summaryrefslogtreecommitdiff
path: root/eaaf_core_utils
AgeCommit message (Collapse)AuthorFilesLines
2023-08-02build(core): switch to next release version1.3.15Thomas1-1/+1
2023-07-12feat(hsm-facade): make trusted SSL-certificate optional for HSM-Facade ↵Thomas2-37/+54
initialization
2023-07-12feat(http): Add connection timeout parameters to HTTP client-configurationThomas2-11/+27
2023-06-06fix(core): add some more allowed classes to Exception deserialization.Thomas2-1/+31
2023-06-05fix(core): update wrong encoded parameter in validation exceptionThomas1-1/+1
2023-05-31refact(core): change some more internal representation to make it JSON ↵Thomas2-2/+10
serializable
2023-05-15chore(utils): optimize type-specific deserializationThomas3-2/+6
2023-05-15refact(core): change process-data holder-implementation to use Jackson ↵Thomas4-6/+196
serialization for storage
2023-05-15feat(utils): add custom Jackson (de)serialization for polymorph class structuresThomas2-0/+170
2023-05-15feat(utils): optimize custom Java serialization implementationThomas3-21/+335
2023-05-08style(core): fix codestyle issuesThomas2-3/+5
2023-05-08feat(core): add in-line method to KeyStoreFactoryThomas13-2/+701
The keystore type 'inline' can be used to build a keystore by using PEM encoded certificate and key files. Example: pkcs12:keystore?private=certs/key.pem&cert=certs/certificate.pem
2023-04-21feat(log): add MDC based ID to correlate single HTTP requestsThomas1-2/+43
2023-04-12build(core): switch to next snapshot versionThomas1-1/+1
2023-04-12build(core): switch to next release version1.3.14Thomas1-1/+1
2023-02-06feat(http): add request interceptor to pre-emptive HTTP Basic authenticationThomas4-0/+99
2023-01-18build(core): switch to next snapshot versionThomas1-1/+1
2023-01-18build(core): switch to next release version1.3.13Thomas1-1/+1
2023-01-09build(core): switch to next snapshot versionThomas1-1/+1
2023-01-09build(core): switch to next snapshot versionThomas1-1/+1
2022-12-19build(core): switch to next release version1.3.11Thomas1-1/+1
2022-11-24build(core): switch to next snapshot versionThomas1-1/+1
2022-11-24build(core): switch to next release version1.3.10Thomas1-1/+1
2022-11-23build(core): switch to next snapshot versionThomas1-1/+1
2022-11-23build(core): switch to next release version1.3.9Thomas1-1/+1
2022-11-21build(core): switch to next snapshot versionThomas1-1/+1
2022-11-21build(core): switch to next release version1.3.8Thomas1-1/+1
2022-10-24build(core): switch to next snapshot versionThomas1-1/+1
2022-10-20build(core): switch to next release version1.3.7Thomas1-1/+1
2022-10-13build(core): switch to next snapshot versionThomas1-1/+1
2022-10-13build(core): switch to next release version1.3.6Thomas1-1/+1
2022-10-04build(core): switch to next snapshot versionThomas1-1/+1
2022-10-03build(core): switch to next release version1.3.5Thomas1-1/+1
2022-09-29refact(core): change logger to lombok annotationThomas1-4/+2
2022-09-28chore(core): change log basic status-messager implementationThomas1-5/+5
wrote log messages on level 'debug' if no message property was found
2022-09-28chore(core): change log-level to info to get more information about invalid ↵Thomas1-3/+3
pendingRequestId's
2022-08-22build(core): switch to next snapshot versionThomas1-1/+1
2022-08-22build(core): switch to next release version1.3.4Thomas1-1/+1
2022-08-11refact(core): move JoseUtils into 'eaaf-utils' moduleThomas5-0/+489
2022-06-22build(core): switch to next snapshot versionThomas1-1/+1
2022-06-22build(core): switch to next release version1.3.3Thomas1-1/+1
2022-06-08test(ssl): ignore SSL Client-Authentication test with prod. endpointThomas1-0/+2
2022-05-20chore(core): switch to BouncyCastle Provider 1.71 with JDK1.8 requirementsThomas1-1/+1
2022-05-09build(core): switch to next snapshot versionThomas1-1/+1
2022-05-09build(core): switch to next release version1.3.2Thomas1-1/+1
2022-05-09test(http): fix possible false-positive test resultsThomas2-5/+12
2022-05-03feature(core): add simple implementation of a Spring based message sourceThomas1-0/+115
2022-04-19test(http): add second SSL client authentication testThomas1-24/+17
INFO: SSL Client-Authentication with keys from HSM-Facade only works with BCJSSE Provider >= 1.70 and SystemD Parameter: -Dorg.bouncycastle.jsse.client.acceptRenegotiation=true if HTTP Server requires re-negotiation. Hint: do not enable SSL Debugging in BCJSSE Probider, because it throws a NullPointerException with HSM-Facade keys!!!!
2022-04-19chore(http): add missing parameter into log messageThomas1-1/+1
2022-04-19feat(http): add request interceptor configuration into Apache HTTP Client ↵Thomas2-1/+17
factory