-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Github secrets become public env variables in AWS console #45
Comments
Hi @ccastaneda-gap, |
We do have the same issue. At the beginning we define the env variables with Github Secrets, e.g.
They get passed into AppRunner
In AWS Console of AppRunner they get shown in plain text. Is there an option to pass in environment variables from SecretsManager or SSM Parameter Store instead? |
You can use env:
SECRET_ENV: ${{ secrets.AWS_SECRET_ARN }}
with:
copy-secret-env-vars: |
SECRET_ENV |
Hi! Any ideas? |
Github secret values are exposed as environment variables in AWS App Runner console, everyone can access them. Am I missing something?
The text was updated successfully, but these errors were encountered: