thoreinstein / serverless-offline-ssm

Read SSM parameters from a .env file instead of AWS

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Questions

bitsofinfo opened this issue · comments

My secrets in SSM in AWS are there because they are sensitive.

Do I have to copy those secrets into my local serverless.yml or the .env files in order to use this?

Doesn't that defeat the purpose? Both of those files are in git.... so now I have to remember to wipe that data prior to code updates? .env is already used by the https://www.serverless.com/plugins/serverless-dotenv-plugin which conflicts.

Maybe an additional option to permit a custom config file? That would be a great additions then I could have .ssm-secrets and put it in a gitignore.

If your .env file contains secrets then it should not be committed to git.

Yes, you are correct in that this plugin is a direct conflict with the serverless-dotenv-plugin and they were never intended to be used together. This plugin was created to be used only when running the serverless-offline plugin to prevent it from reaching out to AWS to read SSM parameters. Any use case outside of that is outside of the scope of this plugin and should be supported by something else.

yes, thats exactly my use case. serverless-dotenv-plugin and serverless-offline

I have no intention of making this plugin support use cases outside of what I have already mentioned above.