Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: address missed comments in #705 #707

Closed
laurentsimon opened this issue Oct 2, 2023 · 6 comments · Fixed by #708
Closed

feat: address missed comments in #705 #707

laurentsimon opened this issue Oct 2, 2023 · 6 comments · Fixed by #708
Assignees

Comments

@laurentsimon
Copy link
Contributor

laurentsimon commented Oct 2, 2023

I pressed the merge button by mistake in #705. There were unresolved comments:

@trishankatdatadog @ianlewis

@laurentsimon laurentsimon self-assigned this Oct 2, 2023
@laurentsimon
Copy link
Contributor Author

Any thoughts on the first bullet? I'm not sure we can tests it in the regression part of the test.

@trishankatdatadog
Copy link
Member

trishankatdatadog commented Oct 2, 2023

Any thoughts on the first bullet? I'm not sure we can tests it in the regression part of the test.

Yes, we certainly shouldn't have npm publish a known bad attestation to this effect. We also probably don't want to maintain a test key in the code, and acting conditionally. What about tampering during a test with a known attestation but mocking the signature verification for checking the bad digest alone?

@laurentsimon
Copy link
Contributor Author

the code currently does not allow mocking / ignoring / passing a custom pubKey for signature verification.

@trishankatdatadog
Copy link
Member

the code currently does not allow mocking / ignoring / passing a custom pubKey for signature verification.

Right: maybe our best bet is to parameterise the public key used for verification.

@laurentsimon
Copy link
Contributor Author

the code currently does not allow mocking / ignoring / passing a custom pubKey for signature verification.

Right: maybe our best bet is to parameterise the public key used for verification.

yes we can do that. It needs to be an internal API and should not be exposed to end-users.

@laurentsimon
Copy link
Contributor Author

Created #709 for tracking the part on mocking sig verification.

laurentsimon added a commit that referenced this issue Oct 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants