Skip to content

Support for serverkeygen and additional path segments#21

Merged
vkhoroz merged 4 commits intofoundriesio:mainfrom
orangepizza:features
Feb 26, 2026
Merged

Support for serverkeygen and additional path segments#21
vkhoroz merged 4 commits intofoundriesio:mainfrom
orangepizza:features

Conversation

@orangepizza
Copy link
Contributor

shouldn't two saparate PR's but I already stack commits so

implement 4.3 serverkeygen and 3.2.2 addiional path segment (it's tecially a must for server to support but not usre what acually use it)
fixed logic bug on one of http test too

@orangepizza orangepizza marked this pull request as draft February 19, 2026 14:49
Copy link
Member

@vkhoroz vkhoroz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@doanac I doubt this is something we want to accept.

We might consider making it easier for 3PP developers to extend the estserver via import and composition.
But I wouldn't accept all optional RFC 7030 featurettes just for the sake of completeness.

WDYT?

Copy link
Member

@doanac doanac left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I made a couple of comments already but I'd say to rework this PR to:

  • rebase on the latest main
  • introduce a new flag to say whether or not the server should expose optional resources
  • add the /serverkeygen optional resource

it had missing a / in path building so it always errored out before

Signed-off-by: Seo Suchan <tjtncks@gmail.com>
they aren't used by x509.createcertificate
add test for cert key match with csr requested

Signed-off-by: Seo Suchan <tjtncks@gmail.com>
@orangepizza orangepizza marked this pull request as ready for review February 19, 2026 23:23
@orangepizza orangepizza force-pushed the features branch 2 times, most recently from ded09d9 to 69a1727 Compare February 20, 2026 00:48
Copy link
Member

@vkhoroz vkhoroz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good now, I think.

Only need to solve that single functional comment about CSR attributes, and a couple of stylish improvements.

Thanks, @orangepizza .

for entropy limited clients that can't trust local random
server will create same type of key with CA
don't support out of band key encryption

Signed-off-by: Seo Suchan <tjtncks@gmail.com>
Copy link
Member

@vkhoroz vkhoroz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@doanac I think this one is good to go.

Once the typos in that comment are corrected, and you have no objections, I will merge.

Thanks @orangepizza

Co-authored-by: vkhoroz <vkhoroz@users.noreply.github.com>
@vkhoroz vkhoroz merged commit cbaa32e into foundriesio:main Feb 26, 2026
3 checks passed
@orangepizza orangepizza deleted the features branch February 27, 2026 02:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants