Skip to content

Commit

Permalink
Make serving SCEP endpoints optional
Browse files Browse the repository at this point in the history
Only when a SCEP provisioner is enabled, the SCEP endpoints
will now be available.

The SCEP endpoints will be served on an "insecure" server,
without TLS, only when an additional "insecureAddress" and a
SCEP provisioner are configured for the CA.
  • Loading branch information
hslatman authored and dopey committed May 26, 2021
1 parent bcacd2f commit 13fe7a0
Show file tree
Hide file tree
Showing 3 changed files with 10 additions and 7 deletions.
2 changes: 2 additions & 0 deletions authority/authority.go
Expand Up @@ -575,6 +575,8 @@ func (a *Authority) CloseForReload() {

// requiresDecrypter returns whether the Authority
// requires a KMS that provides a crypto.Decrypter
// Currently this is only required when SCEP is
// enabled.
func (a *Authority) requiresDecrypter() bool {
return a.requiresSCEPService()
}
Expand Down
14 changes: 8 additions & 6 deletions ca/ca.go
Expand Up @@ -118,6 +118,7 @@ func (ca *CA) Init(config *config.Config) (*CA, error) {
if err != nil {
return nil, err
}
ca.auth = auth

tlsConfig, err := ca.getTLSConfig(auth)
if err != nil {
Expand Down Expand Up @@ -233,14 +234,15 @@ func (ca *CA) Init(config *config.Config) (*CA, error) {
handler = logger.Middleware(handler)
}

ca.auth = auth
ca.srv = server.New(config.Address, handler, tlsConfig)

// TODO: instead opt for having a single server.Server but two
// http.Servers handling the HTTP and HTTPS handler? The latter
// will probably introduce more complexity in terms of graceful
// reload.
if config.InsecureAddress != "" {
// only start the insecure server if the insecure address is configured
// and, currently, also only when it should serve SCEP endpoints.
if ca.shouldServeSCEPEndpoints() && config.InsecureAddress != "" {
// TODO: instead opt for having a single server.Server but two
// http.Servers handling the HTTP and HTTPS handler? The latter
// will probably introduce more complexity in terms of graceful
// reload.
ca.insecureSrv = server.New(config.InsecureAddress, insecureHandler, nil)
}

Expand Down
1 change: 0 additions & 1 deletion scep/scep.go
Expand Up @@ -33,7 +33,6 @@ var (
oidSCEPtransactionID = asn1.ObjectIdentifier{2, 16, 840, 1, 113733, 1, 9, 7}
oidSCEPfailInfoText = asn1.ObjectIdentifier{1, 3, 6, 1, 5, 5, 7, 24}
//oidChallengePassword = asn1.ObjectIdentifier{1, 2, 840, 113549, 1, 9, 7}

)

// PKIMessage defines the possible SCEP message types
Expand Down

0 comments on commit 13fe7a0

Please sign in to comment.