-
Notifications
You must be signed in to change notification settings - Fork 91
fix password and user in jdbc standalone xml #1213
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
core/src/main/python/wlsdeploy/tool/discover/deployments_discoverer.py
Outdated
Show resolved
Hide resolved
core/src/main/java/oracle/weblogic/deploy/util/WLSDeployArchive.java
Outdated
Show resolved
Hide resolved
core/src/main/python/wlsdeploy/tool/discover/deployments_discoverer.py
Outdated
Show resolved
Hide resolved
core/src/main/python/wlsdeploy/tool/util/credential_injector.py
Outdated
Show resolved
Hide resolved
Can we change the name of the generated secret token not to use
|
The secret name embedded in the generated secret token MUST be a legal Kubernetes name. |
Also, I believe we have some logic to limit the number of characters of the generated token so that it won't fail later, and the logic should apply here also. @rakillen ? |
@jshum2479 The character count check currently happens in the generated
We don't currently check before that point, because we don't have a good way of shortening any that are too long, and ensuring that they stay unique. |
Kudos, SonarCloud Quality Gate passed! |
Handled in #1220 |
First part of WDT-675. Looks for password and user in jdbc standalone xml app and tokenizes or replaces the values with the fix token.