You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Update doc strings with new ws url
* Update names and routes to match current config
* Update route and names to match api split
* Update routes/names to match api split
* 🎨
* drop generic
---------
Co-authored-by: ff137 <[email protected]>
Copy file name to clipboardexpand all lines: app/main.py
+3-3
Original file line number
Diff line number
Diff line change
@@ -46,11 +46,11 @@
46
46
47
47
Our WebSocket endpoints are as follows:
48
48
49
-
1. `/ws/topic/{topic}`: (Admin only) This endpoint allows admins to receive all webhook events on a specific topic (e.g. `connections`, `credentials`, `proofs`, `endorsements`).
49
+
1. `/v1/ws/topic/{topic}`: (Admin only) This endpoint allows admins to receive all webhook events on a specific topic (e.g. `connections`, `credentials`, `proofs`, `endorsements`).
50
50
51
-
2. `/ws/{wallet_id}`: This endpoint allows authenticated users to receive webhook events associated with a specific wallet ID.
51
+
2. `/v1/ws/{wallet_id}`: This endpoint allows authenticated users to receive webhook events associated with a specific wallet ID.
52
52
53
-
3. `/ws/{wallet_id}/{topic}`: Similar to above, but with topic-specific subscription.
53
+
3. `/v1/ws/{wallet_id}/{topic}`: Similar to above, but with topic-specific subscription.
54
54
55
55
For authentication, the WebSocket headers should include `x-api-key`: `<your key>`.
1. Go to the [Governance Cloud API](http://localhost:8100/docs)
94
-
2. Execute the PUT endpoint to set a Public DID: `/wallet/dids/public?did=`
93
+
1. Go to the [CloudAPI-Governance](http://localhost:8200/docs)
94
+
2. Execute the PUT endpoint to set a Public DID: `/v1/wallet/dids/public?did=`
95
95
3. Use the DID that you anchored to the ledger in step 3
96
96
4. A successful response should look like this. You can also query the Public DID Endpoint `/wallet/dids/public` of the Governance Agent to confirm that the public DID is now set:
Copy file name to clipboardexpand all lines: docs/Common Steps.md
+11-4
Original file line number
Diff line number
Diff line change
@@ -2,7 +2,14 @@
2
2
3
3
This document will guide you through some common steps and interactions. Please read it carefully, and feel free to open an issue if further questions arise or if you spot a mistake.
4
4
5
-
>**Note:** It is always helpful to inspect the CloudAPI Swagger UI to understand the available endpoints, their expected inputs, and the corresponding outputs. If requests fail, check the Swagger UI to ensure you've called the correct endpoint with the correct data. The Swagger UI is accessible at [http://localhost:8100/docs](http://localhost:8100/docs) under a vanilla setup. If you find any model to be unclear from the document below, try finding it in Swagger UI before opening an issue. This document describes only some basic steps; more detailed workflows can be found [here](./Example%20Flows.md).
5
+
>**Note:** It is always helpful to inspect the CloudAPI Swagger UI to understand the available endpoints, their expected inputs, and the corresponding outputs. If requests fail, check the Swagger UI to ensure you've called the correct endpoint with the correct data. The Swagger UI is accessible at:
> under a vanilla setup. If you find any model to be unclear from the document below, try finding it in Swagger UI before opening an issue. This document describes only some basic steps; more detailed workflows can be found [here](./Example%20Flows.md).
6
13
7
14
It is also recommended to set up a webhook listener (refer to our [Webhooks doc](./Webhooks.md)). This will significantly aid in understanding the activities occurring in the ACA-Py instances in the background.
8
15
@@ -25,7 +32,7 @@ The admin "wallet" is already configured as it is not a subwallet on a multi-ten
25
32
}
26
33
```
27
34
28
-
Send this to the `/admin/tenants` endpoint. You can omit the roles field altogether or pass "issuer" and/or "verifier". All payloads are documented in Swagger, so if in doubt, consult the [Swagger docs](http://localhost:8100/docs).
35
+
Send this to the `/tenant-admin/v1/admin/tenants` endpoint. You can omit the roles field altogether or pass "issuer" and/or "verifier". All payloads are documented in Swagger, so if in doubt, consult the [CloudAPI-Multitenant-Admin](http://localhost:8100/docs).
29
36
30
37
Creating a tenant with roles will update the trust registry by writing an entry for an `actor`, including wallet details and its associated roles.
31
38
@@ -53,7 +60,7 @@ To create schemas and effectively write them to the ledger as well as registerin
53
60
}
54
61
```
55
62
56
-
Note that you will need to have a public DID to do so (if your agent lacks one, you can use the governance role to create one: see [Bootstrapping the Trust Ecosystem](./Bootstrap%20Trust%20Ecosystem.md)). Run the request with the header from 1. and the payload from 2. against the CloudAPI URL and endpoint `/admin/governance/schemas/` (POST method). Upon success, the created schema will be returned.
63
+
Note that you will need to have a public DID to do so (if your agent lacks one, you can use the governance role to create one: see [Bootstrapping the Trust Ecosystem](./Bootstrap%20Trust%20Ecosystem.md)). Run the request with the header from 1. and the payload from 2. against the [CloudAPI-Governance URL](http://localhost:8200/docs) and endpoint `/v1/definitions/schemas` (POST method). Upon success, the created schema will be returned.
57
64
58
65
## Issuing a Credential
59
66
@@ -62,7 +69,7 @@ To create schemas and effectively write them to the ledger as well as registerin
62
69
3. Issuer creates credential definition
63
70
4. Create a connection between the issuer and prospect holder
64
71
65
-
1. Create an invitation using either the issuer or the holder using the `/connections` endpoint of the CloudAPI. Here, you will also need to authenticate via the header, e.g., using
72
+
1. Create an invitation using either the issuer or the holder using the `/v1/connections/create-invitation` endpoint of the [CloudAPI-Tenant URL](http://localhost:8300/docs). Here, you will also need to authenticate via the header, e.g., using
Copy file name to clipboardexpand all lines: docs/Governance as Code.md
+14-14
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
5
5
Schemas are used to define attributes related to credentials. To define schemas for your trust ecosystem, follow the steps below:
6
6
7
-
1. Access the API through the [Governance Cloud API](http://localhost:8100/docs).
7
+
1. Access the API through the [Governance Cloud API](http://localhost:8200/docs).
8
8
2. Authenticate with `governance.` + `APIKEY` role.
9
9
3. Generate a new schema with a `POST` to the following API endpoint: `/v1/definitions/schemas`.
10
10
@@ -27,9 +27,9 @@ Creating new tenants in the multi-tenant environment for the various tenant type
27
27
28
28
Tenants are custodial wallets created within the Trust Ecosystem's multitenant AcaPy agent. To create new tenants for your trust ecosystem, follow the steps below:
29
29
30
-
1. Access the API through the [Governance Cloud API](http://localhost:8100/docs).
30
+
1. Access the API through the [CloudAPI-Multitenant-Admin](http://localhost:8100/docs).
31
31
2. Authenticate with `tenant-admin.` + `APIKEY` role.
32
-
3. Create a new tenant with a `POST` to the following API endpoint: `/admin/tenants/`, using the example request body below.
32
+
3. Create a new tenant with a `POST` to the following API endpoint: `/tenant-admin/v1/admin/tenants/`, using the example request body below.
33
33
34
34
```json
35
35
{
@@ -62,9 +62,9 @@ An example of a successful response to create a new Issuer Tenant:
62
62
63
63
Tenants, functioning as custodial wallets, are established within the Trust Ecosystem's multitenant AcaPy agent. Follow the steps below to create new tenants for your trust ecosystem:
64
64
65
-
1. Access the API through [Governance Cloud API](http://localhost:8100/docs)
65
+
1. Access the API through [CloudAPI-Multitenant-Admin](http://localhost:8100/docs)
66
66
2. Authenticate using the `tenant-admin.`+`APIKEY` role
67
-
3. Generate a new tenant with a `POST` request to the API endpoint `/admin/tenants/` using the request body detailed in the example below
67
+
3. Generate a new tenant with a `POST` request to the API endpoint `/tenant-admin/v1/admin/tenants/` using the request body detailed in the example below
68
68
69
69
```json
70
70
{
@@ -97,9 +97,9 @@ Tenants, functioning as custodial wallets, are established within the Trust Ecos
97
97
98
98
Similar to Verifiers, Tenants for Holders are created within the Trust Ecosystem's multitenant AcaPy agent. Follow these steps to create new Holders for your trust ecosystem:
99
99
100
-
1. Access the API through [Governance Cloud API](http://localhost:8100/docs)
100
+
1. Access the API through [CloudAPI-Multitenant-Admin](http://localhost:8100/docs)
101
101
2. Authenticate using `tenant-admin.`+`APIKEY` role
102
-
3. Generate a new tenant with a `POST` to the API endpoint `/admin/tenants/` using the request body in the example below
102
+
3. Generate a new tenant with a `POST` to the API endpoint `/tenant-admin/v1/admin/tenants/` using the request body in the example below
103
103
104
104
```json
105
105
{
@@ -131,7 +131,7 @@ Credential definitions are expected to be created by all **_Issuers_** within th
131
131
132
132
To create credential definitions through the `Transaction Endorser Protocol` for trust ecosystem _issuers_, follow the steps below:
133
133
134
-
1. Access the [Cloud API Swagger UI](http://localhost:8100/docs)
134
+
1. Access the [CloudAPI-Tenant Swagger UI](http://localhost:8300/docs)
135
135
2. Authenticate as an Issuer using `tenant.`+`JWTKey` x-api-key
136
136
3. Create a new schema with a `POST` to the API endpoint `/v1/definitions/credentials` using the request body illustrated in the example below.
137
137
@@ -158,13 +158,13 @@ To create credential definitions through the `Transaction Endorser Protocol` for
158
158
159
159
To query entries in the Trust Registry, adhere to the following steps:
160
160
161
-
1. Access the [Cloud API Swagger UI](http://localhost:8100/docs)
161
+
1. Access the [CloudAPI-Public Swagger UI](http://localhost:8400/docs)
162
162
2. Authenticate as an Issuer using `tenant.`+`JWTKey` role
163
163
164
164
>NOTE: The Trust Registry is currently public and accessible to anyone on the internet
165
165
166
166
3. The trust-registry has 5 GET endpoints:
167
-
-`GET``/trust-registry/schemas` will return all schemas on the trust registry
167
+
-`GET``/v1/trust-registry/schemas` will return all schemas on the trust registry
168
168
169
169
Response:
170
170
@@ -197,7 +197,7 @@ To query entries in the Trust Registry, adhere to the following steps:
197
197
]
198
198
```
199
199
200
-
- `GET` `/trust-registry/schemas/{schema_id}` will return the schema based on id passed
200
+
- `GET` `/v1/trust-registry/schemas/{schema_id}` will return the schema based on id passed
201
201
202
202
Response:
203
203
@@ -210,7 +210,7 @@ To query entries in the Trust Registry, adhere to the following steps:
210
210
}
211
211
```
212
212
213
-
- `GET` `/trust-registry/actors` will return all actors on the trust registry
213
+
- `GET` `/v1/trust-registry/actors` will return all actors on the trust registry
214
214
- Optionally one of the following query parameters can be passed to get a specific actor:
215
215
- `actor_did`
216
216
- `actor_id`
@@ -251,5 +251,5 @@ To query entries in the Trust Registry, adhere to the following steps:
251
251
]
252
252
```
253
253
254
-
- `GET` `/trust-registry/actors/issuers` will return all actors with `issuer` as a role
255
-
- `GET` `/trust-registry/actors/verifiers` will return all actors with `verifier` as a role
254
+
- `GET` `/v1/trust-registry/actors/issuers` will return all actors with `issuer` as a role
255
+
- `GET` `/v1/trust-registry/actors/verifiers` will return all actors with `verifier` as a role
Copy file name to clipboardexpand all lines: docs/README.md
+9-2
Original file line number
Diff line number
Diff line change
@@ -11,9 +11,16 @@
11
11
12
12
## First Steps
13
13
14
-
After spinning up the containers following the [Quick Start Guide](Quick%20Start%20Guide.md), you are ready to rumble. Navigating to the [Swagger UI](http://localhost:8100/docs/) provides a good overview of the intended functionalities. You'll see that there are `generic` endpoints for common actions, wallet specific actions, and admin actions. On top of that, you'll find trust registry and webhooks endpoints.
14
+
After spinning up the containers following the [Quick Start Guide](Quick%20Start%20Guide.md), you are ready to rumble. Navigating to the **Swagger UI** :
15
15
16
-
>NOTE: Regardless of the multitude of containers and mechanisms running, [CloudAPI](http://localhost:8100) and its [Swagger UI](http://localhost:8100/docs) are the main interaction points intended between clients and the stack. This should be the only endpoint clients should interact with. There is no need (and no intention to allow) for clients to directly interact with the webhooks or trust registry container. For a production deployment or a close-to-production/smoke-testing deployment, you are well advised to only expose this endpoint to clients and leave all other endpoints unexposed to the outside world.
provides a good overview of the intended functionalities. You'll see that there are endpoints for common actions, wallet specific actions, and admin actions. On top of that, you'll find trust registry and webhooks endpoints.
22
+
23
+
>NOTE: Regardless of the multitude of containers and mechanisms running in **CloudAPI**, its aforementioned Swagger UI's are the main interaction points intended between clients and the stack. This should be the only endpoints clients should interact with. There is no need (and no intention to allow) for clients to directly interact with the webhooks or trust registry container. For a production deployment or a close-to-production/smoke-testing deployment, you are well advised to only expose this endpoint to clients and leave all other endpoints unexposed to the outside world.
Copy file name to clipboardexpand all lines: docs/examples/1. Onboarding.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
# 1: Onboarding Tenants
2
2
3
-
When onboarding users, also referred to as tenants or wallets, you need to use the `tenant-admin` role. Below, you will find the curl commands used to create an `Issuer`, `Verifier` and a `Holder`. If you are using the [Swagger UI](http://localhost:8100/docs) to do the onboarding, just use the JSON in the field marked with `-d` in the curl commands.
3
+
When onboarding users, also referred to as tenants or wallets, you need to use the `tenant-admin` role. Below, you will find the curl commands used to create an `Issuer`, `Verifier` and a `Holder`. If you are using the [CloudAPI-Multitenant-Admin Swagger UI](http://localhost:8100/docs) to do the onboarding, just use the JSON in the field marked with `-d` in the curl commands.
4
4
5
5
The difference between an `Issuer`, `Verifier` and `Holder` is that issuers and verifiers have privileged roles, and are therefore written to the trust registry, allowing them to issue credentials and to verify proof requests in our ecosystem. A holder is a regular tenant without a role, and therefore cannot act as an issuer or verifier. They are all "tenants", and therefore each will have a tenant access token.
6
6
@@ -10,7 +10,7 @@ The difference between an `Issuer`, `Verifier` and `Holder` is that issuers and
0 commit comments