Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Secure Speech Service Key/Region #101

Closed
1 of 2 tasks
hunterjam opened this issue Dec 11, 2023 · 4 comments · Fixed by #697
Closed
1 of 2 tasks

Secure Speech Service Key/Region #101

hunterjam opened this issue Dec 11, 2023 · 4 comments · Fixed by #697
Assignees
Labels
enhancement New feature or request

Comments

@hunterjam
Copy link
Collaborator

hunterjam commented Dec 11, 2023

Motivation

Ensure sensitive credentials cannot be exposed. We are currently returning the Azure Speech Key from the /api/config endpoint in plain text

@app.route("/api/config", methods=["GET"])
def get_config():
# Return the configuration data as JSON
return jsonify(
{
"azureSpeechKey": env_helper.AZURE_SPEECH_KEY,
"azureSpeechRegion": env_helper.AZURE_SPEECH_SERVICE_REGION,
}
)

How would you feel if this feature request was implemented?

secure

Requirements

Tasks

To be filled in by the engineer picking up the issue

@ross-p-smith
Copy link
Collaborator

The solution now has KeyVault - should this be utilised?

@adamdougal
Copy link
Collaborator

adamdougal commented Mar 12, 2024

The solution now has KeyVault - should this be utilised?

Looks like we are now using Key Vault. I think this is more that the key is returned in plain text from the /api/config end point 😬

@app.route("/api/config", methods=["GET"])
def get_config():
# Return the configuration data as JSON
return jsonify(
{
"azureSpeechKey": env_helper.AZURE_SPEECH_KEY,
"azureSpeechRegion": env_helper.AZURE_SPEECH_SERVICE_REGION,
}
)

I'll reword the issue to be clearer.

@superhindupur
Copy link
Collaborator

@cecheta
Copy link
Collaborator

cecheta commented Apr 16, 2024

After discussing with the team, it has been decided to remove the /api/config endpoint entirely, as there is no requirement for the endpoint, and to have the endpoint while also masking secrets is non-trivial.

If such a requirement arises, the endpoint may be added back to the application.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants