Skip to content
This repository has been archived by the owner on Aug 1, 2024. It is now read-only.

Add support for stack parameters from ConfigMaps #4

Open
clareliguori opened this issue Mar 20, 2023 · 2 comments
Open

Add support for stack parameters from ConfigMaps #4

clareliguori opened this issue Mar 20, 2023 · 2 comments

Comments

@clareliguori
Copy link
Member

clareliguori commented Mar 20, 2023

Enable users to add parameters to their CFN templates, then provide parameter values in the spec for the CloudFormationStack object from Kubernetes ConfigMaps.

@clareliguori clareliguori changed the title Add support for stack parameters Add support for stack parameters from ConfigMaps Apr 5, 2023
@artem-nefedov
Copy link

Inputs from Secrets should probably be supported as well, considering that sensitive data should never be stored in any k8s object besides Secret.

@clareliguori
Copy link
Member Author

Generally CloudFormation parameter values should not be sensitive data. As a best practice, CloudFormation recommends using dynamic parameters that pull sensitive values directly from Secrets Manager or Systems Manager Parameter Store, to reduce the likelihood that this sensitive info will be accidentally exposed (for example, forgetting to set the NoEcho flag on a parameter in your template).
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/dynamic-references.html

With the AWS provider for the Secrets Store CSI Driver, you can store a sensitive value in Secrets Manager and then have it available to both your Kubernetes cluster as a Secret object and also to your CloudFormation template.
https://github.com/aws/secrets-store-csi-driver-provider-aws

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants