Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Address Test Port final TMS fixes for rhel7 to master branch, phase 2… #4894

Merged
merged 1 commit into from
Nov 7, 2024

Conversation

jmagne
Copy link
Contributor

@jmagne jmagne commented Nov 5, 2024

…, RHCS-5403

This checkin coincides with the final sub task of porting the rhel7 tms to the master branch.

Once this code makes it to the testing phase, every feature present in the lastest version of the rhel7 tms system should be present in any releases taken from the master branch.

Add some more TPS CS.cfg comments for newer features.

Change-Id: I7c98ddeffafd912debb908c9efc7a6bb591807ee


if (tempKey == null) {
return createNoContentResponse();
}

logger.debug("TPSConnectorService.createSharedSecret. about to export shared secret : " + nickname + " certs.length " + certs.length);
logger.debug("TPSConnectorService.createSharedSecert cert: " + certs[certs.length -1]);
List<byte[]> listWrappedKeys = CryptoUtil.exportSharedSecret(nickname, certs[certs.length -1], tempKey, getUseOAEPKeyWrap());
List<byte[]> listWrappedKeys = CryptoUtil.exportSharedSecretWithAES(nickname, certs[certs.length -1], tempKey,getUseOAEPKeyWrap());
logger.debug("TPSConnectorService.createSharedSecret. done exporting shared secret : " + nickname);
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think the same fix should be applied to TPSConnectorProcessor.java because in the future we should move to rest v2.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

OK, thanks!

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Concern has been addressed in recent push.

@jmagne jmagne force-pushed the master-latest-tms branch from 040980b to 7eb6cb9 Compare November 5, 2024 18:25
Copy link

sonarqubecloud bot commented Nov 5, 2024

Quality Gate Failed Quality Gate failed

Failed conditions
3 Security Hotspots
C Reliability Rating on New Code (required ≥ A)

See analysis details on SonarCloud

Catch issues before they fail your Quality Gate with our IDE extension SonarLint

@jmagne jmagne force-pushed the master-latest-tms branch from 7eb6cb9 to 24978ad Compare November 5, 2024 22:32
…, RHCS-5403

This checkin coincides with the final sub task of porting the rhel7 tms to the master branch.

Once this code makes it to the testing phase, every feature present in the lastest version of the rhel7 tms
system should be present in any releases taken from the master branch.

Add some more TPS CS.cfg comments for newer features.
Fix tps docker test to include the cfg variable needed to allow tpsclient enrollments to complete.
Update call to CryptoUtil.exportSharedSecretWithAES in TPSConnectorProcessor.java to reflect change to
TPSConnectorService.java.

Addresss github code security concerns.
Change-Id: I7c98ddeffafd912debb908c9efc7a6bb591807ee
@jmagne jmagne force-pushed the master-latest-tms branch from 24978ad to 4796ced Compare November 6, 2024 19:23
@jmagne
Copy link
Contributor Author

jmagne commented Nov 6, 2024

Addressed the main test failures that I could control. About to merge.

@jmagne
Copy link
Contributor Author

jmagne commented Nov 7, 2024

Fixed TPS test issue and determined that all the other test failures are known issues. Merging.

@jmagne jmagne merged commit 847ddbc into dogtagpki:master Nov 7, 2024
157 of 167 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants