Skip to content

Commit 3657477

Browse files
committedOct 16, 2024·
Update Fabric docs - HSM not supported for TLS (#5030)
Update Fabric docs to indicate that HSM is not supported for TLS keys. Also update the error messages for missing TLS keys to indicate that the error is specific to TLS keys. This will assist with troubleshooting for users that attempt to configure TLS keys with an HSM. Signed-off-by: David Enyeart <enyeart@us.ibm.com> (cherry picked from commit b5a9798)

File tree

3 files changed

+10
-8
lines changed

3 files changed

+10
-8
lines changed
 

‎docs/source/hsm.md

+2
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,8 @@ multiple certified HSMs from which to choose.
99

1010
Fabric currently leverages the PKCS11 standard to communicate with an HSM.
1111

12+
**Note:** Fabric can use a HSM for peer and orderer node MSP identities as documented in this topic,
13+
however for TLS you must use file-based keys as documented in the [TLS topic](./enable_tls.html).
1214

1315
## Configuring an HSM
1416

‎orderer/common/server/main.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -603,19 +603,19 @@ func initializeServerConfig(conf *localconfig.TopLevel, metricsProvider metrics.
603603
// load crypto material from files
604604
serverCertificate, err := ioutil.ReadFile(conf.General.TLS.Certificate)
605605
if err != nil {
606-
logger.Fatalf("Failed to load server Certificate file '%s' (%s)",
606+
logger.Fatalf("Failed to load server TLS Certificate file '%s' (%s)",
607607
conf.General.TLS.Certificate, err)
608608
}
609609
serverKey, err := ioutil.ReadFile(conf.General.TLS.PrivateKey)
610610
if err != nil {
611-
logger.Fatalf("Failed to load PrivateKey file '%s' (%s)",
611+
logger.Fatalf("Failed to load TLS PrivateKey file '%s' (%s)",
612612
conf.General.TLS.PrivateKey, err)
613613
}
614614
var serverRootCAs, clientRootCAs [][]byte
615615
for _, serverRoot := range conf.General.TLS.RootCAs {
616616
root, err := ioutil.ReadFile(serverRoot)
617617
if err != nil {
618-
logger.Fatalf("Failed to load ServerRootCAs file '%s' (%s)",
618+
logger.Fatalf("Failed to load TLS ServerRootCAs file '%s' (%s)",
619619
err, serverRoot)
620620
}
621621
serverRootCAs = append(serverRootCAs, root)
@@ -624,7 +624,7 @@ func initializeServerConfig(conf *localconfig.TopLevel, metricsProvider metrics.
624624
for _, clientRoot := range conf.General.TLS.ClientRootCAs {
625625
root, err := ioutil.ReadFile(clientRoot)
626626
if err != nil {
627-
logger.Fatalf("Failed to load ClientRootCAs file '%s' (%s)",
627+
logger.Fatalf("Failed to load TLS ClientRootCAs file '%s' (%s)",
628628
err, clientRoot)
629629
}
630630
clientRootCAs = append(clientRootCAs, root)

‎orderer/common/server/main_test.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -205,31 +205,31 @@ func TestInitializeServerConfig(t *testing.T) {
205205
privateKey: goodFile,
206206
rootCA: goodFile,
207207
clientRootCert: goodFile,
208-
expectedPanic: "Failed to load server Certificate file 'does_not_exist' (open does_not_exist: no such file or directory)",
208+
expectedPanic: "Failed to load server TLS Certificate file 'does_not_exist' (open does_not_exist: no such file or directory)",
209209
},
210210
{
211211
name: "BadPrivateKey",
212212
certificate: goodFile,
213213
privateKey: badFile,
214214
rootCA: goodFile,
215215
clientRootCert: goodFile,
216-
expectedPanic: "Failed to load PrivateKey file 'does_not_exist' (open does_not_exist: no such file or directory)",
216+
expectedPanic: "Failed to load TLS PrivateKey file 'does_not_exist' (open does_not_exist: no such file or directory)",
217217
},
218218
{
219219
name: "BadRootCA",
220220
certificate: goodFile,
221221
privateKey: goodFile,
222222
rootCA: badFile,
223223
clientRootCert: goodFile,
224-
expectedPanic: "Failed to load ServerRootCAs file 'open does_not_exist: no such file or directory' (does_not_exist)",
224+
expectedPanic: "Failed to load TLS ServerRootCAs file 'open does_not_exist: no such file or directory' (does_not_exist)",
225225
},
226226
{
227227
name: "BadClientRootCertificate",
228228
certificate: goodFile,
229229
privateKey: goodFile,
230230
rootCA: goodFile,
231231
clientRootCert: badFile,
232-
expectedPanic: "Failed to load ClientRootCAs file 'open does_not_exist: no such file or directory' (does_not_exist)",
232+
expectedPanic: "Failed to load TLS ClientRootCAs file 'open does_not_exist: no such file or directory' (does_not_exist)",
233233
},
234234
{
235235
name: "BadCertificate - cluster reuses server config",

0 commit comments

Comments
 (0)
Please sign in to comment.