@@ -25,9 +25,9 @@ import (
2525 "path/filepath"
2626 "strings"
2727
28+ "github.com/tektoncd/pipeline/pkg/credentials/common"
2829 credmatcher "github.com/tektoncd/pipeline/pkg/credentials/matcher"
2930 credwriter "github.com/tektoncd/pipeline/pkg/credentials/writer"
30- corev1 "k8s.io/api/core/v1"
3131)
3232
3333const annotationPrefix = "tekton.dev/docker-"
@@ -120,13 +120,13 @@ type entry struct {
120120func newEntry (secret string ) (* entry , error ) {
121121 secretPath := credmatcher .VolumeName (secret )
122122
123- ub , err := os .ReadFile (filepath .Join (secretPath , corev1 .BasicAuthUsernameKey ))
123+ ub , err := os .ReadFile (filepath .Join (secretPath , common .BasicAuthUsernameKey ))
124124 if err != nil {
125125 return nil , err
126126 }
127127 username := string (ub )
128128
129- pb , err := os .ReadFile (filepath .Join (secretPath , corev1 .BasicAuthPasswordKey ))
129+ pb , err := os .ReadFile (filepath .Join (secretPath , common .BasicAuthPasswordKey ))
130130 if err != nil {
131131 return nil , err
132132 }
@@ -154,20 +154,20 @@ func NewBuilder() interface {
154154// MatchingAnnotations extracts flags for the credential helper
155155// from the supplied secret and returns a slice (of length 0 or
156156// greater) of applicable domains.
157- func (* basicDockerBuilder ) MatchingAnnotations (secret * corev1 .Secret ) []string {
157+ func (* basicDockerBuilder ) MatchingAnnotations (secret credmatcher .Secret ) []string {
158158 var flags []string
159- switch secret . Type {
160- case corev1 .SecretTypeBasicAuth :
161- for _ , v := range credwriter .SortAnnotations (secret .Annotations , annotationPrefix ) {
162- flags = append (flags , fmt .Sprintf ("-basic-docker=%s=%s" , secret .Name , v ))
159+ switch credmatcher . GetSecretType ( secret ) {
160+ case common .SecretTypeBasicAuth :
161+ for _ , v := range credwriter .SortAnnotations (secret .GetAnnotations () , annotationPrefix ) {
162+ flags = append (flags , fmt .Sprintf ("-basic-docker=%s=%s" , secret .GetName () , v ))
163163 }
164- case corev1 .SecretTypeDockerConfigJson :
165- flags = append (flags , "-docker-config=" + secret .Name )
166- case corev1 .SecretTypeDockercfg :
167- flags = append (flags , "-docker-cfg=" + secret .Name )
164+ case common .SecretTypeDockerConfigJson :
165+ flags = append (flags , "-docker-config=" + secret .GetName () )
166+ case common .SecretTypeDockercfg :
167+ flags = append (flags , "-docker-cfg=" + secret .GetName () )
168168
169- case corev1 .SecretTypeOpaque , corev1 .SecretTypeServiceAccountToken , corev1 .SecretTypeSSHAuth , corev1 .SecretTypeTLS , corev1 .SecretTypeBootstrapToken :
170- return flags
169+ case common .SecretTypeOpaque , common .SecretTypeServiceAccountToken , common .SecretTypeSSHAuth , common .SecretTypeTLS , common .SecretTypeBootstrapToken :
170+ fallthrough
171171
172172 default :
173173 return flags
@@ -226,7 +226,7 @@ func (*basicDockerBuilder) Write(directory string) error {
226226func authsFromDockerCfg (secret string ) (map [string ]entry , error ) {
227227 secretPath := credmatcher .VolumeName (secret )
228228 m := make (map [string ]entry )
229- data , err := os .ReadFile (filepath .Join (secretPath , corev1 .DockerConfigKey ))
229+ data , err := os .ReadFile (filepath .Join (secretPath , common .DockerConfigKey ))
230230 if err != nil {
231231 return m , err
232232 }
@@ -238,7 +238,7 @@ func authsFromDockerConfig(secret string) (map[string]entry, error) {
238238 secretPath := credmatcher .VolumeName (secret )
239239 m := make (map [string ]entry )
240240 c := configFile {}
241- data , err := os .ReadFile (filepath .Join (secretPath , corev1 .DockerConfigJsonKey ))
241+ data , err := os .ReadFile (filepath .Join (secretPath , common .DockerConfigJsonKey ))
242242 if err != nil {
243243 return m , err
244244 }
0 commit comments