id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequence | docstring
stringlengths 6
2.61k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
1,600 | manifoldco/torus-cli | daemon/observer/observer.go | Start | func (o *Observer) Start() {
for {
select {
case evt := <-o.notify: // We have an event to observe
if len(o.observers) == 0 {
log.Printf("Ignoring event due to no observers: %s", evt.ID)
continue
}
evtb, err := json.Marshal(evt)
if err != nil {
log.Printf("Error marshaling event: %s", err)
continue
}
sse := []byte("event: " + evt.Type + "\ndata: ")
sse = append(sse, append(evtb, []byte("\n\n")...)...)
for n := range o.observers {
n <- sse
}
case n := <-o.newObservers:
o.observers[n] = true
case n := <-o.closedObservers:
delete(o.observers, n)
case <-o.closed: // The Observer has been closed.
return
}
}
} | go | func (o *Observer) Start() {
for {
select {
case evt := <-o.notify: // We have an event to observe
if len(o.observers) == 0 {
log.Printf("Ignoring event due to no observers: %s", evt.ID)
continue
}
evtb, err := json.Marshal(evt)
if err != nil {
log.Printf("Error marshaling event: %s", err)
continue
}
sse := []byte("event: " + evt.Type + "\ndata: ")
sse = append(sse, append(evtb, []byte("\n\n")...)...)
for n := range o.observers {
n <- sse
}
case n := <-o.newObservers:
o.observers[n] = true
case n := <-o.closedObservers:
delete(o.observers, n)
case <-o.closed: // The Observer has been closed.
return
}
}
} | [
"func",
"(",
"o",
"*",
"Observer",
")",
"Start",
"(",
")",
"{",
"for",
"{",
"select",
"{",
"case",
"evt",
":=",
"<-",
"o",
".",
"notify",
":",
"// We have an event to observe",
"if",
"len",
"(",
"o",
".",
"observers",
")",
"==",
"0",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"evt",
".",
"ID",
")",
"\n",
"continue",
"\n",
"}",
"\n\n",
"evtb",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"evt",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n\n",
"sse",
":=",
"[",
"]",
"byte",
"(",
"\"",
"\"",
"+",
"evt",
".",
"Type",
"+",
"\"",
"\\n",
"\"",
")",
"\n",
"sse",
"=",
"append",
"(",
"sse",
",",
"append",
"(",
"evtb",
",",
"[",
"]",
"byte",
"(",
"\"",
"\\n",
"\\n",
"\"",
")",
"...",
")",
"...",
")",
"\n\n",
"for",
"n",
":=",
"range",
"o",
".",
"observers",
"{",
"n",
"<-",
"sse",
"\n",
"}",
"\n\n",
"case",
"n",
":=",
"<-",
"o",
".",
"newObservers",
":",
"o",
".",
"observers",
"[",
"n",
"]",
"=",
"true",
"\n",
"case",
"n",
":=",
"<-",
"o",
".",
"closedObservers",
":",
"delete",
"(",
"o",
".",
"observers",
",",
"n",
")",
"\n\n",
"case",
"<-",
"o",
".",
"closed",
":",
"// The Observer has been closed.",
"return",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // Start begins listening for notifications of observable events. It returns
// after stop has been called. | [
"Start",
"begins",
"listening",
"for",
"notifications",
"of",
"observable",
"events",
".",
"It",
"returns",
"after",
"stop",
"has",
"been",
"called",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/observer/observer.go#L253-L284 |
1,601 | manifoldco/torus-cli | prefs/publickey.go | LoadPublicKey | func LoadPublicKey(prefs *Preferences) (*PublicKey, error) {
filePath := prefs.Core.PublicKeyFile
var fd io.Reader
var err error
if filePath == "" {
var b []byte
b, err = data.Asset("data/public_key.json")
if err == nil {
fd = bytes.NewReader(b)
}
} else {
fd, err = readPublicKeyFile(filePath)
}
if err != nil {
return nil, err
}
key, err := parsePublicKeyFile(fd)
if err != nil {
return nil, err
}
return key, nil
} | go | func LoadPublicKey(prefs *Preferences) (*PublicKey, error) {
filePath := prefs.Core.PublicKeyFile
var fd io.Reader
var err error
if filePath == "" {
var b []byte
b, err = data.Asset("data/public_key.json")
if err == nil {
fd = bytes.NewReader(b)
}
} else {
fd, err = readPublicKeyFile(filePath)
}
if err != nil {
return nil, err
}
key, err := parsePublicKeyFile(fd)
if err != nil {
return nil, err
}
return key, nil
} | [
"func",
"LoadPublicKey",
"(",
"prefs",
"*",
"Preferences",
")",
"(",
"*",
"PublicKey",
",",
"error",
")",
"{",
"filePath",
":=",
"prefs",
".",
"Core",
".",
"PublicKeyFile",
"\n\n",
"var",
"fd",
"io",
".",
"Reader",
"\n",
"var",
"err",
"error",
"\n\n",
"if",
"filePath",
"==",
"\"",
"\"",
"{",
"var",
"b",
"[",
"]",
"byte",
"\n",
"b",
",",
"err",
"=",
"data",
".",
"Asset",
"(",
"\"",
"\"",
")",
"\n\n",
"if",
"err",
"==",
"nil",
"{",
"fd",
"=",
"bytes",
".",
"NewReader",
"(",
"b",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"fd",
",",
"err",
"=",
"readPublicKeyFile",
"(",
"filePath",
")",
"\n",
"}",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"key",
",",
"err",
":=",
"parsePublicKeyFile",
"(",
"fd",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"key",
",",
"nil",
"\n",
"}"
] | // LoadPublicKey reads the publickey file from disk and parses the json | [
"LoadPublicKey",
"reads",
"the",
"publickey",
"file",
"from",
"disk",
"and",
"parses",
"the",
"json"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/prefs/publickey.go#L24-L51 |
1,602 | manifoldco/torus-cli | prefs/publickey.go | ValidatePublicKey | func ValidatePublicKey(filePath string) error {
var text string
src, err := os.Stat(filePath)
if err != nil {
return errs.NewExitError("Publick key file must exist")
}
fMode := src.Mode()
if fMode.Perm() != requiredPermissions {
text = fmt.Sprintf("File specified has permissions %d, must have permissions %d", fMode.Perm(), requiredPermissions)
return errs.NewExitError(text)
}
fd, err := readPublicKeyFile(filePath)
if err != nil {
return errs.NewExitError("Could not read file, permissions ok")
}
_, err = parsePublicKeyFile(fd)
if err != nil {
return errs.NewExitError("Could not parse JSON")
}
return nil
} | go | func ValidatePublicKey(filePath string) error {
var text string
src, err := os.Stat(filePath)
if err != nil {
return errs.NewExitError("Publick key file must exist")
}
fMode := src.Mode()
if fMode.Perm() != requiredPermissions {
text = fmt.Sprintf("File specified has permissions %d, must have permissions %d", fMode.Perm(), requiredPermissions)
return errs.NewExitError(text)
}
fd, err := readPublicKeyFile(filePath)
if err != nil {
return errs.NewExitError("Could not read file, permissions ok")
}
_, err = parsePublicKeyFile(fd)
if err != nil {
return errs.NewExitError("Could not parse JSON")
}
return nil
} | [
"func",
"ValidatePublicKey",
"(",
"filePath",
"string",
")",
"error",
"{",
"var",
"text",
"string",
"\n\n",
"src",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"filePath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errs",
".",
"NewExitError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"fMode",
":=",
"src",
".",
"Mode",
"(",
")",
"\n",
"if",
"fMode",
".",
"Perm",
"(",
")",
"!=",
"requiredPermissions",
"{",
"text",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"fMode",
".",
"Perm",
"(",
")",
",",
"requiredPermissions",
")",
"\n",
"return",
"errs",
".",
"NewExitError",
"(",
"text",
")",
"\n",
"}",
"\n\n",
"fd",
",",
"err",
":=",
"readPublicKeyFile",
"(",
"filePath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errs",
".",
"NewExitError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"_",
",",
"err",
"=",
"parsePublicKeyFile",
"(",
"fd",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errs",
".",
"NewExitError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // ValidatePublicKey checks the publickey path for valid file | [
"ValidatePublicKey",
"checks",
"the",
"publickey",
"path",
"for",
"valid",
"file"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/prefs/publickey.go#L78-L103 |
1,603 | manifoldco/torus-cli | daemon/ctxutil/ctxutil.go | ErrIfDone | func ErrIfDone(ctx context.Context) error {
select {
case <-ctx.Done():
return ctx.Err()
default:
return nil
}
} | go | func ErrIfDone(ctx context.Context) error {
select {
case <-ctx.Done():
return ctx.Err()
default:
return nil
}
} | [
"func",
"ErrIfDone",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"select",
"{",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"ctx",
".",
"Err",
"(",
")",
"\n",
"default",
":",
"return",
"nil",
"\n",
"}",
"\n",
"}"
] | // ErrIfDone returns the Context's error if done. It is a convenience method
// for long-running routines that don't have cancellable goroutines. | [
"ErrIfDone",
"returns",
"the",
"Context",
"s",
"error",
"if",
"done",
".",
"It",
"is",
"a",
"convenience",
"method",
"for",
"long",
"-",
"running",
"routines",
"that",
"don",
"t",
"have",
"cancellable",
"goroutines",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/ctxutil/ctxutil.go#L8-L15 |
1,604 | manifoldco/torus-cli | daemon/logic/session.go | Login | func (s *Session) Login(ctx context.Context, creds apitypes.LoginCredential) error {
if !creds.Valid() {
return &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{"invalid login credentials provided"},
}
}
salt, loginToken, err := s.engine.client.Tokens.PostLogin(ctx, creds)
if err != nil {
return err
}
mechanism := loginToken.Body.Mechanism
var authToken *envelope.Token
switch mechanism {
case primitive.HMACAuth:
authToken, err = s.attemptEdDSAUpgrade(ctx, loginToken, salt, creds)
case primitive.EdDSAAuth:
authToken, err = s.attemptEdDSALogin(ctx, loginToken, salt, creds)
default:
err = &apitypes.Error{
Type: apitypes.InternalServerError,
Err: []string{fmt.Sprintf("unrecognized auth mechanism: %s", mechanism)},
}
}
if err != nil {
return err
}
token := []byte(authToken.Body.Token)
self, err := s.engine.client.Self.Get(ctx, authToken.Body.Token)
if err != nil {
return err
}
s.engine.db.Set(self.Identity)
if self.Type == apitypes.UserSession {
s.engine.db.Set(self.Auth)
}
return s.engine.session.Set(self.Type, self.Identity, self.Auth, creds.Passphrase(), token)
} | go | func (s *Session) Login(ctx context.Context, creds apitypes.LoginCredential) error {
if !creds.Valid() {
return &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{"invalid login credentials provided"},
}
}
salt, loginToken, err := s.engine.client.Tokens.PostLogin(ctx, creds)
if err != nil {
return err
}
mechanism := loginToken.Body.Mechanism
var authToken *envelope.Token
switch mechanism {
case primitive.HMACAuth:
authToken, err = s.attemptEdDSAUpgrade(ctx, loginToken, salt, creds)
case primitive.EdDSAAuth:
authToken, err = s.attemptEdDSALogin(ctx, loginToken, salt, creds)
default:
err = &apitypes.Error{
Type: apitypes.InternalServerError,
Err: []string{fmt.Sprintf("unrecognized auth mechanism: %s", mechanism)},
}
}
if err != nil {
return err
}
token := []byte(authToken.Body.Token)
self, err := s.engine.client.Self.Get(ctx, authToken.Body.Token)
if err != nil {
return err
}
s.engine.db.Set(self.Identity)
if self.Type == apitypes.UserSession {
s.engine.db.Set(self.Auth)
}
return s.engine.session.Set(self.Type, self.Identity, self.Auth, creds.Passphrase(), token)
} | [
"func",
"(",
"s",
"*",
"Session",
")",
"Login",
"(",
"ctx",
"context",
".",
"Context",
",",
"creds",
"apitypes",
".",
"LoginCredential",
")",
"error",
"{",
"if",
"!",
"creds",
".",
"Valid",
"(",
")",
"{",
"return",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"BadRequestError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"salt",
",",
"loginToken",
",",
"err",
":=",
"s",
".",
"engine",
".",
"client",
".",
"Tokens",
".",
"PostLogin",
"(",
"ctx",
",",
"creds",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"mechanism",
":=",
"loginToken",
".",
"Body",
".",
"Mechanism",
"\n",
"var",
"authToken",
"*",
"envelope",
".",
"Token",
"\n",
"switch",
"mechanism",
"{",
"case",
"primitive",
".",
"HMACAuth",
":",
"authToken",
",",
"err",
"=",
"s",
".",
"attemptEdDSAUpgrade",
"(",
"ctx",
",",
"loginToken",
",",
"salt",
",",
"creds",
")",
"\n",
"case",
"primitive",
".",
"EdDSAAuth",
":",
"authToken",
",",
"err",
"=",
"s",
".",
"attemptEdDSALogin",
"(",
"ctx",
",",
"loginToken",
",",
"salt",
",",
"creds",
")",
"\n",
"default",
":",
"err",
"=",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"InternalServerError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"mechanism",
")",
"}",
",",
"}",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"token",
":=",
"[",
"]",
"byte",
"(",
"authToken",
".",
"Body",
".",
"Token",
")",
"\n",
"self",
",",
"err",
":=",
"s",
".",
"engine",
".",
"client",
".",
"Self",
".",
"Get",
"(",
"ctx",
",",
"authToken",
".",
"Body",
".",
"Token",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"s",
".",
"engine",
".",
"db",
".",
"Set",
"(",
"self",
".",
"Identity",
")",
"\n",
"if",
"self",
".",
"Type",
"==",
"apitypes",
".",
"UserSession",
"{",
"s",
".",
"engine",
".",
"db",
".",
"Set",
"(",
"self",
".",
"Auth",
")",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"engine",
".",
"session",
".",
"Set",
"(",
"self",
".",
"Type",
",",
"self",
".",
"Identity",
",",
"self",
".",
"Auth",
",",
"creds",
".",
"Passphrase",
"(",
")",
",",
"token",
")",
"\n",
"}"
] | // Login attempts to create a valid auth token to authorize http requests made
// against the registry. | [
"Login",
"attempts",
"to",
"create",
"a",
"valid",
"auth",
"token",
"to",
"authorize",
"http",
"requests",
"made",
"against",
"the",
"registry",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/session.go#L33-L75 |
1,605 | manifoldco/torus-cli | daemon/logic/session.go | Verify | func (s *Session) Verify(ctx context.Context, code string) error {
if s.engine.session.Type() == apitypes.MachineSession {
return &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{"A machine cannot verify it's acccount!"},
}
}
err := s.engine.client.Users.VerifyEmail(ctx, code)
if err != nil {
return err
}
token := s.engine.session.Token()
self, err := s.engine.client.Self.Get(ctx, string(token))
if err != nil {
return err
}
err = s.engine.session.SetIdentity(self.Type, self.Identity, self.Auth)
if err != nil {
return err
}
return s.engine.session.SetIdentity(self.Type, self.Identity, self.Auth)
} | go | func (s *Session) Verify(ctx context.Context, code string) error {
if s.engine.session.Type() == apitypes.MachineSession {
return &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{"A machine cannot verify it's acccount!"},
}
}
err := s.engine.client.Users.VerifyEmail(ctx, code)
if err != nil {
return err
}
token := s.engine.session.Token()
self, err := s.engine.client.Self.Get(ctx, string(token))
if err != nil {
return err
}
err = s.engine.session.SetIdentity(self.Type, self.Identity, self.Auth)
if err != nil {
return err
}
return s.engine.session.SetIdentity(self.Type, self.Identity, self.Auth)
} | [
"func",
"(",
"s",
"*",
"Session",
")",
"Verify",
"(",
"ctx",
"context",
".",
"Context",
",",
"code",
"string",
")",
"error",
"{",
"if",
"s",
".",
"engine",
".",
"session",
".",
"Type",
"(",
")",
"==",
"apitypes",
".",
"MachineSession",
"{",
"return",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"BadRequestError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"err",
":=",
"s",
".",
"engine",
".",
"client",
".",
"Users",
".",
"VerifyEmail",
"(",
"ctx",
",",
"code",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"token",
":=",
"s",
".",
"engine",
".",
"session",
".",
"Token",
"(",
")",
"\n",
"self",
",",
"err",
":=",
"s",
".",
"engine",
".",
"client",
".",
"Self",
".",
"Get",
"(",
"ctx",
",",
"string",
"(",
"token",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"engine",
".",
"session",
".",
"SetIdentity",
"(",
"self",
".",
"Type",
",",
"self",
".",
"Identity",
",",
"self",
".",
"Auth",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"engine",
".",
"session",
".",
"SetIdentity",
"(",
"self",
".",
"Type",
",",
"self",
".",
"Identity",
",",
"self",
".",
"Auth",
")",
"\n",
"}"
] | // Verify attempts to verify the users account using the | [
"Verify",
"attempts",
"to",
"verify",
"the",
"users",
"account",
"using",
"the"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/session.go#L78-L103 |
1,606 | manifoldco/torus-cli | daemon/logic/session.go | UpdateProfile | func (s *Session) UpdateProfile(ctx context.Context, newEmail, newName, newPassword string) (envelope.UserInf, error) {
if s.engine.session.Type() != apitypes.UserSession {
return nil, &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{"You must be a logged in user to change your password!"},
}
}
// Convert the auth portion of the session to a UserInf interface
// Note: the auth and identity sections for a user are the same
user, ok := s.engine.session.Self().Auth.(envelope.UserInf)
if !ok {
log.Printf("Could not convert to UserInf during update profile")
return nil, &apitypes.Error{
Type: apitypes.InternalServerError,
Err: []string{"Could not convert to user interface"},
}
}
if user.StructVersion() != 2 {
return nil, &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{fmt.Sprintf(
"User schema must be v2 to perform password change: %d",
user.StructVersion()),
},
}
}
payload := &updateProfile{}
if newEmail != "" {
payload.Email = newEmail
}
if newName != "" {
payload.Name = newName
}
if newPassword != "" {
pw, master, keypair, err := s.engine.crypto.ChangePassword(ctx, newPassword)
if err != nil {
log.Printf("Could not re-encrypt master key: %s", err)
return nil, &apitypes.Error{
Type: apitypes.InternalServerError,
Err: []string{"Could not re-encrypt master key"},
}
}
payload.Password = pw
payload.Master = master
payload.PublicKey = keypair
}
updatedUser, err := s.engine.client.Users.Update(ctx, payload)
if err != nil {
log.Printf("Could not update password on server due to err: %s", err)
return nil, err
}
s.engine.session.SetIdentity(apitypes.UserSession, updatedUser, updatedUser)
return updatedUser, nil
} | go | func (s *Session) UpdateProfile(ctx context.Context, newEmail, newName, newPassword string) (envelope.UserInf, error) {
if s.engine.session.Type() != apitypes.UserSession {
return nil, &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{"You must be a logged in user to change your password!"},
}
}
// Convert the auth portion of the session to a UserInf interface
// Note: the auth and identity sections for a user are the same
user, ok := s.engine.session.Self().Auth.(envelope.UserInf)
if !ok {
log.Printf("Could not convert to UserInf during update profile")
return nil, &apitypes.Error{
Type: apitypes.InternalServerError,
Err: []string{"Could not convert to user interface"},
}
}
if user.StructVersion() != 2 {
return nil, &apitypes.Error{
Type: apitypes.BadRequestError,
Err: []string{fmt.Sprintf(
"User schema must be v2 to perform password change: %d",
user.StructVersion()),
},
}
}
payload := &updateProfile{}
if newEmail != "" {
payload.Email = newEmail
}
if newName != "" {
payload.Name = newName
}
if newPassword != "" {
pw, master, keypair, err := s.engine.crypto.ChangePassword(ctx, newPassword)
if err != nil {
log.Printf("Could not re-encrypt master key: %s", err)
return nil, &apitypes.Error{
Type: apitypes.InternalServerError,
Err: []string{"Could not re-encrypt master key"},
}
}
payload.Password = pw
payload.Master = master
payload.PublicKey = keypair
}
updatedUser, err := s.engine.client.Users.Update(ctx, payload)
if err != nil {
log.Printf("Could not update password on server due to err: %s", err)
return nil, err
}
s.engine.session.SetIdentity(apitypes.UserSession, updatedUser, updatedUser)
return updatedUser, nil
} | [
"func",
"(",
"s",
"*",
"Session",
")",
"UpdateProfile",
"(",
"ctx",
"context",
".",
"Context",
",",
"newEmail",
",",
"newName",
",",
"newPassword",
"string",
")",
"(",
"envelope",
".",
"UserInf",
",",
"error",
")",
"{",
"if",
"s",
".",
"engine",
".",
"session",
".",
"Type",
"(",
")",
"!=",
"apitypes",
".",
"UserSession",
"{",
"return",
"nil",
",",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"BadRequestError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"// Convert the auth portion of the session to a UserInf interface",
"// Note: the auth and identity sections for a user are the same",
"user",
",",
"ok",
":=",
"s",
".",
"engine",
".",
"session",
".",
"Self",
"(",
")",
".",
"Auth",
".",
"(",
"envelope",
".",
"UserInf",
")",
"\n",
"if",
"!",
"ok",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"InternalServerError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"if",
"user",
".",
"StructVersion",
"(",
")",
"!=",
"2",
"{",
"return",
"nil",
",",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"BadRequestError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"user",
".",
"StructVersion",
"(",
")",
")",
",",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"payload",
":=",
"&",
"updateProfile",
"{",
"}",
"\n",
"if",
"newEmail",
"!=",
"\"",
"\"",
"{",
"payload",
".",
"Email",
"=",
"newEmail",
"\n",
"}",
"\n\n",
"if",
"newName",
"!=",
"\"",
"\"",
"{",
"payload",
".",
"Name",
"=",
"newName",
"\n",
"}",
"\n\n",
"if",
"newPassword",
"!=",
"\"",
"\"",
"{",
"pw",
",",
"master",
",",
"keypair",
",",
"err",
":=",
"s",
".",
"engine",
".",
"crypto",
".",
"ChangePassword",
"(",
"ctx",
",",
"newPassword",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"InternalServerError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"payload",
".",
"Password",
"=",
"pw",
"\n",
"payload",
".",
"Master",
"=",
"master",
"\n",
"payload",
".",
"PublicKey",
"=",
"keypair",
"\n",
"}",
"\n\n",
"updatedUser",
",",
"err",
":=",
"s",
".",
"engine",
".",
"client",
".",
"Users",
".",
"Update",
"(",
"ctx",
",",
"payload",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"s",
".",
"engine",
".",
"session",
".",
"SetIdentity",
"(",
"apitypes",
".",
"UserSession",
",",
"updatedUser",
",",
"updatedUser",
")",
"\n",
"return",
"updatedUser",
",",
"nil",
"\n",
"}"
] | // UpdateProfile attempts to update the root password used by a user to log
// into Torus which also allows them to access their stored and encrypted
// secrets. | [
"UpdateProfile",
"attempts",
"to",
"update",
"the",
"root",
"password",
"used",
"by",
"a",
"user",
"to",
"log",
"into",
"Torus",
"which",
"also",
"allows",
"them",
"to",
"access",
"their",
"stored",
"and",
"encrypted",
"secrets",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/session.go#L108-L169 |
1,607 | manifoldco/torus-cli | daemon/logic/session.go | Logout | func (s *Session) Logout(ctx context.Context) error {
if !s.engine.session.HasToken() {
return &apitypes.Error{
Type: apitypes.UnauthorizedError,
Err: []string{"You must be logged in, to logout!"},
}
}
tok := s.engine.session.Token()
err := s.engine.client.Tokens.Delete(ctx, string(tok[:]))
switch err := err.(type) {
case *apitypes.Error:
switch err.Type {
case apitypes.InternalServerError:
// On a 5XX response, we don't know for sure that the server
// has successfully removed the auth token. Keep the copy in
// the daemon, so the user may try again.
return err
case apitypes.NotFoundError, apitypes.BadRequestError, apitypes.UnauthorizedError:
// A 4XX error indicates either the token isn't found, or we're
// not allowed to remove it (or the server is a teapot).
//
// In any case, the daemon has gotten out of sync with the
// server. Remove our local copy of the auth token.
log.Printf("Got 4XX removing auth token. Treating as success")
logoutErr := s.engine.session.Logout()
if logoutErr != nil {
return logoutErr
}
return nil
}
case nil:
logoutErr := s.engine.session.Logout()
if logoutErr != nil {
return logoutErr
}
return nil
default:
return err
}
return nil
} | go | func (s *Session) Logout(ctx context.Context) error {
if !s.engine.session.HasToken() {
return &apitypes.Error{
Type: apitypes.UnauthorizedError,
Err: []string{"You must be logged in, to logout!"},
}
}
tok := s.engine.session.Token()
err := s.engine.client.Tokens.Delete(ctx, string(tok[:]))
switch err := err.(type) {
case *apitypes.Error:
switch err.Type {
case apitypes.InternalServerError:
// On a 5XX response, we don't know for sure that the server
// has successfully removed the auth token. Keep the copy in
// the daemon, so the user may try again.
return err
case apitypes.NotFoundError, apitypes.BadRequestError, apitypes.UnauthorizedError:
// A 4XX error indicates either the token isn't found, or we're
// not allowed to remove it (or the server is a teapot).
//
// In any case, the daemon has gotten out of sync with the
// server. Remove our local copy of the auth token.
log.Printf("Got 4XX removing auth token. Treating as success")
logoutErr := s.engine.session.Logout()
if logoutErr != nil {
return logoutErr
}
return nil
}
case nil:
logoutErr := s.engine.session.Logout()
if logoutErr != nil {
return logoutErr
}
return nil
default:
return err
}
return nil
} | [
"func",
"(",
"s",
"*",
"Session",
")",
"Logout",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"if",
"!",
"s",
".",
"engine",
".",
"session",
".",
"HasToken",
"(",
")",
"{",
"return",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"UnauthorizedError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"tok",
":=",
"s",
".",
"engine",
".",
"session",
".",
"Token",
"(",
")",
"\n",
"err",
":=",
"s",
".",
"engine",
".",
"client",
".",
"Tokens",
".",
"Delete",
"(",
"ctx",
",",
"string",
"(",
"tok",
"[",
":",
"]",
")",
")",
"\n",
"switch",
"err",
":=",
"err",
".",
"(",
"type",
")",
"{",
"case",
"*",
"apitypes",
".",
"Error",
":",
"switch",
"err",
".",
"Type",
"{",
"case",
"apitypes",
".",
"InternalServerError",
":",
"// On a 5XX response, we don't know for sure that the server",
"// has successfully removed the auth token. Keep the copy in",
"// the daemon, so the user may try again.",
"return",
"err",
"\n",
"case",
"apitypes",
".",
"NotFoundError",
",",
"apitypes",
".",
"BadRequestError",
",",
"apitypes",
".",
"UnauthorizedError",
":",
"// A 4XX error indicates either the token isn't found, or we're",
"// not allowed to remove it (or the server is a teapot).",
"//",
"// In any case, the daemon has gotten out of sync with the",
"// server. Remove our local copy of the auth token.",
"log",
".",
"Printf",
"(",
"\"",
"\"",
")",
"\n",
"logoutErr",
":=",
"s",
".",
"engine",
".",
"session",
".",
"Logout",
"(",
")",
"\n",
"if",
"logoutErr",
"!=",
"nil",
"{",
"return",
"logoutErr",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}",
"\n",
"case",
"nil",
":",
"logoutErr",
":=",
"s",
".",
"engine",
".",
"session",
".",
"Logout",
"(",
")",
"\n",
"if",
"logoutErr",
"!=",
"nil",
"{",
"return",
"logoutErr",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"default",
":",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Logout destroys the current session if it exists, otherwise, it returns an
// error that the request could not be completed. | [
"Logout",
"destroys",
"the",
"current",
"session",
"if",
"it",
"exists",
"otherwise",
"it",
"returns",
"an",
"error",
"that",
"the",
"request",
"could",
"not",
"be",
"completed",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/session.go#L208-L254 |
1,608 | manifoldco/torus-cli | registry/memberships.go | Create | func (m *MembershipsClient) Create(ctx context.Context, userID, orgID, teamID *identity.ID) error {
if orgID == nil {
return errors.New("invalid org")
}
if userID == nil {
return errors.New("invalid user")
}
if teamID == nil {
return errors.New("invalid team")
}
membershipBody := primitive.Membership{
OwnerID: userID,
OrgID: orgID,
TeamID: teamID,
}
ID, err := identity.NewMutable(&membershipBody)
if err != nil {
return err
}
membership := envelope.Membership{
ID: &ID,
Version: 1,
Body: &membershipBody,
}
return m.client.RoundTrip(ctx, "POST", "/memberships", nil, &membership, nil)
} | go | func (m *MembershipsClient) Create(ctx context.Context, userID, orgID, teamID *identity.ID) error {
if orgID == nil {
return errors.New("invalid org")
}
if userID == nil {
return errors.New("invalid user")
}
if teamID == nil {
return errors.New("invalid team")
}
membershipBody := primitive.Membership{
OwnerID: userID,
OrgID: orgID,
TeamID: teamID,
}
ID, err := identity.NewMutable(&membershipBody)
if err != nil {
return err
}
membership := envelope.Membership{
ID: &ID,
Version: 1,
Body: &membershipBody,
}
return m.client.RoundTrip(ctx, "POST", "/memberships", nil, &membership, nil)
} | [
"func",
"(",
"m",
"*",
"MembershipsClient",
")",
"Create",
"(",
"ctx",
"context",
".",
"Context",
",",
"userID",
",",
"orgID",
",",
"teamID",
"*",
"identity",
".",
"ID",
")",
"error",
"{",
"if",
"orgID",
"==",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"userID",
"==",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"teamID",
"==",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"membershipBody",
":=",
"primitive",
".",
"Membership",
"{",
"OwnerID",
":",
"userID",
",",
"OrgID",
":",
"orgID",
",",
"TeamID",
":",
"teamID",
",",
"}",
"\n\n",
"ID",
",",
"err",
":=",
"identity",
".",
"NewMutable",
"(",
"&",
"membershipBody",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"membership",
":=",
"envelope",
".",
"Membership",
"{",
"ID",
":",
"&",
"ID",
",",
"Version",
":",
"1",
",",
"Body",
":",
"&",
"membershipBody",
",",
"}",
"\n\n",
"return",
"m",
".",
"client",
".",
"RoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"&",
"membership",
",",
"nil",
")",
"\n",
"}"
] | // Create requests addition of a user to a team | [
"Create",
"requests",
"addition",
"of",
"a",
"user",
"to",
"a",
"team"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/memberships.go#L41-L70 |
1,609 | manifoldco/torus-cli | registry/memberships.go | Delete | func (m *MembershipsClient) Delete(ctx context.Context, membership *identity.ID) error {
return m.client.RoundTrip(ctx, "DELETE", "/memberships/"+membership.String(), nil, nil, nil)
} | go | func (m *MembershipsClient) Delete(ctx context.Context, membership *identity.ID) error {
return m.client.RoundTrip(ctx, "DELETE", "/memberships/"+membership.String(), nil, nil, nil)
} | [
"func",
"(",
"m",
"*",
"MembershipsClient",
")",
"Delete",
"(",
"ctx",
"context",
".",
"Context",
",",
"membership",
"*",
"identity",
".",
"ID",
")",
"error",
"{",
"return",
"m",
".",
"client",
".",
"RoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"membership",
".",
"String",
"(",
")",
",",
"nil",
",",
"nil",
",",
"nil",
")",
"\n",
"}"
] | // Delete requests deletion of a specific membership row by ID | [
"Delete",
"requests",
"deletion",
"of",
"a",
"specific",
"membership",
"row",
"by",
"ID"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/memberships.go#L73-L75 |
1,610 | manifoldco/torus-cli | registry/self.go | Get | func (s *SelfClient) Get(ctx context.Context, token string) (*apitypes.Self, error) {
raw := &rawSelf{}
err := tokenRoundTrip(ctx, s.client, token, "GET", "/self", nil, nil, raw)
if err != nil {
return nil, err
}
self := raw.Self
switch raw.Type {
case apitypes.UserSession:
user, err := envelope.ConvertUser(raw.Identity)
if err != nil {
return nil, err
}
self.Identity = user
self.Auth = user
case apitypes.MachineSession:
self.Identity = &envelope.Machine{
ID: raw.Identity.ID,
Version: raw.Identity.Version,
Body: raw.Identity.Body.(*primitive.Machine),
}
self.Auth = &envelope.MachineToken{
ID: raw.Auth.ID,
Version: raw.Auth.Version,
Body: raw.Auth.Body.(*primitive.MachineToken),
}
default:
return nil, errUnknownSessionType
}
return self, nil
} | go | func (s *SelfClient) Get(ctx context.Context, token string) (*apitypes.Self, error) {
raw := &rawSelf{}
err := tokenRoundTrip(ctx, s.client, token, "GET", "/self", nil, nil, raw)
if err != nil {
return nil, err
}
self := raw.Self
switch raw.Type {
case apitypes.UserSession:
user, err := envelope.ConvertUser(raw.Identity)
if err != nil {
return nil, err
}
self.Identity = user
self.Auth = user
case apitypes.MachineSession:
self.Identity = &envelope.Machine{
ID: raw.Identity.ID,
Version: raw.Identity.Version,
Body: raw.Identity.Body.(*primitive.Machine),
}
self.Auth = &envelope.MachineToken{
ID: raw.Auth.ID,
Version: raw.Auth.Version,
Body: raw.Auth.Body.(*primitive.MachineToken),
}
default:
return nil, errUnknownSessionType
}
return self, nil
} | [
"func",
"(",
"s",
"*",
"SelfClient",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"token",
"string",
")",
"(",
"*",
"apitypes",
".",
"Self",
",",
"error",
")",
"{",
"raw",
":=",
"&",
"rawSelf",
"{",
"}",
"\n",
"err",
":=",
"tokenRoundTrip",
"(",
"ctx",
",",
"s",
".",
"client",
",",
"token",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"raw",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"self",
":=",
"raw",
".",
"Self",
"\n",
"switch",
"raw",
".",
"Type",
"{",
"case",
"apitypes",
".",
"UserSession",
":",
"user",
",",
"err",
":=",
"envelope",
".",
"ConvertUser",
"(",
"raw",
".",
"Identity",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"self",
".",
"Identity",
"=",
"user",
"\n",
"self",
".",
"Auth",
"=",
"user",
"\n",
"case",
"apitypes",
".",
"MachineSession",
":",
"self",
".",
"Identity",
"=",
"&",
"envelope",
".",
"Machine",
"{",
"ID",
":",
"raw",
".",
"Identity",
".",
"ID",
",",
"Version",
":",
"raw",
".",
"Identity",
".",
"Version",
",",
"Body",
":",
"raw",
".",
"Identity",
".",
"Body",
".",
"(",
"*",
"primitive",
".",
"Machine",
")",
",",
"}",
"\n",
"self",
".",
"Auth",
"=",
"&",
"envelope",
".",
"MachineToken",
"{",
"ID",
":",
"raw",
".",
"Auth",
".",
"ID",
",",
"Version",
":",
"raw",
".",
"Auth",
".",
"Version",
",",
"Body",
":",
"raw",
".",
"Auth",
".",
"Body",
".",
"(",
"*",
"primitive",
".",
"MachineToken",
")",
",",
"}",
"\n",
"default",
":",
"return",
"nil",
",",
"errUnknownSessionType",
"\n",
"}",
"\n\n",
"return",
"self",
",",
"nil",
"\n",
"}"
] | // Get returns the current identities associated with this token | [
"Get",
"returns",
"the",
"current",
"identities",
"associated",
"with",
"this",
"token"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/self.go#L28-L61 |
1,611 | manifoldco/torus-cli | cmd/cmd.go | NewAPIClient | func NewAPIClient(ctx *context.Context, client *api.Client) (context.Context, *api.Client, error) {
if client == nil {
cfg, err := config.LoadConfig()
if err != nil {
return nil, nil, err
}
client = api.NewClient(cfg)
}
var c context.Context
if ctx == nil {
c = context.Background()
} else {
c = *ctx
}
return c, client, nil
} | go | func NewAPIClient(ctx *context.Context, client *api.Client) (context.Context, *api.Client, error) {
if client == nil {
cfg, err := config.LoadConfig()
if err != nil {
return nil, nil, err
}
client = api.NewClient(cfg)
}
var c context.Context
if ctx == nil {
c = context.Background()
} else {
c = *ctx
}
return c, client, nil
} | [
"func",
"NewAPIClient",
"(",
"ctx",
"*",
"context",
".",
"Context",
",",
"client",
"*",
"api",
".",
"Client",
")",
"(",
"context",
".",
"Context",
",",
"*",
"api",
".",
"Client",
",",
"error",
")",
"{",
"if",
"client",
"==",
"nil",
"{",
"cfg",
",",
"err",
":=",
"config",
".",
"LoadConfig",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"client",
"=",
"api",
".",
"NewClient",
"(",
"cfg",
")",
"\n",
"}",
"\n",
"var",
"c",
"context",
".",
"Context",
"\n",
"if",
"ctx",
"==",
"nil",
"{",
"c",
"=",
"context",
".",
"Background",
"(",
")",
"\n",
"}",
"else",
"{",
"c",
"=",
"*",
"ctx",
"\n",
"}",
"\n",
"return",
"c",
",",
"client",
",",
"nil",
"\n",
"}"
] | // NewAPIClient loads config and creates a new api client | [
"NewAPIClient",
"loads",
"config",
"and",
"creates",
"a",
"new",
"api",
"client"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/cmd.go#L28-L43 |
1,612 | manifoldco/torus-cli | api/updates.go | Check | func (c *UpdatesClient) Check(ctx context.Context) (*apitypes.UpdateInfo, error) {
var needsUpdate apitypes.UpdateInfo
err := c.client.DaemonRoundTrip(ctx, "GET", "/updates", nil, nil, &needsUpdate, nil)
return &needsUpdate, err
} | go | func (c *UpdatesClient) Check(ctx context.Context) (*apitypes.UpdateInfo, error) {
var needsUpdate apitypes.UpdateInfo
err := c.client.DaemonRoundTrip(ctx, "GET", "/updates", nil, nil, &needsUpdate, nil)
return &needsUpdate, err
} | [
"func",
"(",
"c",
"*",
"UpdatesClient",
")",
"Check",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"apitypes",
".",
"UpdateInfo",
",",
"error",
")",
"{",
"var",
"needsUpdate",
"apitypes",
".",
"UpdateInfo",
"\n",
"err",
":=",
"c",
".",
"client",
".",
"DaemonRoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"&",
"needsUpdate",
",",
"nil",
")",
"\n",
"return",
"&",
"needsUpdate",
",",
"err",
"\n",
"}"
] | // Check returns the latest updates check result, useful for detecting whether
// a newer version of Torus is available for download. | [
"Check",
"returns",
"the",
"latest",
"updates",
"check",
"result",
"useful",
"for",
"detecting",
"whether",
"a",
"newer",
"version",
"of",
"Torus",
"is",
"available",
"for",
"download",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/updates.go#L17-L21 |
1,613 | manifoldco/torus-cli | daemon/crypto/engine.go | Unseal | func (e *Engine) Unseal(ctx context.Context, ct, nonce []byte) (*secure.Secret, error) {
mk, err := e.unsealMasterKey(ctx)
defer mk.Destroy()
if err != nil {
return nil, err
}
dk, err := deriveKey(ctx, mk.Buffer(), nonce, blakeSize)
if err != nil {
return nil, err
}
ts, err := newTriplesec(ctx, dk)
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
b, err := ts.Decrypt(ct)
if err != nil {
return nil, err
}
return e.guard.Secret(b)
} | go | func (e *Engine) Unseal(ctx context.Context, ct, nonce []byte) (*secure.Secret, error) {
mk, err := e.unsealMasterKey(ctx)
defer mk.Destroy()
if err != nil {
return nil, err
}
dk, err := deriveKey(ctx, mk.Buffer(), nonce, blakeSize)
if err != nil {
return nil, err
}
ts, err := newTriplesec(ctx, dk)
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
b, err := ts.Decrypt(ct)
if err != nil {
return nil, err
}
return e.guard.Secret(b)
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"Unseal",
"(",
"ctx",
"context",
".",
"Context",
",",
"ct",
",",
"nonce",
"[",
"]",
"byte",
")",
"(",
"*",
"secure",
".",
"Secret",
",",
"error",
")",
"{",
"mk",
",",
"err",
":=",
"e",
".",
"unsealMasterKey",
"(",
"ctx",
")",
"\n",
"defer",
"mk",
".",
"Destroy",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"dk",
",",
"err",
":=",
"deriveKey",
"(",
"ctx",
",",
"mk",
".",
"Buffer",
"(",
")",
",",
"nonce",
",",
"blakeSize",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"ts",
",",
"err",
":=",
"newTriplesec",
"(",
"ctx",
",",
"dk",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"b",
",",
"err",
":=",
"ts",
".",
"Decrypt",
"(",
"ct",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"e",
".",
"guard",
".",
"Secret",
"(",
"b",
")",
"\n",
"}"
] | // Unseal decrypts the ciphertext ct, encrypted with triplesec-v3, using the
// a key derived via blake2b from the user's master key and the provided nonce. | [
"Unseal",
"decrypts",
"the",
"ciphertext",
"ct",
"encrypted",
"with",
"triplesec",
"-",
"v3",
"using",
"the",
"a",
"key",
"derived",
"via",
"blake2b",
"from",
"the",
"user",
"s",
"master",
"key",
"and",
"the",
"provided",
"nonce",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L118-L146 |
1,614 | manifoldco/torus-cli | daemon/crypto/engine.go | Box | func (e *Engine) Box(ctx context.Context, pt *secure.Secret, privKP *EncryptionKeyPair,
pubKey []byte) ([]byte, []byte, error) {
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, nil, err
}
nonce := [24]byte{}
_, err = rand.Read(nonce[:])
if err != nil {
return nil, nil, err
}
privKey, err := e.Unseal(ctx, privKP.Private, privKP.PNonce)
if err != nil {
return nil, nil, err
}
defer privKey.Destroy()
// Get a pointer to the underlying private key in memory
privkb := (*[32]byte)(unsafe.Pointer(&privKey.Buffer()[0]))
pubkb := [32]byte{}
copy(pubkb[:], pubKey)
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, nil, err
}
return box.Seal([]byte{}, pt.Buffer(), &nonce, &pubkb, privkb), nonce[:], nil
} | go | func (e *Engine) Box(ctx context.Context, pt *secure.Secret, privKP *EncryptionKeyPair,
pubKey []byte) ([]byte, []byte, error) {
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, nil, err
}
nonce := [24]byte{}
_, err = rand.Read(nonce[:])
if err != nil {
return nil, nil, err
}
privKey, err := e.Unseal(ctx, privKP.Private, privKP.PNonce)
if err != nil {
return nil, nil, err
}
defer privKey.Destroy()
// Get a pointer to the underlying private key in memory
privkb := (*[32]byte)(unsafe.Pointer(&privKey.Buffer()[0]))
pubkb := [32]byte{}
copy(pubkb[:], pubKey)
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, nil, err
}
return box.Seal([]byte{}, pt.Buffer(), &nonce, &pubkb, privkb), nonce[:], nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"Box",
"(",
"ctx",
"context",
".",
"Context",
",",
"pt",
"*",
"secure",
".",
"Secret",
",",
"privKP",
"*",
"EncryptionKeyPair",
",",
"pubKey",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"byte",
",",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"err",
":=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"nonce",
":=",
"[",
"24",
"]",
"byte",
"{",
"}",
"\n",
"_",
",",
"err",
"=",
"rand",
".",
"Read",
"(",
"nonce",
"[",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"privKey",
",",
"err",
":=",
"e",
".",
"Unseal",
"(",
"ctx",
",",
"privKP",
".",
"Private",
",",
"privKP",
".",
"PNonce",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"privKey",
".",
"Destroy",
"(",
")",
"\n\n",
"// Get a pointer to the underlying private key in memory",
"privkb",
":=",
"(",
"*",
"[",
"32",
"]",
"byte",
")",
"(",
"unsafe",
".",
"Pointer",
"(",
"&",
"privKey",
".",
"Buffer",
"(",
")",
"[",
"0",
"]",
")",
")",
"\n\n",
"pubkb",
":=",
"[",
"32",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"pubkb",
"[",
":",
"]",
",",
"pubKey",
")",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"box",
".",
"Seal",
"(",
"[",
"]",
"byte",
"{",
"}",
",",
"pt",
".",
"Buffer",
"(",
")",
",",
"&",
"nonce",
",",
"&",
"pubkb",
",",
"privkb",
")",
",",
"nonce",
"[",
":",
"]",
",",
"nil",
"\n",
"}"
] | // Box encrypts the plaintext pt bytes with Box, using the private key found in
// privKP, first decrypted with the user's master key, and encrypted for the
// public key pubKey.
//
// It returns the ciphertext, the nonce used for encrypting the plaintext,
// and an optional error. | [
"Box",
"encrypts",
"the",
"plaintext",
"pt",
"bytes",
"with",
"Box",
"using",
"the",
"private",
"key",
"found",
"in",
"privKP",
"first",
"decrypted",
"with",
"the",
"user",
"s",
"master",
"key",
"and",
"encrypted",
"for",
"the",
"public",
"key",
"pubKey",
".",
"It",
"returns",
"the",
"ciphertext",
"the",
"nonce",
"used",
"for",
"encrypting",
"the",
"plaintext",
"and",
"an",
"optional",
"error",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L154-L186 |
1,615 | manifoldco/torus-cli | daemon/crypto/engine.go | Unbox | func (e *Engine) Unbox(ctx context.Context, ct, nonce []byte,
privKP *EncryptionKeyPair, pubKey []byte) (*secure.Secret, error) {
privKey, err := e.Unseal(ctx, privKP.Private, privKP.PNonce)
if err != nil {
return nil, err
}
defer privKey.Destroy()
nonceb := [24]byte{}
copy(nonceb[:], nonce)
// Get a pointer to the underlying private key in memory
privkb := (*[32]byte)(unsafe.Pointer(&privKey.Buffer()[0]))
pubkb := [32]byte{}
copy(pubkb[:], pubKey)
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pt, success := box.Open([]byte{}, ct, &nonceb, &pubkb, privkb)
if !success {
return nil, errors.New("Failed to decrypt ciphertext")
}
return e.guard.Secret(pt)
} | go | func (e *Engine) Unbox(ctx context.Context, ct, nonce []byte,
privKP *EncryptionKeyPair, pubKey []byte) (*secure.Secret, error) {
privKey, err := e.Unseal(ctx, privKP.Private, privKP.PNonce)
if err != nil {
return nil, err
}
defer privKey.Destroy()
nonceb := [24]byte{}
copy(nonceb[:], nonce)
// Get a pointer to the underlying private key in memory
privkb := (*[32]byte)(unsafe.Pointer(&privKey.Buffer()[0]))
pubkb := [32]byte{}
copy(pubkb[:], pubKey)
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pt, success := box.Open([]byte{}, ct, &nonceb, &pubkb, privkb)
if !success {
return nil, errors.New("Failed to decrypt ciphertext")
}
return e.guard.Secret(pt)
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"Unbox",
"(",
"ctx",
"context",
".",
"Context",
",",
"ct",
",",
"nonce",
"[",
"]",
"byte",
",",
"privKP",
"*",
"EncryptionKeyPair",
",",
"pubKey",
"[",
"]",
"byte",
")",
"(",
"*",
"secure",
".",
"Secret",
",",
"error",
")",
"{",
"privKey",
",",
"err",
":=",
"e",
".",
"Unseal",
"(",
"ctx",
",",
"privKP",
".",
"Private",
",",
"privKP",
".",
"PNonce",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"privKey",
".",
"Destroy",
"(",
")",
"\n\n",
"nonceb",
":=",
"[",
"24",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"nonceb",
"[",
":",
"]",
",",
"nonce",
")",
"\n\n",
"// Get a pointer to the underlying private key in memory",
"privkb",
":=",
"(",
"*",
"[",
"32",
"]",
"byte",
")",
"(",
"unsafe",
".",
"Pointer",
"(",
"&",
"privKey",
".",
"Buffer",
"(",
")",
"[",
"0",
"]",
")",
")",
"\n\n",
"pubkb",
":=",
"[",
"32",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"pubkb",
"[",
":",
"]",
",",
"pubKey",
")",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"pt",
",",
"success",
":=",
"box",
".",
"Open",
"(",
"[",
"]",
"byte",
"{",
"}",
",",
"ct",
",",
"&",
"nonceb",
",",
"&",
"pubkb",
",",
"privkb",
")",
"\n",
"if",
"!",
"success",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"e",
".",
"guard",
".",
"Secret",
"(",
"pt",
")",
"\n",
"}"
] | // Unbox Decrypts and verifies ciphertext ct that was previously encrypted using
// the provided nonce, and the inverse parts of the provided keypairs. | [
"Unbox",
"Decrypts",
"and",
"verifies",
"ciphertext",
"ct",
"that",
"was",
"previously",
"encrypted",
"using",
"the",
"provided",
"nonce",
"and",
"the",
"inverse",
"parts",
"of",
"the",
"provided",
"keypairs",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L190-L219 |
1,616 | manifoldco/torus-cli | daemon/crypto/engine.go | UnboxCredential | func (e *Engine) UnboxCredential(ctx context.Context, ct, encMec, mecNonce,
cekNonce, ctNonce []byte, privKP *EncryptionKeyPair, pubKey []byte) ([]byte, error) {
mek, err := e.Unbox(ctx, encMec, mecNonce, privKP, pubKey)
if err != nil {
return nil, err
}
defer mek.Destroy()
cek, err := deriveKey(ctx, mek.Buffer(), cekNonce, 32)
if err != nil {
return nil, err
}
cekb := [32]byte{}
copy(cekb[:], cek)
ctNonceb := [24]byte{}
copy(ctNonceb[:], ctNonce)
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pt, success := secretbox.Open([]byte{}, ct, &ctNonceb, &cekb)
if !success {
return nil, errors.New("Failed to decrypt ciphertext")
}
return pt, nil
} | go | func (e *Engine) UnboxCredential(ctx context.Context, ct, encMec, mecNonce,
cekNonce, ctNonce []byte, privKP *EncryptionKeyPair, pubKey []byte) ([]byte, error) {
mek, err := e.Unbox(ctx, encMec, mecNonce, privKP, pubKey)
if err != nil {
return nil, err
}
defer mek.Destroy()
cek, err := deriveKey(ctx, mek.Buffer(), cekNonce, 32)
if err != nil {
return nil, err
}
cekb := [32]byte{}
copy(cekb[:], cek)
ctNonceb := [24]byte{}
copy(ctNonceb[:], ctNonce)
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pt, success := secretbox.Open([]byte{}, ct, &ctNonceb, &cekb)
if !success {
return nil, errors.New("Failed to decrypt ciphertext")
}
return pt, nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"UnboxCredential",
"(",
"ctx",
"context",
".",
"Context",
",",
"ct",
",",
"encMec",
",",
"mecNonce",
",",
"cekNonce",
",",
"ctNonce",
"[",
"]",
"byte",
",",
"privKP",
"*",
"EncryptionKeyPair",
",",
"pubKey",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"mek",
",",
"err",
":=",
"e",
".",
"Unbox",
"(",
"ctx",
",",
"encMec",
",",
"mecNonce",
",",
"privKP",
",",
"pubKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"mek",
".",
"Destroy",
"(",
")",
"\n\n",
"cek",
",",
"err",
":=",
"deriveKey",
"(",
"ctx",
",",
"mek",
".",
"Buffer",
"(",
")",
",",
"cekNonce",
",",
"32",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"cekb",
":=",
"[",
"32",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"cekb",
"[",
":",
"]",
",",
"cek",
")",
"\n\n",
"ctNonceb",
":=",
"[",
"24",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"ctNonceb",
"[",
":",
"]",
",",
"ctNonce",
")",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"pt",
",",
"success",
":=",
"secretbox",
".",
"Open",
"(",
"[",
"]",
"byte",
"{",
"}",
",",
"ct",
",",
"&",
"ctNonceb",
",",
"&",
"cekb",
")",
"\n",
"if",
"!",
"success",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"pt",
",",
"nil",
"\n",
"}"
] | // UnboxCredential does the inverse of BoxCredential to retrieve the plaintext
// version of a credential. | [
"UnboxCredential",
"does",
"the",
"inverse",
"of",
"BoxCredential",
"to",
"retrieve",
"the",
"plaintext",
"version",
"of",
"a",
"credential",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L278-L309 |
1,617 | manifoldco/torus-cli | daemon/crypto/engine.go | WithUnboxer | func (u *unsealerImpl) WithUnboxer(ctx context.Context, encMec, mecNonce []byte,
fn func(Unboxer) error) error {
nonce := [24]byte{}
copy(nonce[:], mecNonce)
// Get a pointer to the private key buffer
privkb := (*[32]byte)(unsafe.Pointer(&u.privkey.Buffer()[0]))
pubkb := [32]byte{}
copy(pubkb[:], u.pubkey)
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return err
}
mek, success := box.Open([]byte{}, encMec, &nonce, &pubkb, privkb)
if !success {
return errors.New("Failed to decrypt keyring")
}
s, err := u.engine.guard.Secret(mek)
if err != nil {
return err
}
defer s.Destroy()
unboxer := unboxerImpl{mek: s}
return fn(&unboxer)
} | go | func (u *unsealerImpl) WithUnboxer(ctx context.Context, encMec, mecNonce []byte,
fn func(Unboxer) error) error {
nonce := [24]byte{}
copy(nonce[:], mecNonce)
// Get a pointer to the private key buffer
privkb := (*[32]byte)(unsafe.Pointer(&u.privkey.Buffer()[0]))
pubkb := [32]byte{}
copy(pubkb[:], u.pubkey)
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return err
}
mek, success := box.Open([]byte{}, encMec, &nonce, &pubkb, privkb)
if !success {
return errors.New("Failed to decrypt keyring")
}
s, err := u.engine.guard.Secret(mek)
if err != nil {
return err
}
defer s.Destroy()
unboxer := unboxerImpl{mek: s}
return fn(&unboxer)
} | [
"func",
"(",
"u",
"*",
"unsealerImpl",
")",
"WithUnboxer",
"(",
"ctx",
"context",
".",
"Context",
",",
"encMec",
",",
"mecNonce",
"[",
"]",
"byte",
",",
"fn",
"func",
"(",
"Unboxer",
")",
"error",
")",
"error",
"{",
"nonce",
":=",
"[",
"24",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"nonce",
"[",
":",
"]",
",",
"mecNonce",
")",
"\n\n",
"// Get a pointer to the private key buffer",
"privkb",
":=",
"(",
"*",
"[",
"32",
"]",
"byte",
")",
"(",
"unsafe",
".",
"Pointer",
"(",
"&",
"u",
".",
"privkey",
".",
"Buffer",
"(",
")",
"[",
"0",
"]",
")",
")",
"\n",
"pubkb",
":=",
"[",
"32",
"]",
"byte",
"{",
"}",
"\n",
"copy",
"(",
"pubkb",
"[",
":",
"]",
",",
"u",
".",
"pubkey",
")",
"\n\n",
"err",
":=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"mek",
",",
"success",
":=",
"box",
".",
"Open",
"(",
"[",
"]",
"byte",
"{",
"}",
",",
"encMec",
",",
"&",
"nonce",
",",
"&",
"pubkb",
",",
"privkb",
")",
"\n",
"if",
"!",
"success",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"s",
",",
"err",
":=",
"u",
".",
"engine",
".",
"guard",
".",
"Secret",
"(",
"mek",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"defer",
"s",
".",
"Destroy",
"(",
")",
"\n\n",
"unboxer",
":=",
"unboxerImpl",
"{",
"mek",
":",
"s",
"}",
"\n",
"return",
"fn",
"(",
"&",
"unboxer",
")",
"\n",
"}"
] | // WithUnboxer returns an Unboxer for unboxing credentials tied to the unsealed
// keypairs. | [
"WithUnboxer",
"returns",
"an",
"Unboxer",
"for",
"unboxing",
"credentials",
"tied",
"to",
"the",
"unsealed",
"keypairs",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L325-L354 |
1,618 | manifoldco/torus-cli | daemon/crypto/engine.go | WithUnboxer | func (e *Engine) WithUnboxer(ctx context.Context, encMec, mecNonce []byte,
privKP *EncryptionKeyPair, pubKey []byte, fn func(Unboxer) error) error {
mek, err := e.Unbox(ctx, encMec, mecNonce, privKP, pubKey)
if err != nil {
return err
}
defer mek.Destroy()
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return err
}
u := unboxerImpl{mek: mek}
return fn(&u)
} | go | func (e *Engine) WithUnboxer(ctx context.Context, encMec, mecNonce []byte,
privKP *EncryptionKeyPair, pubKey []byte, fn func(Unboxer) error) error {
mek, err := e.Unbox(ctx, encMec, mecNonce, privKP, pubKey)
if err != nil {
return err
}
defer mek.Destroy()
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return err
}
u := unboxerImpl{mek: mek}
return fn(&u)
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"WithUnboxer",
"(",
"ctx",
"context",
".",
"Context",
",",
"encMec",
",",
"mecNonce",
"[",
"]",
"byte",
",",
"privKP",
"*",
"EncryptionKeyPair",
",",
"pubKey",
"[",
"]",
"byte",
",",
"fn",
"func",
"(",
"Unboxer",
")",
"error",
")",
"error",
"{",
"mek",
",",
"err",
":=",
"e",
".",
"Unbox",
"(",
"ctx",
",",
"encMec",
",",
"mecNonce",
",",
"privKP",
",",
"pubKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"defer",
"mek",
".",
"Destroy",
"(",
")",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"u",
":=",
"unboxerImpl",
"{",
"mek",
":",
"mek",
"}",
"\n",
"return",
"fn",
"(",
"&",
"u",
")",
"\n",
"}"
] | // WithUnboxer returns an Unboxer for unboxing credentials within the context
// of the provided keypairs. | [
"WithUnboxer",
"returns",
"an",
"Unboxer",
"for",
"unboxing",
"credentials",
"within",
"the",
"context",
"of",
"the",
"provided",
"keypairs",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L392-L408 |
1,619 | manifoldco/torus-cli | daemon/crypto/engine.go | WithUnsealer | func (e *Engine) WithUnsealer(ctx context.Context, privKP *EncryptionKeyPair,
pubKey []byte, fn func(Unsealer) error) error {
privKey, err := e.Unseal(ctx, privKP.Private, privKP.PNonce)
if err != nil {
return err
}
defer privKey.Destroy()
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return err
}
u := unsealerImpl{privkey: privKey, pubkey: pubKey, engine: e}
return fn(&u)
} | go | func (e *Engine) WithUnsealer(ctx context.Context, privKP *EncryptionKeyPair,
pubKey []byte, fn func(Unsealer) error) error {
privKey, err := e.Unseal(ctx, privKP.Private, privKP.PNonce)
if err != nil {
return err
}
defer privKey.Destroy()
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return err
}
u := unsealerImpl{privkey: privKey, pubkey: pubKey, engine: e}
return fn(&u)
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"WithUnsealer",
"(",
"ctx",
"context",
".",
"Context",
",",
"privKP",
"*",
"EncryptionKeyPair",
",",
"pubKey",
"[",
"]",
"byte",
",",
"fn",
"func",
"(",
"Unsealer",
")",
"error",
")",
"error",
"{",
"privKey",
",",
"err",
":=",
"e",
".",
"Unseal",
"(",
"ctx",
",",
"privKP",
".",
"Private",
",",
"privKP",
".",
"PNonce",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"defer",
"privKey",
".",
"Destroy",
"(",
")",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"u",
":=",
"unsealerImpl",
"{",
"privkey",
":",
"privKey",
",",
"pubkey",
":",
"pubKey",
",",
"engine",
":",
"e",
"}",
"\n",
"return",
"fn",
"(",
"&",
"u",
")",
"\n",
"}"
] | // WithUnsealer returns an Unsealer to unseal keypairs which can
// subsequentently perform crypto operations through the Unsealer interface. | [
"WithUnsealer",
"returns",
"an",
"Unsealer",
"to",
"unseal",
"keypairs",
"which",
"can",
"subsequentently",
"perform",
"crypto",
"operations",
"through",
"the",
"Unsealer",
"interface",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L412-L428 |
1,620 | manifoldco/torus-cli | daemon/crypto/engine.go | CloneMembership | func (e *Engine) CloneMembership(ctx context.Context, encMec, mecNonce []byte, privKP *EncryptionKeyPair, encPubKey, targetPubKey []byte) ([]byte, []byte, error) {
mek, err := e.Unbox(ctx, encMec, mecNonce, privKP, encPubKey)
if err != nil {
return nil, nil, err
}
defer mek.Destroy()
return e.Box(ctx, mek, privKP, targetPubKey)
} | go | func (e *Engine) CloneMembership(ctx context.Context, encMec, mecNonce []byte, privKP *EncryptionKeyPair, encPubKey, targetPubKey []byte) ([]byte, []byte, error) {
mek, err := e.Unbox(ctx, encMec, mecNonce, privKP, encPubKey)
if err != nil {
return nil, nil, err
}
defer mek.Destroy()
return e.Box(ctx, mek, privKP, targetPubKey)
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"CloneMembership",
"(",
"ctx",
"context",
".",
"Context",
",",
"encMec",
",",
"mecNonce",
"[",
"]",
"byte",
",",
"privKP",
"*",
"EncryptionKeyPair",
",",
"encPubKey",
",",
"targetPubKey",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"byte",
",",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"mek",
",",
"err",
":=",
"e",
".",
"Unbox",
"(",
"ctx",
",",
"encMec",
",",
"mecNonce",
",",
"privKP",
",",
"encPubKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"mek",
".",
"Destroy",
"(",
")",
"\n\n",
"return",
"e",
".",
"Box",
"(",
"ctx",
",",
"mek",
",",
"privKP",
",",
"targetPubKey",
")",
"\n",
"}"
] | // CloneMembership decrypts the given KeyringMember object, and creates another
// for the targeted user. | [
"CloneMembership",
"decrypts",
"the",
"given",
"KeyringMember",
"object",
"and",
"creates",
"another",
"for",
"the",
"targeted",
"user",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L432-L440 |
1,621 | manifoldco/torus-cli | daemon/crypto/engine.go | GenerateKeyPairs | func (e *Engine) GenerateKeyPairs(ctx context.Context) (*KeyPairs, error) {
kp := &KeyPairs{}
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pubSig, privSig, err := ed25519.GenerateKey(rand.Reader)
if err != nil {
return nil, err
}
sealedSig, nonceSig, err := e.Seal(ctx, privSig)
if err != nil {
return nil, err
}
kp.Signature.Private = sealedSig
kp.Signature.Public = pubSig
kp.Signature.PNonce = nonceSig
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pubEnc, privEnc, err := box.GenerateKey(rand.Reader)
if err != nil {
return nil, err
}
sealedEnc, nonceEnc, err := e.Seal(ctx, (*privEnc)[:])
if err != nil {
return nil, err
}
kp.Encryption.Private = sealedEnc
kp.Encryption.Public = *pubEnc
kp.Encryption.PNonce = nonceEnc
return kp, nil
} | go | func (e *Engine) GenerateKeyPairs(ctx context.Context) (*KeyPairs, error) {
kp := &KeyPairs{}
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pubSig, privSig, err := ed25519.GenerateKey(rand.Reader)
if err != nil {
return nil, err
}
sealedSig, nonceSig, err := e.Seal(ctx, privSig)
if err != nil {
return nil, err
}
kp.Signature.Private = sealedSig
kp.Signature.Public = pubSig
kp.Signature.PNonce = nonceSig
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
pubEnc, privEnc, err := box.GenerateKey(rand.Reader)
if err != nil {
return nil, err
}
sealedEnc, nonceEnc, err := e.Seal(ctx, (*privEnc)[:])
if err != nil {
return nil, err
}
kp.Encryption.Private = sealedEnc
kp.Encryption.Public = *pubEnc
kp.Encryption.PNonce = nonceEnc
return kp, nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"GenerateKeyPairs",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"KeyPairs",
",",
"error",
")",
"{",
"kp",
":=",
"&",
"KeyPairs",
"{",
"}",
"\n\n",
"err",
":=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"pubSig",
",",
"privSig",
",",
"err",
":=",
"ed25519",
".",
"GenerateKey",
"(",
"rand",
".",
"Reader",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"sealedSig",
",",
"nonceSig",
",",
"err",
":=",
"e",
".",
"Seal",
"(",
"ctx",
",",
"privSig",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"kp",
".",
"Signature",
".",
"Private",
"=",
"sealedSig",
"\n",
"kp",
".",
"Signature",
".",
"Public",
"=",
"pubSig",
"\n",
"kp",
".",
"Signature",
".",
"PNonce",
"=",
"nonceSig",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"pubEnc",
",",
"privEnc",
",",
"err",
":=",
"box",
".",
"GenerateKey",
"(",
"rand",
".",
"Reader",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"sealedEnc",
",",
"nonceEnc",
",",
"err",
":=",
"e",
".",
"Seal",
"(",
"ctx",
",",
"(",
"*",
"privEnc",
")",
"[",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"kp",
".",
"Encryption",
".",
"Private",
"=",
"sealedEnc",
"\n",
"kp",
".",
"Encryption",
".",
"Public",
"=",
"*",
"pubEnc",
"\n",
"kp",
".",
"Encryption",
".",
"PNonce",
"=",
"nonceEnc",
"\n\n",
"return",
"kp",
",",
"nil",
"\n",
"}"
] | // GenerateKeyPairs generates and ed25519 signing key pair, and a curve25519
// encryption key pair for the user, encrypting the private keys in
// triplesec-v3 with the user's master key. | [
"GenerateKeyPairs",
"generates",
"and",
"ed25519",
"signing",
"key",
"pair",
"and",
"a",
"curve25519",
"encryption",
"key",
"pair",
"for",
"the",
"user",
"encrypting",
"the",
"private",
"keys",
"in",
"triplesec",
"-",
"v3",
"with",
"the",
"user",
"s",
"master",
"key",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L445-L487 |
1,622 | manifoldco/torus-cli | daemon/crypto/engine.go | Sign | func (e *Engine) Sign(ctx context.Context, s SignatureKeyPair, b []byte) ([]byte, error) {
pk, err := e.Unseal(ctx, s.Private, s.PNonce)
if err != nil {
return nil, err
}
defer pk.Destroy()
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
return ed25519.Sign(pk.Buffer(), b), nil
} | go | func (e *Engine) Sign(ctx context.Context, s SignatureKeyPair, b []byte) ([]byte, error) {
pk, err := e.Unseal(ctx, s.Private, s.PNonce)
if err != nil {
return nil, err
}
defer pk.Destroy()
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
return ed25519.Sign(pk.Buffer(), b), nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"Sign",
"(",
"ctx",
"context",
".",
"Context",
",",
"s",
"SignatureKeyPair",
",",
"b",
"[",
"]",
"byte",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"pk",
",",
"err",
":=",
"e",
".",
"Unseal",
"(",
"ctx",
",",
"s",
".",
"Private",
",",
"s",
".",
"PNonce",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"pk",
".",
"Destroy",
"(",
")",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"ed25519",
".",
"Sign",
"(",
"pk",
".",
"Buffer",
"(",
")",
",",
"b",
")",
",",
"nil",
"\n",
"}"
] | // Sign signs b bytes using the provided Sealed ed25519 keypair. | [
"Sign",
"signs",
"b",
"bytes",
"using",
"the",
"provided",
"Sealed",
"ed25519",
"keypair",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L490-L503 |
1,623 | manifoldco/torus-cli | daemon/crypto/engine.go | Verify | func (e *Engine) Verify(ctx context.Context, s SignatureKeyPair, b, sig []byte) (bool, error) {
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return false, err
}
return ed25519.Verify(s.Public, b, sig), nil
} | go | func (e *Engine) Verify(ctx context.Context, s SignatureKeyPair, b, sig []byte) (bool, error) {
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return false, err
}
return ed25519.Verify(s.Public, b, sig), nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"Verify",
"(",
"ctx",
"context",
".",
"Context",
",",
"s",
"SignatureKeyPair",
",",
"b",
",",
"sig",
"[",
"]",
"byte",
")",
"(",
"bool",
",",
"error",
")",
"{",
"err",
":=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"ed25519",
".",
"Verify",
"(",
"s",
".",
"Public",
",",
"b",
",",
"sig",
")",
",",
"nil",
"\n",
"}"
] | // Verify verifies that sig is the correct signature for b given
// SignatureKeyPair s. | [
"Verify",
"verifies",
"that",
"sig",
"is",
"the",
"correct",
"signature",
"for",
"b",
"given",
"SignatureKeyPair",
"s",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L507-L514 |
1,624 | manifoldco/torus-cli | daemon/crypto/engine.go | unsealMasterKey | func (e *Engine) unsealMasterKey(ctx context.Context) (*secure.Secret, error) {
if !e.sess.HasPassphrase() {
return nil, ErrMissingPassphrase
}
ts, err := newTriplesec(ctx, e.sess.Passphrase())
if err != nil {
return nil, err
}
masterKey, err := e.sess.MasterKey()
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
mk, err := ts.Decrypt(*masterKey)
if err != nil {
return nil, err
}
return e.guard.Secret(mk)
} | go | func (e *Engine) unsealMasterKey(ctx context.Context) (*secure.Secret, error) {
if !e.sess.HasPassphrase() {
return nil, ErrMissingPassphrase
}
ts, err := newTriplesec(ctx, e.sess.Passphrase())
if err != nil {
return nil, err
}
masterKey, err := e.sess.MasterKey()
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
mk, err := ts.Decrypt(*masterKey)
if err != nil {
return nil, err
}
return e.guard.Secret(mk)
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"unsealMasterKey",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"secure",
".",
"Secret",
",",
"error",
")",
"{",
"if",
"!",
"e",
".",
"sess",
".",
"HasPassphrase",
"(",
")",
"{",
"return",
"nil",
",",
"ErrMissingPassphrase",
"\n",
"}",
"\n\n",
"ts",
",",
"err",
":=",
"newTriplesec",
"(",
"ctx",
",",
"e",
".",
"sess",
".",
"Passphrase",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"masterKey",
",",
"err",
":=",
"e",
".",
"sess",
".",
"MasterKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"mk",
",",
"err",
":=",
"ts",
".",
"Decrypt",
"(",
"*",
"masterKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"e",
".",
"guard",
".",
"Secret",
"(",
"mk",
")",
"\n",
"}"
] | // unsealMasterKey uses the scrypt stretched password to decrypt the master
// password, which is encrypted with triplesec-v3 | [
"unsealMasterKey",
"uses",
"the",
"scrypt",
"stretched",
"password",
"to",
"decrypt",
"the",
"master",
"password",
"which",
"is",
"encrypted",
"with",
"triplesec",
"-",
"v3"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L550-L575 |
1,625 | manifoldco/torus-cli | daemon/crypto/engine.go | ChangePassword | func (e *Engine) ChangePassword(ctx context.Context, newPassword string) (*primitive.UserPassword, *primitive.MasterKey, *primitive.LoginPublicKey, error) {
// We need to re-use the master key
cmk, err := e.unsealMasterKey(ctx)
defer cmk.Destroy()
if err != nil {
return nil, nil, nil, err
}
// Encrypt the new password and re-encrypt the original master key
b := cmk.Buffer()
pw, master, err := EncryptPasswordObject(ctx, newPassword, &b)
if err != nil {
return nil, nil, nil, err
}
// Now derive LoginKeypair
s, err := base64.NewFromString(pw.Salt)
if err != nil {
return nil, nil, nil, err
}
keypair, err := DeriveLoginKeypair(ctx, []byte(newPassword), s)
if err != nil {
return nil, nil, nil, err
}
return pw, master, &primitive.LoginPublicKey{
Salt: keypair.Salt(),
Value: keypair.PublicKey(),
Alg: EdDSA,
}, nil
} | go | func (e *Engine) ChangePassword(ctx context.Context, newPassword string) (*primitive.UserPassword, *primitive.MasterKey, *primitive.LoginPublicKey, error) {
// We need to re-use the master key
cmk, err := e.unsealMasterKey(ctx)
defer cmk.Destroy()
if err != nil {
return nil, nil, nil, err
}
// Encrypt the new password and re-encrypt the original master key
b := cmk.Buffer()
pw, master, err := EncryptPasswordObject(ctx, newPassword, &b)
if err != nil {
return nil, nil, nil, err
}
// Now derive LoginKeypair
s, err := base64.NewFromString(pw.Salt)
if err != nil {
return nil, nil, nil, err
}
keypair, err := DeriveLoginKeypair(ctx, []byte(newPassword), s)
if err != nil {
return nil, nil, nil, err
}
return pw, master, &primitive.LoginPublicKey{
Salt: keypair.Salt(),
Value: keypair.PublicKey(),
Alg: EdDSA,
}, nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"ChangePassword",
"(",
"ctx",
"context",
".",
"Context",
",",
"newPassword",
"string",
")",
"(",
"*",
"primitive",
".",
"UserPassword",
",",
"*",
"primitive",
".",
"MasterKey",
",",
"*",
"primitive",
".",
"LoginPublicKey",
",",
"error",
")",
"{",
"// We need to re-use the master key",
"cmk",
",",
"err",
":=",
"e",
".",
"unsealMasterKey",
"(",
"ctx",
")",
"\n",
"defer",
"cmk",
".",
"Destroy",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Encrypt the new password and re-encrypt the original master key",
"b",
":=",
"cmk",
".",
"Buffer",
"(",
")",
"\n",
"pw",
",",
"master",
",",
"err",
":=",
"EncryptPasswordObject",
"(",
"ctx",
",",
"newPassword",
",",
"&",
"b",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Now derive LoginKeypair",
"s",
",",
"err",
":=",
"base64",
".",
"NewFromString",
"(",
"pw",
".",
"Salt",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"keypair",
",",
"err",
":=",
"DeriveLoginKeypair",
"(",
"ctx",
",",
"[",
"]",
"byte",
"(",
"newPassword",
")",
",",
"s",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"pw",
",",
"master",
",",
"&",
"primitive",
".",
"LoginPublicKey",
"{",
"Salt",
":",
"keypair",
".",
"Salt",
"(",
")",
",",
"Value",
":",
"keypair",
".",
"PublicKey",
"(",
")",
",",
"Alg",
":",
"EdDSA",
",",
"}",
",",
"nil",
"\n",
"}"
] | // ChangePassword creates a password object and re-encrypts the master key | [
"ChangePassword",
"creates",
"a",
"password",
"object",
"and",
"re",
"-",
"encrypts",
"the",
"master",
"key"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L592-L623 |
1,626 | manifoldco/torus-cli | daemon/crypto/engine.go | deriveKey | func deriveKey(ctx context.Context, mk, nonce []byte, size uint8) ([]byte, error) {
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
h := blake2b.NewMAC(size, nonce) // NewMAC can panic if size is too big.
h.Sum(mk)
return h.Sum(nil), nil
} | go | func deriveKey(ctx context.Context, mk, nonce []byte, size uint8) ([]byte, error) {
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
h := blake2b.NewMAC(size, nonce) // NewMAC can panic if size is too big.
h.Sum(mk)
return h.Sum(nil), nil
} | [
"func",
"deriveKey",
"(",
"ctx",
"context",
".",
"Context",
",",
"mk",
",",
"nonce",
"[",
"]",
"byte",
",",
"size",
"uint8",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"err",
":=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"h",
":=",
"blake2b",
".",
"NewMAC",
"(",
"size",
",",
"nonce",
")",
"// NewMAC can panic if size is too big.",
"\n",
"h",
".",
"Sum",
"(",
"mk",
")",
"\n",
"return",
"h",
".",
"Sum",
"(",
"nil",
")",
",",
"nil",
"\n",
"}"
] | // deriveKey Derives a single use key from the given master key via blake2b
// and a nonce. | [
"deriveKey",
"Derives",
"a",
"single",
"use",
"key",
"from",
"the",
"given",
"master",
"key",
"via",
"blake2b",
"and",
"a",
"nonce",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/engine.go#L627-L636 |
1,627 | manifoldco/torus-cli | daemon/daemon.go | New | func New(cfg *config.Config, groupShared bool) (*Daemon, error) {
lock, err := lockfile.New(cfg.PidPath)
if err != nil {
return nil, fmt.Errorf("Failed to create lockfile object: %s", err)
}
err = lock.TryLock()
if err != nil {
return nil, fmt.Errorf(
"Failed to create lockfile[%s]: %s", cfg.PidPath, err)
}
// Recover from the panic and return the error; this way we can
// delete the lockfile!
defer func() {
if r := recover(); r != nil {
err, _ = r.(error)
}
}()
if groupShared {
if err = os.Chmod(string(lock), 0640); err != nil {
return nil, err
}
}
db, err := db.NewDB(cfg.DBPath)
if err != nil {
return nil, err
}
guard := secure.NewGuard()
session := session.NewSession(guard)
cryptoEngine := crypto.NewEngine(session, guard)
transport := utils.CreateHTTPTransport(cfg.CABundle, strings.Split(cfg.RegistryURI.Host, ":")[0])
client := registry.NewClient(cfg.RegistryURI.String(), cfg.APIVersion,
cfg.Version, session, transport)
logic := logic.NewEngine(session, db, cryptoEngine, client, guard)
mTransport := utils.CreateHTTPTransport(cfg.CABundle, strings.Split(cfg.ManifestURI.Host, ":")[0])
updates := updates.NewEngine(cfg, mTransport)
proxy, err := socket.NewAuthProxy(cfg, session, db, transport, client, logic, updates, groupShared)
if err != nil {
return nil, fmt.Errorf("Failed to create auth proxy: %s", err)
}
daemon := &Daemon{
proxy: proxy,
lock: lock,
session: session,
config: cfg,
db: db,
logic: logic,
hasShutdown: false,
updates: updates,
}
return daemon, nil
} | go | func New(cfg *config.Config, groupShared bool) (*Daemon, error) {
lock, err := lockfile.New(cfg.PidPath)
if err != nil {
return nil, fmt.Errorf("Failed to create lockfile object: %s", err)
}
err = lock.TryLock()
if err != nil {
return nil, fmt.Errorf(
"Failed to create lockfile[%s]: %s", cfg.PidPath, err)
}
// Recover from the panic and return the error; this way we can
// delete the lockfile!
defer func() {
if r := recover(); r != nil {
err, _ = r.(error)
}
}()
if groupShared {
if err = os.Chmod(string(lock), 0640); err != nil {
return nil, err
}
}
db, err := db.NewDB(cfg.DBPath)
if err != nil {
return nil, err
}
guard := secure.NewGuard()
session := session.NewSession(guard)
cryptoEngine := crypto.NewEngine(session, guard)
transport := utils.CreateHTTPTransport(cfg.CABundle, strings.Split(cfg.RegistryURI.Host, ":")[0])
client := registry.NewClient(cfg.RegistryURI.String(), cfg.APIVersion,
cfg.Version, session, transport)
logic := logic.NewEngine(session, db, cryptoEngine, client, guard)
mTransport := utils.CreateHTTPTransport(cfg.CABundle, strings.Split(cfg.ManifestURI.Host, ":")[0])
updates := updates.NewEngine(cfg, mTransport)
proxy, err := socket.NewAuthProxy(cfg, session, db, transport, client, logic, updates, groupShared)
if err != nil {
return nil, fmt.Errorf("Failed to create auth proxy: %s", err)
}
daemon := &Daemon{
proxy: proxy,
lock: lock,
session: session,
config: cfg,
db: db,
logic: logic,
hasShutdown: false,
updates: updates,
}
return daemon, nil
} | [
"func",
"New",
"(",
"cfg",
"*",
"config",
".",
"Config",
",",
"groupShared",
"bool",
")",
"(",
"*",
"Daemon",
",",
"error",
")",
"{",
"lock",
",",
"err",
":=",
"lockfile",
".",
"New",
"(",
"cfg",
".",
"PidPath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"lock",
".",
"TryLock",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"cfg",
".",
"PidPath",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Recover from the panic and return the error; this way we can",
"// delete the lockfile!",
"defer",
"func",
"(",
")",
"{",
"if",
"r",
":=",
"recover",
"(",
")",
";",
"r",
"!=",
"nil",
"{",
"err",
",",
"_",
"=",
"r",
".",
"(",
"error",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"if",
"groupShared",
"{",
"if",
"err",
"=",
"os",
".",
"Chmod",
"(",
"string",
"(",
"lock",
")",
",",
"0640",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"db",
",",
"err",
":=",
"db",
".",
"NewDB",
"(",
"cfg",
".",
"DBPath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"guard",
":=",
"secure",
".",
"NewGuard",
"(",
")",
"\n",
"session",
":=",
"session",
".",
"NewSession",
"(",
"guard",
")",
"\n",
"cryptoEngine",
":=",
"crypto",
".",
"NewEngine",
"(",
"session",
",",
"guard",
")",
"\n",
"transport",
":=",
"utils",
".",
"CreateHTTPTransport",
"(",
"cfg",
".",
"CABundle",
",",
"strings",
".",
"Split",
"(",
"cfg",
".",
"RegistryURI",
".",
"Host",
",",
"\"",
"\"",
")",
"[",
"0",
"]",
")",
"\n",
"client",
":=",
"registry",
".",
"NewClient",
"(",
"cfg",
".",
"RegistryURI",
".",
"String",
"(",
")",
",",
"cfg",
".",
"APIVersion",
",",
"cfg",
".",
"Version",
",",
"session",
",",
"transport",
")",
"\n",
"logic",
":=",
"logic",
".",
"NewEngine",
"(",
"session",
",",
"db",
",",
"cryptoEngine",
",",
"client",
",",
"guard",
")",
"\n\n",
"mTransport",
":=",
"utils",
".",
"CreateHTTPTransport",
"(",
"cfg",
".",
"CABundle",
",",
"strings",
".",
"Split",
"(",
"cfg",
".",
"ManifestURI",
".",
"Host",
",",
"\"",
"\"",
")",
"[",
"0",
"]",
")",
"\n",
"updates",
":=",
"updates",
".",
"NewEngine",
"(",
"cfg",
",",
"mTransport",
")",
"\n\n",
"proxy",
",",
"err",
":=",
"socket",
".",
"NewAuthProxy",
"(",
"cfg",
",",
"session",
",",
"db",
",",
"transport",
",",
"client",
",",
"logic",
",",
"updates",
",",
"groupShared",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"daemon",
":=",
"&",
"Daemon",
"{",
"proxy",
":",
"proxy",
",",
"lock",
":",
"lock",
",",
"session",
":",
"session",
",",
"config",
":",
"cfg",
",",
"db",
":",
"db",
",",
"logic",
":",
"logic",
",",
"hasShutdown",
":",
"false",
",",
"updates",
":",
"updates",
",",
"}",
"\n\n",
"return",
"daemon",
",",
"nil",
"\n",
"}"
] | // New creates a new Daemon. | [
"New",
"creates",
"a",
"new",
"Daemon",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/daemon.go#L43-L102 |
1,628 | manifoldco/torus-cli | daemon/daemon.go | Run | func (d *Daemon) Run() error {
email, hasEmail := os.LookupEnv("TORUS_EMAIL")
password, hasPassword := os.LookupEnv("TORUS_PASSWORD")
tokenID, hasTokenID := os.LookupEnv("TORUS_TOKEN_ID")
tokenSecret, hasTokenSecret := os.LookupEnv("TORUS_TOKEN_SECRET")
if hasEmail && hasPassword {
log.Printf("Attempting to login as: %s", email)
userLogin := &apitypes.UserLogin{
Email: email,
Password: password,
}
err := d.logic.Session.Login(context.Background(), userLogin)
if err != nil {
return err
}
}
if hasTokenID && hasTokenSecret {
log.Printf("Attempting to login as machine token id: %s", tokenID)
ID, err := identity.DecodeFromString(tokenID)
if err != nil {
log.Printf("Could not parse TORUS_TOKEN_ID")
return err
}
secret, err := base64.NewFromString(tokenSecret)
if err != nil {
log.Printf("Could not parse TORUS_TOKEN_SECRET")
return err
}
machineLogin := &apitypes.MachineLogin{
TokenID: &ID,
Secret: secret,
}
err = d.logic.Session.Login(context.Background(), machineLogin)
if err != nil {
return err
}
}
if err := d.updates.Start(); err != nil {
log.Printf("cannot start updates checker: %s", err)
}
return d.proxy.Listen()
} | go | func (d *Daemon) Run() error {
email, hasEmail := os.LookupEnv("TORUS_EMAIL")
password, hasPassword := os.LookupEnv("TORUS_PASSWORD")
tokenID, hasTokenID := os.LookupEnv("TORUS_TOKEN_ID")
tokenSecret, hasTokenSecret := os.LookupEnv("TORUS_TOKEN_SECRET")
if hasEmail && hasPassword {
log.Printf("Attempting to login as: %s", email)
userLogin := &apitypes.UserLogin{
Email: email,
Password: password,
}
err := d.logic.Session.Login(context.Background(), userLogin)
if err != nil {
return err
}
}
if hasTokenID && hasTokenSecret {
log.Printf("Attempting to login as machine token id: %s", tokenID)
ID, err := identity.DecodeFromString(tokenID)
if err != nil {
log.Printf("Could not parse TORUS_TOKEN_ID")
return err
}
secret, err := base64.NewFromString(tokenSecret)
if err != nil {
log.Printf("Could not parse TORUS_TOKEN_SECRET")
return err
}
machineLogin := &apitypes.MachineLogin{
TokenID: &ID,
Secret: secret,
}
err = d.logic.Session.Login(context.Background(), machineLogin)
if err != nil {
return err
}
}
if err := d.updates.Start(); err != nil {
log.Printf("cannot start updates checker: %s", err)
}
return d.proxy.Listen()
} | [
"func",
"(",
"d",
"*",
"Daemon",
")",
"Run",
"(",
")",
"error",
"{",
"email",
",",
"hasEmail",
":=",
"os",
".",
"LookupEnv",
"(",
"\"",
"\"",
")",
"\n",
"password",
",",
"hasPassword",
":=",
"os",
".",
"LookupEnv",
"(",
"\"",
"\"",
")",
"\n",
"tokenID",
",",
"hasTokenID",
":=",
"os",
".",
"LookupEnv",
"(",
"\"",
"\"",
")",
"\n",
"tokenSecret",
",",
"hasTokenSecret",
":=",
"os",
".",
"LookupEnv",
"(",
"\"",
"\"",
")",
"\n\n",
"if",
"hasEmail",
"&&",
"hasPassword",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"email",
")",
"\n",
"userLogin",
":=",
"&",
"apitypes",
".",
"UserLogin",
"{",
"Email",
":",
"email",
",",
"Password",
":",
"password",
",",
"}",
"\n\n",
"err",
":=",
"d",
".",
"logic",
".",
"Session",
".",
"Login",
"(",
"context",
".",
"Background",
"(",
")",
",",
"userLogin",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"hasTokenID",
"&&",
"hasTokenSecret",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"tokenID",
")",
"\n\n",
"ID",
",",
"err",
":=",
"identity",
".",
"DecodeFromString",
"(",
"tokenID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"secret",
",",
"err",
":=",
"base64",
".",
"NewFromString",
"(",
"tokenSecret",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"machineLogin",
":=",
"&",
"apitypes",
".",
"MachineLogin",
"{",
"TokenID",
":",
"&",
"ID",
",",
"Secret",
":",
"secret",
",",
"}",
"\n\n",
"err",
"=",
"d",
".",
"logic",
".",
"Session",
".",
"Login",
"(",
"context",
".",
"Background",
"(",
")",
",",
"machineLogin",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"updates",
".",
"Start",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"d",
".",
"proxy",
".",
"Listen",
"(",
")",
"\n",
"}"
] | // Run starts the daemon main loop. It returns on failure, or when the daemon
// has been gracefully shut down. | [
"Run",
"starts",
"the",
"daemon",
"main",
"loop",
".",
"It",
"returns",
"on",
"failure",
"or",
"when",
"the",
"daemon",
"has",
"been",
"gracefully",
"shut",
"down",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/daemon.go#L111-L161 |
1,629 | manifoldco/torus-cli | daemon/daemon.go | Shutdown | func (d *Daemon) Shutdown() error {
if d.hasShutdown {
return nil
}
d.hasShutdown = true
if err := d.lock.Unlock(); err != nil {
return fmt.Errorf("Could not unlock: %s", err)
}
if err := d.proxy.Close(); err != nil {
return fmt.Errorf("Could not stop http proxy: %s", err)
}
if err := d.db.Close(); err != nil {
return fmt.Errorf("Could not close db: %s", err)
}
if err := d.updates.Stop(); err != nil {
return fmt.Errorf("Could not stop update checker: %s", err)
}
return nil
} | go | func (d *Daemon) Shutdown() error {
if d.hasShutdown {
return nil
}
d.hasShutdown = true
if err := d.lock.Unlock(); err != nil {
return fmt.Errorf("Could not unlock: %s", err)
}
if err := d.proxy.Close(); err != nil {
return fmt.Errorf("Could not stop http proxy: %s", err)
}
if err := d.db.Close(); err != nil {
return fmt.Errorf("Could not close db: %s", err)
}
if err := d.updates.Stop(); err != nil {
return fmt.Errorf("Could not stop update checker: %s", err)
}
return nil
} | [
"func",
"(",
"d",
"*",
"Daemon",
")",
"Shutdown",
"(",
")",
"error",
"{",
"if",
"d",
".",
"hasShutdown",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"d",
".",
"hasShutdown",
"=",
"true",
"\n",
"if",
"err",
":=",
"d",
".",
"lock",
".",
"Unlock",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"proxy",
".",
"Close",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"db",
".",
"Close",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"d",
".",
"updates",
".",
"Stop",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Shutdown gracefully shuts down the daemon. | [
"Shutdown",
"gracefully",
"shuts",
"down",
"the",
"daemon",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/daemon.go#L164-L187 |
1,630 | manifoldco/torus-cli | registry/keyring.go | FindMember | func (k *KeyringSectionV1) FindMember(id *identity.ID) (*primitive.KeyringMember, *primitive.MEKShare, error) {
var krm *primitive.KeyringMember
var mekshare *primitive.MEKShare
for _, m := range k.Members {
if *m.Body.OwnerID == *id {
krm, mekshare = convertV1KRM(&m)
break
}
}
if krm == nil {
return nil, nil, ErrMemberNotFound
}
return krm, mekshare, nil
} | go | func (k *KeyringSectionV1) FindMember(id *identity.ID) (*primitive.KeyringMember, *primitive.MEKShare, error) {
var krm *primitive.KeyringMember
var mekshare *primitive.MEKShare
for _, m := range k.Members {
if *m.Body.OwnerID == *id {
krm, mekshare = convertV1KRM(&m)
break
}
}
if krm == nil {
return nil, nil, ErrMemberNotFound
}
return krm, mekshare, nil
} | [
"func",
"(",
"k",
"*",
"KeyringSectionV1",
")",
"FindMember",
"(",
"id",
"*",
"identity",
".",
"ID",
")",
"(",
"*",
"primitive",
".",
"KeyringMember",
",",
"*",
"primitive",
".",
"MEKShare",
",",
"error",
")",
"{",
"var",
"krm",
"*",
"primitive",
".",
"KeyringMember",
"\n",
"var",
"mekshare",
"*",
"primitive",
".",
"MEKShare",
"\n",
"for",
"_",
",",
"m",
":=",
"range",
"k",
".",
"Members",
"{",
"if",
"*",
"m",
".",
"Body",
".",
"OwnerID",
"==",
"*",
"id",
"{",
"krm",
",",
"mekshare",
"=",
"convertV1KRM",
"(",
"&",
"m",
")",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"krm",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"ErrMemberNotFound",
"\n",
"}",
"\n\n",
"return",
"krm",
",",
"mekshare",
",",
"nil",
"\n",
"}"
] | // FindMember returns the membership and mekshare for the given user id.
// The data is returned in V2 format. | [
"FindMember",
"returns",
"the",
"membership",
"and",
"mekshare",
"for",
"the",
"given",
"user",
"id",
".",
"The",
"data",
"is",
"returned",
"in",
"V2",
"format",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/keyring.go#L54-L69 |
1,631 | manifoldco/torus-cli | registry/keyring.go | FindMEKByKeyID | func (k *KeyringSectionV1) FindMEKByKeyID(id *identity.ID) (*primitive.MEKShare, error) {
var mekshare *primitive.MEKShare
for _, m := range k.Members {
if *m.Body.EncryptingKeyID == *id {
mekshare = &primitive.MEKShare{
Key: m.Body.Key,
}
break
}
}
if mekshare == nil {
return nil, ErrMemberNotFound
}
return mekshare, nil
} | go | func (k *KeyringSectionV1) FindMEKByKeyID(id *identity.ID) (*primitive.MEKShare, error) {
var mekshare *primitive.MEKShare
for _, m := range k.Members {
if *m.Body.EncryptingKeyID == *id {
mekshare = &primitive.MEKShare{
Key: m.Body.Key,
}
break
}
}
if mekshare == nil {
return nil, ErrMemberNotFound
}
return mekshare, nil
} | [
"func",
"(",
"k",
"*",
"KeyringSectionV1",
")",
"FindMEKByKeyID",
"(",
"id",
"*",
"identity",
".",
"ID",
")",
"(",
"*",
"primitive",
".",
"MEKShare",
",",
"error",
")",
"{",
"var",
"mekshare",
"*",
"primitive",
".",
"MEKShare",
"\n",
"for",
"_",
",",
"m",
":=",
"range",
"k",
".",
"Members",
"{",
"if",
"*",
"m",
".",
"Body",
".",
"EncryptingKeyID",
"==",
"*",
"id",
"{",
"mekshare",
"=",
"&",
"primitive",
".",
"MEKShare",
"{",
"Key",
":",
"m",
".",
"Body",
".",
"Key",
",",
"}",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"mekshare",
"==",
"nil",
"{",
"return",
"nil",
",",
"ErrMemberNotFound",
"\n",
"}",
"\n\n",
"return",
"mekshare",
",",
"nil",
"\n",
"}"
] | // FindMEKByKeyID returns the MEKShare for the given encrypting key id.
//
// The data is returned in the V2 format. | [
"FindMEKByKeyID",
"returns",
"the",
"MEKShare",
"for",
"the",
"given",
"encrypting",
"key",
"id",
".",
"The",
"data",
"is",
"returned",
"in",
"the",
"V2",
"format",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/keyring.go#L74-L90 |
1,632 | manifoldco/torus-cli | registry/keyring.go | HasRevocations | func (k *KeyringSectionV2) HasRevocations() bool {
for _, claim := range k.Claims {
if claim.Body.ClaimType == primitive.RevocationClaimType {
return true
}
}
return false
} | go | func (k *KeyringSectionV2) HasRevocations() bool {
for _, claim := range k.Claims {
if claim.Body.ClaimType == primitive.RevocationClaimType {
return true
}
}
return false
} | [
"func",
"(",
"k",
"*",
"KeyringSectionV2",
")",
"HasRevocations",
"(",
")",
"bool",
"{",
"for",
"_",
",",
"claim",
":=",
"range",
"k",
".",
"Claims",
"{",
"if",
"claim",
".",
"Body",
".",
"ClaimType",
"==",
"primitive",
".",
"RevocationClaimType",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // HasRevocations indicates that a Keyring holds revoked user keys. | [
"HasRevocations",
"indicates",
"that",
"a",
"Keyring",
"holds",
"revoked",
"user",
"keys",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/keyring.go#L213-L220 |
1,633 | manifoldco/torus-cli | registry/keyring.go | List | func (k *KeyringClient) List(ctx context.Context, orgID *identity.ID,
ownerID *identity.ID) ([]KeyringSection, error) {
query := &url.Values{}
if orgID != nil {
query.Set("org_id", orgID.String())
}
if ownerID != nil {
query.Set("owner_id", ownerID.String())
}
resp := []struct {
Keyring *envelope.Signed `json:"keyring"`
Members json.RawMessage `json:"members"`
Claims []envelope.KeyringMemberClaim `json:"claims"`
}{}
err := k.client.RoundTrip(ctx, "GET", "/keyrings", query, nil, &resp)
if err != nil {
return nil, err
}
converted := make([]KeyringSection, len(resp))
for i, k := range resp {
if k.Keyring.Version == 1 {
kre := &envelope.KeyringV1{
ID: k.Keyring.ID,
Version: k.Keyring.Version,
Signature: k.Keyring.Signature,
Body: k.Keyring.Body.(*primitive.KeyringV1),
}
s := KeyringSectionV1{
Keyring: kre,
}
err := json.Unmarshal(k.Members, &s.Members)
if err != nil {
return nil, err
}
converted[i] = &s
} else {
kre := &envelope.Keyring{
ID: k.Keyring.ID,
Version: k.Keyring.Version,
Signature: k.Keyring.Signature,
Body: k.Keyring.Body.(*primitive.Keyring),
}
s := KeyringSectionV2{
Keyring: kre,
Claims: k.Claims,
}
err := json.Unmarshal(k.Members, &s.Members)
if err != nil {
return nil, err
}
converted[i] = &s
}
}
return converted, nil
} | go | func (k *KeyringClient) List(ctx context.Context, orgID *identity.ID,
ownerID *identity.ID) ([]KeyringSection, error) {
query := &url.Values{}
if orgID != nil {
query.Set("org_id", orgID.String())
}
if ownerID != nil {
query.Set("owner_id", ownerID.String())
}
resp := []struct {
Keyring *envelope.Signed `json:"keyring"`
Members json.RawMessage `json:"members"`
Claims []envelope.KeyringMemberClaim `json:"claims"`
}{}
err := k.client.RoundTrip(ctx, "GET", "/keyrings", query, nil, &resp)
if err != nil {
return nil, err
}
converted := make([]KeyringSection, len(resp))
for i, k := range resp {
if k.Keyring.Version == 1 {
kre := &envelope.KeyringV1{
ID: k.Keyring.ID,
Version: k.Keyring.Version,
Signature: k.Keyring.Signature,
Body: k.Keyring.Body.(*primitive.KeyringV1),
}
s := KeyringSectionV1{
Keyring: kre,
}
err := json.Unmarshal(k.Members, &s.Members)
if err != nil {
return nil, err
}
converted[i] = &s
} else {
kre := &envelope.Keyring{
ID: k.Keyring.ID,
Version: k.Keyring.Version,
Signature: k.Keyring.Signature,
Body: k.Keyring.Body.(*primitive.Keyring),
}
s := KeyringSectionV2{
Keyring: kre,
Claims: k.Claims,
}
err := json.Unmarshal(k.Members, &s.Members)
if err != nil {
return nil, err
}
converted[i] = &s
}
}
return converted, nil
} | [
"func",
"(",
"k",
"*",
"KeyringClient",
")",
"List",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
",",
"ownerID",
"*",
"identity",
".",
"ID",
")",
"(",
"[",
"]",
"KeyringSection",
",",
"error",
")",
"{",
"query",
":=",
"&",
"url",
".",
"Values",
"{",
"}",
"\n\n",
"if",
"orgID",
"!=",
"nil",
"{",
"query",
".",
"Set",
"(",
"\"",
"\"",
",",
"orgID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"if",
"ownerID",
"!=",
"nil",
"{",
"query",
".",
"Set",
"(",
"\"",
"\"",
",",
"ownerID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n\n",
"resp",
":=",
"[",
"]",
"struct",
"{",
"Keyring",
"*",
"envelope",
".",
"Signed",
"`json:\"keyring\"`",
"\n",
"Members",
"json",
".",
"RawMessage",
"`json:\"members\"`",
"\n",
"Claims",
"[",
"]",
"envelope",
".",
"KeyringMemberClaim",
"`json:\"claims\"`",
"\n",
"}",
"{",
"}",
"\n\n",
"err",
":=",
"k",
".",
"client",
".",
"RoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"query",
",",
"nil",
",",
"&",
"resp",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"converted",
":=",
"make",
"(",
"[",
"]",
"KeyringSection",
",",
"len",
"(",
"resp",
")",
")",
"\n",
"for",
"i",
",",
"k",
":=",
"range",
"resp",
"{",
"if",
"k",
".",
"Keyring",
".",
"Version",
"==",
"1",
"{",
"kre",
":=",
"&",
"envelope",
".",
"KeyringV1",
"{",
"ID",
":",
"k",
".",
"Keyring",
".",
"ID",
",",
"Version",
":",
"k",
".",
"Keyring",
".",
"Version",
",",
"Signature",
":",
"k",
".",
"Keyring",
".",
"Signature",
",",
"Body",
":",
"k",
".",
"Keyring",
".",
"Body",
".",
"(",
"*",
"primitive",
".",
"KeyringV1",
")",
",",
"}",
"\n\n",
"s",
":=",
"KeyringSectionV1",
"{",
"Keyring",
":",
"kre",
",",
"}",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"k",
".",
"Members",
",",
"&",
"s",
".",
"Members",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"converted",
"[",
"i",
"]",
"=",
"&",
"s",
"\n",
"}",
"else",
"{",
"kre",
":=",
"&",
"envelope",
".",
"Keyring",
"{",
"ID",
":",
"k",
".",
"Keyring",
".",
"ID",
",",
"Version",
":",
"k",
".",
"Keyring",
".",
"Version",
",",
"Signature",
":",
"k",
".",
"Keyring",
".",
"Signature",
",",
"Body",
":",
"k",
".",
"Keyring",
".",
"Body",
".",
"(",
"*",
"primitive",
".",
"Keyring",
")",
",",
"}",
"\n",
"s",
":=",
"KeyringSectionV2",
"{",
"Keyring",
":",
"kre",
",",
"Claims",
":",
"k",
".",
"Claims",
",",
"}",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"k",
".",
"Members",
",",
"&",
"s",
".",
"Members",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"converted",
"[",
"i",
"]",
"=",
"&",
"s",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"converted",
",",
"nil",
"\n",
"}"
] | // List retrieves an array of KeyringSections from the registry. | [
"List",
"retrieves",
"an",
"array",
"of",
"KeyringSections",
"from",
"the",
"registry",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/keyring.go#L235-L296 |
1,634 | manifoldco/torus-cli | registry/teams.go | List | func (t *TeamsClient) List(ctx context.Context, orgID *identity.ID, name string, teamType primitive.TeamType) ([]envelope.Team, error) {
v := &url.Values{}
if orgID != nil {
v.Set("org_id", orgID.String())
}
if name != "" {
v.Set("name", name)
}
if teamType != primitive.AnyTeamType {
v.Set("type", string(teamType))
}
var teams []envelope.Team
err := t.client.RoundTrip(ctx, "GET", "/teams", v, nil, &teams)
return teams, err
} | go | func (t *TeamsClient) List(ctx context.Context, orgID *identity.ID, name string, teamType primitive.TeamType) ([]envelope.Team, error) {
v := &url.Values{}
if orgID != nil {
v.Set("org_id", orgID.String())
}
if name != "" {
v.Set("name", name)
}
if teamType != primitive.AnyTeamType {
v.Set("type", string(teamType))
}
var teams []envelope.Team
err := t.client.RoundTrip(ctx, "GET", "/teams", v, nil, &teams)
return teams, err
} | [
"func",
"(",
"t",
"*",
"TeamsClient",
")",
"List",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
",",
"name",
"string",
",",
"teamType",
"primitive",
".",
"TeamType",
")",
"(",
"[",
"]",
"envelope",
".",
"Team",
",",
"error",
")",
"{",
"v",
":=",
"&",
"url",
".",
"Values",
"{",
"}",
"\n\n",
"if",
"orgID",
"!=",
"nil",
"{",
"v",
".",
"Set",
"(",
"\"",
"\"",
",",
"orgID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"if",
"name",
"!=",
"\"",
"\"",
"{",
"v",
".",
"Set",
"(",
"\"",
"\"",
",",
"name",
")",
"\n",
"}",
"\n",
"if",
"teamType",
"!=",
"primitive",
".",
"AnyTeamType",
"{",
"v",
".",
"Set",
"(",
"\"",
"\"",
",",
"string",
"(",
"teamType",
")",
")",
"\n",
"}",
"\n\n",
"var",
"teams",
"[",
"]",
"envelope",
".",
"Team",
"\n",
"err",
":=",
"t",
".",
"client",
".",
"RoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"v",
",",
"nil",
",",
"&",
"teams",
")",
"\n",
"return",
"teams",
",",
"err",
"\n",
"}"
] | // List retrieves all teams for an org based on the filtered values | [
"List",
"retrieves",
"all",
"teams",
"for",
"an",
"org",
"based",
"on",
"the",
"filtered",
"values"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/teams.go#L19-L35 |
1,635 | manifoldco/torus-cli | registry/teams.go | GetByOrg | func (t *TeamsClient) GetByOrg(ctx context.Context, orgID *identity.ID) ([]envelope.Team, error) {
return t.List(ctx, orgID, "", primitive.AnyTeamType)
} | go | func (t *TeamsClient) GetByOrg(ctx context.Context, orgID *identity.ID) ([]envelope.Team, error) {
return t.List(ctx, orgID, "", primitive.AnyTeamType)
} | [
"func",
"(",
"t",
"*",
"TeamsClient",
")",
"GetByOrg",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
")",
"(",
"[",
"]",
"envelope",
".",
"Team",
",",
"error",
")",
"{",
"return",
"t",
".",
"List",
"(",
"ctx",
",",
"orgID",
",",
"\"",
"\"",
",",
"primitive",
".",
"AnyTeamType",
")",
"\n",
"}"
] | // GetByOrg retrieves all teams for an org id | [
"GetByOrg",
"retrieves",
"all",
"teams",
"for",
"an",
"org",
"id"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/teams.go#L38-L40 |
1,636 | manifoldco/torus-cli | registry/teams.go | GetByName | func (t *TeamsClient) GetByName(ctx context.Context, orgID *identity.ID, name string) ([]envelope.Team, error) {
return t.List(ctx, orgID, name, primitive.AnyTeamType)
} | go | func (t *TeamsClient) GetByName(ctx context.Context, orgID *identity.ID, name string) ([]envelope.Team, error) {
return t.List(ctx, orgID, name, primitive.AnyTeamType)
} | [
"func",
"(",
"t",
"*",
"TeamsClient",
")",
"GetByName",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
",",
"name",
"string",
")",
"(",
"[",
"]",
"envelope",
".",
"Team",
",",
"error",
")",
"{",
"return",
"t",
".",
"List",
"(",
"ctx",
",",
"orgID",
",",
"name",
",",
"primitive",
".",
"AnyTeamType",
")",
"\n",
"}"
] | // GetByName retrieves the team with the specified name | [
"GetByName",
"retrieves",
"the",
"team",
"with",
"the",
"specified",
"name"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/teams.go#L43-L45 |
1,637 | manifoldco/torus-cli | registry/teams.go | Create | func (t *TeamsClient) Create(ctx context.Context, orgID *identity.ID, name string,
teamType primitive.TeamType) (*envelope.Team, error) {
if orgID == nil {
return nil, errors.New("invalid org")
}
teamBody := primitive.Team{
Name: name,
OrgID: orgID,
TeamType: teamType,
}
ID, err := identity.NewMutable(&teamBody)
if err != nil {
return nil, err
}
team := envelope.Team{
ID: &ID,
Version: 1,
Body: &teamBody,
}
result := &envelope.Team{}
err = t.client.RoundTrip(ctx, "POST", "/teams", nil, &team, result)
return result, err
} | go | func (t *TeamsClient) Create(ctx context.Context, orgID *identity.ID, name string,
teamType primitive.TeamType) (*envelope.Team, error) {
if orgID == nil {
return nil, errors.New("invalid org")
}
teamBody := primitive.Team{
Name: name,
OrgID: orgID,
TeamType: teamType,
}
ID, err := identity.NewMutable(&teamBody)
if err != nil {
return nil, err
}
team := envelope.Team{
ID: &ID,
Version: 1,
Body: &teamBody,
}
result := &envelope.Team{}
err = t.client.RoundTrip(ctx, "POST", "/teams", nil, &team, result)
return result, err
} | [
"func",
"(",
"t",
"*",
"TeamsClient",
")",
"Create",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
",",
"name",
"string",
",",
"teamType",
"primitive",
".",
"TeamType",
")",
"(",
"*",
"envelope",
".",
"Team",
",",
"error",
")",
"{",
"if",
"orgID",
"==",
"nil",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"teamBody",
":=",
"primitive",
".",
"Team",
"{",
"Name",
":",
"name",
",",
"OrgID",
":",
"orgID",
",",
"TeamType",
":",
"teamType",
",",
"}",
"\n\n",
"ID",
",",
"err",
":=",
"identity",
".",
"NewMutable",
"(",
"&",
"teamBody",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"team",
":=",
"envelope",
".",
"Team",
"{",
"ID",
":",
"&",
"ID",
",",
"Version",
":",
"1",
",",
"Body",
":",
"&",
"teamBody",
",",
"}",
"\n\n",
"result",
":=",
"&",
"envelope",
".",
"Team",
"{",
"}",
"\n",
"err",
"=",
"t",
".",
"client",
".",
"RoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"&",
"team",
",",
"result",
")",
"\n",
"return",
"result",
",",
"err",
"\n",
"}"
] | // Create performs a request to create a new team object | [
"Create",
"performs",
"a",
"request",
"to",
"create",
"a",
"new",
"team",
"object"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/teams.go#L48-L74 |
1,638 | manifoldco/torus-cli | daemon/crypto/secure/secure.go | NewGuard | func NewGuard() *Guard {
lock.Lock()
defer lock.Unlock()
if current != nil {
return current
}
current = &Guard{
secrets: []*Secret{},
lock: &sync.Mutex{},
}
return current
} | go | func NewGuard() *Guard {
lock.Lock()
defer lock.Unlock()
if current != nil {
return current
}
current = &Guard{
secrets: []*Secret{},
lock: &sync.Mutex{},
}
return current
} | [
"func",
"NewGuard",
"(",
")",
"*",
"Guard",
"{",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"current",
"!=",
"nil",
"{",
"return",
"current",
"\n",
"}",
"\n\n",
"current",
"=",
"&",
"Guard",
"{",
"secrets",
":",
"[",
"]",
"*",
"Secret",
"{",
"}",
",",
"lock",
":",
"&",
"sync",
".",
"Mutex",
"{",
"}",
",",
"}",
"\n\n",
"return",
"current",
"\n",
"}"
] | // NewGuard returns a Guard instance or errors if a guard already exists. | [
"NewGuard",
"returns",
"a",
"Guard",
"instance",
"or",
"errors",
"if",
"a",
"guard",
"already",
"exists",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/secure/secure.go#L37-L51 |
1,639 | manifoldco/torus-cli | daemon/crypto/secure/secure.go | Destroy | func (g *Guard) Destroy() {
lock.Lock()
defer lock.Unlock()
for _, s := range g.secrets {
s.Destroy()
}
current = nil
} | go | func (g *Guard) Destroy() {
lock.Lock()
defer lock.Unlock()
for _, s := range g.secrets {
s.Destroy()
}
current = nil
} | [
"func",
"(",
"g",
"*",
"Guard",
")",
"Destroy",
"(",
")",
"{",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"for",
"_",
",",
"s",
":=",
"range",
"g",
".",
"secrets",
"{",
"s",
".",
"Destroy",
"(",
")",
"\n",
"}",
"\n\n",
"current",
"=",
"nil",
"\n",
"}"
] | // Destroy removes all secrets and cleans up everything up appropriately. | [
"Destroy",
"removes",
"all",
"secrets",
"and",
"cleans",
"up",
"everything",
"up",
"appropriately",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/secure/secure.go#L79-L88 |
1,640 | manifoldco/torus-cli | daemon/crypto/secure/secure.go | Random | func (g *Guard) Random(size int) (*Secret, error) {
g.lock.Lock()
defer g.lock.Unlock()
b, err := memguard.NewImmutableRandom(size)
if err != nil {
return nil, err
}
s := Secret{
buffer: b,
guard: g,
}
g.secrets = append(g.secrets, &s)
return &s, nil
} | go | func (g *Guard) Random(size int) (*Secret, error) {
g.lock.Lock()
defer g.lock.Unlock()
b, err := memguard.NewImmutableRandom(size)
if err != nil {
return nil, err
}
s := Secret{
buffer: b,
guard: g,
}
g.secrets = append(g.secrets, &s)
return &s, nil
} | [
"func",
"(",
"g",
"*",
"Guard",
")",
"Random",
"(",
"size",
"int",
")",
"(",
"*",
"Secret",
",",
"error",
")",
"{",
"g",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"g",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"b",
",",
"err",
":=",
"memguard",
".",
"NewImmutableRandom",
"(",
"size",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"s",
":=",
"Secret",
"{",
"buffer",
":",
"b",
",",
"guard",
":",
"g",
",",
"}",
"\n\n",
"g",
".",
"secrets",
"=",
"append",
"(",
"g",
".",
"secrets",
",",
"&",
"s",
")",
"\n",
"return",
"&",
"s",
",",
"nil",
"\n",
"}"
] | // Random returns a new secret of the given length in bytes. | [
"Random",
"returns",
"a",
"new",
"secret",
"of",
"the",
"given",
"length",
"in",
"bytes",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/secure/secure.go#L111-L127 |
1,641 | manifoldco/torus-cli | daemon/crypto/secure/secure.go | Destroy | func (s *Secret) Destroy() {
defer s.buffer.Destroy()
s.guard.remove(s)
} | go | func (s *Secret) Destroy() {
defer s.buffer.Destroy()
s.guard.remove(s)
} | [
"func",
"(",
"s",
"*",
"Secret",
")",
"Destroy",
"(",
")",
"{",
"defer",
"s",
".",
"buffer",
".",
"Destroy",
"(",
")",
"\n",
"s",
".",
"guard",
".",
"remove",
"(",
"s",
")",
"\n",
"}"
] | // Destroy properly dispenses of the underlying secret stored in secure memory. | [
"Destroy",
"properly",
"dispenses",
"of",
"the",
"underlying",
"secret",
"stored",
"in",
"secure",
"memory",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/secure/secure.go#L135-L138 |
1,642 | manifoldco/torus-cli | api/worklog.go | List | func (w *WorklogClient) List(ctx context.Context, orgID *identity.ID) ([]apitypes.WorklogItem, error) {
v := &url.Values{}
if orgID != nil {
v.Set("org_id", orgID.String())
}
var resp []rawWorklogItem
err := w.client.DaemonRoundTrip(ctx, "GET", "/worklog", v, nil, &resp, nil)
if err != nil {
return nil, err
}
out := make([]apitypes.WorklogItem, 0, len(resp))
for _, w := range resp {
err := w.setDetails()
if err != nil {
return nil, err
}
out = append(out, *w.WorklogItem)
}
return out, err
} | go | func (w *WorklogClient) List(ctx context.Context, orgID *identity.ID) ([]apitypes.WorklogItem, error) {
v := &url.Values{}
if orgID != nil {
v.Set("org_id", orgID.String())
}
var resp []rawWorklogItem
err := w.client.DaemonRoundTrip(ctx, "GET", "/worklog", v, nil, &resp, nil)
if err != nil {
return nil, err
}
out := make([]apitypes.WorklogItem, 0, len(resp))
for _, w := range resp {
err := w.setDetails()
if err != nil {
return nil, err
}
out = append(out, *w.WorklogItem)
}
return out, err
} | [
"func",
"(",
"w",
"*",
"WorklogClient",
")",
"List",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
")",
"(",
"[",
"]",
"apitypes",
".",
"WorklogItem",
",",
"error",
")",
"{",
"v",
":=",
"&",
"url",
".",
"Values",
"{",
"}",
"\n",
"if",
"orgID",
"!=",
"nil",
"{",
"v",
".",
"Set",
"(",
"\"",
"\"",
",",
"orgID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n\n",
"var",
"resp",
"[",
"]",
"rawWorklogItem",
"\n",
"err",
":=",
"w",
".",
"client",
".",
"DaemonRoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"v",
",",
"nil",
",",
"&",
"resp",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"out",
":=",
"make",
"(",
"[",
"]",
"apitypes",
".",
"WorklogItem",
",",
"0",
",",
"len",
"(",
"resp",
")",
")",
"\n",
"for",
"_",
",",
"w",
":=",
"range",
"resp",
"{",
"err",
":=",
"w",
".",
"setDetails",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"out",
"=",
"append",
"(",
"out",
",",
"*",
"w",
".",
"WorklogItem",
")",
"\n",
"}",
"\n",
"return",
"out",
",",
"err",
"\n",
"}"
] | // List returns the list of all worklog items in the given org. | [
"List",
"returns",
"the",
"list",
"of",
"all",
"worklog",
"items",
"in",
"the",
"given",
"org",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/worklog.go#L21-L43 |
1,643 | manifoldco/torus-cli | api/worklog.go | Get | func (w *WorklogClient) Get(ctx context.Context, orgID *identity.ID, ident *apitypes.WorklogID) (*apitypes.WorklogItem, error) {
var res rawWorklogItem
err := w.singleItemWorker(ctx, "GET", orgID, ident, &res)
if err != nil {
return nil, err
}
err = res.setDetails()
return res.WorklogItem, err
} | go | func (w *WorklogClient) Get(ctx context.Context, orgID *identity.ID, ident *apitypes.WorklogID) (*apitypes.WorklogItem, error) {
var res rawWorklogItem
err := w.singleItemWorker(ctx, "GET", orgID, ident, &res)
if err != nil {
return nil, err
}
err = res.setDetails()
return res.WorklogItem, err
} | [
"func",
"(",
"w",
"*",
"WorklogClient",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
",",
"ident",
"*",
"apitypes",
".",
"WorklogID",
")",
"(",
"*",
"apitypes",
".",
"WorklogItem",
",",
"error",
")",
"{",
"var",
"res",
"rawWorklogItem",
"\n",
"err",
":=",
"w",
".",
"singleItemWorker",
"(",
"ctx",
",",
"\"",
"\"",
",",
"orgID",
",",
"ident",
",",
"&",
"res",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"res",
".",
"setDetails",
"(",
")",
"\n",
"return",
"res",
".",
"WorklogItem",
",",
"err",
"\n",
"}"
] | // Get returns the worklog item with the given id in the given org. | [
"Get",
"returns",
"the",
"worklog",
"item",
"with",
"the",
"given",
"id",
"in",
"the",
"given",
"org",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/worklog.go#L46-L55 |
1,644 | manifoldco/torus-cli | api/worklog.go | Resolve | func (w *WorklogClient) Resolve(ctx context.Context, orgID *identity.ID, ident *apitypes.WorklogID) error {
return w.singleItemWorker(ctx, "POST", orgID, ident, nil)
} | go | func (w *WorklogClient) Resolve(ctx context.Context, orgID *identity.ID, ident *apitypes.WorklogID) error {
return w.singleItemWorker(ctx, "POST", orgID, ident, nil)
} | [
"func",
"(",
"w",
"*",
"WorklogClient",
")",
"Resolve",
"(",
"ctx",
"context",
".",
"Context",
",",
"orgID",
"*",
"identity",
".",
"ID",
",",
"ident",
"*",
"apitypes",
".",
"WorklogID",
")",
"error",
"{",
"return",
"w",
".",
"singleItemWorker",
"(",
"ctx",
",",
"\"",
"\"",
",",
"orgID",
",",
"ident",
",",
"nil",
")",
"\n",
"}"
] | // Resolve resolves the worklog item with the given id in the given org. | [
"Resolve",
"resolves",
"the",
"worklog",
"item",
"with",
"the",
"given",
"id",
"in",
"the",
"given",
"org",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/worklog.go#L58-L60 |
1,645 | manifoldco/torus-cli | cmd/set.go | determinePath | func determinePath(ctx *cli.Context, path string) (*pathexp.PathExp, *string, error) {
// First try and use the cli args as a full path. it should override any
// options.
idx := strings.LastIndex(path, "/")
name := path[idx+1:]
// It looks like the user gave a path expression. use that instead of flags.
var pe *pathexp.PathExp
var err error
if idx != -1 {
path := path[:idx]
pe, err = parsePathExp(path)
if err != nil {
return nil, nil, errs.NewExitError(err.Error())
}
if name == "*" {
return nil, nil, errs.NewExitError("Secret name cannot be wildcard")
}
} else {
pe, err = determinePathFromFlags(ctx)
if err != nil {
return nil, nil, err
}
}
return pe, &name, nil
} | go | func determinePath(ctx *cli.Context, path string) (*pathexp.PathExp, *string, error) {
// First try and use the cli args as a full path. it should override any
// options.
idx := strings.LastIndex(path, "/")
name := path[idx+1:]
// It looks like the user gave a path expression. use that instead of flags.
var pe *pathexp.PathExp
var err error
if idx != -1 {
path := path[:idx]
pe, err = parsePathExp(path)
if err != nil {
return nil, nil, errs.NewExitError(err.Error())
}
if name == "*" {
return nil, nil, errs.NewExitError("Secret name cannot be wildcard")
}
} else {
pe, err = determinePathFromFlags(ctx)
if err != nil {
return nil, nil, err
}
}
return pe, &name, nil
} | [
"func",
"determinePath",
"(",
"ctx",
"*",
"cli",
".",
"Context",
",",
"path",
"string",
")",
"(",
"*",
"pathexp",
".",
"PathExp",
",",
"*",
"string",
",",
"error",
")",
"{",
"// First try and use the cli args as a full path. it should override any",
"// options.",
"idx",
":=",
"strings",
".",
"LastIndex",
"(",
"path",
",",
"\"",
"\"",
")",
"\n",
"name",
":=",
"path",
"[",
"idx",
"+",
"1",
":",
"]",
"\n\n",
"// It looks like the user gave a path expression. use that instead of flags.",
"var",
"pe",
"*",
"pathexp",
".",
"PathExp",
"\n",
"var",
"err",
"error",
"\n",
"if",
"idx",
"!=",
"-",
"1",
"{",
"path",
":=",
"path",
"[",
":",
"idx",
"]",
"\n",
"pe",
",",
"err",
"=",
"parsePathExp",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"errs",
".",
"NewExitError",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"if",
"name",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"errs",
".",
"NewExitError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"pe",
",",
"err",
"=",
"determinePathFromFlags",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"pe",
",",
"&",
"name",
",",
"nil",
"\n",
"}"
] | // determinePath returns a PathExp and a possible credential name if a full
// path was provided. | [
"determinePath",
"returns",
"a",
"PathExp",
"and",
"a",
"possible",
"credential",
"name",
"if",
"a",
"full",
"path",
"was",
"provided",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/set.go#L106-L132 |
1,646 | manifoldco/torus-cli | apitypes/claimtree.go | Revoked | func (pks *PublicKeySegment) Revoked() bool {
for _, claim := range pks.Claims {
if claim.Body.ClaimType == primitive.RevocationClaimType {
return true
}
}
return false
} | go | func (pks *PublicKeySegment) Revoked() bool {
for _, claim := range pks.Claims {
if claim.Body.ClaimType == primitive.RevocationClaimType {
return true
}
}
return false
} | [
"func",
"(",
"pks",
"*",
"PublicKeySegment",
")",
"Revoked",
"(",
")",
"bool",
"{",
"for",
"_",
",",
"claim",
":=",
"range",
"pks",
".",
"Claims",
"{",
"if",
"claim",
".",
"Body",
".",
"ClaimType",
"==",
"primitive",
".",
"RevocationClaimType",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"false",
"\n",
"}"
] | // Revoked returns a bool indicating if any revocation claims exist against this
// PublicKey | [
"Revoked",
"returns",
"a",
"bool",
"indicating",
"if",
"any",
"revocation",
"claims",
"exist",
"against",
"this",
"PublicKey"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/apitypes/claimtree.go#L23-L31 |
1,647 | manifoldco/torus-cli | apitypes/claimtree.go | HeadClaim | func (pks *PublicKeySegment) HeadClaim() (*envelope.Claim, error) {
// The head claim is the one that is not the previous claim of any others
outerLoop:
for _, c1 := range pks.Claims {
for _, c2 := range pks.Claims {
if *c2.Body.Previous == *c1.ID {
// Something else is newer than c1
continue outerLoop
}
}
// nothing is newer than c1. return it
return &c1, nil
}
return nil, ErrClaimCycleFound
} | go | func (pks *PublicKeySegment) HeadClaim() (*envelope.Claim, error) {
// The head claim is the one that is not the previous claim of any others
outerLoop:
for _, c1 := range pks.Claims {
for _, c2 := range pks.Claims {
if *c2.Body.Previous == *c1.ID {
// Something else is newer than c1
continue outerLoop
}
}
// nothing is newer than c1. return it
return &c1, nil
}
return nil, ErrClaimCycleFound
} | [
"func",
"(",
"pks",
"*",
"PublicKeySegment",
")",
"HeadClaim",
"(",
")",
"(",
"*",
"envelope",
".",
"Claim",
",",
"error",
")",
"{",
"// The head claim is the one that is not the previous claim of any others",
"outerLoop",
":",
"for",
"_",
",",
"c1",
":=",
"range",
"pks",
".",
"Claims",
"{",
"for",
"_",
",",
"c2",
":=",
"range",
"pks",
".",
"Claims",
"{",
"if",
"*",
"c2",
".",
"Body",
".",
"Previous",
"==",
"*",
"c1",
".",
"ID",
"{",
"// Something else is newer than c1",
"continue",
"outerLoop",
"\n",
"}",
"\n\n",
"}",
"\n",
"// nothing is newer than c1. return it",
"return",
"&",
"c1",
",",
"nil",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"ErrClaimCycleFound",
"\n",
"}"
] | // HeadClaim returns the most recent Claim made against this PublicKey | [
"HeadClaim",
"returns",
"the",
"most",
"recent",
"Claim",
"made",
"against",
"this",
"PublicKey"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/apitypes/claimtree.go#L34-L50 |
1,648 | manifoldco/torus-cli | registry/client.go | NewClientWithRoundTripper | func NewClientWithRoundTripper(rt RoundTripper) *Client {
c := &Client{}
c.KeyPairs = &KeyPairsClient{client: rt}
c.Tokens = &TokensClient{client: rt}
c.Users = &UsersClient{client: rt}
c.Teams = &TeamsClient{client: rt}
c.Memberships = &MembershipsClient{client: rt}
c.Credentials = &Credentials{client: rt}
c.Orgs = &OrgsClient{client: rt}
c.OrgInvites = &OrgInvitesClient{client: rt}
c.Policies = &PoliciesClient{client: rt}
c.Projects = &ProjectsClient{client: rt}
c.Environments = &EnvironmentsClient{client: rt}
c.Services = &ServicesClient{client: rt}
c.Claims = &ClaimsClient{client: rt}
c.ClaimTree = &ClaimTreeClient{client: rt}
c.Keyring = &KeyringClient{client: rt}
c.Keyring.Members = &KeyringMembersClient{client: rt}
c.KeyringMember = &KeyringMemberClientV1{client: rt}
c.CredentialGraph = &CredentialGraphClient{client: rt}
c.Machines = &MachinesClient{client: rt}
c.Profiles = &ProfilesClient{client: rt}
c.Self = &SelfClient{client: rt}
c.Version = &VersionClient{client: rt}
return c
} | go | func NewClientWithRoundTripper(rt RoundTripper) *Client {
c := &Client{}
c.KeyPairs = &KeyPairsClient{client: rt}
c.Tokens = &TokensClient{client: rt}
c.Users = &UsersClient{client: rt}
c.Teams = &TeamsClient{client: rt}
c.Memberships = &MembershipsClient{client: rt}
c.Credentials = &Credentials{client: rt}
c.Orgs = &OrgsClient{client: rt}
c.OrgInvites = &OrgInvitesClient{client: rt}
c.Policies = &PoliciesClient{client: rt}
c.Projects = &ProjectsClient{client: rt}
c.Environments = &EnvironmentsClient{client: rt}
c.Services = &ServicesClient{client: rt}
c.Claims = &ClaimsClient{client: rt}
c.ClaimTree = &ClaimTreeClient{client: rt}
c.Keyring = &KeyringClient{client: rt}
c.Keyring.Members = &KeyringMembersClient{client: rt}
c.KeyringMember = &KeyringMemberClientV1{client: rt}
c.CredentialGraph = &CredentialGraphClient{client: rt}
c.Machines = &MachinesClient{client: rt}
c.Profiles = &ProfilesClient{client: rt}
c.Self = &SelfClient{client: rt}
c.Version = &VersionClient{client: rt}
return c
} | [
"func",
"NewClientWithRoundTripper",
"(",
"rt",
"RoundTripper",
")",
"*",
"Client",
"{",
"c",
":=",
"&",
"Client",
"{",
"}",
"\n\n",
"c",
".",
"KeyPairs",
"=",
"&",
"KeyPairsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Tokens",
"=",
"&",
"TokensClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Users",
"=",
"&",
"UsersClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Teams",
"=",
"&",
"TeamsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Memberships",
"=",
"&",
"MembershipsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Credentials",
"=",
"&",
"Credentials",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Orgs",
"=",
"&",
"OrgsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"OrgInvites",
"=",
"&",
"OrgInvitesClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Policies",
"=",
"&",
"PoliciesClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Projects",
"=",
"&",
"ProjectsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Environments",
"=",
"&",
"EnvironmentsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Services",
"=",
"&",
"ServicesClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Claims",
"=",
"&",
"ClaimsClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"ClaimTree",
"=",
"&",
"ClaimTreeClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Keyring",
"=",
"&",
"KeyringClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Keyring",
".",
"Members",
"=",
"&",
"KeyringMembersClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"KeyringMember",
"=",
"&",
"KeyringMemberClientV1",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"CredentialGraph",
"=",
"&",
"CredentialGraphClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Machines",
"=",
"&",
"MachinesClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Profiles",
"=",
"&",
"ProfilesClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Self",
"=",
"&",
"SelfClient",
"{",
"client",
":",
"rt",
"}",
"\n",
"c",
".",
"Version",
"=",
"&",
"VersionClient",
"{",
"client",
":",
"rt",
"}",
"\n\n",
"return",
"c",
"\n",
"}"
] | // NewClientWithRoundTripper returns a new Client using the provided
// RoundTripper. This is used in the api package to embed registry endpoints. | [
"NewClientWithRoundTripper",
"returns",
"a",
"new",
"Client",
"using",
"the",
"provided",
"RoundTripper",
".",
"This",
"is",
"used",
"in",
"the",
"api",
"package",
"to",
"embed",
"registry",
"endpoints",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/client.go#L67-L94 |
1,649 | manifoldco/torus-cli | registry/client.go | NewRequest | func (rt *registryRoundTripper) NewRequest(method, path string,
query *url.Values, body interface{}) (*http.Request, error) {
req, err := rt.DefaultRequestDoer.NewRequest(method, path, query, body)
if err != nil {
return nil, err
}
if rt.holder.HasToken() {
req.Header.Set("Authorization", "Bearer "+string(rt.holder.Token()))
}
req.Header.Set("User-Agent", "Torus-Daemon/"+rt.version)
req.Header.Set("X-Registry-Version", rt.apiVersion)
return req, nil
} | go | func (rt *registryRoundTripper) NewRequest(method, path string,
query *url.Values, body interface{}) (*http.Request, error) {
req, err := rt.DefaultRequestDoer.NewRequest(method, path, query, body)
if err != nil {
return nil, err
}
if rt.holder.HasToken() {
req.Header.Set("Authorization", "Bearer "+string(rt.holder.Token()))
}
req.Header.Set("User-Agent", "Torus-Daemon/"+rt.version)
req.Header.Set("X-Registry-Version", rt.apiVersion)
return req, nil
} | [
"func",
"(",
"rt",
"*",
"registryRoundTripper",
")",
"NewRequest",
"(",
"method",
",",
"path",
"string",
",",
"query",
"*",
"url",
".",
"Values",
",",
"body",
"interface",
"{",
"}",
")",
"(",
"*",
"http",
".",
"Request",
",",
"error",
")",
"{",
"req",
",",
"err",
":=",
"rt",
".",
"DefaultRequestDoer",
".",
"NewRequest",
"(",
"method",
",",
"path",
",",
"query",
",",
"body",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"rt",
".",
"holder",
".",
"HasToken",
"(",
")",
"{",
"req",
".",
"Header",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"string",
"(",
"rt",
".",
"holder",
".",
"Token",
"(",
")",
")",
")",
"\n",
"}",
"\n\n",
"req",
".",
"Header",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
"+",
"rt",
".",
"version",
")",
"\n",
"req",
".",
"Header",
".",
"Set",
"(",
"\"",
"\"",
",",
"rt",
".",
"apiVersion",
")",
"\n\n",
"return",
"req",
",",
"nil",
"\n",
"}"
] | // Augment the default NewRequest to set additional required headers | [
"Augment",
"the",
"default",
"NewRequest",
"to",
"set",
"additional",
"required",
"headers"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/client.go#L105-L122 |
1,650 | manifoldco/torus-cli | registry/client.go | Do | func (rt *registryRoundTripper) Do(ctx context.Context, r *http.Request,
v interface{}) (*http.Response, error) {
ctx, cancelFunc := context.WithTimeout(ctx, 60*time.Second)
r = r.WithContext(ctx)
defer cancelFunc()
resp, err := rt.DefaultRequestDoer.Do(ctx, r, v)
if err != nil {
if ctx.Err() == context.DeadlineExceeded {
err = &apitypes.Error{
Type: apitypes.RequestTimeoutError,
Err: []string{"Request timed out"},
}
}
return nil, err
}
return resp, nil
} | go | func (rt *registryRoundTripper) Do(ctx context.Context, r *http.Request,
v interface{}) (*http.Response, error) {
ctx, cancelFunc := context.WithTimeout(ctx, 60*time.Second)
r = r.WithContext(ctx)
defer cancelFunc()
resp, err := rt.DefaultRequestDoer.Do(ctx, r, v)
if err != nil {
if ctx.Err() == context.DeadlineExceeded {
err = &apitypes.Error{
Type: apitypes.RequestTimeoutError,
Err: []string{"Request timed out"},
}
}
return nil, err
}
return resp, nil
} | [
"func",
"(",
"rt",
"*",
"registryRoundTripper",
")",
"Do",
"(",
"ctx",
"context",
".",
"Context",
",",
"r",
"*",
"http",
".",
"Request",
",",
"v",
"interface",
"{",
"}",
")",
"(",
"*",
"http",
".",
"Response",
",",
"error",
")",
"{",
"ctx",
",",
"cancelFunc",
":=",
"context",
".",
"WithTimeout",
"(",
"ctx",
",",
"60",
"*",
"time",
".",
"Second",
")",
"\n",
"r",
"=",
"r",
".",
"WithContext",
"(",
"ctx",
")",
"\n",
"defer",
"cancelFunc",
"(",
")",
"\n\n",
"resp",
",",
"err",
":=",
"rt",
".",
"DefaultRequestDoer",
".",
"Do",
"(",
"ctx",
",",
"r",
",",
"v",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"ctx",
".",
"Err",
"(",
")",
"==",
"context",
".",
"DeadlineExceeded",
"{",
"err",
"=",
"&",
"apitypes",
".",
"Error",
"{",
"Type",
":",
"apitypes",
".",
"RequestTimeoutError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
"}",
",",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"resp",
",",
"nil",
"\n",
"}"
] | // Augment the default Do to set a timeout. | [
"Augment",
"the",
"default",
"Do",
"to",
"set",
"a",
"timeout",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/registry/client.go#L125-L145 |
1,651 | manifoldco/torus-cli | config/config.go | NewConfig | func NewConfig(torusRoot string) (*Config, error) {
preferences, err := prefs.NewPreferences()
if err != nil {
return nil, err
}
publicKey, err := prefs.LoadPublicKey(preferences)
if err != nil {
return nil, fmt.Errorf("failed to load public key")
}
caBundle, err := loadCABundle(preferences.Core.CABundleFile)
if err != nil {
return nil, err
}
registryURI, err := url.Parse(preferences.Core.RegistryURI)
if err != nil {
return nil, fmt.Errorf("invalid registry_uri")
}
manifestURI, err := url.Parse(preferences.Core.ManifestURI)
if err != nil {
return nil, fmt.Errorf("invalid manifest_uri")
}
_, _, err = net.SplitHostPort(preferences.Core.GatekeeperAddress)
if err != nil {
return nil, fmt.Errorf("invalid gatekeeper listener address")
}
cfg := &Config{
APIVersion: apiVersion,
Version: Version,
TorusRoot: torusRoot,
PidPath: path.Join(torusRoot, "daemon.pid"),
GatekeeperPidPath: path.Join(torusRoot, "gateway.pid"),
DBPath: path.Join(torusRoot, "daemon.db"),
LastUpdatePath: path.Join(torusRoot, "last_update"),
RegistryURI: registryURI,
ManifestURI: manifestURI,
GatekeeperAddress: preferences.Core.GatekeeperAddress,
CABundle: caBundle,
PublicKey: publicKey,
}
// set OS specific transport address
setTransportAddress(cfg)
return cfg, nil
} | go | func NewConfig(torusRoot string) (*Config, error) {
preferences, err := prefs.NewPreferences()
if err != nil {
return nil, err
}
publicKey, err := prefs.LoadPublicKey(preferences)
if err != nil {
return nil, fmt.Errorf("failed to load public key")
}
caBundle, err := loadCABundle(preferences.Core.CABundleFile)
if err != nil {
return nil, err
}
registryURI, err := url.Parse(preferences.Core.RegistryURI)
if err != nil {
return nil, fmt.Errorf("invalid registry_uri")
}
manifestURI, err := url.Parse(preferences.Core.ManifestURI)
if err != nil {
return nil, fmt.Errorf("invalid manifest_uri")
}
_, _, err = net.SplitHostPort(preferences.Core.GatekeeperAddress)
if err != nil {
return nil, fmt.Errorf("invalid gatekeeper listener address")
}
cfg := &Config{
APIVersion: apiVersion,
Version: Version,
TorusRoot: torusRoot,
PidPath: path.Join(torusRoot, "daemon.pid"),
GatekeeperPidPath: path.Join(torusRoot, "gateway.pid"),
DBPath: path.Join(torusRoot, "daemon.db"),
LastUpdatePath: path.Join(torusRoot, "last_update"),
RegistryURI: registryURI,
ManifestURI: manifestURI,
GatekeeperAddress: preferences.Core.GatekeeperAddress,
CABundle: caBundle,
PublicKey: publicKey,
}
// set OS specific transport address
setTransportAddress(cfg)
return cfg, nil
} | [
"func",
"NewConfig",
"(",
"torusRoot",
"string",
")",
"(",
"*",
"Config",
",",
"error",
")",
"{",
"preferences",
",",
"err",
":=",
"prefs",
".",
"NewPreferences",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"publicKey",
",",
"err",
":=",
"prefs",
".",
"LoadPublicKey",
"(",
"preferences",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"caBundle",
",",
"err",
":=",
"loadCABundle",
"(",
"preferences",
".",
"Core",
".",
"CABundleFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"registryURI",
",",
"err",
":=",
"url",
".",
"Parse",
"(",
"preferences",
".",
"Core",
".",
"RegistryURI",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"manifestURI",
",",
"err",
":=",
"url",
".",
"Parse",
"(",
"preferences",
".",
"Core",
".",
"ManifestURI",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"_",
",",
"_",
",",
"err",
"=",
"net",
".",
"SplitHostPort",
"(",
"preferences",
".",
"Core",
".",
"GatekeeperAddress",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"cfg",
":=",
"&",
"Config",
"{",
"APIVersion",
":",
"apiVersion",
",",
"Version",
":",
"Version",
",",
"TorusRoot",
":",
"torusRoot",
",",
"PidPath",
":",
"path",
".",
"Join",
"(",
"torusRoot",
",",
"\"",
"\"",
")",
",",
"GatekeeperPidPath",
":",
"path",
".",
"Join",
"(",
"torusRoot",
",",
"\"",
"\"",
")",
",",
"DBPath",
":",
"path",
".",
"Join",
"(",
"torusRoot",
",",
"\"",
"\"",
")",
",",
"LastUpdatePath",
":",
"path",
".",
"Join",
"(",
"torusRoot",
",",
"\"",
"\"",
")",
",",
"RegistryURI",
":",
"registryURI",
",",
"ManifestURI",
":",
"manifestURI",
",",
"GatekeeperAddress",
":",
"preferences",
".",
"Core",
".",
"GatekeeperAddress",
",",
"CABundle",
":",
"caBundle",
",",
"PublicKey",
":",
"publicKey",
",",
"}",
"\n\n",
"// set OS specific transport address",
"setTransportAddress",
"(",
"cfg",
")",
"\n\n",
"return",
"cfg",
",",
"nil",
"\n",
"}"
] | // NewConfig returns a new Config, with loaded user preferences. | [
"NewConfig",
"returns",
"a",
"new",
"Config",
"with",
"loaded",
"user",
"preferences",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/config/config.go#L44-L96 |
1,652 | manifoldco/torus-cli | config/config.go | CreateTorusRoot | func CreateTorusRoot(checkPermissions bool) (string, error) {
torusRoot := torusRootPath()
src, err := os.Stat(torusRoot)
if err != nil && !os.IsNotExist(err) {
return "", err
}
if err == nil && !src.IsDir() {
return "", fmt.Errorf("%s exists but is not a dir", torusRoot)
}
if os.IsNotExist(err) {
err = os.Mkdir(torusRoot, requiredPermissions)
if err != nil {
return "", err
}
src, err = os.Stat(torusRoot)
if err != nil {
return "", err
}
}
fMode := src.Mode()
if checkPermissions && fMode.Perm() != requiredPermissions {
return "", fmt.Errorf("%s has permissions %d requires %d",
torusRoot, fMode.Perm(), requiredPermissions)
}
return torusRoot, nil
} | go | func CreateTorusRoot(checkPermissions bool) (string, error) {
torusRoot := torusRootPath()
src, err := os.Stat(torusRoot)
if err != nil && !os.IsNotExist(err) {
return "", err
}
if err == nil && !src.IsDir() {
return "", fmt.Errorf("%s exists but is not a dir", torusRoot)
}
if os.IsNotExist(err) {
err = os.Mkdir(torusRoot, requiredPermissions)
if err != nil {
return "", err
}
src, err = os.Stat(torusRoot)
if err != nil {
return "", err
}
}
fMode := src.Mode()
if checkPermissions && fMode.Perm() != requiredPermissions {
return "", fmt.Errorf("%s has permissions %d requires %d",
torusRoot, fMode.Perm(), requiredPermissions)
}
return torusRoot, nil
} | [
"func",
"CreateTorusRoot",
"(",
"checkPermissions",
"bool",
")",
"(",
"string",
",",
"error",
")",
"{",
"torusRoot",
":=",
"torusRootPath",
"(",
")",
"\n",
"src",
",",
"err",
":=",
"os",
".",
"Stat",
"(",
"torusRoot",
")",
"\n",
"if",
"err",
"!=",
"nil",
"&&",
"!",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"err",
"==",
"nil",
"&&",
"!",
"src",
".",
"IsDir",
"(",
")",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"torusRoot",
")",
"\n",
"}",
"\n\n",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"err",
"=",
"os",
".",
"Mkdir",
"(",
"torusRoot",
",",
"requiredPermissions",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"src",
",",
"err",
"=",
"os",
".",
"Stat",
"(",
"torusRoot",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"fMode",
":=",
"src",
".",
"Mode",
"(",
")",
"\n",
"if",
"checkPermissions",
"&&",
"fMode",
".",
"Perm",
"(",
")",
"!=",
"requiredPermissions",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"torusRoot",
",",
"fMode",
".",
"Perm",
"(",
")",
",",
"requiredPermissions",
")",
"\n",
"}",
"\n\n",
"return",
"torusRoot",
",",
"nil",
"\n",
"}"
] | // CreateTorusRoot creates the root directory for the Torus daemon. | [
"CreateTorusRoot",
"creates",
"the",
"root",
"directory",
"for",
"the",
"Torus",
"daemon",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/config/config.go#L99-L129 |
1,653 | manifoldco/torus-cli | config/config.go | loadCABundle | func loadCABundle(cafile string) (*x509.CertPool, error) {
var pem []byte
var err error
if cafile == "" {
pem, err = data.Asset("data/ca_bundle.pem")
} else {
pem, err = ioutil.ReadFile(cafile)
}
if err != nil {
return nil, fmt.Errorf("unable to find CA bundle")
}
c := x509.NewCertPool()
ok := c.AppendCertsFromPEM(pem)
if !ok {
return nil, fmt.Errorf("unable to load CA bundle from %s", cafile)
}
return c, nil
} | go | func loadCABundle(cafile string) (*x509.CertPool, error) {
var pem []byte
var err error
if cafile == "" {
pem, err = data.Asset("data/ca_bundle.pem")
} else {
pem, err = ioutil.ReadFile(cafile)
}
if err != nil {
return nil, fmt.Errorf("unable to find CA bundle")
}
c := x509.NewCertPool()
ok := c.AppendCertsFromPEM(pem)
if !ok {
return nil, fmt.Errorf("unable to load CA bundle from %s", cafile)
}
return c, nil
} | [
"func",
"loadCABundle",
"(",
"cafile",
"string",
")",
"(",
"*",
"x509",
".",
"CertPool",
",",
"error",
")",
"{",
"var",
"pem",
"[",
"]",
"byte",
"\n",
"var",
"err",
"error",
"\n\n",
"if",
"cafile",
"==",
"\"",
"\"",
"{",
"pem",
",",
"err",
"=",
"data",
".",
"Asset",
"(",
"\"",
"\"",
")",
"\n",
"}",
"else",
"{",
"pem",
",",
"err",
"=",
"ioutil",
".",
"ReadFile",
"(",
"cafile",
")",
"\n\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"c",
":=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"ok",
":=",
"c",
".",
"AppendCertsFromPEM",
"(",
"pem",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"cafile",
")",
"\n",
"}",
"\n\n",
"return",
"c",
",",
"nil",
"\n",
"}"
] | // Load CABundle creates a new CertPool from the given filename | [
"Load",
"CABundle",
"creates",
"a",
"new",
"CertPool",
"from",
"the",
"given",
"filename"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/config/config.go#L132-L153 |
1,654 | manifoldco/torus-cli | config/config.go | LoadConfig | func LoadConfig() (*Config, error) {
cfg, err := NewConfig(torusRootPath())
if err != nil {
return nil, errs.NewErrorExitError("Failed to load config.", err)
}
return cfg, nil
} | go | func LoadConfig() (*Config, error) {
cfg, err := NewConfig(torusRootPath())
if err != nil {
return nil, errs.NewErrorExitError("Failed to load config.", err)
}
return cfg, nil
} | [
"func",
"LoadConfig",
"(",
")",
"(",
"*",
"Config",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"NewConfig",
"(",
"torusRootPath",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"errs",
".",
"NewErrorExitError",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"cfg",
",",
"nil",
"\n",
"}"
] | // LoadConfig loads the config, standardizing cli errors on failure. | [
"LoadConfig",
"loads",
"the",
"config",
"standardizing",
"cli",
"errors",
"on",
"failure",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/config/config.go#L156-L163 |
1,655 | manifoldco/torus-cli | cmd/import.go | importSecretFile | func importSecretFile(args []string) ([]secretPair, error) {
switch len(args) {
case 0:
return readStdin()
case 1:
return readFile(args[0])
default:
return nil, errors.New("Too many arguments were provided")
}
} | go | func importSecretFile(args []string) ([]secretPair, error) {
switch len(args) {
case 0:
return readStdin()
case 1:
return readFile(args[0])
default:
return nil, errors.New("Too many arguments were provided")
}
} | [
"func",
"importSecretFile",
"(",
"args",
"[",
"]",
"string",
")",
"(",
"[",
"]",
"secretPair",
",",
"error",
")",
"{",
"switch",
"len",
"(",
"args",
")",
"{",
"case",
"0",
":",
"return",
"readStdin",
"(",
")",
"\n",
"case",
"1",
":",
"return",
"readFile",
"(",
"args",
"[",
"0",
"]",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // importSecretFile returns a list of secret pairs either reading a file
// provided or from the standard input. It returns an error if there is a
// problem parsing secrets or stdin fails to read. | [
"importSecretFile",
"returns",
"a",
"list",
"of",
"secret",
"pairs",
"either",
"reading",
"a",
"file",
"provided",
"or",
"from",
"the",
"standard",
"input",
".",
"It",
"returns",
"an",
"error",
"if",
"there",
"is",
"a",
"problem",
"parsing",
"secrets",
"or",
"stdin",
"fails",
"to",
"read",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/import.go#L83-L92 |
1,656 | manifoldco/torus-cli | cmd/import.go | scanSecrets | func scanSecrets(r io.Reader) ([]secretPair, error) {
var pairs []secretPair
lexer := shlex.NewLexer(r)
for {
word, err := lexer.Next()
if err != nil {
if err == io.EOF {
return pairs, nil
}
return nil, fmt.Errorf("Error reading input file. %s", err)
}
tokens := strings.SplitN(word, "=", 2)
if len(tokens) < 2 {
return nil, fmt.Errorf("Error parsing secret %q", word)
}
key := tokens[0]
value := tokens[1]
if key == "" || value == "" {
return nil, fmt.Errorf("Error parsing secret %q", word)
}
pairs = append(pairs, secretPair{key: key, value: value})
}
} | go | func scanSecrets(r io.Reader) ([]secretPair, error) {
var pairs []secretPair
lexer := shlex.NewLexer(r)
for {
word, err := lexer.Next()
if err != nil {
if err == io.EOF {
return pairs, nil
}
return nil, fmt.Errorf("Error reading input file. %s", err)
}
tokens := strings.SplitN(word, "=", 2)
if len(tokens) < 2 {
return nil, fmt.Errorf("Error parsing secret %q", word)
}
key := tokens[0]
value := tokens[1]
if key == "" || value == "" {
return nil, fmt.Errorf("Error parsing secret %q", word)
}
pairs = append(pairs, secretPair{key: key, value: value})
}
} | [
"func",
"scanSecrets",
"(",
"r",
"io",
".",
"Reader",
")",
"(",
"[",
"]",
"secretPair",
",",
"error",
")",
"{",
"var",
"pairs",
"[",
"]",
"secretPair",
"\n\n",
"lexer",
":=",
"shlex",
".",
"NewLexer",
"(",
"r",
")",
"\n\n",
"for",
"{",
"word",
",",
"err",
":=",
"lexer",
".",
"Next",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"err",
"==",
"io",
".",
"EOF",
"{",
"return",
"pairs",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"tokens",
":=",
"strings",
".",
"SplitN",
"(",
"word",
",",
"\"",
"\"",
",",
"2",
")",
"\n",
"if",
"len",
"(",
"tokens",
")",
"<",
"2",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"word",
")",
"\n",
"}",
"\n\n",
"key",
":=",
"tokens",
"[",
"0",
"]",
"\n",
"value",
":=",
"tokens",
"[",
"1",
"]",
"\n\n",
"if",
"key",
"==",
"\"",
"\"",
"||",
"value",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"word",
")",
"\n",
"}",
"\n\n",
"pairs",
"=",
"append",
"(",
"pairs",
",",
"secretPair",
"{",
"key",
":",
"key",
",",
"value",
":",
"value",
"}",
")",
"\n",
"}",
"\n",
"}"
] | // scanSecrets reads secret pairs using an UNIX shell-like syntax parser. Empty
// lines and comments are ignored. | [
"scanSecrets",
"reads",
"secret",
"pairs",
"using",
"an",
"UNIX",
"shell",
"-",
"like",
"syntax",
"parser",
".",
"Empty",
"lines",
"and",
"comments",
"are",
"ignored",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/import.go#L124-L152 |
1,657 | manifoldco/torus-cli | daemon/routes/machines.go | createMachine | func createMachine(orgID, teamID, creatorID *identity.ID, name string) (
*envelope.Machine, []envelope.Membership, error) {
machineBody := &primitive.Machine{
Name: name,
OrgID: orgID,
CreatedBy: creatorID,
Created: time.Now().UTC(),
DestroyedBy: nil,
Destroyed: nil,
State: primitive.MachineActiveState,
}
machineID, err := identity.NewMutable(machineBody)
if err != nil {
return nil, nil, err
}
machine := envelope.Machine{
ID: &machineID,
Version: 1,
Body: machineBody,
}
machineTeamID := identity.DeriveMutable(&primitive.Team{}, orgID, primitive.DerivableMachineTeamSymbol)
teamIDList := []*identity.ID{&machineTeamID, teamID}
var memberships []envelope.Membership
for _, curTeamID := range teamIDList {
body := primitive.Membership{
OwnerID: &machineID,
OrgID: orgID,
TeamID: curTeamID,
}
ID, err := identity.NewMutable(&body)
if err != nil {
return nil, nil, err
}
membership := envelope.Membership{
ID: &ID,
Version: 1,
Body: &body,
}
memberships = append(memberships, membership)
}
return &machine, memberships, nil
} | go | func createMachine(orgID, teamID, creatorID *identity.ID, name string) (
*envelope.Machine, []envelope.Membership, error) {
machineBody := &primitive.Machine{
Name: name,
OrgID: orgID,
CreatedBy: creatorID,
Created: time.Now().UTC(),
DestroyedBy: nil,
Destroyed: nil,
State: primitive.MachineActiveState,
}
machineID, err := identity.NewMutable(machineBody)
if err != nil {
return nil, nil, err
}
machine := envelope.Machine{
ID: &machineID,
Version: 1,
Body: machineBody,
}
machineTeamID := identity.DeriveMutable(&primitive.Team{}, orgID, primitive.DerivableMachineTeamSymbol)
teamIDList := []*identity.ID{&machineTeamID, teamID}
var memberships []envelope.Membership
for _, curTeamID := range teamIDList {
body := primitive.Membership{
OwnerID: &machineID,
OrgID: orgID,
TeamID: curTeamID,
}
ID, err := identity.NewMutable(&body)
if err != nil {
return nil, nil, err
}
membership := envelope.Membership{
ID: &ID,
Version: 1,
Body: &body,
}
memberships = append(memberships, membership)
}
return &machine, memberships, nil
} | [
"func",
"createMachine",
"(",
"orgID",
",",
"teamID",
",",
"creatorID",
"*",
"identity",
".",
"ID",
",",
"name",
"string",
")",
"(",
"*",
"envelope",
".",
"Machine",
",",
"[",
"]",
"envelope",
".",
"Membership",
",",
"error",
")",
"{",
"machineBody",
":=",
"&",
"primitive",
".",
"Machine",
"{",
"Name",
":",
"name",
",",
"OrgID",
":",
"orgID",
",",
"CreatedBy",
":",
"creatorID",
",",
"Created",
":",
"time",
".",
"Now",
"(",
")",
".",
"UTC",
"(",
")",
",",
"DestroyedBy",
":",
"nil",
",",
"Destroyed",
":",
"nil",
",",
"State",
":",
"primitive",
".",
"MachineActiveState",
",",
"}",
"\n",
"machineID",
",",
"err",
":=",
"identity",
".",
"NewMutable",
"(",
"machineBody",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"machine",
":=",
"envelope",
".",
"Machine",
"{",
"ID",
":",
"&",
"machineID",
",",
"Version",
":",
"1",
",",
"Body",
":",
"machineBody",
",",
"}",
"\n\n",
"machineTeamID",
":=",
"identity",
".",
"DeriveMutable",
"(",
"&",
"primitive",
".",
"Team",
"{",
"}",
",",
"orgID",
",",
"primitive",
".",
"DerivableMachineTeamSymbol",
")",
"\n",
"teamIDList",
":=",
"[",
"]",
"*",
"identity",
".",
"ID",
"{",
"&",
"machineTeamID",
",",
"teamID",
"}",
"\n",
"var",
"memberships",
"[",
"]",
"envelope",
".",
"Membership",
"\n",
"for",
"_",
",",
"curTeamID",
":=",
"range",
"teamIDList",
"{",
"body",
":=",
"primitive",
".",
"Membership",
"{",
"OwnerID",
":",
"&",
"machineID",
",",
"OrgID",
":",
"orgID",
",",
"TeamID",
":",
"curTeamID",
",",
"}",
"\n\n",
"ID",
",",
"err",
":=",
"identity",
".",
"NewMutable",
"(",
"&",
"body",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"membership",
":=",
"envelope",
".",
"Membership",
"{",
"ID",
":",
"&",
"ID",
",",
"Version",
":",
"1",
",",
"Body",
":",
"&",
"body",
",",
"}",
"\n",
"memberships",
"=",
"append",
"(",
"memberships",
",",
"membership",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"machine",
",",
"memberships",
",",
"nil",
"\n",
"}"
] | // createMachine generates a Machine object and associated Membership objects
// to be uploaded to the registry in the future. | [
"createMachine",
"generates",
"a",
"Machine",
"object",
"and",
"associated",
"Membership",
"objects",
"to",
"be",
"uploaded",
"to",
"the",
"registry",
"in",
"the",
"future",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/routes/machines.go#L91-L137 |
1,658 | manifoldco/torus-cli | daemon/crypto/zz_generated_crypto.go | SignedPublicKey | func (e *Engine) SignedPublicKey(ctx context.Context, body *primitive.PublicKey,
sigID *identity.ID, sigKP *SignatureKeyPair) (*envelope.PublicKey, error) {
id, sig, err := e.signAndID(ctx, body, sigID, sigKP)
if err != nil {
return nil, err
}
return &envelope.PublicKey{
ID: id,
Version: uint8(body.Version()),
Body: body,
Signature: *sig,
}, nil
} | go | func (e *Engine) SignedPublicKey(ctx context.Context, body *primitive.PublicKey,
sigID *identity.ID, sigKP *SignatureKeyPair) (*envelope.PublicKey, error) {
id, sig, err := e.signAndID(ctx, body, sigID, sigKP)
if err != nil {
return nil, err
}
return &envelope.PublicKey{
ID: id,
Version: uint8(body.Version()),
Body: body,
Signature: *sig,
}, nil
} | [
"func",
"(",
"e",
"*",
"Engine",
")",
"SignedPublicKey",
"(",
"ctx",
"context",
".",
"Context",
",",
"body",
"*",
"primitive",
".",
"PublicKey",
",",
"sigID",
"*",
"identity",
".",
"ID",
",",
"sigKP",
"*",
"SignatureKeyPair",
")",
"(",
"*",
"envelope",
".",
"PublicKey",
",",
"error",
")",
"{",
"id",
",",
"sig",
",",
"err",
":=",
"e",
".",
"signAndID",
"(",
"ctx",
",",
"body",
",",
"sigID",
",",
"sigKP",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"envelope",
".",
"PublicKey",
"{",
"ID",
":",
"id",
",",
"Version",
":",
"uint8",
"(",
"body",
".",
"Version",
"(",
")",
")",
",",
"Body",
":",
"body",
",",
"Signature",
":",
"*",
"sig",
",",
"}",
",",
"nil",
"\n",
"}"
] | // SignedPublicKey returns a PublicKeyEnvelope that is signed, and includes
// a tamper-proof ID. | [
"SignedPublicKey",
"returns",
"a",
"PublicKeyEnvelope",
"that",
"is",
"signed",
"and",
"includes",
"a",
"tamper",
"-",
"proof",
"ID",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/zz_generated_crypto.go#L15-L28 |
1,659 | manifoldco/torus-cli | api/session.go | Name | func (s *Session) Name() string {
if s.sessionType == apitypes.MachineSession {
return s.identity.(*envelope.Machine).Body.Name
}
return s.identity.(envelope.UserInf).Name()
} | go | func (s *Session) Name() string {
if s.sessionType == apitypes.MachineSession {
return s.identity.(*envelope.Machine).Body.Name
}
return s.identity.(envelope.UserInf).Name()
} | [
"func",
"(",
"s",
"*",
"Session",
")",
"Name",
"(",
")",
"string",
"{",
"if",
"s",
".",
"sessionType",
"==",
"apitypes",
".",
"MachineSession",
"{",
"return",
"s",
".",
"identity",
".",
"(",
"*",
"envelope",
".",
"Machine",
")",
".",
"Body",
".",
"Name",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"identity",
".",
"(",
"envelope",
".",
"UserInf",
")",
".",
"Name",
"(",
")",
"\n",
"}"
] | // Name returns the fullname of the user or the machine name | [
"Name",
"returns",
"the",
"fullname",
"of",
"the",
"user",
"or",
"the",
"machine",
"name"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L50-L56 |
1,660 | manifoldco/torus-cli | api/session.go | Email | func (s *Session) Email() string {
if s.sessionType == apitypes.MachineSession {
return "none"
}
return s.identity.(envelope.UserInf).Email()
} | go | func (s *Session) Email() string {
if s.sessionType == apitypes.MachineSession {
return "none"
}
return s.identity.(envelope.UserInf).Email()
} | [
"func",
"(",
"s",
"*",
"Session",
")",
"Email",
"(",
")",
"string",
"{",
"if",
"s",
".",
"sessionType",
"==",
"apitypes",
".",
"MachineSession",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"identity",
".",
"(",
"envelope",
".",
"UserInf",
")",
".",
"Email",
"(",
")",
"\n",
"}"
] | // Email returns none for a machine or the users email address | [
"Email",
"returns",
"none",
"for",
"a",
"machine",
"or",
"the",
"users",
"email",
"address"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L59-L65 |
1,661 | manifoldco/torus-cli | api/session.go | NewSession | func NewSession(resp *apitypes.Self) (*Session, error) {
switch resp.Type {
case apitypes.UserSession:
if _, ok := resp.Identity.(envelope.UserInf); !ok {
return nil, errors.New("Identity must be a user object")
}
if _, ok := resp.Auth.(envelope.UserInf); !ok {
return nil, errors.New("Auth must be a user object")
}
case apitypes.MachineSession:
if _, ok := resp.Identity.(*envelope.Machine); !ok {
