Transaction Signer options
Usage:
orchestrate tx-signer run [flags]
Flags:
--chain-registry-url string URL of the Chain Registry HTTP endpoint.
Environment variable: "CHAIN_REGISTRY_URL" (default "localhost:8081")
-h, --help help for run
--kafka-consumer-max-wait-time int Kafka consumer max wait time.
Environment variable: "KAFKA_CONSUMER_MAX_WAIT_TIME" in ms (default 20)
--kafka-group string Address of Kafka server to connect to.
Environment variable: "KAFKA_GROUP" (default "group-e2e")
--kafka-sasl-enabled Whether or not to use SASL authentication when connecting to the broker
Environment variable: "KAFKA_SASL_ENABLED"
--kafka-sasl-handshake Whether or not to send the Kafka SASL handshake first if enabled (defaults to true). You should only set this to false if you're using a non-Kafka SASL proxy.
Environment variable: "KAFKA_SASL_HANDSHAKE" (default true)
--kafka-sasl-mechanism string SASLMechanism is the name of the enabled SASL mechanism. Possible values: OAUTHBEARER, PLAIN (defaults to PLAIN).
Environment variable: "KAFKA_SASL_MECHANISM"
--kafka-sasl-password string Password for SASL/PLAIN or SASL/SCRAM auth.
Environment variable: "KAFKA_SASL_PASSWORD"
--kafka-sasl-scramauthzid string Authz id used for SASL/SCRAM authentication
Environment variable: "KAFKA_SASL_SCRAMAUTHZID"
--kafka-sasl-user string Username for SASL/PLAIN or SASL/SCRAM auth.
Environment variable: "KAFKA_SASL_USER"
--kafka-tls-ca-cert-file string CA cert file Path.
Environment variable: "KAFKA_TLS_CA_CERT_FILE"
--kafka-tls-client-cert-file string Client Cert File Path.
Environment variable: "KAFKA_TLS_CLIENT_CERT_FILE"
--kafka-tls-client-key-file string Client key file Path.
Environment variable: "KAFKA_TLS_CLIENT_KEY_FILE"
--kafka-tls-enabled Whether or not to use TLS when connecting to the broker (defaults to false).
Environment variable: "KAFKA_TLS_ENABLED"
--kafka-tls-insecure-skip-verify Controls whether a client verifies the server's certificate chain and host name. If InsecureSkipVerify is true, TLS accepts any certificate presented by the server and any host name in that certificate. In this mode, TLS is susceptible to man-in-the-middle attacks. This should be used only for testing.
Environment variable: "KAFKA_TLS_INSECURE_SKIP_VERIFY"
--kafka-url strings URL (addresses) of Kafka server(s) to connect to.
Environment variable: "KAFKA_URL" (default [localhost:9092])
--secret-pkey strings Private keys to pre-register in key store. Warning - Do not use in production.
Environment variable: "SECRET_PKEY"
--secret-store string Type of secret store for private keys (one of "in-memory" "hashicorp")
Environment variable: "SECRET_STORE" (default "in-memory")
--topic-account-generated string Kafka topic for newly generated accounts
Environment variable: "TOPIC_ACCOUNT_GENERATED" (default "topic-account-generated")
--topic-account-generator string Kafka topic for generating new accounts
Environment variable: "TOPIC_ACCOUNT_GENERATOR" (default "topic-account-generator")
--topic-tx-recover string Kafka topic for envelopes waiting for their transaction recovered
Environment variable: "TOPIC_TX_RECOVER" (default "topic-tx-recover")
--topic-tx-sender string Kafka topic for envelopes waiting for their transaction sent
Environment variable: "TOPIC_TX_SENDER" (default "topic-tx-sender")
--topic-tx-signer string Kafka topic for envelopes waiting for their transaction signed
Environment variable: "TOPIC_TX_SIGNER" (default "topic-tx-signer")
--transaction-scheduler-url string URL of the Transaction Scheduler HTTP endpoint.
Environment variable: "TRANSACTION_SCHEDULER_URL" (default "localhost:8081")
--vault-addr string Hashicorp URL of the remote hashicorp vault
Environment variable: "VAULT_ADDR" (default "https://127.0.0.1:8200")
--vault-burst-limit int Hashicorp query burst limit
Environment variable: "VAULT_RATE_LIMIT"
--vault-cacert string Hashicorp CA certificate
Environment variable: "VAULT_CACERT"
--vault-capath string Path toward the CA certificate
Environment variable: "VAULT_CAPATH"
--vault-client-cert string Certificate of the client
Environment variable: "VAULT_CLIENT_CERT"
--vault-client-key string Hashicorp client key
Environment variable: "VAULT_CLIENT_KEY"
--vault-client-timeout duration Hashicorp clean timeout of the client
Environment variable: "VAULT_CLIENT_TIMEOUT" (default 1m0s)
--vault-kv-version string Determine which version of the kv secret engine we will be using
Can be "v1" or "v2".
Environment variable: "VAULT_KV_VERSION" (default "v2")
--vault-max-retries int Hashicorp max retry for a request
Environment variable: "VAULT_MAX_RETRIES"
--vault-mount-point string Specifies the mount point used. Should not start with a //
Environment variable: "VAULT_MOUNT_POINT" (default "secret")
--vault-rate-limit float Hashicorp query rate limit
Environment variable: "VAULT_RATE_LIMIT"
--vault-secret-path string Hashicorp secret path
Environment variable: "VAULT_SECRET_PATH" (default "default")
--vault-skip-verify Hashicorp skip verification
Environment variable: "VAULT_SKIP_VERIFY"
--vault-tls-server-name string Hashicorp TLS server name
Environment variable: "VAULT_TLS_SERVER_NAME"
--vault-token-file string Specifies the token file path.
Parameter ignored if the token has been passed by VAULT_TOKEN
Environment variable: "VAULT_TOKEN_FILE" (default "/vault/token/.vault-token")
Command line arguments take precedence over environment variables.