-
Notifications
You must be signed in to change notification settings - Fork 181
Accept DOM node when computing/verifying signatures #492
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
We're in an active update cycle for this library now, so your changes are coming at a good time. Do any of the recent changes affect what you're trying to accomplish? |
The recent addition/changes of |
I feel like we should fix the underlying issue in xmldom, which is parsing "\r\n" as "\r\n". It should be normalized to "\n". Then we can accept the PR. Furthermore, I would prefer changes to be made on v7.x rather than v6.x (which has poor API design) |
While I'd definitely prefer to fix the issue at the downstream dependency, that cycle would take far longer and furthermore, it wouldn't prevent a similar issue in the future given that the upstream can still be using a completely different version of xmldom (which may have other fixes and/or regressions) that do not play well with the version shipped with xml-crypto. Happy to PR both versions. But I might need some guidance on V7 as I'm seeing |
In V7, we move the signature verificaiton part into a new module. |
Btw, for the specific bug I'm hunting (and the ticket refers) it's already fixed in xmldom 0.9. |
In order to handle different versions
@xmldom/xmldom
from the upstream vsxml-crypto
it would be ideal to support injecting the DOM similarly to how other methods in the library already allow it.This would allow a faster fixing cycle when cases as these happen: #108
Happy to do any additional modifications to improve this so it can be landed.