Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

pref: Migrated from RSA to ECC #139

Merged
merged 2 commits into from
Feb 11, 2024
Merged

Conversation

rajdip-b
Copy link
Member

@rajdip-b rajdip-b commented Feb 11, 2024

User description

Summary

  • Updated public key algorithm from RSA to Elliptic Curve Cryptography

This update was made keeping two factors in mind:

  • ECC has a lower computation cost since it operates on tangents for calculation
  • It has a significantly smaller key size than RSA.

Scope of update

  • encrypt, decrypt, createKeyPair functions
  • NO CHANGES IN DATABASE WAS INTRODUCED

Type

enhancement


Description

  • Migrated key generation, encryption, and decryption from RSA to ECC across various services for improved performance and smaller key sizes.
  • Updated tests to support asynchronous ECC operations.
  • Added eccrypto package to dependencies for ECC functionality.

Changes walkthrough

Relevant files
Enhancement
create-key-pair.ts
Migrate Key Generation from RSA to ECC                                                 

apps/api/src/common/create-key-pair.ts

  • Replaced RSA key generation with ECC using eccrypto.
  • Changed key export format to hexadecimal strings.
  • +5/-9     
    decrypt.ts
    Implement ECC-based Asynchronous Decryption                                       

    apps/api/src/common/decrypt.ts

  • Switched from synchronous RSA decryption to asynchronous ECC
    decryption.
  • Adjusted decryption logic to handle ECC-specific data structure.
  • +19/-9   
    encrypt.ts
    Transition to ECC Encryption                                                                     

    apps/api/src/common/encrypt.ts

  • Replaced RSA encryption with ECC encryption.
  • Modified encryption output to JSON string to accommodate ECC data
    structure.
  • +10/-9   
    project.service.ts
    Integrate ECC Asynchronous Operations in Project Service             

    apps/api/src/project/service/project.service.ts

  • Updated encryption and decryption calls to be asynchronous in project
    service.
  • +2/-2     
    secret.service.ts
    Adapt Secret Service to ECC Asynchronous Operations                       

    apps/api/src/secret/service/secret.service.ts

  • Adapted secret service to use ECC for encryption and decryption.
  • Made encryption and decryption calls asynchronous.
  • +5/-5     
    Tests
    util.spec.ts
    Update Tests for ECC Encryption and Decryption                                 

    apps/api/src/common/util.spec.ts

  • Updated encryption and decryption tests for ECC.
  • Added async/await to test cases due to asynchronous nature of ECC
    operations.
  • +6/-8     
    Dependencies
    package.json
    Update Dependencies for ECC Support                                                       

    package.json

  • Added eccrypto and its types to dependencies.
  • Removed some packages from dependencies to devDependencies.
  • +8/-7     

    ✨ Usage guide:

    Overview:
    The describe tool scans the PR code changes, and generates a description for the PR - title, type, summary, walkthrough and labels. The tool can be triggered automatically every time a new PR is opened, or can be invoked manually by commenting on a PR.

    When commenting, to edit configurations related to the describe tool (pr_description section), use the following template:

    /describe --pr_description.some_config1=... --pr_description.some_config2=...
    

    With a configuration file, use the following template:

    [pr_description]
    some_config1=...
    some_config2=...
    
    Enabling\disabling automation
    • When you first install the app, the default mode for the describe tool is:
    pr_commands = ["/describe --pr_description.add_original_user_description=true" 
                             "--pr_description.keep_original_user_title=true", ...]
    

    meaning the describe tool will run automatically on every PR, will keep the original title, and will add the original user description above the generated description.

    • Markers are an alternative way to control the generated description, to give maximal control to the user. If you set:
    pr_commands = ["/describe --pr_description.use_description_markers=true", ...]
    

    the tool will replace every marker of the form pr_agent:marker_name in the PR description with the relevant content, where marker_name is one of the following:

    • type: the PR type.
    • summary: the PR summary.
    • walkthrough: the PR walkthrough.

    Note that when markers are enabled, if the original PR description does not contain any markers, the tool will not alter the description at all.

    Custom labels

    The default labels of the describe tool are quite generic: [Bug fix, Tests, Enhancement, Documentation, Other].

    If you specify custom labels in the repo's labels page or via configuration file, you can get tailored labels for your use cases.
    Examples for custom labels:

    • Main topic:performance - pr_agent:The main topic of this PR is performance
    • New endpoint - pr_agent:A new endpoint was added in this PR
    • SQL query - pr_agent:A new SQL query was added in this PR
    • Dockerfile changes - pr_agent:The PR contains changes in the Dockerfile
    • ...

    The list above is eclectic, and aims to give an idea of different possibilities. Define custom labels that are relevant for your repo and use cases.
    Note that Labels are not mutually exclusive, so you can add multiple label categories.
    Make sure to provide proper title, and a detailed and well-phrased description for each label, so the tool will know when to suggest it.

    Inline File Walkthrough 💎

    For enhanced user experience, the describe tool can add file summaries directly to the "Files changed" tab in the PR page.
    This will enable you to quickly understand the changes in each file, while reviewing the code changes (diffs).

    To enable inline file summary, set pr_description.inline_file_summary in the configuration file, possible values are:

    • 'table': File changes walkthrough table will be displayed on the top of the "Files changed" tab, in addition to the "Conversation" tab.
    • true: A collapsable file comment with changes title and a changes summary for each file in the PR.
    • false (default): File changes walkthrough will be added only to the "Conversation" tab.
    Utilizing extra instructions

    The describe tool can be configured with extra instructions, to guide the model to a feedback tailored to the needs of your project.

    Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Notice that the general structure of the description is fixed, and cannot be changed. Extra instructions can change the content or style of each sub-section of the PR description.

    Examples for extra instructions:

    [pr_description] 
    extra_instructions="""
    - The PR title should be in the format: '<PR type>: <title>'
    - The title should be short and concise (up to 10 words)
    - ...
    """
    

    Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable.

    More PR-Agent commands

    To invoke the PR-Agent, add a comment using one of the following commands:

    • /review: Request a review of your Pull Request.
    • /describe: Update the PR title and description based on the contents of the PR.
    • /improve [--extended]: Suggest code improvements. Extended mode provides a higher quality feedback.
    • /ask <QUESTION>: Ask a question about the PR.
    • /update_changelog: Update the changelog based on the PR's contents.
    • /add_docs 💎: Generate docstring for new components introduced in the PR.
    • /generate_labels 💎: Generate labels for the PR based on the PR's contents.
    • /analyze 💎: Automatically analyzes the PR, and presents changes walkthrough for each component.

    See the tools guide for more details.
    To list the possible configuration parameters, add a /config comment.

    See the describe usage page for a comprehensive guide on using this tool.

    @rajdip-b rajdip-b changed the title pref: Migrated from RSA to ECC performance: Migrated from RSA to ECC Feb 11, 2024
    @codiumai-pr-agent-free codiumai-pr-agent-free bot added the type: enhancement New feature or request label Feb 11, 2024
    @codiumai-pr-agent-free codiumai-pr-agent-free bot changed the title performance: Migrated from RSA to ECC pref: Migrated from RSA to ECC Feb 11, 2024
    Copy link
    Contributor

    PR Description updated to latest commit (0a6e8e3)

    Copy link
    Contributor

    PR Review

         PR feedback                    
    ⏱️ Estimated effort to review [1-5]

    3, because the PR involves migrating encryption algorithms from RSA to ECC, which requires understanding cryptographic principles, the eccrypto library usage, and ensuring that the asynchronous nature of the new implementation is correctly handled across the application. The changes are spread across multiple files but are focused on a single functionality, making it moderately complex.

    🧪 Relevant tests

    Yes

    🔍 Possible issues
    • The asynchronous nature of the new ECC encryption and decryption methods could introduce unhandled promise rejections if not properly implemented or called.
    • The error handling for the encryption and decryption processes is not visible in the diff. Proper error handling is crucial for cryptographic operations to ensure security and reliability.
    • The PR does not show if there are any changes to how keys are stored or managed. Since ECC keys are structurally different from RSA keys, ensuring that the storage and retrieval mechanisms are updated accordingly is important.
    🔒 Security concerns

    No clear security vulnerabilities are introduced in the provided diff. However, it's important to ensure that the migration from RSA to ECC does not weaken the existing security posture. This includes verifying the strength of the ECC keys used (curve type) and ensuring secure key management practices are followed.


    ✨ Usage guide:

    Overview:
    The review tool scans the PR code changes, and generates a PR review. The tool can be triggered automatically every time a new PR is opened, or can be invoked manually by commenting on any PR.
    When commenting, to edit configurations related to the review tool (pr_reviewer section), use the following template:

    /review --pr_reviewer.some_config1=... --pr_reviewer.some_config2=...
    

    With a configuration file, use the following template:

    [pr_reviewer]
    some_config1=...
    some_config2=...
    
    Utilizing extra instructions

    The review tool can be configured with extra instructions, which can be used to guide the model to a feedback tailored to the needs of your project.

    Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Specify the relevant sub-tool, and the relevant aspects of the PR that you want to emphasize.

    Examples for extra instructions:

    [pr_reviewer] # /review #
    extra_instructions="""
    In the 'possible issues' section, emphasize the following:
    - Does the code logic cover relevant edge cases?
    - Is the code logic clear and easy to understand?
    - Is the code logic efficient?
    ...
    """
    

    Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable.

    How to enable\disable automation
    • When you first install PR-Agent app, the default mode for the review tool is:
    pr_commands = ["/review", ...]
    

    meaning the review tool will run automatically on every PR, with the default configuration.
    Edit this field to enable/disable the tool, or to change the used configurations

    Auto-labels

    The review tool can auto-generate two specific types of labels for a PR:

    • a possible security issue label, that detects possible security issues (enable_review_labels_security flag)
    • a Review effort [1-5]: x label, where x is the estimated effort to review the PR (enable_review_labels_effort flag)
    Extra sub-tools

    The review tool provides a collection of possible feedbacks about a PR.
    It is recommended to review the possible options, and choose the ones relevant for your use case.
    Some of the feature that are disabled by default are quite useful, and should be considered for enabling. For example:
    require_score_review, require_soc2_ticket, and more.

    Auto-approve PRs

    By invoking:

    /review auto_approve
    

    The tool will automatically approve the PR, and add a comment with the approval.

    To ensure safety, the auto-approval feature is disabled by default. To enable auto-approval, you need to actively set in a pre-defined configuration file the following:

    [pr_reviewer]
    enable_auto_approval = true
    

    (this specific flag cannot be set with a command line argument, only in the configuration file, committed to the repository)

    You can also enable auto-approval only if the PR meets certain requirements, such as that the estimated_review_effort is equal or below a certain threshold, by adjusting the flag:

    [pr_reviewer]
    maximal_review_effort = 5
    
    More PR-Agent commands

    To invoke the PR-Agent, add a comment using one of the following commands:

    • /review: Request a review of your Pull Request.
    • /describe: Update the PR title and description based on the contents of the PR.
    • /improve [--extended]: Suggest code improvements. Extended mode provides a higher quality feedback.
    • /ask <QUESTION>: Ask a question about the PR.
    • /update_changelog: Update the changelog based on the PR's contents.
    • /add_docs 💎: Generate docstring for new components introduced in the PR.
    • /generate_labels 💎: Generate labels for the PR based on the PR's contents.
    • /analyze 💎: Automatically analyzes the PR, and presents changes walkthrough for each component.

    See the tools guide for more details.
    To list the possible configuration parameters, add a /config comment.

    See the review usage page for a comprehensive guide on using this tool.

    Copy link

    nx-cloud bot commented Feb 11, 2024

    ☁️ Nx Cloud Report

    CI is running/has finished running commands for commit 8b516a8. As they complete they will appear below. Click to see the status, the terminal output, and the build insights.

    📂 See all runs for this CI Pipeline Execution


    ✅ Successfully ran 4 targets

    Sent with 💌 from NxCloud.

    Copy link
    Contributor

    PR Code Suggestions

    Suggestions                                                                                                                                                     
    performance
    Use asynchronous key generation to improve performance.                      

    Consider using asynchronous key generation to avoid blocking the event loop, especially if
    this function is called frequently.

    apps/api/src/common/create-key-pair.ts [7-8]

    -const privateKey = eccrypto.generatePrivate()
    -const publicKey = eccrypto.getPublic(privateKey)
    +const privateKey = await eccrypto.generatePrivate()
    +const publicKey = await eccrypto.getPublic(privateKey)
     
    Improve performance by using Promise.all for asynchronous mapping.

    Use Promise.all for mapping over asynchronous operations to improve performance.

    apps/api/src/secret/service/secret.service.ts [450]

    -return secrets.map(async (secret) => {
    +return Promise.all(secrets.map(async (secret) => {
     
    best practice
    Validate input data structure before decryption.                             

    Validate the structure of parsed to ensure it contains all required fields before
    attempting decryption.

    apps/api/src/common/decrypt.ts [7]

     const parsed = JSON.parse(data)
    +if (!parsed.iv || !parsed.ephemPublicKey || !parsed.ciphertext || !parsed.mac) {
    +  throw new Error('Invalid data format for decryption.')
    +}
     
    Correctly test for exceptions in asynchronous functions.                     

    Use expect().rejects.toThrow() for testing asynchronous functions that should fail.

    apps/api/src/common/util.spec.ts [34-35]

    -const decrypted = await decrypt(differenetKeyPair.privateKey, encrypted)
    -expect(decrypted).toThrow()
    +await expect(decrypt(differenetKeyPair.privateKey, encrypted)).rejects.toThrow()
     
    possible issue
    Verify eccrypto compatibility with the Node.js version.         

    Ensure that the version of eccrypto is compatible with the Node.js version used in the
    project, as some versions of eccrypto have specific requirements.

    package.json [192]

    -"eccrypto": "^1.1.6",
    +"eccrypto": "^1.1.6", // Ensure compatibility with your Node.js version
     

    ✨ Usage guide:

    Overview:
    The improve tool scans the PR code changes, and automatically generates suggestions for improving the PR code. The tool can be triggered automatically every time a new PR is opened, or can be invoked manually by commenting on a PR.
    When commenting, to edit configurations related to the improve tool (pr_code_suggestions section), use the following template:

    /improve --pr_code_suggestions.some_config1=... --pr_code_suggestions.some_config2=...
    

    With a configuration file, use the following template:

    [pr_code_suggestions]
    some_config1=...
    some_config2=...
    
    Enabling\disabling automation

    When you first install the app, the default mode for the improve tool is:

    pr_commands = ["/improve --pr_code_suggestions.summarize=true", ...]
    

    meaning the improve tool will run automatically on every PR, with summarization enabled. Delete this line to disable the tool from running automatically.

    Utilizing extra instructions

    Extra instructions are very important for the improve tool, since they enable to guide the model to suggestions that are more relevant to the specific needs of the project.

    Be specific, clear, and concise in the instructions. With extra instructions, you are the prompter. Specify relevant aspects that you want the model to focus on.

    Examples for extra instructions:

    [pr_code_suggestions] # /improve #
    extra_instructions="""
    Emphasize the following aspects:
    - Does the code logic cover relevant edge cases?
    - Is the code logic clear and easy to understand?
    - Is the code logic efficient?
    ...
    """
    

    Use triple quotes to write multi-line instructions. Use bullet points to make the instructions more readable.

    A note on code suggestions quality
    • While the current AI for code is getting better and better (GPT-4), it's not flawless. Not all the suggestions will be perfect, and a user should not accept all of them automatically.
    • Suggestions are not meant to be simplistic. Instead, they aim to give deep feedback and raise questions, ideas and thoughts to the user, who can then use his judgment, experience, and understanding of the code base.
    • Recommended to use the 'extra_instructions' field to guide the model to suggestions that are more relevant to the specific needs of the project, or use the custom suggestions 💎 tool
    • With large PRs, best quality will be obtained by using 'improve --extended' mode.
    More PR-Agent commands

    To invoke the PR-Agent, add a comment using one of the following commands:

    • /review: Request a review of your Pull Request.
    • /describe: Update the PR title and description based on the contents of the PR.
    • /improve [--extended]: Suggest code improvements. Extended mode provides a higher quality feedback.
    • /ask <QUESTION>: Ask a question about the PR.
    • /update_changelog: Update the changelog based on the PR's contents.
    • /add_docs 💎: Generate docstring for new components introduced in the PR.
    • /generate_labels 💎: Generate labels for the PR based on the PR's contents.
    • /analyze 💎: Automatically analyzes the PR, and presents changes walkthrough for each component.

    See the tools guide for more details.
    To list the possible configuration parameters, add a /config comment.

    See the improve usage page for a more comprehensive guide on using this tool.

    Copy link

    sonarcloud bot commented Feb 11, 2024

    Quality Gate Passed Quality Gate passed

    Issues
    0 New issues

    Measures
    0 Security Hotspots
    No data about Coverage
    0.0% Duplication on New Code

    See analysis details on SonarCloud

    Copy link

    codecov bot commented Feb 11, 2024

    Codecov Report

    Attention: 171 lines in your changes are missing coverage. Please review.

    Comparison is base (ae73e7a) 31.22% compared to head (8b516a8) 51.88%.
    Report is 17 commits behind head on develop.

    Files Patch % Lines
    apps/api/src/common/create-event.ts 43.33% 34 Missing ⚠️
    apps/api/src/event/service/event.service.ts 26.47% 25 Missing ⚠️
    ...pps/api/src/workspace/service/workspace.service.ts 4.00% 24 Missing ⚠️
    apps/api/src/secret/service/secret.service.ts 12.00% 22 Missing ⚠️
    apps/api/src/auth/guard/auth/auth.guard.ts 65.78% 13 Missing ⚠️
    apps/api/src/common/get-secret-with-authority.ts 26.66% 11 Missing ⚠️
    ...api/src/environment/service/environment.service.ts 18.18% 9 Missing ⚠️
    apps/api/src/common/decrypt.ts 28.57% 5 Missing ⚠️
    apps/api/src/event/controller/event.controller.ts 64.28% 5 Missing ⚠️
    apps/api/src/project/service/project.service.ts 20.00% 4 Missing ⚠️
    ... and 8 more
    Additional details and impacted files
    @@             Coverage Diff              @@
    ##           develop     #139       +/-   ##
    ============================================
    + Coverage    31.22%   51.88%   +20.65%     
    ============================================
      Files           54       75       +21     
      Lines         1156     1515      +359     
      Branches       210      267       +57     
    ============================================
    + Hits           361      786      +425     
    + Misses         795      729       -66     
    Flag Coverage Δ
    api-e2e-tests 51.88% <52.63%> (?)

    Flags with carried forward coverage won't be shown. Click here to find out more.

    ☔ View full report in Codecov by Sentry.
    📢 Have feedback on the report? Share it here.

    @rajdip-b rajdip-b merged commit 7622db3 into develop Feb 11, 2024
    8 of 12 checks passed
    @rajdip-b rajdip-b deleted the performance/migrate-to-ecc branch February 11, 2024 18:24
    @rajdip-b
    Copy link
    Member Author

    🎉 This PR is included in version 1.1.0 🎉

    The release is available on GitHub release

    Your semantic-release bot 📦🚀

    Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
    Labels
    type: enhancement New feature or request
    Projects
    None yet
    Development

    Successfully merging this pull request may close these issues.

    1 participant