Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Removing rails secrets facilities from RMT #1065

Merged
merged 1 commit into from
Jan 4, 2024

Conversation

josegomezr
Copy link
Contributor

Description

RMT does not use any secret facility (key derivation for singing or encrypting data), yet rails requires a valid configuration for this to boot fine.

This is now removed and hardcoded a dummy secret key base in case any other component within the rails stack tries to derivate a key.

Further helps #1064

Change Type

  • Bug Fix (a non-breaking change which fixes an issue)
  • New Feature (a non-breaking change which adds new functionality)
  • Documentation Update (a change which only updates documentation)

Checklist

  • I have verified that my code follows RMT's coding standards with rubocop.
  • I have reviewed my own code and believe that it's ready for an external review.
  • I have provided comments for any hard-to-understand code.
  • I have documented the MANUAL.md file with any changes to the user experience.
  • RMT's test coverage remains at 100%.
  • If my changes are non-trivial, I have added a changelog entry to notify users at package/obs/rmt-server.changes.

Other Notes

Please use this space to provide notes or thoughts to the team, such as tips on how to review/demo your changes.

@josegomezr josegomezr force-pushed the remove_unused_secrets_yml branch from 6228758 to 15d45d2 Compare January 4, 2024 15:27
@josegomezr josegomezr force-pushed the remove_unused_secrets_yml branch from 15d45d2 to 7a28d1d Compare January 4, 2024 15:35
- RMT does not use any secret facility (key derivation for singing
  or encrypting data), yet rails requires a valid configuration for
  this to boot fine.

  This is now removed and hardcoded a dummy secret key base in case
  any other component within the rails stack tries to derivate a
  key.
@josegomezr josegomezr force-pushed the remove_unused_secrets_yml branch from 7a28d1d to 5ea6b32 Compare January 4, 2024 16:17
@SUSE SUSE deleted a comment from suse-tests-fail Jan 4, 2024
@suse-tests-pass
Copy link
Collaborator

Well Done! Your tests are still passing.
https://ci.suse.de/job/scc-RMT-integration-tests/351590/console
If the given link has expired,you can force a Prophet rerun by just deleting this comment. (Merged 5ea6b32 into 9f151f0)

@josegomezr josegomezr merged commit 4926fb9 into master Jan 4, 2024
3 checks passed
@josegomezr josegomezr deleted the remove_unused_secrets_yml branch January 4, 2024 16:58
@felixsch felixsch mentioned this pull request Jan 4, 2024
9 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants