Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add TLS config files #29

Merged
merged 6 commits into from
May 28, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
40 changes: 40 additions & 0 deletions example/configurations/consumer-https.properties
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
# HTTPS config
edc.web.https.keystore.password = password
edc.web.https.keymanager.password = password
edc.web.https.keystore.path = ./example/resources/keystore.pkcs
edc.web.https.keystore.type = PKCS12

# IDS AAS Extension specific
edc.aas.logPrefix = EDC-AAS-Extension-Consumer
edc.aas.exposeSelfDescription = False
# Timeouts in seconds
edc.aas.client.waitForAgreementTimeout = 15
edc.aas.client.waitForTransferTimeout = 30
edc.aas.client.acceptAllProviderOffers = true
edc.aas.client.acceptedContractOffersPath = ./example/resources/acceptedContractOffers.json

# EDC specific values
web.http.port=9191
web.http.path=/api
web.http.management.port=9192
web.http.management.path=/api/v1/data
web.http.protocol.port = 9292
web.http.protocol.path = /api/v1/ids

edc.api.auth.key=password

# IDS specific (see EDC/data-protocols/ids/ids-core/README.md)
edc.ids.id = urn:connector:consumer
edc.ids.title = "Eclipse Dataspace Connector with AAS support"
edc.ids.description = "EDC with extension IDS-AAS-App enabled"
edc.ids.maintainer = iosb
edc.ids.curator = https://example.com
edc.ids.endpoint = https://example.com
edc.ids.security.profile = base
edc.ids.catalog.id = urn:catalog:default

# Set this to the address at which another connector can reach your connector,
# as it is used as a callback address during the contract negotiation,
# where messages are exchanged asynchronously. If you change the IDS API port,
# make sure to adjust the webhook address accordingly.
ids.webhook.address=https://localhost:9292
52 changes: 52 additions & 0 deletions example/configurations/provider-https.properties
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
# HTTPS config
edc.web.https.keystore.password = password
edc.web.https.keymanager.password = password
edc.web.https.keystore.path = ./example/resources/keystore.pkcs
edc.web.https.keystore.type = PKCS12

# AAS Extension specific
edc.aas.logPrefix = EDC-AAS-Extension
# Supply AAS model + (port XOR AAS service config) for an AAS service internally started by the extension
edc.aas.localAASModelPath = ./example/resources/FestoDemoAAS.json
edc.aas.localAASServicePort = 8080
# edc.aas.localAASServiceConfigPath = ./example/resources/exampleConfig.json
# Provide a URL of an already running AAS service (such as FA³ST, BaSyx)
# edc.aas.remoteAasLocation = http://example.com/aas
# Period of synchronizing the EDC assetStore with the connected AAS services (in seconds)
edc.aas.syncPeriod = 100
# Expose self description
# Path to a default access policy definition file
# edc.aas.defaultAccessPolicyDefinitionPath = ...
# Path to a default contract policy definition file
# edc.aas.defaultContractPolicyDefinitionPath = ...


# EDC specific, mostly default values
# Port and path for custom http services such as SelfDescription
web.http.port=8181
web.http.path=/api
# Port and path for requesting an EDC to communicate with another EDC by IDS messages (consumer-provider)
web.http.management.port=8182
web.http.management.path=/api/v1/data
# Port and path for IDS messages (from another EDC)
web.http.protocol.port = 8282
web.http.protocol.path = /api/v1/ids

edc.transfer.functions.enabled.protocols = http
# Connector hostname, which e.g. is used in referer urls
edc.hostname = localhost
# Auth key for using internal EDC api (header key: x-api-key)
edc.api.auth.key=password

# IDS specific (see EDC/data-protocols/ids/ids-core/README.md)
edc.ids.id = urn:connector:provider
edc.ids.title = "Eclipse Dataspace Connector with AAS support"
edc.ids.description = "EDC with extension IDS-AAS-App enabled"
edc.ids.maintainer = iosb
edc.ids.curator = https://example.com
edc.ids.endpoint = https://example.com
edc.ids.security.profile = base
edc.ids.catalog.id = urn:catalog:default

# Set this to the address at which another connector can reach your connector, as it is used as a callback address during the contract negotiation, where messages are exchanged asynchronously. If you change the IDS API port, make sure to adjust the webhook address accordingly.
ids.webhook.address=http://localhost:8282
10 changes: 8 additions & 2 deletions example/dataspaceconnector-configuration.properties
Original file line number Diff line number Diff line change
@@ -1,3 +1,9 @@
# HTTPS config
edc.web.https.keystore.password = password
edc.web.https.keymanager.password = password
edc.web.https.keystore.path = ./resources/keystore.pkcs
edc.web.https.keystore.type = PKCS12

# Useful for debugging the extension since this will automatically be called when no config parameter is given
# AAS Extension specific
edc.aas.logPrefix = EDC-AAS-Extension
Expand Down Expand Up @@ -35,7 +41,7 @@ web.http.management.path=/api/v1/data
web.http.protocol.port = 8282
web.http.protocol.path = /api/v1/ids

edc.transfer.functions.enabled.protocols = http
edc.transfer.functions.enabled.protocols = https
# Connector hostname, which e.g. is used in referer urls
edc.hostname = localhost
# Auth key for using internal EDC api (header key: x-api-key)
Expand All @@ -52,4 +58,4 @@ edc.ids.security.profile = base
edc.ids.catalog.id = urn:catalog:default

# Set this to the address at which another connector can reach your connector, as it is used as a callback address during the contract negotiation, where messages are exchanged asynchronously. If you change the IDS API port, make sure to adjust the webhook address accordingly.
ids.webhook.address=http://localhost:8282
ids.webhook.address=https://localhost:8282
Binary file added example/resources/keystore.pkcs
Binary file not shown.