Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

BE-757 Disable CA server support #121

Merged
merged 1 commit into from
Jun 22, 2020

Conversation

nekia
Copy link
Contributor

@nekia nekia commented Jun 21, 2020

When enabling CA server in network profile, admin certificate is retrieved from CA server instead of using the certificate specified in the network profile. But the certificate retrieved from CA server does not have admin priviledge so explorer running under the certificate fails to query chaincode on the network. Because the query to the installed chaincode is required admin policy by default. Our CA server support has been incomplete yet, so we'll disable this functionality temporarily.

https://jira.hyperledger.org/browse/BE-757

Signed-off-by: Atsushi Neki atsushin@fast.au.fujitsu.com

Signed-off-by: Atsushi Neki <atsushin@fast.au.fujitsu.com>
@sonarcloud
Copy link

sonarcloud bot commented Jun 21, 2020

Kudos, SonarCloud Quality Gate passed!

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities (and Security Hotspot 0 Security Hotspots to review)
Code Smell A 0 Code Smells

No Coverage information No Coverage information
No Duplication information No Duplication information

@JeevaSang JeevaSang merged commit 2404718 into hyperledger-labs:master Jun 22, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants