diff --git a/.github/workflows/push-trigger.yml b/.github/workflows/push-trigger.yml index 8d592addc..8857fa82d 100644 --- a/.github/workflows/push-trigger.yml +++ b/.github/workflows/push-trigger.yml @@ -35,35 +35,35 @@ jobs: GPG_SECRET: ${{ secrets.GPG_SECRET }} SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK }} - publish_to_nexus: - if: "${{ !contains(github.ref, 'master') && github.event_name != 'pull_request' }}" - needs: build-maven-esignet - uses: mosip/kattu/.github/workflows/maven-publish-to-nexus.yml@master - with: - SERVICE_LOCATION: ./ - secrets: - OSSRH_USER: ${{ secrets.OSSRH_USER }} - OSSRH_SECRET: ${{ secrets.OSSRH_SECRET }} - OSSRH_URL: ${{ secrets.OSSRH_SNAPSHOT_URL }} - OSSRH_TOKEN: ${{ secrets.OSSRH_TOKEN }} - GPG_SECRET: ${{ secrets.GPG_SECRET }} - SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK }} +# publish_to_nexus: +# if: "${{ !contains(github.ref, 'master') && github.event_name != 'pull_request' }}" +# needs: build-maven-esignet +# uses: mosip/kattu/.github/workflows/maven-publish-to-nexus.yml@master +# with: +# SERVICE_LOCATION: ./ +# secrets: +# OSSRH_USER: ${{ secrets.OSSRH_USER }} +# OSSRH_SECRET: ${{ secrets.OSSRH_SECRET }} +# OSSRH_URL: ${{ secrets.OSSRH_SNAPSHOT_URL }} +# OSSRH_TOKEN: ${{ secrets.OSSRH_TOKEN }} +# GPG_SECRET: ${{ secrets.GPG_SECRET }} +# SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK }} - sonar_analysis: - needs: build-maven-esignet - if: "${{ github.event_name != 'pull_request' }}" - uses: mosip/kattu/.github/workflows/maven-sonar-analysis.yml@master - with: - SERVICE_LOCATION: ./ - secrets: - SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} - ORG_KEY: ${{ secrets.ORG_KEY }} - OSSRH_USER: ${{ secrets.OSSRH_USER }} - OSSRH_SECRET: ${{ secrets.OSSRH_SECRET }} - OSSRH_TOKEN: ${{ secrets.OSSRH_TOKEN }} - GPG_SECRET: ${{ secrets.GPG_SECRET }} - SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK }} +# sonar_analysis: +# needs: build-maven-esignet +# if: "${{ github.event_name != 'pull_request' }}" +# uses: mosip/kattu/.github/workflows/maven-sonar-analysis.yml@master +# with: +# SERVICE_LOCATION: ./ +# secrets: +# SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} +# ORG_KEY: ${{ secrets.ORG_KEY }} +# OSSRH_USER: ${{ secrets.OSSRH_USER }} +# OSSRH_SECRET: ${{ secrets.OSSRH_SECRET }} +# OSSRH_TOKEN: ${{ secrets.OSSRH_TOKEN }} +# GPG_SECRET: ${{ secrets.GPG_SECRET }} +# SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK }} build-dockers: needs: build-maven-esignet diff --git a/esignet-service/src/main/resources/application.properties b/esignet-service/src/main/resources/application.properties index 11a0d38bc..a6f2fb9b9 100644 --- a/esignet-service/src/main/resources/application.properties +++ b/esignet-service/src/main/resources/application.properties @@ -294,7 +294,7 @@ mosip.esignet.supported-pkce-methods={'S256'} mosip.esignet.ida.vci-exchange-id=mosip.identity.vciexchange mosip.esignet.ida.vci-exchange-version=1.0 mosip.esignet.ida.vci-exchange-url=${mosip.esignet.mock.host}/v1/mock-identity-system/vci-exchange/delegated/${mosip.esignet.misp.license.key}/ -mosip.esignet.integration.vci-plugin=IdaVCIssuancePluginImpl +mosip.esignet.integration.vci-plugin=TestVCIPluginImpl mosip.esignet.mock.vciplugin.verification-method=${mosip.esignet.vci.authn.jwk-set-uri} mosip.esignet.supported.credential.scopes={'sample_vc_ldp','mosip_identity_vc_ldp'} mosip.esignet.credential.scope-resource-mapping={'sample_vc_ldp' : '${mosip.esignet.domain.url}${server.servlet.path}/vci/credential', 'mosip_identity_vc_ldp': '${mosip.esignet.domain.url}${server.servlet.path}/vci/credential' }