Skip to content

Commit 20457eb

Browse files
committed
[FAB-9178] Fix erroneous indentation in three lists
Three doc files: - msp.rst - policies.rst - understand_fabcar_network.rst have incorrect spacing/indentation in lists which generate build warnings, so fix all three at once. Change-Id: I0d951e4cbd4ade8b36da01d7d9e258fa772e220f Signed-off-by: Robert P. J. Day <rpjday@crashcourse.ca>
1 parent 56e07e1 commit 20457eb

File tree

3 files changed

+13
-10
lines changed

3 files changed

+13
-10
lines changed

docs/source/msp.rst

+6-5
Original file line numberDiff line numberDiff line change
@@ -192,11 +192,12 @@ needs to be set appropriately. Here is an example:
192192
As shown above, the ``NodeOUs.Enable`` is set to ``true``, this enables the identify classification.
193193
Then, client (peer) identifiers are defined by setting the following properties
194194
for the ``NodeOUs.ClientOUIdentifier`` (``NodeOUs.PeerOUIdentifier``) key:
195-
a. ``OrganizationalUnitIdentifier``: Set this to the value that matches the OU that
196-
the x509 certificate of a client (peer) should contain.
197-
b. ``Certificate``: Set this to the CA or intermediate CA under which client (peer) identities
198-
should be validated. The field is relative to the MSP root folder. It can be empty, meaning
199-
that the identity's x509 certificate can be validated under any CA defined in the MSP configuration.
195+
196+
a. ``OrganizationalUnitIdentifier``: Set this to the value that matches the OU that
197+
the x509 certificate of a client (peer) should contain.
198+
b. ``Certificate``: Set this to the CA or intermediate CA under which client (peer) identities
199+
should be validated. The field is relative to the MSP root folder. It can be empty, meaning
200+
that the identity's x509 certificate can be validated under any CA defined in the MSP configuration.
200201

201202
When the classification is enabled, MSP administrators need
202203
to be clients of that MSP, meaning that their x509 certificates need to carry

docs/source/policies.rst

+3-2
Original file line numberDiff line numberDiff line change
@@ -315,11 +315,12 @@ message defined as follows:
315315
The ``msp_identifier`` is set to the ID of the MSP (as defined by the
316316
``MSPConfig`` proto in the channel configuration for an org) which will
317317
evaluate the signature, and the ``Role`` is set to either ``MEMBER``,
318-
``ADMIN``, ``CLIENT`` or ``PEER``. In particular
318+
``ADMIN``, ``CLIENT`` or ``PEER``. In particular:
319319

320320
1. ``MEMBER`` matches any certificate issued by the MSP.
321321
2. ``ADMIN`` matches certificates enumerated as admin in the MSP definition.
322-
3. ``CLIENT`` (``PEER``) matches certificates that carry the client (peer) Organizational unit
322+
3. ``CLIENT`` (``PEER``) matches certificates that carry the client (peer) Organizational unit.
323+
323324
(see `MSP Documentation <http://hyperledger-fabric.readthedocs.io/en/latest/msp.html>`_)
324325

325326
Constructing an ImplicitMetaPolicy

docs/source/understand_fabcar_network.rst

+4-3
Original file line numberDiff line numberDiff line change
@@ -33,9 +33,10 @@ For detailed information on these components and what they do, refer to
3333

3434
These components are bootstrapped by the ``./startFabric.sh`` script, which
3535
also:
36-
* creates a channel and joins the peer to the channel
37-
* installs the ``fabcar`` smart contract onto the peer's file system and instantiates it on the channel (instantiate starts a container)
38-
* calls the ``initLedger`` function to populate the channel ledger with 10 unique cars
36+
37+
* creates a channel and joins the peer to the channel
38+
* installs the ``fabcar`` smart contract onto the peer's file system and instantiates it on the channel (instantiate starts a container)
39+
* calls the ``initLedger`` function to populate the channel ledger with 10 unique cars
3940

4041
These operations would typically be done by an organizational or peer admin.
4142
The script uses the CLI to execute these commands, however there is support in

0 commit comments

Comments
 (0)