return nil, errors.New("Identity must be a machine object")
}
if _, ok := resp.Auth.(*envelope.MachineToken); !ok {
return nil, errors.New("Auth must be a machine token object")
}
default:
return nil, errors.New("did not recognize session type")
}
return &Session{
sessionType: resp.Type,
identity: resp.Identity,
auth: resp.Auth,
}, nil
} | go | func NewSession(resp *apitypes.Self) (*Session, error) {
switch resp.Type {
case apitypes.UserSession:
if _, ok := resp.Identity.(envelope.UserInf); !ok {
return nil, errors.New("Identity must be a user object")
}
if _, ok := resp.Auth.(envelope.UserInf); !ok {
return nil, errors.New("Auth must be a user object")
}
case apitypes.MachineSession:
if _, ok := resp.Identity.(*envelope.Machine); !ok {
return nil, errors.New("Identity must be a machine object")
}
if _, ok := resp.Auth.(*envelope.MachineToken); !ok {
return nil, errors.New("Auth must be a machine token object")
}
default:
return nil, errors.New("did not recognize session type")
}
return &Session{
sessionType: resp.Type,
identity: resp.Identity,
auth: resp.Auth,
}, nil
} | [
"func",
"NewSession",
"(",
"resp",
"*",
"apitypes",
".",
"Self",
")",
"(",
"*",
"Session",
",",
"error",
")",
"{",
"switch",
"resp",
".",
"Type",
"{",
"case",
"apitypes",
".",
"UserSession",
":",
"if",
"_",
",",
"ok",
":=",
"resp",
".",
"Identity",
".",
"(",
"envelope",
".",
"UserInf",
")",
";",
"!",
"ok",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"resp",
".",
"Auth",
".",
"(",
"envelope",
".",
"UserInf",
")",
";",
"!",
"ok",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"case",
"apitypes",
".",
"MachineSession",
":",
"if",
"_",
",",
"ok",
":=",
"resp",
".",
"Identity",
".",
"(",
"*",
"envelope",
".",
"Machine",
")",
";",
"!",
"ok",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"resp",
".",
"Auth",
".",
"(",
"*",
"envelope",
".",
"MachineToken",
")",
";",
"!",
"ok",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"default",
":",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"Session",
"{",
"sessionType",
":",
"resp",
".",
"Type",
",",
"identity",
":",
"resp",
".",
"Identity",
",",
"auth",
":",
"resp",
".",
"Auth",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewSession returns a new session constructed from the payload of the current
// identity as returned from the Daemon | [
"NewSession",
"returns",
"a",
"new",
"session",
"constructed",
"from",
"the",
"payload",
"of",
"the",
"current",
"identity",
"as",
"returned",
"from",
"the",
"Daemon"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L78-L104 |
1,662 | manifoldco/torus-cli | api/session.go | Who | func (s *SessionClient) Who(ctx context.Context) (*Session, error) {
raw := &rawSelf{}
err := s.client.DaemonRoundTrip(ctx, "GET", "/self", nil, nil, raw, nil)
if err != nil {
return nil, err
}
self := raw.Self
switch raw.Type {
case apitypes.UserSession:
self.Identity = &envelope.User{}
self.Auth = &envelope.User{}
case apitypes.MachineSession:
self.Identity = &envelope.Machine{}
self.Auth = &envelope.MachineToken{}
default:
return nil, errUnknownSessionType
}
err = json.Unmarshal(raw.Identity, self.Identity)
if err != nil {
return nil, err
}
err = json.Unmarshal(raw.Auth, self.Auth)
if err != nil {
return nil, err
}
return NewSession(self)
} | go | func (s *SessionClient) Who(ctx context.Context) (*Session, error) {
raw := &rawSelf{}
err := s.client.DaemonRoundTrip(ctx, "GET", "/self", nil, nil, raw, nil)
if err != nil {
return nil, err
}
self := raw.Self
switch raw.Type {
case apitypes.UserSession:
self.Identity = &envelope.User{}
self.Auth = &envelope.User{}
case apitypes.MachineSession:
self.Identity = &envelope.Machine{}
self.Auth = &envelope.MachineToken{}
default:
return nil, errUnknownSessionType
}
err = json.Unmarshal(raw.Identity, self.Identity)
if err != nil {
return nil, err
}
err = json.Unmarshal(raw.Auth, self.Auth)
if err != nil {
return nil, err
}
return NewSession(self)
} | [
"func",
"(",
"s",
"*",
"SessionClient",
")",
"Who",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"Session",
",",
"error",
")",
"{",
"raw",
":=",
"&",
"rawSelf",
"{",
"}",
"\n",
"err",
":=",
"s",
".",
"client",
".",
"DaemonRoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"raw",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"self",
":=",
"raw",
".",
"Self",
"\n",
"switch",
"raw",
".",
"Type",
"{",
"case",
"apitypes",
".",
"UserSession",
":",
"self",
".",
"Identity",
"=",
"&",
"envelope",
".",
"User",
"{",
"}",
"\n",
"self",
".",
"Auth",
"=",
"&",
"envelope",
".",
"User",
"{",
"}",
"\n",
"case",
"apitypes",
".",
"MachineSession",
":",
"self",
".",
"Identity",
"=",
"&",
"envelope",
".",
"Machine",
"{",
"}",
"\n",
"self",
".",
"Auth",
"=",
"&",
"envelope",
".",
"MachineToken",
"{",
"}",
"\n",
"default",
":",
"return",
"nil",
",",
"errUnknownSessionType",
"\n",
"}",
"\n\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"raw",
".",
"Identity",
",",
"self",
".",
"Identity",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"raw",
".",
"Auth",
",",
"self",
".",
"Auth",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"NewSession",
"(",
"self",
")",
"\n",
"}"
] | // Who returns the Session object for the current authenticated user or machine | [
"Who",
"returns",
"the",
"Session",
"object",
"for",
"the",
"current",
"authenticated",
"user",
"or",
"machine"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L121-L151 |
1,663 | manifoldco/torus-cli | api/session.go | Get | func (s *SessionClient) Get(ctx context.Context) (*apitypes.SessionStatus, error) {
resp := &apitypes.SessionStatus{}
err := s.client.DaemonRoundTrip(ctx, "GET", "/session", nil, nil, resp, nil)
return resp, err
} | go | func (s *SessionClient) Get(ctx context.Context) (*apitypes.SessionStatus, error) {
resp := &apitypes.SessionStatus{}
err := s.client.DaemonRoundTrip(ctx, "GET", "/session", nil, nil, resp, nil)
return resp, err
} | [
"func",
"(",
"s",
"*",
"SessionClient",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"apitypes",
".",
"SessionStatus",
",",
"error",
")",
"{",
"resp",
":=",
"&",
"apitypes",
".",
"SessionStatus",
"{",
"}",
"\n",
"err",
":=",
"s",
".",
"client",
".",
"DaemonRoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"resp",
",",
"nil",
")",
"\n",
"return",
"resp",
",",
"err",
"\n",
"}"
] | // Get returns the status of the user's session. | [
"Get",
"returns",
"the",
"status",
"of",
"the",
"user",
"s",
"session",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L154-L158 |
1,664 | manifoldco/torus-cli | api/session.go | UserLogin | func (s *SessionClient) UserLogin(ctx context.Context, email, passphrase string) error {
// Package up login credentials for the user
login := apitypes.UserLogin{
Email: email,
Password: passphrase,
}
rawLogin, err := json.Marshal(login)
if err != nil {
return err
}
return performLogin(ctx, s, "user", rawLogin)
} | go | func (s *SessionClient) UserLogin(ctx context.Context, email, passphrase string) error {
// Package up login credentials for the user
login := apitypes.UserLogin{
Email: email,
Password: passphrase,
}
rawLogin, err := json.Marshal(login)
if err != nil {
return err
}
return performLogin(ctx, s, "user", rawLogin)
} | [
"func",
"(",
"s",
"*",
"SessionClient",
")",
"UserLogin",
"(",
"ctx",
"context",
".",
"Context",
",",
"email",
",",
"passphrase",
"string",
")",
"error",
"{",
"// Package up login credentials for the user",
"login",
":=",
"apitypes",
".",
"UserLogin",
"{",
"Email",
":",
"email",
",",
"Password",
":",
"passphrase",
",",
"}",
"\n\n",
"rawLogin",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"login",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"performLogin",
"(",
"ctx",
",",
"s",
",",
"\"",
"\"",
",",
"rawLogin",
")",
"\n",
"}"
] | // UserLogin logs the user in using the provided email and passphrase | [
"UserLogin",
"logs",
"the",
"user",
"in",
"using",
"the",
"provided",
"email",
"and",
"passphrase"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L161-L174 |
1,665 | manifoldco/torus-cli | api/session.go | MachineLogin | func (s *SessionClient) MachineLogin(ctx context.Context, tokenID, tokenSecret string) error {
ID, err := identity.DecodeFromString(tokenID)
if err != nil {
return err
}
secret, err := base64.NewFromString(tokenSecret)
if err != nil {
return err
}
login := apitypes.MachineLogin{
TokenID: &ID,
Secret: secret,
}
rawLogin, err := json.Marshal(login)
if err != nil {
return err
}
return performLogin(ctx, s, "machine", rawLogin)
} | go | func (s *SessionClient) MachineLogin(ctx context.Context, tokenID, tokenSecret string) error {
ID, err := identity.DecodeFromString(tokenID)
if err != nil {
return err
}
secret, err := base64.NewFromString(tokenSecret)
if err != nil {
return err
}
login := apitypes.MachineLogin{
TokenID: &ID,
Secret: secret,
}
rawLogin, err := json.Marshal(login)
if err != nil {
return err
}
return performLogin(ctx, s, "machine", rawLogin)
} | [
"func",
"(",
"s",
"*",
"SessionClient",
")",
"MachineLogin",
"(",
"ctx",
"context",
".",
"Context",
",",
"tokenID",
",",
"tokenSecret",
"string",
")",
"error",
"{",
"ID",
",",
"err",
":=",
"identity",
".",
"DecodeFromString",
"(",
"tokenID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"secret",
",",
"err",
":=",
"base64",
".",
"NewFromString",
"(",
"tokenSecret",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"login",
":=",
"apitypes",
".",
"MachineLogin",
"{",
"TokenID",
":",
"&",
"ID",
",",
"Secret",
":",
"secret",
",",
"}",
"\n\n",
"rawLogin",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"login",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"performLogin",
"(",
"ctx",
",",
"s",
",",
"\"",
"\"",
",",
"rawLogin",
")",
"\n",
"}"
] | // MachineLogin logs the user in using the provided token id and secret | [
"MachineLogin",
"logs",
"the",
"user",
"in",
"using",
"the",
"provided",
"token",
"id",
"and",
"secret"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L177-L199 |
1,666 | manifoldco/torus-cli | api/session.go | Logout | func (s *SessionClient) Logout(ctx context.Context) error {
return s.client.DaemonRoundTrip(ctx, "POST", "/logout", nil, nil, nil, nil)
} | go | func (s *SessionClient) Logout(ctx context.Context) error {
return s.client.DaemonRoundTrip(ctx, "POST", "/logout", nil, nil, nil, nil)
} | [
"func",
"(",
"s",
"*",
"SessionClient",
")",
"Logout",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"return",
"s",
".",
"client",
".",
"DaemonRoundTrip",
"(",
"ctx",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"nil",
",",
"nil",
",",
"nil",
",",
"nil",
")",
"\n",
"}"
] | // Logout logs the user out of their session | [
"Logout",
"logs",
"the",
"user",
"out",
"of",
"their",
"session"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/api/session.go#L211-L213 |
1,667 | manifoldco/torus-cli | daemon/utils/utils.go | CreateHTTPTransport | func CreateHTTPTransport(caBundle *x509.CertPool, hostname string) *http.Transport {
return &http.Transport{TLSClientConfig: &tls.Config{
ServerName: hostname,
RootCAs: caBundle,
}}
} | go | func CreateHTTPTransport(caBundle *x509.CertPool, hostname string) *http.Transport {
return &http.Transport{TLSClientConfig: &tls.Config{
ServerName: hostname,
RootCAs: caBundle,
}}
} | [
"func",
"CreateHTTPTransport",
"(",
"caBundle",
"*",
"x509",
".",
"CertPool",
",",
"hostname",
"string",
")",
"*",
"http",
".",
"Transport",
"{",
"return",
"&",
"http",
".",
"Transport",
"{",
"TLSClientConfig",
":",
"&",
"tls",
".",
"Config",
"{",
"ServerName",
":",
"hostname",
",",
"RootCAs",
":",
"caBundle",
",",
"}",
"}",
"\n",
"}"
] | // CreateHTTPTransport creates and configures the | [
"CreateHTTPTransport",
"creates",
"and",
"configures",
"the"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/utils/utils.go#L10-L15 |
1,668 | manifoldco/torus-cli | cmd/signup.go | signup | func signup(ctx *cli.Context, subCommand bool) error {
fmt.Println("Torus is no longer accepting signups.")
os.Exit(-1)
return nil
} | go | func signup(ctx *cli.Context, subCommand bool) error {
fmt.Println("Torus is no longer accepting signups.")
os.Exit(-1)
return nil
} | [
"func",
"signup",
"(",
"ctx",
"*",
"cli",
".",
"Context",
",",
"subCommand",
"bool",
")",
"error",
"{",
"fmt",
".",
"Println",
"(",
"\"",
"\"",
")",
"\n",
"os",
".",
"Exit",
"(",
"-",
"1",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // signup can be ran as a sub-command when an account is needed prior to running
// a particular action. the subCommand boolean signifies it is running as such
// and not as a generic signup | [
"signup",
"can",
"be",
"ran",
"as",
"a",
"sub",
"-",
"command",
"when",
"an",
"account",
"is",
"needed",
"prior",
"to",
"running",
"a",
"particular",
"action",
".",
"the",
"subCommand",
"boolean",
"signifies",
"it",
"is",
"running",
"as",
"such",
"and",
"not",
"as",
"a",
"generic",
"signup"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/signup.go#L27-L31 |
1,669 | manifoldco/torus-cli | gatekeeper/routes/boostrap.go | writeError | func writeError(w http.ResponseWriter, status int, err error) {
w.WriteHeader(status)
enc := json.NewEncoder(w)
resp := baseapitypes.Error{
Type: baseapitypes.InternalServerError,
Err: []string{err.Error()},
}
enc.Encode(resp)
} | go | func writeError(w http.ResponseWriter, status int, err error) {
w.WriteHeader(status)
enc := json.NewEncoder(w)
resp := baseapitypes.Error{
Type: baseapitypes.InternalServerError,
Err: []string{err.Error()},
}
enc.Encode(resp)
} | [
"func",
"writeError",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"status",
"int",
",",
"err",
"error",
")",
"{",
"w",
".",
"WriteHeader",
"(",
"status",
")",
"\n",
"enc",
":=",
"json",
".",
"NewEncoder",
"(",
"w",
")",
"\n",
"resp",
":=",
"baseapitypes",
".",
"Error",
"{",
"Type",
":",
"baseapitypes",
".",
"InternalServerError",
",",
"Err",
":",
"[",
"]",
"string",
"{",
"err",
".",
"Error",
"(",
")",
"}",
",",
"}",
"\n\n",
"enc",
".",
"Encode",
"(",
"resp",
")",
"\n",
"}"
] | // writeError returns a bootstrapping error | [
"writeError",
"returns",
"a",
"bootstrapping",
"error"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/gatekeeper/routes/boostrap.go#L139-L148 |
1,670 | manifoldco/torus-cli | cmd/run.go | manipulateEnv | func manipulateEnv(path *pathexp.PathExp) []string {
env := filterEnv()
org := path.Org.Components()
project := path.Project.Components()
envs := path.Envs.Components()
services := path.Services.Components()
env = append(env, "TORUS_ORG="+org[0])
env = append(env, "TORUS_PROJECT="+project[0])
env = append(env, "TORUS_ENVIRONMENT="+envs[0])
env = append(env, "TORUS_SERVICE="+services[0])
return env
} | go | func manipulateEnv(path *pathexp.PathExp) []string {
env := filterEnv()
org := path.Org.Components()
project := path.Project.Components()
envs := path.Envs.Components()
services := path.Services.Components()
env = append(env, "TORUS_ORG="+org[0])
env = append(env, "TORUS_PROJECT="+project[0])
env = append(env, "TORUS_ENVIRONMENT="+envs[0])
env = append(env, "TORUS_SERVICE="+services[0])
return env
} | [
"func",
"manipulateEnv",
"(",
"path",
"*",
"pathexp",
".",
"PathExp",
")",
"[",
"]",
"string",
"{",
"env",
":=",
"filterEnv",
"(",
")",
"\n\n",
"org",
":=",
"path",
".",
"Org",
".",
"Components",
"(",
")",
"\n",
"project",
":=",
"path",
".",
"Project",
".",
"Components",
"(",
")",
"\n",
"envs",
":=",
"path",
".",
"Envs",
".",
"Components",
"(",
")",
"\n",
"services",
":=",
"path",
".",
"Services",
".",
"Components",
"(",
")",
"\n\n",
"env",
"=",
"append",
"(",
"env",
",",
"\"",
"\"",
"+",
"org",
"[",
"0",
"]",
")",
"\n",
"env",
"=",
"append",
"(",
"env",
",",
"\"",
"\"",
"+",
"project",
"[",
"0",
"]",
")",
"\n",
"env",
"=",
"append",
"(",
"env",
",",
"\"",
"\"",
"+",
"envs",
"[",
"0",
"]",
")",
"\n",
"env",
"=",
"append",
"(",
"env",
",",
"\"",
"\"",
"+",
"services",
"[",
"0",
"]",
")",
"\n\n",
"return",
"env",
"\n",
"}"
] | // manipulateEnv removes any sensitive torus environment variables and sets
// `TORUS_ORG`, `TORUS_PROJECT`, `TORUS_ENVIRONMENT`, and `TORUS_SERVICE` for
// use by the running process. | [
"manipulateEnv",
"removes",
"any",
"sensitive",
"torus",
"environment",
"variables",
"and",
"sets",
"TORUS_ORG",
"TORUS_PROJECT",
"TORUS_ENVIRONMENT",
"and",
"TORUS_SERVICE",
"for",
"use",
"by",
"the",
"running",
"process",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/run.go#L103-L117 |
1,671 | manifoldco/torus-cli | daemon/crypto/crypto.go | Sign | func (k *LoginKeypair) Sign(token []byte) *base64url.Value {
sig := ed25519.Sign(k.private, token)
return base64url.New(sig)
} | go | func (k *LoginKeypair) Sign(token []byte) *base64url.Value {
sig := ed25519.Sign(k.private, token)
return base64url.New(sig)
} | [
"func",
"(",
"k",
"*",
"LoginKeypair",
")",
"Sign",
"(",
"token",
"[",
"]",
"byte",
")",
"*",
"base64url",
".",
"Value",
"{",
"sig",
":=",
"ed25519",
".",
"Sign",
"(",
"k",
".",
"private",
",",
"token",
")",
"\n",
"return",
"base64url",
".",
"New",
"(",
"sig",
")",
"\n",
"}"
] | // Sign returns a signature of the given token as a base64 string | [
"Sign",
"returns",
"a",
"signature",
"of",
"the",
"given",
"token",
"as",
"a",
"base64",
"string"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/crypto.go#L59-L62 |
1,672 | manifoldco/torus-cli | daemon/crypto/crypto.go | DeriveLoginHMAC | func DeriveLoginHMAC(ctx context.Context, password []byte, salt, token string) (string, error) {
key, err := derivePassword(ctx, password, salt)
if err != nil {
return "", err
}
pwh := make([]byte, base64.RawURLEncoding.EncodedLen(32))
base64.RawURLEncoding.Encode(pwh, key)
mac := hmac.New(sha512.New, pwh)
mac.Write([]byte(token))
return base64.RawURLEncoding.EncodeToString(mac.Sum(nil)), nil
} | go | func DeriveLoginHMAC(ctx context.Context, password []byte, salt, token string) (string, error) {
key, err := derivePassword(ctx, password, salt)
if err != nil {
return "", err
}
pwh := make([]byte, base64.RawURLEncoding.EncodedLen(32))
base64.RawURLEncoding.Encode(pwh, key)
mac := hmac.New(sha512.New, pwh)
mac.Write([]byte(token))
return base64.RawURLEncoding.EncodeToString(mac.Sum(nil)), nil
} | [
"func",
"DeriveLoginHMAC",
"(",
"ctx",
"context",
".",
"Context",
",",
"password",
"[",
"]",
"byte",
",",
"salt",
",",
"token",
"string",
")",
"(",
"string",
",",
"error",
")",
"{",
"key",
",",
"err",
":=",
"derivePassword",
"(",
"ctx",
",",
"password",
",",
"salt",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"pwh",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"base64",
".",
"RawURLEncoding",
".",
"EncodedLen",
"(",
"32",
")",
")",
"\n",
"base64",
".",
"RawURLEncoding",
".",
"Encode",
"(",
"pwh",
",",
"key",
")",
"\n\n",
"mac",
":=",
"hmac",
".",
"New",
"(",
"sha512",
".",
"New",
",",
"pwh",
")",
"\n",
"mac",
".",
"Write",
"(",
"[",
"]",
"byte",
"(",
"token",
")",
")",
"\n",
"return",
"base64",
".",
"RawURLEncoding",
".",
"EncodeToString",
"(",
"mac",
".",
"Sum",
"(",
"nil",
")",
")",
",",
"nil",
"\n",
"}"
] | // DeriveLoginHMAC HMACs the provided token with a key derived from password
// and the provided base64 encoded salt. | [
"DeriveLoginHMAC",
"HMACs",
"the",
"provided",
"token",
"with",
"a",
"key",
"derived",
"from",
"password",
"and",
"the",
"provided",
"base64",
"encoded",
"salt",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/crypto.go#L66-L78 |
1,673 | manifoldco/torus-cli | daemon/crypto/crypto.go | CreateMasterKeyObject | func CreateMasterKeyObject(ctx context.Context, password []byte, masterKey *[]byte) (*primitive.MasterKey, error) {
m := &primitive.MasterKey{
Alg: Triplesec,
}
// We either need to generate a new key, or will use the existing
// key during a password change scenario
key := make([]byte, masterKeyBytes)
if masterKey == nil {
// Generate a master key of 256 bytes
_, err := rand.Read(key)
if err != nil {
return nil, err
}
} else {
// Use the provided key
key = *masterKey
}
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
ts, err := newTriplesec(ctx, password)
if err != nil {
return nil, err
}
ct, err := ts.Encrypt(key)
if err != nil {
return nil, err
}
// Encode the master key value to base64url
m.Value = base64url.New(ct)
return m, nil
} | go | func CreateMasterKeyObject(ctx context.Context, password []byte, masterKey *[]byte) (*primitive.MasterKey, error) {
m := &primitive.MasterKey{
Alg: Triplesec,
}
// We either need to generate a new key, or will use the existing
// key during a password change scenario
key := make([]byte, masterKeyBytes)
if masterKey == nil {
// Generate a master key of 256 bytes
_, err := rand.Read(key)
if err != nil {
return nil, err
}
} else {
// Use the provided key
key = *masterKey
}
err := ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
ts, err := newTriplesec(ctx, password)
if err != nil {
return nil, err
}
ct, err := ts.Encrypt(key)
if err != nil {
return nil, err
}
// Encode the master key value to base64url
m.Value = base64url.New(ct)
return m, nil
} | [
"func",
"CreateMasterKeyObject",
"(",
"ctx",
"context",
".",
"Context",
",",
"password",
"[",
"]",
"byte",
",",
"masterKey",
"*",
"[",
"]",
"byte",
")",
"(",
"*",
"primitive",
".",
"MasterKey",
",",
"error",
")",
"{",
"m",
":=",
"&",
"primitive",
".",
"MasterKey",
"{",
"Alg",
":",
"Triplesec",
",",
"}",
"\n\n",
"// We either need to generate a new key, or will use the existing",
"// key during a password change scenario",
"key",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"masterKeyBytes",
")",
"\n",
"if",
"masterKey",
"==",
"nil",
"{",
"// Generate a master key of 256 bytes",
"_",
",",
"err",
":=",
"rand",
".",
"Read",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// Use the provided key",
"key",
"=",
"*",
"masterKey",
"\n",
"}",
"\n\n",
"err",
":=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"ts",
",",
"err",
":=",
"newTriplesec",
"(",
"ctx",
",",
"password",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"ct",
",",
"err",
":=",
"ts",
".",
"Encrypt",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Encode the master key value to base64url",
"m",
".",
"Value",
"=",
"base64url",
".",
"New",
"(",
"ct",
")",
"\n",
"return",
"m",
",",
"nil",
"\n",
"}"
] | // CreateMasterKeyObject generates a 256 byte master key which is then
// encrypted using TripleSec-v3 using the given password. | [
"CreateMasterKeyObject",
"generates",
"a",
"256",
"byte",
"master",
"key",
"which",
"is",
"then",
"encrypted",
"using",
"TripleSec",
"-",
"v3",
"using",
"the",
"given",
"password",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/crypto.go#L164-L201 |
1,674 | manifoldco/torus-cli | daemon/crypto/crypto.go | DeriveLoginKeypair | func DeriveLoginKeypair(ctx context.Context, secret []byte, salt *base64url.Value) (
*LoginKeypair, error) {
key, err := deriveHash(ctx, secret, salt.String())
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
r := bytes.NewReader(key[224:]) // Use last 32 bytes of 256 to derive key
pubKey, privKey, err := ed25519.GenerateKey(r)
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
keypair := &LoginKeypair{
public: pubKey,
private: privKey,
salt: salt,
}
return keypair, nil
} | go | func DeriveLoginKeypair(ctx context.Context, secret []byte, salt *base64url.Value) (
*LoginKeypair, error) {
key, err := deriveHash(ctx, secret, salt.String())
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
r := bytes.NewReader(key[224:]) // Use last 32 bytes of 256 to derive key
pubKey, privKey, err := ed25519.GenerateKey(r)
if err != nil {
return nil, err
}
err = ctxutil.ErrIfDone(ctx)
if err != nil {
return nil, err
}
keypair := &LoginKeypair{
public: pubKey,
private: privKey,
salt: salt,
}
return keypair, nil
} | [
"func",
"DeriveLoginKeypair",
"(",
"ctx",
"context",
".",
"Context",
",",
"secret",
"[",
"]",
"byte",
",",
"salt",
"*",
"base64url",
".",
"Value",
")",
"(",
"*",
"LoginKeypair",
",",
"error",
")",
"{",
"key",
",",
"err",
":=",
"deriveHash",
"(",
"ctx",
",",
"secret",
",",
"salt",
".",
"String",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"r",
":=",
"bytes",
".",
"NewReader",
"(",
"key",
"[",
"224",
":",
"]",
")",
"// Use last 32 bytes of 256 to derive key",
"\n",
"pubKey",
",",
"privKey",
",",
"err",
":=",
"ed25519",
".",
"GenerateKey",
"(",
"r",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"ctxutil",
