whisper: project restructured, version 5 introduced (#3022)
whisper: project restructured, version 5 introduced This commits adds a draft version of the new shh v5 protocol. The new version is not on by default, --shh still selects version 2.
This commit is contained in:
504
whisper/shhapi/api.go
Normal file
504
whisper/shhapi/api.go
Normal file
@@ -0,0 +1,504 @@
|
||||
// Copyright 2016 The go-ethereum Authors
|
||||
// This file is part of the go-ethereum library.
|
||||
//
|
||||
// The go-ethereum library is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU Lesser General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
//
|
||||
// The go-ethereum library is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU Lesser General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU Lesser General Public License
|
||||
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
package shhapi
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"errors"
|
||||
"fmt"
|
||||
mathrand "math/rand"
|
||||
|
||||
"github.com/ethereum/go-ethereum/common"
|
||||
"github.com/ethereum/go-ethereum/crypto"
|
||||
"github.com/ethereum/go-ethereum/logger"
|
||||
"github.com/ethereum/go-ethereum/logger/glog"
|
||||
"github.com/ethereum/go-ethereum/rpc"
|
||||
"github.com/ethereum/go-ethereum/whisper/whisperv5"
|
||||
)
|
||||
|
||||
var whisperOffLineErr = errors.New("whisper is offline")
|
||||
|
||||
// PublicWhisperAPI provides the whisper RPC service.
|
||||
type PublicWhisperAPI struct {
|
||||
whisper *whisperv5.Whisper
|
||||
}
|
||||
|
||||
// NewPublicWhisperAPI create a new RPC whisper service.
|
||||
func NewPublicWhisperAPI() *PublicWhisperAPI {
|
||||
w := whisperv5.NewWhisper(nil)
|
||||
return &PublicWhisperAPI{whisper: w}
|
||||
}
|
||||
|
||||
// APIs returns the RPC descriptors the Whisper implementation offers
|
||||
func APIs() []rpc.API {
|
||||
return []rpc.API{
|
||||
{
|
||||
Namespace: whisperv5.ProtocolName,
|
||||
Version: whisperv5.ProtocolVersionStr,
|
||||
Service: NewPublicWhisperAPI(),
|
||||
Public: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// Version returns the Whisper version this node offers.
|
||||
func (api *PublicWhisperAPI) Version() (*rpc.HexNumber, error) {
|
||||
if api.whisper == nil {
|
||||
return rpc.NewHexNumber(0), whisperOffLineErr
|
||||
}
|
||||
return rpc.NewHexNumber(api.whisper.Version()), nil
|
||||
}
|
||||
|
||||
// MarkPeerTrusted marks specific peer trusted, which will allow it
|
||||
// to send historic (expired) messages.
|
||||
func (api *PublicWhisperAPI) MarkPeerTrusted(peerID rpc.HexBytes) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
return api.whisper.MarkPeerTrusted(peerID)
|
||||
}
|
||||
|
||||
// RequestHistoricMessages requests the peer to deliver the old (expired) messages.
|
||||
// data contains parameters (time frame, payment details, etc.), required
|
||||
// by the remote email-like server. Whisper is not aware about the data format,
|
||||
// it will just forward the raw data to the server.
|
||||
func (api *PublicWhisperAPI) RequestHistoricMessages(peerID rpc.HexBytes, data rpc.HexBytes) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
return api.whisper.RequestHistoricMessages(peerID, data)
|
||||
}
|
||||
|
||||
// HasIdentity checks if the whisper node is configured with the private key
|
||||
// of the specified public pair.
|
||||
func (api *PublicWhisperAPI) HasIdentity(identity string) (bool, error) {
|
||||
if api.whisper == nil {
|
||||
return false, whisperOffLineErr
|
||||
}
|
||||
return api.whisper.HasIdentity(identity), nil
|
||||
}
|
||||
|
||||
// DeleteIdentity deletes the specifies key if it exists.
|
||||
func (api *PublicWhisperAPI) DeleteIdentity(identity string) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
api.whisper.DeleteIdentity(identity)
|
||||
return nil
|
||||
}
|
||||
|
||||
// NewIdentity generates a new cryptographic identity for the client, and injects
|
||||
// it into the known identities for message decryption.
|
||||
func (api *PublicWhisperAPI) NewIdentity() (string, error) {
|
||||
if api.whisper == nil {
|
||||
return "", whisperOffLineErr
|
||||
}
|
||||
identity := api.whisper.NewIdentity()
|
||||
return common.ToHex(crypto.FromECDSAPub(&identity.PublicKey)), nil
|
||||
}
|
||||
|
||||
// GenerateSymKey generates a random symmetric key and stores it under
|
||||
// the 'name' id. Will be used in the future for session key exchange.
|
||||
func (api *PublicWhisperAPI) GenerateSymKey(name string) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
return api.whisper.GenerateSymKey(name)
|
||||
}
|
||||
|
||||
// AddSymKey stores the key under the 'name' id.
|
||||
func (api *PublicWhisperAPI) AddSymKey(name string, key []byte) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
return api.whisper.AddSymKey(name, key)
|
||||
}
|
||||
|
||||
// HasSymKey returns true if there is a key associated with the name string.
|
||||
// Otherwise returns false.
|
||||
func (api *PublicWhisperAPI) HasSymKey(name string) (bool, error) {
|
||||
if api.whisper == nil {
|
||||
return false, whisperOffLineErr
|
||||
}
|
||||
res := api.whisper.HasSymKey(name)
|
||||
return res, nil
|
||||
}
|
||||
|
||||
// DeleteSymKey deletes the key associated with the name string if it exists.
|
||||
func (api *PublicWhisperAPI) DeleteSymKey(name string) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
api.whisper.DeleteSymKey(name)
|
||||
return nil
|
||||
}
|
||||
|
||||
// NewWhisperFilter creates and registers a new message filter to watch for inbound whisper messages.
|
||||
// Returns the ID of the newly created Filter.
|
||||
func (api *PublicWhisperAPI) NewFilter(args WhisperFilterArgs) (*rpc.HexNumber, error) {
|
||||
if api.whisper == nil {
|
||||
return nil, whisperOffLineErr
|
||||
}
|
||||
|
||||
filter := whisperv5.Filter{
|
||||
Src: crypto.ToECDSAPub(args.From),
|
||||
KeySym: api.whisper.GetSymKey(args.KeyName),
|
||||
PoW: args.PoW,
|
||||
Messages: make(map[common.Hash]*whisperv5.ReceivedMessage),
|
||||
AcceptP2P: args.AcceptP2P,
|
||||
}
|
||||
|
||||
if len(filter.KeySym) > 0 {
|
||||
filter.SymKeyHash = crypto.Keccak256Hash(filter.KeySym)
|
||||
}
|
||||
|
||||
for _, t := range args.Topics {
|
||||
filter.Topics = append(filter.Topics, t)
|
||||
}
|
||||
|
||||
if len(args.Topics) == 0 {
|
||||
info := "NewFilter: at least one topic must be specified"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.KeyName) != 0 && len(filter.KeySym) == 0 {
|
||||
info := "NewFilter: key was not found by name: " + args.KeyName
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.To) == 0 && len(filter.KeySym) == 0 {
|
||||
info := "NewFilter: filter must contain either symmetric or asymmetric key"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.To) != 0 && len(filter.KeySym) != 0 {
|
||||
info := "NewFilter: filter must not contain both symmetric and asymmetric key"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.To) > 0 {
|
||||
dst := crypto.ToECDSAPub(args.To)
|
||||
if !whisperv5.ValidatePublicKey(dst) {
|
||||
info := "NewFilter: Invalid 'To' address"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
filter.KeyAsym = api.whisper.GetIdentity(string(args.To))
|
||||
if filter.KeyAsym == nil {
|
||||
info := "NewFilter: non-existent identity provided"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
}
|
||||
|
||||
if len(args.From) > 0 {
|
||||
if !whisperv5.ValidatePublicKey(filter.Src) {
|
||||
info := "NewFilter: Invalid 'From' address"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return nil, errors.New(info)
|
||||
}
|
||||
}
|
||||
|
||||
id := api.whisper.Watch(&filter)
|
||||
return rpc.NewHexNumber(id), nil
|
||||
}
|
||||
|
||||
// UninstallFilter disables and removes an existing filter.
|
||||
func (api *PublicWhisperAPI) UninstallFilter(filterId rpc.HexNumber) {
|
||||
api.whisper.Unwatch(filterId.Int())
|
||||
}
|
||||
|
||||
// GetFilterChanges retrieves all the new messages matched by a filter since the last retrieval.
|
||||
func (api *PublicWhisperAPI) GetFilterChanges(filterId rpc.HexNumber) []WhisperMessage {
|
||||
f := api.whisper.GetFilter(filterId.Int())
|
||||
if f != nil {
|
||||
newMail := f.Retrieve()
|
||||
return toWhisperMessages(newMail)
|
||||
}
|
||||
return toWhisperMessages(nil)
|
||||
}
|
||||
|
||||
// GetMessages retrieves all the known messages that match a specific filter.
|
||||
func (api *PublicWhisperAPI) GetMessages(filterId rpc.HexNumber) []WhisperMessage {
|
||||
all := api.whisper.Messages(filterId.Int())
|
||||
return toWhisperMessages(all)
|
||||
}
|
||||
|
||||
// toWhisperMessages converts a Whisper message to a RPC whisper message.
|
||||
func toWhisperMessages(messages []*whisperv5.ReceivedMessage) []WhisperMessage {
|
||||
msgs := make([]WhisperMessage, len(messages))
|
||||
for i, msg := range messages {
|
||||
msgs[i] = NewWhisperMessage(msg)
|
||||
}
|
||||
return msgs
|
||||
}
|
||||
|
||||
// Post creates a whisper message and injects it into the network for distribution.
|
||||
func (api *PublicWhisperAPI) Post(args PostArgs) error {
|
||||
if api.whisper == nil {
|
||||
return whisperOffLineErr
|
||||
}
|
||||
|
||||
params := whisperv5.MessageParams{
|
||||
TTL: args.TTL,
|
||||
Dst: crypto.ToECDSAPub(args.To),
|
||||
KeySym: api.whisper.GetSymKey(args.KeyName),
|
||||
Topic: args.Topic,
|
||||
Payload: args.Payload,
|
||||
Padding: args.Padding,
|
||||
WorkTime: args.WorkTime,
|
||||
PoW: args.PoW,
|
||||
}
|
||||
|
||||
if len(args.From) > 0 {
|
||||
pub := crypto.ToECDSAPub(args.From)
|
||||
if !whisperv5.ValidatePublicKey(pub) {
|
||||
info := "Post: Invalid 'From' address"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
params.Src = api.whisper.GetIdentity(string(args.From))
|
||||
if params.Src == nil {
|
||||
info := "Post: non-existent identity provided"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
}
|
||||
|
||||
filter := api.whisper.GetFilter(args.FilterID)
|
||||
if filter == nil && args.FilterID > -1 {
|
||||
info := fmt.Sprintf("Post: wrong filter id %d", args.FilterID)
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
|
||||
if filter != nil {
|
||||
// get the missing fields from the filter
|
||||
if params.KeySym == nil && filter.KeySym != nil {
|
||||
params.KeySym = filter.KeySym
|
||||
}
|
||||
if params.Src == nil && filter.Src != nil {
|
||||
params.Src = filter.KeyAsym
|
||||
}
|
||||
if (params.Topic == whisperv5.TopicType{}) {
|
||||
sz := len(filter.Topics)
|
||||
if sz < 1 {
|
||||
info := fmt.Sprintf("Post: no topics in filter # %d", args.FilterID)
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
} else if sz == 1 {
|
||||
params.Topic = filter.Topics[0]
|
||||
} else {
|
||||
// choose randomly
|
||||
rnd := mathrand.Intn(sz)
|
||||
params.Topic = filter.Topics[rnd]
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// validate
|
||||
if len(args.KeyName) != 0 && len(params.KeySym) == 0 {
|
||||
info := "Post: key was not found by name: " + args.KeyName
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.To) == 0 && len(args.KeyName) == 0 {
|
||||
info := "Post: message must be encrypted either symmetrically or asymmetrically"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.To) != 0 && len(args.KeyName) != 0 {
|
||||
info := "Post: ambigous encryption method requested"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
|
||||
if len(args.To) > 0 {
|
||||
if !whisperv5.ValidatePublicKey(params.Dst) {
|
||||
info := "Post: Invalid 'To' address"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
}
|
||||
|
||||
// encrypt and send
|
||||
message := whisperv5.NewSentMessage(¶ms)
|
||||
envelope, err := message.Wrap(¶ms)
|
||||
if err != nil {
|
||||
glog.V(logger.Error).Infof(err.Error())
|
||||
return err
|
||||
}
|
||||
if len(envelope.Data) > whisperv5.MaxMessageLength {
|
||||
info := "Post: message is too big"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
if (envelope.Topic == whisperv5.TopicType{} && envelope.IsSymmetric()) {
|
||||
info := "Post: topic is missing for symmetric encryption"
|
||||
glog.V(logger.Error).Infof(info)
|
||||
return errors.New(info)
|
||||
}
|
||||
|
||||
if args.PeerID != nil {
|
||||
return api.whisper.SendP2PMessage(args.PeerID, envelope)
|
||||
}
|
||||
|
||||
return api.whisper.Send(envelope)
|
||||
}
|
||||
|
||||
type PostArgs struct {
|
||||
TTL uint32 `json:"ttl"`
|
||||
From rpc.HexBytes `json:"from"`
|
||||
To rpc.HexBytes `json:"to"`
|
||||
KeyName string `json:"keyname"`
|
||||
Topic whisperv5.TopicType `json:"topic"`
|
||||
Padding rpc.HexBytes `json:"padding"`
|
||||
Payload rpc.HexBytes `json:"payload"`
|
||||
WorkTime uint32 `json:"worktime"`
|
||||
PoW float64 `json:"pow"`
|
||||
FilterID int `json:"filter"`
|
||||
PeerID rpc.HexBytes `json:"directP2P"`
|
||||
}
|
||||
|
||||
func (args *PostArgs) UnmarshalJSON(data []byte) (err error) {
|
||||
var obj struct {
|
||||
TTL uint32 `json:"ttl"`
|
||||
From rpc.HexBytes `json:"from"`
|
||||
To rpc.HexBytes `json:"to"`
|
||||
KeyName string `json:"keyname"`
|
||||
Topic whisperv5.TopicType `json:"topic"`
|
||||
Payload rpc.HexBytes `json:"payload"`
|
||||
Padding rpc.HexBytes `json:"padding"`
|
||||
WorkTime uint32 `json:"worktime"`
|
||||
PoW float64 `json:"pow"`
|
||||
FilterID rpc.HexBytes `json:"filter"`
|
||||
PeerID rpc.HexBytes `json:"directP2P"`
|
||||
}
|
||||
|
||||
if err := json.Unmarshal(data, &obj); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
args.TTL = obj.TTL
|
||||
args.From = obj.From
|
||||
args.To = obj.To
|
||||
args.KeyName = obj.KeyName
|
||||
args.Topic = obj.Topic
|
||||
args.Payload = obj.Payload
|
||||
args.Padding = obj.Padding
|
||||
args.WorkTime = obj.WorkTime
|
||||
args.PoW = obj.PoW
|
||||
args.FilterID = -1
|
||||
args.PeerID = obj.PeerID
|
||||
|
||||
if obj.FilterID != nil {
|
||||
x := whisperv5.BytesToIntBigEndian(obj.FilterID)
|
||||
args.FilterID = int(x)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
type WhisperFilterArgs struct {
|
||||
To []byte
|
||||
From []byte
|
||||
KeyName string
|
||||
PoW float64
|
||||
Topics []whisperv5.TopicType
|
||||
AcceptP2P bool
|
||||
}
|
||||
|
||||
// UnmarshalJSON implements the json.Unmarshaler interface, invoked to convert a
|
||||
// JSON message blob into a WhisperFilterArgs structure.
|
||||
func (args *WhisperFilterArgs) UnmarshalJSON(b []byte) (err error) {
|
||||
// Unmarshal the JSON message and sanity check
|
||||
var obj struct {
|
||||
To rpc.HexBytes `json:"to"`
|
||||
From rpc.HexBytes `json:"from"`
|
||||
KeyName string `json:"keyname"`
|
||||
PoW float64 `json:"pow"`
|
||||
Topics []interface{} `json:"topics"`
|
||||
AcceptP2P bool `json:"acceptP2P"`
|
||||
}
|
||||
if err := json.Unmarshal(b, &obj); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
args.To = obj.To
|
||||
args.From = obj.From
|
||||
args.KeyName = obj.KeyName
|
||||
args.PoW = obj.PoW
|
||||
args.AcceptP2P = obj.AcceptP2P
|
||||
|
||||
// Construct the topic array
|
||||
if obj.Topics != nil {
|
||||
topics := make([]string, len(obj.Topics))
|
||||
for i, field := range obj.Topics {
|
||||
switch value := field.(type) {
|
||||
case string:
|
||||
topics[i] = value
|
||||
case nil:
|
||||
return fmt.Errorf("topic[%d] is empty", i)
|
||||
default:
|
||||
return fmt.Errorf("topic[%d] is not a string", i)
|
||||
}
|
||||
}
|
||||
topicsDecoded := make([]whisperv5.TopicType, len(topics))
|
||||
for j, s := range topics {
|
||||
x := common.FromHex(s)
|
||||
if x == nil || len(x) != whisperv5.TopicLength {
|
||||
return fmt.Errorf("topic[%d] is invalid", j)
|
||||
}
|
||||
topicsDecoded[j] = whisperv5.BytesToTopic(x)
|
||||
}
|
||||
args.Topics = topicsDecoded
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
// WhisperMessage is the RPC representation of a whisper message.
|
||||
type WhisperMessage struct {
|
||||
Payload string `json:"payload"`
|
||||
Padding string `json:"padding"`
|
||||
From string `json:"from"`
|
||||
To string `json:"to"`
|
||||
Sent uint32 `json:"sent"`
|
||||
TTL uint32 `json:"ttl"`
|
||||
PoW float64 `json:"pow"`
|
||||
Hash string `json:"hash"`
|
||||
}
|
||||
|
||||
// NewWhisperMessage converts an internal message into an API version.
|
||||
func NewWhisperMessage(message *whisperv5.ReceivedMessage) WhisperMessage {
|
||||
return WhisperMessage{
|
||||
Payload: common.ToHex(message.Payload),
|
||||
Padding: common.ToHex(message.Padding),
|
||||
From: common.ToHex(crypto.FromECDSAPub(message.SigToPubKey())),
|
||||
To: common.ToHex(crypto.FromECDSAPub(message.Dst)),
|
||||
Sent: message.Sent,
|
||||
TTL: message.TTL,
|
||||
PoW: message.PoW,
|
||||
Hash: common.ToHex(message.EnvelopeHash.Bytes()),
|
||||
}
|
||||
}
|
170
whisper/shhapi/api_test.go
Normal file
170
whisper/shhapi/api_test.go
Normal file
@@ -0,0 +1,170 @@
|
||||
// Copyright 2016 The go-ethereum Authors
|
||||
// This file is part of the go-ethereum library.
|
||||
//
|
||||
// The go-ethereum library is free software: you can redistribute it and/or modify
|
||||
// it under the terms of the GNU Lesser General Public License as published by
|
||||
// the Free Software Foundation, either version 3 of the License, or
|
||||
// (at your option) any later version.
|
||||
//
|
||||
// The go-ethereum library is distributed in the hope that it will be useful,
|
||||
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
// GNU Lesser General Public License for more details.
|
||||
//
|
||||
// You should have received a copy of the GNU Lesser General Public License
|
||||
// along with the go-ethereum library. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
package shhapi
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/ethereum/go-ethereum/rpc"
|
||||
"github.com/ethereum/go-ethereum/whisper/whisperv5"
|
||||
)
|
||||
|
||||
func TestBasic(x *testing.T) {
|
||||
var id string = "test"
|
||||
api := NewPublicWhisperAPI()
|
||||
if api == nil {
|
||||
x.Errorf("failed to create API.")
|
||||
return
|
||||
}
|
||||
|
||||
ver, err := api.Version()
|
||||
if err != nil {
|
||||
x.Errorf("failed generateFilter: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
if ver.Uint64() != whisperv5.ProtocolVersion {
|
||||
x.Errorf("wrong version: %d.", ver.Uint64())
|
||||
return
|
||||
}
|
||||
|
||||
var hexnum rpc.HexNumber
|
||||
mail := api.GetFilterChanges(hexnum)
|
||||
if len(mail) != 0 {
|
||||
x.Errorf("failed GetFilterChanges")
|
||||
return
|
||||
}
|
||||
|
||||
exist, err := api.HasIdentity(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 1 HasIdentity: %s.", err)
|
||||
return
|
||||
}
|
||||
if exist {
|
||||
x.Errorf("failed 2 HasIdentity: false positive.")
|
||||
return
|
||||
}
|
||||
|
||||
err = api.DeleteIdentity(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 3 DeleteIdentity: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
pub, err := api.NewIdentity()
|
||||
if err != nil {
|
||||
x.Errorf("failed 4 NewIdentity: %s.", err)
|
||||
return
|
||||
}
|
||||
if len(pub) == 0 {
|
||||
x.Errorf("NewIdentity 5: empty")
|
||||
return
|
||||
}
|
||||
|
||||
exist, err = api.HasIdentity(pub)
|
||||
if err != nil {
|
||||
x.Errorf("failed 6 HasIdentity: %s.", err)
|
||||
return
|
||||
}
|
||||
if !exist {
|
||||
x.Errorf("failed 7 HasIdentity: false negative.")
|
||||
return
|
||||
}
|
||||
|
||||
err = api.DeleteIdentity(pub)
|
||||
if err != nil {
|
||||
x.Errorf("failed 8 DeleteIdentity: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
exist, err = api.HasIdentity(pub)
|
||||
if err != nil {
|
||||
x.Errorf("failed 9 HasIdentity: %s.", err)
|
||||
return
|
||||
}
|
||||
if exist {
|
||||
x.Errorf("failed 10 HasIdentity: false positive.")
|
||||
return
|
||||
}
|
||||
|
||||
id = "arbitrary text"
|
||||
id2 := "another arbitrary string"
|
||||
|
||||
exist, err = api.HasSymKey(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 11 HasSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
if exist {
|
||||
x.Errorf("failed 12 HasSymKey: false positive.")
|
||||
return
|
||||
}
|
||||
|
||||
err = api.GenerateSymKey(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 13 GenerateSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
exist, err = api.HasSymKey(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 14 HasSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
if !exist {
|
||||
x.Errorf("failed 15 HasSymKey: false negative.")
|
||||
return
|
||||
}
|
||||
|
||||
err = api.AddSymKey(id, []byte("some stuff here"))
|
||||
if err == nil {
|
||||
x.Errorf("failed 16 AddSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
err = api.AddSymKey(id2, []byte("some stuff here"))
|
||||
if err != nil {
|
||||
x.Errorf("failed 17 AddSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
exist, err = api.HasSymKey(id2)
|
||||
if err != nil {
|
||||
x.Errorf("failed 18 HasSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
if !exist {
|
||||
x.Errorf("failed 19 HasSymKey: false negative.")
|
||||
return
|
||||
}
|
||||
|
||||
err = api.DeleteSymKey(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 20 DeleteSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
|
||||
exist, err = api.HasSymKey(id)
|
||||
if err != nil {
|
||||
x.Errorf("failed 21 HasSymKey: %s.", err)
|
||||
return
|
||||
}
|
||||
if exist {
|
||||
x.Errorf("failed 22 HasSymKey: false positive.")
|
||||
return
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user