You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.rst
+3-2Lines changed: 3 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -187,6 +187,7 @@ The following options can be configured on the server:
187
187
strictmode true When set, insecure settings are forbidden.
188
188
url Public facing URL of the server (required). Must be HTTPS when strictmode is set.
189
189
verbosity info Log level (trace, debug, info, warn, error)
190
+
httpclient.timeout 30s Request time-out for HTTP clients, such as '10s'. Refer to Golang's 'time.Duration' syntax for a more elaborate description of the syntax.
190
191
tls.certfile PEM file containing the certificate for the server (also used as client certificate).
191
192
tls.certheader Name of the HTTP header that will contain the client certificate when TLS is offloaded.
192
193
tls.certkeyfile PEM file containing the private key of the server certificate.
@@ -208,7 +209,7 @@ The following options can be configured on the server:
208
209
crypto.vault.timeout 5s Timeout of client calls to Vault, in Golang time.Duration string format (e.g. 1s).
209
210
crypto.vault.token The Vault token. If set it overwrites the VAULT_TOKEN env var.
210
211
**Discovery**
211
-
discovery.client.update_interval 1m0s How often to check for Discovery Services updates, specified as Golang duration (e.g. 1m, 1h30m).
212
+
discovery.client.update_interval 10m0s How often to check for Discovery Services updates, specified as Golang duration (e.g. 1m, 1h30m).
212
213
discovery.definitions.directory Directory to load Discovery Service Definitions from. If not set, the discovery service will be disabled. If the directory contains JSON files that can't be parsed as service definition, the node will fail to start.
213
214
discovery.server.definition_ids [] IDs of the Discovery Service Definitions for which to act as server. If an ID does not map to a loaded service definition, the node will fail to start.
214
215
**Events**
@@ -228,7 +229,7 @@ The following options can be configured on the server:
228
229
http.default.auth.type Whether to enable authentication for the default interface, specify 'token_v2' for bearer token mode or 'token' for legacy bearer token mode.
229
230
http.default.cors.origin [] When set, enables CORS from the specified origins on the default HTTP interface.
230
231
**JSONLD**
231
-
jsonld.contexts.localmapping [https://www.w3.org/2018/credentials/v1=assets/contexts/w3c-credentials-v1.ldjson,https://w3id.org/vc/status-list/2021/v1=assets/contexts/w3c-statuslist2021.ldjson,https://w3c-ccg.github.io/lds-jws2020/contexts/lds-jws2020-v1.json=assets/contexts/lds-jws2020-v1.ldjson,https://schema.org=assets/contexts/schema-org-v13.ldjson,https://nuts.nl/credentials/v1=assets/contexts/nuts.ldjson] This setting allows mapping external URLs to local files for e.g. preventing external dependencies. These mappings have precedence over those in remoteallowlist.
232
+
jsonld.contexts.localmapping [https://nuts.nl/credentials/v1=assets/contexts/nuts.ldjson,https://www.w3.org/2018/credentials/v1=assets/contexts/w3c-credentials-v1.ldjson,https://w3id.org/vc/status-list/2021/v1=assets/contexts/w3c-statuslist2021.ldjson,https://w3c-ccg.github.io/lds-jws2020/contexts/lds-jws2020-v1.json=assets/contexts/lds-jws2020-v1.ldjson,https://schema.org=assets/contexts/schema-org-v13.ldjson] This setting allows mapping external URLs to local files for e.g. preventing external dependencies. These mappings have precedence over those in remoteallowlist.
232
233
jsonld.contexts.remoteallowlist [https://schema.org,https://www.w3.org/2018/credentials/v1,https://w3c-ccg.github.io/lds-jws2020/contexts/lds-jws2020-v1.json,https://w3id.org/vc/status-list/2021/v1] In strict mode, fetching external JSON-LD contexts is not allowed except for context-URLs listed here.
233
234
**Network**
234
235
network.bootstrapnodes [] List of bootstrap nodes ('<host>:<port>') which the node initially connect to.
flagSet.String("loggerformat", "text", "Log format (text, json)")
265
-
flagSet.Bool("strictmode", true, "When set, insecure settings are forbidden.")
266
-
flagSet.Bool("internalratelimiter", true, "When set, expensive internal calls are rate-limited to protect the network. Always enabled in strict mode.")
267
-
flagSet.String("datadir", "./data", "Directory where the node stores its files.")
268
-
flagSet.String("url", "", "Public facing URL of the server (required). Must be HTTPS when strictmode is set.")
269
-
flagSet.String("tls.certfile", "", "PEM file containing the certificate for the server (also used as client certificate).")
270
-
flagSet.String("tls.certkeyfile", "", "PEM file containing the private key of the server certificate.")
271
-
flagSet.String("tls.truststorefile", "truststore.pem", "PEM file containing the trusted CA certificates for authenticating remote servers.")
272
-
flagSet.String("tls.offload", string(NoOffloading), fmt.Sprintf("Whether to enable TLS offloading for incoming connections. "+
flagSet.String("loggerformat", defaultCfg.LoggerFormat, "Log format (text, json)")
285
+
flagSet.Bool("strictmode", defaultCfg.Strictmode, "When set, insecure settings are forbidden.")
286
+
flagSet.Bool("internalratelimiter", defaultCfg.InternalRateLimiter, "When set, expensive internal calls are rate-limited to protect the network. Always enabled in strict mode.")
287
+
flagSet.String("datadir", defaultCfg.Datadir, "Directory where the node stores its files.")
288
+
flagSet.String("url", defaultCfg.URL, "Public facing URL of the server (required). Must be HTTPS when strictmode is set.")
289
+
flagSet.Duration("httpclient.timeout", defaultCfg.HTTPClient.Timeout, "Request time-out for HTTP clients, such as '10s'. Refer to Golang's 'time.Duration' syntax for a more elaborate description of the syntax.")
290
+
flagSet.String("tls.certfile", defaultCfg.TLS.CertFile, "PEM file containing the certificate for the server (also used as client certificate).")
291
+
flagSet.String("tls.certkeyfile", defaultCfg.TLS.CertKeyFile, "PEM file containing the private key of the server certificate.")
292
+
flagSet.String("tls.truststorefile", defaultCfg.TLS.TrustStoreFile, "PEM file containing the trusted CA certificates for authenticating remote servers.")
293
+
flagSet.String("tls.offload", string(defaultCfg.TLS.Offload), fmt.Sprintf("Whether to enable TLS offloading for incoming connections. "+
273
294
"Enable by setting it to '%s'. If enabled 'tls.certheader' must be configured as well.", OffloadIncomingTLS))
274
-
flagSet.String("tls.certheader", "", "Name of the HTTP header that will contain the client certificate when TLS is offloaded.")
295
+
flagSet.String("tls.certheader", defaultCfg.TLS.ClientCertHeaderName, "Name of the HTTP header that will contain the client certificate when TLS is offloaded.")
275
296
276
297
// Maxvaliditydays has been deprecated in v5.x
277
298
flagSet.Int("tls.crl.maxvaliditydays", 0, "The number of days a CRL can be outdated, after that it will hard-fail.")
0 commit comments