Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Decrypt and validate credentials in raw_connect #69

Merged
merged 1 commit into from
Jul 17, 2017

Conversation

jntullo
Copy link

@jntullo jntullo commented Jun 28, 2017

The UI is moving towards validating credentials on the queue to allow for validating credentials in separate zones utilizing the raw_connect class method, rather than needing to create a temporary EMS for validation.

For many of the providers, raw_connect ensures the credentials are correct. This updates raw_connect to not only return a connection but also be able to validate (it will not validate by default).

Because credentials are going to be stored on the queue, it also needs to be able to decrypt them. This uses MiqPassword.try_decrypt so that it can accept both unencrypted and encrypted credentials.

PR with greater detail: ManageIQ/manageiq-ui-classic#1580

@miq-bot
Copy link
Member

miq-bot commented Jun 28, 2017

Checked commit jntullo@701fdc4 with ruby 2.2.6, rubocop 0.47.1, and haml-lint 0.20.0
2 files checked, 0 offenses detected
Everything looks fine. 🍰

@jntullo
Copy link
Author

jntullo commented Jul 17, 2017

@miq-bot assign @blomquisg

@agrare agrare self-assigned this Jul 17, 2017
@agrare agrare merged commit ed4e981 into ManageIQ:master Jul 17, 2017
@agrare agrare added this to the Sprint 65 Ending Jul 24, 2017 milestone Jul 17, 2017
agrare pushed a commit to agrare/manageiq-providers-vmware that referenced this pull request Apr 15, 2019
…_140758691

Add  Automate modeling for Embedded Ansible Events.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants