-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detect IDevID/IAK template from certificates #689
Conversation
/packit retest-failed |
keylime-agent.conf
Outdated
@@ -228,19 +228,21 @@ tpm_signing_alg = "rsassa" | |||
ek_handle = "generate" | |||
|
|||
# Enable IDevID and IAK usage and set their algorithms. | |||
# Choosing a template will override the name and asymmetric algorithm choices. | |||
# By default the template will be detected automatically from the certificates. This will happen in iak_idevid_template is left empty or set as "default" or "detect". |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
in -> if
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks, fixed
0406adf
to
1c20f8c
Compare
Works with "detect" now. Very cool! |
@Isaac-Matthews Thank you for implementing this! Could you please rebase? |
Signed-off-by: Isaac Matthews <[email protected]>
1c20f8c
to
96725bc
Compare
No problem. Done! |
Codecov ReportAttention:
Additional details and impacted files
Flags with carried forward coverage won't be shown. Click here to find out more.
|
This adds the requested auto-detect functionality for the agent. The new default setting for the IDevID and IAK templates will be
detect
, and with that set the agent will detect what template has been used from the imported certificates. This can still be overridden by users that want to specify the template or algorithm but likely should be left as default for the majority of users.The certs are now imported first, and the key regeneration is delayed until after, with the key comparison against the certs performed during key regeneration.