Mariano Cano
343e7308a8
Remove Disabled provisioner add add an Uninitialized state
...
This commit renames the Disabled provisioner to Uninitialized and adds
an state instead of just a boolean. It also adds tests.
3 months ago
Mariano Cano
39089325b5
Merge branch 'master' into mariano/init-provisioners
3 months ago
Mariano Cano
191f1a598d
Fix unit tests after introduction of rawSubject
3 months ago
Mariano Cano
f8bda96940
Apply suggestions from code review
...
Co-authored-by: Herman Slatman <hslatman@users.noreply.github.com>
4 months ago
Mariano Cano
cb9abbe25b
Add support for validities in templates
...
This commit upgrades go.step.sm/crypto with a version that adds support
for setting validity bounds in templates. It also adds support for these
in the certificate modifiers.
The priority for the validity bounds are:
1. Coming from flags.
2. Coming from the template.
3. Defaults.
4 months ago
Mariano Cano
a017c0e3fb
Merge branch 'master' into AuthParams
4 months ago
Max
474f5d28f4
Update hardcoded AWS certs ( #1881 )
4 months ago
max furman
99ce13a4ea
Fix linter warnings
5 months ago
Jeremy Doupe
aa543a335a
add Scopes to OIDC struct
6 months ago
Jeremy Doupe
2fcf34066b
add AuthParams to OIDC struct
6 months ago
Mariano Cano
7df3ad05ed
Merge pull request #1797 from smallstep/mariano/init-scep
...
Allow custom SCEP key manager
6 months ago
Mariano Cano
4202d6673c
Remove debug statement
6 months ago
verytrap
db92404342
chore: fix function names in comment
...
Signed-off-by: verytrap <wangqiuyue@outlook.com>
6 months ago
Mariano Cano
725a913f66
Allow custom SCEP key manager
...
This commit allows to inject a custom key manger for SCEP.
6 months ago
Mariano Cano
06a9d2e255
Allow custom SCEP key manager
...
This commit allows to inject a custom key manger for SCEP.
6 months ago
Mariano Cano
976bf0c2a2
Do not fail if a provisioner cannot be initialized
...
This commit will mark a provisioner as disabled if it fails to
initialize. The provisioner will be visible, but authorizing a token
with a disabled provisioner will always fail.
Fixes : #589 , #1757
7 months ago
Mariano Cano
10f6a901ec
Let the CA determine the RA lifetime
...
When the RA mode with StepCAS is used, let the CA decide which lifetime
the RA should get instead of requiring always 24h.
This commit also fixes linter warnings.
Related to #1094
7 months ago
Herman Slatman
b8510dd5b2
Make the `requestid` an exported middleware
8 months ago
Herman Slatman
d392c169fc
Improve functional coverage of request ID integration test
8 months ago
Herman Slatman
7e5f10927f
Decouple request ID middleware from logging middleware
8 months ago
Herman Slatman
c16a0b70ee
Remove `smallstep/assert` and `pkg/errors` from webhook tests
8 months ago
Herman Slatman
9689508709
Add tests for webhook request IDs
8 months ago
Herman Slatman
2a8b80a3e1
Merge branch 'master' into herman/webhook-request-id
8 months ago
Remi Vichery
ee44ac104d
fixup! Add AWS ca-west-1 identity document certificate
8 months ago
Remi Vichery
283d46d9a7
Add AWS ca-west-1 identity document certificate
8 months ago
Mariano Cano
b20af51f32
Upgrade go.step.sm/crypto to use go-jose/v3
10 months ago
Herman Slatman
f082cbc421
Denormalize provisioner name in SCEP webhook
11 months ago
Herman Slatman
9ebc8779f5
Normalize SCEP provisioner name in webhook body
11 months ago
Herman Slatman
e815864ed8
Add verification of `provisionerName` in test
11 months ago
Herman Slatman
de45d66cdb
Add `provisionerName` to webhook request body
11 months ago
Mariano Cano
49045a1150
Change CommonName validator in JWK
...
This commit changes the common name validator in the JWK provisioner to
accept either the token subject or any of the sans in the token.
12 months ago
Max
9f84f7ce35
Allow for identity certificate signing (in sshSign) by skipping validators ( #1572 )
...
- skip urisValidator for identity certificate signing. Implemented
by building the validator with the context in a hacky way.
1 year ago
Mariano Cano
52baf52f84
Change scep password type to string
...
This commit changes the type of the decrypter key password to string to
be consistent with other passwords in the ca.json
1 year ago
Herman Slatman
4554f86f16
Make SCEP decrypter properties use `omitempty`
1 year ago
Herman Slatman
ffe079f31b
Merge branch 'master' into herman/scep-provisioner-decrypter
1 year ago
Mariano Cano
31da66c124
Fix webhooks signature
...
This commit fixes the way webhooks signatures are created. Before this
change, the signature of an empty body was prepended by the body itself.
1 year ago
Herman Slatman
3f3b67e05c
Merge branch 'herman/scep-provisioner-decrypter' into herman/scep-notifying-webhook
1 year ago
Herman Slatman
ba72710e2d
Address code review remarks
1 year ago
Herman Slatman
5f8e0de1c3
Fix duplicate import in SCEP provisioner
1 year ago
Herman Slatman
3ade92f8d5
Support both a decrypter key URI as well as PEM
1 year ago
Herman Slatman
b6c95d7be2
Add additional properties to SCEP notify webhook request body
1 year ago
Herman Slatman
63257e0576
Add full certificate DER bytes to success notification webhook
1 year ago
Herman Slatman
52bc96760b
Add SCEP certificate issuance notification webhook
1 year ago
Herman Slatman
4e06bdbc51
Add `SignWithContext` method to authority and mocks
1 year ago
Herman Slatman
b2301ea127
Remove the webhook `Do` method
1 year ago
Herman Slatman
f3229d3e3c
Propagate (original) request ID to webhook requests
...
Technically the webhook request is a new request, so maybe the
`X-Request-ID` should not be set to the value of the original
request? But then the original request ID should be propageted
in the webhook request body, or using a different header.
The way the request ID is used in this functionality is actually
more like a tracing ID, so that may be an option too.
1 year ago
Herman Slatman
33e661ce7d
Add a dummy CSR to SCEP request body tests
1 year ago
Herman Slatman
36f1dd70bf
Add CSR to `SCEPCHALLENGE` webhook request body
1 year ago
Herman Slatman
98d015b5c3
Fix linting issues
1 year ago
Herman Slatman
d9f56cdbdc
Merge branch 'master' into herman/scep-provisioner-decrypter
1 year ago