@@ -96,3 +96,58 @@ services:
96
96
- ./secrets:/secrets
97
97
- .:/tmp
98
98
` ` `
99
+
100
+ # ## Bitbucket pipelines samples
101
+
102
+ Sample of bitbucket-pipelines.yml file for GCP
103
+
104
+
105
+ ` ` ` yaml
106
+ dev:
107
+ - step:
108
+ name: Obtain environment variables
109
+ image: ghcr.io/omvmike/config-storage:gcp
110
+ script:
111
+ - export GCP_KEY_FILE=$KEY_FILE_BASE64
112
+ - export GCS_BUCKET=my-bucket
113
+ - export PATH_PREFIX=config-storage/dev
114
+ - config-storage get .env api.env
115
+ artifacts:
116
+ - api.env
117
+ ` ` `
118
+ it will bethe same for AWS,
119
+ just change image name to `ghcr.io/omvmike/config-storage:aws`
120
+ and provide `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY` environment variables instead of `GCP_KEY_FILE`
121
+
122
+ ` ` ` yaml
123
+ dev:
124
+ - step:
125
+ name: Obtain environment variables
126
+ image: ghcr.io/omvmike/config-storage:aws
127
+ script:
128
+ - export AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID
129
+ - export AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY
130
+ - export AWS_BUCKET=my-bucket
131
+ - export PATH_PREFIX=config-storage/dev
132
+ - config-storage get .env api.env
133
+ artifacts:
134
+ - api.env
135
+ ` ` `
136
+
137
+ For AWS you can use `oidc` option to get temporary credentials from AWS STS service.
138
+
139
+
140
+ ` ` ` yaml
141
+ dev:
142
+ - step:
143
+ name: Obtain environment variables
144
+ image: ghcr.io/omvmike/config-storage:aws
145
+ oidc: true
146
+ script:
147
+ - export AWS_OIDC_ROLE_ARN=arn:aws:iam::123456789012:role/MyRoleName
148
+ - export PATH_PREFIX=config-storage/dev
149
+ - export AWS_BUCKET=my-bucket
150
+ - config-storage get .env api.env
151
+ artifacts:
152
+ - api.env
153
+ ` ` `
0 commit comments