Mariano Cano
f84c8f846a
Upgrade x/crypto
...
Although this does not affects us the old version had the vulnerability
CVE-2020-29652
2021-05-18 19:16:13 -07:00
max furman
b205f50412
bump crypto to 0.8.3 and go mod tidy
2021-05-13 12:14:11 -07:00
Mariano Cano
561341a6f2
Update go.step.sm/crypto.
2021-03-18 18:04:38 -07:00
Mariano Cano
d74f1fa55e
Use cli-utils v0.2.0
2021-03-10 12:53:25 -08:00
Mariano Cano
a1a7e38a49
Add support for cli-utils with powershell support.
2021-03-10 12:34:47 -08:00
Mariano Cano
3eb24d7d01
Remove duplicated replace.
2021-02-16 17:14:15 -08:00
Mariano Cano
f289d1ee1f
Update to crypto11 v1.2.4
...
This version now includes my changes to delete a certificate.
2021-02-08 12:01:21 -08:00
Mariano Cano
4fbf7569fa
Merge branch 'master' into pkcs11
2021-02-01 18:13:16 -08:00
Mariano Cano
1d47a7284d
Upgrade nosql with a version of badger compatible with 32bits
2021-02-01 18:09:28 -08:00
Mariano Cano
6c0cf99b24
Upgrade nosql with a 32-bit version of badger.
2021-01-27 11:02:56 -08:00
Mariano Cano
8dca652bc7
Add support for PKCS #11 KMS.
...
The implementation works with YubiHSM2. Unit tests are still pending.
Fixes #301
2021-01-26 20:03:53 -08:00
Mariano Cano
c61222de1d
Upgrade nosql version.
...
nosql has newer version of badgers v1 and v2.
2021-01-21 18:03:55 -08:00
Derek Gaffney
8416bd633d
Bump go-piv to v1.7.0 for x32 overflow fix
2020-12-27 20:27:39 -05:00
Mariano Cano
86c947babc
Upgrade crypto and fix test.
2020-12-17 14:17:08 -08:00
Mariano Cano
d6ea8b13ab
Upgrade crypto.
...
Related to #435
2020-12-17 13:34:50 -08:00
Mariano Cano
921de7e07f
Upgrade crypto to v0.7.1
...
Add basic constraints extensions if defined.
2020-11-17 11:43:12 -08:00
Mariano Cano
736a6fb64e
Fix rebase.
2020-11-03 12:49:04 -08:00
Mariano Cano
b275758018
Complete CloudCAS tests.
...
Upgrade cloud.google.com/go
2020-11-03 12:45:31 -08:00
Mariano Cano
b2ae112dd2
Add initial tests for CreateCertificateAuthority.
2020-11-03 12:44:54 -08:00
Mariano Cano
461735718d
Update go.step.sm/crypto dependency.
2020-11-03 12:44:54 -08:00
Mariano Cano
2b4b902975
Add initial support for step ca init
with cloud cas.
...
Fixes smallstep/cli#363
2020-11-03 12:44:28 -08:00
Mariano Cano
b79701202b
Use cli-utils@v0.1.0
2020-10-29 15:07:14 -07:00
Mariano Cano
40d0596b71
Use smallstep/cli-utils instead of smallstep/cli
2020-10-29 13:10:03 -07:00
max furman
81a0df9e45
go mod tidy
2020-10-21 20:42:23 -07:00
max furman
bf45e6ff16
Bump cli to v0.15.3
2020-10-21 16:40:06 -07:00
max furman
3f4d041082
bump cli to master
2020-10-20 22:38:59 -07:00
Mariano Cano
647b9b4541
Merge pull request #367 from smallstep/cas
...
Support for CAS Interface and CloudCAS
2020-10-05 18:09:01 -07:00
Mariano Cano
4c8bf87dc1
Use new admin template for K8ssa and admin-OIDC provisioners.
...
This change replaces the .Insecure.CR template to one that sets
all the SANs, but uses key usages and extended key usages for
regular TLS certificates.
2020-09-21 12:49:16 -07:00
Mariano Cano
a332c40530
Merge branch 'master' into cas
2020-09-17 14:46:52 -07:00
Pierre Laden
179e793f1a
- provide PINpolicy always to piv-go to avoid trying to use attestation cert, which we might not have
...
- bump piv-go version to 1.6.0
2020-09-16 21:59:48 +02:00
Mariano Cano
c8d9cb0a1d
Complete cloudcas using CAS v1beta1.
2020-09-10 16:19:18 -07:00
Mariano Cano
1b1f73dec6
Early attempt to develop a CAS interface.
2020-09-08 19:26:32 -07:00
Mariano Cano
3ac0ef2eaa
Update crypto to v0.6.0
2020-09-02 18:08:24 -07:00
Mariano Cano
f3b65e54ac
Update go.step.sm to v0.5.0
...
Solves the problem of enforcing the signature algorithm. This
causes issues if the intermediate key is not an ECDSA key.
2020-09-01 12:44:46 -07:00
Mariano Cano
8ee246edda
Upgrade go.step.sm to v0.4.0
2020-08-31 12:30:54 -07:00
Mariano Cano
ef86bedb2c
Upgrade go.step.sm dependency to v0.3.0
2020-08-25 11:46:04 -07:00
Mariano Cano
c94a1c51be
Merge branch 'master' into ssh-cert-templates
2020-08-24 15:08:28 -07:00
Mariano Cano
ba918100d0
Use go.step.sm/crypto/jose
...
Replace use of github.com/smallstep/cli/crypto with the new package
go.step.sm/crypto/jose.
2020-08-24 14:44:11 -07:00
Mariano Cano
03d642e59c
Update go.step.sm/crypto to v0.2.0
...
Fixes #302
2020-08-20 16:02:45 -07:00
max furman
cb594ed2e0
go mod tidy and golang 1.15.0 cleanup ...
...
- cs.NegotiatedProtocolIsMutual has been deprecated but we still build
in travis with 1.14 so for now we'll ignore this linting error
- string(int) was resolving to string of a single rune rather than
string of digits -> use fmt.Sprint
2020-08-17 13:48:37 -07:00
max furman
795648e5d5
bump cli to v0.15.0
2020-08-16 21:04:12 -07:00
Mariano Cano
32ba80f446
Use pemutil branch.
2020-08-14 15:44:18 -07:00
Mariano Cano
d30a95236d
Use always go.step.sm/crypto
2020-08-14 15:33:50 -07:00
Mariano Cano
aaaa7e9b4e
Merge branch 'master' into cert-templates
2020-08-14 10:45:41 -07:00
Mariano Cano
533ad0ca20
Use always go.step.sm/crypto/x509util
2020-08-11 17:59:33 -07:00
Mariano Cano
4943ae58d8
Move TLSOption, TLSVersion, CipherSuites and ASN1DN to certificates.
2020-08-10 15:29:18 -07:00
Mariano Cano
e83e47a91e
Use sshutil and randutil from go.step.sm/crypto.
2020-08-10 11:26:51 -07:00
Mariano Cano
c8d225a763
Use x509util from go.step.sm/crypto/x509util
2020-08-05 16:02:46 -07:00
max furman
3f844c5e23
Update the way SubjectKeyId is calculated, and more ...
...
- swith lint to first in line for `make all`
- update tests to conform with new subjectkeyid
2020-07-28 12:00:07 -07:00
David Cowden
dc39eef721
aws: test badIDMS functional path
...
The existing test only covers the constructor logic. Also test the live
code path that is executed when a bad IDMS version is supplied.
2020-07-22 17:40:26 -07:00