Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable docker secrets as a more secure alternative to build args #17

Merged
merged 6 commits into from
Jan 20, 2023

Conversation

anoldguy
Copy link
Contributor

Docker build args work, but leave your value exposed in the final images. Docker buildx secrets are a more secure alternative.

This attempts to enable simple ENV based secrets in the builder command. In theory, if the referenced name is present in the ENV, this should JustWork™, but I have yet to test in anger. I'm not attempting to handle the more complex file-based secrets, as we don't generally use them.

Some of the function names are janky, simple_secretize? What is that? Would love to get some feedback on the coding style and idea.

@dhh dhh marked this pull request as ready for review January 20, 2023 09:07
@dhh dhh changed the title WIP: Enable docker secrets as a more secure alternative to build args Enable docker secrets as a more secure alternative to build args Jan 20, 2023
@dhh dhh merged commit 4434b6e into basecamp:main Jan 20, 2023
djmb added a commit that referenced this pull request Oct 6, 2024
Proxy changes:
- Add option to use custom TLS certificates (#17)
- Don't buffer SSE responses (#36)
- Allow routing to wildcard subdomains (#45)

Custom TLS certificates not supported in Kamal itself yet. Buffering
SSE responses and wildcard subdomains will work without any Kamal
changes.
@djmb djmb mentioned this pull request Oct 6, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants