Docker secrets
Quentin McGaw edited this page Aug 13, 2022
·
2 revisions
Pages 70
Table of content
Home
Setup
- Prerequisites
- Providers
- Connect a container to gluetun
- Connect a LAN device to gluetun
- Port mapping
- Wireguard
- Inter-containers networking
- Test your setup (optional)
- Docker image tags
Advanced setup
- VPN options
- OpenVPN options
- VPN server port forwarding
- Shadowsocks options
- HTTP proxy options
- Firewall options
- DNS options
- HTTP control server
- HTTP control server options
- Outdated servers
- Updating servers
- Docker secrets
- OpenVPN configuration file
- Health options
- Other options
FAQ
- Firewall
- Healthcheck
- TUN device errors
- Iptables errors
- Routing errors
- OpenVPN errors
- Bandwidth speeds
- Explanations
Contributing
Other pages referenced
Clone this wiki locally
If you use Docker Compose or Docker Swarm, you can optionally use Docker secret files for all sensitive values such as your Openvpn credentials, instead of using environment variables.
The following secrets can be used:
openvpn_useropenvpn_passwordopenvpn_clientkeyopenvpn_encrypted_keyopenvpn_key_passphraseopenvpn_clientcrthttpproxy_userhttpproxy_passwordshadowsocks_password
Note that you can change the secret file path in the container by changing the environment variable in the form <capitalizedSecretName>_SECRETFILE.
For example, OPENVPN_PASSWORD_SECRETFILE defaults to /run/secrets/openvpn_password which you can change.