Skip to content

Commit 7c5f173

Browse files
authored
Merge pull request #573 from zigbee-alliance/add-schemaVersion-into-NOC-models
Add schemaVersion field into NOC/ICA and auxiliary models
2 parents 65d202d + 2cfde03 commit 7c5f173

File tree

164 files changed

+3229
-1795
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

164 files changed

+3229
-1795
lines changed

docs/static/openapi.yml

+475-6
Large diffs are not rendered by default.

docs/transactions.md

+2-11
Original file line numberDiff line numberDiff line change
@@ -850,8 +850,7 @@ The PAA certificate is immutable. It can only be revoked by either the owner or
850850
- info: `optional(string)` - information/notes for the proposal. Can contain up to 4096 characters.
851851
- time: `optional(int64)` - proposal time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
852852
- vid: `uint16` - Vendor ID (positive non-zero). Must be equal to the Certificate's `vid` field for VID-scoped PAA.
853-
- certificate-schema-version: `optional(uint16)` - Certificate's schema version to support backward/forward compatability(default 0)
854-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
853+
- schemaVersion: `optional(uint16)` - Certificate's schema version to support backward/forward compatability(default 0)
855854
- In State: `pki/ProposedCertificate/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
856855
- CLI command:
857856
- `dcld tx pki propose-add-x509-root-cert --certificate=<string-or-path> --from=<account>`
@@ -908,7 +907,6 @@ The certificate is not reject until sufficient number of Trustees reject it.
908907
`5A:88:0E:6C:36:53:D0:7F:B0:89:71:A3:F4:73:79:09:30:E6:2B:DB`
909908
- info: `optional(string)` - information/notes for the reject. Can contain up to 4096 characters.
910909
- time: `optional(int64)` - reject time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
911-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
912910
- In State: `pki/RejectedCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
913911
- Number of required rejects:
914912
- more than 1/3 of Trustees
@@ -943,7 +941,6 @@ then the certificate will be in a pending state until sufficient number of other
943941
- revoke-child: `optional(bool)` - to revoke child certificates in the chain - default is false.
944942
- info: `optional(string)` - information/notes for the revocation proposal. Can contain up to 4096 characters.
945943
- time: `optional(int64)` - revocation proposal time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
946-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
947944
- In State: `pki/ProposedCertificateRevocation/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
948945
- CLI command:
949946
- `dcld tx pki propose-revoke-x509-root-cert --subject=<base64 string> --subject-key-id=<hex string> --from=<account>`
@@ -1101,7 +1098,6 @@ Adds a PAI (intermediate certificate) signed by a chain of certificates which mu
11011098
- Parameters:
11021099
- cert: `string` - PEM encoded certificate. The corresponding CLI parameter can contain either a PEM string or a path to a file containing the data.
11031100
- certificate-schema-version: `optional(uint16)` - Certificate's schema version to support backward/forward compatability(default 0)
1104-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
11051101
- In State:
11061102
- `pki/ApprovedCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
11071103
- `pki/ChildCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
@@ -1153,7 +1149,6 @@ Root certificates can not be revoked this way, use [PROPOSE_REVOKE_PAA](#propos
11531149
- revoke-child: `optional(bool)` - to revoke child certificates in the chain - default is false.
11541150
- info: `optional(string)` - information/notes for the revocation. Can contain up to 4096 characters.
11551151
- time: `optional(int64)` - revocation time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
1156-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
11571152
- In State: `pki/RevokedCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
11581153
- CLI command:
11591154
- `dcld tx pki revoke-x509-cert --subject=<base64 string> --subject-key-id=<hex string> --from=<account>`
@@ -1359,8 +1354,7 @@ This transaction adds a NOC root certificate owned by the Vendor.
13591354
- Vendor account
13601355
- Parameters:
13611356
- cert: `string` - The NOC Root Certificate, encoded in X.509v3 PEM format. Can be a PEM string or a file path.
1362-
- certificate-schema-version: `optional(uint16)` - Certificate's schema version to support backward/forward compatability(default 0)
1363-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
1357+
- schemaVersion: `optional(uint16)` - Certificate's schema version to support backward/forward compatability(default 0)
13641358
- In State:
13651359
- `pki/ApprovedCertificates/value/<Subject>/<SubjectKeyID>`
13661360
- `pki/ApprovedCertificatesBySubject/value/<Subject>`
@@ -1397,7 +1391,6 @@ Revoked certificates can be retrieved by using the [GET_REVOKED_CERT](#get_revok
13971391
- revoke-child: `optional(bool)` - if true, then all certificates in the chain signed by the revoked certificate (intermediate, leaf) are revoked as well. If false, only the current root cert is revoked (default: false).
13981392
- info: `optional(string)` - information/notes for the revocation. Can contain up to 4096 characters.
13991393
- time: `optional(int64)` - revocation time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
1400-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
14011394
- In State:
14021395
- `pki/RevokedCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
14031396
- `pki/RevokedNocRootCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
@@ -1449,7 +1442,6 @@ already present on the ledger.
14491442
- Parameters:
14501443
- cert: `string` - The NOC non-root Certificate, encoded in X.509v3 PEM format. Can be a PEM string or a file path.
14511444
- certificate-schema-version: `optional(uint16)` - Certificate's schema version to support backward/forward compatability(default 0)
1452-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
14531445
- In State:
14541446
- `pki/ApprovedCertificates/value/<Subject>/<SubjectKeyID>`
14551447
- `pki/ApprovedCertificatesBySubject/value/<Subject>`
@@ -1480,7 +1472,6 @@ Revoked certificates can be retrieved by using the [GET_REVOKED_CERT](#get_revok
14801472
- revoke-child: `optional(bool)` - if true, then all certificates in the chain signed by the revoked certificate (leaf) are revoked as well. If false, only the current cert is revoked (default: false).
14811473
- info: `optional(string)` - information/notes for the revocation. Can contain up to 4096 characters.
14821474
- time: `optional(int64)` - revocation time (number of nanoseconds elapsed since January 1, 1970 UTC). CLI uses the current time for that field.
1483-
- schemaVersion: `optional(uint16)` - Schema version to support backward/forward compatability(default 0)
14841475
- In State:
14851476
- `pki/RevokedCertificates/value/<Certificate's Subject>/<Certificate's Subject Key ID>`
14861477
- CLI command:

integration_tests/cli/pki-demo.sh

+9-14
Original file line numberDiff line numberDiff line change
@@ -188,13 +188,13 @@ test_divider
188188
echo "$user_account (Not Trustee) propose Root certificate"
189189
root_path="integration_tests/constants/root_cert"
190190
cert_schema_version_1=1
191-
schema_version_2=2
191+
schema_version_0=0
192192
result=$(echo "$passphrase" | dcld tx pki propose-add-x509-root-cert --certificate="$root_path" --from $user_account --vid $vid --yes)
193193
result=$(get_txn_result "$result")
194194
response_does_not_contain "$result" "\"code\": 0"
195195

196196
echo "$trustee_account (Trustee) propose Root certificate"
197-
result=$(echo "$passphrase" | dcld tx pki propose-add-x509-root-cert --certificate="$root_path" --certificate-schema-version=$cert_schema_version_1 --schemaVersion=$schema_version_2 --from $trustee_account --vid $vid --yes)
197+
result=$(echo "$passphrase" | dcld tx pki propose-add-x509-root-cert --certificate="$root_path" --schemaVersion=$cert_schema_version_1 --from $trustee_account --vid $vid --yes)
198198
result=$(get_txn_result "$result")
199199
check_response "$result" "\"code\": 0"
200200

@@ -206,7 +206,7 @@ echo $result | jq
206206
check_response "$result" "\"subject\": \"$root_cert_subject\""
207207
check_response "$result" "\"subjectKeyId\": \"$root_cert_subject_key_id\""
208208
check_response "$result" "\"certSchemaVersion\": $cert_schema_version_1"
209-
check_response "$result" "\"schemaVersion\": $schema_version_2"
209+
check_response "$result" "\"schemaVersion\": $schema_version_0"
210210

211211
test_divider
212212

@@ -390,7 +390,7 @@ test_divider
390390

391391
echo "$vendor_account adds Intermediate certificate"
392392
intermediate_path="integration_tests/constants/intermediate_cert"
393-
result=$(echo "$passphrase" | dcld tx pki add-x509-cert --certificate="$intermediate_path" --certificate-schema-version=$cert_schema_version_1 --schemaVersion=$schema_version_2 --from $vendor_account --yes)
393+
result=$(echo "$passphrase" | dcld tx pki add-x509-cert --certificate="$intermediate_path" --schemaVersion=$cert_schema_version_1 --from $vendor_account --yes)
394394
result=$(get_txn_result "$result")
395395
check_response "$result" "\"code\": 0"
396396

@@ -405,7 +405,7 @@ check_response "$result" "\"subjectKeyId\": \"$intermediate_cert_subject_key_id\
405405
check_response "$result" "\"serialNumber\": \"$intermediate_cert_serial_number\""
406406
check_response "$result" "\"subjectAsText\": \"$intermediate_cert_subject_as_text\""
407407
check_response "$result" "\"schemaVersion\": $cert_schema_version_1"
408-
check_response "$result" "\"schemaVersion\": $schema_version_2"
408+
check_response "$result" "\"schemaVersion\": 0"
409409
check_response "$result" "\"approvals\": \\[\\]"
410410

411411
echo "Request Intermediate certificate by subjectKeyId - There are no approvals for Intermidiate Certificates"
@@ -680,9 +680,8 @@ result=$(echo "$passphrase" | dcld tx pki revoke-x509-cert --subject="$intermedi
680680
result=$(get_txn_result "$result")
681681
check_response "$result" "\"code\": 4"
682682

683-
revoke_schema_version_3=3
684683
echo "$vendor_account (Not Trustee) revokes only Intermediate certificate. This must not revoke its child - Leaf certificate."
685-
result=$(echo "$passphrase" | dcld tx pki revoke-x509-cert --subject="$intermediate_cert_subject" --subject-key-id="$intermediate_cert_subject_key_id" --schemaVersion=$revoke_schema_version_3 --from=$vendor_account --yes)
684+
result=$(echo "$passphrase" | dcld tx pki revoke-x509-cert --subject="$intermediate_cert_subject" --subject-key-id="$intermediate_cert_subject_key_id" --from=$vendor_account --yes)
686685
result=$(get_txn_result "$result")
687686
check_response "$result" "\"code\": 0"
688687

@@ -712,7 +711,6 @@ result=$(dcld query pki all-revoked-x509-certs)
712711
echo $result | jq
713712
check_response "$result" "\"subject\": \"$intermediate_cert_subject\""
714713
check_response "$result" "\"subjectKeyId\": \"$intermediate_cert_subject_key_id\""
715-
check_response "$result" "\"schemaVersion\": $revoke_schema_version_3"
716714
response_does_not_contain "$result" "\"subject\": \"$leaf_cert_subject\""
717715
response_does_not_contain "$result" "\"subjectKeyId\": \"$leaf_cert_subject_key_id\""
718716
response_does_not_contain "$result" "\"subject\": \"$root_cert_subject\""
@@ -822,9 +820,8 @@ test_divider
822820
echo "7. PROPOSE REVOCATION OF ROOT CERT"
823821
test_divider
824822

825-
revoke_schema_version_4=4
826823
echo "$trustee_account (Trustee) proposes to revoke only Root certificate(child certificates should not be revoked)"
827-
result=$(echo "$passphrase" | dcld tx pki propose-revoke-x509-root-cert --subject="$root_cert_subject" --subject-key-id="$root_cert_subject_key_id" --schemaVersion=$revoke_schema_version_4 --from $trustee_account --yes)
824+
result=$(echo "$passphrase" | dcld tx pki propose-revoke-x509-root-cert --subject="$root_cert_subject" --subject-key-id="$root_cert_subject_key_id" --from $trustee_account --yes)
828825
result=$(get_txn_result "$result")
829826
check_response "$result" "\"code\": 0"
830827

@@ -842,7 +839,6 @@ result=$(dcld query pki all-proposed-x509-root-certs-to-revoke)
842839
echo $result | jq
843840
check_response "$result" "\"subject\": \"$root_cert_subject\""
844841
check_response "$result" "\"subjectKeyId\": \"$root_cert_subject_key_id\""
845-
check_response "$result" "\"schemaVersion\": $revoke_schema_version_4"
846842
response_does_not_contain "$result" "\"subject\": \"$intermediate_cert_subject\""
847843
response_does_not_contain "$result" "\"subjectKeyId\": \"$intermediate_cert_subject_key_id\""
848844
response_does_not_contain "$result" "\"subject\": \"$leaf_cert_subject\""
@@ -1689,9 +1685,8 @@ response_does_not_contain "$result" "\"subjectAsText\": \"$test_cert_subject_as_
16891685

16901686
test_divider
16911687

1692-
reject_schema_version_4=4
16931688
echo "$second_trustee_account (Second Trustee) rejects Root certificate"
1694-
result=$(echo "$passphrase" | dcld tx pki reject-add-x509-root-cert --subject="$test_cert_subject" --subject-key-id="$test_cert_subject_key_id" --schemaVersion=$reject_schema_version_4 --from $second_trustee_account --yes)
1689+
result=$(echo "$passphrase" | dcld tx pki reject-add-x509-root-cert --subject="$test_cert_subject" --subject-key-id="$test_cert_subject_key_id" --from $second_trustee_account --yes)
16951690
result=$(get_txn_result "$result")
16961691
check_response "$result" "\"code\": 0"
16971692

@@ -1722,7 +1717,7 @@ check_response "$result" "\"serialNumber\": \"$test_cert_serial_number\""
17221717
check_response "$result" "\"subjectAsText\": \"$test_cert_subject_as_text\""
17231718
check_response "$result" "\"address\": \"$trustee_account_address\""
17241719
check_response "$result" "\"address\": \"$second_trustee_account_address\""
1725-
check_response "$result" "\"schemaVersion\": $reject_schema_version_4"
1720+
check_response "$result" "\"schemaVersion\": $schema_version_0"
17261721

17271722
test_divider
17281723

integration_tests/cli/pki-noc-certs.sh

+8-10
Original file line numberDiff line numberDiff line change
@@ -153,9 +153,8 @@ result=$(get_txn_result "$result")
153153
check_response "$result" "\"code\": 414"
154154

155155
cert_schema_version_1=1
156-
schema_version_2=2
157156
echo "Add first NOC root certificate by vendor with VID = $vid"
158-
result=$(echo "$passphrase" | dcld tx pki add-noc-x509-root-cert --certificate="$noc_root_cert_1_path" --certificate-schema-version=$cert_schema_version_1 --schemaVersion=$schema_version_2 --from $vendor_account --yes)
157+
result=$(echo "$passphrase" | dcld tx pki add-noc-x509-root-cert --certificate="$noc_root_cert_1_path" --schemaVersion=$cert_schema_version_1 --from $vendor_account --yes)
159158
result=$(get_txn_result "$result")
160159
check_response "$result" "\"code\": 0"
161160

@@ -186,6 +185,7 @@ check_response "$result" "\"serialNumber\": \"$noc_root_cert_2_serial_number\""
186185
check_response "$result" "\"subjectAsText\": \"$noc_root_cert_2_subject_as_text\""
187186
check_response "$result" "\"schemaVersion\": $cert_schema_version_0"
188187
check_response "$result" "\"schemaVersion\": $cert_schema_version_1"
188+
check_response "$result" "\"schemaVersion\": $schema_version_0"
189189
check_response "$result" "\"vid\": $vid"
190190

191191
test_divider
@@ -292,9 +292,8 @@ check_response "$result" "\"code\": 439"
292292
test_divider
293293

294294
cert_schema_version_3=3
295-
schema_version_4=4
296295
echo "Add second NOC certificate by vendor with VID = $vid"
297-
result=$(echo "$passphrase" | dcld tx pki add-noc-x509-ica-cert --certificate="$noc_cert_2_path" --certificate-schema-version=$cert_schema_version_3 --schemaVersion=$schema_version_4 --from $vendor_account --yes)
296+
result=$(echo "$passphrase" | dcld tx pki add-noc-x509-ica-cert --certificate="$noc_cert_2_path" --schemaVersion=$cert_schema_version_3 --from $vendor_account --yes)
298297
result=$(get_txn_result "$result")
299298
check_response "$result" "\"code\": 0"
300299

@@ -316,6 +315,7 @@ check_response "$result" "\"serialNumber\": \"$noc_cert_2_serial_number\""
316315
check_response "$result" "\"vid\": $vid"
317316
check_response "$result" "\"schemaVersion\": $cert_schema_version_0"
318317
check_response "$result" "\"schemaVersion\": $cert_schema_version_3"
318+
check_response "$result" "\"schemaVersion\": $schema_version_0"
319319

320320

321321
echo "Request all approved certificates"
@@ -364,9 +364,8 @@ result=$(echo "$passphrase" | dcld tx pki revoke-noc-x509-root-cert --subject="$
364364
result=$(get_txn_result "$result")
365365
check_response "$result" "\"code\": 439"
366366

367-
revoke_schema_version_5=5
368367
echo "$vendor_account Vendor revokes only root certificate, it should not revoke intermediate certificates"
369-
result=$(echo "$passphrase" | dcld tx pki revoke-noc-x509-root-cert --subject="$noc_root_cert_1_subject" --subject-key-id="$noc_root_cert_1_subject_key_id" --schemaVersion=$revoke_schema_version_5 --from=$vendor_account --yes)
368+
result=$(echo "$passphrase" | dcld tx pki revoke-noc-x509-root-cert --subject="$noc_root_cert_1_subject" --subject-key-id="$noc_root_cert_1_subject_key_id" --from=$vendor_account --yes)
370369
result=$(get_txn_result "$result")
371370
check_response "$result" "\"code\": 0"
372371

@@ -377,7 +376,7 @@ check_response "$result" "\"subject\": \"$noc_root_cert_1_subject"
377376
check_response "$result" "\"subjectKeyId\": \"$noc_root_cert_1_subject_key_id\""
378377
check_response "$result" "\"serialNumber\": \"$noc_root_cert_1_serial_number\""
379378
check_response "$result" "\"serialNumber\": \"$noc_root_cert_1_copy_serial_number\""
380-
check_response "$result" "\"schemaVersion\": $revoke_schema_version_5"
379+
check_response "$result" "\"schemaVersion\": $schema_version_0"
381380
response_does_not_contain "$result" "\"subject\": \"$noc_cert_1_subject\""
382381
response_does_not_contain "$result" "\"subject\": \"$noc_leaf_cert_1_subject\""
383382

@@ -490,9 +489,8 @@ result=$(echo "$passphrase" | dcld tx pki revoke-noc-x509-ica-cert --subject="$n
490489
result=$(get_txn_result "$result")
491490
check_response "$result" "\"code\": 439"
492491

493-
revoke_schema_version_6=6
494492
echo "$vendor_account Vendor revokes only NOC certificates, it should not revoke leaf certificates"
495-
result=$(echo "$passphrase" | dcld tx pki revoke-noc-x509-ica-cert --subject="$noc_cert_1_subject" --subject-key-id="$noc_cert_1_subject_key_id" --schemaVersion=$revoke_schema_version_6 --from=$vendor_account --yes)
493+
result=$(echo "$passphrase" | dcld tx pki revoke-noc-x509-ica-cert --subject="$noc_cert_1_subject" --subject-key-id="$noc_cert_1_subject_key_id" --from=$vendor_account --yes)
496494
result=$(get_txn_result "$result")
497495
check_response "$result" "\"code\": 0"
498496

@@ -506,7 +504,7 @@ check_response "$result" "\"serialNumber\": \"$noc_root_cert_1_copy_serial_numbe
506504
check_response "$result" "\"subject\": \"$noc_cert_1_subject\""
507505
check_response "$result" "\"subjectKeyId\": \"$noc_cert_1_subject_key_id\""
508506
check_response "$result" "\"serialNumber\": \"$noc_cert_1_serial_number"
509-
check_response "$result" "\"schemaVersion\": $revoke_schema_version_6"
507+
check_response "$result" "\"schemaVersion\": $schema_version_0"
510508
response_does_not_contain "$result" "\"subject\": \"$noc_leaf_cert_1_subject\""
511509
response_does_not_contain "$result" "\"subjectKeyId\": \"$noc_leaf_cert_1_subject_key_id\""
512510
response_does_not_contain "$result" "\"serialNumber\": \"$noc_leaf_cert_1_serial_number"

integration_tests/grpc_rest/pki/noc_cert_helpers.go

+2
Original file line numberDiff line numberDiff line change
@@ -282,8 +282,10 @@ func NocCertDemo(suite *utils.TestSuite) {
282282
require.Equal(suite.T, 2, len(nocCertificates.Certs))
283283
require.Equal(suite.T, testconstants.NocRootCert1Subject, nocCertificates.Certs[0].Subject)
284284
require.Equal(suite.T, testconstants.NocRootCert1SubjectKeyID, nocCertificates.Certs[0].SubjectKeyId)
285+
require.Equal(suite.T, testconstants.SchemaVersion, nocCertificates.Certs[0].SchemaVersion)
285286
require.Equal(suite.T, testconstants.NocRootCert2Subject, nocCertificates.Certs[1].Subject)
286287
require.Equal(suite.T, testconstants.NocRootCert2SubjectKeyID, nocCertificates.Certs[1].SubjectKeyId)
288+
require.Equal(suite.T, testconstants.SchemaVersion, nocCertificates.SchemaVersion)
287289

288290
// Request NOC root certificate by VID1 and SKID1
289291
nocCertificatesByVidAndSkid, _ := GetNocX509RootCertsByVidAndSkid(suite, vid1, testconstants.NocRootCert1SubjectKeyID)

proto/zigbeealliance/distributedcomplianceledger/compliance/certified_model.proto

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ message CertifiedModel {
88
int32 pid = 2;
99
uint32 softwareVersion = 3;
1010
string certificationType = 4;
11-
bool value = 5;
12-
11+
bool value = 5;
12+
uint32 schemaVersion = 6;
1313
}
1414

proto/zigbeealliance/distributedcomplianceledger/compliance/compliance_history_item.proto

+2-1
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,6 @@ message ComplianceHistoryItem {
88
uint32 softwareVersionCertificationStatus = 1;
99
string date = 2;
1010
string reason = 3;
11-
uint32 cDVersionNumber = 4;
11+
uint32 cDVersionNumber = 4;
12+
uint32 schemaVersion = 5;
1213
}

proto/zigbeealliance/distributedcomplianceledger/compliance/device_software_compliance.proto

+1
Original file line numberDiff line numberDiff line change
@@ -8,4 +8,5 @@ import "zigbeealliance/distributedcomplianceledger/compliance/compliance_info.pr
88
message DeviceSoftwareCompliance {
99
string cDCertificateId = 1;
1010
repeated ComplianceInfo complianceInfo = 2;
11+
uint32 schemaVersion = 3;
1112
}

proto/zigbeealliance/distributedcomplianceledger/compliance/provisional_model.proto

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ message ProvisionalModel {
88
int32 pid = 2;
99
uint32 softwareVersion = 3;
1010
string certificationType = 4;
11-
bool value = 5;
12-
11+
bool value = 5;
12+
uint32 schemaVersion = 6;
1313
}
1414

0 commit comments

Comments
 (0)