feat: Add ability to load secrets from files #276
Draft
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Overview
Adds the ability to load secret values from files. These environment variables follow the existing environment variable names except with a
_FILE
suffix.COUCHDB_ERLANG_COOKIE_FILE
COUCHDB_SECRET_FILE
COUCHDB_USER_FILE
COUCHDB_PASSWORD_FILE
These environment variables are expected to be paths of projected secret values into the container.
These environment variables are only used if the existing environment variables are not provided IE if a user specifies
COUCHDB_SECRET
thenCOUCHDB_SECRET_FILE
will be ignored.The existing logic of hydrating the docker.ini file has been extracted to functions and re-used with the values loaded from the secret files.
Testing recommendations
TODO
GitHub issue number
Fixes #256
Related Pull Requests
Checklist