Re #8706 - Fix of downloading PKCS#12
Re #8706 - Downloading PKCS#12 identity
Re #8706 - Rebased to current master
Re #8706 - Added issuer link
Re #8706 - Added status adn issuer details to certificate details view
Merge branch 'resolve_conflicts_master'
Merge branch 'resolve_conflicts' into resolve_conflicts_master
Re #8705 - Fixed a merge conflict.
[Merge conflict] - reverted controller version from #8702
[Merge conflict] - reverted controller version from #8705
Merge branch '8705_rapi_private_key' into 'master'
8705 rapi private key
See merge request aswi/aswi-2021/aswi2021jmsd!23
Merge branch 'master' into '8705_rapi_private_key'
Merge remote-tracking branch 'origin/8705_rapi_private_key' into 8705_rapi_private_key
Re #8705 - Added CertService tests for `verify_key` and key reusal functionality of `wrap_custom_key`.
Re #8705 - Reformatting, test updates (discussed invalid branch returns 400).
Re #8705 - `verify_key` bugfix - added check whether the passed PEM is an actual key
Re #8705 - Review updates.
Re #8702 - Updated Certificate constructors in compliance with the recent database updates.
Merge branch '8702_augmented_filtering' into 'master'
8702 Augmented filtering of certificates
See merge request aswi/aswi-2021/aswi2021jmsd!25
Merge branch '8704_create_cert_extensions' into 'master'
8704 Let certificate extensions be specified via REST API
See merge request aswi/aswi-2021/aswi2021jmsd!24
Re #8704 - Minor fix (return code 500 -> 400)
Merge branch '8708_PKCS_Identity' into 'master'
8708 pkcs identity
See merge request aswi/aswi-2021/aswi2021jmsd!22
Re #8708 - Changed the generate_pkcs_identity method of the CertificateService in such way that the Certificate class instance is now passed instead of a certificate ID resulting in a decrease of SQL queries.
Re #8705 - Changed usage dict to usage list in the client application while creating certificate
Re #8708 - Added a unit test covering a scenario in which an empty identity password is passed to the generate_pkcs_identity method of the CryptographyService
Improved the generate_pkcs_identity method in such way that when None is passed as the identity password then an empty string literal ("") is used instead.
Re #8704 - Minor fix (extensions default None -> "")
Re #8704 - Added an invalid extension test.
Re #8704 - Added the `extension` parameter to the create endpoint.
Re #8702 - Reset DB w.r.t. new `init_database.py`.
Re #8702 - Added filtering/pagination tests.
Re #8702 - Minor bug and flow fixes.
Re #8702 - Finished implementing filtering methods in the CertService.
Re #8702 - Added filtering methods to CertRepository.
Re #8708 - Changed /api/certificates/{id}/identity endpoint method back to POST (facepalm)
Changed REST API tests accordingly.
Merge branch '8590_Implement_subject_fields'
Re #8700 - Fixed a test bug related to date format differences.
Re #8702 - Started implementing required CertService updates.
Re #8702 - Reformed CertController's `get_list_of_certs` method, improved filtering logic.
Re #8708 - Improved /api/certificate/{id}/identity test coverage by testing to send non well formed requests
Re #8708 - Improved generate_pkcs_identity tests in such way that the identity's friendlyName attribute is now checked
Re #8708 - Changed the swagger.yaml accordingly to the previous REST API endpoint changes (/api/certificate/{id}/identity endpoint)
Changed method from POST to GET.Changed 201 status code to 200.Improved status code descriptions.Improved ID parameter description....
Re #8708 - Changed the endpoint generating PKCS12 identities to GET from POST (the generated identity is not stored on the server)
Changed the endpoint test accordingly
Re #8708 - Changed the behaviour of the generate_pkcs_identity method in the CryptographyService that now does not use the -CAfile argument when the passed chain of trust is empty
Added a unit test verifying that the changed method works as expected when empty chain of trust is passed
Re #8708 - Renamed a test
Re #8708 - Added a test verifying the validity of the generate_pkcs_identity method in CertificateService when a chain of trust is empty
Re #8708 - Added a new integration test verifying valid status code and content type of /api/certificates/<id>/identity endpoint
Re #8708 - Added a new REST API endpoint used for generating a PKCS12 identities of certificates
Re #8708 - Implemented a new method in the CertificateService that does generate a PKCS12 identity by using the CryptographyService
Covered the new method with few integration testsFixed minor typos in the CertificateService
Re #8705 - Added tests, changed usages (dict -> list).
Re #8705 - Added the `find_pk` method to PKRepo.
Re #8705 - Added the `verify_key` method to CryptoService.
Re #8705 - Added wrapping methods and the `verify_key` method to KeyService.
Re #8705 - Adjusted CertController to handle all combinations of PEM/pass supply. Added calls to a not-yet-existing `verify_key(...)` method of PK service.
Re #8700 - Review merge.
Re #8708 - Implemented a new method in the CryptographyService that allows the caller to create a PKCS12 identity of a certificate and it's chain of trust
Covered the new method with unit tests.
Re #8590 - Modified IF statement- revocation data can be None
Re #8590 - Modified tests due to fields of subject implemented
Re #8590 - Modified methods due to fields of subject implemented
Re #8590 - Implemented all fields of subject into DB
Update README.md
Hotfix - logpath definition
Update requirements.txt
Update Dockerfile
Merge branch '8670_Enhance_revocation_logic' into 'master'
8670 enhance revocation logic
See merge request aswi/aswi-2021/aswi2021jmsd!21
Merge branch 'master' into '8670_Enhance_revocation_logic'
Re #8670 - minor extension of integration test during review
Merge branch '8707_certificate_status_information' into 'master'
8707 certificate status information
See merge request aswi/aswi-2021/aswi2021jmsd!20
Re #8707 - Logging of used config file improved
Re #8707 - Log level mapping via dictionary, minor adjustments during review
Re #8670 - Covered certificate_repository by the CRUD tests
Re #8707 - Added logging for the new functionality
Re #8707 - Enhanced logging to set log level based on config file
Re #8707 - Added integration test of the RestAPI
Re #8707 - Added integration test of the service
Re #8707 - Implemented get_certificate_state() in CertificateRepository
Re #8707 - Implemented status in the controller, prepared method in CertificateService
Re #8707 - Added necessary state constants
Merge branch '8570_Implement_logging'
Re #8670 - Modified deletion for historical storage of certificates
Re #8570 - Rotating file settings
Merge branch '8709_include_root_in_chain' into 'master'
Re #8709 - included root certificate into the trust chain
See merge request aswi/aswi-2021/aswi2021jmsd!17
Updated swagger.yaml
Re #8700 - Implemented certificate revalidation check and fixed affected tests
Re #8570 - Added logs
Re #8570 - Messages logging
Certificate usage hotfix before DEMO #4 - digital signature does not specify timestamping
Re #8570 - Logger configuration- implemented dictionary to string in utils- implemented log functions with parameter message only (name of file, name of class and name of functionare getting automaticaly)
Update swagger.yaml
Re #8585 - Extensions based on usagesMerge branch '8585_Extensions_based_on_usages' into 'master'See merge request aswi/aswi-2021/aswi2021jmsd!16
Re #8575 - Removed useless print method calls
Update README.md - fixed coverage badge
Merge branch 'master' into 8570_Implement_logging
Re #8570 - Logged configuration
Re #8585 - Improved a code comment in usages_to_extensions.py
Re #8585 - Edited certificate_service_test.py tests asserting that various extension field flags are set when certain usages are selected
Re #8585 - Fixed an issue where required extensions based on cert. usages were not present in the generated certificate
Created an utility that converts usages to extension configuration linesDefined which extension field flags are required for certain usages
Re #8576 crl endpointMerge branch '8576_crl_endpoint' into 'master'See merge request aswi/aswi-2021/aswi2021jmsd!15