Skip to content

Update nuget.md #133

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 1 commit into from
Sep 10, 2020
Merged

Update nuget.md #133

merged 1 commit into from
Sep 10, 2020

Conversation

LanceMcCarthy
Copy link
Contributor

Refined GitHub Secrets section with the following changes:

  • Changed example repo to the DevOpsExamples repo where I have recently added 3 new GitHub actions that use secrets to authenticate with the Telerik NuGet server.
  • Added the packageSource section to the nunget config file snippet. This is important because the key of the package source needs to match the xml node for the packagesourceCredential.
  • Changed the packageSource name from Telerik to TelerikFeed to make the relationship between the packagesource key and the credentials key
  • Added an important note about how GitHub keeps the secret encrypted and masked, even after being copied into an environment variable.
  • Added an important warning about GitHub's restriction of allowing secrets to be used in GH actions that were invoked by pull-request event
  • Small refinements to language describing the example (e.g. "get" to "set")

Refined GitHub Secrets section with the following changes:

* Changed example repo to the DevOpsExamples repo where I have recently added 3 new GitHub actions that use secrets to authenticate with the Telerik NuGet server.
* Added the `packageSource` section to the nunget config file snippet. This is important because the key of the package source needs to match the xml node for the packagesourceCredential.
* Changed the packageSource name from `Telerik` to `TelerikFeed` to make the relationship between the packagesource key and the credentials key
* Added an important note about how GitHub keeps the secret encrypted and masked, even after being copied into an environment variable.
* Added an important warning about GitHub's restriction of allowing secrets to be used in GH actions that were invoked by pull-request event
* Small refinements to language describing the example (e.g. "get" to "set")
@marin-bratanov marin-bratanov self-assigned this Sep 10, 2020
@marin-bratanov marin-bratanov merged commit be9d9f1 into telerik:master Sep 10, 2020
marin-bratanov pushed a commit that referenced this pull request Sep 10, 2020
Refined GitHub Secrets section with the following changes:

* Changed example repo to the DevOpsExamples repo where I have recently added 3 new GitHub actions that use secrets to authenticate with the Telerik NuGet server.
* Added the `packageSource` section to the nunget config file snippet. This is important because the key of the package source needs to match the xml node for the packagesourceCredential.
* Changed the packageSource name from `Telerik` to `TelerikFeed` to make the relationship between the packagesource key and the credentials key
* Added an important note about how GitHub keeps the secret encrypted and masked, even after being copied into an environment variable.
* Added an important warning about GitHub's restriction of allowing secrets to be used in GH actions that were invoked by pull-request event
* Small refinements to language describing the example (e.g. "get" to "set")
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants