All Projects → secrethub → actions

secrethub / actions

Licence: Apache-2.0 license
Load secrets into GitHub Actions

Programming Languages

shell
77523 projects
Dockerfile
14818 projects

Projects that are alternatives of or similar to actions

Cryptr
Cryptr: a GUI for Hashicorp's Vault
Stars: ✭ 324 (+589.36%)
Mutual labels:  secret-management, secrets
Secretserver
Secret Server PowerShell Module
Stars: ✭ 82 (+74.47%)
Mutual labels:  secret-management, secrets
Conjur
CyberArk Conjur automatically secures secrets used by privileged users and machine identities
Stars: ✭ 441 (+838.3%)
Mutual labels:  secret-management, secrets
secrets-proxy
🔑 A secure proxy service for managing OneOps secrets.
Stars: ✭ 12 (-74.47%)
Mutual labels:  secret-management, secrets
githubsecrets
Manage your GitHub Actions secrets with a simple CLI
Stars: ✭ 41 (-12.77%)
Mutual labels:  secrets, github-actions
envkey-ruby
EnvKey's official Ruby client library
Stars: ✭ 24 (-48.94%)
Mutual labels:  secret-management, secrets
Helm Secrets
DEPRECATED A helm plugin that help manage secrets with Git workflow and store them anywhere
Stars: ✭ 1,129 (+2302.13%)
Mutual labels:  secret-management, secrets
envkey-node
EnvKey's official Node.js client library
Stars: ✭ 46 (-2.13%)
Mutual labels:  secret-management, secrets
Helm Secrets
Successor of zendesk/helm-secrets - A helm plugin that help manage secrets with Git workflow and store them anywhere
Stars: ✭ 165 (+251.06%)
Mutual labels:  secret-management, secrets
Secretary
DEPRECATED Secrets management for dynamic environments
Stars: ✭ 93 (+97.87%)
Mutual labels:  secret-management, secrets
terraform-provider-lastpass
Terraform Lastpass provider
Stars: ✭ 55 (+17.02%)
Mutual labels:  secret-management, secrets
Keywhiz
A system for distributing and managing secrets
Stars: ✭ 2,452 (+5117.02%)
Mutual labels:  secret-management, secrets
k8s-vault-webhook
A k8s vault webhook is a Kubernetes webhook that can inject secrets into Kubernetes resources by connecting to multiple secret managers
Stars: ✭ 107 (+127.66%)
Mutual labels:  secret-management, secrets
envkeygo
EnvKey's official Go client library
Stars: ✭ 36 (-23.4%)
Mutual labels:  secret-management, secrets
cli
The official CLI for interacting with your Doppler secrets and configuration.
Stars: ✭ 96 (+104.26%)
Mutual labels:  secret-management, secrets
Repo Supervisor
Scan your code for security misconfiguration, search for passwords and secrets. 🔍
Stars: ✭ 482 (+925.53%)
Mutual labels:  secret-management, secrets
envkey-python
EnvKey's python library. Protect API keys and credentials. Keep configuration in sync.
Stars: ✭ 24 (-48.94%)
Mutual labels:  secret-management, secrets
secrets cli
CLI for storing and reading your secrets via vault
Stars: ✭ 24 (-48.94%)
Mutual labels:  secret-management, secrets
Envkey App
Secure, human-friendly, cross-platform secrets and config.
Stars: ✭ 83 (+76.6%)
Mutual labels:  secret-management, secrets
Hashicorp Vault Plugin
Jenkins plugin to populate environment variables from secrets stored in HashiCorp's Vault.
Stars: ✭ 191 (+306.38%)
Mutual labels:  secret-management, secrets

1Password SecretHub has joined 1Password! Find out more on the SecretHub blog. 🎉


GitHub Actions + SecretHub


Learn More


Actions

SecretHub is a secrets management tool that works for every engineer. Securely provision passwords and keys throughout your entire stack with just a few lines of code.

No more copy-pasting sensitive values into a GUI. Securely load secrets into GitHub Actions and sync them automatically using SecretHub.

This Action is officially supported and actively maintained by SecretHub, but community contributions are very welcome.

secrethub/actions/env-export

The env-export action reads all referenced secrets from environment variables prefixed by secrethub:// and secrets specified in the secrethub.env template file, and makes the secret values available as environment variables to the rest of the job.

It leverages GitHub's output masking feature, so if secret values are (accidentally) logged, they get replaced with *****.

Usage

on: push
jobs:
  notify-slack:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v2
      - uses: secrethub/actions/[email protected]
        env:
          SECRETHUB_CREDENTIAL: ${{ secrets.SECRETHUB_CREDENTIAL }}
          SLACK_WEBHOOK: secrethub://company/app/slack/webhook
      - name: Print environment with masked secrets
        run: printenv
      - name: Notify Slack
        # This action expects SLACK_WEBHOOK to be set, which is now done automatically
        uses: Ilshidur/[email protected]
        with:
          args: Sent from GitHub Actions with secrets from SecretHub 🔑

Credential

The example above passes the SECRETHUB_CREDENTIAL environment variable. This credential is used to authenticate to SecretHub and decrypt your secrets.

You can obtain a credential by creating a service account. Service accounts are completely separate accounts from your personal account, which means you can manage their access separately and you can identify them in the audit log.

After you've obtained a credential for SecretHub, you store it in a GitHub secret, so that it can be fetched in your action as shown above.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].