summaryrefslogtreecommitdiff
path: root/eaaf_modules
AgeCommit message (Collapse)AuthorFilesLines
2023-08-31feat(core): refactor to openSAML 5 for Java 17Thomas70-272/+383
2023-08-31feat(core): starting switch from Spring5/JAVA11 to Spring6/Java17Thomas5-13/+12
IMPORTEND: Is not finished because that contains a braking change, like javax.servlet.* --> jakarta.servket.* as one example and we miss some third-party libs that use the new API. # Conflicts: # eaaf_core_api/checks/spotbugs-exclude.xml # eaaf_core_api/pom.xml # eaaf_core_utils/checks/spotbugs-exclude.xml # pom.xml
2023-08-31build(core): switch to new major-release version 2.0.0-SNAPSHOTThomas6-6/+6
This version requires Java 17 as minimum # Conflicts: # build_reporting/pom.xml # eaaf-springboot-utils/pom.xml # eaaf_core/pom.xml # eaaf_core_api/pom.xml # eaaf_core_utils/pom.xml # eaaf_modules/eaaf_module_auth_sl20/pom.xml # eaaf_modules/eaaf_module_moa-sig/pom.xml # eaaf_modules/eaaf_module_pvp2_core/pom.xml # eaaf_modules/eaaf_module_pvp2_idp/pom.xml # eaaf_modules/eaaf_module_pvp2_sp/pom.xml # eaaf_modules/pom.xml # pom.xml
2023-08-30chore(saml2): remove some deprecated methods and switch to new oneThomas8-16/+16
2023-08-21fix(sl20): remove line-of-code that was a copy&past mistakeThomas1-6/+1
2023-08-21feat(sl20): add basic certificate-validity check into JWS validationThomas2-2/+10
The check can be disabled by using the configuration property: modules.sl20.security.truststore.need.valid.certificate
2023-08-21refact(sl20): clean-up SL20 response handlerThomas1-147/+177
2023-08-02build(core): switch to next snapshot versionThomas6-6/+6
2023-08-02build(core): switch to next release version1.3.15Thomas6-6/+6
2023-08-02test(moa-sig): add PAdES verificationThomas2-0/+65
2023-05-31refact(core): change some more internal representation to make it JSON ↵Thomas1-4/+7
serializable
2023-05-22chore(saml2): optimize metadata signature-verification filterThomas2-11/+121
Select trusted X509 certificates based on KeyInfo from XML-Signature, if possible
2023-05-15refact(core): change process-data holder-implementation to use Jackson ↵Thomas2-0/+13
serialization for storage
2023-05-11chore(core): update third-party libsThomas3-2/+18
2023-05-11build(core): add internal EGIZ repositorityThomas1-1/+11
2023-05-08refactor(moa-sig): rename IAIK dependencyThomas2-0/+0
2023-05-08chore(moa-sig): add new versions of IAIK libs.Thomas17-4/+72
2023-04-26feat(core): add extension-point to central errorHandler service to set ↵Thomas2-1/+54
application specific information into error-GUI model
2023-04-12build(core): switch to next snapshot versionThomas6-6/+6
2023-04-12build(core): switch to next release version1.3.14Thomas6-6/+6
2023-02-21test(hsm): fix broken test, because HSM-Facade change an error messageThomas1-1/+1
2023-01-18build(core): switch to next snapshot versionThomas6-6/+6
2023-01-18build(core): switch to next release version1.3.13Thomas6-6/+6
2023-01-18fix(saml2): support XML decryption by using key from HSM-FacadeThomas6-15/+239
Details: openSAML4 uses org.apache.xml.security.algorithms.JCEMapper to define JCE cryptoprovider for openSAML crypto. operations. However, this JCEMapper is not used for openSAML Decrypter, so it must be set manually.
2023-01-17test(jose): add JWE encryption/decryptio test that uses a wrong decryption keyThomas1-0/+80
2023-01-09build(core): switch to next snapshot versionThomas6-6/+6
2023-01-09build(core): switch to next snapshot versionThomas6-6/+6
2022-12-19build(core): switch to next release version1.3.11Thomas6-6/+6
2022-12-19feat(core): support not-notified eIDAS LoAThomas2-11/+16
2022-12-19chore(pvp2): read LoA matching-mode from service-provider configurationThomas1-6/+6
2022-11-24build(core): switch to next snapshot versionThomas6-6/+6
2022-11-24build(core): switch to next release version1.3.10Thomas6-6/+6
2022-11-24fix(sl20): remove full http response body from Exception messageThomas1-3/+3
Reason: Exception messages are illustrated as UX errors
2022-11-23build(core): switch to next snapshot versionThomas6-6/+6
2022-11-23build(core): switch to next release version1.3.9Thomas6-6/+6
2022-11-23fix(sl20): use valid encoded log-message parametersThomas1-3/+3
2022-11-21build(core): switch to next snapshot versionThomas6-6/+6
2022-11-21build(core): switch to next release version1.3.8Thomas6-6/+6
2022-11-07feat(sl20): add response property for IDA eIDAS-comply flagThomas1-0/+4
2022-10-24build(core): switch to next snapshot versionThomas6-6/+6
2022-10-20build(core): switch to next release version1.3.7Thomas6-6/+6
2022-10-13build(core): switch to next snapshot versionThomas6-6/+6
2022-10-13build(core): switch to next release version1.3.6Thomas6-6/+6
2022-10-04test(moa-sig): add some more certificates into truststoreThomas9-0/+160
2022-10-04build(core): switch to next snapshot versionThomas6-6/+6
2022-10-03build(core): switch to next release version1.3.5Thomas6-6/+6
2022-09-28chore(moa-sig): switch MOA-Sig to new IAIK-MOA v2.08Thomas3-3/+10
2022-09-27refact(moa-sig): call MOA-SIG initialization checkThomas1-5/+4
2022-09-22fix(sl20): refactor signature and encryption validation because it can be ↵Thomas2-50/+84
skipped - SBA Pentest finds a pattern that skip security validation SBA(202209-10.2)
2022-09-15feat(moa-sig): only re-initialize MOA-Sig if PKI module is not marked as ↵Thomas1-1/+6
configurated