登录
注册
开源
企业版
高校版
搜索
帮助中心
使用条款
关于我们
开源
企业版
高校版
私有云
Gitee AI
NEW
我知道了
查看详情
登录
注册
代码拉取完成,页面将自动刷新
捐赠
捐赠前请先登录
取消
前往登录
扫描微信二维码支付
取消
支付完成
支付提示
将跳转至支付宝完成支付
确定
取消
Watch
不关注
关注所有动态
仅关注版本发行动态
关注但不提醒动态
1
Star
1
Fork
0
greatesoft
/
fabric-ca
代码
Issues
0
Pull Requests
0
Wiki
统计
流水线
服务
Gitee Pages
JavaDoc
PHPDoc
质量分析
Jenkins for Gitee
腾讯云托管
腾讯云 Serverless
悬镜安全
阿里云 SAE
Codeblitz
我知道了,不再自动展开
标签
标签名
描述
提交信息
操作
v1.4.9
44fffab
2020-10-01 02:49
下载
v1.4.8
7653f06
2020-07-31 06:49
下载
v1.4.7
1960b3f
2020-05-15 01:39
下载
v1.4.6
8d3a701
2020-02-26 05:32
下载
v1.4.5
3d18b03
2020-02-20 02:59
下载
v1.4.4
76f807c
2019-11-16 00:27
下载
v1.4.3
v1.4.3 Release Notes - August 26, 2019 -------------------------------------- What's New in Hyperledger Fabric CA v1.4.3 ------------------------------------------ No new features. Important Fixes --------------- None. Changes, Known Issues, and Workarounds -------------------------------------- Go MySQL driver updated to version 2019-05-10T10:23:35Z. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v143
4af7a27
2019-08-27 05:19
下载
v1.4.2
v1.4.2 Release Notes - July 17, 2019 ------------------------------------ What's New in Hyperledger Fabric CA v1.4.2 ------------------------------------------ No new features. Important Fixes --------------- FABC-848 create table fails using Postgres with tls Prior to the fix, when using Fabric CA with tls configured for Postres database, the creation of the required tables fails upon initial Fabric CA start. FABC-837 Fabric CA panics when setup for multiple CAs Prior to the fix, Fabric CA would panic upon start if configured for multiple CAs (using --cafiles) and metric gathering. Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v142
9321ffb
2019-07-18 02:56
下载
v1.4.1
v1.4.1 Release Notes - April 11, 2019 ------------------------------------- What's New in Hyperledger Fabric CA v1.4.1 ------------------------------------------ FABC-408 Add support for CORS CORS can be enabled in Fabric CA server using new server flags: --cors.enabled Enable CORS for the fabric-ca-server --cors.origins Comma-separated list of Access-Control-Allow-Origin domains FABC-782 Fabric CA API operational metrics FABC-789 Fabric CA database operations metrics FABC-743 Fabric CA health check Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.11.15 Updated baseimage version to 0.4.15 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v141
3384a38
2019-04-11 23:08
下载
v2.0.0-alpha
v2.0.0-alpha Release Notes - April 9, 2019 ------------------------------------------ What's New in Hyperledger Fabric CA v2.0 ---------------------------------------- FABC-408 Add support for CORS CORS can be enabled in Fabric CA server using new server flags: --cors.enabled Enable CORS for the fabric-ca-server --cors.origins Comma-separated list of Access-Control-Allow-Origin domains FABC-735 - Docker images with Alpine Linux Hyperledger Fabric CA Docker image will now use Alpine Linux, a security-oriented, lightweight Linux distribution. FABC-782 Fabric CA API operational metrics FABC-789 Fabric CA database operations metrics FABC-743 Fabric CA health check Changes, Known Issues, and Workarounds -------------------------------------- FAB-11096 - Docker images with Alpine Linux Bash is no longer available in Fabric images. Utilize Alpine's built-in sh or ash instead. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.11.5 Updated baseimage version to 0.4.15 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v200-alpha
4db6520
2019-04-10 03:51
下载
v1.4.0
v1.4.0 Release Notes - January 9th, 2019 ---------------------------------------- What's New in Hyperledger Fabric CA v1.4 ---------------------------------------- No new features in Fabric CA v1.4. v1.4 is a maintenance release only, with bug fixes, dependency updates, test improvements. Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.11.1 Updated baseimage version to 0.4.14 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/release-1.4/CHANGELOG.md#v140
27fbd69
2019-01-09 01:30
下载
v1.4.0-rc2
