Commit Graph

522 Commits (68a1c859b078966fd3298cbe10bda3c594b48d27)

Author SHA1 Message Date
Remi Vichery 82b8e16d7f
Add all AWS identity document certificates
* move to use embed instead of a multi-line string
* add test to ensure all certificates are valid
* add test to ensure validity (no expired certificate)
11 months ago
Mariano Cano cce7d9e839
Address comments from code review 11 months ago
Mariano Cano c7c7decd5e
Add support for the disableSmallstepExtensions claim
This commit adds a new claim to exclude the Smallstep provisioner
extension from the generated certificates.

Fixes #620
11 months ago
Mariano Cano 7061147885
Use step.Abs to load the certificate templates
step.Abs has been removed from crypto and they need to be set when those
methods are used
11 months ago
Mariano Cano 95887ebf40
Merge pull request #1481 from smallstep/remove-user-regex
Remove OIDC user regexp check
11 months ago
Josh Drake ff424fa944
Fix tests. 11 months ago
Josh Drake 904f416d20
Include authorization principal in provisioner webhooks. 11 months ago
Mariano Cano 5bfe96d8c7
Send X5C leaf certificate to webhooks
This commit adds a new property that will be sent to authorizing and
enriching webhooks when signing certificates using the X5C provisioner.
11 months ago
Mariano Cano 7fa97bedec
Remove OIDC user regexp check
This commit removes the regular expression check on OIDC usernames.
Although it is not recommended to use any character in a username,
it is possible to create and use them. The tool useradd has the flag
--badname and adduser has --allow-badname and --allow-all-names to
create new users with any character.

Moreover, it is possible to create any username with the rest of
provisioners.

Fixes #1436
12 months ago
Mariano Cano 71fcdf8a0a
Fix linter errors from #1404 1 year ago
Ruslan Nugmanov 1031324273
add AWS public certificates for me-central-1 and ap-southeast-3
As per https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/verify-signature.html
1 year ago
max furman 8b256f0351
address linter warning for go 1.19 1 year ago
Herman Slatman 0153ff4377
Remove superfluous `GetChallengePassword` 1 year ago
Herman Slatman f9ec62f46c
Merge branch 'master' into herman/improve-scep-marshaling 1 year ago
Herman Slatman c73f157ea4
Remove unused error from challenge validation controller creator 1 year ago
Herman Slatman e8c1e8719d
Refactor SCEP webhook validation 1 year ago
Herman Slatman 419478d1e5
Make SCEP webhook validation look better 1 year ago
Herman Slatman dfc56f21b8
Merge branch 'master' into herman/acme-da-tpm 1 year ago
Mariano Cano ac35f3489c
Remove unused certificate validators and modifiers
With the introduction of certificate templates some certificate
validators and modifiers are not used anymore. This commit deletes the
ones that are not used.
1 year ago
Remi Vichery 09cbe8ba65
fixup! Add identity token for all Azure cloud environments 1 year ago
Herman Slatman 6297bace1a
Merge branch 'master' into herman/acme-da-tpm 1 year ago
Remi Vichery b2c2eec76b
Add identity token for all Azure cloud environments
* Azure Public Cloud (default)
* Azure China Cloud
* Azure US Gov Cloud
* Azure German Cloud
1 year ago
Herman Slatman 59462e826c
Improve testing errors for OIDC `authorizeToken` function 1 year ago
Herman Slatman 10958a124b
Add email address to error message returned for OIDC validation 1 year ago
Herman Slatman f1724ea8c5
Merge branch 'master' into herman/acme-da-tpm 1 year ago
Mariano Cano 5d87201abc
Ignore principals validations with OIDC
This commit will ignore principals validation when an OIDC provisioner
is used. When the principals in the server does not match the principals
given the validation was failing, even if the proper principals were set
by templates or webhooks. With this change OIDC will not validate the
principals and just set the default ones (name, name@example.org) plus
the ones in the templates.

This commit also includes a change in the templates to allow to pass
a provisioner to the $(step path)/ssh/config template

Related to #807
2 years ago
Herman Slatman c365d8580e
Move provisioner marshaling logic to api package 2 years ago
Herman Slatman f2e1c56c6c
Improve SCEP provisioner marshaling 2 years ago
Herman Slatman 85cd9a1277
Fix some ACME DA doc strings (slightly) 2 years ago
Herman Slatman b9f238ad4d
Add additional ACME `meta` properties to provisioner configuration 2 years ago
Herman Slatman cbc0864370
Remove TODO and clarify ACME revoke authorization method docs 2 years ago
max furman 7203739369
Fix err assert linter warnings - upgrade outdated package 2 years ago
Andrew Reed 2c5e41b093
Fix webhook controller ignoring cert type 2 years ago
Andrew Reed 7101fbb0ee
Provisioner webhooks (#1001) 2 years ago
max furman 4c7a2ce3eb
Fix errors.As linter warnings 2 years ago
max furman 2d4efc8292
Fix linter warnings 2 years ago
max furman 75bb196193
Add concurrency workflow config | fix broken test due to golang ver 2 years ago
max furman 7c5e5b2b87
Even more linter fixes 2 years ago
max furman f3d1863ec6
A few more linter errors 2 years ago
max furman 1e0ea6f958
more linting fixes 2 years ago
max furman 33458c88aa
Standardize linting file and fix or ignore lots of linting errors 2 years ago
Mariano Cano f0a24bd8ca
Add acme property to enable challenges
Fixes #1027
2 years ago
Max 2de7d3fcf0
Update authority/provisioner/claims.go
Co-authored-by: Mariano Cano <mariano@smallstep.com>
2 years ago
max furman ab0d2503ae
Standardize linting file and fix or ignore lots of linting errors 2 years ago
Mariano Cano 34c6c65671 Pass attestation information to the Sign method
Attestation information might be useful in authorizing webhooks
2 years ago
Mariano Cano 42102d88d5 Fix merge and add unit tests 2 years ago
Mariano Cano ee7307bd41 Cherry-pick acme.go from acdfdf3 2 years ago
Mariano Cano 1e098aef5b Fixes ACMEAttestationFormat comment 2 years ago
Mariano Cano ba42aaf865 Add attestationFormat property in the ACME provisioner 2 years ago
Mariano Cano b2119e9f2c
Merge pull request #977 from smallstep/device-attestation
Device attestation
2 years ago