Skip to main content

Step 2: Build the EIF for Eliza

The below steps are the same as building any custom Enclave Image File (EIF) and deploying it to Oyster CVM as mentioned in the Oyster CVM tutorials in the previous sections.

Step 2.1: Save the docker image

  • Save the docker image to a file.

    docker save eliza > image.tar

Step 2.2: Build the EIF

  • Build the EIF using Oyster CVM.

    oyster-cvm build --platform amd64 --docker-compose ./docker-compose-oyster.yaml --docker-images ./image.tar --commit-ref d55823a03d860e734075be405baf78448551aa70

Note: Update the platform type to arm64 or amd64 based on your docker image.

Note: Do not change the commit-ref value. This specific commit is required for this task to incorporate the Pulse server which manages your secrets.

  • The output will be stored in the result directory. It'll contain the eif file, logs and the PCR in a JSON file.

  • Go through the Oyster CVM deploy documentation for more details and options available or you can also run -

    oyster-cvm build --help

Step 2.3: Build the Pulse Client to add secrets to the Eliza agent after deployment

  • Clone the Oyster Monorepo in another directory.

    git clone https://github.com/marlinprotocol/oyster-monorepo.git -b roshan/pulse
  • Build the Pulse Client.

    cd oyster-monorepo/initialization/pulse
    cargo build --release --bin pulse-client