<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Devops on void.log</title><link>https://lk-blog.site/tags/devops/</link><description>Recent content in Devops on void.log</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 12 Sep 2024 00:00:00 +0000</lastBuildDate><atom:link href="https://lk-blog.site/tags/devops/index.xml" rel="self" type="application/rss+xml"/><item><title>Docker secrets, and why most teams ship them anyway</title><link>https://lk-blog.site/posts/docker-secrets/</link><pubDate>Thu, 12 Sep 2024 00:00:00 +0000</pubDate><guid>https://lk-blog.site/posts/docker-secrets/</guid><description>&lt;p&gt;I&amp;rsquo;ve seen this happen more times than I&amp;rsquo;d like to admit: someone commits a &lt;code&gt;.env&lt;/code&gt; file,
or bakes an API key directly into a &lt;code&gt;Dockerfile&lt;/code&gt;, and it ends up in the final image.
Sometimes it&amp;rsquo;s in git history. Sometimes it&amp;rsquo;s in the layer cache. Often both.&lt;/p&gt;
&lt;h2 id="why-it-keeps-happening"&gt;Why it keeps happening&lt;/h2&gt;
&lt;p&gt;The problem isn&amp;rsquo;t that developers are careless. The problem is that the path of least
resistance is almost always the insecure one.&lt;/p&gt;</description></item></channel></rss>