conjur-api 5.3.8.pre.3 → 5.3.8.pre.8
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/VERSION +1 -1
- metadata +2 -193
- data/.codeclimate.yml +0 -10
- data/.dockerignore +0 -1
- data/.github/CODEOWNERS +0 -10
- data/.gitignore +0 -32
- data/.gitleaks.toml +0 -219
- data/.overcommit.yml +0 -16
- data/.project +0 -18
- data/.rubocop.yml +0 -3
- data/.rubocop_settings.yml +0 -86
- data/.rubocop_todo.yml +0 -709
- data/.yardopts +0 -1
- data/CHANGELOG.md +0 -448
- data/CONTRIBUTING.md +0 -138
- data/Dockerfile +0 -16
- data/Gemfile +0 -7
- data/Jenkinsfile +0 -137
- data/LICENSE +0 -202
- data/README.md +0 -162
- data/Rakefile +0 -47
- data/SECURITY.md +0 -42
- data/bin/parse-changelog.sh +0 -12
- data/ci/configure_v4.sh +0 -12
- data/ci/configure_v5.sh +0 -19
- data/ci/oauth/keycloak/create_client +0 -18
- data/ci/oauth/keycloak/create_user +0 -21
- data/ci/oauth/keycloak/fetch_certificate +0 -18
- data/ci/oauth/keycloak/keycloak_functions.sh +0 -71
- data/ci/oauth/keycloak/standalone.xml +0 -578
- data/ci/oauth/keycloak/wait_for_server +0 -56
- data/ci/submit-coverage +0 -36
- data/conjur-api.gemspec +0 -41
- data/dev/Dockerfile.dev +0 -12
- data/dev/docker-compose.yml +0 -56
- data/dev/start +0 -22
- data/dev/stop +0 -5
- data/docker-compose.yml +0 -98
- data/example/demo_v4.rb +0 -49
- data/example/demo_v5.rb +0 -57
- data/features/authenticators.feature +0 -41
- data/features/authn.feature +0 -14
- data/features/authn_local.feature +0 -32
- data/features/exists.feature +0 -37
- data/features/group.feature +0 -11
- data/features/host.feature +0 -50
- data/features/host_factory_create_host.feature +0 -28
- data/features/host_factory_token.feature +0 -63
- data/features/load_policy.feature +0 -61
- data/features/members.feature +0 -51
- data/features/new_api.feature +0 -36
- data/features/permitted.feature +0 -70
- data/features/permitted_roles.feature +0 -30
- data/features/public_keys.feature +0 -11
- data/features/resource_fields.feature +0 -53
- data/features/role_fields.feature +0 -15
- data/features/rotate_api_key.feature +0 -13
- data/features/step_definitions/api_steps.rb +0 -52
- data/features/step_definitions/policy_steps.rb +0 -134
- data/features/step_definitions/result_steps.rb +0 -11
- data/features/support/env.rb +0 -19
- data/features/support/hooks.rb +0 -3
- data/features/support/world.rb +0 -12
- data/features/update_password.feature +0 -14
- data/features/user.feature +0 -58
- data/features/variable_fields.feature +0 -20
- data/features/variable_value.feature +0 -60
- data/features_v4/authn_local.feature +0 -27
- data/features_v4/exists.feature +0 -29
- data/features_v4/host.feature +0 -18
- data/features_v4/host_factory_token.feature +0 -49
- data/features_v4/members.feature +0 -39
- data/features_v4/permitted.feature +0 -15
- data/features_v4/permitted_roles.feature +0 -8
- data/features_v4/resource_fields.feature +0 -47
- data/features_v4/rotate_api_key.feature +0 -13
- data/features_v4/step_definitions/api_steps.rb +0 -17
- data/features_v4/step_definitions/result_steps.rb +0 -3
- data/features_v4/support/env.rb +0 -23
- data/features_v4/support/policy.yml +0 -34
- data/features_v4/support/world.rb +0 -12
- data/features_v4/variable_fields.feature +0 -11
- data/features_v4/variable_value.feature +0 -54
- data/lib/conjur/acts_as_resource.rb +0 -123
- data/lib/conjur/acts_as_role.rb +0 -142
- data/lib/conjur/acts_as_rolsource.rb +0 -32
- data/lib/conjur/acts_as_user.rb +0 -68
- data/lib/conjur/api/authenticators.rb +0 -43
- data/lib/conjur/api/authn.rb +0 -144
- data/lib/conjur/api/host_factories.rb +0 -71
- data/lib/conjur/api/ldap_sync.rb +0 -38
- data/lib/conjur/api/policies.rb +0 -56
- data/lib/conjur/api/pubkeys.rb +0 -53
- data/lib/conjur/api/resources.rb +0 -109
- data/lib/conjur/api/roles.rb +0 -98
- data/lib/conjur/api/router/v4.rb +0 -206
- data/lib/conjur/api/router/v5.rb +0 -269
- data/lib/conjur/api/variables.rb +0 -59
- data/lib/conjur/api.rb +0 -105
- data/lib/conjur/base.rb +0 -355
- data/lib/conjur/base_object.rb +0 -57
- data/lib/conjur/build_object.rb +0 -47
- data/lib/conjur/cache.rb +0 -26
- data/lib/conjur/cert_utils.rb +0 -63
- data/lib/conjur/cidr.rb +0 -71
- data/lib/conjur/configuration.rb +0 -460
- data/lib/conjur/escape.rb +0 -129
- data/lib/conjur/exceptions.rb +0 -4
- data/lib/conjur/group.rb +0 -41
- data/lib/conjur/has_attributes.rb +0 -98
- data/lib/conjur/host.rb +0 -27
- data/lib/conjur/host_factory.rb +0 -75
- data/lib/conjur/host_factory_token.rb +0 -78
- data/lib/conjur/id.rb +0 -71
- data/lib/conjur/layer.rb +0 -9
- data/lib/conjur/log.rb +0 -72
- data/lib/conjur/log_source.rb +0 -60
- data/lib/conjur/policy.rb +0 -34
- data/lib/conjur/policy_load_result.rb +0 -61
- data/lib/conjur/query_string.rb +0 -12
- data/lib/conjur/resource.rb +0 -29
- data/lib/conjur/role.rb +0 -29
- data/lib/conjur/role_grant.rb +0 -85
- data/lib/conjur/routing.rb +0 -29
- data/lib/conjur/user.rb +0 -40
- data/lib/conjur/variable.rb +0 -208
- data/lib/conjur/webservice.rb +0 -30
- data/lib/conjur-api/version.rb +0 -24
- data/lib/conjur-api.rb +0 -2
- data/publish.sh +0 -5
- data/spec/api/host_factories_spec.rb +0 -34
- data/spec/api_spec.rb +0 -254
- data/spec/base_object_spec.rb +0 -13
- data/spec/cert_utils_spec.rb +0 -173
- data/spec/cidr_spec.rb +0 -34
- data/spec/configuration_spec.rb +0 -330
- data/spec/has_attributes_spec.rb +0 -63
- data/spec/helpers/errors_matcher.rb +0 -34
- data/spec/helpers/request_helpers.rb +0 -10
- data/spec/id_spec.rb +0 -29
- data/spec/ldap_sync_spec.rb +0 -21
- data/spec/log_source_spec.rb +0 -13
- data/spec/log_spec.rb +0 -42
- data/spec/roles_spec.rb +0 -24
- data/spec/spec_helper.rb +0 -113
- data/spec/ssl_spec.rb +0 -109
- data/spec/uri_escape_spec.rb +0 -21
- data/test.sh +0 -76
- data/tmp/.keep +0 -0
@@ -1,18 +0,0 @@
|
|
1
|
-
#!/bin/sh
|
2
|
-
|
3
|
-
# This script retrieves a certificate from the keycloak OIDC provider
|
4
|
-
# and puts it to a trusted operating system store.
|
5
|
-
# It is needed to communicate with the provider via SSL for validating ID tokens
|
6
|
-
|
7
|
-
openssl s_client \
|
8
|
-
-showcerts \
|
9
|
-
-connect keycloak:8443 \
|
10
|
-
-servername keycloak \
|
11
|
-
</dev/null | \
|
12
|
-
openssl x509 \
|
13
|
-
-outform PEM \
|
14
|
-
>/etc/ssl/certs/keycloak.pem
|
15
|
-
|
16
|
-
hash=$(openssl x509 -hash -in /etc/ssl/certs/keycloak.pem -out /dev/null)
|
17
|
-
|
18
|
-
ln -s /etc/ssl/certs/keycloak.pem "/etc/ssl/certs/${hash}.0"
|
@@ -1,71 +0,0 @@
|
|
1
|
-
#!/usr/bin/env bash
|
2
|
-
|
3
|
-
KEYCLOAK_SERVICE_NAME="keycloak"
|
4
|
-
|
5
|
-
# Note: the single arg is a nameref, which this function sets to an array
|
6
|
-
# containing items of the form "KEY=VAL".
|
7
|
-
function _hydrate_keycloak_env_args() {
|
8
|
-
local -n arr=$1
|
9
|
-
local keycloak_items
|
10
|
-
|
11
|
-
readarray -t keycloak_items < <(
|
12
|
-
set -o pipefail
|
13
|
-
# Note: This prints all lines that look like:
|
14
|
-
# KEYCLOAK_XXX=someval
|
15
|
-
docker-compose exec -T ${KEYCLOAK_SERVICE_NAME} printenv | awk '/KEYCLOAK/'
|
16
|
-
)
|
17
|
-
|
18
|
-
# shellcheck disable=SC2034
|
19
|
-
arr=(
|
20
|
-
"${keycloak_items[@]}"
|
21
|
-
"PROVIDER_URI=https://keycloak:8443/auth/realms/master"
|
22
|
-
"PROVIDER_INTERNAL_URI=http://keycloak:8080/auth/realms/master/protocol/openid-connect"
|
23
|
-
"PROVIDER_ISSUER=http://keycloak:8080/auth/realms/master"
|
24
|
-
"ID_TOKEN_USER_PROPERTY=preferred_username"
|
25
|
-
)
|
26
|
-
}
|
27
|
-
|
28
|
-
# The arguments must be unexpanded variable names. Eg:
|
29
|
-
#
|
30
|
-
# _create_keycloak_user '$APP_USER' '$APP_PW' '$APP_EMAIL'
|
31
|
-
#
|
32
|
-
# This is because those variables are not available to this script. They are
|
33
|
-
# available to bash commands run via "docker-compose exec keycloak bash
|
34
|
-
# -c...", since they're defined in the docker-compose.yml.
|
35
|
-
function _create_keycloak_user() {
|
36
|
-
local user_var=$1
|
37
|
-
local pw_var=$2
|
38
|
-
local email_var=$3
|
39
|
-
|
40
|
-
docker-compose exec -T \
|
41
|
-
${KEYCLOAK_SERVICE_NAME} \
|
42
|
-
bash -c "/scripts/create_user \"$user_var\" \"$pw_var\" \"$email_var\""
|
43
|
-
}
|
44
|
-
|
45
|
-
function create_keycloak_users() {
|
46
|
-
echo "Defining keycloak client"
|
47
|
-
|
48
|
-
docker-compose exec -T ${KEYCLOAK_SERVICE_NAME} /scripts/create_client
|
49
|
-
|
50
|
-
echo "Creating user 'alice' in Keycloak"
|
51
|
-
|
52
|
-
# Note: We want to pass the bash command thru without expansion here.
|
53
|
-
# shellcheck disable=SC2016
|
54
|
-
_create_keycloak_user \
|
55
|
-
'$KEYCLOAK_APP_USER' \
|
56
|
-
'$KEYCLOAK_APP_USER_PASSWORD' \
|
57
|
-
'$KEYCLOAK_APP_USER_EMAIL'
|
58
|
-
}
|
59
|
-
|
60
|
-
function wait_for_keycloak_server() {
|
61
|
-
docker-compose exec -T \
|
62
|
-
${KEYCLOAK_SERVICE_NAME} /scripts/wait_for_server
|
63
|
-
}
|
64
|
-
|
65
|
-
function fetch_keycloak_certificate() {
|
66
|
-
# there's a dep on the docker-compose.yml volumes.
|
67
|
-
# Fetch SSL cert to communicate with keycloak (OIDC provider).
|
68
|
-
echo "Initialize keycloak certificate in conjur server"
|
69
|
-
docker-compose exec -T \
|
70
|
-
conjur_5 /scripts/fetch_certificate
|
71
|
-
}
|