-
Notifications
You must be signed in to change notification settings - Fork 0
fix: rename the googleSecretManager to gcpSecretManager #248
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Reviewer's Guide by SourceryThis pull request renames all instances of 'Google Secret Manager' to 'GCP Secret Manager' within the documentation. This change aims to align the documentation with the current naming conventions and terminology used by Google Cloud Platform. Class diagram for Helm Chart ValuesclassDiagram
class HelmValues {
gcpSecretManager: GCPSecretManager
awsSecretManager: AWSSecretManager
vault: Vault
}
class GCPSecretManager {
enabled: boolean
projectId: string
credentials: string
}
class AWSSecretManager {
enabled: boolean
region: string
accessKeyId: string
secretAccessKey: string
}
class Vault {
enabled: boolean
address: string
token: string
}
HelmValues -- GCPSecretManager : has
HelmValues -- AWSSecretManager : has
HelmValues -- Vault : has
note for GCPSecretManager "Configuration for GCP Secret Manager"
note for AWSSecretManager "Configuration for AWS Secret Manager"
note for Vault "Configuration for HashiCorp Vault"
File-Level Changes
Tips and commandsInteracting with Sourcery
Customizing Your ExperienceAccess your dashboard to:
Getting Help
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @insider89 - I've reviewed your changes and found some issues that need to be addressed.
Blocking issues:
- Hardcoded GCP credentials found. (link)
Overall Comments:
- This change looks good, but could you also update the code to use
gcpSecretManager
instead ofgoogleSecretManager
?
Here's what I looked at during the review
- 🟢 General issues: all looks good
- 🔴 Security: 1 blocking issue
- 🟢 Review instructions: all looks good
- 🟢 Testing: all looks good
- 🟢 Complexity: all looks good
- 🟢 Documentation: all looks good
Help me be more useful! Please click 👍 or 👎 on each comment and I'll use the feedback to improve your reviews.
@@ -260,7 +260,7 @@ vault: | |||
enabled: false | |||
awsSecretManager: | |||
enabled: false | |||
googleSecretManager: | |||
gcpSecretManager: | |||
enabled: true | |||
projectId: "your-project-id" | |||
credentials: | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🚨 issue (security): Hardcoded GCP credentials found.
The credentials
field contains what appears to be a hardcoded service account JSON key. This should be fetched from a secure source, such as a file or environment variable, rather than being hardcoded in the configuration.
Summary by Sourcery
Documentation: