max furman
3f844c5e23
Update the way SubjectKeyId is calculated, and more ...
...
- swith lint to first in line for `make all`
- update tests to conform with new subjectkeyid
4 years ago
David Cowden
86efe7aff0
aws: use http.NoBody instead of nil
...
It's a little more descriptive.
4 years ago
David Cowden
2b121efc8f
aws: test constructor with empty IDMS string array
4 years ago
David Cowden
dc39eef721
aws: test badIDMS functional path
...
The existing test only covers the constructor logic. Also test the live
code path that is executed when a bad IDMS version is supplied.
4 years ago
David Cowden
51f16ee2e0
aws: add tests covering metadata service versions
...
* Add constructor tests for the aws provisioner.
* Add a test to make sure the "v1" logic continues to work.
By and large, v2 is the way to go. However, there are some instances of
things that specifically request metadata service version 1 and so this
adds minimal coverage to make sure we don't accidentally break the path
should anyone need to depend on the former logic.
4 years ago
David Cowden
5efe5f3573
metadata-v2: pull in joshathysolate-master
...
Taking of this PR to get it across the goal line.
4 years ago
Carl Tashian
912e298043
Whitelist -> Allowlist per https://tools.ietf.org/id/draft-knodel-terminology-01.html
4 years ago
max furman
fd05f3249b
A few last fixes and tests added for rekey/renew ...
...
- remove all `renewOrRekey`
- explicitly test difference between renew and rekey (diff pub keys)
- add back tests for renew
4 years ago
Max
ea9bc493b8
Merge pull request #307 from dharanikumar-s/master
...
Add support for rekeying Fixes #292
4 years ago
dharanikumar-s
57fb0c80cf
Removed calculating SubjectKeyIdentifier on Rekey
4 years ago
dharanikumar-s
dfda497929
Renamed RenewOrRekey to Rekey
4 years ago
dharanikumar-s
fe73154a20
Corrected misspelling
4 years ago
dharanikumar-s
0c21f0ae9e
Added error check after GenerateDefaultKeyPair
4 years ago
dharanikumar-s
2479371c06
Added error check while marshalling public key
4 years ago
dharanikumar-s
b368a53149
Modified TestAuthority_Renew to TestAuthority_RenewOrRekey
4 years ago
dharanikumar-s
c8c3581e2f
SubjectKeyIdentifier extention is calculated from public key passed to this function instead of copying from old certificate
4 years ago
dharanikumar-s
8f504483ce
Added RenewOrRekey function based on @maraino suggestion. RenewOrReky is called from Renew.
4 years ago
dharanikumar-s
3813f57b1a
Add support for rekeying Fixes #292
4 years ago
Max
debce1cec2
Merge pull request #299 from smallstep/max/refactor
...
Refactor
4 years ago
max furman
accf1be7e9
wip
4 years ago
max furman
71d87b4e61
wip
4 years ago
max furman
d25e7f64c2
wip
4 years ago
max furman
3636ba3228
wip
4 years ago
Mariano Cano
39650637d4
Merge pull request #297 from smallstep/no-bastion-bastion
...
Do not return bastion for the configured bastion host.
4 years ago
Mariano Cano
fcfc4e9b2b
Fix ssh federated template variables.
4 years ago
max furman
1951669e13
wip
4 years ago
Mariano Cano
b0fdd0b2be
Do not return bastion for the configured bastion host.
...
Fixes #296
4 years ago
Mariano Cano
ff32746312
Add test case for error executing template.
4 years ago
Mariano Cano
e3ae751b57
Use templates from authority instead of config.
4 years ago
Mariano Cano
237baa5169
Check for required variables in templates.
...
Fixes smallstep/cli#232
4 years ago
Mariano Cano
6c844a0618
Load default templates if no templates are configured.
4 years ago
Max
2ebfc73f77
Merge pull request #290 from smallstep/max/profileLimit
...
Update profileLimitDuration validator ...
4 years ago
max furman
7d5cf34ce5
Update profileLimitDuration validator ...
...
- respect notBefore of the provisioner
- modify/fix the reported errors
4 years ago
Mariano Cano
9832d1538b
Avoid nil pointer panic on step ssh config with no templates.
4 years ago
Mariano Cano
4ac51dd508
Merge pull request #274 from smallstep/oidc-raw-locals
...
Allow dots and other symbols in principals for OIDC
4 years ago
Mariano Cano
3246a3e81f
Add missing test case.
4 years ago
max furman
6e69f99310
Always set nbf and naf for new ACME orders ...
...
- Use the default value from the ACME provisioner if values are not
defined in the request.
4 years ago
Mariano Cano
0b5fd156e8
Add a third principal on OIDC tokens with the raw local part of the email.
...
For the email first.last@example.com it will create the principals
["firstlast", "first.last", "first.last@example.com"]
Fixes #253 , #254
4 years ago
Josh Hogle
e9b500daf2
Updated error message
4 years ago
Josh Hogle
044d00045a
Fixed missing initialization of IMDS versions
4 years ago
Josh Hogle
18ac5c07e2
Added support for specifying IMDS version preference
4 years ago
Josh Hogle
8c6a46887b
Added token URL fixes to tests
4 years ago
Josh Hogle
dd27901b12
Moved token URL and TTL to config values
4 years ago
Josh Hogle
bbbe4738c7
Added status code checking
4 years ago
Josh Hogle
af0f21d744
added support for IMDSv2 API
4 years ago
Mariano Cano
2bc69d3edd
Merge pull request #252 from smallstep/yubikey
...
Yubikey support
4 years ago
Oleksandr Kovalchuk
4cd01b6868
Implement tests for forceCNOption modifier
...
Implement unit tests which checks forceCNOption modifier (implemented
in 322200b7db
) is not broken and works
correctly.
Ref: https://github.com/smallstep/certificates/issues/259
4 years ago
Oleksandr Kovalchuk
893a53793a
Modify existing tests to accept forceCNOption modifier
...
Modify existing tests to pass with changes introduced in commit
322200b7db
. This is safe to do as
tests assert exact length of modifiers, which has changed.
4 years ago
Oleksandr Kovalchuk
322200b7db
Implement modifier to set CommonName
...
Implement modifier which sets CommonName to the certificate if
CommonName is empty and forceCN is set in the config. Replace previous
implementation introduced in 0218018cee
with new modifier.
Closes https://github.com/smallstep/certificates/issues/259
Ref: https://github.com/smallstep/certificates/pull/260#issuecomment-628961322
4 years ago
Oleksandr Kovalchuk
503c9f6101
Add config option to force CN
...
Add configuration option `forceCN` to ACME provisioner. When this option
is set to `true`, provisioner should generate Subject.CommonName for
certificate if it was not present in the request. Default value of
`false` should keep the existing behavior (do not modify CSR and
certificate).
Ref: https://github.com/smallstep/certificates/issues/259
4 years ago