beltram
2e128056dc
have updateOrder also update the update joint table [order by account]
2024-01-08 21:35:54 +01:00
Herman Slatman
1a711e1b91
Add new Wire DB methods to acme.DB
interface
2024-01-08 21:34:01 +01:00
beltram
abe86002ee
try by storing everything in db
2024-01-08 21:33:53 +01:00
beltram
76dfcb00e4
try silencing template data for dichotomies
2024-01-08 21:23:09 +01:00
beltram
a32bb66e47
trying to pass access token to template
2024-01-08 21:22:50 +01:00
beltram
ff41a1193d
fix deviceId computing in dpop challenge
2024-01-08 21:21:01 +01:00
Stefan Berthold
5ceed08ae0
Reorganize parsing target
2024-01-08 21:19:54 +01:00
Stefan Berthold
83ba0bdc51
Replace field access by accessor functions
2024-01-08 21:17:57 +01:00
beltram
c4fb19d01f
passing expected issuer to rusty-jwt-cli
2024-01-08 21:15:30 +01:00
beltram
2b1223a080
simpler
2024-01-08 21:14:17 +01:00
beltram
036a144e09
add oidc target
2024-01-08 21:10:46 +01:00
beltram
97002040a5
fix: challenge target field was not mapped to db entity
2024-01-08 21:09:07 +01:00
beltram
d32a3e23f0
wip
2024-01-08 21:08:34 +01:00
beltram
b58de27675
fix: do not convert URIs to lowercase for comparison purpose
2024-01-08 21:05:41 +01:00
beltram
7c9f8020d5
fix: add URI prefix to handle
2024-01-08 21:04:23 +01:00
beltram
680b6ea08f
adapt google demo for wire's special handle format "{firstname}_wire"
2024-01-08 21:03:54 +01:00
beltram
a97991aa83
infer domain from google email address
2024-01-08 21:01:50 +01:00
beltram
49ad2d9967
fix google id token matching in oidc challenge
2024-01-08 21:01:30 +01:00
beltram
a49966f4c9
try using google oidc for demo purpose
2024-01-08 20:59:09 +01:00
beltram
3576cc30c8
forward displayName in CSR with custom OID
2024-01-08 20:58:32 +01:00
beltram
4172b69816
remove displayName validation, potentially harmful
2024-01-08 20:57:35 +01:00
beltram
79501df5a2
fix: exclude displayName from SAN DNS
2024-01-08 20:56:39 +01:00
beltram
3f474f77d4
feat: change from impp prefix to just im
2024-01-08 20:55:32 +01:00
beltram
b6ec4422b4
feat: adapt to dex and pass the 'keyauth' in payload instead of in id_token. Also have a different mapping for id_token claims name
2024-01-08 20:54:54 +01:00
Stefan Berthold
af31a167c6
skip empty entries for uniqueSortedLowerNames
2024-01-08 20:54:17 +01:00
beltram
01ef526d08
change uri prefix to impp:wireapp=
2024-01-08 20:53:10 +01:00
beltram
cc5fd0a6a5
fix san validation
2024-01-08 20:52:52 +01:00
beltram
b3dd169190
cleanup my mess
2024-01-08 20:52:32 +01:00
beltram
3eb0ff43c0
fix orderNames size
2024-01-08 20:47:51 +01:00
beltram
c41a99ad75
(finalize) have both display name & domain in SANs
2024-01-08 20:47:28 +01:00
beltram
5ba0ab3e44
fix csr domain validation in finalize
2024-01-08 20:46:48 +01:00
beltram
73ec6c89d0
fix csr org validation in finalize
2024-01-08 20:46:07 +01:00
beltram
ca01c74333
avoid manipulating the key PEM format and take a plain PEM key as input
2024-01-08 20:42:52 +01:00
beltram
74ddad69dc
fix: challenge is '.token' and not '.id'
2024-01-08 20:39:27 +01:00
beltram
83f6be1f58
print oidc options
2024-01-08 20:38:26 +01:00
beltram
1fe61bee7b
better observability
2024-01-08 20:36:37 +01:00
Stefan Berthold
e6dd211637
acquire DPoP signing key from provisioner
2024-01-08 20:34:58 +01:00
beltram
227e932624
use json struct for challenge request payload otherwise it's a hell to craft from client side
2024-01-08 20:33:46 +01:00
Stefan Berthold
5ca744567c
simplify OIDC verification
2024-01-08 20:32:44 +01:00
Stefan Berthold
da1e64aa53
update wire challenges' status on happy end
2024-01-08 20:28:37 +01:00
Stefan Berthold
8e0e35532c
Add Wire authz and challenges (OIDC+DPOP)
2024-01-08 20:27:16 +01:00
Herman Slatman
e52836f0ab
Add RS1
support for ACME device-attest-01
2024-01-07 21:25:36 +01:00
Herman Slatman
c59d293d26
Add support for HTTP_PROXY
and HTTPS_PROXY
to ACME solver client
2024-01-03 15:09:24 +01:00
Mariano Cano
b20af51f32
Upgrade go.step.sm/crypto to use go-jose/v3
2023-12-12 16:36:48 -08:00
Herman Slatman
f453323ba9
Merge pull request #1631 from smallstep/herman/fix-apple-acmeclient-invalid-signatures
2023-12-01 09:48:37 +01:00
Herman Slatman
405aae798c
Simplify the copy
logic used when patching JWS signature
2023-11-30 14:27:32 +01:00
Max
d34f0f6a97
Fix linter warnings ( #1634 )
2023-11-28 20:58:58 -08:00
Herman Slatman
26a3bb3c11
Make the Apple JWS fix more robust and catch more cases.
2023-11-29 02:30:28 +01:00
Herman Slatman
113491e7af
Remove TODO for patching other algorithms for Apple ACME client
2023-11-24 18:29:22 +01:00
Herman Slatman
06f4cbbcda
Add (temporary) fix for missing null bytes in Apple JWS signatures
...
Apparently the Apple macOS (and iOS?) ACME client seems to omit
leading null bytes from JWS signatures. The base64-url encoded
bytes decode to a shorter byte slice than what the JOSE library
expects (e.g. 63 bytes instead of 64 bytes for ES256), and then
results in a `jose.ErrCryptoFailure`.
This commit retries verification of the JWS in case the first
verification fails with `jose.ErrCryptoFailure`. The signatures are
checked to be of the correct length, and if not, null bytes are
prepended to the signature. Then verification is retried, which
might fail again, but for other reasons. On success, the payload
is returned.
Apple should fix this in their ACME client, but in the meantime
this commit prevents some "bad request" error cases from happening.
2023-11-24 18:21:01 +01:00