| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
SubjectAltNameExtDefault gname is empty, not added in cert ext during configuration
Bug 927545 - Transport Cert signing Algorithm doesn't show ECC Signing Algorithms during DRM configuration with ECC
|
|
|
|
|
|
|
|
| |
Place the python deployment source code and the python deployment
scriptlets in two seperate folders base/deploy/src/engine and
/base/deploy/src/scriptlets in the project.
Ticket #521
|
|
|
|
| |
* Bugzilla Bug #947524 - Clone installation does not work over NAT
|
|
|
|
|
|
|
|
| |
Since pki_backup_password depends on pki_backup_keys to be true, it
is misleading to mention only pki_backup_password in the man page.
It is removed from the examples in the man page.
Ticket #465
|
|
|
|
|
|
|
|
| |
Change the current implementation of time out as
number of tries to, the total time for trying to
get the status of the Tomcat.
Ticket #563
|
|
|
|
|
|
|
|
| |
The PKCS10Client and CRMFPopClient use the CMS.BtoA and CMS.Atob
for encoding and decoding purposes which throws an exception.
Instead using the base64decode and the base64encode methods in Utils.
Ticket #549
|
| |
|
|
|
|
| |
NSCertTypeExtension bits (patch from mpoole)
|
|
|
|
|
|
|
|
|
| |
Removed the -w <security domain password> option for pkidestroy.
Added the -W <security domain password file> option which takes a
file containing the password as input. It is an optional parameter.
Added required information in pkidestroy.
Ticket #502
|
|
|
|
|
|
|
|
| |
Catch the KeyboardInterrupt (Ctrl-C) input during the execution of
pkispawn and pkidestroy and display a proper message to user rather
than a stacktrace.
Ticket #536
|
|
|
|
|
|
|
|
| |
Updated pkispawn/pkidestroy manpages with the steps involved
during the Interactive mode installation. A brief description
of all the parameters asked during the installation is provided.
Ticket #471
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
Updating the sample configuration file entries in
default CA and subordinate CA installation. Added
sample configuration files for each installation type
mentioned in the man page.
Tickets #509, #525
|
|
|
|
|
|
|
| |
A new option has been added to the CLI to capture HTTP requests
and responses and store them in the specified folder.
Ticket #523
|
|
|
|
|
|
|
| |
The class registration for JSON encoding has been moved after the
class definitions to avoid problems.
Ticket #532
|
|
|
|
|
|
|
|
| |
configuration file, /etc/pki/pki.conf does not get replaced
on upgrade, if edited on the disk and the user's
configurations are not lost.
Ticket #507
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Connection is now made to the installation servlet through a python
client using JSON. The code to construct the ConfgurationRequest and
parse the results has been moved to pkihelper.py, and configuration.py
no longer calls a separate jython process to create the Configuration
object and parse the results. The jython code has therefore been removed.
Also added status servlet to other java subsystems, to be tested prior
to starting configuration.
Trac Ticket 532
|
|
|
|
|
|
|
|
|
|
| |
By default Tomcat relies on /dev/random as a random number generator
to generate the session ID's. Under certain conditions /dev/random
may block, which will block Tomcat as well. To solve the problem all
webapps in Tomcat have been configured to use the random number
generator provided by JSS.
Ticket #524
|
|
|
|
|
|
|
|
| |
The Python REST client has been modified to parse JSON data using a method
that is compatible with python-requests 1.1. The RPM spec file has been
modified to require python-requests 1.1 package.
Ticket #535
|
|
|
|
|
|
|
| |
Due to recent CMake script changes, TPS and RA now require python
to build properly.
Ticket #540
|
|
|
|
|
|
|
| |
The Perl wrapper for CLI has been fixed to pass the error code returned
by Java clients.
Ticket #520
|
|
|
|
| |
* Additional fix for Fedora 19+
|
| |
|
| |
|
|
|
|
|
|
|
|
|
| |
The installer script has been modified to validate security domain
info in both interactive and silent installation.
A basic Python API has been added to access the REST interface.
Ticket #473
|
|
|
|
|
|
|
| |
The installer script has been modified to validate DS info in both
interactive and silent installation.
Ticket #472
|
|
|
|
|
|
| |
Ticket #493 - Changes done to bypass interpolation for using a % as part of a value.
All occurences of % will be replaced by a %% in interactive pkispawn/pkidestroy.
If a file is passed, then the values with a '%' need to have an escape character %
|
| |
|
|
|
|
|
|
|
| |
A new cert-request-show command has been added to allow EE users to
check certificate request status.
Ticket #511
|
|
|
|
|
|
|
|
| |
* Correct PKI Theme for RA and TPS:
** TRAC Ticket #517 - Clean up theme dependencies
* Make PKI Theme optional for CA, KRA, OCSP, TKS:
** Bugzilla Bug #916134 - unresolved dependency in pki-server: pki-server-theme
** TRAC Ticket #518 - Remove UI dependencies from pkispawn . . .
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
A new mechanism has been added to specify the authentication methods that
can be used to invoke the REST methods. The AuthMethodMapping annotation
maps each REST method to a list of allowed authentication methods. When a
client calls a REST method, the AuthMethodInterceptor will intercept the
call and verify that the client uses an allowed authentication method.
Most REST methods that require authentication have been configured to
require client certificate authentication. Authentication using username
and password will only be used to get the installation token from security
domain.
Ticket #477
|
|
|
|
|
|
|
|
| |
New CLI's have been added to search, add, and remove user membership.
The group member management code has been refactored into a processor
to allow reuse.
Ticket #190
|
|
|
|
|
|
|
| |
The cert-find command has been modified to provide an option to
search by certificate status.
Ticket #501
|
|
|
|
| |
security domain.
|
| |
|
| |
|
| |
|
| |
|
|
|
|
|
|
|
|
| |
The cert-find command has been modified to include some additional
attributes including certificate type and version, key algorithm
name and length, validity dates, creation time and issuer.
Ticket #498
|
|
|
|
|
|
|
|
|
| |
The cert-find command has been fixed to show better error messages
on missing validity duration options. The validity duration unit
has been changed to take "day", "week", "month", or "year" and
convert it into milliseconds.
Ticket #291, #500
|
|
|
|
|
|
|
|
| |
The SecurityDomainProcessor has been modified to generate the host
ID from the subsystem type, hostname, and secure port instead of
relying on the user-configurable SubsystemName attribute.
Ticket #503
|
|
|
|
|
|
|
|
| |
All date parameters for cert-find have been modified to use the
YYYY-MM-DD date format. Date parsing code in FilterBuilder has
been modified not to ignore parsing errors.
Ticket #497
|
|
|
|
|
|
|
|
|
|
| |
The pkispawn has been modified such that the configuration file
and subsystem type are optional. The pkidestroy has been modified
such that the instance name and subsystem type are optional.
If any of these options are not specified they will enter an
interactive mode.
Ticket #380
|
|
|
|
|
|
|
| |
The configuration code has been modified to use the REST interface
to get the installation token and ignore CA cert validation errors.
Ticket #476
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
Previously nonces were stored in a global map which might not scale
well due to some issues:
1. The map uses the nonces as map keys. There were possible nonce
collisions which required special handling.
2. The collision handling code was not thread safe. There were
possible race conditions during concurrent modifications.
3. The map was shared and size limited. If there were a lot of
users using the system, valid nonces could get pruned.
4. The map maps the nonces to client certificates. This limits
the possible authentication methods that can be supported.
Now the code has been modified such that each user has a private map
in the user's session to store the nonces. Additional locking has been
implemented to protect against concurrent modifications. The map now
uses the target of the operation as the map key, eliminating possible
collisions and allowing the use of other authentication methods. Since
this is a private map, it's not affected by the number of users using
the system.
Ticket #474
|
|
|
|
|
|
|
| |
The cert-request-approve has been merged into cert-request-review
to ensure that these operations are executed in the same session.
Ticket #474
|
| |
|
|
|
|
| |
* TRAC Ticket #488 - Dogtag 10: Fix CLI 'cert-find' clientAuth issue
|
| |
|