Cyrus
|
28f0fdb3e1
|
Merge pull request #309 from nsacyber/aic-policy-rule
[#169] AIC policy rule
|
2021-03-09 10:52:01 -05:00 |
|
Cyrus
|
d0315bd5f2
|
Merge pull request #335 from nsacyber/firmware-log-fix
Firmware Event Numbering Fix
|
2021-03-09 09:47:14 -05:00 |
|
Cyrus
|
6e470e2b04
|
Updated the wording for the policy setting page.
|
2021-02-23 13:27:43 -05:00 |
|
Cyrus
|
a5184f5a5b
|
Final changes that adds in the additional setting for the renewal period threshold. This value indicates that if the end validity has been reached for the current issued attestation certificate, then don't generate one. However if we are within the number of days set by the threshold, then generate the certificate before it expires. The default is 1 year from the end validity.
|
2021-02-23 10:17:56 -05:00 |
|
Cyrus
|
9c3dfe16b1
|
Modified the policy page controller by adding a new method to work on a form request from the policy page for enabling the generate issued attestation certificate based on a time frame rather than never or on each provision.
|
2021-02-16 10:30:21 -05:00 |
|
Cyrus
|
a41d1484e1
|
Updated the printing of the event number for the failed events. This is to match them with the event number on the support rim page. Support rim page starts at 1 but the method used on the failure page starts at 0. Also while investigating this issue, I noted that the coloring of the failure event disappears after the first viewing of that page. This was fixed. The conditions to check for an error were being ignored after the first load.
|
2021-02-12 09:01:35 -05:00 |
|
Cyrus
|
dcf0ec8101
|
Merge branch 'master' into aic-policy-rule
|
2021-02-11 14:13:28 -05:00 |
|
Cyrus
|
9b8721e33a
|
Merge pull request #333 from nsacyber/sf-4-update
SpringFramework 4 version update
|
2021-02-08 09:48:11 -05:00 |
|
Cyrus
|
2d9bbe1bd7
|
initial commit
|
2021-02-01 11:24:20 -05:00 |
|
Cyrus
|
8639e8b708
|
Merge pull request #332 from nsacyber/cpp-error-cleanup
CppCheck cleanup
|
2021-01-28 10:12:13 -05:00 |
|
Cyrus
|
a04b697c9a
|
Added an additional suppression to the cppcheck call.
|
2021-01-26 15:10:47 -05:00 |
|
Cyrus
|
f80d9af3b7
|
Some issues were found while doing script testings. These issues don't appear on Travis, however some of the issues were resolved in the scripts by making these changes. This is to test how travis will react.
|
2021-01-22 10:08:50 -05:00 |
|
Cyrus
|
4d8315f443
|
Merge pull request #331 from nsacyber/issue-308-unitTests
[#308] Updated unit tests
|
2021-01-15 08:22:52 -05:00 |
|
chubtub
|
88015df551
|
Checkstyle: unused import
|
2021-01-14 13:19:17 -05:00 |
|
Cyrus
|
859fdbef83
|
Added a null check for the platformCredentials in the issued certificate attribute helper so that NPEs aren't thrown.
|
2021-01-14 12:48:53 -05:00 |
|
Cyrus
|
164a43f056
|
These are unit tests that were not run on the merge request #327 for issue 308. The unit tests uses certificate (EC and 2 CAs) that don't match for SKI to AKI or issuer string fields. The O= field isn't required and the code in #327 was changed to use SKI first then a sorted RDN list. See #327. A note was left in the unit tests that the test certs need to be updated.`
|
2021-01-14 12:41:29 -05:00 |
|
Cyrus
|
49f8fd3ed4
|
Merge pull request #330 from nsacyber/firmware-summary
[#329] Firmware Tests summary
|
2021-01-11 13:41:52 -05:00 |
|
Cyrus
|
fa6b64d38a
|
Removed unused statement
|
2021-01-08 07:20:18 -05:00 |
|
Cyrus
|
e0ae088401
|
Remove error statement
|
2021-01-08 07:07:16 -05:00 |
|
Cyrus
|
43c9f04d60
|
Updated some of the checks for the search text for the summary.
|
2021-01-07 16:00:56 -05:00 |
|
Cyrus
|
f361a49a74
|
Resovled the issue of the DBX variable not showing up under the correct category when present. The search for the DB variable also checks the DBX so it never actually hit the DBX if statement.`
|
2021-01-07 13:40:40 -05:00 |
|
Cyrus
|
ab8d30ee82
|
Corrected the missing boot order entry on the page and updated how the boot variables are searched for. However, DBX is still not showing up.
|
2021-01-07 09:48:04 -05:00 |
|
Cyrus
|
08c0daf9be
|
Initial Commit
|
2021-01-06 15:45:50 -05:00 |
|
Cyrus
|
c181665ad9
|
Merge pull request #326 from nsacyber/issue-324
[#324] Update filenames when downloading (RIM)
|
2021-01-05 11:12:25 -05:00 |
|
Cyrus
|
20f94b94ec
|
Merge pull request #327 from nsacyber/issue-308
[#308] Certificate RDN update
|
2021-01-05 10:07:04 -05:00 |
|
Cyrus
|
85254d9c44
|
Removed null assignment that isn't used
|
2021-01-05 08:14:18 -05:00 |
|
Cyrus
|
6dd948c828
|
Added a null check for the endorsement credential for the tpm 1.2
|
2020-12-18 06:58:18 -05:00 |
|
Cyrus
|
a7eae2fd77
|
Test out an potential exception
|
2020-12-17 13:09:03 -05:00 |
|
Cyrus
|
8fa5dfdd9e
|
Removed unused imports
|
2020-12-14 10:57:35 -05:00 |
|
Cyrus
|
62c7ca2d90
|
This PR is to address issue #308. The ACA was pulling Issuer Certificates using the organization RDN of the subject string and getting this from the issuer string of the EC or PC. This presents a problem because it isn't a required field. The organization field cannot be null or empty. Pulling objects from a DB using null or empty would produce bad results. The main change of this issue (which has not been full tested) is pulling using the AKI for the db lookup. If this fails, instead of falling back on potentially left out fields like the O= RDN, the ACA takes the issuer/subject fields, breaks them apart and sorts them based on the key. It also changes the case. This way the lookup can be assured to match in case of some random situation in which the issuer or subject field don't match because RDN keys are just in different positions of the string.
|
2020-12-11 14:47:46 -05:00 |
|
Cyrus
|
209024c12a
|
Cleaned up some comments and code.
|
2020-12-07 09:47:54 -05:00 |
|
Cyrus
|
a3de35ed27
|
The issue with the tpm 1.2 system test failing had to do with the string to integer conversion using getInteger instead of parseInt.
|
2020-12-07 07:44:48 -05:00 |
|
Cyrus
|
ec47aceedc
|
Merge branch 'master' into aic-policy-rule
|
2020-12-07 07:40:09 -05:00 |
|
Cyrus
|
11f238f671
|
Testing system tests
|
2020-12-04 08:36:42 -05:00 |
|
iadgovuser26
|
408060b1e0
|
Update README.md
Updated for Release 2.0
|
2020-12-03 15:40:46 -05:00 |
|
Cyrus
|
e64c6cf772
|
Merge branch 'master' into aic-policy-rule
|
2020-12-03 13:34:29 -05:00 |
|
Cyrus
|
0ce8d41f23
|
Merge pull request #323 from nsacyber/multiple-rim-upload
Multiple RIM upload
|
2020-12-03 07:57:15 -05:00 |
|
Cyrus
|
b56fb73801
|
Updated the file to just use the fileName from the ReferenceManifest for the downloaded name.
|
2020-12-02 19:40:50 -05:00 |
|
Cyrus
|
a07fbbd847
|
In a previous pull request, the reference manifest manager was not called to update the unarchived base rim. So it appears to never have been uploaded.
|
2020-12-02 11:46:42 -05:00 |
|
Cyrus
|
7d49f63a9b
|
Merge branch 'master' into multiple-rim-upload
|
2020-12-02 11:05:12 -05:00 |
|
Cyrus
|
a3f5386b21
|
Merge pull request #322 from nsacyber/platform_cert_missing_fix
Platform Certificate Upload Modification
|
2020-12-02 11:01:27 -05:00 |
|
Cyrus
|
70662bddec
|
Updated how the bios measurement file is uploaded. Changed the code to pull the string from the properties file instead of a hard link in the code.
|
2020-12-01 11:13:41 -05:00 |
|
Cyrus
|
9534d6650f
|
Merge branch 'master' into platform_cert_missing_fix
|
2020-12-01 09:47:45 -05:00 |
|
Cyrus
|
a3ba12f7b7
|
Merge pull request #321 from nsacyber/expected_pcr_display_fix
Bug Fix for Base RIM Details Page
|
2020-12-01 09:45:55 -05:00 |
|
Cyrus
|
6eefb393a3
|
Updated the code to pull all the files from a swid tag file directory and a rim log file directory, instead of a single file.
|
2020-11-30 14:16:57 -05:00 |
|
Cyrus
|
857f1eb0ff
|
There was a pull for an object that would be null without any RIMs uploaded.
|
2020-11-30 10:11:25 -05:00 |
|
Cyrus
|
29b7d466cd
|
Updated wording in validation for failed trust store
|
2020-11-30 09:23:10 -05:00 |
|
Cyrus
|
bfeff6c867
|
initial commit
|
2020-11-30 08:38:46 -05:00 |
|
Cyrus
|
eab88e1ef6
|
Merge branch 'platform_cert_missing_fix' into multiple-rim-upload
|
2020-11-30 06:41:52 -05:00 |
|
Cyrus
|
61359e1920
|
Updated the provisioner to look into the tcg properties file for the location of the certificates that are to be uploaded instead of using the tpm (if the file is not in the tpm).
|
2020-11-27 13:09:04 -05:00 |
|