Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
CTK should be deployed with the required dockers.
compliance-toolkit-service: 1.1.0
compliance-toolkit-ui: 1.1.0
To deploy Compliance Toolkit, we require only below mandatory services:
Artifactory: mosipid/artifactory-ref-impl: 1.2.0.1-B2
Audit manager: mosipid/kernel-auditmanager-service: 1.2.0.1-B1
Auth Manager: mosipid/kernel-authmanager: 1.2.0.1-B1
Key Manager: modipid/kernel-keymanager-service: 1.2.0.1-B1
Partner Management: mosipid/partner-management-service: 1.2.0.1-B1
KeyCloak: mosipid/keycloak-init: 1.2.0.1-B1
Postgres: mosipid/postgres-init: 1.2.0.1-B1
Config Server: config-server: mosipid/config-server: 1.1.2
Notification Service: mosipid/kernel-notification-service: 1.2.0.1-B1
ClamAV: clamav/clamav: latest
MinIO
The Setup guide is a checklist for the three categories below:
Configuration Checks
Steps to load testdata, schemas and testcases
Steps to generate Android APK
Ensure that in the kernel-default.properties
, the value of mosip-toolkit-client
and mosip-toolkit-android-client
is set in auth.server.admin.allowed.audience
. If this was not set by default, then set it and restart kernel-auth-service
and compliance-toolkit-service
.
Ensure that in compliance-toolkit-default.properties
, CORS is enabled to allow access to mosip-toolkit-android-client
:
If this was not set by default, then set it and restart compliance-toolkit-service
.
Check if the roles given to mosip-pms-client
match with any of the roles for the following config property: mosip.role.keymanager.postverifycertificatetrust=XXX
This config property is available here.
For Example:
mosip.role.keymanager.postverifycertificatetrust=ZONAL_ADMIN
, GLOBAL_ADMIN
, PMS_ADMIN
, PMS_USER
Then mosip-pms-client
should have any of the above roles.
Check that mosip-pms-client
has the role REGISTRATION_PROCESSOR
, PARTNER_ADMIN
, PMS_ADMIN
in Key Cloak. If this was not set by default, then set it and restart keymanager
and compliance-toolkit-service
.
From the CTK v 1.0.0 version onwards, we need to generate an encryption key for CTK.
Create a new app id by directly inserting the below row.
INSERT INTO keymgr.key_policy_def(app_id, key_validity_duration, is_active,pre_expire_days, access_allowed, cr_by, cr_dtimes, upd_by, upd_dtimes, is_deleted, del_dtimes) VALUES ('COMPLIANCE_TOOLKIT', 1095, true, 60, 'NA', 'mosipadmin', '2022-11-28 09:00:40.822625', null, null, false, null);
Using the auth manager swagger URL, get the client token.
Swagger URL:
Endpoint:
Request:
Now using the key manager swagger URL, generate module level certificate.
Swagger URL:
Endpoint:
Request:
Directly download the certificate via key manager swagger URL and getCertificate
endpoint, with App Id as COMPLIANCE_TOOLKIT
and Ref Id as COMP-FIR
.
This certificate is to be used by SBI devices as the encryption key.
For Mock MDS, when running in Auth mode: update the below values in the application.properties
file.
For real MDS/SBI, the vendors can download the new encryption key from the UI and test with the updated SBI which uses this encryption key.It can be downloaded for Auth SBI projects from UI.
1. Browse mosip-compliance-toolkit
2. Project structure will be as shown below.
3. The resources folder has schemas, test data and testcases that need to be added to MinIO and DB.
1. Log in to MinIO from the browser.
2. Create a compliance-toolkit
bucket.
3. Create a new folder named testdata
in the above bucket.Upload MOSIP_DEFAULT_XXX.zip files from resources to it.
4. Create a new folder named schemas
in the above bucket. Upload all SBI and SDK schemas along with subfolders in it.
5. Upload testcase_schema.json
from resources folder to `schemas folder.
6. There is no need to upload compliance_test_definitions_sbi.json
& compliance_test_definitions_sdk.json
7. Please restart the compliance pods after adding new files in minio to refresh the cache.
Alernately swagger endpoint can also be used to upload data in Minio. In this case there is no need to restart CTK services.
1. The swagger url is:
https://{api-internal-env-url}/v1/toolkit/swagger-ui/index.html?configUrl=/v1/toolkit/v3/api-docs/swagger-config
2. Using keycloak/ register option in CTK UI create a new user for compliance toolkit.
3. Make sure to add the email ID. Also, give the role GLOBAL_ADMIN
.
4. Login to compliance toolkit in your environment from browser with above the Keycloak user.
5. Go to ResourceManagementController
in swagger, there you need to upload schema and testdata files.
6. Then you have to choose any one of the types which is mentioned above and also mention the version (SBI/SDK Version).
7. Select the type of required file which you want to upload from resources folder in project.
8. After execution you can see the response.
9. Check inside the MinIo in dev environment whether the files have been uploaded into it.
1. Open swagger and go to saveTestCases
in test-cases-controller
.
2. Open resources folder in project.
3. compliance_test_definitions_sbi.json
file have all the test cases in it.
4. Copy test cases array from this file and prepare a request as shown below.
5. Request body for saveTestCases
request.
6. Then execute it.
7. Same should be done for compliance_test_definitions_sdk.json
.
Once all the steps mentioned above are completed, you can trigger the Android APK build for your env https://github.com/mosip/mosip-compliance-toolkit-ui/actions/workflows/android.yml
You may need GitHub repository write access.
Add values for the URL’s according to your deployment env.
CTK should be deployed with the required dockers.
compliance-toolkit-service: 1.2.0
compliance-toolkit-ui: 1.2.0
To deploy Compliance Toolkit, we require the below mandatory services:
Artifactory: mosipid/artifactory-ref-impl: 1.2.0.1-B2
Audit manager: mosipid/kernel-auditmanager-service: 1.2.0.1-B1
Auth Manager: mosipid/kernel-authmanager: 1.2.0.1-B1
Key Manager: modipid/kernel-keymanager-service: 1.2.0.1-B1
Partner Management: mosipid/partner-management-service: 1.2.0.1-B1
KeyCloak: mosipid/keycloak-init: 1.2.0.1-B1
Postgres: mosipid/postgres-init: 1.2.0.1-B1
Config Server: config-server: mosipid/config-server: 1.1.2
Notification Service: mosipid/kernel-notification-service: 1.2.0.1-B1
ClamAV: clamav/clamav: latest
MinIO
The Setup guide is a checklist for the three categories below:
Configuration Checks
Steps to load testdata, schemas and testcases
Steps to generate Android APK
Ensure that in the kernel-default.properties
, the value of mosip-toolkit-client
and mosip-toolkit-android-client
is set in auth.server.admin.allowed.audience
. If this was not set by default, then set it and restart kernel-auth-service
and compliance-toolkit-service
.
Ensure that in compliance-toolkit-default.properties
, CORS is enabled to allow access to mosip-toolkit-android-client
:
If this was not set by default, then set it and restart compliance-toolkit-service
.
Check if the roles given to mosip-pms-client
match with any of the roles for the following config property: mosip.role.keymanager.postverifycertificatetrust=XXX
For Example:
mosip.role.keymanager.postverifycertificatetrust=ZONAL_ADMIN
, GLOBAL_ADMIN
, PMS_ADMIN
, PMS_USER
Then mosip-pms-client
should have any of the above roles.
Check that mosip-pms-client
has the role REGISTRATION_PROCESSOR
, PARTNER_ADMIN
, PMS_ADMIN
in Key Cloak. If this was not set by default, then set it and restart keymanager
and compliance-toolkit-service
.
From the CTK v 1.0.0 version onwards, we need to generate an encryption key for CTK.
Create a new app id by directly inserting the below row.
INSERT INTO keymgr.key_policy_def(app_id, key_validity_duration, is_active,pre_expire_days, access_allowed, cr_by, cr_dtimes, upd_by, upd_dtimes, is_deleted, del_dtimes) VALUES ('COMPLIANCE_TOOLKIT', 1095, true, 60, 'NA', 'mosipadmin', '2022-11-28 09:00:40.822625', null, null, false, null);
Using the auth manager swagger URL, get the client token.
Swagger URL:
Endpoint:
Request:
Now using the key manager swagger URL, generate module level certificate.
Swagger URL:
Endpoint:
Request:
Directly download the certificate via key manager swagger URL and getCertificate
endpoint, with App Id as COMPLIANCE_TOOLKIT
and Ref Id as COMP-FIR
.
This certificate is to be used by SBI devices as the encryption key.
For Mock MDS, when running in Auth mode: update the below values in the application.properties
file.
For real MDS/SBI, the vendors can download the new encryption key from the UI and test with the updated SBI which uses this encryption key.It can be downloaded for Auth SBI projects from UI.
2. Project structure will be as shown below.
3. The resources folder has schemas, test data and testcases that need to be added to MinIO and DB.
1. Log in to MinIO from the browser.
2. Create a compliance-toolkit
bucket.
3. Create a new folder named testdata
in the above bucket.Upload MOSIP_DEFAULT_XXX.zip files from resources to it.
4. Create a new folder named schemas
in the above bucket. Upload all SBI, SDK and ABIS schemas along with subfolders in it.
5. Upload testcase_schema.json
from resources folder to `schemas folder.
6. There is no need to upload compliance_test_definitions_sbi.json
,compliance_test_definitions_sdk.json
and compliance_test_definitions_abis.json
7. Please restart the compliance pods after adding new files in minio to refresh the cache.
Alernately swagger endpoint can also be used to upload data in Minio. In this case there is no need to restart CTK services.
1. The swagger url is:
https://{api-internal-env-url}/v1/toolkit/swagger-ui/index.html?configUrl=/v1/toolkit/v3/api-docs/swagger-config
2. Using keycloak/ register option in CTK UI, create a new user for compliance toolkit.
3. Make sure to add the email ID. Also, give the role GLOBAL_ADMIN
.
4. Login to compliance toolkit in your environment from browser with the above Keycloak user.
5. Go to ResourceManagementController
in swagger and upload the schema alongwith testdata files.
6. Then, select any one of type mentioned above and also mention the version (SBI/SDK/ABIS Version).
7. Select the type of required file which you want to upload from resources
folder in project.
8. After execution you can see the response.
9. Check inside the MinIo in dev environment whether the files have been uploaded into it.
2. Open resources
folder in project.
3. compliance_test_definitions_sbi.json
file have all the test cases in it.
4. Copy test cases array from this file and prepare a request as shown below.
5. Request body for saveTestCases
request.
6. Then, execute it.
7. The same should be done for compliance_test_definitions_sdk.json
and compliance_test_definitions_abis.json
.
Once all the steps mentioned above are completed, you can trigger the Android APK build for your environment. https://github.com/mosip/mosip-compliance-toolkit-ui/actions/workflows/android.yml
You may need GitHub repository write access.
Add values for the URL’s according to your deployment env.
This config property is available .
1. Browse
1. Open and go to saveTestCases
in test-cases-controller
.
CTK should be deployed with the required dockers.
compliance-toolkit-service: 0.0.9-B1
compliance-toolkit-ui: 0.0.9-B1
Dependent Service (dockers)
Artifactory: mosipid/artifactory-ref-impl: 1.2.0.1-B2
Audit manager: mosipid/kernel-auditmanager-service: 1.2.0.1-B1
Auth Manager: mosipid/kernel-authmanager: 1.2.0.1-B1
Key Manager: modipid/kernel-keymanager-service: 1.2.0.1-B1
Partner Management: mosipid/partner-management-service: 1.2.0.1-B1
KeyCloak: mosipid/keycloak-init: 1.2.0.1-B1
Postgres: mosipid/postgres-init: 1.2.0.1-B1
Config Server: config-server: mosipid/config-server: 1.1.2
Notification Service: mosipid/kernel-notification-service: 1.2.0.1-B1
ClamAV: clamav/clamav: latest
MinIO
Note:
Ensure that in the kernel-default.properties
, the value of mosip-toolkit-client
is set in auth.server.admin.allowed.audience
. If this was not set by default, then set it and restart kernel-auth-service
and compliance-toolkit-service
.
Check if the roles given to mosip-pms-client
should match with any of the roles for following config property.
This config property is available in: https://github.com/mosip/mosip-config/blob/${ENV_NAME}/kernel-default.properties
For Example:
mosip.role.keymanager.postverifycertificatetrust=ZONAL_ADMIN
, GLOBAL_ADMIN
, PMS_ADMIN
, PMS_USER
Then mosip-pms-client
should have any of the above roles.
1. Browse to mosip-compliance-toolkit.
2. The resources folder would contain schemas, test data and test cases that need to be added to MinIO and DB.
1. Log in to MinIO from the browser.
2. Create a compliance-toolkit
bucket.
3. Create a new folder named testdata
in the above bucket and upload all test data zip files from the resources folder to this folder.
4. Create a new folder named schemas
in the above bucket and upload all sbi and sdk schemas, testcase schema from the resources folder to this folder.
Note: There is no need to upload compliance_test_definitions_sbi.json
and compliance_test_definitions_sdk.json
.
5. Restart the pods after adding new files in MinIO.
1. Using Keycloak, create a new user for the compliance toolkit.
2. Make sure to add the email ID. Also, give the user GLOBAL_ADMIN
.
3. Log in to the compliance toolkit in your environment with above the Keycloak user.
4. Open the developer tools and copy the Authorization
token from the headers section under the Networks
tab.
5. Add the Authorization
token in postman, copy the token and place it in the headers section of the request (Cookie=Authentication:eyAjksa...) and send the request.
1. Open postman and create a POST request.
2. URL endpoint https://{base_URL}/v1/toolkit/saveTestCases
3. Copy the Authorization token in the request header as mentioned in the Using Postman
section.
4. Open the resources folder in the project.
5. compliance_test_definitions_sbi.json
file has all the test cases in it.
6. Copy the test cases array from this file and prepare a request as shown below.
7. Request body for saveTestCases
request
8. Change the requesttime
to the current day and send the request.
9. The same should be done for compliance_test_definitions_sdk.json
.
CTK should be deployed with the required dockers.
compliance-toolkit-service: 1.0.0
compliance-toolkit-ui: 1.0.0
Dependent Service (dockers)
Artifactory: mosipid/artifactory-ref-impl: 1.2.0.1-B2
Audit manager: mosipid/kernel-auditmanager-service: 1.2.0.1-B1
Auth Manager: mosipid/kernel-authmanager: 1.2.0.1-B1
Key Manager: modipid/kernel-keymanager-service: 1.2.0.1-B1
Partner Management: mosipid/partner-management-service: 1.2.0.1-B1
KeyCloak: mosipid/keycloak-init: 1.2.0.1-B1
Postgres: mosipid/postgres-init: 1.2.0.1-B1
Config Server: config-server: mosipid/config-server: 1.1.2
Notification Service: mosipid/kernel-notification-service: 1.2.0.1-B1
ClamAV: clamav/clamav: latest
MinIO
Note:
Ensure that in the kernel-default.properties
, the value of mosip-toolkit-client
is set in auth.server.admin.allowed.audience
.If this was not set by default, then set it and restart kernel-auth-service
and compliance-toolkit-service
.
Check if the roles given to mosip-pms-client
should match with any of the roles for following config property.
This config property is available in: https://github.com/mosip/mosip-config/blob/${ENV_NAME}/kernel-default.properties
For Example:
mosip.role.keymanager.postverifycertificatetrust=ZONAL_ADMIN
, GLOBAL_ADMIN
, PMS_ADMIN
, PMS_USER
Then mosip-pms-client
should have any of the above roles.
Check that mosip-pms-client
has the role REGISTRATION_PROCESSOR
, PARTNER_ADMIN
, PMS_ADMIN
in Key Cloak.If this was not set by default, then set it and restart key manager
and compliance-toolkit-service
.
From the 1.0.0 version onwards, we need to generate an encryption key for CTK.
Create a new app id by directly inserting the below row.
Get the client token using auth manager swagger by calling endpoint.
https://api-internal.dev.mosip.net/v1/authmanager/authenticate/clientidsecretkey
Use generateMasterKey
endpoint to generate module-level certificate.
Directly download the certificate via key manager swagger getCertificate
with App Id as COMPLIANCE_TOOLKIT
and Ref Id as COMP-FIR
.
This certificate is to be used by SBI devices as the encryption key.
For Mock MDS, when running in Auth mode, update the below values in the application.properties file.
For REAL MDS/SBI.
You must communicate to the vendors to download the new encryption key from UI and give us an updated SBI which uses this encryption key.
It can be downloaded for Auth SBI projects from UI.
1. Browse to mosip-compliance-toolkit.
2. The resources folder would contain schemas, test data and test cases that need to be added to MinIO and DB.
1. Log in to MinIO from the browser.
2. Create a compliance-toolkit
bucket.
3. Create a new folder named testdata
in the above bucket and upload all test data zip files from the resources folder to this folder.
4. Create a new folder named schemas
in the above bucket and upload all sbi and sdk schemas, test case schema from the resources folder to this folder.
Note: There is no need to upload compliance_test_definitions_sbi.json
and compliance_test_definitions_sdk.json
.
5. Restart the pods after adding new files in MinIO.
1. Using Keycloak, create a new user for the compliance toolkit.
2. Make sure to add the email ID. Also, give the user GLOBAL_ADMIN
.
3. Log in to the compliance toolkit in your environment with above the Keycloak user.
4. Open the swagger.
5. Go to uploadResourceFile
the endpoint in ResourceManagementController
.
6. Select any one of the types which are mentioned in swagger and version (SBI or SDK).
7. Upload the schema and test data files from the resources folder in the project.
8. You can see the uploaded schema and test data files in the MinIO dev environment.
1. Open swagger and go to saveTestCases
in test-cases-controller
.
2. Open the resources folder in the project.
3. compliance_test_definitions_sbi.json
file has all the test cases in it.
4. Copy the test cases array from this file and prepare a request as shown below.
5. Request body for saveTestCases
request.
9. The same should be done for compliance_test_definitions_sdk.json
.
CTK should be deployed with the required dockers.
compliance-toolkit-service: 1.3.0
compliance-toolkit-ui: 1.3.0
To deploy Compliance Toolkit, we require the below mandatory services:
Artifactory: mosipid/artifactory-ref-impl: 1.2.0.1-B2
Audit manager: mosipid/kernel-auditmanager-service: 1.2.0.1-B1
Auth Manager: mosipid/kernel-authmanager: 1.2.0.1-B1
Key Manager: modipid/kernel-keymanager-service: 1.2.0.1-B1
Partner Management: mosipid/partner-management-service: 1.2.0.1-B1
KeyCloak: mosipid/keycloak-init: 1.2.0.1-B1
Postgres: mosipid/postgres-init: 1.2.0.1-B1
Config Server: config-server: mosipid/config-server: 1.1.2
Notification Service: mosipid/kernel-notification-service: 1.2.0.1-B1
ClamAV: clamav/clamav: latest
MinIO
The Setup guide is a checklist for the three categories below:
Configuration checks
Steps to load testdata, schemas and testcases
Steps to generate Android APK
Ensure that in the kernel-default.properties
, the value of mosip-toolkit-client
and mosip-toolkit-android-client
is set in auth.server.admin.allowed.audience
. If this was not set by default, then set it and restart kernel-auth-service
and compliance-toolkit-service
.
Ensure that in compliance-toolkit-default.properties
, CORS is enabled to allow access to mosip-toolkit-android-client
:
If this was not set by default, then set it and restart compliance-toolkit-service
.
Check if the roles given to mosip-pms-client
match with any of the roles for the following config property: mosip.role.keymanager.postverifycertificatetrust=XXX
This config property is available here.
For Example:
mosip.role.keymanager.postverifycertificatetrust=ZONAL_ADMIN
, GLOBAL_ADMIN
, PMS_ADMIN
, PMS_USER
Then mosip-pms-client
should have any of the above roles.
Check that mosip-pms-client
has the role REGISTRATION_PROCESSOR
, PARTNER_ADMIN
, PMS_ADMIN
in Key Cloak. If this was not set by default, then set it and restart keymanager
and compliance-toolkit-service
.
It is also needed to generate an encryption key for CTK.
Create a new app id by directly inserting the below row.
INSERT INTO keymgr.key_policy_def(app_id, key_validity_duration, is_active,pre_expire_days, access_allowed, cr_by, cr_dtimes, upd_by, upd_dtimes, is_deleted, del_dtimes) VALUES ('COMPLIANCE_TOOLKIT', 1095, true, 60, 'NA', 'mosipadmin', '2022-11-28 09:00:40.822625', null, null, false, null);
Using the auth manager swagger URL, obtain the client token.
Swagger URL:
Endpoint:
Request:
Now using the key manager swagger URL, generate module level certificate.
Swagger URL:
Endpoint:
Request:
Directly download the certificate via key manager swagger URL and getCertificate
endpoint, with App Id as COMPLIANCE_TOOLKIT
and Ref Id as COMP-FIR
.
This certificate is to be used by SBI devices as the encryption key.
For Mock MDS, when running in Auth mode: update the below values in the application.properties
file.
For real MDS/SBI, the vendors can download the new encryption key from the UI and test with the updated SBI which uses this encryption key.It can be downloaded for Auth SBI projects from UI.
Ensure that reporting
module is deployed from the develop
branch. This is required for the Kibana Dashboard.
1. Browse mosip-compliance-toolkit
2. Project structure will be as shown below.
3. The resources folder has schemas, test data and testcases that need to be added to MinIO and DB.
1. Log in to MinIO from the browser.
2. Create a compliance-toolkit
bucket.
3. Create a new folder named testdata
in the above bucket.Upload MOSIP_DEFAULT_XXX.zip files from resources to it.
4. Create a new folder named schemas
in the above bucket. Upload all SBI, SDK and ABIS schemas along with subfolders in it.
5. Upload testcase_schema.json
from resources folder to schemas
folder.
6. There is no need to upload compliance_test_definitions_sbi.json
,compliance_test_definitions_sdk.json
and compliance_test_definitions_abis.json
7. Please restart the compliance pods after adding new files in minio to refresh the cache.
Alternately, swagger endpoint can also be used to upload data in Minio. In this case there is no need to restart CTK services.
1. The swagger url is:
https://{api-internal-env-url}/v1/toolkit/swagger-ui/index.html?configUrl=/v1/toolkit/v3/api-docs/swagger-config
2. Using keycloak/ register option in CTK UI, create a new user for compliance toolkit.
3. Make sure to add the email ID. Also, give the role CTK_ADMIN
.
4. Login to compliance toolkit in your environment from browser with the above Keycloak user.
5. Go to ResourceManagementController
in swagger and upload the schema alongwith testdata files.
6. Then, select any one of type mentioned above and also mention the version (SBI/SDK/ABIS Version).
7. Select the type of required file which you want to upload from resources
folder in project.
8. After execution you can see the response.
9. Check inside the Minio, in dev environment, whether the files have been uploaded into it.
1. Open swagger and go to saveTestCases
in test-cases-controller
.
2. Open resources
folder in project.
3. compliance_test_definitions_sbi.json
file have all the test cases in it.
4. Copy test cases array from this file and prepare a request as shown below.
5. Request body for saveTestCases
request.
6. Then, execute it.
7. The same should be done for compliance_test_definitions_sdk.json
and compliance_test_definitions_abis.json
.
Once all the steps mentioned above are completed, you can trigger the Android APK build for your environment. https://github.com/mosip/mosip-compliance-toolkit-ui/actions/workflows/android.yml
You may need GitHub repository write access.
Add values for the URL’s according to your deployment env.
CTK should be deployed along with the required dockers as mentioned below.
compliance-toolkit-service: 1.4.0
compliance-toolkit-ui: 1.4.0
compliance-toolkit-batch-job: 1.4.0
To successfully deploy Compliance Toolkit, below mentioned services are mandatorily required.
Artifactory: mosipid/artifactory-ref-impl: 1.2.0.1-B2
Audit manager: mosipid/kernel-auditmanager-service: 1.2.0.1-B1
Auth Manager: mosipid/kernel-authmanager: 1.2.0.1-B1
Key Manager: modipid/kernel-keymanager-service: 1.2.0.1-B1
Partner Management: mosipid/partner-management-service: 1.2.0.1-B1
KeyCloak: mosipid/keycloak-init: 1.2.0.1-B1
Postgres: mosipid/postgres-init: 1.2.0.1-B1
Config Server: config-server: mosipid/config-server: 1.1.2
Notification Service: mosipid/kernel-notification-service: 1.2.0.1-B1
ClamAV: clamav/clamav: latest
MinIO
The Setup guide serves as a checklist for the following three categories.
Configuration checks
Steps to load testdata, schemas, testcases and terms and conditions templates
Steps to generate Android APK
Make sure that the kernel-default.properties
file includes the mosip-toolkit-client
and mosip-toolkit-android-client
values in the auth.server.admin.allowed.audience
setting. If these values are not set by default, configure them and then restart the kernel-auth-service
and compliance-toolkit-service
.
Ensure that in compliance-toolkit-default.properties
, CORS is enabled to allow access to mosip-toolkit-android-client
:
If this was not set by default, then set it and restart compliance-toolkit-service
.
Check if the roles given to mosip-pms-client
match with any of the roles for the following config property: mosip.role.keymanager.postverifycertificatetrust=XXX
This config property is available here.
For Example:
mosip.role.keymanager.postverifycertificatetrust=ZONAL_ADMIN
, GLOBAL_ADMIN
, PMS_ADMIN
, PMS_USER
Ensure that the mosip-pms-client
possesses any of the roles mentioned above.
Check that mosip-pms-client
has the role REGISTRATION_PROCESSOR
, PARTNER_ADMIN
, PMS_ADMIN
in Key Cloak. If this was not set by default, then set it and restart keymanager
and compliance-toolkit-service
.
It is also needed to generate an encryption key for CTK.
Insert the following row to create a new app ID.
INSERT INTO keymgr.key_policy_def(app_id, key_validity_duration, is_active,pre_expire_days, access_allowed, cr_by, cr_dtimes, upd_by, upd_dtimes, is_deleted, del_dtimes) VALUES ('COMPLIANCE_TOOLKIT', 1095, true, 60, 'NA', 'mosipadmin', '2022-11-28 09:00:40.822625', null, null, false, null);
Using the auth manager swagger URL, obtain the client token.
Swagger URL:
Endpoint:
Request:
Now using the key manager swagger URL, generate module level certificate.
Swagger URL:
Endpoint:
Request:
Directly download the certificate through key manager swagger URL and getCertificate
endpoint, with App Id as COMPLIANCE_TOOLKIT
and Ref Id as COMP-FIR
.
This certificate serves as the encryption key specifically for SBI devices.
For Mock MDS, when running in Auth mode: update the below values in the application.properties
file.
For real MDS/SBI, the vendors can download the new encryption key from the UI and test with the updated SBI which uses this encryption key. It can be downloaded for Auth SBI projects from UI.
Ensure that reporting
module is deployed from the develop
branch. This is required for the Kibana Dashboard.
Ensure that the kernel-auth-adapter-1.2.0.1
has been successfully deployed in the compliance-toolkit-service
, and verify that the identical authentication adapter was utilized to configure the mock ABIS.
Check datashare configurations for ABIS3030 and ABIS3031 testcases.
Ensure that in data-share-default.properties
and compliance-toolkit-default.properties
, the value of mosip-abis-client
is set in auth.server.admin.allowed.audience
. If this was not set by default, then set it and restart data-share-service
and compliance-toolkit-service
.
For handle CTK datashare token flow, add the below values in data-share-default.properties
.
1. Browse mosip-compliance-toolkit
2. Project structure will be displayed as mentioned below.
3. The resources folder has schemas and test data that need to be added to MinIO.
1. Log in to MinIO from the browser.
2. Create a compliance-toolkit
bucket.
3. Create a new folder named testdata
in the above bucket.Upload MOSIP_DEFAULT_XXX.zip files from resources to it.
4. Create a new folder named schemas
in the above bucket. Upload all SBI, SDK and ABIS schemas along with subfolders in it.
5. Upload testcase_schema.json
from resources folder to schemas
folder.
6. Please restart the compliance pods after adding new files in minio to refresh the cache.
Alternately, swagger endpoint can also be used to upload data in Minio. In this case there is no need to restart CTK services.
1. The swagger url is:
https://{api-internal-env-url}/v1/toolkit/swagger-ui/index.html?configUrl=/v1/toolkit/v3/api-docs/swagger-config
2. Using keycloak/ register option in CTK UI, create a new user for compliance toolkit.
3. Make sure to add the email ID. Also, give the role CTK_ADMIN
.
4. Login to compliance toolkit in your environment from browser with the above Keycloak user.
5. Go to ResourceManagementController
in swagger and upload the schema alongwith testdata files.
6. Then, select any one of type mentioned above and also mention the version (SBI/SDK/ABIS Version).
7. Select the type of required file which you want to upload from resources
folder in project.
8. After execution you can see the response.
9. Check inside the Minio, in dev environment, whether the files have been uploaded into it.
1. Open swagger and go to saveTestCases
endpoint in test-cases-controller
.
2. Currently, CTK has a separate repository called compliance-toolkit-testcases
, which includes the testcases for the SBI, SDK and ABIS.
3. Open compliance-toolkit-testcases repo.
4. compliance_test_definitions_sbi.json
file have all the test cases in it.
5. Copy test cases array from this file and prepare a request as shown below.
6. Request body for saveTestCases
request.
7. Then, execute it.
8. The same should be done for compliance_test_definitions_sdk.json
and compliance_test_definitions_abis.json
.
Open swagger and go to uploadTemplate
endpoint in resource-management-controller
.
Provide the required parameters:
Specify the language for the template using ISO 639 standard language codes.
Enter the version of the template. (the template version should be in format as v1,v2,v3 and so on)
Enter the template name as terms_and_conditions_template.
The template file extension should be.vm
(Velocity Template Language).
Then , execute it
Once all the steps mentioned above are completed, you can trigger the Android APK build for your environment. https://github.com/mosip/mosip-compliance-toolkit-ui/actions/workflows/android.yml
You may need GitHub repository write access.
Add values for the URL’s according to your deployment env.