@@ -39,10 +39,10 @@ type bindMount struct {
39
39
40
40
const defaultSocketPath string = "/var/run/docker.sock"
41
41
42
- type credentialSetOpt func (b * bundle.Bundle , creds map [ string ] string ) error
42
+ type credentialSetOpt func (b * bundle.Bundle , creds credentials. Set ) error
43
43
44
44
func addNamedCredentialSets (namedCredentialsets []string ) credentialSetOpt {
45
- return func (_ * bundle.Bundle , creds map [ string ] string ) error {
45
+ return func (_ * bundle.Bundle , creds credentials. Set ) error {
46
46
for _ , file := range namedCredentialsets {
47
47
if _ , err := os .Stat (file ); err != nil {
48
48
file = filepath .Join (duffleHome ().Credentials (), file + ".yaml" )
@@ -69,7 +69,7 @@ func addNamedCredentialSets(namedCredentialsets []string) credentialSetOpt {
69
69
func addDockerCredentials (contextName string , contextStore store.Store ) credentialSetOpt {
70
70
// docker desktop contexts require some rewriting for being used within a container
71
71
contextStore = dockerDesktopAwareStore {Store : contextStore }
72
- return func (_ * bundle.Bundle , creds map [ string ] string ) error {
72
+ return func (_ * bundle.Bundle , creds credentials. Set ) error {
73
73
if contextName != "" {
74
74
data , err := ioutil .ReadAll (store .Export (contextName , contextStore ))
75
75
if err != nil {
@@ -82,7 +82,7 @@ func addDockerCredentials(contextName string, contextStore store.Store) credenti
82
82
}
83
83
84
84
func addRegistryCredentials (shouldPopulate bool , dockerCli command.Cli ) credentialSetOpt {
85
- return func (b * bundle.Bundle , creds map [ string ] string ) error {
85
+ return func (b * bundle.Bundle , creds credentials. Set ) error {
86
86
if _ , ok := b .Credentials [internal .CredentialRegistryName ]; ! ok {
87
87
return nil
88
88
}
0 commit comments