v1.4.0-rc2 Release Notes - December 20, 2018 -------------------------------------------- What's New in Hyperledger Fabric CA v1.4 ---------------------------------------- No new features in Fabric CA v1.4. v1.4 is a maintenance release only, with bug fixes, dependency updates, test improvements. Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.11.1 Updated baseimage version to 0.4.14 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v140-rc2
6d9eaea
2018-12-20 22:15
下载
v1.4.0-rc1
v1.4.0-rc1 Release Notes - December 10, 2018 -------------------------------------------- What's New in Hyperledger Fabric CA v1.4 ---------------------------------------- No new features in Fabric CA v1.4. v1.4 is a maintenance release only, with bug fixes, dependency updates, test improvements. Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- FABC-174 Commands can be manipulated to delete identities or affiliations This vulnerability can be resolved in one of two ways: 1) Use HTTPS (TLS) so that the authorization header is not in clear text. 2) The token generation/authentication mechanism was improved to optionally prevent token reuse. In v1.4 a more secure token can be used by setting environment variable: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false However, it cannot be set to false until all clients have been updated to generate the more secure token and tolerate FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false. The Fabric CA client has been updated in v1.4 to generate the more secure token. The Fabric SDKs will be updated by v2.0 timeframe to generate the more secure token, at which time the default for Fabric CA server will change to: FABRIC_CA_SERVER_COMPATIBILITY_MODE_V1_3=false Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.11.1 Updated baseimage version to 0.4.14 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v140-rc1
ef74d7e
2018-12-11 11:15
下载
v1.3.0
v1.3.0 Release Notes - October 10, 2018 --------------------------------------- What's New in Hyperledger Fabric CA v1.3 ---------------------------------------- The following features/epics are included in this release: FABC-592 - Identity Mixer for anonymous transactions Fabric-CA can now issue Identity Mixer credentials to enable anonymous and unlinkable client identities through the use of zero-knowledge proofs. Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- None. Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.10.4 Updated baseimage version to 0.4.13 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v130
8b93ae0
2018-10-10 15:59
下载
v1.2.1
v1.2.1 September 27, 2018 ------------------- Release Notes ------------- Update vendored version of BCCSP package. Known Vulnerabilities --------------------- none Resolved Vulnerabilities ------------------------ none Known Issues & Workarounds -------------------------- none Change Log ---------- https://github.com/hyperledger/fabric-ca/blob/release-1.2/CHANGELOG.md#v121
6d37cf3
2018-09-28 03:22
下载
v1.3.0-rc1
v1.3.0-rc1 Release Notes - September 24, 2018 --------------------------------------------- What's New in Hyperledger Fabric CA v1.3 ---------------------------------------- The following features/epics are included in this release: FABC-592 - Identity Mixer for anonymous transactions Fabric-CA can now issue Identity Mixer credentials to enable anonymous and unlinkable client identities through the use of zero-knowledge proofs. Changes, Known Issues, and Workarounds -------------------------------------- None. Known Vulnerabilities --------------------- None. Resolved Vulnerabilities ------------------------ None. Other improvements and fixes ---------------------------- Updated to Go version 1.10.4 Updated baseimage version to 0.4.12 For the full list of improvements and fixes, refer to the release change log: https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v130-rc1
edb0015
2018-09-25 07:31
下载
v1.2.0
