Mariano Cano
af41ef1ab8
Merge pull request #683 from smallstep/imds-versions
...
Initialize required IMDSVersions for GetIdentityToken
3 years ago
Mariano Cano
470b546d59
Merge pull request #557 from joejulian/http01-isv
...
use InsecureSkipVerify for validation
3 years ago
Mariano Cano
40e77f6e9a
Initialize required variables on GetIdentityToken
...
Fixes smallstep/cli#465
3 years ago
Mariano Cano
352acf8faa
Upgrade golang.org/x/crypto
3 years ago
Mariano Cano
8acce7b092
Merge pull request #682 from smallstep/helm-ssh
...
Fix ssh in helm chart values
3 years ago
Mariano Cano
8cb62b6d67
Fix ssh in helm chart values.
3 years ago
Mariano Cano
c43d0362a4
Merge pull request #680 from smallstep/identity-cert-lifetime
...
Identity certificate lifetime
3 years ago
Mariano Cano
833d28cb6a
Clone the certificate in case we need to look at it later.
3 years ago
Mariano Cano
9e57e4db2c
Merge pull request #633 from smallstep/linkedca
...
Linkedca
3 years ago
Mariano Cano
2c5080aae0
go mod tidy
3 years ago
Mariano Cano
42fde8ba28
Merge branch 'master' into linkedca
3 years ago
max furman
2317bf183b
Nosql and badger bump
3 years ago
max furman
cc9bc9c84b
Bump Badger
3 years ago
Alan Christopher Thomas
21b2057ecd
Add Certificate Manager notice for the pragmatic folks
3 years ago
Mariano Cano
516b74f43a
Add comment about unused code.
3 years ago
Mariano Cano
ff25f4974f
Fix comment.
3 years ago
Mariano Cano
3d141896e2
Remove extra space.
3 years ago
Mariano Cano
e12f6fcc84
Complete phrase in step-ca export help.
3 years ago
Mariano Cano
61b8bfda1a
Fix comment typos.
3 years ago
Mariano Cano
568fce201a
Enforce identity cert to match ssh cert on renewals.
3 years ago
max furman
a3028bbc0e
Add test for updateAddOrderIDs
3 years ago
Mariano Cano
31d3bf1cfc
Update discord link
3 years ago
Carl Tashian
050b233d43
Merge branch 'docker-init'
3 years ago
Carl Tashian
f738cb43c3
Make the default provisioner name optional; change DNS names variable name
3 years ago
Carl Tashian
7f2516f33d
Merge pull request #678 from smallstep/docker-init
...
New Dockerfile with entrypoint script for easy CA init
3 years ago
Carl Tashian
4e8e4c638e
Add newline to password file for readabiliy
3 years ago
max furman
f53f78974e
Badger bump to fix issue with caddy build
3 years ago
Carl Tashian
bc63829111
Auto-generate password by default
3 years ago
Carl Tashian
7ab26c8303
Auto-generate password by default
3 years ago
Mariano Cano
33b6d4c3c8
Merge pull request #677 from smallstep/go1.17
...
Go 1.17 compatibility
3 years ago
Carl Tashian
b88b2f9808
Just adding a comment to the step-ra install script
3 years ago
Carl Tashian
8d52379771
New Dockerfile with entrypoint script for easy CA init
3 years ago
Mariano Cano
dc5205cc72
Extract the tls error code and fail accordingly.
3 years ago
Mariano Cano
ae58a0ee4e
Make tests compatible with Go 1.17.
...
With Go 1.17 tls.Dial will fail if the client and server configured
protocols do not overlap. See https://golang.org/doc/go1.17#ALPN
3 years ago
Mariano Cano
abd78e2d2a
Make kms uri compatible with Go 1.17.
...
Go 1.17 introduces a change in the net/url package disallowing the
use of semicolon (;) in URL queries. We used url.ParseQuery to
decode the opaque string that is semicolon separated. This change
replaces the semicolon with ampersands before decoding it.
3 years ago
Mariano Cano
a864f0134d
Fix key version when SHA512WithRSA is used.
...
There was a typo creating RSA keys with SHA256 digests instead of
SHA512
3 years ago
Mariano Cano
b1f59586ab
Update message to align with UI.
3 years ago
Mariano Cano
e3ef4a7da9
Update test with default tls options.
3 years ago
Mariano Cano
da2802504b
Use Default min version if not specified.
3 years ago
Mariano Cano
456ffd8806
Use linkedca v0.5.0
3 years ago
Mariano Cano
6a7ea71f19
Merge pull request #672 from smallstep/azure-tofu
...
Allow the reuse of azure tokens if DisableTrustOnFirstUse is true
3 years ago
Mariano Cano
d4ae267add
Fix ErrAllowTokenReuse comment.
3 years ago
Mariano Cano
9e5762fe06
Allow the reuse of azure token if DisableTrustOnFirstUse is true
...
Azure caches tokens for 24h and we cannot issue a new certificate
for the same instance in that period of time.
The meaning of this parameter is to allow the signing of multiple
certificate in one instance. This is possible in GCP, because we
get a new token, and is possible in AWS because we can generate
a new one. On Azure there was no other way to do it unless you
wait for 24h.
Fixes #656
3 years ago
Mariano Cano
66f6c73655
Update badger driver to use v2 by default.
3 years ago
Mariano Cano
492ff4b632
Ask for the first provisioner password if none is provided.
3 years ago
Mariano Cano
28e882c9b3
Add deployment type to export.
3 years ago
Mariano Cano
072ba4227c
Add deployment type to config.
...
This field is ignored except for the start of the ca. If the type
is linked and the token is not passed, it will fail with an error.
3 years ago
Mariano Cano
56bb3eb6e1
Add next steps for linked ca.
3 years ago
Herman Slatman
f31ca4f6a4
Add tests for validateExternalAccountBinding
3 years ago
Herman Slatman
492256f2d7
Add first test cases for EAB and make provisioner unique per EAB
...
Before this commit, EAB keys could be used CA-wide, meaning that
an EAB credential could be used at any ACME provisioner. This
commit changes that behavior, so that EAB credentials are now
intended to be used with a specific ACME provisioner. I think
that makes sense, because from the perspective of an ACME client
the provisioner is like a distinct CA.
Besides that this commit also includes the first tests for EAB.
The logic for creating the EAB JWS as a client has been taken
from github.com/mholt/acmez. This logic may be moved or otherwise
sourced (i.e. from a vendor) as soon as the step client also
(needs to) support(s) EAB with ACME.
3 years ago