github.com/IBM-Blockchain/fabric-operator@v1.0.4/defaultconfig/orderer/configtx.yaml (about) 1 # 2 # Copyright contributors to the Hyperledger Fabric Operator project 3 # 4 # SPDX-License-Identifier: Apache-2.0 5 # 6 # Licensed under the Apache License, Version 2.0 (the "License"); 7 # you may not use this file except in compliance with the License. 8 # You may obtain a copy of the License at: 9 # 10 # http://www.apache.org/licenses/LICENSE-2.0 11 # 12 # Unless required by applicable law or agreed to in writing, software 13 # distributed under the License is distributed on an "AS IS" BASIS, 14 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 15 # See the License for the specific language governing permissions and 16 # limitations under the License. 17 # 18 19 Capabilities: 20 # Channel capabilities apply to both the orderers and the peers and must be 21 # supported by both. 22 # Set the value of the capability to true to require it. 23 Channel: &ChannelCapabilities 24 V1_4_3: true 25 V1_3: false 26 V1_1: false 27 28 # Orderer capabilities apply only to the orderers, and may be safely 29 # used with prior release peers. 30 # Set the value of the capability to true to require it. 31 Orderer: &OrdererCapabilities 32 V1_4_2: true 33 V1_1: false 34 35 # Application capabilities apply only to the peer network, and may be safely 36 # used with prior release orderers. 37 # Set the value of the capability to true to require it. 38 Application: &ApplicationCapabilities 39 # V1.4.2 for Application enables the new non-backwards compatible 40 # features and fixes of fabric v1.4.2 41 V1_4_2: true 42 # V1.3 for Application enables the new non-backwards compatible 43 # features and fixes of fabric v1.3. 44 V1_3: false 45 # V1.2 for Application enables the new non-backwards compatible 46 # features and fixes of fabric v1.2 (note, this need not be set if 47 # later version capabilities are set) 48 V1_2: false 49 # V1.1 for Application enables the new non-backwards compatible 50 # features and fixes of fabric v1.1 (note, this need not be set if 51 # later version capabilities are set). 52 V1_1: false 53 54 ################################################################################ 55 # 56 # ORGANIZATIONS 57 # 58 # This section defines the organizational identities that can be referenced 59 # in the configuration profiles. 60 # 61 ################################################################################ 62 Organizations: 63 ################################################################################ 64 # 65 # ORDERER 66 # 67 # This section defines the values to encode into a config transaction or 68 # genesis block for orderer related parameters. 69 # 70 # - ibpv2-test-cluster.us-south.containers.appdomain.cloud:32356 71 # - Host: ibpv2-test-cluster.us-south.containers.appdomain.cloud 72 # Port: 32356 73 # ClientTLSCert: /certs/tls/cert.pem 74 # ServerTLSCert: /certs/tls/cert.pem 75 ################################################################################ 76 Orderer: &OrdererDefaults 77 78 OrdererType: etcdraft 79 Addresses: 80 BatchTimeout: 2s 81 BatchSize: 82 83 MaxChannels: 0 84 Kafka: 85 Brokers: 86 87 EtcdRaft: 88 Consenters: 89 Options: 90 91 Organizations: 92 93 Policies: 94 95 # Capabilities describes the orderer level capabilities, see the 96 # dedicated Capabilities section elsewhere in this file for a full 97 # description 98 Capabilities: 99 <<: *OrdererCapabilities 100 101 ################################################################################ 102 # 103 # APPLICATION 104 # 105 # This section defines the values to encode into a config transaction or 106 # genesis block for application-related parameters. 107 # 108 ################################################################################ 109 Application: &ApplicationDefaults 110 ACLs: &ACLsDefault 111 # This section provides defaults for policies for various resources 112 # in the system. These "resources" could be functions on system chaincodes 113 # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources 114 # (e.g.,who can receive Block events). This section does NOT specify the resource's 115 # definition or API, but just the ACL policy for it. 116 # 117 # User's can override these defaults with their own policy mapping by defining the 118 # mapping under ACLs in their channel definition 119 120 #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# 121 122 # ACL policy for lscc's "getid" function 123 lscc/ChaincodeExists: /Channel/Application/Readers 124 125 # ACL policy for lscc's "getdepspec" function 126 lscc/GetDeploymentSpec: /Channel/Application/Readers 127 128 # ACL policy for lscc's "getccdata" function 129 lscc/GetChaincodeData: /Channel/Application/Readers 130 131 # ACL Policy for lscc's "getchaincodes" function 132 lscc/GetInstantiatedChaincodes: /Channel/Application/Readers 133 134 #---Query System Chaincode (qscc) function to policy mapping for access control---# 135 136 # ACL policy for qscc's "GetChainInfo" function 137 qscc/GetChainInfo: /Channel/Application/Readers 138 139 # ACL policy for qscc's "GetBlockByNumber" function 140 qscc/GetBlockByNumber: /Channel/Application/Readers 141 142 # ACL policy for qscc's "GetBlockByHash" function 143 qscc/GetBlockByHash: /Channel/Application/Readers 144 145 # ACL policy for qscc's "GetTransactionByID" function 146 qscc/GetTransactionByID: /Channel/Application/Readers 147 148 # ACL policy for qscc's "GetBlockByTxID" function 149 qscc/GetBlockByTxID: /Channel/Application/Readers 150 151 #---Configuration System Chaincode (cscc) function to policy mapping for access control---# 152 153 # ACL policy for cscc's "GetConfigBlock" function 154 cscc/GetConfigBlock: /Channel/Application/Readers 155 156 # ACL policy for cscc's "GetConfigTree" function 157 cscc/GetConfigTree: /Channel/Application/Readers 158 159 # ACL policy for cscc's "SimulateConfigTreeUpdate" function 160 cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers 161 162 #---Miscellanesous peer function to policy mapping for access control---# 163 164 # ACL policy for invoking chaincodes on peer 165 peer/Propose: /Channel/Application/Writers 166 167 # ACL policy for chaincode to chaincode invocation 168 peer/ChaincodeToChaincode: /Channel/Application/Readers 169 170 #---Events resource to policy mapping for access control###---# 171 172 # ACL policy for sending block events 173 event/Block: /Channel/Application/Readers 174 175 # ACL policy for sending filtered block events 176 event/FilteredBlock: /Channel/Application/Readers 177 178 # Organizations lists the orgs participating on the application side of the 179 # network. 180 Organizations: 181 182 # Policies defines the set of policies at this level of the config tree 183 # For Application policies, their canonical path is 184 # /Channel/Application/<PolicyName> 185 Policies: &ApplicationDefaultPolicies 186 187 # Capabilities describes the application level capabilities, see the 188 # dedicated Capabilities section elsewhere in this file for a full 189 # description 190 Capabilities: 191 <<: *ApplicationCapabilities 192 193 ################################################################################ 194 # 195 # CHANNEL 196 # 197 # This section defines the values to encode into a config transaction or 198 # genesis block for channel related parameters. 199 # 200 ################################################################################ 201 Channel: &ChannelDefaults 202 # Policies defines the set of policies at this level of the config tree 203 # For Channel policies, their canonical path is 204 # /Channel/<PolicyName> 205 Policies: 206 207 208 # Capabilities describes the channel level capabilities, see the 209 # dedicated Capabilities section elsewhere in this file for a full 210 # description 211 Capabilities: 212 <<: *ChannelCapabilities 213 214 ################################################################################ 215 # 216 # PROFILES 217 # 218 # Different configuration profiles may be encoded here to be specified as 219 # parameters to the configtxgen tool. The profiles which specify consortiums 220 # are to be used for generating the orderer genesis block. With the correct 221 # consortium members defined in the orderer genesis block, channel creation 222 # requests may be generated with only the org member names and a consortium 223 # name. 224 # 225 ################################################################################ 226 Profiles: 227 Initial: 228 <<: *ChannelDefaults 229 Orderer: 230 <<: *OrdererDefaults 231 OrdererType: etcdraft 232 Organizations: 233 234 Consortiums: 235 Channel: 236 <<: *ChannelDefaults 237 Consortium: SampleConsortium 238 Application: 239 <<: *ApplicationDefaults 240 Organizations: