1 Star 0 Fork 0

麦当 / fabric-ca

标签名
描述
提交信息
操作
2020-10-01 02:49
2020-07-31 06:49
2020-05-15 01:39
2020-02-26 05:32
2020-02-20 02:59
2019-11-16 00:27

v1.4.3 Release Notes - August 26, 2019

What's New in Hyperledger Fabric CA v1.4.3

No new features.

Important Fixes

None.

Changes, Known Issues, and Workarounds

Go MySQL driver updated to version 2019-05-10T10:23:35Z.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v143

2019-08-27 05:19

v1.4.2 Release Notes - July 17, 2019

What's New in Hyperledger Fabric CA v1.4.2

No new features.

Important Fixes

FABC-848 create table fails using Postgres with tls
Prior to the fix, when using Fabric CA with tls configured for Postres
database, the creation of the required tables fails upon initial
Fabric CA start.

FABC-837 Fabric CA panics when setup for multiple CAs
Prior to the fix, Fabric CA would panic upon start if configured
for multiple CAs (using --cafiles) and metric gathering.

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v142

2019-07-18 02:56

v1.4.1 Release Notes - April 11, 2019

What's New in Hyperledger Fabric CA v1.4.1

FABC-408 Add support for CORS
CORS can be enabled in Fabric CA server using new server flags:
--cors.enabled Enable CORS for the fabric-ca-server
--cors.origins Comma-separated list of Access-Control-Allow-Origin domains

FABC-782
Fabric CA API operational metrics

FABC-789
Fabric CA database operations metrics

FABC-743
Fabric CA health check

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.11.15
Updated baseimage version to 0.4.15

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v141

2019-04-11 23:08

v2.0.0-alpha Release Notes - April 9, 2019

What's New in Hyperledger Fabric CA v2.0

FABC-408 Add support for CORS
CORS can be enabled in Fabric CA server using new server flags:
--cors.enabled Enable CORS for the fabric-ca-server
--cors.origins Comma-separated list of Access-Control-Allow-Origin domains

FABC-735 - Docker images with Alpine Linux
Hyperledger Fabric CA Docker image will now use Alpine Linux,
a security-oriented, lightweight Linux distribution.

FABC-782
Fabric CA API operational metrics

FABC-789
Fabric CA database operations metrics

FABC-743
Fabric CA health check

Changes, Known Issues, and Workarounds

FAB-11096 - Docker images with Alpine Linux
Bash is no longer available in Fabric images. Utilize Alpine's built-in
sh or ash instead.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.11.5
Updated baseimage version to 0.4.15

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v200-alpha

2019-04-10 03:51

v1.4.0 Release Notes - January 9th, 2019

What's New in Hyperledger Fabric CA v1.4

No new features in Fabric CA v1.4. v1.4 is a maintenance release only,
with bug fixes, dependency updates, test improvements.

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.11.1
Updated baseimage version to 0.4.14

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v140

2019-01-09 01:30

v1.4.0-rc2 Release Notes - December 20, 2018

What's New in Hyperledger Fabric CA v1.4

No new features in Fabric CA v1.4. v1.4 is a maintenance release only,
with bug fixes, dependency updates, test improvements.

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.11.1
Updated baseimage version to 0.4.14

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v140-rc2

2018-12-20 22:15

v1.4.0-rc1 Release Notes - December 10, 2018

What's New in Hyperledger Fabric CA v1.4

No new features in Fabric CA v1.4. v1.4 is a maintenance release only,
with bug fixes, dependency updates, test improvements.

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

FABC-174 Commands can be manipulated to delete identities or affiliations

This vulnerability can be resolved in one of two ways:

  1. Use HTTPS (TLS) so that the authorization header is not in clear text.

  2. The token generation/authentication mechanism was improved to optionally prevent
    token reuse. In v1.4 a more secure token can be used by setting environment variable:

FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

However, it cannot be set to false until all clients have
been updated to generate the more secure token and tolerate
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false.
The Fabric CA client has been updated in v1.4 to generate the more secure token.
The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token,
at which time the default for Fabric CA server will change to:
FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.11.1
Updated baseimage version to 0.4.14

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v140-rc1

2018-12-11 11:15

v1.3.0 Release Notes - October 10, 2018

What's New in Hyperledger Fabric CA v1.3

The following features/epics are included in this release:

FABC-592 - Identity Mixer for anonymous transactions
Fabric-CA can now issue Identity Mixer credentials to enable anonymous and
unlinkable client identities through the use of zero-knowledge proofs.

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

None.

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.10.4
Updated baseimage version to 0.4.13

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v130

2018-10-10 15:59

v1.2.1 September 27, 2018

Release Notes

Update vendored version of BCCSP package.

Known Vulnerabilities

none

Resolved Vulnerabilities

none

Known Issues & Workarounds

none

Change Log

https://github.com/hyperledger/fabric-ca/blob/release-1.2/CHANGELOG.md#v121

2018-09-28 03:22

v1.3.0-rc1 Release Notes - September 24, 2018

What's New in Hyperledger Fabric CA v1.3

The following features/epics are included in this release:

FABC-592 - Identity Mixer for anonymous transactions
Fabric-CA can now issue Identity Mixer credentials to enable anonymous and
unlinkable client identities through the use of zero-knowledge proofs.

Changes, Known Issues, and Workarounds

None.

Known Vulnerabilities

None.

Resolved Vulnerabilities

None.

Other improvements and fixes

Updated to Go version 1.10.4
Updated baseimage version to 0.4.12

For the full list of improvements and fixes, refer to the release change log:
https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v130-rc1

2018-09-25 07:31

v1.2.0 July 3, 2018

Release Notes

Added support for listing certificates based on various filter criteria.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.10
Updated baseimage version to 0.4.10

Known Vulnerabilities

[FAB-9938] many commands can be manipulated to delete identities or affiliations
This vulnerability has a low severity because to exploit it, one would need to
access the authorization header of the requests. Using HTTPS (TLS) eliminates this
potential. We will be re-evaluating the authorization approach for the v1.3
release.

Resolved Vulnerabilities

https://jira.hyperledger.org/browse/FAB-7534

Known Issues & Workarounds

none

Change Log

https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v120

2018-07-04 03:43

v1.2.0-rc1 June 22, 2018

Release Notes

Added support for listing certificates based on various filter criteria.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.10
Updated baseimage version to 0.4.8

Known Vulnerabilities

[FAB-9938] many commands can be manipulated to delete identities or affiliations
This vulnerability has a low severity because to exploit it, one would need to
access the authorization header of the requests. Using HTTPS (TLS) eliminates this
potential. We will be re-evaluating the authorization approach for the v1.3
release.

Resolved Vulnerabilities

https://jira.hyperledger.org/browse/FAB-7534

Known Issues & Workarounds

none

Change Log

https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v120-rc1

2018-06-22 05:48

v1.1.0 March 15, 2018

Release Notes

Added support for CRLs and attribute based access control.

Added support for dynamic configurtion of the fabric-ca-server without requiring restart.

Added capability to dynamically modify affiliations.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.9.2
Updated baseimage version to 0.4.6

Known Vulnerabilities

none

Resolved Vulnerabilities

https://jira.hyperledger.org/browse/FAB-5794
https://jira.hyperledger.org/browse/FAB-6871
https://jira.hyperledger.org/browse/FAB-7348
https://jira.hyperledger.org/browse/FAB-7465
https://jira.hyperledger.org/browse/FAB-7646

Known Issues & Workarounds

none

Change Log

https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v110

2018-03-16 01:51

v1.1.0-rc1 March 1, 2018

Release Notes

Added capability to dynamically modify affiliations.

Bug fixes, documentation and test coverage improvements, UX improvements
based on user feedback and changes to address a variety of static scan
findings (unused code, static security scanning, spelling, linting and more).

Updated to Go version 1.9.2
Updated baseimage version to 0.4.6

Known Vulnerabilities

none

Resolved Vulnerabilities

none

Known Issues & Workarounds

none

Change Log

https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v110-rc1

2018-03-02 02:19
1
https://gitee.com/Mydawng/fabric-ca.git
git@gitee.com:Mydawng/fabric-ca.git
Mydawng
fabric-ca
fabric-ca

搜索帮助

53164aa7 5694891 3bd8fe86 5694891