Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE REQUEST] Support asymmetric signature operations #66528

Closed
lkubb opened this issue May 16, 2024 · 0 comments · Fixed by #66526
Closed

[FEATURE REQUEST] Support asymmetric signature operations #66528

lkubb opened this issue May 16, 2024 · 0 comments · Fixed by #66526
Labels
Feature new functionality including changes to functionality and code refactors, etc. needs-triage

Comments

@lkubb
Copy link
Contributor

lkubb commented May 16, 2024

Is your feature request related to a problem? Please describe.
Salt has supported cryptographic operations with GPG for a long time. While it is the most widely used algorithm, there are other ones that are in use. An example are plain asymmetric signatures, without the reliance on GPG-specific constructs such as keyrings.

Describe the solution you'd like
Add an asymmetric execution module that allows to sign and verify data using plain private/public keys, such as in use for X.509 certificates, without any external dependencies.

Describe alternatives you've considered

  • Add the module as a custom one
  • Create a Salt extension

Additional context
I know the current general trend is to make Salt core lean, but wanted to offer this nonetheless since it is not much code and broadly useful.
This is related to #66527.

@lkubb lkubb added Feature new functionality including changes to functionality and code refactors, etc. needs-triage labels May 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Feature new functionality including changes to functionality and code refactors, etc. needs-triage
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant