github.com/IBM-Blockchain/fabric-operator@v1.0.4/testdata/init/orderer/configtx.yaml (about) 1 ################################################################################ 2 # 3 # ORGANIZATIONS 4 # 5 # This section defines the organizational identities that can be referenced 6 # in the configuration profiles. 7 # 8 ################################################################################ 9 Organizations: 10 ################################################################################ 11 # 12 # CAPABILITIES 13 # 14 # This section defines the capabilities of fabric network. This is a new 15 # concept as of v1.1.0 and should not be utilized in mixed networks with 16 # v1.0.x peers and orderers. Capabilities define features which must be 17 # present in a fabric binary for that binary to safely participate in the 18 # fabric network. For instance, if a new MSP type is added, newer binaries 19 # might recognize and validate the signatures from this type, while older 20 # binaries without this support would be unable to validate those 21 # transactions. This could lead to different versions of the fabric binaries 22 # having different world states. Instead, defining a capability for a channel 23 # informs those binaries without this capability that they must cease 24 # processing transactions until they have been upgraded. For v1.0.x if any 25 # capabilities are defined (including a map with all capabilities turned off) 26 # then the v1.0.x peer will deliberately crash. 27 # 28 ################################################################################ 29 Capabilities: 30 # Channel capabilities apply to both the orderers and the peers and must be 31 # supported by both. 32 # Set the value of the capability to true to require it. 33 Channel: &ChannelCapabilities 34 V1_4_3: true 35 V1_3: false 36 V1_1: false 37 38 # Orderer capabilities apply only to the orderers, and may be safely 39 # used with prior release peers. 40 # Set the value of the capability to true to require it. 41 Orderer: &OrdererCapabilities 42 V1_4_2: true 43 V1_1: false 44 45 # Application capabilities apply only to the peer network, and may be safely 46 # used with prior release orderers. 47 # Set the value of the capability to true to require it. 48 Application: &ApplicationCapabilities 49 # V1.4.2 for Application enables the new non-backwards compatible 50 # features and fixes of fabric v1.4.2 51 V1_4_2: true 52 # V1.3 for Application enables the new non-backwards compatible 53 # features and fixes of fabric v1.3. 54 V1_3: false 55 # V1.2 for Application enables the new non-backwards compatible 56 # features and fixes of fabric v1.2 (note, this need not be set if 57 # later version capabilities are set) 58 V1_2: false 59 # V1.1 for Application enables the new non-backwards compatible 60 # features and fixes of fabric v1.1 (note, this need not be set if 61 # later version capabilities are set). 62 V1_1: false 63 64 ################################################################################ 65 # 66 # APPLICATION 67 # 68 # This section defines the values to encode into a config transaction or 69 # genesis block for application-related parameters. 70 # 71 ################################################################################ 72 Application: &ApplicationDefaults 73 ACLs: &ACLsDefault 74 # This section provides defaults for policies for various resources 75 # in the system. These "resources" could be functions on system chaincodes 76 # (e.g., "GetBlockByNumber" on the "qscc" system chaincode) or other resources 77 # (e.g.,who can receive Block events). This section does NOT specify the resource's 78 # definition or API, but just the ACL policy for it. 79 # 80 # User's can override these defaults with their own policy mapping by defining the 81 # mapping under ACLs in their channel definition 82 83 #---Lifecycle System Chaincode (lscc) function to policy mapping for access control---# 84 85 # ACL policy for lscc's "getid" function 86 lscc/ChaincodeExists: /Channel/Application/Readers 87 88 # ACL policy for lscc's "getdepspec" function 89 lscc/GetDeploymentSpec: /Channel/Application/Readers 90 91 # ACL policy for lscc's "getccdata" function 92 lscc/GetChaincodeData: /Channel/Application/Readers 93 94 # ACL Policy for lscc's "getchaincodes" function 95 lscc/GetInstantiatedChaincodes: /Channel/Application/Readers 96 97 #---Query System Chaincode (qscc) function to policy mapping for access control---# 98 99 # ACL policy for qscc's "GetChainInfo" function 100 qscc/GetChainInfo: /Channel/Application/Readers 101 102 # ACL policy for qscc's "GetBlockByNumber" function 103 qscc/GetBlockByNumber: /Channel/Application/Readers 104 105 # ACL policy for qscc's "GetBlockByHash" function 106 qscc/GetBlockByHash: /Channel/Application/Readers 107 108 # ACL policy for qscc's "GetTransactionByID" function 109 qscc/GetTransactionByID: /Channel/Application/Readers 110 111 # ACL policy for qscc's "GetBlockByTxID" function 112 qscc/GetBlockByTxID: /Channel/Application/Readers 113 114 #---Configuration System Chaincode (cscc) function to policy mapping for access control---# 115 116 # ACL policy for cscc's "GetConfigBlock" function 117 cscc/GetConfigBlock: /Channel/Application/Readers 118 119 # ACL policy for cscc's "GetConfigTree" function 120 cscc/GetConfigTree: /Channel/Application/Readers 121 122 # ACL policy for cscc's "SimulateConfigTreeUpdate" function 123 cscc/SimulateConfigTreeUpdate: /Channel/Application/Readers 124 125 #---Miscellanesous peer function to policy mapping for access control---# 126 127 # ACL policy for invoking chaincodes on peer 128 peer/Propose: /Channel/Application/Writers 129 130 # ACL policy for chaincode to chaincode invocation 131 peer/ChaincodeToChaincode: /Channel/Application/Readers 132 133 #---Events resource to policy mapping for access control###---# 134 135 # ACL policy for sending block events 136 event/Block: /Channel/Application/Readers 137 138 # ACL policy for sending filtered block events 139 event/FilteredBlock: /Channel/Application/Readers 140 141 # Organizations lists the orgs participating on the application side of the 142 # network. 143 Organizations: 144 145 # Policies defines the set of policies at this level of the config tree 146 # For Application policies, their canonical path is 147 # /Channel/Application/<PolicyName> 148 Policies: &ApplicationDefaultPolicies 149 Readers: 150 Type: ImplicitMeta 151 Rule: "ANY Readers" 152 Writers: 153 Type: ImplicitMeta 154 Rule: "ANY Writers" 155 Admins: 156 Type: ImplicitMeta 157 Rule: "MAJORITY Admins" 158 159 # Capabilities describes the application level capabilities, see the 160 # dedicated Capabilities section elsewhere in this file for a full 161 # description 162 Capabilities: 163 <<: *ApplicationCapabilities 164 165 ################################################################################ 166 # 167 # ORDERER 168 # 169 # This section defines the values to encode into a config transaction or 170 # genesis block for orderer related parameters. 171 # 172 ################################################################################ 173 Orderer: &OrdererDefaults 174 175 OrdererType: solo 176 Addresses: 177 BatchTimeout: 2s 178 BatchSize: 179 MaxMessageCount: 500 180 AbsoluteMaxBytes: 10 MB 181 PreferredMaxBytes: 2 MB 182 MaxChannels: 0 183 EtcdRaft: 184 Consenters: 185 Options: 186 TickInterval: 500ms 187 ElectionTick: 10 188 HeartbeatTick: 1 189 MaxInflightBlocks: 5 190 SnapshotIntervalSize: 20 MB 191 192 Organizations: 193 194 Policies: 195 Readers: 196 Type: ImplicitMeta 197 Rule: "ANY Readers" 198 Writers: 199 Type: ImplicitMeta 200 Rule: "ANY Writers" 201 Admins: 202 Type: ImplicitMeta 203 Rule: "ANY Admins" 204 # BlockValidation specifies what signatures must be included in the block 205 # from the orderer for the peer to validate it. 206 BlockValidation: 207 Type: ImplicitMeta 208 Rule: "ANY Writers" 209 210 # Capabilities describes the orderer level capabilities, see the 211 # dedicated Capabilities section elsewhere in this file for a full 212 # description 213 Capabilities: 214 <<: *OrdererCapabilities 215 216 ################################################################################ 217 # 218 # CHANNEL 219 # 220 # This section defines the values to encode into a config transaction or 221 # genesis block for channel related parameters. 222 # 223 ################################################################################ 224 Channel: &ChannelDefaults 225 # Policies defines the set of policies at this level of the config tree 226 # For Channel policies, their canonical path is 227 # /Channel/<PolicyName> 228 Policies: 229 # Who may invoke the 'Deliver' API 230 Readers: 231 Type: ImplicitMeta 232 Rule: "ANY Readers" 233 # Who may invoke the 'Broadcast' API 234 Writers: 235 Type: ImplicitMeta 236 Rule: "ANY Writers" 237 # By default, who may modify elements at this config level 238 Admins: 239 Type: ImplicitMeta 240 Rule: "MAJORITY Admins" 241 242 243 # Capabilities describes the channel level capabilities, see the 244 # dedicated Capabilities section elsewhere in this file for a full 245 # description 246 Capabilities: 247 <<: *ChannelCapabilities 248 249 ################################################################################ 250 # 251 # PROFILES 252 # 253 # Different configuration profiles may be encoded here to be specified as 254 # parameters to the configtxgen tool. The profiles which specify consortiums 255 # are to be used for generating the orderer genesis block. With the correct 256 # consortium members defined in the orderer genesis block, channel creation 257 # requests may be generated with only the org member names and a consortium 258 # name. 259 # 260 ################################################################################ 261 Profiles: 262 Initial: 263 <<: *ChannelDefaults 264 Orderer: 265 <<: *OrdererDefaults 266 Organizations: 267 Consortiums: 268 SampleConsortium: 269 Organizations: 270 Channel: 271 <<: *ChannelDefaults 272 Consortium: SampleConsortium 273 Application: 274 <<: *ApplicationDefaults 275 Organizations: