-
Notifications
You must be signed in to change notification settings - Fork 421
fix(docs): use concrete secrets from settings #2322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
use GitHub Environments secrets instead (encrypted vs unencrypted)
secrets: | ||
AWS_DOCS_ROLE_ARN: | ||
description: Docs IAM Role | ||
required: false | ||
AWS_DOCS_BUCKET: | ||
description: Docs S3 Bucket | ||
required: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
use secrets: inherit
instead from the caller
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In addition to this, use environment: Docs
in the caller, and move the secrets into the Docs
environment please. Don't leave any "Repository secrets".
secrets: | ||
AWS_DOCS_ROLE_ARN: | ||
description: Docs IAM Role | ||
required: false | ||
AWS_DOCS_BUCKET: | ||
description: Docs S3 Bucket | ||
required: false |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
In addition to this, use environment: Docs
in the caller, and move the secrets into the Docs
environment please. Don't leave any "Repository secrets".
Signed-off-by: Simon Thulbourn <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
APPROVED!
* develop: chore(deps-dev): bump aws-cdk from 2.80.0 to 2.81.0 (aws-powertools#2332) chore(deps-dev): bump coverage from 7.2.5 to 7.2.6 (aws-powertools#2326) chore(deps-dev): bump pytest-cov from 4.0.0 to 4.1.0 (aws-powertools#2327) chore(deps): bump actions/setup-python from 4.6.0 to 4.6.1 (aws-powertools#2325) fix(docs): use concrete secrets from settings (aws-powertools#2322) fix(logger): add setLevel function to set level programmatically (aws-powertools#2320) feat(parser): add support for parsing SQS events wrapped in Kinesis Firehose (aws-powertools#2294)
Issue number: #2277
Summary
Changes
Forces GHA to use the secrets stored in the repository.
User experience
No change
Checklist
If your change doesn't seem to apply, please leave them unchecked.
Is this a breaking change?
RFC issue number:
Checklist:
Acknowledgment
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.
Disclaimer: We value your time and bandwidth. As such, any pull requests created on non-triaged issues might not be successful.