You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It should be possible to configure Nightscout to read its API_SECRET from a file so it can be injected into a host container securely without exposing it in the runtime environment. The typical solution (e.g. as used in postgres) would be to add support for a variable named API_SECRET_FILE, that could then be used to configure Nightscout to load the API key from a Docker secret stored in /run/secrets/nightscout_api_secret or similar.
The text was updated successfully, but these errors were encountered:
It should be possible to configure Nightscout to read its API_SECRET from a file so it can be injected into a host container securely without exposing it in the runtime environment. The typical solution (e.g. as used in postgres) would be to add support for a variable named API_SECRET_FILE, that could then be used to configure Nightscout to load the API key from a Docker secret stored in /run/secrets/nightscout_api_secret or similar.
The text was updated successfully, but these errors were encountered: