Description of problem: Coverity scanner has detected the use of SHA1 in the oauth-proxy repository: https://github.com/openshift/oauth-proxy/blob/20bf8e702b98b228dde09a48ae0dbeb14a73d591/htpasswd.go#L45 After talking with @slaznick, it's confirmed that this just allows administrators to add additional users on top of the normal OpenShift ones. So whilst a low priority, it would be good to eventually get this updated to use something like bcrypt instead (I think that's the best we can do here) especially given that https://httpd.apache.org/docs/2.4/misc/password_encryptions.html lists SHA1 as no longer secure. The motivation here would be at least from a compliance angle, i.e. potentially storing passwords as SHA1. Additional info:
This bug hasn't had any activity in the last 30 days. Maybe the problem got resolved, was a duplicate of something else, or became less pressing for some reason - or maybe it's still relevant but just hasn't been looked at yet. As such, we're marking this bug as "LifecycleStale" and decreasing the severity/priority. If you have further information on the current state of the bug, please update it, otherwise this bug can be closed in about 7 days. The information can be, for example, that the problem still occurs, that you still want the feature, that more information is needed, or that the bug is (for whatever reason) no longer relevant. Additionally, you can add LifecycleFrozen into Keywords if you think this bug should never be marked as stale. Please consult with bug assignee before you do that.
Removing LifecycleStale, I just did not get to it yet
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Moderate: OpenShift Container Platform 4.8.2 bug fix and security update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2021:2438