We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.
Already on GitHub? Sign in to your account
If I could lobby for a few more algorithms to be supported 馃檹
RSA-PSS
ECDSA
Ed25519
HMAC
Also pkcs8 and spki key format import/export are not to be overlooked. Developers LOOOVE to use in favour of JWKs.
pkcs8
spki
I have a comprehensive test suite for different runtimes' webcrypto implementations that I could unload on js-compute-runtime eventually.
Originally posted by @panva in #440 (comment)
The text was updated successfully, but these errors were encountered:
Would this also include RS256? 馃檪 We need RS256 to be able to verify JWTs from Fanout in a c@e js runtime - for more context: https://developer.fastly.com/learning/concepts/real-time-messaging/fanout/#validating-grip-requests
RS256
Sorry, something went wrong.
@jfctfl We support RS256, but that is not what Fanout uses, Fanout uses EC P-256, which we do not support and is already listed in this issue 馃憤
I assumed it was RS256 based on this rust example. But in any case, glad to see the required algorithm listed here! 馃憤
Add EcKeyImportParams to SubtleCrypto.importKey
9f6c27e
In fastly#639 we added support for ECDSA keys in SubtleCrypto. This adds the interface to the type defintions for SubtleCrypto.importKey to allow consuming TypeScript applications to use this type of key. Partly addresses fastly#579 and brings the library in sync with [our Fanout docs][1]. [1]: https://www.fastly.com/documentation/guides/concepts/real-time-messaging/fanout/#validating-grip-requests
No branches or pull requests
If I could lobby for a few more algorithms to be supported 馃檹
RSA-PSS
ECDSA
(at least P-256, but ideally all three curves)Ed25519
from https://wicg.github.io/webcrypto-secure-curves/HMAC
Also
pkcs8
andspki
key format import/export are not to be overlooked. Developers LOOOVE to use in favour of JWKs.I have a comprehensive test suite for different runtimes' webcrypto implementations that I could unload on js-compute-runtime eventually.
Originally posted by @panva in #440 (comment)
The text was updated successfully, but these errors were encountered: