Skip to content
This repository was archived by the owner on Mar 8, 2020. It is now read-only.

Conversation

@EdProsser
Copy link
Contributor

Updates for Security, Queries, Connection profiles and other minor tweaks.

# Conflicts:
#	packages/composer-website/jekylldocs/installing/quickstart.md
# Conflicts:

#	packages/composer-website/jekylldocs/installing/manual_prerequisites.md
#	packages/composer-website/jekylldocs/installing/prerequisites.md
@EdProsser EdProsser requested a review from davidkel June 14, 2017 15:32

In {{site.data.conrefs.hlf_full}} Beta peers now enforce the concepts of admins and members. Admin user's identities and crypto material must be available to the peer at deployment. To make that identity and its crypto material available, your must import it to your local `keyValStore` directory before deploying the business network. To import the identity, use the [`composer identity import` command](../reference/composer.identity.import.html). When importing an identity, you do not assign it a secret, however the `composer network deploy` command requires a secret. If you are using an imported identity, you can enter any value for the secret.

When connecting to the peer you must specify an identity which contains the userID `admin`, for example, `PeerAdmin`, `myadmin`, or `AdminPeer` are all valid userID's. Peers in different organizations may have different admin users. Only an admin user of peer's organization will be able to deploy a business network to their peers.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you must specify an identity which contains the userID admin
it's not so much containing the userid as the userid you choose containing the text 'admin'.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changed


When connecting to the peer you must specify an identity which contains the userID `admin`, for example, `PeerAdmin`, `myadmin`, or `AdminPeer` are all valid userID's. Peers in different organizations may have different admin users. Only an admin user of peer's organization will be able to deploy a business network to their peers.

Once a user has deployed a business network to one or more peers, they must also be the user to instantiate the business network. Any subsequent deploys requests will only install the business network on those peers.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When a user deploys a business network to their peers, it will first install the business network then if the business network has never been instantiated before it will be instantiated. If later on someone deploys to another peer as the business network has already been instantiated it will only be installed to the peer and that peer will then be able to participate in the business network

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changed


Once a user has deployed a business network to one or more peers, they must also be the user to instantiate the business network. Any subsequent deploys requests will only install the business network on those peers.

These security changes mean that {{site.data.conrefs.hlf_full}} Beta is not compatible with any fabric that is running an older version.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

With composer moving to support hlfv1 beta. It will not be compatible with older versions of hlfv1

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changed.

## Connecting to a {{site.data.conrefs.hlf_full}} Beta


In {{site.data.conrefs.hlf_full}} Beta peers now enforce the concepts of admins and members. Admin user's identities and crypto material must be available to the peer at deployment. To make that identity and its crypto material available, your must import it to your local `keyValStore` directory before deploying the business network. To import the identity, use the [`composer identity import` command](../reference/composer.identity.import.html). When importing an identity, you do not assign it a secret, however the `composer network deploy` command requires a secret. If you are using an imported identity, you can enter any value for the secret.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we really want to replicate this again ?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

For the time being. Next week will implement some steps explaining how and what to do, but for something which came in so late in the day...

"maxRecvSize": 15
}

If you are connecting to {{site.data.conrefs.hlf_full}} v1.0 and are not using TLS or if you don't need the trustedRoots and verify options of the Certificate Authority definition you can use the following simplified connection profile:

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The simplified version defines the "ca" as a single line. This will only work if the ca has no name defined. If it does then you will have to use the more complex definition of a ca

            "ca": {
                      "url:" "http://",
                      "name": ""
              },

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Changed

- `maxSendSize` is an optional property which defines the size limit of outbound grpc messages being send to orderers and peers. The value is defined in megabytes. If this is not set, grpc sets a default. Setting this property to `-1` results in no size restriction.
- `maxRecvSize` is an optional property which defines the size limit of inbound grpc messages being received from orderers and peers. The value is defined in megabytes. If this is not set, grpc sets a default. Setting this property to `-1` results in no size restriction.

*Please note: If you are connecting to an instance of {{site.data.conrefs.hlf_full}} v1.0 the `keyValStore` property must be `home/.hfc-key-store`*

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The comment
Please note: If you are connecting to an instance of {{site.data.conrefs.hlf_full}} v1.0 the keyValStore property must be home/.hfc-key-store

can now be removed, thank goodness.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Removed. :)

@davidkel
Copy link

davidkel commented Jun 15, 2017

@EdProsser you are going to have trouble getting this to merge, suggest you talk to Caroline to help you rebase this branch, Ok, maybe not. But highly recommend you rebase before merging.

davidkel
davidkel previously approved these changes Jun 15, 2017
Copy link

@davidkel davidkel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

difficult to see how this will flow until published to website so approving so we can get it in and review again.

@EdProsser EdProsser requested a review from mbwhite June 15, 2017 07:47
@EdProsser EdProsser merged commit c1ccdb4 into hyperledger-archives:master Jun 15, 2017
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Development

Successfully merging this pull request may close these issues.

4 participants