Skip to content
/ mason Public

Create secrets on AWS Secret Manager via config (more natural and easier)

Notifications You must be signed in to change notification settings

umegbewe/mason

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Mason

I have been working with lots of secrets in AWS Secrets Manager the past few days, using the CLI and remembering aws commands is daunting, the console is worse and feels unnatural

I built mason to make stuff easier as simple as defining secrets this way

secrets:
   # create key value secret
  /example/postgres/secret:
    key_value:
      POSTGRES_USERNAME: postgres
      POSTGRES_PASSWORD: password
    tags:
      environment: local
  # create plain text secret
  /example/nas/secret-lyric:
    plaintext: |
      Early on the wakeup
      Cunning as the father of the twelve sons of jacob
      Shake up the world cake crumbs
    tags:
     track: fever
  # create file secret
  /example/file/secret:
    file: "example.json"
    tags:
      file-type: json

Install

go install github.com/umegbewe/mason@latest

Usage

Usage:

    mason [OPTIONS]

Options:

    -profile: AWS profile to use, default is  "default"

    -config: Path to where config for secrets is defined, see secrets.yml for example.

    -region: The region where the secrets should be created. Default is "us-east-1".'

    -kms: KMS key ID or alias to use for encrypting the secrets

License

This tool is released under the MIT License. See LICENSE for more information.

About

Create secrets on AWS Secret Manager via config (more natural and easier)

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages