- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for dockerConfig (0.18 sec)
-
hack/testdata/dockerconfig.json
zhouya0 <******@****.***> 1589166337 +0800
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri May 15 04:14:03 UTC 2020 - 311 bytes - Viewed (0) -
pkg/credentialprovider/config.go
type DockerConfigJSON struct { Auths DockerConfig `json:"auths"` // +optional HTTPHeaders map[string]string `json:"HttpHeaders,omitempty"` } // DockerConfig represents the config file used by the docker CLI. // This config that represents the credentials that should be used // when pulling images from specific image repositories. type DockerConfig map[string]DockerConfigEntry
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Apr 19 15:11:57 UTC 2023 - 9.3K bytes - Viewed (0) -
pkg/credentialprovider/provider.go
// with another DockerConfigProvider and caching the DockerConfig it provides // for a pre-specified lifetime. type CachingDockerConfigProvider struct { Provider DockerConfigProvider Lifetime time.Duration // ShouldCache is an optional function that returns true if the specific config should be cached. // If nil, all configs are treated as cacheable. ShouldCache func(DockerConfig) bool // cache fields
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 02 00:08:54 UTC 2021 - 3.3K bytes - Viewed (0) -
pkg/credentialprovider/secrets/secrets_test.go
}, }, }, authConfigs: []credentialprovider.AuthConfig{ { Username: "user", Password: "password", }, }, found: true, }, { name: "with .dockerconfig and auth field", image: "test.registry.io", defaultKeyring: &fakeKeyring{}, pullSecrets: []v1.Secret{ { Type: v1.SecretTypeDockercfg, Data: map[string][]byte{
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Sep 23 18:11:10 UTC 2020 - 7.3K bytes - Viewed (0) -
pkg/credentialprovider/secrets/secrets.go
// then a DockerKeyring is built based on every hit and unioned with the defaultKeyring. // If they do not, then the default keyring is returned func MakeDockerKeyring(passedSecrets []v1.Secret, defaultKeyring credentialprovider.DockerKeyring) (credentialprovider.DockerKeyring, error) { passedCredentials := []credentialprovider.DockerConfig{} for _, passedSecret := range passedSecrets {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 02 00:08:54 UTC 2021 - 2.3K bytes - Viewed (0) -
pkg/credentialprovider/provider_test.go
} // Enabled implements dockerConfigProvider func (d *testProvider) Enabled() bool { return true } // Provide implements dockerConfigProvider func (d *testProvider) Provide(image string) DockerConfig { d.Count++ return DockerConfig{} } func TestCachingProvider(t *testing.T) { provider := &testProvider{ Count: 0, } cache := &CachingDockerConfigProvider{ Provider: provider, Lifetime: 1 * time.Second,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 02 00:08:54 UTC 2021 - 1.8K bytes - Viewed (0) -
pkg/credentialprovider/keyring.go
// RegistryToken is a bearer token to be sent to a registry RegistryToken string `json:"registrytoken,omitempty"` } // Add add some docker config in basic docker keyring func (dk *BasicDockerKeyring) Add(cfg DockerConfig) { if dk.index == nil { dk.index = make([]string, 0) dk.creds = make(map[string][]AuthConfig) } for loc, ident := range cfg { creds := AuthConfig{ Username: ident.Username,
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jul 26 17:14:05 UTC 2022 - 9.2K bytes - Viewed (0)