-
Notifications
You must be signed in to change notification settings - Fork 53
Remove keys.format_metadata_to_key()
's dependency on settings.HASH_ALGORITHMS
#220
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Apr 1, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
I will work to fix this one. |
This was referenced Apr 2, 2020
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Apr 6, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Apr 14, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Apr 16, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Apr 27, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
May 18, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
May 18, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
May 21, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Jun 2, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Jun 8, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
MVrachev
added a commit
to MVrachev/securesystemslib
that referenced
this issue
Jun 8, 2020
Refactor format_metadata_to_key so that it won't depend on settings.HASH_ALGORITHMS. There are couple of code snippets in tuf where in order to provide a custom list of hash algorithms, tuf is temporary changing settings.HASH_ALGORITHMS and then returning it to its formal state. This could lead to problems in future and one should be able to control hash algorithms used for generating keyids in f ormat_metadata_to_key() without having to change package level settings in securesystemslib.settings. Closes: secure-systems-lab#220 Signed-off-by: Martin Vrachev <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description of issue or feature request:
It should be possible to control the hash algorithms used for generating keyids in
securesystemslib.keys.format_metadata_to_key()
without having to change package level settings insecuresystemslib.settings
Related to #219
Current behavior:
The tuf reference implementation has code like the following, i.e. repository_tool.py#L3062
Expected behavior:
format_metadata_to_key can be called without having to change
securesystemslib.settings.HASH_ALGORITHMS
, something like:The text was updated successfully, but these errors were encountered: