Skip to content

Conversation

@lupine
Copy link

@lupine lupine commented Mar 16, 2021

I've been tasked with checking FIPS compliance of the GitLab codebase. One attribute of FIPS compliance is that MD5 hashes are frowned upon.

It's going to be much easier to switch to SHA256 for this specific use than to explain in detail why MD5 is fine 😅 so I'd love to get this merged.

@roidelapluie
Copy link
Member

Thanks!

All tests are broken and you did not sign your commit with DCO :)

In a FIPS environment, it's much easier to switch to SHA256 than it is
to verify and explain that any particular use of MD5 is actually safe
in-context.

Signed-off-by: Nick Thomas <[email protected]>
@lupine
Copy link
Author

lupine commented Mar 16, 2021

Oops, sorry about that @roidelapluie . That'll teach me to try to use the in-browser editor 😅

I can see we're still failing on very old Go versions, I'll see if I can work out why that is.

@roidelapluie
Copy link
Member

roidelapluie commented Mar 16, 2021

You can remove them from our circleci config (we want to support go 1.13 onwards).

@lupine
Copy link
Author

lupine commented Mar 16, 2021

Haha, that works too 😅 . Hopefully that's everything!

@roidelapluie roidelapluie merged commit 6e540be into prometheus:main Mar 17, 2021
@roidelapluie
Copy link
Member

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants