Generated credential's cn has no suffix
parent
593f88c33f
commit
0115e8175c
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAElrxQZ6gowmj2lx/rvgwuJpw6N/lcmQ0p
|
||||||
|
Ev+ZnXuw1/p6b2ExvMQIZ5g3dQ5fXk9Cn6ZPkx9O9EVdNMFQHdcMUxw0TU/Aodwe
|
||||||
|
2iM2CTL4vlQyE1jPchTksA5TajJQCSCI
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICDTCCAbOgAwIBAgIUW+04RptN2graLOmClc14tpFScJMwCgYIKoZIzj0EAwIw
|
||||||
|
YjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRQwEgYDVQQK
|
||||||
|
EwtleGFtcGxlLmNvbTELMAkGA1UECxMCY2ExFzAVBgNVBAMTDmNhLmV4YW1wbGUu
|
||||||
|
Y29tMCAXDTE4MTAxMjA4NTcwMFoYDzIxNjgwOTA1MDg1NzAwWjBiMQswCQYDVQQG
|
||||||
|
EwJVUzEXMBUGA1UECBMOTm9ydGggQ2Fyb2xpbmExFDASBgNVBAoTC2V4YW1wbGUu
|
||||||
|
Y29tMQswCQYDVQQLEwJjYTEXMBUGA1UEAxMOY2EuZXhhbXBsZS5jb20wWTATBgcq
|
||||||
|
hkjOPQIBBggqhkjOPQMBBwNCAATBR97JMKtWes7KiIHOD/Cm6ndD3gn92rgiqyNY
|
||||||
|
rjS5putZABmaK2PRc5JBrw9ee6BERJJTV0MphwSug3WPDSNIo0UwQzAOBgNVHQ8B
|
||||||
|
Af8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAdBgNVHQ4EFgQU35gCrJjArRVf
|
||||||
|
c1H+xMDIBIGo64owCgYIKoZIzj0EAwIDSAAwRQIhAOReEs7Au22Ed3KVY/Wb9ArP
|
||||||
|
XomXnX951Cv6SJjohUixAiBS1d/qj2S8hC82STczs7wZU+vP841NOOU/j9fdFH16
|
||||||
|
8g==
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1nXDT9Gv5kyA/o3y
|
||||||
|
ElnE/KZ1gF8o4vVas+46SVpvk8qhRANCAATBR97JMKtWes7KiIHOD/Cm6ndD3gn9
|
||||||
|
2rgiqyNYrjS5putZABmaK2PRc5JBrw9ee6BERJJTV0MphwSug3WPDSNI
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,134 @@
|
||||||
|
version: 1.4.0
|
||||||
|
port: 7054
|
||||||
|
debug: false
|
||||||
|
crlsizelimit: 512000
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
||||||
|
clientauth:
|
||||||
|
type: noclientcert
|
||||||
|
certfiles: null
|
||||||
|
ca:
|
||||||
|
name: ca.example.com
|
||||||
|
keyfile: ca.example.com_sk
|
||||||
|
certfile: ca.example.com-cert.pem
|
||||||
|
chainfile: null
|
||||||
|
crl:
|
||||||
|
expiry: 24h
|
||||||
|
registry:
|
||||||
|
maxenrollments: -1
|
||||||
|
identities:
|
||||||
|
- name: boot-admin
|
||||||
|
pass: boot-pass
|
||||||
|
type: client
|
||||||
|
affiliation: ""
|
||||||
|
attrs:
|
||||||
|
hf.Registrar.Roles: '*'
|
||||||
|
hf.Registrar.DelegateRoles: '*'
|
||||||
|
hf.Revoker: true
|
||||||
|
hf.IntermediateCA: true
|
||||||
|
hf.GenCRL: true
|
||||||
|
hf.Registrar.Attributes: '*'
|
||||||
|
hf.AffiliationMgr: true
|
||||||
|
db:
|
||||||
|
type: sqlite3
|
||||||
|
datasource: fabric-ca-server.db
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
certfiles: null
|
||||||
|
client:
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
||||||
|
ldap:
|
||||||
|
enabled: false
|
||||||
|
url: ldap://<adminDN>:<adminPassword>@<host>:<port>/<base>
|
||||||
|
tls:
|
||||||
|
certfiles: null
|
||||||
|
client:
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
||||||
|
attribute:
|
||||||
|
names:
|
||||||
|
- uid
|
||||||
|
- member
|
||||||
|
converters:
|
||||||
|
- name: null
|
||||||
|
value: null
|
||||||
|
maps:
|
||||||
|
groups:
|
||||||
|
- name: null
|
||||||
|
value: null
|
||||||
|
affiliations:
|
||||||
|
org1:
|
||||||
|
- department1
|
||||||
|
- department2
|
||||||
|
org2:
|
||||||
|
- department1
|
||||||
|
signing:
|
||||||
|
default:
|
||||||
|
usage:
|
||||||
|
- digital signature
|
||||||
|
- cert sign
|
||||||
|
- crl sign
|
||||||
|
expiry: 87600h
|
||||||
|
profiles:
|
||||||
|
ca:
|
||||||
|
usage:
|
||||||
|
- cert sign
|
||||||
|
- crl sign
|
||||||
|
expiry: 43800h
|
||||||
|
caconstraint:
|
||||||
|
isca: true
|
||||||
|
maxpathlen: 0
|
||||||
|
tls:
|
||||||
|
usage:
|
||||||
|
- signing
|
||||||
|
- key encipherment
|
||||||
|
- server auth
|
||||||
|
- client auth
|
||||||
|
- key agreement
|
||||||
|
expiry: 87600h
|
||||||
|
csr:
|
||||||
|
cn: ca.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L: null
|
||||||
|
O: example.com
|
||||||
|
OU: ca
|
||||||
|
hosts:
|
||||||
|
- fabric-ca-server
|
||||||
|
- localhost
|
||||||
|
ca:
|
||||||
|
expiry: 1314000h
|
||||||
|
pathlength: 1
|
||||||
|
idemix:
|
||||||
|
rhpoolsize: 1000
|
||||||
|
nonceexpiration: 15s
|
||||||
|
noncesweepinterval: 15m
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
keystore: msp/keystore
|
||||||
|
cacount: null
|
||||||
|
cafiles: null
|
||||||
|
intermediate:
|
||||||
|
parentserver:
|
||||||
|
url: null
|
||||||
|
caname: null
|
||||||
|
enrollment:
|
||||||
|
hosts: null
|
||||||
|
profile: null
|
||||||
|
label: null
|
||||||
|
tls:
|
||||||
|
certfiles: null
|
||||||
|
client:
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg1nXDT9Gv5kyA/o3y
|
||||||
|
ElnE/KZ1gF8o4vVas+46SVpvk8qhRANCAATBR97JMKtWes7KiIHOD/Cm6ndD3gn9
|
||||||
|
2rgiqyNYrjS5putZABmaK2PRc5JBrw9ee6BERJJTV0MphwSug3WPDSNI
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,6 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGkAgEBBDAjhzxjRaRZLGVOklgx7o9aZvyCx8kwYw2sWu8YSH0l1FqLHZ7Mgdle
|
||||||
|
Bpu5J7qJuPmgBwYFK4EEACKhZANiAASWvFBnqCjCaPaXH+u+DC4mnDo3+VyZDSkS
|
||||||
|
/5mde7DX+npvYTG8xAhnmDd1Dl9eT0Kfpk+TH070RV00wVAd1wxTHDRNT8Ch3B7a
|
||||||
|
IzYJMvi+VDITWM9yFOSwDlNqMlAJIIg=
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1 @@
|
||||||
|
;—WF-™״²k[ה<><D794>®¯תִA¾LGˆ0Yד°J
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAE6LMQZx53Kgp+gunfCKNehruZy1AYQ72D
|
||||||
|
cfzkbq9Ei3sSJzClK0cnNphae80+l61Ak5imq2SQvu4lhqyssp4JME8b8WvFVWhm
|
||||||
|
OdQv+XTm1bAPN8ZKOxjqDB2Fbb8RQmCZ
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,134 @@
|
||||||
|
version: 1.4.0
|
||||||
|
port: 7054
|
||||||
|
debug: false
|
||||||
|
crlsizelimit: 512000
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
||||||
|
clientauth:
|
||||||
|
type: noclientcert
|
||||||
|
certfiles: null
|
||||||
|
ca:
|
||||||
|
name: tlsca.example.com
|
||||||
|
keyfile: tlsca.example.com_sk
|
||||||
|
certfile: tlsca.example.com-cert.pem
|
||||||
|
chainfile: null
|
||||||
|
crl:
|
||||||
|
expiry: 24h
|
||||||
|
registry:
|
||||||
|
maxenrollments: -1
|
||||||
|
identities:
|
||||||
|
- name: boot-admin
|
||||||
|
pass: boot-pass
|
||||||
|
type: client
|
||||||
|
affiliation: ""
|
||||||
|
attrs:
|
||||||
|
hf.Registrar.Roles: '*'
|
||||||
|
hf.Registrar.DelegateRoles: '*'
|
||||||
|
hf.Revoker: true
|
||||||
|
hf.IntermediateCA: true
|
||||||
|
hf.GenCRL: true
|
||||||
|
hf.Registrar.Attributes: '*'
|
||||||
|
hf.AffiliationMgr: true
|
||||||
|
db:
|
||||||
|
type: sqlite3
|
||||||
|
datasource: fabric-ca-server.db
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
certfiles: null
|
||||||
|
client:
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
||||||
|
ldap:
|
||||||
|
enabled: false
|
||||||
|
url: ldap://<adminDN>:<adminPassword>@<host>:<port>/<base>
|
||||||
|
tls:
|
||||||
|
certfiles: null
|
||||||
|
client:
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
||||||
|
attribute:
|
||||||
|
names:
|
||||||
|
- uid
|
||||||
|
- member
|
||||||
|
converters:
|
||||||
|
- name: null
|
||||||
|
value: null
|
||||||
|
maps:
|
||||||
|
groups:
|
||||||
|
- name: null
|
||||||
|
value: null
|
||||||
|
affiliations:
|
||||||
|
org1:
|
||||||
|
- department1
|
||||||
|
- department2
|
||||||
|
org2:
|
||||||
|
- department1
|
||||||
|
signing:
|
||||||
|
default:
|
||||||
|
usage:
|
||||||
|
- digital signature
|
||||||
|
- cert sign
|
||||||
|
- crl sign
|
||||||
|
expiry: 87600h
|
||||||
|
profiles:
|
||||||
|
ca:
|
||||||
|
usage:
|
||||||
|
- cert sign
|
||||||
|
- crl sign
|
||||||
|
expiry: 43800h
|
||||||
|
caconstraint:
|
||||||
|
isca: true
|
||||||
|
maxpathlen: 0
|
||||||
|
tls:
|
||||||
|
usage:
|
||||||
|
- signing
|
||||||
|
- key encipherment
|
||||||
|
- server auth
|
||||||
|
- client auth
|
||||||
|
- key agreement
|
||||||
|
expiry: 87600h
|
||||||
|
csr:
|
||||||
|
cn: tlsca.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L: null
|
||||||
|
O: example.com
|
||||||
|
OU: tlsca
|
||||||
|
hosts:
|
||||||
|
- fabric-ca-server
|
||||||
|
- localhost
|
||||||
|
ca:
|
||||||
|
expiry: 1314000h
|
||||||
|
pathlength: 1
|
||||||
|
idemix:
|
||||||
|
rhpoolsize: 1000
|
||||||
|
nonceexpiration: 15s
|
||||||
|
noncesweepinterval: 15m
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
keystore: msp/keystore
|
||||||
|
cacount: null
|
||||||
|
cafiles: null
|
||||||
|
intermediate:
|
||||||
|
parentserver:
|
||||||
|
url: null
|
||||||
|
caname: null
|
||||||
|
enrollment:
|
||||||
|
hosts: null
|
||||||
|
profile: null
|
||||||
|
label: null
|
||||||
|
tls:
|
||||||
|
certfiles: null
|
||||||
|
client:
|
||||||
|
certfile: null
|
||||||
|
keyfile: null
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUPdLlI4BVuCXdly
|
||||||
|
UQMuZ67vJYr2t4ybbr0jLHAIDdChRANCAATgOHkZzn6C6MieVWOZjGve0h/taMdx
|
||||||
|
QKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,6 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGkAgEBBDALaw+r+kOT0kY5O9E91HUwvqE7p4cTqrAJQ/ZFcgtUz9b8wPL23DOi
|
||||||
|
XM8Bf77RMaCgBwYFK4EEACKhZANiAATosxBnHncqCn6C6d8Io16Gu5nLUBhDvYNx
|
||||||
|
/ORur0SLexInMKUrRyc2mFp7zT6XrUCTmKarZJC+7iWGrKyyngkwTxvxa8VVaGY5
|
||||||
|
1C/5dObVsA83xko7GOoMHYVtvxFCYJk=
|
||||||
|
-----END PRIVATE KEY-----
|
Binary file not shown.
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICGTCCAb+gAwIBAgIUf6wM/e5Yoqad5ykzdyNMmFEkQpwwCgYIKoZIzj0EAwIw
|
||||||
|
aDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRQwEgYDVQQK
|
||||||
|
EwtleGFtcGxlLmNvbTEOMAwGA1UECxMFdGxzY2ExGjAYBgNVBAMTEXRsc2NhLmV4
|
||||||
|
YW1wbGUuY29tMCAXDTE4MTAxMjA4NTYwMFoYDzIxNjgwOTA1MDg1NjAwWjBoMQsw
|
||||||
|
CQYDVQQGEwJVUzEXMBUGA1UECBMOTm9ydGggQ2Fyb2xpbmExFDASBgNVBAoTC2V4
|
||||||
|
YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEaMBgGA1UEAxMRdGxzY2EuZXhhbXBs
|
||||||
|
ZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAATgOHkZzn6C6MieVWOZjGve
|
||||||
|
0h/taMdxQKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq
|
||||||
|
o0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAdBgNVHQ4E
|
||||||
|
FgQUnOwD/If5n4yCIxCc2kik9+mRsxYwCgYIKoZIzj0EAwIDSAAwRQIhAPNMC62d
|
||||||
|
5EsJjkqZLSuq9GyZDk+4fsHzNS6lgrlzZfuxAiBygZt2ee8Z8zwoZjTRXvcCj4Df
|
||||||
|
5+YwFqOjgPXdXg+nTA==
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgLUPdLlI4BVuCXdly
|
||||||
|
UQMuZ67vJYr2t4ybbr0jLHAIDdChRANCAATgOHkZzn6C6MieVWOZjGve0h/taMdx
|
||||||
|
QKLv8l08a1FScas16CDWIcDBSIWg1eRh/I/J7Ijjt6DEtHSt3ctGzAuq
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://ca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: Admin@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg8vMuirOjKSGHUNNF
|
||||||
|
qYlMP7ZlaOE8xD4BIV9UjYApuQyhRANCAATVFCmMnRB4YjYASeToLpW905Sr11d7
|
||||||
|
eJuWWVEXxRXweujA+2XIvJnu9oJzfctuEgAixaNfNLWaHo7AAdK1WOLw
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://tlsca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: Admin@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP
|
||||||
|
9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU
|
||||||
|
JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
|
FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
|
AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz
|
||||||
|
ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq
|
||||||
|
hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C
|
||||||
|
IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgfRcMLZfkPxSPSjxY
|
||||||
|
LOcLxIeUCd7C71EfZH9Jyj8cstqhRANCAASpl1xmXmNMex/YmPK9ew9sI4JW7w5B
|
||||||
|
e4whAaHEMEr4K9QWbmGUtZPtr3EKEHYbhA8BM2RdFkl+09fvew76T9tQ
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,19 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDDTCCArOgAwIBAgIUJbPbRHo+tTwYRVq0zJ2p3bzYtdMwCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy
|
||||||
|
MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE
|
||||||
|
BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG
|
||||||
|
A1UECxMEdXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTBZMBMG
|
||||||
|
ByqGSM49AgEGCCqGSM49AwEHA0IABKmXXGZeY0x7H9iY8r17D2wjglbvDkF7jCEB
|
||||||
|
ocQwSvgr1BZuYZS1k+2vcQoQdhuEDwEzZF0WSX7T1+97DvpP21CjggERMIIBDTAO
|
||||||
|
BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUPgf/xHQ/Nru2
|
||||||
|
+JEBpLOA2OClo6AwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD
|
||||||
|
VR0RBBowGIEWQWRtaW5Ab3JnMS5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsi
|
||||||
|
YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFm
|
||||||
|
ZmlsaWF0aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMS5leGFt
|
||||||
|
cGxlLmNvbSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQCl
|
||||||
|
X+M3Rp7MEAVT6N8D7TgqOh9Rmtrv4By1WVmeNf/ZAAIgb6Cb7Thh7y60I6OlxdOw
|
||||||
|
A3bsWxA4xq8q3gCL+/I2kDE=
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://ca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: User1@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWUNovBTSm43w0Gne
|
||||||
|
wH+gjOv4wnAUOes4Rl5xRfJNkFChRANCAAQYGe+D/gw4IbjDBD5XQutFqjELjXz+
|
||||||
|
WayBTKOK/gZP4lqwqp9NqWNWI8uiVilHKrKD24GqsM3+h5d5q2UJG5Hf
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://tlsca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: User1@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP
|
||||||
|
9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU
|
||||||
|
JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
|
FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
|
AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz
|
||||||
|
ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq
|
||||||
|
hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C
|
||||||
|
IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQg2PYDX6UQs548jvq0
|
||||||
|
eP2rClDYv8JoiZeK6qJcXHzvQUqhRANCAAT6w4XqgWi8OOT6uYXZRaGkquFsFtsh
|
||||||
|
rfS8J4KB2c6WUDkUIHXOio6hLP2mNFTVNMGnRxF1LSpMPEFxie5jaN/W
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,19 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDDTCCArSgAwIBAgIUH4qT7e5nHhIYhhXrdGPnEzHWMhswCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy
|
||||||
|
MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE
|
||||||
|
BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG
|
||||||
|
A1UECxMEdXNlcjEfMB0GA1UEAwwWVXNlcjFAb3JnMS5leGFtcGxlLmNvbTBZMBMG
|
||||||
|
ByqGSM49AgEGCCqGSM49AwEHA0IABPrDheqBaLw45Pq5hdlFoaSq4WwW2yGt9Lwn
|
||||||
|
goHZzpZQORQgdc6KjqEs/aY0VNU0wadHEXUtKkw8QXGJ7mNo39ajggESMIIBDjAO
|
||||||
|
BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU/fDcOzrRHtLF
|
||||||
|
QnXNHSVg2ln0UmgwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD
|
||||||
|
VR0RBBowGIEWVXNlcjFAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi
|
||||||
|
YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B
|
||||||
|
ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6IlVzZXIxQG9yZzEuZXhh
|
||||||
|
bXBsZS5jb20iLCJoZi5UeXBlIjoidXNlciJ9fTAKBggqhkjOPQQDAgNHADBEAiBK
|
||||||
|
C0p26m2dx0Y9IEJ93KWHgr+kCXtJHs+mLh56CbjkNwIgOyqY7vOQ6plgUpTT42b8
|
||||||
|
Xp2CkVyqaw+hsUg+F2lxGsA=
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -99,7 +99,7 @@ tls:
|
||||||
#
|
#
|
||||||
#############################################################################
|
#############################################################################
|
||||||
csr:
|
csr:
|
||||||
cn: admin-default
|
cn: boot-admin
|
||||||
keyrequest:
|
keyrequest:
|
||||||
algo: ecdsa
|
algo: ecdsa
|
||||||
size: 256
|
size: 256
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGnD2h1/mDGeNIadf
|
||||||
|
fP/pROrbeZRifCe8Z9VIGAQ3GoShRANCAAR2wsRMRc5/mBRrTbjfZ/4FD6rb9fPz
|
||||||
|
y36ATZQx+o7Zj22paPHhXKHOOZliP/n0Ax5EPeY8DejzDY0mo3CV3voZ
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -99,7 +99,7 @@ tls:
|
||||||
#
|
#
|
||||||
#############################################################################
|
#############################################################################
|
||||||
csr:
|
csr:
|
||||||
cn: admin-default
|
cn: boot-admin
|
||||||
keyrequest:
|
keyrequest:
|
||||||
algo: ecdsa
|
algo: ecdsa
|
||||||
size: 256
|
size: 256
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP
|
||||||
|
9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU
|
||||||
|
JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
|
FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
|
AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz
|
||||||
|
ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq
|
||||||
|
hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C
|
||||||
|
IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgWPQgr/DLwEczolSb
|
||||||
|
mEznYJZXe4gNhPPAcnMmQrLgolehRANCAARyGsnOftmnTa+flGDLKdPJbj+C0Cla
|
||||||
|
aaY5zkuAUT1ojNk/ASQv22KGOi+V50QvzyK3QOqAKnPBGvpM9akBz92J
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,16 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICczCCAhqgAwIBAgIUc5cHVaZnLnq0g7UZ8bveQ2VJADEwCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy
|
||||||
|
MDBaMHsxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH
|
||||||
|
Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ8wDQYD
|
||||||
|
VQQLEwZjbGllbnQxEzARBgNVBAMTCmJvb3QtYWRtaW4wWTATBgcqhkjOPQIBBggq
|
||||||
|
hkjOPQMBBwNCAARyGsnOftmnTa+flGDLKdPJbj+C0ClaaaY5zkuAUT1ojNk/ASQv
|
||||||
|
22KGOi+V50QvzyK3QOqAKnPBGvpM9akBz92Jo4GEMIGBMA4GA1UdDwEB/wQEAwIB
|
||||||
|
hjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQWBBQhJFtMm0+ApEOidrRbUd466PCe4jAf
|
||||||
|
BgNVHSMEGDAWgBRYLwES7lJq4i67F2AeLU35NxkbUzAhBgNVHREEGjAYgRZBZG1p
|
||||||
|
bkBvcmcxLmV4YW1wbGUuY29tMAoGCCqGSM49BAMCA0cAMEQCICaXvUWDxu62xHmK
|
||||||
|
TXMvTTVgSYZE+Q8hCOfnlz9OQJyaAiAtKzb22ZNDjW/ZSjsKXJhsK1+CJC52CabN
|
||||||
|
ANE96bx2Xg==
|
||||||
|
-----END CERTIFICATE-----
|
Binary file not shown.
|
@ -1,5 +1,5 @@
|
||||||
-----BEGIN PUBLIC KEY-----
|
-----BEGIN PUBLIC KEY-----
|
||||||
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEDSMDdZOsmA1SpSm9GK1mKkTPBPVKjeYo
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEVHAMGD123d5QVhI6LAq7sEU8frN4bN9p
|
||||||
mEZMM/kqHNiXQErz6y77zu+kaxVwMM2I+jipDuYHzFxJA9m27hpFODNHApg5WEla
|
gPiKwWBLljpCGQH8kBbQoyEyFFBGndyWgalkLrEXJNv/VGAWyDEeg6c8/fycfJW4
|
||||||
Ak5Fo+Ak9cw5WUydukL1FjBg3UICNOgi
|
iq8Mk1AvRAVMJIF9VwjHdwQ3rMmzC15n
|
||||||
-----END PUBLIC KEY-----
|
-----END PUBLIC KEY-----
|
||||||
|
|
|
@ -1,14 +1,14 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICHjCCAcWgAwIBAgIUFBjX17iaFQ0kRSLN1YQIdlBIdM0wCgYIKoZIzj0EAwIw
|
MIICIDCCAcegAwIBAgIUDEK12gHn0vyqLETS3DWGJrqUksMwCgYIKoZIzj0EAwIw
|
||||||
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
||||||
MS5leGFtcGxlLmNvbTAeFw0xODEwMTAwOTI2MDBaFw0zMzEwMDYwOTI2MDBaMGwx
|
MS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow
|
||||||
CzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEZMBcGA1UEChMQ
|
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
b3JnMS5leGFtcGxlLmNvbTELMAkGA1UECxMCY2ExHDAaBgNVBAMTE2NhLm9yZzEu
|
ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
||||||
ZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR/vnxyLUrmMJJx
|
MS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABN1A0nR0Orkp
|
||||||
h1nGAk+YidN8RL0XKl8gjzNa2SuEHfaROUhBVU3r06rDuJoNn+P3tcIwFsgndJmk
|
ppOOnvCoIiIFfzpBdwWQCJ7FEx/iF2H/2PkOws6qEN2sBh2WqByWR2c7EIdmgvUu
|
||||||
vLrCBcQDo0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAd
|
ZxSIEXU2TO2jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB
|
||||||
BgNVHQ4EFgQUu79ukG5b4N19gYSYYALk+wY91SYwCgYIKoZIzj0EAwIDRwAwRAIg
|
MB0GA1UdDgQWBBSpWdz/SpIKYXgSaEYa0XBEvF8TGzAKBggqhkjOPQQDAgNHADBE
|
||||||
THDvbxlsa/Xw0gEAXlSfNS5XIthdULlQmsWzA0WEz1ACICXifW6iWfl4fibYwqR5
|
AiAPu4EVW8V7ocl2hRGI+jAz4aBfCiiW5MX3+vYbDCtyxgIgJoeEFVulOhxdEBBe
|
||||||
L/XiIQ/2UQ9nHnPbZm3ISVvN
|
YKUNAAVA2pkMYUzgEWT743z0jhY=
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgiN1Z0HqaMHo8VPPt
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvjKIcywt9dWmrXyU
|
||||||
2267O46l2yZ1r411HjSr9rOPXeOhRANCAAR/vnxyLUrmMJJxh1nGAk+YidN8RL0X
|
EP5BS3QS2820krnIkXpMxcUfL5qhRANCAATdQNJ0dDq5KaaTjp7wqCIiBX86QXcF
|
||||||
Kl8gjzNa2SuEHfaROUhBVU3r06rDuJoNn+P3tcIwFsgndJmkvLrCBcQD
|
kAiexRMf4hdh/9j5DsLOqhDdrAYdlqgclkdnOxCHZoL1LmcUiBF1Nkzt
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
version: 1.3.0
|
version: 1.4.0
|
||||||
port: 7054
|
port: 7054
|
||||||
debug: false
|
debug: false
|
||||||
crlsizelimit: 512000
|
crlsizelimit: 512000
|
||||||
|
@ -19,8 +19,8 @@ crl:
|
||||||
registry:
|
registry:
|
||||||
maxenrollments: -1
|
maxenrollments: -1
|
||||||
identities:
|
identities:
|
||||||
- name: admin-default
|
- name: boot-admin
|
||||||
pass: pass-default
|
pass: boot-pass
|
||||||
type: client
|
type: client
|
||||||
affiliation: ""
|
affiliation: ""
|
||||||
attrs:
|
attrs:
|
||||||
|
@ -69,7 +69,9 @@ signing:
|
||||||
default:
|
default:
|
||||||
usage:
|
usage:
|
||||||
- digital signature
|
- digital signature
|
||||||
expiry: 8760h
|
- cert sign
|
||||||
|
- crl sign
|
||||||
|
expiry: 87600h
|
||||||
profiles:
|
profiles:
|
||||||
ca:
|
ca:
|
||||||
usage:
|
usage:
|
||||||
|
@ -86,7 +88,7 @@ signing:
|
||||||
- server auth
|
- server auth
|
||||||
- client auth
|
- client auth
|
||||||
- key agreement
|
- key agreement
|
||||||
expiry: 8760h
|
expiry: 87600h
|
||||||
csr:
|
csr:
|
||||||
cn: ca.org1.example.com
|
cn: ca.org1.example.com
|
||||||
keyrequest:
|
keyrequest:
|
||||||
|
@ -99,10 +101,10 @@ csr:
|
||||||
O: org1.example.com
|
O: org1.example.com
|
||||||
OU: ca
|
OU: ca
|
||||||
hosts:
|
hosts:
|
||||||
- ca.org1.example.com
|
- fabric-ca-server
|
||||||
- localhost
|
- localhost
|
||||||
ca:
|
ca:
|
||||||
expiry: 131400h
|
expiry: 1314000h
|
||||||
pathlength: 1
|
pathlength: 1
|
||||||
idemix:
|
idemix:
|
||||||
rhpoolsize: 1000
|
rhpoolsize: 1000
|
||||||
|
|
Binary file not shown.
|
@ -1,6 +1,6 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIGkAgEBBDB9kCD1CUKnFFo6ks3Mo2qS/X+GFNPPT0SZkeR4iHswUzsZIV7bTwN9
|
MIGkAgEBBDAeHTZpAnNYS17/22SSARJQbFhM0QMN0URv5wTBgUkEWL5dBzQQ3TJb
|
||||||
0RDjlfS2Ix+gBwYFK4EEACKhZANiAAQNIwN1k6yYDVKlKb0YrWYqRM8E9UqN5iiY
|
EOjTlsC57wOgBwYFK4EEACKhZANiAARUcAwYPXbd3lBWEjosCruwRTx+s3hs32mA
|
||||||
Rkwz+Soc2JdASvPrLvvO76RrFXAwzYj6OKkO5gfMXEkD2bbuGkU4M0cCmDlYSVoC
|
+IrBYEuWOkIZAfyQFtCjITIUUEad3JaBqWQusRck2/9UYBbIMR6Dpzz9/Jx8lbiK
|
||||||
TkWj4CT1zDlZTJ26QvUWMGDdQgI06CI=
|
rwyTUC9EBUwkgX1XCMd3BDesybMLXmc=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
<EFBFBD>ƶ<EFBFBD><19><><EFBFBD><16><><EFBFBD>f<EFBFBD>i<EFBFBD>:<3A>bb<62><62>f<EFBFBD>:<3A>߶<EFBFBD><DFB6><EFBFBD>G
|
xRُWه<EFBFBD>اQ@5Fئ<46>P[<5B>2<>v<19><>bظ5H<35>J<EFBFBD>
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgvjKIcywt9dWmrXyU
|
||||||
|
EP5BS3QS2820krnIkXpMxcUfL5qhRANCAATdQNJ0dDq5KaaTjp7wqCIiBX86QXcF
|
||||||
|
kAiexRMf4hdh/9j5DsLOqhDdrAYdlqgclkdnOxCHZoL1LmcUiBF1Nkzt
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -1,5 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgiN1Z0HqaMHo8VPPt
|
|
||||||
2267O46l2yZ1r411HjSr9rOPXeOhRANCAAR/vnxyLUrmMJJxh1nGAk+YidN8RL0X
|
|
||||||
Kl8gjzNa2SuEHfaROUhBVU3r06rDuJoNn+P3tcIwFsgndJmkvLrCBcQD
|
|
||||||
-----END PRIVATE KEY-----
|
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://ca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: peer0@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgGbiPTe+OO8PG2TQu
|
||||||
|
00tnxr7sU1D/DrPshhXHyyND/7uhRANCAAT0Du/ENv0FsDjpCcRxrlW8zJqU3mYB
|
||||||
|
YengujzLKbirqcKlmmon2uWm4vZDiLS60b6Aa/5nfLSNatAfhyenKtez
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://tlsca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: peer0@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP
|
||||||
|
9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU
|
||||||
|
JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
|
FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
|
AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz
|
||||||
|
ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq
|
||||||
|
hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C
|
||||||
|
IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgt8+ZSv6BYejhJK/E
|
||||||
|
peNwqBja0KCe2vKwffqny1Frd2mhRANCAAQKmzIKjGZnFmh/yK0FRRiY+dnfPubf
|
||||||
|
RsFhSlE0li5JXcBhyBpgi9+7R3280q/SW9+xuEMQK0nSqoXLPeC+UrZU
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,19 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDDTCCArSgAwIBAgIUB9LSFJbuP69HlDI8K2SpPTBn2nUwCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy
|
||||||
|
MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE
|
||||||
|
BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG
|
||||||
|
A1UECxMEcGVlcjEfMB0GA1UEAwwWcGVlcjBAb3JnMS5leGFtcGxlLmNvbTBZMBMG
|
||||||
|
ByqGSM49AgEGCCqGSM49AwEHA0IABAqbMgqMZmcWaH/IrQVFGJj52d8+5t9GwWFK
|
||||||
|
UTSWLkldwGHIGmCL37tHfbzSr9Jb37G4QxArSdKqhcs94L5StlSjggESMIIBDjAO
|
||||||
|
BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQU+wgV82ZCI689
|
||||||
|
LNyFs4c7B56yCRwwHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD
|
||||||
|
VR0RBBowGIEWcGVlcjBAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi
|
||||||
|
YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B
|
||||||
|
ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIwQG9yZzEuZXhh
|
||||||
|
bXBsZS5jb20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNHADBEAiAe
|
||||||
|
MRREuRJHh2iXJ2WPf7R1KvxecnPMloR3yDG50jOYNwIgKBoK5xErYt1DWgnVkEZS
|
||||||
|
1ZEVaQDJlz/x6sEqnJmkmPg=
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://ca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: peer1@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQghB1MF5YZXvp0exC/
|
||||||
|
ilHXOoMC65o9zOVFC2oc7DPGqO+hRANCAAQcmOyY+LZZTLSHLmuAUniwy5Q3mE3f
|
||||||
|
x+GHmBHaCNrIJzZUITw0XKQRS2FCT5UC89OY1SSc9WrhR+MXgJVQkvtF
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://tlsca.org1.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: peer1@org1.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP
|
||||||
|
9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU
|
||||||
|
JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
|
FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
|
AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz
|
||||||
|
ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq
|
||||||
|
hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C
|
||||||
|
IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgsxgf5OvUl/sjxL9e
|
||||||
|
iu74qhsKNsyAY6u99fumKce+ooOhRANCAASx6/D/olnbL9yJRaLqZ5s78OByGvb1
|
||||||
|
/yeEs+YxR9eyKNnZ4O6IKqf2IF3hxNP5rY+mcey3Khxi41aoDv++BOFV
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,19 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDDjCCArSgAwIBAgIUDpmSDWSCx8uN1ybq8hBHpqHk4+IwCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy
|
||||||
|
MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE
|
||||||
|
BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMS5leGFtcGxlLmNvbTENMAsG
|
||||||
|
A1UECxMEcGVlcjEfMB0GA1UEAwwWcGVlcjFAb3JnMS5leGFtcGxlLmNvbTBZMBMG
|
||||||
|
ByqGSM49AgEGCCqGSM49AwEHA0IABLHr8P+iWdsv3IlFoupnmzvw4HIa9vX/J4Sz
|
||||||
|
5jFH17Io2dng7ogqp/YgXeHE0/mtj6Zx7LcqHGLjVqgO/74E4VWjggESMIIBDjAO
|
||||||
|
BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUUmH/JVFmmsgN
|
||||||
|
1VsrQfNCA63B0u4wHwYDVR0jBBgwFoAUWC8BEu5SauIuuxdgHi1N+TcZG1MwIQYD
|
||||||
|
VR0RBBowGIEWcGVlcjFAb3JnMS5leGFtcGxlLmNvbTCBigYIKgMEBQYHCAEEfnsi
|
||||||
|
YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoiZmFsc2UiLCJoZi5B
|
||||||
|
ZmZpbGlhdGlvbiI6IiIsImhmLkVucm9sbG1lbnRJRCI6InBlZXIxQG9yZzEuZXhh
|
||||||
|
bXBsZS5jb20iLCJoZi5UeXBlIjoicGVlciJ9fTAKBggqhkjOPQQDAgNIADBFAiEA
|
||||||
|
s0HoNc7f21bNcod5zq4wjE5aKWNP4qLfePX04KGlQA0CIDZw8DUTR4AOuPoM37Dm
|
||||||
|
MKEFHoiOD9QajnX09mkaCbOf
|
||||||
|
-----END CERTIFICATE-----
|
Binary file not shown.
|
@ -1,5 +1,5 @@
|
||||||
-----BEGIN PUBLIC KEY-----
|
-----BEGIN PUBLIC KEY-----
|
||||||
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEWdv1PmR2LLHqufi+l8aYtxnRvnJBwHop
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEbdmgC+obJLpKIU15eFC1MJNLMdkpOchP
|
||||||
mSWv/TJgomLUWfPd2jBSWZEhY0FpkAPSDSJQNRIG8wMVqbWRcL3uYIyqj3PMO6yt
|
9bG0xFWT0wk69EEFAeSYnDHdDFwJH3gmSEmSaccrRRGJUts4yBCz4vpAyxklNEJU
|
||||||
LdTu49HIFPocwCLg3KNyA4xpcS8zUjc4
|
JQV9TLWAwWs6IwpYSdI5FZb1Ot4YWvUd
|
||||||
-----END PUBLIC KEY-----
|
-----END PUBLIC KEY-----
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
version: 1.3.0
|
version: 1.4.0
|
||||||
port: 7054
|
port: 7054
|
||||||
debug: false
|
debug: false
|
||||||
crlsizelimit: 512000
|
crlsizelimit: 512000
|
||||||
|
@ -19,8 +19,8 @@ crl:
|
||||||
registry:
|
registry:
|
||||||
maxenrollments: -1
|
maxenrollments: -1
|
||||||
identities:
|
identities:
|
||||||
- name: admin-default
|
- name: boot-admin
|
||||||
pass: pass-default
|
pass: boot-pass
|
||||||
type: client
|
type: client
|
||||||
affiliation: ""
|
affiliation: ""
|
||||||
attrs:
|
attrs:
|
||||||
|
@ -69,7 +69,9 @@ signing:
|
||||||
default:
|
default:
|
||||||
usage:
|
usage:
|
||||||
- digital signature
|
- digital signature
|
||||||
expiry: 8760h
|
- cert sign
|
||||||
|
- crl sign
|
||||||
|
expiry: 87600h
|
||||||
profiles:
|
profiles:
|
||||||
ca:
|
ca:
|
||||||
usage:
|
usage:
|
||||||
|
@ -86,7 +88,7 @@ signing:
|
||||||
- server auth
|
- server auth
|
||||||
- client auth
|
- client auth
|
||||||
- key agreement
|
- key agreement
|
||||||
expiry: 8760h
|
expiry: 87600h
|
||||||
csr:
|
csr:
|
||||||
cn: tlsca.org1.example.com
|
cn: tlsca.org1.example.com
|
||||||
keyrequest:
|
keyrequest:
|
||||||
|
@ -99,10 +101,10 @@ csr:
|
||||||
O: org1.example.com
|
O: org1.example.com
|
||||||
OU: tlsca
|
OU: tlsca
|
||||||
hosts:
|
hosts:
|
||||||
- tlsca.org1.example.com
|
- fabric-ca-server
|
||||||
- localhost
|
- localhost
|
||||||
ca:
|
ca:
|
||||||
expiry: 131400h
|
expiry: 1314000h
|
||||||
pathlength: 1
|
pathlength: 1
|
||||||
idemix:
|
idemix:
|
||||||
rhpoolsize: 1000
|
rhpoolsize: 1000
|
||||||
|
|
Binary file not shown.
|
@ -1,5 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgIBJvF5e9l85ObbFs
|
|
||||||
duRrWd2ZPgc/vmaR231EQhsibl6hRANCAAR+EOYSg7O1tuEvYiXkWlNtg06RjTzv
|
|
||||||
sz9aASDbkjLfaIDf+mOjUzESXAlXqma+hy/6EJT+Bt7fVq0mdvVTlec6
|
|
||||||
-----END PRIVATE KEY-----
|
|
|
@ -1,6 +1,6 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIGkAgEBBDAOZeFX1SIKBZaYMr4mlObgPA+nf9HPxUpPn6LnwuJin86W0OlRpBcf
|
MIGkAgEBBDCIN8r9Ce4UVyH5grrWB+Vi5vdSJcU6/KQm+EEEV1MBsrAzeywcTUgC
|
||||||
m52W/svE6cegBwYFK4EEACKhZANiAARZ2/U+ZHYsseq5+L6Xxpi3GdG+ckHAeimZ
|
wDCVFoDm4P+gBwYFK4EEACKhZANiAARt2aAL6hskukohTXl4ULUwk0sx2Sk5yE/1
|
||||||
Ja/9MmCiYtRZ893aMFJZkSFjQWmQA9INIlA1EgbzAxWptZFwve5gjKqPc8w7rK0t
|
sbTEVZPTCTr0QQUB5JicMd0MXAkfeCZISZJpxytFEYlS2zjIELPi+kDLGSU0QlQl
|
||||||
1O7j0cgU+hzAIuDco3IDjGlxLzNSNzg=
|
BX1MtYDBazojClhJ0jkVlvU63hha9R0=
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
<EFBFBD>Fm'<27>Mo<4D>v<EFBFBD>k4x<34>E%<25><><EFBFBD> {5<>*B<>Mql<71><6C>
|
zU7¹œÌUüºÜd¦L4ºÅPO›½Ãº1ølX
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggsGwkVZtE7AfrOIT
|
||||||
|
ylDXxMAUDxau5fx7CHiNJGAyVUuhRANCAAQ04hgVlZw5Wx8dKpLoxd6+K+YO3xtx
|
||||||
|
RbmF8+FIDdlpjZNs+pxeBWg/mEIAs2sqdHi09+5CtAUiR6hCqIiayrWe
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -1,14 +1,14 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
-----BEGIN CERTIFICATE-----
|
||||||
MIICKjCCAdGgAwIBAgIUYILtTrGFkEL2QHDFj1jvfBAPZYQwCgYIKoZIzj0EAwIw
|
MIICLTCCAdOgAwIBAgIUZtbUdoKq2gdiBI4t9xAYtKb0l1swCgYIKoZIzj0EAwIw
|
||||||
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTAwOTI2MDBaFw0zMzEwMDYwOTI2
|
Y2Eub3JnMS5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
MDBaMHIxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEZMBcG
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
A1UEChMQb3JnMS5leGFtcGxlLmNvbTEOMAwGA1UECxMFdGxzY2ExHzAdBgNVBAMT
|
FwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
FnRsc2NhLm9yZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
AxMWdGxzY2Eub3JnMS5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
AAR+EOYSg7O1tuEvYiXkWlNtg06RjTzvsz9aASDbkjLfaIDf+mOjUzESXAlXqma+
|
A0IABDTiGBWVnDlbHx0qkujF3r4r5g7fG3FFuYXz4UgN2WmNk2z6nF4FaD+YQgCz
|
||||||
hy/6EJT+Bt7fVq0mdvVTlec6o0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/
|
ayp0eLT37kK0BSJHqEKoiJrKtZ6jRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
BAgwBgEB/wIBATAdBgNVHQ4EFgQU8TyFJWYtXTJDpEvvaA8vwVFCT2IwCgYIKoZI
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBRYLwES7lJq4i67F2AeLU35NxkbUzAKBggq
|
||||||
zj0EAwIDRwAwRAIgAmyCF1D7mXAjHZpBwQsF2pOXS2V/LQ+j3Wg0hvjixZgCICEh
|
hkjOPQQDAgNIADBFAiEAvfkVNhBjlw8ApIorDAvqMA2DmLckOjX1HS2aN8MleT8C
|
||||||
X7C57zvM+RKPMYjWdlzXvt1JU+8l6nw9CGsWCPnY
|
IBIrfl1rq9rz/PuvEmGB15oKXPiTHOWqZ3Mkdlc4Uddd
|
||||||
-----END CERTIFICATE-----
|
-----END CERTIFICATE-----
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
-----BEGIN PRIVATE KEY-----
|
||||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgIBJvF5e9l85ObbFs
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggsGwkVZtE7AfrOIT
|
||||||
duRrWd2ZPgc/vmaR231EQhsibl6hRANCAAR+EOYSg7O1tuEvYiXkWlNtg06RjTzv
|
ylDXxMAUDxau5fx7CHiNJGAyVUuhRANCAAQ04hgVlZw5Wx8dKpLoxd6+K+YO3xtx
|
||||||
sz9aASDbkjLfaIDf+mOjUzESXAlXqma+hy/6EJT+Bt7fVq0mdvVTlec6
|
RbmF8+FIDdlpjZNs+pxeBWg/mEIAs2sqdHi09+5CtAUiR6hCqIiayrWe
|
||||||
-----END PRIVATE KEY-----
|
-----END PRIVATE KEY-----
|
||||||
|
|
|
@ -1,18 +0,0 @@
|
||||||
|
|
||||||
OU
|
|
||||||
Role
|
|
||||||
EnrollmentID
|
|
||||||
RevocationHandleD
|
|
||||||
/KÙ—\TMւ°NÉ®ðc[½ó_Óš €»?8þ“ñr´-<2D>`—S¸Á!*1‚WØø~þ¿þöD
|
|
||||||
qÝÒ!ÐÂR"$“ºDþeR¢œoö{Ù%‡{„ú¾ c†Û¾CO?wê=Û¦(\Ó¹Z<C2B9>üEª§’ï«\Û‚t‡"D
|
|
||||||
÷s€“@É´O<C2B4>ojRA£hÙ¬ùn¥
|
|
||||||
Á3ÀRUEÇy¯> FÆ0mpPr»è{ÚV㥟¦æpö¡ÀM¨ùgèn"D
|
|
||||||
ÀKV¨Q£Ì•OÐÄ|ß!š°R*!å¹îàW<1B>àdˆ tT@w.ÛáŸù' mù–üp¶"Qã2t[ñ<>#™Ñ„"D
|
|
||||||
¹ppŸ²¨•ž9J8wÎœú
<™è×
[™,>˜OÀH€
|
|
||||||
Ïôk¤?[®‰ztýP_Á-gto+«4Ô³æ?$"D
|
|
||||||
<20>º¡)T¦p3o<sÆ6M6ÍŽý ~Ñx×]x È ç¬´.)ûºÿäKÌ!_IÒá=å‘D•î*•îÜú*ˆ
|
|
||||||
€G£e—Ã÷†xùh”X±MHY¬Ï±½h±£PB„½ ^Ï„/„aÔÃù`Æ™ï\áJHay¨
|
|
||||||
Ùñ`BäyÑÐÓ OëŠÊõGf‰ôͨKÞXåEËð|~°:<16>¾" <20>Sr{ȼtÕ³D•¶ƒþ²º?¹—WNèlOùÓˆ'2D
|
|
||||||
K¨û<C2A8>öâ0VÊÄEì”BV†êûª$ßxâj¡†‚ö "~AŠJ9<4A>Ù`mü<À^Ž_9óz$Q¬÷:D
|
|
||||||
I·–8°QÂÈ*´ú½ÕDhïñ<C3AF>Lù26µOÀxN Äû «>MX>õÛ¿e£MxõB)IÜTô¾E<C2BE>%öÍB I“°l[ÔÌ0„’hŸõ@Q‚¨³§ƒ«Ë‰Û¡µJJ ]œA½ëò0³¨(Ð<>1Õ‹Oëx]<5D>QGÏ-«Š1R ¥šÌeÈëC’†Á•`>‘`£F‘û
|
|
||||||
¢l=Á‰f0øô
|
|
|
@ -1,5 +0,0 @@
|
||||||
-----BEGIN PUBLIC KEY-----
|
|
||||||
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEDSMDdZOsmA1SpSm9GK1mKkTPBPVKjeYo
|
|
||||||
mEZMM/kqHNiXQErz6y77zu+kaxVwMM2I+jipDuYHzFxJA9m27hpFODNHApg5WEla
|
|
||||||
Ak5Fo+Ak9cw5WUydukL1FjBg3UICNOgi
|
|
||||||
-----END PUBLIC KEY-----
|
|
|
@ -1,14 +0,0 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICHjCCAcWgAwIBAgIUFBjX17iaFQ0kRSLN1YQIdlBIdM0wCgYIKoZIzj0EAwIw
|
|
||||||
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
|
||||||
ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
|
||||||
MS5leGFtcGxlLmNvbTAeFw0xODEwMTAwOTI2MDBaFw0zMzEwMDYwOTI2MDBaMGwx
|
|
||||||
CzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEZMBcGA1UEChMQ
|
|
||||||
b3JnMS5leGFtcGxlLmNvbTELMAkGA1UECxMCY2ExHDAaBgNVBAMTE2NhLm9yZzEu
|
|
||||||
ZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNCAAR/vnxyLUrmMJJx
|
|
||||||
h1nGAk+YidN8RL0XKl8gjzNa2SuEHfaROUhBVU3r06rDuJoNn+P3tcIwFsgndJmk
|
|
||||||
vLrCBcQDo0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBATAd
|
|
||||||
BgNVHQ4EFgQUu79ukG5b4N19gYSYYALk+wY91SYwCgYIKoZIzj0EAwIDRwAwRAIg
|
|
||||||
THDvbxlsa/Xw0gEAXlSfNS5XIthdULlQmsWzA0WEz1ACICXifW6iWfl4fibYwqR5
|
|
||||||
L/XiIQ/2UQ9nHnPbZm3ISVvN
|
|
||||||
-----END CERTIFICATE-----
|
|
|
@ -1,5 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgZrwah78tlyMwH4ae
|
|
||||||
ZtAaf1VUiEomgNlJiJMEZtbI69mhRANCAATHx4bqLxk/6+AuPl3fp+usYmv36sGR
|
|
||||||
gDXNwOJNj8FFvKbc972Q4e+OUoGjD3OWY9QVOXktTJu7XIgUjNzdUTte
|
|
||||||
-----END PRIVATE KEY-----
|
|
|
@ -1,15 +0,0 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICYTCCAgigAwIBAgIUc+B8yCS4gvRvORC1tN+ciGJXVhYwCgYIKoZIzj0EAwIw
|
|
||||||
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
|
||||||
ExBvcmcxLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
|
||||||
MS5leGFtcGxlLmNvbTAeFw0xODEwMTAwOTI2MDBaFw0xOTEwMTAwOTMxMDBaMH4x
|
|
||||||
CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQHEw1TYW4g
|
|
||||||
RnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ8wDQYDVQQLEwZj
|
|
||||||
bGllbnQxFjAUBgNVBAMTDWFkbWluLWRlZmF1bHQwWTATBgcqhkjOPQIBBggqhkjO
|
|
||||||
PQMBBwNCAATHx4bqLxk/6+AuPl3fp+usYmv36sGRgDXNwOJNj8FFvKbc972Q4e+O
|
|
||||||
UoGjD3OWY9QVOXktTJu7XIgUjNzdUTteo3YwdDAOBgNVHQ8BAf8EBAMCB4AwDAYD
|
|
||||||
VR0TAQH/BAIwADAdBgNVHQ4EFgQUN2YlpmPSJriIdIkwnMw6nZicUIkwHwYDVR0j
|
|
||||||
BBgwFoAUu79ukG5b4N19gYSYYALk+wY91SYwFAYDVR0RBA0wC4IJY2EtY2xpZW50
|
|
||||||
MAoGCCqGSM49BAMCA0cAMEQCIFdPCkKVb8kKnL6AEMH3DVwuvcuImivs7HKkqEH3
|
|
||||||
U4QcAiBINUX3yyYVlFHII+wbEpBrilgNvak+4/gG+oWemh/iLw==
|
|
||||||
-----END CERTIFICATE-----
|
|
Binary file not shown.
|
@ -1,5 +0,0 @@
|
||||||
-----BEGIN PUBLIC KEY-----
|
|
||||||
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEWdv1PmR2LLHqufi+l8aYtxnRvnJBwHop
|
|
||||||
mSWv/TJgomLUWfPd2jBSWZEhY0FpkAPSDSJQNRIG8wMVqbWRcL3uYIyqj3PMO6yt
|
|
||||||
LdTu49HIFPocwCLg3KNyA4xpcS8zUjc4
|
|
||||||
-----END PUBLIC KEY-----
|
|
|
@ -1,14 +0,0 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICKjCCAdGgAwIBAgIUYILtTrGFkEL2QHDFj1jvfBAPZYQwCgYIKoZIzj0EAwIw
|
|
||||||
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
|
||||||
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
|
||||||
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTAwOTI2MDBaFw0zMzEwMDYwOTI2
|
|
||||||
MDBaMHIxCzAJBgNVBAYTAlVTMRcwFQYDVQQIEw5Ob3J0aCBDYXJvbGluYTEZMBcG
|
|
||||||
A1UEChMQb3JnMS5leGFtcGxlLmNvbTEOMAwGA1UECxMFdGxzY2ExHzAdBgNVBAMT
|
|
||||||
FnRsc2NhLm9yZzEuZXhhbXBsZS5jb20wWTATBgcqhkjOPQIBBggqhkjOPQMBBwNC
|
|
||||||
AAR+EOYSg7O1tuEvYiXkWlNtg06RjTzvsz9aASDbkjLfaIDf+mOjUzESXAlXqma+
|
|
||||||
hy/6EJT+Bt7fVq0mdvVTlec6o0UwQzAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/
|
|
||||||
BAgwBgEB/wIBATAdBgNVHQ4EFgQU8TyFJWYtXTJDpEvvaA8vwVFCT2IwCgYIKoZI
|
|
||||||
zj0EAwIDRwAwRAIgAmyCF1D7mXAjHZpBwQsF2pOXS2V/LQ+j3Wg0hvjixZgCICEh
|
|
||||||
X7C57zvM+RKPMYjWdlzXvt1JU+8l6nw9CGsWCPnY
|
|
||||||
-----END CERTIFICATE-----
|
|
|
@ -1,5 +0,0 @@
|
||||||
-----BEGIN PRIVATE KEY-----
|
|
||||||
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgu+QFmPSh0F5eI4EJ
|
|
||||||
dXM3BFLfYc1r2NGrU2fZ4YEiqeChRANCAAS+eWBQdlHoVLDGhuh2uUlFBJb/UAUm
|
|
||||||
UMjJtdS4G4GmzpLdrxk6DJGK9gKbv80IyHju6f0GQloiuJIYTnDeUobm
|
|
||||||
-----END PRIVATE KEY-----
|
|
|
@ -1,15 +0,0 @@
|
||||||
-----BEGIN CERTIFICATE-----
|
|
||||||
MIICZzCCAg6gAwIBAgIUWlg7m9a5bLX3n5ncxfLHoegDS2wwCgYIKoZIzj0EAwIw
|
|
||||||
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
|
||||||
ExBvcmcxLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
|
||||||
Y2Eub3JnMS5leGFtcGxlLmNvbTAeFw0xODEwMTAwOTI2MDBaFw0xOTEwMTAwOTMx
|
|
||||||
MDBaMH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlhMRYwFAYDVQQH
|
|
||||||
Ew1TYW4gRnJhbmNpc2NvMRkwFwYDVQQKExBvcmcxLmV4YW1wbGUuY29tMQ8wDQYD
|
|
||||||
VQQLEwZjbGllbnQxFjAUBgNVBAMTDWFkbWluLWRlZmF1bHQwWTATBgcqhkjOPQIB
|
|
||||||
BggqhkjOPQMBBwNCAAS+eWBQdlHoVLDGhuh2uUlFBJb/UAUmUMjJtdS4G4GmzpLd
|
|
||||||
rxk6DJGK9gKbv80IyHju6f0GQloiuJIYTnDeUobmo3YwdDAOBgNVHQ8BAf8EBAMC
|
|
||||||
B4AwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUJ+5d0xZP4TCm3qU9IjfYTllxd3kw
|
|
||||||
HwYDVR0jBBgwFoAU8TyFJWYtXTJDpEvvaA8vwVFCT2IwFAYDVR0RBA0wC4IJY2Et
|
|
||||||
Y2xpZW50MAoGCCqGSM49BAMCA0cAMEQCIGjT2hSvBeVkXuE96qRzKSTzejRptVr8
|
|
||||||
pKkfaX2WXZkJAiBRppl8nlWoeoi0py6omQtt5bgRByQI1GmEvJ5+B9oMyA==
|
|
||||||
-----END CERTIFICATE-----
|
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://ca.org2.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: Admin@org2.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPVA6lM9Hu7HVgkVMNGdx3LlqjDLWwgrB
|
||||||
|
2meNOi2gU7vJc7P+08aH8VO5Ei0gDdY98EVCrO5EktGid1FLrLFpfVFIYZjicfBP
|
||||||
|
NoGyHdb18NKNtNb9kQ53BZJGpKiH+sUm
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICITCCAcegAwIBAgIUZ7jMmKdx/engWidCBBAel1RL43owCgYIKoZIzj0EAwIw
|
||||||
|
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
||||||
|
Mi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU3MDBaGA8yMTY4MDkwNTA4NTcwMFow
|
||||||
|
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
||||||
|
Mi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEHA0IABH8Dtmztvf9n
|
||||||
|
Jl2z4VhoyD7N2AAokv9GnKP0EdO1piYFbXtpJLL/ABF9HBFNXeGq8RfkOILyO/sc
|
||||||
|
wPNKRLJkPrmjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMBAf8ECDAGAQH/AgEB
|
||||||
|
MB0GA1UdDgQWBBT9WLnGJJ/6w/Mj6Ke9opqJ/Iu3ETAKBggqhkjOPQQDAgNIADBF
|
||||||
|
AiEA4DVUfbHvC5wIjsL8Lbpmhq4bdsz9puUkeS7h3NlhANkCIFIdUw5qQezJudts
|
||||||
|
Kzbbqt/QA1h+00JyeT5TqHYgIwfl
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQggqc1zbFFuHAzpMBx
|
||||||
|
PW/o2Nd1QaF2T2HhxnCElZs7mMihRANCAATbIGXRjemfzFkvZULl7J28kaj1LpFk
|
||||||
|
vdL/1Bugo1NOND7S3wKz4Ch0XbY5JEVnjHAstd/zgmlVOeO32LILbT7D
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,19 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDBzCCAq2gAwIBAgIUSOvvLzUR89ElH1ZGMFz9GIrxsFAwCgYIKoZIzj0EAwIw
|
||||||
|
bDELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcyLmV4YW1wbGUuY29tMQswCQYDVQQLEwJjYTEcMBoGA1UEAxMTY2Eub3Jn
|
||||||
|
Mi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAyMDBaMIGF
|
||||||
|
MQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UEBxMNU2Fu
|
||||||
|
IEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsGA1UECxME
|
||||||
|
dXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49
|
||||||
|
AgEGCCqGSM49AwEHA0IABNsgZdGN6Z/MWS9lQuXsnbyRqPUukWS90v/UG6CjU040
|
||||||
|
PtLfArPgKHRdtjkkRWeMcCy13/OCaVU547fYsgttPsOjggERMIIBDTAOBgNVHQ8B
|
||||||
|
Af8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUgmokzoyDPqRjnwgxsrSN
|
||||||
|
rHXjcU8wHwYDVR0jBBgwFoAU/Vi5xiSf+sPzI+invaKaifyLtxEwIQYDVR0RBBow
|
||||||
|
GIEWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsiYXR0cnMi
|
||||||
|
OnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFmZmlsaWF0
|
||||||
|
aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMi5leGFtcGxlLmNv
|
||||||
|
bSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQDg1Ml8qNlg
|
||||||
|
w4wmPOgLUPFlgRRhRhcitTq7Ufy2KYt6SQIgOKF6UW4XT3a0eMUJeNYBfvXqbb+g
|
||||||
|
tlBmZSkhTB960JM=
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,162 @@
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# This is a configuration file for the fabric-ca-client command.
|
||||||
|
#
|
||||||
|
# COMMAND LINE ARGUMENTS AND ENVIRONMENT VARIABLES
|
||||||
|
# ------------------------------------------------
|
||||||
|
# Each configuration element can be overridden via command line
|
||||||
|
# arguments or environment variables. The precedence for determining
|
||||||
|
# the value of each element is as follows:
|
||||||
|
# 1) command line argument
|
||||||
|
# Examples:
|
||||||
|
# a) --url https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) --tls.client.certfile certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 2) environment variable
|
||||||
|
# Examples:
|
||||||
|
# a) FABRIC_CA_CLIENT_URL=https://localhost:7054
|
||||||
|
# To set the fabric-ca server url
|
||||||
|
# b) FABRIC_CA_CLIENT_TLS_CLIENT_CERTFILE=certfile.pem
|
||||||
|
# To set the client certificate for TLS
|
||||||
|
# 3) configuration file
|
||||||
|
# 4) default value (if there is one)
|
||||||
|
# All default values are shown beside each element below.
|
||||||
|
#
|
||||||
|
# FILE NAME ELEMENTS
|
||||||
|
# ------------------
|
||||||
|
# The value of all fields whose name ends with "file" or "files" are
|
||||||
|
# name or names of other files.
|
||||||
|
# For example, see "tls.certfiles" and "tls.client.certfile".
|
||||||
|
# The value of each of these fields can be a simple filename, a
|
||||||
|
# relative path, or an absolute path. If the value is not an
|
||||||
|
# absolute path, it is interpretted as being relative to the location
|
||||||
|
# of this configuration file.
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Client Configuration
|
||||||
|
#############################################################################
|
||||||
|
|
||||||
|
# URL of the Fabric-ca-server (default: http://localhost:7054)
|
||||||
|
url: http://tlsca.org2.example.com:7054
|
||||||
|
|
||||||
|
# Membership Service Provider (MSP) directory
|
||||||
|
# This is useful when the client is used to enroll a peer or orderer, so
|
||||||
|
# that the enrollment artifacts are stored in the format expected by MSP.
|
||||||
|
mspdir: msp
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
#
|
||||||
|
# certfiles - PEM-encoded list of trusted root certificate files
|
||||||
|
# client:
|
||||||
|
# certfile - PEM-encoded certificate file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
# keyfile - PEM-encoded key file for when client authentication
|
||||||
|
# is enabled on server
|
||||||
|
#############################################################################
|
||||||
|
tls:
|
||||||
|
# TLS section for secure socket connection
|
||||||
|
certfiles:
|
||||||
|
client:
|
||||||
|
certfile:
|
||||||
|
keyfile:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Certificate Signing Request section for generating the CSR for an
|
||||||
|
# enrollment certificate (ECert)
|
||||||
|
#
|
||||||
|
# cn - Used by CAs to determine which domain the certificate is to be generated for
|
||||||
|
#
|
||||||
|
# serialnumber - The serialnumber field, if specified, becomes part of the issued
|
||||||
|
# certificate's DN (Distinguished Name). For example, one use case for this is
|
||||||
|
# a company with its own CA (Certificate Authority) which issues certificates
|
||||||
|
# to its employees and wants to include the employee's serial number in the DN
|
||||||
|
# of its issued certificates.
|
||||||
|
# WARNING: The serialnumber field should not be confused with the certificate's
|
||||||
|
# serial number which is set by the CA but is not a component of the
|
||||||
|
# certificate's DN.
|
||||||
|
#
|
||||||
|
# names - A list of name objects. Each name object should contain at least one
|
||||||
|
# "C", "L", "O", or "ST" value (or any combination of these) where these
|
||||||
|
# are abbreviations for the following:
|
||||||
|
# "C": country
|
||||||
|
# "L": locality or municipality (such as city or town name)
|
||||||
|
# "O": organization
|
||||||
|
# "OU": organizational unit, such as the department responsible for owning the key;
|
||||||
|
# it can also be used for a "Doing Business As" (DBS) name
|
||||||
|
# "ST": the state or province
|
||||||
|
#
|
||||||
|
# Note that the "OU" or organizational units of an ECert are always set according
|
||||||
|
# to the values of the identities type and affiliation. OUs are calculated for an enroll
|
||||||
|
# as OU=<type>, OU=<affiliationRoot>, ..., OU=<affiliationLeaf>. For example, an identity
|
||||||
|
# of type "client" with an affiliation of "org1.dept2.team3" would have the following
|
||||||
|
# organizational units: OU=client, OU=org1, OU=dept2, OU=team3
|
||||||
|
#
|
||||||
|
# hosts - A list of host names for which the certificate should be valid
|
||||||
|
#
|
||||||
|
#############################################################################
|
||||||
|
csr:
|
||||||
|
cn: Admin@org2.example.com
|
||||||
|
keyrequest:
|
||||||
|
algo: ecdsa
|
||||||
|
size: 256
|
||||||
|
serialnumber:
|
||||||
|
names:
|
||||||
|
- C: US
|
||||||
|
ST: North Carolina
|
||||||
|
L:
|
||||||
|
O: Hyperledger
|
||||||
|
OU: Fabric
|
||||||
|
hosts:
|
||||||
|
- ca-client
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Registration section used to register a new identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# name - Unique name of the identity
|
||||||
|
# type - Type of identity being registered (e.g. 'peer, app, user')
|
||||||
|
# affiliation - The identity's affiliation
|
||||||
|
# maxenrollments - The maximum number of times the secret can be reused to enroll.
|
||||||
|
# Specially, -1 means unlimited; 0 means to use CA's max enrollment
|
||||||
|
# value.
|
||||||
|
# attributes - List of name/value pairs of attribute for identity
|
||||||
|
#############################################################################
|
||||||
|
id:
|
||||||
|
name:
|
||||||
|
type:
|
||||||
|
affiliation:
|
||||||
|
maxenrollments: 0
|
||||||
|
attributes:
|
||||||
|
# - name:
|
||||||
|
# value:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Enrollment section used to enroll an identity with fabric-ca server
|
||||||
|
#
|
||||||
|
# profile - Name of the signing profile to use in issuing the certificate
|
||||||
|
# label - Label to use in HSM operations
|
||||||
|
#############################################################################
|
||||||
|
enrollment:
|
||||||
|
profile:
|
||||||
|
label:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# Name of the CA to connect to within the fabric-ca server
|
||||||
|
#############################################################################
|
||||||
|
caname:
|
||||||
|
|
||||||
|
#############################################################################
|
||||||
|
# BCCSP (BlockChain Crypto Service Provider) section allows to select which
|
||||||
|
# crypto implementation library to use
|
||||||
|
#############################################################################
|
||||||
|
bccsp:
|
||||||
|
default: SW
|
||||||
|
sw:
|
||||||
|
hash: SHA2
|
||||||
|
security: 256
|
||||||
|
filekeystore:
|
||||||
|
# The directory used for the software file-based keystore
|
||||||
|
keystore: msp/keystore
|
Binary file not shown.
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PUBLIC KEY-----
|
||||||
|
MHYwEAYHKoZIzj0CAQYFK4EEACIDYgAEPIU7ckxiUbplOh7KM39TqBaKc+PMPcZc
|
||||||
|
x9RCxqCuwHY4LMBd5gyXm8erOUyKN0EpEKiLc3PHYvssda4zH9tdyAuUZryhW0co
|
||||||
|
GaPuz5FRrtrfy59d1eqneZ2KBLaz7r6L
|
||||||
|
-----END PUBLIC KEY-----
|
|
@ -0,0 +1,14 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICLTCCAdOgAwIBAgIUOya/oTe+7qMcKY3TkoQfUUz9zE8wCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMi5leGFtcGxlLmNvbTAgFw0xODEwMTIwODU2MDBaGA8yMTY4MDkwNTA4
|
||||||
|
NTYwMFowcjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkw
|
||||||
|
FwYDVQQKExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UE
|
||||||
|
AxMWdGxzY2Eub3JnMi5leGFtcGxlLmNvbTBZMBMGByqGSM49AgEGCCqGSM49AwEH
|
||||||
|
A0IABMEU5dpAp0tg/aUsZbtKJawjYfU5rPXprVXtVnhWCbqTB0YqQSRhqbuLBXyZ
|
||||||
|
0fC69aj5hM/pNaZ/rQbHL1vitfKjRTBDMA4GA1UdDwEB/wQEAwIBBjASBgNVHRMB
|
||||||
|
Af8ECDAGAQH/AgEBMB0GA1UdDgQWBBTHXy/A06QOhfnvBqXicOlXG6eIJjAKBggq
|
||||||
|
hkjOPQQDAgNIADBFAiEAmsZj2wdRwaq3n4oDEp6mWvv8rcAxfuGqZJfjvhSZujMC
|
||||||
|
ID3hvwL0Y0zZEnFQozSX2bkqajwNnHiXyCbnCbwVOnE1
|
||||||
|
-----END CERTIFICATE-----
|
|
@ -0,0 +1,5 @@
|
||||||
|
-----BEGIN PRIVATE KEY-----
|
||||||
|
MIGHAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBG0wawIBAQQgibr/EHRtUeZnJFjT
|
||||||
|
4+TaAv+8+Yd40trfoyh3SMC59eGhRANCAATMwHNJnMsvTB/wkG8u1iGl/mhGNMt7
|
||||||
|
f/iDuX0F/QVaMkSlIDLWP1qZItvC2dsaYC0So33uT6Dl3U6A6mh91PTT
|
||||||
|
-----END PRIVATE KEY-----
|
|
@ -0,0 +1,19 @@
|
||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIIDDTCCArOgAwIBAgIUV8dC0+C17LEvSnznbpXNNbl9b8kwCgYIKoZIzj0EAwIw
|
||||||
|
cjELMAkGA1UEBhMCVVMxFzAVBgNVBAgTDk5vcnRoIENhcm9saW5hMRkwFwYDVQQK
|
||||||
|
ExBvcmcyLmV4YW1wbGUuY29tMQ4wDAYDVQQLEwV0bHNjYTEfMB0GA1UEAxMWdGxz
|
||||||
|
Y2Eub3JnMi5leGFtcGxlLmNvbTAeFw0xODEwMTIwODU3MDBaFw0yODEwMDkwOTAy
|
||||||
|
MDBaMIGFMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTEWMBQGA1UE
|
||||||
|
BxMNU2FuIEZyYW5jaXNjbzEZMBcGA1UEChMQb3JnMi5leGFtcGxlLmNvbTENMAsG
|
||||||
|
A1UECxMEdXNlcjEfMB0GA1UEAwwWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTBZMBMG
|
||||||
|
ByqGSM49AgEGCCqGSM49AwEHA0IABMzAc0mcyy9MH/CQby7WIaX+aEY0y3t/+IO5
|
||||||
|
fQX9BVoyRKUgMtY/Wpki28LZ2xpgLRKjfe5PoOXdToDqaH3U9NOjggERMIIBDTAO
|
||||||
|
BgNVHQ8BAf8EBAMCAYYwDAYDVR0TAQH/BAIwADAdBgNVHQ4EFgQUbUJkMvze/dgB
|
||||||
|
qB2bYunHIe2TaIswHwYDVR0jBBgwFoAUx18vwNOkDoX57wal4nDpVxuniCYwIQYD
|
||||||
|
VR0RBBowGIEWQWRtaW5Ab3JnMi5leGFtcGxlLmNvbTCBiQYIKgMEBQYHCAEEfXsi
|
||||||
|
YXR0cnMiOnsiYWJhYy5pbml0IjoidHJ1ZSIsImFkbWluIjoidHJ1ZSIsImhmLkFm
|
||||||
|
ZmlsaWF0aW9uIjoiIiwiaGYuRW5yb2xsbWVudElEIjoiQWRtaW5Ab3JnMi5leGFt
|
||||||
|
cGxlLmNvbSIsImhmLlR5cGUiOiJ1c2VyIn19MAoGCCqGSM49BAMCA0gAMEUCIQDz
|
||||||
|
kLhFKXaRBAiCo1ehUBS3xtpS/d1BGhmerQ2tbG71hgIgJivLVLsE89/7XfuXxic3
|
||||||
|
bNJiNW4NnqZUNCR6n8fHgiw=
|
||||||
|
-----END CERTIFICATE-----
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue