Commit Graph

33 Commits

Author SHA1 Message Date
lhinds 93aacb43e6 Retiring Project
http://lists.openstack.org/pipermail/openstack-sigs/2018-August/000481.html

Depends-On: 90ca23f2ef5bf2cfdaf63552a7d8d8be325a03e6

Change-Id: I9ebc8cfcbb8906e9c4e1fd9e91205fe364bdc3c9
2018-08-28 09:41:53 +01:00
Jenkins b5b412b567 Merge "Remove link to modindex" 2017-02-20 14:36:30 +00:00
Jenkins f1d8333d58 Merge "Typo fix: emited => emitted" 2017-02-20 14:10:37 +00:00
xhzhf 9d4ea65ef7 command of "tox -e docs" failed
error info of "tox -e docs" is below
doc/source/signing_backends.rst:74: D003 Tabulation used for indentation
doc/source/signing_backends.rst:75: D003 Tabulation used for indentation
doc/source/signing_backends.rst:76: D003 Tabulation used for indentation
doc/source/signing_backends.rst:77: D003 Tabulation used for indentation
doc/source/signing_backends.rst:52: D001 Line too long
This patch correct it
Closes-Bug: #1664796

Change-Id: I55798c2823f8a98ae7bfee0612c3a2639b4ca8d5
2017-02-17 15:31:42 +08:00
Anh Tran d28b1011ed Typo fix: emited => emitted
Change-Id: I4983c4a011b862b90976dfbc169eda8c66186168
2017-02-07 14:31:09 +07:00
avnish ba5120c8c0 Remove link to modindex
The documentation build does not generate any module index, thus
remove the link to the page.

Change-Id: Ia06a5a3d4310cf71fd6814a6c58d0044348899ba
2017-02-02 16:24:31 +05:30
Jenkins 29a0e8954d Merge "Fix typo in fixups.rst" 2017-01-05 19:49:33 +00:00
Jinay Vora 1864f6b2a3 Fix typo in fixups.rst
Change-Id: I062d2e81b8cbc1b6fdf1bf98fac51015122b781a
2016-06-27 20:11:25 -07:00
Stanisław Pitucha 2257b8bbed Allow custom domain labels
Original validator checked for domain labels as defined by RFC1034, however real
internet deals with other domains as well - starting with digits or symbols.
This change allows modifying the pattern to allow custom / relaxed rules.

Validation has been removed from adding a domain to a new extension, since it's
only used in fixups and the domain should be already validated. (or not, if not
configured)

Closes-bug: 1592489

Change-Id: Ib453054ba5f554bab28cff392c539e713fa28918
2016-06-16 19:34:18 +10:00
Stanisław Pitucha 524a4cef34 Add the PKCS11-based signing backend
Change-Id: I576a6837f2239d4e82baaacc68342a897db07f1d
2016-02-19 13:09:27 +11:00
Stanisław Pitucha d0fa9b519d Refactor the signing backends
Prepare for new signing backend implementations which reuse the existing
functionality. This abstracts most of the current signing function, so that the
signature generation itself can be replaced.

Change-Id: I99a28f4bcb08f010f397faf49e23276672977bc1
2016-02-19 13:09:25 +11:00
Jenkins f0132c5969 Merge "Add documentation for audit" 2016-01-20 10:29:28 +00:00
Stanisław Pitucha b2819654bb Add documentation for audit
Add description for the audit configuration and short note about usage with
Ceilometer.

Change-Id: I40fa00d3667bea1aca81482abb3a7ad5b81e8761
2015-12-08 15:38:27 +11:00
Stanisław Pitucha 8644dc5834 Add better names validator and deprecate older one
Previous name validators have multiple issues. They do not prevent
unknown entires from passing through. They require repeating rules for
various name locations (cn, san). They also disregard wildcards when
matching only the suffix. The inflexible configuration also makes
specific validators like server_group required.

The new validator whitelist_names solves all those issues and allows to
deprecate old validators.

Implements: blueprint validator-improvement

Change-Id: Id31889f735eb34323f21a91d68a50602351f6611
2015-11-05 16:28:06 +11:00
Jenkins 1bcc7172ec Merge "Add missing extensions to docs" 2015-11-04 16:31:03 +00:00
Jenkins a976084f65 Merge "Add key size validator" 2015-11-01 06:01:54 +00:00
Stanisław Pitucha d171715798 Add key size validator
Add a validator for the public key sizes. This allows to reject a
request with a 512b long RSA key for example.

Change-Id: Ib4988e595c4c5cdc643af56e9529e8c0de31d993
2015-10-30 14:26:23 +11:00
Stanisław Pitucha c6cb4d9b3d Remove bad ca_status validator. Always reject CA
Remove a validator which has been marked for an update for some time.
CA certificate signing should not be handled by Anchor at all.

Change-Id: Ib13a0ca3445956e35c23c559f59f37e6721c1a33
Closes-bug: 1508776
2015-10-30 14:00:32 +11:00
Stanisław Pitucha a9cf1a6820 Add missing extensions to docs
Change-Id: I0ac029833dba42e6c237b572e5a4200788cd0c8b
2015-10-22 16:42:22 +11:00
Jenkins 580d6edcce Merge "Add rfc based validators" 2015-09-28 12:24:37 +00:00
Jenkins e5f4233141 Merge "Add fixup enforcing SAN extension" 2015-09-28 12:23:02 +00:00
Jenkins b6306762d3 Merge "Add EKU extension validator" 2015-09-28 11:02:36 +00:00
Jenkins 5b2fa7a5f1 Merge "Don't accept unknown extensions" 2015-09-28 10:49:34 +00:00
Jenkins 7dee9a2a4c Merge "Add documentation about supported extensions" 2015-09-28 10:00:32 +00:00
Stanisław Pitucha 33ac1a09e2 Add documentation about supported extensions
Explain which extensions will / will not be supported.

Change-Id: Ie2dfaa8f1f52eb1dc644c4e042df449c306b9ed7
Partial-bug: 1495392
2015-09-25 10:02:31 +10:00
Stanisław Pitucha 4cec799e07 Don't accept unknown extensions
Unknown and not verified extensions could possibly give the requester
more capabilities than they are allowed to have. Each backend needs to
have its own policy what to do with unknown extensions. Anchor either
ignors them, or refuses signing, depending on the critical flag.

Change-Id: I711aa4aabae76ddd489501c100f51873c0fcc7d6
Closes-bug: 1494111
2015-09-25 09:07:00 +10:00
Stanisław Pitucha b48f43e146 Add EKU extension validator
Add a validator for the extended key usage, matching the existing key
usage one.

Change-Id: I10efc01cabf3a63adce95f2a3a2b615070d84e2b
2015-09-24 10:24:40 +10:00
Stanisław Pitucha 29552eb45f Add rfc based validators
Add a validator which collects various standard format/behaviour tests.
These are not user-configurable and any valid request failing them is a
bug in Anchor.

All checks reference the document where they're defined.

Closes-bug: 1476877
Partial-bug: 1476875
Change-Id: I208685d8d7cde40ed5294e7235d64ca17617c094
2015-09-21 12:21:05 +10:00
Stanisław Pitucha 81264fb9bb Add fixup enforcing SAN extension
Fixup to make sure that if we have a CN, we have a matching SAN entry.

Change-Id: Ic37a053d909f2411e8f08acfa7cf9606a6316e58
Closes-bug: 1401580
2015-09-21 12:19:04 +10:00
Jenkins af129c1340 Merge "Add fixups configuration / processing" 2015-09-19 11:50:03 +00:00
Stanisław Pitucha 5456abff94 Add fixups configuration / processing
Fixups allow changing the submitted CSR before signing. This may be
useful for enforcing rules, like removing deprecated options.

All fixups are available in the "anchor.fixups" namespace and each one
returns either a new or a modified CSR when it's finished.

Partial-bug: #1401580
Change-Id: Id42802194bbdf36799660899eb34f728782bc893
2015-09-07 15:33:38 +10:00
Stanisław Pitucha 7623347163 Return CA for a given instance
Return the signing CA certificate.

Closes bug: 1409037
Change-Id: I57ec9b657dd2bedf4b13a45703f7fd0c6d1d4a0b
2015-09-05 14:06:42 +10:00
Robert Clark 6040112312 Changes to allow sphinx to build correctly
This should allow our documentation to post to
http://docs.openstack.org/developer/anchor

Running locally both pass:
python setup.py build_sphinx
tox -e venv python setup.py build_sphinx

"tox -e docs" still works and you can run
that if you desire.

"tox -e venv python setup.py build_sphinx"
is what's required to work by infra so that
documentation can be built upstream and
published to the developer documentation pages.
It also allows the documentation jobs to run in
the gate so that documentation is built at
review time.

Change-Id: If67961a1b68223ed4ca002037cb7e8c6a51fbe3e
2015-09-04 08:48:44 -07:00