Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow oidc-user to be marked as non secret for CI #207

Open
jake-perkins opened this issue Sep 4, 2024 · 0 comments
Open

Allow oidc-user to be marked as non secret for CI #207

jake-perkins opened this issue Sep 4, 2024 · 0 comments
Labels
feature request New feature or request

Comments

@jake-perkins
Copy link

jake-perkins commented Sep 4, 2024

Is your feature request related to a problem? Please describe.

this action currently has two outputs

outputs:
oidc-token:
description: "JFrog OIDC token generated by the Setup JFrog CLI when setting oidc-provider-name."
oidc-user:
description: "JFrog OIDC username from the OIDC token generated by the Setup JFrog CLI when setting oidc-provider-name."

the latter would useful for troubleshooting action pipelines, however it is by default marked a secret and therefore not easily consumed for informational purposes.
It would be great if there was an optional input argument to mark this output as non secret so it could be used for various purposes within the CI

Describe the solution you'd like to see

Something to the effect of

inputs:
mask-oidc-user:
description: "Mask OIDC User"
default: true
required: false

and naturally some update to the internal JS code to propagate this boolean to the github sdk when adding the output such that it's not set as a secret

Describe alternatives you've considered

No response

Additional context

No response

@jake-perkins jake-perkins added the feature request New feature or request label Sep 4, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature request New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant