Skip to content

updates april 20206#293

Merged
cviecco merged 2 commits into
Cloud-Foundations:masterfrom
cviecco:dep-update-apr-2026
Apr 8, 2026
Merged

updates april 20206#293
cviecco merged 2 commits into
Cloud-Foundations:masterfrom
cviecco:dep-update-apr-2026

Conversation

@cviecco
Copy link
Copy Markdown
Contributor

@cviecco cviecco commented Apr 2, 2026

No description provided.

rpTopOrigins := rpOrigins // FIXME: we actually have to compute this
validError := parsedResponse.Verify(session.Challenge, rpID, rpOrigins, rpTopOrigins, protocol.TopOriginAutoVerificationMode, appID, shouldVerifyUser, loginCredential.PublicKey)
verifyUserPresence := true
validError := parsedResponse.Verify(session.Challenge, rpID, rpOrigins, rpTopOrigins, protocol.TopOriginAutoVerificationMode, appID, shouldVerifyUser, verifyUserPresence, loginCredential.PublicKey)
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did the external webauthn package make an incompatible API change?

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes it did. I do have to actually test on a keymaster with a real hostname if the behaviour of this new param: verifyUserPresence is what I expect. We are using a "less traveled" path as we need to use some of the internal apis for backwards compatility with u2f registered tokens. We may start thnking on when we will drop that and go to only webauthn flows.

I will not land until I have actually tested this.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just tested works with new path (localhost)l

@cviecco cviecco requested a review from rgooch April 8, 2026 05:11
@cviecco cviecco merged commit 0ec07b9 into Cloud-Foundations:master Apr 8, 2026
9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants