Re #8702 - Finished implementing filtering methods in the CertService.
Re #8702 - Added filtering methods to CertRepository.
Re #8702 - Started implementing required CertService updates.
Re #8702 - Reformed CertController's `get_list_of_certs` method, improved filtering logic.
Re #8700 - Review merge.
Hotfix - logpath definition
Merge branch 'master' into '8670_Enhance_revocation_logic'
Re #8707 - Logging of used config file improved
Re #8707 - Log level mapping via dictionary, minor adjustments during review
Re #8670 - Covered certificate_repository by the CRUD tests
Re #8707 - Added logging for the new functionality
Re #8707 - Enhanced logging to set log level based on config file
Re #8707 - Implemented get_certificate_state() in CertificateRepository
Re #8707 - Implemented status in the controller, prepared method in CertificateService
Re #8707 - Added necessary state constants
Merge branch '8570_Implement_logging'
Re #8670 - Modified deletion for historical storage of certificates
Re #8570 - Rotating file settings
Merge branch '8709_include_root_in_chain' into 'master'
Re #8709 - included root certificate into the trust chain
See merge request aswi/aswi-2021/aswi2021jmsd!17
Updated swagger.yaml
Re #8700 - Implemented certificate revalidation check and fixed affected tests
Re #8570 - Added logs
Re #8570 - Messages logging
Certificate usage hotfix before DEMO #4 - digital signature does not specify timestamping
Re #8570 - Logger configuration- implemented dictionary to string in utils- implemented log functions with parameter message only (name of file, name of class and name of functionare getting automaticaly)
Update swagger.yaml
Merge branch 'master' into 8570_Implement_logging
Re #8570 - Logged configuration
Re #8585 - Improved a code comment in usages_to_extensions.py
Re #8585 - Fixed an issue where required extensions based on cert. usages were not present in the generated certificate
Created an utility that converts usages to extension configuration linesDefined which extension field flags are required for certain usages
Re #8576 crl endpointMerge branch '8576_crl_endpoint' into 'master'See merge request aswi/aswi-2021/aswi2021jmsd!15
Re #8577 - Minor refactoring (crl -> crl_ocsp).
Merge remote-tracking branch 'origin/8576_crl_endpoint' into 8576_crl_endpoint
Re #8576 - openssl config template update, comment added
Re #8577 - Minor adjustment to accept binary contents.
Re #8577 - Added a `generate_ocsp` method to the CryptoService - calls OpenSSL to generate the response.
Re #8577 - Added a `create_index` method (= index including valid certificates) to the CRL Service.
Re #8577 - Added handle methods for OCSP to the CrlOcspController.
Re #8576 - Fix of specifying CRL and OCSP endpoint
Re #8576 - Added crl endpoint integration tests, fix of serial number
Re #8570 - Setted configuration of logging
Re #8576 - Fixed generating index file for generating empty CRL
Re #8576 - implemented CRL endpoint
Re #8576 - moved return codes to separate file
Merge branch '8583_interactive_details_page' into 'master'
8583 - Interactive details page
See merge request aswi/aswi-2021/aswi2021jmsd!14
Re #8576 - calling CryptographyService from CrlService, passphrase support
Re #8576 - cryptography.py implemented generate_crl()
Re #8576 - CrlService implemented generate_crl_response(), prepared method generate_crl in CryptographyService
Re #8576 - moved CertificateNotFoundException to separate file
Re #8575 - Serial number item in the index file is now always uppercase
Re #8575 - Fixed an issue where when creating an index file the valid_to field was passed instead of the revocation_date field
Re #8575 - Fixed an issue where serial number was not passed when creating certificatesRemoved a TODO that has already been fixed
Re #8570 - Implemented logger- implemented static functions (debug, info, warning, error, critical) (sorted by level)- used configuration for setting logging library
Re #8575 - Implemented CrlService that allows the caller to generate a CA database index of revoked certificates
Added an integration test verifying its validity.Renamed NOT_BEFORE_AFTER_DATE_FORMAT constant to VALID_FROM_TO_DATE_FORMAT in certificate_service.py....
Re #8575 - Added a file that defines methods used for generating CA index file lines
Added unit tests verifying the validity of added methods
Re #8575 - Added unit tests verifying that serial number is set when creating a self signed certificate
Re #8583 - Deleting certificates
Re #8575 - Fixed an issue where the serial number was not passed when signing a CSR
Re #8575 - Added a "sn" parameter to some CryptographyService
Re #8572 - resolved conflicts
Re #8574 - Added the `get_certificates_issued_by(id)` method to the CertificateService (just calling the homonymous CryptoService method).
Re #8574 - Extended the `get_certificate_list` method of CertificateController to reflect the filtering query 'issuedby' update.
Re #8572 - Added a `get_all_descendants_of(id)` (meaning descendants in general) method to the CertificateRepository.
Re #8572 - Extended the method in the CertificateService.
Re #8572 - Added the `delete_certificate(id)` method to the Controller.
Re #8571 - Fixed problems during walk-through code review
Re #8571 - RestAPI testing
Re #8571 - Added RestAPI endpoint for revoking certificates
Re #8571 - certificate_service.py revocation support end tests
Re #8571 - cryptography.py unified extension specification and support for CRL LF
Re #8571 - Added get_next_id to CertificateRepository in order to be able to specify CRL/OCSP endpoints
Re #8571 - Added necessary configuration
Merge branch '8578_Implement_database_changes'
Re #8578 - Delete old rows of test validity revocation data
Re #8573 - Fixed typos
Re #8578 - Cover private_key_repository tests- created tests for functions create, read, read_all, update, delete- (+) edited certificate_repository to the same stylistics
Re #8573 - Added some CertificateService tests and improved CryptographyService tests of methods that extract public keys
Re #8573 - /api/certificates/{id}/public_key endpoint now does not extract public key from private key but does so directly from the certificate instead
Re #8578 - Remaked tests files- created tests for new functions - set_certificate_revoked, clear_certificate_revocation, get_all_revoked_by, get_all_issued_by
Re #8573 - Implemented extract_public_key_from_certificate
Re #8578 - Updated certificate and certificate_repository- certificate initialize revocation_date and revocation_reason on "" if input is None- certificate_repository - repaired error after tests - edited comments (return) - stylistics
Re #8578 - Edited init queries for initialize database
Re #8573 - Implemented get_private_key_of_a_certificate method in CertController and added /api/certificates/<id>/private_key endpoint
Re #8573 - Implemented get_public_key_of_a_certificate method in CertController and added /api/certificates/<id>/public_key endpoint
Re #8573 - Added get_public_key method to KeyService that extracts a public key from a private key
Re #8573 - Changed extract_public_key method in such way that it now extracts a public key from a private key instead of a certificate
Re #8573 - Implemented extract_public_key method that allows the caller to extract a public key from a certificate
Re #8578 - Implemented new functions- set_certificate_revoked, clear_certificate_revocation, get_all_revoked_by, get_all_issued_by- update returns of all functions
Re #8578 - Applied changes of the database
Re #8475 - Applied FlaskInjector to REST API tests
Re #8569 Added comments to connection_provider.py
Re #8569 Fixed failing pipeline
Re #8569 Added support for handling configuration files
Re #8569 Checking presence of OpenSSL during init
Re #8569 Added application initialization and running dependency injection
Re #8569 Added configuration class and loading it using injector
Re #8569 connection_provider.py implementation