@@ -27,10 +27,13 @@ import (
27
27
28
28
"github.com/golang/protobuf/proto"
29
29
"github.com/hyperledger/fabric/bccsp"
30
+ "github.com/hyperledger/fabric/common/flogging"
30
31
"github.com/hyperledger/fabric/protos/msp"
31
32
"github.com/op/go-logging"
32
33
)
33
34
35
+ var mspIdentityLogger = flogging .MustGetLogger ("msp/identity" )
36
+
34
37
type identity struct {
35
38
// id contains the identifier (MSPID and identity identifier) for this instance
36
39
id * IdentityIdentifier
@@ -46,7 +49,7 @@ type identity struct {
46
49
}
47
50
48
51
func newIdentity (id * IdentityIdentifier , cert * x509.Certificate , pk bccsp.Key , msp * bccspmsp ) (Identity , error ) {
49
- mspLogger .Debugf ("Creating identity instance for ID %s" , id )
52
+ mspIdentityLogger .Debugf ("Creating identity instance for ID %s" , id )
50
53
51
54
cert , err := msp .sanitizeCert (cert )
52
55
if err != nil {
@@ -83,7 +86,7 @@ func (id *identity) GetOrganizationalUnits() []*OUIdentifier {
83
86
84
87
cid , err := id .msp .getCertificationChainIdentifier (id )
85
88
if err != nil {
86
- mspLogger .Errorf ("Failed getting certification chain identifier for [%v]: [%s]" , id , err )
89
+ mspIdentityLogger .Errorf ("Failed getting certification chain identifier for [%v]: [%s]" , id , err )
87
90
88
91
return nil
89
92
}
@@ -118,7 +121,7 @@ func NewSerializedIdentity(mspID string, certPEM []byte) ([]byte, error) {
118
121
// to determine whether this identity produced the
119
122
// signature; it returns nil if so or an error otherwise
120
123
func (id * identity ) Verify (msg []byte , sig []byte ) error {
121
- // mspLogger .Infof("Verifying signature")
124
+ // mspIdentityLogger .Infof("Verifying signature")
122
125
123
126
// Compute Hash
124
127
hashOpt , err := id .getHashOpt (id .msp .cryptoConfig .SignatureHashFamily )
@@ -131,10 +134,9 @@ func (id *identity) Verify(msg []byte, sig []byte) error {
131
134
return fmt .Errorf ("Failed computing digest [%s]" , err )
132
135
}
133
136
134
- // TODO: Are these ok to log ?
135
- if mspLogger .IsEnabledFor (logging .DEBUG ) {
136
- mspLogger .Debugf ("Verify: digest = %s" , hex .Dump (digest ))
137
- mspLogger .Debugf ("Verify: sig = %s" , hex .Dump (sig ))
137
+ if mspIdentityLogger .IsEnabledFor (logging .DEBUG ) {
138
+ mspIdentityLogger .Debugf ("Verify: digest = %s" , hex .Dump (digest ))
139
+ mspIdentityLogger .Debugf ("Verify: sig = %s" , hex .Dump (sig ))
138
140
}
139
141
140
142
valid , err := id .msp .bccsp .Verify (id .pk , sig , digest , nil )
@@ -159,7 +161,7 @@ func (id *identity) VerifyAttributes(proof []byte, spec *AttributeProofSpec) err
159
161
160
162
// Serialize returns a byte array representation of this identity
161
163
func (id * identity ) Serialize () ([]byte , error ) {
162
- // mspLogger .Infof("Serializing identity %s", id.id)
164
+ // mspIdentityLogger .Infof("Serializing identity %s", id.id)
163
165
164
166
pb := & pem.Block {Bytes : id .cert .Raw }
165
167
pemBytes := pem .EncodeToMemory (pb )
@@ -196,7 +198,7 @@ type signingidentity struct {
196
198
}
197
199
198
200
func newSigningIdentity (id * IdentityIdentifier , cert * x509.Certificate , pk bccsp.Key , signer crypto.Signer , msp * bccspmsp ) (SigningIdentity , error ) {
199
- //mspLogger .Infof("Creating signing identity instance for ID %s", id)
201
+ //mspIdentityLogger .Infof("Creating signing identity instance for ID %s", id)
200
202
mspId , err := newIdentity (id , cert , pk , msp )
201
203
if err != nil {
202
204
return nil , err
@@ -206,7 +208,7 @@ func newSigningIdentity(id *IdentityIdentifier, cert *x509.Certificate, pk bccsp
206
208
207
209
// Sign produces a signature over msg, signed by this instance
208
210
func (id * signingidentity ) Sign (msg []byte ) ([]byte , error ) {
209
- //mspLogger .Infof("Signing message")
211
+ //mspIdentityLogger .Infof("Signing message")
210
212
211
213
// Compute Hash
212
214
hashOpt , err := id .getHashOpt (id .msp .cryptoConfig .SignatureHashFamily )
@@ -219,14 +221,12 @@ func (id *signingidentity) Sign(msg []byte) ([]byte, error) {
219
221
return nil , fmt .Errorf ("Failed computing digest [%s]" , err )
220
222
}
221
223
222
- // TODO - consider removing these debug statements in the future as they may
223
- // contain confidential information
224
224
if len (msg ) < 32 {
225
- mspLogger .Debugf ("Sign: plaintext: %X \n " , msg )
225
+ mspIdentityLogger .Debugf ("Sign: plaintext: %X \n " , msg )
226
226
} else {
227
- mspLogger .Debugf ("Sign: plaintext: %X...%X \n " , msg [0 :16 ], msg [len (msg )- 16 :])
227
+ mspIdentityLogger .Debugf ("Sign: plaintext: %X...%X \n " , msg [0 :16 ], msg [len (msg )- 16 :])
228
228
}
229
- mspLogger .Debugf ("Sign: digest: %X \n " , digest )
229
+ mspIdentityLogger .Debugf ("Sign: digest: %X \n " , digest )
230
230
231
231
// Sign
232
232
return id .signer .Sign (rand .Reader , digest , nil )
0 commit comments