Utility package for assessing Google Cloud Platform (GCP) secrets uniformly
Project description
Introduction
This project is designed to simplify access to the secrets stored in the Secret Manager within Google Cloud Platform (GCP) during the application development life cycle.
Let's imagine you are developing an application running in Cloud Run using a git repository for code versioning and CI/CD pipelines orchestration. In this case the secrets can be mounted to the Cloud Run container as environmental variables. This provided easy and fast access to the secrets within the deployed application but during the development lifecycle it may cause complications. To keep the secrets only in Secret Manager and avoid a situation of having the secrets on multiple places as environment variables and/or Git repository variables you can use this project.
Quick Start
``python from surquest.GCP.secret_assessor import Secret
secret_value = Secret.get("my-secret-name") ``
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Hashes for surquest_gcp_secret_assessor-0.0.1rc4.tar.gz
Algorithm | Hash digest | |
---|---|---|
SHA256 | 9192fdfb800bf00ae4978afb09bd4493985d0a420fadae9cc67b698b98272f4a |
|
MD5 | adbaf53248d470de68e8550c0b79ca54 |
|
BLAKE2b-256 | dfc70aaf3bdc5859ac76c315c1858567e5db9ee492d0e7eeba556d263ffa37bc |
Hashes for surquest_gcp_secret_assessor-0.0.1rc4-py2.py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | d1a485023001b140c6370545a5f8f9bbd891b8d911b7c7f5c213fe56685e1d10 |
|
MD5 | 9712268c601b377d5c88c08bdb26b8da |
|
BLAKE2b-256 | 2d988cd97405fe31d5b73ab70e4d749f4b61c2ae0e50d52c80273512d879a396 |