-
Notifications
You must be signed in to change notification settings - Fork 30
feat(queue)!: add priv/pub key signing #843
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
Merged
Changes from 1 commit
Commits
Show all changes
29 commits
Select commit
Hold shift + click to select a range
bd87a68
wip: queue item signing via asymm keys
plyr4 41a1bba
revert: docker-compose local changes
plyr4 70e9b23
wip: queue item signing via asymm keys
plyr4 2fcaf0c
wip: queue signing cleanup
plyr4 bae5946
fix: generate example keys
plyr4 203bdb7
tweak: env var naming
plyr4 43141ee
enhance: key validations
plyr4 ae70584
chore: comment wording
plyr4 ca19837
chore: merge with main
plyr4 e48fa44
chore: go mod tidy
plyr4 683e0a3
wip: nil return to allow read-only setup
plyr4 b1c4c48
chore: merge with main
plyr4 d9d7364
chore: add base64 encoded comment
plyr4 fc52931
chore: merge with main
plyr4 96f7bd5
fix: adding keys to redis test mocks
plyr4 67f4416
Merge branch 'main' into feat/queue-signing
plyr4 1324f55
Merge branch 'main' of github.com:go-vela/server into feat/queue-signing
plyr4 4786391
fix: do not allow empty signing keys
plyr4 448a95d
Merge branch 'main' into feat/queue-signing
plyr4 2c9d166
fix: lint
plyr4 346df6c
fix: lint
plyr4 00507fb
chore: add middleware tests
plyr4 0328180
Merge branch 'main' into feat/queue-signing
plyr4 7935fe5
Merge branch 'main' into feat/queue-signing
plyr4 c28b5d6
Merge branch 'main' into feat/queue-signing
ecrupper 37926a5
tweak: queue/redis/pop.go suggestion
plyr4 5815fe9
tweak: variable naming for queue keys
plyr4 5bf066b
tweak: cli variable naming for queue keys
plyr4 f24894c
Merge branch 'main' into feat/queue-signing
plyr4 File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
fix: do not allow empty signing keys
- Loading branch information
commit 4786391a3756166c3546546bd66d57414352fae7
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We don't expect base64 encoding in any of our other private keys (token manager, DB encryption). Is there a reason why we're going with this pattern here? Should this be standardized across all private keys?
Uh oh!
There was an error while loading. Please reload this page.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
good question, i used base64 here because the private/public keys i generated arent in unicode.
(using this process to make it easier: https://go.dev/play/p/-go_7SnJbnP)
base64 encoding them made it easy to copy+paste, store elsewhere, put into transit, easier handling.
for the other values in the server? id argue we should base64 anything that isnt in a format that is easy to handle.
though i think the other keys are fine because we recommend generating them using
-hexfrom a unicode-safe characterset.from docs
https://go-vela.github.io/docs/installation/server/docker/#step-4-create-the-private-key
so... honestly yeah we should base64 more, but for queue signing since hex isnt a valid way to generate the keypair it becomes more important to encode the pair.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cool, thanks for the explanation