With Cloud Code's Secret Manager integration, you can create, view, update, and use secrets in your IDE and without storing them in your codebase.
This page describes how to access Secret Manager in your IDE and how you can get started creating and managing secrets.
Enable Secret Manager API
When managing secrets with Cloud Code, secrets are securely stored in Secret Manager and can be programmatically fetched when you need them. All you need is the Secret Manager API enabled and the right permissions to manage secrets:
Make sure that you're working in the project where your application code resides. Your secret must be in the same project as your application code.
Click Cloud Code and then expand the Secret Manager explorer.
If you haven't enabled the Secret Manager API, click Enable Secret Manager API in the Secret Manager explorer.
Create secrets
To create a secret using the Secret Manager explorer, follow these steps:
In your IDE, click Cloud Code and then expand the Secret Manager explorer.
Click add Create Secret in the Secret Manager explorer.
In the Create Secret dialog, set your secret's project, name, value, and region, and specify labels to organize your secrets.
Alternatively, you can create a secret using the editor:
- Open a file containing text that you want to store as a secret in the editor.
- Highlight the text to store as a secret, right-click, and then click Create Secret in Secret Manager.
- In the Create Secret dialog, customize the secret's project, name, value, region, and labels.
Create new versions of secrets
To create a new version of a secret using Secret Manager, follow these steps:
Right-click an existing secret and then choose Create Secret Version.
In the Create Version dialog, set the new value of your existing secret using the Secret value field or by importing a file.
To remove all previous versions of your secret and keep just the new version you're creating, choose Disable all past versions.
Click Create Version. Your version is added and you can see the latest secret version and previous versions listed under the Versions dropdowns.
Alternatively, you can create a new version of a secret in the editor:
In the editor, open a file and highlight the text to store as a secret.
Right-click the highlighted text and then choose Add Version to Secret in Secret Manager.
Manage secret versions
To enable, disable, or destroy a version of a secret, right-click the secret and then select the command for the action you want to perform. For enabled versions of secrets, you can also view the version's value.
View secrets
To view secrets, in the Secret Manager explorer, select a secret from the list. Details of the secret such as name, replication policy, creation timestamp, and resource ID are listed below the secret name.
View secrets in Google Cloud console
Alternatively, you can view secrets in Google Cloud console by right-clicking the secret in the Secret Manager explorer and clicking Open in Cloud console.
View secrets in Kubernetes explorer
To view secrets in the Kubernetes explorer, follow these steps:
- Click Cloud Code and then expand the Kubernetes explorer.
- Expand your cluster and then expand Secrets.
- Expand the secret to view its details.
Access secrets from your application
After your secret is created, you can include it in your code and set up authentication.
To access a secret from your application:
Install the Secret Manager client library.
Click Cloud Code and then expand the Cloud APIs explorer.
Expand Cloud Security > Secret Manager API and then follow the instructions in the Install Client Library section for the language you're using.
Customize and include the relevant code snippet in your application's code.
To obtain your secret's version name to use in your code, select the secret in the Secret Manager panel, right-click, and then choose Copy Resource ID.
To complete your authentication setup, follow the Client libraries authentication guide:
- Local development: If you're developing on a local cluster (like minikube or Docker Desktop) or a local emulator, you should complete the steps illustrated in the Local development section relevant to your workflow.
- Remote development: If you're using a GKE cluster or a Cloud Run service in your application, you should complete the steps illustrated in the Remote development section relevant to your workflow, including the Secret Manager-specific instructions for setting up the required roles on your service account.
Add a secret as an environment variable
To add an existing Kubernetes secret to the deployment as an environment variable, follow these steps:
- Click Cloud Code and then expand the Kubernetes explorer.
- Expand your minikube cluster and then expand Secrets.
- Right-click a secret that represents a deployment object and then click Add Secret as Environment Variable.
Mount a secret as a volume
To mount an existing Kubernetes secret as a volume in the deployment's container, follow these steps:
- Click Cloud Code and then expand the Kubernetes explorer.
- Expand your minikube cluster and then expand Secrets.
- Right-click a secret that represents a deployment object and then click Mount Secret as Volume.
Delete secrets
To delete a secret using the Secret Manager in Cloud Code, follow these steps:
Click Cloud Code and then expand the Secret Manager explorer.
Right-click an existing secret and select Open in Cloud Console.
On the Secret details page, click DELETE and follow the prompts to delete the secret.