Skip to content

Commit 5ca7cb0

Browse files
committed
add info on GCP secret manager
1 parent 14364fc commit 5ca7cb0

File tree

1 file changed

+9
-1
lines changed

1 file changed

+9
-1
lines changed

README.md

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -67,10 +67,18 @@ MY_DB_PASSWORD=very-secret-password
6767

6868
### Requirement
6969

70-
In order to resolve AWS secrets from AWS Secret Manager and Parameter Store, `secrets-init` should run under IAM role that has permission to access desired secrets.
70+
#### AWS
71+
72+
In order to resolve AWS secrets from AWS Secrets Manager and Parameter Store, `secrets-init` should run under IAM role that has permission to access desired secrets.
7173

7274
This can be achieved by assigning IAM Role to Kubernetes Pod or ECS Task. It's possible to assign IAM Role to EC2 instance, where container is running, but this option is less secure.
7375

76+
#### Google Cloud
77+
78+
In order to resolve Google secrets from Google Secret Manager, `secrets-init` should run under IAM role that has permission to access desired secrets.
79+
80+
This can be achieved by assigning IAM Role to Kubernetes Pod with [Workload Identity](https://cloud.google.com/kubernetes-engine/docs/how-to/workload-identity). It's possible to assign IAM Role to GCE instance, where container is running, but this option is less secure.
81+
7482
## Code Reference
7583

7684
Initial init system code was copied from [go-init](https://github.com/pablo-ruth/go-init) project.

0 commit comments

Comments
 (0)