Documentation ¶
Index ¶
- func CreateSignedCCDepSpecForInstall(pack []*common.Envelope) (*common.Envelope, error)
- func ExtractSignedCCDepSpec(env *common.Envelope) (*common.ChannelHeader, *peer.SignedChaincodeDeploymentSpec, error)
- func OwnerCreateSignedCCDepSpec(cds *peer.ChaincodeDeploymentSpec, instPolicy *common.SignaturePolicyEnvelope, ...) (*common.Envelope, error)
- func SignExistingPackage(env *common.Envelope, owner msp.SigningIdentity) (*common.Envelope, error)
- func ValidateCip(baseCip, otherCip *peer.SignedChaincodeDeploymentSpec) error
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func CreateSignedCCDepSpecForInstall ¶
CreateSignedCCDepSpecForInstall creates the final package from a set of packages signed by owners. This is similar to how the SDK assembles a TX from various proposal responses from the signatures.
func ExtractSignedCCDepSpec ¶
func ExtractSignedCCDepSpec(env *common.Envelope) (*common.ChannelHeader, *peer.SignedChaincodeDeploymentSpec, error)
ExtractSignedCCDepSpec extracts the messages from the envelope
func OwnerCreateSignedCCDepSpec ¶
func OwnerCreateSignedCCDepSpec(cds *peer.ChaincodeDeploymentSpec, instPolicy *common.SignaturePolicyEnvelope, owner msp.SigningIdentity) (*common.Envelope, error)
OwnerCreateSignedCCDepSpec creates a package from a ChaincodeDeploymentSpec and optionally endorses it
func SignExistingPackage ¶
SignExistingPackage adds a signature to a signed package.
func ValidateCip ¶
func ValidateCip(baseCip, otherCip *peer.SignedChaincodeDeploymentSpec) error
ValidateCip validate the endorsed package against the base package
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.