Move to different repo? Add Support for Native Secrets Management services #5625
+3,330
−520
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Closes: #4545
This change adds native support for deploying secrets to AWS, Azure, and Google Cloud’s secrets management services. The script now handles secret creation and updating for:
Change Type
Testing
Test Configuration:
AWS Testing:
AWS_REGION
and your AWS credentials (e.g.,AWS_ACCESS_KEY_ID
,AWS_SECRET_ACCESS_KEY
).Azure Testing:
KEY_VAULT_URL
along with necessary Azure credentials.AZURE_SUBSCRIPTION_ID
,AZURE_RESOURCE_GROUP
, andAZURE_WEBAPP_NAME
along with other required credentials.GCP Testing:
GCP_PROJECT_ID
and configure your GCP credentials..env
file are processed.Checklist