简体   繁体   English

将秘密存储为云构建环境变量

[英]Storing Secrets as cloud build environment variables

The recommended way of using secrets during builds on Cloud Build is by loading them in from Secret Manager.在 Cloud Build 上构建期间使用密钥的推荐方法是从 Secret Manager 中加载它们。 What would be the dangers of saving them as environment variables on the build trigger?将它们保存为构建触发器上的环境变量会有什么危险?

Anyone with project viewer or higher permissions will be able to see them.具有项目查看者或更高权限的任何人都可以查看它们。 Anyone who can invoke your build can easily print them out in build logs.任何可以调用您的构建的人都可以轻松地将它们打印到构建日志中。 There's no auditing or logging when a secret is accessed or by who.当秘密被访问或由谁访问时,没有审计或日志记录。

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 如何在cloudbuild.yaml中使用带有KMS的Google Cloud Build将多个环境变量作为秘密传递? - How to pass multiple environment variables as secrets using Google Cloud Build with KMS in cloudbuild.yaml? Google Cloud Build中的环境变量 - Environment variables in Google Cloud Build 在 Google Cloud Build 中使用 Google Cloud Secret 作为环境变量 - Using Google Cloud Secret as environment variables in Google Cloud Build 如何使用云构建将环境变量传递给app.yaml - How to pass environment variables to the app.yaml using cloud build 使用文件将环境变量加载到Google Cloud Build中 - Loading in environment variables to Google Cloud Build using a file Google云容器集群环境变量的秘密 - Google cloud container cluster environmental variables for secrets 如何在 Google App Engine 标准环境中使用 Google Cloud Build 或其他方法设置环境变量? - How to set environment variables using Google Cloud Build or other method in Google App Engine Standard Environment? 如何通过 Cloud Build 访问 GSM 机密并传递给 Cloud Function - How to access GSM secrets through Cloud Build and pass to Cloud Function 获取云端环境变量 function - Get environment variables in a cloud function 如何在 Google App Engine 中设置环境变量/应用程序机密 - How to set environment variables/app secrets in Google App Engine
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM