Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

/pkg/hsskey: Include backup HSS #2771

Merged
merged 1 commit into from
Oct 20, 2023
Merged

Conversation

Fusxfaranto
Copy link
Contributor

Refactor getHssFromIpmi to use an ordered list of HSS string prefixes, allowing the use of "backup" HSS keys (which will only be used after all "regular" HSS keys have been tried).

@codecov
Copy link

codecov bot commented Sep 26, 2023

Codecov Report

Attention: 21 lines in your changes are missing coverage. Please review.

Files Coverage Δ
pkg/hsskey/hsskey.go 20.98% <0.00%> (-4.02%) ⬇️

... and 3 files with indirect coverage changes

📢 Thoughts on this report? Let us know!.

Copy link
Member

@rminnich rminnich left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This logic is complex enough that a test would sure be nice.

@rminnich rminnich added the Awaiting author Waiting for new changes or feedback for author. label Oct 1, 2023
@Fusxfaranto
Copy link
Contributor Author

I agree that it'd be nice to have this covered by a test, but due to the way this function uses the IPMI interface, it would require adding some awkward dependency injection code, which would end up being more complicated and invasive than the actual logic change itself here.

@Fusxfaranto Fusxfaranto added Awaiting reviewer Waiting for a reviewer. and removed Awaiting author Waiting for new changes or feedback for author. labels Oct 2, 2023
@rminnich rminnich added Awaiting author Waiting for new changes or feedback for author. and removed Awaiting reviewer Waiting for a reviewer. labels Oct 20, 2023
Refactor getHssFromIpmi to use an ordered list of HSS string prefixes,
allowing the use of "backup" HSS keys (which will only be used after
all "regular" HSS keys have been tried).

Signed-off-by: Albert Morgese <amorgese@google.com>
@Fusxfaranto Fusxfaranto merged commit 19031e1 into u-root:main Oct 20, 2023
23 of 24 checks passed
@Fusxfaranto Fusxfaranto deleted the hss-backup branch October 20, 2023 20:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Awaiting author Waiting for new changes or feedback for author.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants