Here is my CloudFormation (CFN) template that creates the secret named MySecret
in AWS SecretsManager.
Resources:
MySecret:
Type: "AWS::SecretsManager::Secret"
Properties:
Name: MyDatabaseSecret
Description: Secret for Database Connection
SecretString: !Sub |
{
"DBUserName": "",
"DBPassword": "",
"DBPort":""
}
After creating this secret using this CFN template, I started updating the secret values manually.
At some point, I wanted to add another key named DBName
to this same secret with empty value like "DBName": ""
, or, delete the key "DBPort"
, using the same CFN template. But, for any key modification using the CFN update, I need to provide values for the existing keys as well. Otherwise, the CFN update will overwrite the values with the empty values from the template. I'd like the CFN to get (resolve) the values of the existing keys from the Secret and update them back. Is it possible?
I prefer a CloudFormation solution. If not, then AWS CDK with Python also will help.
No, at least in a single deployment it is not possible and if you retrieve the secret value and assign it back, it will create a circular dependency if you reference to itself.
To resolve the circular dependency, you need to do a two phase deployment. First deployment, create your secret. Second deployment, grab your Secret's ARN and update your CFN template to get the Secret value.
CDK Psuedocode:
You can also put the Secret ARN as a parameter and create a logic like this:
You can use GenerateSecretString to generate a random password. For keys like
DBUserName
orDBPort
, you can use CFN Parameters with your default value. And if you want to update the value, you need update it via CFN and not manually.