-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dependabot can't fetch secrets from GitHub? #3764
Comments
You'll still need to add configuration for those secrets to the config file, I think this should solve your problem: https://docs.github.com/en/code-security/supply-chain-security/keeping-your-dependencies-updated-automatically/configuration-options-for-dependency-updates#configuration-options-for-private-registries |
@jurre thanks for the quick reply. I added the following lines to the registries:
github-octocat:
type: git
url: https://github.com
username: x-access-token
password: ${{ secrets.DEPENDABOT_ACCESS_TOKEN }} I also created a GitHub Access Token from my profile and put it in my repo, under https://github.com/MYORGANIZATION/myrepo/settings/secrets/dependabot However, I still get the same error 🤔 I also tried to add the updates:
- package-ecosystem: "mix" # See documentation for possible values
directory: "/" # Location of package manifests
registries:
- github
schedule:
interval: "weekly" Without success. I still get the same error. |
Shouldn't these secrets be stored in the actions secrets not in the dependabot secrets? Is your action in response to a |
Those secrets are configured for both actions and dependabot. However, only PRs opened by dependabot fails the CI check due to dependabot not being able to fetch secrets. How can I know if an action is a response to |
The action would say |
This is because the |
Don't look acceptable to me, this workflow running is not free, developer time for running this workflow is not free. |
@Roriz see #3253 (comment). For The issue you have is clearly #3253, this issue appears to be related but not necessarily the same. |
As best I can tell, everything in here is already tracked or explained in the two following issues:
So closing as a duplicate. If for some reason I misunderstand, please comment and we can reopen. |
dependabot.yml content
What you expected to see, versus what you actually saw?
I expected that, once Dependabot's open up a PR for updating a package, Dependabot has access to GitHub Secrets.
Here's the problem however:
I'm using this action to fetch private repositories from GitHub that will then be used as private dependencies in my projects. In this action, each dependencies is fetched in order, based on a secret.
The problem is that, once Dependabot opens up a PR to update a dependency, the CI stops and returns the following error:
Which is false because I configured all the keys in my organisation's settings for Dependabot under https://github.com/organizations/MY-ORGANIZATION/settings/secrets/dependabot. I know that the keys are correct. I also explicitely gave Dependabot access to all of the private repositories that I which to be updated by Dependabot. Basically, I did what's mentioned in this blog post.
What did I tried to solve this issue?
@dependabot recreate
=> Didn't workCould it be that Dependabot has a problem with fetching secrets?
The text was updated successfully, but these errors were encountered: