New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ULNRemotes expose username/password in the serializer. #2428
Labels
Comments
dralley
added a commit
to dralley/pulp_rpm
that referenced
this issue
Mar 25, 2022
dralley
added a commit
to dralley/pulp_rpm
that referenced
this issue
Mar 25, 2022
dralley
added a commit
to dralley/pulp_rpm
that referenced
this issue
Mar 25, 2022
dralley
added a commit
that referenced
this issue
Mar 25, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Version
rpm/3.18-dev
core/3.19-dev
Describe the bug
Serializers shouldn't expose sensitive information. UlnRemoteSerializer, alas, does.
To Reproduce
Expected behavior
We can't expose sensitive information in the serializers. UlnRemote needs to protect username/password like the default remote.
Additional context
UlnRemote needs some work, it overrides fields from base Remote that it doesn't need to. If UlnRemote didn't have its "own" username/password, this bug wouldn't exist.
The text was updated successfully, but these errors were encountered: