Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace md5 with sha256 algorithm #9021

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

IvanChalukov
Copy link

Changes proposed by this PR

closes #9020

Switching md5 algorithm to sha256 across the code base and add migration for database naming convention.

  • done

Notes to reviewer

Tested on FIPS compliant database and on already existing database.

Release Note

  • Switches md5 algorithm to sha256 across the code base
  • Renames database related entries from md5 to sha256 suffix

Signed-off-by: IvanChalukov <ichalukov@gmail.com>
@IvanChalukov IvanChalukov requested a review from a team as a code owner November 1, 2024 13:47
Copy link

@Kump3r Kump3r left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have tested something really similar, due to my closed issue #9007. I tried with FIPS and non FIPS compliant databases, both worked like a charm locally and on my bosh environment. When having multiple webs in rolling update, I can see some temporary trouble, due to the first web migrating the data and the second still working with md5 columns, but that is expected with such migrations. The other way would be to not rename the columns at all, since they are used for UID from what I can gather. But that wouldn’t be okay imho. Looks good to me, good job!

@Kump3r
Copy link

Kump3r commented Nov 4, 2024

The validations are currently failing due to check comment. Once the issue is fixed in upstream, or the module is reverted, we will recheck.

@Kump3r
Copy link

Kump3r commented Nov 5, 2024

@taylorsilva since the PR resource uses the broken base at the moment still and I don't have permissions to recreate the version, what is the procedure, so we can trigger the PR validations with the correct base? Thanks!

Edit: clear resource cache seem to do the trick I guess

@taylorsilva
Copy link
Member

@Kump3r it's fixed now, so you should be unblocked

@Kump3r
Copy link

Kump3r commented Nov 5, 2024

Yes, just the failing PR's with this error need to clear the cache of the resource, since otherwise it will not fetch the new base. Btw I am not sure if bug is the correct label for such a PR, feel free to adjust as necessary 😅

@taylorsilva
Copy link
Member

Haven't had a chance to review this. Happy to see all the test passed though! I think this should go into a minor release version since it's a big change. Will definitely take this in once I have time to review it.

@taylorsilva taylorsilva added this to the v7.13.0 milestone Dec 4, 2024
@taylorsilva
Copy link
Member

Just making a note: one concern I have is how long will the migration take on a large Concourse database? I'm reminded of #8499 which takes 30mins on a large database.

I sadly don't have access to a large database. I plan to create one and do some manual acceptance testing.

@Kump3r
Copy link

Kump3r commented Jan 4, 2025

From my side I haven’t tested with a heavily loaded database, but if I manage to allocate some time, I can try it out and let you know as well. Thanks for the remark, it is a valid concern.

@IvanChalukov
Copy link
Author

I unfortunately haven't had the opportunity to test with a heavily loaded database either, but I'll make sure to give it a try as soon as I have the chance. Thanks for pointing that out!

@taylorsilva
Copy link
Member

Would be a big help if either of you can do that!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: In review
Development

Successfully merging this pull request may close these issues.

pq issue when using FIPS compliant OpenSSL library
3 participants