github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/kbfs/tlf/handle_test.go (about)

     1  package tlf
     2  
     3  import (
     4  	"testing"
     5  
     6  	"github.com/keybase/client/go/protocol/keybase1"
     7  	"github.com/stretchr/testify/assert"
     8  	"github.com/stretchr/testify/require"
     9  )
    10  
    11  func TestMakeHandle(t *testing.T) {
    12  	w := []keybase1.UserOrTeamID{
    13  		keybase1.MakeTestUID(4).AsUserOrTeam(),
    14  		keybase1.MakeTestUID(3).AsUserOrTeam(),
    15  	}
    16  
    17  	r := []keybase1.UserOrTeamID{
    18  		keybase1.MakeTestUID(5).AsUserOrTeam(),
    19  		keybase1.MakeTestUID(1).AsUserOrTeam(),
    20  	}
    21  
    22  	uw := []keybase1.SocialAssertion{
    23  		{
    24  			User:    "user2",
    25  			Service: "service3",
    26  		},
    27  		{
    28  			User:    "user1",
    29  			Service: "service1",
    30  		},
    31  	}
    32  
    33  	ur := []keybase1.SocialAssertion{
    34  		{
    35  			User:    "user5",
    36  			Service: "service3",
    37  		},
    38  		{
    39  			User:    "user1",
    40  			Service: "service2",
    41  		},
    42  	}
    43  
    44  	h, err := MakeHandle(w, r, uw, ur, nil)
    45  	require.NoError(t, err)
    46  	require.Equal(t, []keybase1.UserOrTeamID{
    47  		keybase1.MakeTestUID(3).AsUserOrTeam(),
    48  		keybase1.MakeTestUID(4).AsUserOrTeam(),
    49  	}, h.Writers)
    50  	require.Equal(t, []keybase1.UserOrTeamID{
    51  		keybase1.MakeTestUID(1).AsUserOrTeam(),
    52  		keybase1.MakeTestUID(5).AsUserOrTeam(),
    53  	}, h.Readers)
    54  	require.Equal(t, []keybase1.SocialAssertion{
    55  		{
    56  			User:    "user1",
    57  			Service: "service1",
    58  		},
    59  		{
    60  			User:    "user2",
    61  			Service: "service3",
    62  		},
    63  	}, h.UnresolvedWriters)
    64  	require.Equal(t, []keybase1.SocialAssertion{
    65  		{
    66  			User:    "user1",
    67  			Service: "service2",
    68  		},
    69  		{
    70  			User:    "user5",
    71  			Service: "service3",
    72  		},
    73  	}, h.UnresolvedReaders)
    74  }
    75  
    76  func TestMakeHandleFailures(t *testing.T) {
    77  	_, err := MakeHandle(nil, nil, nil, nil, nil)
    78  	assert.Equal(t, errNoWriters, err)
    79  
    80  	w := []keybase1.UserOrTeamID{
    81  		keybase1.MakeTestUID(4).AsUserOrTeam(),
    82  		keybase1.MakeTestUID(3).AsUserOrTeam(),
    83  	}
    84  
    85  	r := []keybase1.UserOrTeamID{
    86  		keybase1.UserOrTeamID(keybase1.PUBLIC_UID),
    87  		keybase1.MakeTestUID(2).AsUserOrTeam(),
    88  	}
    89  
    90  	_, err = MakeHandle(r, nil, nil, nil, nil)
    91  	assert.Equal(t, errInvalidWriter, err)
    92  
    93  	_, err = MakeHandle(w, r, nil, nil, nil)
    94  	assert.Equal(t, errInvalidReader, err)
    95  
    96  	ur := []keybase1.SocialAssertion{
    97  		{
    98  			User:    "user5",
    99  			Service: "service3",
   100  		},
   101  	}
   102  
   103  	_, err = MakeHandle(w, r[:1], nil, ur, nil)
   104  	assert.Equal(t, errInvalidReader, err)
   105  
   106  	// Any handle with a team must be a single-team handle.
   107  	w = []keybase1.UserOrTeamID{
   108  		keybase1.MakeTestTeamID(3, false).AsUserOrTeam(),
   109  		keybase1.MakeTestTeamID(4, false).AsUserOrTeam(),
   110  	}
   111  	r = []keybase1.UserOrTeamID{}
   112  	_, err = MakeHandle(w, r, nil, nil, nil)
   113  	assert.Equal(t, errInvalidWriter, err)
   114  
   115  	w = []keybase1.UserOrTeamID{
   116  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   117  		keybase1.MakeTestTeamID(3, false).AsUserOrTeam(),
   118  	}
   119  	r = []keybase1.UserOrTeamID{}
   120  	_, err = MakeHandle(w, r, nil, nil, nil)
   121  	assert.Equal(t, errInvalidWriter, err)
   122  
   123  	w = []keybase1.UserOrTeamID{
   124  		keybase1.MakeTestTeamID(3, false).AsUserOrTeam(),
   125  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   126  	}
   127  	r = []keybase1.UserOrTeamID{}
   128  	_, err = MakeHandle(w, r, nil, nil, nil)
   129  	assert.Equal(t, errInvalidWriter, err)
   130  
   131  	w = []keybase1.UserOrTeamID{
   132  		keybase1.MakeTestTeamID(3, false).AsUserOrTeam(),
   133  	}
   134  	r = []keybase1.UserOrTeamID{
   135  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   136  	}
   137  	_, err = MakeHandle(w, r, nil, nil, nil)
   138  	assert.Equal(t, errInvalidReader, err)
   139  
   140  	w = []keybase1.UserOrTeamID{
   141  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   142  		keybase1.MakeTestUID(5).AsUserOrTeam(),
   143  	}
   144  	r = []keybase1.UserOrTeamID{
   145  		keybase1.MakeTestTeamID(3, false).AsUserOrTeam(),
   146  	}
   147  	_, err = MakeHandle(w, r, nil, nil, nil)
   148  	assert.Equal(t, errInvalidReader, err)
   149  }
   150  
   151  func TestHandleAccessorsPrivate(t *testing.T) {
   152  	w := []keybase1.UserOrTeamID{
   153  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   154  		keybase1.MakeTestUID(3).AsUserOrTeam(),
   155  	}
   156  
   157  	r := []keybase1.UserOrTeamID{
   158  		keybase1.MakeTestUID(5).AsUserOrTeam(),
   159  		keybase1.MakeTestUID(1).AsUserOrTeam(),
   160  	}
   161  
   162  	uw := []keybase1.SocialAssertion{
   163  		{
   164  			User:    "user2",
   165  			Service: "service3",
   166  		},
   167  		{
   168  			User:    "user1",
   169  			Service: "service1",
   170  		},
   171  	}
   172  
   173  	ur := []keybase1.SocialAssertion{
   174  		{
   175  			User:    "user5",
   176  			Service: "service3",
   177  		},
   178  		{
   179  			User:    "user1",
   180  			Service: "service2",
   181  		},
   182  	}
   183  
   184  	h, err := MakeHandle(w, r, uw, ur, nil)
   185  	require.NoError(t, err)
   186  
   187  	require.Equal(t, Private, h.Type())
   188  
   189  	for _, u := range w {
   190  		require.True(t, h.IsWriter(u))
   191  		require.True(t, h.IsReader(u))
   192  	}
   193  
   194  	for _, u := range r {
   195  		require.False(t, h.IsWriter(u))
   196  		require.True(t, h.IsReader(u))
   197  	}
   198  
   199  	for i := 6; i < 10; i++ {
   200  		u := keybase1.MakeTestUID(uint32(i)).AsUserOrTeam()
   201  		require.False(t, h.IsWriter(u))
   202  		require.False(t, h.IsReader(u))
   203  	}
   204  
   205  	require.Equal(t, h.ResolvedUsers(),
   206  		[]keybase1.UserOrTeamID{
   207  			keybase1.MakeTestUID(3).AsUserOrTeam(),
   208  			keybase1.MakeTestUID(4).AsUserOrTeam(),
   209  			keybase1.MakeTestUID(1).AsUserOrTeam(),
   210  			keybase1.MakeTestUID(5).AsUserOrTeam(),
   211  		})
   212  	require.True(t, h.HasUnresolvedUsers())
   213  	require.Equal(t, h.UnresolvedUsers(),
   214  		[]keybase1.SocialAssertion{
   215  			{
   216  				User:    "user1",
   217  				Service: "service1",
   218  			},
   219  			{
   220  				User:    "user2",
   221  				Service: "service3",
   222  			},
   223  			{
   224  				User:    "user1",
   225  				Service: "service2",
   226  			},
   227  			{
   228  				User:    "user5",
   229  				Service: "service3",
   230  			},
   231  		})
   232  }
   233  
   234  func TestHandleAccessorsPublic(t *testing.T) {
   235  	w := []keybase1.UserOrTeamID{
   236  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   237  		keybase1.MakeTestUID(3).AsUserOrTeam(),
   238  	}
   239  
   240  	uw := []keybase1.SocialAssertion{
   241  		{
   242  			User:    "user2",
   243  			Service: "service3",
   244  		},
   245  		{
   246  			User:    "user1",
   247  			Service: "service1",
   248  		},
   249  	}
   250  
   251  	h, err := MakeHandle(
   252  		w, []keybase1.UserOrTeamID{keybase1.UserOrTeamID(keybase1.PUBLIC_UID)},
   253  		uw, nil, nil)
   254  	require.NoError(t, err)
   255  
   256  	require.Equal(t, Public, h.Type())
   257  
   258  	for _, u := range w {
   259  		require.True(t, h.IsWriter(u))
   260  		require.True(t, h.IsReader(u))
   261  	}
   262  
   263  	for i := 6; i < 10; i++ {
   264  		u := keybase1.MakeTestUID(uint32(i)).AsUserOrTeam()
   265  		require.False(t, h.IsWriter(u))
   266  		require.True(t, h.IsReader(u))
   267  	}
   268  
   269  	require.Equal(t, h.ResolvedUsers(),
   270  		[]keybase1.UserOrTeamID{
   271  			keybase1.MakeTestUID(3).AsUserOrTeam(),
   272  			keybase1.MakeTestUID(4).AsUserOrTeam(),
   273  		})
   274  	require.True(t, h.HasUnresolvedUsers())
   275  	require.Equal(t, h.UnresolvedUsers(),
   276  		[]keybase1.SocialAssertion{
   277  			{
   278  				User:    "user1",
   279  				Service: "service1",
   280  			},
   281  			{
   282  				User:    "user2",
   283  				Service: "service3",
   284  			},
   285  		})
   286  }
   287  
   288  func TestHandleAccessorsSingleTeam(t *testing.T) {
   289  	w := []keybase1.UserOrTeamID{
   290  		keybase1.MakeTestTeamID(4, false).AsUserOrTeam(),
   291  	}
   292  
   293  	h, err := MakeHandle(
   294  		w, nil, nil, nil, nil)
   295  	require.NoError(t, err)
   296  
   297  	require.Equal(t, SingleTeam, h.Type())
   298  
   299  	// All types of IsWriter/IsReader calls should panic for team TLFs.
   300  	for _, u := range w {
   301  		require.Panics(t, func() { h.IsWriter(u) })
   302  		require.Panics(t, func() { h.IsReader(u) })
   303  	}
   304  
   305  	u := keybase1.MakeTestUID(uint32(6)).AsUserOrTeam()
   306  	require.Panics(t, func() { h.IsWriter(u) })
   307  	require.Panics(t, func() { h.IsReader(u) })
   308  
   309  	require.False(t, h.HasUnresolvedUsers())
   310  }
   311  
   312  func TestHandleHasUnresolvedUsers(t *testing.T) {
   313  	w := []keybase1.UserOrTeamID{
   314  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   315  		keybase1.MakeTestUID(3).AsUserOrTeam(),
   316  	}
   317  
   318  	uw := []keybase1.SocialAssertion{
   319  		{
   320  			User:    "user2",
   321  			Service: "service3",
   322  		},
   323  		{
   324  			User:    "user1",
   325  			Service: "service1",
   326  		},
   327  	}
   328  
   329  	ur := []keybase1.SocialAssertion{
   330  		{
   331  			User:    "user5",
   332  			Service: "service3",
   333  		},
   334  		{
   335  			User:    "user1",
   336  			Service: "service2",
   337  		},
   338  	}
   339  
   340  	h, err := MakeHandle(w, nil, uw, ur, nil)
   341  	require.NoError(t, err)
   342  	require.True(t, h.HasUnresolvedUsers())
   343  
   344  	uw = h.UnresolvedWriters
   345  	h.UnresolvedWriters = nil
   346  	require.True(t, h.HasUnresolvedUsers())
   347  
   348  	h.UnresolvedReaders = nil
   349  	require.False(t, h.HasUnresolvedUsers())
   350  
   351  	h.UnresolvedWriters = uw
   352  	require.True(t, h.HasUnresolvedUsers())
   353  }
   354  
   355  func TestHandleResolveAssertions(t *testing.T) {
   356  	w := []keybase1.UserOrTeamID{
   357  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   358  		keybase1.MakeTestUID(3).AsUserOrTeam(),
   359  	}
   360  
   361  	r := []keybase1.UserOrTeamID{
   362  		keybase1.MakeTestUID(5).AsUserOrTeam(),
   363  		keybase1.MakeTestUID(1).AsUserOrTeam(),
   364  	}
   365  
   366  	uw := []keybase1.SocialAssertion{
   367  		{
   368  			User:    "user2",
   369  			Service: "service3",
   370  		},
   371  		{
   372  			User:    "user7",
   373  			Service: "service2",
   374  		},
   375  		{
   376  			User:    "user1",
   377  			Service: "service1",
   378  		},
   379  	}
   380  
   381  	ur := []keybase1.SocialAssertion{
   382  		{
   383  			User:    "user6",
   384  			Service: "service3",
   385  		},
   386  		{
   387  			User:    "user8",
   388  			Service: "service1",
   389  		},
   390  		{
   391  			User:    "user5",
   392  			Service: "service1",
   393  		},
   394  		{
   395  			User:    "user1",
   396  			Service: "service2",
   397  		},
   398  		{
   399  			User:    "user9",
   400  			Service: "service1",
   401  		},
   402  		{
   403  			User:    "user9",
   404  			Service: "service3",
   405  		},
   406  	}
   407  
   408  	h, err := MakeHandle(w, r, uw, ur, nil)
   409  	require.NoError(t, err)
   410  
   411  	assertions := make(map[keybase1.SocialAssertion]keybase1.UID)
   412  	assertions[uw[0]] = keybase1.MakeTestUID(2) // new writer
   413  	assertions[uw[2]] = keybase1.MakeTestUID(1) // reader promoted to writer
   414  	assertions[ur[0]] = keybase1.MakeTestUID(6) // new reader
   415  	assertions[ur[2]] = keybase1.MakeTestUID(5) // already a reader
   416  	assertions[ur[3]] = keybase1.MakeTestUID(1) // already a writer
   417  	assertions[ur[4]] = keybase1.MakeTestUID(9) // new reader
   418  	assertions[ur[5]] = keybase1.MakeTestUID(9) // already a reader
   419  
   420  	h = h.ResolveAssertions(assertions)
   421  
   422  	require.Equal(t, []keybase1.UserOrTeamID{
   423  		keybase1.MakeTestUID(1).AsUserOrTeam(),
   424  		keybase1.MakeTestUID(2).AsUserOrTeam(),
   425  		keybase1.MakeTestUID(3).AsUserOrTeam(),
   426  		keybase1.MakeTestUID(4).AsUserOrTeam(),
   427  	}, h.Writers)
   428  	require.Equal(t, []keybase1.UserOrTeamID{
   429  		keybase1.MakeTestUID(5).AsUserOrTeam(),
   430  		keybase1.MakeTestUID(6).AsUserOrTeam(),
   431  		keybase1.MakeTestUID(9).AsUserOrTeam(),
   432  	}, h.Readers)
   433  	require.Equal(t, []keybase1.SocialAssertion{
   434  		{
   435  			User:    "user7",
   436  			Service: "service2",
   437  		},
   438  	}, h.UnresolvedWriters)
   439  	require.Equal(t, []keybase1.SocialAssertion{
   440  		{
   441  			User:    "user8",
   442  			Service: "service1",
   443  		},
   444  	}, h.UnresolvedReaders)
   445  }