Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Use a github variable containing 1password secret references #1921

Merged
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
51 changes: 51 additions & 0 deletions .github/actions/extract-1password-secret/action.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
name: 'Extract secrets from 1Password'
description: 'Extracts secrets from 1Password using a Github variable containing multiple secret references'
inputs:
VARIABLES_TO_EXTRACT:
description: 'A list of comma separated secrets to extract'
required: true
type: string
ONE_PASSWORD_SECRET_REFERENCES:
description: 'The contents of the ONE_PASSWORD_SECRET_REFERENCES variable, containing key-value pairs of secret references'
required: true
type: string
OP_SERVICE_ACCOUNT_TOKEN:
description: 'The 1Password service account token'
required: true
type: string

runs:
using: 'composite'
steps:
- name: Extract 1password secret references for specific variables
id: extract_secret_references
shell: bash
# One possible error is that the specified variable name does not exist in the ONE_PASSWORD_SECRET_REFERENCES variable.
# In that case just go over it
continue-on-error: true
run: |
# Replace command with spaces to it's easier to iterate over the key-value pairs
keys=$(echo "${{ inputs.VARIABLES_TO_EXTRACT }}" | tr ',' ' ')
for key in $keys; do
# Remove leading and trailing spaces
variable_name=$(echo "$key" | sed 's/^ *//;s/ *$//')
value=$(echo "${{ inputs.ONE_PASSWORD_SECRET_REFERENCES }}" | grep "^$variable_name *=" | cut -d'=' -f2- | sed 's/^ *//;s/[ \r]*$//')
# For each variable to extract create an env variable with the secret reference as a value
echo "$variable_name=$value" >> $GITHUB_ENV
echo "$variable_name=$value"
done

- name: Load secrets from 1Password
id: onepw_secrets
uses: 1password/[email protected]
with:
export-env: true # Export loaded secrets as environment variables
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

env:
# 1password/load-secrets-action will take any defined env variable and try to get the secret value from 1Password
# I think it does this only for variables that start with op://
# That means all variables defined in the previous step will be loaded from 1Password if they exist.
OP_SERVICE_ACCOUNT_TOKEN: ${{ inputs.OP_SERVICE_ACCOUNT_TOKEN }} # This is required to connect to the vault in our 1Password account.

# After the previous step all variables specified in VARIABLES_TO_EXTRACT should have an env variable with the
# secret as a value. If they don't exist in 1Password they will be left as is, meaning that will still contain the
# secret reference.
22 changes: 12 additions & 10 deletions .github/workflows/publish_assets.yml
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,16 @@ jobs:

steps:
- uses: actions/checkout@v3

# Get the version from the commit. This will depend on the trigger of the workflow
# If the trigger is release, the version will be the tag on the commit.
# If the trigger is a workflow_dispatch, the version will be the branch name, which is
# not really useful.
- id: get_version
uses: battila7/get-version-action@v2

- name: printVersion
run: echo "The version extracted from github.ref is ${{ steps.get_version.outputs.version }}"

- name: Set up JDK 17
uses: actions/setup-java@v3
with:
Expand Down Expand Up @@ -83,19 +89,15 @@ jobs:

- name: Load secrets from 1Password
id: onepw_secrets
uses: 1password/[email protected]
uses: ./.github/actions/extract-1password-secret
with:
export-env: true # Export loaded secrets as environment variables
env:
OP_SERVICE_ACCOUNT_TOKEN: ${{ secrets.OP_SERVICE_ACCOUNT_TOKEN }} # This is required to connect to the vault in our 1Password account.
MAVEN_GPG_PRIVATE_KEY: "op://rbiv7rvkkrsdlpcrz3bmv7nmcu/yztcx47yzp4vizjyaq7ulvkgoi/Private Key"
MAVEN_GPG_PASSPHRASE: "op://rbiv7rvkkrsdlpcrz3bmv7nmcu/yztcx47yzp4vizjyaq7ulvkgoi/password"
VARIABLES_TO_EXTRACT: 'MAVEN_GPG_PASSPHRASE, MAVEN_GPG_PRIVATE_KEY, SONATYPE_TOKEN_USERNAME, SONATYPE_TOKEN_PASSWORD'
ONE_PASSWORD_SECRET_REFERENCES: ${{ vars.ONE_PASSWORD_SECRET_REFERENCES }}

- name: Build and Publish to Sonatype
run: |
# The gradle java verifying plugin does not work with java 17.
# Don't verify since it has already been done when the PR was created.
./gradlew publish -x verifyGoogleJavaFormat
env:
SONATYPE_USERNAME: ${{secrets.SONATYPE_USERNAME}}
SONATYPE_PASSWORD: ${{secrets.SONATYPE_PASSWORD}}
./gradlew publish --rerun-tasks -x verifyGoogleJavaFormat

12 changes: 6 additions & 6 deletions .github/workflows/stg_web_svc_merge.yml
Original file line number Diff line number Diff line change
Expand Up @@ -56,16 +56,16 @@ jobs:

- name: Load secrets from 1Password to be used for sending notification
id: onepw_secrets
uses: 1password/[email protected]
uses: ./.github/actions/extract-1password-secret
with:
export-env: true # Export loaded secrets as environment variables
env:
OP_SERVICE_ACCOUNT_TOKEN: ${{ secrets.OP_SERVICE_ACCOUNT_TOKEN }}
CREDENTIALS: "op://rbiv7rvkkrsdlpcrz3bmv7nmcu/ifkeehu5gzi7wy5ub5qvwkaire/credential"
OP_SERVICE_ACCOUNT_TOKEN: ${{ secrets.OP_SERVICE_ACCOUNT_TOKEN }} # This is required to connect to the vault in our 1Password account.
VARIABLES_TO_EXTRACT: 'GITHUB_GENERIC_ACTION_CREDENTIALS'
ONE_PASSWORD_SECRET_REFERENCES: ${{ vars.ONE_PASSWORD_SECRET_REFERENCES }}


- name: Send a notification to mobility-feed-api
uses: peter-evans/repository-dispatch@v2
with:
token: ${{ env.CREDENTIALS }}
token: ${{ env.GITHUB_GENERIC_ACTION_CREDENTIALS }}
repository: MobilityData/mobility-feed-api
event-type: gtfs-validator-update-stg
11 changes: 5 additions & 6 deletions .github/workflows/web_release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -54,16 +54,15 @@ jobs:

- name: Load secrets from 1Password to be used for sending notification
id: onepw_secrets
uses: 1password/[email protected]
uses: ./.github/actions/extract-1password-secret
with:
export-env: true # Export loaded secrets as environment variables
env:
OP_SERVICE_ACCOUNT_TOKEN: ${{ secrets.OP_SERVICE_ACCOUNT_TOKEN }}
CREDENTIALS: "op://rbiv7rvkkrsdlpcrz3bmv7nmcu/ifkeehu5gzi7wy5ub5qvwkaire/credential"
OP_SERVICE_ACCOUNT_TOKEN: ${{ secrets.OP_SERVICE_ACCOUNT_TOKEN }} # This is required to connect to the vault in our 1Password account.
VARIABLES_TO_EXTRACT: 'GITHUB_GENERIC_ACTION_CREDENTIALS'
ONE_PASSWORD_SECRET_REFERENCES: ${{ vars.ONE_PASSWORD_SECRET_REFERENCES }}

- name: Send a notification to mobility-feed-api
uses: peter-evans/repository-dispatch@v2
with:
token: ${{ env.CREDENTIALS }}
token: ${{ env.GITHUB_GENERIC_ACTION_CREDENTIALS }}
repository: MobilityData/mobility-feed-api
event-type: gtfs-validator-release
8 changes: 4 additions & 4 deletions build.gradle
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,8 @@
* A note about publishing and signing.
* Maven central requires that artifacts be signed. And upload is done to Sonatype.
* To publish you will need these environment variables defined:
* SONATYPE_USERNAME
* SONATYPE_PASSWORD
* SONATYPE_TOKEN_USERNAME
* SONATYPE_TOKEN_PASSWORD
* MAVEN_GPG_PRIVATE_KEY
* MAVEN_GPG_PASSPHRASE
* Suggestion is to put these in a shell script with restricted read permissions, then source it before calling
Expand Down Expand Up @@ -119,8 +119,8 @@ subprojects {
maven {
url = 'https://s01.oss.sonatype.org/service/local/staging/deploy/maven2'
credentials {
username System.getenv("SONATYPE_USERNAME")
password System.getenv("SONATYPE_PASSWORD")
username System.getenv("SONATYPE_TOKEN_USERNAME")
password System.getenv("SONATYPE_TOKEN_PASSWORD")
}
}
}
Expand Down
Loading