Created
October 17, 2019 10:46
-
-
Save MrHassanMurtaza/ce159ec380cd8f1c3aad012bcb100a47 to your computer and use it in GitHub Desktop.
secret-manager-to-env
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
// Use this code snippet in your app. | |
// If you need more information about configurations or implementing the sample code, visit the AWS docs: | |
// https://aws.amazon.com/developers/getting-started/nodejs/ | |
// Load the AWS SDK | |
DEPLOYMENT_GROUP_NAME = process.env.DEPLOYMENT_GROUP_NAME | |
var AWS = require('aws-sdk'), | |
region = "us-west-2", | |
secretName = `${DEPLOYMENT_GROUP_NAME}`, | |
secret, | |
decodedBinarySecret; | |
var fs = require('fs'); | |
// Create a Secrets Manager client | |
var client = new AWS.SecretsManager({ | |
region: region | |
}); | |
// In this sample we only handle the specific exceptions for the 'GetSecretValue' API. | |
// See https://docs.aws.amazon.com/secretsmanager/latest/apireference/API_GetSecretValue.html | |
// We rethrow the exception by default. | |
client.getSecretValue({SecretId: secretName}, function(err, data) { | |
if (err) { | |
console.log("*******************************") | |
console.log("Error fetching secrets") | |
console.log("*******************************") | |
process.exit(1); | |
if (err.code === 'DecryptionFailureException') | |
// Secrets Manager can't decrypt the protected secret text using the provided KMS key. | |
// Deal with the exception here, and/or rethrow at your discretion. | |
throw err; | |
else if (err.code === 'InternalServiceErrorException') | |
// An error occurred on the server side. | |
// Deal with the exception here, and/or rethrow at your discretion. | |
throw err; | |
else if (err.code === 'InvalidParameterException') | |
// You provided an invalid value for a parameter. | |
// Deal with the exception here, and/or rethrow at your discretion. | |
throw err; | |
else if (err.code === 'InvalidRequestException') | |
// You provided a parameter value that is not valid for the current state of the resource. | |
// Deal with the exception here, and/or rethrow at your discretion. | |
throw err; | |
else if (err.code === 'ResourceNotFoundException') | |
// We can't find the resource that you asked for. | |
// Deal with the exception here, and/or rethrow at your discretion. | |
throw err; | |
} | |
else { | |
// Decrypts secret using the associated KMS CMK. | |
// Depending on whether the secret is a string or binary, one of these fields will be populated. | |
if ('SecretString' in data) { | |
secret = JSON.parse(data.SecretString); | |
for (let key in secret) { | |
if(secret.hasOwnProperty(key)) | |
fs.appendFile('.env', `${key}='${secret[key]}'` + '\r\n', function (err) { | |
if (err) throw err; | |
console.log(`${key}='${secret[key]}' Saved!`); | |
}); | |
} | |
} else { | |
let buff = new Buffer(data.SecretBinary, 'base64'); | |
decodedBinarySecret = buff.toString('ascii'); | |
} | |
} | |
// Your code goes here. | |
}); |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment