 Documentation
      ¶
      Documentation
      ¶
    
    
  
    
  
    Overview ¶
Package msp is a generated protocol buffer package.
It is generated from these files:
msp/mspconfig.proto
It has these top-level messages:
MSPConfig FabricMSPConfig SigningIdentityInfo KeyInfo FabricOUIdentifier
Index ¶
- type FabricMSPConfig
- func (*FabricMSPConfig) Descriptor() ([]byte, []int)
- func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier
- func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo
- func (*FabricMSPConfig) ProtoMessage()
- func (m *FabricMSPConfig) Reset()
- func (m *FabricMSPConfig) String() string
 
- type FabricOUIdentifier
- type KeyInfo
- type MSPConfig
- type SigningIdentityInfo
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type FabricMSPConfig ¶
type FabricMSPConfig struct {
	// Name holds the identifier of the MSP; MSP identifier
	// is chosen by the application that governs this MSP.
	// For example, and assuming the default implementation of MSP,
	// that is X.509-based and considers a single Issuer,
	// this can refer to the Subject OU field or the Issuer OU field.
	Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"`
	// List of root certificates trusted by this MSP
	// they are used upon certificate validation (see
	// comment for IntermediateCerts below)
	RootCerts [][]byte `protobuf:"bytes,2,rep,name=root_certs,json=rootCerts,proto3" json:"root_certs,omitempty"`
	// List of intermediate certificates trusted by this MSP;
	// they are used upon certificate validation as follows:
	// validation attempts to build a path from the certificate
	// to be validated (which is at one end of the path) and
	// one of the certs in the RootCerts field (which is at
	// the other end of the path). If the path is longer than
	// 2, certificates in the middle are searched within the
	// IntermediateCerts pool
	IntermediateCerts [][]byte `protobuf:"bytes,3,rep,name=intermediate_certs,json=intermediateCerts,proto3" json:"intermediate_certs,omitempty"`
	// Identity denoting the administrator of this MSP
	Admins [][]byte `protobuf:"bytes,4,rep,name=admins,proto3" json:"admins,omitempty"`
	// Identity revocation list
	RevocationList [][]byte `protobuf:"bytes,5,rep,name=revocation_list,json=revocationList,proto3" json:"revocation_list,omitempty"`
	// SigningIdentity holds information on the signing identity
	// this peer is to use, and which is to be imported by the
	// MSP defined before
	SigningIdentity *SigningIdentityInfo `protobuf:"bytes,6,opt,name=signing_identity,json=signingIdentity" json:"signing_identity,omitempty"`
	// OrganizationalUnitIdentifiers holds one or more
	// fabric organizational unit identifiers that belong to
	// this MSP configuration
	OrganizationalUnitIdentifiers []*FabricOUIdentifier `` /* 143-byte string literal not displayed */
}
    FabricMSPConfig collects all the configuration information for a Fabric MSP. Here we assume a default certificate validation policy, where any certificate signed by any of the listed rootCA certs would be considered as valid under this MSP. This MSP may or may not come with a signing identity. If it does, it can also issue signing identities. If it does not, it can only be used to validate and verify certificates.
func (*FabricMSPConfig) Descriptor ¶
func (*FabricMSPConfig) Descriptor() ([]byte, []int)
func (*FabricMSPConfig) GetOrganizationalUnitIdentifiers ¶
func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier
func (*FabricMSPConfig) GetSigningIdentity ¶
func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo
func (*FabricMSPConfig) ProtoMessage ¶
func (*FabricMSPConfig) ProtoMessage()
func (*FabricMSPConfig) Reset ¶
func (m *FabricMSPConfig) Reset()
func (*FabricMSPConfig) String ¶
func (m *FabricMSPConfig) String() string
type FabricOUIdentifier ¶
type FabricOUIdentifier struct {
	// CertifiersIdentifier is the hash of certificates chain of trust
	// related to this organizational unit
	CertifiersIdentifier []byte `protobuf:"bytes,1,opt,name=certifiers_identifier,json=certifiersIdentifier,proto3" json:"certifiers_identifier,omitempty"`
	// OrganizationUnitIdentifier defines the organizational unit under the
	// MSP identified with MSPIdentifier
	OrganizationalUnitIdentifier string `` /* 140-byte string literal not displayed */
}
    FabricOUIdentifier represents an organizazional unit and its related chain of trust identifier.
func (*FabricOUIdentifier) Descriptor ¶
func (*FabricOUIdentifier) Descriptor() ([]byte, []int)
func (*FabricOUIdentifier) ProtoMessage ¶
func (*FabricOUIdentifier) ProtoMessage()
func (*FabricOUIdentifier) Reset ¶
func (m *FabricOUIdentifier) Reset()
func (*FabricOUIdentifier) String ¶
func (m *FabricOUIdentifier) String() string
type KeyInfo ¶
type KeyInfo struct {
	// Identifier of the key inside the default keystore; this for
	// the case of Software BCCSP as well as the HSM BCCSP would be
	// the SKI of the key
	KeyIdentifier string `protobuf:"bytes,1,opt,name=key_identifier,json=keyIdentifier" json:"key_identifier,omitempty"`
	// KeyMaterial (optional) for the key to be imported; this is
	// properly encoded key bytes, prefixed by the type of the key
	KeyMaterial []byte `protobuf:"bytes,2,opt,name=key_material,json=keyMaterial,proto3" json:"key_material,omitempty"`
}
    KeyInfo represents a (secret) key that is either already stored in the bccsp/keystore or key material to be imported to the bccsp key-store. In later versions it may contain also a keystore identifier
func (*KeyInfo) Descriptor ¶
func (*KeyInfo) ProtoMessage ¶
func (*KeyInfo) ProtoMessage()
type MSPConfig ¶
type MSPConfig struct {
	// Type holds the type of the MSP; the default one would
	// be of type FABRIC implementing an X.509 based provider
	Type int32 `protobuf:"varint,1,opt,name=type" json:"type,omitempty"`
	// Config is MSP dependent configuration info
	Config []byte `protobuf:"bytes,2,opt,name=config,proto3" json:"config,omitempty"`
}
    MSPConfig collects all the configuration information for an MSP. The Config field should be unmarshalled in a way that depends on the Type
func (*MSPConfig) Descriptor ¶
func (*MSPConfig) ProtoMessage ¶
func (*MSPConfig) ProtoMessage()
type SigningIdentityInfo ¶
type SigningIdentityInfo struct {
	// PublicSigner carries the public information of the signing
	// identity. For an X.509 provider this would be represented by
	// an X.509 certificate
	PublicSigner []byte `protobuf:"bytes,1,opt,name=public_signer,json=publicSigner,proto3" json:"public_signer,omitempty"`
	// PrivateSigner denotes a reference to the private key of the
	// peer's signing identity
	PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=private_signer,json=privateSigner" json:"private_signer,omitempty"`
}
    SigningIdentityInfo represents the configuration information related to the signing identity the peer is to use for generating endorsements
func (*SigningIdentityInfo) Descriptor ¶
func (*SigningIdentityInfo) Descriptor() ([]byte, []int)
func (*SigningIdentityInfo) GetPrivateSigner ¶
func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo
func (*SigningIdentityInfo) ProtoMessage ¶
func (*SigningIdentityInfo) ProtoMessage()
func (*SigningIdentityInfo) Reset ¶
func (m *SigningIdentityInfo) Reset()
func (*SigningIdentityInfo) String ¶
func (m *SigningIdentityInfo) String() string