github.com/kaituanwang/hyperledger@v2.0.1+incompatible/gossip/privdata/pull_test.go (about)

     1  /*
     2  Copyright IBM Corp. All Rights Reserved.
     3  
     4  SPDX-License-Identifier: Apache-2.0
     5  */
     6  
     7  package privdata
     8  
     9  import (
    10  	"bytes"
    11  	"crypto/rand"
    12  	"io/ioutil"
    13  	"os"
    14  	"sync"
    15  	"testing"
    16  
    17  	pb "github.com/golang/protobuf/proto"
    18  	proto "github.com/hyperledger/fabric-protos-go/gossip"
    19  	"github.com/hyperledger/fabric-protos-go/ledger/rwset"
    20  	"github.com/hyperledger/fabric-protos-go/peer"
    21  	"github.com/hyperledger/fabric/common/metrics/disabled"
    22  	"github.com/hyperledger/fabric/core/common/privdata"
    23  	"github.com/hyperledger/fabric/core/ledger"
    24  	"github.com/hyperledger/fabric/core/transientstore"
    25  	"github.com/hyperledger/fabric/gossip/api"
    26  	"github.com/hyperledger/fabric/gossip/comm"
    27  	"github.com/hyperledger/fabric/gossip/common"
    28  	"github.com/hyperledger/fabric/gossip/discovery"
    29  	"github.com/hyperledger/fabric/gossip/filter"
    30  	"github.com/hyperledger/fabric/gossip/metrics"
    31  	gmetricsmocks "github.com/hyperledger/fabric/gossip/metrics/mocks"
    32  	privdatacommon "github.com/hyperledger/fabric/gossip/privdata/common"
    33  	"github.com/hyperledger/fabric/gossip/privdata/mocks"
    34  	"github.com/hyperledger/fabric/gossip/protoext"
    35  	"github.com/hyperledger/fabric/gossip/util"
    36  	"github.com/hyperledger/fabric/protoutil"
    37  	"github.com/pkg/errors"
    38  	"github.com/stretchr/testify/assert"
    39  	"github.com/stretchr/testify/mock"
    40  )
    41  
    42  func init() {
    43  	policy2Filter = make(map[privdata.CollectionAccessPolicy]privdata.Filter)
    44  }
    45  
    46  // protoMatcher is used to test that a slice of protos equals another slice of protos.
    47  // This is needed because in general reflect.Equal(proto1, proto1) may not be true.
    48  func protoMatcher(pvds ...*proto.PvtDataDigest) func([]*proto.PvtDataDigest) bool {
    49  	return func(ipvds []*proto.PvtDataDigest) bool {
    50  		if len(pvds) != len(ipvds) {
    51  			return false
    52  		}
    53  
    54  		for i, pvd := range pvds {
    55  			if !pb.Equal(pvd, ipvds[i]) {
    56  				return false
    57  			}
    58  		}
    59  
    60  		return true
    61  	}
    62  }
    63  
    64  var policyLock sync.Mutex
    65  var policy2Filter map[privdata.CollectionAccessPolicy]privdata.Filter
    66  
    67  type mockCollectionStore struct {
    68  	m            map[string]*mockCollectionAccess
    69  	accessFilter privdata.Filter
    70  }
    71  
    72  func newCollectionStore() *mockCollectionStore {
    73  	return &mockCollectionStore{
    74  		m:            make(map[string]*mockCollectionAccess),
    75  		accessFilter: nil,
    76  	}
    77  }
    78  
    79  func (cs *mockCollectionStore) withPolicy(collection string, btl uint64) *mockCollectionAccess {
    80  	coll := &mockCollectionAccess{cs: cs, btl: btl}
    81  	cs.m[collection] = coll
    82  	return coll
    83  }
    84  
    85  func (cs *mockCollectionStore) withAccessFilter(filter privdata.Filter) *mockCollectionStore {
    86  	cs.accessFilter = filter
    87  	return cs
    88  }
    89  
    90  func (cs mockCollectionStore) RetrieveCollectionAccessPolicy(cc privdata.CollectionCriteria) (privdata.CollectionAccessPolicy, error) {
    91  	return cs.m[cc.Collection], nil
    92  }
    93  
    94  func (cs mockCollectionStore) RetrieveCollection(privdata.CollectionCriteria) (privdata.Collection, error) {
    95  	panic("implement me")
    96  }
    97  
    98  func (cs mockCollectionStore) RetrieveCollectionConfig(privdata.CollectionCriteria) (*peer.StaticCollectionConfig, error) {
    99  	panic("implement me")
   100  }
   101  
   102  func (cs mockCollectionStore) RetrieveCollectionConfigPackage(privdata.CollectionCriteria) (*peer.CollectionConfigPackage, error) {
   103  	panic("implement me")
   104  }
   105  
   106  func (cs mockCollectionStore) RetrieveCollectionPersistenceConfigs(cc privdata.CollectionCriteria) (privdata.CollectionPersistenceConfigs, error) {
   107  	return cs.m[cc.Collection], nil
   108  }
   109  
   110  func (cs mockCollectionStore) RetrieveReadWritePermission(cc privdata.CollectionCriteria, sp *peer.SignedProposal, qe ledger.QueryExecutor) (bool, bool, error) {
   111  	panic("implement me")
   112  }
   113  
   114  func (cs mockCollectionStore) AccessFilter(channelName string, collectionPolicyConfig *peer.CollectionPolicyConfig) (privdata.Filter, error) {
   115  	if cs.accessFilter != nil {
   116  		return cs.accessFilter, nil
   117  	}
   118  	panic("implement me")
   119  }
   120  
   121  type mockCollectionAccess struct {
   122  	cs  *mockCollectionStore
   123  	btl uint64
   124  }
   125  
   126  func (mc *mockCollectionAccess) BlockToLive() uint64 {
   127  	return mc.btl
   128  }
   129  
   130  func (mc *mockCollectionAccess) thatMapsTo(peers ...string) *mockCollectionStore {
   131  	policyLock.Lock()
   132  	defer policyLock.Unlock()
   133  	policy2Filter[mc] = func(sd protoutil.SignedData) bool {
   134  		for _, peer := range peers {
   135  			if bytes.Equal(sd.Identity, []byte(peer)) {
   136  				return true
   137  			}
   138  		}
   139  		return false
   140  	}
   141  	return mc.cs
   142  }
   143  
   144  func (mc *mockCollectionAccess) MemberOrgs() map[string]struct{} {
   145  	return nil
   146  }
   147  
   148  func (mc *mockCollectionAccess) AccessFilter() privdata.Filter {
   149  	policyLock.Lock()
   150  	defer policyLock.Unlock()
   151  	return policy2Filter[mc]
   152  }
   153  
   154  func (mc *mockCollectionAccess) RequiredPeerCount() int {
   155  	return 0
   156  }
   157  
   158  func (mc *mockCollectionAccess) MaximumPeerCount() int {
   159  	return 0
   160  }
   161  
   162  func (mc *mockCollectionAccess) IsMemberOnlyRead() bool {
   163  	return false
   164  }
   165  
   166  func (mc *mockCollectionAccess) IsMemberOnlyWrite() bool {
   167  	return false
   168  }
   169  
   170  type dataRetrieverMock struct {
   171  	mock.Mock
   172  }
   173  
   174  func (dr *dataRetrieverMock) CollectionRWSet(dig []*proto.PvtDataDigest, blockNum uint64) (Dig2PvtRWSetWithConfig, bool, error) {
   175  	args := dr.Called(dig, blockNum)
   176  	return args.Get(0).(Dig2PvtRWSetWithConfig), args.Bool(1), args.Error(2)
   177  }
   178  
   179  type receivedMsg struct {
   180  	responseChan chan protoext.ReceivedMessage
   181  	*comm.RemotePeer
   182  	*protoext.SignedGossipMessage
   183  }
   184  
   185  func (msg *receivedMsg) Ack(_ error) {
   186  
   187  }
   188  
   189  func (msg *receivedMsg) Respond(message *proto.GossipMessage) {
   190  	m, _ := protoext.NoopSign(message)
   191  	msg.responseChan <- &receivedMsg{SignedGossipMessage: m, RemotePeer: &comm.RemotePeer{}}
   192  }
   193  
   194  func (msg *receivedMsg) GetGossipMessage() *protoext.SignedGossipMessage {
   195  	return msg.SignedGossipMessage
   196  }
   197  
   198  func (msg *receivedMsg) GetSourceEnvelope() *proto.Envelope {
   199  	panic("implement me")
   200  }
   201  
   202  func (msg *receivedMsg) GetConnectionInfo() *protoext.ConnectionInfo {
   203  	return &protoext.ConnectionInfo{
   204  		Identity: api.PeerIdentityType(msg.RemotePeer.PKIID),
   205  		Auth: &protoext.AuthInfo{
   206  			SignedData: []byte{},
   207  			Signature:  []byte{},
   208  		},
   209  	}
   210  }
   211  
   212  type mockGossip struct {
   213  	mock.Mock
   214  	msgChan chan protoext.ReceivedMessage
   215  	id      *comm.RemotePeer
   216  	network *gossipNetwork
   217  }
   218  
   219  func newMockGossip(id *comm.RemotePeer) *mockGossip {
   220  	return &mockGossip{
   221  		msgChan: make(chan protoext.ReceivedMessage),
   222  		id:      id,
   223  	}
   224  }
   225  
   226  func (g *mockGossip) PeerFilter(channel common.ChannelID, messagePredicate api.SubChannelSelectionCriteria) (filter.RoutingFilter, error) {
   227  	for _, call := range g.Mock.ExpectedCalls {
   228  		if call.Method == "PeerFilter" {
   229  			args := g.Called(channel, messagePredicate)
   230  			if args.Get(1) != nil {
   231  				return nil, args.Get(1).(error)
   232  			}
   233  			return args.Get(0).(filter.RoutingFilter), nil
   234  		}
   235  	}
   236  	return func(member discovery.NetworkMember) bool {
   237  		return messagePredicate(api.PeerSignature{
   238  			PeerIdentity: api.PeerIdentityType(member.PKIid),
   239  		})
   240  	}, nil
   241  }
   242  
   243  func (g *mockGossip) Send(msg *proto.GossipMessage, peers ...*comm.RemotePeer) {
   244  	sMsg, _ := protoext.NoopSign(msg)
   245  	for _, peer := range g.network.peers {
   246  		if bytes.Equal(peer.id.PKIID, peers[0].PKIID) {
   247  			peer.msgChan <- &receivedMsg{
   248  				RemotePeer:          g.id,
   249  				SignedGossipMessage: sMsg,
   250  				responseChan:        g.msgChan,
   251  			}
   252  			return
   253  		}
   254  	}
   255  }
   256  
   257  func (g *mockGossip) PeersOfChannel(common.ChannelID) []discovery.NetworkMember {
   258  	return g.Called().Get(0).([]discovery.NetworkMember)
   259  }
   260  
   261  func (g *mockGossip) Accept(acceptor common.MessageAcceptor, passThrough bool) (<-chan *proto.GossipMessage, <-chan protoext.ReceivedMessage) {
   262  	return nil, g.msgChan
   263  }
   264  
   265  type peerData struct {
   266  	id           string
   267  	ledgerHeight uint64
   268  }
   269  
   270  func membership(knownPeers ...peerData) []discovery.NetworkMember {
   271  	var peers []discovery.NetworkMember
   272  	for _, peer := range knownPeers {
   273  		peers = append(peers, discovery.NetworkMember{
   274  			Endpoint: peer.id,
   275  			PKIid:    common.PKIidType(peer.id),
   276  			Properties: &proto.Properties{
   277  				LedgerHeight: peer.ledgerHeight,
   278  			},
   279  		})
   280  	}
   281  	return peers
   282  }
   283  
   284  type gossipNetwork struct {
   285  	peers []*mockGossip
   286  }
   287  
   288  func (gn *gossipNetwork) newPullerWithMetrics(metrics *metrics.PrivdataMetrics, id string, ps privdata.CollectionStore,
   289  	factory CollectionAccessFactory, knownMembers ...discovery.NetworkMember) *puller {
   290  	g := newMockGossip(&comm.RemotePeer{PKIID: common.PKIidType(id), Endpoint: id})
   291  	g.network = gn
   292  	g.On("PeersOfChannel", mock.Anything).Return(knownMembers)
   293  
   294  	p := NewPuller(metrics, ps, g, &dataRetrieverMock{}, factory, "A", 10)
   295  	gn.peers = append(gn.peers, g)
   296  	return p
   297  }
   298  
   299  func (gn *gossipNetwork) newPuller(id string, ps privdata.CollectionStore, factory CollectionAccessFactory,
   300  	knownMembers ...discovery.NetworkMember) *puller {
   301  	metrics := metrics.NewGossipMetrics(&disabled.Provider{}).PrivdataMetrics
   302  	return gn.newPullerWithMetrics(metrics, id, ps, factory, knownMembers...)
   303  }
   304  
   305  func newPRWSet() []util.PrivateRWSet {
   306  	b1 := make([]byte, 10)
   307  	b2 := make([]byte, 10)
   308  	rand.Read(b1)
   309  	rand.Read(b2)
   310  	return []util.PrivateRWSet{util.PrivateRWSet(b1), util.PrivateRWSet(b2)}
   311  }
   312  
   313  func TestPullerFromOnly1Peer(t *testing.T) {
   314  	t.Parallel()
   315  	// Scenario: p1 pulls from p2 and not from p3
   316  	// and succeeds - p1 asks from p2 (and not from p3!) for the
   317  	// expected digest
   318  	gn := &gossipNetwork{}
   319  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2")
   320  	factoryMock1 := &collectionAccessFactoryMock{}
   321  	policyMock1 := &collectionAccessPolicyMock{}
   322  	policyMock1.Setup(1, 2, func(data protoutil.SignedData) bool {
   323  		return bytes.Equal(data.Identity, []byte("p2"))
   324  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   325  	factoryMock1.On("AccessPolicy", mock.Anything, mock.Anything).Return(policyMock1, nil)
   326  	p1 := gn.newPuller("p1", policyStore, factoryMock1, membership(peerData{"p2", uint64(1)}, peerData{"p3", uint64(1)})...)
   327  
   328  	p2TransientStore := &util.PrivateRWSetWithConfig{
   329  		RWSet: newPRWSet(),
   330  		CollectionConfig: &peer.CollectionConfig{
   331  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   332  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   333  					Name: "col1",
   334  				},
   335  			},
   336  		},
   337  	}
   338  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p1")
   339  	factoryMock2 := &collectionAccessFactoryMock{}
   340  	policyMock2 := &collectionAccessPolicyMock{}
   341  	policyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   342  		return bytes.Equal(data.Identity, []byte("p1"))
   343  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   344  	factoryMock2.On("AccessPolicy", mock.Anything, mock.Anything).Return(policyMock2, nil)
   345  
   346  	p2 := gn.newPuller("p2", policyStore, factoryMock2)
   347  	dig := &proto.PvtDataDigest{
   348  		TxId:       "txID1",
   349  		Collection: "col1",
   350  		Namespace:  "ns1",
   351  	}
   352  
   353  	store := Dig2PvtRWSetWithConfig{
   354  		privdatacommon.DigKey{
   355  			TxId:       "txID1",
   356  			Collection: "col1",
   357  			Namespace:  "ns1",
   358  		}: p2TransientStore,
   359  	}
   360  
   361  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), uint64(0)).Return(store, true, nil)
   362  
   363  	factoryMock3 := &collectionAccessFactoryMock{}
   364  	policyMock3 := &collectionAccessPolicyMock{}
   365  	policyMock3.Setup(1, 2, func(data protoutil.SignedData) bool {
   366  		return false
   367  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   368  	factoryMock3.On("AccessPolicy", mock.Anything, mock.Anything).Return(policyMock3, nil)
   369  
   370  	p3 := gn.newPuller("p3", newCollectionStore(), factoryMock3)
   371  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), uint64(0)).Run(func(_ mock.Arguments) {
   372  		t.Fatal("p3 shouldn't have been selected for pull")
   373  	})
   374  
   375  	dasf := &digestsAndSourceFactory{}
   376  
   377  	fetchedMessages, err := p1.fetch(dasf.mapDigest(toDigKey(dig)).toSources().create())
   378  	rws1 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[0])
   379  	rws2 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[1])
   380  	fetched := []util.PrivateRWSet{rws1, rws2}
   381  	assert.NoError(t, err)
   382  	assert.Equal(t, p2TransientStore.RWSet, fetched)
   383  }
   384  
   385  func TestPullerDataNotAvailable(t *testing.T) {
   386  	t.Parallel()
   387  	// Scenario: p1 pulls from p2 and not from p3
   388  	// but the data in p2 doesn't exist
   389  	gn := &gossipNetwork{}
   390  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2")
   391  	factoryMock := &collectionAccessFactoryMock{}
   392  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(&collectionAccessPolicyMock{}, nil)
   393  
   394  	p1 := gn.newPuller("p1", policyStore, factoryMock, membership(peerData{"p2", uint64(1)}, peerData{"p3", uint64(1)})...)
   395  
   396  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p1")
   397  	p2 := gn.newPuller("p2", policyStore, factoryMock)
   398  	dig := &proto.PvtDataDigest{
   399  		TxId:       "txID1",
   400  		Collection: "col1",
   401  		Namespace:  "ns1",
   402  	}
   403  
   404  	store := Dig2PvtRWSetWithConfig{
   405  		privdatacommon.DigKey{
   406  			TxId:       "txID1",
   407  			Collection: "col1",
   408  			Namespace:  "ns1",
   409  		}: &util.PrivateRWSetWithConfig{
   410  			RWSet: []util.PrivateRWSet{},
   411  		},
   412  	}
   413  
   414  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), mock.Anything).Return(store, true, nil)
   415  
   416  	p3 := gn.newPuller("p3", newCollectionStore(), factoryMock)
   417  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), mock.Anything).Run(func(_ mock.Arguments) {
   418  		t.Fatal("p3 shouldn't have been selected for pull")
   419  	})
   420  
   421  	dasf := &digestsAndSourceFactory{}
   422  	fetchedMessages, err := p1.fetch(dasf.mapDigest(toDigKey(dig)).toSources().create())
   423  	assert.Empty(t, fetchedMessages.AvailableElements)
   424  	assert.NoError(t, err)
   425  }
   426  
   427  func TestPullerNoPeersKnown(t *testing.T) {
   428  	t.Parallel()
   429  	// Scenario: p1 doesn't know any peer and therefore fails fetching
   430  	gn := &gossipNetwork{}
   431  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2", "p3")
   432  	factoryMock := &collectionAccessFactoryMock{}
   433  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(&collectionAccessPolicyMock{}, nil)
   434  
   435  	p1 := gn.newPuller("p1", policyStore, factoryMock)
   436  	dasf := &digestsAndSourceFactory{}
   437  	d2s := dasf.mapDigest(&privdatacommon.DigKey{Collection: "col1", TxId: "txID1", Namespace: "ns1"}).toSources().create()
   438  	fetchedMessages, err := p1.fetch(d2s)
   439  	assert.Empty(t, fetchedMessages)
   440  	assert.Error(t, err)
   441  	assert.Contains(t, err.Error(), "Empty membership")
   442  }
   443  
   444  func TestPullPeerFilterError(t *testing.T) {
   445  	t.Parallel()
   446  	// Scenario: p1 attempts to fetch for the wrong channel
   447  	gn := &gossipNetwork{}
   448  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2")
   449  	factoryMock := &collectionAccessFactoryMock{}
   450  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(&collectionAccessPolicyMock{}, nil)
   451  
   452  	p1 := gn.newPuller("p1", policyStore, factoryMock)
   453  	gn.peers[0].On("PeerFilter", mock.Anything, mock.Anything).Return(nil, errors.New("Failed obtaining filter"))
   454  	dasf := &digestsAndSourceFactory{}
   455  	d2s := dasf.mapDigest(&privdatacommon.DigKey{Collection: "col1", TxId: "txID1", Namespace: "ns1"}).toSources().create()
   456  	fetchedMessages, err := p1.fetch(d2s)
   457  	assert.Error(t, err)
   458  	assert.Contains(t, err.Error(), "Failed obtaining filter")
   459  	assert.Empty(t, fetchedMessages)
   460  }
   461  
   462  func TestPullerPeerNotEligible(t *testing.T) {
   463  	t.Parallel()
   464  	// Scenario: p1 pulls from p2 or from p3
   465  	// but it's not eligible for pulling data from p2 or from p3
   466  	gn := &gossipNetwork{}
   467  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2", "p3")
   468  	factoryMock1 := &collectionAccessFactoryMock{}
   469  	accessPolicyMock1 := &collectionAccessPolicyMock{}
   470  	accessPolicyMock1.Setup(1, 2, func(data protoutil.SignedData) bool {
   471  		return bytes.Equal(data.Identity, []byte("p2")) || bytes.Equal(data.Identity, []byte("p3"))
   472  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   473  	factoryMock1.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock1, nil)
   474  
   475  	p1 := gn.newPuller("p1", policyStore, factoryMock1, membership(peerData{"p2", uint64(1)}, peerData{"p3", uint64(1)})...)
   476  
   477  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2")
   478  	factoryMock2 := &collectionAccessFactoryMock{}
   479  	accessPolicyMock2 := &collectionAccessPolicyMock{}
   480  	accessPolicyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   481  		return bytes.Equal(data.Identity, []byte("p2"))
   482  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   483  	factoryMock2.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock2, nil)
   484  
   485  	p2 := gn.newPuller("p2", policyStore, factoryMock2)
   486  
   487  	dig := &proto.PvtDataDigest{
   488  		TxId:       "txID1",
   489  		Collection: "col1",
   490  		Namespace:  "ns1",
   491  	}
   492  
   493  	store := Dig2PvtRWSetWithConfig{
   494  		privdatacommon.DigKey{
   495  			TxId:       "txID1",
   496  			Collection: "col1",
   497  			Namespace:  "ns1",
   498  		}: &util.PrivateRWSetWithConfig{
   499  			RWSet: newPRWSet(),
   500  			CollectionConfig: &peer.CollectionConfig{
   501  				Payload: &peer.CollectionConfig_StaticCollectionConfig{
   502  					StaticCollectionConfig: &peer.StaticCollectionConfig{
   503  						Name: "col1",
   504  					},
   505  				},
   506  			},
   507  		},
   508  	}
   509  
   510  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), mock.Anything).Return(store, true, nil)
   511  
   512  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p3")
   513  	factoryMock3 := &collectionAccessFactoryMock{}
   514  	accessPolicyMock3 := &collectionAccessPolicyMock{}
   515  	accessPolicyMock3.Setup(1, 2, func(data protoutil.SignedData) bool {
   516  		return bytes.Equal(data.Identity, []byte("p3"))
   517  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   518  	factoryMock3.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock1, nil)
   519  
   520  	p3 := gn.newPuller("p3", policyStore, factoryMock3)
   521  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), mock.Anything).Return(store, true, nil)
   522  	dasf := &digestsAndSourceFactory{}
   523  	d2s := dasf.mapDigest(&privdatacommon.DigKey{Collection: "col1", TxId: "txID1", Namespace: "ns1"}).toSources().create()
   524  	fetchedMessages, err := p1.fetch(d2s)
   525  	assert.Empty(t, fetchedMessages.AvailableElements)
   526  	assert.NoError(t, err)
   527  }
   528  
   529  func TestPullerDifferentPeersDifferentCollections(t *testing.T) {
   530  	t.Parallel()
   531  	// Scenario: p1 pulls from p2 and from p3
   532  	// and each has different collections
   533  	gn := &gossipNetwork{}
   534  	factoryMock1 := &collectionAccessFactoryMock{}
   535  	accessPolicyMock1 := &collectionAccessPolicyMock{}
   536  	accessPolicyMock1.Setup(1, 2, func(data protoutil.SignedData) bool {
   537  		return bytes.Equal(data.Identity, []byte("p2")) || bytes.Equal(data.Identity, []byte("p3"))
   538  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   539  	factoryMock1.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock1, nil)
   540  
   541  	policyStore := newCollectionStore().withPolicy("col2", uint64(100)).thatMapsTo("p2").withPolicy("col3", uint64(100)).thatMapsTo("p3")
   542  	p1 := gn.newPuller("p1", policyStore, factoryMock1, membership(peerData{"p2", uint64(1)}, peerData{"p3", uint64(1)})...)
   543  
   544  	p2TransientStore := &util.PrivateRWSetWithConfig{
   545  		RWSet: newPRWSet(),
   546  		CollectionConfig: &peer.CollectionConfig{
   547  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   548  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   549  					Name: "col2",
   550  				},
   551  			},
   552  		},
   553  	}
   554  
   555  	policyStore = newCollectionStore().withPolicy("col2", uint64(100)).thatMapsTo("p1")
   556  	factoryMock2 := &collectionAccessFactoryMock{}
   557  	accessPolicyMock2 := &collectionAccessPolicyMock{}
   558  	accessPolicyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   559  		return bytes.Equal(data.Identity, []byte("p1"))
   560  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   561  	factoryMock2.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock2, nil)
   562  
   563  	p2 := gn.newPuller("p2", policyStore, factoryMock2)
   564  	dig1 := &proto.PvtDataDigest{
   565  		TxId:       "txID1",
   566  		Collection: "col2",
   567  		Namespace:  "ns1",
   568  	}
   569  
   570  	store1 := Dig2PvtRWSetWithConfig{
   571  		privdatacommon.DigKey{
   572  			TxId:       "txID1",
   573  			Collection: "col2",
   574  			Namespace:  "ns1",
   575  		}: p2TransientStore,
   576  	}
   577  
   578  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig1)), mock.Anything).Return(store1, true, nil)
   579  
   580  	p3TransientStore := &util.PrivateRWSetWithConfig{
   581  		RWSet: newPRWSet(),
   582  		CollectionConfig: &peer.CollectionConfig{
   583  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   584  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   585  					Name: "col3",
   586  				},
   587  			},
   588  		},
   589  	}
   590  
   591  	store2 := Dig2PvtRWSetWithConfig{
   592  		privdatacommon.DigKey{
   593  			TxId:       "txID1",
   594  			Collection: "col3",
   595  			Namespace:  "ns1",
   596  		}: p3TransientStore,
   597  	}
   598  	policyStore = newCollectionStore().withPolicy("col3", uint64(100)).thatMapsTo("p1")
   599  	factoryMock3 := &collectionAccessFactoryMock{}
   600  	accessPolicyMock3 := &collectionAccessPolicyMock{}
   601  	accessPolicyMock3.Setup(1, 2, func(data protoutil.SignedData) bool {
   602  		return bytes.Equal(data.Identity, []byte("p1"))
   603  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   604  	factoryMock3.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock3, nil)
   605  
   606  	p3 := gn.newPuller("p3", policyStore, factoryMock3)
   607  	dig2 := &proto.PvtDataDigest{
   608  		TxId:       "txID1",
   609  		Collection: "col3",
   610  		Namespace:  "ns1",
   611  	}
   612  
   613  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig2)), mock.Anything).Return(store2, true, nil)
   614  
   615  	dasf := &digestsAndSourceFactory{}
   616  	fetchedMessages, err := p1.fetch(dasf.mapDigest(toDigKey(dig1)).toSources().mapDigest(toDigKey(dig2)).toSources().create())
   617  	assert.NoError(t, err)
   618  	rws1 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[0])
   619  	rws2 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[1])
   620  	rws3 := util.PrivateRWSet(fetchedMessages.AvailableElements[1].Payload[0])
   621  	rws4 := util.PrivateRWSet(fetchedMessages.AvailableElements[1].Payload[1])
   622  	fetched := []util.PrivateRWSet{rws1, rws2, rws3, rws4}
   623  	assert.Contains(t, fetched, p2TransientStore.RWSet[0])
   624  	assert.Contains(t, fetched, p2TransientStore.RWSet[1])
   625  	assert.Contains(t, fetched, p3TransientStore.RWSet[0])
   626  	assert.Contains(t, fetched, p3TransientStore.RWSet[1])
   627  }
   628  
   629  func TestPullerRetries(t *testing.T) {
   630  	t.Parallel()
   631  	// Scenario: p1 pulls from p2, p3, p4 and p5.
   632  	// Only p3 considers p1 to be eligible to receive the data.
   633  	// The rest consider p1 as not eligible.
   634  	gn := &gossipNetwork{}
   635  	factoryMock1 := &collectionAccessFactoryMock{}
   636  	accessPolicyMock1 := &collectionAccessPolicyMock{}
   637  	accessPolicyMock1.Setup(1, 2, func(data protoutil.SignedData) bool {
   638  		return bytes.Equal(data.Identity, []byte("p2")) || bytes.Equal(data.Identity, []byte("p3")) ||
   639  			bytes.Equal(data.Identity, []byte("p4")) ||
   640  			bytes.Equal(data.Identity, []byte("p5"))
   641  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   642  	factoryMock1.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock1, nil)
   643  
   644  	// p1
   645  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2", "p3", "p4", "p5")
   646  	p1 := gn.newPuller("p1", policyStore, factoryMock1, membership(peerData{"p2", uint64(1)},
   647  		peerData{"p3", uint64(1)}, peerData{"p4", uint64(1)}, peerData{"p5", uint64(1)})...)
   648  
   649  	// p2, p3, p4, and p5 have the same transient store
   650  	transientStore := &util.PrivateRWSetWithConfig{
   651  		RWSet: newPRWSet(),
   652  		CollectionConfig: &peer.CollectionConfig{
   653  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   654  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   655  					Name: "col1",
   656  				},
   657  			},
   658  		},
   659  	}
   660  
   661  	dig := &proto.PvtDataDigest{
   662  		TxId:       "txID1",
   663  		Collection: "col1",
   664  		Namespace:  "ns1",
   665  	}
   666  
   667  	store := Dig2PvtRWSetWithConfig{
   668  		privdatacommon.DigKey{
   669  			TxId:       "txID1",
   670  			Collection: "col1",
   671  			Namespace:  "ns1",
   672  		}: transientStore,
   673  	}
   674  
   675  	// p2
   676  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2")
   677  	factoryMock2 := &collectionAccessFactoryMock{}
   678  	accessPolicyMock2 := &collectionAccessPolicyMock{}
   679  	accessPolicyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   680  		return bytes.Equal(data.Identity, []byte("p2"))
   681  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   682  	factoryMock2.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock2, nil)
   683  
   684  	p2 := gn.newPuller("p2", policyStore, factoryMock2)
   685  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), uint64(0)).Return(store, true, nil)
   686  
   687  	// p3
   688  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p1")
   689  	factoryMock3 := &collectionAccessFactoryMock{}
   690  	accessPolicyMock3 := &collectionAccessPolicyMock{}
   691  	accessPolicyMock3.Setup(1, 2, func(data protoutil.SignedData) bool {
   692  		return bytes.Equal(data.Identity, []byte("p1"))
   693  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   694  	factoryMock3.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock3, nil)
   695  
   696  	p3 := gn.newPuller("p3", policyStore, factoryMock3)
   697  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), uint64(0)).Return(store, true, nil)
   698  
   699  	// p4
   700  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p4")
   701  	factoryMock4 := &collectionAccessFactoryMock{}
   702  	accessPolicyMock4 := &collectionAccessPolicyMock{}
   703  	accessPolicyMock4.Setup(1, 2, func(data protoutil.SignedData) bool {
   704  		return bytes.Equal(data.Identity, []byte("p4"))
   705  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   706  	factoryMock4.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock4, nil)
   707  
   708  	p4 := gn.newPuller("p4", policyStore, factoryMock4)
   709  	p4.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), uint64(0)).Return(store, true, nil)
   710  
   711  	// p5
   712  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p5")
   713  	factoryMock5 := &collectionAccessFactoryMock{}
   714  	accessPolicyMock5 := &collectionAccessPolicyMock{}
   715  	accessPolicyMock5.Setup(1, 2, func(data protoutil.SignedData) bool {
   716  		return bytes.Equal(data.Identity, []byte("p5"))
   717  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   718  	factoryMock5.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock5, nil)
   719  
   720  	p5 := gn.newPuller("p5", policyStore, factoryMock5)
   721  	p5.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)), uint64(0)).Return(store, true, nil)
   722  
   723  	// Fetch from someone
   724  	dasf := &digestsAndSourceFactory{}
   725  	fetchedMessages, err := p1.fetch(dasf.mapDigest(toDigKey(dig)).toSources().create())
   726  	assert.NoError(t, err)
   727  	rws1 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[0])
   728  	rws2 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[1])
   729  	fetched := []util.PrivateRWSet{rws1, rws2}
   730  	assert.NoError(t, err)
   731  	assert.Equal(t, transientStore.RWSet, fetched)
   732  }
   733  
   734  func TestPullerPreferEndorsers(t *testing.T) {
   735  	t.Parallel()
   736  	// Scenario: p1 pulls from p2, p3, p4, p5
   737  	// and the only endorser for col1 is p3, so it should be selected
   738  	// at the top priority for col1.
   739  	// for col2, only p2 should have the data, but its not an endorser of the data.
   740  	gn := &gossipNetwork{}
   741  	factoryMock := &collectionAccessFactoryMock{}
   742  	accessPolicyMock2 := &collectionAccessPolicyMock{}
   743  	accessPolicyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   744  		return bytes.Equal(data.Identity, []byte("p2")) || bytes.Equal(data.Identity, []byte("p1"))
   745  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   746  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock2, nil)
   747  
   748  	policyStore := newCollectionStore().
   749  		withPolicy("col1", uint64(100)).
   750  		thatMapsTo("p1", "p2", "p3", "p4", "p5").
   751  		withPolicy("col2", uint64(100)).
   752  		thatMapsTo("p1", "p2")
   753  	p1 := gn.newPuller("p1", policyStore, factoryMock, membership(peerData{"p2", uint64(1)},
   754  		peerData{"p3", uint64(1)}, peerData{"p4", uint64(1)}, peerData{"p5", uint64(1)})...)
   755  
   756  	p3TransientStore := &util.PrivateRWSetWithConfig{
   757  		RWSet: newPRWSet(),
   758  		CollectionConfig: &peer.CollectionConfig{
   759  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   760  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   761  					Name: "col2",
   762  				},
   763  			},
   764  		},
   765  	}
   766  
   767  	p2TransientStore := &util.PrivateRWSetWithConfig{
   768  		RWSet: newPRWSet(),
   769  		CollectionConfig: &peer.CollectionConfig{
   770  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   771  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   772  					Name: "col2",
   773  				},
   774  			},
   775  		},
   776  	}
   777  
   778  	p2 := gn.newPuller("p2", policyStore, factoryMock)
   779  	p3 := gn.newPuller("p3", policyStore, factoryMock)
   780  	gn.newPuller("p4", policyStore, factoryMock)
   781  	gn.newPuller("p5", policyStore, factoryMock)
   782  
   783  	dig1 := &proto.PvtDataDigest{
   784  		TxId:       "txID1",
   785  		Collection: "col1",
   786  		Namespace:  "ns1",
   787  	}
   788  
   789  	dig2 := &proto.PvtDataDigest{
   790  		TxId:       "txID1",
   791  		Collection: "col2",
   792  		Namespace:  "ns1",
   793  	}
   794  
   795  	store := Dig2PvtRWSetWithConfig{
   796  		privdatacommon.DigKey{
   797  			TxId:       "txID1",
   798  			Collection: "col1",
   799  			Namespace:  "ns1",
   800  		}: p3TransientStore,
   801  		privdatacommon.DigKey{
   802  			TxId:       "txID1",
   803  			Collection: "col2",
   804  			Namespace:  "ns1",
   805  		}: p2TransientStore,
   806  	}
   807  
   808  	// We only define an action for dig2 on p2, and the test would fail with panic if any other peer is asked for
   809  	// a private RWSet on dig2
   810  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig2)), uint64(0)).Return(store, true, nil)
   811  
   812  	// We only define an action for dig1 on p3, and the test would fail with panic if any other peer is asked for
   813  	// a private RWSet on dig1
   814  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig1)), uint64(0)).Return(store, true, nil)
   815  
   816  	dasf := &digestsAndSourceFactory{}
   817  	d2s := dasf.mapDigest(toDigKey(dig1)).toSources("p3").mapDigest(toDigKey(dig2)).toSources().create()
   818  	fetchedMessages, err := p1.fetch(d2s)
   819  	assert.NoError(t, err)
   820  	rws1 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[0])
   821  	rws2 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[1])
   822  	rws3 := util.PrivateRWSet(fetchedMessages.AvailableElements[1].Payload[0])
   823  	rws4 := util.PrivateRWSet(fetchedMessages.AvailableElements[1].Payload[1])
   824  	fetched := []util.PrivateRWSet{rws1, rws2, rws3, rws4}
   825  	assert.Contains(t, fetched, p3TransientStore.RWSet[0])
   826  	assert.Contains(t, fetched, p3TransientStore.RWSet[1])
   827  	assert.Contains(t, fetched, p2TransientStore.RWSet[0])
   828  	assert.Contains(t, fetched, p2TransientStore.RWSet[1])
   829  }
   830  
   831  func TestPullerFetchReconciledItemsPreferPeersFromOriginalConfig(t *testing.T) {
   832  	t.Parallel()
   833  	// Scenario: p1 pulls from p2, p3, p4, p5
   834  	// the only peer that was in the collection config while data was created for col1 is p3, so it should be selected
   835  	// at the top priority for col1.
   836  	// for col2, p3 was in the collection config while the data was created but was removed from collection and now only p2 should have the data.
   837  	// so obviously p2 should be selected for col2.
   838  	gn := &gossipNetwork{}
   839  	factoryMock := &collectionAccessFactoryMock{}
   840  	accessPolicyMock2 := &collectionAccessPolicyMock{}
   841  	accessPolicyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   842  		return bytes.Equal(data.Identity, []byte("p2")) || bytes.Equal(data.Identity, []byte("p1"))
   843  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   844  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock2, nil)
   845  
   846  	policyStore := newCollectionStore().
   847  		withPolicy("col1", uint64(100)).
   848  		thatMapsTo("p1", "p2", "p3", "p4", "p5").
   849  		withPolicy("col2", uint64(100)).
   850  		thatMapsTo("p1", "p2").
   851  		withAccessFilter(func(data protoutil.SignedData) bool {
   852  			return bytes.Equal(data.Identity, []byte("p3"))
   853  		})
   854  
   855  	p1 := gn.newPuller("p1", policyStore, factoryMock, membership(peerData{"p2", uint64(1)},
   856  		peerData{"p3", uint64(1)}, peerData{"p4", uint64(1)}, peerData{"p5", uint64(1)})...)
   857  
   858  	p3TransientStore := &util.PrivateRWSetWithConfig{
   859  		RWSet: newPRWSet(),
   860  		CollectionConfig: &peer.CollectionConfig{
   861  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   862  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   863  					Name: "col2",
   864  				},
   865  			},
   866  		},
   867  	}
   868  
   869  	p2TransientStore := &util.PrivateRWSetWithConfig{
   870  		RWSet: newPRWSet(),
   871  		CollectionConfig: &peer.CollectionConfig{
   872  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   873  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   874  					Name: "col2",
   875  				},
   876  			},
   877  		},
   878  	}
   879  
   880  	p2 := gn.newPuller("p2", policyStore, factoryMock)
   881  	p3 := gn.newPuller("p3", policyStore, factoryMock)
   882  	gn.newPuller("p4", policyStore, factoryMock)
   883  	gn.newPuller("p5", policyStore, factoryMock)
   884  
   885  	dig1 := &proto.PvtDataDigest{
   886  		TxId:       "txID1",
   887  		Collection: "col1",
   888  		Namespace:  "ns1",
   889  	}
   890  
   891  	dig2 := &proto.PvtDataDigest{
   892  		TxId:       "txID1",
   893  		Collection: "col2",
   894  		Namespace:  "ns1",
   895  	}
   896  
   897  	store := Dig2PvtRWSetWithConfig{
   898  		privdatacommon.DigKey{
   899  			TxId:       "txID1",
   900  			Collection: "col1",
   901  			Namespace:  "ns1",
   902  		}: p3TransientStore,
   903  		privdatacommon.DigKey{
   904  			TxId:       "txID1",
   905  			Collection: "col2",
   906  			Namespace:  "ns1",
   907  		}: p2TransientStore,
   908  	}
   909  
   910  	// We only define an action for dig2 on p2, and the test would fail with panic if any other peer is asked for
   911  	// a private RWSet on dig2
   912  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig2)), uint64(0)).Return(store, true, nil)
   913  
   914  	// We only define an action for dig1 on p3, and the test would fail with panic if any other peer is asked for
   915  	// a private RWSet on dig1
   916  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig1)), uint64(0)).Return(store, true, nil)
   917  
   918  	d2cc := privdatacommon.Dig2CollectionConfig{
   919  		privdatacommon.DigKey{
   920  			TxId:       "txID1",
   921  			Collection: "col1",
   922  			Namespace:  "ns1",
   923  		}: &peer.StaticCollectionConfig{
   924  			Name: "col1",
   925  		},
   926  		privdatacommon.DigKey{
   927  			TxId:       "txID1",
   928  			Collection: "col2",
   929  			Namespace:  "ns1",
   930  		}: &peer.StaticCollectionConfig{
   931  			Name: "col2",
   932  		},
   933  	}
   934  
   935  	fetchedMessages, err := p1.FetchReconciledItems(d2cc)
   936  	assert.NoError(t, err)
   937  	rws1 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[0])
   938  	rws2 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[1])
   939  	rws3 := util.PrivateRWSet(fetchedMessages.AvailableElements[1].Payload[0])
   940  	rws4 := util.PrivateRWSet(fetchedMessages.AvailableElements[1].Payload[1])
   941  	fetched := []util.PrivateRWSet{rws1, rws2, rws3, rws4}
   942  	assert.Contains(t, fetched, p3TransientStore.RWSet[0])
   943  	assert.Contains(t, fetched, p3TransientStore.RWSet[1])
   944  	assert.Contains(t, fetched, p2TransientStore.RWSet[0])
   945  	assert.Contains(t, fetched, p2TransientStore.RWSet[1])
   946  }
   947  
   948  func TestPullerAvoidPullingPurgedData(t *testing.T) {
   949  	// Scenario: p1 missing private data for col1
   950  	// p2 and p3 is suppose to have it, while p3 has more advanced
   951  	// ledger and based on BTL already purged data for, so p1
   952  	// suppose to fetch data only from p2
   953  
   954  	t.Parallel()
   955  	gn := &gossipNetwork{}
   956  	factoryMock := &collectionAccessFactoryMock{}
   957  	accessPolicyMock2 := &collectionAccessPolicyMock{}
   958  	accessPolicyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
   959  		return bytes.Equal(data.Identity, []byte("p1"))
   960  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
   961  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(accessPolicyMock2, nil)
   962  
   963  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p1", "p2", "p3").
   964  		withPolicy("col2", uint64(1000)).thatMapsTo("p1", "p2", "p3")
   965  
   966  	// p2 is at ledger height 1, while p2 is at 111 which is beyond BTL defined for col1 (100)
   967  	p1 := gn.newPuller("p1", policyStore, factoryMock, membership(peerData{"p2", uint64(1)},
   968  		peerData{"p3", uint64(111)})...)
   969  
   970  	privateData1 := &util.PrivateRWSetWithConfig{
   971  		RWSet: newPRWSet(),
   972  		CollectionConfig: &peer.CollectionConfig{
   973  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   974  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   975  					Name: "col1",
   976  				},
   977  			},
   978  		},
   979  	}
   980  	privateData2 := &util.PrivateRWSetWithConfig{
   981  		RWSet: newPRWSet(),
   982  		CollectionConfig: &peer.CollectionConfig{
   983  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
   984  				StaticCollectionConfig: &peer.StaticCollectionConfig{
   985  					Name: "col2",
   986  				},
   987  			},
   988  		},
   989  	}
   990  
   991  	p2 := gn.newPuller("p2", policyStore, factoryMock)
   992  	p3 := gn.newPuller("p3", policyStore, factoryMock)
   993  
   994  	dig1 := &proto.PvtDataDigest{
   995  		TxId:       "txID1",
   996  		Collection: "col1",
   997  		Namespace:  "ns1",
   998  	}
   999  
  1000  	dig2 := &proto.PvtDataDigest{
  1001  		TxId:       "txID1",
  1002  		Collection: "col2",
  1003  		Namespace:  "ns1",
  1004  	}
  1005  
  1006  	store := Dig2PvtRWSetWithConfig{
  1007  		privdatacommon.DigKey{
  1008  			TxId:       "txID1",
  1009  			Collection: "col1",
  1010  			Namespace:  "ns1",
  1011  		}: privateData1,
  1012  		privdatacommon.DigKey{
  1013  			TxId:       "txID1",
  1014  			Collection: "col2",
  1015  			Namespace:  "ns1",
  1016  		}: privateData2,
  1017  	}
  1018  
  1019  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig1)), 0).Return(store, true, nil)
  1020  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig1)), 0).Return(store, true, nil).
  1021  		Run(
  1022  			func(arg mock.Arguments) {
  1023  				assert.Fail(t, "we should not fetch private data from peers where it was purged")
  1024  			},
  1025  		)
  1026  
  1027  	p3.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig2)), uint64(0)).Return(store, true, nil)
  1028  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig2)), uint64(0)).Return(store, true, nil).
  1029  		Run(
  1030  			func(mock.Arguments) {
  1031  				assert.Fail(t, "we should not fetch private data of collection2 from peer 2")
  1032  
  1033  			},
  1034  		)
  1035  
  1036  	dasf := &digestsAndSourceFactory{}
  1037  	d2s := dasf.mapDigest(toDigKey(dig1)).toSources("p3", "p2").mapDigest(toDigKey(dig2)).toSources("p3").create()
  1038  	// trying to fetch missing pvt data for block seq 1
  1039  	fetchedMessages, err := p1.fetch(d2s)
  1040  
  1041  	assert.NoError(t, err)
  1042  	assert.Equal(t, 1, len(fetchedMessages.PurgedElements))
  1043  	assert.Equal(t, dig1, fetchedMessages.PurgedElements[0])
  1044  	p3.PrivateDataRetriever.(*dataRetrieverMock).AssertNumberOfCalls(t, "CollectionRWSet", 1)
  1045  
  1046  }
  1047  
  1048  type counterDataRetreiver struct {
  1049  	numberOfCalls int
  1050  	PrivateDataRetriever
  1051  }
  1052  
  1053  func (c *counterDataRetreiver) CollectionRWSet(dig []*proto.PvtDataDigest, blockNum uint64) (Dig2PvtRWSetWithConfig, bool, error) {
  1054  	c.numberOfCalls += 1
  1055  	return c.PrivateDataRetriever.CollectionRWSet(dig, blockNum)
  1056  }
  1057  
  1058  func (c *counterDataRetreiver) getNumberOfCalls() int {
  1059  	return c.numberOfCalls
  1060  }
  1061  
  1062  func TestPullerIntegratedWithDataRetreiver(t *testing.T) {
  1063  	t.Parallel()
  1064  	gn := &gossipNetwork{}
  1065  
  1066  	ns1, ns2 := "testChaincodeName1", "testChaincodeName2"
  1067  	col1, col2 := "testCollectionName1", "testCollectionName2"
  1068  
  1069  	ap := &collectionAccessPolicyMock{}
  1070  	ap.Setup(1, 2, func(data protoutil.SignedData) bool {
  1071  		return bytes.Equal(data.Identity, []byte("p1"))
  1072  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
  1073  
  1074  	factoryMock := &collectionAccessFactoryMock{}
  1075  	factoryMock.On("AccessPolicy", mock.Anything, mock.Anything).Return(ap, nil)
  1076  
  1077  	policyStore := newCollectionStore().withPolicy(col1, uint64(1000)).thatMapsTo("p1", "p2").
  1078  		withPolicy(col2, uint64(1000)).thatMapsTo("p1", "p2")
  1079  
  1080  	p1 := gn.newPuller("p1", policyStore, factoryMock, membership(peerData{"p2", uint64(10)})...)
  1081  	p2 := gn.newPuller("p2", policyStore, factoryMock, membership(peerData{"p1", uint64(1)})...)
  1082  
  1083  	committer := &mocks.Committer{}
  1084  	tempdir, err := ioutil.TempDir("", "ts")
  1085  	if err != nil {
  1086  		t.Fatalf("Failed to create test directory, got err %s", err)
  1087  		return
  1088  	}
  1089  	storeProvider, err := transientstore.NewStoreProvider(tempdir)
  1090  	if err != nil {
  1091  		t.Fatalf("Failed to open store, got err %s", err)
  1092  		return
  1093  	}
  1094  	store, err := storeProvider.OpenStore("test")
  1095  	if err != nil {
  1096  		t.Fatalf("Failed to open store, got err %s", err)
  1097  		return
  1098  	}
  1099  	defer storeProvider.Close()
  1100  	defer os.RemoveAll(tempdir)
  1101  	result := []*ledger.TxPvtData{
  1102  		{
  1103  			WriteSet: &rwset.TxPvtReadWriteSet{
  1104  				DataModel: rwset.TxReadWriteSet_KV,
  1105  				NsPvtRwset: []*rwset.NsPvtReadWriteSet{
  1106  					pvtReadWriteSet(ns1, col1, []byte{1}),
  1107  					pvtReadWriteSet(ns1, col1, []byte{2}),
  1108  				},
  1109  			},
  1110  			SeqInBlock: 1,
  1111  		},
  1112  		{
  1113  			WriteSet: &rwset.TxPvtReadWriteSet{
  1114  				DataModel: rwset.TxReadWriteSet_KV,
  1115  				NsPvtRwset: []*rwset.NsPvtReadWriteSet{
  1116  					pvtReadWriteSet(ns2, col2, []byte{3}),
  1117  					pvtReadWriteSet(ns2, col2, []byte{4}),
  1118  				},
  1119  			},
  1120  			SeqInBlock: 2,
  1121  		},
  1122  	}
  1123  
  1124  	committer.On("LedgerHeight").Return(uint64(10), nil)
  1125  	committer.On("GetPvtDataByNum", uint64(5), mock.Anything).Return(result, nil)
  1126  	historyRetreiver := &mocks.ConfigHistoryRetriever{}
  1127  	historyRetreiver.On("MostRecentCollectionConfigBelow", mock.Anything, ns1).Return(newCollectionConfig(col1), nil)
  1128  	historyRetreiver.On("MostRecentCollectionConfigBelow", mock.Anything, ns2).Return(newCollectionConfig(col2), nil)
  1129  	committer.On("GetConfigHistoryRetriever").Return(historyRetreiver, nil)
  1130  
  1131  	dataRetreiver := &counterDataRetreiver{PrivateDataRetriever: NewDataRetriever(store, committer), numberOfCalls: 0}
  1132  	p2.PrivateDataRetriever = dataRetreiver
  1133  
  1134  	dig1 := &privdatacommon.DigKey{
  1135  		TxId:       "txID1",
  1136  		Collection: col1,
  1137  		Namespace:  ns1,
  1138  		BlockSeq:   5,
  1139  		SeqInBlock: 1,
  1140  	}
  1141  
  1142  	dig2 := &privdatacommon.DigKey{
  1143  		TxId:       "txID1",
  1144  		Collection: col2,
  1145  		Namespace:  ns2,
  1146  		BlockSeq:   5,
  1147  		SeqInBlock: 2,
  1148  	}
  1149  
  1150  	dasf := &digestsAndSourceFactory{}
  1151  	d2s := dasf.mapDigest(dig1).toSources("p2").mapDigest(dig2).toSources("p2").create()
  1152  	fetchedMessages, err := p1.fetch(d2s)
  1153  	assert.NoError(t, err)
  1154  	assert.Equal(t, 2, len(fetchedMessages.AvailableElements))
  1155  	assert.Equal(t, 1, dataRetreiver.getNumberOfCalls())
  1156  	assert.Equal(t, 2, len(fetchedMessages.AvailableElements[0].Payload))
  1157  	assert.Equal(t, 2, len(fetchedMessages.AvailableElements[1].Payload))
  1158  }
  1159  
  1160  func toDigKey(dig *proto.PvtDataDigest) *privdatacommon.DigKey {
  1161  	return &privdatacommon.DigKey{
  1162  		TxId:       dig.TxId,
  1163  		BlockSeq:   dig.BlockSeq,
  1164  		SeqInBlock: dig.SeqInBlock,
  1165  		Namespace:  dig.Namespace,
  1166  		Collection: dig.Collection,
  1167  	}
  1168  }
  1169  
  1170  func TestPullerMetrics(t *testing.T) {
  1171  	t.Parallel()
  1172  	// Scenario: p1 pulls from p2 and sends metric reports
  1173  	gn := &gossipNetwork{}
  1174  	policyStore := newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p2")
  1175  	factoryMock1 := &collectionAccessFactoryMock{}
  1176  	policyMock1 := &collectionAccessPolicyMock{}
  1177  	policyMock1.Setup(1, 2, func(data protoutil.SignedData) bool {
  1178  		return bytes.Equal(data.Identity, []byte("p2"))
  1179  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
  1180  	factoryMock1.On("AccessPolicy", mock.Anything, mock.Anything).Return(policyMock1, nil)
  1181  
  1182  	testMetricProvider := gmetricsmocks.TestUtilConstructMetricProvider()
  1183  	metrics := metrics.NewGossipMetrics(testMetricProvider.FakeProvider).PrivdataMetrics
  1184  
  1185  	p1 := gn.newPullerWithMetrics(metrics, "p1", policyStore, factoryMock1, membership(peerData{"p2", uint64(1)})...)
  1186  
  1187  	p2TransientStore := &util.PrivateRWSetWithConfig{
  1188  		RWSet: newPRWSet(),
  1189  		CollectionConfig: &peer.CollectionConfig{
  1190  			Payload: &peer.CollectionConfig_StaticCollectionConfig{
  1191  				StaticCollectionConfig: &peer.StaticCollectionConfig{
  1192  					Name: "col1",
  1193  				},
  1194  			},
  1195  		},
  1196  	}
  1197  	policyStore = newCollectionStore().withPolicy("col1", uint64(100)).thatMapsTo("p1")
  1198  	factoryMock2 := &collectionAccessFactoryMock{}
  1199  	policyMock2 := &collectionAccessPolicyMock{}
  1200  	policyMock2.Setup(1, 2, func(data protoutil.SignedData) bool {
  1201  		return bytes.Equal(data.Identity, []byte("p1"))
  1202  	}, map[string]struct{}{"org1": {}, "org2": {}}, false)
  1203  	factoryMock2.On("AccessPolicy", mock.Anything, mock.Anything).Return(policyMock2, nil)
  1204  
  1205  	p2 := gn.newPullerWithMetrics(metrics, "p2", policyStore, factoryMock2)
  1206  
  1207  	dig := &proto.PvtDataDigest{
  1208  		TxId:       "txID1",
  1209  		Collection: "col1",
  1210  		Namespace:  "ns1",
  1211  	}
  1212  
  1213  	store := Dig2PvtRWSetWithConfig{
  1214  		privdatacommon.DigKey{
  1215  			TxId:       "txID1",
  1216  			Collection: "col1",
  1217  			Namespace:  "ns1",
  1218  		}: p2TransientStore,
  1219  	}
  1220  
  1221  	p2.PrivateDataRetriever.(*dataRetrieverMock).On("CollectionRWSet", mock.MatchedBy(protoMatcher(dig)),
  1222  		uint64(0)).Return(store, true, nil)
  1223  
  1224  	dasf := &digestsAndSourceFactory{}
  1225  
  1226  	fetchedMessages, err := p1.fetch(dasf.mapDigest(toDigKey(dig)).toSources().create())
  1227  	rws1 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[0])
  1228  	rws2 := util.PrivateRWSet(fetchedMessages.AvailableElements[0].Payload[1])
  1229  	fetched := []util.PrivateRWSet{rws1, rws2}
  1230  	assert.NoError(t, err)
  1231  	assert.Equal(t, p2TransientStore.RWSet, fetched)
  1232  
  1233  	assert.Equal(t,
  1234  		[]string{"channel", "A"},
  1235  		testMetricProvider.FakePullDuration.WithArgsForCall(0),
  1236  	)
  1237  	assert.True(t, testMetricProvider.FakePullDuration.ObserveArgsForCall(0) > 0)
  1238  	assert.Equal(t,
  1239  		[]string{"channel", "A"},
  1240  		testMetricProvider.FakeRetrieveDuration.WithArgsForCall(0),
  1241  	)
  1242  	assert.True(t, testMetricProvider.FakeRetrieveDuration.ObserveArgsForCall(0) > 0)
  1243  }