Skip to content

Conversation

@Siumauricio
Copy link
Contributor

@Siumauricio Siumauricio commented Jan 21, 2026

…pport

  • Introduced a function to read database credentials from a file for improved security.
  • Added support for environment variables to configure database connection, replacing hardcoded values.
  • Implemented a warning for users relying on deprecated hardcoded credentials, encouraging migration to Docker Secrets.

What is this PR about?

Please describe in a short paragraph what this PR is about.

Checklist

Before submitting this PR, please make sure that:

Issues related (if applicable)

closes #3449

Screenshots (if applicable)

…pport

- Introduced a function to read database credentials from a file for improved security.
- Added support for environment variables to configure database connection, replacing hardcoded values.
- Implemented a warning for users relying on deprecated hardcoded credentials, encouraging migration to Docker Secrets.
@Siumauricio Siumauricio linked an issue Jan 21, 2026 that may be closed by this pull request
@Siumauricio Siumauricio merged commit b902c16 into canary Jan 21, 2026
4 checks passed
@Siumauricio Siumauricio deleted the 3449-security-hardcoded-token-authentication-for-a-postgres-db branch January 21, 2026 12:32
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

security: Hardcoded Token Authentication for a Postgres DB

2 participants