Commit Graph

699 Commits (d83ca96d2a37f3846280c739637b994cb7cfb8c6)

Author SHA1 Message Date
Mariano Cano b6ebd118fc Update temporal solution for sending message to users 3 years ago
Mariano Cano 668d3ea6c7 Modify errs.Wrap() with bad request to send messages to users. 3 years ago
Mariano Cano 8c8db0d4b7 Modify errs.BadRequestErr() to always return an error to the client. 3 years ago
Mariano Cano 8ce807a6cb Modify errs.BadRequest() calls to always send an error to the client. 3 years ago
Max de2ce5cf9f
Merge pull request #692 from smallstep/max/context
Context management
3 years ago
Mariano Cano 440616cffa
Merge pull request #750 from smallstep/duration-errors
Report duration errors directly to the cli.
3 years ago
Mariano Cano acd0bac025 Remove extra and in comment. 3 years ago
Mariano Cano 1aadd63cef Use always badRequest on duration errors. 3 years ago
Mariano Cano 41fec1577d Report duration errors directly to the cli. 3 years ago
max furman 7fac8c96c3 Merge branch 'master' into max/context 3 years ago
max furman 922d239171 Simplify conditional 3 years ago
max furman a7d144996f SSH backwards compat updates
- use existence of new value in data map as boolean
- add tests for backwards and forwards compatibility
- fix old tests that used static dir locations
3 years ago
max furman 507be61e8c Use a more distint map key to indicate template version
- make the key a variable that can be reused on the CLI side.
3 years ago
max furman f426c152a9 backwards compatibility for version of cli older than v0.18.0 3 years ago
max furman ed4b56732e updates after rebase to keep up with master 3 years ago
Herman Slatman e7a988b2cd
Pin golangci-lint to v1.43.0 and fix issues 3 years ago
max furman 933b40a02a Introduce gocritic linter and address warnings 3 years ago
Mariano Cano 9fb6df3abb Fix ssh template variables when CA is injected using options. 3 years ago
Mariano Cano aedd7fcc05 Be able to start a SSH host or SSH user only CA
In previous versions if the host or user CA is not configured, the
start of step-ca was crashing. This allows to configure a user or
host only ssh ca.
3 years ago
Mariano Cano a50654b468 Check for admins in both emails and groups. 3 years ago
max furman 2d5bfd3485 fix comment 3 years ago
Mariano Cano 6729c79253 Add support for setting individual password for ssh and tls keys
This change add the following flags:
 * --ssh-host-password-file
 * --ssh-user-password-file

Fixes #693
3 years ago
Mariano Cano 141c519171 Simplify check of principals in a case insensitive way
Fixes #679
3 years ago
Fearghal O Floinn 7a94b0c157 Converts group and subgroup to lowercase for comparison.
Fixes #679
3 years ago
Mariano Cano f919535475 Add an extra way to distinguish Azure and Azure OIDC tokens.
We used to distinguish these tokens using the azp claim, but this
claim does not appear on new azure oidc tokens, at least on some
configurations.

This change will try to load by audience (client id) if the token
contains an email, required for OIDC.
3 years ago
Mariano Cano 097a918da7 Fix tests when we create re-use a token with a new authority. 3 years ago
Mariano Cano 40e77f6e9a Initialize required variables on GetIdentityToken
Fixes smallstep/cli#465
3 years ago
Mariano Cano 42fde8ba28
Merge branch 'master' into linkedca 3 years ago
Mariano Cano 61b8bfda1a Fix comment typos. 3 years ago
Mariano Cano da2802504b Use Default min version if not specified. 3 years ago
Mariano Cano d4ae267add Fix ErrAllowTokenReuse comment. 3 years ago
Mariano Cano 9e5762fe06 Allow the reuse of azure token if DisableTrustOnFirstUse is true
Azure caches tokens for 24h and we cannot issue a new certificate
for the same instance in that period of time.

The meaning of this parameter is to allow the signing of multiple
certificate in one instance. This is possible in GCP, because we
get a new token, and is possible in AWS because we can generate
a new one. On Azure there was no other way to do it unless you
wait for 24h.

Fixes #656
3 years ago
Mariano Cano 492ff4b632 Ask for the first provisioner password if none is provided. 3 years ago
Mariano Cano 28e882c9b3 Add deployment type to export. 3 years ago
Mariano Cano 072ba4227c Add deployment type to config.
This field is ignored except for the start of the ca. If the type
is linked and the token is not passed, it will fail with an error.
3 years ago
Mariano Cano 536536c92d Wrap json errors. 3 years ago
Mariano Cano 9d51c2cceb Fix linter errors in the name of export methods. 3 years ago
Mariano Cano 16d3afb92a Remove unused method. 3 years ago
Mariano Cano d72fa953ac Remove debug statements. 3 years ago
Mariano Cano 3f07eb597a Implement revocation using linkedca. 3 years ago
Mariano Cano 798b90c359 Move linkedca configuration to the main package. 3 years ago
Mariano Cano 384be6e205 Do not show provisioners if they are not required.
For deployment types like linked ca, the list of provisioners in
the ca.json are not required, so we should tag the json as omitempty.
3 years ago
Mariano Cano b0e0f2b89d Use linkedca GetAdmin and GetProvisioner. 3 years ago
Mariano Cano 91a369f618 Automatically enable admin properly on linked cas. 3 years ago
Mariano Cano 26122a2cbf Enable admin automatically if a token is provided. 3 years ago
Mariano Cano 2620c38aee Add is converting provisioners to linkedca.
The ids are required to be able to link admins with provisioners.
3 years ago
Mariano Cano e62d7988b8 Do not store password on exports. 3 years ago
Mariano Cano 4f27f4b002 Change default ciphersuites to newer names. 3 years ago
Mariano Cano 07f7316851 Add bastion to export. 3 years ago
Mariano Cano 0730a165fd Add collection of files and authority template. 3 years ago