You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The GitLab Runner should be able to dynamically resolve the GitLab token from AWS Secrets Manager.
Use Case
Get rid of the need to pass a token and write it into the resulting CloudFormation template in clear text.
Proposed Solution
Introduce an additional field gitlabTokenSecretName into the props.
If gitlabToken is not specified and gitlabTokenSecretName is, the construct adds the command $(aws secretsmanager get-secret-value --region ${Aws.REGION} --secret-id gitlab-runner --query SecretString --output text | grep -o '"registration-token":"[^"]*' | grep -o '[^"]*$') instead of the clear text token into the user data.
If gitlabTokenSecretName is specified, the constructs adds read permissions for the secrets to the instance role:
The GitLab Runner should be able to dynamically resolve the GitLab token from AWS Secrets Manager.
Use Case
Get rid of the need to pass a token and write it into the resulting CloudFormation template in clear text.
Proposed Solution
gitlabTokenSecretName
into the props.gitlabToken
is not specified andgitlabTokenSecretName
is, the construct adds the command$(aws secretsmanager get-secret-value --region ${Aws.REGION} --secret-id gitlab-runner --query SecretString --output text | grep -o '"registration-token":"[^"]*' | grep -o '[^"]*$')
instead of the clear text token into the user data.gitlabTokenSecretName
is specified, the constructs adds read permissions for the secrets to the instance role:Other
Successfully tested the proposed solution with the existing construct.
This is a 🚀 Feature Request
The text was updated successfully, but these errors were encountered: