提交 3c5c90ca 编写于 作者: P Peter Krempa

virsh: secret: Print warning that passing secret on command-line is insecure

Print a warning if users pass in secrets as command line arguments and
mention it in the man page.
Signed-off-by: NPeter Krempa <pkrempa@redhat.com>
Reviewed-by: NDaniel P. Berrangé <berrange@redhat.com>
上级 dbbc74e4
...@@ -6571,6 +6571,9 @@ Base64-encoded value *base64* or Base-64-encoded contents of file named ...@@ -6571,6 +6571,9 @@ Base64-encoded value *base64* or Base-64-encoded contents of file named
Note that *--file* and *base64* options are mutually exclusive. Note that *--file* and *base64* options are mutually exclusive.
Passing secrets via the *base64* option on command line is INSECURE and
deprecated. Use the *--file* option instead.
secret-get-value secret-get-value
---------------- ----------------
......
...@@ -217,6 +217,10 @@ cmdSecretSetValue(vshControl *ctl, const vshCmd *cmd) ...@@ -217,6 +217,10 @@ cmdSecretSetValue(vshControl *ctl, const vshCmd *cmd)
return false; return false;
} }
/* warn users that the --base64 option passed from command line is wrong */
if (base64)
vshError(ctl, _("Passing secret value as command-line argument is insecure!"));
if (filename) { if (filename) {
ssize_t read_ret; ssize_t read_ret;
if ((read_ret = virFileReadAll(filename, 1024, &file_buf)) < 0) { if ((read_ret = virFileReadAll(filename, 1024, &file_buf)) < 0) {
......
Markdown is supported
0% .
You are about to add 0 people to the discussion. Proceed with caution.
先完成此消息的编辑!
想要评论请 注册