-
Notifications
You must be signed in to change notification settings - Fork 90
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
openssl_csr extendedKeyUsage should support custom oid #39
Comments
Maybe we could circumvent the lookup if a value is prefixed with Kinda like this:
In this case however cryptography seems to insist on https://cryptography.io/en/latest/x509/reference/#cryptography.x509.oid.ExtendedKeyUsageOID for example - is this even really a valid OID in this context? |
The prefix breaks parity with openssl where it is simply specified with the dotted notation. How about a simple regex test before the lookup? |
Do you have an example for such a simple regex in mind? |
Just from the top of my head
\d+(\.\d+)+
I do not know if it is fully compliant though...
ons. 29. apr. 2020 21.56 skrev MarkusTeufelberger <[email protected]
…:
Do you have an example for such a simple regex in mind?
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#39 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AAQDWMX4NEEQVXJLGJVT76TRPCA47ANCNFSM4MT2V45Q>
.
|
Well of cause with start and end matching
^\d+(\.\d+)+$
ons. 29. apr. 2020 22.17 skrev Rasmus Melchior Jacobsen <[email protected]>:
… Just from the top of my head
\d+(\.\d+)+
I do not know if it is fully compliant though...
ons. 29. apr. 2020 21.56 skrev MarkusTeufelberger <
***@***.***>:
> Do you have an example for such a simple regex in mind?
>
> —
> You are receiving this because you authored the thread.
> Reply to this email directly, view it on GitHub
> <#39 (comment)>,
> or unsubscribe
> <https://github.com/notifications/unsubscribe-auth/AAQDWMX4NEEQVXJLGJVT76TRPCA47ANCNFSM4MT2V45Q>
> .
>
|
This should be relatively simple to implement (probably updating |
PR #91 implements this. |
SUMMARY
The openssl_csr module should support custom OID's for extendedKeyUsage, example:
Applying this file currently returns:
ISSUE TYPE
COMPONENT NAME
openssl_csr
ADDITIONAL INFORMATION
The cryptography_name_to_oid should probably determine if the name passed in is already an oid, and return the input it if it was not found in the lookup table. There is also the inverse function which should simply return the oid if no name is found.
(this issue is migrated from ansible/ansible#69232)
The text was updated successfully, but these errors were encountered: