@@ -181,6 +181,14 @@ def ci_export(suffix):
181181 "Effect" : "Allow" ,
182182 "Action" : ["secretsmanager:GetSecretValue" ],
183183 "Resource" : [Sub ("${SecretArn}*" , SecretArn = DbSecretArnValue )]
184+ },
185+ {
186+ "Effect" : "Allow" ,
187+ "Action" : ["ssm:GetParameter" ],
188+ "Resource" : [
189+ Sub ("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter/lakerunner/api_keys" ),
190+ Sub ("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter/lakerunner/storage_profiles" )
191+ ]
184192 }
185193 ]
186194 }
@@ -224,10 +232,14 @@ def ci_export(suffix):
224232 Environment (Name = "CONFIGDB_DBNAME" , Value = "lakerunner" ),
225233 Environment (Name = "CONFIGDB_USER" , Value = "lakerunner" ),
226234 Environment (Name = "CONFIGDB_SSLMODE" , Value = "require" ),
235+ Environment (Name = "API_KEYS_FILE" , Value = "env:API_KEYS_ENV" ),
236+ Environment (Name = "STORAGE_PROFILE_FILE" , Value = "env:STORAGE_PROFILES_ENV" ),
227237 ],
228238 Secrets = [
229239 EcsSecret (Name = "LRDB_PASSWORD" , ValueFrom = Sub ("${S}:password::" , S = DbSecretArnValue )),
230- EcsSecret (Name = "CONFIGDB_PASSWORD" , ValueFrom = Sub ("${S}:password::" , S = DbSecretArnValue ))
240+ EcsSecret (Name = "CONFIGDB_PASSWORD" , ValueFrom = Sub ("${S}:password::" , S = DbSecretArnValue )),
241+ EcsSecret (Name = "API_KEYS_ENV" , ValueFrom = Sub ("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter/lakerunner/api_keys" )),
242+ EcsSecret (Name = "STORAGE_PROFILES_ENV" , ValueFrom = Sub ("arn:aws:ssm:${AWS::Region}:${AWS::AccountId}:parameter/lakerunner/storage_profiles" ))
231243 ]
232244 )
233245 ]
0 commit comments