-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support of ECDSA #194
Comments
This comment has been minimized.
This comment has been minimized.
marching through the institutions
|
Well done digging into the underlying code! We're currently in the middle of refactoring the code to swap from Rocket to Actix, but will probably still use rustls as the underlying TLS implementation. What do you want to happen with this issue? It seems to be outside of the control of this repo. We could keep it with a "blocked" label, but then I would like a simple test so that we can check when it does start working. |
Yeah a test sounds like an excellent idea! I'll throw something together today. |
It looks like this just unblocked. I would be very keen to be able to end-to-end test my poc setup from half a year ago on hope to retake where I had to stop. Could you bump the rocket version? |
However it looks as if spiffe SVID's are EC keys 😕
Unfortunately, fore spire, as result of their secure default policy, it's hard coded
The text was updated successfully, but these errors were encountered: