certificates/kms
Herman Slatman 2d85d4c1c1 Add non-TLS server and improve crypto.Decrypter interface
A server without TLS was added to serve the SCEP endpoints. According
to the RFC, SCEP has to be served via HTTP. The `sscep` client, for
example, will stop any URL that does not start with `http://` from
being used, so serving SCEP seems to be the right way to do it.

This commit adds a second server for which no TLS configuration is
configured. A distinct field in the configuration, `insecureAddress`
was added to specify the address for the insecure server.

The SCEP endpoints will also still be served via HTTPS. Some clients
may be able to work with that.

This commit also improves how the crypto.Decrypter interface is
handled for the different types of KMSes supported by step. The
apiv1.Decrypter interface was added. Currently only SoftKMS
implements this interface, providing a crypto.Decrypter required
for SCEP operations.
2021-05-26 16:09:38 -07:00
..
apiv1 Add non-TLS server and improve crypto.Decrypter interface 2021-05-26 16:09:38 -07:00
awskms Add non-TLS server and improve crypto.Decrypter interface 2021-05-26 16:09:38 -07:00
cloudkms Add non-TLS server and improve crypto.Decrypter interface 2021-05-26 16:09:38 -07:00
pkcs11 Add non-TLS server and improve crypto.Decrypter interface 2021-05-26 16:09:38 -07:00
softkms Refactor initialization of SCEP authority 2021-05-26 16:04:19 -07:00
sshagentkms Add non-TLS server and improve crypto.Decrypter interface 2021-05-26 16:09:38 -07:00
uri Add test cases for uris with only the schema. 2021-02-11 19:14:35 -08:00
yubikey Add non-TLS server and improve crypto.Decrypter interface 2021-05-26 16:09:38 -07:00
kms.go Move load of kms to main package. 2020-06-12 14:55:35 -07:00
kms_test.go Fix unit tests. 2020-05-19 17:45:15 -07:00