-
-
Notifications
You must be signed in to change notification settings - Fork 223
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
Signer usage impacted by default algorithm changes #115
Comments
User of For now, we are just using |
Oh yeah, the |
Having educated myself about the |
1.1 went back to the original settings, 1.0 was yanked, so except for in that window during the initial 1.0 release, installing will get a release that doesn't break things. If you do need to upgrade, you can use a shim similar to #120 (comment). |
This relates to #111 and #112. We were impacted by the change in default algorithm in our usage of
TimestampSigner
. The impact is probably lower as the services recovered without intervention and/or any visible user impact. We noticed it due to #112.Raising this issue to ask if the
Signer
implementation also needs a fallback digest method defaulting to SHA-512 in order prevent any further breakages.The text was updated successfully, but these errors were encountered: