Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mount secrets when building the job image #474

Open
iszulcdeepsense opened this issue Jun 11, 2024 · 0 comments
Open

Mount secrets when building the job image #474

iszulcdeepsense opened this issue Jun 11, 2024 · 0 comments

Comments

@iszulcdeepsense
Copy link
Collaborator

iszulcdeepsense commented Jun 11, 2024

Let's use RUN --mount=type=secret when building the job image, to access user's secret build vars without baking them into the image.

Currently, build env vars are passed via regular environment variables, which leaves a trace of a secret in the docker layers history (anyone having access to the image could read the secret build vars).

Build env vars are particularly useful when the job needs to download a third-party library from a private git repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant