Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hide the secrets #159

Open
markdav-is opened this issue Dec 21, 2020 · 4 comments
Open

Hide the secrets #159

markdav-is opened this issue Dec 21, 2020 · 4 comments
Assignees

Comments

@markdav-is
Copy link
Member

please scan your code looking for any secrets that could allow folks to compromise airtable or any other data source. We have one read-only account API key that we use for the API. Beyond that no one should be using any personal api keys or other secrets. Secrets should never be checked into the repo on github or deployed as part of the app via javascript.

you might have to research how best to store secrets for your server platform of choice. mvp-studio and netlify bith have ways to manage secrets. managing secrets is a big part of developing and deploying software, I encourage everyone to take the time to research this topic and work together to find solutions.

@colindavey
Copy link
Contributor

I believe that the only Airtable key in our repo is the read-only one, which appears in scripts/dal.js. That's the only source-code file that communicates with Airtable. I also searched on the string "key, which should find all keys in the repo because the keys are strings that begin with "key", and the aforementioned one is the only one that turned up.

@markdav-is
Copy link
Member Author

thanks for doing that. It's nice to know that the airtable. key is read-only. You will still want to hide these secrets as a matter of course, but maybe not at this time for this project. Nobody is auditing you, so, no worries. If you want to keep this ticket alive you can, but I'm not too concerned either way.

@colindavey
Copy link
Contributor

BTW, I originally found the read-only key (months ago) in the API code, though it doesn't seem to be there at the moment, so I assume you or someone moved it into a secrets file. It may still be somewhere on github in older commits, not that it matters, since it's read-only.

@markdav-is
Copy link
Member Author

managing secrets a base features of your deployment platform of choice. You are currently publishing your dev branch on netlifty and you could keep secrets there: https://dev.to/thisdotmedia/build-your-backend-with-netlify-functions-in-20-minutes-2gc4 mvp-studio uses K8s https://kubernetes.io/docs/concepts/configuration/secret/ this is typicially tied in with your build process.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants