Skip to content

Latest commit

 

History

History
39 lines (24 loc) · 3.81 KB

UsingTheAwsSecretsManagerPlugin.md

File metadata and controls

39 lines (24 loc) · 3.81 KB

AWS Secrets Manager Plugin

The AWS Advanced NodeJS Wrapper supports usage of database credentials stored as secrets in the AWS Secrets Manager through the AWS Secrets Manager Connection Plugin. When you create a new connection with this plugin enabled, the plugin will retrieve the secret and the connection will be created with the credentials inside that secret.

Prerequisites

Enabling the AWS Secrets Manager Connection Plugin

To enable the AWS Secrets Manager Connection Plugin, add the plugin code secretsManager to the plugins connection parameter.

This plugin requires a valid set of AWS credentials to retrieve the database credentials from AWS Secrets Manager. The AWS credentials must be located in one of these locations supported by the AWS SDK's default credentials provider. See also at AWS Credentials Configuration

AWS Secrets Manager Connection Plugin Parameters

The following properties are required for the AWS Secrets Manager Connection Plugin to retrieve database credentials from the AWS Secrets Manager.

Note

To use this plugin, you will need to set the following AWS Secrets Manager specific parameters.

Parameter Value Required Description Example Default Value
secretId String Yes Set this value to be the secret name or the secret ARN. secretId null
secretRegion String Yes unless the secretId is an ARN Set this value to be the region your secret is in. us-east-2 null
secretEndpoint String No Set this value to be the endpoint override to retrieve your secret from. This parameter value should be in the form of a URL, with a valid protocol (ex. https://) and domain (ex. localhost). A port number is not required. https://localhost:1234 null

Note

A Secret ARN has the following format: arn:aws:secretsmanager:<Region>:<AccountId>:secret:SecretName-6RandomCharacters

Secret Data

The plugin assumes that the secret contains the following properties username and password.

Example

Examples of making a connection using credentials fetched from the AWS Secrets Manager can be found at: PostgreSQL example and MySQL example