Remove hardcoded Fly server key#26
Conversation
|
You have reached your Codex usage limits for code reviews. You can see your limits in the Codex usage dashboard. |
|
Warning Rate limit exceeded
You’ve run out of usage credits. Purchase more in the billing tab. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. ℹ️ Review info⚙️ Run configurationConfiguration used: Organization UI Review profile: CHILL Plan: Pro Run ID: 📒 Files selected for processing (2)
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
There was a problem hiding this comment.
Strict pass complete.
This is a focused security fix and I am comfortable approving it.
What matters here is that the committed SERVER_PRIVATE_KEY literal is gone from deploy-fly.sh, the wrapper no longer writes production secret values itself, and deploy now fails early when the required Fly secret names are missing.
The documentation also does the right operational thing by treating the previously committed key as compromised and explicitly documenting rotation.
I do not see a blocker in the current scope, so approving.
Summary
Security validation
Source/sink/control: deploy-fly.sh used a committed literal in flyctl secrets set SERVER_PRIVATE_KEY=...; the script now only verifies required Fly secret names and deploys after they exist.
Original issue no longer reproduces locally:
Remaining ops step: this account cannot rotate the real Fly secret. flyctl secrets list -a mostro-push-server returns unauthorized, so a maintainer must run the documented rotation command and treat the old committed key as compromised.
Refs #5
Tests