mirror of
https://github.com/containers/podman.git
synced 2025-05-21 00:56:36 +08:00

Users may want to replace the secret used within containers, without destroying the secret and recreating it. Partial fix for https://github.com/containers/podman/issues/18667 Make sure podman --remote secret inspect and podman secret inspect return the same error message. Signed-off-by: Daniel J Walsh <dwalsh@redhat.com>
67 lines
1.9 KiB
Go
67 lines
1.9 KiB
Go
package libpod
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http"
|
|
|
|
"github.com/containers/common/pkg/secrets"
|
|
"github.com/containers/podman/v4/libpod"
|
|
"github.com/containers/podman/v4/pkg/api/handlers/utils"
|
|
api "github.com/containers/podman/v4/pkg/api/types"
|
|
"github.com/containers/podman/v4/pkg/domain/entities"
|
|
"github.com/containers/podman/v4/pkg/domain/infra/abi"
|
|
"github.com/gorilla/schema"
|
|
)
|
|
|
|
func CreateSecret(w http.ResponseWriter, r *http.Request) {
|
|
var (
|
|
runtime = r.Context().Value(api.RuntimeKey).(*libpod.Runtime)
|
|
decoder = r.Context().Value(api.DecoderKey).(*schema.Decoder)
|
|
)
|
|
|
|
query := struct {
|
|
Name string `schema:"name"`
|
|
Driver string `schema:"driver"`
|
|
DriverOpts map[string]string `schema:"driveropts"`
|
|
Labels map[string]string `schema:"labels"`
|
|
Replace bool `schema:"replace"`
|
|
}{
|
|
// override any golang type defaults
|
|
}
|
|
opts := entities.SecretCreateOptions{}
|
|
if err := decoder.Decode(&query, r.URL.Query()); err != nil {
|
|
utils.Error(w, http.StatusBadRequest, fmt.Errorf("failed to parse parameters for %s: %w", r.URL.String(), err))
|
|
return
|
|
}
|
|
|
|
opts.Driver = query.Driver
|
|
opts.DriverOpts = query.DriverOpts
|
|
opts.Labels = query.Labels
|
|
opts.Replace = query.Replace
|
|
|
|
ic := abi.ContainerEngine{Libpod: runtime}
|
|
report, err := ic.SecretCreate(r.Context(), query.Name, r.Body, opts)
|
|
if err != nil {
|
|
utils.InternalServerError(w, err)
|
|
return
|
|
}
|
|
utils.WriteResponse(w, http.StatusOK, report)
|
|
}
|
|
|
|
func SecretExists(w http.ResponseWriter, r *http.Request) {
|
|
runtime := r.Context().Value(api.RuntimeKey).(*libpod.Runtime)
|
|
name := utils.GetName(r)
|
|
ic := abi.ContainerEngine{Libpod: runtime}
|
|
|
|
report, err := ic.SecretExists(r.Context(), name)
|
|
if err != nil {
|
|
utils.InternalServerError(w, err)
|
|
return
|
|
}
|
|
if !report.Value {
|
|
utils.SecretNotFound(w, name, secrets.ErrNoSuchSecret)
|
|
return
|
|
}
|
|
utils.WriteResponse(w, http.StatusNoContent, "")
|
|
}
|