gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[taler-docs] branch master updated: document new configuration layout


From: gnunet
Subject: [taler-docs] branch master updated: document new configuration layout
Date: Wed, 04 Aug 2021 19:38:29 +0200

This is an automated email from the git hooks/post-receive script.

dold pushed a commit to branch master
in repository docs.

The following commit(s) were added to refs/heads/master by this push:
     new 58cf85f  document new configuration layout
58cf85f is described below

commit 58cf85f57a11641ae254cbf54b1246b187f9eb69
Author: Florian Dold <florian@dold.me>
AuthorDate: Wed Aug 4 19:38:24 2021 +0200

    document new configuration layout
---
 taler-exchange-setup-guide.rst | 94 +++++++++++++++++++++++++-----------------
 1 file changed, 57 insertions(+), 37 deletions(-)

diff --git a/taler-exchange-setup-guide.rst b/taler-exchange-setup-guide.rst
index f950484..0853d7d 100644
--- a/taler-exchange-setup-guide.rst
+++ b/taler-exchange-setup-guide.rst
@@ -33,8 +33,8 @@ We recommend the setup of offline signing keys to be done on 
a second machine th
 does not have internet access.
 
 In the guide, we mark commands that are supposed to be executed on the online
-exchange machine as `[root@exchange-online]#` / `[$user@exchange-online]$` and 
commands for the offline
-machine as `[root@exchange-offline]#` /`[$user@exchange-offline]$`.  It is 
possible to do the entire setup
+exchange machine as ``[root@exchange-online]#`` / ``[$user@exchange-online]$`` 
and commands for the offline
+machine as ``[root@exchange-offline]#`` / ``[$user@exchange-offline]$``.  It 
is possible to do the entire setup
 on one machine, but we do not recommend this for security reasons.
 
 
@@ -145,14 +145,14 @@ Services, users, groups and file system hierarchy
 The *taler-exchange-httpd* package will create several system users
 to compartmentalize different parts of the system:
 
-  * taler-exchange-httpd: runs the HTTP daemon with the core business logic
-  * taler-exchange-secmod-rsa: manages the RSA private online signing keys
-  * taler-exchange-secmod-eddsa: manages the EdDSA private online signing keys
-  * taler-exchange-closer: closes idle reserves by triggering wire transfers 
that refund the originator
-  * taler-exchange-aggregator: aggregates deposits into larger wire transfer 
requests
-  * taler-exchange-wire: performs wire transfers with the bank (via 
libeufin/nexus)
-  * postgres: runs the Postgres database (from *postgres* package)
-  * www-data: runs the frontend HTTPS service with the TLS keys (from *nginx* 
package)
+* taler-exchange-httpd: runs the HTTP daemon with the core business logic
+* taler-exchange-secmod-rsa: manages the RSA private online signing keys
+* taler-exchange-secmod-eddsa: manages the EdDSA private online signing keys
+* taler-exchange-closer: closes idle reserves by triggering wire transfers 
that refund the originator
+* taler-exchange-aggregator: aggregates deposits into larger wire transfer 
requests
+* taler-exchange-wire: performs wire transfers with the bank (via 
libeufin/nexus)
+* postgres: runs the Postgres database (from *postgres* package)
+* www-data: runs the frontend HTTPS service with the TLS keys (from *nginx* 
package)
 
 .. note::
 
@@ -162,34 +162,34 @@ to compartmentalize different parts of the system:
 
 The exchange setup uses the following system groups:
 
-  * taler-exchange-db: group for all Taler users with direct database access, 
specifically taler-exchange-httpd, taler-exchange-wire, taler-exchange-closer 
and taler-exchange-aggregator
-  * taler-exchange-secmod: group for processes with access to online signing 
keys, so taler-exchange-secmod-rsa, taler-exchange-secmod-eddsa and 
taler-exchange-httpd
-  * taler-exchange-offline: group for the access to the offline private key 
(only used on the offline host and not used on the online system)
+* taler-exchange-db: group for all Taler users with direct database access, 
specifically taler-exchange-httpd, taler-exchange-wire, taler-exchange-closer 
and taler-exchange-aggregator
+* taler-exchange-secmod: group for processes with access to online signing 
keys, so taler-exchange-secmod-rsa, taler-exchange-secmod-eddsa and 
taler-exchange-httpd
+* taler-exchange-offline: group for the access to the offline private key 
(only used on the offline host and not used on the online system)
 
 
 The package will deploy systemd service files in
 ``/usr/lib/systemd/system/`` for the various components:
 
-  * taler-exchange-aggregator.service: service that schedules wire transfers 
which combine multiple deposits to the same merchant
-  * taler-exchange-closer.service: service that watches for reserves that have 
been abandoned and schedules wire transfers to send the money back to the 
originator
-  * taler-exchange-httpd.service: main Taler exchange logic with the public 
REST API
-  * taler-exchange-httpd.socket: systemd socket activation for the Taler 
exchange HTTP daemon
-  * taler-exchange-secmod-eddsa.service: software security module for making 
EdDSA signatures
-  * taler-exchange-secmod-rsa.service: software security module for making RSA 
signatures
-  * taler-exchange-transfer.service: service that triggers outgoing wire 
transfers (pays merchants)
-  * taler-exchange-wirewatch.service: service that watches for incoming wire 
transfers (first step of withdraw)
-  * taler-exchange.target: Main target for the Taler exchange to be operational
+* taler-exchange-aggregator.service: service that schedules wire transfers 
which combine multiple deposits to the same merchant
+* taler-exchange-closer.service: service that watches for reserves that have 
been abandoned and schedules wire transfers to send the money back to the 
originator
+* taler-exchange-httpd.service: main Taler exchange logic with the public REST 
API
+* taler-exchange-httpd.socket: systemd socket activation for the Taler 
exchange HTTP daemon
+* taler-exchange-secmod-eddsa.service: software security module for making 
EdDSA signatures
+* taler-exchange-secmod-rsa.service: software security module for making RSA 
signatures
+* taler-exchange-transfer.service: service that triggers outgoing wire 
transfers (pays merchants)
+* taler-exchange-wirewatch.service: service that watches for incoming wire 
transfers (first step of withdraw)
+* taler-exchange.target: Main target for the Taler exchange to be operational
 
 
 The deployment creates the following key locations in the system:
 
-  * /etc/taler/: configuration files
-  * /var/run/taler/: contains the UNIX domain sockets for inter-process 
communication (IPC)
-  * /var/lib/taler/: serves as the $HOME for all Taler users and contains 
sub-directories
-    with the private keys; which keys are stored here depends on the host:
+* /etc/taler/: configuration files
+* /var/run/taler/: contains the UNIX domain sockets for inter-process 
communication (IPC)
+* /var/lib/taler/: serves as the $HOME for all Taler users and contains 
sub-directories
+  with the private keys; which keys are stored here depends on the host:
 
-    - online system: exchange-secmod-eddsa and exchange-secmod-rsa keys
-    - offline system: exchange-offline keys
+  * online system: exchange-secmod-eddsa and exchange-secmod-rsa keys
+  * offline system: exchange-offline keys
 
 
 
@@ -250,20 +250,34 @@ Typically only one Wire Gateway is used.
 
 A Taler Wire Gateway is configured in a configuration section that follows the
 pattern ``exchange-account-$id``, where ``$id`` is an internal identifier for
-the bank account accessed with the Wire Gateway. The configuration file
-``/etc/taler/conf.d/exchange-system.conf`` by default loads the section
-``exchange-account-1`` from the secret file
-``/etc/taler/secrets/exchange-accounts.secret.conf``.  The latter file
-should already be only readable for the taler-exchange-wire user.  Other
+the bank account accessed by the exchange.  The basic information for an 
account should
+be put in ``/etc/taler/conf.d/exchange-business.conf``.
+The secret credentials to access the Taler Wire Gateway API should
+be put into a corresponding ``exchange-accountcredentials-$id`` section
+in ``/etc/taler/secrets/exchange-accountcredentials.conf``.
+The latter file
+should already be only readable for the ``taler-exchange-wire`` user.  Other
 exchange processes should not have access to this information.
 
 .. code-block:: ini
-  :caption: /etc/taler/secrets/exchange-accounts.secret.conf
+  :caption: /etc/taler/secrets/exchange-business.conf
 
   [exchange-account-1]
   enable_credit = yes
   enable_debit = yes
 
+  # Account identifier in the form of an RFC-8905 payto:// URI
+  # For SEPA, looks like payto://sepa/$IBAN
+  payto_uri =
+
+  @inline-secret@ exchange-accountcredentials-1 
../secrets/exchange-accountcredendials.secret.conf
+
+
+.. code-block:: ini
+  :caption: /etc/taler/secrets/exchange-accountcredentials.secret.conf
+
+  [exchange-accountcredentials-1]
+
   # LibEuFin expects basic auth
   wire_gateway_auth_method = basic
 
@@ -274,9 +288,6 @@ exchange processes should not have access to this 
information.
   # base URL of the wire gateway set up with LibEuFin
   wire_gateway_url = ...
 
-  # Account identifier in the form of an RFC-8905 payto:// URI
-  # For SEPA, looks like payto://sepa/$IBAN
-  payto_uri =
 
 The Wire Gateway configuration can be tested with the following command:
 
@@ -531,6 +542,15 @@ a merchant backend is not required, as the wallet acts as 
a merchant.
   # After enough time has passed, the money should arrive at the specified IBAN
 
 
+Summary of Variables
+====================
+
+This section summarizes all placeholder variables used in this document.
+
+
+TBD.
+
+
 FIXMEs
 ======
 

-- 
To stop receiving notification emails like this one, please contact
gnunet@gnunet.org.



reply via email to

[Prev in Thread] Current Thread [Next in Thread]