-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SPKI: TRC signature combination #3341
Conversation
2166bd5
to
e60b595
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed 10 of 10 files at r1.
Reviewable status: all files reviewed, 2 unresolved discussions (waiting on @oncilla)
go/tools/scion-pki/internal/v2/trcs/combine.go, line 69 at r1 (raw file):
for fname, part := range parts[isd] { if !bytes.Equal(proto.Signed.EncodedTRC, part.EncodedTRC) { pkicmn.QuietPrint("Ignoring signed in %s. Payload is different\n", fname)
isn't a continue
needed here? why isn't that catched by a unit test?
go/tools/scion-pki/internal/v2/trcs/validator.go, line 28 at r1 (raw file):
} func (v validator) Validate(combined map[addr.ISD]signedMeta) error {
I think a short comment about what this validates would be helpful.
e60b595
to
250d598
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewable status: all files reviewed, 2 unresolved discussions (waiting on @lukedirtwalker)
go/tools/scion-pki/internal/v2/trcs/combine.go, line 69 at r1 (raw file):
Previously, lukedirtwalker (Lukas Vogel) wrote…
isn't a
continue
needed here? why isn't that catched by a unit test?
ugh, right. Great catch.
This branch was never executed in the test. Fixed now.
go/tools/scion-pki/internal/v2/trcs/validator.go, line 28 at r1 (raw file):
Previously, lukedirtwalker (Lukas Vogel) wrote…
I think a short comment about what this validates would be helpful.
Done.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Reviewed 3 of 3 files at r2.
Reviewable status: complete! all files reviewed, all discussions resolved
Add support for combining TRC signature parts into a final signed TRC. The version to sign can be provided via command line flag. If no version is specified, the tool searches the newest TRC configuration file and uses its version.
250d598
to
c660919
Compare
Add support for combining TRC signature parts into a final signed TRC.
The version to sign can be provided via command line flag.
If no version is specified, the tool searches the newest TRC
configuration file and uses its version.
This change is