|
34 | 34 | from common import configtx_pb2 as common_dot_configtx_pb2
|
35 | 35 | from common import configuration_pb2 as common_dot_configuration_pb2
|
36 | 36 | from common import policies_pb2 as common_dot_policies_pb2
|
37 |
| -from common import msp_principal_pb2 |
38 |
| -from msp import mspconfig_pb2 |
| 37 | +from msp import mspconfig_pb2, msp_principal_pb2, identities_pb2 |
39 | 38 | from peer import configuration_pb2 as peer_dot_configuration_pb2
|
40 | 39 | from orderer import configuration_pb2 as orderer_dot_configuration_pb2
|
41 |
| -import identities_pb2 |
42 | 40 | import orderer_util
|
43 | 41 |
|
44 | 42 | from contexthelper import ContextHelper
|
@@ -256,7 +254,7 @@ def isInNetwork(self, network):
|
256 | 254 | return False
|
257 | 255 |
|
258 | 256 | def getMspPrincipalAsRole(self, mspRoleTypeAsString):
|
259 |
| - mspRole = msp_principal_pb2.MSPRole(msp_identifier=self.name, Role=msp_principal_pb2.MSPRole.MSPRoleType.Value(mspRoleTypeAsString)) |
| 257 | + mspRole = msp_principal_pb2.MSPRole(msp_identifier=self.name, role=msp_principal_pb2.MSPRole.MSPRoleType.Value(mspRoleTypeAsString)) |
260 | 258 | mspPrincipal = msp_principal_pb2.MSPPrincipal(
|
261 | 259 | principal_classification=msp_principal_pb2.MSPPrincipal.Classification.Value('ROLE'),
|
262 | 260 | principal=mspRole.SerializeToString())
|
@@ -378,7 +376,7 @@ def NOutOf(cls, n, policies):
|
378 | 376 | 'NOutOf creates a policy which requires N out of the slice of policies to evaluate to true'
|
379 | 377 | return common_dot_policies_pb2.SignaturePolicy(
|
380 | 378 | n_out_of=common_dot_policies_pb2.SignaturePolicy.NOutOf(
|
381 |
| - N=n, |
| 379 | + n=n, |
382 | 380 | policies=policies,
|
383 | 381 | ),
|
384 | 382 | )
|
@@ -427,7 +425,7 @@ def getNonce(cls):
|
427 | 425 |
|
428 | 426 | @classmethod
|
429 | 427 | def addSignatureToSignedConfigItem(cls, configUpdateEnvelope, (entity, cert)):
|
430 |
| - serializedIdentity = identities_pb2.SerializedIdentity(Mspid=entity.name, IdBytes=crypto.dump_certificate(crypto.FILETYPE_PEM, cert)) |
| 428 | + serializedIdentity = identities_pb2.SerializedIdentity(mspid=entity.name, id_bytes=crypto.dump_certificate(crypto.FILETYPE_PEM, cert)) |
431 | 429 | sigHeader = common_dot_common_pb2.SignatureHeader(creator=serializedIdentity.SerializeToString(),
|
432 | 430 | nonce=BootstrapHelper.getNonce())
|
433 | 431 | sigHeaderBytes = sigHeader.SerializeToString()
|
@@ -775,7 +773,7 @@ def createEnvelopeForMsg(directory, nodeAdminTuple, chainId, msg, typeAsString):
|
775 | 773 | org = directory.getOrganization(nodeAdminTuple.organization)
|
776 | 774 | user = directory.getUser(nodeAdminTuple.user)
|
777 | 775 | cert = directory.findCertForNodeAdminTuple(nodeAdminTuple)
|
778 |
| - serializedIdentity = identities_pb2.SerializedIdentity(Mspid=org.name, IdBytes=crypto.dump_certificate(crypto.FILETYPE_PEM, cert)) |
| 776 | + serializedIdentity = identities_pb2.SerializedIdentity(mspid=org.name, id_bytes=crypto.dump_certificate(crypto.FILETYPE_PEM, cert)) |
779 | 777 | serializedCreatorCertChain = serializedIdentity.SerializeToString()
|
780 | 778 | nonce = None
|
781 | 779 | payloadSignatureHeader = common_dot_common_pb2.SignatureHeader(
|
|
0 commit comments