代码拉取完成,页面将自动刷新
/*
Copyright IBM Corp. 2017 All Rights Reserved.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package command
import (
"bytes"
"crypto/x509"
"encoding/pem"
"fmt"
"net/url"
"os"
"path"
"path/filepath"
"strings"
"github.com/cloudflare/cfssl/log"
"github.com/hyperledger/fabric-ca/api"
"github.com/hyperledger/fabric-ca/lib"
"github.com/hyperledger/fabric-ca/util"
"github.com/pkg/errors"
"github.com/spf13/cobra"
)
const (
// GetCAInfoCmdUsage is the usage text for getCACert command
GetCAInfoCmdUsage = "getcainfo -u http://serverAddr:serverPort -M <MSP-directory>"
// GetCAInfoCmdShortDesc is the short description for getCACert command
GetCAInfoCmdShortDesc = "Get CA certificate chain and Idemix public key"
)
type getCAInfoCmd struct {
Command
}
func newGetCAInfoCmd(c Command) *getCAInfoCmd {
getcacertcmd := &getCAInfoCmd{c}
return getcacertcmd
}
func (c *getCAInfoCmd) getCommand() *cobra.Command {
cmd := &cobra.Command{
Use: GetCAInfoCmdUsage,
Short: GetCAInfoCmdShortDesc,
Aliases: []string{"getcacert"},
PreRunE: c.preRunGetCACert,
RunE: c.runGetCACert,
}
return cmd
}
func (c *getCAInfoCmd) preRunGetCACert(cmd *cobra.Command, args []string) error {
if len(args) > 0 {
return errors.Errorf(extraArgsError, args, cmd.UsageString())
}
err := c.ConfigInit()
if err != nil {
return err
}
log.Debugf("Client configuration settings: %+v", c.GetClientCfg())
return nil
}
func (c *getCAInfoCmd) runGetCACert(cmd *cobra.Command, args []string) error {
log.Debug("Entered runGetCACert")
client := &lib.Client{
HomeDir: filepath.Dir(c.GetCfgFileName()),
Config: c.GetClientCfg(),
}
req := &api.GetCAInfoRequest{
CAName: c.GetClientCfg().CAName,
}
si, err := client.GetCAInfo(req)
if err != nil {
return err
}
err = storeCAChain(client.Config, si)
if err != nil {
return err
}
err = storeIssuerPublicKey(client.Config, si)
if err != nil {
return err
}
return storeIssuerRevocationPublicKey(client.Config, si)
}
// Store the CAChain in the CACerts folder of MSP (Membership Service Provider)
// The root cert in the chain goes into MSP 'cacerts' directory.
// The others (if any) go into the MSP 'intermediatecerts' directory.
func storeCAChain(config *lib.ClientConfig, si *lib.GetCAInfoResponse) error {
mspDir := config.MSPDir
// Get a unique name to use for filenames
serverURL, err := url.Parse(config.URL)
if err != nil {
return err
}
fname := serverURL.Host
if config.CAName != "" {
fname = fmt.Sprintf("%s-%s", fname, config.CAName)
}
fname = strings.Replace(fname, ":", "-", -1)
fname = strings.Replace(fname, ".", "-", -1) + ".pem"
tlsfname := fmt.Sprintf("tls-%s", fname)
rootCACertsDir := path.Join(mspDir, "cacerts")
intCACertsDir := path.Join(mspDir, "intermediatecerts")
tlsRootCACertsDir := path.Join(mspDir, "tlscacerts")
tlsIntCACertsDir := path.Join(mspDir, "tlsintermediatecerts")
var rootBlks [][]byte
var intBlks [][]byte
chain := si.CAChain
for len(chain) > 0 {
var block *pem.Block
block, chain = pem.Decode(chain)
if block == nil {
break
}
cert, err := x509.ParseCertificate(block.Bytes)
if err != nil {
return errors.Wrap(err, "Failed to parse certificate in the CA chain")
}
if !cert.IsCA {
return errors.New("A certificate in the CA chain is not a CA certificate")
}
// If authority key id is not present or if it is present and equal to subject key id,
// then it is a root certificate
if len(cert.AuthorityKeyId) == 0 || bytes.Equal(cert.AuthorityKeyId, cert.SubjectKeyId) {
rootBlks = append(rootBlks, pem.EncodeToMemory(block))
} else {
intBlks = append(intBlks, pem.EncodeToMemory(block))
}
}
// Store the root certificates in the "cacerts" msp folder
certBytes := bytes.Join(rootBlks, []byte(""))
if len(certBytes) > 0 {
if config.Enrollment.Profile == "tls" {
err := storeToFile("TLS root CA certificate", tlsRootCACertsDir, tlsfname, certBytes)
if err != nil {
return err
}
} else {
err = storeToFile("root CA certificate", rootCACertsDir, fname, certBytes)
if err != nil {
return err
}
}
}
// Store the intermediate certificates in the "intermediatecerts" msp folder
certBytes = bytes.Join(intBlks, []byte(""))
if len(certBytes) > 0 {
if config.Enrollment.Profile == "tls" {
err = storeToFile("TLS intermediate certificates", tlsIntCACertsDir, tlsfname, certBytes)
if err != nil {
return err
}
} else {
err = storeToFile("intermediate CA certificates", intCACertsDir, fname, certBytes)
if err != nil {
return err
}
}
}
return nil
}
func storeIssuerPublicKey(config *lib.ClientConfig, si *lib.GetCAInfoResponse) error {
if len(si.IssuerPublicKey) > 0 {
err := storeToFile("Issuer public key", config.MSPDir, "IssuerPublicKey", si.IssuerPublicKey)
if err != nil {
return err
}
}
return nil
}
func storeIssuerRevocationPublicKey(config *lib.ClientConfig, si *lib.GetCAInfoResponse) error {
if len(si.IssuerRevocationPublicKey) > 0 {
err := storeToFile("Issuer revocation public key", config.MSPDir, "IssuerRevocationPublicKey", si.IssuerRevocationPublicKey)
if err != nil {
return err
}
}
return nil
}
func storeToFile(what, dir, fname string, contents []byte) error {
err := os.MkdirAll(dir, 0755)
if err != nil {
return errors.Wrapf(err, "Failed to create directory for %s at '%s'", what, dir)
}
fpath := path.Join(dir, fname)
err = util.WriteFile(fpath, contents, 0644)
if err != nil {
return errors.WithMessage(err, fmt.Sprintf("Failed to store %s at '%s'", what, fpath))
}
log.Infof("Stored %s at %s", what, fpath)
return nil
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。