mirror of https://github.com/containers/podman.git
document available secret drivers
[NO NEW TESTS NEEDED] Signed-off-by: Christian Hörtnagl <christian.hoertnagl@univie.ac.at>
This commit is contained in:
parent
7836401c8f
commit
896cab6120
|
@ -20,7 +20,7 @@ var (
|
||||||
createCmd = &cobra.Command{
|
createCmd = &cobra.Command{
|
||||||
Use: "create [options] NAME FILE|-",
|
Use: "create [options] NAME FILE|-",
|
||||||
Short: "Create a new secret",
|
Short: "Create a new secret",
|
||||||
Long: "Create a secret. Input can be a path to a file or \"-\" (read from stdin). Default driver is file (unencrypted).",
|
Long: "Create a secret. Input can be a path to a file or \"-\" (read from stdin). Secret drivers \"file\" (default), \"pass\", and \"shell\" are available.",
|
||||||
RunE: create,
|
RunE: create,
|
||||||
Args: cobra.ExactArgs(2),
|
Args: cobra.ExactArgs(2),
|
||||||
Example: `podman secret create mysecret /path/to/secret
|
Example: `podman secret create mysecret /path/to/secret
|
||||||
|
|
|
@ -24,7 +24,7 @@ Secrets can also be used to store passwords for `podman login` to authenticate a
|
||||||
|
|
||||||
#### **--driver**, **-d**=*driver*
|
#### **--driver**, **-d**=*driver*
|
||||||
|
|
||||||
Specify the secret driver (default **file**, which is unencrypted).
|
Specify the secret driver (default **file**).
|
||||||
|
|
||||||
#### **--driver-opts**=*key1=val1,key2=val2*
|
#### **--driver-opts**=*key1=val1,key2=val2*
|
||||||
|
|
||||||
|
@ -48,6 +48,34 @@ If existing secret with the same name already exists, update the secret.
|
||||||
The `--replace` option does not change secrets within existing containers, only newly created containers.
|
The `--replace` option does not change secrets within existing containers, only newly created containers.
|
||||||
The default is **false**.
|
The default is **false**.
|
||||||
|
|
||||||
|
## SECRET DRIVERS
|
||||||
|
|
||||||
|
#### file
|
||||||
|
|
||||||
|
Secret resides in a read-protected file.
|
||||||
|
|
||||||
|
#### pass
|
||||||
|
|
||||||
|
Secret resides in a GPG-encrypted file.
|
||||||
|
|
||||||
|
#### shell
|
||||||
|
|
||||||
|
Secret is managed by custom scripts. An environment variable **SECRET_ID**
|
||||||
|
is passed to the scripts (except for **list**), and secrets are communicated
|
||||||
|
via stdin/stdout (where applicable). Driver options **list**, **lookup**,
|
||||||
|
**store**, and **delete** serve to install the scripts:
|
||||||
|
|
||||||
|
```
|
||||||
|
[secrets]
|
||||||
|
driver = "shell"
|
||||||
|
|
||||||
|
[secrets.opts]
|
||||||
|
list =
|
||||||
|
lookup =
|
||||||
|
store =
|
||||||
|
delete =
|
||||||
|
```
|
||||||
|
|
||||||
## EXAMPLES
|
## EXAMPLES
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
Loading…
Reference in New Issue