IBM Cloud Functions - Securing API keys & Passwords inside Functions / node.js

267 Views Asked by At

I got some Node.js code in an IBM Cloud Function. I have enabled it as a web action and the function is called via webhook from Watson Assistant.

Is it safe to have my API keys and other passwords inside the IBM Cloud Function as readable text? Or how should I refer to the Keys and passwords?

Here are two excerpts as examples:

function main(params) {
    if (params.actionJoke == 'joke') {
        const optionsDad = {
            method: "GET",
            uri: "https://dad-jokes.p.rapidapi.com/random/joke",
            json: true,
            "resolveWithFullResponse": true,

            "headers": {
                "x-rapidapi-host": "dad-jokes.p.rapidapi.com",
                "x-rapidapi-key": "myapiCODEgoesHERE",
                "useQueryString": true
            }

With this first example, I was able to use params.apiKey instead of the literal key. And I defined the Parameter in the left menu 'parameters'. But I don't know if this is better or worse in terms of security?

However, for my second example, this method doesn't work. Or at least I don't know how to do it semantically correctly.

let smtpConfig = {
    host: 'mail.myz.net',
    port: 122,
    secure: false, // use TLS
    auth: {
        user: '[email protected]', 
        pass: 'mypassword'
    }
1

There are 1 best solutions below

1
On BEST ANSWER

The way to work with secrets is to bind them to actions or packages. You can bind services to the functions or arbitrary credentials.

I recommend my blog on enhancing security by rotating service credentials which has a section on Cloud Functions using the __bx_creds environment object.

See this file from a tutorial how the credentials are accessed in the action from the environment.