mirror of
https://github.com/containers/podman.git
synced 2025-10-27 03:06:22 +08:00
Implement podman secret create, inspect, ls, rm Implement podman run/create --secret Secrets are blobs of data that are sensitive. Currently, the only secret driver supported is filedriver, which means creating a secret stores it in base64 unencrypted in a file. After creating a secret, a user can use the --secret flag to expose the secret inside the container at /run/secrets/[secretname] This secret will not be commited to an image on a podman commit Signed-off-by: Ashley Cui <acui@redhat.com>
39 lines
803 B
Markdown
39 lines
803 B
Markdown
% podman-secret-inspect(1)
|
|
|
|
## NAME
|
|
podman\-secret\-inspect - Display detailed information on one or more secrets
|
|
|
|
## SYNOPSIS
|
|
**podman secret inspect** [*options*] *secret* [...]
|
|
|
|
## DESCRIPTION
|
|
|
|
Inspects the specified secret.
|
|
|
|
By default, this renders all results in a JSON array. If a format is specified, the given template will be executed for each result.
|
|
Secrets can be queried individually by providing their full name or a unique partial name.
|
|
|
|
## OPTIONS
|
|
|
|
#### **--format**=*format*
|
|
|
|
Format secret output using Go template.
|
|
|
|
#### **--help**
|
|
|
|
Print usage statement.
|
|
|
|
|
|
## EXAMPLES
|
|
|
|
```
|
|
$ podman secret inspect mysecret
|
|
$ podman secret inspect --format "{{.Name} {{.Scope}}" mysecret
|
|
```
|
|
|
|
## SEE ALSO
|
|
podman-secret(1)
|
|
|
|
## HISTORY
|
|
January 2021, Originally compiled by Ashley Cui <acui@redhat.com>
|