You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|**POWERTOOLS_LOG_DEDUPLICATION_DISABLED**| Disables log deduplication filter protection to use Pytest Live Log feature |[Logging](./core/logger)|`false`|
709
+
|**POWERTOOLS_PARAMETERS_SSM_DECRYPT**| Sets whether to decrypt or not values retrieved from AWS SSM Parameters Store |[Parameters](.//utilities/parameters/#ssmprovider)|`false`|
709
710
|**POWERTOOLS_DEV**| Increases verbosity across utilities | Multiple; see [POWERTOOLS_DEV effect below](#increasing-verbosity-across-utilities)|`false`|
Copy file name to clipboardExpand all lines: docs/utilities/parameters.md
+3Lines changed: 3 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -179,6 +179,9 @@ The AWS Systems Manager Parameter Store provider supports two additional argumen
179
179
180
180
You can create `SecureString` parameters, which are parameters that have a plaintext parameter name and an encrypted parameter value. If you don't use the `decrypt` argument, you will get an encrypted value. Read [here](https://docs.aws.amazon.com/kms/latest/developerguide/services-parameter-store.html) about best practices using KMS to secure your parameters.
181
181
182
+
???+ tip
183
+
If you want to always decrypt parameters, you can set the `POWERTOOLS_PARAMETERS_SSM_DECRYPT=true` environment variable. **This will override the default value of `false` but can be overridden by the `decrypt` parameter**.
0 commit comments