Skip to content

Commit f85bc2f

Browse files
feat: added uses of env-var secret in readme
1 parent c92588b commit f85bc2f

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

docs/terraform_workflow.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@ jobs:
3030
AWS_ACCESS_KEY_ID: # Specify AWS Access key ID
3131
AWS_SECRET_ACCESS_KEY: # Specify AWS Secret Access key ID
3232
AWS_SESSION_TOKEN: # Specify Session ID
33+
env-vars: # Specify env variables. ex. '{"KEY1":"VALUE1", "KEY2":" ${{ secrets.VALUE2 }}"}'
3334

3435
```
3536

@@ -55,6 +56,7 @@ jobs:
5556
destroy: # If the value is set to true, the workflow proceeds to the destroy step. However, the default value is false
5657
secrets:
5758
AZURE_CREDENTIALS: # Specify Azure credentilas
59+
env-vars: # Specify env variables. ex. '{"KEY1":"VALUE1", "KEY2":" ${{ secrets.VALUE2 }}"}'
5860
```
5961
6062
#### Example of a Terraform workflow for a Digitalocean cloud provider
@@ -79,8 +81,7 @@ jobs:
7981
destroy: # If the value is set to true, the workflow proceeds to the destroy step. However, the default value is false
8082
secrets:
8183
DIGITALOCEAN_ACCESS_TOKEN: # Digitalocean token
82-
SPACES_ACCESS_KEY_ID: # Provide spaces access key id if required
83-
SPACES_SECRET_ACCESS_KEY: # Provide spaces secret access key if required
84+
env-vars: # Specify env variables. ex. '{"KEY1":"VALUE1", "KEY2":" ${{ secrets.VALUE2 }}"}'
8485
```
8586
8687
#### Example of a Terraform workflow for a GCP cloud provider
@@ -105,4 +106,5 @@ jobs:
105106
destroy: # If the value is set to true, the workflow proceeds to the destroy step. However, the default value is false
106107
secrets:
107108
GCP_SA_KEY: # GCP service account Secret access key
109+
env-vars: # Specify env variables. ex. '{"KEY1":"VALUE1", "KEY2":" ${{ secrets.VALUE2 }}"}'
108110
```

0 commit comments

Comments
 (0)