Skip to content

Commit

Permalink
MOSIP-34894
Browse files Browse the repository at this point in the history
Signed-off-by: Sohan Kumar Dey <72375959+Sohandey@users.noreply.github.com>
  • Loading branch information
Sohandey committed Aug 1, 2024
1 parent e3c37de commit 3d10352
Showing 1 changed file with 161 additions and 165 deletions.
326 changes: 161 additions & 165 deletions apitest-commons/src/main/resources/config/Kernel.properties
Original file line number Diff line number Diff line change
@@ -1,20 +1,19 @@
#Kernel resource uris
#Make sure all resource apis are covered
authclientidsecretkeyURL=/v1/authmanager/authenticate/clientidsecretkey
authentication=/v1/authmanager/authenticate/useridPwd
authenticationInternal=/v1/authmanager/authenticate/internal/useridPwd
keycloakAuthURL=/auth/realms/master/protocol/openid-connect/token
#---------------------------------- End point(s) relative URLs ----------------------------------#
authclientidsecretkeyURL = /v1/authmanager/authenticate/clientidsecretkey
authentication = /v1/authmanager/authenticate/useridPwd
authenticationInternal = /v1/authmanager/authenticate/internal/useridPwd
keycloakAuthURL = /auth/realms/master/protocol/openid-connect/token
auditLog_URI = /v1/auditmanager/audits
CentetMachineUserMappingToMasterData_uri= /v1/masterdata/registrationmachineusermappings
EmailNotification_URI= /v1/notifier/email/send
encrypt_URI=/v1/keymanager/encrypt
decrypt_URI=/v1/keymanager/decrypt
FetchApplication_URI=/v1/masterdata/applicationtypes
FetchApplication_lang_URI=/v1/masterdata/applicationtypes/{langcode}
FetchApplication_id_lang_URI=/v1/masterdata/applicationtypes/{code}/{langcode}
FetchBiometricAttribute_URI=/v1/masterdata/getbiometricattributesbyauthtype/{langcode}/{biometrictypecode}
FetchBiometricAuthType_URI=/v1/masterdata/biometrictypes/{langcode}
FetchBlackListedWord_URI=/v1/masterdata/blacklistedwords/{langcode}
CentetMachineUserMappingToMasterData_uri = /v1/masterdata/registrationmachineusermappings
EmailNotification_URI = /v1/notifier/email/send
encrypt_URI = /v1/keymanager/encrypt
decrypt_URI = /v1/keymanager/decrypt
FetchApplication_URI = /v1/masterdata/applicationtypes
FetchApplication_lang_URI = /v1/masterdata/applicationtypes/{langcode}
FetchApplication_id_lang_URI = /v1/masterdata/applicationtypes/{code}/{langcode}
FetchBiometricAttribute_URI = /v1/masterdata/getbiometricattributesbyauthtype/{langcode}/{biometrictypecode}
FetchBiometricAuthType_URI = /v1/masterdata/biometrictypes/{langcode}
FetchBlackListedWord_URI = /v1/masterdata/blacklistedwords/{langcode}
FetchDevice_lang_URI = /v1/masterdata/devices/{languagecode}
FetchDevice_id_lang_URI = /v1/masterdata/devices/{languagecode}/{deviceType}
FetchDeviceSpec_lang_URI = /v1/masterdata/devicespecifications/{langcode}
Expand All @@ -31,9 +30,9 @@ FetchIDlist_URI = /v1/masterdata/idtypes/{langcode}
FetchLocationHierarchy_URI_withlangCode = /v1/masterdata/locations/{langcode}
FetchLocationHierarchy_URI_locationcode = /v1/masterdata/locations/{locationcode}/{langcode}
FetchLocationHierarchy_URI_hierarchyname = /v1/masterdata/locations/locationhierarchy/{hierarchyname}
FetchMachine_URI=/v1/masterdata/machines
FetchMachine_lang_URI=/v1/masterdata/machines/{langcode}
FetchMachine_id_lang_URI=/v1/masterdata/machines/{id}/{langcode}
FetchMachine_URI = /v1/masterdata/machines
FetchMachine_lang_URI = /v1/masterdata/machines/{langcode}
FetchMachine_id_lang_URI = /v1/masterdata/machines/{id}/{langcode}
FetchMachineHistory_URI = /v1/masterdata/machineshistories/{id}/{langcode}/{effdatetimes}
FetchRegCent_URI = /v1/masterdata/registrationcenters
FetchRegCent_id_lang_URI = /v1/masterdata/registrationcenters/{id}/{langcode}
Expand Down Expand Up @@ -83,92 +82,95 @@ uploadpublickey = /v1/syncdata/tpm/publickey
getUserHistory = /v1/masterdata/users/{id}/{eff_dtimes}
sendOtp = /v1/authmanager/authenticate/sendotp
useridOTP = /v1/authmanager/authenticate/useridOTP
#preregSendOtp = /preregistration/v1/login/sendOtp
preregSendOtp = /preregistration/v1/login/sendOtp/langcode
preregValidateOtp = /preregistration/v1/login/validateOtp
zoneMappingUrl=/v1/masterdata/zoneuser
zoneNameUrl=/v1/masterdata/zones/zonename
zoneMappingActivateUrl=/v1/masterdata/zoneuser
userCenterMappingUrl=/v1/masterdata/usercentermapping
bulkUploadUrl=/v1/admin/bulkupload
mountPath=/home/mosip/mountvolume
packetUtilityBaseUrl=http://localhost:8080
mountPathForScenario=D:/centralized/mountvolume
# OTP Details
OTPTimeOut = 181
attempt = 10
ConfigParameters=mosip.kernel.rid.length,mosip.kernel.uin.length,mosip.kernel.sms.country.code,mosip.kernel.sms.number.length,mosip.kernel.otp.default-length,mosip.kernel.otp.expiry-time,mosip.kernel.otp.key-freeze-time,mosip.kernel.otp.validation-attempt-threshold,mosip.kernel.otp.min-key-length,mosip.kernel.otp.max-key-length,mosip.kernel.licensekey.length,mosip.supported-languages
#Below users are used for authentication
#PARTNER
#Dont change the partner id
pmsAuthInternal=true
mosip_pms_app_id=partner
partner_password=mosip123
partner_userName=111997
partner_revamp_userName=111999
partner_user_password=mosip123
mosip_pms_client_id=mosip-pms-client
mosip_partner_client_id=mosip-partner-client
mosip_partner_client_secret=
mosip_pms_client_secret=
policytest_password=mosip123
policytest_userName=111998
policytest_without_pmrole_userName=111887
#RESIDENT & IDA
mosip_resident_app_id=resident
mosip_resident_client_id=mosip-resident-client
mosip_resident_client_secret=
#IDREPO
mosip_idrepo_app_id=idrepo
mosip_idrepo_client_id=mosip-idrepo-client
mosip_idrepo_client_secret=
#admin
mosip_admin_app_id=admin
admin_password=mosip123
admin_userName=220005
mosip_admin_client_id=mosip-admin-client
mosip_admin_client_secret=
#admin
admin_zone_password=mosip123
admin_zone_userName=globaladmin
mosip_regclient_app_id=registrationclient
mosip_reg_client_id=mosip-reg-client
mosip_reg_client_secret=
#admin
mosip_regprocclient_app_id=regproc
mosip_regproc_client_id=mosip-regproc-client
mosip_regproc_client_secret=
#mparter_mobile
mpartner_default_mobile_client_id=mpartner-default-mobile
mpartner_default_mobile_secret=
zoneMappingUrl = /v1/masterdata/zoneuser
zoneNameUrl = /v1/masterdata/zones/zonename
zoneMappingActivateUrl = /v1/masterdata/zoneuser
userCenterMappingUrl = /v1/masterdata/usercentermapping
bulkUploadUrl = /v1/admin/bulkupload
currentUserURI=/#/uinservices/viewhistory
actuatorEndpoint=/resident/v1/actuator/env
actuatorAdminEndpoint=/v1/admin/actuator/env
actuatorMasterDataEndpoint=/v1/masterdata/actuator/env
actuatorIDAEndpoint=/idauthentication/v1/actuator/env
actuatorRegprocEndpoint=/registrationprocessor/v1/registrationtransaction/actuator/env
actuatorEsignetEndpoint=/v1/esignet/actuator/env
tokenEndpoint=/v1/esignet/oauth/token
auditActuatorEndpoint=/v1/auditmanager/actuator/info
validateBindingEndpoint=ida-binding
esignetWellKnownEndPoint=/v1/esignet/oidc/.well-known/openid-configuration
signupSettingsEndPoint=/v1/signup/settings




#This credentials are used to execute auth demo service
AuthClientID=mosip-resident-client
AuthClientSecret=
AuthAppID=resident
mosip_hotlist_app_id=hotlist
mosip_hotlist_client_id=mosip-hotlist-client
mosip_hotlist_client_secret=
###Keycloak_User-Creation_Properties
#Dontchange the partner user_111997
#---------------------------------- APP IDs ----------------------------------#
#-- When test rig ran in docker, these values dervied from the environment ---#
mosip_pms_app_id = partner
mosip_resident_app_id = resident
mosip_idrepo_app_id = idrepo
mosip_regclient_app_id = registrationclient
mosip_hotlist_app_id = hotlist
mosip_regprocclient_app_id = regproc
AuthAppID = resident
mosip_admin_app_id = admin

new_Resident_User=111995
new_Resident_Password=mosip123
new_Resident_Role=default-roles-mosip,PARTNER_ADMIN
roles.111995=PARTNER_ADMIN,default-roles-mosip


keycloak_UserName = admin
keycloak_Password =
#---------------------------------- Client IDs -------------------------------#
#-- When test rig ran in docker, these values dervied from the environment ---#
mosip_pms_client_id = mosip-pms-client
mosip_partner_client_id = mosip-partner-client
mosip_resident_client_id = mosip-resident-client
mosip_idrepo_client_id = mosip-idrepo-client
mosip_reg_client_id = mosip-reg-client
mosip_admin_client_id = mosip-admin-client
mosip_hotlist_client_id = mosip-hotlist-client
mosip_regproc_client_id = mosip-regproc-client
mpartner_default_mobile_client_id = mpartner-default-mobile
mosip_testrig_client_id = mosip-testrig-client
AuthClientID = mosip-resident-client



#---------------------------------- Client Secret Keys -----------------------#
#-- When test rig ran in docker, these values dervied from the environment ---#
mosip_partner_client_secret =
mosip_pms_client_secret =
mosip_resident_client_secret =
mosip_idrepo_client_secret =
mosip_reg_client_secret =
mosip_admin_client_secret =
mosip_hotlist_client_secret =
mosip_regproc_client_secret =
mpartner_default_mobile_secret =
mosip_testrig_client_secret =
AuthClientSecret =


keycloak-external-url=https://iam.qa-inji.mosip.net
mosip_testrig_client_id=mosip-testrig-client
mosip_testrig_client_secret=

keycloak-realm-id=mosip
#----------------------------- minio proprties ------------------------------#
s3-user-key = minioadmin
s3-user-secret = minioadmin
s3-host = http://minio.minio:9000
s3-account = automation
s3-region = null
reportExpirationInDays = 3
s3-account-for-persona-data = personaData
push-reports-to-s3 = no


#-------------------- Keycloak User Creation proprties ----------------------#
#-- When test rig ran in docker,few of below dervied from the environment ---#
new_Resident_User = 111995
new_Resident_Password = mosip123
new_Resident_Role = default-roles-mosip,PARTNER_ADMIN
roles.111995 = PARTNER_ADMIN,default-roles-mosip
keycloak_UserName = admin
keycloak_Password =
keycloak-external-url = https://iam.qa1-java21.mosip.net
keycloak-realm-id = mosip
iam-users-to-create=111997,111998,220005,111992,globaladmin,111999,111887
iam-users-password=mosip123,mosip123,mosip123,mosip123,mosip123,mosip123,mosip123
roles.220005=GLOBAL_ADMIN,ID_AUTHENTICATION,REGISTRATION_ADMIN,REGISTRATION_SUPERVISOR,ZONAL_ADMIN
Expand All @@ -177,45 +179,30 @@ roles.111999=AUTH_PARTNER,PARTNER_ADMIN,PMS_ADMIN,POLICYMANAGER,REGISTRATION_SUP
roles.111887=AUTH_PARTNER,PARTNER_ADMIN,PMS_ADMIN,REGISTRATION_SUPERVISOR
roles.111998=POLICYMANAGER
roles.111992=GLOBAL_ADMIN
roles.globaladmin=GLOBAL_ADMIN,REGISTRATION_ADMIN,uma_authorization,ZONAL_ADMIN,default-roles-mosip
##DB_Connectivity
roles.globaladmin = GLOBAL_ADMIN,REGISTRATION_ADMIN,uma_authorization,ZONAL_ADMIN,default-roles-mosip


#------------------------- DB Connectivity proprties ------------------------#
#-- When test rig ran in docker,few of below dervied from the environment ---#
driver_class=org.postgresql.Driver
pool_size=1
dialect=org.hibernate.dialect.PostgreSQLDialect
show_sql=true
current_session_context_class=thread
#audit details
audit_url=jdbc:postgresql://qa-inji.mosip.net:5432/mosip_audit
audit_url=jdbc:postgresql://qa1-java21.mosip.net:5432/mosip_audit
audit_username=postgres
audit_password=
audit_default_schema=audit
#ida-partner details
DB_PORT=
installation-domain=
partner_url=jdbc:postgresql://qa-inji.mosip.net:5432/mosip_ida
partner_url=jdbc:postgresql://qa1-java21.mosip.net:5432/mosip_ida
partner_username=postgres
partner_password=
partner_default_schema=partner
reportLogPath=automationLogAndReport
#--------minio proprties----------------
s3-user-key=minioadmin
s3-user-secret=minioadmin
s3-host=http://minio.minio:9000
s3-account=automation
s3-region=null
reportExpirationInDays=3
s3-account-for-persona-data=personaData
# supported values yes or no
push-reports-to-s3=yes
enableDebug=yes
# supported values are 1 to 8
threadCount=1
# supported values are 0 ,1, 2 based on number of env languages
langselect=0
#----------------------------------Database properties----------------------------------------------------------#
postgresqlUser=postgresql
db-port=5432
db-server=qa-inji.mosip.net
db-server=qa1-java21.mosip.net
hibernate.connection.driver_class=org.postgresql.Driver
hibernate.connection.pool_size=1
hibernate.dialect=org.hibernate.dialect.PostgreSQLDialect
Expand All @@ -229,61 +216,70 @@ master_db_schema=master
audit_db_schema=audit
ida_db_schema=ida

#----------------------------------AuthDemoService Host properties----------------------------------------------------------#
#To run locally
#authDemoServiceBaseURL=http://localhost
#authDemoServicePort=8082

#To run in Docker
#authDemoServiceBaseURL=http://authdemo.apitestrig
#authDemoServicePort=80


#----------------------------------e-Signet properties----------------------------------------------------------#

currentUserURI=/#/uinservices/viewhistory
actuatorEndpoint=/resident/v1/actuator/env
actuatorAdminEndpoint=/v1/admin/actuator/env
actuatorMasterDataEndpoint=/v1/masterdata/actuator/env
actuatorIDAEndpoint=/idauthentication/v1/actuator/env
actuatorRegprocEndpoint=/registrationprocessor/v1/registrationtransaction/actuator/env
actuatorEsignetEndpoint=/v1/esignet/actuator/env
tokenEndpoint=/v1/esignet/oauth/token
auditActuatorEndpoint=/v1/auditmanager/actuator/info
validateBindingEndpoint=ida-binding
esignetWellKnownEndPoint=/v1/esignet/oidc/.well-known/openid-configuration
signupSettingsEndPoint=/v1/signup/settings

#To run in Docker
authCertsPath=/home/mosip/authcerts

#To run locally
#authCertsPath=
preconfiguredOtp=111111
#usePreConfiguredOtp=true

checkWhichOtp=mosip/mosip-config/application-default.properties
proxyOtpProp=mosip.kernel.auth.proxy-otp


#----------------------------------Assume that by Default e-signet is deployed----------------------------------------------------------#
# supported values yes or no
eSignetDeployed=yes

# ---- Add scenarios to skip from automation and server side -------------------------------------
#------------------------- DSL specific proprties ------------------------#
#------------------------- We need to see how to have DSL specific proprties file ------------------------#
packetUtilityBaseUrl=http://localhost:8080
mountPathForScenario=D:/centralized/mountvolume
mountPath=/home/mosip/mountvolume
# Add scenarios to skip from automation and server side
# supported values "S-scnearioNumber" for server side and "A-scnearioNumber" for automation
scenariosToSkip=

#-- Add scenarios to include in the the execution list------
# -- Empty if we want to execute all the scenarios---
# Add scenarios to include in the the execution list
# Empty if we want to execute all the scenarios---
scenariosToExecute=

#-- supported values yes or no
# supported values yes or no
useExternalScenarioSheet=yes
# supported values are 1 to 8
threadCount=1

#------------------------ Generic properties ------------------------#
enableDebug=yes
preconfiguredOtp=111111
usePreConfiguredOtp=false
# supported values yes or no. Assume that by Default e-signet is deployed
eSignetDeployed=yes
partnerUrlSuffix=oYf63Lax0DY2QkYMRHnrmDqhmO3RMWQagwm0ftgLlkuin1KOND/666/576732
reportIgnoredTestCases=yes
reportIgnoredTestCases=no
servicesNotDeployed=
esignetMockBaseURL=esignet-insurance.
sunBirdBaseURL=registry
slack-webhook-url=
serverErrorsToMonitor=IDA-MLC-018
serverErrorsToMonitor=IDA-MLC-018
pmsAuthInternal=true
partner_password=mosip123
partner_userName=111997
partner_revamp_userName=111999
partner_user_password=mosip123
policytest_password=mosip123
policytest_userName=111998
policytest_without_pmrole_userName=111887
admin_password=mosip123
admin_userName=220005
admin_zone_password=mosip123
admin_zone_userName=globaladmin



#------------------------- Need to check if these are used or not ------------------------#
OTPTimeOut = 181
attempt = 10
ConfigParameters=mosip.kernel.rid.length,mosip.kernel.uin.length,mosip.kernel.sms.country.code,mosip.kernel.sms.number.length,mosip.kernel.otp.default-length,mosip.kernel.otp.expiry-time,mosip.kernel.otp.key-freeze-time,mosip.kernel.otp.validation-attempt-threshold,mosip.kernel.otp.min-key-length,mosip.kernel.otp.max-key-length,mosip.kernel.licensekey.length,mosip.supported-languages
# supported values are 0 ,1, 2 based on number of env languages
langselect=0



#----------------------------------AuthDemoService Host properties----------------------------------------------------------#
#Uncommemnt the below to run locally
authDemoServiceBaseURL=http://localhost
authDemoServicePort=8082
authCertsPath=
#Uncommemnt the below to run in Docker
#authDemoServiceBaseURL=http://authdemo.apitestrig
#authDemoServicePort=80
#authCertsPath=/home/mosip/authcerts


mosip_components_base_urls=
#auditmanager=api-internal.dev1.mosip.net;idrepository=api-internal.dev1.mosip.net;partnermanager=api-internal.qa-inji.mosip.net;idauthentication=api-internal.qa-inji.mosip.net;policymanager=api-internal.qa-inji.mosip.net

0 comments on commit 3d10352

Please sign in to comment.