Skip to content

Commit

Permalink
change evaluate RequestId for update config tx
Browse files Browse the repository at this point in the history
Signed-off-by: Fedor Partanskiy <[email protected]>
  • Loading branch information
pfi79 committed Dec 28, 2023
1 parent 4201eb5 commit 557c936
Show file tree
Hide file tree
Showing 4 changed files with 39 additions and 3 deletions.
5 changes: 3 additions & 2 deletions orderer/consensus/smartbft/chain.go
Original file line number Diff line number Diff line change
Expand Up @@ -107,14 +107,15 @@ func NewChain(
metricsWalBFT *wal.Metrics,
bccsp bccsp.BCCSP,
) (*BFTChain, error) {
logger := flogging.MustGetLogger("orderer.consensus.smartbft.chain").With(zap.String("channel", support.ChannelID()))

requestInspector := &RequestInspector{
ValidateIdentityStructure: func(_ *msp.SerializedIdentity) error {
return nil
},
Logger: logger,
}

logger := flogging.MustGetLogger("orderer.consensus.smartbft.chain").With(zap.String("channel", support.ChannelID()))

c := &BFTChain{
RuntimeConfig: &atomic.Value{},
Channel: support.ChannelID(),
Expand Down
22 changes: 22 additions & 0 deletions orderer/consensus/smartbft/util.go
Original file line number Diff line number Diff line change
Expand Up @@ -254,6 +254,7 @@ type request struct {
// RequestInspector inspects incomming requests and validates serialized identity
type RequestInspector struct {
ValidateIdentityStructure func(identity *msp.SerializedIdentity) error
Logger *flogging.FabricLogger
}

func (ri *RequestInspector) requestIDFromSigHeader(sigHdr *cb.SignatureHeader) (types.RequestInfo, error) {
Expand Down Expand Up @@ -283,6 +284,22 @@ func (ri *RequestInspector) RequestID(rawReq []byte) types.RequestInfo {
if err != nil {
return types.RequestInfo{}
}

if req.chHdr.Type == int32(cb.HeaderType_CONFIG) {
configEnvelope := &cb.ConfigEnvelope{}
_, err = protoutil.UnmarshalEnvelopeOfType(req.envelope, cb.HeaderType_CONFIG, configEnvelope)
if err != nil {
ri.Logger.Errorf("can't get config envelope: %s", err.Error())
return types.RequestInfo{}
}

req, err = ri.unwrapReqFromEnvelop(configEnvelope.LastUpdate)
if err != nil {
ri.Logger.Errorf("can't unwrap request from last update: %s", err.Error())
return types.RequestInfo{}
}
}

reqInfo, err := ri.requestIDFromSigHeader(req.sigHdr)
if err != nil {
return types.RequestInfo{}
Expand All @@ -295,6 +312,11 @@ func (ri *RequestInspector) unwrapReq(req []byte) (*request, error) {
if err != nil {
return nil, err
}

return ri.unwrapReqFromEnvelop(envelope)
}

func (ri *RequestInspector) unwrapReqFromEnvelop(envelope *cb.Envelope) (*request, error) {
payload := &cb.Payload{}
if err := proto.Unmarshal(envelope.Payload, payload); err != nil {
return nil, errors.Wrap(err, "failed unmarshaling payload")
Expand Down
13 changes: 12 additions & 1 deletion orderer/consensus/smartbft/verifier.go
Original file line number Diff line number Diff line change
Expand Up @@ -190,11 +190,22 @@ func (v *Verifier) verifyRequest(rawRequest []byte, noConfigAllowed bool) (types
}

if req.chHdr.Type == int32(cb.HeaderType_CONFIG) {
err := v.ConfigValidator.ValidateConfig(req.envelope)
err = v.ConfigValidator.ValidateConfig(req.envelope)
if err != nil {
v.Logger.Errorf("Error verifying config update: %v", err)
return types.RequestInfo{}, err
}

configEnvelope := &cb.ConfigEnvelope{}
_, err = protoutil.UnmarshalEnvelopeOfType(req.envelope, cb.HeaderType_CONFIG, configEnvelope)
if err != nil {
return types.RequestInfo{}, err
}

req, err = v.ReqInspector.unwrapReqFromEnvelop(configEnvelope.LastUpdate)
if err != nil {
return types.RequestInfo{}, nil
}
}

return v.ReqInspector.requestIDFromSigHeader(req.sigHdr)
Expand Down
2 changes: 2 additions & 0 deletions orderer/consensus/smartbft/verifier_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -111,6 +111,7 @@ func TestVerifyConsenterSig(t *testing.T) {
ValidateIdentityStructure: func(_ *msp.SerializedIdentity) error {
return nil
},
Logger: logger,
}

cv := &mocks.ConsenterVerifier{}
Expand Down Expand Up @@ -415,6 +416,7 @@ func TestVerifyProposal(t *testing.T) {
ValidateIdentityStructure: func(_ *msp.SerializedIdentity) error {
return nil
},
Logger: logger,
}

lastHash := hex.EncodeToString(protoutil.BlockHeaderHash(lastBlock.Header))
Expand Down

0 comments on commit 557c936

Please sign in to comment.