JT Olio
2a59679766
pkg/transport: require tls configuration for dialing ( #1286 )
...
* separate TLS options from server options (because we need them for dialing too)
* stop creating transports in multiple places
* ensure that we actually check revocation, whitelists, certificate signing, etc, for all connections.
2019-02-11 13:17:32 +02:00
paul cannon
ef61c170b1
Consolidate key/cert/signature encoding and decoding ( #1243 )
2019-02-07 12:40:28 -06:00
Egon Elbre
5a63c00442
Fix issues with blocking during startup ( #1212 )
2019-02-01 19:28:40 +02:00
Egon Elbre
d5346982c2
Delete provider package ( #1177 )
2019-01-30 22:47:21 +02:00
Egon Elbre
cecd4b0816
Remove server aliases ( #1154 )
2019-01-28 17:04:53 +02:00
Bryan White
2b20acbec9
identity cleanup ( #1145 )
2019-01-26 15:59:53 +01:00
Jennifer Li Johnson
856b98997c
updates copyright 2018 to 2019 ( #1133 )
2019-01-24 15:15:10 -05:00
Bryan White
9e1ec633d8
Improve cert signing integration test+: ( #997 )
2019-01-11 15:59:35 +01:00
Bryan White
b6611e2800
automate certificate signing in storage node setup ( #954 )
2019-01-04 18:23:23 +01:00
Bryan White
249244536a
CSR Service (part 2): cert signing rpc ( #950 )
...
* CSR Service:
+ implement certificate sign rpc method
+ implement certificate signer client/server
+ refactor `AuthorizationDB#Create`
+ refactor `NewTestIdentity`
+ add `AuthorizationDB#Claim`
+ add `Token#Equal`
+ fix `Authorizations#Marshal` when marshaling identities and certificates
+ tweak `Authorization#String` format
+ cert debugging improvements (jsondiff)
+ receive context arg in `NewTestIdentity`
+ misc. fixes
2019-01-02 12:39:17 -05:00
Bryan White
4efb5c0a75
Authorization improvements ( #925 )
2018-12-31 10:45:43 -05:00
Bryan White
398379b149
CSR service (part 1): authorizations ( #906 )
2018-12-20 19:29:05 +01:00