Commit Graph

63 Commits (master)

Author SHA1 Message Date
Herman Slatman 113a6dd8ab
Remove reporting the CA mode from startup logs 4 weeks ago
Herman Slatman 6bc0a86207
Fix CA startup with Vault RA configuration 1 month ago
Mariano Cano 10f6a901ec
Let the CA determine the RA lifetime
When the RA mode with StepCAS is used, let the CA decide which lifetime
the RA should get instead of requiring always 24h.

This commit also fixes linter warnings.

Related to #1094
2 months ago
Venky Gopal fbc1e895c2 Allow x509 Service CA implementation to be injected through ca and authority options 4 months ago
max furman 8b256f0351
address linter warning for go 1.19 1 year ago
max furman 57c1c2071d
Correct bad comment on NotImplementedError.Error() 2 years ago
Mariano Cano c7f226bcec
Add support for renew when using stepcas
It supports renewing X.509 certificates when an RA is configured with stepcas.
This will only work when the renewal uses a token, and it won't work with mTLS.

The audience cannot be properly verified when an RA is used, to avoid this we
will get from the database if an RA was used to issue the initial certificate
and we will accept the renew token.

Fixes #1021 for stepcas
2 years ago
Raal Goff d0e81af524 Merge branch 'master' into crl-support 2 years ago
max furman 6af9437875
Rebase over master and a few more linter fixes 2 years ago
max furman 18a648cffa
Fix linter warning about bad error name 2 years ago
max furman ab0d2503ae
Standardize linting file and fix or ignore lots of linting errors 2 years ago
Raal Goff d2483f3a70 Merge branch 'master' into crl-support
# Conflicts:
#	authority/config/config.go
2 years ago
Mariano Cano 8bd0174251 Rename field to IsCAServerCert 2 years ago
Mariano Cano 5df1694250 Add endpoint id for the RA certificate
In a linked RA mode, send an endpoint id to group the server
certificates.
2 years ago
Mariano Cano eb091aec54 Simplify field names for ProvisionerInfo 2 years ago
Mariano Cano 369b8f81c3 Use go.step.sm/crypto/kms
Fixes #975
2 years ago
Mariano Cano c5c7c30cc2 Fix typo in ProvisionerInfo 2 years ago
Mariano Cano 64744562c6 Send RA provisioner to linkedca. 2 years ago
Mariano Cano 9408d0f24b Send RA provisioner information to the CA 2 years ago
Raal Goff 60671b07d7 Merge branch 'master' into crl-support
# Conflicts:
#	api/api.go
#	authority/config/config.go
#	cas/softcas/softcas.go
#	db/db.go
2 years ago
Mariano Cano 3aebe8d019 Add missing comma in comment. 2 years ago
Mariano Cano 37b521ec6c
Merge branch 'master' into feat/vault 2 years ago
Raal Goff d417ce3232 implement changes from review 2 years ago
Raal Goff e8fdb703c9 initial support for CRL 2 years ago
Mariano Cano abf5fc32a3 Format comment. 2 years ago
Mariano Cano c480936ba4 Split comments. 2 years ago
Mariano Cano 955d4cf80d Add authority.WithX509SignerFunc
This change adds a new authority option that allows to pass a callback
that returns the certificate chain and signer used to sign X.509
certificates.

This option will be used by Caddy, they renew the intermediate
certificate weekly and there's no other way to replace it without
re-creating the embedded CA.

Fixes #874
2 years ago
Ahmet DEMIR d957a57e24
fix: apply mariano suggestions and fixes
* use json.RawMessage to remote mapstructure in options
* use vault secretid structure to support multiple source aka string, file and env
* remove log prefix
* return raw cert on error on newline for cert and csr
* clean sans, commonName in createCertificate (bad copy/paste from StepCAS)
* verify authority fingerprint
* convert serial on revoke to bigint, bytes and vault dashed representation
2 years ago
Ahmet DEMIR 16390694e1
feat(vault): adding hashicorp vault cas 2 years ago
Ahmet DEMIR 26d7b70957
feat(cas): add generic Config parameter to allow more flexible configuration on CAS 2 years ago
Mariano Cano 52a18e0c2d Add key name to CreateCertificateAuthority 3 years ago
Mariano Cano 6d644880bd Allow to kms signers to define the SignatureAlgorithm
CloudKMS keys signs data using an specific signature algorithm, in RSA keys,
this can be PKCS#1 RSA or RSA-PSS, if the later is used, x509.CreateCertificate
will fail unless the template SignatureCertificate is properly set.

On contrast, AWSKMS RSA keys, are just RSA keys, and can sign with PKCS#1 or
RSA-PSS schemes, so right now the way to enforce one or the other is to used
templates.
3 years ago
Mariano Cano de719eb6f0 Add an option to avoid password prompts on step cas
When we are using `step ca init` to create a stepcas RA we don't
have access to the password for verify the provisioner.
3 years ago
Mariano Cano 35e6cc275a Fix typos in comments. 3 years ago
Mariano Cano ac3c754a6d Use known CA and add tier and gcs bucket options. 3 years ago
Mariano Cano 529eb4bae9 Rename CAPool to CaPool. 3 years ago
Mariano Cano 072bd0dcf4 Add support for Google CAS v1 3 years ago
Herman Slatman c5e4ea08b3
Merge branch 'master' into hs/scep 3 years ago
Mariano Cano d9f93ccfde Fix typo. 3 years ago
Mariano Cano edc7c4d90e Add support for password encrypted files 3 years ago
Mariano Cano ce3e6bfdf6 Fix linting errors. 3 years ago
Mariano Cano 96de4e6ec8 Return a non-implemented error in stepcas.RenewCertificate. 3 years ago
Herman Slatman 583d60dc0d
Address (most) PR comments 3 years ago
Mariano Cano bcf70206ac Add support for revocation using an extra provisioner in the RA. 3 years ago
Mariano Cano a6115e29c2 Add initial implementation of StepCAS.
StepCAS allows to configure step-ca as an RA using another step-ca
as the main CA.
3 years ago
Herman Slatman e1cab4966f
Improve initialization of SCEP authority 3 years ago
Herman Slatman 7ad90d10b3
Refactor initialization of SCEP authority 3 years ago
Miclain K Keffeler 7a1eb43bb1
Update options.go 3 years ago
Miclain Keffeler 7545b4a625 leverage intermediate_ca.crt for appending certs. 3 years ago
Mariano Cano a97fab4119 Fix mispell. 4 years ago