Skip to content

Latest commit

 

History

History
47 lines (31 loc) · 1.65 KB

secrets-consumer-env_gcp.md

File metadata and controls

47 lines (31 loc) · 1.65 KB

secrets-consumer-env gcp

Secrets Consumer for GCP Secret Manager

Synopsis

GCP secrets manager can hold secrets in plain text, it does not bind a format, in order to work with this tool you must use a JSON format for your secrets.

GCP secrets manager can hold a numerical version number, and you can specify it using SECRET_VERSION

This app is working using the Application Default Credentials

you must either use export GOOGLE_APPLICATION_CREDENTIALS=<path-to-service-account-json-file> or use the command

gcloud auth application-default login

The logged in serviceAccount or User must have the permissions/role roles/secretmanager.secretAccessor to the secret

secrets-consumer-env gcp [flags]

Options

  -a, --google-application-credentials string   The file path to the GCP service account json file with permission to the secret
  -h, --help                                    help for gcp
      --project-id string                       GCP Project ID the Secret Manager is on
      --secret-name string                      GCP Secret Name
      --secret-version string                   GCP Secret Version (default: latest) (default "latest")

Options inherited from parent commands

      --config string      config file (default is $HOME/.secrets-consumer-env.yaml)
  -v, --verbosity string   Log level (debug, info, warn, error, fatal, panic (default "info")

SEE ALSO

Auto generated by spf13/cobra on 29-Apr-2020