-
Couldn't load subscription status.
- Fork 447
Allow to choose algorithms when creating new metadata #645
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow to choose algorithms when creating new metadata #645
Conversation
Codecov Report
@@ Coverage Diff @@ ## master #645 +/- ## ========================================== + Coverage 65.44% 65.48% +0.04% ========================================== Files 103 103 Lines 25703 25703 ========================================== + Hits 16821 16832 +11 + Misses 8882 8871 -11
Continue to review full report at Codecov.
|
@psmiraglia Hey Paolo, nice to see you here!
The discussion on this topic is here: #628
I also saw that you have also bringed some commits from another branch of mine (those with allow_create documentation... already merged by c00kieMon5ter here: https://github.com/IdentityPython/pysaml2/pull/632/files).
If you can we could work on this in that PR, close this one.
We should move to a configuration asset that permits users to disable weak alghorithms not only in the metadata but also during signature/encryption verification.
Nice shoot
eace864 to
123427f
Compare
@psmiraglia Hey Paolo, nice to see you here!
The discussion on this topic is here: #628
I don't think so. My PR just covers the script to generate the metadata. Algorithms I'm referring to are just used to compute the signature and the digest of the whole metadata (to check its integrity and authenticity). The mechanism to advertise supported algorithms (for SAML signature and assertions encryption) remains untouched.
I also saw that you have also bringed some commits from another branch of mine (those with allow_create documentation... already merged by c00kieMon5ter here: https://github.com/IdentityPython/pysaml2/pull/632/files).
Don't know why it happened... Anyway, I rebased it!
If you can we could work on this in that PR, close this one.
As I said, topics are similar but different. So, I would keep the PR opened.
We should move to a configuration asset that permits users to disable weak alghorithms not only in the metadata but also during signature/encryption verification.
This makes sense
Nice shoot
😄
23a0c8b to
b6a5322
Compare
b6a5322 to
027d8d2
Compare
Hi,
Given that metadata generation can also be invoked within an application (e.g., in SATOSA at /Saml2/proxy_saml2_backend.xml), it might be better to specify the algorithms in the config, instead of extra flags passed to make_metadata.py.
If all input information needed for generating the metadata is captured in the config, then all the different ways of triggering the metadata generation would produce the same output.
How does this sound?
Cheers,
Vlad
Good to me!
The
make_metadata.pyuses default (and poor) algorithms for signature and digest computation when creating new metadata. It would be nice to allow the selection of these algorithms. The PR introduces the-Sand-Dcommand line arguments that can be used as followsAll Submissions: