remove usage of CAGENT_* org secrets in docs repo#24983
remove usage of CAGENT_* org secrets in docs repo#24983derekmisler wants to merge 1 commit intodocker:mainfrom
Conversation
✅ Deploy Preview for docsdocker ready!
To edit notification comments on pull requests, go to your Netlify project configuration. |
docker-agent
left a comment
There was a problem hiding this comment.
Assessment: 🟡 NEEDS ATTENTION
This PR migrates token acquisition from a GitHub App (tibdex/github-app-token) to an AWS OIDC + Secrets Manager flow. The approach is sound. Two items worth addressing before merge — see inline comments.
🟡 NEEDS ATTENTION — Automated Review
This PR migrates the nightly scan's token acquisition from Finding 1 — [MEDIUM] Silent
|
a7cbe59 to
0a65893
Compare
|
Thanks for the update! Two things to flag with the new change: 1. GH_TOKEN: ${{ env.GITHUB_APP_TOKEN || github.token }} # has fallback ✅
github-token: ${{ env.GITHUB_APP_TOKEN }} # no fallback ❌If the PAT fetch fails (step errors out), the job halts before reaching this step anyway — so the 2. The In GitHub Actions expressions, the The safest fix is still an explicit guard in the shell step: if [ -z "$PAT" ] || [ "$PAT" = "null" ]; then
echo "::error::pat key missing or null in AWS secret"
exit 1
fi |
0a65893 to
8e70a37
Compare
|
@dvdksn, this one is for you (i don't have permissions to assign reviewers) |
Signed-off-by: Derek Misler <derek.misler@docker.com>
8e70a37 to
fec0423
Compare
Description
Removes usage of
CAGENT_*organization secrets from the nightly docs scan workflow and replaces them with AWS-based credential management. The workflow now uses AWS IAM role assumption to fetch a GitHub PAT from AWS Secrets Manager instead of relying on GitHub App secrets.Changes
GH_TOKENandgithub-tokento use the fetched PAT from environment variableid-token: write,contents: read,issues: write)inputs['dry-run']toinputs.dry-run == trueRelated issues or tickets
Closes: https://github.com/docker/gordon/issues/537
Reviews