Skip to content

Commit

Permalink
Merge pull request #9728 from ashley-cui/secretdocs
Browse files Browse the repository at this point in the history
[CI:DOCS] removing secrets is safe for in-use secrets
  • Loading branch information
openshift-merge-robot authored Mar 17, 2021
2 parents 604459b + 3d01d42 commit 9439b69
Show file tree
Hide file tree
Showing 3 changed files with 16 additions and 0 deletions.
5 changes: 5 additions & 0 deletions docs/source/markdown/podman-create.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -833,6 +833,11 @@ A secret is a blob of sensitive data which a container needs at runtime but
should not be stored in the image or in source control, such as usernames and passwords,
TLS certificates and keys, SSH keys or other important generic strings or binary content (up to 500 kb in size).

Secrets are copied and mounted into the container when a container is created. If a secret is deleted using
`podman secret rm`, the container will still have access to the secret. If a secret is deleted and
another secret is created with the same name, the secret inside the container will not change; the old
secret value will still remain.

Secrets are managed using the `podman secret` command.

#### **--security-opt**=*option*
Expand Down
5 changes: 5 additions & 0 deletions docs/source/markdown/podman-run.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -885,6 +885,11 @@ A secret is a blob of sensitive data which a container needs at runtime but
should not be stored in the image or in source control, such as usernames and passwords,
TLS certificates and keys, SSH keys or other important generic strings or binary content (up to 500 kb in size).

Secrets are copied and mounted into the container when a container is created. If a secret is deleted using
`podman secret rm`, the container will still have access to the secret. If a secret is deleted and
another secret is created with the same name, the secret inside the container will not change; the old
secret value will still remain.

Secrets are managed using the `podman secret` command

#### **--security-opt**=*option*
Expand Down
6 changes: 6 additions & 0 deletions docs/source/markdown/podman-secret-rm.1.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,12 @@ podman\-secret\-rm - Remove one or more secrets

Removes one or more secrets.

`podman secret rm` is safe to use on secrets that are in use by a container.
The created container will still have access to the secret data because secrets are
copied and mounted into the container when a container is created. If a secret is deleted and
another secret is created with the same name, the secret inside the container will not change;
the old secret value will still remain.

## OPTIONS

#### **--all**, **-a**
Expand Down

0 comments on commit 9439b69

Please sign in to comment.