Skip to content

Commit 16e209b

Browse files
committedFeb 8, 2018
[FAB-6986] cryptogen support for NodeOUs
Since cryptogen is used to generate MSPs used in many of the samples as well as by clients to bootstrap their test networks, it makes sense to add support for testing the NodeOU support added in FAB-5664. In order to keep things simple, crypotgen now provides an option to enable NodeOU support and uses a fixed set of OUs to avoid unnecessary confusion and complexity. Change-Id: I40745caa1761113c1358efc4c6ff05dda64e3ee9 Signed-off-by: Gari Singh <gari.r.singh@gmail.com>
1 parent 9c54ba3 commit 16e209b

File tree

8 files changed

+166
-123
lines changed

8 files changed

+166
-123
lines changed
 

‎common/tools/cryptogen/ca/ca_test.go

+15-18
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,7 @@
11
/*
2-
Copyright IBM Corp. 2017 All Rights Reserved.
2+
Copyright IBM Corp. All Rights Reserved.
33
4-
Licensed under the Apache License, Version 2.0 (the "License");
5-
you may not use this file except in compliance with the License.
6-
You may obtain a copy of the License at
7-
8-
http://www.apache.org/licenses/LICENSE-2.0
9-
10-
Unless required by applicable law or agreed to in writing, software
11-
distributed under the License is distributed on an "AS IS" BASIS,
12-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13-
See the License for the specific language governing permissions and
14-
limitations under the License.
4+
SPDX-License-Identifier: Apache-2.0
155
*/
166
package ca_test
177

@@ -62,7 +52,7 @@ func TestLoadCertificateECDSA(t *testing.T) {
6252
rootCA, err := ca.NewCA(caDir, testCA3Name, testCA3Name, testCountry, testProvince, testLocality, testOrganizationalUnit, testStreetAddress, testPostalCode)
6353
assert.NoError(t, err, "Error generating CA")
6454

65-
cert, err := rootCA.SignCertificate(certDir, testName3, nil, ecPubKey,
55+
cert, err := rootCA.SignCertificate(certDir, testName3, nil, nil, ecPubKey,
6656
x509.KeyUsageDigitalSignature|x509.KeyUsageKeyEncipherment,
6757
[]x509.ExtKeyUsage{x509.ExtKeyUsageAny})
6858
assert.NoError(t, err, "Failed to generate signed certificate")
@@ -128,7 +118,7 @@ func TestGenerateSignCertificate(t *testing.T) {
128118
rootCA, err := ca.NewCA(caDir, testCA2Name, testCA2Name, testCountry, testProvince, testLocality, testOrganizationalUnit, testStreetAddress, testPostalCode)
129119
assert.NoError(t, err, "Error generating CA")
130120

131-
cert, err := rootCA.SignCertificate(certDir, testName, nil, ecPubKey,
121+
cert, err := rootCA.SignCertificate(certDir, testName, nil, nil, ecPubKey,
132122
x509.KeyUsageDigitalSignature|x509.KeyUsageKeyEncipherment,
133123
[]x509.ExtKeyUsage{x509.ExtKeyUsageAny})
134124
assert.NoError(t, err, "Failed to generate signed certificate")
@@ -137,14 +127,21 @@ func TestGenerateSignCertificate(t *testing.T) {
137127
cert.KeyUsage)
138128
assert.Contains(t, cert.ExtKeyUsage, x509.ExtKeyUsageAny)
139129

140-
cert, err = rootCA.SignCertificate(certDir, testName, nil, ecPubKey,
130+
cert, err = rootCA.SignCertificate(certDir, testName, nil, nil, ecPubKey,
141131
x509.KeyUsageDigitalSignature, []x509.ExtKeyUsage{})
142132
assert.NoError(t, err, "Failed to generate signed certificate")
143133
assert.Equal(t, 0, len(cert.ExtKeyUsage))
144134

135+
// make sure ous are correctly set
136+
ous := []string{"TestOU", "PeerOU"}
137+
cert, err = rootCA.SignCertificate(certDir, testName, ous, nil, ecPubKey,
138+
x509.KeyUsageDigitalSignature, []x509.ExtKeyUsage{})
139+
assert.Contains(t, cert.Subject.OrganizationalUnit, ous[0])
140+
assert.Contains(t, cert.Subject.OrganizationalUnit, ous[1])
141+
145142
// make sure sans are correctly set
146143
sans := []string{testName2, testIP}
147-
cert, err = rootCA.SignCertificate(certDir, testName, sans, ecPubKey,
144+
cert, err = rootCA.SignCertificate(certDir, testName, nil, sans, ecPubKey,
148145
x509.KeyUsageDigitalSignature, []x509.ExtKeyUsage{})
149146
assert.Contains(t, cert.DNSNames, testName2)
150147
assert.Contains(t, cert.IPAddresses, net.ParseIP(testIP).To4())
@@ -154,7 +151,7 @@ func TestGenerateSignCertificate(t *testing.T) {
154151
assert.Equal(t, true, checkForFile(pemFile),
155152
"Expected to find file "+pemFile)
156153

157-
_, err = rootCA.SignCertificate(certDir, "empty/CA", nil, ecPubKey,
154+
_, err = rootCA.SignCertificate(certDir, "empty/CA", nil, nil, ecPubKey,
158155
x509.KeyUsageKeyEncipherment, []x509.ExtKeyUsage{x509.ExtKeyUsageAny})
159156
assert.Error(t, err, "Bad name should fail")
160157

@@ -163,7 +160,7 @@ func TestGenerateSignCertificate(t *testing.T) {
163160
Name: "badCA",
164161
SignCert: &x509.Certificate{},
165162
}
166-
_, err = badCA.SignCertificate(certDir, testName, nil, &ecdsa.PublicKey{},
163+
_, err = badCA.SignCertificate(certDir, testName, nil, nil, &ecdsa.PublicKey{},
167164
x509.KeyUsageKeyEncipherment, []x509.ExtKeyUsage{x509.ExtKeyUsageAny})
168165
assert.Error(t, err, "Empty CA should not be able to sign")
169166
cleanup(testDir)

‎common/tools/cryptogen/ca/generator.go

+5-13
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,7 @@
11
/*
2-
Copyright IBM Corp. 2017 All Rights Reserved.
2+
Copyright IBM Corp. All Rights Reserved.
33
4-
Licensed under the Apache License, Version 2.0 (the "License");
5-
you may not use this file except in compliance with the License.
6-
You may obtain a copy of the License at
7-
8-
http://www.apache.org/licenses/LICENSE-2.0
9-
10-
Unless required by applicable law or agreed to in writing, software
11-
distributed under the License is distributed on an "AS IS" BASIS,
12-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13-
See the License for the specific language governing permissions and
14-
limitations under the License.
4+
SPDX-License-Identifier: Apache-2.0
155
*/
166
package ca
177

@@ -103,7 +93,7 @@ func NewCA(baseDir, org, name, country, province, locality, orgUnit, streetAddre
10393

10494
// SignCertificate creates a signed certificate based on a built-in template
10595
// and saves it in baseDir/name
106-
func (ca *CA) SignCertificate(baseDir, name string, sans []string, pub *ecdsa.PublicKey,
96+
func (ca *CA) SignCertificate(baseDir, name string, ous, sans []string, pub *ecdsa.PublicKey,
10797
ku x509.KeyUsage, eku []x509.ExtKeyUsage) (*x509.Certificate, error) {
10898

10999
template := x509Template()
@@ -114,6 +104,8 @@ func (ca *CA) SignCertificate(baseDir, name string, sans []string, pub *ecdsa.Pu
114104
subject := subjectTemplateAdditional(ca.Country, ca.Province, ca.Locality, ca.OrganizationalUnit, ca.StreetAddress, ca.PostalCode)
115105
subject.CommonName = name
116106

107+
subject.OrganizationalUnit = append(subject.OrganizationalUnit, ous...)
108+
117109
template.Subject = subject
118110
for _, san := range sans {
119111
// try to parse as an IP address first

‎common/tools/cryptogen/csp/csp.go

+2-12
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,7 @@
11
/*
2-
Copyright IBM Corp. 2017 All Rights Reserved.
2+
Copyright IBM Corp. All Rights Reserved.
33
4-
Licensed under the Apache License, Version 2.0 (the "License");
5-
you may not use this file except in compliance with the License.
6-
You may obtain a copy of the License at
7-
8-
http://www.apache.org/licenses/LICENSE-2.0
9-
10-
Unless required by applicable law or agreed to in writing, software
11-
distributed under the License is distributed on an "AS IS" BASIS,
12-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13-
See the License for the specific language governing permissions and
14-
limitations under the License.
4+
SPDX-License-Identifier: Apache-2.0
155
*/
166
package csp
177

‎common/tools/cryptogen/csp/csp_test.go

+2-12
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,7 @@
11
/*
2-
Copyright IBM Corp. 2017 All Rights Reserved.
2+
Copyright IBM Corp. All Rights Reserved.
33
4-
Licensed under the Apache License, Version 2.0 (the "License");
5-
you may not use this file except in compliance with the License.
6-
You may obtain a copy of the License at
7-
8-
http://www.apache.org/licenses/LICENSE-2.0
9-
10-
Unless required by applicable law or agreed to in writing, software
11-
distributed under the License is distributed on an "AS IS" BASIS,
12-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13-
See the License for the specific language governing permissions and
14-
limitations under the License.
4+
SPDX-License-Identifier: Apache-2.0
155
*/
166
package csp_test
177

‎common/tools/cryptogen/main.go

+22-29
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,7 @@
11
/*
2-
Copyright IBM Corp. 2017 All Rights Reserved.
2+
Copyright IBM Corp. All Rights Reserved.
33
4-
Licensed under the Apache License, Version 2.0 (the "License");
5-
you may not use this file except in compliance with the License.
6-
You may obtain a copy of the License at
7-
8-
http://www.apache.org/licenses/LICENSE-2.0
9-
10-
Unless required by applicable law or agreed to in writing, software
11-
distributed under the License is distributed on an "AS IS" BASIS,
12-
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13-
See the License for the specific language governing permissions and
14-
limitations under the License.
4+
SPDX-License-Identifier: Apache-2.0
155
*/
166
package main
177

@@ -75,12 +65,13 @@ type UsersSpec struct {
7565
}
7666

7767
type OrgSpec struct {
78-
Name string `yaml:"Name"`
79-
Domain string `yaml:"Domain"`
80-
CA NodeSpec `yaml:"CA"`
81-
Template NodeTemplate `yaml:"Template"`
82-
Specs []NodeSpec `yaml:"Specs"`
83-
Users UsersSpec `yaml:"Users"`
68+
Name string `yaml:"Name"`
69+
Domain string `yaml:"Domain"`
70+
EnableNodeOUs bool `yaml:"EnableNodeOUs"`
71+
CA NodeSpec `yaml:"CA"`
72+
Template NodeTemplate `yaml:"Template"`
73+
Specs []NodeSpec `yaml:"Specs"`
74+
Users UsersSpec `yaml:"Users"`
8475
}
8576

8677
type Config struct {
@@ -114,6 +105,7 @@ PeerOrgs:
114105
# ---------------------------------------------------------------------------
115106
- Name: Org1
116107
Domain: org1.example.com
108+
EnableNodeOUs: false
117109
118110
# ---------------------------------------------------------------------------
119111
# "CA"
@@ -197,6 +189,7 @@ PeerOrgs:
197189
# ---------------------------------------------------------------------------
198190
- Name: Org2
199191
Domain: org2.example.com
192+
EnableNodeOUs: false
200193
Template:
201194
Count: 1
202195
Users:
@@ -315,7 +308,7 @@ func extendPeerOrg(orgSpec OrgSpec) {
315308
signCA := getCA(caDir, orgSpec, orgSpec.CA.CommonName)
316309
tlsCA := getCA(tlscaDir, orgSpec, "tls"+orgSpec.CA.CommonName)
317310

318-
generateNodes(peersDir, orgSpec.Specs, signCA, tlsCA, msp.PEER)
311+
generateNodes(peersDir, orgSpec.Specs, signCA, tlsCA, msp.PEER, orgSpec.EnableNodeOUs)
319312

320313
adminUser := NodeSpec{
321314
CommonName: fmt.Sprintf("%s@%s", adminBaseName, orgName),
@@ -341,7 +334,7 @@ func extendPeerOrg(orgSpec OrgSpec) {
341334
users = append(users, user)
342335
}
343336

344-
generateNodes(usersDir, users, signCA, tlsCA, msp.CLIENT)
337+
generateNodes(usersDir, users, signCA, tlsCA, msp.CLIENT, orgSpec.EnableNodeOUs)
345338
}
346339

347340
func extendOrdererOrg(orgSpec OrgSpec) {
@@ -360,7 +353,7 @@ func extendOrdererOrg(orgSpec OrgSpec) {
360353
signCA := getCA(caDir, orgSpec, orgSpec.CA.CommonName)
361354
tlsCA := getCA(tlscaDir, orgSpec, "tls"+orgSpec.CA.CommonName)
362355

363-
generateNodes(orderersDir, orgSpec.Specs, signCA, tlsCA, msp.ORDERER)
356+
generateNodes(orderersDir, orgSpec.Specs, signCA, tlsCA, msp.ORDERER, false)
364357

365358
adminUser := NodeSpec{
366359
CommonName: fmt.Sprintf("%s@%s", adminBaseName, orgName),
@@ -533,13 +526,13 @@ func generatePeerOrg(baseDir string, orgSpec OrgSpec) {
533526
os.Exit(1)
534527
}
535528

536-
err = msp.GenerateVerifyingMSP(mspDir, signCA, tlsCA)
529+
err = msp.GenerateVerifyingMSP(mspDir, signCA, tlsCA, orgSpec.EnableNodeOUs)
537530
if err != nil {
538531
fmt.Printf("Error generating MSP for org %s:\n%v\n", orgName, err)
539532
os.Exit(1)
540533
}
541534

542-
generateNodes(peersDir, orgSpec.Specs, signCA, tlsCA, msp.PEER)
535+
generateNodes(peersDir, orgSpec.Specs, signCA, tlsCA, msp.PEER, orgSpec.EnableNodeOUs)
543536

544537
// TODO: add ability to specify usernames
545538
users := []NodeSpec{}
@@ -556,7 +549,7 @@ func generatePeerOrg(baseDir string, orgSpec OrgSpec) {
556549
}
557550

558551
users = append(users, adminUser)
559-
generateNodes(usersDir, users, signCA, tlsCA, msp.CLIENT)
552+
generateNodes(usersDir, users, signCA, tlsCA, msp.CLIENT, orgSpec.EnableNodeOUs)
560553

561554
// copy the admin cert to the org's MSP admincerts
562555
err = copyAdminCert(usersDir, adminCertsDir, adminUser.CommonName)
@@ -603,12 +596,12 @@ func copyAdminCert(usersDir, adminCertsDir, adminUserName string) error {
603596

604597
}
605598

606-
func generateNodes(baseDir string, nodes []NodeSpec, signCA *ca.CA, tlsCA *ca.CA, nodeType int) {
599+
func generateNodes(baseDir string, nodes []NodeSpec, signCA *ca.CA, tlsCA *ca.CA, nodeType int, nodeOUs bool) {
607600

608601
for _, node := range nodes {
609602
nodeDir := filepath.Join(baseDir, node.CommonName)
610603
if _, err := os.Stat(nodeDir); os.IsNotExist(err) {
611-
err := msp.GenerateLocalMSP(nodeDir, node.CommonName, node.SANS, signCA, tlsCA, nodeType)
604+
err := msp.GenerateLocalMSP(nodeDir, node.CommonName, node.SANS, signCA, tlsCA, nodeType, nodeOUs)
612605
if err != nil {
613606
fmt.Printf("Error generating local MSP for %s:\n%v\n", node, err)
614607
os.Exit(1)
@@ -642,13 +635,13 @@ func generateOrdererOrg(baseDir string, orgSpec OrgSpec) {
642635
os.Exit(1)
643636
}
644637

645-
err = msp.GenerateVerifyingMSP(mspDir, signCA, tlsCA)
638+
err = msp.GenerateVerifyingMSP(mspDir, signCA, tlsCA, false)
646639
if err != nil {
647640
fmt.Printf("Error generating MSP for org %s:\n%v\n", orgName, err)
648641
os.Exit(1)
649642
}
650643

651-
generateNodes(orderersDir, orgSpec.Specs, signCA, tlsCA, msp.ORDERER)
644+
generateNodes(orderersDir, orgSpec.Specs, signCA, tlsCA, msp.ORDERER, false)
652645

653646
adminUser := NodeSpec{
654647
CommonName: fmt.Sprintf("%s@%s", adminBaseName, orgName),
@@ -658,7 +651,7 @@ func generateOrdererOrg(baseDir string, orgSpec OrgSpec) {
658651
users := []NodeSpec{}
659652
// add an admin user
660653
users = append(users, adminUser)
661-
generateNodes(usersDir, users, signCA, tlsCA, msp.CLIENT)
654+
generateNodes(usersDir, users, signCA, tlsCA, msp.CLIENT, false)
662655

663656
// copy the admin cert to the org's MSP admincerts
664657
err = copyAdminCert(usersDir, adminCertsDir, adminUser.CommonName)

0 commit comments

Comments
 (0)
Please sign in to comment.