...
Add a new role for REINDEXING so as to push encrypted data in the index in roleactions.json and roles.json files.
Reference for these file changes can be taken from the following commit: https://github.com/egovernments/egov-mdms-data/pull/2835/files (Please pick the changes for the required files- roleactions.json and roles.json only)Add a copy of the existing water-service index with a different topic name(
update-ws-encryption
andupdate-sw-encryption
) for the encryption process.
Reference: https://github.com/egovernments/configs/pull/2510/commits/bf025f1489933dce71fe448d1181515fa418f09cSome changes need to be made for existing indexes in water-service and sewerage-service indexer files. The changes with respect to these files can be referred from the following commit:
https://github.com/egovernments/configs/pull/2342
https://github.com/egovernments/configs/pull/2345Restart the indexer.
Add the following json mappings in the existing mappings (parallely to water-services and sewerage-services key) for water-services and sewerage-services in kibana so that the PII data is not visible during search(The data do remain in the index and also search with respect to this happens as is).
Code Block "_source": { "excludes": [ "Data.ownerMobileNumbers", "Data.connectionHolders.ownerType", "Data.connectionHolders.gender", "Data.connectionHolders.mobileNumber", "Data.connectionHolders.correspondenceAddress", "Data.connectionHolders.fatherOrHusbandName", "Data.connectionHolders.relationship", "Data.plumberInfo.mobileNumber" ] }
Sample index at bottom.
Add 2 new persister files responsible for managing old data encryption. ws-enc-audit-persister.yml and sw-enc-audit-persister.yml.
Update the path of these files in the DevOps repo in the specific environment file.
Restart the persister
Deploy new ws-service and sw-service builds.
Add the following file in the indexer: privacy-audit.yaml
Update path for the above index in DevOps environment file:
file:///work-dir/configs/egov-indexer/privacy-audit.yaml
here.Add searchpath for ws and sw inbox :
"NewWS1,ModifyWSConnection,DisconnectWSConnection":{"searchPath":"http://ws-services.egov:8080/ws-services/wc/_search","dataRoot":"WaterConnection","applNosParam":"applicationNumber","businessIdProperty":"applicationNo","applsStatusParam":"applicationStatus"},"NewSW1,ModifySWConnection,DisconnectSWConnection":{"searchPath":"http://sw-services.egov:8080/sw-services/swc/_search","dataRoot":"SewerageConnections","applNosParam":"applicationNumber","businessIdProperty":"applicationNo","applsStatusParam":"applicationStatus"}"NewWS1,ModifyWSConnection,DisconnectWSConnection":{"searchPath":"http://ws-services.egov:8080/ws-services/wc/_search","dataRoot":"WaterConnection","applNosParam":"applicationNumber","businessIdProperty":"applicationNo","applsStatusParam":"applicationStatus"},"NewSW1,ModifySWConnection,DisconnectSWConnection":{"searchPath":"http://sw-services.egov:8080/sw-services/swc/_search","dataRoot":"SewerageConnections","applNosParam":"applicationNumber","businessIdProperty":"applicationNo","applsStatusParam":"applicationStatus"}
hereFollowing variables need to be added in env-secrets file :
Code Block elasticsearch: egov-es-username egov-es-password
Following variables need to be overridden in env file:
Code Block #W&S indexes water.es.index=water-services sewerage.es.index=sewerage-services
Port-forward the ws-service and sw-service pods and hit the curl to start encryption.
The curls can be referred from here:
Water-encryption curl:Code Block curl --location --request POST 'http://localhost:8040/ws-services/wc/_encryptOldData?tenantIds=pb,pb.jalandhar&limit=200' \ --header 'authority: dev.digit.org' \ --header 'accept: application/json, text/plain, */*' \ --header 'accept-language: en-GB,en-US;q=0.9,en;q=0.8' \ --header 'content-type: application/json;charset=UTF-8' \ --header 'origin: https://dev.digit.org' \ --header 'referer: https://dev.digit.org/digit-ui/employee/pt/search' \ --header 'sec-ch-ua: ".Not/A)Brand";v="99", "Google Chrome";v="103", "Chromium";v="103"' \ --header 'sec-ch-ua-mobile: ?0' \ --header 'sec-ch-ua-platform: "Linux"' \ --header 'sec-fetch-dest: empty' \ --header 'sec-fetch-mode: cors' \ --header 'sec-fetch-site: same-origin' \ --header 'user-agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36' \ --data-raw '{ "RequestInfo": { "apiId": "Rainmaker", "authToken": "{{auth}}", "userInfo": { "id": 24226, "uuid": "11b0e02b-0145-4de2-bc42-c97b96264807", "userName": "amr001", "name": "leela", "mobileNumber": "9814424443", "emailId": "leela@llgmail.com", "locale": null, "type": "EMPLOYEE", "roles": [ { "name": "WS Document Verifier", "code": "WS_DOC_VERIFIER", "tenantId": "pb.amritsar" } ], "active": true, "tenantId": "pb.amritsar", "permanentCity": "Amritsar" }, "plainAccessRequest": { }, "msgId": "1657027355542|en_IN" } }'
Sewerage-encryption curl:Code Block curl --location --request POST 'http://localhost:4040/sw-services/swc/_encryptOldData?tenantIds=pb.amritsar&limit=150' \ --header 'authority: dev.digit.org' \ --header 'accept: application/json, text/plain, */*' \ --header 'accept-language: en-GB,en-US;q=0.9,en;q=0.8' \ --header 'content-type: application/json;charset=UTF-8' \ --header 'origin: https://dev.digit.org' \ --header 'referer: https://dev.digit.org/digit-ui/employee/pt/search' \ --header 'sec-ch-ua: ".Not/A)Brand";v="99", "Google Chrome";v="103", "Chromium";v="103"' \ --header 'sec-ch-ua-mobile: ?0' \ --header 'sec-ch-ua-platform: "Linux"' \ --header 'sec-fetch-dest: empty' \ --header 'sec-fetch-mode: cors' \ --header 'sec-fetch-site: same-origin' \ --header 'user-agent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.0.0 Safari/537.36' \ --data-raw '{ "RequestInfo": { "apiId": "Rainmaker", "authToken": "null", "userInfo": { "id": 24226, "uuid": "11b0e02b-0145-4de2-bc42-c97b96264807", "userName": "amr001", "name": "leela", "mobileNumber": "9814424443", "emailId": "leela@llgmail.com", "locale": null, "type": "EMPLOYEE", "roles": [ { "name": "SW Approver", "code": "SW_APPROVER", "tenantId": "pb.amritsar" } ], "active": true, "tenantId": "pb.amritsar", "permanentCity": "Amritsar" }, "plainAccessRequest": { }, "msgId": "1657027355542|en_IN" } }'
In the params list in both the above curls, “tenantIds” param can either be provided with a single tenantId or a list of tenantIds for encrypting the data with respect to the provided tenantIds. However, to encrypt the data for all tenantIds in the system, tenantIds param itself should be removed.
...