Skip to content

Commit a095669

Browse files
committed
Remove line
Signed-off-by: Alex Ellis (OpenFaaS Ltd) <[email protected]>
1 parent 8f9661f commit a095669

File tree

1 file changed

+2
-4
lines changed

1 file changed

+2
-4
lines changed

docs/reference/secrets.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,9 @@ There is a two-step process to using a secret. First you need to create the secr
1313

1414
**Environment variables vs. files**
1515

16-
Secrets should never be set in environment variables, no matter how tempting it is. These are always visible within the OpenFaaS REST API and from within the Pod spec in Kubernetes.
16+
Secrets should never be set in environment variables, no matter how tempting it is. These are always visible within the OpenFaaS REST API and from within the Pod spec in Kubernetes. They are also often exposed via debug tools, logs, traces and may leak to unauthorized users.
1717

18-
Instead, all secrets are made available in the container file-system and should be read from the following location: `/var/openfaas/secrets/<secret-name>`. In the sample below we show how to create and consume a secret in a function.
19-
20-
The faas-cli can be used to manage secrets on Kubernetes and for faasd.
18+
Instead, all secrets are made available in the container file-system and should be read from the following location: `/var/openfaas/secrets/<secret-name>`. In the sample below we show how to create and consume a secret in a function.
2119

2220
> See also: [YAML reference: environmental variables](yaml.md).
2321

0 commit comments

Comments
 (0)