From 6a7848bd4bc1fd522974fcb81f05eaaa53ef5359 Mon Sep 17 00:00:00 2001 From: mgarciaLKS Date: Mon, 5 Aug 2024 12:56:23 +0200 Subject: [PATCH] Resquest Changes --- charts/umbrella/README.md | 6 +++--- charts/umbrella/values.yaml | 39 +++++++------------------------------ 2 files changed, 10 insertions(+), 35 deletions(-) diff --git a/charts/umbrella/README.md b/charts/umbrella/README.md index 9d25e67..5996633 100644 --- a/charts/umbrella/README.md +++ b/charts/umbrella/README.md @@ -117,7 +117,7 @@ If you still face DNS issues, add the hosts to your /etc/hosts file: 192.168.49.2 portal-backend.tx.test 192.168.49.2 semantics.tx.test 192.168.49.2 sdfactory.tx.test -192.168.49.2 ssi.tx.test +192.168.49.2 ssi-credential-issuer.tx.test 192.168.49.2 dataconsumer-1-dataplane.tx.test 192.168.49.2 dataconsumer-1-controlplane.tx.test 192.168.49.2 dataprovider-dataplane.tx.test @@ -145,7 +145,7 @@ For Windows edit the hosts file under `C:\Windows\System32\drivers\etc\hosts`: 192.168.49.2 portal-backend.tx.test 192.168.49.2 semantics.tx.test 192.168.49.2 sdfactory.tx.test -192.168.49.2 ssi.tx.test +192.168.49.2 ssi-credential-issuer.tx.test 192.168.49.2 dataconsumer-1-dataplane.tx.test 192.168.49.2 dataconsumer-1-controlplane.tx.test 192.168.49.2 dataprovider-dataplane.tx.test @@ -429,7 +429,7 @@ Currently enabled ingresses: - http://portal-backend.tx.test/api/notification/swagger/index.html - http://portal.tx.test - http://semantics.tx.test/discoveryfinder/swagger-ui/index.html -- http://ssi.tx.test/ +- http://ssi-credential-issuer.tx.test/ - http://dataconsumer-1-controlplane.tx.test - http://dataconsumer-1-dataplane.tx.test - http://dataprovider-dataplane.tx.test diff --git a/charts/umbrella/values.yaml b/charts/umbrella/values.yaml index b469f6d..b1ff829 100644 --- a/charts/umbrella/values.yaml +++ b/charts/umbrella/values.yaml @@ -46,7 +46,7 @@ portal: sdfactoryAddress: "http://sdfactory.tx.test" clearinghouseAddress: "http://validation.tx.test" clearinghouseTokenAddress: "http://keycloak.tx.test/realms/example/protocol/openid-connect/token" - issuerComponentAddress: "http://ssi.tx.test" + issuerComponentAddress: "http://ssi-credential-issuer.tx.test" frontend: ingress: enabled: true @@ -643,8 +643,8 @@ iatpmock: ssi-credential-issuer: enabled: false portalBackendAddress: "http://portal-backend.tx.test" - walletAddress: "http://managed-identity-wallets.tx.test" - walletTokenAddress: "http://centralidp.tx.test/auth/realms/CX-Central/protocol/openid-connect/token" + walletAddress: "http://iatpmock.tx.test" + walletTokenAddress: "https://iatpmock-token-address.tx.test/oauth/token" issuer: swaggerEnabled: true @@ -681,9 +681,9 @@ ssi-credential-issuer: wallet: # -- Provide wallet client-id from CX IAM centralidp. # You must specify the technical user with the required roles for the interaction with the managed-identity-wallet - clientId: "sa-cl5-custodian-2" + clientId: "wallet-client-id" # -- Client-secret for wallet client-id. Secret-key 'wallet-client-secret'. - clientSecret: "UIqawwoohsvZ6AZOd1llLhnsUTKMWe4D" + clientSecret: "" encryptionConfigIndex: 0 encryptionConfigs: index0: @@ -695,30 +695,16 @@ ssi-credential-issuer: default: "Debug" credentialExpiry: - expiry: - expiredVcsToDeleteInMonth: 12 - inactiveVcsToDeleteInWeeks: 12 logging: default: "Debug" - dbConnection: - schema: "issuer" - sslMode: "Disable" - postgresql: enabled: true architecture: standalone primary: persistence: - enabled: true + enabled: false auth: - # -- Non-root username. - username: issuer - # -- Database name. - database: issuer - # -- Secret containing the passwords for root usernames postgres and non-root username issuer. - # Should not be changed without changing the "issuer-postgresSecretName" template as well. - existingSecret: "{{ .Release.Name }}-issuer-postgres" # -- Password for the root username 'postgres'. Secret-key 'postgres-password'. postgrespassword: "rootissuerpassword" # -- Password for the non-root username 'issuer'. Secret-key 'password'. @@ -727,17 +713,6 @@ ssi-credential-issuer: centralidp: # -- Provide centralidp base address (CX IAM), without trailing '/auth'. address: "http://centralidp.tx.test" - authRealm: "CX-Central" - jwtBearerOptions: - requireHttpsMetadata: "false" - metadataPath: "/auth/realms/CX-Central/.well-known/openid-configuration" - tokenValidationParameters: - validIssuerPath: "/auth/realms/CX-Central" - validAudience: "Cl24-CX-SSI-CredentialIssuer" - refreshInterval: "00:00:30" - tokenPath: "/auth/realms/CX-Central/protocol/openid-connect/token" - # -- Flag if the api should be used with an leading /auth path - useAuthTrail: true ingress: enabled: true @@ -753,7 +728,7 @@ ssi-credential-issuer: # hosts: # - "" hosts: - - host: "ssi.tx.test" + - host: "ssi-credential-issuer.tx.test" paths: - path: "/" pathType: "Prefix"