We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
We want to parse the Outputs section of the addons template generated in #646 to detect if an output value refers to a secret.
Outputs
See this gist for an example on how to do this with awslabs/goformation: https://gist.github.com/efekarakus/14814a0043905e5242626922b01ea859
package addons type Outputs structs { ManagedPolicyARN string EnvVars []string Secrets []string } func (a *Addons) Outputs(template string) (*Outputs, error)
The Outputs object can then be passed into the web app template to inject secrets, env variables, and the managed policy!
The text was updated successfully, but these errors were encountered:
chore: parse addons template outputs to detect secrets and policies (#…
53d987f
…684) Resolves #681
efekarakus
Successfully merging a pull request may close this issue.
Task
We want to parse the
Outputs
section of the addons template generated in #646 to detect if an output value refers to a secret.Programming model
See this gist for an example on how to do this with awslabs/goformation: https://gist.github.com/efekarakus/14814a0043905e5242626922b01ea859
The
Outputs
object can then be passed into the web app template to inject secrets, env variables, and the managed policy!The text was updated successfully, but these errors were encountered: