Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

馃懛 Clean up secrets and connection strings #122

Open
1 of 5 tasks
jackreimers opened this issue Aug 24, 2023 · 6 comments
Open
1 of 5 tasks

馃懛 Clean up secrets and connection strings #122

jackreimers opened this issue Aug 24, 2023 · 6 comments
Assignees
Labels
Type: DevOps Setting up of DevOps processes e.g. GitHub Actions, Azure DevOps Pipelines etc

Comments

@jackreimers
Copy link
Contributor

jackreimers commented Aug 24, 2023

Cc: @matt-goldman

Hi

Pain

Currently there are secrets being stored in appsettings.json and in configuration variables in Azure.
This is making setup of development environments confusing and means secrets are stored in the incorrect place.

Suggested Solution

Remove the secrets from appsettings.json and have them stored in secrets.json instead.
Any secrets in Azure config variables should be moved to Key Vault or Connection Strings.
The GitHub action to deploy to Azure should deploy the secrets to KeyVault.

Tasks

  • Move secrets from appsettings.json to secrets.json (ensure appsettings.json is committed to source control)
  • Add a Key Vault reference in app service configuration.
  • Move connection strings to connection strings in Azure.
  • Add secrets into Keeper so other developers can access them without needing to ask someone.
  • Update project setup documentation (README.md)

Acceptance Criteria

There should be no secrets stored outside of secrets.json in the project and they should be properly stored in Azure.

Thanks!

@jackreimers jackreimers added the Type: DevOps Setting up of DevOps processes e.g. GitHub Actions, Azure DevOps Pipelines etc label Aug 24, 2023
@jackreimers jackreimers self-assigned this Aug 24, 2023
@jackreimers
Copy link
Contributor Author

As per my discussion with @brydeno we are going to leave the GPT API key and database connection string as is because this would be better done as an infrastructure as code deployment and there is no secret data in the database or API key.

@matt-goldman
Copy link

Hi @jackreimers and @brydeno - I disagree about this:

there is no secret data in the database or API key.

While this is true for now, we are locking the GPT4 API key behind an authentication wall. It may not necessarily protect secret data, but it has a cost implication that needs to be protected.

I do agree with this:

this would be better done as an infrastructure as code deployment

Does that not mean that's what we should do, rather than leaving things as they are?

@jackreimers
Copy link
Contributor Author

As per my conversation with @calumjs we are going to prioritise getting Identity Server implemented and come back to this at a later date.

@matt-goldman
Copy link

FYI, see: https://github.com/orgs/SSWConsulting/discussions/24

@bradystroud
Copy link
Member

@jackreimers any update?
This ones getting stale...

@jackreimers
Copy link
Contributor Author

@bradystroud this will be resolved by #32 which is currently blocked

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Type: DevOps Setting up of DevOps processes e.g. GitHub Actions, Azure DevOps Pipelines etc
Projects
None yet
Development

No branches or pull requests

3 participants