So for 0.5 there doesn’t appear to be a way to use secrets to variable a repo’s pipeline per environment. Let me explain w/ plugins/docker my “registry” and “repo” parameters are different for a pipeline executing two or more environment like so:
0.5 does not support ${VARIABLE} for secerts. Secrets are passed to the plugin container as environment variables, similar to docker run -e VARIABLE=...
The issue here is you are trying to use 0.4 syntax with 0.5, which is not supported
How does one use secrets as container environment variables in the plugin container beyond the ones ticked off by the plugin container and utilized specifically in the code of the plugin. For me the documentation is not clear.
Yeah, I could make it work, but I had to review ECR plugin wrapper script to figure out the name of the secrets I had to add.
For example, ECR plugin docs says that these parameters should be on yaml file:
secret_key
access_key
…
But docs doesn’t say the name of secrets if I don’t want to store secret_key or access key on yaml file, which for the case of ECR pluging they are: ECR_SECRET_KEY, ECR_ACCESS_KEY, etc. Something similar with Docker plugin, seems that secret names should be DOCKER_USERNAME, DOCKER_PASSWORD, etc.
That makes me realize that there is a convention for secrets with plugins, that secrets should be named as {PLUGIN_NAME}_{PARAMETER_NAME} maybe I’m wrong but if that convention is true I couldn’t find it in the docs . Maybe that can be added as a documentation improvement.
But docs doesn’t say the name of secrets if I don’t want to store secret_key or access key on yaml file, which for the case of ECR pluging they are: ECR_SECRET_KEY, ECR_ACCESS_KEY, etc
This is describing an old, experimental feature that was deprecated, which is why it is no longer documented.
If you want to inject a secret key and secret token you need to use the following syntax in your yaml configuration file: