-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement read set for composite key get_state #506
Comments
Do we really want to do this as part of MVP mileston? We don’t support composite keys in FPC lite security model? And even if we would decide to implement composite keys completely inside of stub via (de)multiplexing onto single external fabric key, the read-write set discussed in issue would essentially be irrelevant, as to untrusted side no composite query would happen? I would assign this to rollback-protection extension so it is in same bucket as full-fpc stuff. |
It is good simplification, there is some effort hidden in this. But we should remove (or fail-safe) |
Hmm, we discussed this in a meeting (see minutes from 2020-11-12) and decided we just document that these functions are not supported in fpc lite for which i then generate a corresponding pr #465 which updated |
Sounds good to me. |
Although reads and writes of composite keys are handled just like regular keys,
the
get_public_state_by_partial_composite_key
fetches a json blob with a set of kv pairs, which are unmarshalled and passed to the caller. As of #501 FPC does not keep track of this set in the rwset. Also the kv pairs cannot be simply put in the read set, because they are not the result of single reads.Handling this properly requires to handle the RangeQueryInfo protobuf, include it in the rwset protobuf, and finally check and replay it at endorse time.
The text was updated successfully, but these errors were encountered: