The plugin needs to be configured with a secret config in order to connect to AWS Secrets Manager.
- GoCD server version
v19.6.0
or above - AWS credentials to access secrets from AWS Secrets Manager
- Copy the file
build/libs/gocd-aws-based-secrets-plugin-VERSION.jar
to the GoCD server under${GO_SERVER_DIR}/plugins/external
and restart the server. - The
GO_SERVER_DIR
is usually/var/lib/go-server
on Linux andC:\Program Files\Go Server
on Windows.
-
Login to your GoCD server.
-
Navigate to Admin > Secret Management.
-
Click on ADD button.
-
Configure the mandatory fields.
Field Required Description Endpoint true The AWS service endpoint for the plugin to connect. AccessKey true The access key as a part of AWS credentials. SecretAccessKey true The secret access key as a part of AWS credentials. Region true Region in which AWS secrets manager is hosted. SecretName true The name of the secret to be utilized. SecretCacheTTL false The secrets cache TTL in milliseconds, defaults to 30 minutes. NOTE: The plugin caches secrets for a duration configured using the SecretCacheTTL. Currently GoCD does not provide a way to invalidate the cache. To invalidate the cache, change the SecretCacheTTL and save the SecretConfig.
-
Configure the
rules
where this secrets can be used.<rules>
tag defines where this secretConfig is allowed/denied to be referred. For more details about rules and examples refer the GoCD Secret Management documentation -
Save.
- See Define Secret Params for more information