Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(cli): enable secret init #2335

Merged
merged 11 commits into from
May 18, 2021
Merged

feat(cli): enable secret init #2335

merged 11 commits into from
May 18, 2021

Conversation

Lou1415926
Copy link
Contributor

@Lou1415926 Lou1415926 commented May 17, 2021

Resolves #1920

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@Lou1415926 Lou1415926 requested a review from a team as a code owner May 17, 2021 21:09
@Lou1415926 Lou1415926 requested a review from huanjani May 17, 2021 21:09
"sort"
"strings"
goTemplate "text/template"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
goTemplate "text/template"
txttemplate "text/template"

https://rakyll.org/style-packages/#renames-should-follow-the-same-rules

tmpl, _ := goTemplate.New("secretInitOutput").Parse(templateRaw)

log.Infoln("You can refer to these secrets from your manifest file by editing the `secrets` section.")
return tmpl.Execute(os.Stdout, secretInitOutput{
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice!

Comment on lines 485 to 491
/code $ copilot secret init
Create a secret named db-password.
You will be prompted for the values you want for db-password in each existing environments.
/code $ copilot secret init --name db-password
Create a secret named db-password with values you want in each existing environments.
You will be prompted for the values you want for db-password in each existing environments.
/code $ copilot secret init --name db-password
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this repeated twice?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Addressed! I also addressed your feedback from last round (sorry I missed your comment somehow), shortening the example description language so that they are more terse. However I removed the one with --values flag since we want to encourage the user to use guided/input file so that the values are not visible in shell history.

@mergify mergify bot merged commit c1a21aa into aws:mainline May 18, 2021
thrau pushed a commit to localstack/copilot-cli-local that referenced this pull request Dec 9, 2022
Resolves aws#1920

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Feature request: add secret init command to simplify adding SSM secure parameters
3 participants