Skip to content

Feedback before writing: Clean-out secrets before production #700

@goldbergyoni

Description

@goldbergyoni

Context: This is used to share my TOC of a new best practice so I can solicit feedback and ideas before start writing. From my experience, this makes the writing experience much easier and shorter. And fun.

Title: Clean-out secrets before production, avoid build-time args

  • TL&DR: Neither build time and run time secrets should be left within Docker images. Build time args for example leave traces. In run-time, a reputable secret management framework should be used. In build time, secrets must be deleted using multi-stage build or [Looking for other simpler technique]
  • Otherwise: An access to the image repository will reveal not only code but also precious secrets like the npm keys
  • Simple explanation:
  • Advanced tip: How to extract build args from image
    Code example: Show how to install packages from private npm repo without leaking secrets

Thoughts? improvement? Help me to make it better

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions