github.com/darrenli6/fabric-sdk-example@v0.0.0-20220109053535-94b13b56df8c/protos/msp/msp_config.pb.go (about) 1 // Code generated by protoc-gen-go. DO NOT EDIT. 2 // source: msp/msp_config.proto 3 4 package msp 5 6 import proto "github.com/golang/protobuf/proto" 7 import fmt "fmt" 8 import math "math" 9 10 // Reference imports to suppress errors if they are not otherwise used. 11 var _ = proto.Marshal 12 var _ = fmt.Errorf 13 var _ = math.Inf 14 15 // MSPConfig collects all the configuration information for 16 // an MSP. The Config field should be unmarshalled in a way 17 // that depends on the Type 18 type MSPConfig struct { 19 // Type holds the type of the MSP; the default one would 20 // be of type FABRIC implementing an X.509 based provider 21 Type int32 `protobuf:"varint,1,opt,name=type" json:"type,omitempty"` 22 // Config is MSP dependent configuration info 23 Config []byte `protobuf:"bytes,2,opt,name=config,proto3" json:"config,omitempty"` 24 } 25 26 func (m *MSPConfig) Reset() { *m = MSPConfig{} } 27 func (m *MSPConfig) String() string { return proto.CompactTextString(m) } 28 func (*MSPConfig) ProtoMessage() {} 29 func (*MSPConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{0} } 30 31 func (m *MSPConfig) GetType() int32 { 32 if m != nil { 33 return m.Type 34 } 35 return 0 36 } 37 38 func (m *MSPConfig) GetConfig() []byte { 39 if m != nil { 40 return m.Config 41 } 42 return nil 43 } 44 45 // FabricMSPConfig collects all the configuration information for 46 // a Fabric MSP. 47 // Here we assume a default certificate validation policy, where 48 // any certificate signed by any of the listed rootCA certs would 49 // be considered as valid under this MSP. 50 // This MSP may or may not come with a signing identity. If it does, 51 // it can also issue signing identities. If it does not, it can only 52 // be used to validate and verify certificates. 53 type FabricMSPConfig struct { 54 // Name holds the identifier of the MSP; MSP identifier 55 // is chosen by the application that governs this MSP. 56 // For example, and assuming the default implementation of MSP, 57 // that is X.509-based and considers a single Issuer, 58 // this can refer to the Subject OU field or the Issuer OU field. 59 Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"` 60 // List of root certificates trusted by this MSP 61 // they are used upon certificate validation (see 62 // comment for IntermediateCerts below) 63 RootCerts [][]byte `protobuf:"bytes,2,rep,name=root_certs,json=rootCerts,proto3" json:"root_certs,omitempty"` 64 // List of intermediate certificates trusted by this MSP; 65 // they are used upon certificate validation as follows: 66 // validation attempts to build a path from the certificate 67 // to be validated (which is at one end of the path) and 68 // one of the certs in the RootCerts field (which is at 69 // the other end of the path). If the path is longer than 70 // 2, certificates in the middle are searched within the 71 // IntermediateCerts pool 72 IntermediateCerts [][]byte `protobuf:"bytes,3,rep,name=intermediate_certs,json=intermediateCerts,proto3" json:"intermediate_certs,omitempty"` 73 // Identity denoting the administrator of this MSP 74 Admins [][]byte `protobuf:"bytes,4,rep,name=admins,proto3" json:"admins,omitempty"` 75 // Identity revocation list 76 RevocationList [][]byte `protobuf:"bytes,5,rep,name=revocation_list,json=revocationList,proto3" json:"revocation_list,omitempty"` 77 // SigningIdentity holds information on the signing identity 78 // this peer is to use, and which is to be imported by the 79 // MSP defined before 80 SigningIdentity *SigningIdentityInfo `protobuf:"bytes,6,opt,name=signing_identity,json=signingIdentity" json:"signing_identity,omitempty"` 81 // OrganizationalUnitIdentifiers holds one or more 82 // fabric organizational unit identifiers that belong to 83 // this MSP configuration 84 OrganizationalUnitIdentifiers []*FabricOUIdentifier `protobuf:"bytes,7,rep,name=organizational_unit_identifiers,json=organizationalUnitIdentifiers" json:"organizational_unit_identifiers,omitempty"` 85 // FabricCryptoConfig contains the configuration parameters 86 // for the cryptographic algorithms used by this MSP 87 CryptoConfig *FabricCryptoConfig `protobuf:"bytes,8,opt,name=crypto_config,json=cryptoConfig" json:"crypto_config,omitempty"` 88 // List of TLS root certificates trusted by this MSP. 89 // They are returned by GetTLSRootCerts. 90 TlsRootCerts [][]byte `protobuf:"bytes,9,rep,name=tls_root_certs,json=tlsRootCerts,proto3" json:"tls_root_certs,omitempty"` 91 // List of TLS intermediate certificates trusted by this MSP; 92 // They are returned by GetTLSIntermediateCerts. 93 TlsIntermediateCerts [][]byte `protobuf:"bytes,10,rep,name=tls_intermediate_certs,json=tlsIntermediateCerts,proto3" json:"tls_intermediate_certs,omitempty"` 94 } 95 96 func (m *FabricMSPConfig) Reset() { *m = FabricMSPConfig{} } 97 func (m *FabricMSPConfig) String() string { return proto.CompactTextString(m) } 98 func (*FabricMSPConfig) ProtoMessage() {} 99 func (*FabricMSPConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{1} } 100 101 func (m *FabricMSPConfig) GetName() string { 102 if m != nil { 103 return m.Name 104 } 105 return "" 106 } 107 108 func (m *FabricMSPConfig) GetRootCerts() [][]byte { 109 if m != nil { 110 return m.RootCerts 111 } 112 return nil 113 } 114 115 func (m *FabricMSPConfig) GetIntermediateCerts() [][]byte { 116 if m != nil { 117 return m.IntermediateCerts 118 } 119 return nil 120 } 121 122 func (m *FabricMSPConfig) GetAdmins() [][]byte { 123 if m != nil { 124 return m.Admins 125 } 126 return nil 127 } 128 129 func (m *FabricMSPConfig) GetRevocationList() [][]byte { 130 if m != nil { 131 return m.RevocationList 132 } 133 return nil 134 } 135 136 func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo { 137 if m != nil { 138 return m.SigningIdentity 139 } 140 return nil 141 } 142 143 func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier { 144 if m != nil { 145 return m.OrganizationalUnitIdentifiers 146 } 147 return nil 148 } 149 150 func (m *FabricMSPConfig) GetCryptoConfig() *FabricCryptoConfig { 151 if m != nil { 152 return m.CryptoConfig 153 } 154 return nil 155 } 156 157 func (m *FabricMSPConfig) GetTlsRootCerts() [][]byte { 158 if m != nil { 159 return m.TlsRootCerts 160 } 161 return nil 162 } 163 164 func (m *FabricMSPConfig) GetTlsIntermediateCerts() [][]byte { 165 if m != nil { 166 return m.TlsIntermediateCerts 167 } 168 return nil 169 } 170 171 // FabricCryptoConfig contains configuration parameters 172 // for the cryptographic algorithms used by the MSP 173 // this configuration refers to 174 type FabricCryptoConfig struct { 175 // SignatureHashFamily is a string representing the hash family to be used 176 // during sign and verify operations. 177 // Allowed values are "SHA2" and "SHA3". 178 SignatureHashFamily string `protobuf:"bytes,1,opt,name=signature_hash_family,json=signatureHashFamily" json:"signature_hash_family,omitempty"` 179 // IdentityIdentifierHashFunction is a string representing the hash function 180 // to be used during the computation of the identity identifier of an MSP identity. 181 // Allowed values are "SHA256", "SHA384" and "SHA3_256", "SHA3_384". 182 IdentityIdentifierHashFunction string `protobuf:"bytes,2,opt,name=identity_identifier_hash_function,json=identityIdentifierHashFunction" json:"identity_identifier_hash_function,omitempty"` 183 } 184 185 func (m *FabricCryptoConfig) Reset() { *m = FabricCryptoConfig{} } 186 func (m *FabricCryptoConfig) String() string { return proto.CompactTextString(m) } 187 func (*FabricCryptoConfig) ProtoMessage() {} 188 func (*FabricCryptoConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{2} } 189 190 func (m *FabricCryptoConfig) GetSignatureHashFamily() string { 191 if m != nil { 192 return m.SignatureHashFamily 193 } 194 return "" 195 } 196 197 func (m *FabricCryptoConfig) GetIdentityIdentifierHashFunction() string { 198 if m != nil { 199 return m.IdentityIdentifierHashFunction 200 } 201 return "" 202 } 203 204 // SigningIdentityInfo represents the configuration information 205 // related to the signing identity the peer is to use for generating 206 // endorsements 207 type SigningIdentityInfo struct { 208 // PublicSigner carries the public information of the signing 209 // identity. For an X.509 provider this would be represented by 210 // an X.509 certificate 211 PublicSigner []byte `protobuf:"bytes,1,opt,name=public_signer,json=publicSigner,proto3" json:"public_signer,omitempty"` 212 // PrivateSigner denotes a reference to the private key of the 213 // peer's signing identity 214 PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=private_signer,json=privateSigner" json:"private_signer,omitempty"` 215 } 216 217 func (m *SigningIdentityInfo) Reset() { *m = SigningIdentityInfo{} } 218 func (m *SigningIdentityInfo) String() string { return proto.CompactTextString(m) } 219 func (*SigningIdentityInfo) ProtoMessage() {} 220 func (*SigningIdentityInfo) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{3} } 221 222 func (m *SigningIdentityInfo) GetPublicSigner() []byte { 223 if m != nil { 224 return m.PublicSigner 225 } 226 return nil 227 } 228 229 func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo { 230 if m != nil { 231 return m.PrivateSigner 232 } 233 return nil 234 } 235 236 // KeyInfo represents a (secret) key that is either already stored 237 // in the bccsp/keystore or key material to be imported to the 238 // bccsp key-store. In later versions it may contain also a 239 // keystore identifier 240 type KeyInfo struct { 241 // Identifier of the key inside the default keystore; this for 242 // the case of Software BCCSP as well as the HSM BCCSP would be 243 // the SKI of the key 244 KeyIdentifier string `protobuf:"bytes,1,opt,name=key_identifier,json=keyIdentifier" json:"key_identifier,omitempty"` 245 // KeyMaterial (optional) for the key to be imported; this is 246 // properly encoded key bytes, prefixed by the type of the key 247 KeyMaterial []byte `protobuf:"bytes,2,opt,name=key_material,json=keyMaterial,proto3" json:"key_material,omitempty"` 248 } 249 250 func (m *KeyInfo) Reset() { *m = KeyInfo{} } 251 func (m *KeyInfo) String() string { return proto.CompactTextString(m) } 252 func (*KeyInfo) ProtoMessage() {} 253 func (*KeyInfo) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{4} } 254 255 func (m *KeyInfo) GetKeyIdentifier() string { 256 if m != nil { 257 return m.KeyIdentifier 258 } 259 return "" 260 } 261 262 func (m *KeyInfo) GetKeyMaterial() []byte { 263 if m != nil { 264 return m.KeyMaterial 265 } 266 return nil 267 } 268 269 // FabricOUIdentifier represents an organizational unit and 270 // its related chain of trust identifier. 271 type FabricOUIdentifier struct { 272 // Certificate represents the second certificate in a certification chain. 273 // (Notice that the first certificate in a certification chain is supposed 274 // to be the certificate of an identity). 275 // It must correspond to the certificate of root or intermediate CA 276 // recognized by the MSP this message belongs to. 277 // Starting from this certificate, a certification chain is computed 278 // and boud to the OrganizationUnitIdentifier specified 279 Certificate []byte `protobuf:"bytes,1,opt,name=certificate,proto3" json:"certificate,omitempty"` 280 // OrganizationUnitIdentifier defines the organizational unit under the 281 // MSP identified with MSPIdentifier 282 OrganizationalUnitIdentifier string `protobuf:"bytes,2,opt,name=organizational_unit_identifier,json=organizationalUnitIdentifier" json:"organizational_unit_identifier,omitempty"` 283 } 284 285 func (m *FabricOUIdentifier) Reset() { *m = FabricOUIdentifier{} } 286 func (m *FabricOUIdentifier) String() string { return proto.CompactTextString(m) } 287 func (*FabricOUIdentifier) ProtoMessage() {} 288 func (*FabricOUIdentifier) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{5} } 289 290 func (m *FabricOUIdentifier) GetCertificate() []byte { 291 if m != nil { 292 return m.Certificate 293 } 294 return nil 295 } 296 297 func (m *FabricOUIdentifier) GetOrganizationalUnitIdentifier() string { 298 if m != nil { 299 return m.OrganizationalUnitIdentifier 300 } 301 return "" 302 } 303 304 func init() { 305 proto.RegisterType((*MSPConfig)(nil), "msp.MSPConfig") 306 proto.RegisterType((*FabricMSPConfig)(nil), "msp.FabricMSPConfig") 307 proto.RegisterType((*FabricCryptoConfig)(nil), "msp.FabricCryptoConfig") 308 proto.RegisterType((*SigningIdentityInfo)(nil), "msp.SigningIdentityInfo") 309 proto.RegisterType((*KeyInfo)(nil), "msp.KeyInfo") 310 proto.RegisterType((*FabricOUIdentifier)(nil), "msp.FabricOUIdentifier") 311 } 312 313 func init() { proto.RegisterFile("msp/msp_config.proto", fileDescriptor1) } 314 315 var fileDescriptor1 = []byte{ 316 // 599 bytes of a gzipped FileDescriptorProto 317 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x09, 0x6e, 0x88, 0x02, 0xff, 0x7c, 0x54, 0xdf, 0x6e, 0xd3, 0x3c, 318 0x14, 0x57, 0xd7, 0xad, 0xfb, 0x7a, 0x9a, 0x76, 0xfb, 0xbc, 0x31, 0x72, 0xc1, 0x46, 0x16, 0x40, 319 0xe4, 0x86, 0x54, 0xda, 0x90, 0xb8, 0xe1, 0x6a, 0x45, 0x13, 0x15, 0x54, 0x4c, 0xa9, 0x76, 0xc3, 320 0x4d, 0xe4, 0xa6, 0x4e, 0x6a, 0x35, 0xb1, 0x23, 0xdb, 0x9d, 0x14, 0xc4, 0x5b, 0xf0, 0xaa, 0x3c, 321 0x00, 0x8a, 0xed, 0xb6, 0x29, 0x4c, 0xbb, 0xb3, 0x7f, 0x7f, 0x4e, 0x8f, 0x7f, 0xe7, 0x34, 0x70, 322 0x5a, 0xc8, 0x72, 0x58, 0xc8, 0x32, 0x4e, 0x38, 0x4b, 0x69, 0x16, 0x96, 0x82, 0x2b, 0x8e, 0xda, 323 0x85, 0x2c, 0xfd, 0x0f, 0xd0, 0x9d, 0x4c, 0xef, 0x46, 0x1a, 0x47, 0x08, 0xf6, 0x55, 0x55, 0x12, 324 0xb7, 0xe5, 0xb5, 0x82, 0x83, 0x48, 0x9f, 0xd1, 0x19, 0x74, 0x8c, 0xcb, 0xdd, 0xf3, 0x5a, 0x81, 325 0x13, 0xd9, 0x9b, 0xff, 0xbb, 0x0d, 0x47, 0xb7, 0x78, 0x26, 0x68, 0xb2, 0xe3, 0x67, 0xb8, 0x30, 326 0xfe, 0x6e, 0xa4, 0xcf, 0xe8, 0x1c, 0x40, 0x70, 0xae, 0xe2, 0x84, 0x08, 0x25, 0xdd, 0x3d, 0xaf, 327 0x1d, 0x38, 0x51, 0xb7, 0x46, 0x46, 0x35, 0x80, 0xde, 0x01, 0xa2, 0x4c, 0x11, 0x51, 0x90, 0x39, 328 0xc5, 0x8a, 0x58, 0x59, 0x5b, 0xcb, 0xfe, 0x6f, 0x32, 0x46, 0x7e, 0x06, 0x1d, 0x3c, 0x2f, 0x28, 329 0x93, 0xee, 0xbe, 0x96, 0xd8, 0x1b, 0x7a, 0x0b, 0x47, 0x82, 0x3c, 0xf0, 0x04, 0x2b, 0xca, 0x59, 330 0x9c, 0x53, 0xa9, 0xdc, 0x03, 0x2d, 0x18, 0x6c, 0xe1, 0xaf, 0x54, 0x2a, 0x34, 0x82, 0x63, 0x49, 331 0x33, 0x46, 0x59, 0x16, 0xd3, 0x39, 0x61, 0x8a, 0xaa, 0xca, 0xed, 0x78, 0xad, 0xa0, 0x77, 0xe5, 332 0x86, 0x85, 0x2c, 0xc3, 0xa9, 0x21, 0xc7, 0x96, 0x1b, 0xb3, 0x94, 0x47, 0x47, 0x72, 0x17, 0x44, 333 0x31, 0xbc, 0xe4, 0x22, 0xc3, 0x8c, 0xfe, 0xd0, 0x85, 0x71, 0x1e, 0xaf, 0x18, 0x55, 0xb6, 0x60, 334 0x4a, 0x89, 0x90, 0xee, 0xa1, 0xd7, 0x0e, 0x7a, 0x57, 0xcf, 0x75, 0x4d, 0x13, 0xd3, 0xb7, 0xfb, 335 0xf1, 0x86, 0x8f, 0xce, 0x77, 0xfd, 0xf7, 0x8c, 0xaa, 0x2d, 0x2b, 0xd1, 0x47, 0xe8, 0x27, 0xa2, 336 0x2a, 0x15, 0xb7, 0x13, 0x73, 0xff, 0xd3, 0x2d, 0x36, 0xcb, 0x8d, 0x34, 0x6f, 0x82, 0x8f, 0x9c, 337 0xa4, 0x71, 0x43, 0xaf, 0x61, 0xa0, 0x72, 0x19, 0x37, 0x62, 0xef, 0xea, 0x2c, 0x1c, 0x95, 0xcb, 338 0x68, 0x93, 0xfc, 0x7b, 0x38, 0xab, 0x55, 0x8f, 0xa4, 0x0f, 0x5a, 0x7d, 0xaa, 0x72, 0x39, 0xfe, 339 0x7b, 0x00, 0xfe, 0xaf, 0x16, 0xa0, 0x7f, 0x1b, 0x40, 0x57, 0xf0, 0xac, 0x0e, 0x09, 0xab, 0x95, 340 0x20, 0xf1, 0x02, 0xcb, 0x45, 0x9c, 0xe2, 0x82, 0xe6, 0x95, 0x5d, 0x85, 0x93, 0x0d, 0xf9, 0x19, 341 0xcb, 0xc5, 0xad, 0xa6, 0xd0, 0x18, 0x2e, 0xd7, 0x23, 0x68, 0x44, 0x67, 0xdd, 0x2b, 0x96, 0xd4, 342 0xd1, 0xe8, 0xa5, 0xeb, 0x46, 0x17, 0x6b, 0xe1, 0x36, 0x24, 0x5d, 0xc8, 0xaa, 0x7c, 0x0e, 0x27, 343 0x8f, 0x0c, 0x0e, 0xbd, 0x82, 0x7e, 0xb9, 0x9a, 0xe5, 0x34, 0x89, 0xeb, 0xdf, 0x27, 0x42, 0x77, 344 0xe3, 0x44, 0x8e, 0x01, 0xa7, 0x1a, 0x43, 0xd7, 0x30, 0x28, 0x05, 0x7d, 0xa8, 0x9f, 0x6f, 0x55, 345 0x7b, 0x3a, 0x6c, 0x47, 0x87, 0xfd, 0x85, 0x98, 0x1d, 0xe8, 0x5b, 0x8d, 0x31, 0xf9, 0x53, 0x38, 346 0xb4, 0x0c, 0x7a, 0x03, 0x83, 0x25, 0x69, 0xbe, 0xc0, 0xbe, 0xb9, 0xbf, 0x24, 0x8d, 0x76, 0xd1, 347 0x25, 0x38, 0xb5, 0xac, 0xc0, 0x8a, 0x08, 0x8a, 0x73, 0xfb, 0x6f, 0xea, 0x2d, 0x49, 0x35, 0xb1, 348 0x90, 0xff, 0x73, 0x1d, 0x6d, 0x73, 0x55, 0x90, 0x07, 0xbd, 0x7a, 0x2c, 0x34, 0xa5, 0x09, 0x56, 349 0xc4, 0x3e, 0xa1, 0x09, 0xa1, 0x4f, 0x70, 0xf1, 0xf4, 0x3a, 0xda, 0x14, 0x5f, 0x3c, 0xb5, 0x74, 350 0x37, 0x31, 0x5c, 0x72, 0x91, 0x85, 0x8b, 0xaa, 0x24, 0x22, 0x27, 0xf3, 0x8c, 0x88, 0x30, 0xd5, 351 0xdd, 0x98, 0xcf, 0x85, 0xac, 0xe3, 0xb8, 0x39, 0x9e, 0xc8, 0xd2, 0x8c, 0xfc, 0x0e, 0x27, 0x4b, 352 0x9c, 0x91, 0xef, 0x41, 0x46, 0xd5, 0x62, 0x35, 0x0b, 0x13, 0x5e, 0x0c, 0x1b, 0xde, 0xa1, 0xf1, 353 0x0e, 0x8d, 0xb7, 0xfe, 0xf8, 0xcc, 0x3a, 0xfa, 0x7c, 0xfd, 0x27, 0x00, 0x00, 0xff, 0xff, 0x2e, 354 0xb1, 0x83, 0xaa, 0x8e, 0x04, 0x00, 0x00, 355 }