insert secrets dynamically, expect uniqueness to fail
parent
b379560f74
commit
5b8b8d8334
|
|
@ -495,7 +495,7 @@ class AWS {
|
|||
].join('');
|
||||
const indexp2 = taskDefCloudFormation.search(p2string) + p2string.length + '\n'.length;
|
||||
const template2 = `
|
||||
${secret.ParameterKey}Secret:
|
||||
${secret.ParameterKey}Secret:
|
||||
Type: AWS::SecretsManager::Secret
|
||||
Properties:
|
||||
Name: !Join [ "", [ '${secret.ParameterKey}', !Ref BUILDID ] ]
|
||||
|
|
@ -509,7 +509,8 @@ class AWS {
|
|||
const indexp3 = taskDefCloudFormation.search(p3string) + p3string.length + '\n'.length;
|
||||
const template3 = `
|
||||
- Name: '${secret.ParameterKey.toUpperCase()}'
|
||||
ValueFrom: !Ref ${secret.ParameterKey}Secret`;
|
||||
ValueFrom: !Ref ${secret.ParameterKey}Secret
|
||||
`;
|
||||
taskDefCloudFormation = [
|
||||
taskDefCloudFormation.slice(0, indexp3),
|
||||
template3,
|
||||
|
|
|
|||
File diff suppressed because one or more lines are too long
|
|
@ -350,7 +350,7 @@ class AWS {
|
|||
].join('');
|
||||
const indexp2 = taskDefCloudFormation.search(p2string) + p2string.length + '\n'.length;
|
||||
const template2 = `
|
||||
${secret.ParameterKey}Secret:
|
||||
${secret.ParameterKey}Secret:
|
||||
Type: AWS::SecretsManager::Secret
|
||||
Properties:
|
||||
Name: !Join [ "", [ '${secret.ParameterKey}', !Ref BUILDID ] ]
|
||||
|
|
@ -364,7 +364,8 @@ class AWS {
|
|||
const indexp3 = taskDefCloudFormation.search(p3string) + p3string.length + '\n'.length;
|
||||
const template3 = `
|
||||
- Name: '${secret.ParameterKey.toUpperCase()}'
|
||||
ValueFrom: !Ref ${secret.ParameterKey}Secret`;
|
||||
ValueFrom: !Ref ${secret.ParameterKey}Secret
|
||||
`;
|
||||
taskDefCloudFormation = [
|
||||
taskDefCloudFormation.slice(0, indexp3),
|
||||
template3,
|
||||
|
|
|
|||
Loading…
Reference in New Issue