[PR #5235] [CLOSED] feat: support _FILE variant for ACTUAL_OPENID_CLIENT_SECRET #5835

Closed
opened 2026-02-28 21:19:31 -06:00 by GiteaMirror · 0 comments
Owner

📋 Pull Request Information

Original PR: https://github.com/actualbudget/actual/pull/5235
Author: @ghost
Created: 6/25/2025
Status: Closed

Base: masterHead: add_secrets_file_support


📝 Commits (9)

  • c3dbee2 feat: support _FILE variant for ACTUAL_OPENID_CLIENT_SECRET
  • 87359f4 Merge branch 'master' into add_secrets_file_support
  • 6e33ccf Merge branch 'master' into add_secrets_file_support
  • 980361e Merge branch 'master' into add_secrets_file_support
  • b7c2c91 Merge branch 'master' into add_secrets_file_support
  • a8c01bb Merge branch 'master' into add_secrets_file_support
  • 9cb341c Merge branch 'master' into add_secrets_file_support
  • 0fe4839 note
  • d5d6fd1 Merge branch 'master' into add_secrets_file_support

📊 Changes

2 files changed (+24 additions, -0 deletions)

View changed files

📝 packages/sync-server/src/load-config.js (+18 -0)
upcoming-release-notes/5235.md (+6 -0)

📄 Description

Fixes #5233

Adds support for a _FILE variant of ACTUAL_OPENID_CLIENT_SECRET for better Docker secret management. Reads secret value from file if the _FILE env var is set. This will overwrite other settings of the secret through config.json or the ACTUAL_OPENID_CLIENT_SECRET environment variable.

The function was written somewhat generically to allow further expansion, but as no other secrets are exposed through variables only ACTUAL_OPENID_CLIENT_SECRET was given a _FILE overwrite.

To test, simply append this line after the function is invoked.
console.log('[DEBUG] Loaded OIDC secret:', configSchema.get('openId.client_secret'));
Output should be the contents of the file.

Release Notes

Type: Enhancements
Username(s): tim_connect
PR Number: #5235
Summary:
This PR adds support for reading the OpenID client secret from a file using the ACTUAL_OPENID_CLIENT_SECRET_FILE environment variable. This enables better handling of secrets in Docker and Kubernetes environments.

If both ACTUAL_OPENID_CLIENT_SECRET and ACTUAL_OPENID_CLIENT_SECRET_FILE are set, the _FILE variant takes precedence.


🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.

## 📋 Pull Request Information **Original PR:** https://github.com/actualbudget/actual/pull/5235 **Author:** [@ghost](https://github.com/ghost) **Created:** 6/25/2025 **Status:** ❌ Closed **Base:** `master` ← **Head:** `add_secrets_file_support` --- ### 📝 Commits (9) - [`c3dbee2`](https://github.com/actualbudget/actual/commit/c3dbee259814725b4c557d08323c1993831f52b2) feat: support _FILE variant for ACTUAL_OPENID_CLIENT_SECRET - [`87359f4`](https://github.com/actualbudget/actual/commit/87359f4200ac18adae58e3d576270aea40990628) Merge branch 'master' into add_secrets_file_support - [`6e33ccf`](https://github.com/actualbudget/actual/commit/6e33ccfc784d20c5b88cadf51d4e97cf31e3bf98) Merge branch 'master' into add_secrets_file_support - [`980361e`](https://github.com/actualbudget/actual/commit/980361e6f787699700ea802c21a8787a8fab3c94) Merge branch 'master' into add_secrets_file_support - [`b7c2c91`](https://github.com/actualbudget/actual/commit/b7c2c91704bff3e12b69e7fcbfa11a8197a921a4) Merge branch 'master' into add_secrets_file_support - [`a8c01bb`](https://github.com/actualbudget/actual/commit/a8c01bbb5e3b2955b6b950b2f57f04de5eb6cb53) Merge branch 'master' into add_secrets_file_support - [`9cb341c`](https://github.com/actualbudget/actual/commit/9cb341c4a2ebc78978cc4c34eaebfc5152338e33) Merge branch 'master' into add_secrets_file_support - [`0fe4839`](https://github.com/actualbudget/actual/commit/0fe4839680b72fd8c970786f132c52038f2bbf4b) note - [`d5d6fd1`](https://github.com/actualbudget/actual/commit/d5d6fd15dc96d764a8305c27da944ae910d7523e) Merge branch 'master' into add_secrets_file_support ### 📊 Changes **2 files changed** (+24 additions, -0 deletions) <details> <summary>View changed files</summary> 📝 `packages/sync-server/src/load-config.js` (+18 -0) ➕ `upcoming-release-notes/5235.md` (+6 -0) </details> ### 📄 Description Fixes #5233 Adds support for a _FILE variant of ACTUAL_OPENID_CLIENT_SECRET for better Docker secret management. Reads secret value from file if the _FILE env var is set. This will overwrite other settings of the secret through config.json or the ACTUAL_OPENID_CLIENT_SECRET environment variable. The function was written somewhat generically to allow further expansion, but as no other secrets are exposed through variables only ACTUAL_OPENID_CLIENT_SECRET was given a _FILE overwrite. To test, simply append this line after the function is invoked. ```console.log('[DEBUG] Loaded OIDC secret:', configSchema.get('openId.client_secret'));``` Output should be the contents of the file. ## Release Notes Type: Enhancements Username(s): tim_connect PR Number: #5235 Summary: This PR adds support for reading the OpenID client secret from a file using the `ACTUAL_OPENID_CLIENT_SECRET_FILE` environment variable. This enables better handling of secrets in Docker and Kubernetes environments. If both `ACTUAL_OPENID_CLIENT_SECRET` and `ACTUAL_OPENID_CLIENT_SECRET_FILE` are set, the `_FILE` variant takes precedence. --- <sub>🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.</sub>
GiteaMirror added the pull-request label 2026-02-28 21:19:31 -06:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: github-starred/actual#5835