-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fixes some loose secrets handling #108
Conversation
- Removes logging of base64 strings - Adds explicit GHA masking for the base64 strings - Consume the base64 strings via environment variables in GHA scripts, to avoid another logging disclosure scenario
Test Results1 tests 1 ✅ 0s ⏱️ Results for commit 83d91d5. ♻️ This comment has been updated with latest results. |
Code Coverage Summary Report - Linux (No TFM)Summary
CoverageTestLib - 100%
TestLib.Tests - 100%
|
Code Coverage Summary Report - Linux (net8.0)Summary
CoverageTestLib - 100%
TestLib.Tests - 100%
|
Code Coverage Summary Report - Windows (net8.0)Summary
CoverageTestLib - 100%
TestLib.Tests - 100%
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good to me.
I would like a second approver for this though.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So if I've understood correctly, there are three changes here:
- we no longer dump out the base64 with the secrets
- we no longer dump out the base64 with the non-secret environment variables
- we tell GitHub that if it ever sees the text of the base64 with the secrets in log output, it should mask it.
So 1 is the problem originally identified. 3 is an additional 'belt and braces' step to ensure that if anything else tries to do the same thing, it'll be blocked. And 2 doesn't seem directly concerned with secret handling, but I'm guessing that both of these Write-Host
lines were diagnostic code that wasn't meant to be left in.
Updates the following composite actions:
prepare-env-vars-and-secrets
set-env-vars-and-secrets
Summary of changes: