-
Notifications
You must be signed in to change notification settings - Fork 258
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Secrets in Build #264
Comments
Does anyone know if there is a workaround for this (before this issue is addressed) or is it currently not possible to supply a secret? |
there is no way to supply a secret now. PR is welcome as |
Bump! |
Related: #331 |
I am working on a fix here: #363 |
I understand this is done as of #366. However, I can't quite figure our how to use it. Say I've got access to |
+1 — I've been trying various combinations of: secrets:
<KEY>: ((secret-value)) secrets:
<ID>:
<KEY>: ((secret-value)) secrets:
<ID>:
<KEY>: ENV_VAR_NAME and nothing seems to work, despite trying to fit these into what it seems like that structure expects. Any guidance on how |
Hi, dynamic vars are not supported in |
Issue:
Support docker secret, in concourse jobs that build docker images.
Reference:
docker build has a --secret command line argument. It's different than --build-arg
https://docs.docker.com/engine/reference/commandline/build/
Expected result:
A concourse job can pass a map of secrets to the a job. Just like build-args.
Motivation:
Secrets will not show up in docker inspect. build-args will show up in docker inspect. secrets are safe for passwords. build-args are not safe for passwords.
Concourse credential protected values must be valid values for a secret. Then everything is safe.
docker build --secret is supported in: Docker API 1.39+
Example:
The text was updated successfully, but these errors were encountered: