- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
How to use Boto3 to get the secret keys as plain text from binary/encrypted format in AWS Secret Manager
Problem Statement: Use boto3 library in Python to get the secret keys as plain text from binary/encrypted format present in AWS Secret Manager
Approach/Algorithm to solve this problem
Step 1: Import boto3 and botocore exceptions to handle exceptions.
Step 2: secret_stored_location is the required parameter. It is a place where secrets are saved.
Step 3: Create an AWS session using boto3 lib. Make sure region_name is mentioned in the default profile. If it is not mentioned, then explicitly pass the region_name while creating the session.
Step 4: Create an AWS client for secretmanager.
Step 5: Call get_secret_value and pass the secret_stored_location as SecretId.
Step 6: Check whether it is plain text or encrypted one.
Step 7: If it is encrypted one, call the function to decode binary values using base64.b64decode
Step 8: It returns all the secrets as decrypted mode, i.e., plain text in the given location.
Step 9: Handle the generic exception if something went wrong while retrieving values.
Example Code
Use the following code to get the decrypted plain text secret from AWS secret Manager −
import boto3 from botocore.exceptions import ClientError def get_decrypted_secret_details(secret_stored_location): session = boto3.session.Session() s3_client = session.client('secretmanager') try: response = s3_client.get_secret_value(SecretId=secret_stored_location) if not ('SecretString' in response): decoded_secret_values = base64.b64decode(response['SecretBinary']) return decoded_secret_values except ClientError as e: raise Exception("boto3 client error in get_decrypted_secret_details: " + e.__str__()) except Exception as e: raise Exception("Unexpected error in get_decrypted_secret_details: " + e.__str__()) a = get_decrypted_secret_details('/secrets/aws') print(a)
Output
{"user":"SERVICE_USER","accesskey":"I**************"}
- Related Articles
- How to use Boto3 to get the secret keys saved as plain text from AWS Secret Manager
- How to use Boto3 to create a secret key as plain text in AWS Secret Manager
- How to use Boto3 to update the secret keys from a specific location in AWS Secret Manager
- How to use Boto3 to delete all secret keys from a specific location in AWS Secret Manager
- How to use Boto3 to restore all secret keys from a a specific location in AWS Secret Manager
- How to use Boto3 to store a new secret in a specific location in AWS Secret Manager
- How to use Boto3 to get a list of all secrets in AWS Secret Manager
- How to use Boto3 to get the details of secrets from a specific location in AWS Secret Manager
- How to use Boto3 to generate a random password in AWS Secret Manager
- How to use Boto3 to find whether a function can paginate or not in AWS Secret Manager
- How to use Boto3 to get tags from an AWS Glue Resources
- How to use Boto3 to get the details of a classifier from AWS Glue Data catalog?
- How to use Boto3 to get the details of a connection from AWS Glue Data catalog?
- How to use Boto3 to get the details of a database from AWS Glue Data Catalog?
- How to use Boto3 to get the list of schemas present in AWS account
