This repository has been archived by the owner on Feb 16, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 11
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'develop' into release/v1.1.0
- Loading branch information
Showing
4 changed files
with
49 additions
and
10 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
--- | ||
layout: "secrethub" | ||
page_title: "Resource: secrethub_service_gcp" | ||
sidebar_current: "docs-secrethub-resource-service-gcp" | ||
description: |- | ||
Creates and manages SecretHub service accounts tied to a GCP Service Account. | ||
--- | ||
|
||
# Resource: secrethub_service_gcp | ||
|
||
This resource allows you to manage a SecretHub service account that is tied to a GCP Service Account. | ||
|
||
The GCP identity provider uses a combination of Cloud IAM and Cloud KMS to read secrets from SecretHub from any app running on Google Cloud (GCE, GKE, etc.) without needing to manage another key. | ||
|
||
## GCP Project link | ||
|
||
Before you can use this resource, you first have to link your SecretHub namespace with your GCP project. | ||
You only have to do this once for your namespace and GCP project. | ||
|
||
Because the linking process uses OAuth and therefore needs a web browser login, it cannot be Terraformed and needs the SecretHub CLI: | ||
|
||
``` | ||
secrethub service gcp link <namespace> <project id> | ||
``` | ||
|
||
## Argument Reference | ||
|
||
The following arguments are supported: | ||
|
||
* `service_account_email` - (Required) The email of the Google Service Account that provides the identity of the SecretHub service account. | ||
* `kms_key_id` - (Required) The Resource ID of the Cloud KMS key to use to encrypt and decrypt your SecretHub key material. | ||
* `repo` - (Required) The path of the repository on which the service operates. | ||
* `description` - (Optional) A description of the service so others will recognize it. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters