Herman Slatman
b8510dd5b2
Make the `requestid` an exported middleware
4 months ago
Herman Slatman
d392c169fc
Improve functional coverage of request ID integration test
4 months ago
Herman Slatman
7e5f10927f
Decouple request ID middleware from logging middleware
4 months ago
Herman Slatman
c16a0b70ee
Remove `smallstep/assert` and `pkg/errors` from webhook tests
4 months ago
Herman Slatman
9689508709
Add tests for webhook request IDs
4 months ago
Herman Slatman
2a8b80a3e1
Merge branch 'master' into herman/webhook-request-id
4 months ago
Remi Vichery
ee44ac104d
fixup! Add AWS ca-west-1 identity document certificate
4 months ago
Remi Vichery
283d46d9a7
Add AWS ca-west-1 identity document certificate
4 months ago
Mariano Cano
b20af51f32
Upgrade go.step.sm/crypto to use go-jose/v3
6 months ago
Herman Slatman
f082cbc421
Denormalize provisioner name in SCEP webhook
8 months ago
Herman Slatman
9ebc8779f5
Normalize SCEP provisioner name in webhook body
8 months ago
Herman Slatman
e815864ed8
Add verification of `provisionerName` in test
8 months ago
Herman Slatman
de45d66cdb
Add `provisionerName` to webhook request body
8 months ago
Mariano Cano
49045a1150
Change CommonName validator in JWK
...
This commit changes the common name validator in the JWK provisioner to
accept either the token subject or any of the sans in the token.
8 months ago
Max
9f84f7ce35
Allow for identity certificate signing (in sshSign) by skipping validators ( #1572 )
...
- skip urisValidator for identity certificate signing. Implemented
by building the validator with the context in a hacky way.
9 months ago
Mariano Cano
52baf52f84
Change scep password type to string
...
This commit changes the type of the decrypter key password to string to
be consistent with other passwords in the ca.json
9 months ago
Herman Slatman
4554f86f16
Make SCEP decrypter properties use `omitempty`
9 months ago
Herman Slatman
ffe079f31b
Merge branch 'master' into herman/scep-provisioner-decrypter
9 months ago
Mariano Cano
31da66c124
Fix webhooks signature
...
This commit fixes the way webhooks signatures are created. Before this
change, the signature of an empty body was prepended by the body itself.
9 months ago
Herman Slatman
3f3b67e05c
Merge branch 'herman/scep-provisioner-decrypter' into herman/scep-notifying-webhook
9 months ago
Herman Slatman
ba72710e2d
Address code review remarks
9 months ago
Herman Slatman
5f8e0de1c3
Fix duplicate import in SCEP provisioner
9 months ago
Herman Slatman
3ade92f8d5
Support both a decrypter key URI as well as PEM
9 months ago
Herman Slatman
b6c95d7be2
Add additional properties to SCEP notify webhook request body
9 months ago
Herman Slatman
63257e0576
Add full certificate DER bytes to success notification webhook
9 months ago
Herman Slatman
52bc96760b
Add SCEP certificate issuance notification webhook
9 months ago
Herman Slatman
4e06bdbc51
Add `SignWithContext` method to authority and mocks
9 months ago
Herman Slatman
b2301ea127
Remove the webhook `Do` method
9 months ago
Herman Slatman
f3229d3e3c
Propagate (original) request ID to webhook requests
...
Technically the webhook request is a new request, so maybe the
`X-Request-ID` should not be set to the value of the original
request? But then the original request ID should be propageted
in the webhook request body, or using a different header.
The way the request ID is used in this functionality is actually
more like a tracing ID, so that may be an option too.
9 months ago
Herman Slatman
33e661ce7d
Add a dummy CSR to SCEP request body tests
10 months ago
Herman Slatman
36f1dd70bf
Add CSR to `SCEPCHALLENGE` webhook request body
10 months ago
Herman Slatman
98d015b5c3
Fix linting issues
10 months ago
Herman Slatman
d9f56cdbdc
Merge branch 'master' into herman/scep-provisioner-decrypter
10 months ago
Herman Slatman
9d3b78ae49
Add `excludeIntermediate` to SCEP provisioner
10 months ago
Remi Vichery
82b8e16d7f
Add all AWS identity document certificates
...
* move to use embed instead of a multi-line string
* add test to ensure all certificates are valid
* add test to ensure validity (no expired certificate)
10 months ago
Herman Slatman
645b6ffc18
Ensure no prompt is fired for loading provisioner decrypter
11 months ago
Herman Slatman
e2e9bf5494
Clarify some SCEP properties
11 months ago
Herman Slatman
c0a1837cd9
Verify full decrypter/signer configuration at usage time
...
When changing the SCEP configuration it is possible that one
or both of the decrypter configurations required are not available
or have been provided in a way that's not usable for actual SCEP
requests.
Instead of failing hard when provisioners are loaded,
which could result in the CA not starting properly, this type of
problematic configuration errors will now be handled at usage
time instead.
11 months ago
Herman Slatman
569a1be12c
Merge branch 'master' into herman/scep-provisioner-decrypter
11 months ago
Mariano Cano
cce7d9e839
Address comments from code review
11 months ago
Mariano Cano
c7c7decd5e
Add support for the disableSmallstepExtensions claim
...
This commit adds a new claim to exclude the Smallstep provisioner
extension from the generated certificates.
Fixes #620
11 months ago
Herman Slatman
1ce80cf740
Merge branch 'master' into herman/scep-provisioner-decrypter
11 months ago
Herman Slatman
567fc25404
Use the RSA decryption configuration for signing responses too
11 months ago
Mariano Cano
7061147885
Use step.Abs to load the certificate templates
...
step.Abs has been removed from crypto and they need to be set when those
methods are used
11 months ago
Mariano Cano
95887ebf40
Merge pull request #1481 from smallstep/remove-user-regex
...
Remove OIDC user regexp check
11 months ago
Josh Drake
ff424fa944
Fix tests.
11 months ago
Josh Drake
904f416d20
Include authorization principal in provisioner webhooks.
11 months ago
Mariano Cano
5bfe96d8c7
Send X5C leaf certificate to webhooks
...
This commit adds a new property that will be sent to authorizing and
enriching webhooks when signing certificates using the X5C provisioner.
11 months ago
Mariano Cano
7fa97bedec
Remove OIDC user regexp check
...
This commit removes the regular expression check on OIDC usernames.
Although it is not recommended to use any character in a username,
it is possible to create and use them. The tool useradd has the flag
--badname and adduser has --allow-badname and --allow-all-names to
create new users with any character.
Moreover, it is possible to create any username with the rest of
provisioners.
Fixes #1436
11 months ago
Herman Slatman
6985b4be62
Clean up the SCEP authority and provisioner
1 year ago