-
Notifications
You must be signed in to change notification settings - Fork 3.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revert "feat (codespaces) - Add initial support for codespaces (#27483)" #27655
Conversation
This reverts commit 9599197.
Note that this won't unblock the mirroring for this branch, that will have to be done separately. |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
May I please know what is the problem with the That database is just for running local EF tests, not critical data I guess! |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
@ShreyasJejurkar I don't think there is anything wrong with it, but it isn't allowed. If there isn't any other way to do it, and we can demonstrate that there is no risk, then we may be able to get an exception to the rule. I am reverting this until we find out more. |
As of now, I am not aware of any other method. And also somewhere we need to pass that password right. Maybe in the connection string or env variable. But no matter where we store, we need to tell that in the |
@ShreyasJejurkar I agree that this sucks. I don't agree with the rules. I don't think there is really a problem here. But I don't make the rules. |
I just saw this codespaces secret, but not sure will that works for this or not. https://docs.github.com/en/codespaces/managing-your-codespaces/managing-encrypted-secrets-for-your-codespaces |
Yes, @ajcvickers I can totally understand. Programming is easy, organizations are hard. |
@ShreyasJejurkar Which may mean we can't enable codespaces. |
"As of now". (I hope) Sorry for the pain. For sure I will research a little bit on this how we can avoid storing passwords in I will look forward to safia @captainsafia response on this as well, to know if she knew any way to workaround on this. |
Codespaces do support managing secrets per this doc. However, someone with admin access to the settings page will have to add the local test password to the secret on the page. If this is done @ShreyasJejurkar, is the SQL testing extension able to access secrets from an environment variable instead of a literal string? |
@captainsafia I am yet to try this, just yesterday I found that. Not sure will that work or not correctly, but looks like a huge work for the new-ish contributor to EF Core. |
https://code.visualstudio.com/docs/remote/devcontainerjson-reference |
This reverts commit 9599197.
Having a password checked in to
efcore/devcontainer.json
is not allowed./cc @mmitche @dougbu @wtgodbe @Pilchie @ShreyasJejurkar