Awesome
GreenLight
GreenLight (an instance of decentralized workFlow) demonstrates a basic application for deploying the VON-X library, in order to enable issuer registration, claims verification, and credential submission to TheOrgBook. It includes Docker tooling for deployment of the application behind a Caddy reverse proxy.
greenlight
is being developed as part of the Verifiable Organizations Network (VON). For more information on VON see https://vonx.io. Even, better - join in with what we are doing and contribute to VON and the Indy community.
The GreenLight Business Scenario
The business problem addressed in this demo is a business trying to get Business Permits and Licences in their local municipality. Getting such authorizations are complicated processes, often requiring contacting multiple jurisdictions to acquire multiple credentials - licenses, permits, registrations, etc., each of which may require the presentation of previously acquired credentials from other sources. GreenLight simplifies the problem by:
- Asking the user to select the business goal they are trying to achieve. For example, a Business Licence to open a restaurent, or a "Dog and Cat Breeder" permit.
- Starting from the goal, evaluating the Hyperledger Indy prerequisite proof request to determine the credentials needed to acquire that credential.
- Repeating that process for each pre-requisite credential until all the necessary licenses are determined
- Presenting the user with a list of the credentials needed and the order of acquisition necessary to meet the prerequisites - e.g. starting from the credentials that have no prerequisites.
- Laying over that the list of Credentials the business has already acquired.
- Allowing the user to click from the list of needed credentials screen to either the application for that credential (if not yet acquired), or to TheOrgBook screen to see the already acquired credential.
Running a Complete VON Network
A quick start guide for running a complete local VON Network (including a local Indy Network, an instance of TheOrgBook and GreenLight) can be found in the VON Network Quick Start Guide.
Running Locally
Instructions for running just GreenLight locally can be found in the GreenLight docker folder.
Running a Shared Instance
GreenLight can be run on a server for multiple users. The docker
folder provides guidance of what needs to be set up. Likewise, the openshift
folder contains an example of deploying GreenLight to a Red Hat OpenShift
instance.
Services
Services are defined using config files. See ./config folders for examples of the existing services.
Caveats
On dev machines
- For Django's hot-reloading to work in development, the src directory needs to mounted as a volume. This only works when one "service" is defined in the docker-compose.yml since multiple services will clobber each other's config files that get copied in.
Adding a new issuing service to GreenLight
The steps below describe how to add and register a new issuer service to a GreenLight instance.
Prerequisites:
- You have followed the OpenShift Scripts environment setup instructions to install and configure the scripts for use on your system (only for OpenShift deployments).
Create Configuration Files
First, create the configuration files for the new issuer service. For more information on creating and setting up the configuration files, please refer to the documentation in von-agent-template.
Update Caddy Configuration
Caddy needs to be configured to support proxying requests to the new agent. To do this, add the following proxy instructions to the Caddyfile, making sure to replace myorg with the mnemonic you previously picked.
proxy /myorg/health {%MYORG_AGENT_HOST%}:{%MYORG_AGENT_PORT%} {
without /worksafe
}
proxy /myorg {%MYORG_AGENT_HOST%}:{%MYORG_AGENT_PORT%} {
except /assets
transparent
fail_timeout 0
}
Update Docker Configuration
In docker-compose.yml
:
- add a section describing the new issuer service. Use the exisisting agents as example, and make sure to update any references to configuration files, etc.
- remember to also add a volume for the agent, making sure the volume name and the environment variables match what is in the configuration.
...
myorg-agent:
build:
context: ..
dockerfile: docker/agent/Dockerfile
environment:
DOCKERHOST: ${DOCKERHOST}
APPLICATION_URL: ${APPLICATION_URL:-http://localhost:5000}
ENDPOINT_URL: ${ENDPOINT_URL:-http://localhost:5000}
CONFIG_ROOT: ../config/agri-agent
ENVIRONMENT: ${ENVIRONMENT:-default}
INDY_LEDGER_URL: ${LEDGER_URL:-http://localhost:9000}
LOG_LEVEL: ${LOG_LEVEL:-}
PYTHON_ENV: ${PYTHON_ENV:-development}
TOB_API_URL: ${TOB_API_URL:-}
TOB_APP_URL: ${TOB_APP_URL:-}
POSTGRESQL_WALLET_HOST: ${POSTGRESQL_WALLET_HOST}
POSTGRESQL_WALLET_PORT: ${POSTGRESQL_WALLET_PORT}
POSTGRESQL_WALLET_USER: ${POSTGRESQL_USER}
POSTGRESQL_WALLET_PASSWORD: ${POSTGRESQL_PASSWORD}
POSTGRESQL_WALLET_ADMIN_PASSWORD: ${POSTGRESQL_ADMIN_PASSWORD}
WALLET_ENCRYPTION_KEY: ${WALLET_ENCRYPTION_KEY}
INDY_WALLET_TYPE: ${INDY_WALLET_TYPE}
INDY_WALLET_SEED: ${MYORG_WALLET_SEED:-}
networks:
- orgbook
- vonx
depends_on:
- agent-wallet-db
volumes:
- myorg-agent-wallet:/home/indy/.indy_client/wallet
...
volumes:
myorg-agent-wallet:
...
- add environment variables and dependencies referencing the new agent to the
proxy-dev
andcaddy
services
proxy-dev:
image: "abiosoft/caddy:no-stats"
environment:
...
MYORG_AGENT_HOST: ${MYORG_AGENT_HOST}
MYORG_AGENT_PORT: ${MYORG_AGENT_PORT}
...
depends_on:
...
- myorg-agent
...
...
caddy:
image: greenlight
environment:
...
MYORG_AGENT_HOST: ${MYORG_AGENT_HOST}
MYORG_AGENT_PORT: ${MYORG_AGENT_PORT}
...
depends_on:
- myorg-agent
...
In the manage
script in the docker directory:
- export the environment variables for the new agent. See how this is done for other agents in the configuration section related to "caddy".
export MYORG_AGENT_HOST=${MYORG_AGENT_HOST:-myorg-agent}
export MYORG_AGENT_PORT=${MYORG_AGENT_PORT:-8000}
- add the new agent to the
DEFAULT_CONTAINERS
list.
DEFAULT_CONTAINERS="agent-wallet-db myorg-agent bcreg-agent ministry-finance-agent city-surrey-agent fraser-valley-agent liquor-control-agent worksafe-agent"
Update OpenShift Configuration
If you use OpenShift, you will be interested in adding a new deployment configuration for the new agent, and updating the deployment configuration for GreenLight to correctly proxy requests.
- In the
openshift/agents
folder, copy one of the existing agents deployment configurations and create a new one.- Make sure to update the name and all the variables in the deployment configuration to reflect the new agent mnemonic picked for the configuration files.
- from within the
openshift
folder, rungenParams.sh
create the parameter files for the new deployment configuration. - create an
.overrides.sh
file for the new agent, following one of the other agents as example.