-
-
Notifications
You must be signed in to change notification settings - Fork 4.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
don't put key auth data in public config.js #631
Comments
Even better in environment variables or passed as command line arguments |
@langpavel in some instances, it's possible to see the arguments that were used when starting a process so environment vars aren't always the best answer. Not sure what's right here. |
FYI, the And if you need to extract some data from this config for use in the client-side code, you can do it in |
@koistya Good catch! I will prepare PR because I violate this myself. |
#633 Prevent config to be bundled in client |
I think koistya's solution is a good extra layer of prevention. |
@tomByrer thank you very much for crating this issue! Unfortunately, we have close it due to inactivity. Feel free to re-open it or join our Discord channel for discussion. NOTE: The |
I think having
config.js
is a good idea, & should stay part of the git repo (eg not in .gitignore.But correct me if I'm wrong, isn't the social login
id
&secret
private information? So should they be in a separate file (eg secrets.js) & that file be added to.gitignore
so people don't accidentally upload their secretes?The text was updated successfully, but these errors were encountered: