crypteia
crypteia copied to clipboard
🧱🔐 Rust Lambda Extension for any Runtime/Container to preload Secure Environment Variables!
Hi, First of all thank you very much for the work put into this, it was a crucial component of moving some of my workloads into lambda, and it works...
Bumps [webpki](https://github.com/briansmith/webpki) from 0.22.0 to 0.22.2. Commits See full diff in compare view [](https://docs.github.com/en/github/managing-security-vulnerabilities/about-dependabot-security-updates#about-compatibility-scores) Dependabot will resolve any conflicts with this PR as long as you don't alter...
Is it possible to load secrets from secrets manager [via the special aws/reference path](https://docs.aws.amazon.com/systems-manager/latest/userguide/integration-ps-secretsmanager.html)? I would love to see loading secrets from secrets manager too
Hi, I spent the afternoon trying to build this and I only managed to build this using [cargo-lambda](https://github.com/cargo-lambda) - because it is using zig build https://www.cargo-lambda.info/commands/build.html#compiler-backends In Codespace and after...
String representation of errors in AWS SDK is quite terrible at the moment and `Err.to_string()` only produces `Service error` while hiding all important aspects. This improvement should display the whole...
Use this env var `AWS_LAMBDA_RUNTIME_API` to avoid to avoid running this https://github.com/customink/crypteia/blob/main/src/main.rs#L18 when not present. Thanks @tdstark
Expressed here, good answers in the replies too. https://github.com/devcontainers/ci/issues/173
Seems AWS is having a SSM issue in us-east-1 today. Perhaps we can have a `CRYPTEIA_AWS_REGION` config here https://github.com/customink/crypteia/blob/main/src/ssm.rs#L7 to force another region in case it is needed?
Thanks to @cameronlynn for pointing this out. It is possible to use two paths where a value like `SECRET` would be in both. ```yaml X_CRYPTEIA_SSM1: x-crypteia-ssm-path:/myapp/1/env X_CRYPTEIA_SSM2: x-crypteia-ssm-path:/myapp/2/env SECRET: x-crypteia...
If you were to print out the full `ENV` object in Ruby it would not show the resolved values because we patch into `getenv` only which comes into play when...