New feature 🎉 - Fetch & injects secrets from AWS SSM parameter store in applications
Whispr now supports AWS SSM Parameter Store as a vault sub-type for AWS vault. It means developers can now store secrets in AWS SSM parameter store as a string/secure string, and fetch & inject them into app/script using Whispr. This is an additional feature to existing AWS Secrets manager.
Usage
1. Run a script with secrets stored in parameter store.
To initialize a new Whispr config with parameter store as vault type:
sh
whispr init aws parameter-store
Or, modify and existing configuration to add a `type` key :
whispr.yaml
yaml
env_file: .env
secret_name: my_secret
vault: aws
type: parameter-store
and launch a script called `script.sh` with
sh
whispr run 'sh script.sh'
This will inspect `.env` file for keys to include, goes to AWS SSM parameter store and fetches the respective values and injects them into environment of `script.sh`. See README.md for more details on this.
2. **Audit a secret quickly**
sh
Prints a JSON format of all keys in given secret
whispr secret get -v aws -s my_secret -t parameter-store
Note: Make sure AWS IAM credentials & region is set before running commands.
What's Changed
* feat/5: Fetch secrets from AWS parameter store by narenaryan in https://github.com/cybrota/whispr/pull/30
**Full Changelog**: https://github.com/cybrota/whispr/compare/v0.6.0...v0.7.0