Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update crypto + bugfix in x509KeyPairProvider #122

Merged
merged 4 commits into from
Aug 17, 2022

Conversation

JordiSubira
Copy link

@JordiSubira JordiSubira commented Jul 18, 2022

This PR resolves #121 updating the crypto material using go test ./... -update-non-deterministic. In the future we might want to automatically regenerate the crypto material (e.g. https://github.com/scionproto/scion/blob/39b8fd4acbc2773e04e022bd66cf7cffae1f48a7/private/trust/x509_provider_test.go#L45).

Additionally, this PR includes a bugfix for the x509KepPairProvider, in order to choose the certificate chain the expires the latest.


This change is Reviewable

@JordiSubira JordiSubira requested a review from juagargi July 18, 2022 09:18
Copy link
Member

@juagargi juagargi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewed 153 of 153 files at r1, all commit messages.
Reviewable status: all files reviewed, 2 unresolved discussions / 0 of 1 LGTMs obtained / 0 of 1 approvals obtained


go/pkg/cs/drkey/grpc/golden.topo line 1 at r1 (raw file):

---

I think this file is duplicated and not necessary here.


go/pkg/trust/x509KeyPairProvider.go line 67 at r1 (raw file):

			continue
		}
		if bestChain != nil && bestExpiry.Before(expiry) {

all good, but can we extend the UT for LoadX509KeyPair so that it covers this as well?

Copy link
Member

@juagargi juagargi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

On my side, the test for go/pkg/ca/renewal fails (needs updated testdata).

Reviewable status: all files reviewed, 2 unresolved discussions / 0 of 1 LGTMs obtained / 0 of 1 approvals obtained

Copy link
Author

@JordiSubira JordiSubira left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Reviewable status: all files reviewed, 2 unresolved discussions / 0 of 1 LGTMs obtained / 0 of 1 approvals obtained


go/pkg/cs/drkey/grpc/golden.topo line 1 at r1 (raw file):

Previously, juagargi (Juan A. Garcia Pardo) wrote…

I think this file is duplicated and not necessary here.

Done.


go/pkg/trust/x509KeyPairProvider.go line 67 at r1 (raw file):

Previously, juagargi (Juan A. Garcia Pardo) wrote…

all good, but can we extend the UT for LoadX509KeyPair so that it covers this as well?

Done.

@JordiSubira JordiSubira requested a review from juagargi August 10, 2022 13:44
Copy link
Member

@juagargi juagargi left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:lgtm:

Reviewed 41 of 41 files at r2, all commit messages.
Reviewable status: :shipit: complete! all files reviewed, all discussions resolved

@JordiSubira JordiSubira merged commit a398efd into netsec-ethz:scionlab Aug 17, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Broken UTs
2 participants