kubernetes/pkg/credentialprovider
Nikolaos Moraitis b907f9e118 avoid potential secret leaking while reading .dockercfg
There are a lot of scenarios where an invalid .dockercfg file
will still contain secrets. This commit removes logging of the
contents to avoid any potential leaking and manages the actual error
by printing to the user the actual location of the invalid file.

Signed-off-by: Nikolaos Moraitis <nmoraiti@redhat.com>
2020-09-14 15:39:05 +02:00
..
aws remove david-mcmahon from reviewers 2020-06-30 14:06:58 -07:00
azure Add providerless tags 2020-07-30 13:48:40 -04:00
gcp remove david-mcmahon from reviewers 2020-06-30 14:06:58 -07:00
secrets Fix golint failures in pkg/credentialprovider (#88860) 2020-03-18 20:10:43 -07:00
BUILD Run hack/update-vendor.sh 2020-05-16 07:54:33 -04:00
config_test.go avoid potential secret leaking while reading .dockercfg 2020-09-14 15:39:05 +02:00
config.go avoid potential secret leaking while reading .dockercfg 2020-09-14 15:39:05 +02:00
doc.go Use Go canonical import paths 2016-07-16 13:48:21 -04:00
keyring_test.go Fix golint failures in pkg/credentialprovider (#88860) 2020-03-18 20:10:43 -07:00
keyring.go switch over k/k to use klog v2 2020-05-16 07:54:27 -04:00
OWNERS remove david-mcmahon from reviewers 2020-06-30 14:06:58 -07:00
plugins.go switch over k/k to use klog v2 2020-05-16 07:54:27 -04:00
provider_test.go Credential provider Provide takes image (general) 2019-03-27 01:00:26 +00:00
provider.go fix: don't use docker config cache if it's empty 2020-06-22 15:10:47 +00:00