msp

package
v1.0.0-alpha Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Mar 15, 2017 License: Apache-2.0 Imports: 3 Imported by: 0

Documentation

Overview

Package msp is a generated protocol buffer package.

It is generated from these files:

msp/mspconfig.proto

It has these top-level messages:

MSPConfig
FabricMSPConfig
SigningIdentityInfo
KeyInfo
FabricOUIdentifier

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

This section is empty.

Types

type FabricMSPConfig

type FabricMSPConfig struct {
	// Name holds the identifier of the MSP; MSP identifier
	// is chosen by the application that governs this MSP.
	// For example, and assuming the default implementation of MSP,
	// that is X.509-based and considers a single Issuer,
	// this can refer to the Subject OU field or the Issuer OU field.
	Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"`
	// List of root certificates trusted by this MSP
	// they are used upon certificate validation (see
	// comment for IntermediateCerts below)
	RootCerts [][]byte `protobuf:"bytes,2,rep,name=root_certs,json=rootCerts,proto3" json:"root_certs,omitempty"`
	// List of intermediate certificates trusted by this MSP;
	// they are used upon certificate validation as follows:
	// validation attempts to build a path from the certificate
	// to be validated (which is at one end of the path) and
	// one of the certs in the RootCerts field (which is at
	// the other end of the path). If the path is longer than
	// 2, certificates in the middle are searched within the
	// IntermediateCerts pool
	IntermediateCerts [][]byte `protobuf:"bytes,3,rep,name=intermediate_certs,json=intermediateCerts,proto3" json:"intermediate_certs,omitempty"`
	// Identity denoting the administrator of this MSP
	Admins [][]byte `protobuf:"bytes,4,rep,name=admins,proto3" json:"admins,omitempty"`
	// Identity revocation list
	RevocationList [][]byte `protobuf:"bytes,5,rep,name=revocation_list,json=revocationList,proto3" json:"revocation_list,omitempty"`
	// SigningIdentity holds information on the signing identity
	// this peer is to use, and which is to be imported by the
	// MSP defined before
	SigningIdentity *SigningIdentityInfo `protobuf:"bytes,6,opt,name=signing_identity,json=signingIdentity" json:"signing_identity,omitempty"`
	// OrganizationalUnitIdentifiers holds one or more
	// fabric organizational unit identifiers that belong to
	// this MSP configuration
	OrganizationalUnitIdentifiers []*FabricOUIdentifier `` /* 143-byte string literal not displayed */
}

FabricMSPConfig collects all the configuration information for a Fabric MSP. Here we assume a default certificate validation policy, where any certificate signed by any of the listed rootCA certs would be considered as valid under this MSP. This MSP may or may not come with a signing identity. If it does, it can also issue signing identities. If it does not, it can only be used to validate and verify certificates.

func (*FabricMSPConfig) Descriptor

func (*FabricMSPConfig) Descriptor() ([]byte, []int)

func (*FabricMSPConfig) GetOrganizationalUnitIdentifiers

func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier

func (*FabricMSPConfig) GetSigningIdentity

func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo

func (*FabricMSPConfig) ProtoMessage

func (*FabricMSPConfig) ProtoMessage()

func (*FabricMSPConfig) Reset

func (m *FabricMSPConfig) Reset()

func (*FabricMSPConfig) String

func (m *FabricMSPConfig) String() string

type FabricOUIdentifier

type FabricOUIdentifier struct {
	// CertifiersIdentifier is the hash of certificates chain of trust
	// related to this organizational unit
	CertifiersIdentifier []byte `protobuf:"bytes,1,opt,name=certifiers_identifier,json=certifiersIdentifier,proto3" json:"certifiers_identifier,omitempty"`
	// OrganizationUnitIdentifier defines the organizational unit under the
	// MSP identified with MSPIdentifier
	OrganizationalUnitIdentifier string `` /* 140-byte string literal not displayed */
}

FabricOUIdentifier represents an organizazional unit and its related chain of trust identifier.

func (*FabricOUIdentifier) Descriptor

func (*FabricOUIdentifier) Descriptor() ([]byte, []int)

func (*FabricOUIdentifier) ProtoMessage

func (*FabricOUIdentifier) ProtoMessage()

func (*FabricOUIdentifier) Reset

func (m *FabricOUIdentifier) Reset()

func (*FabricOUIdentifier) String

func (m *FabricOUIdentifier) String() string

type KeyInfo

type KeyInfo struct {
	// Identifier of the key inside the default keystore; this for
	// the case of Software BCCSP as well as the HSM BCCSP would be
	// the SKI of the key
	KeyIdentifier string `protobuf:"bytes,1,opt,name=key_identifier,json=keyIdentifier" json:"key_identifier,omitempty"`
	// KeyMaterial (optional) for the key to be imported; this is
	// properly encoded key bytes, prefixed by the type of the key
	KeyMaterial []byte `protobuf:"bytes,2,opt,name=key_material,json=keyMaterial,proto3" json:"key_material,omitempty"`
}

KeyInfo represents a (secret) key that is either already stored in the bccsp/keystore or key material to be imported to the bccsp key-store. In later versions it may contain also a keystore identifier

func (*KeyInfo) Descriptor

func (*KeyInfo) Descriptor() ([]byte, []int)

func (*KeyInfo) ProtoMessage

func (*KeyInfo) ProtoMessage()

func (*KeyInfo) Reset

func (m *KeyInfo) Reset()

func (*KeyInfo) String

func (m *KeyInfo) String() string

type MSPConfig

type MSPConfig struct {
	// Type holds the type of the MSP; the default one would
	// be of type FABRIC implementing an X.509 based provider
	Type int32 `protobuf:"varint,1,opt,name=type" json:"type,omitempty"`
	// Config is MSP dependent configuration info
	Config []byte `protobuf:"bytes,2,opt,name=config,proto3" json:"config,omitempty"`
}

MSPConfig collects all the configuration information for an MSP. The Config field should be unmarshalled in a way that depends on the Type

func (*MSPConfig) Descriptor

func (*MSPConfig) Descriptor() ([]byte, []int)

func (*MSPConfig) ProtoMessage

func (*MSPConfig) ProtoMessage()

func (*MSPConfig) Reset

func (m *MSPConfig) Reset()

func (*MSPConfig) String

func (m *MSPConfig) String() string

type SigningIdentityInfo

type SigningIdentityInfo struct {
	// PublicSigner carries the public information of the signing
	// identity. For an X.509 provider this would be represented by
	// an X.509 certificate
	PublicSigner []byte `protobuf:"bytes,1,opt,name=public_signer,json=publicSigner,proto3" json:"public_signer,omitempty"`
	// PrivateSigner denotes a reference to the private key of the
	// peer's signing identity
	PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=private_signer,json=privateSigner" json:"private_signer,omitempty"`
}

SigningIdentityInfo represents the configuration information related to the signing identity the peer is to use for generating endorsements

func (*SigningIdentityInfo) Descriptor

func (*SigningIdentityInfo) Descriptor() ([]byte, []int)

func (*SigningIdentityInfo) GetPrivateSigner

func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo

func (*SigningIdentityInfo) ProtoMessage

func (*SigningIdentityInfo) ProtoMessage()

func (*SigningIdentityInfo) Reset

func (m *SigningIdentityInfo) Reset()

func (*SigningIdentityInfo) String

func (m *SigningIdentityInfo) String() string

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL