-
-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws+sm datasource only supports path-like secret names #868
Comments
Hmm... There's some ambiguity here. Given An option is to support an opaque URI, like What would be especially awkward is to use the authority part and have How does the opaque option sound @RecuencoJones? In your example you'd use this command:
If this works, it probably should be applied to the |
I think the opaque URI fits really well, I actually tested the following and worked with a secret named
So definitely, having just |
I think Glad to hear the opaque one works - I'll use that for the bugfix 🙂 |
@hairyhenderson, I am currently trying to use aws+sm datasource but it seems to be broken with 4.x gomplate while same is working with gomplate 3.x. After checking related cloudtrail event, I see that gomplate is adding "/" as prefix for Opaque URLs to secret manager ID. For example, with gomplate 4.x, when I try running gomplate -c 'secrets=aws+sm:foo' --in {{.secrets}} then it's trying to get secret value for ID "/foo". Is it related to breaking changes in 4.x gomplate? |
@shashank201192 please file an issue or start a discussion - this issue has been closed for over 4 years |
As per #867, looks like
aws+sm
schema only works with Unix path secret names (/like/this
) but would fail otherwise,Test with a secret named
some-secrets
:Failing with:
However, when just using
aws+sm:
as a datasource then it can be used like this:The text was updated successfully, but these errors were encountered: