🚀 Feature: Enable use of Docker Secrets #150

Closed
opened 2025-10-07 23:55:22 +03:00 by OVERLORD · 2 comments
Owner

Originally created by @crazytimmy on GitHub.

Originally assigned to: @ItalyPaleAle on GitHub.

Feature description

I couldn't find any reference in the documentation for using docker secrets for sensitive information (Maxmind key, smtp password). I hope I'm not missing it.

Pitch

Most other apps I deploy with docke I can change the environment variable to XXX_FILE=. I think it would be a good feature to support. Ideally it would support this for all environment variables just because? but at the very least sensitive information.

MAXMIND_LICENSE_KEY_FILE=/run/secrets/
SMTP_PASSWORD_FILE=/run/secrets/

Originally created by @crazytimmy on GitHub. Originally assigned to: @ItalyPaleAle on GitHub. ### Feature description I couldn't find any reference in the documentation for using docker secrets for sensitive information (Maxmind key, smtp password). I hope I'm not missing it. ### Pitch Most other apps I deploy with docke I can change the environment variable to XXX_FILE=<secretsname>. I think it would be a good feature to support. Ideally it would support this for all environment variables just because? but at the very least sensitive information. MAXMIND_LICENSE_KEY_FILE=/run/secrets/<secretname> SMTP_PASSWORD_FILE=/run/secrets/<secretname>
Author
Owner

@ItalyPaleAle commented on GitHub:

#799 will allow this!

@ItalyPaleAle commented on GitHub: #799 will allow this!
Author
Owner

@ItalyPaleAle commented on GitHub:

I think this is a very good idea. In fact, in #682 I have added a _FILE variant for the env var passing the key encryption key.

This is not just about Docker secrets. In general, storing secrets in env vars is not always a good idea since they can be exposed. Some more context here: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data

@ItalyPaleAle commented on GitHub: I think this is a very good idea. In fact, in #682 I have added a `_FILE` variant for the env var passing the key encryption key. This is not just about Docker secrets. In general, storing secrets in env vars is not always a good idea since they can be exposed. Some more context here: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/pocket-id-pocket-id-1#150