Skip to content

Commit 92eb400

Browse files
authored
Remove Base64'ing of file contents
Updated example of reading secret values from a file so that it doesn't base64 the contents in the file before `kubectl` reads it.
1 parent 45fc485 commit 92eb400

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

content/en/docs/tasks/configmap-secret/managing-secret-using-kubectl.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,11 +42,11 @@ characters.
4242

4343
### Use source files
4444

45-
1. Store the credentials in files with the values encoded in base64:
45+
1. Store the credentials in files:
4646

4747
```shell
48-
echo -n 'admin' | base64 > ./username.txt
49-
echo -n 'S!B\*d$zDsb=' | base64 > ./password.txt
48+
echo -n 'admin' > ./username.txt
49+
echo -n 'S!B\*d$zDsb=' > ./password.txt
5050
```
5151
The `-n` flag ensures that the generated files do not have an extra newline
5252
character at the end of the text. This is important because when `kubectl`
@@ -199,4 +199,4 @@ kubectl delete secret db-user-pass
199199

200200
- Read more about the [Secret concept](/docs/concepts/configuration/secret/)
201201
- Learn how to [manage Secrets using config file](/docs/tasks/configmap-secret/managing-secret-using-config-file/)
202-
- Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/)
202+
- Learn how to [manage Secrets using kustomize](/docs/tasks/configmap-secret/managing-secret-using-kustomize/)

0 commit comments

Comments
 (0)