Documentation ¶
Overview ¶
Package msp is a generated protocol buffer package.
It is generated from these files:
msp/mspconfig.proto
It has these top-level messages:
MSPConfig FabricMSPConfig SigningIdentityInfo KeyInfo
Index ¶
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type FabricMSPConfig ¶
type FabricMSPConfig struct { // Name holds the identifier of the MSP; MSP identifier // is chosen by the application that governs this MSP. // For example, and assuming the default implementation of MSP, // that is X.509-based and considers a single Issuer, // this can refer to the Subject OU field or the Issuer OU field. Name string `protobuf:"bytes,1,opt,name=Name" json:"Name,omitempty"` // List of root certificates associated RootCerts [][]byte `protobuf:"bytes,2,rep,name=RootCerts,proto3" json:"RootCerts,omitempty"` // Identity denoting the administrator of this MSP Admins [][]byte `protobuf:"bytes,3,rep,name=Admins,proto3" json:"Admins,omitempty"` // Identity revocation list RevocationList [][]byte `protobuf:"bytes,4,rep,name=RevocationList,proto3" json:"RevocationList,omitempty"` // SigningIdentity holds information on the signing identity // this peer is to use, and which is to be imported by the // MSP defined before SigningIdentity *SigningIdentityInfo `protobuf:"bytes,5,opt,name=SigningIdentity" json:"SigningIdentity,omitempty"` }
FabricMSPConfig collects all the configuration information for a Fabric MSP. Here we assume a default certificate validation policy, where any certificate signed by any of the listed rootCA certs would be considered as valid under this MSP. This MSP may or may not come with a signing identity. If it does, it can also issue signing identities. If it does not, it can only be used to validate and verify certificates.
func (*FabricMSPConfig) Descriptor ¶
func (*FabricMSPConfig) Descriptor() ([]byte, []int)
func (*FabricMSPConfig) GetSigningIdentity ¶
func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo
func (*FabricMSPConfig) ProtoMessage ¶
func (*FabricMSPConfig) ProtoMessage()
func (*FabricMSPConfig) Reset ¶
func (m *FabricMSPConfig) Reset()
func (*FabricMSPConfig) String ¶
func (m *FabricMSPConfig) String() string
type KeyInfo ¶
type KeyInfo struct { // Identifier of the key inside the default keystore; this for // the case of Software BCCSP as well as the HSM BCCSP would be // the SKI of the key KeyIdentifier string `protobuf:"bytes,1,opt,name=KeyIdentifier" json:"KeyIdentifier,omitempty"` // KeyMaterial (optional) for the key to be imported; this is // properly encoded key bytes, prefixed by the type of the key KeyMaterial []byte `protobuf:"bytes,2,opt,name=KeyMaterial,proto3" json:"KeyMaterial,omitempty"` }
KeyInfo represents a (secret) key that is either already stored in the bccsp/keystore or key material to be imported to the bccsp key-store. In later versions it may contain also a keystore identifier
func (*KeyInfo) Descriptor ¶
func (*KeyInfo) ProtoMessage ¶
func (*KeyInfo) ProtoMessage()
type MSPConfig ¶
type MSPConfig struct { // Type holds the type of the MSP; the default one would // be of type FABRIC implementing an X.509 based provider Type int32 `protobuf:"varint,1,opt,name=Type" json:"Type,omitempty"` // Config is MSP dependent configuration info Config []byte `protobuf:"bytes,2,opt,name=Config,proto3" json:"Config,omitempty"` }
MSPConfig collects all the configuration information for an MSP. The Config field should be unmarshalled in a way that depends on the Type
func (*MSPConfig) Descriptor ¶
func (*MSPConfig) ProtoMessage ¶
func (*MSPConfig) ProtoMessage()
type SigningIdentityInfo ¶
type SigningIdentityInfo struct { // PublicSigner carries the public information of the signing // identity. For an X.509 provider this would be represented by // an X.509 certificate PublicSigner []byte `protobuf:"bytes,1,opt,name=PublicSigner,proto3" json:"PublicSigner,omitempty"` // PrivateSigner denotes a reference to the private key of the // peer's signing identity PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=PrivateSigner" json:"PrivateSigner,omitempty"` }
SigningIdentityInfo represents the configuration information related to the signing identity the peer is to use for generating endorsements
func (*SigningIdentityInfo) Descriptor ¶
func (*SigningIdentityInfo) Descriptor() ([]byte, []int)
func (*SigningIdentityInfo) GetPrivateSigner ¶
func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo
func (*SigningIdentityInfo) ProtoMessage ¶
func (*SigningIdentityInfo) ProtoMessage()
func (*SigningIdentityInfo) Reset ¶
func (m *SigningIdentityInfo) Reset()
func (*SigningIdentityInfo) String ¶
func (m *SigningIdentityInfo) String() string