You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -93,10 +92,10 @@ That mean you must also have the secrets in your **Settings** > **Secrets** list
93
92
You could also dynamically update the credentials of a Package Source defined in your nuget.config file This is a good option when you do not want to use a `packageSourceCredentials` section that uses environment variables.
94
93
95
94
```powershell
96
-
# Updates a source named 'Telerik' in the nuget.config
That command will look through the nuget.config for a package source with the key `Telerik` and then add/update the credentials for that source.
98
+
That command will look through the nuget.config for a package source with the key `Telerik_v3_Feed` and then add/update the credentials for that source.
100
99
101
100
#### Option 2 - Add a new package source
102
101
@@ -115,47 +114,54 @@ You can use the same approach in the previous section. Everything is exactly the
115
114
Please visit the [Announcing NuGet Keys](https://www.telerik.com/blogs/announcing-nuget-keys) blog post for more details how ot create the key and how to use it.
> Protect your key by storing it in a GitHub Secret, then use the secret's varible name in the command
121
+
> Protect your key by storing it in a GitHub Secret, then use the secret's ID in the command.
123
122
124
123
### Dockerfile: Using Secrets
125
124
126
125
When using a Dockerfile to build a .NET project that uses the Telerik NuGet server, you'll need a safe and secure way to handle your NuGet crednetials and your Telerik License Key. This can be done my mounting a Docker secret.
127
126
128
-
In your GitHub Actions workflow, you can define and set docker secrets in the docker build step. Take a look at the following example, we using GitHub secrest to set two docker secrets `telerik-nuget-key=${{secrets.MY_NUGET_KEY}}` and `telerik-license-key=${{secrets.MY_TELERIK_LICENSE_KEY}}`.
127
+
In your GitHub Actions workflow, you can define and set docker secrets in the docker build step. In the following example, notice how we are setting two docker secrets (`nuget-sec` and `license-sec`) using the values from GitHub secrets.
> Only set these sensitive values in the build stage or you risk leaking secrets in the final image. Please [visit the complete Dockerfile](https://github.com/LanceMcCarthy/DevOpsExamples/blob/main/src/AspNetCore/MyAspNetCoreApp/Dockerfile) and [the workflow](https://github.com/LanceMcCarthy/DevOpsExamples/blob/main/.github/workflows/main_build-aspnetcore.yml).
175
+
> Pay attention to whether or not you are including any secrets in your final image. You can run your container to explore the files (and env vars in Exec) to make sure.
170
176
171
177
### Telerik License Approaches
172
178
@@ -177,7 +183,6 @@ Depending on how you're building our code, there are several ways to introduce t
177
183
-[In a YAML Pipeline](https://github.com/LanceMcCarthy/DevOpsExamples?tab=readme-ov-file#yaml-pipeline)
178
184
-[In a Classic Pipeline](https://github.com/LanceMcCarthy/DevOpsExamples?tab=readme-ov-file#classic-pipeline)
179
185
180
-
181
186
#### Approach 1 - Using a Variable
182
187
183
188
This is by far the easiest and safest way. You can use a secret (GitHub Action secret or AzDO Variable secret) and set the `TELERIK_LICENSE` environment variable before the project is compiled.
0 commit comments