github.com/leonlxy/hyperledger@v1.0.0-alpha.0.20170427033203-34922035d248/protos/msp/msp_config.pb.go (about) 1 // Code generated by protoc-gen-go. 2 // source: msp/msp_config.proto 3 // DO NOT EDIT! 4 5 package msp 6 7 import proto "github.com/golang/protobuf/proto" 8 import fmt "fmt" 9 import math "math" 10 11 // Reference imports to suppress errors if they are not otherwise used. 12 var _ = proto.Marshal 13 var _ = fmt.Errorf 14 var _ = math.Inf 15 16 // MSPConfig collects all the configuration information for 17 // an MSP. The Config field should be unmarshalled in a way 18 // that depends on the Type 19 type MSPConfig struct { 20 // Type holds the type of the MSP; the default one would 21 // be of type FABRIC implementing an X.509 based provider 22 Type int32 `protobuf:"varint,1,opt,name=type" json:"type,omitempty"` 23 // Config is MSP dependent configuration info 24 Config []byte `protobuf:"bytes,2,opt,name=config,proto3" json:"config,omitempty"` 25 } 26 27 func (m *MSPConfig) Reset() { *m = MSPConfig{} } 28 func (m *MSPConfig) String() string { return proto.CompactTextString(m) } 29 func (*MSPConfig) ProtoMessage() {} 30 func (*MSPConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{0} } 31 32 // FabricMSPConfig collects all the configuration information for 33 // a Fabric MSP. 34 // Here we assume a default certificate validation policy, where 35 // any certificate signed by any of the listed rootCA certs would 36 // be considered as valid under this MSP. 37 // This MSP may or may not come with a signing identity. If it does, 38 // it can also issue signing identities. If it does not, it can only 39 // be used to validate and verify certificates. 40 type FabricMSPConfig struct { 41 // Name holds the identifier of the MSP; MSP identifier 42 // is chosen by the application that governs this MSP. 43 // For example, and assuming the default implementation of MSP, 44 // that is X.509-based and considers a single Issuer, 45 // this can refer to the Subject OU field or the Issuer OU field. 46 Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"` 47 // List of root certificates trusted by this MSP 48 // they are used upon certificate validation (see 49 // comment for IntermediateCerts below) 50 RootCerts [][]byte `protobuf:"bytes,2,rep,name=root_certs,json=rootCerts,proto3" json:"root_certs,omitempty"` 51 // List of intermediate certificates trusted by this MSP; 52 // they are used upon certificate validation as follows: 53 // validation attempts to build a path from the certificate 54 // to be validated (which is at one end of the path) and 55 // one of the certs in the RootCerts field (which is at 56 // the other end of the path). If the path is longer than 57 // 2, certificates in the middle are searched within the 58 // IntermediateCerts pool 59 IntermediateCerts [][]byte `protobuf:"bytes,3,rep,name=intermediate_certs,json=intermediateCerts,proto3" json:"intermediate_certs,omitempty"` 60 // Identity denoting the administrator of this MSP 61 Admins [][]byte `protobuf:"bytes,4,rep,name=admins,proto3" json:"admins,omitempty"` 62 // Identity revocation list 63 RevocationList [][]byte `protobuf:"bytes,5,rep,name=revocation_list,json=revocationList,proto3" json:"revocation_list,omitempty"` 64 // SigningIdentity holds information on the signing identity 65 // this peer is to use, and which is to be imported by the 66 // MSP defined before 67 SigningIdentity *SigningIdentityInfo `protobuf:"bytes,6,opt,name=signing_identity,json=signingIdentity" json:"signing_identity,omitempty"` 68 // OrganizationalUnitIdentifiers holds one or more 69 // fabric organizational unit identifiers that belong to 70 // this MSP configuration 71 OrganizationalUnitIdentifiers []*FabricOUIdentifier `protobuf:"bytes,7,rep,name=organizational_unit_identifiers,json=organizationalUnitIdentifiers" json:"organizational_unit_identifiers,omitempty"` 72 // FabricCryptoConfig contains the configuration parameters 73 // for the cryptographic algorithms used by this MSP 74 CryptoConfig *FabricCryptoConfig `protobuf:"bytes,8,opt,name=crypto_config,json=cryptoConfig" json:"crypto_config,omitempty"` 75 } 76 77 func (m *FabricMSPConfig) Reset() { *m = FabricMSPConfig{} } 78 func (m *FabricMSPConfig) String() string { return proto.CompactTextString(m) } 79 func (*FabricMSPConfig) ProtoMessage() {} 80 func (*FabricMSPConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{1} } 81 82 func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo { 83 if m != nil { 84 return m.SigningIdentity 85 } 86 return nil 87 } 88 89 func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier { 90 if m != nil { 91 return m.OrganizationalUnitIdentifiers 92 } 93 return nil 94 } 95 96 func (m *FabricMSPConfig) GetCryptoConfig() *FabricCryptoConfig { 97 if m != nil { 98 return m.CryptoConfig 99 } 100 return nil 101 } 102 103 // FabricCryptoConfig contains configuration parameters 104 // for the cryptographic algorithms used by the MSP 105 // this configuration refers to 106 type FabricCryptoConfig struct { 107 // SignatureHashFamily is a string representing the hash family to be used 108 // during sign and verify operations. 109 // Allowed values are "SHA2" and "SHA3". 110 SignatureHashFamily string `protobuf:"bytes,1,opt,name=signature_hash_family,json=signatureHashFamily" json:"signature_hash_family,omitempty"` 111 // IdentityIdentifierHashFunction is a string representing the hash function 112 // to be used during the computation of the identity identifier of an MSP identity. 113 // Allowed values are "SHA256", "SHA384" and "SHA3_256", "SHA3_384". 114 IdentityIdentifierHashFunction string `protobuf:"bytes,2,opt,name=identity_identifier_hash_function,json=identityIdentifierHashFunction" json:"identity_identifier_hash_function,omitempty"` 115 } 116 117 func (m *FabricCryptoConfig) Reset() { *m = FabricCryptoConfig{} } 118 func (m *FabricCryptoConfig) String() string { return proto.CompactTextString(m) } 119 func (*FabricCryptoConfig) ProtoMessage() {} 120 func (*FabricCryptoConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{2} } 121 122 // SigningIdentityInfo represents the configuration information 123 // related to the signing identity the peer is to use for generating 124 // endorsements 125 type SigningIdentityInfo struct { 126 // PublicSigner carries the public information of the signing 127 // identity. For an X.509 provider this would be represented by 128 // an X.509 certificate 129 PublicSigner []byte `protobuf:"bytes,1,opt,name=public_signer,json=publicSigner,proto3" json:"public_signer,omitempty"` 130 // PrivateSigner denotes a reference to the private key of the 131 // peer's signing identity 132 PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=private_signer,json=privateSigner" json:"private_signer,omitempty"` 133 } 134 135 func (m *SigningIdentityInfo) Reset() { *m = SigningIdentityInfo{} } 136 func (m *SigningIdentityInfo) String() string { return proto.CompactTextString(m) } 137 func (*SigningIdentityInfo) ProtoMessage() {} 138 func (*SigningIdentityInfo) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{3} } 139 140 func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo { 141 if m != nil { 142 return m.PrivateSigner 143 } 144 return nil 145 } 146 147 // KeyInfo represents a (secret) key that is either already stored 148 // in the bccsp/keystore or key material to be imported to the 149 // bccsp key-store. In later versions it may contain also a 150 // keystore identifier 151 type KeyInfo struct { 152 // Identifier of the key inside the default keystore; this for 153 // the case of Software BCCSP as well as the HSM BCCSP would be 154 // the SKI of the key 155 KeyIdentifier string `protobuf:"bytes,1,opt,name=key_identifier,json=keyIdentifier" json:"key_identifier,omitempty"` 156 // KeyMaterial (optional) for the key to be imported; this is 157 // properly encoded key bytes, prefixed by the type of the key 158 KeyMaterial []byte `protobuf:"bytes,2,opt,name=key_material,json=keyMaterial,proto3" json:"key_material,omitempty"` 159 } 160 161 func (m *KeyInfo) Reset() { *m = KeyInfo{} } 162 func (m *KeyInfo) String() string { return proto.CompactTextString(m) } 163 func (*KeyInfo) ProtoMessage() {} 164 func (*KeyInfo) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{4} } 165 166 // FabricOUIdentifier represents an organizazional unit and 167 // its related chain of trust identifier. 168 type FabricOUIdentifier struct { 169 // CertifiersIdentifier is the hash of certificates chain of trust 170 // related to this organizational unit 171 CertifiersIdentifier []byte `protobuf:"bytes,1,opt,name=certifiers_identifier,json=certifiersIdentifier,proto3" json:"certifiers_identifier,omitempty"` 172 // OrganizationUnitIdentifier defines the organizational unit under the 173 // MSP identified with MSPIdentifier 174 OrganizationalUnitIdentifier string `protobuf:"bytes,2,opt,name=organizational_unit_identifier,json=organizationalUnitIdentifier" json:"organizational_unit_identifier,omitempty"` 175 } 176 177 func (m *FabricOUIdentifier) Reset() { *m = FabricOUIdentifier{} } 178 func (m *FabricOUIdentifier) String() string { return proto.CompactTextString(m) } 179 func (*FabricOUIdentifier) ProtoMessage() {} 180 func (*FabricOUIdentifier) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{5} } 181 182 func init() { 183 proto.RegisterType((*MSPConfig)(nil), "msp.MSPConfig") 184 proto.RegisterType((*FabricMSPConfig)(nil), "msp.FabricMSPConfig") 185 proto.RegisterType((*FabricCryptoConfig)(nil), "msp.FabricCryptoConfig") 186 proto.RegisterType((*SigningIdentityInfo)(nil), "msp.SigningIdentityInfo") 187 proto.RegisterType((*KeyInfo)(nil), "msp.KeyInfo") 188 proto.RegisterType((*FabricOUIdentifier)(nil), "msp.FabricOUIdentifier") 189 } 190 191 func init() { proto.RegisterFile("msp/msp_config.proto", fileDescriptor1) } 192 193 var fileDescriptor1 = []byte{ 194 // 568 bytes of a gzipped FileDescriptorProto 195 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x09, 0x6e, 0x88, 0x02, 0xff, 0x7c, 0x54, 0xcf, 0x6f, 0xda, 0x30, 196 0x14, 0x16, 0xd0, 0xd2, 0xf1, 0x08, 0xd0, 0xb9, 0x3f, 0x96, 0xc3, 0xda, 0x41, 0xa6, 0x69, 0xb9, 197 0x2c, 0x48, 0x70, 0xd8, 0x65, 0xa7, 0x32, 0x55, 0x43, 0x1b, 0x5a, 0x15, 0xd4, 0xcb, 0x2e, 0x91, 198 0x09, 0x26, 0x58, 0x24, 0x76, 0x64, 0x9b, 0x4a, 0xd9, 0x3f, 0xb1, 0xc3, 0x2e, 0xfb, 0x73, 0xa7, 199 0xd8, 0x2e, 0x84, 0xad, 0xea, 0xcd, 0x7e, 0xdf, 0xf7, 0x3d, 0xbf, 0xf7, 0xbd, 0x97, 0xc0, 0x79, 200 0x26, 0xf3, 0x61, 0x26, 0xf3, 0x28, 0xe6, 0x6c, 0x45, 0x93, 0x20, 0x17, 0x5c, 0x71, 0xd4, 0xc8, 201 0x64, 0xee, 0x7d, 0x84, 0xd6, 0x6c, 0x7e, 0x37, 0xd1, 0x71, 0x84, 0xe0, 0x48, 0x15, 0x39, 0x71, 202 0x6b, 0xfd, 0x9a, 0x7f, 0x1c, 0xea, 0x33, 0xba, 0x84, 0xa6, 0x51, 0xb9, 0xf5, 0x7e, 0xcd, 0x77, 203 0x42, 0x7b, 0xf3, 0xfe, 0x34, 0xa0, 0x77, 0x8b, 0x17, 0x82, 0xc6, 0x07, 0x7a, 0x86, 0x33, 0xa3, 204 0x6f, 0x85, 0xfa, 0x8c, 0xae, 0x00, 0x04, 0xe7, 0x2a, 0x8a, 0x89, 0x50, 0xd2, 0xad, 0xf7, 0x1b, 205 0xbe, 0x13, 0xb6, 0xca, 0xc8, 0xa4, 0x0c, 0xa0, 0x0f, 0x80, 0x28, 0x53, 0x44, 0x64, 0x64, 0x49, 206 0xb1, 0x22, 0x96, 0xd6, 0xd0, 0xb4, 0x97, 0x55, 0xc4, 0xd0, 0x2f, 0xa1, 0x89, 0x97, 0x19, 0x65, 207 0xd2, 0x3d, 0xd2, 0x14, 0x7b, 0x43, 0xef, 0xa1, 0x27, 0xc8, 0x03, 0x8f, 0xb1, 0xa2, 0x9c, 0x45, 208 0x29, 0x95, 0xca, 0x3d, 0xd6, 0x84, 0xee, 0x3e, 0xfc, 0x8d, 0x4a, 0x85, 0x26, 0x70, 0x2a, 0x69, 209 0xc2, 0x28, 0x4b, 0x22, 0xba, 0x24, 0x4c, 0x51, 0x55, 0xb8, 0xcd, 0x7e, 0xcd, 0x6f, 0x8f, 0xdc, 210 0x20, 0x93, 0x79, 0x30, 0x37, 0xe0, 0xd4, 0x62, 0x53, 0xb6, 0xe2, 0x61, 0x4f, 0x1e, 0x06, 0x51, 211 0x04, 0x6f, 0xb8, 0x48, 0x30, 0xa3, 0x3f, 0x75, 0x62, 0x9c, 0x46, 0x5b, 0x46, 0x95, 0x4d, 0xb8, 212 0xa2, 0x44, 0x48, 0xf7, 0xa4, 0xdf, 0xf0, 0xdb, 0xa3, 0x57, 0x3a, 0xa7, 0xb1, 0xe9, 0xfb, 0xfd, 213 0x74, 0x87, 0x87, 0x57, 0x87, 0xfa, 0x7b, 0x46, 0xd5, 0x1e, 0x95, 0xe8, 0x13, 0x74, 0x62, 0x51, 214 0xe4, 0x8a, 0xdb, 0x89, 0xb9, 0x2f, 0x74, 0x89, 0xd5, 0x74, 0x13, 0x8d, 0x1b, 0xe3, 0x43, 0x27, 215 0xae, 0xdc, 0xbc, 0xdf, 0x35, 0x40, 0xff, 0x93, 0xd0, 0x08, 0x2e, 0xca, 0x46, 0xb0, 0xda, 0x0a, 216 0x12, 0xad, 0xb1, 0x5c, 0x47, 0x2b, 0x9c, 0xd1, 0xb4, 0xb0, 0xe3, 0x3a, 0xdb, 0x81, 0x5f, 0xb0, 217 0x5c, 0xdf, 0x6a, 0x08, 0x4d, 0x61, 0xf0, 0x68, 0x53, 0xa5, 0x3d, 0xab, 0xde, 0xb2, 0xb8, 0x2c, 218 0x5f, 0x2f, 0x46, 0x2b, 0xbc, 0x7e, 0x24, 0xee, 0x1b, 0xd1, 0x89, 0x2c, 0xcb, 0xe3, 0x70, 0xf6, 219 0x84, 0xb9, 0xe8, 0x2d, 0x74, 0xf2, 0xed, 0x22, 0xa5, 0x71, 0x54, 0xbe, 0x4f, 0x84, 0xae, 0xc6, 220 0x09, 0x1d, 0x13, 0x9c, 0xeb, 0x18, 0x1a, 0x43, 0x37, 0x17, 0xf4, 0xa1, 0x5c, 0x10, 0xcb, 0xaa, 221 0x6b, 0x43, 0x1c, 0x6d, 0xc8, 0x57, 0x62, 0xe6, 0xd4, 0xb1, 0x1c, 0x23, 0xf2, 0xe6, 0x70, 0x62, 222 0x11, 0xf4, 0x0e, 0xba, 0x1b, 0x52, 0xed, 0xc0, 0xf6, 0xdc, 0xd9, 0x90, 0x4a, 0xb9, 0x68, 0x00, 223 0x4e, 0x49, 0xcb, 0xb0, 0x22, 0x82, 0xe2, 0xd4, 0x6e, 0x7c, 0x7b, 0x43, 0x8a, 0x99, 0x0d, 0x79, 224 0xbf, 0x76, 0xde, 0x56, 0xe7, 0x89, 0xc6, 0x70, 0x51, 0x6e, 0xae, 0x19, 0xdf, 0xbf, 0xef, 0x38, 225 0xe1, 0xf9, 0x1e, 0xac, 0x88, 0x3e, 0xc3, 0xf5, 0xf3, 0x6b, 0x64, 0x9d, 0x7d, 0xfd, 0xdc, 0xb2, 226 0xdc, 0x44, 0x30, 0xe0, 0x22, 0x09, 0xd6, 0x45, 0x4e, 0x44, 0x4a, 0x96, 0x09, 0x11, 0xc1, 0x4a, 227 0x17, 0x68, 0x3e, 0x73, 0x59, 0x5a, 0x74, 0x73, 0x3a, 0x93, 0xb9, 0x59, 0x83, 0x3b, 0x1c, 0x6f, 228 0x70, 0x42, 0x7e, 0xf8, 0x09, 0x55, 0xeb, 0xed, 0x22, 0x88, 0x79, 0x36, 0xac, 0x68, 0x87, 0x46, 229 0x3b, 0x34, 0xda, 0xf2, 0xa7, 0xb1, 0x68, 0xea, 0xf3, 0xf8, 0x6f, 0x00, 0x00, 0x00, 0xff, 0xff, 230 0x1a, 0x51, 0x36, 0xed, 0x46, 0x04, 0x00, 0x00, 231 }