-
-
Notifications
You must be signed in to change notification settings - Fork 224
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Signer usage impacted by default algorithm changes #115
Comments
User of For now, we are just using |
Oh yeah, the |
Having educated myself about the |
1.1 went back to the original settings, 1.0 was yanked, so except for in that window during the initial 1.0 release, installing will get a release that doesn't break things. If you do need to upgrade, you can use a shim similar to #120 (comment). |
This relates to #111 and #112. We were impacted by the change in default algorithm in our usage of
TimestampSigner
. The impact is probably lower as the services recovered without intervention and/or any visible user impact. We noticed it due to #112.Raising this issue to ask if the
Signer
implementation also needs a fallback digest method defaulting to SHA-512 in order prevent any further breakages.The text was updated successfully, but these errors were encountered: