Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove salt field from EncryptedData #3357

Merged
merged 1 commit into from
May 17, 2024
Merged

Remove salt field from EncryptedData #3357

merged 1 commit into from
May 17, 2024

Conversation

dmjb
Copy link
Contributor

@dmjb dmjb commented May 17, 2024

Relates to #3317

Previously EncryptedData had a dedicated salt field. As part of investigating AES-256-GCM, I have decided to follow the Go crypto library's convention of prepending the nonce/salt to the ciphertext. As a result, the salt field is no longer needed.

Since we are still using the hardcoded salt at this time, this will not impact any data in production.

Also tweaked some unit tests to use the new encrypted data structure instead of relying on the old DB columns which will be deleted in a future PR.

Summary

Provide a brief overview of the changes and the issue being addressed.
Explain the rationale and any background necessary for understanding the changes.
List dependencies required by this change, if any.

Fixes #(related issue)

Change Type

Mark the type of change your PR introduces:

  • Bug fix (resolves an issue without affecting existing features)
  • Feature (adds new functionality without breaking changes)
  • Breaking change (may impact existing functionalities or require documentation updates)
  • Documentation (updates or additions to documentation)
  • Refactoring or test improvements (no bug fixes or new functionality)

Testing

Outline how the changes were tested, including steps to reproduce and any relevant configurations.
Attach screenshots if helpful.

Review Checklist:

  • Reviewed my own code for quality and clarity.
  • Added comments to complex or tricky code sections.
  • Updated any affected documentation.
  • Included tests that validate the fix or feature.
  • Checked that related changes are merged.

Relates to #3317

Previously EncryptedData had a dedicated salt field. As part of
investigating AES-256-GCM, I have decided to follow the Go crypto
library's convention of prepending the nonce/salt to the ciphertext. As
a result, the salt field is no longer needed.

Since we are still using the hardcoded salt at this time, this will not
impact any data in production.

Also tweaked some unit tests to use the new encrypted data structure
instead of relying on the old DB columns which will be deleted in a
future PR.
@dmjb dmjb requested a review from a team as a code owner May 17, 2024 14:21
Copy link
Contributor

@stacklokbot stacklokbot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

✅ No Invisible Unicode Characters Detected.

@coveralls
Copy link

Coverage Status

coverage: 50.267% (+0.008%) from 50.259%
when pulling a97de23 on use-fixed-salt
into c0286cd on main.

@dmjb dmjb merged commit d736e5f into main May 17, 2024
24 of 25 checks passed
@dmjb dmjb deleted the use-fixed-salt branch May 17, 2024 15:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants