Gathering detailed insights and metrics for @google-cloud/secret-manager
Gathering detailed insights and metrics for @google-cloud/secret-manager
Gathering detailed insights and metrics for @google-cloud/secret-manager
Gathering detailed insights and metrics for @google-cloud/secret-manager
@google-cloud/run
Cloud Run Admin API
nestjs-gcloud-secret-manager
Google Cloud Secret Manager module for Nest.js
@agent-base/secret-client
A TypeScript client for Google Cloud Secret Manager.
envars
Load environment variables from .env files. Decode secret values from AWS Secrets Manager, Google Secret Manager, and other sources.
Google Cloud Client Library for Node.js
npm install @google-cloud/secret-manager
Typescript
Module System
Min. Node Version
Node Version
NPM Version
maintenance-api: v0.1.0
Updated on Jul 10, 2025
subscriptions: v0.1.0
Updated on Jul 10, 2025
storagebatchoperations: v0.1.0
Updated on Jul 10, 2025
lustre: v0.1.0
Updated on Jul 10, 2025
devicestreaming: v0.2.0
Updated on Jul 10, 2025
chronicle: v0.2.0
Updated on Jul 10, 2025
TypeScript (89.53%)
JavaScript (10.44%)
Shell (0.01%)
Python (0.01%)
Total Downloads
0
Last Day
0
Last Week
0
Last Month
0
Last Year
0
Apache-2.0 License
3,042 Stars
25,206 Commits
626 Forks
190 Watchers
260 Branches
349 Contributors
Updated on Jul 15, 2025
Latest Version
6.1.0
Package Id
@google-cloud/secret-manager@6.1.0
Unpacked Size
4.10 MB
Size
262.33 kB
File Count
35
NPM Version
10.8.2
Node Version
18.20.8
Published on
Jul 10, 2025
Cumulative downloads
Total Downloads
Last Day
0%
NaN
Compared to previous day
Last Week
0%
NaN
Compared to previous week
Last Month
0%
NaN
Compared to previous month
Last Year
0%
NaN
Compared to previous year
Secrets client for Node.js
A comprehensive list of changes in each version may be found in the CHANGELOG.
Read more about the client libraries for Cloud APIs, including the older Google APIs Client Libraries, in Client Libraries Explained.
Table of contents:
1npm install @google-cloud/secret-manager
Samples are in the samples/
directory. Each sample's README.md
has instructions for running its sample.
Sample | Source Code | Try it |
---|---|---|
Secret_manager_service.access_secret_version | source code | ![]() |
Secret_manager_service.add_secret_version | source code | ![]() |
Secret_manager_service.create_secret | source code | ![]() |
Secret_manager_service.delete_secret | source code | ![]() |
Secret_manager_service.destroy_secret_version | source code | ![]() |
Secret_manager_service.disable_secret_version | source code | ![]() |
Secret_manager_service.enable_secret_version | source code | ![]() |
Secret_manager_service.get_iam_policy | source code | ![]() |
Secret_manager_service.get_secret | source code | ![]() |
Secret_manager_service.get_secret_version | source code | ![]() |
Secret_manager_service.list_secret_versions | source code | ![]() |
Secret_manager_service.list_secrets | source code | ![]() |
Secret_manager_service.set_iam_policy | source code | ![]() |
Secret_manager_service.test_iam_permissions | source code | ![]() |
Secret_manager_service.update_secret | source code | ![]() |
Secret_manager_service.access_secret_version | source code | ![]() |
Secret_manager_service.add_secret_version | source code | ![]() |
Secret_manager_service.create_secret | source code | ![]() |
Secret_manager_service.delete_secret | source code | ![]() |
Secret_manager_service.destroy_secret_version | source code | ![]() |
Secret_manager_service.disable_secret_version | source code | ![]() |
Secret_manager_service.enable_secret_version | source code | ![]() |
Secret_manager_service.get_iam_policy | source code | ![]() |
Secret_manager_service.get_secret | source code | ![]() |
Secret_manager_service.get_secret_version | source code | ![]() |
Secret_manager_service.list_secret_versions | source code | ![]() |
Secret_manager_service.list_secrets | source code | ![]() |
Secret_manager_service.set_iam_policy | source code | ![]() |
Secret_manager_service.test_iam_permissions | source code | ![]() |
Secret_manager_service.update_secret | source code | ![]() |
Quickstart | source code | ![]() |
The Secret Manager Node.js Client API Reference documentation also contains samples.
Our client libraries follow the Node.js release schedule. Libraries are compatible with all current active and maintenance versions of Node.js. If you are using an end-of-life version of Node.js, we recommend that you update as soon as possible to an actively supported LTS version.
Google's client libraries support legacy versions of Node.js runtimes on a best-efforts basis with the following warnings:
Client libraries targeting some end-of-life versions of Node.js are available, and
can be installed through npm dist-tags.
The dist-tags follow the naming convention legacy-(version)
.
For example, npm install @google-cloud/secret-manager@legacy-8
installs client libraries
for versions compatible with Node.js 8.
This library follows Semantic Versioning.
This library is considered to be stable. The code surface will not change in backwards-incompatible ways unless absolutely necessary (e.g. because of critical security issues) or with an extensive deprecation period. Issues and requests against stable libraries are addressed with the highest priority.
More Information: Google Cloud Platform Launch Stages
Contributions welcome! See the Contributing Guide.
Please note that this README.md
, the samples/README.md
,
and a variety of configuration files in this repository (including .nycrc
and tsconfig.json
)
are generated from a central template. To edit one of these files, make an edit
to its templates in
directory.
Apache Version 2.0
See LICENSE
No vulnerabilities found.
Reason
all changesets reviewed
Reason
30 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 10
Reason
security policy file detected
Details
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
Reason
no binaries found in the repo
Reason
1 existing vulnerabilities detected
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
detected GitHub workflow tokens with excessive permissions
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
dependency not pinned by hash detected -- score normalized to 0
Details
Reason
project is not fuzzed
Details
Score
Last Scanned on 2025-07-07
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More