google-cloud-kms

GCP kms encrypt env var and passing encrypted key through cloudbuild.yaml to google app engine

我们两清 提交于 2021-02-11 14:46:23
问题 I'm trying to encrypt env vars for database in Cloud SQL in my RoR app deploying to Google App Engine. Following this doc https://cloud.google.com/cloud-build/docs/securing-builds/use-encrypted-secrets-credentials However, I have an error when running both gcloud builds submit and gcloud app deploy . Both are error out with: Failure status: UNKNOWN: Error Response: [4] DEADLINE_EXCEEDED / build step 0 "gcr.io/cloud-builders/gcloud" failed: exit status 1. I then check the gcloud builds

Can we save wrapped keys generated with cloud KMS keys in DLP deidentification templates(using Python Api)?

空扰寡人 提交于 2021-01-23 06:54:22
问题 I am working on a PII de-identification project and using google cloud's data loss prevention api. Use case: To encrypt a field with cloud KMS key. Created a dlp-deidentification template, here is the snippet: { "deidentify_template":{ "display_name":"deidentification_encryption", "description":"deidentification_encryption", "deidentify_config":{ "record_transformations":{ "field_transformations":[ { "fields":[ { "name":"password" } ], "primitive_transformation":{ "crypto_hash_config": {

Can we save wrapped keys generated with cloud KMS keys in DLP deidentification templates(using Python Api)?

不问归期 提交于 2021-01-23 06:54:07
问题 I am working on a PII de-identification project and using google cloud's data loss prevention api. Use case: To encrypt a field with cloud KMS key. Created a dlp-deidentification template, here is the snippet: { "deidentify_template":{ "display_name":"deidentification_encryption", "description":"deidentification_encryption", "deidentify_config":{ "record_transformations":{ "field_transformations":[ { "fields":[ { "name":"password" } ], "primitive_transformation":{ "crypto_hash_config": {

Can we save wrapped keys generated with cloud KMS keys in DLP deidentification templates(using Python Api)?

坚强是说给别人听的谎言 提交于 2021-01-23 06:53:23
问题 I am working on a PII de-identification project and using google cloud's data loss prevention api. Use case: To encrypt a field with cloud KMS key. Created a dlp-deidentification template, here is the snippet: { "deidentify_template":{ "display_name":"deidentification_encryption", "description":"deidentification_encryption", "deidentify_config":{ "record_transformations":{ "field_transformations":[ { "fields":[ { "name":"password" } ], "primitive_transformation":{ "crypto_hash_config": {

Access environment variables stored in Google Secret Manager from Google Cloud Build

我的未来我决定 提交于 2021-01-04 05:40:12
问题 How can I access the variables I define in Google Secret Manager from my Google Cloud Build Pipeline ? 回答1: You can access to secret from Cloud Build by using the standard Cloud Builder gcloud But, there is 2 issues: If you want to use the secret value in another Cloud Build step, you have to store your secret in a file, the only way to reuse a previous value from one step to another one The current Cloud Builder gcloud isn't up to date (today, 03 feb 2020). You have to add a gcloud component

How should I store secrets for use in Google Cloud Platform?

柔情痞子 提交于 2020-07-21 07:07:54
问题 If I had credentials I need to store in Google Compute Engine or Google App Engine for use at build time, how should I store them? Is there something better than storing them in code, or in a bucket? 回答1: One option is to encrypt the secrets with a key from Cloud KMS, and store them either in a storage bucket or keep them in the binary. This lets you manage permissions and logging on the key, to indirectly manage who accesses the secret. 回答2: As of December 2019, you should store secrets with

How should I store secrets for use in Google Cloud Platform?

孤街浪徒 提交于 2020-07-21 07:05:28
问题 If I had credentials I need to store in Google Compute Engine or Google App Engine for use at build time, how should I store them? Is there something better than storing them in code, or in a bucket? 回答1: One option is to encrypt the secrets with a key from Cloud KMS, and store them either in a storage bucket or keep them in the binary. This lets you manage permissions and logging on the key, to indirectly manage who accesses the secret. 回答2: As of December 2019, you should store secrets with

How should I store secrets for use in Google Cloud Platform?

本秂侑毒 提交于 2020-07-21 07:05:08
问题 If I had credentials I need to store in Google Compute Engine or Google App Engine for use at build time, how should I store them? Is there something better than storing them in code, or in a bucket? 回答1: One option is to encrypt the secrets with a key from Cloud KMS, and store them either in a storage bucket or keep them in the binary. This lets you manage permissions and logging on the key, to indirectly manage who accesses the secret. 回答2: As of December 2019, you should store secrets with