-
Notifications
You must be signed in to change notification settings - Fork 515
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[FABN-869] Fix TypeScript test script
This changeset fixes a test script for TypeScript to make it runnable. The changes are: - Rename the channel (mychannelts) and chaincoe (examplets) - Add a new connection profile (network-ts.yaml) - Add artifacts for a new channel (mychannelts.tx) - Rename user name for CA test (user1 -> user2) - Fix paths for artifacts - Use the proper client certificate for TLS This also adds test/typescript/test.js to 'gulp test' tasks. FABN-869 #done Change-Id: I3836d34d328d1d6d530b9ca2d43ba2f8672596e1 Signed-off-by: Taku Shimosawa <[email protected]>
- Loading branch information
Showing
4 changed files
with
316 additions
and
40 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,224 @@ | ||
--- | ||
# | ||
# The network connection profile provides client applications the information about the target | ||
# blockchain network that are necessary for the applications to interact with it. These are all | ||
# knowledge that must be acquired from out-of-band sources. This file provides such a source. | ||
# | ||
name: "global-trade-network" | ||
|
||
# | ||
# Any properties with an "x-" prefix will be treated as application-specific, exactly like how naming | ||
# in HTTP headers or swagger properties work. The SDK will simply ignore these fields and leave | ||
# them for the applications to process. This is a mechanism for different components of an application | ||
# to exchange information that are not part of the standard schema described below. In particular, | ||
# the "x-type" property with the "hlfv1" value example below is used by Hyperledger Composer to | ||
# determine the type of Fabric networks (v0.6 vs. v1.0) it needs to work with. | ||
# | ||
x-type: "hlfv1" | ||
|
||
# | ||
# Describe what the target network is/does. | ||
# | ||
description: "The network to be in if you want to stay in the global trade business" | ||
|
||
# | ||
# Schema version of the content. Used by the SDK to apply the corresponding parsing rules. | ||
# | ||
version: "1.0" | ||
|
||
# | ||
# The client section is SDK-specific. The sample below is for the node.js SDK | ||
# | ||
#client: | ||
# Which organization does this application instance belong to? The value must be the name of an org | ||
# defined under "organizations" | ||
#organization: Org1 | ||
|
||
# Some SDKs support pluggable KV stores, the properties under "credentialStore" | ||
# are implementation specific | ||
#credentialStore: | ||
# [Optional]. Specific to FileKeyValueStore.js or similar implementations in other SDKs. Can be others | ||
# if using an alternative impl. For instance, CouchDBKeyValueStore.js would require an object | ||
# here for properties like url, db name, etc. | ||
#path: "/tmp/hfc-kvs" | ||
|
||
# [Optional]. Specific to the CryptoSuite implementation. Software-based implementations like | ||
# CryptoSuite_ECDSA_AES.js in node SDK requires a key store. PKCS#11 based implementations does | ||
# not. | ||
#cryptoStore: | ||
# Specific to the underlying KeyValueStore that backs the crypto key store. | ||
#path: "/tmp/hfc-cvs" | ||
|
||
# [Optional]. Specific to Composer environment | ||
#wallet: wallet-name | ||
|
||
# | ||
# [Optional]. But most apps would have this section so that channel objects can be constructed | ||
# based on the content below. If an app is creating channels, then it likely will not need this | ||
# section. | ||
# | ||
channels: | ||
# name of the channel | ||
mychannelts: | ||
# Required. list of orderers designated by the application to use for transactions on this | ||
# channel. This list can be a result of access control ("org1" can only access "ordererA"), or | ||
# operational decisions to share loads from applications among the orderers. The values must | ||
# be "names" of orgs defined under "organizations/peers" | ||
orderers: | ||
- orderer.example.com | ||
|
||
# Required. list of peers from participating orgs | ||
peers: | ||
peer0.org1.example.com: | ||
# [Optional]. will this peer be sent transaction proposals for endorsement? The peer must | ||
# have the chaincode installed. The app can also use this property to decide which peers | ||
# to send the chaincode install request. Default: true | ||
endorsingPeer: true | ||
|
||
# [Optional]. will this peer be sent query proposals? The peer must have the chaincode | ||
# installed. The app can also use this property to decide which peers to send the | ||
# chaincode install request. Default: true | ||
chaincodeQuery: true | ||
|
||
# [Optional]. will this peer be sent query proposals that do not require chaincodes, like | ||
# queryBlock(), queryTransaction(), etc. Default: true | ||
ledgerQuery: true | ||
|
||
# [Optional]. will this peer be the target of the SDK's listener registration? All peers can | ||
# produce events but the app typically only needs to connect to one to listen to events. | ||
# Default: true | ||
eventSource: true | ||
|
||
peer0.org2.example.com: | ||
endorsingPeer: true | ||
chaincodeQuery: false | ||
ledgerQuery: true | ||
eventSource: true | ||
|
||
# [Optional]. what chaincodes are expected to exist on this channel? The application can use | ||
# this information to validate that the target peers are in the expected state by comparing | ||
# this list with the query results of getInstalledChaincodes() and getInstantiatedChaincodes() | ||
chaincodes: | ||
# the format follows the "cannonical name" of chaincodes by fabric code | ||
- example02:v1 | ||
- marbles:1.0 | ||
|
||
# | ||
# list of participating organizations in this network | ||
# | ||
organizations: | ||
Org1: | ||
mspid: Org1MSP | ||
|
||
peers: | ||
- peer0.org1.example.com | ||
|
||
# [Optional]. Certificate Authorities issue certificates for identification purposes in a Fabric based | ||
# network. Typically certificates provisioning is done in a separate process outside of the | ||
# runtime network. Fabric-CA is a special certificate authority that provides a REST APIs for | ||
# dynamic certificate management (enroll, revoke, re-enroll). The following section is only for | ||
# Fabric-CA servers. | ||
certificateAuthorities: | ||
- ca-org1 | ||
|
||
# [Optional]. If the application is going to make requests that are reserved to organization | ||
# administrators, including creating/updating channels, installing/instantiating chaincodes, it | ||
# must have access to the admin identity represented by the private key and signing certificate. | ||
# Both properties can be the PEM string or local path to the PEM file. Note that this is mainly for | ||
# convenience in development mode, production systems should not expose sensitive information | ||
# this way. The SDK should allow applications to set the org admin identity via APIs, and only use | ||
# this route as an alternative when it exists. | ||
adminPrivateKey: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org1.example.com/users/[email protected]/keystore/9022d671ceedbb24af3ea69b5a8136cc64203df6b9920e26f48123fcfcb1d2e9_sk | ||
signedCert: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org1.example.com/users/[email protected]/signcerts/[email protected] | ||
|
||
# the profile will contain public information about organizations other than the one it belongs to. | ||
# These are necessary information to make transaction lifecycles work, including MSP IDs and | ||
# peers with a public URL to send transaction proposals. The file will not contain private | ||
# information reserved for members of the organization, such as admin key and certificate, | ||
# fabric-ca registrar enroll ID and secret, etc. | ||
Org2: | ||
mspid: Org2MSP | ||
peers: | ||
- peer0.org2.example.com | ||
certificateAuthorities: | ||
- ca-org2 | ||
adminPrivateKey: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org2.example.com/users/[email protected]/keystore/5a983ddcbefe52a7f9b8ee5b85a590c3e3a43c4ccd70c7795bec504e7f74848d_sk | ||
signedCert: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org2.example.com/users/[email protected]/signcerts/[email protected] | ||
|
||
# | ||
# List of orderers to send transaction and channel create/update requests to. For the time | ||
# being only one orderer is needed. If more than one is defined, which one get used by the | ||
# SDK is implementation specific. Consult each SDK's documentation for its handling of orderers. | ||
# | ||
orderers: | ||
orderer.example.com: | ||
url: grpcs://localhost:7050 | ||
|
||
# these are standard properties defined by the gRPC library | ||
# they will be passed in as-is to gRPC client constructor | ||
grpcOptions: | ||
ssl-target-name-override: orderer.example.com | ||
|
||
tlsCACerts: | ||
path: test/fixtures/channel/crypto-config/ordererOrganizations/example.com/orderers/orderer.example.com/tlscacerts/example.com-cert.pem | ||
|
||
# | ||
# List of peers to send various requests to, including endorsement, query | ||
# and event listener registration. | ||
# | ||
peers: | ||
peer0.org1.example.com: | ||
# this URL is used to send endorsement and query requests | ||
url: grpcs://localhost:7051 | ||
|
||
grpcOptions: | ||
ssl-target-name-override: peer0.org1.example.com | ||
|
||
tlsCACerts: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org1.example.com/peers/peer0.org1.example.com/tlscacerts/org1.example.com-cert.pem | ||
|
||
peer0.org2.example.com: | ||
url: grpcs://localhost:8051 | ||
grpcOptions: | ||
ssl-target-name-override: peer0.org2.example.com | ||
tlsCACerts: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org2.example.com/peers/peer0.org2.example.com/tlscacerts/org2.example.com-cert.pem | ||
|
||
# | ||
# Fabric-CA is a special kind of Certificate Authority provided by Hyperledger Fabric which allows | ||
# certificate management to be done via REST APIs. Application may choose to use a standard | ||
# Certificate Authority instead of Fabric-CA, in which case this section would not be specified. | ||
# | ||
certificateAuthorities: | ||
ca-org1: | ||
url: https://localhost:7054 | ||
# the properties specified under this object are passed to the 'http' client verbatim when | ||
# making the request to the Fabric-CA server | ||
httpOptions: | ||
verify: false | ||
tlsCACerts: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org1.example.com/ca/org1.example.com-cert.pem | ||
|
||
# Fabric-CA supports dynamic user enrollment via REST APIs. A "root" user, a.k.a registrar, is | ||
# needed to enroll and invoke new users. | ||
registrar: | ||
- enrollId: admin | ||
enrollSecret: adminpw | ||
# [Optional] The optional name of the CA. | ||
caName: ca-org1 | ||
|
||
ca-org2: | ||
url: https://localhost:8054 | ||
httpOptions: | ||
verify: false | ||
tlsCACerts: | ||
path: test/fixtures/channel/crypto-config/peerOrganizations/org2.example.com/ca/org2.example.com-cert.pem | ||
registrar: | ||
- enrollId: admin | ||
enrollSecret: adminpw | ||
# [Optional] The optional name of the CA. | ||
caName: ca-org2 |
Oops, something went wrong.