Read Google cloud secrets from Secret Manager using service account.
- Create service account and download json key
- Add in IAM role
Secret Manager Secret Accessor
role - export env variable
GOOGLE_APPLICATION_CREDENTIALS
with your service account key file
gcp-secret -p project-id -s secretname
go build
- Secret value for latest version of secret
- Add versioning support
- Add flag to list all secrets available
- Add possibility to save new version of secret