Skip to content

Commit

Permalink
Merge pull request #185 from atlassian/NONE-remove-backend-secret-ff
Browse files Browse the repository at this point in the history
NONE remove ff for generating secret on backend
  • Loading branch information
rachellerathbone authored Oct 9, 2023
2 parents fe7946f + 62209cd commit 97a98c9
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 28 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -22,13 +22,10 @@ import {
AnalyticsUiEventsEnum
} from '../../../common/analytics/analytics-events';
import { generateNewSecret } from '../../../api/generateNewSecret';
import { generateNewSecretUNSAFE } from '../../JenkinsConfigurationForm/JenkinsConfigurationForm';
import { FeatureFlags, useFeatureFlag } from '../../../hooks/useFeatureFlag';

const analyticsClient = new AnalyticsClient();

const CreateServer = () => {
const serverSecretGenerationFlag = useFeatureFlag<boolean>(FeatureFlags.SERVER_SECRET_GENERATION);
const history = useHistory();
const [serverName, setServerName] = useState('');
const [hasError, setHasError] = useState(false);
Expand Down Expand Up @@ -61,7 +58,7 @@ const CreateServer = () => {
await createJenkinsServer({
name: serverName,
uuid,
secret: serverSecretGenerationFlag ? await generateNewSecret() : generateNewSecretUNSAFE(),
secret: await generateNewSecret(),
pipelines: []
});

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -17,24 +17,6 @@ import {
AnalyticsUiEventsEnum
} from '../../common/analytics/analytics-events';
import { generateNewSecret } from '../../api/generateNewSecret';
import { FeatureFlags, useFeatureFlag } from '../../hooks/useFeatureFlag';

const charactersForSecret =
'ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789';

export const generateNewSecretUNSAFE = () => {
const SECRET_LENGTH = 20;
let newSecret = '';
const numberOfSecretCharacters = charactersForSecret.length;

for (let i = 0; i < SECRET_LENGTH; i++) {
newSecret += charactersForSecret.charAt(
Math.floor(Math.random() * numberOfSecretCharacters)
);
}

return newSecret;
};

type JenkinsConfigurationFormProps = {
onSubmit(): void;
Expand Down Expand Up @@ -66,7 +48,6 @@ const JenkinsConfigurationForm = ({
pageTitle
}: JenkinsConfigurationFormProps) => {
const analyticsClient = new AnalyticsClient();
const serverSecretGenerationFlag = useFeatureFlag<boolean>(FeatureFlags.SERVER_SECRET_GENERATION);
const [showConfirmRefreshSecret, setShowConfirmRefreshSecret] =
useState(false);
const isOnManageConnectPage = pageTitle.includes('Manage');
Expand All @@ -76,11 +57,7 @@ const JenkinsConfigurationForm = ({

const refreshSecret = async (event: React.MouseEvent<HTMLElement>) => {
event.preventDefault();
if (serverSecretGenerationFlag) {
setSecret(await generateNewSecret());
} else {
setSecret(generateNewSecretUNSAFE());
}
setSecret(await generateNewSecret());

setShowConfirmRefreshSecret(false);

Expand Down

0 comments on commit 97a98c9

Please sign in to comment.