mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
make secret ls support filters in CLI
Signed-off-by: allencloud <allen.sun@daocloud.io>
This commit is contained in:
parent
08544b1912
commit
3935074016
6 changed files with 259 additions and 7 deletions
|
@ -7974,6 +7974,9 @@ paths:
|
||||||
description: |
|
description: |
|
||||||
A JSON encoded value of the filters (a `map[string][]string`) to process on the secrets list. Available filters:
|
A JSON encoded value of the filters (a `map[string][]string`) to process on the secrets list. Available filters:
|
||||||
|
|
||||||
|
- `id=<secret id>`
|
||||||
|
- `label=<key> or label=<key>=value`
|
||||||
|
- `name=<secret name>`
|
||||||
- `names=<secret name>`
|
- `names=<secret name>`
|
||||||
tags: ["Secret"]
|
tags: ["Secret"]
|
||||||
/secrets/create:
|
/secrets/create:
|
||||||
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
"github.com/docker/docker/cli"
|
"github.com/docker/docker/cli"
|
||||||
"github.com/docker/docker/cli/command"
|
"github.com/docker/docker/cli/command"
|
||||||
"github.com/docker/docker/cli/command/formatter"
|
"github.com/docker/docker/cli/command/formatter"
|
||||||
|
"github.com/docker/docker/opts"
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
"golang.org/x/net/context"
|
"golang.org/x/net/context"
|
||||||
)
|
)
|
||||||
|
@ -12,10 +13,11 @@ import (
|
||||||
type listOptions struct {
|
type listOptions struct {
|
||||||
quiet bool
|
quiet bool
|
||||||
format string
|
format string
|
||||||
|
filter opts.FilterOpt
|
||||||
}
|
}
|
||||||
|
|
||||||
func newSecretListCommand(dockerCli *command.DockerCli) *cobra.Command {
|
func newSecretListCommand(dockerCli *command.DockerCli) *cobra.Command {
|
||||||
opts := listOptions{}
|
opts := listOptions{filter: opts.NewFilterOpt()}
|
||||||
|
|
||||||
cmd := &cobra.Command{
|
cmd := &cobra.Command{
|
||||||
Use: "ls [OPTIONS]",
|
Use: "ls [OPTIONS]",
|
||||||
|
@ -30,6 +32,7 @@ func newSecretListCommand(dockerCli *command.DockerCli) *cobra.Command {
|
||||||
flags := cmd.Flags()
|
flags := cmd.Flags()
|
||||||
flags.BoolVarP(&opts.quiet, "quiet", "q", false, "Only display IDs")
|
flags.BoolVarP(&opts.quiet, "quiet", "q", false, "Only display IDs")
|
||||||
flags.StringVarP(&opts.format, "format", "", "", "Pretty-print secrets using a Go template")
|
flags.StringVarP(&opts.format, "format", "", "", "Pretty-print secrets using a Go template")
|
||||||
|
flags.VarP(&opts.filter, "filter", "f", "Filter output based on conditions provided")
|
||||||
|
|
||||||
return cmd
|
return cmd
|
||||||
}
|
}
|
||||||
|
@ -38,7 +41,7 @@ func runSecretList(dockerCli *command.DockerCli, opts listOptions) error {
|
||||||
client := dockerCli.Client()
|
client := dockerCli.Client()
|
||||||
ctx := context.Background()
|
ctx := context.Background()
|
||||||
|
|
||||||
secrets, err := client.SecretList(ctx, types.SecretListOptions{})
|
secrets, err := client.SecretList(ctx, types.SecretListOptions{Filters: opts.filter.Value()})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
|
@ -27,7 +27,7 @@ func ParseSecrets(client client.SecretAPIClient, requestedSecrets []*swarmtypes.
|
||||||
|
|
||||||
args := filters.NewArgs()
|
args := filters.NewArgs()
|
||||||
for _, s := range secretRefs {
|
for _, s := range secretRefs {
|
||||||
args.Add("names", s.SecretName)
|
args.Add("name", s.SecretName)
|
||||||
}
|
}
|
||||||
|
|
||||||
secrets, err := client.SecretList(ctx, types.SecretListOptions{
|
secrets, err := client.SecretList(ctx, types.SecretListOptions{
|
||||||
|
|
57
daemon/cluster/filters_test.go
Normal file
57
daemon/cluster/filters_test.go
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
package cluster
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/types/filters"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestNewListSecretsFilters(t *testing.T) {
|
||||||
|
validNameFilter := filters.NewArgs()
|
||||||
|
validNameFilter.Add("name", "test_name")
|
||||||
|
|
||||||
|
validIDFilter := filters.NewArgs()
|
||||||
|
validIDFilter.Add("id", "7c9009d6720f6de3b492f5")
|
||||||
|
|
||||||
|
validLabelFilter := filters.NewArgs()
|
||||||
|
validLabelFilter.Add("label", "type=test")
|
||||||
|
validLabelFilter.Add("label", "storage=ssd")
|
||||||
|
validLabelFilter.Add("label", "memory")
|
||||||
|
|
||||||
|
validNamesFilter := filters.NewArgs()
|
||||||
|
validNamesFilter.Add("names", "test_name")
|
||||||
|
|
||||||
|
validAllFilter := filters.NewArgs()
|
||||||
|
validAllFilter.Add("name", "nodeName")
|
||||||
|
validAllFilter.Add("id", "7c9009d6720f6de3b492f5")
|
||||||
|
validAllFilter.Add("label", "type=test")
|
||||||
|
validAllFilter.Add("label", "memory")
|
||||||
|
validAllFilter.Add("names", "test_name")
|
||||||
|
|
||||||
|
validFilters := []filters.Args{
|
||||||
|
validNameFilter,
|
||||||
|
validIDFilter,
|
||||||
|
validLabelFilter,
|
||||||
|
validNamesFilter,
|
||||||
|
validAllFilter,
|
||||||
|
}
|
||||||
|
|
||||||
|
invalidTypeFilter := filters.NewArgs()
|
||||||
|
invalidTypeFilter.Add("nonexist", "aaaa")
|
||||||
|
|
||||||
|
invalidFilters := []filters.Args{
|
||||||
|
invalidTypeFilter,
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, filter := range validFilters {
|
||||||
|
if _, err := newListSecretsFilters(filter); err != nil {
|
||||||
|
t.Fatalf("Should get no error, got %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, filter := range invalidFilters {
|
||||||
|
if _, err := newListSecretsFilters(filter); err == nil {
|
||||||
|
t.Fatalf("Should get an error for filter %s, while got nil", filter)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -24,8 +24,10 @@ Aliases:
|
||||||
ls, list
|
ls, list
|
||||||
|
|
||||||
Options:
|
Options:
|
||||||
|
-f, --filter filter Filter output based on conditions provided
|
||||||
|
--format string Pretty-print secrets using a Go template
|
||||||
|
--help Print usage
|
||||||
-q, --quiet Only display IDs
|
-q, --quiet Only display IDs
|
||||||
-format string Pretty-print secrets using a Go template
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Description
|
## Description
|
||||||
|
@ -38,7 +40,69 @@ Run this command on a manager node to list the secrets in the swarm.
|
||||||
$ docker secret ls
|
$ docker secret ls
|
||||||
|
|
||||||
ID NAME CREATED UPDATED
|
ID NAME CREATED UPDATED
|
||||||
eo7jnzguqgtpdah3cm5srfb97 my_secret 11 minutes ago 11 minutes ago
|
6697bflskwj1998km1gnnjr38 q5s5570vtvnimefos1fyeo2u2 6 weeks ago 6 weeks ago
|
||||||
|
9u9hk4br2ej0wgngkga6rp4hq my_secret 5 weeks ago 5 weeks ago
|
||||||
|
mem02h8n73mybpgqjf0kfi1n0 test_secret 3 seconds ago 3 seconds ago
|
||||||
|
```
|
||||||
|
|
||||||
|
### Filtering
|
||||||
|
|
||||||
|
The filtering flag (`-f` or `--filter`) format is a `key=value` pair. If there is more
|
||||||
|
than one filter, then pass multiple flags (e.g., `--filter "foo=bar" --filter "bif=baz"`)
|
||||||
|
|
||||||
|
The currently supported filters are:
|
||||||
|
|
||||||
|
* [id](secret_ls.md#id) (secret's ID)
|
||||||
|
* [label](secret_ls.md#label) (`label=<key>` or `label=<key>=<value>`)
|
||||||
|
* [name](secret_ls.md#name) (secret's name)
|
||||||
|
|
||||||
|
#### id
|
||||||
|
|
||||||
|
The `id` filter matches all or prefix of a secret's id.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ docker secret ls -f "id=6697bflskwj1998km1gnnjr38"
|
||||||
|
|
||||||
|
ID NAME CREATED UPDATED
|
||||||
|
6697bflskwj1998km1gnnjr38 q5s5570vtvnimefos1fyeo2u2 6 weeks ago 6 weeks ago
|
||||||
|
```
|
||||||
|
|
||||||
|
#### label
|
||||||
|
|
||||||
|
The `label` filter matches secrets based on the presence of a `label` alone or
|
||||||
|
a `label` and a value.
|
||||||
|
|
||||||
|
The following filter matches all secrets with a `project` label regardless of
|
||||||
|
its value:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ docker secret ls --filter label=project
|
||||||
|
|
||||||
|
ID NAME CREATED UPDATED
|
||||||
|
mem02h8n73mybpgqjf0kfi1n0 test_secret About an hour ago About an hour ago
|
||||||
|
```
|
||||||
|
|
||||||
|
The following filter matches only services with the `project` label with the
|
||||||
|
`project-a` value.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ docker service ls --filter label=project=test
|
||||||
|
|
||||||
|
ID NAME CREATED UPDATED
|
||||||
|
mem02h8n73mybpgqjf0kfi1n0 test_secret About an hour ago About an hour ago
|
||||||
|
```
|
||||||
|
|
||||||
|
#### name
|
||||||
|
|
||||||
|
The `name` filter matches on all or prefix of a secret's name.
|
||||||
|
|
||||||
|
The following filter matches secret with a name containing a prefix of `test`.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ docker secret ls --filter name=test_secret
|
||||||
|
|
||||||
|
ID NAME CREATED UPDATED
|
||||||
|
mem02h8n73mybpgqjf0kfi1n0 test_secret About an hour ago About an hour ago
|
||||||
```
|
```
|
||||||
|
|
||||||
### Format the output
|
### Format the output
|
||||||
|
|
125
integration-cli/docker_cli_secret_ls_test.go
Normal file
125
integration-cli/docker_cli_secret_ls_test.go
Normal file
|
@ -0,0 +1,125 @@
|
||||||
|
// +build !windows
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/types/swarm"
|
||||||
|
"github.com/docker/docker/integration-cli/checker"
|
||||||
|
"github.com/go-check/check"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (s *DockerSwarmSuite) TestSecretList(c *check.C) {
|
||||||
|
d := s.AddDaemon(c, true, true)
|
||||||
|
|
||||||
|
testName0 := "test0"
|
||||||
|
testName1 := "test1"
|
||||||
|
|
||||||
|
// create secret test0
|
||||||
|
id0 := d.CreateSecret(c, swarm.SecretSpec{
|
||||||
|
Annotations: swarm.Annotations{
|
||||||
|
Name: testName0,
|
||||||
|
Labels: map[string]string{"type": "test"},
|
||||||
|
},
|
||||||
|
Data: []byte("TESTINGDATA0"),
|
||||||
|
})
|
||||||
|
c.Assert(id0, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id0))
|
||||||
|
|
||||||
|
secret := d.GetSecret(c, id0)
|
||||||
|
c.Assert(secret.Spec.Name, checker.Equals, testName0)
|
||||||
|
|
||||||
|
// create secret test1
|
||||||
|
id1 := d.CreateSecret(c, swarm.SecretSpec{
|
||||||
|
Annotations: swarm.Annotations{
|
||||||
|
Name: testName1,
|
||||||
|
Labels: map[string]string{"type": "production"},
|
||||||
|
},
|
||||||
|
Data: []byte("TESTINGDATA1"),
|
||||||
|
})
|
||||||
|
c.Assert(id1, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id1))
|
||||||
|
|
||||||
|
secret = d.GetSecret(c, id1)
|
||||||
|
c.Assert(secret.Spec.Name, checker.Equals, testName1)
|
||||||
|
|
||||||
|
// test by command `docker secret ls`
|
||||||
|
out, err := d.Cmd("secret", "ls")
|
||||||
|
c.Assert(err, checker.IsNil, check.Commentf(out))
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName0)
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName1)
|
||||||
|
|
||||||
|
// test filter by name `docker secret ls --filter name=xxx`
|
||||||
|
args := []string{
|
||||||
|
"secret",
|
||||||
|
"ls",
|
||||||
|
"--filter",
|
||||||
|
"name=test0",
|
||||||
|
}
|
||||||
|
out, err = d.Cmd(args...)
|
||||||
|
c.Assert(err, checker.IsNil, check.Commentf(out))
|
||||||
|
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName0)
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Not(checker.Contains), testName1)
|
||||||
|
|
||||||
|
// test filter by id `docker secret ls --filter id=xxx`
|
||||||
|
args = []string{
|
||||||
|
"secret",
|
||||||
|
"ls",
|
||||||
|
"--filter",
|
||||||
|
"id=" + id1,
|
||||||
|
}
|
||||||
|
out, err = d.Cmd(args...)
|
||||||
|
c.Assert(err, checker.IsNil, check.Commentf(out))
|
||||||
|
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Not(checker.Contains), testName0)
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName1)
|
||||||
|
|
||||||
|
// test filter by label `docker secret ls --filter label=xxx`
|
||||||
|
args = []string{
|
||||||
|
"secret",
|
||||||
|
"ls",
|
||||||
|
"--filter",
|
||||||
|
"label=type",
|
||||||
|
}
|
||||||
|
out, err = d.Cmd(args...)
|
||||||
|
c.Assert(err, checker.IsNil, check.Commentf(out))
|
||||||
|
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName0)
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName1)
|
||||||
|
|
||||||
|
args = []string{
|
||||||
|
"secret",
|
||||||
|
"ls",
|
||||||
|
"--filter",
|
||||||
|
"label=type=test",
|
||||||
|
}
|
||||||
|
out, err = d.Cmd(args...)
|
||||||
|
c.Assert(err, checker.IsNil, check.Commentf(out))
|
||||||
|
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName0)
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Not(checker.Contains), testName1)
|
||||||
|
|
||||||
|
args = []string{
|
||||||
|
"secret",
|
||||||
|
"ls",
|
||||||
|
"--filter",
|
||||||
|
"label=type=production",
|
||||||
|
}
|
||||||
|
out, err = d.Cmd(args...)
|
||||||
|
c.Assert(err, checker.IsNil, check.Commentf(out))
|
||||||
|
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Not(checker.Contains), testName0)
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, testName1)
|
||||||
|
|
||||||
|
// test invalid filter `docker secret ls --filter noexisttype=xxx`
|
||||||
|
args = []string{
|
||||||
|
"secret",
|
||||||
|
"ls",
|
||||||
|
"--filter",
|
||||||
|
"noexisttype=test0",
|
||||||
|
}
|
||||||
|
out, err = d.Cmd(args...)
|
||||||
|
c.Assert(err, checker.NotNil, check.Commentf(out))
|
||||||
|
|
||||||
|
c.Assert(strings.TrimSpace(out), checker.Contains, "Error response from daemon: Invalid filter 'noexisttype'")
|
||||||
|
}
|
Loading…
Reference in a new issue