ansible-taler-exchange

Ansible playbook to deploy a production Taler Exchange
Log | Files | Refs | Submodules | README | LICENSE

commit bf57389f360b37a2d8a331b189c2b8883da2b7a4
parent 13d369ef50fa13b891577cadcfe904c11224929f
Author: Florian Dold <florian@dold.me>
Date:   Fri, 13 Jun 2025 00:23:58 +0200

configure BANK_COMPLIANCE_LANGUAGE for gls

Diffstat:
Mroles/exchange/templates/etc/taler-exchange/conf.d/exchange-business.conf.j2 | 19+++++++++++++------
1 file changed, 13 insertions(+), 6 deletions(-)

diff --git a/roles/exchange/templates/etc/taler-exchange/conf.d/exchange-business.conf.j2 b/roles/exchange/templates/etc/taler-exchange/conf.d/exchange-business.conf.j2 @@ -32,6 +32,11 @@ ATTRIBUTE_ENCRYPTION_KEY = {{ EXCHANGE_ATTRIBUTE_ENCRYPTION_KEY }} TERMS_ETAG = {{ EXCHANGE_TERMS_ETAG }} PRIVACY_ETAG = {{ EXCHANGE_PP_ETAG }} +{% if DEPLOYMENT_KIND == "gls" %} +BANK_COMPLIANCE_LANGUAGE = gls +{% endif %} + + # Bank accounts used by the exchange should be specified here: [exchange-account-primary] @@ -45,6 +50,14 @@ PAYTO_URI = {{ EXCHANGE_BANK_ACCOUNT_PAYTO }} WIRE_METHOD = iban + +[exchange-sanctionscheck] +RATER_COMMAND = /usr/bin/robocop /var/lib/taler-exchange/{{ SANCTION_LIST }} + +# Name where we store the sanctions check offset. +MIN_ROW_FILENAME = ${HOME}/.cache/sanctionscheck-offset.bin + + # Credentials to access the account are in a separate # config file with restricted permissions. @inline-secret@ exchange-accountcredentials-primary ../secrets/exchange-accountcredentials-primary.secret.conf @@ -53,9 +66,3 @@ WIRE_METHOD = iban # config files with restricted permissions. @inline-secret@ kyc-provider-kycaid-individual ../secrets/exchange-kyc-provider-individual.secret.conf @inline-secret@ kyc-provider-kycaid-business ../secrets/exchange-kyc-provider-business.secret.conf - -[exchange-sanctionscheck] -RATER_COMMAND = /usr/bin/robocop /var/lib/taler-exchange/{{ SANCTION_LIST }} - -# Name where we store the sanctions check offset. -MIN_ROW_FILENAME = ${HOME}/.cache/sanctionscheck-offset.bin