Conversation
Uses a four‐year‐old patched vendored version of Mbed TLS for cryptography that doesn’t build with CMake 4. Doesn’t build with current versions of `canokey-core`, either. No upstream development since 2023. This was only used in‐tree by the `systemd-initrd-luks-fido2` NixOS test, which is not a channel blocker and that I couldn’t find a historical failure for that wasn’t related to issues with the test driver.
oxalica
left a comment
There was a problem hiding this comment.
I'm fine with this decision. But it would be good to have an alternative systemd FIDO2 test. I'm pretty sure there are many ones using it (including me) and it would be terrible to break accidentally, eg. during systemd update.
|
I agree it would be good. Unfortunately, CanoKey is the only virtual CTAP library QEMU supports; it supports a software‐emulated U2F device, but I don’t think that would work with the FIDO2 We could perhaps have a manually‐run test that passes through a host FIDO2 device – that wouldn’t work on Hydra, but it’s not a channel blocker to begin with, so manually running these tests is the only way they prevent issues from reaching the channels anyway. It would also be a more end‐to‐end test, which is nice, albeit less convenient to run. Ideally, we could get |
Uses a four‐year‐old patched vendored version of Mbed TLS for cryptography that doesn’t build with CMake 4. Doesn’t build with current versions of
canokey-core, either. No upstream development since 2023.This was only used in‐tree by the
systemd-initrd-luks-fido2NixOS test, which is not a channel blocker and that I couldn’t find a historical failure for that wasn’t related to issues with the test driver.cc @tlaurion as Alyssa mentioned you were invested in the support here. Unfortunately it seems like CanoKey upstream has somewhat abandoned the QEMU library. Even if it was bumped to work with the current
canokey-core,canokey-cryptois still on the same version of Mbed TLS from 2021. I get the impression that upstream are not very invested in the software QEMU support, and are focused on hardware keys that use separate accelerated cryptography implementations. Maybe they could use help getting things updated?Things done
passthru.tests.nixpkgs-reviewon this PR. See nixpkgs-review usage../result/bin/.Add a 👍 reaction to pull requests you find important.