Skip to content

Releases: binarycodes/ssh-key-signer

Release v0.0.10

08 Feb 11:12
Immutable release. Only release title and notes can be modified.
v0.0.10
0303c12

Choose a tag to compare

Packing and ci/cd workflow related changes only.

Release v0.0.9

05 Jan 01:27
Immutable release. Only release title and notes can be modified.
v0.0.9
18e45b8

Choose a tag to compare

Fixes

  • Add cert in agent for the entire cert duration

Release v0.0.8

14 Dec 21:07
Immutable release. Only release title and notes can be modified.
v0.0.8
fa7fdce

Choose a tag to compare

Fix packages for Debian and Arch Linux

Release v0.0.7

05 Nov 17:58
Immutable release. Only release title and notes can be modified.
v0.0.7
76fa0c2

Choose a tag to compare

Bug fixes and packages for Debian and Arch Linux

Release v0.0.6

02 Nov 13:39
Immutable release. Only release title and notes can be modified.
v0.0.6
65cd9d8

Choose a tag to compare

For user certificates, specifying the key file is now optional.
If key is not specified then a new ed25519 key pair and certificate for it is generated.

This private key and the certificate is added to the user's ssh-agent.
So the ssh-agent must already be running.

Release v0.0.5

11 Oct 22:26
Immutable release. Only release title and notes can be modified.
v0.0.5
377fdc6

Choose a tag to compare

The ssh-keysign-linux-amd64 binary now supports both host certificate and user certificate signing.

New configuration options for the ssh-key-signer-server, for example,

SOURCE_ADDRESSES: 10.10.0.0/16
KNOWN_EXTENSIONS: permit-pty,permit-agent-forwarding

The existing validity options now support duration formats, s - second, h - hour, etc.

CA_USER_VALIDITY: 30m
CA_HOST_VALIDITY: 365d

The client app ssh-keysign-linux-amd64 now takes options from either parameter, environment variables or a config file.

Sample configuration file may look like the following,

Warning

The sample config uses the default test setup in the project. Configure the values according to your environment

log-level: "error"       # error|warn|info|debug
log-dest: "stderr"       # stderr|stdout|file

ca-server-url: "http://localhost:8088"
client-id: "my-test-client"
client-secret: "UTRtYkyYN1nbgdPPbBru1FDVsE8ye5JE"
token-url: "http://10.88.0.100:8090/realms/my-test-realm/protocol/openid-connect/token"

user:
  key: "testdata/id.pub"
  principal:
    - alice
  duration: 3600

host:
  key: "testdata/id.pub"
  principal:
    - webserver
  duration: 3600

Note

The java based separate host and user cert generators are now removed.

Release v0.0.4

12 Sep 14:10

Choose a tag to compare

match authenticated user and principal before signing certificate for user

Release v0.0.3

08 Sep 19:13

Choose a tag to compare

Configurable validity period for user and host certificate in days.

sample configuration in spring boot properties

CA_USER_VALIDITY: 1
CA_HOST_VALIDITY: 365

Release v0.0.1

26 Apr 12:21

Choose a tag to compare

Initial release for the key signer.