-
Notifications
You must be signed in to change notification settings - Fork 10.7k
Closed
Labels
Description
Context: This is used to share my TOC of a new best practice so I can solicit feedback and ideas before start writing. From my experience, this makes the writing experience much easier and shorter. And fun.
Title: Clean-out secrets before production, avoid build-time args
- TL&DR: Neither build time and run time secrets should be left within Docker images. Build time args for example leave traces. In run-time, a reputable secret management framework should be used. In build time, secrets must be deleted using multi-stage build or [Looking for other simpler technique]
- Otherwise: An access to the image repository will reveal not only code but also precious secrets like the npm keys
- Simple explanation:
- Advanced tip: How to extract build args from image
Code example: Show how to install packages from private npm repo without leaking secrets
Thoughts? improvement? Help me to make it better
Reactions are currently unavailable