Skip to content

Commit 3c32e17

Browse files
authored
Merge pull request moby#29218 from yongtang/28884-secret-inspect-follow-up
Move secret name or ID prefix resolving from client to daemon
2 parents 002312d + fa358a8 commit 3c32e17

File tree

4 files changed

+65
-21
lines changed

4 files changed

+65
-21
lines changed

cli/command/secret/inspect.go

+1-5
Original file line numberDiff line numberDiff line change
@@ -33,13 +33,9 @@ func runSecretInspect(dockerCli *command.DockerCli, opts inspectOptions) error {
3333
client := dockerCli.Client()
3434
ctx := context.Background()
3535

36-
ids, err := getCliRequestedSecretIDs(ctx, client, opts.names)
37-
if err != nil {
38-
return err
39-
}
4036
getRef := func(id string) (interface{}, []byte, error) {
4137
return client.SecretInspectWithRaw(ctx, id)
4238
}
4339

44-
return inspect.Inspect(dockerCli.Out(), ids, opts.format, getRef)
40+
return inspect.Inspect(dockerCli.Out(), opts.names, opts.format, getRef)
4541
}

cli/command/secret/remove.go

+3-8
Original file line numberDiff line numberDiff line change
@@ -33,20 +33,15 @@ func runSecretRemove(dockerCli *command.DockerCli, opts removeOptions) error {
3333
client := dockerCli.Client()
3434
ctx := context.Background()
3535

36-
ids, err := getCliRequestedSecretIDs(ctx, client, opts.names)
37-
if err != nil {
38-
return err
39-
}
40-
4136
var errs []string
4237

43-
for _, id := range ids {
44-
if err := client.SecretRemove(ctx, id); err != nil {
38+
for _, name := range opts.names {
39+
if err := client.SecretRemove(ctx, name); err != nil {
4540
errs = append(errs, err.Error())
4641
continue
4742
}
4843

49-
fmt.Fprintln(dockerCli.Out(), id)
44+
fmt.Fprintln(dockerCli.Out(), name)
5045
}
5146

5247
if len(errs) > 0 {

daemon/cluster/secrets.go

+60-7
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,63 @@
11
package cluster
22

33
import (
4+
"fmt"
5+
"strings"
6+
47
apitypes "github.com/docker/docker/api/types"
58
types "github.com/docker/docker/api/types/swarm"
69
"github.com/docker/docker/daemon/cluster/convert"
710
swarmapi "github.com/docker/swarmkit/api"
11+
"golang.org/x/net/context"
812
)
913

14+
func getSecretByNameOrIDPrefix(ctx context.Context, state *nodeState, nameOrIDPrefix string) (*swarmapi.Secret, error) {
15+
// attempt to lookup secret by full ID
16+
if r, err := state.controlClient.GetSecret(ctx, &swarmapi.GetSecretRequest{
17+
SecretID: nameOrIDPrefix,
18+
}); err == nil {
19+
return r.Secret, nil
20+
}
21+
22+
// attempt to lookup secret by full name and partial ID
23+
// Note here ListSecretRequest_Filters operate with `or`
24+
r, err := state.controlClient.ListSecrets(ctx, &swarmapi.ListSecretsRequest{
25+
Filters: &swarmapi.ListSecretsRequest_Filters{
26+
Names: []string{nameOrIDPrefix},
27+
IDPrefixes: []string{nameOrIDPrefix},
28+
},
29+
})
30+
if err != nil {
31+
return nil, err
32+
}
33+
34+
// attempt to lookup secret by full name
35+
for _, s := range r.Secrets {
36+
if s.Spec.Annotations.Name == nameOrIDPrefix {
37+
return s, nil
38+
}
39+
}
40+
// attempt to lookup secret by partial ID (prefix)
41+
// return error if more than one matches found (ambiguous)
42+
n := 0
43+
var found *swarmapi.Secret
44+
for _, s := range r.Secrets {
45+
if strings.HasPrefix(s.ID, nameOrIDPrefix) {
46+
found = s
47+
n++
48+
}
49+
}
50+
if n > 1 {
51+
return nil, fmt.Errorf("secret %s is ambiguous (%d matches found)", nameOrIDPrefix, n)
52+
}
53+
if found == nil {
54+
return nil, fmt.Errorf("no such secret: %s", nameOrIDPrefix)
55+
}
56+
return found, nil
57+
}
58+
1059
// GetSecret returns a secret from a managed swarm cluster
11-
func (c *Cluster) GetSecret(id string) (types.Secret, error) {
60+
func (c *Cluster) GetSecret(nameOrIDPrefix string) (types.Secret, error) {
1261
c.mu.RLock()
1362
defer c.mu.RUnlock()
1463

@@ -20,12 +69,11 @@ func (c *Cluster) GetSecret(id string) (types.Secret, error) {
2069
ctx, cancel := c.getRequestContext()
2170
defer cancel()
2271

23-
r, err := state.controlClient.GetSecret(ctx, &swarmapi.GetSecretRequest{SecretID: id})
72+
secret, err := getSecretByNameOrIDPrefix(ctx, &state, nameOrIDPrefix)
2473
if err != nil {
2574
return types.Secret{}, err
2675
}
27-
28-
return convert.SecretFromGRPC(r.Secret), nil
76+
return convert.SecretFromGRPC(secret), nil
2977
}
3078

3179
// GetSecrets returns all secrets of a managed swarm cluster.
@@ -85,7 +133,7 @@ func (c *Cluster) CreateSecret(s types.SecretSpec) (string, error) {
85133
}
86134

87135
// RemoveSecret removes a secret from a managed swarm cluster.
88-
func (c *Cluster) RemoveSecret(id string) error {
136+
func (c *Cluster) RemoveSecret(nameOrIDPrefix string) error {
89137
c.mu.RLock()
90138
defer c.mu.RUnlock()
91139

@@ -97,11 +145,16 @@ func (c *Cluster) RemoveSecret(id string) error {
97145
ctx, cancel := c.getRequestContext()
98146
defer cancel()
99147

148+
secret, err := getSecretByNameOrIDPrefix(ctx, &state, nameOrIDPrefix)
149+
if err != nil {
150+
return err
151+
}
152+
100153
req := &swarmapi.RemoveSecretRequest{
101-
SecretID: id,
154+
SecretID: secret.ID,
102155
}
103156

104-
_, err := state.controlClient.RemoveSecret(ctx, req)
157+
_, err = state.controlClient.RemoveSecret(ctx, req)
105158
return err
106159
}
107160

integration-cli/docker_cli_secret_create_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ func (s *DockerSwarmSuite) TestSecretCreateResolve(c *check.C) {
101101

102102
// Remove based on ID prefix of the fake one should succeed
103103
out, err = d.Cmd("secret", "rm", fake[:5])
104-
c.Assert(out, checker.Contains, fake)
104+
c.Assert(out, checker.Contains, fake[:5])
105105
out, err = d.Cmd("secret", "ls")
106106
c.Assert(err, checker.IsNil)
107107
c.Assert(out, checker.Not(checker.Contains), name)

0 commit comments

Comments
 (0)