Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
github.com/fanliao/go-concurrentMap
go-concurrentMap is a concurrent Map implement, it is ported from java.util.ConcurrentHashMap.
m := concurrent.NewConcurrentMap()
previou, err := m.Put(1, 10) //return nil, nil
previou, err = m.PutIfAbsent(1, 20) //return 10, nil
val, err := m.Get(1) //return 10, nil
s := m.Size() //return 1
m.PutAll(map[interface{}]interface{}{
1: 100,
2: 200,
})
ok, err := m.RemoveEntry(1, 100) //return true, nil
previou, err = m.Replace(2, 20) //return 200, nil
ok, err = m.CompareAndReplace(2, 200, 20) //return false, nil
previou, err = m.Remove(2) //return 20, nil
m.Clear()
s = m.Size() //return 0
/*---- group string by first char using ConcurrentMap ----*/
//sliceAdd function returns a function that appends v into slice
sliceAdd := func(v interface{}) (func(interface{}) interface{}){
return func(oldVal interface{})(newVal interface{}){
if oldVal == nil {
vs := make([]string, 0, 1)
return append(vs, v.(string))
} else {
return append(oldVal.([]string), v.(string))
}
}
}
m := concurrent.NewConcurrentMap()
//group by first char of str
group := func(str string) {
m.Update(string(str[0]), sliceAdd(str))
}
go group("stone")
go group("jack")
go group("jackson")
/*m will include the below key-value pairs, but please note sequence may be different:
{
s:[stone],
j:[jack jackson],
}
*/
//user implements concurrent.Hasher interface
type user struct {
id string
Name string
}
func (u *user) HashBytes() []byte {
return []byte(u.id)
}
func (u *user) Equals(v2 interface{}) (equal bool) {
u2, ok := v2.(*user)
return ok && u.id == u2.id
}
m := concurrent.NewConcurrentMap()
previou, err := m.Put(&user, 10) //return nil, nil
val, err := m.Get(&user) //return 10, nil
//iterate ConcurrentMap
for itr := m.Iterator();itr.HasNext(); {
k, v, _ := itr.Next()
}
//only user Next method to iterate ConcurrentMap
for itr := m.Iterator();; {
k, v, ok := itr.Next()
if !ok {
break
}
}
//ToSlice
for _, entry := range m.ToSlice(){
k, v := entry.Key(), entry.Value()
}
//new concurrentMap with specified initial capacity
m = concurrent.NewConcurrentMap(32)
//new concurrentMap with specified initial capacity and load factor
m = concurrent.NewConcurrentMap(32, 0.75)
//new concurrentMap with specified initial capacity, load factor and concurrent level
m = concurrent.NewConcurrentMap(32, 0.75, 16)
//new concurrentMap with the same mappings as the given map
m = concurrent.NewConcurrentMapFromMap(map[interface{}]interface{}{
"x": "x1val",
"xx": "x2val",
})
Do not support the below types as key:
Do not support pointer because the memory address of pointer may be changed after GC, so cannot get a invariant value as hash code for pointer type. Please refer to when in next releases of go compacting GC move pointers, does map on poiner types will work ?
Below are the CPU, OS and parameters of benchmark testing:
Xeon E3-1230V3 3.30GHZ, Win7 64 OS
Use 8 procs and 9 goroutines, every goroutines will put or get 100,000 key-value pairs.
I used a thread safe implement that uses the RWMutex to compare the performance,. The below are the test results:
Use RWMutex | ConcurrentMap | |
---|---|---|
Put | 480.000 ms/op | 130.207 ms/op |
Get | 45.643 ms/op | 69.464 ms/op |
Put and Get | 729.534 ms/op | 166.610 ms/op |
Note the performance of LockMap's Get operation is better than concurrentMap, the reason is that RWMutex supports parallel read. But if multiple threads put and get at same time, ConcurrentMap will be better than LockMap.
go-concurrentMap is licensed under the MIT Licence, (http://www.apache.org/licenses/LICENSE-2.0.html).
FAQs
Unknown package
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.