Improve Secrets Handling #32
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
References
https://docs.docker.com/engine/swarm/secrets/
https://docs.docker.com/compose/compose-file/compose-file-v3/#secrets
assigned to @Jafner
marked this issue as related to #34
mentioned in issue #36
Docker secrets might not be the right solution here. I use a cosmopolitan array of images, which means I cannot reasonably control whether the images themselves support secret-style file-based values for sensitive information.
https://stackoverflow.com/questions/52492359/docker-secrets-passing-as-environment-variable
So instead we'll add a gitignore entry for files matching
*_secrets.env
and manually remove already-tracked secrets.mentioned in commit
3804024435
mentioned in commit
ef7da5ce08
While this task is complete, we will also need to do one of the following:
I prefer the latter, as it preserves the valuable Git history. It also provides procedure experience for secret replacement.
Let's take inventory of the secrets used:
POSTGRES_PASSWORD
API_KEY
ADMIN_PASSWORD
,SECRET_KEY
KEYCLOAK_ADMIN_PASSWORD
CLIENT_SECRET
,SECRET
,ENCRYPTION_KEY
IPINFO_APIKEY
,PASSWORD
SABNZBD_APIKEYS
PLEX_CLAIM
PASSWORD
bc451b8d
PLEX_CLAIM
token expires after like 15 minutes. Only used for setup.Forwardauth
SECRET
is a simple encryption secret. Should be able to rotate without issue.ENCRYPTION_KEY
used to be calledSESSION_KEY
CLIENT_SECRET
comes from the Keycloak client. Rotate it in Keycloak and copy it to the forwardauth secrets file.SABNZBd
List of applications that might be using the SABNZBd API token:
API key has been rolled and each of the listed services have been updated.
ddclient.conf contains secret credentials.
Re-opening issue to determine how we can handle these credentials.
changed title from Imp{-lement Docker Secrets for sensitive information-} to Imp{+rove Secrets Handling+}
https://github.com/linuxserver/docker-ddclient/issues/44
Rotate these secrets:
And for handling secrets in ddclient.conf, we can use
envsubst
with addclient_secrets.env
file.mentioned in commit
dac3146ac0
mentioned in commit
57a5d95394
mentioned in issue #99
All described secrets have been rotated and removed from version control.