代码拉取完成,页面将自动刷新
// Copyright the Hyperledger Fabric contributors. All rights reserved.
// SPDX-License-Identifier: Apache-2.0
package statebased
import (
"fmt"
"sort"
"github.com/golang/protobuf/proto"
"github.com/hyperledger/fabric-protos-go/common"
"github.com/hyperledger/fabric-protos-go/msp"
)
// stateEP implements the KeyEndorsementPolicy
type stateEP struct {
orgs map[string]msp.MSPRole_MSPRoleType
}
// NewStateEP constructs a state-based endorsement policy from a given
// serialized EP byte array. If the byte array is empty, a new EP is created.
func NewStateEP(policy []byte) (KeyEndorsementPolicy, error) {
s := &stateEP{orgs: make(map[string]msp.MSPRole_MSPRoleType)}
if policy != nil {
spe := &common.SignaturePolicyEnvelope{}
if err := proto.Unmarshal(policy, spe); err != nil {
return nil, fmt.Errorf("Error unmarshaling to SignaturePolicy: %s", err)
}
err := s.setMSPIDsFromSP(spe)
if err != nil {
return nil, err
}
}
return s, nil
}
// Policy returns the endorsement policy as bytes
func (s *stateEP) Policy() ([]byte, error) {
spe, err := s.policyFromMSPIDs()
if err != nil {
return nil, err
}
spBytes, err := proto.Marshal(spe)
if err != nil {
return nil, err
}
return spBytes, nil
}
// AddOrgs adds the specified channel orgs to the existing key-level EP
func (s *stateEP) AddOrgs(role RoleType, neworgs ...string) error {
var mspRole msp.MSPRole_MSPRoleType
switch role {
case RoleTypeMember:
mspRole = msp.MSPRole_MEMBER
case RoleTypePeer:
mspRole = msp.MSPRole_PEER
default:
return &RoleTypeDoesNotExistError{RoleType: role}
}
// add new orgs
for _, addorg := range neworgs {
s.orgs[addorg] = mspRole
}
return nil
}
// DelOrgs delete the specified channel orgs from the existing key-level EP
func (s *stateEP) DelOrgs(delorgs ...string) {
for _, delorg := range delorgs {
delete(s.orgs, delorg)
}
}
// ListOrgs returns an array of channel orgs that are required to endorse chnages
func (s *stateEP) ListOrgs() []string {
orgNames := make([]string, 0, len(s.orgs))
for mspid := range s.orgs {
orgNames = append(orgNames, mspid)
}
return orgNames
}
func (s *stateEP) setMSPIDsFromSP(sp *common.SignaturePolicyEnvelope) error {
// iterate over the identities in this envelope
for _, identity := range sp.Identities {
// this imlementation only supports the ROLE type
if identity.PrincipalClassification == msp.MSPPrincipal_ROLE {
msprole := &msp.MSPRole{}
err := proto.Unmarshal(identity.Principal, msprole)
if err != nil {
return fmt.Errorf("error unmarshaling msp principal: %s", err)
}
s.orgs[msprole.GetMspIdentifier()] = msprole.GetRole()
}
}
return nil
}
func (s *stateEP) policyFromMSPIDs() (*common.SignaturePolicyEnvelope, error) {
mspids := s.ListOrgs()
sort.Strings(mspids)
principals := make([]*msp.MSPPrincipal, len(mspids))
sigspolicy := make([]*common.SignaturePolicy, len(mspids))
for i, id := range mspids {
principal, err := proto.Marshal(
&msp.MSPRole{
Role: s.orgs[id],
MspIdentifier: id,
},
)
if err != nil {
return nil, err
}
principals[i] = &msp.MSPPrincipal{
PrincipalClassification: msp.MSPPrincipal_ROLE,
Principal: principal,
}
sigspolicy[i] = &common.SignaturePolicy{
Type: &common.SignaturePolicy_SignedBy{
SignedBy: int32(i),
},
}
}
// create the policy: it requires exactly 1 signature from all of the principals
p := &common.SignaturePolicyEnvelope{
Version: 0,
Rule: &common.SignaturePolicy{
Type: &common.SignaturePolicy_NOutOf_{
NOutOf: &common.SignaturePolicy_NOutOf{
N: int32(len(mspids)),
Rules: sigspolicy,
},
},
},
Identities: principals,
}
return p, nil
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。