mirror of
https://github.com/minio/minio.git
synced 2025-04-20 02:27:50 -04:00
Revert "fix: remove deprecated MINIO_ACCESS_KEY, MINIO_SECRET_KEY envs (#12173)"
This reverts commit b0baaeaa3ddee9573d3b1ac698e1182d2cc883fe.
This commit is contained in:
parent
091845df39
commit
8cd89e10ea
@ -13,7 +13,9 @@ RUN \
|
|||||||
|
|
||||||
FROM registry.access.redhat.com/ubi8/ubi-minimal:8.3
|
FROM registry.access.redhat.com/ubi8/ubi-minimal:8.3
|
||||||
|
|
||||||
ENV MINIO_ROOT_USER_FILE=access_key \
|
ENV MINIO_ACCESS_KEY_FILE=access_key \
|
||||||
|
MINIO_SECRET_KEY_FILE=secret_key \
|
||||||
|
MINIO_ROOT_USER_FILE=access_key \
|
||||||
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
||||||
MINIO_KMS_SECRET_KEY_FILE=kms_master_key \
|
MINIO_KMS_SECRET_KEY_FILE=kms_master_key \
|
||||||
MINIO_UPDATE_MINISIGN_PUBKEY="RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
|
MINIO_UPDATE_MINISIGN_PUBKEY="RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
|
||||||
|
@ -15,7 +15,9 @@ FROM registry.access.redhat.com/ubi8/ubi-minimal:8.3
|
|||||||
|
|
||||||
ARG TARGETARCH
|
ARG TARGETARCH
|
||||||
|
|
||||||
ENV MINIO_ROOT_USER_FILE=access_key \
|
ENV MINIO_ACCESS_KEY_FILE=access_key \
|
||||||
|
MINIO_SECRET_KEY_FILE=secret_key \
|
||||||
|
MINIO_ROOT_USER_FILE=access_key \
|
||||||
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
||||||
MINIO_KMS_SECRET_KEY_FILE=kms_master_key \
|
MINIO_KMS_SECRET_KEY_FILE=kms_master_key \
|
||||||
MINIO_UPDATE_MINISIGN_PUBKEY="RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
|
MINIO_UPDATE_MINISIGN_PUBKEY="RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
|
||||||
|
@ -8,6 +8,8 @@ COPY dockerscripts/docker-entrypoint.sh /usr/bin/
|
|||||||
COPY minio /usr/bin/
|
COPY minio /usr/bin/
|
||||||
|
|
||||||
ENV MINIO_UPDATE=off \
|
ENV MINIO_UPDATE=off \
|
||||||
|
MINIO_ACCESS_KEY_FILE=access_key \
|
||||||
|
MINIO_SECRET_KEY_FILE=secret_key \
|
||||||
MINIO_ROOT_USER_FILE=access_key \
|
MINIO_ROOT_USER_FILE=access_key \
|
||||||
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
||||||
MINIO_KMS_SECRET_KEY_FILE=kms_master_key
|
MINIO_KMS_SECRET_KEY_FILE=kms_master_key
|
||||||
|
@ -12,7 +12,9 @@ LABEL name="MinIO" \
|
|||||||
summary="MinIO is a High Performance Object Storage, API compatible with Amazon S3 cloud storage service." \
|
summary="MinIO is a High Performance Object Storage, API compatible with Amazon S3 cloud storage service." \
|
||||||
description="MinIO object storage is fundamentally different. Designed for performance and the S3 API, it is 100% open-source. MinIO is ideal for large, private cloud environments with stringent security requirements and delivers mission-critical availability across a diverse range of workloads."
|
description="MinIO object storage is fundamentally different. Designed for performance and the S3 API, it is 100% open-source. MinIO is ideal for large, private cloud environments with stringent security requirements and delivers mission-critical availability across a diverse range of workloads."
|
||||||
|
|
||||||
ENV MINIO_ROOT_USER_FILE=access_key \
|
ENV MINIO_ACCESS_KEY_FILE=access_key \
|
||||||
|
MINIO_SECRET_KEY_FILE=secret_key \
|
||||||
|
MINIO_ROOT_USER_FILE=access_key \
|
||||||
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
MINIO_ROOT_PASSWORD_FILE=secret_key \
|
||||||
MINIO_KMS_SECRET_KEY_FILE=kms_master_key \
|
MINIO_KMS_SECRET_KEY_FILE=kms_master_key \
|
||||||
MINIO_UPDATE_MINISIGN_PUBKEY="RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
|
MINIO_UPDATE_MINISIGN_PUBKEY="RWTx5Zr1tiHQLwG9keckT0c45M3AGeHD6IvimQHpyRywVWGbP1aVSGav"
|
||||||
|
@ -309,6 +309,15 @@ func handleCommonEnvVars() {
|
|||||||
// in-place update is off.
|
// in-place update is off.
|
||||||
globalInplaceUpdateDisabled = strings.EqualFold(env.Get(config.EnvUpdate, config.EnableOn), config.EnableOff)
|
globalInplaceUpdateDisabled = strings.EqualFold(env.Get(config.EnvUpdate, config.EnableOn), config.EnableOff)
|
||||||
|
|
||||||
|
if env.IsSet(config.EnvAccessKey) || env.IsSet(config.EnvSecretKey) {
|
||||||
|
cred, err := auth.CreateCredentials(env.Get(config.EnvAccessKey, ""), env.Get(config.EnvSecretKey, ""))
|
||||||
|
if err != nil {
|
||||||
|
logger.Fatal(config.ErrInvalidCredentials(err),
|
||||||
|
"Unable to validate credentials inherited from the shell environment")
|
||||||
|
}
|
||||||
|
globalActiveCred = cred
|
||||||
|
}
|
||||||
|
|
||||||
if env.IsSet(config.EnvRootUser) || env.IsSet(config.EnvRootPassword) {
|
if env.IsSet(config.EnvRootUser) || env.IsSet(config.EnvRootPassword) {
|
||||||
cred, err := auth.CreateCredentials(env.Get(config.EnvRootUser, ""), env.Get(config.EnvRootPassword, ""))
|
cred, err := auth.CreateCredentials(env.Get(config.EnvRootUser, ""), env.Get(config.EnvRootPassword, ""))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -24,6 +24,8 @@ const (
|
|||||||
|
|
||||||
// Top level common ENVs
|
// Top level common ENVs
|
||||||
const (
|
const (
|
||||||
|
EnvAccessKey = "MINIO_ACCESS_KEY"
|
||||||
|
EnvSecretKey = "MINIO_SECRET_KEY"
|
||||||
EnvRootUser = "MINIO_ROOT_USER"
|
EnvRootUser = "MINIO_ROOT_USER"
|
||||||
EnvRootPassword = "MINIO_ROOT_PASSWORD"
|
EnvRootPassword = "MINIO_ROOT_PASSWORD"
|
||||||
|
|
||||||
|
@ -82,6 +82,8 @@ func TestMain(m *testing.M) {
|
|||||||
// disable ENVs which interfere with tests.
|
// disable ENVs which interfere with tests.
|
||||||
for _, env := range []string{
|
for _, env := range []string{
|
||||||
crypto.EnvKMSAutoEncryption,
|
crypto.EnvKMSAutoEncryption,
|
||||||
|
config.EnvAccessKey,
|
||||||
|
config.EnvSecretKey,
|
||||||
config.EnvRootUser,
|
config.EnvRootUser,
|
||||||
config.EnvRootPassword,
|
config.EnvRootPassword,
|
||||||
} {
|
} {
|
||||||
|
@ -8,6 +8,31 @@ if [ "${1}" != "minio" ]; then
|
|||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
## Look for docker secrets at given absolute path or in default documented location.
|
||||||
|
docker_secrets_env_old() {
|
||||||
|
if [ -f "$MINIO_ACCESS_KEY_FILE" ]; then
|
||||||
|
ACCESS_KEY_FILE="$MINIO_ACCESS_KEY_FILE"
|
||||||
|
else
|
||||||
|
ACCESS_KEY_FILE="/run/secrets/$MINIO_ACCESS_KEY_FILE"
|
||||||
|
fi
|
||||||
|
if [ -f "$MINIO_SECRET_KEY_FILE" ]; then
|
||||||
|
SECRET_KEY_FILE="$MINIO_SECRET_KEY_FILE"
|
||||||
|
else
|
||||||
|
SECRET_KEY_FILE="/run/secrets/$MINIO_SECRET_KEY_FILE"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -f "$ACCESS_KEY_FILE" ] && [ -f "$SECRET_KEY_FILE" ]; then
|
||||||
|
if [ -f "$ACCESS_KEY_FILE" ]; then
|
||||||
|
MINIO_ACCESS_KEY="$(cat "$ACCESS_KEY_FILE")"
|
||||||
|
export MINIO_ACCESS_KEY
|
||||||
|
fi
|
||||||
|
if [ -f "$SECRET_KEY_FILE" ]; then
|
||||||
|
MINIO_SECRET_KEY="$(cat "$SECRET_KEY_FILE")"
|
||||||
|
export MINIO_SECRET_KEY
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
|
||||||
docker_secrets_env() {
|
docker_secrets_env() {
|
||||||
if [ -f "$MINIO_ROOT_USER_FILE" ]; then
|
if [ -f "$MINIO_ROOT_USER_FILE" ]; then
|
||||||
ROOT_USER_FILE="$MINIO_ROOT_USER_FILE"
|
ROOT_USER_FILE="$MINIO_ROOT_USER_FILE"
|
||||||
@ -73,6 +98,9 @@ docker_switch_user() {
|
|||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
## Set access env from secrets if necessary.
|
||||||
|
docker_secrets_env_old
|
||||||
|
|
||||||
## Set access env from secrets if necessary.
|
## Set access env from secrets if necessary.
|
||||||
docker_secrets_env
|
docker_secrets_env
|
||||||
|
|
||||||
|
Loading…
x
Reference in New Issue
Block a user