-
Notifications
You must be signed in to change notification settings - Fork 28
Include challenge password attribute if required by EST server #38
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Code refactoring : change Enroll(), Reenroll() and ServerKeyGen() csr argument type so that we don't depend on x509 package anymore, which today still ignores the challenge password attribute Inlcude tls unique if required by CA Add test cases Add sample Update readme and documentation
Thanks for opening this PR, I'll forward this to my team for review. |
[ ] Need to resolve conflicts after upgrading to Go 1.22.1... |
Thought the comment wasn't for me until I noticed the repo did get upgraded with a different version of go... |
Ah it wasn't actually! Just a reminder for when I had time to get around to this again, but thank you for addressing the changes needed! |
Looks like work on this PR has stalled - I wonder when is it going to be resumed? |
BTW, copying to |
Hi DDvO, unfortunately my team hasn't been able to spare the cycles to work on this repository for a while, so while I hesitate to recommend it you may want to fork and patch a clone of this repository if you need this functionality right away. Edit: I'll try to review this PR as soon as possible to avoid such scenario |
I agree with this, I'd prefer to see this functionality without including this dependency if possible. |
Sorry for such a long delay for reviewing this PR, I didn't prioritize it and it has been far to long so I apologize for that. Thank you for your contribution, but I don't think I can hit the merge button on this PR as it is now into the master, but I am happy to support it as a separate branch to support this use-case for now. Some critiques that are blocking this:
|
Hi guys, Thank you @DDvO for closing the previous PR, that's on me.
I too agree, I actually borrowed that code snippet from another repository, credit goes to micromdm. Meanwhile, unfortunately Go has still not taken action to address it, there is an open issue for it already. |
@toddgaunt-gs On a personal note: I thought I had to change the method signature but after a quick review, I start to think it can be done while keeping your methods signatures intact. That being said,
|
Hi guys, thank you for swiftly responding on this.
Looks like there is a glitch in the link you included and instead you meant
I've meanwhile had a closer look. |
* add challenge password to CSR as described in rfc 7030 section 3.5 * update cmd client test : if challenge password is to be included, CSR must be re-created. --------- Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: Rob Casey <rcasey@gmail.com> Co-authored-by: Todd Gaunt <todd.gaunt@globalsign.com> Co-authored-by: Rob Casey <61131@users.noreply.github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
…sunique' into features/include_tlsunique
The changes introduced come after the issue/feature requrest #30 has been opened.
They allow us to enroll a CSR that includes the TLS-unique value as recommended by the RFC 7030