-
After running the installation instructions, there appears to be two files containing secrets. Neither of which is in the gitignore and one of which is already versioned:
Both of these files contain sensitive data that should not appear in version control histories (including tokens and passwords). These files should not be versioned for security reasons, in addition, I suggest splitting the data into two files, one which is safe to version and one which is not. |
Beta Was this translation helpful? Give feedback.
Replies: 5 comments
-
I propose even a step farther - not having .env at all in the codebase (.env.example, sure), but rather base64 encoding the .env file into the github secrets manager for a specific environment, and loading it up during github actions. |
Beta Was this translation helpful? Give feedback.
-
Would some of this be mitigated with I too am confused as to why |
Beta Was this translation helpful? Give feedback.
-
...I think I see why Another option: use Edit: This option does make |
Beta Was this translation helpful? Give feedback.
-
Indeed, the idea is that you can continue and modify the project as you see fit, storing passwords and secrets in any system you choose for deployments. But that's something I can't decide and enforce for others, just the starting point. There are many alternatives to handle this, but there's no single obvious one that would work for all use cases, so I would consider it out of scope for this project, at least for now. |
Beta Was this translation helpful? Give feedback.
-
After generating a project from this template (using I get not wanting to be prescriptive about what system is used for secrets management and deployment, but I don't think that making the project insecure by default is the right answer. The project readme barely mentions anything regarding this (which is a stretch to even infer that the
By the same logic, there are also a lot of source control technologies that one might consider using (e.g. Subversion, Mercurial, etc.), yet this project assumes that you're using Git (i.e. generates a So, if we are going to assume you're using Git, we should at least go ahead and have the generated project be set up with some sort of standard secure secrets managements mechanism. Having the We should be taking an approach of being secure by default rather than expecting users to notice and adopt it themselves. At the very least, this should be explicitly called out in the readme and be part of the initial setup steps to have users address it themselves before they potentially push their code to a remote. |
Beta Was this translation helpful? Give feedback.
Indeed, the idea is that you can continue and modify the project as you see fit, storing passwords and secrets in any system you choose for deployments. But that's something I can't decide and enforce for others, just the starting point. There are many alternatives to handle this, but there's no single obvious one that would work for all use cases, so I would consider it out of scope for this project, at least for now.