-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Secrets manager plus usage in RDS create #32
Closed
Closed
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
…ce clean vcr secrets hiding workflow
- added two new pkg imports: uuid, jsonlite - rds create now creates username and password for the user, storing in aws secrets manager
sean feedback
|
- update return docs for both fxns - change test for both fxns
workflow from sean: aws_user_create("scott") # exists
aws_db_rds_create("aaa", "mariadb") # exists
add_user_to_rds_db("scott") # DOES NOT EXIST
aws_db_rds_list() # exists
#> # A tibble: 2 × 5
#> DBInstanceIdentifier DBInstanceClass Engine DBInstanceStatus DBName
#> <chr> <chr> <chr> <chr> <chr>
#> 1 aaa db.t3.micro mariadb available dev
#> 2 bbb db.t3.micro mariadb available dev
con <- aws_db_rds_con("aaa") # exists
# do things with DBI/dplyr/etc 3 steps that need to happen for connecting to a DB instance using IAM authentication::
Probably |
…fetch_secret b/c of refactor
- users: add aws_user_add_to_rds fxn to give a user IAM access to an RDS database - not working yet! - policies: add two fxns for policy create and create a policy document - a few helper fxns added for stop if and stop if not
Going to try to split up this PR or possibly close and create two new ones for:
|
Merged
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
@seankross Here's the high level changes here:
Add family of functions for AWS secrets manager
fix #29
Integrate secrets into RDS database create
Redshift uses the user's IAM credentials so I think it only makes sense to use secrets manager in RDS.
So
aws_db_rds_create
now allows the user to not pass in a user or password, and we create them for the user. Likewise,aws_db_rds_con
automatically detects secrets in the users aws secrets manager and presents those in a prompt and asks which one they'd like to use, an example:Make the DB
Get the conn
Secrets management
make scan_secrets
to run the command line toolgitleaks
(https://github.com/gitleaks/gitleaks) on the repo. this isn't run automatically anywhere yet, just manually. they do have a github action for it too