Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Docker Secrets #26

Open
mcDevnagh opened this issue Dec 20, 2022 · 1 comment
Open

Docker Secrets #26

mcDevnagh opened this issue Dec 20, 2022 · 1 comment
Labels
enhancement New feature or request

Comments

@mcDevnagh
Copy link

https://docs.docker.com/engine/swarm/secrets/

The docker container should be able to utilize docker secrets in accessing sensitive information, such as the bot's password and the API key. This can be done with docker secrets, and reading the value from a file (/run/secrets/<secret_name>). The docker image would need to support reading the current environment variables (or a subset of them) from a file. The standard way of doing this is to append _FILE to the end of the env var name, and reading from that file if the original env var is empty. So then a user could create a docker secret named bot_password and set the environment variable BOT_PASSWORD_FILE to /run/secrets/bot_password.

For a working example, see PostgresSQL

@moan0s moan0s added the enhancement New feature or request label Jun 2, 2023
@moan0s
Copy link
Owner

moan0s commented Jun 2, 2023

Interesting, I'd have to read more about that. First I want to smash some serious bugs but feel free to open a PR!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants