mirror of
https://github.com/containers/podman.git
synced 2025-08-06 11:32:07 +08:00
Implement Secrets
Implement podman secret create, inspect, ls, rm Implement podman run/create --secret Secrets are blobs of data that are sensitive. Currently, the only secret driver supported is filedriver, which means creating a secret stores it in base64 unencrypted in a file. After creating a secret, a user can use the --secret flag to expose the secret inside the container at /run/secrets/[secretname] This secret will not be commited to an image on a podman commit Signed-off-by: Ashley Cui <acui@redhat.com>
This commit is contained in:
@ -340,6 +340,13 @@ func (c *Container) generateInspectContainerConfig(spec *spec.Spec) *define.Insp
|
||||
|
||||
ctrConfig.Timezone = c.config.Timezone
|
||||
|
||||
for _, secret := range c.config.Secrets {
|
||||
newSec := define.InspectSecret{}
|
||||
newSec.Name = secret.Name
|
||||
newSec.ID = secret.ID
|
||||
ctrConfig.Secrets = append(ctrConfig.Secrets, &newSec)
|
||||
}
|
||||
|
||||
// Pad Umask to 4 characters
|
||||
if len(c.config.Umask) < 4 {
|
||||
pad := strings.Repeat("0", 4-len(c.config.Umask))
|
||||
|
Reference in New Issue
Block a user