You've already forked sap-jenkins-library
							
							
				mirror of
				https://github.com/SAP/jenkins-library.git
				synced 2025-10-30 23:57:50 +02:00 
			
		
		
		
	Fix broken link (#2550)
* Fix broken link * Add config info into documentation * Add line * Add lines * Link documentation to protocodeExecuteScan * Remove space * Change wording Co-authored-by: Linda Siebert <linda.siebert@sap.com> Co-authored-by: Linda Siebert <39100394+LindaSieb@users.noreply.github.com>
This commit is contained in:
		
				
					committed by
					
						 GitHub
						GitHub
					
				
			
			
				
	
			
			
			
						parent
						
							8c5986bbfa
						
					
				
				
					commit
					0d0689e18b
				
			| @@ -161,7 +161,7 @@ func kanikoExecuteMetadata() config.StepData { | ||||
| 		Spec: config.StepSpec{ | ||||
| 			Inputs: config.StepInputs{ | ||||
| 				Secrets: []config.StepSecrets{ | ||||
| 					{Name: "dockerConfigJsonCredentialsId", Description: "Jenkins 'Secret file' credentials ID containing Docker config.json (with registry credential(s)). You can create it like explained in the Docker Success Center in the article about [how to generate a new auth in the config.json file](https://success.docker.com/article/generate-new-auth-in-config-json-file).", Type: "jenkins"}, | ||||
| 					{Name: "dockerConfigJsonCredentialsId", Description: "Jenkins 'Secret file' credentials ID containing Docker config.json (with registry credential(s)). You can create it like explained in the [protocodeExecuteScan Prerequisites section](https://www.project-piper.io/steps/protecodeExecuteScan/#prerequisites).", Type: "jenkins"}, | ||||
| 				}, | ||||
| 				Parameters: []config.StepParameters{ | ||||
| 					{ | ||||
|   | ||||
| @@ -7,7 +7,7 @@ | ||||
| When pushing to a container registry, you need to maintain the respective credentials in your Jenkins credentials store: | ||||
|  | ||||
| Kaniko expects a Docker `config.json` file containing the credential information for registries. | ||||
| You can create it like explained in the Docker Success Center in the article about [How to generate a new auth in the config.json file](https://success.docker.com/article/generate-new-auth-in-config-json-file). | ||||
| You can create it like explained in the [protocodeExecuteScan Prerequisites section](https://www.project-piper.io/steps/protecodeExecuteScan/#prerequisites). | ||||
|  | ||||
| Please copy this file and upload it to your Jenkins for example<br /> | ||||
| via _Jenkins_ -> _Credentials_ -> _System_ -> _Global credentials (unrestricted)_ -> _Add Credentials_ -> | ||||
|   | ||||
| @@ -6,7 +6,7 @@ spec: | ||||
|   inputs: | ||||
|     secrets: | ||||
|       - name: dockerConfigJsonCredentialsId | ||||
|         description: Jenkins 'Secret file' credentials ID containing Docker config.json (with registry credential(s)). You can create it like explained in the Docker Success Center in the article about [how to generate a new auth in the config.json file](https://success.docker.com/article/generate-new-auth-in-config-json-file). | ||||
|         description: Jenkins 'Secret file' credentials ID containing Docker config.json (with registry credential(s)). You can create it like explained in the [protocodeExecuteScan Prerequisites section](https://www.project-piper.io/steps/protecodeExecuteScan/#prerequisites). | ||||
|         type: jenkins | ||||
|     params: | ||||
|       - name: buildOptions | ||||
|   | ||||
		Reference in New Issue
	
	Block a user