Skip to content

Commit

Permalink
Resquest Changes
Browse files Browse the repository at this point in the history
  • Loading branch information
mgarciaLKS committed Aug 5, 2024
1 parent ee95d3d commit 6a7848b
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 35 deletions.
6 changes: 3 additions & 3 deletions charts/umbrella/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -117,7 +117,7 @@ If you still face DNS issues, add the hosts to your /etc/hosts file:
192.168.49.2 portal-backend.tx.test
192.168.49.2 semantics.tx.test
192.168.49.2 sdfactory.tx.test
192.168.49.2 ssi.tx.test
192.168.49.2 ssi-credential-issuer.tx.test
192.168.49.2 dataconsumer-1-dataplane.tx.test
192.168.49.2 dataconsumer-1-controlplane.tx.test
192.168.49.2 dataprovider-dataplane.tx.test
Expand Down Expand Up @@ -145,7 +145,7 @@ For Windows edit the hosts file under `C:\Windows\System32\drivers\etc\hosts`:
192.168.49.2 portal-backend.tx.test
192.168.49.2 semantics.tx.test
192.168.49.2 sdfactory.tx.test
192.168.49.2 ssi.tx.test
192.168.49.2 ssi-credential-issuer.tx.test
192.168.49.2 dataconsumer-1-dataplane.tx.test
192.168.49.2 dataconsumer-1-controlplane.tx.test
192.168.49.2 dataprovider-dataplane.tx.test
Expand Down Expand Up @@ -429,7 +429,7 @@ Currently enabled ingresses:
- http://portal-backend.tx.test/api/notification/swagger/index.html
- http://portal.tx.test
- http://semantics.tx.test/discoveryfinder/swagger-ui/index.html
- http://ssi.tx.test/
- http://ssi-credential-issuer.tx.test/
- http://dataconsumer-1-controlplane.tx.test
- http://dataconsumer-1-dataplane.tx.test
- http://dataprovider-dataplane.tx.test
Expand Down
39 changes: 7 additions & 32 deletions charts/umbrella/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,7 +46,7 @@ portal:
sdfactoryAddress: "http://sdfactory.tx.test"
clearinghouseAddress: "http://validation.tx.test"
clearinghouseTokenAddress: "http://keycloak.tx.test/realms/example/protocol/openid-connect/token"
issuerComponentAddress: "http://ssi.tx.test"
issuerComponentAddress: "http://ssi-credential-issuer.tx.test"
frontend:
ingress:
enabled: true
Expand Down Expand Up @@ -643,8 +643,8 @@ iatpmock:
ssi-credential-issuer:
enabled: false
portalBackendAddress: "http://portal-backend.tx.test"
walletAddress: "http://managed-identity-wallets.tx.test"
walletTokenAddress: "http://centralidp.tx.test/auth/realms/CX-Central/protocol/openid-connect/token"
walletAddress: "http://iatpmock.tx.test"
walletTokenAddress: "https://iatpmock-token-address.tx.test/oauth/token"

issuer:
swaggerEnabled: true
Expand Down Expand Up @@ -681,9 +681,9 @@ ssi-credential-issuer:
wallet:
# -- Provide wallet client-id from CX IAM centralidp.
# You must specify the technical user with the required roles for the interaction with the managed-identity-wallet
clientId: "sa-cl5-custodian-2"
clientId: "wallet-client-id"
# -- Client-secret for wallet client-id. Secret-key 'wallet-client-secret'.
clientSecret: "UIqawwoohsvZ6AZOd1llLhnsUTKMWe4D"
clientSecret: ""
encryptionConfigIndex: 0
encryptionConfigs:
index0:
Expand All @@ -695,30 +695,16 @@ ssi-credential-issuer:
default: "Debug"

credentialExpiry:
expiry:
expiredVcsToDeleteInMonth: 12
inactiveVcsToDeleteInWeeks: 12
logging:
default: "Debug"

dbConnection:
schema: "issuer"
sslMode: "Disable"

postgresql:
enabled: true
architecture: standalone
primary:
persistence:
enabled: true
enabled: false
auth:
# -- Non-root username.
username: issuer
# -- Database name.
database: issuer
# -- Secret containing the passwords for root usernames postgres and non-root username issuer.
# Should not be changed without changing the "issuer-postgresSecretName" template as well.
existingSecret: "{{ .Release.Name }}-issuer-postgres"
# -- Password for the root username 'postgres'. Secret-key 'postgres-password'.
postgrespassword: "rootissuerpassword"
# -- Password for the non-root username 'issuer'. Secret-key 'password'.
Expand All @@ -727,17 +713,6 @@ ssi-credential-issuer:
centralidp:
# -- Provide centralidp base address (CX IAM), without trailing '/auth'.
address: "http://centralidp.tx.test"
authRealm: "CX-Central"
jwtBearerOptions:
requireHttpsMetadata: "false"
metadataPath: "/auth/realms/CX-Central/.well-known/openid-configuration"
tokenValidationParameters:
validIssuerPath: "/auth/realms/CX-Central"
validAudience: "Cl24-CX-SSI-CredentialIssuer"
refreshInterval: "00:00:30"
tokenPath: "/auth/realms/CX-Central/protocol/openid-connect/token"
# -- Flag if the api should be used with an leading /auth path
useAuthTrail: true

ingress:
enabled: true
Expand All @@ -753,7 +728,7 @@ ssi-credential-issuer:
# hosts:
# - ""
hosts:
- host: "ssi.tx.test"
- host: "ssi-credential-issuer.tx.test"
paths:
- path: "/"
pathType: "Prefix"
Expand Down

0 comments on commit 6a7848b

Please sign in to comment.