cstamas commented on code in PR #77:
URL: https://github.com/apache/maven-gpg-plugin/pull/77#discussion_r1512820505


##########
src/site/apt/index.apt.vm:
##########
@@ -40,6 +40,13 @@ ${project.name}
   General instructions on how to use the GPG Plugin can be found on the 
{{{./usage.html}usage page}}. Some more
   specific use cases are described in the examples given below.
 
+  By default, plugin will enforce "best practices", and will fail the build if 
any violation are detected.
+  In short, this was done to stop users putting secrets (plaintext or 
quasi-encrypted) in their Maven configuration
+  files (settings.xml, POMs) or use secrets in a way they leave trace (like in 
terminal history). In this default mode,
+  plugin leaves two options to obtain passphrase: use of gpg-agent in 
interactive sessions, and use of environment
+  variables in batch/non-interactive sessions. To disable "best practices" and 
regain full backward compatibility,
+  configure the plugin accordingly (see goals, look for <<<bestPractices>>> 
configuration).

Review Comment:
   And no, you would never ever export any env variable (or set on root 
process) that contains sensitive info, you usually set it on process that needs 
it (and is per def inherited by childs, if forking). But this way, once the 
process finishes, the env variable is gone with it.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: issues-unsubscr...@maven.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to