-
-
Notifications
You must be signed in to change notification settings - Fork 375
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: Allow WIREGUARD_PRIVATE_KEY to be specified via a secret file #614
Comments
Also WIREGUARD_PRESHARED_KEY and WIREGUARD_ADDRESS, I would think. |
Also why do you guys see an interest in using files instead of env variables? Sensitive variables are unset at start once read in memory, so the only place they are vulnerable is in your e.g. docker-compose.yml... which is also a file. And for more advanced systems like K8s, I think you can specific a secret file to be plugged in as env variable 🤔 Just being curious! Thanks! |
Honestly you're right, I could just separate out all of my variables into a separate environment file the same way the secrets files work on my system. |
Removing sensitive items from my default .env means other containers won't see the variables. I could use an .env specifically for gluetun, but having separate files also lets me write to a file from command-line easily and change the value without messing around with nano. |
See #1348 (comment) I'll get to it soon. |
This is possible with |
Closed issues are NOT monitored, so commenting here is likely to be not seen. This is an automated comment setup because @qdm12 is the sole maintainer of this project |
What's the feature? 🧐
Allow
WIREGUARD_PRIVATE_KEY
to be specified via a Docker Compose secret file.Optional extra information 🚀
I usually like to do this so I can have any sensitive data I'd normally put in my docker-compose file in a permission controlled directory.
The text was updated successfully, but these errors were encountered: