[Github Action] Check all secrets are replaced by bin/generate-secrets #275
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
When new secret placeholders are defined in base-secrets.yaml the bin/generate-secrets script (that should replace secret placeholders with randomized values) is sometimes not updated accordingly. This will result in the use of the word secret as a weak password.
This PR will implement a check on the occurrence of the word secret in the secrets.yaml file left after running the bin/generate-secrets script. If detect this will cause the action to fail with a message on which secrets to update.
This PR also updates the generate-secrets script to replace any field with value
secretwith a password.Example output: