-
Notifications
You must be signed in to change notification settings - Fork 44
Deprecation info #33
Comments
@BALAGA-GAYATRI : Could you provide an update on this issue including:
I realize this action has largely been in maintenance mode since the few issue template changes you made approximately a year ago. Maybe some of the other contributors might have ideas about this given past experience. |
@andyfeller |
I would never use a deprecated action in any workflows even if they will still work after archiving. You should provide full details of alternatives or have a replacement action available when issuing a deprecation notice. In any case I managed to get it working in a rudimentary way with Az CLI below:
Output values have the same names as the secrets and are masked. |
this is what I do as well, and it works well between steps of the same job, but when attempting to pass that masked secret to a 2nd job in the same workflow, the value can become unmasked in the GH Logs |
@jku-sr: as far as I know, |
@andyfeller sharing secret across jobs works, may be you are missing output section for job
|
@BALAGA-GAYATRI can you provide more information on why this action was deprecated? This action is heavily used by my organization, and the recommended replacement action (azure/cli@v1 action) is not sufficient. If I'm not mistaken this action will treat the returned values as plaintext, not obfuscated secrets. Additionally this action doesn't even work on self-hosted runners (Azure/cli#71).
Even stranger, the official Microsoft documentation is still using
get-keyvault-secrets
in the code example, but soon after the depreciation someone updated the action marketplace link to a non-verified action maintained by a single developer.The text was updated successfully, but these errors were encountered: