@bradrydzewski thanks, yep, it seems i was running 1.0.
I am hitting another issue now: i have added few orgsecrets, but it seems they are not available from the pipeline.
@bradrydzewski just to clarify: i am trying to access the secrets during the PR event. As far as i know secrets for PR are disabled by default for security reasons.
Before i provide all the requested info, could you please advise how to pass Pull Request Read and
Pull Request Write parameters to drone orgsecret add command?
@bradrydzewski --allow-pull-request switch worked and now the secrets are now available on PR event.
The only one question: is it possible to use dockerconfigjson as a global secret in order to pull images from the private registries like below?
image_pull_secrets:
dockerconfigjson
I have basically added the org secret for dockerconfigjson , but the image pull fails with No such image error.
I recommend setting DRONE_LOGS_TRUE=true on the agent and tracing through the code to further troubleshoot. You should be able to analyze the trace logs, in conjunction with reading the code, to debug further. You may also need to compile the agent from source and add your own debug logic as needed.
Many thanks for valuable advice, @bradrydzewski. I was inserting the valid dockerconfigjson json as i’ve checked it before inserting it as a usual credential.
In my case the json has been parsed with errors by drone agent and i had to define the json as the env var heredoc and then used that var as an argument to the drone orgsecret add command.
I hit the same issue where a JSON secret got corrupted somehow while getting it to the command line. drone orgsecret add needs a better way to ingest blob secrets.