summaryrefslogtreecommitdiff
AgeCommit message (Collapse)AuthorFilesLines
2022-09-22fix(sl20): refactor signature and encryption validation because it can be ↵Thomas2-50/+84
skipped - SBA Pentest finds a pattern that skip security validation SBA(202209-10.2)
2022-09-15feat(moa-sig): only re-initialize MOA-Sig if PKI module is not marked as ↵Thomas1-1/+6
configurated
2022-09-15chore(moa-sig): switch to next snapshot versionThomas2-2/+2
2022-09-15chore(moa-sig): log used classloader to find moa-sig initialization problemsThomas2-3/+3
2022-09-15test(moa-sig): update moa-sig test-configurationThomas1-0/+1
2022-08-24refact(sl20): use custom static JSON Mapper implementationThomas1-1/+1
2022-08-22build(core): switch to next snapshot versionThomas12-12/+12
2022-08-22build(core): switch to next release version1.3.4Thomas12-12/+12
2022-08-22chore(core): update third-party libsThomas2-7/+26
2022-08-18refact(sl20): switch to one single JSONMapper instsanceThomas6-220/+46
2022-08-11refact(core): move JoseUtils into 'eaaf-utils' moduleThomas9-10/+46
2022-07-04feat(sl20): add 'eidasAuthLevel' flag into IDA authentication request to VDAThomas2-6/+10
2022-06-22chore(core): update third-party libs to latest versionsThomas1-10/+17
2022-06-22build(core): switch to next snapshot versionThomas12-12/+12
2022-06-22build(core): switch to next release version1.3.3Thomas12-12/+12
2022-06-08build(ci): use Java 11 for dependency scanning because template does not run ↵Thomas1-1/+2
with Java 17
2022-06-08test(ssl): ignore SSL Client-Authentication test with prod. endpointThomas1-0/+2
2022-06-08build(ci): fix broken CI pipe, because 'cobertura' template has been changedThomas1-3/+4
2022-06-08feat(attributes): define extended attribute that contais a CSV list of ↵Thomas1-0/+4
requested IDA attributes - The eIDAS AT-Proxy-Service uses that attribute to send the required attributes to IDA system
2022-05-20test(saml2): fix signature-verification test because we get a valid ↵Thomas1-1/+1
errorCode now
2022-05-20chore(core): switch to BouncyCastle Provider 1.71 with JDK1.8 requirementsThomas3-9/+9
2022-05-16chore(core): switch to lastest Spring and SpringBoot versionsThomas1-2/+2
2022-05-13chore(hsm): update HSM-Facade-Provider to v0.9.0Thomas1-1/+1
2022-05-09build(core): switch to next snapshot versionThomas12-12/+12
2022-05-09build(core): switch to next release version1.3.2Thomas12-12/+12
2022-05-09test(http): fix possible false-positive test resultsThomas2-5/+12
2022-05-03feature(core): add simple implementation of a Spring based message sourceThomas1-0/+115
2022-04-19test(http): add second SSL client authentication testThomas1-24/+17
INFO: SSL Client-Authentication with keys from HSM-Facade only works with BCJSSE Provider >= 1.70 and SystemD Parameter: -Dorg.bouncycastle.jsse.client.acceptRenegotiation=true if HTTP Server requires re-negotiation. Hint: do not enable SSL Debugging in BCJSSE Probider, because it throws a NullPointerException with HSM-Facade keys!!!!
2022-04-19chore(core): update IAIK JCE to v5.63Thomas1-1/+1
2022-04-19chore(http): add missing parameter into log messageThomas1-1/+1
2022-04-19feat(http): add request interceptor configuration into Apache HTTP Client ↵Thomas2-1/+17
factory
2022-04-19refact(http): reorder keyStore configuration-builder to optimize log messagesThomas1-1/+1
2022-04-12refact(config): split IConfigurationWithSP into two interfacesThomas6-195/+228
2022-04-12chore(core): update third-party lib to remove double declaration of APIsThomas3-1/+10
2022-03-31chore(core): update some more third-party libsThomas3-12/+19
2022-03-31fix(core): switch to Spring-Core 5.3.18 and Spring-Boot 2.6.5 to fix ↵Thomas1-2/+2
cve-2022-22965
2022-03-31chore(core): add log message to DataBinderControllerAdvice -> ↵Thomas1-3/+9
setDisallowedFields
2022-03-31build(core): switch to next snapshot versionThomas12-12/+12
2022-03-31build(core): switch to next release version1.3.1Thomas12-12/+12
2022-03-31feature(spring): add Spring controller advice to set default set of ↵Thomas1-0/+27
disallowed files for DataBinder This code protects Spring Core from a "Remote Code Execution" attack (dubbed "Spring4Shell").This is a midigation for For more details, see this post: https://www.lunasec.io/docs/blog/spring-rce-vulnerabilities/
2022-03-01chore: switch to next snapshot versionThomas12-12/+12
2022-03-01build: switch to next release version1.3.0Thomas12-12/+12
2022-03-01chore(core): update third-party libsThomas1-6/+6
2022-03-01refactor(ux): provide method to extract Locale from HTTP request by using ↵Thomas1-5/+12
Spring locale-resolver
2022-02-11chore(core): remove old HttpServlet implementation, because we only use Java ↵Thomas1-148/+0
Spring now
2022-01-27build(test): fix wrong scope of jUnit dependenciesThomas1-1/+2
2022-01-19test(core): add extension of ↵Thomas4-59/+115
'AuthenticatedEncryptionPendingRequestIdGenerationStrategy' that allows generation of already expired tokens
2022-01-19build(CI): optimize source-code analysing and dependency scanningThomas1-0/+10
2022-01-19refactor(core): change API parameters from 'Date' to 'Instant'Thomas7-36/+43
2022-01-19build: switch to new snapshot versionThomas12-12/+12