Re #8708 - Changed /api/certificates/{id}/identity endpoint method back to POST (facepalm)
Changed REST API tests accordingly.
Re #8708 - Improved /api/certificate/{id}/identity test coverage by testing to send non well formed requests
Re #8708 - Improved generate_pkcs_identity tests in such way that the identity's friendlyName attribute is now checked
Re #8708 - Changed the swagger.yaml accordingly to the previous REST API endpoint changes (/api/certificate/{id}/identity endpoint)
Changed method from POST to GET.Changed 201 status code to 200.Improved status code descriptions.Improved ID parameter description....
Re #8708 - Changed the endpoint generating PKCS12 identities to GET from POST (the generated identity is not stored on the server)
Changed the endpoint test accordingly
Re #8708 - Changed the behaviour of the generate_pkcs_identity method in the CryptographyService that now does not use the -CAfile argument when the passed chain of trust is empty
Added a unit test verifying that the changed method works as expected when empty chain of trust is passed
Re #8708 - Renamed a test
Re #8708 - Added a test verifying the validity of the generate_pkcs_identity method in CertificateService when a chain of trust is empty
Re #8708 - Added a new integration test verifying valid status code and content type of /api/certificates/<id>/identity endpoint
Re #8708 - Added a new REST API endpoint used for generating a PKCS12 identities of certificates
Re #8708 - Implemented a new method in the CertificateService that does generate a PKCS12 identity by using the CryptographyService
Covered the new method with few integration testsFixed minor typos in the CertificateService
Re #8708 - Implemented a new method in the CryptographyService that allows the caller to create a PKCS12 identity of a certificate and it's chain of trust
Covered the new method with unit tests.
Update README.md
Hotfix - logpath definition
Update requirements.txt
Update Dockerfile
Merge branch '8670_Enhance_revocation_logic' into 'master'
8670 enhance revocation logic
See merge request aswi/aswi-2021/aswi2021jmsd!21
Merge branch 'master' into '8670_Enhance_revocation_logic'
Re #8670 - minor extension of integration test during review
Merge branch '8707_certificate_status_information' into 'master'
8707 certificate status information
See merge request aswi/aswi-2021/aswi2021jmsd!20
Re #8707 - Logging of used config file improved
Re #8707 - Log level mapping via dictionary, minor adjustments during review
Re #8670 - Covered certificate_repository by the CRUD tests
Re #8707 - Added logging for the new functionality
Re #8707 - Enhanced logging to set log level based on config file
Re #8707 - Added integration test of the RestAPI
Re #8707 - Added integration test of the service
Re #8707 - Implemented get_certificate_state() in CertificateRepository
Re #8707 - Implemented status in the controller, prepared method in CertificateService
Re #8707 - Added necessary state constants
Merge branch '8570_Implement_logging'
Re #8670 - Modified deletion for historical storage of certificates
Re #8570 - Rotating file settings
Merge branch '8709_include_root_in_chain' into 'master'
Re #8709 - included root certificate into the trust chain
See merge request aswi/aswi-2021/aswi2021jmsd!17
Updated swagger.yaml
Re #8570 - Added logs
Re #8570 - Messages logging
Certificate usage hotfix before DEMO #4 - digital signature does not specify timestamping
Re #8570 - Logger configuration- implemented dictionary to string in utils- implemented log functions with parameter message only (name of file, name of class and name of functionare getting automaticaly)
Update swagger.yaml
Re #8585 - Extensions based on usagesMerge branch '8585_Extensions_based_on_usages' into 'master'See merge request aswi/aswi-2021/aswi2021jmsd!16
Re #8575 - Removed useless print method calls
Update README.md - fixed coverage badge
Merge branch 'master' into 8570_Implement_logging
Re #8570 - Logged configuration
Re #8585 - Improved a code comment in usages_to_extensions.py
Re #8585 - Edited certificate_service_test.py tests asserting that various extension field flags are set when certain usages are selected
Re #8585 - Fixed an issue where required extensions based on cert. usages were not present in the generated certificate
Created an utility that converts usages to extension configuration linesDefined which extension field flags are required for certain usages
Re #8576 crl endpointMerge branch '8576_crl_endpoint' into 'master'See merge request aswi/aswi-2021/aswi2021jmsd!15
Re #8577 - Minor refactoring (crl -> crl_ocsp).
Merge remote-tracking branch 'origin/8576_crl_endpoint' into 8576_crl_endpoint
Re #8576 - openssl config template update, comment added
Re #8577 - Added OCSP integration tests.
Re #8577 - Minor adjustment to accept binary contents.
Re #8577 - Added a `generate_ocsp` method to the CryptoService - calls OpenSSL to generate the response.
Re #8577 - Added a `create_index` method (= index including valid certificates) to the CRL Service.
Re #8577 - Added handle methods for OCSP to the CrlOcspController.
Re #8577 - Added endpoints for OCSP.
Re #8576 - Fix of specifying CRL and OCSP endpoint
Re #8576 - Added crl endpoint integration tests, fix of serial number
Re #8570 - Setted configuration of logging
Re #8576 - Added integration test for empty CRL
Re #8576 - Fixed generating index file for generating empty CRL
Re #8576 - implemented CRL endpoint
Re #8576 - moved return codes to separate file
Re #8576 - integration test of CrlService
Merge branch '8583_interactive_details_page' into 'master'
8583 - Interactive details page
See merge request aswi/aswi-2021/aswi2021jmsd!14
Re #8583 - Updated possible revocation reasons
Re #8576 - calling CryptographyService from CrlService, passphrase support
Re #8576 - cryptography.py implemented generate_crl()
Re #8576 - added coverage into the readme.md
Re #8576 - Added coverage into the pipeline
Re #8576 - CrlService implemented generate_crl_response(), prepared method generate_crl in CryptographyService
Re #8576 - moved CertificateNotFoundException to separate file
Re #8583 - certificate.js and utilities.js using await
Re #8583 - index.js uses await
Re #8583 - create_certificate.js uses await
Re #8583 - create_certificate.js moved initialization code into mounted
Re #8583 - index.js moved initialization code into mounted
Re #8583 - certificate.js moved initialization code to mounted
Re #8575 - Index file creationMerge branch '8575_Index_file_creation' into 'master'See merge request aswi/aswi-2021/aswi2021jmsd!13
Re #8575 - Serial number item in the index file is now always uppercase
Re #8575 - Fixed an issue where when creating an index file the valid_to field was passed instead of the revocation_date field
Re #8575 - Fixed an issue where serial number was not passed when creating certificatesRemoved a TODO that has already been fixed
Re #8575 - Improved crl_service_test.py comments
Re #8570 - Implemented logger- implemented static functions (debug, info, warning, error, critical) (sorted by level)- used configuration for setting logging library
Re #8583 - Fixed a typo in a comment
Re #8575 - Removed a useless CryptographyService fixture
Re #8575 - Implemented CrlService that allows the caller to generate a CA database index of revoked certificates
Added an integration test verifying its validity.Renamed NOT_BEFORE_AFTER_DATE_FORMAT constant to VALID_FROM_TO_DATE_FORMAT in certificate_service.py....
Re #8575 - Added a file that defines methods used for generating CA index file lines
Added unit tests verifying the validity of added methods
Re #8575 - Renamed some variable names in create_crt_test.py
Re #8575 - Added unit tests verifying that serial number is correctly set when creating a certificate
Renamed some create_crt_test.py tests.
Re #8575 - Added unit tests verifying that serial number is set when creating a self signed certificate
Re #8583 - Certificate management tab design improvement
Re #8583 - Display issued certificates
Re #8583 - Deleting certificates
Merge branch 'master' into 8583_interactive_details_page