Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.
common.rmdir(options.kvs_path); //delete it
logger.error('[fcw] MSP in KVS mismatch. KVS has been deleted. Restart the app to try again.');
process.exit(); //this is terrible, but can't seem to reset client._userContext
} else {
logger.info('[fcw] Successfully loaded enrollment from persistence'); //load from KVS if we can
return user;
}
} else {
// Need to enroll it with the CA
var tlsOptions = {
trustedRoots: [options.ca_tls_opts.pem], //pem cert required
verify: false
};
var ca_client = new CaService(options.ca_url, tlsOptions, options.ca_name); //ca_name is important for the IBM Cloud service
member = new User(options.enroll_id);
logger.debug('enroll id: "' + options.enroll_id + '", secret: "' + options.enroll_secret + '"');
logger.debug('msp_id: ', options.msp_id, 'ca_name:', options.ca_name);
// --- Lets Do It --- //
return ca_client.enroll({
enrollmentID: options.enroll_id,
enrollmentSecret: options.enroll_secret
}).then((enrollment) => {
// Store Certs
logger.info('[fcw] Successfully enrolled user \'' + options.enroll_id + '\'');
return member.setEnrollment(enrollment.key, enrollment.certificate, options.msp_id);
}).then(() => {
return new Promise((resolve, reject) => {
if (user && user.isEnrolled()) {
return resolve(user);
}
var member = new User(username);
var cryptoSuite = client.getCryptoSuite();
if (!cryptoSuite) {
cryptoSuite = Client.newCryptoSuite();
if (userOrg) {
cryptoSuite.setCryptoKeyStore(Client.newCryptoKeyStore({path: module.exports.storePathForOrg(ORGS[userOrg].name)}));
client.setCryptoSuite(cryptoSuite);
}
}
member.setCryptoSuite(cryptoSuite);
// need to enroll it with CA server
var cop = new copService(caUrl, tlsOptions, ORGS[userOrg].ca.name, cryptoSuite);
return cop.enroll({
enrollmentID: username,
enrollmentSecret: password
async function getMember(username, password, client, userOrg) {
const caUrl = ORGS[userOrg].ca.url;
let user = await client.getUserContext(username, true);
if (user && user.isEnrolled()) {
return user;
}
const member = new User(username);
let cryptoSuite = client.getCryptoSuite();
if (!cryptoSuite) {
cryptoSuite = Client.newCryptoSuite();
if (userOrg) {
cryptoSuite.setCryptoKeyStore(Client.newCryptoKeyStore({path: module.exports.storePathForOrg(ORGS[userOrg].name)}));
client.setCryptoSuite(cryptoSuite);
}
}
member.setCryptoSuite(cryptoSuite);
// need to enroll it with CA server
const cop = new copService(caUrl, tlsOptions, ORGS[userOrg].ca.name, cryptoSuite);
try {
let enrollment = await cop.enroll({
enrollmentID: username,
async function getMember(username, password, client, userOrg) {
const caUrl = ORGS[userOrg].ca.url;
let user = await client.getUserContext(username, true);
if (user && user.isEnrolled()) {
return user;
}
const member = new User(username);
let cryptoSuite = client.getCryptoSuite();
if (!cryptoSuite) {
cryptoSuite = Client.newCryptoSuite();
if (userOrg) {
cryptoSuite.setCryptoKeyStore(Client.newCryptoKeyStore({path: module.exports.storePathForOrg(ORGS[userOrg].name)}));
client.setCryptoSuite(cryptoSuite);
}
}
member.setCryptoSuite(cryptoSuite);
// need to enroll it with CA server
const cop = new copService(caUrl, tlsOptions, ORGS[userOrg].ca.name, cryptoSuite);
try {
let enrollment = await cop.enroll({
enrollmentID: username,
test('\n\n ** User - constructor set get tests **\n\n', async (t) => {
testutil.resetDefaults();
utils.setConfigSetting('crypto-hsm', false);
const member1 = new User(memberName);
if (member1.getName() === memberName) {
t.pass('User constructor set get tests 1: new User getName was successful');
} else {
t.fail('User constructor set get tests 1: new User getName was not successful');
}
member1.setRoles(roles);
if (member1.getRoles() &&
member1.getRoles().indexOf('admin') > -1 &&
member1.getRoles().indexOf('user') > -1) {
t.pass('User constructor set get tests 1: setRoles getRoles was successful');
} else {
t.fail('User constructor set get tests 1: setRoles getRoles was not successful');
}
try {
}).then((enrollment) => {
console.log('Successfully enrolled user \'' + username + '\'');
member = new User(username, client);
return member.setEnrollment(enrollment.key, enrollment.certificate, mspid);
}).then(() => {
return client.setUserContext(member);
}).then((pubKey) => {
fs.removeSync(path.join(CryptoSuite_ECDSA_AES.getDefaultKeyStorePath(), '0e67f7fa577fd76e487ea3b660e1a3ff15320dbc95e396d8b0ff616c87f8c81a-priv'));
var poorUser = new User('admin2', _client);
poorUser.fromString(JSON.stringify(TEST_USER_ENROLLMENT))
.then(() => {
t.fail('Failed to catch missing private key expected from a user enrollment object');
}).catch((err) => {
t.pass('Successfully caught missing private key expected from a user enrollment object');
});
});
}).then((enrollment) => {
logger.info('Successfully enrolled user \'' + username + '\'');
member = new User(username);
member.setCryptoSuite(client.getCryptoSuite());
return member.setEnrollment(enrollment.key, enrollment.certificate, getMspID(userOrg));
}).then(() => {
return client.setUserContext(member);
build: (username, { key, certificate }, MSPID) => {
const user = new User(username)
return user.setEnrollment(key, certificate, MSPID).then(() => user)
},
register: (caService, { username, affiliation }, adminUser) =>
}).then((enrollment) => {
logger.info('Successfully enrolled user \'' + username + '\'');
member = new User(username);
member.setCryptoSuite(client.getCryptoSuite());
return member.setEnrollment(enrollment.key, enrollment.certificate, getMspID(userOrg));
}).then(() => {
return client.setUserContext(member);