@@ -14,7 +14,7 @@ See the License for the specific language governing permissions and
14
14
limitations under the License.
15
15
*/
16
16
17
- package mcs
17
+ package gossip
18
18
19
19
import (
20
20
"bytes"
@@ -35,7 +35,7 @@ import (
35
35
"github.com/hyperledger/fabric/protos/utils"
36
36
)
37
37
38
- var logger = flogging .MustGetLogger ("peer/gossip/mcs" )
38
+ var mcsLogger = flogging .MustGetLogger ("peer/gossip/mcs" )
39
39
40
40
// mspMessageCryptoService implements the MessageCryptoService interface
41
41
// using the peer MSPs (local and channel-related)
@@ -52,13 +52,13 @@ type mspMessageCryptoService struct {
52
52
deserializer mgmt.DeserializersManager
53
53
}
54
54
55
- // New creates a new instance of mspMessageCryptoService
55
+ // NewMCS creates a new instance of mspMessageCryptoService
56
56
// that implements MessageCryptoService.
57
57
// The method takes in input:
58
58
// 1. a policies.ChannelPolicyManagerGetter that gives access to the policy manager of a given channel via the Manager method.
59
59
// 2. an instance of crypto.LocalSigner
60
60
// 3. an identity deserializer manager
61
- func New (channelPolicyManagerGetter policies.ChannelPolicyManagerGetter , localSigner crypto.LocalSigner , deserializer mgmt.DeserializersManager ) api.MessageCryptoService {
61
+ func NewMCS (channelPolicyManagerGetter policies.ChannelPolicyManagerGetter , localSigner crypto.LocalSigner , deserializer mgmt.DeserializersManager ) api.MessageCryptoService {
62
62
return & mspMessageCryptoService {channelPolicyManagerGetter : channelPolicyManagerGetter , localSigner : localSigner , deserializer : deserializer }
63
63
}
64
64
@@ -83,14 +83,14 @@ func (s *mspMessageCryptoService) ValidateIdentity(peerIdentity api.PeerIdentity
83
83
func (s * mspMessageCryptoService ) GetPKIidOfCert (peerIdentity api.PeerIdentityType ) common.PKIidType {
84
84
// Validate arguments
85
85
if len (peerIdentity ) == 0 {
86
- logger .Error ("Invalid Peer Identity. It must be different from nil." )
86
+ mcsLogger .Error ("Invalid Peer Identity. It must be different from nil." )
87
87
88
88
return nil
89
89
}
90
90
91
91
sid , err := s .deserializer .Deserialize (peerIdentity )
92
92
if err != nil {
93
- logger .Errorf ("Failed getting validated identity from peer identity [% x]: [%s]" , peerIdentity , err )
93
+ mcsLogger .Errorf ("Failed getting validated identity from peer identity [% x]: [%s]" , peerIdentity , err )
94
94
95
95
return nil
96
96
}
@@ -105,7 +105,7 @@ func (s *mspMessageCryptoService) GetPKIidOfCert(peerIdentity api.PeerIdentityTy
105
105
// Hash
106
106
digest , err := factory .GetDefault ().Hash (raw , & bccsp.SHA256Opts {})
107
107
if err != nil {
108
- logger .Errorf ("Failed computing digest of serialized identity [% x]: [%s]" , peerIdentity , err )
108
+ mcsLogger .Errorf ("Failed computing digest of serialized identity [% x]: [%s]" , peerIdentity , err )
109
109
110
110
return nil
111
111
}
@@ -160,12 +160,12 @@ func (s *mspMessageCryptoService) VerifyBlock(chainID common.ChainID, signedBloc
160
160
return fmt .Errorf ("Could not acquire policy manager for channel %s" , channelID )
161
161
}
162
162
// ok is true if it was the manager requested, or false if it is the default manager
163
- logger .Debugf ("Got policy manager for channel [%s] with flag [%s]" , channelID , ok )
163
+ mcsLogger .Debugf ("Got policy manager for channel [%s] with flag [%s]" , channelID , ok )
164
164
165
165
// Get block validation policy
166
166
policy , ok := cpm .GetPolicy (policies .BlockValidation )
167
167
// ok is true if it was the policy requested, or false if it is the default policy
168
- logger .Debugf ("Got block validation policy for channel [%s] with flag [%s]" , channelID , ok )
168
+ mcsLogger .Debugf ("Got block validation policy for channel [%s] with flag [%s]" , channelID , ok )
169
169
170
170
// - Prepare SignedData
171
171
signatureSet := []* pcommon.SignedData {}
@@ -200,7 +200,7 @@ func (s *mspMessageCryptoService) Sign(msg []byte) ([]byte, error) {
200
200
func (s * mspMessageCryptoService ) Verify (peerIdentity api.PeerIdentityType , signature , message []byte ) error {
201
201
identity , chainID , err := s .getValidatedIdentity (peerIdentity )
202
202
if err != nil {
203
- logger .Errorf ("Failed getting validated identity from peer identity [%s]" , err )
203
+ mcsLogger .Errorf ("Failed getting validated identity from peer identity [%s]" , err )
204
204
205
205
return err
206
206
}
@@ -234,11 +234,11 @@ func (s *mspMessageCryptoService) VerifyByChannel(chainID common.ChainID, peerId
234
234
if cpm == nil {
235
235
return fmt .Errorf ("Could not acquire policy manager for channel %s" , string (chainID ))
236
236
}
237
- logger .Debugf ("Got policy manager for channel [%s] with flag [%s]" , string (chainID ), flag )
237
+ mcsLogger .Debugf ("Got policy manager for channel [%s] with flag [%s]" , string (chainID ), flag )
238
238
239
239
// Get channel reader policy
240
240
policy , flag := cpm .GetPolicy (policies .ChannelApplicationReaders )
241
- logger .Debugf ("Got reader policy for channel [%s] with flag [%s]" , string (chainID ), flag )
241
+ mcsLogger .Debugf ("Got reader policy for channel [%s] with flag [%s]" , string (chainID ), flag )
242
242
243
243
return policy .Evaluate (
244
244
[]* pcommon.SignedData {{
@@ -290,7 +290,7 @@ func (s *mspMessageCryptoService) getValidatedIdentity(peerIdentity api.PeerIden
290
290
// Deserialize identity
291
291
identity , err := mspManager .DeserializeIdentity ([]byte (peerIdentity ))
292
292
if err != nil {
293
- logger .Debugf ("Failed deserialization identity [% x] on [%s]: [%s]" , peerIdentity , chainID , err )
293
+ mcsLogger .Debugf ("Failed deserialization identity [% x] on [%s]: [%s]" , peerIdentity , chainID , err )
294
294
continue
295
295
}
296
296
@@ -300,11 +300,11 @@ func (s *mspMessageCryptoService) getValidatedIdentity(peerIdentity api.PeerIden
300
300
// This will be done by the caller function, if needed.
301
301
302
302
if err := identity .Validate (); err != nil {
303
- logger .Debugf ("Failed validating identity [% x] on [%s]: [%s]" , peerIdentity , chainID , err )
303
+ mcsLogger .Debugf ("Failed validating identity [% x] on [%s]: [%s]" , peerIdentity , chainID , err )
304
304
continue
305
305
}
306
306
307
- logger .Debugf ("Validation succeeded [% x] on [%s]" , peerIdentity , chainID )
307
+ mcsLogger .Debugf ("Validation succeeded [% x] on [%s]" , peerIdentity , chainID )
308
308
309
309
return identity , common .ChainID (chainID ), nil
310
310
}
0 commit comments