diff --git a/weaver/core/drivers/fabric-driver/wallet-network1/relay.id b/weaver/core/drivers/fabric-driver/wallet-network1/relay.id index 869a4afca37..3d050f78f7e 100644 --- a/weaver/core/drivers/fabric-driver/wallet-network1/relay.id +++ b/weaver/core/drivers/fabric-driver/wallet-network1/relay.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nui0CIAKJsTHKi93RWjVaCH+eht17uQdGBd7Mjy978h6zySTP\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgzfBJHTugO94BIzYV\r\n1EAgArIQLGsd5flPqEmb4yzjZR6hRANCAAQk7D+FDRnEciwdbVVJSMmd2fUb2ibT\r\nwiIMabQoaOVBGO8CtKW9pYO303iAXoglGDWd3OLxbMYkcU+d2FexSKwK\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\npJzvAiB+PJnxtkNCRO8/SkapDgD0eyigIKTDPdRiY5Z7mTcE8g==\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgTZ+LtXT58KVa3qbI\r\nXo+NMe9zbNMLW6qUxoi/YjTGXbOhRANCAASVptZNTjxeRDtd5WUwKiBXHUczicGV\r\nNMTTVAlA48IsQaTTImHGVTsHktZqq/Uw/nMpPOf/4wSEb0qfLefN5MSc\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/core/drivers/fabric-driver/wallet-network2/relay.id b/weaver/core/drivers/fabric-driver/wallet-network2/relay.id index d8bdac49540..37e3c2d1286 100644 --- a/weaver/core/drivers/fabric-driver/wallet-network2/relay.id +++ b/weaver/core/drivers/fabric-driver/wallet-network2/relay.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\naI8CIChWjdEDXucOWwaGACecmWwffgVwICnvyrmQ8oSPiWLw\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgzy3mhTq9CoG/u3u7\r\n0KZYU5cg/9otYKeGMV+IADpqF3ChRANCAAQaknGrpAUGalBRgj27L95pA3b2+FW6\r\nq0Lg1v2h8CbTs26GX0aAq/zcJHEFT/sTa6ztQSvkoLDZrFwMywXfOw0S\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nMoXHAiAxJGfHM7ip/W83AJMdPu7XwaVvXIASfTtyB6UBnxvfJA==\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgVyKszKf33WTsan5B\r\nZrPTMHbX8ML0gUetSQolHqhQHVChRANCAAQILWNNrxw+RFNgGECMxD7R/NW7hHOc\r\nWxGuUbw17dU3H8DwvB5r/V6o/3YTyVym1P/MKiEwPz9z1pif38oAwLu/\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/access-control.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/access-control.json index f2feef9ecd3..b773b9524dd 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/access-control.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/access-control.json @@ -2,49 +2,49 @@ "securityDomain": "network1", "rules": [ { - "principal": "-----BEGIN CERTIFICATE-----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\n0p3o5sIWerFEdHZ7CRSgunlJvC8V\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nIl/v3iKbCglmnsk611jdPh0aRdsz\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\n0p3o5sIWerFEdHZ7CRSgunlJvC8V\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nIl/v3iKbCglmnsk611jdPh0aRdsz\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:30006#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#net.corda.samples.tokenizedhouse.flows.GetAssetPledgeStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICgTCCAiigAwIBAgIUG2Ihvr7B4clwiAztVGgZ2x0HdEAwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwNzU5\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAASHDpgIUGKEqwsxODBCrsXEfDUyOLrZiQNDjLsoWha/P71V+UFtq1N1OqfbB9pn\ncgvr/8BVqXhORPpJ8lZOP2djo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBQM6VLLJWlocxJX2MAAlfqK84xx0zAfBgNVHSMEGDAW\ngBSjqW3VHCTFVlj3wk5DlBb7yNs8kzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDRwAw\nRAIgNRcgYuDV5t0m8NOdEBNWfuH1s0K65OGOLIf83p5z9jECIBM0YdAQOBowcrko\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#net.corda.samples.tokenizedhouse.flows.GetAssetClaimStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICgTCCAiigAwIBAgIUG2Ihvr7B4clwiAztVGgZ2x0HdEAwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwNzU5\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAASHDpgIUGKEqwsxODBCrsXEfDUyOLrZiQNDjLsoWha/P71V+UFtq1N1OqfbB9pn\ncgvr/8BVqXhORPpJ8lZOP2djo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBQM6VLLJWlocxJX2MAAlfqK84xx0zAfBgNVHSMEGDAW\ngBSjqW3VHCTFVlj3wk5DlBb7yNs8kzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDRwAw\nRAIgNRcgYuDV5t0m8NOdEBNWfuH1s0K65OGOLIf83p5z9jECIBM0YdAQOBowcrko\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#com.cordaSimpleApplication.flow.GetAssetPledgeStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----\nMIICgjCCAiigAwIBAgIUXsPcXN7TAlH83i1GYw24BXuCv1AwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yMjEwMTkwOTQ0MDBaFw0yNDA1MzAxMTI4\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAATQEppNCkDtvsxhbDzcI3nW9ldw8xAXqVy/IVKLOzdE4R8HLVxiEYMSMbJAiQDX\nCF0w0wVX7y98K55/77FUmKQVo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBRYz2doIpfknBETZRLeJto4HUgnpTAfBgNVHSMEGDAW\ngBRjnLf7Ig7RWWfHMSkggxrPM5hbrzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDSAAw\nRQIhANJx9JPV02Vo3pZUtPRGXAv3hqFwNF6epqOsksjWCDkCAiBuPWqN3ONJ/iT+\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#com.cordaSimpleApplication.flow.GetAssetClaimStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#com.cordaSimpleApplication.flow.GetBondAssetPledgeStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#com.cordaSimpleApplication.flow.GetBondAssetClaimStatusByPledgeId:*", "read": true diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/membership.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/membership.json index c02add53e17..d91bfa82186 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/membership.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network1/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----\nMIICKjCCAdGgAwIBAgIUdHQvmhtJKADA+C/+t1SwugAFSQcwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcyLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcyLm5ldHdvcmsxLmNvbTAeFw0yMjEwMTkwOTQ0MDBaFw0zNzEwMTUwOTQ0\nMDBaMHIxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEaMBgG\nA1UEChMRb3JnMi5uZXR3b3JrMS5jb20xDzANBgNVBAsTBkZhYnJpYzEdMBsGA1UE\nAxMUY2Eub3JnMi5uZXR3b3JrMS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAAR/XHMDDKB3RH3T3MyqRwj7Qkgm5bwRVvwRflbwXofU2V14bOEQ4APk6VhEtGPB\nF/95F7p1bIxLiVEO2ve+ANS0o0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/\nBAgwBgEB/wIBATAdBgNVHQ4EFgQUzM0N2UeftTD0p9rIUU4UPACYNocwCgYIKoZI\nzj0EAwIDRwAwRAIgJa4rejQXSzOF6Fww6iSnZtSKlbuIACLzMs1DEHIr9L0CICjI\nQdzRaVCsWK7XcG46FtI0chD23t4kFzpbVl+hhMst\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nz6xJM1mo+JF0ZlwVBr7wFKVfzgtvlwkpVktgIQV5ug==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file +{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neN2U/C2X2oZifhAOas7x/WozDDwbQJ0pcXbhz/Rz\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----\nMIICKjCCAdGgAwIBAgIUcws+2zc99L2cl7+VRQAIGntaoTQwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zOTA2MTQwNjIw\nMDBaMHIxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEaMBgG\nA1UEChMRb3JnMS5uZXR3b3JrMS5jb20xDzANBgNVBAsTBkZhYnJpYzEdMBsGA1UE\nAxMUY2Eub3JnMS5uZXR3b3JrMS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAASRCfXL0J5PiLLUyqluS5Fi4OZ+OSZiZe+KAmXkBwByC7uyc+N9LQSMd3srdc+y\nFJtwRKbmi/DJcPL14HrZa3+Ko0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/\nBAgwBgEB/wIBATAdBgNVHQ4EFgQUo6lt1RwkxVZY98JOQ5QW+8jbPJMwCgYIKoZI\nzj0EAwIDRwAwRAIgHw4EO3aWTcK8Q07brs35YDEnxPWlQUU60j9HHbHEmwcCIEQR\nacHYPAXBEdRuIwMuZuZd8N8dXeM3PE4jKMZQurCP\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/access-control.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/access-control.json index 2207608ed54..113c8cd603f 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/access-control.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/access-control.json @@ -2,13 +2,13 @@ "securityDomain": "network2", "rules": [ { - "principal": "-----BEGIN CERTIFICATE-----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\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:10006#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----\nMIICUDCCAfegAwIBAgIUeeOR/dieeIlKyt2GV098/C8TAfMwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsyLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsyLmNvbTAeFw0yMjEwMTkxMjA3MDBaFw0zMjEwMTkwMDEy\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAAT9eQoprN/YqJiRC5okvLOqqokAcNMy1WfuAZKazuj7\n6KKG7fnCwz710gvvNhxwiQTjQWRHG1uE6wVCB1apqZ5co4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSaIQrE1wG9KOYEQYQPBnKq\nXTOh/jAfBgNVHSMEGDAWgBTa2B8P3P/47A9fsAIcst7vwkrZlzBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNHADBE\nAiAGkpX+ZFTjzpbw8wUlhstlvcZagxK52NIyNSMu9PyNSgIgDX+7I/vSAq70oe2l\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "localhost:30006#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/membership.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/membership.json index d7314827314..620a8ad2f61 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/membership.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials/network2/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nuLv93Ni9hjHJ7c7J5tAPR1Cy8KT+F4+664KoDiFE\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neUv4Ri1zjWx+gn3Ylq3nzZDZh1gpohdmiMxbmNLJaA==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file +{"members":{"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\ncl37ou/O/oNuKXceG+hMp7QIHYvKF44Vt3uxyf61\n-----END CERTIFICATE-----\n"},"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nlkyN4Wnk82snkgrK4N/lCsgwc7UcQ4sGyjC8BQjj\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/access-control.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/access-control.json index 6d06621631b..7f94d7a1981 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/access-control.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/access-control.json @@ -2,49 +2,49 @@ "securityDomain": "network1", "rules": [ { - "principal": "-----BEGIN CERTIFICATE-----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\n0p3o5sIWerFEdHZ7CRSgunlJvC8V\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nIl/v3iKbCglmnsk611jdPh0aRdsz\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIUPDwbsFvyX1MrCdXormZuoPzzLwYwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yMjEwMTkxMjA2MDBaFw0zMjEwMTkwMDEx\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAATw5UmBhZBJQ4BE1i/0qJjmOXstlIpGfa9jIUj7LDfO\n9Z54X0zG7pFdyVS1G8jzFHznYqEwx3KL7UdUtZJapu+no4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSh0isswtURoLtYDakVeL0Z\nlBD+ADAfBgNVHSMEGDAWgBRjnLf7Ig7RWWfHMSkggxrPM5hbrzBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNIADBF\nAiEA7H8/Gltao5YzySWH+ZL2WzWFdTksHfutIqkn8pQJbMkCIERN9oR2iXirxkNC\n0p3o5sIWerFEdHZ7CRSgunlJvC8V\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIUU2gr2GYceKXUS8sN1pYhKNafD4IwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwODAw\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAASGW6JcHgcP1lS44vYNyoklETO9Wx/wUWTTKsiZng2U\nUHC/bUIwajUmzMyFKiFowok5SkVtblonvs3cOOO3M3lio4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBTDqjjwlstDeStHGxE2Hkki\nlJdK/jAfBgNVHSMEGDAWgBSjqW3VHCTFVlj3wk5DlBb7yNs8kzBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNIADBF\nAiEAkxIUs7586eSQCzVKRMmL8M5qsVvLU+SECmHXoug6kskCIFX3fAlpcJk11r1x\nIl/v3iKbCglmnsk611jdPh0aRdsz\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_network2_partya_1:10003#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----\nMIICgjCCAiigAwIBAgIUXsPcXN7TAlH83i1GYw24BXuCv1AwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yMjEwMTkwOTQ0MDBaFw0yNDA1MzAxMTI4\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAATQEppNCkDtvsxhbDzcI3nW9ldw8xAXqVy/IVKLOzdE4R8HLVxiEYMSMbJAiQDX\nCF0w0wVX7y98K55/77FUmKQVo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBRYz2doIpfknBETZRLeJto4HUgnpTAfBgNVHSMEGDAW\ngBRjnLf7Ig7RWWfHMSkggxrPM5hbrzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDSAAw\nRQIhANJx9JPV02Vo3pZUtPRGXAv3hqFwNF6epqOsksjWCDkCAiBuPWqN3ONJ/iT+\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#net.corda.samples.tokenizedhouse.flows.GetAssetPledgeStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICgTCCAiigAwIBAgIUG2Ihvr7B4clwiAztVGgZ2x0HdEAwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwNzU5\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAASHDpgIUGKEqwsxODBCrsXEfDUyOLrZiQNDjLsoWha/P71V+UFtq1N1OqfbB9pn\ncgvr/8BVqXhORPpJ8lZOP2djo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBQM6VLLJWlocxJX2MAAlfqK84xx0zAfBgNVHSMEGDAW\ngBSjqW3VHCTFVlj3wk5DlBb7yNs8kzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDRwAw\nRAIgNRcgYuDV5t0m8NOdEBNWfuH1s0K65OGOLIf83p5z9jECIBM0YdAQOBowcrko\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#net.corda.samples.tokenizedhouse.flows.GetAssetClaimStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----\nMIICgjCCAiigAwIBAgIUXsPcXN7TAlH83i1GYw24BXuCv1AwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yMjEwMTkwOTQ0MDBaFw0yNDA1MzAxMTI4\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAATQEppNCkDtvsxhbDzcI3nW9ldw8xAXqVy/IVKLOzdE4R8HLVxiEYMSMbJAiQDX\nCF0w0wVX7y98K55/77FUmKQVo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBRYz2doIpfknBETZRLeJto4HUgnpTAfBgNVHSMEGDAW\ngBRjnLf7Ig7RWWfHMSkggxrPM5hbrzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDSAAw\nRQIhANJx9JPV02Vo3pZUtPRGXAv3hqFwNF6epqOsksjWCDkCAiBuPWqN3ONJ/iT+\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#com.cordaSimpleApplication.flow.GetAssetPledgeStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICgTCCAiigAwIBAgIUG2Ihvr7B4clwiAztVGgZ2x0HdEAwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwNzU5\nMDBaMEIxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEOMAwGA1UEAxMFYWxpY2UwWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAASHDpgIUGKEqwsxODBCrsXEfDUyOLrZiQNDjLsoWha/P71V+UFtq1N1OqfbB9pn\ncgvr/8BVqXhORPpJ8lZOP2djo4HLMIHIMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMB\nAf8EAjAAMB0GA1UdDgQWBBQM6VLLJWlocxJX2MAAlfqK84xx0zAfBgNVHSMEGDAW\ngBSjqW3VHCTFVlj3wk5DlBb7yNs8kzBoBggqAwQFBgcIAQRceyJhdHRycyI6eyJo\nZi5BZmZpbGlhdGlvbiI6Im9yZzEuZGVwYXJ0bWVudDEiLCJoZi5FbnJvbGxtZW50\nSUQiOiJhbGljZSIsImhmLlR5cGUiOiJjbGllbnQifX0wCgYIKoZIzj0EAwIDRwAw\nRAIgNRcgYuDV5t0m8NOdEBNWfuH1s0K65OGOLIf83p5z9jECIBM0YdAQOBowcrko\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#com.cordaSimpleApplication.flow.GetAssetClaimStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#com.cordaSimpleApplication.flow.GetBondAssetPledgeStatusByPledgeId:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nhrG8VVa8EzTPv7yo0Y0nGPhunUJ/MA==\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#com.cordaSimpleApplication.flow.GetBondAssetClaimStatusByPledgeId:*", "read": true diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/membership.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/membership.json index c02add53e17..d91bfa82186 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/membership.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network1/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nQdzRaVCsWK7XcG46FtI0chD23t4kFzpbVl+hhMst\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nz6xJM1mo+JF0ZlwVBr7wFKVfzgtvlwkpVktgIQV5ug==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file +{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neN2U/C2X2oZifhAOas7x/WozDDwbQJ0pcXbhz/Rz\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nacHYPAXBEdRuIwMuZuZd8N8dXeM3PE4jKMZQurCP\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/access-control.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/access-control.json index f4772472e5f..f52dbbdcb45 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/access-control.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/access-control.json @@ -2,13 +2,13 @@ "securityDomain": "network2", "rules": [ { - "principal": "-----BEGIN CERTIFICATE-----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\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIUURApCqjaAlobIecfkt911/z1W1swCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsyLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsyLmNvbTAeFw0yNDA2MTcwNjI1MDBaFw0zNDA2MTUwODAw\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAASwUNOIxkCXH/p4ndkltB9LpFGR4V56+9CqKxIuWih9\n6LLuKzToujsrMC/6l+owYBPcBfpu5ynIQVerI1wFAnW0o4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSfK1IJBtyHoiSXMGwvF/qJ\nuXgUtDAfBgNVHSMEGDAWgBTilesMXvxSuqCr6Si0MKVXhJU9nDBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNIADBF\nAiEAmSD2Ei/h4mbfrm3pSaSJx1IXuXqzzqX0rEUa00n4N+YCIF51gwwFrOHS8283\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_partya_1:10003#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true }, { - "principal": "-----BEGIN CERTIFICATE-----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\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n", + "principal": "-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIUURApCqjaAlobIecfkt911/z1W1swCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsyLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsyLmNvbTAeFw0yNDA2MTcwNjI1MDBaFw0zNDA2MTUwODAw\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAASwUNOIxkCXH/p4ndkltB9LpFGR4V56+9CqKxIuWih9\n6LLuKzToujsrMC/6l+owYBPcBfpu5ynIQVerI1wFAnW0o4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSfK1IJBtyHoiSXMGwvF/qJ\nuXgUtDAfBgNVHSMEGDAWgBTilesMXvxSuqCr6Si0MKVXhJU9nDBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNIADBF\nAiEAmSD2Ei/h4mbfrm3pSaSJx1IXuXqzzqX0rEUa00n4N+YCIF51gwwFrOHS8283\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n", "principalType": "ca", "resource": "corda_network2_partya_1:10003#com.cordaSimpleApplication.flow.GetStateByKey:*", "read": true diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/membership.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/membership.json index d7314827314..620a8ad2f61 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/membership.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/credentials_docker/network2/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nuLv93Ni9hjHJ7c7J5tAPR1Cy8KT+F4+664KoDiFE\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neUv4Ri1zjWx+gn3Ylq3nzZDZh1gpohdmiMxbmNLJaA==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file +{"members":{"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\ncl37ou/O/oNuKXceG+hMp7QIHYvKF44Vt3uxyf61\n-----END CERTIFICATE-----\n"},"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nlkyN4Wnk82snkgrK4N/lCsgwc7UcQ4sGyjC8BQjj\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network1_UsersAndCerts.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network1_UsersAndCerts.json index 07fe80748e8..919da06e2b2 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network1_UsersAndCerts.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network1_UsersAndCerts.json @@ -1 +1 @@ -{"alice":"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","bob":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNmakNDQWlTZ0F3SUJBZ0lVQWcxWFJCc1BiRVV6dDNmYlVaUmZuUFgxeUs0d0NnWUlLb1pJemowRUF3SXcKY2pFTE1Ba0dBMVVFQmhNQ1ZWTXhGekFWQmdOVkJBZ1REazV2Y25Sb0lFTmhjbTlzYVc1aE1Sb3dHQVlEVlFRSwpFeEZ2Y21jeExtNWxkSGR2Y21zeExtTnZiVEVQTUEwR0ExVUVDeE1HUm1GaWNtbGpNUjB3R3dZRFZRUURFeFJqCllTNXZjbWN4TG01bGRIZHZjbXN4TG1OdmJUQWVGdzB5TWpFd01Ua3dPVFEwTURCYUZ3MHlOREExTXpBeE1USTQKTURCYU1FQXhNREFMQmdOVkJBc1RCRzl5WnpFd0RRWURWUVFMRXdaamJHbGxiblF3RWdZRFZRUUxFd3RrWlhCaApjblJ0Wlc1ME1URU1NQW9HQTFVRUF4TURZbTlpTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFClNxZ0pDUWFxNlJablBEVENxdlJiSFdZWVJrYkF5MkhheExrV2ZZMEdrUTZVYmZuMkdKU3NNak5qSVVHdCtvNzEKNzMwN1FPMHZIZ3VwV01zaVpaYUhNcU9CeVRDQnhqQU9CZ05WSFE4QkFmOEVCQU1DQjRBd0RBWURWUjBUQVFILwpCQUl3QURBZEJnTlZIUTRFRmdRVXYwYmhKenZpUnZPRVFjaHBKZE5CT0JSVGxNRXdId1lEVlIwakJCZ3dGb0FVClk1eTMreUlPMFZsbnh6RXBJSU1henpPWVc2OHdaZ1lJS2dNRUJRWUhDQUVFV25zaVlYUjBjbk1pT25zaWFHWXUKUVdabWFXeHBZWFJwYjI0aU9pSnZjbWN4TG1SbGNHRnlkRzFsYm5ReElpd2lhR1l1Ulc1eWIyeHNiV1Z1ZEVsRQpJam9pWW05aUlpd2lhR1l1Vkhsd1pTSTZJbU5zYVdWdWRDSjlmVEFLQmdncWhrak9QUVFEQWdOSUFEQkZBaUVBCjFWYzRWUmZXcTVBWFBNS0xCZVI5WWV0S2pXMWlWbG9VL0RFdFkwTVB6NklDSURRSWlHcWhUM0RZSzVJdFF2VDAKR1RCVFdpWElDdG84eDVUR3RrZHZvQUJ6Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K"} +{"alice":"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","bob":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNmVENDQWlTZ0F3SUJBZ0lVUmNEVXZEdTJBdnRtZHgwUFMvc1VZbGtNRGFrd0NnWUlLb1pJemowRUF3SXcKY2pFTE1Ba0dBMVVFQmhNQ1ZWTXhGekFWQmdOVkJBZ1REazV2Y25Sb0lFTmhjbTlzYVc1aE1Sb3dHQVlEVlFRSwpFeEZ2Y21jeExtNWxkSGR2Y21zeExtTnZiVEVQTUEwR0ExVUVDeE1HUm1GaWNtbGpNUjB3R3dZRFZRUURFeFJqCllTNXZjbWN4TG01bGRIZHZjbXN4TG1OdmJUQWVGdzB5TkRBMk1UY3dOakl3TURCYUZ3MHpOREEyTVRVd056VTUKTURCYU1FQXhNREFMQmdOVkJBc1RCRzl5WnpFd0RRWURWUVFMRXdaamJHbGxiblF3RWdZRFZRUUxFd3RrWlhCaApjblJ0Wlc1ME1URU1NQW9HQTFVRUF4TURZbTlpTUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJemowREFRY0RRZ0FFCnFSaTF4SnlnQU5LM0k3em12ck5GU3JibTU1TzA5Q0FEcmR6VSsvTDFRZ3dreUd0cjdoblJETE9nL0Y2Yy83dDEKemlNTFplektWd0Fuajc5QnE5TkFPYU9CeVRDQnhqQU9CZ05WSFE4QkFmOEVCQU1DQjRBd0RBWURWUjBUQVFILwpCQUl3QURBZEJnTlZIUTRFRmdRVXdZRGI2WGxFSnFBUWFaYVVDRmJnbm9va0x3TXdId1lEVlIwakJCZ3dGb0FVCm82bHQxUndreFZaWTk4Sk9RNVFXKzhqYlBKTXdaZ1lJS2dNRUJRWUhDQUVFV25zaVlYUjBjbk1pT25zaWFHWXUKUVdabWFXeHBZWFJwYjI0aU9pSnZjbWN4TG1SbGNHRnlkRzFsYm5ReElpd2lhR1l1Ulc1eWIyeHNiV1Z1ZEVsRQpJam9pWW05aUlpd2lhR1l1Vkhsd1pTSTZJbU5zYVdWdWRDSjlmVEFLQmdncWhrak9QUVFEQWdOSEFEQkVBaUJOCjhNZVRnK3dQRVI0ZTQzQk8zUkl2MkJYM3dsbXRkaVVSSEtOUHlQMEs5QUlnRC9VMG9STnRkTE11MFV1NksvT1MKRWFEZEh1QlN1Sk9tQWtEdDJRMkRtSDA9Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K","networkadmin":"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"} \ No newline at end of file diff --git a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network2_UsersAndCerts.json b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network2_UsersAndCerts.json index 91a7fb7d281..fda7b9719c0 100644 --- a/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network2_UsersAndCerts.json +++ b/weaver/samples/corda/corda-simple-application/clients/src/main/resources/config/remoteNetworkUsers/network2_UsersAndCerts.json @@ -1 +1 @@ -{"bob":"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","alice":"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"} +{"bob":"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","alice":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNnakNDQWlpZ0F3SUJBZ0lVYVAyczdBRThHanQxUW5UYS92T0I2TUFrREFvd0NnWUlLb1pJemowRUF3SXcKY2pFTE1Ba0dBMVVFQmhNQ1ZWTXhGekFWQmdOVkJBZ1REazV2Y25Sb0lFTmhjbTlzYVc1aE1Sb3dHQVlEVlFRSwpFeEZ2Y21jeExtNWxkSGR2Y21zeUxtTnZiVEVQTUEwR0ExVUVDeE1HUm1GaWNtbGpNUjB3R3dZRFZRUURFeFJqCllTNXZjbWN4TG01bGRIZHZjbXN5TG1OdmJUQWVGdzB5TkRBMk1UY3dOakkxTURCYUZ3MHpOREEyTVRVd056VTUKTURCYU1FSXhNREFMQmdOVkJBc1RCRzl5WnpFd0RRWURWUVFMRXdaamJHbGxiblF3RWdZRFZRUUxFd3RrWlhCaApjblJ0Wlc1ME1URU9NQXdHQTFVRUF4TUZZV3hwWTJVd1dUQVRCZ2NxaGtqT1BRSUJCZ2dxaGtqT1BRTUJCd05DCkFBU0NsckhpaFk1MmVNZnpBYkJXNGZuNjhuQUR0UzV4UUxJNVV5Z1hoOXV2S0ZqTm9SOWtkM3VobFhtZGNZb1gKaFJ1M1VrSTN0clRMYkI3alZUSTVEbHlFbzRITE1JSElNQTRHQTFVZER3RUIvd1FFQXdJSGdEQU1CZ05WSFJNQgpBZjhFQWpBQU1CMEdBMVVkRGdRV0JCUk9SSW53MU4rTnQ1R0l1MlZSWlVDVUlSNnVTVEFmQmdOVkhTTUVHREFXCmdCVGlsZXNNWHZ4U3VxQ3I2U2kwTUtWWGhKVTluREJvQmdncUF3UUZCZ2NJQVFSY2V5SmhkSFJ5Y3lJNmV5Sm8KWmk1QlptWnBiR2xoZEdsdmJpSTZJbTl5WnpFdVpHVndZWEowYldWdWRERWlMQ0pvWmk1RmJuSnZiR3h0Wlc1MApTVVFpT2lKaGJHbGpaU0lzSW1obUxsUjVjR1VpT2lKamJHbGxiblFpZlgwd0NnWUlLb1pJemowRUF3SURTQUF3ClJRSWhBSlJhSmdQLzRPN3BYaFArMGpzN1BrZmxoeTBpYzZCalV2ZEVoNmpKNUpDU0FpQVRVdGZmQmZLNTVZeksKM2RrK3FwSDNVN0VTeWlkbkNrV0gzOTJEd3ZHVThnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=","networkadmin":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUNxRENDQWs2Z0F3SUJBZ0lVUzlsSEltWTFKSkZmbk5WM1hoUG5oZk9rSzFnd0NnWUlLb1pJemowRUF3SXcKY2pFTE1Ba0dBMVVFQmhNQ1ZWTXhGekFWQmdOVkJBZ1REazV2Y25Sb0lFTmhjbTlzYVc1aE1Sb3dHQVlEVlFRSwpFeEZ2Y21jeExtNWxkSGR2Y21zeUxtTnZiVEVQTUEwR0ExVUVDeE1HUm1GaWNtbGpNUjB3R3dZRFZRUURFeFJqCllTNXZjbWN4TG01bGRIZHZjbXN5TG1OdmJUQWVGdzB5TkRBMk1UY3dOakkxTURCYUZ3MHpOREEyTVRVd09EQXcKTURCYU1Fa3hNREFMQmdOVkJBc1RCRzl5WnpFd0RRWURWUVFMRXdaamJHbGxiblF3RWdZRFZRUUxFd3RrWlhCaApjblJ0Wlc1ME1URVZNQk1HQTFVRUF4TU1ibVYwZDI5eWEyRmtiV2x1TUZrd0V3WUhLb1pJemowQ0FRWUlLb1pJCnpqMERBUWNEUWdBRTdGZzdHb2lBcENubzQxMmpWWUJoLzJPTkwrUG5RN0YweWlNTHUrTkIwMyt4MXF0QndzWWQKZDZZU0J0b0dvaVhaNjNQejNIREg4bjBkVFFkNjVLRkpocU9CNmpDQjV6QU9CZ05WSFE4QkFmOEVCQU1DQjRBdwpEQVlEVlIwVEFRSC9CQUl3QURBZEJnTlZIUTRFRmdRVWxjc2V5VzRvMWZQbHMyQ0tNTE40T2krQjl5c3dId1lEClZSMGpCQmd3Rm9BVTRwWHJERjc4VXJxZ3Era290RENsVjRTVlBad3dnWVlHQ0NvREJBVUdCd2dCQkhwN0ltRjAKZEhKeklqcDdJbWhtTGtGbVptbHNhV0YwYVc5dUlqb2liM0puTVM1a1pYQmhjblJ0Wlc1ME1TSXNJbWhtTGtWdQpjbTlzYkcxbGJuUkpSQ0k2SW01bGRIZHZjbXRoWkcxcGJpSXNJbWhtTGxSNWNHVWlPaUpqYkdsbGJuUWlMQ0p1ClpYUjNiM0pyTFdGa2JXbHVJam9pZEhKMVpTSjlmVEFLQmdncWhrak9QUVFEQWdOSUFEQkZBaUVBeDI1Z2hLaEwKQmVBZ3pMVExzODl6Y3dQVkcxSjg3RE51cWUwUUg1K1NBaU1DSURNRGttOVRtaTFoblpJM1JTalBRSno1UEJRTgp4U1VlNHcyZERTeXhEeXBTCi0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials/network1/membership.json b/weaver/samples/fabric/fabric-cli/src/data/credentials/network1/membership.json index c02add53e17..d91bfa82186 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials/network1/membership.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials/network1/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nQdzRaVCsWK7XcG46FtI0chD23t4kFzpbVl+hhMst\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nz6xJM1mo+JF0ZlwVBr7wFKVfzgtvlwkpVktgIQV5ug==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file +{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neN2U/C2X2oZifhAOas7x/WozDDwbQJ0pcXbhz/Rz\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nacHYPAXBEdRuIwMuZuZd8N8dXeM3PE4jKMZQurCP\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/access-control.json b/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/access-control.json index 3dad11c85ac..e738792e6a8 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/access-control.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/access-control.json @@ -1 +1 @@ -{"securityDomain":"network2","rules":[{"principal":"-----BEGIN CERTIFICATE-----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\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n","principalType":"certificate","resource":"mychannel:simplestate:Read:*","read":true}]} \ No newline at end of file +{"securityDomain":"network2","rules":[{"principal":"-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIUURApCqjaAlobIecfkt911/z1W1swCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsyLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsyLmNvbTAeFw0yNDA2MTcwNjI1MDBaFw0zNDA2MTUwODAw\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAASwUNOIxkCXH/p4ndkltB9LpFGR4V56+9CqKxIuWih9\n6LLuKzToujsrMC/6l+owYBPcBfpu5ynIQVerI1wFAnW0o4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSfK1IJBtyHoiSXMGwvF/qJ\nuXgUtDAfBgNVHSMEGDAWgBTilesMXvxSuqCr6Si0MKVXhJU9nDBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNIADBF\nAiEAmSD2Ei/h4mbfrm3pSaSJx1IXuXqzzqX0rEUa00n4N+YCIF51gwwFrOHS8283\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n","principalType":"certificate","resource":"mychannel:simplestate:Read:*","read":true}]} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/membership.json b/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/membership.json index d7314827314..620a8ad2f61 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/membership.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nuLv93Ni9hjHJ7c7J5tAPR1Cy8KT+F4+664KoDiFE\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neUv4Ri1zjWx+gn3Ylq3nzZDZh1gpohdmiMxbmNLJaA==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file +{"members":{"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\ncl37ou/O/oNuKXceG+hMp7QIHYvKF44Vt3uxyf61\n-----END CERTIFICATE-----\n"},"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----\nMIICKjCCAdGgAwIBAgIUSYr6b5xSUuhNUG1Sb0exM9TQ/DYwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcyLm5ldHdvcmsyLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcyLm5ldHdvcmsyLmNvbTAeFw0yNDA2MTcwNjI1MDBaFw0zOTA2MTQwNjI1\nMDBaMHIxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEaMBgG\nA1UEChMRb3JnMi5uZXR3b3JrMi5jb20xDzANBgNVBAsTBkZhYnJpYzEdMBsGA1UE\nAxMUY2Eub3JnMi5uZXR3b3JrMi5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC\nAAT3q7aptCzB/vPTExDemdbVVN6Rpj3SY7yq+JMg63zc8qwfi8J5qmXx2V6JqiQ7\n9EpRqlq26fIgpKpn4HLX1A1ro0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/\nBAgwBgEB/wIBATAdBgNVHQ4EFgQUEiEOnL0j02YzXatNq3/5sdBppnQwCgYIKoZI\nzj0EAwIDRwAwRAIgQm5PFjx6gRAPvKNJe9dic7AzdoxSkfonlJ+cgev8tMACIHbT\nlkyN4Wnk82snkgrK4N/lCsgwc7UcQ4sGyjC8BQjj\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/verification-policy.json b/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/verification-policy.json index eae326c408b..17526590d2b 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/verification-policy.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials/network2/verification-policy.json @@ -1 +1 @@ -{"securityDomain":"network2","identifiers":[{"pattern":"mychannel:simplestate:Read:*","policy":{"type":"Signature","criteria":["Org2MSP","Org1MSP"]}}]} \ No newline at end of file +{"securityDomain":"network2","identifiers":[{"pattern":"mychannel:simplestate:Read:*","policy":{"type":"Signature","criteria":["Org1MSP","Org2MSP"]}}]} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network1/membership.json b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network1/membership.json index c02add53e17..d91bfa82186 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network1/membership.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network1/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nQdzRaVCsWK7XcG46FtI0chD23t4kFzpbVl+hhMst\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nz6xJM1mo+JF0ZlwVBr7wFKVfzgtvlwkpVktgIQV5ug==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file +{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neN2U/C2X2oZifhAOas7x/WozDDwbQJ0pcXbhz/Rz\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nacHYPAXBEdRuIwMuZuZd8N8dXeM3PE4jKMZQurCP\n-----END CERTIFICATE-----\n"}},"securityDomain":"network1"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/access-control.json b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/access-control.json index 3dad11c85ac..e738792e6a8 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/access-control.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/access-control.json @@ -1 +1 @@ -{"securityDomain":"network2","rules":[{"principal":"-----BEGIN CERTIFICATE-----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\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n","principalType":"certificate","resource":"mychannel:simplestate:Read:*","read":true}]} \ No newline at end of file +{"securityDomain":"network2","rules":[{"principal":"-----BEGIN CERTIFICATE-----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\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n","principalType":"certificate","resource":"mychannel:simplestate:Read:*","read":true}]} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/membership.json b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/membership.json index d7314827314..620a8ad2f61 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/membership.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/membership.json @@ -1 +1 @@ -{"members":{"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nuLv93Ni9hjHJ7c7J5tAPR1Cy8KT+F4+664KoDiFE\n-----END CERTIFICATE-----\n"},"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\neUv4Ri1zjWx+gn3Ylq3nzZDZh1gpohdmiMxbmNLJaA==\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file +{"members":{"Org1MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\ncl37ou/O/oNuKXceG+hMp7QIHYvKF44Vt3uxyf61\n-----END CERTIFICATE-----\n"},"Org2MSP":{"type":"ca","value":"-----BEGIN CERTIFICATE-----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\nlkyN4Wnk82snkgrK4N/lCsgwc7UcQ4sGyjC8BQjj\n-----END CERTIFICATE-----\n"}},"securityDomain":"network2"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/verification-policy.json b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/verification-policy.json index eae326c408b..17526590d2b 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/verification-policy.json +++ b/weaver/samples/fabric/fabric-cli/src/data/credentials_docker/network2/verification-policy.json @@ -1 +1 @@ -{"securityDomain":"network2","identifiers":[{"pattern":"mychannel:simplestate:Read:*","policy":{"type":"Signature","criteria":["Org2MSP","Org1MSP"]}}]} \ No newline at end of file +{"securityDomain":"network2","identifiers":[{"pattern":"mychannel:simplestate:Read:*","policy":{"type":"Signature","criteria":["Org1MSP","Org2MSP"]}}]} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network1_UsersAndCerts.json b/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network1_UsersAndCerts.json index 07fe80748e8..919da06e2b2 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network1_UsersAndCerts.json +++ b/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network1_UsersAndCerts.json @@ -1 +1 @@ -{"alice":"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","bob":"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"} +{"alice":"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","bob":"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","networkadmin":"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"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network2_UsersAndCerts.json b/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network2_UsersAndCerts.json index 91a7fb7d281..fda7b9719c0 100644 --- a/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network2_UsersAndCerts.json +++ b/weaver/samples/fabric/fabric-cli/src/data/remoteNetworkUsers/network2_UsersAndCerts.json @@ -1 +1 @@ -{"bob":"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","alice":"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"} +{"bob":"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","alice":"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","networkadmin":"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"} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network1/alice.id b/weaver/samples/fabric/fabric-cli/src/wallet-network1/alice.id index f241a4335a7..6b376668ea4 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network1/alice.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network1/alice.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nOHyMrvNVk2rEfWf1shd3hPzMEN9Iww==\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgf+pHPbwcrKHTq0YQ\r\nk3O8iw+OGMnjl7Pvt+NSnobkreehRANCAATQEppNCkDtvsxhbDzcI3nW9ldw8xAX\r\nqVy/IVKLOzdE4R8HLVxiEYMSMbJAiQDXCF0w0wVX7y98K55/77FUmKQV\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nLwCBEUe07ExiyaUtR8FbUG1fiNmp\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgI0LuhEvNsjkjmi2+\r\nxARO0c0e9iOVu0cihyz+0E/c4IihRANCAASHDpgIUGKEqwsxODBCrsXEfDUyOLrZ\r\niQNDjLsoWha/P71V+UFtq1N1OqfbB9pncgvr/8BVqXhORPpJ8lZOP2dj\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network1/bob.id b/weaver/samples/fabric/fabric-cli/src/wallet-network1/bob.id index 2595f0980df..350f843a055 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network1/bob.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network1/bob.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nGTBTWiXICto8x5TGtkdvoABz\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLiFXlGzjlOVt6Ri3\r\nNmf94LcZHqmKhM/bW7As4bVdWbOhRANCAARKqAkJBqrpFmc8NMKq9FsdZhhGRsDL\r\nYdrEuRZ9jQaRDpRt+fYYlKwyM2MhQa36jvXvfTtA7S8eC6lYyyJllocy\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----\nMIICfTCCAiSgAwIBAgIURcDUvDu2Avtmdx0PS/sUYlkMDakwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwNzU5\nMDBaMEAxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEMMAoGA1UEAxMDYm9iMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nqRi1xJygANK3I7zmvrNFSrbm55O09CADrdzU+/L1QgwkyGtr7hnRDLOg/F6c/7t1\nziMLZezKVwAnj79Bq9NAOaOByTCBxjAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/\nBAIwADAdBgNVHQ4EFgQUwYDb6XlEJqAQaZaUCFbgnookLwMwHwYDVR0jBBgwFoAU\no6lt1RwkxVZY98JOQ5QW+8jbPJMwZgYIKgMEBQYHCAEEWnsiYXR0cnMiOnsiaGYu\nQWZmaWxpYXRpb24iOiJvcmcxLmRlcGFydG1lbnQxIiwiaGYuRW5yb2xsbWVudElE\nIjoiYm9iIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNHADBEAiBN\n8MeTg+wPER4e43BO3RIv2BX3wlmtdiURHKNPyP0K9AIgD/U0oRNtdLMu0Uu6K/OS\nEaDdHuBSuJOmAkDt2Q2DmH0=\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgRE+bigcAzrZXhz2x\r\n4re8P46SWz3INtDUusbpUI5vGp2hRANCAASpGLXEnKAA0rcjvOa+s0VKtubnk7T0\r\nIAOt3NT78vVCDCTIa2vuGdEMs6D8Xpz/u3XOIwtl7MpXACePv0Gr00A5\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network1/networkadmin.id b/weaver/samples/fabric/fabric-cli/src/wallet-network1/networkadmin.id index b7aa84540b2..ffa3b3daa49 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network1/networkadmin.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network1/networkadmin.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nnRfwVSzEruWyTjA=\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg27hkT0AItB1ghhJB\r\nHIdavtcggusWBiEGZzsWu0nt3xOhRANCAAT55d0PdBH9vUCK6lWCSfxWUUo93AC+\r\nfON90NFexbgp2M5GAqA5KgGfzhe06MGyA8lGXz/p2qircILcrll7tfTx\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----\nMIICqDCCAk6gAwIBAgIULSae+qeZMC3tKr8VgXnpQtVxGAowCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yNDA2MTcwNjIwMDBaFw0zNDA2MTUwODAw\nMDBaMEkxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEVMBMGA1UEAxMMbmV0d29ya2FkbWluMFkwEwYHKoZIzj0CAQYIKoZI\nzj0DAQcDQgAE69M1g8e9TjNpIjc5MYi1n3wMH9TCTPl0fjaWWy/yXYYd+28wL2Dd\nlTv/eK/SnSnNfE7MntNSciOmDNhKgVrvAaOB6jCB5zAOBgNVHQ8BAf8EBAMCB4Aw\nDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUD5MV/yzlVYU7qJ/nBedelqz0MDwwHwYD\nVR0jBBgwFoAUo6lt1RwkxVZY98JOQ5QW+8jbPJMwgYYGCCoDBAUGBwgBBHp7ImF0\ndHJzIjp7ImhmLkFmZmlsaWF0aW9uIjoib3JnMS5kZXBhcnRtZW50MSIsImhmLkVu\ncm9sbG1lbnRJRCI6Im5ldHdvcmthZG1pbiIsImhmLlR5cGUiOiJjbGllbnQiLCJu\nZXR3b3JrLWFkbWluIjoidHJ1ZSJ9fTAKBggqhkjOPQQDAgNIADBFAiEAuKJNkfTd\nFLkGH4hZrGAeO8Jiwc2o1W1C4ItzOpPhheYCIHhH0fZFsnFjWP9deGRyjUScorrM\nz65yrmCIVK6qkibC\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgFfBca+4mW/7g3kzQ\r\n5DFOhB2QjNCHxPQ1ybGsiRwWLrqhRANCAATr0zWDx71OM2kiNzkxiLWffAwf1MJM\r\n+XR+NpZbL/Jdhh37bzAvYN2VO/94r9KdKc18Tsye01JyI6YM2EqBWu8B\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network1/user1.id b/weaver/samples/fabric/fabric-cli/src/wallet-network1/user1.id index d7274753a05..597ec00a178 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network1/user1.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network1/user1.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----\nMIICUTCCAfegAwIBAgIUPDwbsFvyX1MrCdXormZuoPzzLwYwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsxLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsxLmNvbTAeFw0yMjEwMTkxMjA2MDBaFw0zMjEwMTkwMDEx\nMDBaMCExDzANBgNVBAsTBmNsaWVudDEOMAwGA1UEAxMFdXNlcjEwWTATBgcqhkjO\nPQIBBggqhkjOPQMBBwNCAATw5UmBhZBJQ4BE1i/0qJjmOXstlIpGfa9jIUj7LDfO\n9Z54X0zG7pFdyVS1G8jzFHznYqEwx3KL7UdUtZJapu+no4G7MIG4MA4GA1UdDwEB\n/wQEAwIHgDAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBSh0isswtURoLtYDakVeL0Z\nlBD+ADAfBgNVHSMEGDAWgBRjnLf7Ig7RWWfHMSkggxrPM5hbrzBYBggqAwQFBgcI\nAQRMeyJhdHRycyI6eyJoZi5BZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJ\nRCI6InVzZXIxIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNIADBF\nAiEA7H8/Gltao5YzySWH+ZL2WzWFdTksHfutIqkn8pQJbMkCIERN9oR2iXirxkNC\n0p3o5sIWerFEdHZ7CRSgunlJvC8V\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgSPJ1gNgVs/RGzgRo\r\n7DJ0A2ZxqMkga90LrdZ1smE1dEuhRANCAATw5UmBhZBJQ4BE1i/0qJjmOXstlIpG\r\nfa9jIUj7LDfO9Z54X0zG7pFdyVS1G8jzFHznYqEwx3KL7UdUtZJapu+n\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nIl/v3iKbCglmnsk611jdPh0aRdsz\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgh8LczZs0LSHVsrGH\r\nZ7oGsXh5i+DNEVUSMOmNNMRJvlShRANCAASGW6JcHgcP1lS44vYNyoklETO9Wx/w\r\nUWTTKsiZng2UUHC/bUIwajUmzMyFKiFowok5SkVtblonvs3cOOO3M3li\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network2/alice.id b/weaver/samples/fabric/fabric-cli/src/wallet-network2/alice.id index d6f5b2ff112..f3e371277db 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network2/alice.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network2/alice.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nBx+iNyTe6C3DfjUSJTr+OSUwmxDq8Q==\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgIahenRXYeW1e2jn6\r\ndlFoqgoX4vHYGF5U/I1T1yTpzmOhRANCAARLNzna5mNhaPnMB9GRAWIiljO+R0Ng\r\nLsORz1BuLatxx85p4P6j+KWS1uy64m4fpOu4yWWsC5AxP3qRMdW02rQ3\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\n3dk+qpH3U7ESyidnCkWH392DwvGU8g==\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg++P1ycQKec9ExRtq\r\nSUggTUmatmoQFHMcYoM9Ypxet+2hRANCAASClrHihY52eMfzAbBW4fn68nADtS5x\r\nQLI5UygXh9uvKFjNoR9kd3uhlXmdcYoXhRu3UkI3trTLbB7jVTI5DlyE\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network2/bob.id b/weaver/samples/fabric/fabric-cli/src/wallet-network2/bob.id index 5dde284f378..6e6ab47b467 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network2/bob.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network2/bob.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nU15zJshm/12efNsulDbXzAmh\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgq1bCvmIG93cc8egu\r\n/MApzVJjbuOnnPoCezvywQiEmvKhRANCAARchVsUiOpJYoEzK7vRzLn3c3UAHm/8\r\nVS9WBQJK//Czp6YU35WQlJERMmiNzGuE3tGU18QGS7CqN6dgdrPHf3+S\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----\nMIICfTCCAiSgAwIBAgIUEQ4i3b/b46qrwot/TaCh2wvjXGgwCgYIKoZIzj0EAwIw\ncjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRowGAYDVQQK\nExFvcmcxLm5ldHdvcmsyLmNvbTEPMA0GA1UECxMGRmFicmljMR0wGwYDVQQDExRj\nYS5vcmcxLm5ldHdvcmsyLmNvbTAeFw0yNDA2MTcwNjI1MDBaFw0zNDA2MTUwODAw\nMDBaMEAxMDALBgNVBAsTBG9yZzEwDQYDVQQLEwZjbGllbnQwEgYDVQQLEwtkZXBh\ncnRtZW50MTEMMAoGA1UEAxMDYm9iMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE\nNeOUm9ONZPu2+imXfFVkMQ87Y1QRoz8gkDOTZY/En+92vfI5TF3VJ4Q3dd/a4StX\njsf//v4Fmz5wyuECNhyXeqOByTCBxjAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/\nBAIwADAdBgNVHQ4EFgQUMNqwTpRMENi3JQjFMBYNQrsOwgQwHwYDVR0jBBgwFoAU\n4pXrDF78Urqgq+kotDClV4SVPZwwZgYIKgMEBQYHCAEEWnsiYXR0cnMiOnsiaGYu\nQWZmaWxpYXRpb24iOiJvcmcxLmRlcGFydG1lbnQxIiwiaGYuRW5yb2xsbWVudElE\nIjoiYm9iIiwiaGYuVHlwZSI6ImNsaWVudCJ9fTAKBggqhkjOPQQDAgNHADBEAiAK\ng+KGNi7feiT8pM/ZAjLx09Oca3tQO4zLbzjW8QuyagIgBI1VQsGj0ka4os9GGuQG\ntPRtNYeT9J/SSmzZhDClquo=\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLOYnUoMLY3pJCryu\r\n/fbQZxCE5iR1sCrznLXXNsF80W6hRANCAAQ145Sb041k+7b6KZd8VWQxDztjVBGj\r\nPyCQM5Nlj8Sf73a98jlMXdUnhDd139rhK1eOx//+/gWbPnDK4QI2HJd6\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network2/networkadmin.id b/weaver/samples/fabric/fabric-cli/src/wallet-network2/networkadmin.id index f5a4284981b..ac54eb5e616 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network2/networkadmin.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network2/networkadmin.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nyn5G/Avzuqeh2oc=\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgUZrt88CdnTkVkmGB\r\nraS0kfNdlfjSt0+BBJw+PL2gPc+hRANCAATYVnRfsv/y4lK50v0jE5faOL7MRRUy\r\ncCH0gpYB9Q99clGcjQIOaDo6mIhq02y04Xo3wordijUyOpaJGSDUIy6G\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nxSUe4w2dDSyxDypS\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggz0IAjE2Wtsrhbie\r\nHOvDu5YrSDjKZ11fl34TW87ITWChRANCAATsWDsaiICkKejjXaNVgGH/Y40v4+dD\r\nsXTKIwu740HTf7HWq0HCxh13phIG2gaiJdnrc/PccMfyfR1NB3rkoUmG\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/samples/fabric/fabric-cli/src/wallet-network2/user1.id b/weaver/samples/fabric/fabric-cli/src/wallet-network2/user1.id index 3322574dc7e..064be8cce1b 100644 --- a/weaver/samples/fabric/fabric-cli/src/wallet-network2/user1.id +++ b/weaver/samples/fabric/fabric-cli/src/wallet-network2/user1.id @@ -1 +1 @@ -{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\nMI5vqvtgL1owFrb7BfVKLwIgSJ8=\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUeTrW1fi6zG9B5/\r\nQfs3MGJbJjMMHOKPRo31CG0O5J6hRANCAAT9eQoprN/YqJiRC5okvLOqqokAcNMy\r\n1WfuAZKazuj76KKG7fnCwz710gvvNhxwiQTjQWRHG1uE6wVCB1apqZ5c\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file +{"credentials":{"certificate":"-----BEGIN CERTIFICATE-----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\n+rGaaOZH0N/+drxfvb5B2VeVG8Sp\n-----END CERTIFICATE-----\n","privateKey":"-----BEGIN PRIVATE KEY-----\r\nMIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgrUYt56Ylhyrw68ds\r\nUW05OUSVMNqOYps7hIV7V94KJp6hRANCAASwUNOIxkCXH/p4ndkltB9LpFGR4V56\r\n+9CqKxIuWih96LLuKzToujsrMC/6l+owYBPcBfpu5ynIQVerI1wFAnW0\r\n-----END PRIVATE KEY-----\r\n"},"mspId":"Org1MSP","type":"X.509","version":1} \ No newline at end of file diff --git a/weaver/tests/network-setups/.gitignore b/weaver/tests/network-setups/.gitignore index 420ef267b87..99e5e518157 100644 --- a/weaver/tests/network-setups/.gitignore +++ b/weaver/tests/network-setups/.gitignore @@ -24,8 +24,18 @@ fabric/shared/*/peerOrganizations fabric/shared/*/wallet/* fabric/shared/*/system-genesis-block/* fabric/shared/*/channel-artifacts + +!fabric/shared/*/system-genesis-block/.gitkeep +!fabric/shared/*/wallet/.gitkeep + fabric/shared/*/fabric-ca/ordererOrg/* fabric/shared/*/fabric-ca/org1/* fabric/shared/*/fabric-ca/org2/* + +!fabric/shared/*/fabric-ca/ordererOrg/fabric-ca-server-config.yaml +!fabric/shared/*/fabric-ca/org1/fabric-ca-server-config.yaml +!fabric/shared/*/fabric-ca/org2/fabric-ca-server-config.yaml + + fabric/shared/chaincode/* !fabric/shared/chaincode/.gitkeep \ No newline at end of file diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org1MSPanchors.tx b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org1MSPanchors.tx index b0331b3afbb..5cf4f92f4f7 100644 Binary files a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org1MSPanchors.tx and b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org1MSPanchors.tx differ diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org2MSPanchors.tx b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org2MSPanchors.tx index a79afebe90c..e5e378927aa 100644 Binary files a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org2MSPanchors.tx and b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/Org2MSPanchors.tx differ diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.block b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.block index f10d75ab932..7579f9c4360 100644 Binary files a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.block and b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.block differ diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.tx b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.tx index ad573d528e7..46a4a5670c0 100644 Binary files a/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.tx and b/weaver/tests/network-setups/fabric/network-artifacts/network1/channel-artifacts/mychannel.tx differ diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerPublicKey b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerPublicKey index a97121d6996..b20ed55a13b 100644 Binary files a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerPublicKey and b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerPublicKey differ diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerRevocationPublicKey b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerRevocationPublicKey index cc29dc9f247..0afa634745b 100644 --- a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerRevocationPublicKey +++ b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/IssuerRevocationPublicKey @@ -1,5 +1,5 @@ -----BEGIN PUBLIC KEY----- -MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAECau7LXSs/s5QQFLefPjThFjRoe0D0eLO -1i7jbppE6liCMLLDfl6GVO1nrjXRbW8Ui3B+sC3lxiD9TueIUtW0/kI4Ug0VNPyB -5KMg6J2PonR+LZwt2f9uDZjgCP7/7CLy +MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEstSykA8Q6qI5Jpzr2Pcjo7H0q3ZWbkYN +gFVQl2XTCmSwhDdGfe/3WrTBNeCWHYTQDZus8ZVNT1BDQ6HsXjb42oz0u/AyG6ic +/Fx6nVclOYsP9xz1qgGmWrv+fOXRd31+ -----END PUBLIC KEY----- diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/ca-cert.pem b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/ca-cert.pem index eee92b8052c..3a65218c51f 100644 --- a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/ca-cert.pem +++ b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/ca-cert.pem @@ -1,14 +1,14 @@ -----BEGIN CERTIFICATE----- -MIICFzCCAb2gAwIBAgIUIl0UGFzir8LsrZAVhR/iVtervl4wCgYIKoZIzj0EAwIw +MIICFzCCAb2gAwIBAgIUMSTyuu/+lWrxXI1DWLO1k/z/ygAwCgYIKoZIzj0EAwIw aDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRQwEgYDVQQK EwtIeXBlcmxlZGdlcjEPMA0GA1UECxMGRmFicmljMRkwFwYDVQQDExBmYWJyaWMt -Y2Etc2VydmVyMB4XDTIyMTAxOTA5NDQwMFoXDTM3MTAxNTA5NDQwMFowaDELMAkG +Y2Etc2VydmVyMB4XDTI0MDYxNzA2MjAwMFoXDTM5MDYxNDA2MjAwMFowaDELMAkG A1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRQwEgYDVQQKEwtIeXBl cmxlZGdlcjEPMA0GA1UECxMGRmFicmljMRkwFwYDVQQDExBmYWJyaWMtY2Etc2Vy -dmVyMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAE4pL6C4T3lP+CvPwoPkVXlpNM -SZQUvHOwyuSUhU8/n0gWeRnbS6PSxw2GjCDhHnD+vSUhX+W/LxEStq7b7nzHk6NF +dmVyMFkwEwYHKoZIzj0CAQYIKoZIzj0DAQcDQgAEILOkPuy10f54lbOR5rpvenxa +9cXHP13FOrzIjxw93RtWe7YsTTWBhhZ+tkU8pqnYexNvrVxyF549FINQedicLKNF MEMwDgYDVR0PAQH/BAQDAgEGMBIGA1UdEwEB/wQIMAYBAf8CAQEwHQYDVR0OBBYE -FOg8HelplUlw724Z9jqYIMgpUR55MAoGCCqGSM49BAMCA0gAMEUCIQCjIaNL7HXX -DtZr31O2IqEP7fRXmhXwBE1UOkO+Y6c61QIgcSRQ7OSNu71scXubmJctT0Iss0X2 -gSFhhMLBhIVreQA= +FKwS2ZeG3l49JvP6TIRWuVTtRiDLMAoGCCqGSM49BAMCA0gAMEUCIQCR2EctZ6qu +otmqtb5p/m58wtQJI3D4lC0ejEOhtineiQIgVgYk4apFdL1zY78I1kHTq5S1/VvK +WWv2t5Dm43WezXU= -----END CERTIFICATE----- diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/fabric-ca-server.db b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/fabric-ca-server.db index e145d98971e..20dff4fa507 100644 Binary files a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/fabric-ca-server.db and b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/fabric-ca-server.db differ diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/0cedcb25220cd4268fa66bfbd1fe596d26372bd5bebbd740fb3e140de597ba61_sk b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/0cedcb25220cd4268fa66bfbd1fe596d26372bd5bebbd740fb3e140de597ba61_sk new file mode 100644 index 00000000000..a104e156580 --- /dev/null +++ b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/0cedcb25220cd4268fa66bfbd1fe596d26372bd5bebbd740fb3e140de597ba61_sk @@ -0,0 +1,5 @@ +-----BEGIN PRIVATE KEY----- +MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgPqsZND8xhgDZ4Ysw +hSiSrS2KhbhdzBu9CgAZ3g6M7sWhRANCAAQgs6Q+7LXR/niVs5Hmum96fFr1xcc/ +XcU6vMiPHD3dG1Z7tixNNYGGFn62RTymqdh7E2+tXHIXnj0Ug1B52Jws +-----END PRIVATE KEY----- diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/5e01605d4d48b33b11d0a1687849c5cdc93f7c8bae889fcedcdf96c057321032_sk b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/5e01605d4d48b33b11d0a1687849c5cdc93f7c8bae889fcedcdf96c057321032_sk deleted file mode 100644 index 8264039f547..00000000000 --- a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/5e01605d4d48b33b11d0a1687849c5cdc93f7c8bae889fcedcdf96c057321032_sk +++ /dev/null @@ -1,5 +0,0 @@ ------BEGIN PRIVATE KEY----- -MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgwadqa1JgCL71T16k -BCLsfnDK2FguA2QfWjpHBuwkYHKhRANCAAQZE0vJNpeUcp9uIxcrRvy8LRPuyynW -Ulrr6AXpDkbk0oKsDHreu9juwR3YM0VE2BayGrNh4/aJGlYoz9ZdNbXJ ------END PRIVATE KEY----- diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerRevocationPrivateKey b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerRevocationPrivateKey index aac7ff08e1e..6f2728a1cd2 100644 --- a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerRevocationPrivateKey +++ b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerRevocationPrivateKey @@ -1,6 +1,6 @@ -----BEGIN PRIVATE KEY----- -MIGkAgEBBDATYHpbTUzC8F0djnHkpKyAmu5OOhvSOXJGQ7tzdDS+dHq66DzBytDQ -jsfKYAaZprugBwYFK4EEACKhZANiAAQJq7stdKz+zlBAUt58+NOEWNGh7QPR4s7W -LuNumkTqWIIwssN+XoZU7WeuNdFtbxSLcH6wLeXGIP1O54hS1bT+QjhSDRU0/IHk -oyDonY+idH4tnC3Z/24NmOAI/v/sIvI= +MIGkAgEBBDAWL9RNN6EaeXv5B0Q648G87uDEZ1pnctrFobWnQmkAzjSaHbgpd47h +E5Sh71dXMbGgBwYFK4EEACKhZANiAASy1LKQDxDqojkmnOvY9yOjsfSrdlZuRg2A +VVCXZdMKZLCEN0Z97/datME14JYdhNANm6zxlU1PUENDoexeNvjajPS78DIbqJz8 +XHqdVyU5iw/3HPWqAaZau/585dF3fX4= -----END PRIVATE KEY----- diff --git a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerSecretKey b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerSecretKey index 19de3c0274f..825a7624870 100644 --- a/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerSecretKey +++ b/weaver/tests/network-setups/fabric/network-artifacts/network1/fabric-ca/ordererOrg/msp/keystore/IssuerSecretKey @@ -1 +1 @@ -Onò¨Z†uÿ¡:@:/ + # TLS configuration for the client connection to the LDAP server + tls: + certfiles: + client: + certfile: + keyfile: + # Attribute related configuration for mapping from LDAP entries to Fabric CA attributes + attribute: + # 'names' is an array of strings containing the LDAP attribute names which are + # requested from the LDAP server for an LDAP identity's entry + names: ['uid','member'] + # The 'converters' section is used to convert an LDAP entry to the value of + # a fabric CA attribute. + # For example, the following converts an LDAP 'uid' attribute + # whose value begins with 'revoker' to a fabric CA attribute + # named "hf.Revoker" with a value of "true" (because the boolean expression + # evaluates to true). + # converters: + # - name: hf.Revoker + # value: attr("uid") =~ "revoker*" + converters: + - name: + value: + # The 'maps' section contains named maps which may be referenced by the 'map' + # function in the 'converters' section to map LDAP responses to arbitrary values. + # For example, assume a user has an LDAP attribute named 'member' which has multiple + # values which are each a distinguished name (i.e. a DN). For simplicity, assume the + # values of the 'member' attribute are 'dn1', 'dn2', and 'dn3'. + # Further assume the following configuration. + # converters: + # - name: hf.Registrar.Roles + # value: map(attr("member"),"groups") + # maps: + # groups: + # - name: dn1 + # value: peer + # - name: dn2 + # value: client + # The value of the user's 'hf.Registrar.Roles' attribute is then computed to be + # "peer,client,dn3". This is because the value of 'attr("member")' is + # "dn1,dn2,dn3", and the call to 'map' with a 2nd argument of + # "group" replaces "dn1" with "peer" and "dn2" with "client". + maps: + groups: + - name: + value: + +############################################################################# +# Affiliations section. Fabric CA server can be bootstrapped with the +# affiliations specified in this section. Affiliations are specified as maps. +# For example: +# businessunit1: +# department1: +# - team1 +# businessunit2: +# - department2 +# - department3 +# +# Affiliations are hierarchical in nature. In the above example, +# department1 (used as businessunit1.department1) is the child of businessunit1. +# team1 (used as businessunit1.department1.team1) is the child of department1. +# department2 (used as businessunit2.department2) and department3 (businessunit2.department3) +# are children of businessunit2. +# Note: Affiliations are case sensitive except for the non-leaf affiliations +# (like businessunit1, department1, businessunit2) that are specified in the configuration file, +# which are always stored in lower case. +############################################################################# +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +############################################################################# +# Signing section +# +# The "default" subsection is used to sign enrollment certificates; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +# +# The "ca" profile subsection is used to sign intermediate CA certificates; +# the default expiration ("expiry" field) is "43800h" which is 5 years in hours. +# Note that "isca" is true, meaning that it issues a CA certificate. +# A maxpathlen of 0 means that the intermediate CA cannot issue other +# intermediate CA certificates, though it can still issue end entity certificates. +# (See RFC 5280, section 4.2.1.9) +# +# The "tls" profile subsection is used to sign TLS certificate requests; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +############################################################################# +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 87600h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h + +########################################################################### +# Certificate Signing Request (CSR) section. +# This controls the creation of the root CA certificate. +# The expiration for the root CA certificate is configured with the +# "ca.expiry" field below, whose default value is "131400h" which is +# 15 years in hours. +# The pathlength field is used to limit CA certificate hierarchy as described +# in section 4.2.1.9 of RFC 5280. +# Examples: +# 1) No pathlength value means no limit is requested. +# 2) pathlength == 1 means a limit of 1 is requested which is the default for +# a root CA. This means the root CA can issue intermediate CA certificates, +# but these intermediate CAs may not in turn issue other CA certificates +# though they can still issue end entity certificates. +# 3) pathlength == 0 means a limit of 0 is requested; +# this is the default for an intermediate CA, which means it can not issue +# CA certificates though it can still issue end entity certificates. +########################################################################### +csr: + cn: fabric-ca-server + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: Hyperledger + OU: Fabric + hosts: + - f586f7bcba54 + - localhost + ca: + expiry: 131400h + pathlength: 1 + +########################################################################### +# Each CA can issue both X509 enrollment certificate as well as Idemix +# Credential. This section specifies configuration for the issuer component +# that is responsible for issuing Idemix credentials. +########################################################################### +idemix: + # Specifies pool size for revocation handles. A revocation handle is an unique identifier of an + # Idemix credential. The issuer will create a pool revocation handles of this specified size. When + # a credential is requested, issuer will get handle from the pool and assign it to the credential. + # Issuer will repopulate the pool with new handles when the last handle in the pool is used. + # A revocation handle and credential revocation information (CRI) are used to create non revocation proof + # by the prover to prove to the verifier that her credential is not revoked. + rhpoolsize: 1000 + + # The Idemix credential issuance is a two step process. First step is to get a nonce from the issuer + # and second step is send credential request that is constructed using the nonce to the isuser to + # request a credential. This configuration property specifies expiration for the nonces. By default is + # nonces expire after 15 seconds. The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration). + nonceexpiration: 15s + + # Specifies interval at which expired nonces are removed from datastore. Default value is 15 minutes. + # The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration) + noncesweepinterval: 15m + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section is used to select which +# crypto library implementation to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + +############################################################################# +# Multi CA section +# +# Each Fabric CA server contains one CA by default. This section is used +# to configure multiple CAs in a single server. +# +# 1) --cacount +# Automatically generate non-default CAs. The names of these +# additional CAs are "ca1", "ca2", ... "caN", where "N" is +# This is particularly useful in a development environment to quickly set up +# multiple CAs. Note that, this config option is not applicable to intermediate CA server +# i.e., Fabric CA server that is started with intermediate.parentserver.url config +# option (-u command line option) +# +# 2) --cafiles +# For each CA config file in the list, generate a separate signing CA. Each CA +# config file in this list MAY contain all of the same elements as are found in +# the server config file except port, debug, and tls sections. +# +# Examples: +# fabric-ca-server start -b admin:adminpw --cacount 2 +# +# fabric-ca-server start -b admin:adminpw --cafiles ca/ca1/fabric-ca-server-config.yaml +# --cafiles ca/ca2/fabric-ca-server-config.yaml +# +############################################################################# + +cacount: + +cafiles: + +############################################################################# +# Intermediate CA section +# +# The relationship between servers and CAs is as follows: +# 1) A single server process may contain or function as one or more CAs. +# This is configured by the "Multi CA section" above. +# 2) Each CA is either a root CA or an intermediate CA. +# 3) Each intermediate CA has a parent CA which is either a root CA or another intermediate CA. +# +# This section pertains to configuration of #2 and #3. +# If the "intermediate.parentserver.url" property is set, +# then this is an intermediate CA with the specified parent +# CA. +# +# parentserver section +# url - The URL of the parent server +# caname - Name of the CA to enroll within the server +# +# enrollment section used to enroll intermediate CA with parent CA +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +# +# tls section for secure socket connection +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# CA configuration section +# +# Configure the number of incorrect password attempts are allowed for +# identities. By default, the value of 'passwordattempts' is 10, which +# means that 10 incorrect password attempts can be made before an identity get +# locked out. +############################################################################# +cfg: + identities: + passwordattempts: 10 + +############################################################################### +# +# Operations section +# +############################################################################### +operations: + # host and port for the operations server + listenAddress: 127.0.0.1:9443 + + # TLS configuration for the operations endpoint + tls: + # TLS enabled + enabled: false + + # path to PEM encoded server certificate for the operations server + cert: + file: + + # path to PEM encoded server key for the operations server + key: + file: + + # require client certificate authentication to access all resources + clientAuthRequired: false + + # paths to PEM encoded ca certificates to trust for client authentication + clientRootCAs: + files: [] + +############################################################################### +# +# Metrics section +# +############################################################################### +metrics: + # statsd, prometheus, or disabled + provider: disabled + + # statsd configuration + statsd: + # network type: tcp or udp + network: udp + + # statsd server address + address: 127.0.0.1:8125 + + # the interval at which locally cached counters and gauges are pushsed + # to statsd; timings are pushed immediately + writeInterval: 10s + + # prefix is prepended to all emitted statsd merics + prefix: server diff --git a/weaver/tests/network-setups/fabric/shared/network1/fabric-ca/org1/fabric-ca-server-config.yaml b/weaver/tests/network-setups/fabric/shared/network1/fabric-ca/org1/fabric-ca-server-config.yaml new file mode 100644 index 00000000000..ebfdfa1e9bd --- /dev/null +++ b/weaver/tests/network-setups/fabric/shared/network1/fabric-ca/org1/fabric-ca-server-config.yaml @@ -0,0 +1,505 @@ +############################################################################# +# This is a configuration file for the fabric-ca-server command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --port 443 +# To set the listening port +# b) --ca.keyfile ../mykey.pem +# To set the "keyfile" element in the "ca" section below; +# note the '.' separator character. +# 2) environment variable +# Examples: +# a) FABRIC_CA_SERVER_PORT=443 +# To set the listening port +# b) FABRIC_CA_SERVER_CA_KEYFILE="../mykey.pem" +# To set the "keyfile" element in the "ca" section below; +# note the '_' separator character. +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfile" and "tls.clientauth.certfiles". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +# Version of config file +version: 1.4.7 + +# Server's listening port (default: 7054) +port: 7054 + +# Cross-Origin Resource Sharing (CORS) +cors: + enabled: false + origins: + - "*" + +# Enables debug logging (default: false) +debug: false + +# Size limit of an acceptable CRL in bytes (default: 512000) +crlsizelimit: 512000 + +############################################################################# +# TLS section for the server's listening port +# +# The following types are supported for client authentication: NoClientCert, +# RequestClientCert, RequireAnyClientCert, VerifyClientCertIfGiven, +# and RequireAndVerifyClientCert. +# +# Certfiles is a list of root certificate authorities that the server uses +# when verifying client certificates. +############################################################################# +tls: + # Enable TLS (default: false) + enabled: false + # TLS for the server's listening port + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +############################################################################# +# The CA section contains information related to the Certificate Authority +# including the name of the CA, which should be unique for all members +# of a blockchain network. It also includes the key and certificate files +# used when issuing enrollment certificates (ECerts) and transaction +# certificates (TCerts). +# The chainfile (if it exists) contains the certificate chain which +# should be trusted for this CA, where the 1st in the chain is always the +# root CA certificate. +############################################################################# +ca: + # Name of this CA + name: + # Key file (is only used to import a private key into BCCSP) + keyfile: + # Certificate file (default: ca-cert.pem) + certfile: + # Chain file + chainfile: + +############################################################################# +# The gencrl REST endpoint is used to generate a CRL that contains revoked +# certificates. This section contains configuration options that are used +# during gencrl request processing. +############################################################################# +crl: + # Specifies expiration for the generated CRL. The number of hours + # specified by this property is added to the UTC time, the resulting time + # is used to set the 'Next Update' date of the CRL. + expiry: 24h + +############################################################################# +# The registry section controls how the fabric-ca-server does two things: +# 1) authenticates enrollment requests which contain a username and password +# (also known as an enrollment ID and secret). +# 2) once authenticated, retrieves the identity's attribute names and +# values which the fabric-ca-server optionally puts into TCerts +# which it issues for transacting on the Hyperledger Fabric blockchain. +# These attributes are useful for making access control decisions in +# chaincode. +# There are two main configuration options: +# 1) The fabric-ca-server is the registry. +# This is true if "ldap.enabled" in the ldap section below is false. +# 2) An LDAP server is the registry, in which case the fabric-ca-server +# calls the LDAP server to perform these tasks. +# This is true if "ldap.enabled" in the ldap section below is true, +# which means this "registry" section is ignored. +############################################################################# +registry: + # Maximum number of times a password/secret can be reused for enrollment + # (default: -1, which means there is no limit) + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +############################################################################# +# Database section +# Supported types are: "sqlite3", "postgres", and "mysql". +# The datasource value depends on the type. +# If the type is "sqlite3", the datasource value is a file name to use +# as the database store. Since "sqlite3" is an embedded database, it +# may not be used if you want to run the fabric-ca-server in a cluster. +# To run the fabric-ca-server in a cluster, you must choose "postgres" +# or "mysql". +############################################################################# +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# LDAP section +# If LDAP is enabled, the fabric-ca-server calls LDAP to: +# 1) authenticate enrollment ID and secret (i.e. username and password) +# for enrollment requests; +# 2) To retrieve identity attributes +############################################################################# +ldap: + # Enables or disables the LDAP client (default: false) + # If this is set to true, the "registry" section is ignored. + enabled: false + # The URL of the LDAP server + url: ldap://:@:/ + # TLS configuration for the client connection to the LDAP server + tls: + certfiles: + client: + certfile: + keyfile: + # Attribute related configuration for mapping from LDAP entries to Fabric CA attributes + attribute: + # 'names' is an array of strings containing the LDAP attribute names which are + # requested from the LDAP server for an LDAP identity's entry + names: ['uid','member'] + # The 'converters' section is used to convert an LDAP entry to the value of + # a fabric CA attribute. + # For example, the following converts an LDAP 'uid' attribute + # whose value begins with 'revoker' to a fabric CA attribute + # named "hf.Revoker" with a value of "true" (because the boolean expression + # evaluates to true). + # converters: + # - name: hf.Revoker + # value: attr("uid") =~ "revoker*" + converters: + - name: + value: + # The 'maps' section contains named maps which may be referenced by the 'map' + # function in the 'converters' section to map LDAP responses to arbitrary values. + # For example, assume a user has an LDAP attribute named 'member' which has multiple + # values which are each a distinguished name (i.e. a DN). For simplicity, assume the + # values of the 'member' attribute are 'dn1', 'dn2', and 'dn3'. + # Further assume the following configuration. + # converters: + # - name: hf.Registrar.Roles + # value: map(attr("member"),"groups") + # maps: + # groups: + # - name: dn1 + # value: peer + # - name: dn2 + # value: client + # The value of the user's 'hf.Registrar.Roles' attribute is then computed to be + # "peer,client,dn3". This is because the value of 'attr("member")' is + # "dn1,dn2,dn3", and the call to 'map' with a 2nd argument of + # "group" replaces "dn1" with "peer" and "dn2" with "client". + maps: + groups: + - name: + value: + +############################################################################# +# Affiliations section. Fabric CA server can be bootstrapped with the +# affiliations specified in this section. Affiliations are specified as maps. +# For example: +# businessunit1: +# department1: +# - team1 +# businessunit2: +# - department2 +# - department3 +# +# Affiliations are hierarchical in nature. In the above example, +# department1 (used as businessunit1.department1) is the child of businessunit1. +# team1 (used as businessunit1.department1.team1) is the child of department1. +# department2 (used as businessunit2.department2) and department3 (businessunit2.department3) +# are children of businessunit2. +# Note: Affiliations are case sensitive except for the non-leaf affiliations +# (like businessunit1, department1, businessunit2) that are specified in the configuration file, +# which are always stored in lower case. +############################################################################# +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +############################################################################# +# Signing section +# +# The "default" subsection is used to sign enrollment certificates; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +# +# The "ca" profile subsection is used to sign intermediate CA certificates; +# the default expiration ("expiry" field) is "43800h" which is 5 years in hours. +# Note that "isca" is true, meaning that it issues a CA certificate. +# A maxpathlen of 0 means that the intermediate CA cannot issue other +# intermediate CA certificates, though it can still issue end entity certificates. +# (See RFC 5280, section 4.2.1.9) +# +# The "tls" profile subsection is used to sign TLS certificate requests; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +############################################################################# +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 87600h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h + +########################################################################### +# Certificate Signing Request (CSR) section. +# This controls the creation of the root CA certificate. +# The expiration for the root CA certificate is configured with the +# "ca.expiry" field below, whose default value is "131400h" which is +# 15 years in hours. +# The pathlength field is used to limit CA certificate hierarchy as described +# in section 4.2.1.9 of RFC 5280. +# Examples: +# 1) No pathlength value means no limit is requested. +# 2) pathlength == 1 means a limit of 1 is requested which is the default for +# a root CA. This means the root CA can issue intermediate CA certificates, +# but these intermediate CAs may not in turn issue other CA certificates +# though they can still issue end entity certificates. +# 3) pathlength == 0 means a limit of 0 is requested; +# this is the default for an intermediate CA, which means it can not issue +# CA certificates though it can still issue end entity certificates. +########################################################################### +csr: + cn: ca.org1.network1.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: org1.network1.com + OU: Fabric + hosts: + - 6bbd89430166 + - localhost + - org1.network1.com + ca: + expiry: 131400h + pathlength: 1 + +########################################################################### +# Each CA can issue both X509 enrollment certificate as well as Idemix +# Credential. This section specifies configuration for the issuer component +# that is responsible for issuing Idemix credentials. +########################################################################### +idemix: + # Specifies pool size for revocation handles. A revocation handle is an unique identifier of an + # Idemix credential. The issuer will create a pool revocation handles of this specified size. When + # a credential is requested, issuer will get handle from the pool and assign it to the credential. + # Issuer will repopulate the pool with new handles when the last handle in the pool is used. + # A revocation handle and credential revocation information (CRI) are used to create non revocation proof + # by the prover to prove to the verifier that her credential is not revoked. + rhpoolsize: 1000 + + # The Idemix credential issuance is a two step process. First step is to get a nonce from the issuer + # and second step is send credential request that is constructed using the nonce to the isuser to + # request a credential. This configuration property specifies expiration for the nonces. By default is + # nonces expire after 15 seconds. The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration). + nonceexpiration: 15s + + # Specifies interval at which expired nonces are removed from datastore. Default value is 15 minutes. + # The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration) + noncesweepinterval: 15m + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section is used to select which +# crypto library implementation to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + +############################################################################# +# Multi CA section +# +# Each Fabric CA server contains one CA by default. This section is used +# to configure multiple CAs in a single server. +# +# 1) --cacount +# Automatically generate non-default CAs. The names of these +# additional CAs are "ca1", "ca2", ... "caN", where "N" is +# This is particularly useful in a development environment to quickly set up +# multiple CAs. Note that, this config option is not applicable to intermediate CA server +# i.e., Fabric CA server that is started with intermediate.parentserver.url config +# option (-u command line option) +# +# 2) --cafiles +# For each CA config file in the list, generate a separate signing CA. Each CA +# config file in this list MAY contain all of the same elements as are found in +# the server config file except port, debug, and tls sections. +# +# Examples: +# fabric-ca-server start -b admin:adminpw --cacount 2 +# +# fabric-ca-server start -b admin:adminpw --cafiles ca/ca1/fabric-ca-server-config.yaml +# --cafiles ca/ca2/fabric-ca-server-config.yaml +# +############################################################################# + +cacount: + +cafiles: + +############################################################################# +# Intermediate CA section +# +# The relationship between servers and CAs is as follows: +# 1) A single server process may contain or function as one or more CAs. +# This is configured by the "Multi CA section" above. +# 2) Each CA is either a root CA or an intermediate CA. +# 3) Each intermediate CA has a parent CA which is either a root CA or another intermediate CA. +# +# This section pertains to configuration of #2 and #3. +# If the "intermediate.parentserver.url" property is set, +# then this is an intermediate CA with the specified parent +# CA. +# +# parentserver section +# url - The URL of the parent server +# caname - Name of the CA to enroll within the server +# +# enrollment section used to enroll intermediate CA with parent CA +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +# +# tls section for secure socket connection +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# CA configuration section +# +# Configure the number of incorrect password attempts are allowed for +# identities. By default, the value of 'passwordattempts' is 10, which +# means that 10 incorrect password attempts can be made before an identity get +# locked out. +############################################################################# +cfg: + identities: + passwordattempts: 10 + +############################################################################### +# +# Operations section +# +############################################################################### +operations: + # host and port for the operations server + listenAddress: 127.0.0.1:9443 + + # TLS configuration for the operations endpoint + tls: + # TLS enabled + enabled: false + + # path to PEM encoded server certificate for the operations server + cert: + file: + + # path to PEM encoded server key for the operations server + key: + file: + + # require client certificate authentication to access all resources + clientAuthRequired: false + + # paths to PEM encoded ca certificates to trust for client authentication + clientRootCAs: + files: [] + +############################################################################### +# +# Metrics section +# +############################################################################### +metrics: + # statsd, prometheus, or disabled + provider: disabled + + # statsd configuration + statsd: + # network type: tcp or udp + network: udp + + # statsd server address + address: 127.0.0.1:8125 + + # the interval at which locally cached counters and gauges are pushsed + # to statsd; timings are pushed immediately + writeInterval: 10s + + # prefix is prepended to all emitted statsd merics + prefix: server diff --git a/weaver/tests/network-setups/fabric/shared/network1/fabric-ca/org2/fabric-ca-server-config.yaml b/weaver/tests/network-setups/fabric/shared/network1/fabric-ca/org2/fabric-ca-server-config.yaml new file mode 100644 index 00000000000..d160086350d --- /dev/null +++ b/weaver/tests/network-setups/fabric/shared/network1/fabric-ca/org2/fabric-ca-server-config.yaml @@ -0,0 +1,505 @@ +############################################################################# +# This is a configuration file for the fabric-ca-server command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --port 443 +# To set the listening port +# b) --ca.keyfile ../mykey.pem +# To set the "keyfile" element in the "ca" section below; +# note the '.' separator character. +# 2) environment variable +# Examples: +# a) FABRIC_CA_SERVER_PORT=443 +# To set the listening port +# b) FABRIC_CA_SERVER_CA_KEYFILE="../mykey.pem" +# To set the "keyfile" element in the "ca" section below; +# note the '_' separator character. +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfile" and "tls.clientauth.certfiles". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +# Version of config file +version: 1.4.7 + +# Server's listening port (default: 7054) +port: 7054 + +# Cross-Origin Resource Sharing (CORS) +cors: + enabled: false + origins: + - "*" + +# Enables debug logging (default: false) +debug: false + +# Size limit of an acceptable CRL in bytes (default: 512000) +crlsizelimit: 512000 + +############################################################################# +# TLS section for the server's listening port +# +# The following types are supported for client authentication: NoClientCert, +# RequestClientCert, RequireAnyClientCert, VerifyClientCertIfGiven, +# and RequireAndVerifyClientCert. +# +# Certfiles is a list of root certificate authorities that the server uses +# when verifying client certificates. +############################################################################# +tls: + # Enable TLS (default: false) + enabled: false + # TLS for the server's listening port + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +############################################################################# +# The CA section contains information related to the Certificate Authority +# including the name of the CA, which should be unique for all members +# of a blockchain network. It also includes the key and certificate files +# used when issuing enrollment certificates (ECerts) and transaction +# certificates (TCerts). +# The chainfile (if it exists) contains the certificate chain which +# should be trusted for this CA, where the 1st in the chain is always the +# root CA certificate. +############################################################################# +ca: + # Name of this CA + name: + # Key file (is only used to import a private key into BCCSP) + keyfile: + # Certificate file (default: ca-cert.pem) + certfile: + # Chain file + chainfile: + +############################################################################# +# The gencrl REST endpoint is used to generate a CRL that contains revoked +# certificates. This section contains configuration options that are used +# during gencrl request processing. +############################################################################# +crl: + # Specifies expiration for the generated CRL. The number of hours + # specified by this property is added to the UTC time, the resulting time + # is used to set the 'Next Update' date of the CRL. + expiry: 24h + +############################################################################# +# The registry section controls how the fabric-ca-server does two things: +# 1) authenticates enrollment requests which contain a username and password +# (also known as an enrollment ID and secret). +# 2) once authenticated, retrieves the identity's attribute names and +# values which the fabric-ca-server optionally puts into TCerts +# which it issues for transacting on the Hyperledger Fabric blockchain. +# These attributes are useful for making access control decisions in +# chaincode. +# There are two main configuration options: +# 1) The fabric-ca-server is the registry. +# This is true if "ldap.enabled" in the ldap section below is false. +# 2) An LDAP server is the registry, in which case the fabric-ca-server +# calls the LDAP server to perform these tasks. +# This is true if "ldap.enabled" in the ldap section below is true, +# which means this "registry" section is ignored. +############################################################################# +registry: + # Maximum number of times a password/secret can be reused for enrollment + # (default: -1, which means there is no limit) + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +############################################################################# +# Database section +# Supported types are: "sqlite3", "postgres", and "mysql". +# The datasource value depends on the type. +# If the type is "sqlite3", the datasource value is a file name to use +# as the database store. Since "sqlite3" is an embedded database, it +# may not be used if you want to run the fabric-ca-server in a cluster. +# To run the fabric-ca-server in a cluster, you must choose "postgres" +# or "mysql". +############################################################################# +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# LDAP section +# If LDAP is enabled, the fabric-ca-server calls LDAP to: +# 1) authenticate enrollment ID and secret (i.e. username and password) +# for enrollment requests; +# 2) To retrieve identity attributes +############################################################################# +ldap: + # Enables or disables the LDAP client (default: false) + # If this is set to true, the "registry" section is ignored. + enabled: false + # The URL of the LDAP server + url: ldap://:@:/ + # TLS configuration for the client connection to the LDAP server + tls: + certfiles: + client: + certfile: + keyfile: + # Attribute related configuration for mapping from LDAP entries to Fabric CA attributes + attribute: + # 'names' is an array of strings containing the LDAP attribute names which are + # requested from the LDAP server for an LDAP identity's entry + names: ['uid','member'] + # The 'converters' section is used to convert an LDAP entry to the value of + # a fabric CA attribute. + # For example, the following converts an LDAP 'uid' attribute + # whose value begins with 'revoker' to a fabric CA attribute + # named "hf.Revoker" with a value of "true" (because the boolean expression + # evaluates to true). + # converters: + # - name: hf.Revoker + # value: attr("uid") =~ "revoker*" + converters: + - name: + value: + # The 'maps' section contains named maps which may be referenced by the 'map' + # function in the 'converters' section to map LDAP responses to arbitrary values. + # For example, assume a user has an LDAP attribute named 'member' which has multiple + # values which are each a distinguished name (i.e. a DN). For simplicity, assume the + # values of the 'member' attribute are 'dn1', 'dn2', and 'dn3'. + # Further assume the following configuration. + # converters: + # - name: hf.Registrar.Roles + # value: map(attr("member"),"groups") + # maps: + # groups: + # - name: dn1 + # value: peer + # - name: dn2 + # value: client + # The value of the user's 'hf.Registrar.Roles' attribute is then computed to be + # "peer,client,dn3". This is because the value of 'attr("member")' is + # "dn1,dn2,dn3", and the call to 'map' with a 2nd argument of + # "group" replaces "dn1" with "peer" and "dn2" with "client". + maps: + groups: + - name: + value: + +############################################################################# +# Affiliations section. Fabric CA server can be bootstrapped with the +# affiliations specified in this section. Affiliations are specified as maps. +# For example: +# businessunit1: +# department1: +# - team1 +# businessunit2: +# - department2 +# - department3 +# +# Affiliations are hierarchical in nature. In the above example, +# department1 (used as businessunit1.department1) is the child of businessunit1. +# team1 (used as businessunit1.department1.team1) is the child of department1. +# department2 (used as businessunit2.department2) and department3 (businessunit2.department3) +# are children of businessunit2. +# Note: Affiliations are case sensitive except for the non-leaf affiliations +# (like businessunit1, department1, businessunit2) that are specified in the configuration file, +# which are always stored in lower case. +############################################################################# +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +############################################################################# +# Signing section +# +# The "default" subsection is used to sign enrollment certificates; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +# +# The "ca" profile subsection is used to sign intermediate CA certificates; +# the default expiration ("expiry" field) is "43800h" which is 5 years in hours. +# Note that "isca" is true, meaning that it issues a CA certificate. +# A maxpathlen of 0 means that the intermediate CA cannot issue other +# intermediate CA certificates, though it can still issue end entity certificates. +# (See RFC 5280, section 4.2.1.9) +# +# The "tls" profile subsection is used to sign TLS certificate requests; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +############################################################################# +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 87600h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h + +########################################################################### +# Certificate Signing Request (CSR) section. +# This controls the creation of the root CA certificate. +# The expiration for the root CA certificate is configured with the +# "ca.expiry" field below, whose default value is "131400h" which is +# 15 years in hours. +# The pathlength field is used to limit CA certificate hierarchy as described +# in section 4.2.1.9 of RFC 5280. +# Examples: +# 1) No pathlength value means no limit is requested. +# 2) pathlength == 1 means a limit of 1 is requested which is the default for +# a root CA. This means the root CA can issue intermediate CA certificates, +# but these intermediate CAs may not in turn issue other CA certificates +# though they can still issue end entity certificates. +# 3) pathlength == 0 means a limit of 0 is requested; +# this is the default for an intermediate CA, which means it can not issue +# CA certificates though it can still issue end entity certificates. +########################################################################### +csr: + cn: ca.org2.network1.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: org2.network1.com + OU: Fabric + hosts: + - 6bbd89430166 + - localhost + - org2.network1.com + ca: + expiry: 131400h + pathlength: 1 + +########################################################################### +# Each CA can issue both X509 enrollment certificate as well as Idemix +# Credential. This section specifies configuration for the issuer component +# that is responsible for issuing Idemix credentials. +########################################################################### +idemix: + # Specifies pool size for revocation handles. A revocation handle is an unique identifier of an + # Idemix credential. The issuer will create a pool revocation handles of this specified size. When + # a credential is requested, issuer will get handle from the pool and assign it to the credential. + # Issuer will repopulate the pool with new handles when the last handle in the pool is used. + # A revocation handle and credential revocation information (CRI) are used to create non revocation proof + # by the prover to prove to the verifier that her credential is not revoked. + rhpoolsize: 1000 + + # The Idemix credential issuance is a two step process. First step is to get a nonce from the issuer + # and second step is send credential request that is constructed using the nonce to the isuser to + # request a credential. This configuration property specifies expiration for the nonces. By default is + # nonces expire after 15 seconds. The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration). + nonceexpiration: 15s + + # Specifies interval at which expired nonces are removed from datastore. Default value is 15 minutes. + # The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration) + noncesweepinterval: 15m + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section is used to select which +# crypto library implementation to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + +############################################################################# +# Multi CA section +# +# Each Fabric CA server contains one CA by default. This section is used +# to configure multiple CAs in a single server. +# +# 1) --cacount +# Automatically generate non-default CAs. The names of these +# additional CAs are "ca1", "ca2", ... "caN", where "N" is +# This is particularly useful in a development environment to quickly set up +# multiple CAs. Note that, this config option is not applicable to intermediate CA server +# i.e., Fabric CA server that is started with intermediate.parentserver.url config +# option (-u command line option) +# +# 2) --cafiles +# For each CA config file in the list, generate a separate signing CA. Each CA +# config file in this list MAY contain all of the same elements as are found in +# the server config file except port, debug, and tls sections. +# +# Examples: +# fabric-ca-server start -b admin:adminpw --cacount 2 +# +# fabric-ca-server start -b admin:adminpw --cafiles ca/ca1/fabric-ca-server-config.yaml +# --cafiles ca/ca2/fabric-ca-server-config.yaml +# +############################################################################# + +cacount: + +cafiles: + +############################################################################# +# Intermediate CA section +# +# The relationship between servers and CAs is as follows: +# 1) A single server process may contain or function as one or more CAs. +# This is configured by the "Multi CA section" above. +# 2) Each CA is either a root CA or an intermediate CA. +# 3) Each intermediate CA has a parent CA which is either a root CA or another intermediate CA. +# +# This section pertains to configuration of #2 and #3. +# If the "intermediate.parentserver.url" property is set, +# then this is an intermediate CA with the specified parent +# CA. +# +# parentserver section +# url - The URL of the parent server +# caname - Name of the CA to enroll within the server +# +# enrollment section used to enroll intermediate CA with parent CA +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +# +# tls section for secure socket connection +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# CA configuration section +# +# Configure the number of incorrect password attempts are allowed for +# identities. By default, the value of 'passwordattempts' is 10, which +# means that 10 incorrect password attempts can be made before an identity get +# locked out. +############################################################################# +cfg: + identities: + passwordattempts: 10 + +############################################################################### +# +# Operations section +# +############################################################################### +operations: + # host and port for the operations server + listenAddress: 127.0.0.1:9443 + + # TLS configuration for the operations endpoint + tls: + # TLS enabled + enabled: false + + # path to PEM encoded server certificate for the operations server + cert: + file: + + # path to PEM encoded server key for the operations server + key: + file: + + # require client certificate authentication to access all resources + clientAuthRequired: false + + # paths to PEM encoded ca certificates to trust for client authentication + clientRootCAs: + files: [] + +############################################################################### +# +# Metrics section +# +############################################################################### +metrics: + # statsd, prometheus, or disabled + provider: disabled + + # statsd configuration + statsd: + # network type: tcp or udp + network: udp + + # statsd server address + address: 127.0.0.1:8125 + + # the interval at which locally cached counters and gauges are pushsed + # to statsd; timings are pushed immediately + writeInterval: 10s + + # prefix is prepended to all emitted statsd merics + prefix: server diff --git a/weaver/tests/network-setups/fabric/shared/network1/system-genesis-block/.gitkeep b/weaver/tests/network-setups/fabric/shared/network1/system-genesis-block/.gitkeep new file mode 100644 index 00000000000..e69de29bb2d diff --git a/weaver/tests/network-setups/fabric/shared/network1/wallet/.gitkeep b/weaver/tests/network-setups/fabric/shared/network1/wallet/.gitkeep new file mode 100644 index 00000000000..e69de29bb2d diff --git a/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/ordererOrg/fabric-ca-server-config.yaml b/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/ordererOrg/fabric-ca-server-config.yaml new file mode 100644 index 00000000000..8fc0a8d9f4b --- /dev/null +++ b/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/ordererOrg/fabric-ca-server-config.yaml @@ -0,0 +1,504 @@ +############################################################################# +# This is a configuration file for the fabric-ca-server command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --port 443 +# To set the listening port +# b) --ca.keyfile ../mykey.pem +# To set the "keyfile" element in the "ca" section below; +# note the '.' separator character. +# 2) environment variable +# Examples: +# a) FABRIC_CA_SERVER_PORT=443 +# To set the listening port +# b) FABRIC_CA_SERVER_CA_KEYFILE="../mykey.pem" +# To set the "keyfile" element in the "ca" section below; +# note the '_' separator character. +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfile" and "tls.clientauth.certfiles". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +# Version of config file +version: 1.4.7 + +# Server's listening port (default: 7054) +port: 7054 + +# Cross-Origin Resource Sharing (CORS) +cors: + enabled: false + origins: + - "*" + +# Enables debug logging (default: false) +debug: false + +# Size limit of an acceptable CRL in bytes (default: 512000) +crlsizelimit: 512000 + +############################################################################# +# TLS section for the server's listening port +# +# The following types are supported for client authentication: NoClientCert, +# RequestClientCert, RequireAnyClientCert, VerifyClientCertIfGiven, +# and RequireAndVerifyClientCert. +# +# Certfiles is a list of root certificate authorities that the server uses +# when verifying client certificates. +############################################################################# +tls: + # Enable TLS (default: false) + enabled: false + # TLS for the server's listening port + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +############################################################################# +# The CA section contains information related to the Certificate Authority +# including the name of the CA, which should be unique for all members +# of a blockchain network. It also includes the key and certificate files +# used when issuing enrollment certificates (ECerts) and transaction +# certificates (TCerts). +# The chainfile (if it exists) contains the certificate chain which +# should be trusted for this CA, where the 1st in the chain is always the +# root CA certificate. +############################################################################# +ca: + # Name of this CA + name: + # Key file (is only used to import a private key into BCCSP) + keyfile: + # Certificate file (default: ca-cert.pem) + certfile: + # Chain file + chainfile: + +############################################################################# +# The gencrl REST endpoint is used to generate a CRL that contains revoked +# certificates. This section contains configuration options that are used +# during gencrl request processing. +############################################################################# +crl: + # Specifies expiration for the generated CRL. The number of hours + # specified by this property is added to the UTC time, the resulting time + # is used to set the 'Next Update' date of the CRL. + expiry: 24h + +############################################################################# +# The registry section controls how the fabric-ca-server does two things: +# 1) authenticates enrollment requests which contain a username and password +# (also known as an enrollment ID and secret). +# 2) once authenticated, retrieves the identity's attribute names and +# values which the fabric-ca-server optionally puts into TCerts +# which it issues for transacting on the Hyperledger Fabric blockchain. +# These attributes are useful for making access control decisions in +# chaincode. +# There are two main configuration options: +# 1) The fabric-ca-server is the registry. +# This is true if "ldap.enabled" in the ldap section below is false. +# 2) An LDAP server is the registry, in which case the fabric-ca-server +# calls the LDAP server to perform these tasks. +# This is true if "ldap.enabled" in the ldap section below is true, +# which means this "registry" section is ignored. +############################################################################# +registry: + # Maximum number of times a password/secret can be reused for enrollment + # (default: -1, which means there is no limit) + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +############################################################################# +# Database section +# Supported types are: "sqlite3", "postgres", and "mysql". +# The datasource value depends on the type. +# If the type is "sqlite3", the datasource value is a file name to use +# as the database store. Since "sqlite3" is an embedded database, it +# may not be used if you want to run the fabric-ca-server in a cluster. +# To run the fabric-ca-server in a cluster, you must choose "postgres" +# or "mysql". +############################################################################# +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# LDAP section +# If LDAP is enabled, the fabric-ca-server calls LDAP to: +# 1) authenticate enrollment ID and secret (i.e. username and password) +# for enrollment requests; +# 2) To retrieve identity attributes +############################################################################# +ldap: + # Enables or disables the LDAP client (default: false) + # If this is set to true, the "registry" section is ignored. + enabled: false + # The URL of the LDAP server + url: ldap://:@:/ + # TLS configuration for the client connection to the LDAP server + tls: + certfiles: + client: + certfile: + keyfile: + # Attribute related configuration for mapping from LDAP entries to Fabric CA attributes + attribute: + # 'names' is an array of strings containing the LDAP attribute names which are + # requested from the LDAP server for an LDAP identity's entry + names: ['uid','member'] + # The 'converters' section is used to convert an LDAP entry to the value of + # a fabric CA attribute. + # For example, the following converts an LDAP 'uid' attribute + # whose value begins with 'revoker' to a fabric CA attribute + # named "hf.Revoker" with a value of "true" (because the boolean expression + # evaluates to true). + # converters: + # - name: hf.Revoker + # value: attr("uid") =~ "revoker*" + converters: + - name: + value: + # The 'maps' section contains named maps which may be referenced by the 'map' + # function in the 'converters' section to map LDAP responses to arbitrary values. + # For example, assume a user has an LDAP attribute named 'member' which has multiple + # values which are each a distinguished name (i.e. a DN). For simplicity, assume the + # values of the 'member' attribute are 'dn1', 'dn2', and 'dn3'. + # Further assume the following configuration. + # converters: + # - name: hf.Registrar.Roles + # value: map(attr("member"),"groups") + # maps: + # groups: + # - name: dn1 + # value: peer + # - name: dn2 + # value: client + # The value of the user's 'hf.Registrar.Roles' attribute is then computed to be + # "peer,client,dn3". This is because the value of 'attr("member")' is + # "dn1,dn2,dn3", and the call to 'map' with a 2nd argument of + # "group" replaces "dn1" with "peer" and "dn2" with "client". + maps: + groups: + - name: + value: + +############################################################################# +# Affiliations section. Fabric CA server can be bootstrapped with the +# affiliations specified in this section. Affiliations are specified as maps. +# For example: +# businessunit1: +# department1: +# - team1 +# businessunit2: +# - department2 +# - department3 +# +# Affiliations are hierarchical in nature. In the above example, +# department1 (used as businessunit1.department1) is the child of businessunit1. +# team1 (used as businessunit1.department1.team1) is the child of department1. +# department2 (used as businessunit2.department2) and department3 (businessunit2.department3) +# are children of businessunit2. +# Note: Affiliations are case sensitive except for the non-leaf affiliations +# (like businessunit1, department1, businessunit2) that are specified in the configuration file, +# which are always stored in lower case. +############################################################################# +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +############################################################################# +# Signing section +# +# The "default" subsection is used to sign enrollment certificates; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +# +# The "ca" profile subsection is used to sign intermediate CA certificates; +# the default expiration ("expiry" field) is "43800h" which is 5 years in hours. +# Note that "isca" is true, meaning that it issues a CA certificate. +# A maxpathlen of 0 means that the intermediate CA cannot issue other +# intermediate CA certificates, though it can still issue end entity certificates. +# (See RFC 5280, section 4.2.1.9) +# +# The "tls" profile subsection is used to sign TLS certificate requests; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +############################################################################# +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 87600h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h + +########################################################################### +# Certificate Signing Request (CSR) section. +# This controls the creation of the root CA certificate. +# The expiration for the root CA certificate is configured with the +# "ca.expiry" field below, whose default value is "131400h" which is +# 15 years in hours. +# The pathlength field is used to limit CA certificate hierarchy as described +# in section 4.2.1.9 of RFC 5280. +# Examples: +# 1) No pathlength value means no limit is requested. +# 2) pathlength == 1 means a limit of 1 is requested which is the default for +# a root CA. This means the root CA can issue intermediate CA certificates, +# but these intermediate CAs may not in turn issue other CA certificates +# though they can still issue end entity certificates. +# 3) pathlength == 0 means a limit of 0 is requested; +# this is the default for an intermediate CA, which means it can not issue +# CA certificates though it can still issue end entity certificates. +########################################################################### +csr: + cn: fabric-ca-server + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: Hyperledger + OU: Fabric + hosts: + - 4fe624ffffd0 + - localhost + ca: + expiry: 131400h + pathlength: 1 + +########################################################################### +# Each CA can issue both X509 enrollment certificate as well as Idemix +# Credential. This section specifies configuration for the issuer component +# that is responsible for issuing Idemix credentials. +########################################################################### +idemix: + # Specifies pool size for revocation handles. A revocation handle is an unique identifier of an + # Idemix credential. The issuer will create a pool revocation handles of this specified size. When + # a credential is requested, issuer will get handle from the pool and assign it to the credential. + # Issuer will repopulate the pool with new handles when the last handle in the pool is used. + # A revocation handle and credential revocation information (CRI) are used to create non revocation proof + # by the prover to prove to the verifier that her credential is not revoked. + rhpoolsize: 1000 + + # The Idemix credential issuance is a two step process. First step is to get a nonce from the issuer + # and second step is send credential request that is constructed using the nonce to the isuser to + # request a credential. This configuration property specifies expiration for the nonces. By default is + # nonces expire after 15 seconds. The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration). + nonceexpiration: 15s + + # Specifies interval at which expired nonces are removed from datastore. Default value is 15 minutes. + # The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration) + noncesweepinterval: 15m + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section is used to select which +# crypto library implementation to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + +############################################################################# +# Multi CA section +# +# Each Fabric CA server contains one CA by default. This section is used +# to configure multiple CAs in a single server. +# +# 1) --cacount +# Automatically generate non-default CAs. The names of these +# additional CAs are "ca1", "ca2", ... "caN", where "N" is +# This is particularly useful in a development environment to quickly set up +# multiple CAs. Note that, this config option is not applicable to intermediate CA server +# i.e., Fabric CA server that is started with intermediate.parentserver.url config +# option (-u command line option) +# +# 2) --cafiles +# For each CA config file in the list, generate a separate signing CA. Each CA +# config file in this list MAY contain all of the same elements as are found in +# the server config file except port, debug, and tls sections. +# +# Examples: +# fabric-ca-server start -b admin:adminpw --cacount 2 +# +# fabric-ca-server start -b admin:adminpw --cafiles ca/ca1/fabric-ca-server-config.yaml +# --cafiles ca/ca2/fabric-ca-server-config.yaml +# +############################################################################# + +cacount: + +cafiles: + +############################################################################# +# Intermediate CA section +# +# The relationship between servers and CAs is as follows: +# 1) A single server process may contain or function as one or more CAs. +# This is configured by the "Multi CA section" above. +# 2) Each CA is either a root CA or an intermediate CA. +# 3) Each intermediate CA has a parent CA which is either a root CA or another intermediate CA. +# +# This section pertains to configuration of #2 and #3. +# If the "intermediate.parentserver.url" property is set, +# then this is an intermediate CA with the specified parent +# CA. +# +# parentserver section +# url - The URL of the parent server +# caname - Name of the CA to enroll within the server +# +# enrollment section used to enroll intermediate CA with parent CA +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +# +# tls section for secure socket connection +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# CA configuration section +# +# Configure the number of incorrect password attempts are allowed for +# identities. By default, the value of 'passwordattempts' is 10, which +# means that 10 incorrect password attempts can be made before an identity get +# locked out. +############################################################################# +cfg: + identities: + passwordattempts: 10 + +############################################################################### +# +# Operations section +# +############################################################################### +operations: + # host and port for the operations server + listenAddress: 127.0.0.1:9443 + + # TLS configuration for the operations endpoint + tls: + # TLS enabled + enabled: false + + # path to PEM encoded server certificate for the operations server + cert: + file: + + # path to PEM encoded server key for the operations server + key: + file: + + # require client certificate authentication to access all resources + clientAuthRequired: false + + # paths to PEM encoded ca certificates to trust for client authentication + clientRootCAs: + files: [] + +############################################################################### +# +# Metrics section +# +############################################################################### +metrics: + # statsd, prometheus, or disabled + provider: disabled + + # statsd configuration + statsd: + # network type: tcp or udp + network: udp + + # statsd server address + address: 127.0.0.1:8125 + + # the interval at which locally cached counters and gauges are pushsed + # to statsd; timings are pushed immediately + writeInterval: 10s + + # prefix is prepended to all emitted statsd merics + prefix: server diff --git a/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/org1/fabric-ca-server-config.yaml b/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/org1/fabric-ca-server-config.yaml new file mode 100644 index 00000000000..3dd067f6968 --- /dev/null +++ b/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/org1/fabric-ca-server-config.yaml @@ -0,0 +1,505 @@ +############################################################################# +# This is a configuration file for the fabric-ca-server command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --port 443 +# To set the listening port +# b) --ca.keyfile ../mykey.pem +# To set the "keyfile" element in the "ca" section below; +# note the '.' separator character. +# 2) environment variable +# Examples: +# a) FABRIC_CA_SERVER_PORT=443 +# To set the listening port +# b) FABRIC_CA_SERVER_CA_KEYFILE="../mykey.pem" +# To set the "keyfile" element in the "ca" section below; +# note the '_' separator character. +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfile" and "tls.clientauth.certfiles". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +# Version of config file +version: 1.4.7 + +# Server's listening port (default: 7054) +port: 7054 + +# Cross-Origin Resource Sharing (CORS) +cors: + enabled: false + origins: + - "*" + +# Enables debug logging (default: false) +debug: false + +# Size limit of an acceptable CRL in bytes (default: 512000) +crlsizelimit: 512000 + +############################################################################# +# TLS section for the server's listening port +# +# The following types are supported for client authentication: NoClientCert, +# RequestClientCert, RequireAnyClientCert, VerifyClientCertIfGiven, +# and RequireAndVerifyClientCert. +# +# Certfiles is a list of root certificate authorities that the server uses +# when verifying client certificates. +############################################################################# +tls: + # Enable TLS (default: false) + enabled: false + # TLS for the server's listening port + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +############################################################################# +# The CA section contains information related to the Certificate Authority +# including the name of the CA, which should be unique for all members +# of a blockchain network. It also includes the key and certificate files +# used when issuing enrollment certificates (ECerts) and transaction +# certificates (TCerts). +# The chainfile (if it exists) contains the certificate chain which +# should be trusted for this CA, where the 1st in the chain is always the +# root CA certificate. +############################################################################# +ca: + # Name of this CA + name: + # Key file (is only used to import a private key into BCCSP) + keyfile: + # Certificate file (default: ca-cert.pem) + certfile: + # Chain file + chainfile: + +############################################################################# +# The gencrl REST endpoint is used to generate a CRL that contains revoked +# certificates. This section contains configuration options that are used +# during gencrl request processing. +############################################################################# +crl: + # Specifies expiration for the generated CRL. The number of hours + # specified by this property is added to the UTC time, the resulting time + # is used to set the 'Next Update' date of the CRL. + expiry: 24h + +############################################################################# +# The registry section controls how the fabric-ca-server does two things: +# 1) authenticates enrollment requests which contain a username and password +# (also known as an enrollment ID and secret). +# 2) once authenticated, retrieves the identity's attribute names and +# values which the fabric-ca-server optionally puts into TCerts +# which it issues for transacting on the Hyperledger Fabric blockchain. +# These attributes are useful for making access control decisions in +# chaincode. +# There are two main configuration options: +# 1) The fabric-ca-server is the registry. +# This is true if "ldap.enabled" in the ldap section below is false. +# 2) An LDAP server is the registry, in which case the fabric-ca-server +# calls the LDAP server to perform these tasks. +# This is true if "ldap.enabled" in the ldap section below is true, +# which means this "registry" section is ignored. +############################################################################# +registry: + # Maximum number of times a password/secret can be reused for enrollment + # (default: -1, which means there is no limit) + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +############################################################################# +# Database section +# Supported types are: "sqlite3", "postgres", and "mysql". +# The datasource value depends on the type. +# If the type is "sqlite3", the datasource value is a file name to use +# as the database store. Since "sqlite3" is an embedded database, it +# may not be used if you want to run the fabric-ca-server in a cluster. +# To run the fabric-ca-server in a cluster, you must choose "postgres" +# or "mysql". +############################################################################# +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# LDAP section +# If LDAP is enabled, the fabric-ca-server calls LDAP to: +# 1) authenticate enrollment ID and secret (i.e. username and password) +# for enrollment requests; +# 2) To retrieve identity attributes +############################################################################# +ldap: + # Enables or disables the LDAP client (default: false) + # If this is set to true, the "registry" section is ignored. + enabled: false + # The URL of the LDAP server + url: ldap://:@:/ + # TLS configuration for the client connection to the LDAP server + tls: + certfiles: + client: + certfile: + keyfile: + # Attribute related configuration for mapping from LDAP entries to Fabric CA attributes + attribute: + # 'names' is an array of strings containing the LDAP attribute names which are + # requested from the LDAP server for an LDAP identity's entry + names: ['uid','member'] + # The 'converters' section is used to convert an LDAP entry to the value of + # a fabric CA attribute. + # For example, the following converts an LDAP 'uid' attribute + # whose value begins with 'revoker' to a fabric CA attribute + # named "hf.Revoker" with a value of "true" (because the boolean expression + # evaluates to true). + # converters: + # - name: hf.Revoker + # value: attr("uid") =~ "revoker*" + converters: + - name: + value: + # The 'maps' section contains named maps which may be referenced by the 'map' + # function in the 'converters' section to map LDAP responses to arbitrary values. + # For example, assume a user has an LDAP attribute named 'member' which has multiple + # values which are each a distinguished name (i.e. a DN). For simplicity, assume the + # values of the 'member' attribute are 'dn1', 'dn2', and 'dn3'. + # Further assume the following configuration. + # converters: + # - name: hf.Registrar.Roles + # value: map(attr("member"),"groups") + # maps: + # groups: + # - name: dn1 + # value: peer + # - name: dn2 + # value: client + # The value of the user's 'hf.Registrar.Roles' attribute is then computed to be + # "peer,client,dn3". This is because the value of 'attr("member")' is + # "dn1,dn2,dn3", and the call to 'map' with a 2nd argument of + # "group" replaces "dn1" with "peer" and "dn2" with "client". + maps: + groups: + - name: + value: + +############################################################################# +# Affiliations section. Fabric CA server can be bootstrapped with the +# affiliations specified in this section. Affiliations are specified as maps. +# For example: +# businessunit1: +# department1: +# - team1 +# businessunit2: +# - department2 +# - department3 +# +# Affiliations are hierarchical in nature. In the above example, +# department1 (used as businessunit1.department1) is the child of businessunit1. +# team1 (used as businessunit1.department1.team1) is the child of department1. +# department2 (used as businessunit2.department2) and department3 (businessunit2.department3) +# are children of businessunit2. +# Note: Affiliations are case sensitive except for the non-leaf affiliations +# (like businessunit1, department1, businessunit2) that are specified in the configuration file, +# which are always stored in lower case. +############################################################################# +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +############################################################################# +# Signing section +# +# The "default" subsection is used to sign enrollment certificates; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +# +# The "ca" profile subsection is used to sign intermediate CA certificates; +# the default expiration ("expiry" field) is "43800h" which is 5 years in hours. +# Note that "isca" is true, meaning that it issues a CA certificate. +# A maxpathlen of 0 means that the intermediate CA cannot issue other +# intermediate CA certificates, though it can still issue end entity certificates. +# (See RFC 5280, section 4.2.1.9) +# +# The "tls" profile subsection is used to sign TLS certificate requests; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +############################################################################# +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 87600h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h + +########################################################################### +# Certificate Signing Request (CSR) section. +# This controls the creation of the root CA certificate. +# The expiration for the root CA certificate is configured with the +# "ca.expiry" field below, whose default value is "131400h" which is +# 15 years in hours. +# The pathlength field is used to limit CA certificate hierarchy as described +# in section 4.2.1.9 of RFC 5280. +# Examples: +# 1) No pathlength value means no limit is requested. +# 2) pathlength == 1 means a limit of 1 is requested which is the default for +# a root CA. This means the root CA can issue intermediate CA certificates, +# but these intermediate CAs may not in turn issue other CA certificates +# though they can still issue end entity certificates. +# 3) pathlength == 0 means a limit of 0 is requested; +# this is the default for an intermediate CA, which means it can not issue +# CA certificates though it can still issue end entity certificates. +########################################################################### +csr: + cn: ca.org1.network2.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: org1.network2.com + OU: Fabric + hosts: + - e7bbd10fb786 + - localhost + - org1.network2.com + ca: + expiry: 131400h + pathlength: 1 + +########################################################################### +# Each CA can issue both X509 enrollment certificate as well as Idemix +# Credential. This section specifies configuration for the issuer component +# that is responsible for issuing Idemix credentials. +########################################################################### +idemix: + # Specifies pool size for revocation handles. A revocation handle is an unique identifier of an + # Idemix credential. The issuer will create a pool revocation handles of this specified size. When + # a credential is requested, issuer will get handle from the pool and assign it to the credential. + # Issuer will repopulate the pool with new handles when the last handle in the pool is used. + # A revocation handle and credential revocation information (CRI) are used to create non revocation proof + # by the prover to prove to the verifier that her credential is not revoked. + rhpoolsize: 1000 + + # The Idemix credential issuance is a two step process. First step is to get a nonce from the issuer + # and second step is send credential request that is constructed using the nonce to the isuser to + # request a credential. This configuration property specifies expiration for the nonces. By default is + # nonces expire after 15 seconds. The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration). + nonceexpiration: 15s + + # Specifies interval at which expired nonces are removed from datastore. Default value is 15 minutes. + # The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration) + noncesweepinterval: 15m + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section is used to select which +# crypto library implementation to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + +############################################################################# +# Multi CA section +# +# Each Fabric CA server contains one CA by default. This section is used +# to configure multiple CAs in a single server. +# +# 1) --cacount +# Automatically generate non-default CAs. The names of these +# additional CAs are "ca1", "ca2", ... "caN", where "N" is +# This is particularly useful in a development environment to quickly set up +# multiple CAs. Note that, this config option is not applicable to intermediate CA server +# i.e., Fabric CA server that is started with intermediate.parentserver.url config +# option (-u command line option) +# +# 2) --cafiles +# For each CA config file in the list, generate a separate signing CA. Each CA +# config file in this list MAY contain all of the same elements as are found in +# the server config file except port, debug, and tls sections. +# +# Examples: +# fabric-ca-server start -b admin:adminpw --cacount 2 +# +# fabric-ca-server start -b admin:adminpw --cafiles ca/ca1/fabric-ca-server-config.yaml +# --cafiles ca/ca2/fabric-ca-server-config.yaml +# +############################################################################# + +cacount: + +cafiles: + +############################################################################# +# Intermediate CA section +# +# The relationship between servers and CAs is as follows: +# 1) A single server process may contain or function as one or more CAs. +# This is configured by the "Multi CA section" above. +# 2) Each CA is either a root CA or an intermediate CA. +# 3) Each intermediate CA has a parent CA which is either a root CA or another intermediate CA. +# +# This section pertains to configuration of #2 and #3. +# If the "intermediate.parentserver.url" property is set, +# then this is an intermediate CA with the specified parent +# CA. +# +# parentserver section +# url - The URL of the parent server +# caname - Name of the CA to enroll within the server +# +# enrollment section used to enroll intermediate CA with parent CA +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +# +# tls section for secure socket connection +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# CA configuration section +# +# Configure the number of incorrect password attempts are allowed for +# identities. By default, the value of 'passwordattempts' is 10, which +# means that 10 incorrect password attempts can be made before an identity get +# locked out. +############################################################################# +cfg: + identities: + passwordattempts: 10 + +############################################################################### +# +# Operations section +# +############################################################################### +operations: + # host and port for the operations server + listenAddress: 127.0.0.1:9443 + + # TLS configuration for the operations endpoint + tls: + # TLS enabled + enabled: false + + # path to PEM encoded server certificate for the operations server + cert: + file: + + # path to PEM encoded server key for the operations server + key: + file: + + # require client certificate authentication to access all resources + clientAuthRequired: false + + # paths to PEM encoded ca certificates to trust for client authentication + clientRootCAs: + files: [] + +############################################################################### +# +# Metrics section +# +############################################################################### +metrics: + # statsd, prometheus, or disabled + provider: disabled + + # statsd configuration + statsd: + # network type: tcp or udp + network: udp + + # statsd server address + address: 127.0.0.1:8125 + + # the interval at which locally cached counters and gauges are pushsed + # to statsd; timings are pushed immediately + writeInterval: 10s + + # prefix is prepended to all emitted statsd merics + prefix: server diff --git a/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/org2/fabric-ca-server-config.yaml b/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/org2/fabric-ca-server-config.yaml new file mode 100644 index 00000000000..ba5845a3ae6 --- /dev/null +++ b/weaver/tests/network-setups/fabric/shared/network2/fabric-ca/org2/fabric-ca-server-config.yaml @@ -0,0 +1,505 @@ +############################################################################# +# This is a configuration file for the fabric-ca-server command. +# +# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES +# ------------------------------------------------ +# Each configuration element can be overridden via command line +# arguments or environment variables. The precedence for determining +# the value of each element is as follows: +# 1) command line argument +# Examples: +# a) --port 443 +# To set the listening port +# b) --ca.keyfile ../mykey.pem +# To set the "keyfile" element in the "ca" section below; +# note the '.' separator character. +# 2) environment variable +# Examples: +# a) FABRIC_CA_SERVER_PORT=443 +# To set the listening port +# b) FABRIC_CA_SERVER_CA_KEYFILE="../mykey.pem" +# To set the "keyfile" element in the "ca" section below; +# note the '_' separator character. +# 3) configuration file +# 4) default value (if there is one) +# All default values are shown beside each element below. +# +# FILE NAME ELEMENTS +# ------------------ +# The value of all fields whose name ends with "file" or "files" are +# name or names of other files. +# For example, see "tls.certfile" and "tls.clientauth.certfiles". +# The value of each of these fields can be a simple filename, a +# relative path, or an absolute path. If the value is not an +# absolute path, it is interpretted as being relative to the location +# of this configuration file. +# +############################################################################# + +# Version of config file +version: 1.4.7 + +# Server's listening port (default: 7054) +port: 7054 + +# Cross-Origin Resource Sharing (CORS) +cors: + enabled: false + origins: + - "*" + +# Enables debug logging (default: false) +debug: false + +# Size limit of an acceptable CRL in bytes (default: 512000) +crlsizelimit: 512000 + +############################################################################# +# TLS section for the server's listening port +# +# The following types are supported for client authentication: NoClientCert, +# RequestClientCert, RequireAnyClientCert, VerifyClientCertIfGiven, +# and RequireAndVerifyClientCert. +# +# Certfiles is a list of root certificate authorities that the server uses +# when verifying client certificates. +############################################################################# +tls: + # Enable TLS (default: false) + enabled: false + # TLS for the server's listening port + certfile: + keyfile: + clientauth: + type: noclientcert + certfiles: + +############################################################################# +# The CA section contains information related to the Certificate Authority +# including the name of the CA, which should be unique for all members +# of a blockchain network. It also includes the key and certificate files +# used when issuing enrollment certificates (ECerts) and transaction +# certificates (TCerts). +# The chainfile (if it exists) contains the certificate chain which +# should be trusted for this CA, where the 1st in the chain is always the +# root CA certificate. +############################################################################# +ca: + # Name of this CA + name: + # Key file (is only used to import a private key into BCCSP) + keyfile: + # Certificate file (default: ca-cert.pem) + certfile: + # Chain file + chainfile: + +############################################################################# +# The gencrl REST endpoint is used to generate a CRL that contains revoked +# certificates. This section contains configuration options that are used +# during gencrl request processing. +############################################################################# +crl: + # Specifies expiration for the generated CRL. The number of hours + # specified by this property is added to the UTC time, the resulting time + # is used to set the 'Next Update' date of the CRL. + expiry: 24h + +############################################################################# +# The registry section controls how the fabric-ca-server does two things: +# 1) authenticates enrollment requests which contain a username and password +# (also known as an enrollment ID and secret). +# 2) once authenticated, retrieves the identity's attribute names and +# values which the fabric-ca-server optionally puts into TCerts +# which it issues for transacting on the Hyperledger Fabric blockchain. +# These attributes are useful for making access control decisions in +# chaincode. +# There are two main configuration options: +# 1) The fabric-ca-server is the registry. +# This is true if "ldap.enabled" in the ldap section below is false. +# 2) An LDAP server is the registry, in which case the fabric-ca-server +# calls the LDAP server to perform these tasks. +# This is true if "ldap.enabled" in the ldap section below is true, +# which means this "registry" section is ignored. +############################################################################# +registry: + # Maximum number of times a password/secret can be reused for enrollment + # (default: -1, which means there is no limit) + maxenrollments: -1 + + # Contains identity information which is used when LDAP is disabled + identities: + - name: admin + pass: adminpw + type: client + affiliation: "" + attrs: + hf.Registrar.Roles: "*" + hf.Registrar.DelegateRoles: "*" + hf.Revoker: true + hf.IntermediateCA: true + hf.GenCRL: true + hf.Registrar.Attributes: "*" + hf.AffiliationMgr: true + +############################################################################# +# Database section +# Supported types are: "sqlite3", "postgres", and "mysql". +# The datasource value depends on the type. +# If the type is "sqlite3", the datasource value is a file name to use +# as the database store. Since "sqlite3" is an embedded database, it +# may not be used if you want to run the fabric-ca-server in a cluster. +# To run the fabric-ca-server in a cluster, you must choose "postgres" +# or "mysql". +############################################################################# +db: + type: sqlite3 + datasource: fabric-ca-server.db + tls: + enabled: false + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# LDAP section +# If LDAP is enabled, the fabric-ca-server calls LDAP to: +# 1) authenticate enrollment ID and secret (i.e. username and password) +# for enrollment requests; +# 2) To retrieve identity attributes +############################################################################# +ldap: + # Enables or disables the LDAP client (default: false) + # If this is set to true, the "registry" section is ignored. + enabled: false + # The URL of the LDAP server + url: ldap://:@:/ + # TLS configuration for the client connection to the LDAP server + tls: + certfiles: + client: + certfile: + keyfile: + # Attribute related configuration for mapping from LDAP entries to Fabric CA attributes + attribute: + # 'names' is an array of strings containing the LDAP attribute names which are + # requested from the LDAP server for an LDAP identity's entry + names: ['uid','member'] + # The 'converters' section is used to convert an LDAP entry to the value of + # a fabric CA attribute. + # For example, the following converts an LDAP 'uid' attribute + # whose value begins with 'revoker' to a fabric CA attribute + # named "hf.Revoker" with a value of "true" (because the boolean expression + # evaluates to true). + # converters: + # - name: hf.Revoker + # value: attr("uid") =~ "revoker*" + converters: + - name: + value: + # The 'maps' section contains named maps which may be referenced by the 'map' + # function in the 'converters' section to map LDAP responses to arbitrary values. + # For example, assume a user has an LDAP attribute named 'member' which has multiple + # values which are each a distinguished name (i.e. a DN). For simplicity, assume the + # values of the 'member' attribute are 'dn1', 'dn2', and 'dn3'. + # Further assume the following configuration. + # converters: + # - name: hf.Registrar.Roles + # value: map(attr("member"),"groups") + # maps: + # groups: + # - name: dn1 + # value: peer + # - name: dn2 + # value: client + # The value of the user's 'hf.Registrar.Roles' attribute is then computed to be + # "peer,client,dn3". This is because the value of 'attr("member")' is + # "dn1,dn2,dn3", and the call to 'map' with a 2nd argument of + # "group" replaces "dn1" with "peer" and "dn2" with "client". + maps: + groups: + - name: + value: + +############################################################################# +# Affiliations section. Fabric CA server can be bootstrapped with the +# affiliations specified in this section. Affiliations are specified as maps. +# For example: +# businessunit1: +# department1: +# - team1 +# businessunit2: +# - department2 +# - department3 +# +# Affiliations are hierarchical in nature. In the above example, +# department1 (used as businessunit1.department1) is the child of businessunit1. +# team1 (used as businessunit1.department1.team1) is the child of department1. +# department2 (used as businessunit2.department2) and department3 (businessunit2.department3) +# are children of businessunit2. +# Note: Affiliations are case sensitive except for the non-leaf affiliations +# (like businessunit1, department1, businessunit2) that are specified in the configuration file, +# which are always stored in lower case. +############################################################################# +affiliations: + org1: + - department1 + - department2 + org2: + - department1 + +############################################################################# +# Signing section +# +# The "default" subsection is used to sign enrollment certificates; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +# +# The "ca" profile subsection is used to sign intermediate CA certificates; +# the default expiration ("expiry" field) is "43800h" which is 5 years in hours. +# Note that "isca" is true, meaning that it issues a CA certificate. +# A maxpathlen of 0 means that the intermediate CA cannot issue other +# intermediate CA certificates, though it can still issue end entity certificates. +# (See RFC 5280, section 4.2.1.9) +# +# The "tls" profile subsection is used to sign TLS certificate requests; +# the default expiration ("expiry" field) is "87600h", which is 10 years in hours. +############################################################################# +signing: + default: + usage: + - digital signature + expiry: 87600h + profiles: + ca: + usage: + - cert sign + - crl sign + expiry: 87600h + caconstraint: + isca: true + maxpathlen: 0 + tls: + usage: + - signing + - key encipherment + - server auth + - client auth + - key agreement + expiry: 87600h + +########################################################################### +# Certificate Signing Request (CSR) section. +# This controls the creation of the root CA certificate. +# The expiration for the root CA certificate is configured with the +# "ca.expiry" field below, whose default value is "131400h" which is +# 15 years in hours. +# The pathlength field is used to limit CA certificate hierarchy as described +# in section 4.2.1.9 of RFC 5280. +# Examples: +# 1) No pathlength value means no limit is requested. +# 2) pathlength == 1 means a limit of 1 is requested which is the default for +# a root CA. This means the root CA can issue intermediate CA certificates, +# but these intermediate CAs may not in turn issue other CA certificates +# though they can still issue end entity certificates. +# 3) pathlength == 0 means a limit of 0 is requested; +# this is the default for an intermediate CA, which means it can not issue +# CA certificates though it can still issue end entity certificates. +########################################################################### +csr: + cn: ca.org2.network2.com + keyrequest: + algo: ecdsa + size: 256 + names: + - C: US + ST: "North Carolina" + L: + O: org2.network2.com + OU: Fabric + hosts: + - e7bbd10fb786 + - localhost + - org2.network2.com + ca: + expiry: 131400h + pathlength: 1 + +########################################################################### +# Each CA can issue both X509 enrollment certificate as well as Idemix +# Credential. This section specifies configuration for the issuer component +# that is responsible for issuing Idemix credentials. +########################################################################### +idemix: + # Specifies pool size for revocation handles. A revocation handle is an unique identifier of an + # Idemix credential. The issuer will create a pool revocation handles of this specified size. When + # a credential is requested, issuer will get handle from the pool and assign it to the credential. + # Issuer will repopulate the pool with new handles when the last handle in the pool is used. + # A revocation handle and credential revocation information (CRI) are used to create non revocation proof + # by the prover to prove to the verifier that her credential is not revoked. + rhpoolsize: 1000 + + # The Idemix credential issuance is a two step process. First step is to get a nonce from the issuer + # and second step is send credential request that is constructed using the nonce to the isuser to + # request a credential. This configuration property specifies expiration for the nonces. By default is + # nonces expire after 15 seconds. The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration). + nonceexpiration: 15s + + # Specifies interval at which expired nonces are removed from datastore. Default value is 15 minutes. + # The value is expressed in the time.Duration format (see https://golang.org/pkg/time/#ParseDuration) + noncesweepinterval: 15m + +############################################################################# +# BCCSP (BlockChain Crypto Service Provider) section is used to select which +# crypto library implementation to use +############################################################################# +bccsp: + default: SW + sw: + hash: SHA2 + security: 256 + filekeystore: + # The directory used for the software file-based keystore + keystore: msp/keystore + +############################################################################# +# Multi CA section +# +# Each Fabric CA server contains one CA by default. This section is used +# to configure multiple CAs in a single server. +# +# 1) --cacount +# Automatically generate non-default CAs. The names of these +# additional CAs are "ca1", "ca2", ... "caN", where "N" is +# This is particularly useful in a development environment to quickly set up +# multiple CAs. Note that, this config option is not applicable to intermediate CA server +# i.e., Fabric CA server that is started with intermediate.parentserver.url config +# option (-u command line option) +# +# 2) --cafiles +# For each CA config file in the list, generate a separate signing CA. Each CA +# config file in this list MAY contain all of the same elements as are found in +# the server config file except port, debug, and tls sections. +# +# Examples: +# fabric-ca-server start -b admin:adminpw --cacount 2 +# +# fabric-ca-server start -b admin:adminpw --cafiles ca/ca1/fabric-ca-server-config.yaml +# --cafiles ca/ca2/fabric-ca-server-config.yaml +# +############################################################################# + +cacount: + +cafiles: + +############################################################################# +# Intermediate CA section +# +# The relationship between servers and CAs is as follows: +# 1) A single server process may contain or function as one or more CAs. +# This is configured by the "Multi CA section" above. +# 2) Each CA is either a root CA or an intermediate CA. +# 3) Each intermediate CA has a parent CA which is either a root CA or another intermediate CA. +# +# This section pertains to configuration of #2 and #3. +# If the "intermediate.parentserver.url" property is set, +# then this is an intermediate CA with the specified parent +# CA. +# +# parentserver section +# url - The URL of the parent server +# caname - Name of the CA to enroll within the server +# +# enrollment section used to enroll intermediate CA with parent CA +# profile - Name of the signing profile to use in issuing the certificate +# label - Label to use in HSM operations +# +# tls section for secure socket connection +# certfiles - PEM-encoded list of trusted root certificate files +# client: +# certfile - PEM-encoded certificate file for when client authentication +# is enabled on server +# keyfile - PEM-encoded key file for when client authentication +# is enabled on server +############################################################################# +intermediate: + parentserver: + url: + caname: + + enrollment: + hosts: + profile: + label: + + tls: + certfiles: + client: + certfile: + keyfile: + +############################################################################# +# CA configuration section +# +# Configure the number of incorrect password attempts are allowed for +# identities. By default, the value of 'passwordattempts' is 10, which +# means that 10 incorrect password attempts can be made before an identity get +# locked out. +############################################################################# +cfg: + identities: + passwordattempts: 10 + +############################################################################### +# +# Operations section +# +############################################################################### +operations: + # host and port for the operations server + listenAddress: 127.0.0.1:9443 + + # TLS configuration for the operations endpoint + tls: + # TLS enabled + enabled: false + + # path to PEM encoded server certificate for the operations server + cert: + file: + + # path to PEM encoded server key for the operations server + key: + file: + + # require client certificate authentication to access all resources + clientAuthRequired: false + + # paths to PEM encoded ca certificates to trust for client authentication + clientRootCAs: + files: [] + +############################################################################### +# +# Metrics section +# +############################################################################### +metrics: + # statsd, prometheus, or disabled + provider: disabled + + # statsd configuration + statsd: + # network type: tcp or udp + network: udp + + # statsd server address + address: 127.0.0.1:8125 + + # the interval at which locally cached counters and gauges are pushsed + # to statsd; timings are pushed immediately + writeInterval: 10s + + # prefix is prepended to all emitted statsd merics + prefix: server diff --git a/weaver/tests/network-setups/fabric/shared/network2/system-genesis-block/.gitkeep b/weaver/tests/network-setups/fabric/shared/network2/system-genesis-block/.gitkeep new file mode 100644 index 00000000000..e69de29bb2d diff --git a/weaver/tests/network-setups/fabric/shared/network2/wallet/.gitkeep b/weaver/tests/network-setups/fabric/shared/network2/wallet/.gitkeep new file mode 100644 index 00000000000..e69de29bb2d