Skip to content
This repository was archived by the owner on Apr 25, 2025. It is now read-only.

Commit aedc226

Browse files
committed
[FAB-10568] identity config follow up fix
- fix to use literals based on previous codereview comments Change-Id: I5fab62ad68246fe0e1b9e5c9fd4cfcdce395da9d Signed-off-by: Sudesh Shetty <sudesh.shetty@securekey.com>
1 parent 6599f55 commit aedc226

File tree

2 files changed

+37
-38
lines changed

2 files changed

+37
-38
lines changed

pkg/msp/identityconfig.go

Lines changed: 18 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -217,15 +217,14 @@ func (c *IdentityConfig) loadClientTLSConfig(configEntity *identityConfigEntity)
217217
return errors.WithMessage(err, "failed to load client cert")
218218
}
219219

220-
identityClient := &msp.ClientConfig{}
221-
identityClient.Organization = configEntity.Client.Organization
222-
identityClient.Logging = configEntity.Client.Logging
223-
identityClient.CryptoConfig = configEntity.Client.CryptoConfig
224-
identityClient.CredentialStore = configEntity.Client.CredentialStore
225-
identityClient.TLSKey = configEntity.Client.TLSCerts.Client.Key.Bytes()
226-
identityClient.TLSCert = configEntity.Client.TLSCerts.Client.Cert.Bytes()
227-
228-
c.client = identityClient
220+
c.client = &msp.ClientConfig{
221+
Organization: configEntity.Client.Organization,
222+
Logging: configEntity.Client.Logging,
223+
CryptoConfig: configEntity.Client.CryptoConfig,
224+
CredentialStore: configEntity.Client.CredentialStore,
225+
TLSKey: configEntity.Client.TLSCerts.Client.Key.Bytes(),
226+
TLSCert: configEntity.Client.TLSCerts.Client.Cert.Bytes(),
227+
}
229228

230229
return nil
231230
}
@@ -288,20 +287,20 @@ func (c *IdentityConfig) loadAllCAConfigs(configEntity *identityConfigEntity) er
288287
}
289288

290289
func (c *IdentityConfig) getMSPCAConfig(caConfig *CAConfig) (*msp.CAConfig, error) {
291-
mspCAConfig := &msp.CAConfig{}
292-
var err error
293-
294-
mspCAConfig.URL = caConfig.URL
295-
mspCAConfig.Registrar = caConfig.Registrar
296-
mspCAConfig.CAName = caConfig.CAName
297-
mspCAConfig.TLSCAClientCert = caConfig.TLSCACerts.Client.Cert.Bytes()
298-
mspCAConfig.TLSCAClientKey = caConfig.TLSCACerts.Client.Key.Bytes()
299-
mspCAConfig.TLSCAServerCerts, err = c.getServerCerts(caConfig)
290+
291+
serverCerts, err := c.getServerCerts(caConfig)
300292
if err != nil {
301293
return nil, err
302294
}
303295

304-
return mspCAConfig, nil
296+
return &msp.CAConfig{
297+
URL: caConfig.URL,
298+
Registrar: caConfig.Registrar,
299+
CAName: caConfig.CAName,
300+
TLSCAClientCert: caConfig.TLSCACerts.Client.Cert.Bytes(),
301+
TLSCAClientKey: caConfig.TLSCACerts.Client.Key.Bytes(),
302+
TLSCAServerCerts: serverCerts,
303+
}, nil
305304
}
306305

307306
func (c *IdentityConfig) getServerCerts(caConfig *CAConfig) ([][]byte, error) {

test/integration/e2e/configless/identityconfig_override_test.go

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -47,15 +47,14 @@ type exampleClient struct {
4747

4848
func (m *exampleClient) Client() *msp.ClientConfig {
4949

50-
mspClient := &msp.ClientConfig{}
51-
mspClient.Organization = strings.ToLower(client.Organization)
52-
mspClient.Logging = client.Logging
53-
mspClient.CredentialStore = client.CredentialStore
54-
mspClient.CryptoConfig = client.CryptoConfig
55-
mspClient.TLSCert = client.TLSCerts.Client.Cert.Bytes()
56-
mspClient.TLSKey = client.TLSCerts.Client.Key.Bytes()
57-
58-
return mspClient
50+
return &msp.ClientConfig{
51+
Organization: strings.ToLower(client.Organization),
52+
Logging: client.Logging,
53+
CryptoConfig: client.CryptoConfig,
54+
CredentialStore: client.CredentialStore,
55+
TLSKey: client.TLSCerts.Client.Key.Bytes(),
56+
TLSCert: client.TLSCerts.Client.Cert.Bytes(),
57+
}
5958
}
6059

6160
type exampleCaConfig struct{}
@@ -65,20 +64,21 @@ func (m *exampleCaConfig) CAConfig(org string) (*msp.CAConfig, bool) {
6564
}
6665

6766
func getMSPCAConfig(caConfig *caConfig) (*msp.CAConfig, error) {
68-
mspCAConfig := &msp.CAConfig{}
69-
var err error
70-
71-
mspCAConfig.URL = caConfig.URL
72-
mspCAConfig.Registrar = caConfig.Registrar
73-
mspCAConfig.CAName = caConfig.CAName
74-
mspCAConfig.TLSCAClientCert = caConfig.TLSCACerts.Client.Cert.Bytes()
75-
mspCAConfig.TLSCAClientKey = caConfig.TLSCACerts.Client.Key.Bytes()
76-
mspCAConfig.TLSCAServerCerts, err = getServerCerts(caConfig)
67+
68+
serverCerts, err := getServerCerts(caConfig)
7769
if err != nil {
7870
return nil, err
7971
}
8072

81-
return mspCAConfig, nil
73+
return &msp.CAConfig{
74+
URL: caConfig.URL,
75+
Registrar: caConfig.Registrar,
76+
CAName: caConfig.CAName,
77+
TLSCAClientCert: caConfig.TLSCACerts.Client.Cert.Bytes(),
78+
TLSCAClientKey: caConfig.TLSCACerts.Client.Key.Bytes(),
79+
TLSCAServerCerts: serverCerts,
80+
}, nil
81+
8282
}
8383

8484
func getServerCerts(caConfig *caConfig) ([][]byte, error) {

0 commit comments

Comments
 (0)