Skip to content

Commit 68bc522

Browse files
authored
Clarify "identity expired" error messages (#2685) (#2688)
Peer and Orderer have several "identity expired" error messages. Clarify error messages to indicate which identity has expired. Signed-off-by: David Enyeart <[email protected]>
1 parent 3a69034 commit 68bc522

File tree

9 files changed

+10
-10
lines changed

9 files changed

+10
-10
lines changed

common/deliver/acl.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ type SessionAccessControl struct {
5757
// changes.
5858
func (ac *SessionAccessControl) Evaluate() error {
5959
if !ac.sessionEndTime.IsZero() && time.Now().After(ac.sessionEndTime) {
60-
return errors.Errorf("client identity expired %v before", time.Since(ac.sessionEndTime))
60+
return errors.Errorf("deliver client identity expired %v before", time.Since(ac.sessionEndTime))
6161
}
6262

6363
policyCheckNeeded := !ac.usedAtLeastOnce

common/deliver/acl_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ var _ = Describe("SessionAccessControl", func() {
116116
err = sac.Evaluate()
117117
Expect(err).NotTo(HaveOccurred())
118118

119-
Eventually(sac.Evaluate).Should(MatchError(ContainSubstring("client identity expired")))
119+
Eventually(sac.Evaluate).Should(MatchError(ContainSubstring("deliver client identity expired")))
120120
})
121121
})
122122

core/handlers/auth/filter/expiration.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ func validateProposal(signedProp *peer.SignedProposal) error {
4848
}
4949
expirationTime := crypto.ExpiresAt(sh.Creator)
5050
if !expirationTime.IsZero() && time.Now().After(expirationTime) {
51-
return errors.New("identity expired")
51+
return errors.New("proposal client identity expired")
5252
}
5353
return nil
5454
}

core/handlers/auth/filter/expiration_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ func TestExpirationCheckFilter(t *testing.T) {
9595
// Scenario I: Expired x509 identity
9696
sp := createValidSignedProposal(t, createX509Identity(t, "expiredCert.pem"))
9797
_, err := auth.ProcessProposal(context.Background(), sp)
98-
assert.Equal(t, err.Error(), "identity expired")
98+
assert.Equal(t, err.Error(), "proposal client identity expired")
9999
assert.False(t, nextEndorser.invoked)
100100

101101
// Scenario II: Not expired x509 identity

gossip/identity/identity.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ func (is *identityMapperImpl) Put(pkiID common.PKIidType, identity api.PeerIdent
135135
var expirationTimer *time.Timer
136136
if !expirationDate.IsZero() {
137137
if time.Now().After(expirationDate) {
138-
return errors.New("identity expired")
138+
return errors.New("gossipping peer identity expired")
139139
}
140140
// Identity would be wiped out a millisecond after its expiration date
141141
timeToLive := time.Until(expirationDate.Add(time.Millisecond))

gossip/identity/identity_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -268,7 +268,7 @@ func TestExpiration(t *testing.T) {
268268
err := idStore.Put(x509PkiID, x509Identity)
269269
assert.NoError(t, err)
270270
err = idStore.Put(expiredX509PkiID, expiredX509Identity)
271-
assert.Equal(t, "identity expired", err.Error())
271+
assert.Equal(t, "gossipping peer identity expired", err.Error())
272272
err = idStore.Put(nonX509PkiID, nonX509Identity)
273273
assert.NoError(t, err)
274274
err = idStore.Put(notSupportedPkiID, notSupportedIdentity)

integration/raft/cft_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -728,7 +728,7 @@ var _ = Describe("EndToEnd Crash Fault Tolerance", func() {
728728
p, err := nwo.Broadcast(network, orderer, channelCreateTxn)
729729
Expect(err).NotTo(HaveOccurred())
730730
Expect(p.Status).To(Equal(common.Status_BAD_REQUEST))
731-
Expect(p.Info).To(ContainSubstring("identity expired"))
731+
Expect(p.Info).To(ContainSubstring("broadcast client identity expired"))
732732

733733
By("Attempting to fetch a block from orderer and failing")
734734
denv := CreateDeliverEnvelope(network, orderer, 0, network.SystemChannel.Name)
@@ -737,7 +737,7 @@ var _ = Describe("EndToEnd Crash Fault Tolerance", func() {
737737
block, err := nwo.Deliver(network, orderer, denv)
738738
Expect(err).To(HaveOccurred())
739739
Expect(block).To(BeNil())
740-
Eventually(runner.Err(), time.Minute, time.Second).Should(gbytes.Say("client identity expired"))
740+
Eventually(runner.Err(), time.Minute, time.Second).Should(gbytes.Say("deliver client identity expired"))
741741

742742
By("Killing orderer")
743743
ordererProc.Signal(syscall.SIGTERM)

orderer/common/msgprocessor/expiration.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,5 +51,5 @@ func (exp *expirationRejectRule) Apply(message *common.Envelope) error {
5151
if expirationTime.IsZero() || time.Now().Before(expirationTime) {
5252
return nil
5353
}
54-
return errors.New("identity expired")
54+
return errors.New("broadcast client identity expired")
5555
}

orderer/common/msgprocessor/expiration_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ func TestExpirationRejectRule(t *testing.T) {
109109
mockCapabilities.ExpirationCheckReturns(true)
110110
err := NewExpirationRejectRule(mockResources).Apply(env)
111111
assert.Error(t, err)
112-
assert.Equal(t, err.Error(), "identity expired")
112+
assert.Equal(t, err.Error(), "broadcast client identity expired")
113113

114114
mockCapabilities.ExpirationCheckReturns(false)
115115
err = NewExpirationRejectRule(mockResources).Apply(env)

0 commit comments

Comments
 (0)