From 985915387fffa0b1bdf86e9e8c6113ed42662f94 Mon Sep 17 00:00:00 2001 From: Nander Stabel Date: Thu, 26 Sep 2024 10:23:51 +0200 Subject: [PATCH 1/2] docs: update example configuration --- agent_application/docker/.env.example | 2 +- agent_application/docker/compose.yaml | 12 ++++++------ agent_application/example.config.yaml | 18 +++++++++--------- 3 files changed, 16 insertions(+), 16 deletions(-) diff --git a/agent_application/docker/.env.example b/agent_application/docker/.env.example index 7e5314ab..6fed924e 100644 --- a/agent_application/docker/.env.example +++ b/agent_application/docker/.env.example @@ -1 +1 @@ -UNICORE__URL=http://192.168.1.100:3033 +UNICORE__URL=${UNICORE__URL} diff --git a/agent_application/docker/compose.yaml b/agent_application/docker/compose.yaml index cb4690cf..f122619a 100644 --- a/agent_application/docker/compose.yaml +++ b/agent_application/docker/compose.yaml @@ -26,10 +26,10 @@ services: depends_on: - cqrs-postgres-db ssi-agent: - # image: impiercetechnologies/ssi-agent:476360a - build: - context: ../.. - dockerfile: ./agent_application/docker/Dockerfile + image: impiercetechnologies/ssi-agent:837870c + # build: + # context: ../.. + # dockerfile: ./agent_application/docker/Dockerfile ports: - 3033:3033 environment: @@ -48,7 +48,7 @@ services: volumes: - ../../agent_application/config.yaml:/app/agent_application/config.yaml # - ../../agent_secret_manager/tests/res/test.stronghold:/app/res/stronghold - - ../../agent_verification/presentation_definitions:/app/agent_verification/presentation_definitions + # - ../../agent_verification/presentation_definitions:/app/agent_verification/presentation_definitions # TODO: Remove this. This is a workaround that ensures that the `agent_verification/presentation_definitions` # folder can be accessed by the agent from the `fn authorization_requests` endpoint. - - ./tmp:/app/agent_api_rest + # - ./tmp:/app/agent_api_rest diff --git a/agent_application/example.config.yaml b/agent_application/example.config.yaml index 38e566a1..2cc559d4 100644 --- a/agent_application/example.config.yaml +++ b/agent_application/example.config.yaml @@ -15,17 +15,17 @@ did_methods: did_key: enabled: true did_iota_rms: - enabled: true + enabled: false did_web: - enabled: true + enabled: false domain_linkage_enabled: false signing_algorithms_supported: - eddsa: - enabled: true - preferred: true es256: + preferred: true + enabled: true + eddsa: enabled: true # TODO: required to be stated explicitly? @@ -64,7 +64,7 @@ credential_configurations: type: - VerifiableCredential display: - - name: Verifiable Credential + - name: Impierce Credential locale: en logo: uri: https://www.impierce.com/external/impierce-logo.png @@ -76,10 +76,10 @@ did_document_cache: # Key configuration (temporary) secret_manager: - stronghold_path: "/tmp/local.stronghold" + # stronghold_path: "/tmp/local.stronghold" # stronghold_password: "" <== Should be injected through the env variable `UNICORE__SECRET_MANAGER__STRONGHOLD_PASSWORD` # stronghold_password_file: "" - # issuer_eddsa_key_id: "ed25519-0" - # issuer_es256_key_id: "es256-0" + issuer_eddsa_key_id: "ed25519-0" + issuer_es256_key_id: "es256-0" # issuer_did: "did:iota:rms:0x0000000000000000000000000000000000000000000000000000000000000000" # issuer_fragment: "key-0" From b470d45b8123a15dae33b8a40a216cac5c94b42d Mon Sep 17 00:00:00 2001 From: Nander Stabel Date: Fri, 27 Sep 2024 11:06:01 +0200 Subject: [PATCH 2/2] fix: disable eddsa --- agent_application/example.config.yaml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/agent_application/example.config.yaml b/agent_application/example.config.yaml index 2cc559d4..55dfd2ba 100644 --- a/agent_application/example.config.yaml +++ b/agent_application/example.config.yaml @@ -26,7 +26,7 @@ signing_algorithms_supported: preferred: true enabled: true eddsa: - enabled: true + enabled: false # TODO: required to be stated explicitly? vp_formats: @@ -76,10 +76,10 @@ did_document_cache: # Key configuration (temporary) secret_manager: - # stronghold_path: "/tmp/local.stronghold" + stronghold_path: "/tmp/local.stronghold" # stronghold_password: "" <== Should be injected through the env variable `UNICORE__SECRET_MANAGER__STRONGHOLD_PASSWORD` # stronghold_password_file: "" - issuer_eddsa_key_id: "ed25519-0" + # issuer_eddsa_key_id: "ed25519-0" issuer_es256_key_id: "es256-0" # issuer_did: "did:iota:rms:0x0000000000000000000000000000000000000000000000000000000000000000" # issuer_fragment: "key-0"