-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Secrets #9125
Implement Secrets #9125
Conversation
This needs a new common, or it'll fail all tests. Also, needs some lint-y fixes. |
Need to update commands-demo.md and https://github.com/containers/podman/blob/master/docs/source/Commands.rst, maybe another spot or two to get the man pages to show on docs.podman.io. |
We've already branched 3.0, so we're already safe to merge this, FYI |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Some comments regarding the shell completion logic.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Really good work, @ashley-cui!
This is a huge PR and in really good shape. Once we have this merged, we can create a follow up card and work together with @edsantiago to create system tests in test/system
. Those are executed in the RHEL gating tests and important on the enterprise side.
70117ef
to
4a086f8
Compare
I pushed a common with the journald change reverted. |
4a086f8
to
acc768c
Compare
Vendoring in the new common vendored in a lot of weird other stuff.. Let me know if that's okay |
Well I opened a vendoring for common, and it pulls in some vendors that common got on runc and friends, so this is not surprising. Once my PR gets merged, you should easily just update to it. |
acc768c
to
ecbbea5
Compare
48134f2
to
7534f2b
Compare
The You can test it locally with |
Implement podman secret create, inspect, ls, rm Implement podman run/create --secret Secrets are blobs of data that are sensitive. Currently, the only secret driver supported is filedriver, which means creating a secret stores it in base64 unencrypted in a file. After creating a secret, a user can use the --secret flag to expose the secret inside the container at /run/secrets/[secretname] This secret will not be commited to an image on a podman commit Signed-off-by: Ashley Cui <[email protected]>
7534f2b
to
832a69b
Compare
SHE'S GREEN!!!!! @containers/podman-maintainers PTAL |
LGTM |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED Approval requirements bypassed by manually added approval. This pull-request has been approved by: ashley-cui The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Great job completing this one @ashley-cui! 🎆 🥇 |
Thanks @TomSweeneyRedHat !! |
Implement podman secret create, inspect, ls, rm
Implement podman run/create --secret
Secrets are blobs of data that are sensitive.
Currently, the only secret driver supported is filedriver, which means creating a secret stores it in base64 unencrypted in a file.
After creating a secret, a user can use the --secret flag to expose the secret inside the container at /run/secrets/[secretname]
This secret will not be commited to an image on a podman commit
Signed-off-by: Ashley Cui [email protected]