Removed juniper specific changes RotateAuthorizedKey#5308
Removed juniper specific changes RotateAuthorizedKey#5308ram-mac merged 1 commit intoopenconfig:mainfrom
Conversation
Summary of ChangesHello, I'm Gemini Code Assist1! I'm currently reviewing this pull request and will post my feedback shortly. In the meantime, here's a summary to help you and other reviewers quickly get up to speed! This pull request cleans up the RotateTrustedUserCA function by removing vendor-specific handling for Juniper devices. By standardizing the key format to match the gNSI Credentialz proto definition, the implementation ensures consistent behavior across different hardware vendors. Highlights
Using Gemini Code AssistThe full guide for Gemini Code Assist can be found on our documentation page, here are some quick tips. Invoking Gemini You can request assistance from Gemini at any point by creating a comment using either
Customization To customize Gemini Code Assist for GitHub experience, repository maintainers can create a configuration file and/or provide a custom code review style guide (such as PEP-8 for Python) by creating and adding files to a Limitations & Feedback Gemini Code Assist may make mistakes. Please leave feedback on any instances where its feedback is incorrect or counter productive. You can react with 👍 and 👎 on @gemini-code-assist comments. If you're interested in giving your feedback about your experience with Gemini Code Assist for GitHub and other Google products, sign up here. Footnotes
|
There was a problem hiding this comment.
Code Review
This pull request simplifies the RotateTrustedUserCA function in internal/security/credz/credz.go by removing vendor-specific logic that previously handled Juniper devices differently when processing public keys. A review comment identifies that the pull request metadata is inconsistent with the actual code changes, as the title and description incorrectly refer to RotateAuthorizedKey and the AuthorizedKey field instead of the modified RotateTrustedUserCA function and PublicKey field.
I am having trouble creating individual review comments. Click here to see my feedback.
internal/security/credz/credz.go (265-267)
The pull request title and description contain inconsistencies regarding the function and field being modified. The title mentions RotateAuthorizedKey, and the description refers to the AuthorizedKey field, but the code changes are actually within RotateTrustedUserCA affecting the PublicKey field. Please update the PR metadata to accurately reflect the changes to avoid confusion for future maintainers.
Remove the Juniper-specific special case in RotateTrustedUserCA that was adding the SSH algorithm prefix to the AuthorizedKey field. According to the gNSI Credentialz proto definition, this field should only contain the base64-encoded key.