Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

taken latest changes from 1.2.0-rc2 #56

Merged
merged 24 commits into from
Jan 25, 2022
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
14d1bd4
Created 1.2.0-rc2 (#23)
MonobikashDas Aug 31, 2021
466dc34
MOSIP-15420: Upgraded swagger2.0 to openapi3.0 for packet manager ser…
kameshsr Oct 29, 2021
f59d453
Added logger and fixed test cases (#32)
MonobikashDas Nov 3, 2021
1e5a04d
MOSIP-15420: Generated openapi.json for packet manager service (#34)
kameshsr Nov 12, 2021
d89828b
MOSIP-18453 : improved usage of caching (#36)
MonobikashDas Dec 6, 2021
dff1aa2
Added sonar_analysis
Rakshitha650 Dec 10, 2021
38b4b93
Merge pull request #38 from Rakshitha650/patch-1
mandeepdhiman123 Dec 13, 2021
4b1da36
MOSIP-18450 : added exception for objects not available in minio (#37)
MonobikashDas Dec 30, 2021
ce361ff
Mosip:15286 Changed openapi.json name.
kameshsr Jan 5, 2022
7bd0f33
updated the Sonar_analysis code and removed the Dskiptests
Rakshitha650 Jan 7, 2022
1a380a0
updated the Sonar_analysis code and removed the Dskiptests
Rakshitha650 Jan 7, 2022
29ee19e
added gpg keys
Rakshitha650 Jan 10, 2022
61a1380
Merge pull request #44 from Rakshitha650/1.2.0-rc2
mandeepdhiman123 Jan 10, 2022
f35b07e
Merge pull request #43 from kameshsr/1.2.0-rc2
mandeepdhiman123 Jan 11, 2022
69c6882
changes for real bio
Jan 13, 2022
e84194b
Merged with 1.2.0-rc2
Jan 13, 2022
26baa99
Merge branch 'develop' into 1.2.0-rc2-real-bio
Jan 16, 2022
dabf23b
changes for real bio
Jan 16, 2022
7d1a7cc
Merge pull request #51 from MonobikashDas/1.2.0-rc2-real-bio
gsasikumar Jan 17, 2022
f131608
Auth role issue fixed (#46)
MonobikashDas Jan 19, 2022
0334a73
MOR-147 : multithreading issue for create packet api (#52)
MonobikashDas Jan 19, 2022
17002dc
Merge pull request #54 from MonobikashDas/1.2.0-rc2
gsasikumar Jan 21, 2022
75e1ff9
selfTokenRestTemplate fix for regclient
Jan 23, 2022
91f05c6
Merge remote-tracking branch 'origin/1.2.0-rc2' into develop
Jan 25, 2022
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
MOSIP-18450 : added exception for objects not available in minio (#37)
* MOSIP-18450 : added exception for objects not available in minio

* Added sonar_analysis

* MOSIP-18910 : fixed refNumber issue in DocumentDto

* MOSIP-18450 : added exception for objects not available in minio

* MOSIP-18910 : fixed refNumber issue in DocumentDto

* initial change

* MOSIP-18450 : added exception for objects not available in minio

* MOSIP-18910 : fixed refNumber issue in DocumentDto

* initial change

* MOSIP-18793 :Added afterburner + fixes

Co-authored-by: Monobikash Das <M1045447@mindtree.com>
Co-authored-by: Rakshitha650 <76676196+Rakshitha650@users.noreply.github.com>
Co-authored-by: Mandeep Dhiman <46880392+mandeepdhiman123@users.noreply.github.com>
Co-authored-by: Admin <Admin@MONOBIKASH>
  • Loading branch information
5 people authored Dec 30, 2021
commit 4b1da3670da9c628903c5231bc5effddefd19d4d
5 changes: 5 additions & 0 deletions commons-packet/commons-packet-manager/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -146,6 +146,11 @@
<version>${junit.version}</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>org.apache.commons</groupId>
<artifactId>commons-collections4</artifactId>
<version>4.4</version>
</dependency>
</dependencies>


Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -30,7 +30,6 @@ public class AuditLogEntry {

@Autowired
@Lazy
@Qualifier("restTemplate")
private RestTemplate restTemplate;

@Autowired
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,7 @@ public class PacketManagerConstants {
public static final String VALUE = "value";
public static final String TYPE = "type";
public static final String FORMAT = "format";
public static final String REFNUMBER = "refNumber";

public static final String IDSCHEMA_URL = "IDSCHEMA";
public static final String SCHEMA_JSON = "schemaJson";
Expand Down
Original file line number Diff line number Diff line change
@@ -1,52 +1,53 @@
package io.mosip.commons.packet.constants;

public enum PacketUtilityErrorCodes {

UNKNOWN_RESOURCE_EXCEPTION("KER-PUT-001",
"Unknown resource provided"),
FILE_NOT_FOUND_IN_DESTINATION("KER-PUT-002", "Unable to Find File in Destination Folder"),
PACKET_DECRYPTION_FAILURE_EXCEPTION("KER-PUT-003", "Packet decryption failed"),
API_NOT_ACCESSIBLE_EXCEPTION("KER-PUT-005", "API not accessible"),
SYS_IO_EXCEPTION("KER-PUT-004", "Unable to Find File in Destination Folder"),
GET_ALL_IDENTITY_EXCEPTION("KER-PUT-005", "Unable to fetch identity json from all sub packets"),
NO_AVAILABLE_PROVIDER("KER-PUT-006", "No available provider for given source and process"),
BIOMETRIC_FIELDNAME_NOT_FOUND("KER-PUT-007", "Biometric fieldname is not present inside packet"),
GET_ALL_METAINFO_EXCEPTION("KER-PUT-008", "Unable to fetch meta information from all sub packets"),
ZIP_PARSING_EXCEPTION("KER-PUT-009", "Unable to parse the zip"),
SIGNATURE_EXCEPTION("KER-PUT-010", "Failed to generate digital signature"),
DOCUMENT_EXCEPTION("KER-PUT-011", "Failed to get document"),
BIOMETRIC_EXCEPTION("KER-PUT-012", "Unable to get biometric"),
OS_ADAPTER_EXCEPTION("KER-PUT-013", "No Object store adapter found."),
PACKET_KEEPER_GET_ERROR("KER-PUT-014", "Packet keeper exception occured."),
PACKET_KEEPER_PUT_ERROR("KER-PUT-015", "Packet keeper exception occured."),
PACKET_KEEPER_GETMETA_ERROR("KER-PUT-016", "Packet keeper exception occured."),
PACKET_KEEPER_INTEGRITY_ERROR("KER-PUT-017", "Packet keeper exception occured."),
CRYPTO_EXCEPTION("KER-PUT-018", "No available crypto service exception."),
INTEGRITY_FAILURE("KER-PUT-019", "Packet Integrity check failed."),
PACKET_VALIDATION_FAILED("KER-PUT-020", "Packet Validation exception occured."),
TAGGING_FAILED("KER-PUT-021", "Failed to add tags."),
TAG_ALREADY_EXIST("KER-PUT-022", "Tag Already Exist."),
GET_TAG_EXCEPTION("KER-PUT-023","Failed to get tags"),
TAG_NOT_FOUND("KER-PUT-024", "Requested tag not present"),
SOURCE_NOT_PRESENT("KER-PUT-025", "Source not present in request."),
DELETE_TAGGING_FAILED("KER-PUT-026", "Failed to delete tags.");




private final String errorCode;
private final String errorMessage;

private PacketUtilityErrorCodes(final String errorCode, final String errorMessage) {
this.errorCode = errorCode;
this.errorMessage = errorMessage;
}

public String getErrorCode() {
return errorCode;
}

public String getErrorMessage() {
return errorMessage;
}
}
package io.mosip.commons.packet.constants;

public enum PacketUtilityErrorCodes {

UNKNOWN_RESOURCE_EXCEPTION("KER-PUT-001",
"Unknown resource provided"),
FILE_NOT_FOUND_IN_DESTINATION("KER-PUT-002", "Unable to Find File in Destination Folder"),
PACKET_DECRYPTION_FAILURE_EXCEPTION("KER-PUT-003", "Packet decryption failed"),
API_NOT_ACCESSIBLE_EXCEPTION("KER-PUT-005", "API not accessible"),
SYS_IO_EXCEPTION("KER-PUT-004", "Unable to Find File in Destination Folder"),
GET_ALL_IDENTITY_EXCEPTION("KER-PUT-005", "Unable to fetch identity json from all sub packets"),
NO_AVAILABLE_PROVIDER("KER-PUT-006", "No available provider for given source and process"),
BIOMETRIC_FIELDNAME_NOT_FOUND("KER-PUT-007", "Biometric fieldname is not present inside packet"),
GET_ALL_METAINFO_EXCEPTION("KER-PUT-008", "Unable to fetch meta information from all sub packets"),
ZIP_PARSING_EXCEPTION("KER-PUT-009", "Unable to parse the zip"),
SIGNATURE_EXCEPTION("KER-PUT-010", "Failed to generate digital signature"),
DOCUMENT_EXCEPTION("KER-PUT-011", "Failed to get document"),
BIOMETRIC_EXCEPTION("KER-PUT-012", "Unable to get biometric"),
OS_ADAPTER_EXCEPTION("KER-PUT-013", "No Object store adapter found."),
PACKET_KEEPER_GET_ERROR("KER-PUT-014", "Packet keeper exception occured."),
PACKET_KEEPER_PUT_ERROR("KER-PUT-015", "Packet keeper exception occured."),
PACKET_KEEPER_GETMETA_ERROR("KER-PUT-016", "Packet keeper exception occured."),
PACKET_KEEPER_INTEGRITY_ERROR("KER-PUT-017", "Packet keeper exception occured."),
CRYPTO_EXCEPTION("KER-PUT-018", "No available crypto service exception."),
INTEGRITY_FAILURE("KER-PUT-019", "Packet Integrity check failed."),
PACKET_VALIDATION_FAILED("KER-PUT-020", "Packet Validation exception occured."),
TAGGING_FAILED("KER-PUT-021", "Failed to add tags."),
TAG_ALREADY_EXIST("KER-PUT-022", "Tag Already Exist."),
GET_TAG_EXCEPTION("KER-PUT-023","Failed to get tags"),
TAG_NOT_FOUND("KER-PUT-024", "Requested tag not present"),
SOURCE_NOT_PRESENT("KER-PUT-025", "Invalid source or process."),
DELETE_TAGGING_FAILED("KER-PUT-026", "Failed to delete tags."),
OBJECT_DOESNOT_EXISTS("KER-PUT-027", "Object doesnot exists."),;




private final String errorCode;
private final String errorMessage;

private PacketUtilityErrorCodes(final String errorCode, final String errorMessage) {
this.errorCode = errorCode;
this.errorMessage = errorMessage;
}

public String getErrorCode() {
return errorCode;
}

public String getErrorMessage() {
return errorMessage;
}
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
package io.mosip.commons.packet.exception;

import io.mosip.commons.packet.constants.PacketUtilityErrorCodes;
import io.mosip.kernel.core.exception.BaseUncheckedException;

public class ObjectDoesnotExistsException extends BaseUncheckedException {

public ObjectDoesnotExistsException() {
super(PacketUtilityErrorCodes.OBJECT_DOESNOT_EXISTS.getErrorCode(),
PacketUtilityErrorCodes.OBJECT_DOESNOT_EXISTS.getErrorMessage());
}

public ObjectDoesnotExistsException(String message) {
super(PacketUtilityErrorCodes.OBJECT_DOESNOT_EXISTS.getErrorCode(),
message);
}

public ObjectDoesnotExistsException(Throwable e) {
super(PacketUtilityErrorCodes.OBJECT_DOESNOT_EXISTS.getErrorCode(),
PacketUtilityErrorCodes.OBJECT_DOESNOT_EXISTS.getErrorMessage(), e);
}

public ObjectDoesnotExistsException(String errorMessage, Throwable t) {
super(PacketUtilityErrorCodes.OBJECT_DOESNOT_EXISTS.getErrorCode(), errorMessage, t);
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -60,29 +60,28 @@ public class OfflinePacketCryptoServiceImpl implements IPacketCryptoService {
@Override
public byte[] sign(byte[] packet) {
TpmSignRequestDto signRequest = new TpmSignRequestDto();
signRequest.setData(CryptoUtil.encodeBase64(packet));
return CryptoUtil.decodeBase64(getTpmCryptoService().csSign(signRequest).getData());
signRequest.setData(CryptoUtil.encodeToURLSafeBase64(packet));
return CryptoUtil.decodeURLSafeBase64(getTpmCryptoService().csSign(signRequest).getData());
}

@Override
public byte[] encrypt(String refId, byte[] packet) {
String packetString = CryptoUtil.encodeBase64String(packet);
String packetString = CryptoUtil.encodeToURLSafeBase64(packet);
CryptomanagerRequestDto cryptomanagerRequestDto = new CryptomanagerRequestDto();
cryptomanagerRequestDto.setApplicationId(APPLICATION_ID);
cryptomanagerRequestDto.setData(packetString);
cryptomanagerRequestDto.setReferenceId(refId);
cryptomanagerRequestDto.setPrependThumbprint(isPrependThumbprintEnabled);

SecureRandom sRandom = new SecureRandom();
byte[] nonce = new byte[CryptomanagerConstant.GCM_NONCE_LENGTH];
byte[] aad = new byte[CryptomanagerConstant.GCM_AAD_LENGTH];
sRandom.nextBytes(nonce);
sRandom.nextBytes(aad);
cryptomanagerRequestDto.setAad(CryptoUtil.encodeBase64String(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeBase64String(nonce));
cryptomanagerRequestDto.setAad(CryptoUtil.encodeToURLSafeBase64(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeToURLSafeBase64(nonce));
cryptomanagerRequestDto.setTimeStamp(DateUtils.getUTCCurrentDateTime());

byte[] encryptedData = CryptoUtil.decodeBase64(getCryptomanagerService().encrypt(cryptomanagerRequestDto).getData());
byte[] encryptedData = CryptoUtil.decodeURLSafeBase64(getCryptomanagerService().encrypt(cryptomanagerRequestDto).getData());
return EncryptionUtil.mergeEncryptedData(encryptedData, nonce, aad);
}

Expand All @@ -97,20 +96,19 @@ public byte[] decrypt(String refId, byte[] packet) {
CryptomanagerRequestDto cryptomanagerRequestDto = new CryptomanagerRequestDto();
cryptomanagerRequestDto.setApplicationId(APPLICATION_ID);
cryptomanagerRequestDto.setReferenceId(refId);
cryptomanagerRequestDto.setAad(CryptoUtil.encodeBase64String(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeBase64String(nonce));
cryptomanagerRequestDto.setData(CryptoUtil.encodeBase64String(encryptedData));
cryptomanagerRequestDto.setPrependThumbprint(isPrependThumbprintEnabled);
cryptomanagerRequestDto.setAad(CryptoUtil.encodeToURLSafeBase64(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeToURLSafeBase64(nonce));
cryptomanagerRequestDto.setData(CryptoUtil.encodeToURLSafeBase64(encryptedData));
cryptomanagerRequestDto.setTimeStamp(DateUtils.getUTCCurrentDateTime());

return CryptoUtil.decodeBase64(getCryptomanagerService().decrypt(cryptomanagerRequestDto).getData());
return CryptoUtil.decodeURLSafeBase64(getCryptomanagerService().decrypt(cryptomanagerRequestDto).getData());
}

@Override
public boolean verify(String machineId, byte[] packet, byte[] signature) {
TpmSignVerifyRequestDto tpmSignVerifyRequestDto = new TpmSignVerifyRequestDto();
tpmSignVerifyRequestDto.setData(CryptoUtil.encodeBase64(packet));
tpmSignVerifyRequestDto.setSignature(CryptoUtil.encodeBase64(signature));
tpmSignVerifyRequestDto.setData(CryptoUtil.encodeToURLSafeBase64(packet));
tpmSignVerifyRequestDto.setSignature(CryptoUtil.encodeToURLSafeBase64(signature));
//TODO - get public key based on machine Id
//tpmSignVerifyRequestDto.setPublicKey(<>);
TpmSignVerifyResponseDto tpmSignVerifyResponseDto = getTpmCryptoService().csVerify(tpmSignVerifyRequestDto);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,6 @@ public class OnlinePacketCryptoServiceImpl implements IPacketCryptoService {
private boolean isPrependThumbprintEnabled;

@Autowired
@Qualifier("restTemplate")
private RestTemplate restTemplate;

@Autowired
Expand All @@ -88,7 +87,7 @@ public byte[] sign(byte[] packet) {
try {

TpmSignRequestDto dto = new TpmSignRequestDto();
dto.setData(CryptoUtil.encodeBase64(packet));
dto.setData(CryptoUtil.encodeToURLSafeBase64(packet));
RequestWrapper<TpmSignRequestDto> request = new RequestWrapper<>();
request.setRequest(dto);
request.setMetadata(null);
Expand All @@ -101,7 +100,7 @@ public byte[] sign(byte[] packet) {
String.class);
LinkedHashMap responseMap = (LinkedHashMap) mapper.readValue(response.getBody(), LinkedHashMap.class).get("response");
if (responseMap != null && responseMap.size() > 0)
return CryptoUtil.decodeBase64((String) responseMap.get("data"));
return CryptoUtil.decodeURLSafeBase64((String) responseMap.get("data"));
else
throw new SignatureException();
} catch (IOException e) {
Expand All @@ -116,7 +115,7 @@ public byte[] encrypt(String refId, byte[] packet) {
byte[] encryptedPacket = null;

try {
String packetString = CryptoUtil.encodeBase64String(packet);
String packetString = CryptoUtil.encodeToURLSafeBase64(packet);
CryptomanagerRequestDto cryptomanagerRequestDto = new CryptomanagerRequestDto();
RequestWrapper<CryptomanagerRequestDto> request = new RequestWrapper<>();
cryptomanagerRequestDto.setApplicationId(APPLICATION_ID);
Expand All @@ -129,8 +128,8 @@ public byte[] encrypt(String refId, byte[] packet) {
byte[] aad = new byte[CryptomanagerConstant.GCM_AAD_LENGTH];
sRandom.nextBytes(nonce);
sRandom.nextBytes(aad);
cryptomanagerRequestDto.setAad(CryptoUtil.encodeBase64String(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeBase64String(nonce));
cryptomanagerRequestDto.setAad(CryptoUtil.encodeToURLSafeBase64(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeToURLSafeBase64(nonce));
cryptomanagerRequestDto.setTimeStamp(DateUtils.getUTCCurrentDateTime());

request.setId(DECRYPT_SERVICE_ID);
Expand All @@ -154,7 +153,7 @@ public byte[] encrypt(String refId, byte[] packet) {
"Packet encryption failure message : " + error.getMessage());
throw new PacketDecryptionFailureException(error.getMessage());
}
byte[] encryptedData = CryptoUtil.decodeBase64(responseObject.getResponse().getData());
byte[] encryptedData = CryptoUtil.decodeURLSafeBase64(responseObject.getResponse().getData());
encryptedPacket = EncryptionUtil.mergeEncryptedData(encryptedData, nonce, aad);
LOGGER.info(PacketManagerLogger.SESSIONID, PacketManagerLogger.REFERENCEID, refId,
"Successfully encrypted Packet");
Expand Down Expand Up @@ -197,9 +196,9 @@ public byte[] decrypt(String refId, byte[] packet) {
CryptomanagerConstant.GCM_NONCE_LENGTH + CryptomanagerConstant.GCM_AAD_LENGTH);
byte[] encryptedData = Arrays.copyOfRange(packet, CryptomanagerConstant.GCM_NONCE_LENGTH + CryptomanagerConstant.GCM_AAD_LENGTH,
packet.length);
cryptomanagerRequestDto.setAad(CryptoUtil.encodeBase64String(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeBase64String(nonce));
cryptomanagerRequestDto.setData(CryptoUtil.encodeBase64String(encryptedData));
cryptomanagerRequestDto.setAad(CryptoUtil.encodeToURLSafeBase64(aad));
cryptomanagerRequestDto.setSalt(CryptoUtil.encodeToURLSafeBase64(nonce));
cryptomanagerRequestDto.setData(CryptoUtil.encodeToURLSafeBase64(encryptedData));
cryptomanagerRequestDto.setPrependThumbprint(isPrependThumbprintEnabled);
cryptomanagerRequestDto.setTimeStamp(DateUtils.getUTCCurrentDateTime());

Expand All @@ -226,7 +225,7 @@ public byte[] decrypt(String refId, byte[] packet) {
"Error message : " + error.getMessage());
throw new PacketDecryptionFailureException(error.getMessage());
}
decryptedPacket = CryptoUtil.decodeBase64(responseObject.getResponse().getData());
decryptedPacket = CryptoUtil.decodeURLSafeBase64(responseObject.getResponse().getData());
LOGGER.info(PacketManagerLogger.SESSIONID, PacketManagerLogger.REFERENCEID, refId,
"Successfully decrypted Packet");
} catch (IOException e) {
Expand Down Expand Up @@ -259,8 +258,8 @@ public boolean verify(String refId, byte[] packet, byte[] signature) {
try {
String publicKey=getPublicKey(refId);
TpmSignVerifyRequestDto dto = new TpmSignVerifyRequestDto();
dto.setData(CryptoUtil.encodeBase64(packet));
dto.setSignature(CryptoUtil.encodeBase64(signature));
dto.setData(CryptoUtil.encodeToURLSafeBase64(packet));
dto.setSignature(CryptoUtil.encodeToURLSafeBase64(signature));
dto.setPublicKey(publicKey);
RequestWrapper<TpmSignVerifyRequestDto> request = new RequestWrapper<>();
request.setRequest(dto);
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
import static io.mosip.commons.packet.constants.PacketManagerConstants.IDENTITY;
import static io.mosip.commons.packet.constants.PacketManagerConstants.LABEL;
import static io.mosip.commons.packet.constants.PacketManagerConstants.META_INFO_OPERATIONS_DATA;
import static io.mosip.commons.packet.constants.PacketManagerConstants.REFNUMBER;
import static io.mosip.commons.packet.constants.PacketManagerConstants.TYPE;
import static io.mosip.commons.packet.constants.PacketManagerConstants.VALUE;

Expand Down Expand Up @@ -215,8 +216,9 @@ public Document getDocument(String id, String documentName, String source, Strin
Document document = new Document();
document.setDocument(IOUtils.toByteArray(documentStream));
document.setValue(value);
document.setType(documentMap.get(TYPE) != null ? documentMap.get(TYPE).toString() : null);
document.setFormat(documentMap.get(FORMAT) != null ? documentMap.get(FORMAT).toString() : null);
document.setType(documentMap.has(TYPE) ? documentMap.get(TYPE).toString() : null);
document.setFormat(documentMap.has(FORMAT) ? documentMap.get(FORMAT).toString() : null);
document.setRefNumber(documentMap.has(REFNUMBER) ? documentMap.get(REFNUMBER).toString() : null);
return document;
}
}
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
package io.mosip.commons.packet.impl;

import com.google.common.collect.Lists;
import io.mosip.commons.packet.constants.ErrorCode;
import io.mosip.commons.packet.constants.LoggerFileConstant;
import io.mosip.commons.packet.constants.PacketManagerConstants;
Expand All @@ -23,6 +22,7 @@
import io.mosip.kernel.core.util.JsonUtils;
import io.mosip.kernel.core.util.StringUtils;
import io.mosip.kernel.core.util.exception.JsonProcessingException;
import org.assertj.core.util.Lists;
import org.json.JSONArray;
import org.json.JSONException;
import org.json.JSONObject;
Expand Down
Loading