mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
c6f0b7f448
This fix tries to address the issue raised in 28581 and 28927 where it is not possible to create a secret from a file (only through STDIN). This fix add a flag `--file` to `docker secret create` so that it is possible to create a secret from a file with: ``` docker secret create --file secret.in secret.name ``` or ``` echo TEST | docker secret create --file - secret.name ``` Related docs has been updated. An integration test has been added to cover the changes. This fix fixes 28581. This fix is related to 28927. Signed-off-by: Yong Tang <yong.tang.github@outlook.com>
140 lines
4 KiB
Go
140 lines
4 KiB
Go
// +build !windows
|
|
|
|
package main
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"strings"
|
|
|
|
"github.com/docker/docker/api/types/swarm"
|
|
"github.com/docker/docker/pkg/integration/checker"
|
|
"github.com/go-check/check"
|
|
)
|
|
|
|
func (s *DockerSwarmSuite) TestSecretCreate(c *check.C) {
|
|
d := s.AddDaemon(c, true, true)
|
|
|
|
testName := "test_secret"
|
|
id := d.CreateSecret(c, swarm.SecretSpec{
|
|
swarm.Annotations{
|
|
Name: testName,
|
|
},
|
|
[]byte("TESTINGDATA"),
|
|
})
|
|
c.Assert(id, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id))
|
|
|
|
secret := d.GetSecret(c, id)
|
|
c.Assert(secret.Spec.Name, checker.Equals, testName)
|
|
}
|
|
|
|
func (s *DockerSwarmSuite) TestSecretCreateWithLabels(c *check.C) {
|
|
d := s.AddDaemon(c, true, true)
|
|
|
|
testName := "test_secret"
|
|
id := d.CreateSecret(c, swarm.SecretSpec{
|
|
swarm.Annotations{
|
|
Name: testName,
|
|
Labels: map[string]string{
|
|
"key1": "value1",
|
|
"key2": "value2",
|
|
},
|
|
},
|
|
[]byte("TESTINGDATA"),
|
|
})
|
|
c.Assert(id, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id))
|
|
|
|
secret := d.GetSecret(c, id)
|
|
c.Assert(secret.Spec.Name, checker.Equals, testName)
|
|
c.Assert(len(secret.Spec.Labels), checker.Equals, 2)
|
|
c.Assert(secret.Spec.Labels["key1"], checker.Equals, "value1")
|
|
c.Assert(secret.Spec.Labels["key2"], checker.Equals, "value2")
|
|
}
|
|
|
|
// Test case for 28884
|
|
func (s *DockerSwarmSuite) TestSecretCreateResolve(c *check.C) {
|
|
d := s.AddDaemon(c, true, true)
|
|
|
|
name := "foo"
|
|
id := d.CreateSecret(c, swarm.SecretSpec{
|
|
swarm.Annotations{
|
|
Name: name,
|
|
},
|
|
[]byte("foo"),
|
|
})
|
|
c.Assert(id, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id))
|
|
|
|
fake := d.CreateSecret(c, swarm.SecretSpec{
|
|
swarm.Annotations{
|
|
Name: id,
|
|
},
|
|
[]byte("fake foo"),
|
|
})
|
|
c.Assert(fake, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", fake))
|
|
|
|
out, err := d.Cmd("secret", "ls")
|
|
c.Assert(err, checker.IsNil)
|
|
c.Assert(out, checker.Contains, name)
|
|
c.Assert(out, checker.Contains, fake)
|
|
|
|
out, err = d.Cmd("secret", "rm", id)
|
|
c.Assert(out, checker.Contains, id)
|
|
|
|
// Fake one will remain
|
|
out, err = d.Cmd("secret", "ls")
|
|
c.Assert(err, checker.IsNil)
|
|
c.Assert(out, checker.Not(checker.Contains), name)
|
|
c.Assert(out, checker.Contains, fake)
|
|
|
|
// Remove based on name prefix of the fake one
|
|
// (which is the same as the ID of foo one) should not work
|
|
// as search is only done based on:
|
|
// - Full ID
|
|
// - Full Name
|
|
// - Partial ID (prefix)
|
|
out, err = d.Cmd("secret", "rm", id[:5])
|
|
c.Assert(out, checker.Not(checker.Contains), id)
|
|
out, err = d.Cmd("secret", "ls")
|
|
c.Assert(err, checker.IsNil)
|
|
c.Assert(out, checker.Not(checker.Contains), name)
|
|
c.Assert(out, checker.Contains, fake)
|
|
|
|
// Remove based on ID prefix of the fake one should succeed
|
|
out, err = d.Cmd("secret", "rm", fake[:5])
|
|
c.Assert(out, checker.Contains, fake)
|
|
out, err = d.Cmd("secret", "ls")
|
|
c.Assert(err, checker.IsNil)
|
|
c.Assert(out, checker.Not(checker.Contains), name)
|
|
c.Assert(out, checker.Not(checker.Contains), id)
|
|
c.Assert(out, checker.Not(checker.Contains), fake)
|
|
}
|
|
|
|
func (s *DockerSwarmSuite) TestSecretCreateWithFile(c *check.C) {
|
|
d := s.AddDaemon(c, true, true)
|
|
|
|
testFile, err := ioutil.TempFile("", "secretCreateTest")
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to create temporary file"))
|
|
defer os.Remove(testFile.Name())
|
|
|
|
testData := "TESTINGDATA"
|
|
_, err = testFile.Write([]byte(testData))
|
|
c.Assert(err, checker.IsNil, check.Commentf("failed to write to temporary file"))
|
|
|
|
testName := "test_secret"
|
|
out, err := d.Cmd("secret", "create", "--file", testFile.Name(), testName)
|
|
c.Assert(err, checker.IsNil)
|
|
c.Assert(strings.TrimSpace(out), checker.Not(checker.Equals), "", check.Commentf(out))
|
|
|
|
id := strings.TrimSpace(out)
|
|
secret := d.GetSecret(c, id)
|
|
c.Assert(secret.Spec.Name, checker.Equals, testName)
|
|
|
|
testName = "test_secret_2"
|
|
out, err = d.Cmd("secret", "create", testName, "-f", testFile.Name())
|
|
c.Assert(err, checker.IsNil)
|
|
c.Assert(strings.TrimSpace(out), checker.Not(checker.Equals), "", check.Commentf(out))
|
|
|
|
id = strings.TrimSpace(out)
|
|
secret = d.GetSecret(c, id)
|
|
c.Assert(secret.Spec.Name, checker.Equals, testName)
|
|
}
|