msp

package
v1.0.0-preview Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Jan 31, 2017 License: Apache-2.0 Imports: 3 Imported by: 0

Documentation

Overview

Package msp is a generated protocol buffer package.

It is generated from these files:

msp/mspconfig.proto

It has these top-level messages:

MSPConfig
FabricMSPConfig
SigningIdentityInfo
KeyInfo

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type FabricMSPConfig

type FabricMSPConfig struct {
	// Name holds the identifier of the MSP; MSP identifier
	// is chosen by the application that governs this MSP.
	// For example, and assuming the default implementation of MSP,
	// that is X.509-based and considers a single Issuer,
	// this can refer to the Subject OU field or the Issuer OU field.
	Name string `protobuf:"bytes,1,opt,name=Name" json:"Name,omitempty"`
	// List of root certificates associated
	RootCerts [][]byte `protobuf:"bytes,2,rep,name=RootCerts,proto3" json:"RootCerts,omitempty"`
	// Identity denoting the administrator of this MSP
	Admins [][]byte `protobuf:"bytes,3,rep,name=Admins,proto3" json:"Admins,omitempty"`
	// Identity revocation list
	RevocationList [][]byte `protobuf:"bytes,4,rep,name=RevocationList,proto3" json:"RevocationList,omitempty"`
	// SigningIdentity holds information on the signing identity
	// this peer is to use, and which is to be imported by the
	// MSP defined before
	SigningIdentity *SigningIdentityInfo `protobuf:"bytes,5,opt,name=SigningIdentity" json:"SigningIdentity,omitempty"`
}

FabricMSPConfig collects all the configuration information for a Fabric MSP. Here we assume a default certificate validation policy, where any certificate signed by any of the listed rootCA certs would be considered as valid under this MSP. This MSP may or may not come with a signing identity. If it does, it can also issue signing identities. If it does not, it can only be used to validate and verify certificates.

func (*FabricMSPConfig) Descriptor

func (*FabricMSPConfig) Descriptor() ([]byte, []int)

func (*FabricMSPConfig) GetSigningIdentity

func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo

func (*FabricMSPConfig) ProtoMessage

func (*FabricMSPConfig) ProtoMessage()

func (*FabricMSPConfig) Reset

func (m *FabricMSPConfig) Reset()

func (*FabricMSPConfig) String

func (m *FabricMSPConfig) String() string

type KeyInfo

type KeyInfo struct {
	// Identifier of the key inside the default keystore; this for
	// the case of Software BCCSP as well as the HSM BCCSP would be
	// the SKI of the key
	KeyIdentifier string `protobuf:"bytes,1,opt,name=KeyIdentifier" json:"KeyIdentifier,omitempty"`
	// KeyMaterial (optional) for the key to be imported; this is
	// properly encoded key bytes, prefixed by the type of the key
	KeyMaterial []byte `protobuf:"bytes,2,opt,name=KeyMaterial,proto3" json:"KeyMaterial,omitempty"`
}

KeyInfo represents a (secret) key that is either already stored in the bccsp/keystore or key material to be imported to the bccsp key-store. In later versions it may contain also a keystore identifier

func (*KeyInfo) Descriptor

func (*KeyInfo) Descriptor() ([]byte, []int)

func (*KeyInfo) ProtoMessage

func (*KeyInfo) ProtoMessage()

func (*KeyInfo) Reset

func (m *KeyInfo) Reset()

func (*KeyInfo) String

func (m *KeyInfo) String() string

type MSPConfig

type MSPConfig struct {
	// Type holds the type of the MSP; the default one would
	// be of type FABRIC implementing an X.509 based provider
	Type int32 `protobuf:"varint,1,opt,name=Type" json:"Type,omitempty"`
	// Config is MSP dependent configuration info
	Config []byte `protobuf:"bytes,2,opt,name=Config,proto3" json:"Config,omitempty"`
}

MSPConfig collects all the configuration information for an MSP. The Config field should be unmarshalled in a way that depends on the Type

func (*MSPConfig) Descriptor

func (*MSPConfig) Descriptor() ([]byte, []int)

func (*MSPConfig) ProtoMessage

func (*MSPConfig) ProtoMessage()

func (*MSPConfig) Reset

func (m *MSPConfig) Reset()

func (*MSPConfig) String

func (m *MSPConfig) String() string

type SigningIdentityInfo

type SigningIdentityInfo struct {
	// PublicSigner carries the public information of the signing
	// identity. For an X.509 provider this would be represented by
	// an X.509 certificate
	PublicSigner []byte `protobuf:"bytes,1,opt,name=PublicSigner,proto3" json:"PublicSigner,omitempty"`
	// PrivateSigner denotes a reference to the private key of the
	// peer's signing identity
	PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=PrivateSigner" json:"PrivateSigner,omitempty"`
}

SigningIdentityInfo represents the configuration information related to the signing identity the peer is to use for generating endorsements

func (*SigningIdentityInfo) Descriptor

func (*SigningIdentityInfo) Descriptor() ([]byte, []int)

func (*SigningIdentityInfo) GetPrivateSigner

func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo

func (*SigningIdentityInfo) ProtoMessage

func (*SigningIdentityInfo) ProtoMessage()

func (*SigningIdentityInfo) Reset

func (m *SigningIdentityInfo) Reset()

func (*SigningIdentityInfo) String

func (m *SigningIdentityInfo) String() string

Directories

Path Synopsis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL