-
Notifications
You must be signed in to change notification settings - Fork 80
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS Secret Manager Integration: Allow configurable arbitrary secret prefixes #1442
Labels
Comments
graemerocher
added
type: enhancement
New feature or request
info: good first issue
Good for newcomers
labels
Dec 2, 2022
Hey, I'll try to solve it |
I managed to reproduce the issue described in the first post and will continue working on it |
breader124
pushed a commit
to breader124/micronaut-aws
that referenced
this issue
Feb 12, 2023
… when fetching secrets
breader124
pushed a commit
to breader124/micronaut-aws
that referenced
this issue
Feb 12, 2023
… when fetching secrets
breader124
pushed a commit
to breader124/micronaut-aws
that referenced
this issue
Feb 12, 2023
… when fetching secrets
breader124
pushed a commit
to breader124/micronaut-aws
that referenced
this issue
Feb 12, 2023
… when fetching secrets
breader124
added a commit
to breader124/micronaut-aws
that referenced
this issue
Feb 12, 2023
… when fetching secrets
sdelamo
pushed a commit
that referenced
this issue
Feb 26, 2023
sdelamo
pushed a commit
that referenced
this issue
Feb 26, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
Feature description
I've been investigating the Micronaut AWS Secret Manager integration. Initial setup works like a charm.
However, in our setup we have several secrets which are shared in various ways among different applications, e.g.
Secret 1 is used by Application A and Application B
Secret 2 is used by Application B and Application C.
The AWS IAM permissions are set up so that each application only has access to secrets that it sees.
If we make the secrets available using a common prefix (e.g. based on commonApplicationName), then, once Micronaut encounters a secret to which it has no access, it will stop fetching due to the exception.
Some ideas for improvements:
Thank you!
The text was updated successfully, but these errors were encountered: