Skip to content

Commit f477ccc

Browse files
committed
[FAB-3171] Rename the lifecycle system chaincode
The existing name is lccc, would like to update it to lscc. In this way we can keep all system chaincode with the same scc suffix. This is also aligned with other system chaincodes like cscc, escc and qscc. Change-Id: Ica59de57ea15e79be252aaae263af9a27a19c896 Signed-off-by: Baohua Yang <[email protected]>
1 parent 3b18166 commit f477ccc

27 files changed

+195
-195
lines changed

bddtests/chaincode.go

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ func createProposalForChaincode(ccChaincodeDeploymentSpec *pb.ChaincodeDeploymen
4242
return nil, fmt.Errorf("Error creating proposal from ChaincodeDeploymentSpec: %s", err)
4343
}
4444
lcChaincodeSpec := &pb.ChaincodeSpec{Type: pb.ChaincodeSpec_GOLANG,
45-
ChaincodeId: &pb.ChaincodeID{Name: "lccc"},
45+
ChaincodeId: &pb.ChaincodeID{Name: "lscc"},
4646
Input: &pb.ChaincodeInput{Args: [][]byte{[]byte("deploy"), []byte("default"), ccDeploymentSpecBytes}}}
4747
lcChaincodeInvocationSpec := &pb.ChaincodeInvocationSpec{ChaincodeSpec: lcChaincodeSpec}
4848

bddtests/steps/endorser_util.py

+2-2
Original file line numberDiff line numberDiff line change
@@ -124,12 +124,12 @@ def signProposal(proposal, entity, signersCert):
124124

125125

126126
def createDeploymentChaincodeSpecForBDD(ccDeploymentSpec, chainID):
127-
lc_chaincode_spec = getChaincodeSpec(ccType="GOLANG", path="", name="lccc",
127+
lc_chaincode_spec = getChaincodeSpec(ccType="GOLANG", path="", name="lscc",
128128
args=['deploy', chainID, ccDeploymentSpec.SerializeToString()])
129129
return lc_chaincode_spec
130130

131131
def createInstallChaincodeSpecForBDD(ccDeploymentSpec, chainID):
132-
lc_chaincode_spec = getChaincodeSpec(ccType="GOLANG", path="", name="lccc",
132+
lc_chaincode_spec = getChaincodeSpec(ccType="GOLANG", path="", name="lscc",
133133
args=['install', ccDeploymentSpec.SerializeToString()])
134134
return lc_chaincode_spec
135135

core/chaincode/ccproviderimpl.go

+8-8
Original file line numberDiff line numberDiff line change
@@ -72,22 +72,22 @@ func (c *ccProviderImpl) GetCCContext(cid, name, version, txid string, syscc boo
7272
return &ccProviderContextImpl{ctx: ctx}
7373
}
7474

75-
// GetCCValidationInfoFromLCCC returns the VSCC and the policy listed in LCCC for the supplied chaincode
76-
func (c *ccProviderImpl) GetCCValidationInfoFromLCCC(ctxt context.Context, txid string, signedProp *pb.SignedProposal, prop *pb.Proposal, chainID string, chaincodeID string) (string, []byte, error) {
77-
// LCCC does not have any notion about its own
75+
// GetCCValidationInfoFromLSCC returns the VSCC and the policy listed in LSCC for the supplied chaincode
76+
func (c *ccProviderImpl) GetCCValidationInfoFromLSCC(ctxt context.Context, txid string, signedProp *pb.SignedProposal, prop *pb.Proposal, chainID string, chaincodeID string) (string, []byte, error) {
77+
// LSCC does not have any notion about its own
7878
// endorsing policy - we should never call this
79-
// function with lccc as the chaincodeID
80-
if chaincodeID == "lccc" {
81-
panic("GetCCValidationInfoFromLCCC invoke for LCCC")
79+
// function with lscc as the chaincodeID
80+
if chaincodeID == "lscc" {
81+
panic("GetCCValidationInfoFromLSCC invoke for LSCC")
8282
}
8383

84-
data, err := GetChaincodeDataFromLCCC(ctxt, txid, signedProp, prop, chainID, chaincodeID)
84+
data, err := GetChaincodeDataFromLSCC(ctxt, txid, signedProp, prop, chainID, chaincodeID)
8585
if err != nil {
8686
return "", nil, err
8787
}
8888

8989
if data == nil || data.Vscc == "" || data.Policy == nil {
90-
return "", nil, fmt.Errorf("Incorrect validation info in LCCC")
90+
return "", nil, fmt.Errorf("Incorrect validation info in LSCC")
9191
}
9292

9393
return data.Vscc, data.Policy, nil

core/chaincode/chaincode_support.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -537,10 +537,10 @@ func (chaincodeSupport *ChaincodeSupport) Launch(context context.Context, cccid
537537
var depPayload []byte
538538

539539
//hopefully we are restarting from existing image and the deployed transaction exists
540-
//this will also validate the ID from the LCCC
541-
depPayload, err = GetCDSFromLCCC(context, cccid.TxID, cccid.SignedProposal, cccid.Proposal, cccid.ChainID, cID.Name)
540+
//this will also validate the ID from the LSCC
541+
depPayload, err = GetCDSFromLSCC(context, cccid.TxID, cccid.SignedProposal, cccid.Proposal, cccid.ChainID, cID.Name)
542542
if err != nil {
543-
return cID, cMsg, fmt.Errorf("Could not get deployment transaction from LCCC for %s - %s", canName, err)
543+
return cID, cMsg, fmt.Errorf("Could not get deployment transaction from LSCC for %s - %s", canName, err)
544544
}
545545
if depPayload == nil {
546546
return cID, cMsg, fmt.Errorf("failed to get deployment payload %s - %s", canName, err)
@@ -559,15 +559,15 @@ func (chaincodeSupport *ChaincodeSupport) Launch(context context.Context, cccid
559559

560560
//launch container if it is a System container or not in dev mode
561561
if (!chaincodeSupport.userRunsCC || cds.ExecEnv == pb.ChaincodeDeploymentSpec_SYSTEM) && (chrte == nil || chrte.handler == nil) {
562-
//NOTE-We need to streamline code a bit so the data from LCCC gets passed to this thus
562+
//NOTE-We need to streamline code a bit so the data from LSCC gets passed to this thus
563563
//avoiding the need to go to the FS. In particular, we should use cdsfs completely. It is
564564
//just a vestige of old protocol that we continue to use ChaincodeDeploymentSpec for
565565
//anything other than Install. In particular, instantiate, invoke, upgrade should be using
566566
//just some form of ChaincodeInvocationSpec.
567567
//
568-
//But for now, if we are invoking we have gone through the LCCC path above. If instantiating
568+
//But for now, if we are invoking we have gone through the LSCC path above. If instantiating
569569
//or upgrading currently we send a CDS with nil CodePackage. In this case the codepath
570-
//in the endorser has gone through LCCC validation. Just get the code from the FS.
570+
//in the endorser has gone through LSCC validation. Just get the code from the FS.
571571
if cds.CodePackage == nil {
572572
//no code bytes for these situations
573573
if !(chaincodeSupport.userRunsCC || cds.ExecEnv == pb.ChaincodeDeploymentSpec_SYSTEM) {

core/chaincode/chaincodeexec.go

+8-8
Original file line numberDiff line numberDiff line change
@@ -38,25 +38,25 @@ func createCIS(ccname string, args [][]byte) (*pb.ChaincodeInvocationSpec, error
3838
return spec, nil
3939
}
4040

41-
// GetCDSFromLCCC gets chaincode deployment spec from LCCC
42-
func GetCDSFromLCCC(ctxt context.Context, txid string, signedProp *pb.SignedProposal, prop *pb.Proposal, chainID string, chaincodeID string) ([]byte, error) {
41+
// GetCDSFromLSCC gets chaincode deployment spec from LSCC
42+
func GetCDSFromLSCC(ctxt context.Context, txid string, signedProp *pb.SignedProposal, prop *pb.Proposal, chainID string, chaincodeID string) ([]byte, error) {
4343
version := util.GetSysCCVersion()
44-
cccid := ccprovider.NewCCContext(chainID, "lccc", version, txid, true, signedProp, prop)
44+
cccid := ccprovider.NewCCContext(chainID, "lscc", version, txid, true, signedProp, prop)
4545
res, _, err := ExecuteChaincode(ctxt, cccid, [][]byte{[]byte("getdepspec"), []byte(chainID), []byte(chaincodeID)})
4646
if err != nil {
47-
return nil, fmt.Errorf("Execute getdepspec(%s, %s) of LCCC error: %s", chainID, chaincodeID, err)
47+
return nil, fmt.Errorf("Execute getdepspec(%s, %s) of LSCC error: %s", chainID, chaincodeID, err)
4848
}
4949
if res.Status != shim.OK {
50-
return nil, fmt.Errorf("Get ChaincodeDeploymentSpec for %s/%s from LCCC error: %s", chaincodeID, chainID, res.Message)
50+
return nil, fmt.Errorf("Get ChaincodeDeploymentSpec for %s/%s from LSCC error: %s", chaincodeID, chainID, res.Message)
5151
}
5252

5353
return res.Payload, nil
5454
}
5555

56-
// GetChaincodeDataFromLCCC gets chaincode data from LCCC given name
57-
func GetChaincodeDataFromLCCC(ctxt context.Context, txid string, signedProp *pb.SignedProposal, prop *pb.Proposal, chainID string, chaincodeID string) (*ccprovider.ChaincodeData, error) {
56+
// GetChaincodeDataFromLSCC gets chaincode data from LSCC given name
57+
func GetChaincodeDataFromLSCC(ctxt context.Context, txid string, signedProp *pb.SignedProposal, prop *pb.Proposal, chainID string, chaincodeID string) (*ccprovider.ChaincodeData, error) {
5858
version := util.GetSysCCVersion()
59-
cccid := ccprovider.NewCCContext(chainID, "lccc", version, txid, true, signedProp, prop)
59+
cccid := ccprovider.NewCCContext(chainID, "lscc", version, txid, true, signedProp, prop)
6060
res, _, err := ExecuteChaincode(ctxt, cccid, [][]byte{[]byte("getccdata"), []byte(chainID), []byte(chaincodeID)})
6161
if err == nil {
6262
if res.Status != shim.OK {

core/chaincode/chaincodetest.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -403,7 +403,7 @@ chaincode:
403403
# whitelist, add "myscc: enable" to the list
404404
system:
405405
cscc: enable
406-
lccc: enable
406+
lscc: enable
407407
escc: enable
408408
vscc: enable
409409

core/chaincode/exectransaction_test.go

+14-14
Original file line numberDiff line numberDiff line change
@@ -247,19 +247,19 @@ func getDeploymentSpec(_ context.Context, spec *pb.ChaincodeSpec) (*pb.Chaincode
247247
return cdDeploymentSpec, nil
248248
}
249249

250-
//getDeployLCCCSpec gets the spec for the chaincode deployment to be sent to LCCC
251-
func getDeployLCCCSpec(chainID string, cds *pb.ChaincodeDeploymentSpec) (*pb.ChaincodeInvocationSpec, error) {
250+
//getDeployLSCCSpec gets the spec for the chaincode deployment to be sent to LSCC
251+
func getDeployLSCCSpec(chainID string, cds *pb.ChaincodeDeploymentSpec) (*pb.ChaincodeInvocationSpec, error) {
252252
b, err := proto.Marshal(cds)
253253
if err != nil {
254254
return nil, err
255255
}
256256

257257
sysCCVers := util.GetSysCCVersion()
258258

259-
//wrap the deployment in an invocation spec to lccc...
260-
lcccSpec := &pb.ChaincodeInvocationSpec{ChaincodeSpec: &pb.ChaincodeSpec{Type: pb.ChaincodeSpec_GOLANG, ChaincodeId: &pb.ChaincodeID{Name: "lccc", Version: sysCCVers}, Input: &pb.ChaincodeInput{Args: [][]byte{[]byte("deploy"), []byte(chainID), b}}}}
259+
//wrap the deployment in an invocation spec to lscc...
260+
lsccSpec := &pb.ChaincodeInvocationSpec{ChaincodeSpec: &pb.ChaincodeSpec{Type: pb.ChaincodeSpec_GOLANG, ChaincodeId: &pb.ChaincodeID{Name: "lscc", Version: sysCCVers}, Input: &pb.ChaincodeInput{Args: [][]byte{[]byte("deploy"), []byte(chainID), b}}}}
261261

262-
return lcccSpec, nil
262+
return lsccSpec, nil
263263
}
264264

265265
// Deploy a chaincode - i.e., build and initialize.
@@ -274,9 +274,9 @@ func deploy(ctx context.Context, cccid *ccprovider.CCContext, spec *pb.Chaincode
274274
}
275275

276276
func deploy2(ctx context.Context, cccid *ccprovider.CCContext, chaincodeDeploymentSpec *pb.ChaincodeDeploymentSpec, blockNumber uint64) (b []byte, err error) {
277-
cis, err := getDeployLCCCSpec(cccid.ChainID, chaincodeDeploymentSpec)
277+
cis, err := getDeployLSCCSpec(cccid.ChainID, chaincodeDeploymentSpec)
278278
if err != nil {
279-
return nil, fmt.Errorf("Error creating lccc spec : %s\n", err)
279+
return nil, fmt.Errorf("Error creating lscc spec : %s\n", err)
280280
}
281281

282282
ctx, txsim, err := startTxSimulation(ctx, cccid.ChainID)
@@ -303,10 +303,10 @@ func deploy2(ctx context.Context, cccid *ccprovider.CCContext, chaincodeDeployme
303303
ccprovider.PutChaincodeIntoFS(chaincodeDeploymentSpec)
304304

305305
sysCCVers := util.GetSysCCVersion()
306-
lcccid := ccprovider.NewCCContext(cccid.ChainID, cis.ChaincodeSpec.ChaincodeId.Name, sysCCVers, uuid, true, nil, nil)
306+
lsccid := ccprovider.NewCCContext(cccid.ChainID, cis.ChaincodeSpec.ChaincodeId.Name, sysCCVers, uuid, true, nil, nil)
307307

308-
//write to lccc
309-
if _, _, err = ExecuteWithErrorFilter(ctx, lcccid, cis); err != nil {
308+
//write to lscc
309+
if _, _, err = ExecuteWithErrorFilter(ctx, lsccid, cis); err != nil {
310310
return nil, fmt.Errorf("Error deploying chaincode: %s", err)
311311
}
312312

@@ -1473,7 +1473,7 @@ func TestChaincodeQueryChaincodeUsingInvoke(t *testing.T) {
14731473
}
14741474

14751475
// Test the execution of a chaincode that invokes system chaincode
1476-
// uses the "pthru" chaincode to query "lccc" for the "pthru" chaincode
1476+
// uses the "pthru" chaincode to query "lscc" for the "pthru" chaincode
14771477
func TestChaincodeInvokesSystemChaincode(t *testing.T) {
14781478
chainID := util.GetTestChainID()
14791479

@@ -1512,9 +1512,9 @@ func TestChaincodeInvokesSystemChaincode(t *testing.T) {
15121512

15131513
time.Sleep(time.Second)
15141514

1515-
//send an invoke to pass thru to query "lccc" system chaincode on chainID to get
1515+
//send an invoke to pass thru to query "lscc" system chaincode on chainID to get
15161516
//information about "pthru"
1517-
args = util.ToChaincodeArgs("lccc/"+chainID, "getid", chainID, "pthru")
1517+
args = util.ToChaincodeArgs("lscc/"+chainID, "getid", chainID, "pthru")
15181518

15191519
spec = &pb.ChaincodeSpec{Type: 1, ChaincodeId: cID, Input: &pb.ChaincodeInput{Args: args}}
15201520
// Invoke chaincode
@@ -1529,7 +1529,7 @@ func TestChaincodeInvokesSystemChaincode(t *testing.T) {
15291529

15301530
if string(retval) != "pthru" {
15311531
t.Fail()
1532-
t.Logf("Expected to get back \"pthru\" from lccc but got back %s", string(retval))
1532+
t.Logf("Expected to get back \"pthru\" from lscc but got back %s", string(retval))
15331533
theChaincodeSupport.Stop(ctxt, cccid, &pb.ChaincodeDeploymentSpec{ChaincodeSpec: spec})
15341534
return
15351535
}

core/chaincode/handler.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -121,7 +121,7 @@ func shorttxid(txid string) string {
121121
//This is needed for the "one-instance-per-chain" model when
122122
//starting up the chaincode for each chain. It will still
123123
//work for the "one-instance-for-all-chains" as the version
124-
//and suffix will just be absent (also note that LCCC reserves
124+
//and suffix will just be absent (also note that LSCC reserves
125125
//"/:[]${}" as special chars mainly for such namespace uses)
126126
func (handler *Handler) decomposeRegisteredName(cid *pb.ChaincodeID) {
127127
handler.ccCompParts = chaincodeIDParts(cid.Name)
@@ -1300,20 +1300,20 @@ func (handler *Handler) enterBusyState(e *fsm.Event, state string) {
13001300
ctxt = context.WithValue(ctxt, HistoryQueryExecutorKey, historyQueryExecutor)
13011301

13021302
if chaincodeLogger.IsEnabledFor(logging.DEBUG) {
1303-
chaincodeLogger.Debugf("[%s] calling lccc to get chaincode data for %s on channel %s",
1303+
chaincodeLogger.Debugf("[%s] calling lscc to get chaincode data for %s on channel %s",
13041304
shorttxid(msg.Txid), calledCcParts.name, calledCcParts.suffix)
13051305
}
13061306

1307-
//Call LCCC to get the called chaincode artifacts
1307+
//Call LSCC to get the called chaincode artifacts
13081308

13091309
//is the chaincode a system chaincode ?
13101310
isscc := sysccprovider.GetSystemChaincodeProvider().IsSysCC(calledCcParts.name)
13111311

13121312
var cd *ccprovider.ChaincodeData
13131313
if !isscc {
1314-
//if its a user chaincode, get the details from LCCC
1315-
//Call LCCC to get the called chaincode artifacts
1316-
cd, err = GetChaincodeDataFromLCCC(ctxt, msg.Txid, txContext.signedProp, txContext.proposal, calledCcParts.suffix, calledCcParts.name)
1314+
//if its a user chaincode, get the details from LSCC
1315+
//Call LSCC to get the called chaincode artifacts
1316+
cd, err = GetChaincodeDataFromLSCC(ctxt, msg.Txid, txContext.signedProp, txContext.proposal, calledCcParts.suffix, calledCcParts.name)
13171317
if err != nil {
13181318
payload := []byte(err.Error())
13191319
chaincodeLogger.Debugf("[%s]Failed to get chaincoed data (%s) for invoked chaincode. Sending %s",

core/chaincode/upgrade_test.go

+14-14
Original file line numberDiff line numberDiff line change
@@ -29,17 +29,17 @@ import (
2929
"golang.org/x/net/context"
3030
)
3131

32-
//getUpgradeLCCCSpec gets the spec for the chaincode upgrade to be sent to LCCC
33-
func getUpgradeLCCCSpec(chainID string, cds *pb.ChaincodeDeploymentSpec) (*pb.ChaincodeInvocationSpec, error) {
32+
//getUpgradeLSCCSpec gets the spec for the chaincode upgrade to be sent to LSCC
33+
func getUpgradeLSCCSpec(chainID string, cds *pb.ChaincodeDeploymentSpec) (*pb.ChaincodeInvocationSpec, error) {
3434
b, err := proto.Marshal(cds)
3535
if err != nil {
3636
return nil, err
3737
}
3838

39-
//wrap the deployment in an invocation spec to lccc...
40-
lcccSpec := &pb.ChaincodeInvocationSpec{ChaincodeSpec: &pb.ChaincodeSpec{Type: pb.ChaincodeSpec_GOLANG, ChaincodeId: &pb.ChaincodeID{Name: "lccc"}, Input: &pb.ChaincodeInput{Args: [][]byte{[]byte("upgrade"), []byte(chainID), b}}}}
39+
//wrap the deployment in an invocation spec to lscc...
40+
lsccSpec := &pb.ChaincodeInvocationSpec{ChaincodeSpec: &pb.ChaincodeSpec{Type: pb.ChaincodeSpec_GOLANG, ChaincodeId: &pb.ChaincodeID{Name: "lscc"}, Input: &pb.ChaincodeInput{Args: [][]byte{[]byte("upgrade"), []byte(chainID), b}}}}
4141

42-
return lcccSpec, nil
42+
return lsccSpec, nil
4343
}
4444

4545
// upgrade a chaincode - i.e., build and initialize.
@@ -55,9 +55,9 @@ func upgrade(ctx context.Context, cccid *ccprovider.CCContext, spec *pb.Chaincod
5555

5656
func upgrade2(ctx context.Context, cccid *ccprovider.CCContext,
5757
chaincodeDeploymentSpec *pb.ChaincodeDeploymentSpec, blockNumber uint64) (newcccid *ccprovider.CCContext, err error) {
58-
cis, err := getUpgradeLCCCSpec(cccid.ChainID, chaincodeDeploymentSpec)
58+
cis, err := getUpgradeLSCCSpec(cccid.ChainID, chaincodeDeploymentSpec)
5959
if err != nil {
60-
return nil, fmt.Errorf("Error creating lccc spec : %s\n", err)
60+
return nil, fmt.Errorf("Error creating lscc spec : %s\n", err)
6161
}
6262

6363
ctx, txsim, err := startTxSimulation(ctx, cccid.ChainID)
@@ -84,16 +84,16 @@ func upgrade2(ctx context.Context, cccid *ccprovider.CCContext,
8484
ccprovider.PutChaincodeIntoFS(chaincodeDeploymentSpec)
8585

8686
sysCCVers := util.GetSysCCVersion()
87-
lcccid := ccprovider.NewCCContext(cccid.ChainID, cis.ChaincodeSpec.ChaincodeId.Name, sysCCVers, uuid, true, nil, nil)
87+
lsccid := ccprovider.NewCCContext(cccid.ChainID, cis.ChaincodeSpec.ChaincodeId.Name, sysCCVers, uuid, true, nil, nil)
8888

8989
var cdbytes []byte
90-
//write to lccc
91-
if cdbytes, _, err = ExecuteWithErrorFilter(ctx, lcccid, cis); err != nil {
92-
return nil, fmt.Errorf("Error executing LCCC for upgrade: %s", err)
90+
//write to lscc
91+
if cdbytes, _, err = ExecuteWithErrorFilter(ctx, lsccid, cis); err != nil {
92+
return nil, fmt.Errorf("Error executing LSCC for upgrade: %s", err)
9393
}
9494

9595
if cdbytes == nil {
96-
return nil, fmt.Errorf("Expected ChaincodeData back from LCCC but got nil")
96+
return nil, fmt.Errorf("Expected ChaincodeData back from LSCC but got nil")
9797
}
9898

9999
cd := &ccprovider.ChaincodeData{}
@@ -103,7 +103,7 @@ func upgrade2(ctx context.Context, cccid *ccprovider.CCContext,
103103

104104
newVersion := string(cd.Version)
105105
if newVersion == cccid.Version {
106-
return nil, fmt.Errorf("Expected new version from LCCC but got same %s(%s)", newVersion, cccid.Version)
106+
return nil, fmt.Errorf("Expected new version from LSCC but got same %s(%s)", newVersion, cccid.Version)
107107
}
108108

109109
newcccid = ccprovider.NewCCContext(cccid.ChainID, chaincodeDeploymentSpec.ChaincodeSpec.ChaincodeId.Name, newVersion, uuid, false, nil, nil)
@@ -120,7 +120,7 @@ func upgrade2(ctx context.Context, cccid *ccprovider.CCContext,
120120
// upgrade to exampl02
121121
// show the upgrade worked using the same query successfully
122122
//This test a variety of things in addition to basic upgrade
123-
// uses next version from lccc
123+
// uses next version from lscc
124124
// re-initializtion of the same chaincode "mycc"
125125
// upgrade when "mycc" is up and running (test version based namespace)
126126
func TestUpgradeCC(t *testing.T) {

core/committer/txvalidator/validator.go

+6-6
Original file line numberDiff line numberDiff line change
@@ -226,21 +226,21 @@ func (v *vsccValidatorImpl) VSCCValidateTx(payload *common.Payload, envBytes []b
226226
return err
227227
}
228228

229-
// LCCC should not undergo standard VSCC type of
229+
// LSCC should not undergo standard VSCC type of
230230
// validation. It should instead go through system
231231
// policy validation to determine whether the issuer
232232
// is entitled to deploy a chaincode on our chain
233233
// VSCCValidateTx should
234-
if hdrExt.ChaincodeId.Name == "lccc" {
234+
if hdrExt.ChaincodeId.Name == "lscc" {
235235
// TODO: until FAB-1934 is in, we need to stop here
236-
logger.Debugf("Invocation of LCCC detected, no further VSCC validation necessary")
236+
logger.Debugf("Invocation of LSCC detected, no further VSCC validation necessary")
237237
return nil
238238
}
239239

240-
// obtain name of the VSCC and the policy from LCCC
241-
vscc, policy, err := v.ccprovider.GetCCValidationInfoFromLCCC(ctxt, txid, nil, nil, chainID, hdrExt.ChaincodeId.Name)
240+
// obtain name of the VSCC and the policy from LSCC
241+
vscc, policy, err := v.ccprovider.GetCCValidationInfoFromLSCC(ctxt, txid, nil, nil, chainID, hdrExt.ChaincodeId.Name)
242242
if err != nil {
243-
logger.Errorf("Unable to get chaincode data from LCCC for txid %s, due to %s", txid, err)
243+
logger.Errorf("Unable to get chaincode data from LSCC for txid %s, due to %s", txid, err)
244244
return err
245245
}
246246

0 commit comments

Comments
 (0)