You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -52,24 +50,35 @@ Revoked NOC root certificates can be re-added using the `ADD_NOC_X509_ROOT_CERTI
52
50
- Parameters:
53
51
- subject: `string` - Base64 encoded subject DER sequence bytes of the certificate.
54
52
- subject_key_id: `string` - Certificate's `Subject Key Id` in hex string format, e.g., `5A:88:0E:6C:36:53:D0:7F:B0:89:71:A3:F4:73:79:09:30:E6:2B:DB`.
53
+
- serial_number: `optional(string)` - Certificate's serial number. If not provided, the transaction will revoke all certificates that match the given `subject` and `subject_key_id` combination.
54
+
- info: `optional(string)` - Information/notes for the revocation.
55
+
- time: `optional(int64)` - Revocation time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
56
+
- revokeChild: `optional(bool)` - If true, then all certificates in the chain signed by the revoked certificate (intermediate, leaf) are revoked as well. If false, only the current root cert is revoked (default: false).
This transaction completely removes a NOC root certificate owned by the Vendor.
62
65
Removed NOC root certificates can be re-added using the `ADD_NOC_X509_ROOT_CERTIFICATE` transaction.
63
66
67
+
Revoked certificates that match the specified parameters will also be removed.
68
+
69
+
The certificates in the chain signed by the removed certificate (intermediate, leaf) will not be removed.
70
+
64
71
- Who can send: Vendor account
65
72
- Vid field associated with the corresponding NOC root certificate on the ledger must be equal to the Vendor account's VID.
66
73
- Validation:
67
74
- A NOC root certificate with the provided `subject` and `subject_key_id` must exist in the ledger.
68
75
- Parameters:
69
76
- subject: `string` - Base64 encoded subject DER sequence bytes of the certificate.
70
77
- subject_key_id: `string` - Certificate's `Subject Key Id` in hex string format, e.g., `5A:88:0E:6C:36:53:D0:7F:B0:89:71:A3:F4:73:79:09:30:E6:2B:DB`.
78
+
- serial_number: `optional(string)` - Certificate's serial number. If not provided, the transaction will remove all certificates that match the given `subject` and `subject_key_id` combination.
79
+
- info: `optional(string)` - Information/notes for the removal.
@@ -97,14 +106,18 @@ Retrieve a list of all of NOC root certificates
97
106
- Parameters:
98
107
- Common pagination parameters
99
108
- CLI Command:
100
-
- `dcld query pki get_all_noc_x509_root_certs
109
+
-`dcld query pki get_all_noc_x509_root_certs`
101
110
- REST API:
102
111
- GET `/dcl/pki/noc-root-certificates`
103
112
104
-
## Questions
105
-
- Should a vendor be able to add multiple NOC root certificates with the same Subject and Subject Key Identifier combinations? If so, the vendor may want to remove a specific certificate from the list of certificates with the same Subject and Subject Key Identifier combinations.
106
-
- Should the VID parameter be added to the `ADD_NOC_X509_ROOT_CERTIFICATE` transaction?
107
-
- How should NOC root certificate be renewed with a new one?
108
-
- Should the `REMOVE_NOC_X509_ROOT_CERTIFICATE` transaction also delete revoked certificates?
109
-
- Should a user be able to retrieve all revoked NOC root certificates using the `GET_ALL_REVOKED_X509_NOC_ROOT_CERTS` transaction?
110
-
- In the `Joint Fabric Proposal` document, the concept of a `Trust Quotient (TQ)` is introduced as a future consideration. This concept requires adding `Add Trust` and `Revoke Trust` requests for NOCs in the DCL. Should the implementation of these requests be included in the scope of the current task?
0 commit comments