Commit 959811e7 authored by yacovm's avatar yacovm
Browse files

[FAB-10293] Make MSP protos conform to official style



This change set makes the MSP protos conform to the official proto style

Change-Id: I766cc341833279fcd4149aeea124978145595fed
Signed-off-by: default avataryacovm <yacovm@il.ibm.com>
parent 6528c9db
......@@ -45,7 +45,7 @@ func TestIdemixIdentityExpiresAt(t *testing.T) {
idemixId := &msp.SerializedIdemixIdentity{
NymX: []byte{1, 2, 3},
NymY: []byte{1, 2, 3},
OU: []byte("OU1"),
Ou: []byte("OU1"),
}
idemixBytes, err := proto.Marshal(idemixId)
assert.NoError(t, err)
......
......@@ -46,7 +46,7 @@ func createIdemixIdentity(t *testing.T) []byte {
idemixId := &msp.SerializedIdemixIdentity{
NymX: []byte{1, 2, 3},
NymY: []byte{1, 2, 3},
OU: []byte("OU1"),
Ou: []byte("OU1"),
}
idemixBytes, err := proto.Marshal(idemixId)
assert.NoError(t, err)
......
......@@ -301,8 +301,8 @@ func getMspConfig(dir string, ID string, sigid *msp.SigningIdentityInfo) (*msp.M
nodeOUs = &msp.FabricNodeOUs{
Enable: configuration.NodeOUs.Enable,
ClientOUIdentifier: &msp.FabricOUIdentifier{OrganizationalUnitIdentifier: configuration.NodeOUs.ClientOUIdentifier.OrganizationalUnitIdentifier},
PeerOUIdentifier: &msp.FabricOUIdentifier{OrganizationalUnitIdentifier: configuration.NodeOUs.PeerOUIdentifier.OrganizationalUnitIdentifier},
ClientOuIdentifier: &msp.FabricOUIdentifier{OrganizationalUnitIdentifier: configuration.NodeOUs.ClientOUIdentifier.OrganizationalUnitIdentifier},
PeerOuIdentifier: &msp.FabricOUIdentifier{OrganizationalUnitIdentifier: configuration.NodeOUs.PeerOUIdentifier.OrganizationalUnitIdentifier},
}
// Read certificates, if defined
......@@ -313,7 +313,7 @@ func getMspConfig(dir string, ID string, sigid *msp.SigningIdentityInfo) (*msp.M
if err != nil {
mspLogger.Infof("Failed loading ClientOU certificate at [%s]: [%s]", f, err)
} else {
nodeOUs.ClientOUIdentifier.Certificate = raw
nodeOUs.ClientOuIdentifier.Certificate = raw
}
// PeerOU
......@@ -322,7 +322,7 @@ func getMspConfig(dir string, ID string, sigid *msp.SigningIdentityInfo) (*msp.M
if err != nil {
mspLogger.Debugf("Failed loading PeerOU certificate at [%s]: [%s]", f, err)
} else {
nodeOUs.PeerOUIdentifier.Certificate = raw
nodeOUs.PeerOuIdentifier.Certificate = raw
}
}
} else {
......@@ -347,7 +347,7 @@ func getMspConfig(dir string, ID string, sigid *msp.SigningIdentityInfo) (*msp.M
CryptoConfig: cryptoConfig,
TlsRootCerts: tlsCACerts,
TlsIntermediateCerts: tlsIntermediateCerts,
FabricNodeOUs: nodeOUs,
FabricNodeOus: nodeOUs,
}
fmpsjs, _ := proto.Marshal(fmspconf)
......@@ -379,7 +379,7 @@ func GetIdemixMspConfig(dir string, ID string) (*msp.MSPConfig, error) {
idemixConfig := &msp.IdemixMSPConfig{
Name: ID,
IPk: ipkBytes,
Ipk: ipkBytes,
RevocationPk: revocationPkBytes,
}
......
......@@ -98,7 +98,7 @@ func (msp *idemixmsp) Setup(conf1 *m.MSPConfig) error {
mspLogger.Debugf("Setting up Idemix MSP instance %s", msp.name)
ipk := new(idemix.IssuerPublicKey)
err = proto.Unmarshal(conf.IPk, ipk)
err = proto.Unmarshal(conf.Ipk, ipk)
if err != nil {
return errors.Wrap(err, "failed to unmarshal ipk from idemix msp config")
}
......@@ -266,7 +266,7 @@ func (msp *idemixmsp) deserializeIdentityInternal(serializedID []byte) (Identity
Nym := FP256BN.NewECPbigs(FP256BN.FromBytes(serialized.NymX), FP256BN.FromBytes(serialized.NymY))
ou := &m.OrganizationUnit{}
err = proto.Unmarshal(serialized.OU, ou)
err = proto.Unmarshal(serialized.Ou, ou)
if err != nil {
return nil, errors.Wrap(err, "cannot deserialize the OU of the identity")
}
......@@ -542,7 +542,7 @@ func (id *idemixidentity) Serialize() ([]byte, error) {
return nil, errors.Wrapf(err, "could not marshal role of identity %s", id.id)
}
serialized.OU = ouBytes
serialized.Ou = ouBytes
serialized.Role = roleBytes
serialized.Proof, err = proto.Marshal(id.associationProof)
......
......@@ -97,7 +97,7 @@ func TestSetupBad(t *testing.T) {
assert.NoError(t, err)
ipkBytes, err := proto.Marshal(key.Ipk)
assert.NoError(t, err)
idemixconfig.IPk = ipkBytes
idemixconfig.Ipk = ipkBytes
idemixConfigBytes, err := proto.Marshal(idemixconfig)
assert.NoError(t, err)
......@@ -109,7 +109,7 @@ func TestSetupBad(t *testing.T) {
// Create MSP config with bad IPK bytes
ipkBytes = []byte("barf")
idemixconfig.IPk = ipkBytes
idemixconfig.Ipk = ipkBytes
idemixConfigBytes, err = proto.Marshal(idemixconfig)
assert.NoError(t, err)
......
......@@ -228,14 +228,14 @@ func (msp *bccspmsp) finalizeSetupCAs(config *m.FabricMSPConfig) error {
}
func (msp *bccspmsp) setupNodeOUs(config *m.FabricMSPConfig) error {
if config.FabricNodeOUs != nil {
if config.FabricNodeOus != nil {
msp.ouEnforcement = config.FabricNodeOUs.Enable
msp.ouEnforcement = config.FabricNodeOus.Enable
// ClientOU
msp.clientOU = &OUIdentifier{OrganizationalUnitIdentifier: config.FabricNodeOUs.ClientOUIdentifier.OrganizationalUnitIdentifier}
if len(config.FabricNodeOUs.ClientOUIdentifier.Certificate) != 0 {
certifiersIdentifier, err := msp.getCertifiersIdentifier(config.FabricNodeOUs.ClientOUIdentifier.Certificate)
msp.clientOU = &OUIdentifier{OrganizationalUnitIdentifier: config.FabricNodeOus.ClientOuIdentifier.OrganizationalUnitIdentifier}
if len(config.FabricNodeOus.ClientOuIdentifier.Certificate) != 0 {
certifiersIdentifier, err := msp.getCertifiersIdentifier(config.FabricNodeOus.ClientOuIdentifier.Certificate)
if err != nil {
return err
}
......@@ -243,9 +243,9 @@ func (msp *bccspmsp) setupNodeOUs(config *m.FabricMSPConfig) error {
}
// PeerOU
msp.peerOU = &OUIdentifier{OrganizationalUnitIdentifier: config.FabricNodeOUs.PeerOUIdentifier.OrganizationalUnitIdentifier}
if len(config.FabricNodeOUs.PeerOUIdentifier.Certificate) != 0 {
certifiersIdentifier, err := msp.getCertifiersIdentifier(config.FabricNodeOUs.PeerOUIdentifier.Certificate)
msp.peerOU = &OUIdentifier{OrganizationalUnitIdentifier: config.FabricNodeOus.PeerOuIdentifier.OrganizationalUnitIdentifier}
if len(config.FabricNodeOus.PeerOuIdentifier.Certificate) != 0 {
certifiersIdentifier, err := msp.getCertifiersIdentifier(config.FabricNodeOus.PeerOuIdentifier.Certificate)
if err != nil {
return err
}
......
......@@ -50,7 +50,7 @@ func createIdemixIdentity(t *testing.T) []byte {
idemixId := &msp.SerializedIdemixIdentity{
NymX: []byte{1, 2, 3},
NymY: []byte{1, 2, 3},
OU: []byte("OU1"),
Ou: []byte("OU1"),
}
idemixBytes, err := proto.Marshal(idemixId)
assert.NoError(t, err)
......
......@@ -78,20 +78,20 @@ func (m *SerializedIdentity) GetIdBytes() []byte {
// The IdemixMSP will first serialize an idemix identity to bytes using
// this proto, and then uses these bytes as id_bytes in SerializedIdentity
type SerializedIdemixIdentity struct {
// NymX is the X-component of the pseudonym elliptic curve point.
// nym_x is the X-component of the pseudonym elliptic curve point.
// It is a []byte representation of an amcl.BIG
// The pseudonym can be seen as a public key of the identity, it is used to verify signatures.
NymX []byte `protobuf:"bytes,1,opt,name=NymX,proto3" json:"NymX,omitempty"`
// NymY is the Y-component of the pseudonym elliptic curve point.
NymX []byte `protobuf:"bytes,1,opt,name=nym_x,json=nymX,proto3" json:"nym_x,omitempty"`
// nym_y is the Y-component of the pseudonym elliptic curve point.
// It is a []byte representation of an amcl.BIG
// The pseudonym can be seen as a public key of the identity, it is used to verify signatures.
NymY []byte `protobuf:"bytes,2,opt,name=NymY,proto3" json:"NymY,omitempty"`
// OU contains the organizational unit of the idemix identity
OU []byte `protobuf:"bytes,3,opt,name=OU,proto3" json:"OU,omitempty"`
// Role contains the role of this identity (e.g., ADMIN or MEMBER)
Role []byte `protobuf:"bytes,4,opt,name=Role,proto3" json:"Role,omitempty"`
// Proof contains the cryptographic evidence that this identity is valid
Proof []byte `protobuf:"bytes,5,opt,name=Proof,proto3" json:"Proof,omitempty"`
NymY []byte `protobuf:"bytes,2,opt,name=nym_y,json=nymY,proto3" json:"nym_y,omitempty"`
// ou contains the organizational unit of the idemix identity
Ou []byte `protobuf:"bytes,3,opt,name=ou,proto3" json:"ou,omitempty"`
// role contains the role of this identity (e.g., ADMIN or MEMBER)
Role []byte `protobuf:"bytes,4,opt,name=role,proto3" json:"role,omitempty"`
// proof contains the cryptographic evidence that this identity is valid
Proof []byte `protobuf:"bytes,5,opt,name=proof,proto3" json:"proof,omitempty"`
}
func (m *SerializedIdemixIdentity) Reset() { *m = SerializedIdemixIdentity{} }
......@@ -113,9 +113,9 @@ func (m *SerializedIdemixIdentity) GetNymY() []byte {
return nil
}
func (m *SerializedIdemixIdentity) GetOU() []byte {
func (m *SerializedIdemixIdentity) GetOu() []byte {
if m != nil {
return m.OU
return m.Ou
}
return nil
}
......@@ -142,20 +142,20 @@ func init() {
func init() { proto.RegisterFile("msp/identities.proto", fileDescriptor0) }
var fileDescriptor0 = []byte{
// 236 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x8f, 0x4f, 0x4b, 0x03, 0x31,
0x10, 0xc5, 0xd9, 0x6d, 0xeb, 0x9f, 0x50, 0x3c, 0x84, 0x1e, 0xe2, 0xad, 0xf6, 0xb4, 0xa7, 0xe4,
0xe0, 0x37, 0x28, 0x78, 0xf0, 0xa0, 0x95, 0x95, 0x82, 0x7a, 0x91, 0x6e, 0x33, 0xdd, 0x0e, 0xec,
0x98, 0x90, 0x89, 0xe0, 0x8a, 0x1f, 0x5e, 0x36, 0x59, 0xc4, 0xde, 0xde, 0x7b, 0xfc, 0xf8, 0x31,
0x23, 0x16, 0xc4, 0xde, 0xa0, 0x85, 0x8f, 0x88, 0x11, 0x81, 0xb5, 0x0f, 0x2e, 0x3a, 0x39, 0x21,
0xf6, 0xab, 0x3b, 0x21, 0x9f, 0x21, 0xe0, 0xae, 0xc3, 0x6f, 0xb0, 0xf7, 0x19, 0xe9, 0xe5, 0x42,
0xcc, 0x88, 0x3d, 0x5a, 0x55, 0x2c, 0x8b, 0xea, 0xb2, 0xce, 0x45, 0x5e, 0x8b, 0x0b, 0xb4, 0xef,
0x4d, 0x1f, 0x81, 0x55, 0xb9, 0x2c, 0xaa, 0x79, 0x7d, 0x8e, 0x76, 0x3d, 0xd4, 0xd5, 0x8f, 0x50,
0x27, 0x1a, 0xc2, 0xaf, 0x3f, 0x99, 0x14, 0xd3, 0xc7, 0x9e, 0x5e, 0x92, 0x6b, 0x5e, 0xa7, 0x3c,
0x6e, 0xaf, 0xa3, 0x26, 0x65, 0x79, 0x25, 0xca, 0xcd, 0x56, 0x4d, 0xd2, 0x52, 0x6e, 0xb6, 0x03,
0x53, 0xbb, 0x0e, 0xd4, 0x34, 0x33, 0x43, 0x1e, 0x0e, 0x7b, 0x0a, 0xce, 0x1d, 0xd4, 0x2c, 0x8d,
0xb9, 0xac, 0x1f, 0xc4, 0x8d, 0x0b, 0xad, 0x3e, 0xf6, 0x1e, 0x42, 0x07, 0xb6, 0x85, 0xa0, 0x0f,
0xbb, 0x26, 0xe0, 0x3e, 0x7f, 0xca, 0x9a, 0xd8, 0xbf, 0x55, 0x2d, 0xc6, 0xe3, 0x67, 0xa3, 0xf7,
0x8e, 0xcc, 0x3f, 0xd2, 0x64, 0xd2, 0x64, 0xd2, 0x10, 0xfb, 0xe6, 0x2c, 0xe5, 0xdb, 0xdf, 0x00,
0x00, 0x00, 0xff, 0xff, 0x97, 0xeb, 0x66, 0x12, 0x37, 0x01, 0x00, 0x00,
// 238 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x54, 0x8f, 0x3f, 0x4f, 0xc3, 0x30,
0x10, 0x47, 0x95, 0x34, 0xe1, 0x8f, 0x55, 0x31, 0x98, 0x0e, 0x66, 0x2b, 0x9d, 0x32, 0xc5, 0x03,
0xdf, 0xa0, 0x12, 0x03, 0x03, 0x4b, 0x58, 0x80, 0xa5, 0x6a, 0xea, 0x6b, 0x7a, 0x52, 0x2e, 0x67,
0xd9, 0x8e, 0x54, 0x33, 0xf0, 0xd9, 0x51, 0x62, 0x40, 0xb0, 0xdd, 0xef, 0xe9, 0xe9, 0xc9, 0x16,
0x2b, 0xf2, 0x56, 0xa3, 0x81, 0x21, 0x60, 0x40, 0xf0, 0xb5, 0x75, 0x1c, 0x58, 0x2e, 0xc8, 0xdb,
0xcd, 0xa3, 0x90, 0x2f, 0xe0, 0x70, 0xdf, 0xe3, 0x07, 0x98, 0xa7, 0xa4, 0x44, 0xb9, 0x12, 0x25,
0x79, 0x8b, 0x46, 0x65, 0xeb, 0xac, 0xba, 0x6e, 0xd2, 0x90, 0x77, 0xe2, 0x0a, 0xcd, 0xae, 0x8d,
0x01, 0xbc, 0xca, 0xd7, 0x59, 0xb5, 0x6c, 0x2e, 0xd1, 0x6c, 0xa7, 0xb9, 0xf9, 0x14, 0xea, 0x5f,
0x86, 0xf0, 0xfc, 0x1b, 0xbb, 0x15, 0xe5, 0x10, 0x69, 0x77, 0x9e, 0x63, 0xcb, 0xa6, 0x18, 0x22,
0xbd, 0xfe, 0xc0, 0xf8, 0x1d, 0x9a, 0xe0, 0x9b, 0xbc, 0x11, 0x39, 0x8f, 0x6a, 0x31, 0x93, 0x9c,
0x47, 0x29, 0x45, 0xe1, 0xb8, 0x07, 0x55, 0x24, 0x67, 0xba, 0xa7, 0xa7, 0x59, 0xc7, 0x7c, 0x54,
0xe5, 0x0c, 0xd3, 0xd8, 0x3e, 0x8b, 0x7b, 0x76, 0x5d, 0x7d, 0x8a, 0x16, 0x5c, 0x0f, 0xa6, 0x03,
0x57, 0x1f, 0xf7, 0xad, 0xc3, 0x43, 0xfa, 0xab, 0xaf, 0xc9, 0xdb, 0xf7, 0xaa, 0xc3, 0x70, 0x1a,
0xdb, 0xfa, 0xc0, 0xa4, 0xff, 0x98, 0x3a, 0x99, 0x3a, 0x99, 0x9a, 0xbc, 0x6d, 0x2f, 0xe6, 0xfb,
0xe1, 0x2b, 0x00, 0x00, 0xff, 0xff, 0x13, 0xdc, 0xc8, 0x62, 0x39, 0x01, 0x00, 0x00,
}
......@@ -28,22 +28,22 @@ message SerializedIdentity {
// The IdemixMSP will first serialize an idemix identity to bytes using
// this proto, and then uses these bytes as id_bytes in SerializedIdentity
message SerializedIdemixIdentity {
// NymX is the X-component of the pseudonym elliptic curve point.
// nym_x is the X-component of the pseudonym elliptic curve point.
// It is a []byte representation of an amcl.BIG
// The pseudonym can be seen as a public key of the identity, it is used to verify signatures.
bytes NymX = 1;
bytes nym_x = 1;
// NymY is the Y-component of the pseudonym elliptic curve point.
// nym_y is the Y-component of the pseudonym elliptic curve point.
// It is a []byte representation of an amcl.BIG
// The pseudonym can be seen as a public key of the identity, it is used to verify signatures.
bytes NymY = 2;
bytes nym_y = 2;
// OU contains the organizational unit of the idemix identity
bytes OU = 3;
// ou contains the organizational unit of the idemix identity
bytes ou = 3;
// Role contains the role of this identity (e.g., ADMIN or MEMBER)
bytes Role = 4;
// role contains the role of this identity (e.g., ADMIN or MEMBER)
bytes role = 4;
// Proof contains the cryptographic evidence that this identity is valid
bytes Proof = 5;
// proof contains the cryptographic evidence that this identity is valid
bytes proof = 5;
}
\ No newline at end of file
......@@ -91,9 +91,9 @@ type FabricMSPConfig struct {
// List of TLS intermediate certificates trusted by this MSP;
// They are returned by GetTLSIntermediateCerts.
TlsIntermediateCerts [][]byte `protobuf:"bytes,10,rep,name=tls_intermediate_certs,json=tlsIntermediateCerts,proto3" json:"tls_intermediate_certs,omitempty"`
// FabricNodeOUs contains the configuration to distinguish clients from peers from orderers
// fabric_node_ous contains the configuration to distinguish clients from peers from orderers
// based on the OUs.
FabricNodeOUs *FabricNodeOUs `protobuf:"bytes,11,opt,name=FabricNodeOUs" json:"FabricNodeOUs,omitempty"`
FabricNodeOus *FabricNodeOUs `protobuf:"bytes,11,opt,name=fabric_node_ous,json=fabricNodeOus" json:"fabric_node_ous,omitempty"`
}
func (m *FabricMSPConfig) Reset() { *m = FabricMSPConfig{} }
......@@ -171,9 +171,9 @@ func (m *FabricMSPConfig) GetTlsIntermediateCerts() [][]byte {
return nil
}
func (m *FabricMSPConfig) GetFabricNodeOUs() *FabricNodeOUs {
func (m *FabricMSPConfig) GetFabricNodeOus() *FabricNodeOUs {
if m != nil {
return m.FabricNodeOUs
return m.FabricNodeOus
}
return nil
}
......@@ -216,14 +216,14 @@ func (m *FabricCryptoConfig) GetIdentityIdentifierHashFunction() string {
type IdemixMSPConfig struct {
// Name holds the identifier of the MSP
Name string `protobuf:"bytes,1,opt,name=name" json:"name,omitempty"`
// IPk represents the (serialized) issuer public key
IPk []byte `protobuf:"bytes,2,opt,name=IPk,proto3" json:"IPk,omitempty"`
// ipk represents the (serialized) issuer public key
Ipk []byte `protobuf:"bytes,2,opt,name=ipk,proto3" json:"ipk,omitempty"`
// signer may contain crypto material to configure a default signer
Signer *IdemixMSPSignerConfig `protobuf:"bytes,3,opt,name=signer" json:"signer,omitempty"`
// RevocationPk is the public key used for revocation of credentials
RevocationPk []byte `protobuf:"bytes,4,opt,name=RevocationPk,proto3" json:"RevocationPk,omitempty"`
// Epoch represents the current epoch (time interval) used for revocation
Epoch int64 `protobuf:"varint,5,opt,name=Epoch" json:"Epoch,omitempty"`
// revocation_pk is the public key used for revocation of credentials
RevocationPk []byte `protobuf:"bytes,4,opt,name=revocation_pk,json=revocationPk,proto3" json:"revocation_pk,omitempty"`
// epoch represents the current epoch (time interval) used for revocation
Epoch int64 `protobuf:"varint,5,opt,name=epoch" json:"epoch,omitempty"`
}
func (m *IdemixMSPConfig) Reset() { *m = IdemixMSPConfig{} }
......@@ -238,9 +238,9 @@ func (m *IdemixMSPConfig) GetName() string {
return ""
}
func (m *IdemixMSPConfig) GetIPk() []byte {
func (m *IdemixMSPConfig) GetIpk() []byte {
if m != nil {
return m.IPk
return m.Ipk
}
return nil
}
......@@ -268,10 +268,10 @@ func (m *IdemixMSPConfig) GetEpoch() int64 {
// IdemixMSPSIgnerConfig contains the crypto material to set up an idemix signing identity
type IdemixMSPSignerConfig struct {
// Cred represents the serialized idemix credential of the default signer
Cred []byte `protobuf:"bytes,1,opt,name=Cred,proto3" json:"Cred,omitempty"`
// Sk is the secret key of the default signer, corresponding to credential Cred
Sk []byte `protobuf:"bytes,2,opt,name=Sk,proto3" json:"Sk,omitempty"`
// cred represents the serialized idemix credential of the default signer
Cred []byte `protobuf:"bytes,1,opt,name=cred,proto3" json:"cred,omitempty"`
// sk is the secret key of the default signer, corresponding to credential Cred
Sk []byte `protobuf:"bytes,2,opt,name=sk,proto3" json:"sk,omitempty"`
// organizational_unit_identifier defines the organizational unit the default signer is in
OrganizationalUnitIdentifier string `protobuf:"bytes,3,opt,name=organizational_unit_identifier,json=organizationalUnitIdentifier" json:"organizational_unit_identifier,omitempty"`
// is_admin defines whether the default signer is admin or not
......@@ -434,11 +434,11 @@ func (m *FabricOUIdentifier) GetOrganizationalUnitIdentifier() string {
// that does not contain any of the specified OU will be considered invalid.
type FabricNodeOUs struct {
// If true then an msp identity that does not contain any of the specified OU will be considered invalid.
Enable bool `protobuf:"varint,1,opt,name=Enable" json:"Enable,omitempty"`
Enable bool `protobuf:"varint,1,opt,name=enable" json:"enable,omitempty"`
// OU Identifier of the clients
ClientOUIdentifier *FabricOUIdentifier `protobuf:"bytes,2,opt,name=clientOUIdentifier" json:"clientOUIdentifier,omitempty"`
ClientOuIdentifier *FabricOUIdentifier `protobuf:"bytes,2,opt,name=client_ou_identifier,json=clientOuIdentifier" json:"client_ou_identifier,omitempty"`
// OU Identifier of the peers
PeerOUIdentifier *FabricOUIdentifier `protobuf:"bytes,3,opt,name=peerOUIdentifier" json:"peerOUIdentifier,omitempty"`
PeerOuIdentifier *FabricOUIdentifier `protobuf:"bytes,3,opt,name=peer_ou_identifier,json=peerOuIdentifier" json:"peer_ou_identifier,omitempty"`
}
func (m *FabricNodeOUs) Reset() { *m = FabricNodeOUs{} }
......@@ -453,16 +453,16 @@ func (m *FabricNodeOUs) GetEnable() bool {
return false
}
func (m *FabricNodeOUs) GetClientOUIdentifier() *FabricOUIdentifier {
func (m *FabricNodeOUs) GetClientOuIdentifier() *FabricOUIdentifier {
if m != nil {
return m.ClientOUIdentifier
return m.ClientOuIdentifier
}
return nil
}
func (m *FabricNodeOUs) GetPeerOUIdentifier() *FabricOUIdentifier {
func (m *FabricNodeOUs) GetPeerOuIdentifier() *FabricOUIdentifier {
if m != nil {
return m.PeerOUIdentifier
return m.PeerOuIdentifier
}
return nil
}
......@@ -482,58 +482,59 @@ func init() {
func init() { proto.RegisterFile("msp/msp_config.proto", fileDescriptor1) }
var fileDescriptor1 = []byte{
// 839 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x8c, 0x55, 0x41, 0x6f, 0x23, 0x35,
0x14, 0x56, 0x92, 0x36, 0xdb, 0xbc, 0x4c, 0xd2, 0xe2, 0xed, 0x96, 0x01, 0xb1, 0xbb, 0xe9, 0x00,
0x22, 0x17, 0x52, 0xa9, 0x8b, 0x04, 0x07, 0x2e, 0x6c, 0xd8, 0x85, 0x01, 0xca, 0x56, 0x8e, 0x7a,
0xe1, 0x32, 0x72, 0x26, 0x4e, 0x62, 0x65, 0xc6, 0x1e, 0xd9, 0xce, 0x8a, 0x20, 0xfe, 0x02, 0x27,
0x7e, 0x03, 0x57, 0x6e, 0xfc, 0x3f, 0xe4, 0x67, 0x37, 0x99, 0xd0, 0x52, 0xb8, 0xd9, 0xef, 0x7d,
0xef, 0xcb, 0x97, 0xef, 0xbd, 0xe7, 0x81, 0xd3, 0xd2, 0x54, 0x17, 0xa5, 0xa9, 0xb2, 0x5c, 0xc9,
0xb9, 0x58, 0x8c, 0x2a, 0xad, 0xac, 0x22, 0xad, 0xd2, 0x54, 0xc9, 0xe7, 0xd0, 0xb9, 0x9a, 0x5c,
0x8f, 0x31, 0x4e, 0x08, 0x1c, 0xd8, 0x4d, 0xc5, 0xe3, 0xc6, 0xa0, 0x31, 0x3c, 0xa4, 0x78, 0x26,
0x67, 0xd0, 0xf6, 0x55, 0x71, 0x73, 0xd0, 0x18, 0x46, 0x34, 0xdc, 0x92, 0x3f, 0x0f, 0xe0, 0xf8,
0x35, 0x9b, 0x6a, 0x91, 0xef, 0xd5, 0x4b, 0x56, 0xfa, 0xfa, 0x0e, 0xc5, 0x33, 0x79, 0x0a, 0xa0,
0x95, 0xb2, 0x59, 0xce, 0xb5, 0x35, 0x71, 0x73, 0xd0, 0x1a, 0x46, 0xb4, 0xe3, 0x22, 0x63, 0x17,
0x20, 0x9f, 0x02, 0x11, 0xd2, 0x72, 0x5d, 0xf2, 0x99, 0x60, 0x96, 0x07, 0x58, 0x0b, 0x61, 0xef,
0xd4, 0x33, 0x1e, 0x7e, 0x06, 0x6d, 0x36, 0x2b, 0x85, 0x34, 0xf1, 0x01, 0x42, 0xc2, 0x8d, 0x7c,
0x02, 0xc7, 0x9a, 0xbf, 0x55, 0x39, 0xb3, 0x42, 0xc9, 0xac, 0x10, 0xc6, 0xc6, 0x87, 0x08, 0xe8,
0xef, 0xc2, 0x3f, 0x08, 0x63, 0xc9, 0x18, 0x4e, 0x8c, 0x58, 0x48, 0x21, 0x17, 0x99, 0x98, 0x71,
0x69, 0x85, 0xdd, 0xc4, 0xed, 0x41, 0x63, 0xd8, 0xbd, 0x8c, 0x47, 0xa5, 0xa9, 0x46, 0x13, 0x9f,
0x4c, 0x43, 0x2e, 0x95, 0x73, 0x45, 0x8f, 0xcd, 0x7e, 0x90, 0x64, 0xf0, 0x5c, 0xe9, 0x05, 0x93,
0xe2, 0x17, 0x24, 0x66, 0x45, 0xb6, 0x96, 0xc2, 0x06, 0xc2, 0xb9, 0xe0, 0xda, 0xc4, 0x8f, 0x06,
0xad, 0x61, 0xf7, 0xf2, 0x5d, 0xe4, 0xf4, 0x36, 0xbd, 0xb9, 0x49, 0xb7, 0x79, 0xfa, 0x74, 0xbf,
0xfe, 0x46, 0x0a, 0xbb, 0xcb, 0x1a, 0xf2, 0x25, 0xf4, 0x72, 0xbd, 0xa9, 0xac, 0x0a, 0x1d, 0x8b,
0x8f, 0x50, 0x62, 0x9d, 0x6e, 0x8c, 0x79, 0x6f, 0x3c, 0x8d, 0xf2, 0xda, 0x8d, 0x7c, 0x04, 0x7d,
0x5b, 0x98, 0xac, 0x66, 0x7b, 0x07, 0xbd, 0x88, 0x6c, 0x61, 0xe8, 0xd6, 0xf9, 0xcf, 0xe0, 0xcc,
0xa1, 0xee, 0x71, 0x1f, 0x10, 0x7d, 0x6a, 0x0b, 0x93, 0xde, 0x69, 0xc0, 0x17, 0xd0, 0xf3, 0xbf,
0xff, 0xa3, 0x9a, 0xf1, 0x37, 0x37, 0x26, 0xee, 0xa2, 0x32, 0x52, 0x53, 0x16, 0x32, 0x74, 0x1f,
0x98, 0xfc, 0xde, 0x00, 0x72, 0x57, 0x3a, 0xb9, 0x84, 0x27, 0xce, 0x5e, 0x66, 0xd7, 0x9a, 0x67,
0x4b, 0x66, 0x96, 0xd9, 0x9c, 0x95, 0xa2, 0xd8, 0x84, 0x21, 0x7a, 0xbc, 0x4d, 0x7e, 0xcb, 0xcc,
0xf2, 0x35, 0xa6, 0x48, 0x0a, 0xe7, 0xb7, 0xcd, 0xab, 0x99, 0x1e, 0xaa, 0xd7, 0x32, 0x77, 0xa6,
0xe2, 0xb8, 0x76, 0xe8, 0xb3, 0x5b, 0xe0, 0xce, 0x5e, 0x24, 0x0a, 0xa8, 0xe4, 0x8f, 0x06, 0x1c,
0xa7, 0x33, 0x5e, 0x8a, 0x9f, 0x1f, 0x1e, 0xe3, 0x13, 0x68, 0xa5, 0xd7, 0xab, 0xb0, 0x03, 0xee,
0x48, 0x2e, 0xa1, 0xed, 0xb4, 0x71, 0x1d, 0xb7, 0xd0, 0x82, 0xf7, 0xd1, 0x82, 0x2d, 0xd7, 0x04,
0x73, 0xa1, 0x3f, 0x01, 0x49, 0x12, 0x88, 0xe8, 0x76, 0x1e, 0xaf, 0x57, 0xf1, 0x01, 0xd2, 0xed,
0xc5, 0xc8, 0x29, 0x1c, 0xbe, 0xaa, 0x54, 0xbe, 0x8c, 0x0f, 0x07, 0x8d, 0x61, 0x8b, 0xfa, 0x4b,
0xf2, 0x5b, 0x13, 0x9e, 0xdc, 0xcb, 0xed, 0xd4, 0x8e, 0x35, 0x9f, 0xa1, 0xda, 0x88, 0xe2, 0x99,
0xf4, 0xa1, 0x39, 0xb9, 0x15, 0xdb, 0x9c, 0xac, 0xc8, 0xd7, 0xf0, 0xec, 0xe1, 0x81, 0xc5, 0xff,
0xd0, 0xa1, 0x1f, 0x3c, 0x34, 0x96, 0xe4, 0x3d, 0x38, 0x12, 0x26, 0xc3, 0x8d, 0x43, 0xe5, 0x47,
0xf4, 0x91, 0x30, 0x5f, 0xb9, 0x2b, 0xf9, 0x10, 0x7a, 0x5c, 0x6a, 0x55, 0x14, 0x25, 0x97, 0x8e,
0x17, 0xc5, 0x77, 0x68, 0xb4, 0x0b, 0xa6, 0x33, 0xf2, 0x1d, 0x9c, 0xe7, 0x9a, 0x23, 0x1f, 0x2b,
0xb2, 0xda, 0xbe, 0x0a, 0x39, 0x57, 0xba, 0xc4, 0x33, 0x2e, 0x63, 0x44, 0x9f, 0xef, 0x80, 0x3b,
0x73, 0xd2, 0x1d, 0x2c, 0x51, 0xf0, 0xf8, 0x9e, 0x55, 0x75, 0x3a, 0xaa, 0xf5, 0xb4, 0x10, 0x79,
0x16, 0x7a, 0xe3, 0x5d, 0x89, 0x7c, 0xd0, 0xfb, 0x46, 0x5e, 0x40, 0xbf, 0xd2, 0xe2, 0xad, 0x1b,
0xf8, 0x80, 0x6a, 0x62, 0x07, 0x23, 0xec, 0xe0, 0xf7, 0xdc, 0x6f, 0x7d, 0x2f, 0x60, 0x7c, 0x51,
0x32, 0x81, 0x47, 0x21, 0x43, 0x3e, 0x86, 0xfe, 0x8a, 0xd7, 0x27, 0x2f, 0x4c, 0x4a, 0x6f, 0xc5,
0x6b, 0x63, 0x46, 0xce, 0x21, 0x72, 0xb0, 0x92, 0x59, 0xae, 0x05, 0x2b, 0x42, 0x3b, 0xba, 0x2b,
0xbe, 0xb9, 0x0a, 0xa1, 0xe4, 0xd7, 0xdb, 0x95, 0xa8, 0x3f, 0x0e, 0x64, 0x00, 0x5d, 0xb7, 0x88,
0x62, 0x2e, 0x72, 0x66, 0x79, 0xf8, 0x0b, 0xf5, 0xd0, 0xff, 0xe8, 0x67, 0xf3, 0xbf, 0xfb, 0x99,
0xfc, 0xd5, 0xf8, 0xc7, 0x32, 0xbb, 0xe7, 0xf5, 0x95, 0x64, 0xd3, 0xc2, 0xff, 0xe8, 0x11, 0x0d,
0x37, 0xf2, 0x0d, 0x90, 0xbc, 0x10, 0x5c, 0xda, 0xba, 0xce, 0xe0, 0xda, 0xbf, 0xbe, 0x71, 0xf7,
0x94, 0xb8, 0xe7, 0xb7, 0xe2, 0x5c, 0xef, 0xd1, 0xb4, 0x1e, 0xa6, 0xb9, 0x53, 0xf0, 0x32, 0x83,
0x73, 0xa5, 0x17, 0xa3, 0xe5, 0xa6, 0xe2, 0xba, 0xe0, 0xb3, 0x05, 0xd7, 0xa3, 0x39, 0xd6, 0xf9,
0x0f, 0x9b, 0x71, 0x4c, 0x2f, 0x4f, 0xae, 0x4c, 0xe5, 0x37, 0xe4, 0x9a, 0xe5, 0x2b, 0xb6, 0xe0,
0x3f, 0x0d, 0x17, 0xc2, 0x2e, 0xd7, 0xd3, 0x51, 0xae, 0xca, 0x8b, 0x5a, 0xed, 0x85, 0xaf, 0xbd,
0xf0, 0xb5, 0xee, 0x33, 0x39, 0x6d, 0xe3, 0xf9, 0xc5, 0xdf, 0x01, 0x00, 0x00, 0xff, 0xff, 0xac,
0x7c, 0x60, 0xf7, 0x38, 0x07, 0x00, 0x00,
// 854 bytes of a gzipped FileDescriptorProto
0x1f, 0x8b, 0x08, 0x00, 0x00, 0x00, 0x00, 0x00, 0x02, 0xff, 0x8c, 0x55, 0x5f, 0x6f, 0xe3, 0x44,
0x10, 0x57, 0x92, 0x36, 0x6d, 0x26, 0x4e, 0x52, 0xf6, 0x7a, 0xc5, 0x20, 0xee, 0x2e, 0x35, 0x20,
0xf2, 0x42, 0x2a, 0xf5, 0x90, 0x90, 0x10, 0x2f, 0x5c, 0xe1, 0x84, 0x81, 0xd2, 0x6a, 0xab, 0xbe,
0xf0, 0x62, 0x6d, 0xec, 0x4d, 0xb2, 0xb2, 0xbd, 0x6b, 0xed, 0xae, 0x4f, 0x04, 0xf1, 0x15, 0x78,
0xe2, 0x3b, 0xf0, 0xcc, 0x2b, 0xdf, 0x0e, 0xed, 0x9f, 0xc6, 0xce, 0x5d, 0x15, 0x78, 0xdb, 0x99,
0xf9, 0xcd, 0xcf, 0xb3, 0xbf, 0x99, 0x59, 0xc3, 0x69, 0xa9, 0xaa, 0x8b, 0x52, 0x55, 0x49, 0x2a,
0xf8, 0x92, 0xad, 0xe6, 0x95, 0x14, 0x5a, 0xa0, 0x5e, 0xa9, 0xaa, 0xe8, 0x4b, 0x18, 0x5c, 0xdf,
0xdd, 0x5e, 0x59, 0x3f, 0x42, 0x70, 0xa0, 0x37, 0x15, 0x0d, 0x3b, 0xd3, 0xce, 0xec, 0x10, 0xdb,
0x33, 0x3a, 0x83, 0xbe, 0xcb, 0x0a, 0xbb, 0xd3, 0xce, 0x2c, 0xc0, 0xde, 0x8a, 0xfe, 0x3e, 0x80,
0xc9, 0x6b, 0xb2, 0x90, 0x2c, 0xdd, 0xc9, 0xe7, 0xa4, 0x74, 0xf9, 0x03, 0x6c, 0xcf, 0xe8, 0x19,
0x80, 0x14, 0x42, 0x27, 0x29, 0x95, 0x5a, 0x85, 0xdd, 0x69, 0x6f, 0x16, 0xe0, 0x81, 0xf1, 0x5c,
0x19, 0x07, 0xfa, 0x1c, 0x10, 0xe3, 0x9a, 0xca, 0x92, 0x66, 0x8c, 0x68, 0xea, 0x61, 0x3d, 0x0b,
0x7b, 0xaf, 0x1d, 0x71, 0xf0, 0x33, 0xe8, 0x93, 0xac, 0x64, 0x5c, 0x85, 0x07, 0x16, 0xe2, 0x2d,
0xf4, 0x19, 0x4c, 0x24, 0x7d, 0x23, 0x52, 0xa2, 0x99, 0xe0, 0x49, 0xc1, 0x94, 0x0e, 0x0f, 0x2d,
0x60, 0xdc, 0xb8, 0x7f, 0x62, 0x4a, 0xa3, 0x2b, 0x38, 0x51, 0x6c, 0xc5, 0x19, 0x5f, 0x25, 0x2c,
0xa3, 0x5c, 0x33, 0xbd, 0x09, 0xfb, 0xd3, 0xce, 0x6c, 0x78, 0x19, 0xce, 0x4b, 0x55, 0xcd, 0xef,
0x5c, 0x30, 0xf6, 0xb1, 0x98, 0x2f, 0x05, 0x9e, 0xa8, 0x5d, 0x27, 0x4a, 0xe0, 0x85, 0x90, 0x2b,
0xc2, 0xd9, 0x6f, 0x96, 0x98, 0x14, 0x49, 0xcd, 0x99, 0xf6, 0x84, 0x4b, 0x46, 0xa5, 0x0a, 0x8f,
0xa6, 0xbd, 0xd9, 0xf0, 0xf2, 0x7d, 0xcb, 0xe9, 0x64, 0xba, 0xb9, 0x8f, 0xb7, 0x71, 0xfc, 0x6c,
0x37, 0xff, 0x9e, 0x33, 0xdd, 0x44, 0x15, 0xfa, 0x1a, 0x46, 0xa9, 0xdc, 0x54, 0x5a, 0xf8, 0x8e,
0x85, 0xc7, 0xb6, 0xc4, 0x36, 0xdd, 0x95, 0x8d, 0x3b, 0xe1, 0x71, 0x90, 0xb6, 0x2c, 0xf4, 0x09,
0x8c, 0x75, 0xa1, 0x92, 0x96, 0xec, 0x03, 0xab, 0x45, 0xa0, 0x0b, 0x85, 0xb7, 0xca, 0x7f, 0x01,
0x67, 0x06, 0xf5, 0x88, 0xfa, 0x60, 0xd1, 0xa7, 0xba, 0x50, 0xf1, 0x3b, 0x0d, 0xf8, 0x0a, 0x26,
0x4b, 0xfb, 0xfd, 0x84, 0x8b, 0x8c, 0x26, 0xa2, 0x56, 0xe1, 0xd0, 0xd6, 0x86, 0x5a, 0xb5, 0xfd,
0x2c, 0x32, 0x7a, 0x73, 0xaf, 0xf0, 0x68, 0xd9, 0x98, 0xb5, 0x8a, 0xfe, 0xec, 0x00, 0x7a, 0xb7,
0x78, 0x74, 0x09, 0x4f, 0x8d, 0xc0, 0x44, 0xd7, 0x92, 0x26, 0x6b, 0xa2, 0xd6, 0xc9, 0x92, 0x94,
0xac, 0xd8, 0xf8, 0x31, 0x7a, 0xb2, 0x0d, 0x7e, 0x4f, 0xd4, 0xfa, 0xb5, 0x0d, 0xa1, 0x18, 0xce,
0x1f, 0xda, 0xd7, 0x92, 0xdd, 0x67, 0xd7, 0x3c, 0x35, 0xb2, 0xda, 0x81, 0x1d, 0xe0, 0xe7, 0x0f,
0xc0, 0x46, 0x60, 0x4b, 0xe4, 0x51, 0xd1, 0x5f, 0x1d, 0x98, 0xc4, 0x19, 0x2d, 0xd9, 0xaf, 0xfb,
0x07, 0xf9, 0x04, 0x7a, 0xac, 0xca, 0xfd, 0x16, 0x98, 0x23, 0xba, 0x84, 0xbe, 0xa9, 0x8d, 0xca,
0xb0, 0x67, 0x25, 0xf8, 0xd0, 0x4a, 0xb0, 0xe5, 0xba, 0xb3, 0x31, 0xdf, 0x21, 0x8f, 0x44, 0x1f,
0xc3, 0xa8, 0x35, 0xa8, 0x55, 0x1e, 0x1e, 0x58, 0xbe, 0xa0, 0x71, 0xde, 0xe6, 0xe8, 0x14, 0x0e,
0x69, 0x25, 0xd2, 0x75, 0x78, 0x38, 0xed, 0xcc, 0x7a, 0xd8, 0x19, 0xd1, 0x1f, 0x5d, 0x78, 0xfa,
0x28, 0xb9, 0x29, 0x37, 0x95, 0x34, 0xb3, 0xe5, 0x06, 0xd8, 0x9e, 0xd1, 0x18, 0xba, 0xea, 0xa1,
0xda, 0xae, 0xca, 0xd1, 0xb7, 0xf0, 0x7c, 0xff, 0xcc, 0xda, 0x4b, 0x0c, 0xf0, 0x47, 0xfb, 0x26,
0x13, 0x7d, 0x00, 0xc7, 0x4c, 0x25, 0x76, 0xe9, 0x6c, 0xe5, 0xc7, 0xf8, 0x88, 0xa9, 0x6f, 0x8c,
0x69, 0x6e, 0x46, 0xb9, 0x14, 0x45, 0x51, 0x52, 0x6e, 0x78, 0x6d, 0xf1, 0x03, 0x1c, 0x34, 0xce,
0x38, 0x43, 0x3f, 0xc0, 0xb9, 0xa9, 0xce, 0xf0, 0x91, 0x22, 0x69, 0x29, 0xc1, 0xf8, 0x52, 0xc8,
0xd2, 0x9e, 0xed, 0x3e, 0x06, 0xf8, 0x45, 0x03, 0xc4, 0x5b, 0x5c, 0xdc, 0xc0, 0x22, 0x01, 0x4f,
0x1e, 0xd9, 0x56, 0x53, 0x47, 0x55, 0x2f, 0x0a, 0x96, 0x26, 0xbe, 0x39, 0x4e, 0x95, 0xc0, 0x39,
0x9d, 0x6e, 0xe8, 0x25, 0x8c, 0x2b, 0xc9, 0xde, 0x98, 0x99, 0xf7, 0xa8, 0xae, 0x6d, 0x61, 0x60,
0x5b, 0xf8, 0x23, 0x75, 0x8b, 0x3f, 0xf2, 0x18, 0x97, 0x14, 0xdd, 0xc1, 0x91, 0x8f, 0xa0, 0x4f,
0x61, 0x9c, 0xd3, 0xf6, 0xe8, 0xf9, 0x51, 0x19, 0xe5, 0xb4, 0x35, 0x67, 0xe8, 0x1c, 0x02, 0x03,
0x2b, 0x89, 0xa6, 0x92, 0x91, 0xc2, 0xb7, 0x63, 0x98, 0xd3, 0xcd, 0xb5, 0x77, 0x45, 0xbf, 0x3f,
0xec, 0x44, 0xfb, 0x7d, 0x40, 0x53, 0x18, 0x9a, 0x5d, 0x64, 0x4b, 0x96, 0x12, 0x4d, 0xfd, 0x15,
0xda, 0xae, 0xff, 0xd1, 0xcf, 0xee, 0x7f, 0xf7, 0x33, 0xfa, 0xa7, 0x03, 0xa3, 0x9d, 0x9d, 0x35,
0x2f, 0x2c, 0xe5, 0x64, 0x51, 0xb8, 0x8f, 0x1e, 0x63, 0x6f, 0xa1, 0x18, 0x4e, 0xd3, 0x82, 0x99,
0xd6, 0x8a, 0xfa, 0xed, 0xaf, 0xec, 0x79, 0xe8, 0x90, 0x4b, 0xba, 0xa9, 0x5b, 0x97, 0xfb, 0x0e,
0x50, 0x45, 0xa9, 0x7c, 0x8b, 0xa8, 0xb7, 0x9f, 0xe8, 0xc4, 0xa4, 0xb4, 0x69, 0x5e, 0x25, 0x70,
0x2e, 0xe4, 0x6a, 0xbe, 0xde, 0x54, 0x54, 0x16, 0x34, 0x5b, 0x51, 0x39, 0x77, 0xef, 0x8d, 0xfb,
0xbf, 0x29, 0xc3, 0xf4, 0xea, 0xe4, 0x5a, 0x55, 0x6e, 0x4b, 0x6e, 0x49, 0x9a, 0x93, 0x15, 0xfd,
0x65, 0xb6, 0x62, 0x7a, 0x5d, 0x2f, 0xe6, 0xa9, 0x28, 0x2f, 0x5a, 0xb9, 0x17, 0x2e, 0xf7, 0xc2,
0xe5, 0x9a, 0xbf, 0xe5, 0xa2, 0x6f, 0xcf, 0x2f, 0xff, 0x0d, 0x00, 0x00, 0xff, 0xff, 0x1a, 0x91,
0xb8, 0x49, 0x3f, 0x07, 0x00, 0x00,
}
......@@ -83,9 +83,9 @@ message FabricMSPConfig {
// They are returned by GetTLSIntermediateCerts.
repeated bytes tls_intermediate_certs = 10;
// FabricNodeOUs contains the configuration to distinguish clients from peers from orderers
// fabric_node_ous contains the configuration to distinguish clients from peers from orderers
// based on the OUs.
FabricNodeOUs FabricNodeOUs = 11;
FabricNodeOUs fabric_node_ous = 11;
}
// FabricCryptoConfig contains configuration parameters
......@@ -111,26 +111,26 @@ message IdemixMSPConfig {
// Name holds the identifier of the MSP
string name = 1;
// IPk represents the (serialized) issuer public key
bytes IPk = 2;
// ipk represents the (serialized) issuer public key
bytes ipk = 2;
// signer may contain crypto material to configure a default signer
IdemixMSPSignerConfig signer = 3;
// RevocationPk is the public key used for revocation of credentials
bytes RevocationPk = 4;
// revocation_pk is the public key used for revocation of credentials
bytes revocation_pk = 4;
// Epoch represents the current epoch (time interval) used for revocation
int64 Epoch = 5;
// epoch represents the current epoch (time interval) used for revocation
int64 epoch = 5;
}
// IdemixMSPSIgnerConfig contains the crypto material to set up an idemix signing identity
message IdemixMSPSignerConfig {
// Cred represents the serialized idemix credential of the default signer
bytes Cred = 1;
// cred represents the serialized idemix credential of the default signer
bytes cred = 1;
// Sk is the secret key of the default signer, corresponding to credential Cred
bytes Sk = 2;
// sk is the secret key of the default signer, corresponding to credential Cred
bytes sk = 2;
// organizational_unit_identifier defines the organizational unit the default signer is in
string organizational_unit_identifier = 3;
......@@ -197,12 +197,12 @@ message FabricOUIdentifier {
// that does not contain any of the specified OU will be considered invalid.