You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: core/drivers/corda-driver/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -133,7 +133,7 @@ To push image to github container registry:
133
133
* Create a Personal Access Token with read packages access in github. Refer [Creating a Personal Access Token](https://docs.github.com/en/github/authenticating-to-github/keeping-your-account-and-data-secure/creating-a-personal-access-token) for help.
134
134
* Run `docker login ghcr.io` and use your github username and personal access token as password.
Copy file name to clipboardExpand all lines: core/drivers/fabric-driver/readme.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,7 +55,7 @@ Note: Can also be run in mocked mode by setting environment variable `MOCK=true`
55
55
56
56
Make sure the env and config file have the expected values.
57
57
58
-
Update the docker-compose with the correct external network and ports exposed
58
+
Update the dockercompose with the correct external network and ports exposed
59
59
60
60
To do a full build run `make build-image`. This update/clones protos, generates js protos and compiles typescript.
61
61
@@ -67,8 +67,8 @@ To deploy, run `make deploy`
67
67
* Run `docker login ghcr.io` and use your github username and personal access token as password.
68
68
* Copy `.env.docker.template` to `.env` and make changes appropriately (like correcting the base path of repo, changing network name if required etc, check image details here: [weaver-fabric-driver](https://github.com/hyperledger-labs/weaver-dlt-interoperability/pkgs/container/weaver-fabric-driver)).
69
69
* Make sure connection profile used for docker, containers correct hostnames instead of localhost in urls.
70
-
* If deploying more than one driver on same host, make sure to change service name in docker-compose to avoid conflicts.
71
-
* Finally run `docker-compose up -d` to deploy the fabric driver.
70
+
* If deploying more than one driver on same host, make sure to change service name in dockercompose to avoid conflicts.
71
+
* Finally run `dockercompose up -d` to deploy the fabric driver.
Copy file name to clipboardExpand all lines: core/relay/relay-docker.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,7 +149,7 @@ First **login** to github container registry:
149
149
* Create a Personal Access Token with read packages access in github. Refer [Creating a Personal Access Token](https://docs.github.com/en/github/authenticating-to-github/keeping-your-account-and-data-secure/creating-a-personal-access-token) for help.
150
150
* Run `docker login ghcr.io` and use your github username and personal access token as password.
151
151
152
-
**Some sample steps to deploy relay using docker-compose when Config File is available:**
152
+
**Some sample steps to deploy relay using dockercompose when Config File is available:**
153
153
154
154
* Copy `.env.template` file to `.env`.
155
155
* Keep following Environment Variables in `.env` and delete/ignore rest:
@@ -162,10 +162,10 @@ First **login** to github container registry:
162
162
* Tip: If running all relays on same host, make sure to change service name before each relay deployment, to avoid conflict in names.
163
163
* Run `make convert-compose-method1`.
164
164
* Create docker network named `relay`: `docker network create relay`.
165
-
* To deploy relay, run: `docker-compose up relay-server -d` (Given relay-server is the service name in docker-compose).
165
+
* To deploy relay, run: `dockercompose up relay-server -d` (Given relay-server is the service name in docker-compose).
166
166
* Also `make start-server` does the above 2 steps, if service name is not changed.
167
167
168
-
**Some sample steps to deploy relay using docker-compose when Config is not available:**
168
+
**Some sample steps to deploy relay using dockercompose when Config is not available:**
169
169
170
170
* Copy `.env.template.2` file to `.env`.
171
171
* Configure the following environment variables in `.env` and delete (or ignore) the rest:
@@ -197,7 +197,7 @@ First **login** to github container registry:
197
197
* Run `make convert-compose-method2`.
198
198
* Tip: If running all relays on same host, make sure to change service name before each relay deployment, to avoid conflict in names.
199
199
* Create docker network named `relay`: `docker network create relay`.
200
-
* To deploy relay, run: `docker-compose up relay-server -d` (Given relay-server is the service name in docker-compose).
200
+
* To deploy relay, run: `dockercompose up relay-server -d` (Given relay-server is the service name in docker-compose).
201
201
* Also `make start-server` does the above 2 steps, if service name is not changed.
Copy file name to clipboardExpand all lines: docs/docs/external/getting-started/enabling-weaver-network/corda.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -512,7 +512,7 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
512
512
513
513
To start the relay server, navigate to the folder containing the above files and run the following:
514
514
```bash
515
-
docker-compose up -d relay-server
515
+
dockercompose up -d relay-server
516
516
```
517
517
518
518
#### Launch Driver
@@ -545,13 +545,13 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
545
545
- **Enabling TLS**:
546
546
- You can make your driver accept TLS connections by specifying `DRIVER_TLS` as `true` and specifying a TLS certificate file path and private key file path in `DRIVER_TLS_CERT_PATH` and `DRIVER_TLS_KEY_PATH` respectively. The same certificate should be specified in this driver's definition in the `drivers` section in the `config.toml` file of your relay in the `tlsca_cert_path` property (see the earlier section on relay configuration).
547
547
-To communicate with your network' relay using TLS (i.e., if the relay is TLS-enabled), specify that relay's TLSCA certificate path in `RELAY_TLSCA_CERT_PATH` (currently only one certificate can be configured) and set `RELAY_TLS` to `true`. ThisCA certificate should match the one specified in the `cert_path` property in the relay's `config.toml` file (see the earlier section on relay configuration):
548
-
- You can point to the folder in your host system containing the certificate and key using the `TLS_CREDENTIALS_DIR` variable. (This folder will be synced to the `/corda-driver/credentials` folder in the Fabric Driver container as specified in the [docker-compose file](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/drivers/fabric-driver/docker-compose.yml).) Make sure you point to the right certificate and key file paths within the container using the `DRIVER_TLS_CERT_PATH`, `DRIVER_TLS_KEY_PATH`, and `RELAY_TLSCA_CERT_PATH` variables.
548
+
- You can point to the folder in your host system containing the certificate and key using the `TLS_CREDENTIALS_DIR` variable. (This folder will be synced to the `/corda-driver/credentials` folder in the Fabric Driver container as specified in the [dockercompose file](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/drivers/fabric-driver/docker-compose.yml).) Make sure you point to the right certificate and key file paths within the container using the `DRIVER_TLS_CERT_PATH`, `DRIVER_TLS_KEY_PATH`, and `RELAY_TLSCA_CERT_PATH` variables.
549
549
550
550
- `docker-compose.yaml`: This specifies the properties of the driver container. You can use the [file in the repository](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/drivers/corda-driver/docker-compose.yml) verbatim.
551
551
552
552
To start the driver, navigate to the folder containing the above files and run the following:
Copy file name to clipboardExpand all lines: docs/docs/external/getting-started/enabling-weaver-network/fabric.md
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -603,7 +603,7 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
603
603
604
604
To start the relay server, navigate to the folder containing the above files and run the following:
605
605
```bash
606
-
docker-compose up -d relay-server
606
+
dockercompose up -d relay-server
607
607
```
608
608
609
609
#### Launch Driver
@@ -639,7 +639,7 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
639
639
-**Enabling TLS**:
640
640
- You can make your driver accept TLS connections by specifying `DRIVER_TLS` as `true` and specifying a TLS certificate file path and private key file path in `DRIVER_TLS_CERT_PATH` and `DRIVER_TLS_KEY_PATH` respectively. The same certificate should be specified in this driver's definition in the `drivers` section in the `config.toml` file of your relay in the `tlsca_cert_path` property (see the earlier section on relay configuration).
641
641
- To communicate with your network' relay using TLS (i.e., if the relay is TLS-enabled), specify that relay's TLS CA certificate path in `RELAY_TLSCA_CERT_PATH` (currently only one certificate can be configured) and set `RELAY_TLS` to `true`. This CA certificate should match the one specified in the `cert_path` property in the relay's `config.toml` file (see the earlier section on relay configuration):
642
-
- You can point to the folder in your host system containing the certificate and key using the `TLS_CREDENTIALS_DIR` variable. (This folder will be synced to the `/fabric-driver/credentials` folder in the Fabric Driver container as specified in the [docker-compose file](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/drivers/fabric-driver/docker-compose.yml).) Make sure you point to the right certificate and key file paths within the container using the `DRIVER_TLS_CERT_PATH`, `DRIVER_TLS_KEY_PATH`, and `RELAY_TLSCA_CERT_PATH` variables.
642
+
- You can point to the folder in your host system containing the certificate and key using the `TLS_CREDENTIALS_DIR` variable. (This folder will be synced to the `/fabric-driver/credentials` folder in the Fabric Driver container as specified in the [dockercompose file](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/drivers/fabric-driver/docker-compose.yml).) Make sure you point to the right certificate and key file paths within the container using the `DRIVER_TLS_CERT_PATH`, `DRIVER_TLS_KEY_PATH`, and `RELAY_TLSCA_CERT_PATH` variables.
643
643
644
644
-`config.json`: This contains settings used to connect to a CA of a Fabric network organization and enroll a client. A sample is given below:
645
645
```json
@@ -661,7 +661,7 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
661
661
- As in the `.env` configuration, you should pick an organization for the driver to associate with. The `admin` section specifies the registrar name and password (this should be familiar to any Fabric network administrator) used to enroll clients. Default values of `admin` and `adminpw` are specified above as examples, which you should replace with the right values configured in your network organization's CA.
662
662
-`<affiliation>` should be what's specified in your organization's Fabric CA server configuration. The default is `org1.department1`, but you should look up the appropriate value from the CA server's configuration file.
663
663
-`<msp-id>` should be set to the (or an) MSP ID of the selected organization.
664
-
-`<ca-service-endpoint>` should be set to the CA server's endpoint. If you launched your CA server as a container from a docker-compose file, this should be set to the container's service name.
664
+
-`<ca-service-endpoint>` should be set to the CA server's endpoint. If you launched your CA server as a container from a dockercompose file, this should be set to the container's service name.
665
665
666
666
| Notes |
667
667
|:------|
@@ -671,7 +671,7 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
671
671
672
672
To start the driver, navigate to the folder containing the above files and run the following:
673
673
```bash
674
-
docker-compose up -d
674
+
dockercompose up -d
675
675
```
676
676
677
677
#### Launch IIN Agents
@@ -778,13 +778,13 @@ Weaver provides a [pre-built image](https://github.com/hyperledger-labs/weaver-d
778
778
-`EXTERNAL_NETWORK`: Set to the network [name](https://docs.docker.com/compose/networking/) of your Fabric network.
779
779
-**Enabling TLS**:
780
780
- Make your IIN Agent accept TLS connections by specifying `IIN_AGENT_TLS` as `true` and specifying a TLS certificate file path and private key file path in `IIN_AGENT_TLS_CERT_PATH` and `IIN_AGENT_TLS_KEY_PATH` respectively. The same certificate should be specified in this agent's JSON object in another agent's `dnsconfig.json` file under the appropriate security domain and IIN Agent ID scope.
781
-
- You can point to the folder in your host system containing the certificate and key using the `TLS_CREDENTIALS_DIR` variable. (This folder will be synced to the `/opt/iinagent/credentials` folder in the IIN Agent container as specified in the [docker-compose file](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/identity-management/iin-agent/docker-compose.yml).) Make sure you point to the right certificate and key file paths within the container using the `IIN_AGENT_TLS_CERT_PATH` and `IIN_AGENT_TLS_KEY_PATH` variables respectively.
781
+
- You can point to the folder in your host system containing the certificate and key using the `TLS_CREDENTIALS_DIR` variable. (This folder will be synced to the `/opt/iinagent/credentials` folder in the IIN Agent container as specified in the [dockercompose file](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/identity-management/iin-agent/docker-compose.yml).) Make sure you point to the right certificate and key file paths within the container using the `IIN_AGENT_TLS_CERT_PATH` and `IIN_AGENT_TLS_KEY_PATH` variables respectively.
782
782
783
783
-`docker-compose.yaml`: This specifies the properties of the IIN agent container. You can use the [file in the repository](https://github.com/hyperledger-labs/weaver-dlt-interoperability/blob/main/core/identity-management/iin-agent/docker-compose.yml) verbatim.
784
784
785
785
Now to start the IIN agent, navigate to the folder containing the above files and run the following:
786
786
```bash
787
-
docker-compose up -d
787
+
dockercompose up -d
788
788
```
789
789
790
790
Repeat the above steps to launch an IIN Agent for every other organization on your channnel, i.e., create similar configuration files in an organization-specific folder. Make sure you:
0 commit comments