Skip to content

Commit

Permalink
add changes to readme-file
Browse files Browse the repository at this point in the history
Signed-off-by: Maren Sofie Ringsby <[email protected]>
  • Loading branch information
marensofier committed Sep 3, 2024
1 parent bb4bd8c commit 6719977
Showing 1 changed file with 3 additions and 8 deletions.
11 changes: 3 additions & 8 deletions README.rst
Original file line number Diff line number Diff line change
Expand Up @@ -222,10 +222,9 @@ Encrypting with SSH keys via age is not yet supported by SOPS.
Encrypting using GCP KMS
~~~~~~~~~~~~~~~~~~~~~~~~
GCP KMS has support for authorization with the use of `Application Default Credentials
<https://developers.google.com/identity/protocols/application-default-credentials>`_ and access tokens.
<https://developers.google.com/identity/protocols/application-default-credentials>`_ and using an oauth2 token.
Application default credentials precedes the use of access token.


Using Application Default Credentials you can authorize by doing this:

If you already logged in using
Expand All @@ -240,19 +239,15 @@ you can enable application default credentials using the sdk:
$ gcloud auth application-default login
Using oauth tokens you can authorize by doing this:

.. code:: sh
$ export CLOUDSDK_AUTH_ACCESS_TOKEN=<your access token>
$ export GOOGLE_OAUTH_ACCESS_TOKEN=<your access token>
Or if you are logged in you can authorize by generating an access token:

.. code:: sh
$ export CLOUDSDK_AUTH_ACCESS_TOKEN=$(gcloud auth print-access-token)
$ export GOOGLE_OAUTH_ACCESS_TOKEN="$(gcloud auth print-access-token)"
Encrypting/decrypting with GCP KMS requires a KMS ResourceID. You can use the
Expand Down

0 comments on commit 6719977

Please sign in to comment.