Closed andrea-dintino closed 4 months ago
Move the keys out of the micro services folder I suggest ~/.didroom
+ do not allow to overwrite secret files (aka test existence before writing)
Thus secret keys and custom well-known will be store in a separate folder from the one containing the actual zencode. I think that a small modification on env variables and the Makefile could do the trick 🚀 If we like this I can start to work on it
Thus secret keys and custom well-known will be store in a separate folder from the one containing the actual zencode. I think that a small modification on env variables and the Makefile could do the trick 🚀 If we like this I can start to work on it
It's okay! Please try to avoid logic inside the makefile, as much as you can, but put the logic into the zencode contracts within the autorun.
Yes my idea was to put all the logics in zenroom, but I'm finding some problems:
FILES_DIR=~/.didroom
I have no way to read the well-knowns under the public
directory (This can be fixed by writing the well-known in the announce keys in the .autorun
folder)Superseeded by #127
Microservices are continously re-deployed (currently manually) from files generated by the dashboard.
The Microservices have an announce flow that, if no keys/DIDs are found, creates keys and registers DIDs.
We need a mechanism (manual or automatic) to allow users to redeploy updated microservices, while preserving the existing keys/DIDs.
Currently the secret keys are stored in the credential_issuer/secret.keys (the same for all the microservices)
Possible strategies: