|
20 | 20 | RetentionInDays log_retention |
21 | 21 | } |
22 | 22 |
|
23 | | - definitions, task_volumes, secrets = Array.new(4){[]} |
| 23 | + definitions, task_volumes, secrets = Array.new(3){[]} |
24 | 24 | secrets_policy = {} |
25 | 25 |
|
26 | 26 | task_definition = external_parameters.fetch(:task_definition, {}) |
|
190 | 190 | if task['secrets'].key?('ssm') |
191 | 191 | secrets.push *task['secrets']['ssm'].map {|k,v| { Name: k, ValueFrom: v.is_a?(String) && v.start_with?('/') ? FnSub("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter#{v}") : v }} |
192 | 192 | resources = task['secrets']['ssm'].map {|k,v| v.is_a?(String) && v.start_with?('/') ? FnSub("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter#{v}") : v } |
193 | | - secrets_policy['ssm-secrets'] = { |
| 193 | + secrets_policy["ssm-secrets-#{task_name}"] = { |
194 | 194 | 'action' => 'ssm:GetParameters', |
195 | 195 | 'resource' => resources |
196 | 196 | } |
|
200 | 200 | if task['secrets'].key?('secretsmanager') |
201 | 201 | secrets.push *task['secrets']['secretsmanager'].map {|k,v| { Name: k, ValueFrom: v.is_a?(String) && v.start_with?('/') ? FnSub("arn:aws:secretsmanager:${AWS::Region}:${AWS::AccountId}:secret:#{v}") : v }} |
202 | 202 | resources = task['secrets']['secretsmanager'].map {|k,v| v.is_a?(String) && v.start_with?('/') ? FnSub("arn:aws:secretsmanager:${AWS::Region}:${AWS::AccountId}:secret:#{v}-*") : v } |
203 | | - secrets_policy['secretsmanager'] = { |
| 203 | + secrets_policy["secretsmanager-#{task_name}"] = { |
204 | 204 | 'action' => 'secretsmanager:GetSecretValue', |
205 | 205 | 'resource' => resources |
206 | 206 | } |
|
210 | 210 | unless task['secrets'].empty? |
211 | 211 | secrets.push *task['secrets'].map {|k,v| { Name: k, ValueFrom: v.is_a?(String) && v.start_with?('/') ? FnSub("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter#{v}") : v }} |
212 | 212 | resources = task['secrets'].map {|k,v| v.is_a?(String) && v.start_with?('/') ? FnSub("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter#{v}") : v } |
213 | | - secrets_policy['ssm-secrets-inline'] = { |
| 213 | + secrets_policy["ssm-secrets-inline-#{task_name}"] = { |
214 | 214 | 'action' => 'ssm:GetParameters', |
215 | 215 | 'resource' => resources |
216 | 216 | } |
|
0 commit comments