How to obscure AWS Account ID in SAM pipelineconfig.toml?

0

It's been my understanding that exposing ones AWS Account ID in a public git repository isn't a great idea if it can be avoided. I'm currently spinning up a project with the SAM CLI, using the pipelines feature. This creates a file called pipelineconfig.toml which contains ARNs that show my AWS Account ID. (for IAM roles) Is it possible to do some sort of variable replacement in the config file for the SAM pipeline that doesn't require extra complexity like a custom variable hydration script? Am I simply worrying too much about exposing my AWS Account ID? https://i.imgur.com/AlLnIOl.png

질문됨 2년 전346회 조회
1개 답변
0

I don't see any option for SAM to perform substitution in the configuration file itself. However, account IDs are not sensitive information (for example, see Corey Quinn's recent article including a quote from AWS), so you don't really need to worry about masking them in the configuration file. Of course, you should still be careful not to commit actual credentials to your repo.

profile pictureAWS
전문가
James_S
답변함 2년 전

로그인하지 않았습니다. 로그인해야 답변을 게시할 수 있습니다.

좋은 답변은 질문에 명확하게 답하고 건설적인 피드백을 제공하며 질문자의 전문적인 성장을 장려합니다.

질문 답변하기에 대한 가이드라인

관련 콘텐츠