-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
Secrets configurable via environment variables #7758
Comments
I store all the secrets Synapse requires in |
Possibly. I haven't seen any documentation of that, nor can I find a reference file in my docker image so I'm not sure on the usage of the file. |
I don't know whether any of the Docker images will point Synapse to a config fragment directory; I run Synapse via systemd. |
@auscompgeek I suspect this was a more general question of "what's in your secrets.yaml vs. the other files to get this to work?" I don't think this is a Synapse specific question though. |
you can specify a directory on the synapse commandline:
Note:
Synapse will merge together any config files it will find. Suggestions as to where this could be documented that people would find it are welcome. I don't think the default |
It is not currently planned to make Synapse support environment variables for configuration, and is likely not desirable as it would make the configuration management of Synapse much more difficult to maintain. On top of that, as @richvdh mentioned, we already have a way to separate secrets from Synapse's main configuration file, which should make this less of an issue. Therefore I'm going to close this for now. |
Could I just weigh in as a synapse user running in docker, having environment variable support would greatly simplify the configuration of my deployment. I've been looking recently at some kind of file injection on startup of the container. But I'm really not a fan of this approach. An ideal solution for me would be some kind of opt-in default yaml, which I can override specific variables I need with environment variables. |
@Georift: see #5518 (comment) |
No worries, I see there are other motives. Thanks for the reply. |
Some of the secrets should really be made to take a filepath, then you For instance, |
Description:
I would like to check my
homeserver.yaml
file into a version-control system, unfortunately since the file contains secrets for Synapse and the database I cannot do this without distributing secrets to insecure locations or setting up a system to replace tokens in my config to create a final config.Being able to configure all secrets that are currently in the
homeserver.yaml
file via environment variables would allow separation between secrets and config.The text was updated successfully, but these errors were encountered: