-
-
Notifications
You must be signed in to change notification settings - Fork 5.8k
Instance-level secrets #27373
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
What's your use case? |
I am trying out the actions to replace our current external pipeline when it becomes stable. Today, with secrets at the organization level being the highest, I need to duplicate the DOCKER_LOGIN and DOCKER_PASSWORD secrets to all of them. And if they change, we need to update more than 50 orgs. Server level secrets would mean being able to set those common values once, by the server administrator. They could be overwritten by organization, repository or user secrets if needed on a case-by-case basis. |
I saw the proposal was accepted, thanks ! I'm willing to work on it if no one has started yet :) |
Could you explain this for me once again with a use case, specially the |
We have a single instance, with secrets that must be shared across all orgs. These secrets are to access to a docker registry in my case. Today, I have to duplicate these credentials in all orgs. Tomorrow, with the PR, I can set them once at the instance level, so they apply across all orgs. |
Feature Description
Hello,
Currently, we have user, organization and repository secrets.
But I'm in a case where the secrets will be the same across all the instance. Today, I have to duplicate all values in all organizations.
Would it be a good idea to have them also at the server level ?
Of course, that would apply also to variables, recently added.
Best regards
Screenshots
No response
The text was updated successfully, but these errors were encountered: