-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Github Action] Check all secrets are replaced by bin/generate-secrets #275
Conversation
e44aad2
to
ed26db2
Compare
Thanks for the PR! |
…rets Also fixes some problems with secret replacement :)
ed26db2
to
398f7fa
Compare
@keyvaann I was just discussing this with @Bdegraaf1234 yesterday. I have updated the PR with the On a side note. Would it not be safer to change the generate-secrets script to change any field that it recognizes with value |
Thanks! Yes if we can add the secrets automatically it would be even better. |
@keyvaann The generate-secrets script was updated to automatically replace all remaining |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
LGTM
When new secret placeholders are defined in base-secrets.yaml the bin/generate-secrets script (that should replace secret placeholders with randomized values) is sometimes not updated accordingly. This will result in the use of the word secret as a weak password.
This PR will implement a check on the occurrence of the word secret in the secrets.yaml file left after running the bin/generate-secrets script. If detect this will cause the action to fail with a message on which secrets to update.
This PR also updates the generate-secrets script to replace any field with value
secret
with a password.Example output: