Hi Luke,

Yes, you can inject a secret string in the jjb :

wrappers:
 - credentials-binding:
     - zip-file:
        credential-id: b3e6f337-5d44-4f57-921c-1632d796caa6
        variable: CONFIG_ZIP
     - file:
        credential-id: b3e6f337-5d44-4f57-921c-1632d796caab
        variable: config_file
     - username-password:
        credential-id: b3e6f337-5d44-4f57-921c-1632d796caac
        variable: config_username_password
     - text:
        credential-id: b3e6f337-5d44-4f57-921c-1632d796caad
        variable: config_text

it supports file, text, username-password, etc. It can not be echo/cat
during the CI execution.
It requires a Credentials Binding plugin.
@Trevor, Aric, can you double check is it installed already?
We use this method to avoid API token leak issue in internal CI.

[1], https://docs.openstack.org/infra/jenkins-job-builder/wrappers.html
[2], https://wiki.jenkins.io/display/JENKINS/Credentials+Binding+Plugin


Luke Hinds <[email protected]>于2018年2月20日周二 下午4:11写道:

> Hi,
>
> Do we have the capability to handle (inject?) environment variable secrets
> in our CI that are set during a build?
>
> I am looking at introducing virus total checks into anteater and this
> needs an API key which we don't want to share in the open.
>
> Currently I have the code look for the key in the environment, rather then
> a config file..is this workable?
>
> e.g...
>
> export VT_KEY='<API_KEY>'
> echo $VT_KEY
> <API_KEY>
> --
> Luke Hinds | NFV Partner Engineering | CTO Office | Red Hat
> e: [email protected] | irc: lhinds @freenode | t: +44 12 52 36 2483
> _______________________________________________
> opnfv-tech-discuss mailing list
> [email protected]
> https://lists.opnfv.org/mailman/listinfo/opnfv-tech-discuss
>
_______________________________________________
opnfv-tech-discuss mailing list
[email protected]
https://lists.opnfv.org/mailman/listinfo/opnfv-tech-discuss

Reply via email to