@@ -25,9 +25,9 @@ import (
25
25
"path/filepath"
26
26
"strings"
27
27
28
+ "github.com/tektoncd/pipeline/pkg/credentials/common"
28
29
credmatcher "github.com/tektoncd/pipeline/pkg/credentials/matcher"
29
30
credwriter "github.com/tektoncd/pipeline/pkg/credentials/writer"
30
- corev1 "k8s.io/api/core/v1"
31
31
)
32
32
33
33
const annotationPrefix = "tekton.dev/docker-"
@@ -120,13 +120,13 @@ type entry struct {
120
120
func newEntry (secret string ) (* entry , error ) {
121
121
secretPath := credmatcher .VolumeName (secret )
122
122
123
- ub , err := os .ReadFile (filepath .Join (secretPath , corev1 .BasicAuthUsernameKey ))
123
+ ub , err := os .ReadFile (filepath .Join (secretPath , common .BasicAuthUsernameKey ))
124
124
if err != nil {
125
125
return nil , err
126
126
}
127
127
username := string (ub )
128
128
129
- pb , err := os .ReadFile (filepath .Join (secretPath , corev1 .BasicAuthPasswordKey ))
129
+ pb , err := os .ReadFile (filepath .Join (secretPath , common .BasicAuthPasswordKey ))
130
130
if err != nil {
131
131
return nil , err
132
132
}
@@ -154,20 +154,20 @@ func NewBuilder() interface {
154
154
// MatchingAnnotations extracts flags for the credential helper
155
155
// from the supplied secret and returns a slice (of length 0 or
156
156
// greater) of applicable domains.
157
- func (* basicDockerBuilder ) MatchingAnnotations (secret * corev1 .Secret ) []string {
157
+ func (* basicDockerBuilder ) MatchingAnnotations (secret credmatcher .Secret ) []string {
158
158
var flags []string
159
- switch secret . Type {
160
- case corev1 .SecretTypeBasicAuth :
161
- for _ , v := range credwriter .SortAnnotations (secret .Annotations , annotationPrefix ) {
162
- flags = append (flags , fmt .Sprintf ("-basic-docker=%s=%s" , secret .Name , v ))
159
+ switch credmatcher . GetSecretType ( secret ) {
160
+ case common .SecretTypeBasicAuth :
161
+ for _ , v := range credwriter .SortAnnotations (secret .GetAnnotations () , annotationPrefix ) {
162
+ flags = append (flags , fmt .Sprintf ("-basic-docker=%s=%s" , secret .GetName () , v ))
163
163
}
164
- case corev1 .SecretTypeDockerConfigJson :
165
- flags = append (flags , "-docker-config=" + secret .Name )
166
- case corev1 .SecretTypeDockercfg :
167
- flags = append (flags , "-docker-cfg=" + secret .Name )
164
+ case common .SecretTypeDockerConfigJson :
165
+ flags = append (flags , "-docker-config=" + secret .GetName () )
166
+ case common .SecretTypeDockercfg :
167
+ flags = append (flags , "-docker-cfg=" + secret .GetName () )
168
168
169
- case corev1 .SecretTypeOpaque , corev1 .SecretTypeServiceAccountToken , corev1 .SecretTypeSSHAuth , corev1 .SecretTypeTLS , corev1 .SecretTypeBootstrapToken :
170
- return flags
169
+ case common .SecretTypeOpaque , common .SecretTypeServiceAccountToken , common .SecretTypeSSHAuth , common .SecretTypeTLS , common .SecretTypeBootstrapToken :
170
+ fallthrough
171
171
172
172
default :
173
173
return flags
@@ -226,7 +226,7 @@ func (*basicDockerBuilder) Write(directory string) error {
226
226
func authsFromDockerCfg (secret string ) (map [string ]entry , error ) {
227
227
secretPath := credmatcher .VolumeName (secret )
228
228
m := make (map [string ]entry )
229
- data , err := os .ReadFile (filepath .Join (secretPath , corev1 .DockerConfigKey ))
229
+ data , err := os .ReadFile (filepath .Join (secretPath , common .DockerConfigKey ))
230
230
if err != nil {
231
231
return m , err
232
232
}
@@ -238,7 +238,7 @@ func authsFromDockerConfig(secret string) (map[string]entry, error) {
238
238
secretPath := credmatcher .VolumeName (secret )
239
239
m := make (map [string ]entry )
240
240
c := configFile {}
241
- data , err := os .ReadFile (filepath .Join (secretPath , corev1 .DockerConfigJsonKey ))
241
+ data , err := os .ReadFile (filepath .Join (secretPath , common .DockerConfigJsonKey ))
242
242
if err != nil {
243
243
return m , err
244
244
}
0 commit comments