Herman Slatman
f082cbc421
Denormalize provisioner name in SCEP webhook
11 months ago
Herman Slatman
9ebc8779f5
Normalize SCEP provisioner name in webhook body
11 months ago
Herman Slatman
de45d66cdb
Add `provisionerName` to webhook request body
11 months ago
Mariano Cano
52baf52f84
Change scep password type to string
...
This commit changes the type of the decrypter key password to string to
be consistent with other passwords in the ca.json
1 year ago
Herman Slatman
4554f86f16
Make SCEP decrypter properties use `omitempty`
1 year ago
Herman Slatman
3f3b67e05c
Merge branch 'herman/scep-provisioner-decrypter' into herman/scep-notifying-webhook
1 year ago
Herman Slatman
ba72710e2d
Address code review remarks
1 year ago
Herman Slatman
5f8e0de1c3
Fix duplicate import in SCEP provisioner
1 year ago
Herman Slatman
3ade92f8d5
Support both a decrypter key URI as well as PEM
1 year ago
Herman Slatman
b6c95d7be2
Add additional properties to SCEP notify webhook request body
1 year ago
Herman Slatman
63257e0576
Add full certificate DER bytes to success notification webhook
1 year ago
Herman Slatman
52bc96760b
Add SCEP certificate issuance notification webhook
1 year ago
Herman Slatman
36f1dd70bf
Add CSR to `SCEPCHALLENGE` webhook request body
1 year ago
Herman Slatman
98d015b5c3
Fix linting issues
1 year ago
Herman Slatman
9d3b78ae49
Add `excludeIntermediate` to SCEP provisioner
1 year ago
Herman Slatman
645b6ffc18
Ensure no prompt is fired for loading provisioner decrypter
1 year ago
Herman Slatman
e2e9bf5494
Clarify some SCEP properties
1 year ago
Herman Slatman
c0a1837cd9
Verify full decrypter/signer configuration at usage time
...
When changing the SCEP configuration it is possible that one
or both of the decrypter configurations required are not available
or have been provided in a way that's not usable for actual SCEP
requests.
Instead of failing hard when provisioners are loaded,
which could result in the CA not starting properly, this type of
problematic configuration errors will now be handled at usage
time instead.
1 year ago
Herman Slatman
569a1be12c
Merge branch 'master' into herman/scep-provisioner-decrypter
1 year ago
Mariano Cano
c7c7decd5e
Add support for the disableSmallstepExtensions claim
...
This commit adds a new claim to exclude the Smallstep provisioner
extension from the generated certificates.
Fixes #620
1 year ago
Herman Slatman
567fc25404
Use the RSA decryption configuration for signing responses too
1 year ago
Herman Slatman
6985b4be62
Clean up the SCEP authority and provisioner
1 year ago
Herman Slatman
180162bd6a
Refactor SCEP provisioner and decrypter
1 year ago
Herman Slatman
0377fe559b
Add basic version of provisioner specific SCEP decrypter
1 year ago
max furman
8b256f0351
address linter warning for go 1.19
1 year ago
Herman Slatman
0153ff4377
Remove superfluous `GetChallengePassword`
1 year ago
Herman Slatman
f9ec62f46c
Merge branch 'master' into herman/improve-scep-marshaling
1 year ago
Herman Slatman
c73f157ea4
Remove unused error from challenge validation controller creator
1 year ago
Herman Slatman
e8c1e8719d
Refactor SCEP webhook validation
1 year ago
Herman Slatman
f2e1c56c6c
Improve SCEP provisioner marshaling
2 years ago
Andrew Reed
7101fbb0ee
Provisioner webhooks ( #1001 )
2 years ago
Herman Slatman
5e9bce508d
Unexport GetPolicy()
2 years ago
Herman Slatman
c40a4d2694
Contain policy engines inside provisioner Controller
2 years ago
Herman Slatman
9797b3350e
Merge branch 'master' into herman/allow-deny
3 years ago
Herman Slatman
b49307f326
Fix ACME order tests with mock ACME CA
3 years ago
Herman Slatman
dc23fd23bf
Merge branch 'master' into herman/allow-deny-next
3 years ago
Mariano Cano
b401376829
Add current provisioner to AuthorizeSign SignOptions.
...
The original provisioner cannot be retrieved from a certificate
if a linked ra is used.
3 years ago
Mariano Cano
259e95947c
Add support for the provisioner controller
...
The claimer, audiences and custom callback methods are now managed
by the provisioner controller in an uniform way.
3 years ago
Herman Slatman
7c541888ad
Refactor configuration of allow/deny on authority level
3 years ago
Herman Slatman
acd13cb92d
Merge branch 'master' of github.com:smallstep/certificates into herman/allow-deny
3 years ago
Herman Slatman
512b8d6730
Refactor instantiation of policy engines
...
Instead of using the `base` struct, the x509 and SSH policy
engines are now added to each provisioner directly.
3 years ago
Herman Slatman
64680bb16d
Fix PR comments
3 years ago
Herman Slatman
3612eefc31
Cleanup
3 years ago
Herman Slatman
9c6580ccd2
Fix macOS SCEP client issues
...
Fixes #746
3 years ago
Herman Slatman
9539729bd9
Add initial implementation of x509 and SSH allow/deny policy engine
3 years ago
max furman
77fdfc9fa3
Merge branch 'master' into max/cert-mgr-crud
3 years ago
max furman
9fdef64709
Admin level API for provisioner mgmt v1
3 years ago
Herman Slatman
a64974c179
Fix small typo in divisible
3 years ago
Herman Slatman
d46a4eaca4
Change fmt to errors package for formatting errors
3 years ago
Herman Slatman
2beea1aa89
Add configuration option for specifying the minimum public key length
...
Instead of using the defaultPublicKeyValidator a new validator called
publicKeyMinimumLengthValidator has been implemented that uses a
configurable minimum length for public keys in CSRs.
It's also an option to alter the defaultPublicKeyValidator to also
take a parameter, but that would touch quite some lines of code. This
might be a viable option after merging SCEP support.
3 years ago