{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":273280323,"defaultBranch":"master","name":"ignition-module-tools","ownerLogin":"inductiveautomation","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2020-06-18T15:55:21.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/603896?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1711132890.0","currentOid":""},"activityList":{"items":[{"before":"579957fa4e498d021b6a16741a529f8e6a7e4286","after":"a3f4a6cad2ac7ec4a0a33463e1ed52fe3d1d605a","ref":"refs/heads/master","pushedAt":"2024-04-18T15:28:32.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"ia-keaton","name":null,"path":"/ia-keaton","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/165939484?s=80&v=4"},"commit":{"message":"Added ability to support \"required\" flag in module dependencies of module.xml (#48)\n\nSupports IGN-9137\r\n\r\nCo-authored-by: Brian Ray ","shortMessageHtmlLink":"Added ability to support \"required\" flag in module dependencies of mo…"}},{"before":"743d2f465509ea98c525d099bd9210ac3e73ea3b","after":null,"ref":"refs/tags/v0.2.0","pushedAt":"2024-03-22T18:28:09.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"brianeray","name":"Brian Ray","path":"/brianeray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10779396?s=80&v=4"}},{"before":"429a10f458f0c30265b6c4dec52420306cdb282a","after":null,"ref":"refs/tags/IGN-7871-WIP","pushedAt":"2024-03-22T18:27:49.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"brianeray","name":"Brian Ray","path":"/brianeray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10779396?s=80&v=4"}},{"before":"089c19c91eb3aee0f1e541bc622d5ac52148583e","after":null,"ref":"refs/tags/IGN-7871-rebased-snapshot","pushedAt":"2024-03-22T18:27:43.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"brianeray","name":"Brian Ray","path":"/brianeray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10779396?s=80&v=4"}},{"before":"f3a9b635b6054f921d4a9552d99bb08d3dbfe868","after":null,"ref":"refs/tags/IGN-7871-passwords-optional","pushedAt":"2024-03-22T18:27:36.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"brianeray","name":"Brian Ray","path":"/brianeray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10779396?s=80&v=4"}},{"before":"57a4acb72c9579a71296a7d4c2aae7cbda1206a5","after":"579957fa4e498d021b6a16741a529f8e6a7e4286","ref":"refs/heads/master","pushedAt":"2024-03-22T16:32:34.000Z","pushType":"pr_merge","commitsCount":1,"pusher":{"login":"brianeray","name":"Brian Ray","path":"/brianeray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10779396?s=80&v=4"},"commit":{"message":"IGN-7871 PKCS#11 signing (#43)\n\nAdd HSM/hardware token keystore capability via new property\r\n`pkcs11CfgFile`. Unlike filesystem-based `keystoreFile`, the signing\r\nkey is stored in a device such as a YubiKey, with driver and other\r\n`SunPKCS11` provider properties specified in a configuration file for\r\nthe `signModule` task.\r\n\r\nAn integration partner has a Digicert KeyLocker cloud keystore, which\r\nrequires passing explicitly down to the `:signModule` task neither\r\n`keystorePassword` nor `certPassword`; unlocking is via other\r\nmeans (env vars consumed by the vendor PKCS#11 module, IIUC).\r\n\r\nThis commit also makes those properties optional, translating\r\ntheir ommission as `null` down the call stacks.\r\n\r\nInterestingly, omitting `keystorePassword` is not even a blocker for\r\nPKCS#12 (file-based) keystores; it just skips an integrity check on\r\nkeystore load when no keystore password is specified.\r\n\r\nOther changes include refactoring existing tests in `SignModuleTest`,\r\nSpotless delinting in `gradle-module-plugin`, and a few minor test\r\nand typo fixes.\r\n\r\nNOTE 1: Because we call down to `module-signer` to do the actual\r\nsigning, and because its filter is narrowed to keys of type\r\n`SHA256withRSA`, the key in the keystore must be that type. (This\r\nconstraint predates the current enhancement.) At some point we'll\r\nlikely enhance `module-signer` to support more key algorithms such\r\nas Elliptic Curve and whatever post-quantum algorithms ultimately pass\r\nmuster with NIST and related entities.\r\n\r\nNOTE 2: Plans are in place for `certFile` ommission as well. In many\r\ncases the cert chain can be read straight from the keystore. That\r\nwill come in a future PR.","shortMessageHtmlLink":"IGN-7871 PKCS#11 signing (#43)"}},{"before":"c04241e1ff90728a9f53e1be080bcd765d9a53e5","after":"57a4acb72c9579a71296a7d4c2aae7cbda1206a5","ref":"refs/heads/master","pushedAt":"2023-05-11T15:56:20.000Z","pushType":"pr_merge","commitsCount":7,"pusher":{"login":"brianeray","name":"Brian Ray","path":"/brianeray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/10779396?s=80&v=4"},"commit":{"message":"IGN-6325: fix some Spotless-flagged lint","shortMessageHtmlLink":"IGN-6325: fix some Spotless-flagged lint"}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAENE4bvwA","startCursor":null,"endCursor":null}},"title":"Activity · inductiveautomation/ignition-module-tools"}