Commit Graph

1912 次程式碼提交

作者 SHA1 備註 提交日期
d3284a4006 adjusting the query to filter authorities based on matching CN 2019-01-14 17:52:06 -08:00
3567a768d5 Compare certificate hashes to determine if Lemur already has a synced certificate 2019-01-14 13:35:55 -08:00
31a86687e7 Reduce the expense of joins 2019-01-14 09:20:02 -08:00
c4e6e7c59b Optimize DB cert filtering 2019-01-14 08:02:27 -08:00
638a8450a3 Merge branch 'master' into more_retries 2019-01-11 11:25:00 -08:00
0e02e6da79 Be more forgiving to throttling 2019-01-11 11:13:43 -08:00
a1ca61d813 changed a too long comment 2019-01-09 09:50:26 +01:00
a43476bc87 minor errors after lint fix 2019-01-07 11:04:27 +01:00
054685fc38 Merge branch 'master' into ADCS-plugin 2019-01-07 10:23:18 +01:00
c62bcd1456 repaired several lint errors 2019-01-07 10:02:37 +01:00
542e953919 Check that stored private keys match certificates
This is done in two places:
* Certificate import validator -- throws validation errors.
* Certificate model constructor -- to ensure integrity of Lemur's data
  even when issuer plugins or other code paths have bugs.
2018-12-31 16:28:20 +02:00
6a31856d0d Update plugin.py 2018-12-21 12:33:47 -08:00
b5d6abb01f Merge branch 'master' into kubernetes-improvment 2018-12-21 12:06:09 -08:00
b7332957e7 Merge branch 'master' into unicode-in-issuer-name 2018-12-21 07:59:20 -08:00
70381c4c89 Merge branch 'master' into kubernetes-fix 2018-12-21 07:44:11 -08:00
a14fe08a63 Merge branch 'master' into kubernetes-improvment 2018-12-21 07:42:13 -08:00
fb7605e34b Merge branch 'master' into unicode-in-issuer-name 2018-12-21 07:41:08 -08:00
72f6fdb17d Properly handle Unicode in issuer name sanitization
If the point of sanitization is to get rid of all non-alphanumeric
characters then Unicode characters should probably be forbidden too.

We can re-use the same sanitization function as used for cert 'name'
2018-12-21 16:34:12 +02:00
0f2e30cdae Deduplicate rows before notification associations unique constraint migration 2018-12-21 12:11:33 +02:00
f02178c154 added ADCS issuer and source plugin 2018-12-20 11:54:47 +01:00
fbf48316b1 Minor changes for code review suggestions. 2018-12-18 22:43:32 -05:00
073d05ae21 Merge branch 'kubernetes-fix' into kubernetes-improvment 2018-12-18 22:26:03 -05:00
e7313da03e Minor changes for code review suggestions. 2018-12-18 22:24:48 -05:00
425a07e988 Merge branch 'master' into destination-tpl-fix 2018-12-18 12:27:35 -08:00
513e876e2e Merge branch 'master' into master 2018-12-18 12:18:38 -08:00
bc621c1468 Improve the Kubernetes Destination plugin
The plugin now supports loading details from local files rather than requiring them to be entered through the UI. This is especially relaent when Lemur is deployed on Kubernetes as the certificate, token, and current namespace will be injected into the pod. The location these details are injected are the defaults if no configuration details are supplied.

The plugin now supports deploying the secret in three different formats:
* Full - matches the formate used by the plugin prior to these changes.
* TLS - creates a secret of type kubernetes.io/tls and includes the certificate chain and private key, this format is used by many kubernetes features.
* Certificate - creates a secret containing only the certificate chain, suitable for use as trust authority where private keys should _NOT_ be deployed.

The deployed secret can now have a name set through the configuration options; the setting allows the insertion of the placeholder '{common_name}' which will be replaced by the certificate's common name value.

Debug level logging has been added.
2018-12-12 13:25:36 -08:00
a50d80992c updated query to ignore empty parameters 2018-12-12 12:45:48 +01:00
060c78fd91 Fix Kubernetes Destination Plugin
The Kubernetes plugin was broken. There were two major issues:
* The server certificate was entered in a string input making it impossible (as far as I know) to enter a valid PEM certificate.
* The base64 encoding calls were passing strings where bytes were expected.

The fix to the first issue depends on #2218 and a change in the options structure. I've also included some improved input validation and logging.
2018-12-10 15:33:04 -08:00
437d918cf7 Fix textarea and validation on destination page
The destination configuration page did not previously support a textarea input as was supported on most other pages. The validation of string inputs was not being performed. This commit addresses both of those issues and corrects the validation expressions for the AWS and S3 destination plugins so that they continue to function. The SFTP destination plugin does not have any string validation. The Kubernetes plugin does not work at all as far as I can tell; there will be another PR in the coming days to address that.
2018-12-10 12:04:16 -08:00
dcf5ce0eec Merge branch 'master' into master 2018-12-07 13:57:59 +01:00
c32e20b6fc Fix notifications - Ensure that notifcation e-mails are sent appropriately 2018-12-06 12:25:43 -08:00
e0ac749734 When parsing SAN's, ignore unknown san_types, because in some cases they can contain unparsable/serializable values, resulting in a TypeError(repr(o) + " is not JSON serializable") 2018-12-06 16:47:53 +01:00
2a235fb0e2 Prefer DNS provider with longest matching zone 2018-11-30 12:44:52 -08:00
a90154e0ae LetsEncrypt Celery Flow 2018-11-29 09:29:05 -08:00
39b76d18dc add countdown to async call 2018-11-28 14:41:56 -08:00
e074a14ee9 unit test 2018-11-28 14:27:03 -08:00
2381d0a4bb Add async call to create pending cert when needed 2018-11-28 11:32:52 -08:00
da10913045 Only search nested group memberships when LDAP_IS_ACTIVE_DIRECTORY is True 2018-11-20 10:37:36 +01:00
61839f4aca Add support for nested group membership in ldap authenticator 2018-11-19 13:42:42 +01:00
3ce8abe46e Left outer join on domains tables to avoid missing results 2018-11-13 14:33:17 -08:00
92a771f5ed More accurate db count functionality 2018-11-13 09:14:21 -08:00
29be647911 Merge branch 'master' into no_csr_reissue 2018-11-12 09:54:47 -08:00
a7a05e26bc Do not re-use CSR during certificate reissuance; Update requirement; Add more logging to celery handler 2018-11-12 09:52:11 -08:00
6f0005c78e Avoid colliding LetsEncrypt jobs 2018-11-09 10:31:27 -08:00
1643650685 Changing essential part of query 2018-11-07 16:02:04 -08:00
08a2a2b0e5 Optimize certificate filtering by name 2018-11-07 15:34:25 -08:00
a3f96b96ee Add fixture to failing function 2018-11-05 15:16:09 -08:00
75183ef2f2 Unpin most dependencies, and fix moto 2018-11-05 14:37:52 -08:00
61738dde9e Run query on DB 2018-11-05 13:15:53 -08:00
52e773230d Add new gin index to optimize ILIKE queries 2018-11-05 10:29:11 -08:00