-
-
Notifications
You must be signed in to change notification settings - Fork 738
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Docker secrets #423
Comments
Should be easy enough to add.
I'm not entirely sure what you mean by this, we currently use |
I am also interested in this feature. How it often works in other projects is: In the example above, that would mean exposing the variable Benefits are:
Downsides:
|
I think I understand the behavior you're trying to describe, however I'm leaning more towards the explicitness of using |
Would you still look at the environment variable to find the file path for people pointing to a non secret config file our outside of docker? Or directly resolve the name to a file in Either way works for me since I'm going to keep running it in a container for the foreseeable future. Thanks for taking this up, I appreciate it! |
More so the latter, as I'm not familiar with other use cases where loading the contents of a file would be better than using an ENV. If there are any, then something like this might be even better and leave room for other potential ways to load values: # directly loads the contents of /run/secrets/api_key
password: ${secret:api_key}
# gets value of env variable PATH_TO_SECRET_FILE, then loads the contents of the file it points to
password: ${loadFileFromEnv:PATH_TO_SECRET_FILE} |
That approach does seem even better, it makes it very clear what you're loading and you don't have to implement more than needed now. |
I need this to use Glance with sops-nix — can't wait! |
@anotherhadi It simply reads the contents of the file at |
Description
with use of env variables in custom-api widges it would be more secure to have access to docker secrets. if a tag of VAR__FILE: apikey is used in the yaml it should be extracted from /run/secrets/apikey
The text was updated successfully, but these errors were encountered: