diff --git a/cmd/kanikoExecute_generated.go b/cmd/kanikoExecute_generated.go index cb74cf817..bcc11ac69 100644 --- a/cmd/kanikoExecute_generated.go +++ b/cmd/kanikoExecute_generated.go @@ -222,6 +222,12 @@ func kanikoExecuteMetadata() config.StepData { Name: "dockerConfigJsonCredentialsId", Type: "secret", }, + + { + Name: "", + Paths: []string{"$(vaultPath)/docker-config", "$(vaultBasePath)/$(vaultPipelineName)/docker-config", "$(vaultBasePath)/GROUP-SECRETS/docker-config"}, + Type: "vaultSecretFile", + }, }, Scope: []string{"PARAMETERS", "STAGES", "STEPS"}, Type: "string", diff --git a/cmd/kubernetesDeploy_generated.go b/cmd/kubernetesDeploy_generated.go index 1b837f649..0162476a4 100644 --- a/cmd/kubernetesDeploy_generated.go +++ b/cmd/kubernetesDeploy_generated.go @@ -301,6 +301,12 @@ func kubernetesDeployMetadata() config.StepData { Name: "kubeConfigFileCredentialsId", Type: "secret", }, + + { + Name: "", + Paths: []string{"$(vaultPath)/kube-config", "$(vaultBasePath)/$(vaultPipelineName)/kube-config", "$(vaultBasePath)/GROUP-SECRETS/kube-config"}, + Type: "vaultSecretFile", + }, }, Scope: []string{"GENERAL", "PARAMETERS", "STAGES", "STEPS"}, Type: "string", diff --git a/cmd/protecodeExecuteScan_generated.go b/cmd/protecodeExecuteScan_generated.go index e095cf3a5..fb949aeda 100644 --- a/cmd/protecodeExecuteScan_generated.go +++ b/cmd/protecodeExecuteScan_generated.go @@ -228,6 +228,12 @@ func protecodeExecuteScanMetadata() config.StepData { Name: "dockerConfigJsonCredentialsId", Type: "secret", }, + + { + Name: "", + Paths: []string{"$(vaultPath)/docker-config", "$(vaultBasePath)/$(vaultPipelineName)/docker-config", "$(vaultBasePath)/GROUP-SECRETS/docker-config"}, + Type: "vaultSecretFile", + }, }, Scope: []string{"PARAMETERS", "STAGES", "STEPS"}, Type: "string", diff --git a/resources/metadata/kaniko.yaml b/resources/metadata/kaniko.yaml index a3d49beb4..2b6d7a53a 100644 --- a/resources/metadata/kaniko.yaml +++ b/resources/metadata/kaniko.yaml @@ -97,6 +97,11 @@ spec: resourceRef: - name: dockerConfigJsonCredentialsId type: secret + - type: vaultSecretFile + paths: + - $(vaultPath)/docker-config + - $(vaultBasePath)/$(vaultPipelineName)/docker-config + - $(vaultBasePath)/GROUP-SECRETS/docker-config - name: dockerfilePath aliases: - name: dockerfile diff --git a/resources/metadata/kubernetesdeploy.yaml b/resources/metadata/kubernetesdeploy.yaml index d77fe9a3d..6854c5556 100644 --- a/resources/metadata/kubernetesdeploy.yaml +++ b/resources/metadata/kubernetesdeploy.yaml @@ -225,6 +225,11 @@ spec: resourceRef: - name: kubeConfigFileCredentialsId type: secret + - type: vaultSecretFile + paths: + - $(vaultPath)/kube-config + - $(vaultBasePath)/$(vaultPipelineName)/kube-config + - $(vaultBasePath)/GROUP-SECRETS/kube-config - name: kubeContext type: string description: Defines the context to use from the \"kubeconfig\" file. diff --git a/resources/metadata/protecode.yaml b/resources/metadata/protecode.yaml index 87e127c1b..727ad5eeb 100644 --- a/resources/metadata/protecode.yaml +++ b/resources/metadata/protecode.yaml @@ -74,6 +74,11 @@ spec: resourceRef: - name: dockerConfigJsonCredentialsId type: secret + - type: vaultSecretFile + paths: + - $(vaultPath)/docker-config + - $(vaultBasePath)/$(vaultPipelineName)/docker-config + - $(vaultBasePath)/GROUP-SECRETS/docker-config - name: cleanupMode type: string description: Decides which parts are removed from the Protecode backend after the scan