Skip to content

Commit d6d6a7e

Browse files
Fix staticcheck checks
staticcheck was only being run against the root directory, which contains no Go files. Change to run recurseively so code is actually checked. For now, disable checks for missing package documentation. Fix staticcheck failures and remove use of unnecessary github.com/pkg/errors package. Disable fail-fast for golang test matrix so all test results can be viewed, even if one fails. Signed-off-by: Mark S. Lewis <[email protected]>
1 parent c51695e commit d6d6a7e

26 files changed

+108
-92
lines changed

.github/workflows/golang.yml

+2-1
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,9 @@ jobs:
3131
end-to-end:
3232
runs-on: ubuntu-latest
3333
strategy:
34+
fail-fast: false
3435
matrix:
35-
FABRIC_VERSION: [2.4.8, 2.5.0-beta]
36+
FABRIC_VERSION: ['2.4.8', '2.5.0-beta']
3637
CREATE_CHANNEL: [create_channel, existing_create_channel]
3738
steps:
3839
- uses: actions/checkout@v3

Makefile

+1-1
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ lint: staticcheck golangci-lint
2222
.PHONEY: staticcheck
2323
staticcheck:
2424
go install honnef.co/go/tools/cmd/staticcheck@latest
25-
staticcheck -f stylish '$(base_dir)'
25+
staticcheck -f stylish '$(base_dir)/...'
2626

2727
.PHONEY: golangci-lint
2828
golangci-lint:

go.mod

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ require (
1616
github.com/onsi/ginkgo/v2 v2.5.0
1717
github.com/onsi/gomega v1.24.0
1818
github.com/opentracing/opentracing-go v1.2.0
19+
github.com/pkg/errors v0.9.1
1920
google.golang.org/grpc v1.52.3
2021
google.golang.org/protobuf v1.28.1
2122
gopkg.in/yaml.v2 v2.4.0
@@ -45,7 +46,6 @@ require (
4546
github.com/miekg/pkcs11 v1.1.1 // indirect
4647
github.com/pelletier/go-toml v1.8.0 // indirect
4748
github.com/pierrec/lz4/v4 v4.1.14 // indirect
48-
github.com/pkg/errors v0.9.1 // indirect
4949
github.com/rcrowley/go-metrics v0.0.0-20201227073835-cf1acfcdf475 // indirect
5050
github.com/spf13/afero v1.3.1 // indirect
5151
github.com/spf13/cast v1.4.1 // indirect

internal/channelconfig/channelconfig.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ func (scv *StandardConfigValue) Value() proto.Message {
6464
return scv.value
6565
}
6666

67-
// HashingAlgorithm returns the only currently valid hashing algorithm.
67+
// HashingAlgorithmValue returns the only currently valid hashing algorithm.
6868
// It is a value for the /Channel group.
6969
func HashingAlgorithmValue() *StandardConfigValue {
7070
return &StandardConfigValue{

internal/configtxgen/encoder/encoder.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -226,7 +226,7 @@ func NewOrdererGroup(conf *genesisconfig.Orderer) (*cb.ConfigGroup, error) {
226226
return ordererGroup, nil
227227
}
228228

229-
// NewConsortiumsGroup returns an org component of the channel configuration. It defines the crypto material for the
229+
// NewConsortiumOrgGroup returns an org component of the channel configuration. It defines the crypto material for the
230230
// organization (its MSP). It sets the mod_policy of all elements to "Admins".
231231
func NewConsortiumOrgGroup(conf *genesisconfig.Organization) (*cb.ConfigGroup, error) {
232232
consortiumsOrgGroup := NewConfigGroup()
@@ -364,7 +364,7 @@ func NewConsortiumsGroup(conf map[string]*genesisconfig.Consortium) (*cb.ConfigG
364364
return consortiumsGroup, nil
365365
}
366366

367-
// NewConsortiums returns a consortiums component of the channel configuration. Each consortium defines the organizations which may be involved in channel
367+
// NewConsortiumGroup returns a consortiums component of the channel configuration. Each consortium defines the organizations which may be involved in channel
368368
// creation, as well as the channel creation policy the orderer checks at channel creation time to authorize the action. It sets the mod_policy of all
369369
// elements to "/Channel/Orderer/Admins".
370370
func NewConsortiumGroup(conf *genesisconfig.Consortium) (*cb.ConfigGroup, error) {

internal/configtxgen/genesisconfig/config.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -210,13 +210,13 @@ func LoadTopLevel(configPaths ...string) *TopLevel {
210210

211211
err := config.ReadInConfig()
212212
if err != nil {
213-
panic(fmt.Errorf("Error reading configuration: %w", err))
213+
panic(fmt.Errorf("error reading configuration: %w", err))
214214
}
215215
log.Printf("Using config file: %s", config.ConfigFileUsed())
216216

217217
uconf, err := cache.load(config, config.ConfigFileUsed())
218218
if err != nil {
219-
panic(fmt.Errorf("Error reading configuration: %w", err))
219+
panic(fmt.Errorf("error reading configuration: %w", err))
220220
}
221221
uconf.completeInitialization(filepath.Dir(config.ConfigFileUsed()))
222222
fmt.Printf("Loaded configuration: %s", config.ConfigFileUsed())
@@ -241,7 +241,7 @@ func Load(profile string, configPaths ...string) (*Profile, error) {
241241

242242
uconf, err := cache.load(config, config.ConfigFileUsed())
243243
if err != nil {
244-
panic(fmt.Errorf("Error loading config from config cache: %w", err))
244+
panic(fmt.Errorf("error loading config from config cache: %w", err))
245245
}
246246

247247
result, ok := uconf.Profiles[profile]
@@ -450,7 +450,7 @@ func (c *configCache) load(config *viperutil.ConfigParser, configPath string) (*
450450
if !ok {
451451
err := config.EnhancedExactUnmarshal(conf)
452452
if err != nil {
453-
return nil, fmt.Errorf("Error unmarshalling config into struct: %s", err)
453+
return nil, fmt.Errorf("error unmarshalling config into struct: %s", err)
454454
}
455455

456456
serializedConf, err = json.Marshal(conf)

internal/configtxgen/viperutil/config_util.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -291,7 +291,7 @@ func stringFromFileDecodeHook(f reflect.Kind, t reflect.Kind, data interface{})
291291
return string(bytes), nil
292292
case ok:
293293
// fileName was nil
294-
return nil, fmt.Errorf("Value of File: was nil")
294+
return nil, fmt.Errorf("value of File: was nil")
295295
}
296296
}
297297
return data, nil
@@ -349,7 +349,7 @@ func pemBlocksFromFileDecodeHook(f reflect.Kind, t reflect.Kind, data interface{
349349
return result, nil
350350
case ok:
351351
// fileName was nil
352-
return nil, fmt.Errorf("Value of File: was nil")
352+
return nil, fmt.Errorf("value of File: was nil")
353353
}
354354
}
355355
return data, nil
@@ -379,7 +379,7 @@ func kafkaVersionDecodeHook(f reflect.Type, t reflect.Type, data interface{}) (i
379379

380380
v, err := version.NewVersion(data.(string))
381381
if err != nil {
382-
return nil, fmt.Errorf("Unable to parse Kafka version: %s", err)
382+
return nil, fmt.Errorf("unable to parse Kafka version: %s", err)
383383
}
384384

385385
for kafkaVersion, constraints := range kafkaVersionConstraints {
@@ -388,7 +388,7 @@ func kafkaVersionDecodeHook(f reflect.Type, t reflect.Type, data interface{}) (i
388388
}
389389
}
390390

391-
return nil, fmt.Errorf("Unsupported Kafka version: '%s'", data)
391+
return nil, fmt.Errorf("unsupported Kafka version: '%s'", data)
392392
}
393393

394394
func bccspHook(f reflect.Type, t reflect.Type, data interface{}) (interface{}, error) {

internal/osnadmin/join.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import (
1515
"net/http"
1616
)
1717

18-
// Joins an OSN to a new or existing channel.
18+
// Join an OSN to a new or existing channel.
1919
func Join(osnURL string, blockBytes []byte, caCertPool *x509.CertPool, tlsClientCert tls.Certificate) (*http.Response, error) {
2020
url := fmt.Sprintf("%s/participation/v1/channels", osnURL)
2121
req, err := createJoinRequest(url, blockBytes)

internal/osnadmin/list.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -13,14 +13,14 @@ import (
1313
"net/http"
1414
)
1515

16-
// Lists the channels an OSN is a member of.
16+
// ListAllChannels that an OSN is a member of.
1717
func ListAllChannels(osnURL string, caCertPool *x509.CertPool, tlsClientCert tls.Certificate) (*http.Response, error) {
1818
url := fmt.Sprintf("%s/participation/v1/channels", osnURL)
1919

2020
return httpGet(url, caCertPool, tlsClientCert)
2121
}
2222

23-
// Lists a single channel an OSN is a member of.
23+
// ListSingleChannel that an OSN is a member of.
2424
func ListSingleChannel(osnURL, channelID string, caCertPool *x509.CertPool, tlsClientCert tls.Certificate) (*http.Response, error) {
2525
url := fmt.Sprintf("%s/participation/v1/channels/%s", osnURL, channelID)
2626

internal/osnadmin/remove.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ import (
1313
"net/http"
1414
)
1515

16-
// Removes an OSN from an existing channel.
16+
// Remove an OSN from an existing channel.
1717
func Remove(osnURL, channelID string, caCertPool *x509.CertPool, tlsClientCert tls.Certificate) (*http.Response, error) {
1818
url := fmt.Sprintf("%s/participation/v1/channels/%s", osnURL, channelID)
1919

internal/policies/policies.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ type ConfigPolicy interface {
1818
Value() *cb.Policy
1919
}
2020

21-
// StandardConfigValue implements the ConfigValue interface.
21+
// StandardConfigPolicy implements the ConfigPolicy interface.
2222
type StandardConfigPolicy struct {
2323
key string
2424
value *cb.Policy

internal/policydsl/policydsl.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -251,7 +251,7 @@ func secondPass(args ...interface{}) (interface{}, error) {
251251
}
252252

253253
/* get the n in the t out of n */
254-
var n int = len(args) - 2
254+
n := len(args) - 2
255255

256256
/* sanity check - t should be positive, permit equal to n+1, but disallow over n+1 */
257257
if t < 0 || t > n+1 {

internal/protoutil/unmarshalers.go

+16-10
Original file line numberDiff line numberDiff line change
@@ -1,38 +1,44 @@
11
package protoutil
22

33
import (
4+
"fmt"
5+
46
cb "github.com/hyperledger/fabric-protos-go-apiv2/common"
5-
"github.com/pkg/errors"
67
"google.golang.org/protobuf/proto"
78
)
89

910
// UnmarshalEnvelope unmarshals bytes to a Envelope
1011
func UnmarshalEnvelope(encoded []byte) (*cb.Envelope, error) {
1112
envelope := &cb.Envelope{}
12-
err := proto.Unmarshal(encoded, envelope)
13-
return envelope, errors.Wrap(err, "error unmarshaling Envelope")
13+
if err := proto.Unmarshal(encoded, envelope); err != nil {
14+
return nil, fmt.Errorf("error unmarshaling Envelope: %w", err)
15+
}
16+
return envelope, nil
1417
}
1518

1619
// UnmarshalPayload unmarshals bytes to a Payload
1720
func UnmarshalPayload(encoded []byte) (*cb.Payload, error) {
1821
payload := &cb.Payload{}
19-
err := proto.Unmarshal(encoded, payload)
20-
return payload, errors.Wrap(err, "error unmarshaling Payload")
22+
if err := proto.Unmarshal(encoded, payload); err != nil {
23+
return nil, fmt.Errorf("error unmarshaling Payload: %w", err)
24+
}
25+
return payload, nil
2126
}
2227

2328
// UnmarshalChannelHeader unmarshals bytes to a ChannelHeader
2429
func UnmarshalChannelHeader(bytes []byte) (*cb.ChannelHeader, error) {
2530
chdr := &cb.ChannelHeader{}
26-
err := proto.Unmarshal(bytes, chdr)
27-
return chdr, errors.Wrap(err, "error unmarshaling ChannelHeader")
31+
if err := proto.Unmarshal(bytes, chdr); err != nil {
32+
return nil, fmt.Errorf("error unmarshaling ChannelHeader: %w", err)
33+
}
34+
return chdr, nil
2835
}
2936

3037
// UnmarshalConfigUpdateEnvelope attempts to unmarshal bytes to a *cb.ConfigUpdate
3138
func UnmarshalConfigUpdateEnvelope(data []byte) (*cb.ConfigUpdateEnvelope, error) {
3239
configUpdateEnvelope := &cb.ConfigUpdateEnvelope{}
33-
err := proto.Unmarshal(data, configUpdateEnvelope)
34-
if err != nil {
35-
return nil, err
40+
if err := proto.Unmarshal(data, configUpdateEnvelope); err != nil {
41+
return nil, fmt.Errorf("error unmarshaling ConfigUpdateEnvelope: %w", err)
3642
}
3743
return configUpdateEnvelope, nil
3844
}

pkg/chaincode/approve_test.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ func NewEndorseResponse(channelName string, result string) *gateway.EndorseRespo
5555
}
5656
}
5757

58-
func NewEvaluateResponse(channelName string, result string) *gateway.EvaluateResponse {
58+
func NewEvaluateResponse(result string) *gateway.EvaluateResponse {
5959
return &gateway.EvaluateResponse{
6060
Result: &peer.Response{
6161
Payload: []byte(result),

pkg/chaincode/chaincodeCCAAS.go

+4-4
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,9 @@ import (
1111

1212
// Connection setting used in connection.json
1313
type Connection struct {
14-
Address string `json:"address"`
15-
Dial_timeout string `json:"dial_timeout"`
16-
Tls_required bool `json:"tls_required"`
14+
Address string `json:"address"`
15+
DialTimeout string `json:"dial_timeout"`
16+
TLSRequired bool `json:"tls_required"`
1717
}
1818

1919
// Metadata as metadata.json
@@ -23,7 +23,7 @@ type Metadata struct {
2323
}
2424

2525
/*
26-
To use PackageCCAAS you need to start container by yourself. as sample as
26+
PackageCCAAS requires that you start a container by yourself. as sample as
2727
${CONTAINER_CLI} run --rm -d --name peer0org1_${CC_NAME}_ccaas \
2828
--network fabric_test \
2929
-e CHAINCODE_SERVER_ADDRESS=0.0.0.0:${CCAAS_SERVER_PORT} \

pkg/chaincode/chaincodeCCAAS_test.go

+3-3
Original file line numberDiff line numberDiff line change
@@ -16,9 +16,9 @@ import (
1616
var _ = Describe("Package", func() {
1717
It("CCaaS", func() {
1818
dummyConnection := Connection{
19-
Address: "127.0.0.1:8080",
20-
Dial_timeout: "10s",
21-
Tls_required: false,
19+
Address: "127.0.0.1:8080",
20+
DialTimeout: "10s",
21+
TLSRequired: false,
2222
}
2323
dummyMeta := Metadata{
2424
Type: "ccaas",

pkg/chaincode/lifecycle.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ const (
2929
CodePackageFile = "code.tar.gz"
3030
)
3131

32-
// Chaincode Define
32+
// Definition of a chaincode
3333
type Definition struct {
3434
ChannelName string
3535
PackageID string
@@ -45,16 +45,16 @@ type Definition struct {
4545

4646
func (d *Definition) Validate() error {
4747
if d.ChannelName == "" {
48-
return fmt.Errorf("For channel approve/commit channel name is required")
48+
return fmt.Errorf("channel name is required for channel approve/commit")
4949
}
5050
if d.Name == "" {
51-
return fmt.Errorf("For channel approve/commit chaincode name is required")
51+
return fmt.Errorf("chaincode name is required for channel approve/commit")
5252
}
5353
if d.Version == "" {
54-
return fmt.Errorf("For channel approve/commit chaincode version is required")
54+
return fmt.Errorf("chaincode version is required for channel approve/commit")
5555
}
56-
if d.Sequence == 0 {
57-
return fmt.Errorf("For channel approve/commit chaincode Sequence is required as bigger than 0")
56+
if d.Sequence <= 0 {
57+
return fmt.Errorf("chaincode sequence must be greater than 0 for channel approve/commit")
5858
}
5959
return nil
6060
}

pkg/chaincode/lifecycle_test.go

+12-1
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ var _ = Describe("Lifecycle", func() {
3131
Expect(err).To(HaveOccurred())
3232
})
3333

34-
It("Validate Sequence", func() {
34+
It("Validate missing / zero Sequence", func() {
3535
chaincodeDefinition := &chaincode.Definition{
3636
Name: "CHAINCODE",
3737
Version: "1.0",
@@ -41,6 +41,17 @@ var _ = Describe("Lifecycle", func() {
4141
Expect(err).To(HaveOccurred())
4242
})
4343

44+
It("Validate negative Sequence", func() {
45+
chaincodeDefinition := &chaincode.Definition{
46+
Name: "CHAINCODE",
47+
Version: "1.0",
48+
Sequence: -1,
49+
ChannelName: "mycc",
50+
}
51+
err := chaincodeDefinition.Validate()
52+
Expect(err).To(HaveOccurred())
53+
})
54+
4455
It("Pass validation", func() {
4556
chaincodeDefinition := &chaincode.Definition{
4657
Name: "CHAINCODE",

pkg/chaincode/packageID.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ func PackageID(PackageFile string) (string, error) {
2525
return packageID, nil
2626
}
2727

28-
// PackageID returns the package ID with the label and hash of the chaincode install package
28+
// GetPackageID returns the package ID with the label and hash of the chaincode install package
2929
func GetPackageID(label string, ccInstallPkg []byte) string {
3030
h := sha256.New()
3131
h.Write(ccInstallPkg)

pkg/chaincode/querycommitted_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ var _ = Describe("QueryCommitted", func() {
3535
Invoke(gomock.Any(), gomock.Eq(gatewayEvaluateMethod), gomock.Any(), gomock.Any(), gomock.Any()).
3636
Do(func(ctx context.Context, method string, in *gateway.EvaluateRequest, out *gateway.EvaluateResponse, opts ...grpc.CallOption) {
3737
evaluateCtxErr = ctx.Err()
38-
CopyProto(NewEvaluateResponse(channelName, ""), out)
38+
CopyProto(NewEvaluateResponse(""), out)
3939
})
4040

4141
mockSigner := NewMockSigner(controller, "", nil, nil)
@@ -78,7 +78,7 @@ var _ = Describe("QueryCommitted", func() {
7878
Invoke(gomock.Any(), gomock.Eq(gatewayEvaluateMethod), gomock.Any(), gomock.Any(), gomock.Any()).
7979
Do(func(ctx context.Context, method string, in *gateway.EvaluateRequest, out *gateway.EvaluateResponse, opts ...grpc.CallOption) {
8080
evaluateRequest = in
81-
CopyProto(NewEvaluateResponse(channelName, ""), out)
81+
CopyProto(NewEvaluateResponse(""), out)
8282
}).
8383
Times(1)
8484
mockSigner := NewMockSigner(controller, "", nil, nil)

pkg/chaincode/querycommittedwithname_test.go

+2-2
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ var _ = Describe("QueryCommittedWithName", func() {
3737
Invoke(gomock.Any(), gomock.Eq(gatewayEvaluateMethod), gomock.Any(), gomock.Any(), gomock.Any()).
3838
Do(func(ctx context.Context, method string, in *gateway.EvaluateRequest, out *gateway.EvaluateResponse, opts ...grpc.CallOption) {
3939
evaluateCtxErr = ctx.Err()
40-
CopyProto(NewEvaluateResponse(channelName, ""), out)
40+
CopyProto(NewEvaluateResponse(""), out)
4141
})
4242

4343
mockSigner := NewMockSigner(controller, "", nil, nil)
@@ -82,7 +82,7 @@ var _ = Describe("QueryCommittedWithName", func() {
8282
Invoke(gomock.Any(), gomock.Eq(gatewayEvaluateMethod), gomock.Any(), gomock.Any(), gomock.Any()).
8383
Do(func(ctx context.Context, method string, in *gateway.EvaluateRequest, out *gateway.EvaluateResponse, opts ...grpc.CallOption) {
8484
evaluateRequest = in
85-
CopyProto(NewEvaluateResponse(channelName, ""), out)
85+
CopyProto(NewEvaluateResponse(""), out)
8686
}).
8787
Times(1)
8888
mockSigner := NewMockSigner(controller, "", nil, nil)

0 commit comments

Comments
 (0)