使用AWS Secret Manager配置knexfile.js

时间:2018-06-30 07:02:23

标签: javascript node.js amazon-web-services knex.js aws-secrets-manager

我需要使用从机密管理器检索到的机密配置knexfile.js。 我从密码管理器中检索密码并将其存储在密码变量中,并在配置中使用它。

var AWS = require('aws-sdk'),
endpoint = "abcd",
region = "us-east-1",
secretName = "abcd",
secret,
binarySecretData;

var client = new AWS.SecretsManager({
endpoint: endpoint,
region: region
});
client.getSecretValue({
SecretId: secretName
}, function (err, data) {
if (err) {
if (err.code === 'ResourceNotFoundException')
    console.log("The requested secret " + secretName + " was not found");
else if (err.code === 'InvalidRequestException')
    console.log("The request was invalid due to: " + err.message);
else if (err.code === 'InvalidParameterException')
    console.log("The request had invalid params: " + err.message);
} else {
if (data.SecretString !== "") {
    secret = data.SecretString;
} else {
    binarySecretData = data.SecretBinary;
}
}
});
module.exports = {
development: {
    client: secret.localClient,
    connection: {
        host: secret.localHost,
        user: secret.localUser,
        password: secret.localPassword,
        database: secret.localDatabase,
        charset: "utf8"
    }
},
};

但是显示错误     TypeError:无法读取未定义的属性“ localClient”

2 个答案:

答案 0 :(得分:0)

获取秘密是异步操作,因此,当您尝试从knexfile.js导出变量时,变量driver.FindElementByCss("").sendKeys Username 尚不存在。

启动虚拟机时,您可能应该首先获取要存储在本地的机密,然后在knexfile.js中例如从本地文件同步读取它。

答案 1 :(得分:0)

现在可以在Knex中实现。您可以将异步函数传递给configuration

async function getConfig() {
  return new Promise((resolve, reject) => {
   client.getSecretValue({ SecretId: 'SECRETID' }, function(
    err,
    data
  ) {
    if (err) {
      console.log('secretsErr', err);
      reject(err);
    } else {
      console.log('Secrets Manager call successful');
      if ('SecretString' in data) {
        let secret = data.SecretString;
        secret = JSON.parse(secret);
        const config = {
          user: secret.DbUser,
          password: secret.DbPassword,
          server: secret.DbServer,
          database: secret.DbDatabase,
          expirationChecker: () => false,
          options: {
            encrypt: true,
            enableArithAbort: true
          }
        };
        resolve(config);
      } else {
        console.log('no secret found');
        reject();
      }
    }
  });
}

let knex = require('knex')({
  client: 'mssql',
  connection: async function() {
    return await getConfig();
  }
});