Skip to content

Commit 880d235

Browse files
committed
[FAB-10715] Timeout error in CI
This issue will be better addressed in FAB-10662. This fix performs some missing cleanup and adds more stability around waiting for the sessions to complete. Change-Id: I2045b6369beacb28d46c0af644ef8f55e62ab2e3 Signed-off-by: Latitia M Haskins <latitia.haskins@gmail.com>
1 parent 3436f45 commit 880d235

File tree

4 files changed

+18
-16
lines changed

4 files changed

+18
-16
lines changed

integration/e2e/acl_test.go

+14-14
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ var _ = Describe("EndToEndACL", func() {
116116
By("invoking chaincode as a permitted Org1 Admin identity")
117117
sess, err := network.PeerAdminSession(org1Peer0, invokeChaincode)
118118
Expect(err).NotTo(HaveOccurred())
119-
Eventually(sess.Err).Should(gbytes.Say("Chaincode invoke successful. result: status:200"))
119+
Eventually(sess.Err, time.Minute).Should(gbytes.Say("Chaincode invoke successful. result: status:200"))
120120

121121
//
122122
// when the ACL policy for DeliverFiltered is not satisifed
@@ -129,7 +129,7 @@ var _ = Describe("EndToEndACL", func() {
129129
By("invoking chaincode as a forbidden Org1 Admin identity")
130130
sess, err = network.PeerAdminSession(org1Peer0, invokeChaincode)
131131
Expect(err).NotTo(HaveOccurred())
132-
Eventually(sess.Err).Should(gbytes.Say(`\Qdeliver completed with status (FORBIDDEN)\E`))
132+
Eventually(sess.Err, time.Minute).Should(gbytes.Say(`\Qdeliver completed with status (FORBIDDEN)\E`))
133133

134134
//
135135
// when the ACL policy for Deliver is satisfied
@@ -142,7 +142,7 @@ var _ = Describe("EndToEndACL", func() {
142142
By("fetching the latest block from the peer as a permitted Org1 Admin identity")
143143
sess, err = network.PeerAdminSession(org1Peer0, fetchNewest)
144144
Expect(err).NotTo(HaveOccurred())
145-
Eventually(sess).Should(gexec.Exit(0))
145+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
146146
Expect(sess.Err).To(gbytes.Say("Received block: "))
147147

148148
//
@@ -151,7 +151,7 @@ var _ = Describe("EndToEndACL", func() {
151151
By("fetching the latest block from the peer as a forbidden org2 Admin identity")
152152
sess, err = network.PeerAdminSession(org2Peer0, fetchNewest)
153153
Expect(err).NotTo(HaveOccurred())
154-
Eventually(sess).Should(gexec.Exit())
154+
Eventually(sess, time.Minute).Should(gexec.Exit())
155155
Expect(sess.Err).To(gbytes.Say("can't read the block: &{FORBIDDEN}"))
156156

157157
//
@@ -167,7 +167,7 @@ var _ = Describe("EndToEndACL", func() {
167167
ChannelID: "testchannel",
168168
})
169169
Expect(err).NotTo(HaveOccurred())
170-
Eventually(sess).Should(gexec.Exit(0))
170+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
171171
Expect(sess).To(gbytes.Say("Name: mycc, Version: 0.0, Path: .*, Escc: escc, Vscc: vscc"))
172172

173173
//
@@ -178,7 +178,7 @@ var _ = Describe("EndToEndACL", func() {
178178
ChannelID: "testchannel",
179179
})
180180
Expect(err).NotTo(HaveOccurred())
181-
Eventually(sess).Should(gexec.Exit())
181+
Eventually(sess, time.Minute).Should(gexec.Exit())
182182
Expect(sess).NotTo(gbytes.Say("Name: mycc, Version: 0.0, Path: .*, Escc: escc, Vscc: vscc"))
183183
Expect(sess.Err).To(gbytes.Say(`access denied for \[getchaincodes\]\[testchannel\](.*)signature set did not satisfy policy`))
184184

@@ -189,7 +189,7 @@ var _ = Describe("EndToEndACL", func() {
189189
// getting a transaction id from a block in the ledger
190190
sess, err = network.PeerAdminSession(org1Peer0, fetchNewest)
191191
Expect(err).NotTo(HaveOccurred())
192-
Eventually(sess).Should(gexec.Exit(0))
192+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
193193
Expect(sess.Err).To(gbytes.Say("Received block: "))
194194
txID := GetTxIDFromBlockFile(outputBlock)
195195

@@ -209,12 +209,12 @@ var _ = Describe("EndToEndACL", func() {
209209
By("evaluating " + policyName + " for a permitted subject")
210210
sess, err := network.PeerAdminSession(org1Peer0, chaincodeQuery)
211211
Expect(err).NotTo(HaveOccurred())
212-
Eventually(sess).Should(gexec.Exit(0))
212+
Eventually(sess, 30*time.Second).Should(gexec.Exit(0))
213213

214214
By("evaluating " + policyName + " for a forbidden subject")
215215
sess, err = network.PeerAdminSession(org2Peer0, chaincodeQuery)
216216
Expect(err).NotTo(HaveOccurred())
217-
Eventually(sess).Should(gexec.Exit())
217+
Eventually(sess, 30*time.Second).Should(gexec.Exit())
218218
Expect(sess.Err).To(gbytes.Say(fmt.Sprintf(`access denied for \[%s\]\[%s\](.*)signature set did not satisfy policy`, operation, "testchannel")))
219219
}
220220

@@ -258,7 +258,7 @@ func SetACLPolicy(network *nwo.Network, channel, policyName, policy string) {
258258

259259
sess, err := network.PeerAdminSession(org2AdminPeer, commands.SignConfigTx{File: outputFile})
260260
Expect(err).NotTo(HaveOccurred())
261-
Eventually(sess).Should(gexec.Exit(0))
261+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
262262

263263
SendConfigUpdate(network, org1AdminPeer, channel, outputFile)
264264
}
@@ -280,7 +280,7 @@ func GenerateACLConfigUpdate(network *nwo.Network, orderer *nwo.Orderer, channel
280280
peer := network.Peer("Org1", "peer0")
281281
sess, err := network.PeerAdminSession(peer, channelFetch)
282282
Expect(err).NotTo(HaveOccurred())
283-
Eventually(sess).Should(gexec.Exit(0))
283+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
284284
Expect(sess.Err).To(gbytes.Say("Received block: "))
285285

286286
// read the config block file
@@ -366,7 +366,7 @@ func SendConfigUpdate(network *nwo.Network, peer *nwo.Peer, channel, updateFile
366366

367367
sess, err := network.PeerAdminSession(peer, channelFetch)
368368
Expect(err).NotTo(HaveOccurred())
369-
Eventually(sess).Should(gexec.Exit(0))
369+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
370370
Expect(sess.Err).To(gbytes.Say("Received block: "))
371371

372372
prevConfigBlockNumber := GetNumberFromBlockFile(outputBlock)
@@ -377,13 +377,13 @@ func SendConfigUpdate(network *nwo.Network, peer *nwo.Peer, channel, updateFile
377377
File: updateFile,
378378
})
379379
Expect(err).NotTo(HaveOccurred())
380-
Eventually(sess).Should(gexec.Exit(0))
380+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
381381
Expect(sess.Err).To(gbytes.Say("Successfully submitted channel update"))
382382

383383
getConfigBlockNumber := func() uint64 {
384384
sess, err := network.PeerAdminSession(peer, channelFetch)
385385
Expect(err).NotTo(HaveOccurred())
386-
Eventually(sess).Should(gexec.Exit(0))
386+
Eventually(sess, time.Minute).Should(gexec.Exit(0))
387387
Expect(sess.Err).To(gbytes.Say("Received block: "))
388388
blockNumber := GetNumberFromBlockFile(outputBlock)
389389
return blockNumber

integration/e2e/e2e_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ var _ = Describe("EndToEnd", func() {
8888
})
8989
})
9090

91-
Describe("basic kaka network with 2 orgs", func() {
91+
Describe("basic kafka network with 2 orgs", func() {
9292
BeforeEach(func() {
9393
network = nwo.New(nwo.BasicKafka(), testDir, client, 31000, components)
9494
network.GenerateConfigTree()

integration/world/config.go

+2
Original file line numberDiff line numberDiff line change
@@ -502,6 +502,7 @@ func (w *World) Close(deployments ...Deployment) {
502502
func (w *World) cleanupDeployment(d Deployment) {
503503
// cleanup containers
504504
containers, err := w.DockerClient.ListContainers(docker.ListContainersOptions{
505+
All: true,
505506
Filters: map[string][]string{
506507
"name": []string{fmt.Sprintf("%s-%s", d.Chaincode.Name, d.Chaincode.Version)},
507508
},
@@ -513,6 +514,7 @@ func (w *World) cleanupDeployment(d Deployment) {
513514

514515
// cleanup images
515516
images, err := w.DockerClient.ListImages(docker.ListImagesOptions{
517+
All: true,
516518
Filters: map[string][]string{
517519
"label": []string{fmt.Sprintf("org.hyperledger.fabric.chaincode.id.name=%s", d.Chaincode.Name)},
518520
},

integration/world/config_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ var _ = Describe("Config", func() {
3939
})
4040

4141
AfterEach(func() {
42-
w.Close()
42+
w.Close(deployment)
4343
os.RemoveAll(tempDir)
4444
})
4545

0 commit comments

Comments
 (0)