-
Notifications
You must be signed in to change notification settings - Fork 114
Any plans for adding support for AWS Secrets now supported in Fargate platform version 1.3 #80
Comments
Just created a related issue #93. Currently if you use fargate cli and issue a service deploy it deletes any secrets previous defined in a task definition. This is a blocker for us until it get resolved. |
@jpignata @jeberly @holyjak @billdavidson4 I am willing to open a paid bounty for this feature as we require it. Essentially seems like existing secrets from the
|
@nodesocket just fyi, that our fork has support for secrets in service deploy as well as env set.
|
@jritsema wow, how did I not come across your fork before? This looks awesome. Looks like the deploy command is slightly different. Current:
Your fork:
I will give your fork a try today. |
Yes, it is slightly different. The reason we moved the service argument is so you can maintain a cluster: my-cluster
service: my-service
task: my-task-family
rule: my-cloudwatch-event-rule export AWS_DEFAULT_REGION=us-east-1
fargate service deploy --image "$ECR_REPO/$NAME:$GIT_HASH"
fargate service env set --secret PASSWORD=xyz
fargate service info
fargate service logs |
Just curious if there are any plans to support this or best approach to consume them. Eg. just edit Task Definition.
https://aws.amazon.com/about-aws/whats-new/2018/12/aws-fargate-platform-version-1-3-adds-secrets-support/
Thanks!
The text was updated successfully, but these errors were encountered: