diff --git a/doc/ci/secrets/secrets_manager/_index.md b/doc/ci/secrets/secrets_manager/_index.md index 2011417d02c562fae7f95043018ddf3c6921cce3..f2ea9ea7abf9ab7bf407247c4844cab6619d8dca 100644 --- a/doc/ci/secrets/secrets_manager/_index.md +++ b/doc/ci/secrets/secrets_manager/_index.md @@ -2,7 +2,7 @@ stage: Software Supply Chain Security group: Pipeline Security info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://handbook.gitlab.com/handbook/product/ux/technical-writing/#assignments -title: GitLab secrets manager +title: GitLab Secrets Manager ignore_in_report: true --- @@ -32,20 +32,20 @@ database credentials, private keys, or similar. Unlike CI/CD variables, which are always available to jobs by default, secrets must be explicitly requested by a job. -Use the GitLab secrets manager to securely store and manage your project's secrets and credentials. +Use GitLab Secrets Manager to securely store and manage your project's secrets and credentials. -## Enable the secrets manager +## Enable GitLab Secrets Manager Prerequisites: - You must have the Owner role for the project. -To enable the secrets manager: +To enable GitLab Secrets Manager: 1. On the left sidebar, select **Search or go to** and find your project. 1. Select **Settings** > **General**. 1. Expand **Visibility, project features, permissions**. -1. Turn on the **Secrets Manager** toggle and wait for the secrets manager to be provisioned. +1. Turn on the **GitLab Secrets Manager** toggle and wait for the secrets manager to be provisioned. ## Define a secret @@ -69,7 +69,7 @@ After you create a secret, you can use it in the pipeline configuration or in jo ## Use secrets in job scripts -To access secrets defined with the secret manager, use the [`secrets`](../../yaml/_index.md#secrets) and `gitlab_secrets_manager` keywords: +To access secrets defined with GitLab Secrets Manager, use the [`secrets`](../../yaml/_index.md#secrets) and `gitlab_secrets_manager` keywords: ```yaml job: diff --git a/ee/app/assets/javascripts/ci/secrets/components/secret_delete_modal.vue b/ee/app/assets/javascripts/ci/secrets/components/secret_delete_modal.vue index 05437e291b895610b391b606551e6f45983e2c67..ce609f564a38ecbcb512edc603ca697a55b07c04 100644 --- a/ee/app/assets/javascripts/ci/secrets/components/secret_delete_modal.vue +++ b/ee/app/assets/javascripts/ci/secrets/components/secret_delete_modal.vue @@ -39,7 +39,7 @@ export default { modalOptions() { return { actionPrimary: { - text: s__('Secrets|Delete secret'), + text: s__('SecretsManager|Delete secret'), attributes: { disabled: !this.canDeleteSecret, variant: 'danger', @@ -64,7 +64,7 @@ export default { this.$emit('hide'); }, showToastMessage() { - const toastMessage = sprintf(s__('Secrets|Secret %{secretName} has been deleted.'), { + const toastMessage = sprintf(s__('SecretsManager|Secret %{secretName} has been deleted.'), { secretName: this.secretName, }); @@ -105,7 +105,7 @@ export default {