On Thu, Dec 22, 2022 at 06:20:26PM +0100, William Lallemand wrote:
> On Thu, Dec 22, 2022 at 06:12:46PM +0100, Willy Tarreau wrote:
> > On Thu, Dec 22, 2022 at 11:00:26PM +0600, ???? ??????? wrote:
> > > I'm not sure if it possible to issue organization based token (not a
> > > personal one).
> > > 
> > > As for visibility, secrets are not visible for pull requests.
> > 
> > My concern is not that they are in PR or any such thing, but they're
> > passed in HTTP requests and function arguments in python scripts. So
> > once we get a failure, if the failed request is dumped into the CI's
> > logs, or if the python interpreter emits a stack trace with all
> > arguments to the functions in the stack, the build logs will reveal
> > the secret. Maybe there's a way to be certain that the logs from the
> > python script are never dumped to publicly accessible logs, or to
> > redirect them to files only accessible to authorized people, and that
> > would be fine, but until this, I don't know what such guarantees we
> > have. This is my concern regarding the use of this token like this.
> > 
> > Thanks,
> > Willy
> 
> You need to be logged to see the logs of the CI, I don't know if it is
> only accessible to the people in the haproxy group or if it only need to
> be logged to github.

OK. At least this is something we need to verify before proceeding. I
don't know if anyone has access to an account not part of the users
here. Or conversely maybe we can try to look for another project's
CI logs.

Willy

Reply via email to