Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Finalize UZI PoC Q4 for YubiSign project #59

Open
wants to merge 185 commits into
base: main
Choose a base branch
from
Open

Conversation

basvandriel
Copy link

This pull request finalizes the Q4 PoC of the Yubisign application. This includes new features and refactoring. Note: this application is not suitable for any production environment.

@basvandriel
Copy link
Author

Before this pull request can be ready for review, these should be merged first:

@basvandriel basvandriel marked this pull request as ready for review December 18, 2024 13:20
@basvandriel basvandriel requested a review from a team as a code owner December 18, 2024 13:20
@basvandriel basvandriel changed the title Finalize UZI PoC Q4 Finalize UZI PoC Q4 for YubiSign project Dec 18, 2024
AUTH_FLOW.md Outdated Show resolved Hide resolved
app/pkcs.py Outdated Show resolved Hide resolved
docs/LOCALSETUP.md Outdated Show resolved Hide resolved
docs/LOCALSETUP.md Outdated Show resolved Hide resolved
docs/LOCALSETUP.md Outdated Show resolved Hide resolved
docs/LOCALSETUP.md Outdated Show resolved Hide resolved
docs/LOCALSETUP.md Outdated Show resolved Hide resolved
@basvandriel
Copy link
Author

Hi @ricklambrechts, find the applied feedback in this PR #60

basvandriel and others added 2 commits December 19, 2024 15:04
* work

* add variable to .env.example

* Update docs/local_setup.md

Co-authored-by: Rick Lambrechts <[email protected]>

---------

Co-authored-by: Rick Lambrechts <[email protected]>
Comment on lines +130 to +155
san = x509.GeneralNames(
[
x509.GeneralName("dns_name", "example.com"),
x509.GeneralName("dns_name", "www.example.com"),
]
)
extensions = [
csr_module.CRIAttribute(
{
"type": "extension_request",
"values": [
x509.Extensions(
[
x509.Extension(
{
"extn_id": "subject_alt_name",
"critical": False,
"extn_value": san,
}
)
]
)
],
}
)
]
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should normally not be needed for our CSR, but is needed for the implementation in ACME CA Server.

)
headers = {
"Content-Type": "application/jose+json",
"X-Acme-Jwt": jwt_token,
Copy link
Member

@ricklambrechts ricklambrechts Dec 29, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Normally the JWT is already sent as a challenge and we should not need to update the finalize request.

@ricklambrechts
Copy link
Member

Need to discuss #59 (comment) and #59 (comment) with @meneerhenk to discuss what we want to do with it. These changes conflict with changing between the ACME CA Server implementation and the Boulder implementation.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants