[Feature Request] Load service credentials from Kubernetes secret #2685
Replies: 4 comments 1 reply
-
Based on the context provided, it seems you are looking for a way to securely manage secrets for service widgets in a Kubernetes environment, without exposing sensitive information in your Git repository. As of the information available up to the knowledge cutoff date, Homepage does not natively support Kubernetes Secrets for service widget configuration. However, there are general practices you can follow to manage secrets securely in Kubernetes:
For your specific case, you would need to modify your application to support reading configuration values from environment variables or files that are populated from Kubernetes Secrets at runtime. This would prevent the need to store sensitive information directly in your Git repository. Please note that any changes to the application code or deployment strategy to support Kubernetes Secrets would need to be done by the maintainers of the Homepage project or by forking the project and making the necessary modifications yourself. Remember to follow best practices for secret management, such as limiting access to secrets, using least privilege principles, and regularly rotating secrets. If you are not the maintainer of the Homepage project, you may want to reach out to the project's maintainers to request this feature or to inquire about the best way to handle secrets for service widgets in a Kubernetes environment. Thanks for posting a discussion about homepage here on GitHub. Homepage now uses a fancy new AI tool thanks to our friends at Glime, so the answer above is the AI bot's attempt to answer your question. If you feel it's sufficient you can mark the answer and close this post, otherwise feel free to leave it open of course! Thanks for using Homepage! ❤️ |
Beta Was this translation helpful? Give feedback.
-
I too am struggling with passing my secrets into Kubernetes. Does anyone have any advice, or can point to any examples in github? |
Beta Was this translation helpful? Give feedback.
-
This discussion has been automatically closed due to lack of community support. See our contributing guidelines for more details. |
Beta Was this translation helpful? Give feedback.
-
This discussion has been automatically locked since there has not been any recent activity after it was closed. Please open a new discussion for related concerns. See our contributing guidelines for more details. |
Beta Was this translation helpful? Give feedback.
-
Description
When using service widgets, the configuration requires me to pass api keys or passwords, for example
key: apikeyapikeyapikeyapikeyapikey
for Emby as documented here.I've been trying my hardest to harden my secret management, but because I store everything in Git, this exposes all my passwords. Would it be possible to store the passwords in a Kubernetes Secret and pass the secret to the configuration?
Other
No response
Beta Was this translation helpful? Give feedback.
All reactions