You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/docs/Applications/Overview.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -120,7 +120,7 @@ A star, like `PROD*` in the `app list` output indicates that there are staged ch
120
120
121
121
By default, apps are created with the no authentication type. `system` auth uses `admin` as the username. The password is displayed on the screen during the initial setup of the OpenRun server config.
122
122
123
-
To change app auth type, add `--auth system` to the `app create` command. After an app is created, the auth type can be changed by running `app update auth system /myapp`. OAuth based authentication is also supported, see [authentication]({{< ref "docs/configuration/authentication" >}}) for details.
123
+
To change app auth type, add `--auth system` to the `app create` command. After an app is created, the auth type can be changed by running `app update auth --promote system /myapp`. OAuth based authentication is also supported, see [authentication]({{< ref "docs/configuration/authentication" >}}) for details.
124
124
125
125
{{<callouttype="warning" >}}
126
126
Changes done to the app settings using the `app settings` command are **NOT** staged or versioned, they apply immediately to the stage/prod/preview apps.
Copy file name to clipboardExpand all lines: content/docs/Configuration/Secrets.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,9 +8,9 @@ OpenRun supports secret management when working with apps. Secrets can be passed
8
8
9
9
## Supported Providers
10
10
11
-
OpenRun currently supports AWS Secrets Manager (ASM), AWS SSM and HashiCorp Vault as providers for secrets management. Secrets can also be read from the environment of the OpenRun server, which can be used in development and testing. Secrets can also be read from a local properties file.
11
+
OpenRun currently supports AWS Secrets Manager (ASM), AWS Systems Manager (SSM) and HashiCorp Vault as providers for secrets management. Secrets can also be read from the environment of the OpenRun server, which can be used in development and testing. Secrets can also be read from a local properties file.
12
12
13
-
## AWS Secrets Manager
13
+
###AWS Secrets Manager
14
14
15
15
To enable ASM, add one or more entries in the `openrun.toml` config. The config name should be `asm` or should start with `asm_`. For example
16
16
@@ -26,7 +26,7 @@ creates two ASM configs. `asm` uses the default profile and `asm_prod` uses the
26
26
27
27
To access a secret in app parameters from `asm_prod` config, use `--param MYPARAM='{{secret_from "asm_prod" "MY_SECRET_KEY"}}'` as the param value. Use `--param MYPARAM='{{secret "MY_SECRET_KEY"}}'` to read from the default provider.
28
28
29
-
## AWS Systems Manager (SSM)
29
+
###AWS Systems Manager (SSM)
30
30
31
31
To enable SSM, add one or more entries in the `openrun.toml` config. The config name should be `ssm` or should start with `ssm_`. For example
32
32
@@ -42,7 +42,7 @@ creates two SSM configs. `ssm` uses the default profile and `ssm_prod` uses the
42
42
43
43
To access a secret in app parameters from `ssm_prod` config, use `--param MYPARAM='{{secret_from "ssm_prod" "MY_SECRET_KEY"}}'` as the param value. Use `--param MYPARAM='{{secret "MY_SECRET_KEY"}}'` to read from the default provider.
44
44
45
-
## HashiCorp Vault
45
+
###HashiCorp Vault
46
46
47
47
To enable Vault secret provider, add one or more entries in the `openrun.toml` config. The config name should be `vault` or should start with `vault_`. For example
48
48
@@ -58,7 +58,7 @@ token = "def"
58
58
59
59
creates two Vault configs. The `address` and `token` properties are required.
60
60
61
-
## Environment Secrets
61
+
###Environment Secrets
62
62
63
63
Adding a secret provider with the name `env` or starting with `env_`, like
64
64
@@ -68,7 +68,7 @@ Adding a secret provider with the name `env` or starting with `env_`, like
68
68
69
69
enables looking up the OpenRun server environment for secrets. This can be accessed like `--param MYPARAM='{{secret_from "env" "MY_SECRET_KEY"}}'`. No properties are required in the env provider config. The value of MY_SECRET_KEY in the OpenRun server env wil be passed as the param.
70
70
71
-
## Properties Secrets
71
+
###Properties Secrets
72
72
73
73
Secrets can be read from a properties file. The config name should be `prop` or should start with `prop_`. To use this, add
0 commit comments