Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TrustStore: Add signer #3516

Merged
merged 2 commits into from
Dec 13, 2019
Merged

TrustStore: Add signer #3516

merged 2 commits into from
Dec 13, 2019

Conversation

oncilla
Copy link
Contributor

@oncilla oncilla commented Dec 13, 2019

Add Signer that implements infra.Signer.
Additionally, add a signer generator that selects the correct key based
on the latest certificate chain.

fixes #3118


This change is Reviewable

@oncilla oncilla added the c/CPPKI SCION Control-plane PKI label Dec 13, 2019
@oncilla oncilla added this to the Q4S5.D milestone Dec 13, 2019
Copy link
Collaborator

@lukedirtwalker lukedirtwalker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed 7 of 7 files at r1.
Reviewable status: all files reviewed, 2 unresolved discussions (waiting on @oncilla)


go/lib/infra/modules/trust/v2/signer_test.go, line 142 at r1 (raw file):

		input := sign.SigInput([]byte("wasn't me"), false)
		scrypto.Verify(input, sign.Signature, pub, scrypto.Ed25519)

require.NoError(t, scrypto.Verify(...))


go/lib/infra/modules/trust/v2/signer_test.go, line 345 at r1 (raw file):

				meta := loadChain(t, chain110v1).AS.Keys[cert.SigningKey]
				input := sign.SigInput([]byte("wasn't me"), false)
				scrypto.Verify(input, sign.Signature, meta.Key, meta.Algorithm)

require.NoError

Add Signer that implements infra.Signer.
Additionally, add a signer generator that selects the correct key based
on the latest certificate chain.

fixes scionproto#3118
Copy link
Contributor Author

@oncilla oncilla left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewable status: all files reviewed, 2 unresolved discussions (waiting on @lukedirtwalker)


go/lib/infra/modules/trust/v2/signer_test.go, line 142 at r1 (raw file):

Previously, lukedirtwalker (Lukas Vogel) wrote…

require.NoError(t, scrypto.Verify(...))

Done.


go/lib/infra/modules/trust/v2/signer_test.go, line 345 at r1 (raw file):

Previously, lukedirtwalker (Lukas Vogel) wrote…

require.NoError

Done.

Copy link
Collaborator

@lukedirtwalker lukedirtwalker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:lgtm:

Reviewed 1 of 1 files at r2.
Reviewable status: :shipit: complete! all files reviewed, all discussions resolved

@oncilla oncilla merged commit 4c4179e into scionproto:master Dec 13, 2019
@oncilla oncilla deleted the pub-trust-signer branch December 13, 2019 14:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
c/CPPKI SCION Control-plane PKI
Projects
None yet
Development

Successfully merging this pull request may close these issues.

TrustStore: Signer implementation
2 participants