Commit Graph

191 Commits (84ea8bd67aa18909ff6d78b7b46eb926cb584076)

Author SHA1 Message Date
Herman Slatman bc2bb53009
Merge branch 'master' into hs/scep 3 years ago
Mariano Cano 26e7cc6177 Allow to use the SDK with ed25519 keys. 3 years ago
Herman Slatman c04f556dc2
Merge branch 'master' into hs/scep 3 years ago
max furman 8c709fe3c2 Init config on load | Add wrapper for cli 3 years ago
Mariano Cano 5846314f88 Add missing Rekey method to the ca.Client
Fixes #315
3 years ago
Herman Slatman 68d5f6d0d2
Merge branch 'master' into hs/scep 3 years ago
Mariano Cano 1328aa3e47 Fix review comments. 3 years ago
Mariano Cano 50b9aaec57 Add new identity tests. 3 years ago
Mariano Cano e414d0c8ea Fix unit tests. 3 years ago
Mariano Cano c5234e9c61 Refactor tls tunnel connections.
New method will use an identity-like file with the configuration
used to create the (m)TLS connection to the tunnel.
3 years ago
Mariano Cano e75a9409a5 Add experimental support for a TLS over TLS tunnel. 3 years ago
Herman Slatman 0487686f69
Merge branch 'master' into hs/scep 4 years ago
Mariano Cano 02a5879cfe Specify always a Proxy in all custom transports.
Fixes #535
4 years ago
max furman 93c3c2bf2e Error handle non existent provisioner downstream and disable debug route logging 4 years ago
max furman b1888fd34d Use different method for unescpaed paths for the router 4 years ago
Max b724af30ad
Merge pull request #496 from smallstep/max/acme
Convert to ACME DB interface
4 years ago
max furman 672e3f976e Few ACME fixes ...
- always URL escape linker output
- validateJWS should accept RSAPSS
- GetUpdateAccount -> GetOrUpdateAccount
4 years ago
Herman Slatman 2320d0911e
Add sync.WaitGroup for proper error handling in Run() 4 years ago
Herman Slatman b815478981
Make serving SCEP endpoints optional
Only when a SCEP provisioner is enabled, the SCEP endpoints
will now be available.

The SCEP endpoints will be served on an "insecure" server,
without TLS, only when an additional "insecureAddress" and a
SCEP provisioner are configured for the CA.
4 years ago
Herman Slatman c5e4ea08b3
Merge branch 'master' into hs/scep 4 years ago
Herman Slatman b97f024f8a
Remove superfluous call to StoreCertificate 4 years ago
max furman df05340521 fixing broken unit tests 4 years ago
max furman f72b2ff2c2 [acme db interface] nosql authz unit tests 4 years ago
max furman 074ab7b221 [acme db interface] add linker tests 4 years ago
max furman bb8d54e596 [acme db interface] unit tests compiling 4 years ago
max furman fc395f4d69 [acme db interface] compiles! 4 years ago
max furman 80a6640103 [acme db interface] wip 4 years ago
Mariano Cano 8c8c160c92 Fix method name in comment. 4 years ago
Mariano Cano bdeb0ccd7c Add support for the flag --issuer-password-file
The new flag allows to pass a file with the password used to decrypt
the key used in RA mode.
4 years ago
Herman Slatman 583d60dc0d
Address (most) PR comments 4 years ago
Herman Slatman e1cab4966f
Improve initialization of SCEP authority 4 years ago
Herman Slatman 8c5b12e21d
Add non-TLS server and improve crypto.Decrypter interface
A server without TLS was added to serve the SCEP endpoints. According
to the RFC, SCEP has to be served via HTTP. The `sscep` client, for
example, will stop any URL that does not start with `http://` from
being used, so serving SCEP seems to be the right way to do it.

This commit adds a second server for which no TLS configuration is
configured. A distinct field in the configuration, `insecureAddress`
was added to specify the address for the insecure server.

The SCEP endpoints will also still be served via HTTPS. Some clients
may be able to work with that.

This commit also improves how the crypto.Decrypter interface is
handled for the different types of KMSes supported by step. The
apiv1.Decrypter interface was added. Currently only SoftKMS
implements this interface, providing a crypto.Decrypter required
for SCEP operations.
4 years ago
Herman Slatman 2d21b09d41
Remove some duplicate and unnecessary logic 4 years ago
Herman Slatman 3a5f633cdd
Add support for multiple SCEP provisioners
Similarly to how ACME suppors multiple provisioners, it's
now possible to load the right provisioner based on the
URL.
4 years ago
Herman Slatman 7948f65ac0
Merge branch 'master' into hs/scep 4 years ago
Herman Slatman 7ad90d10b3
Refactor initialization of SCEP authority 4 years ago
Mariano Cano 5be86691c1 Fix unit tests in Go 1.16. 4 years ago
Herman Slatman 78d78580b2
Add note about using a second (unsecured) server 4 years ago
Herman Slatman 9e43dc85d8
Merge branch 'master' into hs/scep-master 4 years ago
Herman Slatman 713b571d7a
Refactor SCEP authority initialization and clean some code 4 years ago
Herman Slatman ffdd58ea3c
Add rudimentary (and incomplete) support for SCEP 4 years ago
Mariano Cano b487edbd13 Clarify comment. 4 years ago
Mariano Cano fbd2208044 Close key manager for safe reloads when a cgo module is used. 4 years ago
Mariano Cano 40d0596b71 Use smallstep/cli-utils instead of smallstep/cli 4 years ago
Mariano Cano ba918100d0 Use go.step.sm/crypto/jose
Replace use of github.com/smallstep/cli/crypto with the new package
go.step.sm/crypto/jose.
4 years ago
Mariano Cano d30a95236d Use always go.step.sm/crypto 4 years ago
Mariano Cano 533ad0ca20 Use always go.step.sm/crypto/x509util 4 years ago
Mariano Cano 4943ae58d8 Move TLSOption, TLSVersion, CipherSuites and ASN1DN to certificates. 4 years ago
Mariano Cano e83e47a91e Use sshutil and randutil from go.step.sm/crypto. 4 years ago
Mariano Cano 6c64fb3ed2 Rename provisioner options structs:
* provisioner.ProvisionerOptions => provisioner.Options
* provisioner.Options => provisioner.SignOptions
* provisioner.SSHOptions => provisioner.SingSSHOptions
4 years ago