From 0d14d7690af7df25212a4da2881ac8f50daaae47 Mon Sep 17 00:00:00 2001 From: Syed Imran Hassan <45480841+syedimranhassan@users.noreply.github.com> Date: Wed, 18 Oct 2023 14:08:07 +0500 Subject: [PATCH] chore: Remove secure repo and fetch secrets from AWS --- devops/resources/user-retirement-archiver.sh | 9 +-------- 1 file changed, 1 insertion(+), 8 deletions(-) diff --git a/devops/resources/user-retirement-archiver.sh b/devops/resources/user-retirement-archiver.sh index b43757e1c..a4b9c3daa 100644 --- a/devops/resources/user-retirement-archiver.sh +++ b/devops/resources/user-retirement-archiver.sh @@ -16,14 +16,7 @@ cd $WORKSPACE/configuration # hide the sensitive information in the logs set +x -SECRET_JSON=$(aws secretsmanager get-secret-value --secret-id "user-retirement-secure/${ENVIRONMENT_DEPLOYMENT}" --region "us-east-1" --output json) -# Check for a successful response -if [ $? -eq 0 ]; then - # Use jq to convert the JSON to YAML - SECRET_YAML=$(echo "$SECRET_JSON" | jq -r '.SecretString' | yq eval - -P) -else - echo "AWS CLI command failed" -fi +SECRET_YAML=$(aws secretsmanager get-secret-value --secret-id "user-retirement-secure/${ENVIRONMENT_DEPLOYMENT}" --region "us-east-1" --output json | jq -r '.SecretString' | yq -y .) set -x