Fabric SDK无法初始化cryptosuite配置

I'm running a business network on IBM Cloud Blockchain Platform 2.0. I downloaded a connection profile from the instantiated smart contracts section on the Platform Console, and am trying to connect using the Fabric SDK for Go but I am facing an error.

This is my current relevant code, under main

configOpts := fabricConfig.FromFile("./profiles/flex.json")
fabSDK, err := fabsdk.New(configOpts)
if err != nil {
    entry.WithError(err).Fatal("Error setting up Fabric SDK")
}
defer fabSDK.Close()

Expected: Connects to the business network instance

Actual: I get an error

FATA[0000] Error setting up Fabric SDK env=DEV 
error="failed to initialize configuration: unable to initialize cryptosuite using crypto suite config: 
failed to initialize crypto suite: Unsupported BCCSP Provider: "

I add "cryptoconfig" path to the client.

BCCSP is optional, and you can remove.

I added the sample config, please see below.

More detail config at Github go-SDK config.yaml

{
"name": "first-network-org1",
"version": "1.0.0",
"client": {
    "organization": "Org1",
    "logging": {
        "level": "info"
    },
    "cryptoconfig": {
        "path": "crypto-config"
    },
    "credentialStore": {
        "path": "/tmp/keystore",
        "cryptoStore": {
            "path": "/tmp/msp"
        }
    },
    "connection": {
        "timeout": {
            "peer": {
                "endorser": "300"
            }
        }
    }
},
"channels": {
    "mychannel": {
        "peers": {
            "peer0.org1.example.com": {}
        }
    }
},
"orderers": {
    "orderer.example.com": {
        "url": "orderer.example.com:7050",
        "grpcOptions": {
            "ssl-target-name-override": "orderer.example.com",
            "keep-alive-time": "60s",
            "keep-alive-timeout": "60s",
            "keep-alive-permit": false,
            "fail-fast": false,
            "allow-insecure": false
        },
        "tlsCACerts": {
            "path": "crypto-config/ordererOrganizations/example.com/tlsca/tlsca.example.com-cert.pem"
        }
    }
},
"organizations": {
    "Org1": {
        "mspid": "Org1MSP",
        "cryptoPath": "crypto-config/peerOrganizations/org1.example.com/users/User1@org1.example.com/msp",
        "peers": [
            "peer0.org1.example.com",
            "peer1.org1.example.com"
        ],
        "certificateAuthorities": [
            "ca.org1.example.com"
        ]
    }
},
"peers": {
    "peer0.org1.example.com": {
        "url": "grpcs://localhost:7051",
        "tlsCACerts": {
            "path": "crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem"
        },
        "grpcOptions": {
            "ssl-target-name-override": "peer0.org1.example.com"
        }
    },
    "peer1.org1.example.com": {
        "url": "grpcs://localhost:8051",
        "tlsCACerts": {
            "path": "crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem"
        },
        "grpcOptions": {
            "ssl-target-name-override": "peer1.org1.example.com"
        }
    }
},
"certificateAuthorities": {
    "ca.org1.example.com": {
        "url": "https://localhost:7054",
        "caName": "ca-org1",
        "tlsCACerts": {
            "path": "crypto-config/peerOrganizations/org1.example.com/tlsca/tlsca.org1.example.com-cert.pem"
        },
        "httpOptions": {
            "verify": false
        }
    }
}

}