From 8afc76eee90620ed27cafbcb6ccb9171b9296159 Mon Sep 17 00:00:00 2001 From: deanshak Date: Tue, 6 May 2025 10:39:48 +0300 Subject: [PATCH 1/3] Updated the GitHub Action plugin ReadMe to include support for creating and updating secrets. --- README.md | 67 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 67 insertions(+) diff --git a/README.md b/README.md index 78ef31f..e840edb 100644 --- a/README.md +++ b/README.md @@ -258,6 +258,73 @@ This example demonstrates fetching an AWS Rotated Secret from Akeyless. csr-data-base64: "csr_data_base64" ``` + +### Create Secret Demo + +```yaml +name: Create Secret With Akeyless + +on: + workflow_dispatch: + +jobs: + create_secret: + runs-on: ubuntu-latest + name: Create Akeyless Secret + + permissions: + id-token: write + contents: read + + steps: + - name: Enable Debug Logging + run: | + echo "ACTIONS_STEP_DEBUG=true" >> $GITHUB_ENV + echo "ACTIONS_RUNNER_DEBUG=true" >> $GITHUB_ENV + + - name: Create a new secret in Akeyless + uses: Akeyless-Product-Team/akeyless-github-action@main + with: + access-type: access_key + access-id: ${{ secrets.AKEYLESS_ACCESS_ID }} + access-key: ${{ secrets.AKEYLESS_ACCESS_KEY }} + create-secret-name: "/my_new_secret" + create-secret-value: "SuperSecretValue" +``` + +### Update Secret Demo + +```yaml +name: Update Secret With Akeyless + +on: + workflow_dispatch: + +jobs: + update_secret: + runs-on: ubuntu-latest + name: Update Akeyless Secret + + permissions: + id-token: write + contents: read + + steps: + - name: Enable Debug Logging + run: | + echo "ACTIONS_STEP_DEBUG=true" >> $GITHUB_ENV + echo "ACTIONS_RUNNER_DEBUG=true" >> $GITHUB_ENV + + - name: Update an existing secret in Akeyless + uses: Akeyless-Product-Team/akeyless-github-action@main + with: + access-type: access_key + access-id: ${{ secrets.AKEYLESS_ACCESS_ID }} + access-key: ${{ secrets.AKEYLESS_ACCESS_KEY }} + update-secret-name: "/my_secret" + update-secret-value: "UpdatedSuperSecretValue" +``` + ### Parse JSON secrets By default, the action sets the environment variable value to the entire JSON string in the secret value. Set `parse-json-secrets` to `true` to create environment variables for each key/value pair in the secret JSON. From cb12447d76efd7b73c80f928437a47ced1843bc9 Mon Sep 17 00:00:00 2001 From: deanshak Date: Tue, 13 May 2025 17:12:10 +0300 Subject: [PATCH 2/3] Bumped to version 1.1.3. The plugin now supports write activities; such as creating and updating secrets. --- version | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/version b/version index 968beee..5d03805 100644 --- a/version +++ b/version @@ -1,2 +1,2 @@ -# Use Semantic versioning only. Please update the version number before opening a pull request. -v1.1.2 +# The plugin now supports write activities; such as creating and updating secrets. +v1.1.3 From 5d3f3849ca5560c27cd3199f82ca588414ba0ebc Mon Sep 17 00:00:00 2001 From: deanshak Date: Thu, 15 May 2025 19:01:52 +0300 Subject: [PATCH 3/3] Incrementing the release version to 1.1.4 --- version | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/version b/version index 5d03805..b53755d 100644 --- a/version +++ b/version @@ -1,2 +1,2 @@ # The plugin now supports write activities; such as creating and updating secrets. -v1.1.3 +v1.1.4