-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support to send config transactions #55
Comments
Discussion with Dave, the first 2 to try are
At a first pass need to just have scripts that can be run that will effect the change so automated but need to be driven manually |
FINDINGS: Endorsement Policy Update: Majority to "AND('Org1MSP.member','Org2MSP.member','Org3MSP.member')"
-- After the policy is updated successfully,
|
@sapthasurendran the endorsement policy update test scenario worked fine for me, however I was not applying a steady transaction load, I just did one transaction before the update and one transaction after the update, both succeeded and got the correct number of endorsements based on the update. So the issue may be with the test rather than a gateway issue, or it may be that some errors are always going to occur for a couple seconds while the endorsement policy change works its way though the network. Could you explain exactly what your test does? What does the chaincode do? Does it create or update a key? Does it read the same key? Do you have a steady transaction load? What rate of transactions? Do you have multiple transactions occurring concurrently? How many seconds does it take after updating the endorsement policy for transactions to start succeeding again? |
Yes, the errors happened only for the transactions which was waiting for endorsement during the time of the policy update . Also, few transactions were successful even during the update process. |
@sapthasurendran I would fully expect to see endorsement policy failures to occur when moving from a less restrictive endorsement policy to a more restrictive one. I would not expect to see those errors if going in reverse which would be an interesting test. The other 2 errors of unmatched proposal responses and mvcc read conflicts are surprising to see and not something I would have expected to see if I am only changing the endorsement policy and no changes to chaincode were being made. Can you post the log timelines from the client and the policy change script so that we could see at what stage of the policy change appears to drive these errors ? |
@davidkel I retested the scenario with latest fabric-gateway version. Findings:
After the update all transactions are failing with either one of the following errors.
|
Clarification then, it would seem that the proposal response payloads may reference the endorsement policy eg a read which creates an entry in the read set and while that's different due to the commit to multiple peers not being atomic then it's entirely possible to get mismatched proposal response payloads. |
Apart from business transactions we should also be able to test the effect of config transactions happening at the same time to see the effect on the system
Unsure whether to make this part of the client or have a separately running app
Config transactions that would have an effect
Not specific to config transactions but might also want to consider
The text was updated successfully, but these errors were encountered: