-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Support for Secret Manager #35
Comments
If it's alright with the community, I'd like to contribute this feature to |
👋 #33 already covers getting a secret version, but doesn’t implement creating a secret or secret version. |
Perfect timing. That's all I needed for my use case, accessing secrets in secret manager. Thanks for your contribution. I'll try out the fork next week. |
Released and tagged in RC 5 |
Motivation
For Serverless products like
Cloud Run
, one should not be injecting secrets into your backend service via Environment Variables. Thus, one should use Google Cloud'sSecret Manager
to query for sensitive information like Database Passwords. It seems that there would be a great advantage to have the logic to retrieve secrets inGoogleCloudKit
Implementation
Much of the work for authentication can be re-used from
GoogleCloudCore
. A request would only need the OAuth token, provided byOAuthRefreshable
. From the Secret Manager api docs, a request would be simple enough to implement with the tokenCreate a Secret
Retrieve a Secret
The text was updated successfully, but these errors were encountered: