Mount Secure Build-Time Secrets with Docker and Docker Compose

Avoid leaking build-time secrets in your Docker images such as API keys or tokens.
Hit the subscribe button to receive more videos like this!
REFERENCE LINKS
---------------------------------------------------
► nickjanetakis.com/blog/mount-...
COURSES
---------------------------------------------------
Courses I've created that focus on web dev and deployment topics.
► nickjanetakis.com/courses/
THE TOOLS I USE / GEAR
---------------------------------------------------
► nickjanetakis.com/blog/the-to...
FOLLOW ME ELSEWHERE
---------------------------------------------------
► Twitter: / nickjanetakis
► GitHub: github.com/nickjj
TIMESTAMPS
---------------------------------------------------
0:00 -- Intro
0:37 -- A couple of use cases
1:43 -- An insecure way with build ARGs
6:14 -- Make sure BuildKit is enabled
6:49 -- Mounting a secure env variable secret
11:26 -- Does it actually work?
14:04 -- Passing it as an env var for a command
15:12 -- Adding multiple secrets
16:02 -- Mounting files instead of env vars
18:43 -- Using Docker Compose for secret env vars
23:13 -- Using Docker Compose for secret files and configs

Пікірлер: 8

  • @JohnMitchellCalif
    @JohnMitchellCalifАй бұрын

    very useful!

  • @vidhinmehta4406
    @vidhinmehta4406Ай бұрын

    thanks

  • @dumidupramith3881
    @dumidupramith38819 күн бұрын

    super helpful

  • @NickJanetakis

    @NickJanetakis

    9 күн бұрын

    Thanks for watching.

  • @ssd6010
    @ssd6010Ай бұрын

    where's your hat?

  • @NickJanetakis

    @NickJanetakis

    Ай бұрын

    It's temporarily on vacation. I recently had surgery and there's quite a few stitches, I didn't want to subject anyone to seeing that.

  • @farzadmf

    @farzadmf

    Ай бұрын

    Oh wow, I hope you're feeling OK

  • @NickJanetakis

    @NickJanetakis

    Ай бұрын

    @@farzadmf Thanks, so far so good.