From 8bca211b5b89c700350c106defe69227014e1cc6 Mon Sep 17 00:00:00 2001 From: Neil Anderson Date: Wed, 4 Sep 2024 10:20:23 +0100 Subject: [PATCH] (PE-39224) Adding random console password for forked pr workflow CI jobs triggered from forked branches aren't able to access secrets. In this case we are using a randomised password. --- .../peadm_spec/plans/install_test_cluster.pp | 12 ++++++++++-- 1 file changed, 10 insertions(+), 2 deletions(-) diff --git a/spec/acceptance/peadm_spec/plans/install_test_cluster.pp b/spec/acceptance/peadm_spec/plans/install_test_cluster.pp index abf6d2d5b..0d21195b5 100644 --- a/spec/acceptance/peadm_spec/plans/install_test_cluster.pp +++ b/spec/acceptance/peadm_spec/plans/install_test_cluster.pp @@ -7,7 +7,6 @@ Boolean $permit_unsafe_versions = false, Enum['enable', 'disable'] $fips = 'disable', String[1] $console_password - ) { $t = get_targets('*') wait_until_available($t) @@ -26,8 +25,17 @@ } } + # CI jobs triggered from forks don't have access to secrets, so use randomized input instead + if $console_password == '' { + $cp = run_command( + 'LC_ALL=C tr -dc \'A-Za-z0-9!"#$%&\'\\\'\'()*+,-./:;<=>?@[\]^_`{|}~\' $console_password, + console_password => $cp, download_mode => $download_mode, code_manager_auto_configure => $code_manager_auto_configure, version => $version,