github.com/keybase/client/go@v0.0.0-20241007131713-f10651d043c8/kbfs/tlfhandle/identify_util_test.go (about) 1 // Copyright 2016 Keybase Inc. All rights reserved. 2 // Use of this source code is governed by a BSD 3 // license that can be found in the LICENSE file. 4 5 package tlfhandle 6 7 import ( 8 "fmt" 9 "sync" 10 "testing" 11 12 "github.com/keybase/client/go/externals" 13 "github.com/keybase/client/go/kbfs/idutil" 14 idutiltest "github.com/keybase/client/go/kbfs/idutil/test" 15 "github.com/keybase/client/go/kbfs/tlf" 16 kbname "github.com/keybase/client/go/kbun" 17 "github.com/keybase/client/go/libkb" 18 "github.com/keybase/client/go/protocol/keybase1" 19 "github.com/stretchr/testify/require" 20 "golang.org/x/net/context" 21 ) 22 23 type testIdentifier struct { 24 assertions map[string]idutil.UserInfo 25 assertionsBrokenTracks map[string]idutil.UserInfo 26 implicitTeams map[string]idutil.ImplicitTeamInfo 27 identifiedIDsLock sync.Mutex 28 identifiedIDs map[keybase1.UserOrTeamID]bool 29 } 30 31 func (ti *testIdentifier) Identify( 32 ctx context.Context, assertion, reason string, 33 _ keybase1.OfflineAvailability) ( 34 kbname.NormalizedUsername, keybase1.UserOrTeamID, error) { 35 ei := GetExtendedIdentify(ctx) 36 userInfo, ok := ti.assertionsBrokenTracks[assertion] 37 if ok { 38 if !ei.Behavior.WarningInsteadOfErrorOnBrokenTracks() { 39 return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), 40 libkb.UnmetAssertionError{ 41 User: "imtotalllymakingthisup", 42 Remote: true, 43 } 44 } 45 ei.UserBreak( 46 ctx, userInfo.Name, userInfo.UID, &keybase1.IdentifyTrackBreaks{}) 47 return userInfo.Name, userInfo.UID.AsUserOrTeam(), nil 48 } 49 50 userInfo, ok = ti.assertions[assertion] 51 if !ok { 52 return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), 53 idutil.NoSuchUserError{Input: assertion} 54 } 55 56 func() { 57 ti.identifiedIDsLock.Lock() 58 defer ti.identifiedIDsLock.Unlock() 59 if ti.identifiedIDs == nil { 60 ti.identifiedIDs = make(map[keybase1.UserOrTeamID]bool) 61 } 62 ti.identifiedIDs[userInfo.UID.AsUserOrTeam()] = true 63 }() 64 65 ei.UserBreak(ctx, userInfo.Name, userInfo.UID, nil) 66 return userInfo.Name, userInfo.UID.AsUserOrTeam(), nil 67 } 68 69 func (ti *testIdentifier) NormalizeSocialAssertion( 70 ctx context.Context, assertion string) (keybase1.SocialAssertion, error) { 71 socialAssertion, isSocialAssertion := externals.NormalizeSocialAssertionStatic(ctx, assertion) 72 if !isSocialAssertion { 73 return keybase1.SocialAssertion{}, fmt.Errorf("Invalid social assertion") 74 } 75 return socialAssertion, nil 76 } 77 78 func (ti *testIdentifier) IdentifyImplicitTeam( 79 _ context.Context, assertions, suffix string, ty tlf.Type, _ string, 80 _ keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) { 81 // TODO: canonicalize name. 82 name := assertions 83 if suffix != "" { 84 name += " " + suffix 85 } 86 87 iteamInfo, ok := ti.implicitTeams[ty.String()+":"+name] 88 if !ok { 89 return idutil.ImplicitTeamInfo{}, idutil.NoSuchTeamError{Input: name} 90 } 91 92 func() { 93 ti.identifiedIDsLock.Lock() 94 defer ti.identifiedIDsLock.Unlock() 95 if ti.identifiedIDs == nil { 96 ti.identifiedIDs = make(map[keybase1.UserOrTeamID]bool) 97 } 98 ti.identifiedIDs[iteamInfo.TID.AsUserOrTeam()] = true 99 }() 100 101 return iteamInfo, nil 102 } 103 104 func makeNugAndTIForTest() ( 105 idutiltest.NormalizedUsernameGetter, *testIdentifier) { 106 return idutiltest.NormalizedUsernameGetter{ 107 keybase1.MakeTestUID(1).AsUserOrTeam(): "alice", 108 keybase1.MakeTestUID(2).AsUserOrTeam(): "bob", 109 keybase1.MakeTestUID(3).AsUserOrTeam(): "charlie", 110 }, &testIdentifier{ 111 assertions: map[string]idutil.UserInfo{ 112 "alice": { 113 Name: "alice", 114 UID: keybase1.MakeTestUID(1), 115 }, 116 "bob": { 117 Name: "bob", 118 UID: keybase1.MakeTestUID(2), 119 }, 120 "charlie": { 121 Name: "charlie", 122 UID: keybase1.MakeTestUID(3), 123 }, 124 }, 125 } 126 } 127 128 func TestIdentify(t *testing.T) { 129 nug, ti := makeNugAndTIForTest() 130 131 ids := make(map[keybase1.UserOrTeamID]bool, len(nug)) 132 for u := range nug { 133 ids[u] = true 134 } 135 136 err := identifyUsersForTLF( 137 context.Background(), nug, ti, nug.UIDMap(), tlf.Private, 138 keybase1.OfflineAvailability_NONE) 139 require.NoError(t, err) 140 require.Equal(t, ids, ti.identifiedIDs) 141 } 142 143 func TestIdentifyAlternativeBehaviors(t *testing.T) { 144 nug, ti := makeNugAndTIForTest() 145 nug[keybase1.MakeTestUID(1001).AsUserOrTeam()] = "zebra" 146 ti.assertionsBrokenTracks = map[string]idutil.UserInfo{ 147 "zebra": { 148 Name: "zebra", 149 UID: keybase1.MakeTestUID(1001), 150 }, 151 } 152 153 ctx, err := MakeExtendedIdentify(context.Background(), 154 keybase1.TLFIdentifyBehavior_CHAT_CLI) 155 require.NoError(t, err) 156 err = identifyUsersForTLF( 157 ctx, nug, ti, nug.UIDMap(), tlf.Private, 158 keybase1.OfflineAvailability_NONE) 159 require.Error(t, err) 160 161 ctx, err = MakeExtendedIdentify(context.Background(), 162 keybase1.TLFIdentifyBehavior_CHAT_GUI) 163 require.NoError(t, err) 164 err = identifyUsersForTLF( 165 ctx, nug, ti, nug.UIDMap(), tlf.Private, 166 keybase1.OfflineAvailability_NONE) 167 require.NoError(t, err) 168 tb := GetExtendedIdentify(ctx).GetTlfBreakAndClose() 169 require.Len(t, tb.Breaks, 1) 170 require.Equal(t, "zebra", tb.Breaks[0].User.Username) 171 require.NotNil(t, tb.Breaks[0].Breaks) 172 } 173 174 func TestIdentifyImplicitTeams(t *testing.T) { 175 nug, ti := makeNugAndTIForTest() 176 177 // Add implicit teams. 178 pubID := keybase1.MakeTestTeamID(1, true) 179 privID := keybase1.MakeTestTeamID(1, false) 180 suffixID := keybase1.MakeTestTeamID(2, false) 181 ti.implicitTeams = map[string]idutil.ImplicitTeamInfo{ 182 "public:alice,bob": { 183 Name: "alice,bob", 184 TID: pubID, 185 }, 186 "private:alice,bob": { 187 Name: "alice,bob", 188 TID: privID, 189 }, 190 "private:alice,bob (conflicted copy 2016-03-14 #3)": { 191 Name: "alice,bob (conflicted copy 2016-03-14 #3)", 192 TID: suffixID, 193 }, 194 } 195 196 ids := make(map[keybase1.UserOrTeamID]bool, len(ti.implicitTeams)) 197 for _, iteamInfo := range ti.implicitTeams { 198 ids[iteamInfo.TID.AsUserOrTeam()] = true 199 } 200 201 err := identifyUsersForTLF( 202 context.Background(), nug, ti, 203 map[keybase1.UserOrTeamID]kbname.NormalizedUsername{ 204 privID.AsUserOrTeam(): "alice,bob", 205 }, tlf.Private, keybase1.OfflineAvailability_NONE) 206 require.NoError(t, err) 207 err = identifyUsersForTLF( 208 context.Background(), nug, ti, 209 map[keybase1.UserOrTeamID]kbname.NormalizedUsername{ 210 pubID.AsUserOrTeam(): "alice,bob", 211 }, tlf.Public, keybase1.OfflineAvailability_NONE) 212 require.NoError(t, err) 213 err = identifyUsersForTLF( 214 context.Background(), nug, ti, 215 map[keybase1.UserOrTeamID]kbname.NormalizedUsername{ 216 suffixID.AsUserOrTeam(): "alice,bob (conflicted copy 2016-03-14 #3)", 217 }, tlf.Private, keybase1.OfflineAvailability_NONE) 218 require.NoError(t, err) 219 require.Equal(t, ids, ti.identifiedIDs) 220 }