-
Notifications
You must be signed in to change notification settings - Fork 574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please implement secret for password #268
Comments
As mentioned in #46 (comment), I think the best solution here would be an "ACL file" (https://redis.io/topics/acl#using-an-external-acl-file) as a secret. If you don't want to use ACLs and want instead to use the older Either way, this isn't something we plan to implement additional behavior in the Docker image for, so if the provided solutions and workarounds are not sufficient for your use case, I'd suggest making a case upstream for Redis itself to include more file-related functionality. |
Ok, too bad |
Any instruction on how to use ACL as a secret?
EDIT: I think I figured it out users.acl:
redis.conf (note: incomplete; these are just the modifications I found were required):
docker-compose.yml secrets:
ACL_SECRET_NAME:
- ./users.acl
services:
redis:
image: redis:alpine
container_name: redis
secrets:
- ACL_SECRET_NAME
command: redis-server /usr/local/etc/redis/redis.conf
volumes:
- ./redis.conf:/usr/local/etc/redis/redis.conf |
The title should be explicit enough: for security reasons, it would be better to use a
secret
.Secrets don't require
docker swarm
, so why not allow this ?A docker-compose would look like this:
A current hacky workaround is detailed here.
The text was updated successfully, but these errors were encountered: