Documentation ¶
Overview ¶
Package msp is a generated protocol buffer package.
It is generated from these files:
msp/mspconfig.proto
It has these top-level messages:
MSPConfig FabricMSPConfig SigningIdentityInfo KeyInfo FabricOUIdentifier
Index ¶
- type FabricMSPConfig
- func (*FabricMSPConfig) Descriptor() ([]byte, []int)
- func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier
- func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo
- func (*FabricMSPConfig) ProtoMessage()
- func (m *FabricMSPConfig) Reset()
- func (m *FabricMSPConfig) String() string
- type FabricOUIdentifier
- type KeyInfo
- type MSPConfig
- type SigningIdentityInfo
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type FabricMSPConfig ¶
type FabricMSPConfig struct { // Name holds the identifier of the MSP; MSP identifier // is chosen by the application that governs this MSP. // For example, and assuming the default implementation of MSP, // that is X.509-based and considers a single Issuer, // this can refer to the Subject OU field or the Issuer OU field. Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"` // List of root certificates trusted by this MSP // they are used upon certificate validation (see // comment for IntermediateCerts below) RootCerts [][]byte `protobuf:"bytes,2,rep,name=root_certs,json=rootCerts,proto3" json:"root_certs,omitempty"` // List of intermediate certificates trusted by this MSP; // they are used upon certificate validation as follows: // validation attempts to build a path from the certificate // to be validated (which is at one end of the path) and // one of the certs in the RootCerts field (which is at // the other end of the path). If the path is longer than // 2, certificates in the middle are searched within the // IntermediateCerts pool IntermediateCerts [][]byte `protobuf:"bytes,3,rep,name=intermediate_certs,json=intermediateCerts,proto3" json:"intermediate_certs,omitempty"` // Identity denoting the administrator of this MSP Admins [][]byte `protobuf:"bytes,4,rep,name=admins,proto3" json:"admins,omitempty"` // Identity revocation list RevocationList [][]byte `protobuf:"bytes,5,rep,name=revocation_list,json=revocationList,proto3" json:"revocation_list,omitempty"` // SigningIdentity holds information on the signing identity // this peer is to use, and which is to be imported by the // MSP defined before SigningIdentity *SigningIdentityInfo `protobuf:"bytes,6,opt,name=signing_identity,json=signingIdentity" json:"signing_identity,omitempty"` // OrganizationalUnitIdentifiers holds one or more // fabric organizational unit identifiers that belong to // this MSP configuration OrganizationalUnitIdentifiers []*FabricOUIdentifier `` /* 143-byte string literal not displayed */ }
FabricMSPConfig collects all the configuration information for a Fabric MSP. Here we assume a default certificate validation policy, where any certificate signed by any of the listed rootCA certs would be considered as valid under this MSP. This MSP may or may not come with a signing identity. If it does, it can also issue signing identities. If it does not, it can only be used to validate and verify certificates.
func (*FabricMSPConfig) Descriptor ¶
func (*FabricMSPConfig) Descriptor() ([]byte, []int)
func (*FabricMSPConfig) GetOrganizationalUnitIdentifiers ¶
func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier
func (*FabricMSPConfig) GetSigningIdentity ¶
func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo
func (*FabricMSPConfig) ProtoMessage ¶
func (*FabricMSPConfig) ProtoMessage()
func (*FabricMSPConfig) Reset ¶
func (m *FabricMSPConfig) Reset()
func (*FabricMSPConfig) String ¶
func (m *FabricMSPConfig) String() string
type FabricOUIdentifier ¶
type FabricOUIdentifier struct { // CertifiersIdentifier is the hash of certificates chain of trust // related to this organizational unit CertifiersIdentifier []byte `protobuf:"bytes,1,opt,name=certifiers_identifier,json=certifiersIdentifier,proto3" json:"certifiers_identifier,omitempty"` // OrganizationUnitIdentifier defines the organizational unit under the // MSP identified with MSPIdentifier OrganizationalUnitIdentifier string `` /* 140-byte string literal not displayed */ }
FabricOUIdentifier represents an organizazional unit and its related chain of trust identifier.
func (*FabricOUIdentifier) Descriptor ¶
func (*FabricOUIdentifier) Descriptor() ([]byte, []int)
func (*FabricOUIdentifier) ProtoMessage ¶
func (*FabricOUIdentifier) ProtoMessage()
func (*FabricOUIdentifier) Reset ¶
func (m *FabricOUIdentifier) Reset()
func (*FabricOUIdentifier) String ¶
func (m *FabricOUIdentifier) String() string
type KeyInfo ¶
type KeyInfo struct { // Identifier of the key inside the default keystore; this for // the case of Software BCCSP as well as the HSM BCCSP would be // the SKI of the key KeyIdentifier string `protobuf:"bytes,1,opt,name=key_identifier,json=keyIdentifier" json:"key_identifier,omitempty"` // KeyMaterial (optional) for the key to be imported; this is // properly encoded key bytes, prefixed by the type of the key KeyMaterial []byte `protobuf:"bytes,2,opt,name=key_material,json=keyMaterial,proto3" json:"key_material,omitempty"` }
KeyInfo represents a (secret) key that is either already stored in the bccsp/keystore or key material to be imported to the bccsp key-store. In later versions it may contain also a keystore identifier
type MSPConfig ¶
type MSPConfig struct { // Type holds the type of the MSP; the default one would // be of type FABRIC implementing an X.509 based provider Type int32 `protobuf:"varint,1,opt,name=type" json:"type,omitempty"` // Config is MSP dependent configuration info Config []byte `protobuf:"bytes,2,opt,name=config,proto3" json:"config,omitempty"` }
MSPConfig collects all the configuration information for an MSP. The Config field should be unmarshalled in a way that depends on the Type
type SigningIdentityInfo ¶
type SigningIdentityInfo struct { // PublicSigner carries the public information of the signing // identity. For an X.509 provider this would be represented by // an X.509 certificate PublicSigner []byte `protobuf:"bytes,1,opt,name=public_signer,json=publicSigner,proto3" json:"public_signer,omitempty"` // PrivateSigner denotes a reference to the private key of the // peer's signing identity PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=private_signer,json=privateSigner" json:"private_signer,omitempty"` }
SigningIdentityInfo represents the configuration information related to the signing identity the peer is to use for generating endorsements
func (*SigningIdentityInfo) Descriptor ¶
func (*SigningIdentityInfo) Descriptor() ([]byte, []int)
func (*SigningIdentityInfo) GetPrivateSigner ¶
func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo
func (*SigningIdentityInfo) ProtoMessage ¶
func (*SigningIdentityInfo) ProtoMessage()
func (*SigningIdentityInfo) Reset ¶
func (m *SigningIdentityInfo) Reset()
func (*SigningIdentityInfo) String ¶
func (m *SigningIdentityInfo) String() string