Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Username and password fields on ULN Remotes should be hidden #2438

Merged
merged 1 commit into from Mar 25, 2022

Conversation

dralley
Copy link
Contributor

@dralley dralley commented Mar 25, 2022

closes #2428

@mdellweg
Copy link
Member

Shouldn't we also encrypt these?

@dralley
Copy link
Contributor Author

dralley commented Mar 25, 2022

They're already encrypted, the model fields are the same, the ULN remote is only overriding the serialization.

Copy link
Member

@mdellweg mdellweg left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, diffs of models and serializers look just tooo similar.

@dralley
Copy link
Contributor Author

dralley commented Mar 25, 2022

Changed: these fields should probably still be "required", I removed that by accident.

@dralley dralley merged commit 1616552 into pulp:main Mar 25, 2022
@dralley dralley deleted the hidden-fields branch March 25, 2022 14:20
@patchback
Copy link

patchback bot commented Mar 25, 2022

Backport to 3.17: 💚 backport PR created

✅ Backport PR branch: patchback/backports/3.17/161655295473d1ef24340b963accdc7edd148d27/pr-2438

Backported as #2441

🤖 @patchback
I'm built with octomachinery and
my source is open — https://github.com/sanitizers/patchback-github-app.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

ULNRemotes expose username/password in the serializer.
2 participants