Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for storing API_SECRET as a secret when running in a container #8299

Open
swebster opened this issue Oct 1, 2024 · 0 comments
Open

Comments

@swebster
Copy link

swebster commented Oct 1, 2024

It should be possible to configure Nightscout to read its API_SECRET from a file so it can be injected into a host container securely without exposing it in the runtime environment. The typical solution (e.g. as used in postgres) would be to add support for a variable named API_SECRET_FILE, that could then be used to configure Nightscout to load the API key from a Docker secret stored in /run/secrets/nightscout_api_secret or similar.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant