-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hide External API Keys #1054
Hide External API Keys #1054
Comments
From Amber 7/18: The one exception here is the use of local development on localhost:5000, which allows much more arbitrary usage than any of the dev/stage/prod apps. My suggestion for this, which I believe is currently viable, would be to: Remove localhost from the list of permitted URLs for the dev app (should ideally already not be allowed for stage and prod) |
@anthonypetersen @we-ai @JoeArmani Any thoughts on Amber's proposed solution for our external keys? (i.e. those keys which are not possible to put in a secret.) |
sounds like a plan to me |
I agree this sounds like a good plan for Firebase keys. |
I agree that it's fine to keep Firebase API keys in repos, based on reasons mentioned. |
I'm not entirely sure that's the case for the dev environment, which is hosted as a GitHub site. While it's possible to provide environment variables to GitHub, the file built with them would, in my research, still need to be uploaded to the GitHub branch from which the site is built. |
Yes, dev site files are in GitHub. Not sure whether they'll be moved to GCP or not. |
The long term plan is to move dev into a GCP environment |
The local dev key work is now done. I'm planning to time revocation of localhost access for the dev key for the next prod release. |
Creating an issue to track work and progress.
The text was updated successfully, but these errors were encountered: