Skip to content

Commit

Permalink
build: Address LegacyKeyValueFormat Dockerfile warnings
Browse files Browse the repository at this point in the history
  • Loading branch information
filipdjokic committed Jan 22, 2025
1 parent fd4af0b commit 312ed4a
Showing 1 changed file with 37 additions and 37 deletions.
74 changes: 37 additions & 37 deletions docker/Dockerfile
Original file line number Diff line number Diff line change
Expand Up @@ -91,57 +91,57 @@ ARG STRIPE_PUBLISHABLE_KEY
ARG STRIPE_WEBHOOK_SECRET

Check warning on line 91 in docker/Dockerfile

View workflow job for this annotation

GitHub Actions / Build & Test / Build Docker image

Sensitive data should not be used in the ARG or ENV commands

SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ARG "STRIPE_WEBHOOK_SECRET") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

# Environment variables: base configuration
ENV NPM_CONFIG_LOGLEVEL ${NPM_CONFIG_LOGLEVEL}
ENV PORT ${PORT}
ENV NPM_CONFIG_LOGLEVEL=${NPM_CONFIG_LOGLEVEL}
ENV PORT=${PORT}

# Environment variables: network API endpoints
ENV MAINNET_RPC_URL ${MAINNET_RPC_URL}
ENV TESTNET_RPC_URL ${TESTNET_RPC_URL}
ENV RESOLVER_URL ${RESOLVER_URL}
ENV APPLICATION_BASE_URL ${APPLICATION_BASE_URL}
ENV MAINNET_RPC_URL=${MAINNET_RPC_URL}
ENV TESTNET_RPC_URL=${TESTNET_RPC_URL}
ENV RESOLVER_URL=${RESOLVER_URL}
ENV APPLICATION_BASE_URL=${APPLICATION_BASE_URL}

# Environment variables: Veramo Database configuration
ENV ENABLE_EXTERNAL_DB ${ENABLE_EXTERNAL_DB}
ENV EXTERNAL_DB_CONNECTION_URL ${EXTERNAL_DB_CONNECTION_URL}
ENV EXTERNAL_DB_ENCRYPTION_KEY ${EXTERNAL_DB_ENCRYPTION_KEY}
ENV EXTERNAL_DB_CERT ${EXTERNAL_DB_CERT}
ENV ENABLE_EXTERNAL_DB=${ENABLE_EXTERNAL_DB}
ENV EXTERNAL_DB_CONNECTION_URL=${EXTERNAL_DB_CONNECTION_URL}
ENV EXTERNAL_DB_ENCRYPTION_KEY=${EXTERNAL_DB_ENCRYPTION_KEY}
ENV EXTERNAL_DB_CERT=${EXTERNAL_DB_CERT}

# Environment variables: LogTo
ENV ENABLE_AUTHENTICATION ${ENABLE_AUTHENTICATION}
ENV LOGTO_ENDPOINT ${LOGTO_ENDPOINT}
ENV LOGTO_DEFAULT_RESOURCE_URL ${LOGTO_DEFAULT_RESOURCE_URL}
ENV LOGTO_APP_ID ${LOGTO_APP_ID}
ENV LOGTO_APP_SECRET ${LOGTO_APP_SECRET}
ENV CORS_ALLOWED_ORIGINS ${CORS_ALLOWED_ORIGINS}
ENV COOKIE_SECRET ${COOKIE_SECRET}
ENV LOGTO_M2M_APP_ID ${LOGTO_M2M_APP_ID}
ENV LOGTO_M2M_APP_SECRET ${LOGTO_M2M_APP_SECRET}
ENV LOGTO_MANAGEMENT_API ${LOGTO_MANAGEMENT_API}
ENV LOGTO_TESTNET_ROLE_ID ${LOGTO_TESTNET_ROLE_ID}
ENV LOGTO_DEFAULT_ROLE_ID ${LOGTO_DEFAULT_ROLE_ID}
ENV LOGTO_MAINNET_ROLE_ID ${LOGTO_MAINNET_ROLE_ID}
ENV LOGTO_WEBHOOK_SECRET ${LOGTO_WEBHOOK_SECRET}
ENV LOG_LEVEL ${LOG_LEVEL}
ENV ENABLE_AUTHENTICATION=${ENABLE_AUTHENTICATION}
ENV LOGTO_ENDPOINT=${LOGTO_ENDPOINT}
ENV LOGTO_DEFAULT_RESOURCE_URL=${LOGTO_DEFAULT_RESOURCE_URL}
ENV LOGTO_APP_ID=${LOGTO_APP_ID}
ENV LOGTO_APP_SECRET=${LOGTO_APP_SECRET}
ENV CORS_ALLOWED_ORIGINS=${CORS_ALLOWED_ORIGINS}
ENV COOKIE_SECRET=${COOKIE_SECRET}
ENV LOGTO_M2M_APP_ID=${LOGTO_M2M_APP_ID}
ENV LOGTO_M2M_APP_SECRET=${LOGTO_M2M_APP_SECRET}
ENV LOGTO_MANAGEMENT_API=${LOGTO_MANAGEMENT_API}
ENV LOGTO_TESTNET_ROLE_ID=${LOGTO_TESTNET_ROLE_ID}
ENV LOGTO_DEFAULT_ROLE_ID=${LOGTO_DEFAULT_ROLE_ID}
ENV LOGTO_MAINNET_ROLE_ID=${LOGTO_MAINNET_ROLE_ID}
ENV LOGTO_WEBHOOK_SECRET=${LOGTO_WEBHOOK_SECRET}

Check warning on line 123 in docker/Dockerfile

View workflow job for this annotation

GitHub Actions / Build & Test / Build Docker image

Sensitive data should not be used in the ARG or ENV commands

SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "LOGTO_WEBHOOK_SECRET") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
ENV LOG_LEVEL=${LOG_LEVEL}

# API generatioin
ENV API_KEY_EXPIRATION ${API_KEY_EXPIRATION}
ENV API_KEY_EXPIRATION=${API_KEY_EXPIRATION}

# Faucet setup
ENV ENABLE_ACCOUNT_TOPUP ${ENABLE_ACCOUNT_TOPUP}
ENV FAUCET_URI ${FAUCET_URI}
ENV TESTNET_MINIMUM_BALANCE ${TESTNET_MINIMUM_BALANCE}
ENV ENABLE_ACCOUNT_TOPUP=${ENABLE_ACCOUNT_TOPUP}
ENV FAUCET_URI=${FAUCET_URI}
ENV TESTNET_MINIMUM_BALANCE=${TESTNET_MINIMUM_BALANCE}

# Environment variables: Verida connector
ENV ENABLE_VERIDA_CONNECTOR ${ENABLE_VERIDA_CONNECTOR}
ENV POLYGON_RPC_URL ${POLYGON_RPC_URL}
ENV VERIDA_PRIVATE_KEY ${VERIDA_PRIVATE_KEY}
ENV POLYGON_PRIVATE_KEY ${POLYGON_PRIVATE_KEY}
ENV ENABLE_VERIDA_CONNECTOR=${ENABLE_VERIDA_CONNECTOR}
ENV POLYGON_RPC_URL=${POLYGON_RPC_URL}
ENV VERIDA_PRIVATE_KEY=${VERIDA_PRIVATE_KEY}

Check warning on line 137 in docker/Dockerfile

View workflow job for this annotation

GitHub Actions / Build & Test / Build Docker image

Sensitive data should not be used in the ARG or ENV commands

SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "VERIDA_PRIVATE_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/
ENV POLYGON_PRIVATE_KEY=${POLYGON_PRIVATE_KEY}

Check warning on line 138 in docker/Dockerfile

View workflow job for this annotation

GitHub Actions / Build & Test / Build Docker image

Sensitive data should not be used in the ARG or ENV commands

SecretsUsedInArgOrEnv: Do not use ARG or ENV instructions for sensitive data (ENV "POLYGON_PRIVATE_KEY") More info: https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/

# Environment variables: Stripe
ENV STRIPE_SECRET_KEY ${STRIPE_SECRET_KEY}
ENV STRIPE_PUBLISHABLE_KEY ${STRIPE_PUBLISHABLE_KEY}
ENV STRIPE_WEBHOOK_SECRET ${STRIPE_WEBHOOK_SECRET}
ENV STRIPE_ENABLED ${STRIPE_ENABLED}
ENV STRIPE_SECRET_KEY=${STRIPE_SECRET_KEY}
ENV STRIPE_PUBLISHABLE_KEY=${STRIPE_PUBLISHABLE_KEY}
ENV STRIPE_WEBHOOK_SECRET=${STRIPE_WEBHOOK_SECRET}
ENV STRIPE_ENABLED=${STRIPE_ENABLED}

# Set ownership permissions
RUN chown -R node:node /home/node/app
Expand Down

0 comments on commit 312ed4a

Please sign in to comment.