Service setup

Installation guide for CREDEBL Platform Services

Before installing the CREDEBL Platform services, it is essential to ensure that your environment meets certain prerequisites. Properly setting up these requirements will help facilitate a smooth installation process and optimal performance of the platform. This includes preparing your system with the necessary software dependencies, configuring the required network settings, and ensuring adequate hardware resources. Following these guidelines will help prevent potential issues and ensure that the CREDEBL Platform services are installed and operate as intended.

System requirements

Here is the list of software needed to get started:


Prerequisites

Here is the list of prerequisites software we will need for CREDEBL:

Clone Repository

Clone the platform repository from GitHub:

Environment Variables

To help you quick start, a .env.demo is already present at the root of the platform repository. To getting started, rename .env.demo to .env Please find your-ip in the .env file, and replace all occurrences it with your machine's Ip address.

If you want to know more about the environment variables, please refer to .env.sample file which is given at root of the repository.

Apart from the already present variables, you need to add few variables generated from the below prerequisites like the PostgreSQL, Keycloak, Sendgrid, AWS S3, etc at the respective steps.

PostgreSQL

PostgreSQL is a powerful, open-source object-relational database system known for its robustness and advanced features. This guide provides instructions for installing and configuring PostgreSQL both natively and using Docker. Installing PostgreSQL

Initially we'll need to install postures on the host or on docker

Access the PostgreSQL and create user and database

Optional: In case you customize the database details, you need to update this

Add the appropriate postgres environment variable to the .env file

You can read more about prisma connection URLs in PostgreSQL here: https://www.prisma.io/docs/orm/overview/databases/postgresql

NATS

The CREDEBL platform utilizes NATS for message-driven data exchange between its micro-services.

NATS configurations
  1. NATS Configuration File (nats-server.conf) The configuration file defines how the NATS server operates, including port assignments and WebSocket support.

  • port: The main port for NATS communication is set to 4222.

  • max_payload: Sets the maximum message payload size to 4 MB.

  • websocket: Enables WebSocket support on port 443 without TLS (for unsecured communication).

  1. docker-compose.yml File

  • The docker-compose.yml file will define the NATS service, map the necessary ports, and bind the configuration file.

To create your Nkeys, you can refer NATS tool nk as per their official documentation

  • container_name: Sets the name of the container to nats.

  • image: Uses the official NATS Docker image.

  • command: Passes the NATS configuration file to the container at startup.

  • ports: Exposes three key ports:

    • 4222: Main NATS client communication port.

    • 6222: Routing port for NATS clusters.

    • 8222: HTTP monitoring port for server statistics and health checks.

  • volumes: Mounts the nats-server.conf configuration file into the container as read-only (ro).

  1. Start the NATS Server

To start the NATS server, run the following command from the directory containing the docker-compose.yml file:

REDIS

The CREDEBL platform leverages Redis as an in-memory data store, primarily for caching and queuing.

REDIS configurations

To set up Redis for the CREDEBL platform, follow the steps below to create and launch a Redis instance using Docker.

  1. Create the docker-compose.yml File The docker-compose.yml file is used to define and configure the Redis container for the platform.

  1. Start REDIS Server Once the docker-compose.redis.yml file is in place, start the Redis service by running the following command:

Keycloak

Keycloak is an open source identity and access management solution

  1. Run Keycloak using docker:

This command installs and starts Keycloak at the specified endpoints, locally accessible at http://localhost:8080.

  1. Once logged in:

    This section guides you through the initial setup and configuration of Keycloak through its administration console.

    1. Go to administration console

    2. Login using username: admin, password: admin.

    3. Click on the Keycloak dropdown on the top left and add a new realm as “credebl-platform” by clicking on 'Create realm'.

    4. Go to 'Clients' under 'Manage' in the sidebar on the left and create new client as a clientId = “adminClient”.

    5. Click on Next Button

    6. Set client authentication to ON mode.

    7. Set Service Accounts Roles to ON mode.

    8. Set Direct Access Grants to ON mode.

    9. Click on Next Button

    10. Add http://your-url/* (Eg.: http://localhost:3000/*) in Valid Redirect URIs as front-end url.

    11. Add http://your-url/ (Eg.: http://localhost:8080/) in Web Origins.

    adminClient details
    1. Save the details

  2. Service Account Roles Settings:

    This section outlines the configuration of service account roles to manage permissions and access control within Keycloak.

    assigned service role
    1. If not already inside, go to adminClient from the clients in the side bar.

    2. Go to the Service account role section.

    3. Click on the Assign role button.

    4. Select Filter by clients from the dropdown menu.

    5. Select the below roles from the Available Roles and click on the Assign button:

      • Create-client

      • Manage-client

      • Manage-users

      • Query-clients

      • Query-users

      • View-clients

      • View-users

  3. Realm Roles Settings:

    This section covers the configuration of realm role settings within Keycloak.

Holder realm role

Under the credebl-platform realm, from the menu select realm-roles.

  • Under the credebl-platform realm, from the menu select realm-roles.

  • In realm-roles, click on Create Role and create a role with Role name=“holder”

When a new user registers on the platform we are assigning them a “holder” role from the realm.

  1. SSO Session Settings: Set SSO Session Idle to 2 days. This is the expiration time of the refresh token if the user is idle on the platform. We can configure this as per our need. To navigate to SSO Session, go to Realm settings option on left sidebar under configure, now under the Sessions tab you can see SSO Session Idle.\

  2. Update the .env

    Update the .env file for the Keycloak details: To set the env variable KEYCLOAK_MANAGEMENT_CLIENT_SECRET, in credebl-platform realm, go to clients >> adminClient. Now in the Credentials tab, copy the client secret

Keycloak client credentials
Optional: Add users manually

This section provides guidance on adding users manually to the Keycloak realm.

  1. Go to users.

  2. Add username: [email protected] and email: [email protected].

  3. Enable user and email, then click on save.

  4. Change the password in the credential section for user login.

  5. Update the Keycloak userId in the users table in the local database.

  6. Also update the client secret key in the .env file, which you will get in the credential section of adminClient in the client section.

  7. Test the flow by logging in to platform admin.

SendGrid

Create a SendGrid account, generate an API key, and grant necessary permissions for sending emails.

Make a note of the API-key as well as the email used, as this will be laterused in our .env and during Installation

  • Add the send grid key in the .env

AWS S3

To utilize all functionalities of CREDEBL, total of 3 S3 buckets are required for;

  1. Storing Organization logo during creating and updating an organization

  2. Bulk issuance of credentials

  3. Storing connection URL generated from Agent and creating shortened URL

From the above mentioned, 1 and 2 can be skipped, if the respective functionality of adding organization logo and Bulk issuance is unused

According to the AWS_S3_STOREOBJECT_BUCKET name, as per the AWS S3 path style, add domain to access objects from the bucket and save it, as it is utilized for the another .env variable

Note: Usually, SHORTENED_URL_DOMAIN for bucket names with dot ( . ) in it comes after '/': https://s3.AWS_S3_STOREOBJECT_REGION.amazonaws.com/bucket-name. While others without a dot(.) are often referred as a subdomain: https://bucket-name.AWS_S3_STOREOBJECT_REGION.amazonaws.com

Schema File Server

Clone Repository

Clone the platform repository from GitHub:

Environment Variables

To help you quick start, a .env.demo is already present at the root of the platform repository. To getting started, rename .env.demo to .env Please find JWT_TOKEN_SECRET in the .env file and replace its value with a base64-encoded JWT token.

Note: You can create JWT Token using the following command: node -e "console.log(require('crypto').randomBytes(32).toString('hex'))"

Service Setup

  1. Build the Docker Image

  2. Run the Docker Container

    • -d: Run container in detached mode

    • --env-file .env: Load environment variables from the .env file

    • -p 4000:4000: Map host port 4000 to container port 4000

    • -v "$PWD/app/schemas:/app/schemas": Mount the local app/schemas directory into the container

    • --name schema-file-server: Assign a name to the container

    • schema-file-server: The name of the Docker image

Update .env and agent.env

  • Update the schema file server token and URL in both the .env and agent.env files.

Agent Setup

The Docker image built during this process is used to launch agents for new organizations on the CREDEBL platform.The Docker image name is set as an environment variable during the platform setup in a later step.

The default image for agent is ghcr.io/credebl/credo-controller:latest refering to latest release of the credo-controller. Refer here: https://github.com/credebl/credo-controller/pkgs/container/credo-controller

Optional: In case you want to build your own image for the agent
  • Clone the following repository:

  • Use following commands to install and upgrade Yarn:

  • To install the dependencies use following command:

  • Build Agent controller using the following command:

  • Create Docker Image using following command :

Mention credo controller version or any tag name. Note the same version will also be needed in the .env against the variable AFJ_VERSION

  • Add the Docker Image tag in the .env

SSO (Single Sign-On) (Applicable for V 2.1.0 onwards)

  • If applications consuming CREDEBL want to use SSO feature, additional environment variables need to be set on the backend side as well.Please refer to the env.demo file for the required values when running the Platform.

  • As part of session management, for users who want to use the client ID / client secret based token generation feature, we have updated the response to include cookies. Using these cookies, users can fetch their session details.

    • To fetch the session details, call the following API while passing the stored cookies in the request headers:

      • /auth/sessionDetails

Installations

Make sure the .env file is set with all the required environment variables as per the sample file and the env guide give above.

Before you start the services make sure to update the credebl-master-table.json present at location, libs/prisma-service/prisma/data sendgrid details as well as your ip-address

At the root of the platfrom repo:

Now seed the db, before starting the services using the following:

Since, you are in the '/prisma-service', move back to the root

Start the services:

To start container from pre-built docker images

In case we want to start services using the latest images from CREDEBL you can start services using the following command:

Access the Platform API by navigating to http://localhost:5000

Last updated