You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: Add support for using secret manager environment variables in Cloud Function (#88)
* Add support for using secret manager environment variables
* Add example of usage secret_environment_variables
* keep sa
* workaround for permadiff
Co-authored-by: bharathkkb <[email protected]>
Copy file name to clipboardExpand all lines: README.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,6 +73,7 @@ module "localhost_function" {
73
73
| project\_id | The ID of the project to which resources will be applied. |`string`| n/a | yes |
74
74
| region | The region in which resources will be applied. |`string`| n/a | yes |
75
75
| runtime | The runtime in which the function will be executed. |`string`| n/a | yes |
76
+
| secret\_environment\_variables | A list of maps which contains key, project\_id, secret\_name (not the full secret id) and version to assign to the function as a set of secret environment variables. |`list(map(string))`|`[]`| no |
76
77
| service\_account\_email | The service account to run the function as. |`string`|`""`| no |
77
78
| source\_dependent\_files | A list of any Terraform created `local_file`s that the module will wait for before creating the archive. | <pre>list(object({<br> filename = string<br> id = string<br> }))</pre> |`[]`| no |
78
79
| source\_directory | The pathname of the directory which contains the function source code. |`string`| n/a | yes |
0 commit comments