mirror of
https://github.com/nektos/act.git
synced 2026-04-26 09:25:54 +03:00
[GH-ISSUE #121] Providing large secrets (json format) #80
Labels
No labels
area/action
area/cli
area/docs
area/image
area/runner
area/workflow
backlog
confirmed/not-planned
kind/bug
kind/discussion
kind/external
kind/feature-request
kind/question
meta/duplicate
meta/invalid
meta/need-more-info
meta/resolved
meta/wontfix
meta/workaround
needs-work
pull-request
review/not-planned
size/M
size/XL
size/XXL
stale
stale-exempt
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/act#80
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @ThijSlim on GitHub (Mar 3, 2020).
Original GitHub issue: https://github.com/nektos/act/issues/121
What do you recommend for providing large secrets like the AZURE_CREDENTIALS secret json format?
The following doesn't work. This secret does work in github secrets.
-s AZURE_CREDENTIALS="{"clientId":"<redacted>","clientSecret":"<redacted>","subscriptionId":"<redacted>","tenantId":"<redacted>","activeDirectoryEndpointUrl":"https://login.microsoftonline.com","resourceManagerEndpointUrl":"https://management.azure.com/","activeDirectoryGraphResourceId":"https://graph.windows.net/","sqlManagementEndpointUrl":"https://management.core.windows.net:8443/","galleryEndpointUrl":"https://gallery.azure.com/","managementEndpointUrl":"https://management.core.windows.net/"}"I replaced the guids with generated guids.
@cplee commented on GitHub (Mar 3, 2020):
@thijslimmen I think the
"needs to be escaped, or surround the value with'instead of"@cplee commented on GitHub (Mar 3, 2020):
One other option @thijslimmen ... you can set the
AZURE_CREDENTIALSenvironment variable in your shell and then just runact -s AZURE_CREDENTIALSand it will pull the secret from your env