Commit Graph

563 Commits (5fdf036a4d87a6eff7659c43db18eadf295476c0)

Author SHA1 Message Date
Stefan Berthold 5ceed08ae0
Reorganize parsing target 9 months ago
Stefan Berthold 83ba0bdc51
Replace field access by accessor functions 9 months ago
beltram 2b1223a080
simpler 9 months ago
beltram 036a144e09
add oidc target 9 months ago
beltram d32a3e23f0
wip 9 months ago
Stefan Berthold 2208b03744
avoid panic when OIDC config is not provided 9 months ago
Stefan Berthold e6dd211637
acquire DPoP signing key from provisioner 9 months ago
Stefan Berthold 8e0e35532c
Add Wire authz and challenges (OIDC+DPOP) 9 months ago
Mariano Cano b20af51f32
Upgrade go.step.sm/crypto to use go-jose/v3 10 months ago
Herman Slatman f082cbc421
Denormalize provisioner name in SCEP webhook 11 months ago
Herman Slatman 9ebc8779f5
Normalize SCEP provisioner name in webhook body 11 months ago
Herman Slatman e815864ed8
Add verification of `provisionerName` in test 11 months ago
Herman Slatman de45d66cdb
Add `provisionerName` to webhook request body 11 months ago
Mariano Cano 49045a1150
Change CommonName validator in JWK
This commit changes the common name validator in the JWK provisioner to
accept either the token subject or any of the sans in the token.
11 months ago
Max 9f84f7ce35
Allow for identity certificate signing (in sshSign) by skipping validators (#1572)
- skip urisValidator for identity certificate signing. Implemented
  by building the validator with the context in a hacky way.
1 year ago
Mariano Cano 52baf52f84
Change scep password type to string
This commit changes the type of the decrypter key password to string to
be consistent with other passwords in the ca.json
1 year ago
Herman Slatman 4554f86f16
Make SCEP decrypter properties use `omitempty` 1 year ago
Herman Slatman ffe079f31b
Merge branch 'master' into herman/scep-provisioner-decrypter 1 year ago
Mariano Cano 31da66c124
Fix webhooks signature
This commit fixes the way webhooks signatures are created. Before this
change, the signature of an empty body was prepended by the body itself.
1 year ago
Herman Slatman 3f3b67e05c
Merge branch 'herman/scep-provisioner-decrypter' into herman/scep-notifying-webhook 1 year ago
Herman Slatman ba72710e2d
Address code review remarks 1 year ago
Herman Slatman 5f8e0de1c3
Fix duplicate import in SCEP provisioner 1 year ago
Herman Slatman 3ade92f8d5
Support both a decrypter key URI as well as PEM 1 year ago
Herman Slatman b6c95d7be2
Add additional properties to SCEP notify webhook request body 1 year ago
Herman Slatman 63257e0576
Add full certificate DER bytes to success notification webhook 1 year ago
Herman Slatman 52bc96760b
Add SCEP certificate issuance notification webhook 1 year ago
Herman Slatman 33e661ce7d
Add a dummy CSR to SCEP request body tests 1 year ago
Herman Slatman 36f1dd70bf
Add CSR to `SCEPCHALLENGE` webhook request body 1 year ago
Herman Slatman 98d015b5c3
Fix linting issues 1 year ago
Herman Slatman d9f56cdbdc
Merge branch 'master' into herman/scep-provisioner-decrypter 1 year ago
Herman Slatman 9d3b78ae49
Add `excludeIntermediate` to SCEP provisioner 1 year ago
Remi Vichery 82b8e16d7f
Add all AWS identity document certificates
* move to use embed instead of a multi-line string
* add test to ensure all certificates are valid
* add test to ensure validity (no expired certificate)
1 year ago
Herman Slatman 645b6ffc18
Ensure no prompt is fired for loading provisioner decrypter 1 year ago
Herman Slatman e2e9bf5494
Clarify some SCEP properties 1 year ago
Herman Slatman c0a1837cd9
Verify full decrypter/signer configuration at usage time
When changing the SCEP configuration it is possible that one
or both of the decrypter configurations required are not available
or have been provided in a way that's not usable for actual SCEP
requests.

Instead of failing hard when provisioners are loaded,
which could result in the CA not starting properly, this type of
problematic configuration errors will now be handled at usage
time instead.
1 year ago
Herman Slatman 569a1be12c
Merge branch 'master' into herman/scep-provisioner-decrypter 1 year ago
Mariano Cano cce7d9e839
Address comments from code review 1 year ago
Mariano Cano c7c7decd5e
Add support for the disableSmallstepExtensions claim
This commit adds a new claim to exclude the Smallstep provisioner
extension from the generated certificates.

Fixes #620
1 year ago
Herman Slatman 1ce80cf740
Merge branch 'master' into herman/scep-provisioner-decrypter 1 year ago
Herman Slatman 567fc25404
Use the RSA decryption configuration for signing responses too 1 year ago
Mariano Cano 7061147885
Use step.Abs to load the certificate templates
step.Abs has been removed from crypto and they need to be set when those
methods are used
1 year ago
Mariano Cano 95887ebf40
Merge pull request #1481 from smallstep/remove-user-regex
Remove OIDC user regexp check
1 year ago
Josh Drake ff424fa944
Fix tests. 1 year ago
Josh Drake 904f416d20
Include authorization principal in provisioner webhooks. 1 year ago
Mariano Cano 5bfe96d8c7
Send X5C leaf certificate to webhooks
This commit adds a new property that will be sent to authorizing and
enriching webhooks when signing certificates using the X5C provisioner.
1 year ago
Mariano Cano 7fa97bedec
Remove OIDC user regexp check
This commit removes the regular expression check on OIDC usernames.
Although it is not recommended to use any character in a username,
it is possible to create and use them. The tool useradd has the flag
--badname and adduser has --allow-badname and --allow-all-names to
create new users with any character.

Moreover, it is possible to create any username with the rest of
provisioners.

Fixes #1436
1 year ago
Herman Slatman 6985b4be62
Clean up the SCEP authority and provisioner 1 year ago
Herman Slatman a1f187e3df
Merge branch 'master' into herman/scep-provisioner-decrypter 1 year ago
Herman Slatman 180162bd6a
Refactor SCEP provisioner and decrypter 1 year ago
Herman Slatman 0377fe559b
Add basic version of provisioner specific SCEP decrypter 1 year ago