-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CEF #8575
base: main
Are you sure you want to change the base?
CEF #8575
Conversation
Created types for the Credential Exchange Format Created test-data Created cef-importer Wrote unit tests that cover importing: - basic-auth logins - partial passkey support - credit-cards - folders and subfolders - collections and subcollections when importing into an organization
…rt, which will call the proper CEFImporter Will fail because of incomplete passkey support Comment out the passkey part in the example file to test complete flow.
…the import-browser component
New Issues
|
…t-script-poc # Conflicts: # package-lock.json
@@ -289,7 +289,7 @@ export class Fido2AuthenticatorService implements Fido2AuthenticatorServiceAbstr | |||
return { | |||
authenticatorData, | |||
selectedCredential: { | |||
id: guidToRawFormat(selectedCredentialId), | |||
id: Utils.fromUtf8ToArray(selectedCredentialId), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@coroiu This seems to be the main difference in how we handle passkeys. I think we can essentially migrate to storing our data B64Url encoded directly and have a if UUID fallback pattern.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah looks good, we should've done this from the start, but alas, we have debt instead :)
Objective
Code changes
Screenshots
Before you submit