-
Notifications
You must be signed in to change notification settings - Fork 359
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Read action's secrets from env vars and avoid logging them #2333
Conversation
d876383
to
05405ba
Compare
.github/workflows/nessie.yaml
Outdated
@@ -375,6 +375,7 @@ jobs: | |||
TAG: ${{ needs.deploy-image.outputs.tag }} | |||
# Setting Account_ID as a secret as a way to avoid specifying it here | |||
REPO: ${{ secrets.AWS_ACCOUNT_ID }}.dkr.ecr.us-east-1.amazonaws.com | |||
ACTIONS_VAR: "this_is_actions_var" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If possible, inject this env var from the test code and not from here - otherwise when running locally, one has to make sure the var is set in order for the test to work.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lakeFS is running separately from the test code. I can't control it from the test code, I can set it always in lakeFS but that seems like too much. WDYT?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looking good.
Missing: documentation, CHANGELOG entry.
2ac9322
to
8da8147
Compare
6a66d0b
to
db9d234
Compare
closes #2282
This implementation assumes that secrets are to be used only in specific locations and are not available in all places. For example, query-params & headers are good place for secrets, but the url itself isn't.
While this might limit the users a bit when trying to pass variables to the execution itself, it will allow us to log all other parameters of the actions, without worrying about leakage of secrets. Env var references in other places in the action yaml file are simply ignored.