You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+97-4Lines changed: 97 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,8 +4,83 @@ The action to load secrets from [1Password Connect](https://1password.com/secret
4
4
5
5
Specify right from your workflow YAML which secrets from 1Password should be loaded into your job, and the action will make them available as environment variables for the next steps.
6
6
7
+
## Prerequisites
8
+
-[1Password Connect](https://support.1password.com/secrets-automation/#step-2-deploy-a-1password-connect-server) deployed in your infrastructure
9
+
7
10
## Usage
8
11
12
+
There are two ways that secrets can be loaded:
13
+
-[use the secrets from the action's ouput](#use-secrets-from-the-actions-output)
14
+
-[export secrets as environment variables](#export-secrets-as-environment-variables)
# Remove local copies of the Docker credentials, which are not needed anymore
75
158
unset-previous: true
76
159
env:
@@ -89,6 +172,7 @@ jobs:
89
172
90
173
| Name | Default | Description |
91
174
|---|---|---|
175
+
| `export-env` | `false` | Export the loaded secrets as environment variables |
92
176
| `unset-previous` | `false` | Whether to unset environment variables populated by 1Password in earlier job steps |
93
177
94
178
## Secrets Reference Syntax
@@ -107,12 +191,9 @@ So for example, the reference URI `op://app-cicd/aws/secret-access-key` would be
107
191
108
192
## Masking
109
193
110
-
Similar to regular GitHub repository secrets, secret fields from 1Password will automatically be masked from the GitHub Actions logs too.
111
-
A 1Password field is considered 'secret' when it's marked as concealed (which shows as `•••••••` in the 1Password GUI) or when it's a secure note.
194
+
Similar to regular GitHub repository secrets, fields from 1Password will automatically be masked from the GitHub Actions logs too.
112
195
So if one of these values accidentally gets printed, it'll get replaced with `***`.
113
196
114
-
This means that a username or port field for example will not get masked.
115
-
116
197
## 1Password Connect Configuration
117
198
118
199
To use the action, you need to have a [1Password Connect](https://support.1password.com/secrets-automation/#step-1-set-up-a-secrets-automation-workflow) instance deployed somewhere.
@@ -150,3 +231,15 @@ jobs:
150
231
## Supported Runners
151
232
152
233
You can run the action on Linux and macOS runners. Windows is currently not supported.
234
+
235
+
## Security
236
+
237
+
1Password requests you practice responsible disclosure if you discover a vulnerability.
238
+
239
+
Please file requests via BugCrowd.
240
+
241
+
For information about security practices, please visit our Security homepage.
242
+
243
+
## Getting help
244
+
245
+
If you find yourself stuck, visit our Support Page for help.
0 commit comments