Commit Graph

517 Commits

Author SHA1 Message Date
48ad20faca moving the 2 year validity issue to the Verisign plugin, and address it there 2019-01-29 16:17:08 -08:00
c68a9cf80a fixing linting issues 2019-01-29 11:10:56 -05:00
254a3079f2 fix whitespace 2019-01-29 11:01:55 -05:00
b4d1b80e04 Adding support for cfssl auth mode signing 2019-01-29 10:13:44 -05:00
c77ccdf46e Merge branch 'master' into ADCS-plugin 2019-01-28 17:57:46 +01:00
7f88c24e83 Fix LetsEncrypt Dyn flow for duplicate CN/SAN 2019-01-17 14:56:04 -08:00
0e02e6da79 Be more forgiving to throttling 2019-01-11 11:13:43 -08:00
a1ca61d813 changed a too long comment 2019-01-09 09:50:26 +01:00
a43476bc87 minor errors after lint fix 2019-01-07 11:04:27 +01:00
054685fc38 Merge branch 'master' into ADCS-plugin 2019-01-07 10:23:18 +01:00
c62bcd1456 repaired several lint errors 2019-01-07 10:02:37 +01:00
6a31856d0d Update plugin.py 2018-12-21 12:33:47 -08:00
b5d6abb01f Merge branch 'master' into kubernetes-improvment 2018-12-21 12:06:09 -08:00
f02178c154 added ADCS issuer and source plugin 2018-12-20 11:54:47 +01:00
fbf48316b1 Minor changes for code review suggestions. 2018-12-18 22:43:32 -05:00
073d05ae21 Merge branch 'kubernetes-fix' into kubernetes-improvment 2018-12-18 22:26:03 -05:00
e7313da03e Minor changes for code review suggestions. 2018-12-18 22:24:48 -05:00
bc621c1468 Improve the Kubernetes Destination plugin
The plugin now supports loading details from local files rather than requiring them to be entered through the UI. This is especially relaent when Lemur is deployed on Kubernetes as the certificate, token, and current namespace will be injected into the pod. The location these details are injected are the defaults if no configuration details are supplied.

The plugin now supports deploying the secret in three different formats:
* Full - matches the formate used by the plugin prior to these changes.
* TLS - creates a secret of type kubernetes.io/tls and includes the certificate chain and private key, this format is used by many kubernetes features.
* Certificate - creates a secret containing only the certificate chain, suitable for use as trust authority where private keys should _NOT_ be deployed.

The deployed secret can now have a name set through the configuration options; the setting allows the insertion of the placeholder '{common_name}' which will be replaced by the certificate's common name value.

Debug level logging has been added.
2018-12-12 13:25:36 -08:00
060c78fd91 Fix Kubernetes Destination Plugin
The Kubernetes plugin was broken. There were two major issues:
* The server certificate was entered in a string input making it impossible (as far as I know) to enter a valid PEM certificate.
* The base64 encoding calls were passing strings where bytes were expected.

The fix to the first issue depends on #2218 and a change in the options structure. I've also included some improved input validation and logging.
2018-12-10 15:33:04 -08:00
437d918cf7 Fix textarea and validation on destination page
The destination configuration page did not previously support a textarea input as was supported on most other pages. The validation of string inputs was not being performed. This commit addresses both of those issues and corrects the validation expressions for the AWS and S3 destination plugins so that they continue to function. The SFTP destination plugin does not have any string validation. The Kubernetes plugin does not work at all as far as I can tell; there will be another PR in the coming days to address that.
2018-12-10 12:04:16 -08:00
2a235fb0e2 Prefer DNS provider with longest matching zone 2018-11-30 12:44:52 -08:00
a90154e0ae LetsEncrypt Celery Flow 2018-11-29 09:29:05 -08:00
a7a05e26bc Do not re-use CSR during certificate reissuance; Update requirement; Add more logging to celery handler 2018-11-12 09:52:11 -08:00
a3f96b96ee Add fixture to failing function 2018-11-05 15:16:09 -08:00
75183ef2f2 Unpin most dependencies, and fix moto 2018-11-05 14:37:52 -08:00
054cc64ee8 Prevent dashes from appearing at end of cert name in AWS 2018-10-23 12:49:58 -07:00
56282845fa Enable optional verisign cloud transparency configuration 2018-10-01 09:20:50 -07:00
82e69db0c5 fix error message typo 2018-09-04 10:21:34 -05:00
1b77dfa47a Revert "Precommit - Fix linty things" 2018-08-22 13:21:35 -07:00
3e9726d9db Precommit work 2018-08-22 10:38:09 -07:00
9f64f0523b Increase timeouts 2018-08-17 15:36:56 -07:00
43ae6c39e3 wait right here 2018-08-17 12:14:02 -07:00
7f9a035802 Fix private key bytecode issue 2018-08-17 10:59:01 -07:00
be9d683e46 fix merge 2018-08-16 10:15:48 -07:00
da99bcda68 Better zone handling 2018-08-16 10:12:19 -07:00
2c22c9c2f1 Allow proper detection of zones, fix certificate detection 2018-08-14 14:37:45 -07:00
1a5abe6550 fix lint 2018-08-13 15:11:57 -07:00
cc836433fb formatting 2018-08-13 15:06:16 -07:00
5829794d82 typo fix 2018-08-13 14:25:54 -07:00
bb026b8b59 Allow LetsEncrypt renewals and requesting certificates without specifying DNS provider 2018-08-13 14:22:59 -07:00
1f0f432327 Fix unit tests certificates to have correct chains and private keys
In preparation for certificate integrity-checking: invalid certificate
chains and mismatching private keys will no longer be allowed anywhere
in Lemur code.

The test vector certs were generated using the Lemur "cryptography"
authority plugin.

* Certificates are now more similar to real-world usage: long serial
  numbers, etc.
* Private key is included for all certs, so it's easy to re-generate
  anything if needed.
2018-08-03 19:45:13 +03:00
44192d4494 remove debug print 2018-07-30 15:27:23 -07:00
0889076d3b Support LetsEncrypt accounts 2018-07-30 15:25:02 -07:00
2a6dda07eb Show and send error for pending certs 2018-07-27 14:15:14 -07:00
1a02740b67 reformat code (noop) 2018-06-29 15:24:31 -07:00
3397fb6560 R53: Extend only TXT records 2018-06-20 10:33:35 -07:00
3efc709e03 tests 2018-06-19 21:16:35 -07:00
dda7f54a16 lint 2018-06-19 20:58:00 -07:00
2d33d3e2b8 lint 2018-06-19 20:35:00 -07:00
d50c9c7748 Merge branch 'master' into acme_validation_dns_provider_option 2018-06-19 16:45:25 -07:00