Step 2: Build the EIF for Eliza
The below steps are the same as building any custom Enclave Image File (EIF) and deploying it to Oyster CVM as mentioned in the Oyster CVM tutorials in the previous sections.
Step 2.1: Save the docker image
-
Save the docker image to a file.
docker save eliza > image.tar
Step 2.2: Build the EIF
-
Build the EIF using Oyster CVM.
oyster-cvm build --platform amd64 --docker-compose ./docker-compose-oyster.yaml --docker-images ./image.tar --commit-ref d55823a03d860e734075be405baf78448551aa70
Note: Update the platform type to arm64 or amd64 based on your docker image.
Note: Do not change the commit-ref value. This specific commit is required for this task to incorporate the Pulse server which manages your secrets.
-
The output will be stored in the
resultdirectory. It'll contain theeiffile, logs and the PCR in a JSON file. -
Go through the Oyster CVM deploy documentation for more details and options available or you can also run -
oyster-cvm build --help
Step 2.3: Build the Pulse Client to add secrets to the Eliza agent after deployment
-
Clone the Oyster Monorepo in another directory.
git clone https://github.com/marlinprotocol/oyster-monorepo.git -b roshan/pulse -
Build the Pulse Client.
cd oyster-monorepo/initialization/pulse
cargo build --release --bin pulse-client