github.com/hyperion-hyn/go-ethereum@v2.4.0+incompatible/docs/Privacy/Tessera/Configuration/Tessera v0.10.0 sample settings.md (about) 1 **Changes:** 2 - Added configuration for remote key validation.Default is set to false 3 4 e.g. 5 ```json 6 "unixSocketFile": "Path", 7 "features": { 8 "enableRemoteKeyValidation": false 9 } 10 ``` 11 12 **Sample:** 13 14 ```json 15 { 16 "useWhiteList": "boolean", 17 "jdbc": { 18 "url": "String", 19 "username": "String", 20 "password": "String" 21 }, 22 "serverConfigs": [ 23 { 24 "app": "ENCLAVE", 25 // Defines us using a remote enclave, leave out if using built-in enclave 26 "enabled": true, 27 "serverAddress": "http://localhost:9081", 28 //Where to find the remote enclave 29 "communicationType": "REST" 30 }, 31 { 32 "app": "ThirdParty", 33 "enabled": true, 34 "serverAddress": "http://localhost:9081", 35 "bindingAddress": "String - url with port e.g. http://127.0.0.1:9081", 36 "communicationType": "REST" 37 }, 38 { 39 "app": "Q2T", 40 "enabled": true, 41 "serverAddress": "unix:/tmp/tm.ipc", 42 "communicationType": "REST" 43 }, 44 { 45 "app": "P2P", 46 "enabled": true, 47 "serverAddress": "http://localhost:9001", 48 "bindingAddress": "String - url with port e.g. http://127.0.0.1:9001", 49 "sslConfig": { 50 "tls": "enum STRICT,OFF", 51 "generateKeyStoreIfNotExisted": "boolean", 52 "serverKeyStore": "Path", 53 "serverTlsKeyPath": "Path", 54 "serverTlsCertificatePath": "Path", 55 "serverKeyStorePassword": "String", 56 "serverTrustStore": "Path", 57 "serverTrustCertificates": [ 58 "Path..." 59 ], 60 "serverTrustStorePassword": "String", 61 "serverTrustMode": "Enumeration: CA, TOFU, WHITELIST, CA_OR_TOFU, NONE", 62 "clientKeyStore": "Path", 63 "clientTlsKeyPath": "Path", 64 "clientTlsCertificatePath": "Path", 65 "clientKeyStorePassword": "String", 66 "clientTrustStore": "Path", 67 "clientTrustCertificates": [ 68 "Path..." 69 ], 70 "clientTrustStorePassword": "String", 71 "clientTrustMode": "Enumeration: CA, TOFU, WHITELIST, CA_OR_TOFU, NONE", 72 "knownClientsFile": "Path", 73 "knownServersFile": "Path" 74 }, 75 "communicationType": "REST" 76 } 77 ], 78 "peer": [ 79 { 80 "url": "url e.g. http://127.0.0.1:9000/" 81 } 82 ], 83 "keys": { 84 "passwords": [ 85 "String..." 86 ], 87 "passwordFile": "Path", 88 "azureKeyVaultConfig": { 89 "url": "Azure Key Vault url" 90 }, 91 "hashicorpKeyVaultConfig": { 92 "url": "Hashicorp Vault url", 93 "approlePath": "String (defaults to 'approle' if not set)", 94 "tlsKeyStorePath": "Path to jks key store", 95 "tlsTrustStorePath": "Path to jks trust store" 96 }, 97 "keyData": [ 98 { 99 "config": { 100 "data": { 101 "aopts": { 102 "variant": "Enum : id,d or i", 103 "memory": "int", 104 "iterations": "int", 105 "parallelism": "int" 106 }, 107 "bytes": "String", 108 "snonce": "String", 109 "asalt": "String", 110 "sbox": "String", 111 "password": "String" 112 }, 113 "type": "Enum: argon2sbox or unlocked. If unlocked is defined then config data is required. " 114 }, 115 "privateKey": "String", 116 "privateKeyPath": "Path", 117 "azureVaultPrivateKeyId": "String", 118 "azureVaultPrivateKeyVersion": "String", 119 "publicKey": "String", 120 "publicKeyPath": "Path", 121 "azureVaultPublicKeyId": "String", 122 "azureVaultPublicKeyVersion": "String", 123 "hashicorpVaultSecretEngineName": "String", 124 "hashicorpVaultSecretName": "String", 125 "hashicorpVaultSecretVersion": "Integer (defaults to 0 (latest) if not set)", 126 "hashicorpVaultPrivateKeyId": "String", 127 "hashicorpVaultPublicKeyId": "String" 128 } 129 ] 130 }, 131 "alwaysSendTo": [ 132 "String..." 133 ], 134 "unixSocketFile": "Path", 135 "features": { 136 "enableRemoteKeyValidation": false 137 } 138 } 139 ```