Better thread safety pattern and some tests

This commit is contained in:
Sarah Jamie Lewis 2018-06-03 12:02:42 -07:00
parent 381a0d743d
commit b8ce0da2dd
5 changed files with 89 additions and 32 deletions

View File

@ -76,15 +76,15 @@ func (t *Timeline) Less(i, j int) bool {
// Insert inserts a message into the timeline in a thread safe way. // Insert inserts a message into the timeline in a thread safe way.
func (t *Timeline) Insert(mi *Message) { func (t *Timeline) Insert(mi *Message) {
t.lock.Lock() t.lock.Lock()
defer t.lock.Unlock()
for _, m := range t.Messages { for _, m := range t.Messages {
// If the message already exists, then we don't add it
if compareSignatures(m.Signature, mi.Signature) { if compareSignatures(m.Signature, mi.Signature) {
t.lock.Unlock()
return return
} }
} }
t.Messages = append(t.Messages, *mi) t.Messages = append(t.Messages, *mi)
sort.Sort(t) sort.Sort(t)
t.lock.Unlock()
} }

View File

@ -59,7 +59,7 @@ func TestTranscriptConsistency(t *testing.T) {
t.Logf("group: %v, sarah %v", group, sarah) t.Logf("group: %v, sarah %v", group, sarah)
c1, _ := sarah.EncryptMessageToGroup("Hello World 1", group.GroupID) c1, _ := alice.EncryptMessageToGroup("Hello World 1", group.GroupID)
t.Logf("Length of Encrypted Message: %v", len(c1)) t.Logf("Length of Encrypted Message: %v", len(c1))
alice.AttemptDecryption(c1) alice.AttemptDecryption(c1)
@ -81,6 +81,7 @@ func TestTranscriptConsistency(t *testing.T) {
t.Logf("Length of Encrypted Message: %v", len(c5)) t.Logf("Length of Encrypted Message: %v", len(c5))
_, m1 := sarah.AttemptDecryption(c1) _, m1 := sarah.AttemptDecryption(c1)
sarah.AttemptDecryption(c1) // Try a duplicate
_, m2 := sarah.AttemptDecryption(c2) _, m2 := sarah.AttemptDecryption(c2)
_, m3 := sarah.AttemptDecryption(c3) _, m3 := sarah.AttemptDecryption(c3)
_, m4 := sarah.AttemptDecryption(c4) _, m4 := sarah.AttemptDecryption(c4)
@ -93,7 +94,7 @@ func TestTranscriptConsistency(t *testing.T) {
timeline.Insert(m3) timeline.Insert(m3)
timeline.Insert(m2) timeline.Insert(m2)
for i, m := range timeline.GetMessages() { for i, m := range group.GetTimeline() {
if m.Message != "Hello World "+strconv.Itoa(i+1) { if m.Message != "Hello World "+strconv.Itoa(i+1) {
t.Fatalf("Timeline Out of Order!: %v %v", i, m) t.Fatalf("Timeline Out of Order!: %v %v", i, m)
} }

View File

@ -93,45 +93,42 @@ func (p *Profile) RejectInvite(groupID string) {
} }
// AcceptInvite accepts a group invite // AcceptInvite accepts a group invite
func (p *Profile) AcceptInvite(groupID string) error { func (p *Profile) AcceptInvite(groupID string) (err error) {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
group, ok := p.Groups[groupID] group, ok := p.Groups[groupID]
if ok { if ok {
group.Accepted = true group.Accepted = true
} else {
err = errors.New("group does not exist")
} }
p.lock.Unlock() return
if !ok {
return errors.New("group does not exist")
}
return nil
} }
// BlockPeer blocks a contact // BlockPeer blocks a contact
func (p *Profile) BlockPeer(onion string) error { func (p *Profile) BlockPeer(onion string) (err error) {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
contact, ok := p.Contacts[onion] contact, ok := p.Contacts[onion]
if ok { if ok {
contact.Blocked = true contact.Blocked = true
} else {
err = errors.New("peer does not exist")
} }
p.lock.Unlock() return
if !ok {
return errors.New("peer does not exist")
}
return nil
} }
// TrustPeer sets a contact to trusted // TrustPeer sets a contact to trusted
func (p *Profile) TrustPeer(onion string) error { func (p *Profile) TrustPeer(onion string) (err error) {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
contact, ok := p.Contacts[onion] contact, ok := p.Contacts[onion]
if ok { if ok {
contact.Trusted = true contact.Trusted = true
} else {
err = errors.New("peer does not exist")
} }
p.lock.Unlock() return
if !ok {
return errors.New("peer does not exist")
}
return nil
} }
// IsBlocked returns true if the contact has been blocked, false otherwise // IsBlocked returns true if the contact has been blocked, false otherwise
@ -145,8 +142,8 @@ func (p *Profile) IsBlocked(onion string) bool {
func (p *Profile) GetContact(onion string) (*PublicProfile, bool) { func (p *Profile) GetContact(onion string) (*PublicProfile, bool) {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
contact, ok := p.Contacts[onion] contact, ok := p.Contacts[onion]
p.lock.Unlock()
return contact, ok return contact, ok
} }
@ -181,17 +178,17 @@ func (p *Profile) StartGroup(server string) (groupID string, invite []byte, err
group.SignGroup(signedGroupID) group.SignGroup(signedGroupID)
invite, err = group.Invite() invite, err = group.Invite()
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
p.Groups[group.GroupID] = group p.Groups[group.GroupID] = group
p.lock.Unlock()
return return
} }
// GetGroupByGroupID a pointer to a Group by the group Id, returns nil if no group found. // GetGroupByGroupID a pointer to a Group by the group Id, returns nil if no group found.
func (p *Profile) GetGroupByGroupID(groupID string) (g *Group) { func (p *Profile) GetGroupByGroupID(groupID string) (g *Group) {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
g = p.Groups[groupID] g = p.Groups[groupID]
p.lock.Unlock() return
return g
} }
// ProcessInvite adds a new group invite to the profile. // ProcessInvite adds a new group invite to the profile.
@ -208,23 +205,21 @@ func (p *Profile) ProcessInvite(gci *protocol.GroupChatInvite, peerHostname stri
// AddGroup is a convenience method for adding a group to a profile. // AddGroup is a convenience method for adding a group to a profile.
func (p *Profile) AddGroup(group *Group) { func (p *Profile) AddGroup(group *Group) {
p.lock.Lock()
existingGroup, exists := p.Groups[group.GroupID] existingGroup, exists := p.Groups[group.GroupID]
p.lock.Unlock()
if !exists { if !exists {
owner, ok := p.GetContact(group.Owner) owner, ok := p.GetContact(group.Owner)
if ok { if ok {
valid := ed25519.Verify(owner.Ed25519PublicKey, []byte(group.GroupID+group.GroupServer), group.SignedGroupID) valid := ed25519.Verify(owner.Ed25519PublicKey, []byte(group.GroupID+group.GroupServer), group.SignedGroupID)
if valid { if valid {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
p.Groups[group.GroupID] = group p.Groups[group.GroupID] = group
p.lock.Unlock()
} }
} }
} else if exists && existingGroup.Owner == group.Owner { } else if exists && existingGroup.Owner == group.Owner {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
p.Groups[group.GroupID] = group p.Groups[group.GroupID] = group
p.lock.Unlock()
} }
// If we are sent an invite or group update by someone who is not an owner // If we are sent an invite or group update by someone who is not an owner
@ -300,8 +295,8 @@ func (p *Profile) EncryptMessageToGroup(message string, groupID string) ([]byte,
// Save makes a opy of the profile in the given file // Save makes a opy of the profile in the given file
func (p *Profile) Save(profilefile string) error { func (p *Profile) Save(profilefile string) error {
p.lock.Lock() p.lock.Lock()
defer p.lock.Unlock()
bytes, _ := json.Marshal(p) bytes, _ := json.Marshal(p)
p.lock.Unlock()
return ioutil.WriteFile(profilefile, bytes, 0600) return ioutil.WriteFile(profilefile, bytes, 0600)
} }

View File

@ -37,6 +37,65 @@ func TestProfileIdentity(t *testing.T) {
t.Logf("%v", alice) t.Logf("%v", alice)
} }
func TestTrustPeer(t *testing.T) {
sarah := GenerateNewProfile("Sarah")
alice := GenerateNewProfile("Alice")
sarah.AddContact(alice.Onion, &alice.PublicProfile)
alice.AddContact(sarah.Onion, &sarah.PublicProfile)
alice.TrustPeer(sarah.Onion)
if alice.IsBlocked(sarah.Onion) {
t.Errorf("peer should not be blocked")
}
if alice.TrustPeer("") == nil {
t.Errorf("trusting a non existent peer should error")
}
}
func TestBlockPeer(t *testing.T) {
sarah := GenerateNewProfile("Sarah")
alice := GenerateNewProfile("Alice")
sarah.AddContact(alice.Onion, &alice.PublicProfile)
alice.AddContact(sarah.Onion, &sarah.PublicProfile)
alice.BlockPeer(sarah.Onion)
if !alice.IsBlocked(sarah.Onion) {
t.Errorf("peer should not be blocked")
}
if alice.BlockPeer("") == nil {
t.Errorf("blocking a non existent peer should error")
}
}
func TestAcceptNonExistentGroup(t *testing.T) {
sarah := GenerateNewProfile("Sarah")
sarah.AcceptInvite("doesnotexist")
}
func TestRejectGroupInvite(t *testing.T) {
sarah := GenerateNewProfile("Sarah")
alice := GenerateNewProfile("Alice")
sarah.AddContact(alice.Onion, &alice.PublicProfile)
alice.AddContact(sarah.Onion, &sarah.PublicProfile)
gid, invite, _ := alice.StartGroup("aaa.onion")
gci := &protocol.CwtchPeerPacket{}
proto.Unmarshal(invite, gci)
sarah.ProcessInvite(gci.GetGroupChatInvite(), alice.Onion)
group := alice.GetGroupByGroupID(gid)
if len(sarah.Groups) == 1 {
if sarah.GetGroupByGroupID(group.GroupID).Accepted {
t.Errorf("Group should not be accepted")
}
sarah.RejectInvite(group.GroupID)
if len(sarah.Groups) != 0 {
t.Errorf("Group %v should have been deleted", group.GroupID)
}
return
}
t.Errorf("Group should exist in map")
}
func TestProfileGroup(t *testing.T) { func TestProfileGroup(t *testing.T) {
sarah := GenerateNewProfile("Sarah") sarah := GenerateNewProfile("Sarah")
alice := GenerateNewProfile("Alice") alice := GenerateNewProfile("Alice")
@ -47,8 +106,8 @@ func TestProfileGroup(t *testing.T) {
gci := &protocol.CwtchPeerPacket{} gci := &protocol.CwtchPeerPacket{}
proto.Unmarshal(invite, gci) proto.Unmarshal(invite, gci)
sarah.ProcessInvite(gci.GetGroupChatInvite(), alice.Onion) sarah.ProcessInvite(gci.GetGroupChatInvite(), alice.Onion)
group := alice.GetGroupByGroupID(gid) group := alice.GetGroupByGroupID(gid)
sarah.AcceptInvite(group.GroupID)
c, _ := sarah.EncryptMessageToGroup("Hello World", group.GroupID) c, _ := sarah.EncryptMessageToGroup("Hello World", group.GroupID)
alice.AttemptDecryption(c) alice.AttemptDecryption(c)

View File

@ -25,8 +25,10 @@ type MessageStore struct {
// Close closes the message store and underlying resources. // Close closes the message store and underlying resources.
func (ms *MessageStore) Close() { func (ms *MessageStore) Close() {
ms.lock.Lock()
ms.messages = nil ms.messages = nil
ms.file.Close() ms.file.Close()
ms.lock.Unlock()
} }
// Init sets up a MessageStore backed by filename // Init sets up a MessageStore backed by filename