-
Notifications
You must be signed in to change notification settings - Fork 1.3k
executors: Secret values #27926
Comments
Heads up @macraig - the "team/code-intelligence" label was applied to this issue. |
About https://github.com/sourcegraph/accounts/issues/580. How can we enable customers to:
|
This should also handle docker pull secrets, ideally. |
This is a fast follower for after 4.0 when we have tons of customers on cloud with executors than we can design this with. |
Adding to Erik's comment: related: there should be a way for users to configure which docke registry to pull from, and to specify secrets for it. This is adjacent to this feature. |
Added feedback from multiple customers on use cases in there that will help inform the design. It sounds like one of these "others already solved this well, let's copy their design" type feature. A subcase that is specific to use is having an easy to understand flow for setting docker secrets that are implicitly used by the executor when pulling containers. |
Here are a few considerations regarding security / access control. ACLs are a dependency of having a broader RBAC design for Sourcegraph. Besides, here are things to consider building
And then of course, ACLs ... |
@malomarrec https://github.com/sourcegraph/accounts/issues/8285 surfaced a use case described in sourcegraph/lsif-go#255. They want to index a repo and its dependencies; one of them is a private repo that needs authentication (currently it just fails to index that private dependency). |
|
@eseliger Depending on how things go, I'll love to be a part of this and work with you to get this out if possible. |
Learnings:
|
Description
At some point we need to allow a way for users to inject secrets into their SSBC executions without adding them to the batch spec inputs directly.
I think we could do something like
${{ secret.XX }}
in templating and support setting those from the UI in a secrets menu.My current plan is to
For the batches transformer, this would mean parsing the batch spec to find
${{ secrets. }}
values and looking for docker secrets to pass along as well.Additional plans:
TBD: Should we allow to specify one-off secret values? This would make it very easy to use a secret in a batch change, but also make it impossible to ever run it again (think recurring batch changes, ..)
Impacted customers
https://github.com/sourcegraph/accounts/issues/580
https://github.com/sourcegraph/accounts/issues/287
The text was updated successfully, but these errors were encountered: