Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[MOSIP-35417]Added changes for misc onboarder to default.sh #102

Open
wants to merge 1 commit into
base: MOSIP-35417
Choose a base branch
from
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
57 changes: 57 additions & 0 deletions default.sh
Original file line number Diff line number Diff line change
Expand Up @@ -533,6 +533,48 @@ onboard_esignet_sunbird_partner(){
$ADD_SSL_NEWMAN \
--export-environment ./config-secrets.json -r cli,htmlextra --reporter-htmlextra-export ./reports/sunbird-oidc.html --reporter-htmlextra-showEnvironmentData
}
onboard_miscellaneous_oidc_partner(){
echo "Onboarding Miscellaneous OIDC partner"
sh $MYDIR/certs/create-signing-certs.sh $MYDIR
root_ca_cert=$(awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}' $root_cert_path)
partner_cert=$(awk 'NF {sub(/\r/, ""); printf "%s\\n",$0;}' $client_cert_path)
sh $MYDIR/certs/convert.sh $MYDIR
mv $MYDIR/certs/$PARTNER_KC_USERNAME/keystore.p12 $MYDIR/certs/$PARTNER_KC_USERNAME/oidckeystore.p12
kubectl -n $ns_mimoto create secret generic sunbird-$PARTNER_KC_USERNAME --from-file=$MYDIR/certs/$PARTNER_KC_USERNAME/oidckeystore.p12 --dry-run=client -o yaml | kubectl apply -f -

if [ $? -gt 0 ]; then
echo "JWK Key generation failed; EXITING";
exit 1;
fi
echo "JWK Keys generated successfully"
jwk_key=$(awk -F'"' '/"n"/ {print $8}' $MYDIR/certs/$PARTNER_KC_USERNAME/publickey.jwk)

newman run onboarding.postman_collection.json --delay-request 2000 -e onboarding.postman_environment.json --bail \
--env-var url="$URL" \
--env-var external-url=$EXTERNAL_URL \
--env-var request-time="$DATE" \
--env-var logo-uri=$LOGO_URI \
--env-var redirect-uris=$REDIRECT_URIS \
--env-var application-id=$APPLICATION_ID \
--env-var module-clientid=$MODULE_CLIENTID \
--env-var module-secretkey=$MODULE_SECRETKEY \
--env-var partner-kc-username=$PARTNER_KC_USERNAME \
--env-var key="$jwk_key" \
--env-var keyid="" \
--env-var partner-manager-username=misc-oidc-kc-mockusername \
--env-var partner-manager-password=misc-oidc-kc-mockuserpassword \
--env-var keycloak-url=$KEYCLOAK_URL \
--env-var keycloak-admin-password=$KEYCLOAK_ADMIN_PASSWORD \
--env-var keycloak-admin-username=$KEYCLOAK_ADMIN_USERNAME \
--env-var oidc-client-name="$OIDC_CLIENT_NAME" \
--env-var oidc-clientid="$OIDC_CLIENTID" \
--folder 'create_keycloak_user' \
--folder authenticate-to-upload-certs \
--folder create-oidc-client-through-esignet \
--folder delete-user \
$ADD_SSL_NEWMAN \
--export-environment ./config-secrets.json -r cli,htmlextra --reporter-htmlextra-export ./reports/signup-oidc.html --reporter-htmlextra-showEnvironmentData
}
## Script starts from here
export MYDIR=$(pwd)
DATE=$(date -u +%FT%T.%3NZ)
Expand Down Expand Up @@ -690,4 +732,19 @@ elif [ "$MODULE" = "resident-oidc" ]; then
REDIRECT_URIS="io.mosip.residentapp.inji:\/\/oauthredirect,https://inji.$( printenv installation-domain)/redirect"
onboard_esignet_sunbird_partner
echo "Esignet Sunbird Partner onboarding completed"
elif [ "$MODULE" = "misc-oidc" ]; then
APPLICATION_ID=partner
EXTERNAL_URL="https://$(printenv mosip-misc-host)"
MODULE_CLIENTID=mosip-pms-client
MODULE_SECRETKEY=$mosip_pms_client_secret
OIDC_CLIENT_NAME='$(printenv misc-client-name)'
OIDC_CLIENTID='$(printenv misc-client-id)'
export PARTNER_KC_USERNAME='$(printenv misc-partnerid)'
root_cert_path="$MYDIR/certs/$PARTNER_KC_USERNAME/RootCA.pem"
client_cert_path="$MYDIR/certs/$PARTNER_KC_USERNAME/Client.pem"
LOGO_URI='$(printenv misc-logo-url)'
REDIRECT_URIS='$(printenv misc-redirect-url)'
onboard_miscellaneous_oidc_partner
echo " Partner onboarding completed"
fi

Loading