Skip to content

Commit

Permalink
log external secret error
Browse files Browse the repository at this point in the history
  • Loading branch information
bradrydzewski committed Jun 23, 2019
1 parent 6a43a8d commit 7e23d36
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 2 deletions.
3 changes: 3 additions & 0 deletions operator/manager/teardown.go
Expand Up @@ -138,6 +138,9 @@ func (t *teardown) do(ctx context.Context, stage *core.Stage) error {
break
}
}
if build.Started == 0 {
build.Started = build.Finished
}

err = t.Builds.Update(noContext, build)
if err == db.ErrOptimisticLock {
Expand Down
4 changes: 2 additions & 2 deletions plugin/secret/external.go
Expand Up @@ -68,7 +68,7 @@ func (c *externalController) Find(ctx context.Context, in *core.SecretArgs) (*co
client := secret.Client(c.endpoint, c.secret, c.skipVerify)
res, err := client.Find(ctx, req)
if err != nil {
logger.Trace("secret: external: cannot get secret")
logger.WithError(err).Trace("secret: external: cannot get secret")
return nil, err
}

Expand All @@ -85,7 +85,7 @@ func (c *externalController) Find(ctx context.Context, in *core.SecretArgs) (*co
// empty results.
if (res.Pull == false && res.PullRequest == false) &&
in.Build.Event == core.EventPullRequest {
logger.Trace("secret: external: restricted from forks")
logger.Trace("secret: external: restricted from forks")
return nil, nil
}

Expand Down

0 comments on commit 7e23d36

Please sign in to comment.