Skip to content
This repository was archived by the owner on Apr 25, 2025. It is now read-only.

Commit 07c145d

Browse files
committed
[FAB-7849] Hide deprecated methods behind build tag
Change-Id: Ic2de488ce73ab7d01b89a91ec72e9a7e3ce20347 Signed-off-by: Troy Ronda <troy@troyronda.com>
1 parent c898ec5 commit 07c145d

File tree

14 files changed

+187
-148
lines changed

14 files changed

+187
-148
lines changed

Makefile

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,9 @@ THIRDPARTY_FABRIC_COMMIT ?= v1.1.0-alpha
7070
# Force removal of images in cleanup (overridable)
7171
FIXTURE_DOCKER_REMOVE_FORCE ?= false
7272

73+
# Options for exercising unit tests (overridable)
74+
FABRIC_DEPRECATED_UNITTEST ?= false
75+
7376
# Code levels to exercise integration/e2e tests against (overridable)
7477
FABRIC_STABLE_INTTEST ?= true
7578
FABRIC_STABLE_PKCS11_INTTEST ?= false
@@ -129,6 +132,7 @@ GO_DEP_COMMIT := v0.4.1
129132
ifdef JENKINS_URL
130133
export FABRIC_SDKGO_DEPEND_INSTALL=true
131134

135+
FABRIC_DEPRECATED_UNITTEST := true
132136
FABRIC_STABLE_INTTEST := true
133137
FABRIC_STABLE_PKCS11_INTTEST := true
134138
FABRIC_PREV_INTTEST := true
@@ -202,6 +206,9 @@ build-softhsm2-image:
202206
.PHONY: unit-test
203207
unit-test: checks depend populate
204208
@FABRIC_SDKGO_CODELEVEL=$(FABRIC_CODELEVEL_UNITTEST_TAG) FABRIC_SDKGO_CODELEVEL_VER=$(FABRIC_CODELEVEL_UNITTEST_VER) $(TEST_SCRIPTS_PATH)/unit.sh
209+
ifeq ($(FABRIC_DEPRECATED_UNITTEST),true)
210+
@GO_TAGS="$(GO_TAGS) deprecated" GO_TESTFLAGS="$(GO_TESTFLAGS) -count=1" FABRIC_SDKGO_CODELEVEL=$(FABRIC_CODELEVEL_UNITTEST_TAG) FABRIC_SDKGO_CODELEVEL_VER=$(FABRIC_CODELEVEL_UNITTEST_VER) $(TEST_SCRIPTS_PATH)/unit.sh
211+
endif
205212

206213
.PHONY: unit-tests
207214
unit-tests: unit-test
@@ -210,7 +217,6 @@ unit-tests: unit-test
210217
unit-tests-pkcs11: checks depend populate
211218
@FABRIC_SDKGO_CODELEVEL=$(FABRIC_CODELEVEL_UNITTEST_TAG) FABRIC_SDKGO_CODELEVEL_VER=$(FABRIC_CODELEVEL_UNITTEST_VER) $(TEST_SCRIPTS_PATH)/unit-pkcs11.sh
212219

213-
214220
.PHONY: integration-tests-stable
215221
integration-tests-stable: clean depend populate
216222
@cd $(FIXTURE_DOCKERENV_PATH) && \

pkg/fab/client.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc. All Rights Reserved.
35

pkg/fab/client_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc. All Rights Reserved.
35

pkg/fab/events/eventmocks.go

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@ import (
1616
fcConsumer "github.com/hyperledger/fabric-sdk-go/internal/github.com/hyperledger/fabric/events/consumer"
1717
"github.com/hyperledger/fabric-sdk-go/pkg/context"
1818
"github.com/hyperledger/fabric-sdk-go/pkg/context/api/fab"
19-
client "github.com/hyperledger/fabric-sdk-go/pkg/fab"
2019
"github.com/hyperledger/fabric-sdk-go/pkg/fab/mocks"
2120
ledger_util "github.com/hyperledger/fabric-sdk-go/third_party/github.com/hyperledger/fabric/core/ledger/util"
2221
"github.com/hyperledger/fabric-sdk-go/third_party/github.com/hyperledger/fabric/protos/common"
@@ -109,10 +108,11 @@ func (mec *mockEventClient) Stop() error {
109108
}
110109

111110
func createMockedEventHub() (*EventHub, *mockEventClientFactory, error) {
112-
client := client.NewClient(mocks.NewMockConfig())
111+
user := mocks.NewMockUser("user")
112+
fabCtx := mocks.NewMockContext(user)
113113
ctx := Context{
114-
ProviderContext: client,
115-
IdentityContext: client.IdentityContext(),
114+
ProviderContext: fabCtx,
115+
IdentityContext: fabCtx,
116116
}
117117
eventHub, err := New(ctx)
118118
if err != nil {

pkg/fab/orderer/deprecated.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc., Unchain B.V. All Rights Reserved.
35

pkg/fab/orderer/deprecated_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc. All Rights Reserved.
35

pkg/fab/orderer/orderer_test.go

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ SPDX-License-Identifier: Apache-2.0
77
package orderer
88

99
import (
10+
"crypto/x509"
1011
"fmt"
1112
"net"
1213
"reflect"
@@ -351,13 +352,14 @@ func TestBroadcastBadDial(t *testing.T) {
351352
config := mock_core.NewMockConfig(mockCtrl)
352353

353354
config.EXPECT().TimeoutOrDefault(core.OrdererConnection).Return(time.Second * 1)
354-
config.EXPECT().TLSCACertPool(gomock.Any()).Return(nil, errors.New("error adding cert to pool")).AnyTimes()
355+
config.EXPECT().TLSCACertPool(gomock.Any()).Return(x509.NewCertPool(), nil).AnyTimes()
355356

356-
orderer, _ := NewOrderer("grpc://127.0.0.1:0", "", "", config, kap)
357+
orderer, err := New(config, WithURL("grpc://127.0.0.1:0"))
358+
assert.Nil(t, err)
357359
orderer.grpcDialOption = append(orderer.grpcDialOption, grpc.WithBlock())
358360
orderer.secured = true
359361
orderer.allowInsecure = true
360-
_, err := orderer.SendBroadcast(&fab.SignedEnvelope{})
362+
_, err = orderer.SendBroadcast(&fab.SignedEnvelope{})
361363
assert.NotNil(t, err)
362364

363365
if err == nil || !strings.Contains(err.Error(), "CONNECTION_FAILED") {
@@ -519,7 +521,7 @@ func TestNewOrdererFromConfig(t *testing.T) {
519521
URL: "",
520522
GRPCOptions: grpcOpts,
521523
}
522-
_, err := NewOrdererFromConfig(ordererConfig, mocks.NewMockConfig())
524+
_, err := New(mocks.NewMockConfig(), FromOrdererConfig(ordererConfig))
523525
if err != nil {
524526
t.Fatalf("Failed to get new orderer from config%v", err)
525527
}

pkg/fab/peer/deprecated.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc., Unchain B.V. All Rights Reserved.
35

pkg/fab/peer/deprecated_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc. All Rights Reserved.
35

pkg/fabsdk/deprecated.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc. All Rights Reserved.
35

pkg/fabsdk/deprecated_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
// +build deprecated
2+
13
/*
24
Copyright SecureKey Technologies Inc. All Rights Reserved.
35

test/integration/fab/fabric_ca_test.go

Lines changed: 0 additions & 138 deletions
Original file line numberDiff line numberDiff line change
@@ -7,102 +7,17 @@ SPDX-License-Identifier: Apache-2.0
77
package fab
88

99
import (
10-
"bytes"
11-
"math/rand"
12-
"strconv"
1310
"testing"
1411

15-
"github.com/hyperledger/fabric-sdk-go/pkg/context/api/core"
16-
17-
"github.com/hyperledger/fabric-sdk-go/pkg/context/api/fab"
1812
cryptosuite "github.com/hyperledger/fabric-sdk-go/pkg/core/cryptosuite/bccsp/sw"
19-
client "github.com/hyperledger/fabric-sdk-go/pkg/fab"
20-
"github.com/hyperledger/fabric-sdk-go/pkg/fab/identity"
2113
"github.com/hyperledger/fabric-sdk-go/pkg/fab/identitymgr"
22-
"github.com/hyperledger/fabric-sdk-go/pkg/fab/peer"
23-
"github.com/hyperledger/fabric-sdk-go/pkg/fab/signingmgr"
2414
)
2515

2616
const (
2717
org1Name = "Org1"
2818
org2Name = "Org2"
2919
)
3020

31-
// This test loads/enrols an admin user
32-
// Using the admin, it registers, enrols, and revokes a test user
33-
func TestRegisterEnrollRevoke(t *testing.T) {
34-
mspID, err := testFabricConfig.MspID(org1Name)
35-
if err != nil {
36-
t.Fatalf("GetMspId() returned error: %v", err)
37-
}
38-
39-
caConfig, err := testFabricConfig.CAConfig(org1Name)
40-
if err != nil {
41-
t.Fatalf("GetCAConfig returned error: %s", err)
42-
}
43-
44-
client := client.NewClient(testFabricConfig)
45-
46-
cryptoSuiteProvider, err := cryptosuite.GetSuiteByConfig(testFabricConfig)
47-
if err != nil {
48-
t.Fatalf("Failed getting cryptosuite from config : %s", err)
49-
}
50-
51-
stateStorePath := "/tmp/enroll_user"
52-
client.SetCryptoSuite(cryptoSuiteProvider)
53-
stateStore, err := identity.NewCertFileUserStore(stateStorePath, cryptoSuiteProvider)
54-
if err != nil {
55-
t.Fatalf("CreateNewFileKeyValueStore return error[%s]", err)
56-
}
57-
client.SetStateStore(stateStore)
58-
59-
idmgr, err := identitymgr.New(org1Name, testFabricConfig, cryptoSuiteProvider)
60-
if err != nil {
61-
t.Fatalf("NewFabricCAClient return error: %v", err)
62-
}
63-
64-
// Register a random user
65-
userName := createRandomName()
66-
registerRequest := fab.RegistrationRequest{
67-
Name: userName,
68-
Type: "user",
69-
Affiliation: "org1.department1",
70-
CAName: caConfig.CAName,
71-
}
72-
enrolmentSecret, err := idmgr.Register(&registerRequest)
73-
if err != nil {
74-
t.Fatalf("Error from Register: %s", err)
75-
}
76-
t.Logf("Registered User: %s, Secret: %s", userName, enrolmentSecret)
77-
// Enrol the previously registered user
78-
ekey, ecert, err := idmgr.Enroll(userName, enrolmentSecret)
79-
if err != nil {
80-
t.Fatalf("Error enroling user: %s", err.Error())
81-
}
82-
//re-enroll
83-
t.Logf("** Attempt to re-enrolled user: '%s'", userName)
84-
//create new user object and set certificate and private key of the previously enrolled user
85-
enrolleduser := identity.NewUser(mspID, userName)
86-
enrolleduser.SetEnrollmentCertificate(ecert)
87-
enrolleduser.SetPrivateKey(ekey)
88-
//reenroll
89-
_, reenrollCert, err := idmgr.Reenroll(enrolleduser)
90-
if err != nil {
91-
t.Fatalf("Error Reenroling user: %s", err.Error())
92-
}
93-
t.Logf("** User '%s' was re-enrolled", userName)
94-
if bytes.Equal(ecert, reenrollCert) {
95-
t.Fatalf("Error Reenroling user. Enrollmet and Reenrollment certificates are the same.")
96-
}
97-
98-
revokeRequest := fab.RevocationRequest{Name: userName, CAName: "ca.org1.example.com"}
99-
_, err = idmgr.Revoke(&revokeRequest)
100-
if err != nil {
101-
t.Fatalf("Error from Revoke: %s", err)
102-
}
103-
104-
}
105-
10621
func TestEnrollOrg2(t *testing.T) {
10722

10823
cryptoSuiteProvider, err := cryptosuite.GetSuiteByConfig(testFabricConfig)
@@ -126,56 +41,3 @@ func TestEnrollOrg2(t *testing.T) {
12641
t.Fatalf("Expected enrol to return an enrolment cert")
12742
}
12843
}
129-
130-
func TestEnrollAndTransact(t *testing.T) {
131-
mspID, err := testFabricConfig.MspID(org1Name)
132-
if err != nil {
133-
t.Fatalf("GetMspId() returned error: %v", err)
134-
}
135-
peers, err := testFabricConfig.PeersConfig(org1Name)
136-
if err != nil {
137-
t.Fatalf("Failed to get peer config : %s", err)
138-
}
139-
networkPeer := &core.NetworkPeer{PeerConfig: peers[0], MspID: mspID}
140-
testPeer, err := peer.New(testFabricConfig, peer.FromPeerConfig(networkPeer))
141-
if err != nil {
142-
t.Fatalf("Failed to create peer from config : %s", err)
143-
}
144-
145-
cryptoSuiteProvider, err := cryptosuite.GetSuiteByConfig(testFabricConfig)
146-
if err != nil {
147-
t.Fatalf("Failed getting cryptosuite from config : %s", err)
148-
}
149-
signingManager, err := signingmgr.New(cryptoSuiteProvider, testFabricConfig)
150-
if err != nil {
151-
t.Fatalf("Could not create signing manager: %s", err)
152-
}
153-
154-
caClient, err := identitymgr.New(org1Name, testFabricConfig, cryptoSuiteProvider)
155-
if err != nil {
156-
t.Fatalf("NewFabricCAClient returned error: %v", err)
157-
}
158-
159-
key, cert, err := caClient.Enroll("admin", "adminpw")
160-
if err != nil {
161-
t.Fatalf("Enroll returned error: %v", err)
162-
}
163-
164-
myUser := identity.NewUser(mspID, "myUser")
165-
myUser.SetEnrollmentCertificate(cert)
166-
myUser.SetPrivateKey(key)
167-
168-
testClient := client.NewClient(testFabricConfig)
169-
testClient.SetCryptoSuite(cryptoSuiteProvider)
170-
testClient.SetIdentityContext(myUser)
171-
testClient.SetSigningManager(signingManager)
172-
173-
_, err = testClient.QueryChannels(testPeer)
174-
if err != nil {
175-
t.Fatalf("Failed to query with enrolled user : %s", err)
176-
}
177-
}
178-
179-
func createRandomName() string {
180-
return "user" + strconv.Itoa(rand.Intn(500000))
181-
}

0 commit comments

Comments
 (0)