//////////// this part does not seem right for use with code-deploy?
Set Profile of IAM User with SecretsManagerReadWrite Permission to ~/.aws/credentials. The following example uses the profile name sample-project-secretsmanager
///////////////// doesn't this defeat the purpose of using a secrets manager? Effectively saving the keys to the kingdom in the ///////////////// settings file?
Using the AWS Credentials Profile
Recommended for use in development environments
//////////// this part does not seem right for use with code-deploy? Set Profile of IAM User with SecretsManagerReadWrite Permission to ~/.aws/credentials. The following example uses the profile name sample-project-secretsmanager
[sample-project-secretsmanager] aws_access_key_id = AKI***** aws_secret_access_key = Mlp****
Then enter the profile name in AWS_SECRETS_MANAGER_PROFILE (or AWS_PROFILE) of the settings module.
settings.py
AWS_SECRETS_MANAGER_PROFILE = 'sample-project-secrets-manager'
Or using AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY
///////////////// doesn't this defeat the purpose of using a secrets manager? Effectively saving the keys to the kingdom in the ///////////////// settings file?
settings.py
AWS_ACCESS_KEY_ID = 'aws-access-key-id' AWS_SECRET_ACCESS_KEY = 'aws-secret-access-key'