Secrets Consumer for GCP Secret Manager
GCP secrets manager can hold secrets in plain text, it does not bind a format, in order to work with this tool you must use a JSON format for your secrets.
GCP secrets manager can hold a numerical version number, and you can specify it using SECRET_VERSION
This app is working using the Application Default Credentials
you must either use export GOOGLE_APPLICATION_CREDENTIALS=<path-to-service-account-json-file>
or use the command
gcloud auth application-default login
The logged in serviceAccount or User must have the permissions/role roles/secretmanager.secretAccessor
to the secret
secrets-consumer-env gcp [flags]
-a, --google-application-credentials string The file path to the GCP service account json file with permission to the secret
-h, --help help for gcp
--project-id string GCP Project ID the Secret Manager is on
--secret-name string GCP Secret Name
--secret-version string GCP Secret Version (default: latest) (default "latest")
--config string config file (default is $HOME/.secrets-consumer-env.yaml)
-v, --verbosity string Log level (debug, info, warn, error, fatal, panic (default "info")
- secrets-consumer-env - Consume secrets from AWS, GCP or Hashicorp Vault