You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+9-2Lines changed: 9 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,12 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
8
8
## [Unreleased]
9
9
10
+
### Added
11
+
12
+
## [0.6.1]
13
+
14
+
- Add support for managing github secrets via `plaintext_secrets` argument (#58/#59 kudos to @mrodm)
15
+
10
16
## [0.6.0]
11
17
12
18
### Added
@@ -17,7 +23,7 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
17
23
18
24
### Fixed
19
25
20
-
- Remove support for Terraform Github Provider v3.1.0 as this version introduced undocumneted breaking changes. See https://github.com/terraform-providers/terraform-provider-github/issues/566 for details.
26
+
- Remove support for Terraform Github Provider v3.1.0 as this version introduced undocumented breaking changes. See https://github.com/integrations/terraform-provider-github/issues/566 for details.
21
27
22
28
### Changed
23
29
@@ -184,10 +190,11 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
This map allows you to create and manage secrets for repositories in your organization.
396
+
Each element in the map is considered a secret to be managed, being the key map the secret name and the value the corresponding secret in plain text:
397
+
```
398
+
plaintext_secrets = {
399
+
SECRET_NAME_1 = "secret_value_1"
400
+
SECRET_NAME_2 = "secret_value_2"
401
+
...
402
+
}
403
+
```
404
+
When applied, a secret with the given key and value will be created in the repositories.
405
+
The value of the secrets must be given in plain text, github provider is in charge of encrypting it.
406
+
**Attention:** You might want to get secrets via a data source from a secure vault and not add them in plain text to your source files; so you do not commit plaintext secrets into the git repository managing your github account.
0 commit comments