Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: add SSI Credential Issuer #114

Merged
merged 10 commits into from
Aug 12, 2024
7 changes: 6 additions & 1 deletion charts/umbrella/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,7 +28,7 @@ sources:
- https://github.com/eclipse-tractusx/tractus-x-umbrella

type: application
version: 0.20.0
version: 0.21.0

# when adding or updating versions of dependencies, also update list under README.md#Install
dependencies:
Expand Down Expand Up @@ -62,6 +62,11 @@ dependencies:
alias: selfdescription
repository: https://eclipse-tractusx.github.io/charts/dev
version: 2.1.19
# ssi-credential-issuer
- name: ssi-credential-issuer
condition: ssi-credential-issuer.enabled
repository: https://eclipse-tractusx.github.io/charts/dev
version: 1.0.0
# semantic-hub
- condition: semantic-hub.enabled
name: semantic-hub
Expand Down
4 changes: 4 additions & 0 deletions charts/umbrella/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -117,6 +117,7 @@ If you still face DNS issues, add the hosts to your /etc/hosts file:
192.168.49.2 portal-backend.tx.test
192.168.49.2 semantics.tx.test
192.168.49.2 sdfactory.tx.test
192.168.49.2 ssi-credential-issuer.tx.test
192.168.49.2 dataconsumer-1-dataplane.tx.test
192.168.49.2 dataconsumer-1-controlplane.tx.test
192.168.49.2 dataprovider-dataplane.tx.test
Expand Down Expand Up @@ -144,6 +145,7 @@ For Windows edit the hosts file under `C:\Windows\System32\drivers\etc\hosts`:
192.168.49.2 portal-backend.tx.test
192.168.49.2 semantics.tx.test
192.168.49.2 sdfactory.tx.test
192.168.49.2 ssi-credential-issuer.tx.test
192.168.49.2 dataconsumer-1-dataplane.tx.test
192.168.49.2 dataconsumer-1-controlplane.tx.test
192.168.49.2 dataprovider-dataplane.tx.test
Expand All @@ -168,6 +170,7 @@ The currently available components are following:
- [sdfactory](https://github.com/eclipse-tractusx/sd-factory/tree/sdfactory-2.1.12)
- [managed-identity-wallet](https://github.com/eclipse-tractusx/managed-identity-wallet/tree/v0.4.0)
- [semantic-hub](https://github.com/eclipse-tractusx/sldt-semantic-hub/tree/semantic-hub-0.2.2)
- [ssi credential issuer](https://github.com/eclipse-tractusx/ssi-credential-issuer/tree/v1.0.0)
- [dataconsumerOne](https://github.com/eclipse-tractusx/tractus-x-umbrella/tree/main/charts/tx-data-provider) ([tractusx-edc](https://github.com/eclipse-tractusx/tractusx-edc/tree/0.7.1), [vault](https://github.com/hashicorp/vault-helm/tree/v0.20.0))
- [tx-data-provider](https://github.com/eclipse-tractusx/tractus-x-umbrella/tree/main/charts/tx-data-provider) ([tractusx-edc](https://github.com/eclipse-tractusx/tractusx-edc/tree/0.7.1), [digital-twin-registry](https://github.com/eclipse-tractusx/sldt-digital-twin-registry/tree/digital-twin-registry-0.4.5), [vault](https://github.com/hashicorp/vault-helm/tree/v0.20.0), [simple-data-backend](https://github.com/eclipse-tractusx/tractus-x-umbrella/tree/main/charts/simple-data-backend))
- [dataconsumerTwo](https://github.com/eclipse-tractusx/tractus-x-umbrella/tree/main/charts/tx-data-provider) ([tractusx-edc](https://github.com/eclipse-tractusx/tractusx-edc/tree/0.7.1), [vault](https://github.com/hashicorp/vault-helm/tree/v0.20.0))
Expand Down Expand Up @@ -426,6 +429,7 @@ Currently enabled ingresses:
- http://portal-backend.tx.test/api/notification/swagger/index.html
- http://portal.tx.test
- http://semantics.tx.test/discoveryfinder/swagger-ui/index.html
- http://ssi-credential-issuer.tx.test/
- http://dataconsumer-1-controlplane.tx.test
- http://dataconsumer-1-dataplane.tx.test
- http://dataprovider-dataplane.tx.test
Expand Down
90 changes: 90 additions & 0 deletions charts/umbrella/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -46,6 +46,7 @@ portal:
sdfactoryAddress: "http://sdfactory.tx.test"
clearinghouseAddress: "http://validation.tx.test"
clearinghouseTokenAddress: "http://keycloak.tx.test/realms/example/protocol/openid-connect/token"
issuerComponentAddress: "http://ssi-credential-issuer.tx.test"
frontend:
ingress:
enabled: true
Expand Down Expand Up @@ -639,6 +640,95 @@ iatpmock:
- path: /
pathType: ImplementationSpecific

ssi-credential-issuer:
enabled: false
portalBackendAddress: "http://portal-backend.tx.test"
walletAddress: "http://iatpmock.tx.test"
walletTokenAddress: "https://iatpmock-token-address.tx.test/oauth/token"
issuer:
swaggerEnabled: true
logging:
businessLogic: "Debug"
default: "Debug"
portal:
# -- Provide portal client-id from CX IAM centralidp.
# You must specify the technical user with the required roles for the interaction with the portal
clientId: "sa-cl24-01"
evegufy marked this conversation as resolved.
Show resolved Hide resolved
# -- Client-secret for portal client-id. Secret-key 'portal-client-secret'.
clientSecret: "VRHQM2NOA4176Vrscxey1DdO4P7ikUQc"
credential:
issuerDid: "did:web:managed-identity-wallets.tx.test:BPNL00000003CRHK"
issuerBpn: "BPNL00000003CRHK"
# statusListUrl: "https://example.org/statuslist"
encryptionConfigIndex: 0
encryptionConfigs:
index0:
# EncryptionKey for wallet. Secret-key 'credential-encryption-key0'. Expected format is 256 bit (64 digits) hex.
encryptionKey: "deb8261ec7b89c344f1c5ef5a11606e305f14e0d231b1357d90ad0180c5081d3"
processesworker:
portal:
# -- Provide portal client-id from CX IAM centralidp.
# You must specify the technical user with the required roles for the interaction with the portal
clientId: "sa-cl24-01"
mgarciaLKS marked this conversation as resolved.
Show resolved Hide resolved
# -- Client-secret for portal client-id. Secret-key 'portal-client-secret'.
clientSecret: "VRHQM2NOA4176Vrscxey1DdO4P7ikUQc"
logging:
default: "Debug"
processIdentity:
identityId: ac1cf001-7fbc-1f2f-817f-bce058020006
wallet:
# -- Provide wallet client-id from CX IAM centralidp.
# You must specify the technical user with the required roles for the interaction with the managed-identity-wallet
clientId: "wallet-client-id"
# -- Client-secret for wallet client-id. Secret-key 'wallet-client-secret'.
clientSecret: ""
encryptionConfigIndex: 0
encryptionConfigs:
index0:
# EncryptionKey for wallet. Secret-key 'process-wallet-encryption-key0'. Expected format is 256 bit (64 digits) hex.
encryptionKey: "deb8261ec7b89c344f1c5ef5a11606e305f14e0d231b1357d90ad0180c5081d3"
issuermigrations:
logging:
default: "Debug"
credentialExpiry:
logging:
default: "Debug"
postgresql:
enabled: true
architecture: standalone
primary:
persistence:
enabled: false
auth:
# -- Password for the root username 'postgres'. Secret-key 'postgres-password'.
postgrespassword: "rootissuerpassword"
# -- Password for the non-root username 'issuer'. Secret-key 'password'.
password: "issuerpassword"

centralidp:
mgarciaLKS marked this conversation as resolved.
Show resolved Hide resolved
# -- Provide centralidp base address (CX IAM), without trailing '/auth'.
address: "http://centralidp.tx.test"
ingress:
enabled: true
className: "nginx"
annotations:
nginx.ingress.kubernetes.io/use-regex: "true"
nginx.ingress.kubernetes.io/enable-cors: "true"
nginx.ingress.kubernetes.io/proxy-body-size: "8m"
nginx.ingress.kubernetes.io/cors-allow-origin: "http://*.tx.test"
# -- Ingress TLS configuration
tls: []
# - secretName: ""
# hosts:
# - ""
hosts:
- host: "ssi-credential-issuer.tx.test"
paths:
- path: "/"
pathType: "Prefix"
backend:
port: 8080

# Set up services for a business partner pool, golden record process
# and a gate with which the Portal and the users can share business partner data
bpdm:
Expand Down
3 changes: 3 additions & 0 deletions charts/values-test-shared-services-2.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -25,3 +25,6 @@ discoveryfinder:

semantic-hub:
enabled: true

ssi-credential-issuer:
enabled: true