-
Notifications
You must be signed in to change notification settings - Fork 819
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automatic Lambda cross-env variables / secrets #13087
Comments
Hey @redjonzaci, this is currently not supported in Amplify CLI. As this would pose security issues in your environment.
|
Hey @ykethan thanks for the response! I think I understand that we could set the secrets on a "main" env and then on each new PR copy those, but how would the Lambda access them? Or is that done automatically, when secrets with that Lambda's name exist in the env? |
Hey @redjonzaci, the permissions for SSM access is generated with the related: #12950 |
@ykethan I got a little confused by the answer, and I couldn't find the "Point all Pull Requests" option, |
@redjonzaci the |
Hey @redjonzaci are you still experiencing this? Were you able to successfully set up and use secrets/env vars in SSM for PR previews? |
Hey @josefaidt, we settled on this solution, so for the moment, it's okay. |
@redjonzaci thank you for the confirmation. closing the issue, please feel free in reaching out to us again. |
|
Amplify CLI Version
12.2.3
Question
I tried
amplify update function
and added an environment secret.I thought that it would automatically be added to any new env I created, but it didn't.
Now the problem is that we only use PR preview environments and the build fails because the environment secret has no value for this new env.
What would be the suggested approach to use an environment secret in every env,
without having to manually add it whenever a new env is created?
The text was updated successfully, but these errors were encountered: