Mariano Cano
440616cffa
Merge pull request #750 from smallstep/duration-errors
...
Report duration errors directly to the cli.
3 years ago
Mariano Cano
acd0bac025
Remove extra and in comment.
3 years ago
Mariano Cano
1aadd63cef
Use always badRequest on duration errors.
3 years ago
Mariano Cano
41fec1577d
Report duration errors directly to the cli.
3 years ago
Herman Slatman
e7a988b2cd
Pin golangci-lint to v1.43.0 and fix issues
3 years ago
Herman Slatman
3151255a25
Merge branch 'master' into hs/acme-revocation
3 years ago
Herman Slatman
e0b495e4c8
Merge branch 'master' into hs/acme-eab
3 years ago
max furman
933b40a02a
Introduce gocritic linter and address warnings
3 years ago
Herman Slatman
9d4cafc4bd
Merge branch 'master' into hs/acme-eab
3 years ago
Mariano Cano
a50654b468
Check for admins in both emails and groups.
3 years ago
Herman Slatman
66464ae302
Merge branch 'master' into hs/acme-eab
3 years ago
Mariano Cano
141c519171
Simplify check of principals in a case insensitive way
...
Fixes #679
3 years ago
Fearghal O Floinn
7a94b0c157
Converts group and subgroup to lowercase for comparison.
...
Fixes #679
3 years ago
Mariano Cano
f919535475
Add an extra way to distinguish Azure and Azure OIDC tokens.
...
We used to distinguish these tokens using the azp claim, but this
claim does not appear on new azure oidc tokens, at least on some
configurations.
This change will try to load by audience (client id) if the token
contains an email, required for OIDC.
3 years ago
Herman Slatman
a98fe03e80
Merge branch 'master' into hs/acme-eab
3 years ago
Mariano Cano
40e77f6e9a
Initialize required variables on GetIdentityToken
...
Fixes smallstep/cli#465
3 years ago
Mariano Cano
42fde8ba28
Merge branch 'master' into linkedca
3 years ago
Mariano Cano
d4ae267add
Fix ErrAllowTokenReuse comment.
3 years ago
Mariano Cano
9e5762fe06
Allow the reuse of azure token if DisableTrustOnFirstUse is true
...
Azure caches tokens for 24h and we cannot issue a new certificate
for the same instance in that period of time.
The meaning of this parameter is to allow the signing of multiple
certificate in one instance. This is possible in GCP, because we
get a new token, and is possible in AWS because we can generate
a new one. On Azure there was no other way to do it unless you
wait for 24h.
Fixes #656
3 years ago
Herman Slatman
f31ca4f6a4
Add tests for validateExternalAccountBinding
3 years ago
Mariano Cano
f7542a5bd9
Move check of ssh revocation from provisioner to the authority.
3 years ago
Herman Slatman
f81d49d963
Add first working version of External Account Binding
3 years ago
Herman Slatman
258efca0fa
Improve revocation authorization
3 years ago
max furman
77fdfc9fa3
Merge branch 'master' into max/cert-mgr-crud
3 years ago
max furman
9fdef64709
Admin level API for provisioner mgmt v1
3 years ago
Herman Slatman
a64974c179
Fix small typo in divisible
3 years ago
Herman Slatman
d46a4eaca4
Change fmt to errors package for formatting errors
3 years ago
Herman Slatman
2beea1aa89
Add configuration option for specifying the minimum public key length
...
Instead of using the defaultPublicKeyValidator a new validator called
publicKeyMinimumLengthValidator has been implemented that uses a
configurable minimum length for public keys in CSRs.
It's also an option to alter the defaultPublicKeyValidator to also
take a parameter, but that would touch quite some lines of code. This
might be a viable option after merging SCEP support.
3 years ago
Herman Slatman
4168449935
Fix typo
3 years ago
Herman Slatman
fa100a5138
Mask challenge password after it has been read
3 years ago
Herman Slatman
97b88c4d58
Address (most) PR comments
3 years ago
Herman Slatman
4fe7179b95
Add support for configuring capabilities (cacaps)
3 years ago
Herman Slatman
3b86550dbf
Add support for challenge password
3 years ago
Herman Slatman
da65f46d0f
Add AuthorizeSign method to SCEP authority
3 years ago
Herman Slatman
2a249d20de
Refactor initialization of SCEP authority
3 years ago
Herman Slatman
339039768c
Refactor SCEP authority initialization and clean some code
3 years ago
Herman Slatman
48c86716a0
Add rudimentary (and incomplete) support for SCEP
3 years ago
max furman
638766c615
wip
3 years ago
max furman
4f3e5ef64d
wip
3 years ago
max furman
5d09d04d14
wip
3 years ago
max furman
7b5d6968a5
first commit
3 years ago
Herman Slatman
a3ec890e71
Fix small typo in divisible
3 years ago
Herman Slatman
d0a9cbc797
Change fmt to errors package for formatting errors
3 years ago
Herman Slatman
ff1b46c95d
Add configuration option for specifying the minimum public key length
...
Instead of using the defaultPublicKeyValidator a new validator called
publicKeyMinimumLengthValidator has been implemented that uses a
configurable minimum length for public keys in CSRs.
It's also an option to alter the defaultPublicKeyValidator to also
take a parameter, but that would touch quite some lines of code. This
might be a viable option after merging SCEP support.
3 years ago
Herman Slatman
c04f556dc2
Merge branch 'master' into hs/scep
3 years ago
Cristian Le
d7eec869c2
Fix the previous tests
3 years ago
Cristian Le
c2d30f7260
gofmt everything
3 years ago
Cristian Le
f38a72a62b
Leftover from previous commit
3 years ago
Cristian Le
1d2445e1d8
Removed the variadic username
...
Could be useful later on, but for the current PR changes should be minimized
3 years ago
Cristian Le
9e00b82bdf
Revert `oidc_test.go`
...
Moving the `preferred_username` to a separate PR
3 years ago
Cristian Le
decf0fc8ce
Revert using preferred_username
...
It might present a security issue if the users can change this value for themselves. Needs further investigation
3 years ago
Cristian Le
21732f213b
Fix shadow issue in CI
3 years ago
Mariano Cano
08e5ec6ad1
Fix IsAdminGroup comment.
3 years ago
Mariano Cano
46c1dc80fb
Use map[string]struct{} instead of map[string]bool
3 years ago
Mariano Cano
aafac179a5
Add test for oidc with preferred usernames.
3 years ago
Cristian Le
f730c0bec4
Sanitize usernames
3 years ago
Cristian Le
48666792c7
Draft: adding usernames to GetIdentityFunc
3 years ago
Cristian Le
79eec83f3e
Rename and reformat to PreferredUsername
3 years ago
Cristian Le
09a21fef26
Implement #550
...
- Read `preferred_username` from token
- Add `preferred_username` to the default Usernames
- Check the `admin` array for admin groups that the user might belong to
3 years ago
Herman Slatman
2336936b5c
Fix typo
4 years ago
Herman Slatman
9787728fbd
Mask challenge password after it has been read
4 years ago
Herman Slatman
0487686f69
Merge branch 'master' into hs/scep
4 years ago
max furman
2ae43ef2dc
[acme db interface] wip errors
4 years ago
Herman Slatman
583d60dc0d
Address (most) PR comments
4 years ago
Herman Slatman
2536a08dc2
Add support for configuring capabilities (cacaps)
4 years ago
Herman Slatman
e4d7ea8fa0
Add support for challenge password
4 years ago
Herman Slatman
311c9d767b
Add AuthorizeSign method to SCEP authority
4 years ago
Herman Slatman
7ad90d10b3
Refactor initialization of SCEP authority
4 years ago
Herman Slatman
713b571d7a
Refactor SCEP authority initialization and clean some code
4 years ago
Herman Slatman
ffdd58ea3c
Add rudimentary (and incomplete) support for SCEP
4 years ago
max furman
16665c97f0
Allow empty SAN in CSR for validation ...
...
- The default template will always use the SANs from the token.
- If there are any SANs they must be validated against the token.
4 years ago
Mariano Cano
5017b7d21f
Recalculate token id instead of validating it.
4 years ago
Mariano Cano
86c947babc
Upgrade crypto and fix test.
4 years ago
Mariano Cano
0cf594a003
Validate payload ID.
...
Related to #435
4 years ago
Mariano Cano
39b23c057d
Add all AWS certificates used to verify base64 signatures.
4 years ago
Mariano Cano
7d1686dc53
Add option to specify the AWS IID certificates to use.
...
This changes adds a new option `iidRoots` that allows a user to
define one or more certificates that will be used for AWS IID
signature validation.
Fixes #393
4 years ago
Mariano Cano
4c8bf87dc1
Use new admin template for K8ssa and admin-OIDC provisioners.
...
This change replaces the .Insecure.CR template to one that sets
all the SANs, but uses key usages and extended key usages for
regular TLS certificates.
4 years ago
Mariano Cano
276e307a1d
Add extra tests for CustomSSHTemplateOptions
4 years ago
max furman
da9f0b09af
Ignore `null` string for x509 and ssh templateData.
4 years ago
Mariano Cano
81c6e01269
Fix unit test.
4 years ago
max furman
ce9af5c20f
Standardize k8ssa check on issuer name
4 years ago
Mariano Cano
8ee246edda
Upgrade go.step.sm to v0.4.0
4 years ago
Mariano Cano
35bd3ec383
Merge pull request #329 from smallstep/ssh-cert-templates
...
SSH cert templates
4 years ago
Mariano Cano
b7269b6579
Fix comment.
4 years ago
Mariano Cano
c94a1c51be
Merge branch 'master' into ssh-cert-templates
4 years ago
Mariano Cano
ba918100d0
Use go.step.sm/crypto/jose
...
Replace use of github.com/smallstep/cli/crypto with the new package
go.step.sm/crypto/jose.
4 years ago
max furman
46fc922afd
Remove unused code; fix usage wrong word; add gap time for unit test
4 years ago
Mariano Cano
d30a95236d
Use always go.step.sm/crypto
4 years ago
Mariano Cano
aaaa7e9b4e
Merge branch 'master' into cert-templates
4 years ago
Mariano Cano
e83e47a91e
Use sshutil and randutil from go.step.sm/crypto.
4 years ago
Mariano Cano
f437b86a7b
Merge branch 'cert-templates' into ssh-cert-templates
4 years ago
Mariano Cano
c8d225a763
Use x509util from go.step.sm/crypto/x509util
4 years ago
Mariano Cano
37f84e9bb3
Add delay in test.
4 years ago
Mariano Cano
8d89bbd62f
Remove unused code.
4 years ago
Mariano Cano
c4bbc81d9f
Fix authority tests.
4 years ago
Mariano Cano
413af88aad
Fix provisioning tests.
4 years ago
Mariano Cano
b66bdfabcd
Enforce an OIDC users to send all template variables.
4 years ago
Mariano Cano
9822305bb6
Use only the IID template on IID provisioners.
...
Use always sshutil.DefaultIIDCertificate and require at least one
principal on IID provisioners.
4 years ago
Mariano Cano
aa657cdb4b
Use SSHOptions inside provisioner options.
4 years ago
Mariano Cano
02379d494b
Add support for extensions and critical options on the identity
...
function.
4 years ago
Mariano Cano
8ff8d90f8c
On JWK and X5C validate the key id on the request.
4 years ago
Mariano Cano
a78f7e8913
Add template support on k8ssa provisioner.
4 years ago
Mariano Cano
6c36ceb158
Add initial template support for iid provisisioners.
4 years ago
Mariano Cano
8e7bf96769
Fix error prefix.
4 years ago
Mariano Cano
e0dce54338
Add missing argument.
4 years ago
Mariano Cano
c1fc45c872
Simplify SSH modifiers with options.
...
It also changes the behavior of the request options to modify only
the validity of the certificate.
4 years ago
Mariano Cano
ad28f0f59a
Move variable where it is used.
4 years ago
Mariano Cano
715eb4eacc
Add initial support for ssh templates on OIDC.
4 years ago
Mariano Cano
c2dc76550c
Add ssh certificate template to X5C provisioner.
4 years ago
Mariano Cano
380a0d6daf
Add ssh certificate templates to JWK provisioner.
4 years ago
Mariano Cano
f75a12e10a
Add omitempty tag option.
4 years ago
Mariano Cano
570ede45e7
Do not enforce number of principals or extensions.
4 years ago
Mariano Cano
631f1612a1
Add TemplateData to SignSSHOptions.
4 years ago
Mariano Cano
c6746425a3
Add methods to initialize ssh templates in provisioners.
4 years ago
Mariano Cano
3e80f41c19
Change provisioner options to have X509 as a field.
4 years ago
David Cowden
86efe7aff0
aws: use http.NoBody instead of nil
...
It's a little more descriptive.
4 years ago
David Cowden
2b121efc8f
aws: test constructor with empty IDMS string array
4 years ago
Mariano Cano
6c64fb3ed2
Rename provisioner options structs:
...
* provisioner.ProvisionerOptions => provisioner.Options
* provisioner.Options => provisioner.SignOptions
* provisioner.SSHOptions => provisioner.SingSSHOptions
4 years ago
David Cowden
dc39eef721
aws: test badIDMS functional path
...
The existing test only covers the constructor logic. Also test the live
code path that is executed when a bad IDMS version is supplied.
4 years ago
David Cowden
51f16ee2e0
aws: add tests covering metadata service versions
...
* Add constructor tests for the aws provisioner.
* Add a test to make sure the "v1" logic continues to work.
By and large, v2 is the way to go. However, there are some instances of
things that specifically request metadata service version 1 and so this
adds minimal coverage to make sure we don't accidentally break the path
should anyone need to depend on the former logic.
4 years ago
David Cowden
5efe5f3573
metadata-v2: pull in joshathysolate-master
...
Taking of this PR to get it across the goal line.
4 years ago
Mariano Cano
5ac3f8a160
Add provisioner options tests.
4 years ago
Mariano Cano
02c4f9817d
Set full token payload instead of only the known properties.
4 years ago
Mariano Cano
0c8376a7f6
Fix existing unit tests.
4 years ago
Mariano Cano
a7fe0104c4
Remove ACME restrictions and add proper template support.
4 years ago
Mariano Cano
cf2989a848
Add token and subject to K8sSA provisioner to be used in custom
...
templates.
4 years ago
Mariano Cano
71be83b25e
Add iss#sub uri in OIDC certificates.
...
Admin will use the CR template if none is provided.
4 years ago
Mariano Cano
c58117b30d
Allow to use base64 when defining a template in the ca.json.
4 years ago
Mariano Cano
b2ca3176f5
Prepend insecure to user and CR variables names.
4 years ago
Mariano Cano
b11486f41f
Fix option method for template variable.
4 years ago
Mariano Cano
04f5053a7a
Add template support for x5c.
4 years ago
Mariano Cano
eb8886d828
Add CR subject as iid default subject.
...
Add a minimal subject with just a common name to iid provisioners
in case we want to use it.
4 years ago
Mariano Cano
e60ea419cc
Add template support for gcp provisioner.
4 years ago
Mariano Cano
32646c49bf
Add templates support to Azure provisioner.
4 years ago
Mariano Cano
a44f0ca866
Add token payload.
4 years ago
Mariano Cano
00fd41a3d0
Add template support to K8sSA provisioners.
4 years ago
Mariano Cano
13b704aeed
Add template support for AWS provisioner.
4 years ago
Mariano Cano
49b9aa6e3f
Fix log string.
4 years ago
Mariano Cano
4795e371bd
Add back the support for ca.json DN template.
4 years ago
Mariano Cano
e6fed5e0aa
Minor fixes and comments.
4 years ago
Mariano Cano
81cd288104
Enable templates in acme provisioners.
4 years ago
Mariano Cano
ca2fb42d68
Move options to the provisioner.
4 years ago
Mariano Cano
206bc6757a
Add initial support for templates in the OIDC provisioner.
4 years ago
Mariano Cano
95c3a41bf0
Rename UserData to TemplateData and fix unmarshaling.
4 years ago
Mariano Cano
9f3acc254b
Set the token payload in the JWK provisioner.
4 years ago
Mariano Cano
ef0ed0ff95
Integrate simple templates in the JWK provisioner.
4 years ago
Mariano Cano
9032018cf2
Convert x509util.WithOptions to new modifiers.
4 years ago
Carl Tashian
912e298043
Whitelist -> Allowlist per https://tools.ietf.org/id/draft-knodel-terminology-01.html
4 years ago
max furman
accf1be7e9
wip
4 years ago
max furman
71d87b4e61
wip
4 years ago