This website requires JavaScript.
Explore
Help
Sign In
jandd
/
cacert-gosigner
Watch
1
Star
0
Fork
You've already forked cacert-gosigner
0
Code
Issues
Pull requests
Projects
Releases
Activity
64dd9429be
cacert-gosigner
/
.gitignore
10 lines
88 B
Text
Raw
Normal View
History
Unescape
Escape
Implement configuration and CA hierarchy setup This commit implements a mechanism to load CA configuration dynamically from JSON files. Missing keys and certificates can be generated in a PKCS#11 HSM or Smartcard. Certificates are stored as PEM encoded .crt files in the filesystem. The default PKCS#11 module (softhsm2) is now loaded from a platform specific path using go:build comments.
2022-04-16 20:24:32 +00:00
*.crt
Add PKCS#11 test to generate root certificate - add documentation how to initialize SoftHSM for testing - add cmd/signer package to hold future signer command - add test to use a private key from softhsm to create a root certificate
2022-04-13 06:30:20 +00:00
*.pem
*.pub
First DDD based signer implementation parts
2021-08-23 18:53:43 +00:00
.idea/
Implement serial link and protocol handling infrastructure This commit adds basic serial link and protocol support. None of the commands from the docs/design.md document is implemented yet. The following new packages have been added: - seriallink containing the serial link handler including COBS decoding and encoding - protocol containing the protocol handler including msgpack unmarshalling and marshaling - health containing a rudimentary health check implementation - messages containing command and response types and generated msgpack marshaling code A client simulation command has been added in cmd/clientsim. README.md got instructions how to run the client simulator. The docs/config.sample.yaml contains a new section for the serial connection parameters.
2022-08-03 12:38:36 +00:00
/clientsim
/signer
/testPty
Implement configuration and CA hierarchy setup This commit implements a mechanism to load CA configuration dynamically from JSON files. Missing keys and certificates can be generated in a PKCS#11 HSM or Smartcard. Certificates are stored as PEM encoded .crt files in the filesystem. The default PKCS#11 module (softhsm2) is now loaded from a platform specific path using go:build comments.
2022-04-16 20:24:32 +00:00
ca-hierarchy.json
Improve configuration, implement setup mode - implement a dedicated setup mode for creating CA certificates that is triggered by the '-setup' command line flag - switch to YAML configuration for comment support and more human readable syntax. Format documentation is in docs/config.sample.yaml - move HSM related code to pkg/hsm - improve consistency checks in pkg/config
2022-04-19 14:48:32 +00:00
config.yaml
Add goreleaser configuration
2022-04-16 12:43:05 +00:00
dist/
Reference in a new issue
Copy permalink