Commit Graph

1108 Commits (df3e9c0cd6d36aa82ed9e8ba8c08148c81fe7e98)
 

Author SHA1 Message Date
Mariano Cano df3e9c0cd6 Add full version of the license. 4 years ago
Mariano Cano 4ac51dd508
Merge pull request #274 from smallstep/oidc-raw-locals
Allow dots and other symbols in principals for OIDC
4 years ago
Mariano Cano 3246a3e81f Add missing test case. 4 years ago
Max ab0f2aedcc
Merge pull request #268 from smallstep/max/acme-nbf
Set nbf and nbf for ACME orders even when they are not set in the request.

Closes #92
4 years ago
max furman 6e69f99310 Always set nbf and naf for new ACME orders ...
- Use the default value from the ACME provisioner if values are not
defined in the request.
4 years ago
Mariano Cano 0b5fd156e8 Add a third principal on OIDC tokens with the raw local part of the email.
For the email first.last@example.com it will create the principals
  ["firstlast", "first.last", "first.last@example.com"]

Fixes #253, #254
4 years ago
Mariano Cano 2bc69d3edd
Merge pull request #252 from smallstep/yubikey
Yubikey support
4 years ago
Mariano Cano 89e164dad6 Add AuthorityKeyId to cloudkms root cert. 4 years ago
Mariano Cano 97508ca215 Add AuthorityKeyId to root certificate.
Fix error string.
4 years ago
Max ba91f4ed13
Merge pull request #260 from anxolerd/feat-force-cn-if-empty
[Feature] Force CommonName for certificates from ACME provisioner
4 years ago
Oleksandr Kovalchuk 4cd01b6868
Implement tests for forceCNOption modifier
Implement unit tests which checks forceCNOption modifier (implemented
in 322200b7db) is not broken and works
correctly.

Ref: https://github.com/smallstep/certificates/issues/259
4 years ago
Oleksandr Kovalchuk 893a53793a
Modify existing tests to accept forceCNOption modifier
Modify existing tests to pass with changes introduced in commit
322200b7db. This is safe to do as
tests assert exact length of modifiers, which has changed.
4 years ago
Oleksandr Kovalchuk 322200b7db
Implement modifier to set CommonName
Implement modifier which sets CommonName to the certificate if
CommonName is empty and forceCN is set in the config. Replace previous
implementation introduced in 0218018cee
with new modifier.

Closes https://github.com/smallstep/certificates/issues/259
Ref: https://github.com/smallstep/certificates/pull/260#issuecomment-628961322
4 years ago
Mariano Cano 3e40cb89a7 Add some docs for YubiKey configuration. 4 years ago
Mariano Cano d95c055163 piv-go requires libpcsclite-dev on linux. 4 years ago
Mariano Cano 03a6789f0e Fix compile errors without cgo support. 4 years ago
Mariano Cano 012a4734bf Add better messaging when yubikey is not detected. 4 years ago
Mariano Cano 7d61c0003c Enable softkms and cloudkms. 4 years ago
Max ae15573f93
Merge pull request #249 from smallstep/clive-jevons/dynamic-host-detection-for-acme-directory
dynamic host detection for acme directory

Closes #235, #193
4 years ago
max furman e1409349f3 Allow relative URL for all links in ACME api ...
* Pass the request context all the way down the ACME stack.
* Save baseURL in context and use when generating ACME urls.
4 years ago
Oleksandr Kovalchuk 0218018cee
Generate Subject if `forceCN` and Subject is empty
When `forceCN` is set in provisioner configuration and
Subject.CommonName is empty, set Subject.CommonName to the first SAN
from the CSR to follow the letsencrypt's boulder behavior. This is done
in order to support system which require certificate's Subject field to
be non-empty.

N.B. certbot does not send Subject in its certificate request and relies
on similar behavior of letsencrypt.

Closes https://github.com/smallstep/certificates/issues/259
4 years ago
Oleksandr Kovalchuk 503c9f6101
Add config option to force CN
Add configuration option `forceCN` to ACME provisioner. When this option
is set to `true`, provisioner should generate Subject.CommonName for
certificate if it was not present in the request. Default value of
`false` should keep the existing behavior (do not modify CSR and
certificate).

Ref: https://github.com/smallstep/certificates/issues/259
4 years ago
Clive Jevons 639993bd09 Read host and protocol information from request for links
When constructing links we want to read the required host and protocol
information in a dynamic manner from the request for constructing ACME
links such as the directory information. This way, if the server is
running behind a proxy, and we don't know what the exposed URL should
be at runtime, we can construct the required information from the
host, tls and X-Forwarded-Proto fields in the HTTP request.
Inspired by the LetsEncrypt Boulder project (web/relative.go).
4 years ago
Mariano Cano 025c0aa20f Display the proper yubikey uri. 4 years ago
Mariano Cano 22b86c3fcc Only rewrite keys with --force. 4 years ago
Mariano Cano 63e36ecd7a Refactor the initialization of KeyManagers. 4 years ago
Max f126962f3f
Merge pull request #257 from smallstep/max/accUpd
ACME accountUpdate ignore fields not recognized by the server.
4 years ago
max furman 4cb777bdc1 ACME accountUpdate ignore fields not recognized by the server. 4 years ago
Mariano Cano c02fe77998 Close the key manager before shutting down. 4 years ago
Mariano Cano 029483463b Remove extra +build statement. 4 years ago
Mariano Cano ef2b13b163 Add step-yubikey-init as a target. 4 years ago
Mariano Cano 677e99793e Create alternative yubikey file when cgo is not enabled.
This yubikey will always fail.
4 years ago
Mariano Cano 6868190fff Add initial support for yubikey. 4 years ago
Mariano Cano 9f1d95d8bf Fix renew of certificate at the start of the server. 4 years ago
Mariano Cano e855707dc2
Merge pull request #248 from smallstep/embedded-config-init
Initialize the required config fields on embedded authorities
4 years ago
Mariano Cano 4e544344f9 Initialize the required config fields on embedded authorities.
This change is to make easier the use of embedded authorities. It
can be difficult for third parties to know what fields are required.
The new init methods will define the minimum usable configuration.
4 years ago
Mariano Cano 9499aed6d1
Merge pull request #247 from smallstep/embedded-authority
Create a method to initialize the authority without a config file
4 years ago
Mariano Cano b5eab009b2 Rename method to NewEmbedded 4 years ago
Mariano Cano 824374bde0 Create a method to initialize the authority without a config file.
When the CA is embedded in a third party product like Caddy, the
config needed to use placeholders to be valid. This change adds
a new method `NewEmbeddedAuthority` that allows to create an
authority with the given options, the minimum options are a root
and intermediate certificate, and the intermediate key.

Fixes #218
4 years ago
max furman ca0861bf17 Add documentation for running HA 4 years ago
max furman 083abf5150 Fix a bit of getting started doc syntax 4 years ago
max furman 8227449746 Add docs for ssh cert duration for authority config.
Fixes #238.
4 years ago
max furman c1a84c1405 go mod tidy 4 years ago
max furman 1b6bf38b52 Bump cli to v0.14.3 4 years ago
max furman d40c029582 Fix docs database link. 4 years ago
max furman 30e38dc501 Bumpt the version of cli for a certificates RC. 4 years ago
Mariano Cano df3b9f637e Use a tagged version of nosql. 4 years ago
Mariano Cano 18869323f4
Merge pull request #234 from smallstep/oidc-multinenant
Add support for multi-tenant OIDC provisioners
4 years ago
Mariano Cano 4e9bff0986 Add support for OIDC multitoken tenants for azure. 4 years ago
Mariano Cano c7907a4626
Merge pull request #233 from smallstep/oidc-add-user-cert
Add support for user provisioner certificates on OIDC provisioners.
4 years ago