🚀 Feature: Enable use of Docker Secrets #353

Closed
opened 2026-02-04 19:04:08 +03:00 by OVERLORD · 2 comments
Owner

Originally created by @crazytimmy on GitHub (Jun 26, 2025).

Originally assigned to: @ItalyPaleAle on GitHub.

Feature description

I couldn't find any reference in the documentation for using docker secrets for sensitive information (Maxmind key, smtp password). I hope I'm not missing it.

Pitch

Most other apps I deploy with docke I can change the environment variable to XXX_FILE=. I think it would be a good feature to support. Ideally it would support this for all environment variables just because? but at the very least sensitive information.

MAXMIND_LICENSE_KEY_FILE=/run/secrets/
SMTP_PASSWORD_FILE=/run/secrets/

Originally created by @crazytimmy on GitHub (Jun 26, 2025). Originally assigned to: @ItalyPaleAle on GitHub. ### Feature description I couldn't find any reference in the documentation for using docker secrets for sensitive information (Maxmind key, smtp password). I hope I'm not missing it. ### Pitch Most other apps I deploy with docke I can change the environment variable to XXX_FILE=<secretsname>. I think it would be a good feature to support. Ideally it would support this for all environment variables just because? but at the very least sensitive information. MAXMIND_LICENSE_KEY_FILE=/run/secrets/<secretname> SMTP_PASSWORD_FILE=/run/secrets/<secretname>
Author
Owner

@ItalyPaleAle commented on GitHub (Jun 27, 2025):

I think this is a very good idea. In fact, in #682 I have added a _FILE variant for the env var passing the key encryption key.

This is not just about Docker secrets. In general, storing secrets in env vars is not always a good idea since they can be exposed. Some more context here: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data

@ItalyPaleAle commented on GitHub (Jun 27, 2025): I think this is a very good idea. In fact, in #682 I have added a `_FILE` variant for the env var passing the key encryption key. This is not just about Docker secrets. In general, storing secrets in env vars is not always a good idea since they can be exposed. Some more context here: https://security.stackexchange.com/questions/197784/is-it-unsafe-to-use-environmental-variables-for-secret-data
Author
Owner

@ItalyPaleAle commented on GitHub (Jul 30, 2025):

#799 will allow this!

@ItalyPaleAle commented on GitHub (Jul 30, 2025): #799 will allow this!
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: starred/pocket-id#353