mirror of
https://github.com/pocket-id/pocket-id.git
synced 2025-12-09 14:53:00 +03:00
🚀 Feature: Enable use of Docker Secrets #150
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @crazytimmy on GitHub.
Originally assigned to: @ItalyPaleAle on GitHub.
Feature description
I couldn't find any reference in the documentation for using docker secrets for sensitive information (Maxmind key, smtp password). I hope I'm not missing it.
Pitch
Most other apps I deploy with docke I can change the environment variable to XXX_FILE=. I think it would be a good feature to support. Ideally it would support this for all environment variables just because? but at the very least sensitive information.
MAXMIND_LICENSE_KEY_FILE=/run/secrets/
SMTP_PASSWORD_FILE=/run/secrets/
@ItalyPaleAle commented on GitHub:
#799 will allow this!
@ItalyPaleAle commented on GitHub:
I think this is a very good idea. In fact, in #682 I have added a
_FILEvariant for the env var passing the key encryption key.This is not just about Docker secrets. In general, storing secrets in env vars is not always a good idea since they can be exposed. Some more context here: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data