Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: emphasize the fact that secrets aren't saved in cache #5211

Merged
merged 2 commits into from
Aug 6, 2024

Conversation

ardrabczyk
Copy link
Contributor

I was reading through the documentation trying to understand what's so
special about secret type mount except for extra options it takes as I
found that contents of bind mount doesn't get baked into the image too
but it can be found in /var/lib/docker in contrary to secret type
mount. I've learned that secret type mount uses tmpfs under the hood
and my findings were confirmed by
https://docs.docker.com/build/cache/invalidation/#general-rules: 'The
contents of build secrets are not part of the build cache.'. I think
it's worth emphasizing in the documentation.

Fixes docker/docs#20436.

Signed-off-by: Arkadiusz Drabczyk arkadiusz@drabczyk.org

I was reading through the documentation trying to understand what's so
special about secret type mount except for extra options it takes as I
found that contents of bind mount doesn't get baked into the image too
but it can be found in /var/lib/docker in contrary to secret type
mount. I've learned that secret type mount uses tmpfs under the hood
and my findings were confirmed by
https://docs.docker.com/build/cache/invalidation/#general-rules: 'The
contents of build secrets are not part of the build cache.'. I think
it's worth emphasizing in the documentation.

Fixes docker/docs#20436.

Signed-off-by: Arkadiusz Drabczyk <arkadiusz@drabczyk.org>
Fixes docker/docs#20436.

Signed-off-by: Arkadiusz Drabczyk <arkadiusz@drabczyk.org>
@crazy-max crazy-max merged commit 78f24da into moby:master Aug 6, 2024
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Why is it emphasized that files are not 'baked them into the image' when type=secret mount is used?
3 participants