Alert users to migrate deprecated secrets to Portal UI #32283
justo-mend
started this conversation in
Suggest an Idea
Replies: 2 comments 3 replies
-
I like the special issue as way to alert repository owners. A special header, plus explanation text in the PR's body text for each PR in the affected repositories is good too. Make sure to keep the PR title as normal, as the PR title is used in things like Semantic Release bot. |
Beta Was this translation helpful? Give feedback.
0 replies
-
I suggest:
|
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Tell us more.
Several months ago, we began the process of deprecating Renovate-encrypted secrets in Renovate config for Mend-hosted Apps.
Despite this, we have identified over 8,000 repos that are still running with encrypted secrets in Renovate file config.
If we stop using encrypted secrets, all of these repos will be negatively affected.
Therefore, we are looking for ways to help alert users who will be affected, and to encourage them to actively migrate their secrets before we fully discontinue the ability to use secrets inside Renovate config.
I'd like to discuss the best ways to help inform those users that they must migrate their secrets if they want to continue running Renovate without failures.
Suggestion: Create an Issue alerting users that encrypted secrets must be migrated
One idea is to create an Issue in each repo that is running with encrypted secrets. Note: this will include repos where the secret is being inherited - ie. through org-level config.
The issue can explain to the user that encrypted secrets can no longer be stored in file-based Renovate config, and that secrets must be migrated to the Developer Portal using the Credentials UI in the portal settings. It can link to the documentation to help provide clear instructions for migrating the secrets.
Along with this, we could add a header to every PR created by Renovate in repos that have encrypted secrets. The header could simply state that there is a problem with the secrets in their config, and provide a link to the Issue that we created for them in their repo.
Does this sound like a good idea?
Are there better suggestions, or additional suggestions?
Beta Was this translation helpful? Give feedback.
All reactions