github.com/tenywen/fabric@v1.0.0-beta.0.20170620030522-a5b1ed380643/protos/msp/msp_config.pb.go (about) 1 // Code generated by protoc-gen-go. DO NOT EDIT. 2 // source: msp/msp_config.proto 3 4 package msp 5 6 import proto "github.com/golang/protobuf/proto" 7 import fmt "fmt" 8 import math "math" 9 10 // Reference imports to suppress errors if they are not otherwise used. 11 var _ = proto.Marshal 12 var _ = fmt.Errorf 13 var _ = math.Inf 14 15 // MSPConfig collects all the configuration information for 16 // an MSP. The Config field should be unmarshalled in a way 17 // that depends on the Type 18 type MSPConfig struct { 19 // Type holds the type of the MSP; the default one would 20 // be of type FABRIC implementing an X.509 based provider 21 Type int32 `protobuf:"varint,1,opt,name=type" json:"type,omitempty"` 22 // Config is MSP dependent configuration info 23 Config []byte `protobuf:"bytes,2,opt,name=config,proto3" json:"config,omitempty"` 24 } 25 26 func (m *MSPConfig) Reset() { *m = MSPConfig{} } 27 func (m *MSPConfig) String() string { return proto.CompactTextString(m) } 28 func (*MSPConfig) ProtoMessage() {} 29 func (*MSPConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{0} } 30 31 func (m *MSPConfig) GetType() int32 { 32 if m != nil { 33 return m.Type 34 } 35 return 0 36 } 37 38 func (m *MSPConfig) GetConfig() []byte { 39 if m != nil { 40 return m.Config 41 } 42 return nil 43 } 44 45 // FabricMSPConfig collects all the configuration information for 46 // a Fabric MSP. 47 // Here we assume a default certificate validation policy, where 48 // any certificate signed by any of the listed rootCA certs would 49 // be considered as valid under this MSP. 50 // This MSP may or may not come with a signing identity. If it does, 51 // it can also issue signing identities. If it does not, it can only 52 // be used to validate and verify certificates. 53 type FabricMSPConfig struct { 54 // Name holds the identifier of the MSP; MSP identifier 55 // is chosen by the application that governs this MSP. 56 // For example, and assuming the default implementation of MSP, 57 // that is X.509-based and considers a single Issuer, 58 // this can refer to the Subject OU field or the Issuer OU field. 59 Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"` 60 // List of root certificates trusted by this MSP 61 // they are used upon certificate validation (see 62 // comment for IntermediateCerts below) 63 RootCerts [][]byte `protobuf:"bytes,2,rep,name=root_certs,json=rootCerts,proto3" json:"root_certs,omitempty"` 64 // List of intermediate certificates trusted by this MSP; 65 // they are used upon certificate validation as follows: 66 // validation attempts to build a path from the certificate 67 // to be validated (which is at one end of the path) and 68 // one of the certs in the RootCerts field (which is at 69 // the other end of the path). If the path is longer than 70 // 2, certificates in the middle are searched within the 71 // IntermediateCerts pool 72 IntermediateCerts [][]byte `protobuf:"bytes,3,rep,name=intermediate_certs,json=intermediateCerts,proto3" json:"intermediate_certs,omitempty"` 73 // Identity denoting the administrator of this MSP 74 Admins [][]byte `protobuf:"bytes,4,rep,name=admins,proto3" json:"admins,omitempty"` 75 // Identity revocation list 76 RevocationList [][]byte `protobuf:"bytes,5,rep,name=revocation_list,json=revocationList,proto3" json:"revocation_list,omitempty"` 77 // SigningIdentity holds information on the signing identity 78 // this peer is to use, and which is to be imported by the 79 // MSP defined before 80 SigningIdentity *SigningIdentityInfo `protobuf:"bytes,6,opt,name=signing_identity,json=signingIdentity" json:"signing_identity,omitempty"` 81 // OrganizationalUnitIdentifiers holds one or more 82 // fabric organizational unit identifiers that belong to 83 // this MSP configuration 84 OrganizationalUnitIdentifiers []*FabricOUIdentifier `protobuf:"bytes,7,rep,name=organizational_unit_identifiers,json=organizationalUnitIdentifiers" json:"organizational_unit_identifiers,omitempty"` 85 // FabricCryptoConfig contains the configuration parameters 86 // for the cryptographic algorithms used by this MSP 87 CryptoConfig *FabricCryptoConfig `protobuf:"bytes,8,opt,name=crypto_config,json=cryptoConfig" json:"crypto_config,omitempty"` 88 } 89 90 func (m *FabricMSPConfig) Reset() { *m = FabricMSPConfig{} } 91 func (m *FabricMSPConfig) String() string { return proto.CompactTextString(m) } 92 func (*FabricMSPConfig) ProtoMessage() {} 93 func (*FabricMSPConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{1} } 94 95 func (m *FabricMSPConfig) GetName() string { 96 if m != nil { 97 return m.Name 98 } 99 return "" 100 } 101 102 func (m *FabricMSPConfig) GetRootCerts() [][]byte { 103 if m != nil { 104 return m.RootCerts 105 } 106 return nil 107 } 108 109 func (m *FabricMSPConfig) GetIntermediateCerts() [][]byte { 110 if m != nil { 111 return m.IntermediateCerts 112 } 113 return nil 114 } 115 116 func (m *FabricMSPConfig) GetAdmins() [][]byte { 117 if m != nil { 118 return m.Admins 119 } 120 return nil 121 } 122 123 func (m *FabricMSPConfig) GetRevocationList() [][]byte { 124 if m != nil { 125 return m.RevocationList 126 } 127 return nil 128 } 129 130 func (m *FabricMSPConfig) GetSigningIdentity() *SigningIdentityInfo { 131 if m != nil { 132 return m.SigningIdentity 133 } 134 return nil 135 } 136 137 func (m *FabricMSPConfig) GetOrganizationalUnitIdentifiers() []*FabricOUIdentifier { 138 if m != nil { 139 return m.OrganizationalUnitIdentifiers 140 } 141 return nil 142 } 143 144 func (m *FabricMSPConfig) GetCryptoConfig() *FabricCryptoConfig { 145 if m != nil { 146 return m.CryptoConfig 147 } 148 return nil 149 } 150 151 // FabricCryptoConfig contains configuration parameters 152 // for the cryptographic algorithms used by the MSP 153 // this configuration refers to 154 type FabricCryptoConfig struct { 155 // SignatureHashFamily is a string representing the hash family to be used 156 // during sign and verify operations. 157 // Allowed values are "SHA2" and "SHA3". 158 SignatureHashFamily string `protobuf:"bytes,1,opt,name=signature_hash_family,json=signatureHashFamily" json:"signature_hash_family,omitempty"` 159 // IdentityIdentifierHashFunction is a string representing the hash function 160 // to be used during the computation of the identity identifier of an MSP identity. 161 // Allowed values are "SHA256", "SHA384" and "SHA3_256", "SHA3_384". 162 IdentityIdentifierHashFunction string `protobuf:"bytes,2,opt,name=identity_identifier_hash_function,json=identityIdentifierHashFunction" json:"identity_identifier_hash_function,omitempty"` 163 } 164 165 func (m *FabricCryptoConfig) Reset() { *m = FabricCryptoConfig{} } 166 func (m *FabricCryptoConfig) String() string { return proto.CompactTextString(m) } 167 func (*FabricCryptoConfig) ProtoMessage() {} 168 func (*FabricCryptoConfig) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{2} } 169 170 func (m *FabricCryptoConfig) GetSignatureHashFamily() string { 171 if m != nil { 172 return m.SignatureHashFamily 173 } 174 return "" 175 } 176 177 func (m *FabricCryptoConfig) GetIdentityIdentifierHashFunction() string { 178 if m != nil { 179 return m.IdentityIdentifierHashFunction 180 } 181 return "" 182 } 183 184 // SigningIdentityInfo represents the configuration information 185 // related to the signing identity the peer is to use for generating 186 // endorsements 187 type SigningIdentityInfo struct { 188 // PublicSigner carries the public information of the signing 189 // identity. For an X.509 provider this would be represented by 190 // an X.509 certificate 191 PublicSigner []byte `protobuf:"bytes,1,opt,name=public_signer,json=publicSigner,proto3" json:"public_signer,omitempty"` 192 // PrivateSigner denotes a reference to the private key of the 193 // peer's signing identity 194 PrivateSigner *KeyInfo `protobuf:"bytes,2,opt,name=private_signer,json=privateSigner" json:"private_signer,omitempty"` 195 } 196 197 func (m *SigningIdentityInfo) Reset() { *m = SigningIdentityInfo{} } 198 func (m *SigningIdentityInfo) String() string { return proto.CompactTextString(m) } 199 func (*SigningIdentityInfo) ProtoMessage() {} 200 func (*SigningIdentityInfo) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{3} } 201 202 func (m *SigningIdentityInfo) GetPublicSigner() []byte { 203 if m != nil { 204 return m.PublicSigner 205 } 206 return nil 207 } 208 209 func (m *SigningIdentityInfo) GetPrivateSigner() *KeyInfo { 210 if m != nil { 211 return m.PrivateSigner 212 } 213 return nil 214 } 215 216 // KeyInfo represents a (secret) key that is either already stored 217 // in the bccsp/keystore or key material to be imported to the 218 // bccsp key-store. In later versions it may contain also a 219 // keystore identifier 220 type KeyInfo struct { 221 // Identifier of the key inside the default keystore; this for 222 // the case of Software BCCSP as well as the HSM BCCSP would be 223 // the SKI of the key 224 KeyIdentifier string `protobuf:"bytes,1,opt,name=key_identifier,json=keyIdentifier" json:"key_identifier,omitempty"` 225 // KeyMaterial (optional) for the key to be imported; this is 226 // properly encoded key bytes, prefixed by the type of the key 227 KeyMaterial []byte `protobuf:"bytes,2,opt,name=key_material,json=keyMaterial,proto3" json:"key_material,omitempty"` 228 } 229 230 func (m *KeyInfo) Reset() { *m = KeyInfo{} } 231 func (m *KeyInfo) String() string { return proto.CompactTextString(m) } 232 func (*KeyInfo) ProtoMessage() {} 233 func (*KeyInfo) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{4} } 234 235 func (m *KeyInfo) GetKeyIdentifier() string { 236 if m != nil { 237 return m.KeyIdentifier 238 } 239 return "" 240 } 241 242 func (m *KeyInfo) GetKeyMaterial() []byte { 243 if m != nil { 244 return m.KeyMaterial 245 } 246 return nil 247 } 248 249 // FabricOUIdentifier represents an organizational unit and 250 // its related chain of trust identifier. 251 type FabricOUIdentifier struct { 252 // Certificate represents the second certificate in a certification chain. 253 // (Notice that the first certificate in a certification chain is supposed 254 // to be the certificate of an identity). 255 // It must correspond to the certificate of root or intermediate CA 256 // recognized by the MSP this message belongs to. 257 // Starting from this certificate, a certification chain is computed 258 // and boud to the OrganizationUnitIdentifier specified 259 Certificate []byte `protobuf:"bytes,1,opt,name=certificate,proto3" json:"certificate,omitempty"` 260 // OrganizationUnitIdentifier defines the organizational unit under the 261 // MSP identified with MSPIdentifier 262 OrganizationalUnitIdentifier string `protobuf:"bytes,2,opt,name=organizational_unit_identifier,json=organizationalUnitIdentifier" json:"organizational_unit_identifier,omitempty"` 263 } 264 265 func (m *FabricOUIdentifier) Reset() { *m = FabricOUIdentifier{} } 266 func (m *FabricOUIdentifier) String() string { return proto.CompactTextString(m) } 267 func (*FabricOUIdentifier) ProtoMessage() {} 268 func (*FabricOUIdentifier) Descriptor() ([]byte, []int) { return fileDescriptor1, []int{5} } 269 270 func (m *FabricOUIdentifier) GetCertificate() []byte { 271 if m != nil { 272 return m.Certificate 273 } 274 return nil 275 } 276 277 func (m *FabricOUIdentifier) GetOrganizationalUnitIdentifier() string { 278 if m != nil { 279 return m.OrganizationalUnitIdentifier 280 } 281 return "" 282 } 283 284 func init() { 285 proto.RegisterType((*MSPConfig)(nil), "msp.MSPConfig") 286 proto.RegisterType((*FabricMSPConfig)(nil), "msp.FabricMSPConfig") 287 proto.RegisterType((*FabricCryptoConfig)(nil), "msp.FabricCryptoConfig") 288 proto.RegisterType((*SigningIdentityInfo)(nil), "msp.SigningIdentityInfo") 289 proto.RegisterType((*KeyInfo)(nil), "msp.KeyInfo") 290 proto.RegisterType((*FabricOUIdentifier)(nil), "msp.FabricOUIdentifier") 291 } 292 293 func init() { proto.RegisterFile("msp/msp_config.proto", fileDescriptor1) } 294 295 var fileDescriptor1 = []byte{ 296 // 564 bytes of a gzipped FileDescriptorProto 297 0x1f, 0x8b, 0x08, 0x00, 0x00, 0x09, 0x6e, 0x88, 0x02, 0xff, 0x7c, 0x54, 0x4f, 0x6f, 0xd3, 0x30, 298 0x14, 0x57, 0xd7, 0xad, 0xa3, 0xaf, 0x69, 0x3b, 0x3c, 0x18, 0x39, 0xb0, 0x91, 0x06, 0x21, 0x72, 299 0x21, 0x95, 0xba, 0x03, 0x17, 0x4e, 0x2b, 0x9a, 0xa8, 0xa0, 0x62, 0x4a, 0xb5, 0x0b, 0x97, 0xc8, 300 0x4d, 0x9d, 0xd4, 0x6a, 0x62, 0x47, 0xb6, 0x3b, 0x29, 0x88, 0x6f, 0xc1, 0x85, 0x8f, 0x8b, 0x62, 301 0xbb, 0x6b, 0x2a, 0xd0, 0x6e, 0xf6, 0xef, 0x8f, 0xfb, 0xde, 0xef, 0xbd, 0x06, 0x5e, 0x14, 0xb2, 302 0x1c, 0x17, 0xb2, 0x8c, 0x13, 0xce, 0x52, 0x9a, 0x85, 0xa5, 0xe0, 0x8a, 0xa3, 0x76, 0x21, 0x4b, 303 0xff, 0x23, 0x74, 0xe7, 0x8b, 0xbb, 0xa9, 0xc6, 0x11, 0x82, 0x63, 0x55, 0x95, 0xc4, 0x6d, 0x79, 304 0xad, 0xe0, 0x24, 0xd2, 0x67, 0x74, 0x01, 0x1d, 0xe3, 0x72, 0x8f, 0xbc, 0x56, 0xe0, 0x44, 0xf6, 305 0xe6, 0xff, 0x69, 0xc3, 0xf0, 0x16, 0x2f, 0x05, 0x4d, 0x0e, 0xfc, 0x0c, 0x17, 0xc6, 0xdf, 0x8d, 306 0xf4, 0x19, 0x5d, 0x02, 0x08, 0xce, 0x55, 0x9c, 0x10, 0xa1, 0xa4, 0x7b, 0xe4, 0xb5, 0x03, 0x27, 307 0xea, 0xd6, 0xc8, 0xb4, 0x06, 0xd0, 0x07, 0x40, 0x94, 0x29, 0x22, 0x0a, 0xb2, 0xa2, 0x58, 0x11, 308 0x2b, 0x6b, 0x6b, 0xd9, 0xf3, 0x26, 0x63, 0xe4, 0x17, 0xd0, 0xc1, 0xab, 0x82, 0x32, 0xe9, 0x1e, 309 0x6b, 0x89, 0xbd, 0xa1, 0xf7, 0x30, 0x14, 0xe4, 0x81, 0x27, 0x58, 0x51, 0xce, 0xe2, 0x9c, 0x4a, 310 0xe5, 0x9e, 0x68, 0xc1, 0x60, 0x0f, 0x7f, 0xa3, 0x52, 0xa1, 0x29, 0x9c, 0x49, 0x9a, 0x31, 0xca, 311 0xb2, 0x98, 0xae, 0x08, 0x53, 0x54, 0x55, 0x6e, 0xc7, 0x6b, 0x05, 0xbd, 0x89, 0x1b, 0x16, 0xb2, 312 0x0c, 0x17, 0x86, 0x9c, 0x59, 0x6e, 0xc6, 0x52, 0x1e, 0x0d, 0xe5, 0x21, 0x88, 0x62, 0x78, 0xc3, 313 0x45, 0x86, 0x19, 0xfd, 0xa9, 0x1f, 0xc6, 0x79, 0xbc, 0x65, 0x54, 0xd9, 0x07, 0x53, 0x4a, 0x84, 314 0x74, 0x4f, 0xbd, 0x76, 0xd0, 0x9b, 0xbc, 0xd2, 0x6f, 0x9a, 0x98, 0xbe, 0xdf, 0xcf, 0x1e, 0xf9, 315 0xe8, 0xf2, 0xd0, 0x7f, 0xcf, 0xa8, 0xda, 0xb3, 0x12, 0x7d, 0x82, 0x7e, 0x22, 0xaa, 0x52, 0x71, 316 0x3b, 0x31, 0xf7, 0x99, 0x2e, 0xb1, 0xf9, 0xdc, 0x54, 0xf3, 0x26, 0xf8, 0xc8, 0x49, 0x1a, 0x37, 317 0xff, 0x77, 0x0b, 0xd0, 0xbf, 0x22, 0x34, 0x81, 0x97, 0x75, 0x23, 0x58, 0x6d, 0x05, 0x89, 0xd7, 318 0x58, 0xae, 0xe3, 0x14, 0x17, 0x34, 0xaf, 0xec, 0xb8, 0xce, 0x1f, 0xc9, 0x2f, 0x58, 0xae, 0x6f, 319 0x35, 0x85, 0x66, 0x30, 0xda, 0xc5, 0xd4, 0x68, 0xcf, 0xba, 0xb7, 0x2c, 0xa9, 0xcb, 0xd7, 0x8b, 320 0xd1, 0x8d, 0xae, 0x76, 0xc2, 0x7d, 0x23, 0xfa, 0x21, 0xab, 0xf2, 0x39, 0x9c, 0xff, 0x27, 0x5c, 321 0xf4, 0x16, 0xfa, 0xe5, 0x76, 0x99, 0xd3, 0x24, 0xae, 0x7f, 0x9f, 0x08, 0x5d, 0x8d, 0x13, 0x39, 322 0x06, 0x5c, 0x68, 0x0c, 0x5d, 0xc3, 0xa0, 0x14, 0xf4, 0xa1, 0x5e, 0x10, 0xab, 0x3a, 0xd2, 0x81, 323 0x38, 0x3a, 0x90, 0xaf, 0xc4, 0xcc, 0xa9, 0x6f, 0x35, 0xc6, 0xe4, 0x2f, 0xe0, 0xd4, 0x32, 0xe8, 324 0x1d, 0x0c, 0x36, 0xa4, 0xd9, 0x81, 0xed, 0xb9, 0xbf, 0x21, 0x8d, 0x72, 0xd1, 0x08, 0x9c, 0x5a, 325 0x56, 0x60, 0x45, 0x04, 0xc5, 0xb9, 0xdd, 0xf8, 0xde, 0x86, 0x54, 0x73, 0x0b, 0xf9, 0xbf, 0x76, 326 0xd1, 0x36, 0xc7, 0x89, 0x3c, 0xe8, 0xd5, 0x8b, 0x4b, 0x53, 0x9a, 0x60, 0x45, 0x6c, 0x0b, 0x4d, 327 0x08, 0x7d, 0x86, 0xab, 0xa7, 0x57, 0xc6, 0xa6, 0xf8, 0xfa, 0xa9, 0xc5, 0xb8, 0x89, 0x61, 0xc4, 328 0x45, 0x16, 0xae, 0xab, 0x92, 0x88, 0x9c, 0xac, 0x32, 0x22, 0xc2, 0x54, 0x57, 0x63, 0xfe, 0xd2, 329 0xb2, 0x8e, 0xe3, 0xe6, 0x6c, 0x2e, 0x4b, 0x33, 0xf2, 0x3b, 0x9c, 0x6c, 0x70, 0x46, 0x7e, 0x04, 330 0x19, 0x55, 0xeb, 0xed, 0x32, 0x4c, 0x78, 0x31, 0x6e, 0x78, 0xc7, 0xc6, 0x3b, 0x36, 0xde, 0xfa, 331 0x03, 0xb1, 0xec, 0xe8, 0xf3, 0xf5, 0xdf, 0x00, 0x00, 0x00, 0xff, 0xff, 0x44, 0x2c, 0x25, 0xec, 332 0x32, 0x04, 0x00, 0x00, 333 }