v1.2.0 July 3, 2018 ------------------- Release Notes ------------- Added support for listing certificates based on various filter criteria. Bug fixes, documentation and test coverage improvements, UX improvements based on user feedback and changes to address a variety of static scan findings (unused code, static security scanning, spelling, linting and more). Updated to Go version 1.10 Updated baseimage version to 0.4.10 Known Vulnerabilities --------------------- [FAB-9938] many commands can be manipulated to delete identities or affiliations This vulnerability has a low severity because to exploit it, one would need to access the authorization header of the requests. Using HTTPS (TLS) eliminates this potential. We will be re-evaluating the authorization approach for the v1.3 release. Resolved Vulnerabilities ------------------------ https://jira.hyperledger.org/browse/FAB-7534 Known Issues & Workarounds -------------------------- none Change Log ---------- https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v120
3bcdbb2
2018-07-04 03:43
下载
v1.2.0-rc1
v1.2.0-rc1 June 22, 2018 ------------------------ Release Notes ------------- Added support for listing certificates based on various filter criteria. Bug fixes, documentation and test coverage improvements, UX improvements based on user feedback and changes to address a variety of static scan findings (unused code, static security scanning, spelling, linting and more). Updated to Go version 1.10 Updated baseimage version to 0.4.8 Known Vulnerabilities --------------------- [FAB-9938] many commands can be manipulated to delete identities or affiliations This vulnerability has a low severity because to exploit it, one would need to access the authorization header of the requests. Using HTTPS (TLS) eliminates this potential. We will be re-evaluating the authorization approach for the v1.3 release. Resolved Vulnerabilities ------------------------ https://jira.hyperledger.org/browse/FAB-7534 Known Issues & Workarounds -------------------------- none Change Log ---------- https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v120-rc1
f8d7544
2018-06-22 05:48
下载
v1.1.0
v1.1.0 March 15, 2018 --------------------- Release Notes ------------- Added support for CRLs and attribute based access control. Added support for dynamic configurtion of the fabric-ca-server without requiring restart. Added capability to dynamically modify affiliations. Bug fixes, documentation and test coverage improvements, UX improvements based on user feedback and changes to address a variety of static scan findings (unused code, static security scanning, spelling, linting and more). Updated to Go version 1.9.2 Updated baseimage version to 0.4.6 Known Vulnerabilities --------------------- none Resolved Vulnerabilities ------------------------ https://jira.hyperledger.org/browse/FAB-5794 https://jira.hyperledger.org/browse/FAB-6871 https://jira.hyperledger.org/browse/FAB-7348 https://jira.hyperledger.org/browse/FAB-7465 https://jira.hyperledger.org/browse/FAB-7646 Known Issues & Workarounds -------------------------- none Change Log ---------- https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v110
f69f53b
2018-03-16 01:51
下载
v1.1.0-rc1
v1.1.0-rc1 March 1, 2018 ----------------------------- Release Notes ------------- Added capability to dynamically modify affiliations. Bug fixes, documentation and test coverage improvements, UX improvements based on user feedback and changes to address a variety of static scan findings (unused code, static security scanning, spelling, linting and more). Updated to Go version 1.9.2 Updated baseimage version to 0.4.6 Known Vulnerabilities --------------------- none Resolved Vulnerabilities ------------------------ none Known Issues & Workarounds -------------------------- none Change Log ---------- https://github.com/hyperledger/fabric-ca/blob/master/CHANGELOG.md#v110-rc1
0e48904
2018-03-02 02:19
下载
下载
请输入验证码,防止盗链导致资源被占用
取消
下载
1
https://gitee.com/greatesoft/fabric-ca.git
[email protected]
:greatesoft/fabric-ca.git
greatesoft
fabric-ca
fabric-ca
点此查找更多帮助
搜索帮助
Git 命令在线学习
如何在 Gitee 导入 GitHub 仓库
Git 仓库基础操作
企业版和社区版功能对比
SSH 公钥设置
如何处理代码冲突
仓库体积过大,如何减小?
如何找回被删除的仓库数据
Gitee 产品配额说明
GitHub仓库快速导入Gitee及同步更新
什么是 Release(发行版)
将 PHP 项目自动发布到 packagist.org
评论
仓库举报
回到顶部
登录提示
该操作需登录 Gitee 帐号,请先登录后再操作。
立即登录
没有帐号,去注册