Commit graph

2159 commits

Author SHA1 Message Date
Mariano Cano
a50654b468 Check for admins in both emails and groups. 2021-09-23 15:49:28 -07:00
Mariano Cano
7f00cc7aad Clarify changelog feature. 2021-09-22 17:41:12 -07:00
Mariano Cano
2ae6b42cfe Add missing feature to the changelog. 2021-09-22 16:39:23 -07:00
Mariano Cano
2cf4127310
Merge pull request #710 from smallstep/upgrade-go-jose
Upgrade go-jose.v2
2021-09-22 15:22:53 -07:00
Mariano Cano
ad82d8a250 Upgrade go.step.sm/crypto as long with go-jose.v2
There was a typo in the OKP template causing bad fingerprints for
Ed25519 keys.

See a10ff54e00

Fixes #705
2021-09-22 15:15:19 -07:00
max furman
2d5bfd3485 fix comment 2021-09-22 11:56:52 -07:00
Carl Tashian
04784be03e
Update cert-renewer@.service
Wrap command line env variables in braces so they are treated as a single argument (rather than split on whitespace)
2021-09-21 17:23:29 -07:00
Mariano Cano
845fa07064
Merge pull request #708 from smallstep/helm-fix
Use badgerv2 the default DB in helm
2021-09-17 12:59:04 -07:00
Mariano Cano
4fde7b5250 Use badgerv2 the default in helm too.
Use also port 443 for the ca-url, as we usually access through the
service, this can be overridden by --with-ca-url flag in the cli.
2021-09-17 12:49:16 -07:00
Mariano Cano
ebf1afa96e
Merge pull request #707 from smallstep/password-flags
Add support for setting individual password for ssh and tls keys
2021-09-16 13:50:03 -07:00
Mariano Cano
cfe08ad6fe Add flags to usage. 2021-09-16 12:05:23 -07:00
Mariano Cano
6729c79253 Add support for setting individual password for ssh and tls keys
This change add the following flags:
 * --ssh-host-password-file
 * --ssh-user-password-file

Fixes #693
2021-09-16 11:55:41 -07:00
max furman
8df9f629b1 go mod tidy 2021-09-16 00:14:06 -07:00
Max
4daef5dd0b
Merge pull request #703 from hslatman/hs/update-pkcs7
Update go.mozilla.org/pkcs7
2021-09-16 00:12:34 -07:00
Herman Slatman
73d0a11a20
Update github.com/micromdm/scep/v2 2021-09-16 08:29:25 +02:00
Herman Slatman
611859eec4
Update go.mozilla.org/pkcs7
This includes the fix as described in https://github.com/mozilla-services/pkcs7/pull/59,
which was the reason a fork of the library was used.
2021-09-16 08:24:28 +02:00
Carl Tashian
e3acea9704 Add release page link to install docs 2021-09-15 10:30:04 -07:00
Max
23add69c9b
Merge pull request #702 from smallstep/max/release-header
[action] add official package links to github release header (via goreleaser)
2021-09-13 09:59:32 -07:00
max furman
6d644ddb2a [action] goreleaser pkg link cli -> certificates 2021-09-12 21:32:22 -07:00
max furman
fcf322023a [action] goreleaser github release footer fix missing close braces 2021-09-11 14:42:02 -07:00
max furman
494da3d668 [action] goreleaser header packages 2021-09-11 13:05:17 -07:00
max furman
2cce795d8f [action] reference correct pub key in cosign example release header 2021-09-09 16:53:47 -07:00
max furman
8a99f7e458 [action] add header and footer to github release page 2021-09-09 16:37:43 -07:00
Mariano Cano
ae42daf288
Merge pull request #700 from smallstep/cloudcas-signature-algorithm
Allow to kms signers to define the SignatureAlgorithm
2021-09-09 12:55:45 -07:00
Mariano Cano
e4e799ca85 Fix typos in comment. 2021-09-09 12:45:29 -07:00
Mariano Cano
6e0d515a55 Add entry to changelog. 2021-09-08 17:49:15 -07:00
Mariano Cano
6d644880bd Allow to kms signers to define the SignatureAlgorithm
CloudKMS keys signs data using an specific signature algorithm, in RSA keys,
this can be PKCS#1 RSA or RSA-PSS, if the later is used, x509.CreateCertificate
will fail unless the template SignatureCertificate is properly set.

On contrast, AWSKMS RSA keys, are just RSA keys, and can sign with PKCS#1 or
RSA-PSS schemes, so right now the way to enforce one or the other is to used
templates.
2021-09-08 17:48:50 -07:00
Mariano Cano
837db2e147
Merge pull request #699 from fofloinn/master
Converts group and subgroup to lowercase for comparison.
2021-09-08 16:05:33 -07:00
Mariano Cano
141c519171 Simplify check of principals in a case insensitive way
Fixes #679
2021-09-08 16:00:33 -07:00
Max
feb2b45cf1
Merge pull request #698 from Slamdunk/patch-1
CHANGELOG: use ISO-8601 dates
2021-09-08 12:36:43 -07:00
Fearghal O Floinn
7a94b0c157 Converts group and subgroup to lowercase for comparison.
Fixes #679
2021-09-08 12:24:49 +01:00
Filippo Tessarotto
913bd0f24a
CHANGELOG: use ISO-8601 dates 2021-09-08 06:45:32 +02:00
Max
efac0926df
Merge pull request #697 from smallstep/max/deb-checksum
Add deb checksum, add golang 1.17 for tests, build with golang 1.17
2021-09-07 15:49:32 -07:00
max furman
9ed84d71f6 [action] Add .releases to .gitignore 2021-09-07 13:07:25 -07:00
max furman
9641354675 [action] tmate debugger 2021-09-07 12:37:45 -07:00
max furman
9df5cc40b6 [action] remove duplicate debian step 2021-09-07 12:16:40 -07:00
max furman
23d3232d75 Changelog updates 2021-09-07 11:39:49 -07:00
max furman
8ba9013f5d gofmt linting errors 2021-09-07 11:35:51 -07:00
max furman
8bec473f8e fix gofmt linting errors 2021-09-07 11:30:35 -07:00
max furman
e4739171b4 [action] Build deb during goreleaser action, add to checksum and ...
- add go 1.17 to test matrix
- build with go 1.17
2021-09-07 11:28:16 -07:00
max furman
19726aa61f update changelog 2021-09-01 13:21:59 -07:00
Max
8a2b2db608
Merge pull request #694 from smallstep/max/docker-cosign
[action] sign and push sigs for multi-arch docker containers w/ cosign
2021-09-01 13:21:12 -07:00
max furman
e73612da07 [action] sign and push sigs for multi-arch docker containers w/ cosign 2021-09-01 12:43:59 -07:00
Kevin
cb2c24fc88
Merge pull request #691 from smallstep/0.17.1-rn
update changelog
2021-08-31 10:22:26 -07:00
Kevin Chen
12153c96ae update changelog 2021-08-31 10:20:14 -07:00
max furman
96762226cd changelog update for 0.17.2 2021-08-30 20:54:46 -07:00
Max
72e365a7ac
Merge pull request #690 from smallstep/max/cosign
[action] use cosign to sign over goreleaser artifacts
2021-08-30 20:48:06 -07:00
Mariano Cano
bcc6ed9a8c
Merge pull request #689 from smallstep/azure-oidc
Azure OIDC
2021-08-30 17:10:05 -07:00
max furman
d6203eb251 [action] use cosign to sign over goreleaser artifacts 2021-08-30 16:53:47 -07:00
Mariano Cano
f919535475 Add an extra way to distinguish Azure and Azure OIDC tokens.
We used to distinguish these tokens using the azp claim, but this
claim does not appear on new azure oidc tokens, at least on some
configurations.

This change will try to load by audience (client id) if the token
contains an email, required for OIDC.
2021-08-30 16:37:29 -07:00