From 4cdc8b2469f261060f3981486e183260d8e7c7be Mon Sep 17 00:00:00 2001 From: Neil Anderson Date: Wed, 4 Sep 2024 10:20:23 +0100 Subject: [PATCH] (PE-39224) Adding random console password for forked pr workflow CI jobs triggered from forked branches aren't able to access secrets. In this case we are using a randomised password. --- .../peadm_spec/plans/install_test_cluster.pp | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/spec/acceptance/peadm_spec/plans/install_test_cluster.pp b/spec/acceptance/peadm_spec/plans/install_test_cluster.pp index abf6d2d5..d7693e24 100644 --- a/spec/acceptance/peadm_spec/plans/install_test_cluster.pp +++ b/spec/acceptance/peadm_spec/plans/install_test_cluster.pp @@ -6,8 +6,7 @@ Optional[String[1]] $pe_installer_source = undef, Boolean $permit_unsafe_versions = false, Enum['enable', 'disable'] $fips = 'disable', - String[1] $console_password - + String $console_password ) { $t = get_targets('*') wait_until_available($t) @@ -26,8 +25,17 @@ } } + # CI jobs triggered from forks don't have access to secrets, so use randomized input instead + if $console_password == '' { + $cp = run_command( + 'LC_ALL=C tr -dc \'A-Za-z0-9!"#$%&\'\\\'\'()*+,-./:;<=>?@[\]^_`{|}~\' $console_password, + console_password => $cp, download_mode => $download_mode, code_manager_auto_configure => $code_manager_auto_configure, version => $version,