".",
"ErrIfDone",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"keypair",
":=",
"&",
"LoginKeypair",
"{",
"public",
":",
"pubKey",
",",
"private",
":",
"privKey",
",",
"salt",
":",
"salt",
",",
"}",
"\n",
"return",
"keypair",
",",
"nil",
"\n",
"}"
] | // DeriveLoginKeypair dervies the ed25519 login keypair used for machine
// authentication from the given salt and secret values. | [
"DeriveLoginKeypair",
"dervies",
"the",
"ed25519",
"login",
"keypair",
"used",
"for",
"machine",
"authentication",
"from",
"the",
"given",
"salt",
"and",
"secret",
"values",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/crypto/crypto.go#L205-L235 |
1,675 | manifoldco/torus-cli | gatekeeper/client/client.go | NewClient | func NewClient(host, caFile string) (*Client, error) {
if !strings.HasSuffix(host, "/") {
host += "/"
}
caPool, err := x509.SystemCertPool()
if err != nil {
log.Printf("Could not load system certificate pool: %s. Creating custom pool", err)
caPool = x509.NewCertPool()
}
if caFile != "" {
caBytes, err := ioutil.ReadFile(caFile)
if err != nil {
return nil, fmt.Errorf("unable to read ca file: %s", err)
}
ok := caPool.AppendCertsFromPEM(caBytes)
if !ok {
return nil, fmt.Errorf("unable to parse and append ca file: %s", err)
}
}
tlsConfig := &tls.Config{
RootCAs: caPool,
}
transport := &http.Transport{
TLSClientConfig: tlsConfig,
}
return &Client{
rt: &clientRoundTripper{
DefaultRequestDoer: registry.DefaultRequestDoer{
Client: &http.Client{
Timeout: clientTimeout,
Transport: transport,
},
Host: host,
},
},
}, nil
} | go | func NewClient(host, caFile string) (*Client, error) {
if !strings.HasSuffix(host, "/") {
host += "/"
}
caPool, err := x509.SystemCertPool()
if err != nil {
log.Printf("Could not load system certificate pool: %s. Creating custom pool", err)
caPool = x509.NewCertPool()
}
if caFile != "" {
caBytes, err := ioutil.ReadFile(caFile)
if err != nil {
return nil, fmt.Errorf("unable to read ca file: %s", err)
}
ok := caPool.AppendCertsFromPEM(caBytes)
if !ok {
return nil, fmt.Errorf("unable to parse and append ca file: %s", err)
}
}
tlsConfig := &tls.Config{
RootCAs: caPool,
}
transport := &http.Transport{
TLSClientConfig: tlsConfig,
}
return &Client{
rt: &clientRoundTripper{
DefaultRequestDoer: registry.DefaultRequestDoer{
Client: &http.Client{
Timeout: clientTimeout,
Transport: transport,
},
Host: host,
},
},
}, nil
} | [
"func",
"NewClient",
"(",
"host",
",",
"caFile",
"string",
")",
"(",
"*",
"Client",
",",
"error",
")",
"{",
"if",
"!",
"strings",
".",
"HasSuffix",
"(",
"host",
",",
"\"",
"\"",
")",
"{",
"host",
"+=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"caPool",
",",
"err",
":=",
"x509",
".",
"SystemCertPool",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Printf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"caPool",
"=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"}",
"\n\n",
"if",
"caFile",
"!=",
"\"",
"\"",
"{",
"caBytes",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"caFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"ok",
":=",
"caPool",
".",
"AppendCertsFromPEM",
"(",
"caBytes",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"tlsConfig",
":=",
"&",
"tls",
".",
"Config",
"{",
"RootCAs",
":",
"caPool",
",",
"}",
"\n\n",
"transport",
":=",
"&",
"http",
".",
"Transport",
"{",
"TLSClientConfig",
":",
"tlsConfig",
",",
"}",
"\n\n",
"return",
"&",
"Client",
"{",
"rt",
":",
"&",
"clientRoundTripper",
"{",
"DefaultRequestDoer",
":",
"registry",
".",
"DefaultRequestDoer",
"{",
"Client",
":",
"&",
"http",
".",
"Client",
"{",
"Timeout",
":",
"clientTimeout",
",",
"Transport",
":",
"transport",
",",
"}",
",",
"Host",
":",
"host",
",",
"}",
",",
"}",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewClient returns a new client to a Gatekeeper host that can bootstrap this machine | [
"NewClient",
"returns",
"a",
"new",
"client",
"to",
"a",
"Gatekeeper",
"host",
"that",
"can",
"bootstrap",
"this",
"machine"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/gatekeeper/client/client.go#L36-L77 |
1,676 | manifoldco/torus-cli | gatekeeper/client/client.go | Bootstrap | func (c *Client) Bootstrap(provider string, bootreq interface{}) (*apitypes.BootstrapResponse, error) {
path := fmt.Sprintf("%s/%s/%s", gatekeeperAPIVersion, "machine", provider)
req, err := c.rt.NewRequest("POST", path, nil, bootreq)
if err != nil {
return nil, err
}
var bootresp apitypes.BootstrapResponse
resp, err := c.rt.Do(context.Background(), req, &bootresp)
if err != nil {
return nil, err
}
defer resp.Body.Close()
return &bootresp, nil
} | go | func (c *Client) Bootstrap(provider string, bootreq interface{}) (*apitypes.BootstrapResponse, error) {
path := fmt.Sprintf("%s/%s/%s", gatekeeperAPIVersion, "machine", provider)
req, err := c.rt.NewRequest("POST", path, nil, bootreq)
if err != nil {
return nil, err
}
var bootresp apitypes.BootstrapResponse
resp, err := c.rt.Do(context.Background(), req, &bootresp)
if err != nil {
return nil, err
}
defer resp.Body.Close()
return &bootresp, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"Bootstrap",
"(",
"provider",
"string",
",",
"bootreq",
"interface",
"{",
"}",
")",
"(",
"*",
"apitypes",
".",
"BootstrapResponse",
",",
"error",
")",
"{",
"path",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"gatekeeperAPIVersion",
",",
"\"",
"\"",
",",
"provider",
")",
"\n",
"req",
",",
"err",
":=",
"c",
".",
"rt",
".",
"NewRequest",
"(",
"\"",
"\"",
",",
"path",
",",
"nil",
",",
"bootreq",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"bootresp",
"apitypes",
".",
"BootstrapResponse",
"\n",
"resp",
",",
"err",
":=",
"c",
".",
"rt",
".",
"Do",
"(",
"context",
".",
"Background",
"(",
")",
",",
"req",
",",
"&",
"bootresp",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"resp",
".",
"Body",
".",
"Close",
"(",
")",
"\n\n",
"return",
"&",
"bootresp",
",",
"nil",
"\n",
"}"
] | // Bootstrap bootstraps the machine with Gatekeeper | [
"Bootstrap",
"bootstraps",
"the",
"machine",
"with",
"Gatekeeper"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/gatekeeper/client/client.go#L80-L95 |
1,677 | manifoldco/torus-cli | cmd/version.go | VersionLookup | func VersionLookup(ctx *cli.Context) error {
return chain(
ensureDaemon, listVersionsCmd, checkUpdates,
)(ctx)
} | go | func VersionLookup(ctx *cli.Context) error {
return chain(
ensureDaemon, listVersionsCmd, checkUpdates,
)(ctx)
} | [
"func",
"VersionLookup",
"(",
"ctx",
"*",
"cli",
".",
"Context",
")",
"error",
"{",
"return",
"chain",
"(",
"ensureDaemon",
",",
"listVersionsCmd",
",",
"checkUpdates",
",",
")",
"(",
"ctx",
")",
"\n",
"}"
] | // VersionLookup ensures the environment is ready and then executes version cmd | [
"VersionLookup",
"ensures",
"the",
"environment",
"is",
"ready",
"and",
"then",
"executes",
"version",
"cmd"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/version.go#L28-L32 |
1,678 | manifoldco/torus-cli | apitypes/worklog.go | DecodeWorklogIDFromString | func DecodeWorklogIDFromString(raw string) (WorklogID, error) {
id := WorklogID{}
buf, err := base32.DecodeString(raw)
if err != nil {
return id, err
}
if len(buf) != worklogIDLen {
return id, ErrIncorrectWorklogIDLen
}
copy(id[:], buf)
return id, nil
} | go | func DecodeWorklogIDFromString(raw string) (WorklogID, error) {
id := WorklogID{}
buf, err := base32.DecodeString(raw)
if err != nil {
return id, err
}
if len(buf) != worklogIDLen {
return id, ErrIncorrectWorklogIDLen
}
copy(id[:], buf)
return id, nil
} | [
"func",
"DecodeWorklogIDFromString",
"(",
"raw",
"string",
")",
"(",
"WorklogID",
",",
"error",
")",
"{",
"id",
":=",
"WorklogID",
"{",
"}",
"\n\n",
"buf",
",",
"err",
":=",
"base32",
".",
"DecodeString",
"(",
"raw",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"id",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"buf",
")",
"!=",
"worklogIDLen",
"{",
"return",
"id",
",",
"ErrIncorrectWorklogIDLen",
"\n",
"}",
"\n\n",
"copy",
"(",
"id",
"[",
":",
"]",
",",
"buf",
")",
"\n",
"return",
"id",
",",
"nil",
"\n\n",
"}"
] | // DecodeWorklogIDFromString decodes a WorklogID from the given base32 encoded
// representation. | [
"DecodeWorklogIDFromString",
"decodes",
"a",
"WorklogID",
"from",
"the",
"given",
"base32",
"encoded",
"representation",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/apitypes/worklog.go#L40-L55 |
1,679 | manifoldco/torus-cli | apitypes/worklog.go | String | func (t WorklogType) String() string {
switch t {
case SecretRotateWorklogType:
return "secret"
case MissingKeypairsWorklogType:
return "keypairs"
case InviteApproveWorklogType:
return "invite"
case UserKeyringMembersWorklogType:
fallthrough
case MachineKeyringMembersWorklogType:
return "secret"
default:
return "n/a"
}
} | go | func (t WorklogType) String() string {
switch t {
case SecretRotateWorklogType:
return "secret"
case MissingKeypairsWorklogType:
return "keypairs"
case InviteApproveWorklogType:
return "invite"
case UserKeyringMembersWorklogType:
fallthrough
case MachineKeyringMembersWorklogType:
return "secret"
default:
return "n/a"
}
} | [
"func",
"(",
"t",
"WorklogType",
")",
"String",
"(",
")",
"string",
"{",
"switch",
"t",
"{",
"case",
"SecretRotateWorklogType",
":",
"return",
"\"",
"\"",
"\n",
"case",
"MissingKeypairsWorklogType",
":",
"return",
"\"",
"\"",
"\n",
"case",
"InviteApproveWorklogType",
":",
"return",
"\"",
"\"",
"\n",
"case",
"UserKeyringMembersWorklogType",
":",
"fallthrough",
"\n",
"case",
"MachineKeyringMembersWorklogType",
":",
"return",
"\"",
"\"",
"\n",
"default",
":",
"return",
"\"",
"\"",
"\n",
"}",
"\n",
"}"
] | // String returns a human reable string for this worklog item type. | [
"String",
"returns",
"a",
"human",
"reable",
"string",
"for",
"this",
"worklog",
"item",
"type",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/apitypes/worklog.go#L189-L204 |
1,680 | manifoldco/torus-cli | apitypes/worklog.go | CreateID | func (w *WorklogItem) CreateID(worklogType WorklogType) {
h, err := blake2b.New(&blake2b.Config{Size: worklogIDLen - 1})
if err != nil { // this only happens with a bad config
panic(err)
}
h.Write([]byte{byte(worklogType)})
h.Write([]byte(w.Details.Subject()))
id := WorklogID{byte(worklogType)}
copy(id[1:], h.Sum(nil))
w.ID = &id
} | go | func (w *WorklogItem) CreateID(worklogType WorklogType) {
h, err := blake2b.New(&blake2b.Config{Size: worklogIDLen - 1})
if err != nil { // this only happens with a bad config
panic(err)
}
h.Write([]byte{byte(worklogType)})
h.Write([]byte(w.Details.Subject()))
id := WorklogID{byte(worklogType)}
copy(id[1:], h.Sum(nil))
w.ID = &id
} | [
"func",
"(",
"w",
"*",
"WorklogItem",
")",
"CreateID",
"(",
"worklogType",
"WorklogType",
")",
"{",
"h",
",",
"err",
":=",
"blake2b",
".",
"New",
"(",
"&",
"blake2b",
".",
"Config",
"{",
"Size",
":",
"worklogIDLen",
"-",
"1",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// this only happens with a bad config",
"panic",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"h",
".",
"Write",
"(",
"[",
"]",
"byte",
"{",
"byte",
"(",
"worklogType",
")",
"}",
")",
"\n",
"h",
".",
"Write",
"(",
"[",
"]",
"byte",
"(",
"w",
".",
"Details",
".",
"Subject",
"(",
")",
")",
")",
"\n\n",
"id",
":=",
"WorklogID",
"{",
"byte",
"(",
"worklogType",
")",
"}",
"\n",
"copy",
"(",
"id",
"[",
"1",
":",
"]",
",",
"h",
".",
"Sum",
"(",
"nil",
")",
")",
"\n",
"w",
".",
"ID",
"=",
"&",
"id",
"\n",
"}"
] | // CreateID creates and populates a WorklogID for the WorklogItem based on the
// given type and its subject. | [
"CreateID",
"creates",
"and",
"populates",
"a",
"WorklogID",
"for",
"the",
"WorklogItem",
"based",
"on",
"the",
"given",
"type",
"and",
"its",
"subject",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/apitypes/worklog.go#L208-L220 |
1,681 | manifoldco/torus-cli | daemon/logic/utils.go | createCredentialGraph | func createCredentialGraph(ctx context.Context, credBody *PlaintextCredential,
parent registry.CredentialGraph, sigID *identity.ID, encID *identity.ID,
kp *crypto.KeyPairs, ct *registry.ClaimTree, client *registry.Client,
engine *crypto.Engine, g *secure.Guard) (*registry.CredentialGraphV2, error) {
pathExp, err := credBody.PathExp.WithInstance("*")
if err != nil {
return nil, err
}
keyringBody := primitive.NewKeyring(credBody.OrgID, credBody.ProjectID, pathExp)
if parent != nil {
keyringBody.Previous = parent.GetKeyring().GetID()
keyringBody.KeyringVersion = parent.KeyringVersion() + 1
}
keyring, err := engine.SignedKeyring(ctx, keyringBody, sigID, &kp.Signature)
if err != nil {
return nil, err
}
mek, err := g.Random(64)
defer mek.Destroy()
if err != nil {
return nil, err
}
subjects, err := getKeyringMembers(ctx, client, credBody.OrgID)
if err != nil {
return nil, err
}
// use their public key to encrypt the mek with a random nonce.
members := []registry.KeyringMember{}
for _, subject := range subjects {
for _, id := range subject.KeyOwnerIDs() {
// For this user/mtoken, find their public encryption key
enc, err := ct.FindActive(&id, primitive.EncryptionKeyType)
if err == registry.ErrMissingKeyForOwner {
// If we didn't find an active key, don't encode this
// user/token in the keyring, but keep going.
continue
}
if err != nil {
return nil, err
}
encPubKey := enc.PublicKey
encmek, nonce, err := engine.Box(ctx, mek, &kp.Encryption, []byte(*encPubKey.Body.Key.Value))
if err != nil {
return nil, err
}
key := &primitive.KeyringMemberKey{
Algorithm: crypto.EasyBox,
Nonce: base64.New(nonce),
Value: base64.New(encmek),
}
member, err := newV2KeyringMember(ctx, engine, credBody.OrgID, keyring.ID,
encPubKey.Body.OwnerID, encPubKey.ID, encID, sigID, key, kp)
if err != nil {
return nil, err
}
members = append(members, *member)
}
}
graph := registry.CredentialGraphV2{
KeyringSectionV2: registry.KeyringSectionV2{
Keyring: keyring,
Claims: []envelope.KeyringMemberClaim{},
Members: members,
},
}
return &graph, nil
} | go | func createCredentialGraph(ctx context.Context, credBody *PlaintextCredential,
parent registry.CredentialGraph, sigID *identity.ID, encID *identity.ID,
kp *crypto.KeyPairs, ct *registry.ClaimTree, client *registry.Client,
engine *crypto.Engine, g *secure.Guard) (*registry.CredentialGraphV2, error) {
pathExp, err := credBody.PathExp.WithInstance("*")
if err != nil {
return nil, err
}
keyringBody := primitive.NewKeyring(credBody.OrgID, credBody.ProjectID, pathExp)
if parent != nil {
keyringBody.Previous = parent.GetKeyring().GetID()
keyringBody.KeyringVersion = parent.KeyringVersion() + 1
}
keyring, err := engine.SignedKeyring(ctx, keyringBody, sigID, &kp.Signature)
if err != nil {
return nil, err
}
mek, err := g.Random(64)
defer mek.Destroy()
if err != nil {
return nil, err
}
subjects, err := getKeyringMembers(ctx, client, credBody.OrgID)
if err != nil {
return nil, err
}
// use their public key to encrypt the mek with a random nonce.
members := []registry.KeyringMember{}
for _, subject := range subjects {
for _, id := range subject.KeyOwnerIDs() {
// For this user/mtoken, find their public encryption key
enc, err := ct.FindActive(&id, primitive.EncryptionKeyType)
if err == registry.ErrMissingKeyForOwner {
// If we didn't find an active key, don't encode this
// user/token in the keyring, but keep going.
continue
}
if err != nil {
return nil, err
}
encPubKey := enc.PublicKey
encmek, nonce, err := engine.Box(ctx, mek, &kp.Encryption, []byte(*encPubKey.Body.Key.Value))
if err != nil {
return nil, err
}
key := &primitive.KeyringMemberKey{
Algorithm: crypto.EasyBox,
Nonce: base64.New(nonce),
Value: base64.New(encmek),
}
member, err := newV2KeyringMember(ctx, engine, credBody.OrgID, keyring.ID,
encPubKey.Body.OwnerID, encPubKey.ID, encID, sigID, key, kp)
if err != nil {
return nil, err
}
members = append(members, *member)
}
}
graph := registry.CredentialGraphV2{
KeyringSectionV2: registry.KeyringSectionV2{
Keyring: keyring,
Claims: []envelope.KeyringMemberClaim{},
Members: members,
},
}
return &graph, nil
} | [
"func",
"createCredentialGraph",
"(",
"ctx",
"context",
".",
"Context",
",",
"credBody",
"*",
"PlaintextCredential",
",",
"parent",
"registry",
".",
"CredentialGraph",
",",
"sigID",
"*",
"identity",
".",
"ID",
",",
"encID",
"*",
"identity",
".",
"ID",
",",
"kp",
"*",
"crypto",
".",
"KeyPairs",
",",
"ct",
"*",
"registry",
".",
"ClaimTree",
",",
"client",
"*",
"registry",
".",
"Client",
",",
"engine",
"*",
"crypto",
".",
"Engine",
",",
"g",
"*",
"secure",
".",
"Guard",
")",
"(",
"*",
"registry",
".",
"CredentialGraphV2",
",",
"error",
")",
"{",
"pathExp",
",",
"err",
":=",
"credBody",
".",
"PathExp",
".",
"WithInstance",
"(",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"keyringBody",
":=",
"primitive",
".",
"NewKeyring",
"(",
"credBody",
".",
"OrgID",
",",
"credBody",
".",
"ProjectID",
",",
"pathExp",
")",
"\n",
"if",
"parent",
"!=",
"nil",
"{",
"keyringBody",
".",
"Previous",
"=",
"parent",
".",
"GetKeyring",
"(",
")",
".",
"GetID",
"(",
")",
"\n",
"keyringBody",
".",
"KeyringVersion",
"=",
"parent",
".",
"KeyringVersion",
"(",
")",
"+",
"1",
"\n",
"}",
"\n\n",
"keyring",
",",
"err",
":=",
"engine",
".",
"SignedKeyring",
"(",
"ctx",
",",
"keyringBody",
",",
"sigID",
",",
"&",
"kp",
".",
"Signature",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"mek",
",",
"err",
":=",
"g",
".",
"Random",
"(",
"64",
")",
"\n",
"defer",
"mek",
".",
"Destroy",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"subjects",
",",
"err",
":=",
"getKeyringMembers",
"(",
"ctx",
",",
"client",
",",
"credBody",
".",
"OrgID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// use their public key to encrypt the mek with a random nonce.",
"members",
":=",
"[",
"]",
"registry",
".",
"KeyringMember",
"{",
"}",
"\n",
"for",
"_",
",",
"subject",
":=",
"range",
"subjects",
"{",
"for",
"_",
",",
"id",
":=",
"range",
"subject",
".",
"KeyOwnerIDs",
"(",
")",
"{",
"// For this user/mtoken, find their public encryption key",
"enc",
",",
"err",
":=",
"ct",
".",
"FindActive",
"(",
"&",
"id",
",",
"primitive",
".",
"EncryptionKeyType",
")",
"\n",
"if",
"err",
"==",
"registry",
".",
"ErrMissingKeyForOwner",
"{",
"// If we didn't find an active key, don't encode this",
"// user/token in the keyring, but keep going.",
"continue",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"encPubKey",
":=",
"enc",
".",
"PublicKey",
"\n\n",
"encmek",
",",
"nonce",
",",
"err",
":=",
"engine",
".",
"Box",
"(",
"ctx",
",",
"mek",
",",
"&",
"kp",
".",
"Encryption",
",",
"[",
"]",
"byte",
"(",
"*",
"encPubKey",
".",
"Body",
".",
"Key",
".",
"Value",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"key",
":=",
"&",
"primitive",
".",
"KeyringMemberKey",
"{",
"Algorithm",
":",
"crypto",
".",
"EasyBox",
",",
"Nonce",
":",
"base64",
".",
"New",
"(",
"nonce",
")",
",",
"Value",
":",
"base64",
".",
"New",
"(",
"encmek",
")",
",",
"}",
"\n\n",
"member",
",",
"err",
":=",
"newV2KeyringMember",
"(",
"ctx",
",",
"engine",
",",
"credBody",
".",
"OrgID",
",",
"keyring",
".",
"ID",
",",
"encPubKey",
".",
"Body",
".",
"OwnerID",
",",
"encPubKey",
".",
"ID",
",",
"encID",
",",
"sigID",
",",
"key",
",",
"kp",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"members",
"=",
"append",
"(",
"members",
",",
"*",
"member",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"graph",
":=",
"registry",
".",
"CredentialGraphV2",
"{",
"KeyringSectionV2",
":",
"registry",
".",
"KeyringSectionV2",
"{",
"Keyring",
":",
"keyring",
",",
"Claims",
":",
"[",
"]",
"envelope",
".",
"KeyringMemberClaim",
"{",
"}",
",",
"Members",
":",
"members",
",",
"}",
",",
"}",
"\n\n",
"return",
"&",
"graph",
",",
"nil",
"\n",
"}"
] | // createCredentialGraph generates, signs, and posts a new CredentialGraph
// to the registry. | [
"createCredentialGraph",
"generates",
"signs",
"and",
"posts",
"a",
"new",
"CredentialGraph",
"to",
"the",
"registry",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/utils.go#L89-L167 |
1,682 | manifoldco/torus-cli | daemon/logic/utils.go | fetchKeyPairs | func fetchKeyPairs(k *registry.Keypairs, orgID *identity.ID) (
*identity.ID, *identity.ID, *crypto.KeyPairs, error) {
enc, err := k.Select(orgID, primitive.EncryptionKeyType)
if err != nil {
return nil, nil, nil, err
}
sig, err := k.Select(orgID, primitive.SigningKeyType)
if err != nil {
return nil, nil, nil, err
}
kp := bundleKeypairs(sig, enc)
return sig.PublicKey.ID, enc.PublicKey.ID, kp, nil
} | go | func fetchKeyPairs(k *registry.Keypairs, orgID *identity.ID) (
*identity.ID, *identity.ID, *crypto.KeyPairs, error) {
enc, err := k.Select(orgID, primitive.EncryptionKeyType)
if err != nil {
return nil, nil, nil, err
}
sig, err := k.Select(orgID, primitive.SigningKeyType)
if err != nil {
return nil, nil, nil, err
}
kp := bundleKeypairs(sig, enc)
return sig.PublicKey.ID, enc.PublicKey.ID, kp, nil
} | [
"func",
"fetchKeyPairs",
"(",
"k",
"*",
"registry",
".",
"Keypairs",
",",
"orgID",
"*",
"identity",
".",
"ID",
")",
"(",
"*",
"identity",
".",
"ID",
",",
"*",
"identity",
".",
"ID",
",",
"*",
"crypto",
".",
"KeyPairs",
",",
"error",
")",
"{",
"enc",
",",
"err",
":=",
"k",
".",
"Select",
"(",
"orgID",
",",
"primitive",
".",
"EncryptionKeyType",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"sig",
",",
"err",
":=",
"k",
".",
"Select",
"(",
"orgID",
",",
"primitive",
".",
"SigningKeyType",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"kp",
":=",
"bundleKeypairs",
"(",
"sig",
",",
"enc",
")",
"\n",
"return",
"sig",
".",
"PublicKey",
".",
"ID",
",",
"enc",
".",
"PublicKey",
".",
"ID",
",",
"kp",
",",
"nil",
"\n",
"}"
] | // fetchKeyPairs fetches and bundles the user's signing and encryption keypairs
// from the given keypairs struct | [
"fetchKeyPairs",
"fetches",
"and",
"bundles",
"the",
"user",
"s",
"signing",
"and",
"encryption",
"keypairs",
"from",
"the",
"given",
"keypairs",
"struct"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/utils.go#L350-L365 |
1,683 | manifoldco/torus-cli | daemon/logic/utils.go | findSystemTeams | func findSystemTeams(teams []envelope.Team) (*envelope.Team, *envelope.Team, error) {
var members, machines *envelope.Team
for _, t := range teams {
var team = t
if t.Body.TeamType == primitive.SystemTeamType {
switch t.Body.Name {
case "member":
members = &team
case "machine":
machines = &team
}
}
if members != nil && machines != nil {
break
}
}
var errs []string
if members == nil {
errs = append(errs, "Member team not found.")
}
if machines == nil {
errs = append(errs, "Machine team not found.")
}
if len(errs) > 0 {
return nil, nil, &apitypes.Error{
Err: errs,
Type: apitypes.NotFoundError,
}
}
return members, machines, nil
} | go | func findSystemTeams(teams []envelope.Team) (*envelope.Team, *envelope.Team, error) {
var members, machines *envelope.Team
for _, t := range teams {
var team = t
if t.Body.TeamType == primitive.SystemTeamType {
switch t.Body.Name {
case "member":
members = &team
case "machine":
machines = &team
}
}
if members != nil && machines != nil {
break
}
}
var errs []string
if members == nil {
errs = append(errs, "Member team not found.")
}
if machines == nil {
errs = append(errs, "Machine team not found.")
}
if len(errs) > 0 {
return nil, nil, &apitypes.Error{
Err: errs,
Type: apitypes.NotFoundError,
}
}
return members, machines, nil
} | [
"func",
"findSystemTeams",
"(",
"teams",
"[",
"]",
"envelope",
".",
"Team",
")",
"(",
"*",
"envelope",
".",
"Team",
",",
"*",
"envelope",
".",
"Team",
",",
"error",
")",
"{",
"var",
"members",
",",
"machines",
"*",
"envelope",
".",
"Team",
"\n",
"for",
"_",
",",
"t",
":=",
"range",
"teams",
"{",
"var",
"team",
"=",
"t",
"\n",
"if",
"t",
".",
"Body",
".",
"TeamType",
"==",
"primitive",
".",
"SystemTeamType",
"{",
"switch",
"t",
".",
"Body",
".",
"Name",
"{",
"case",
"\"",
"\"",
":",
"members",
"=",
"&",
"team",
"\n",
"case",
"\"",
"\"",
":",
"machines",
"=",
"&",
"team",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"members",
"!=",
"nil",
"&&",
"machines",
"!=",
"nil",
"{",
"break",
"\n",
"}",
"\n",
"}",
"\n\n",
"var",
"errs",
"[",
"]",
"string",
"\n",
"if",
"members",
"==",
"nil",
"{",
"errs",
"=",
"append",
"(",
"errs",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"machines",
"==",
"nil",
"{",
"errs",
"=",
"append",
"(",
"errs",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"errs",
")",
">",
"0",
"{",
"return",
"nil",
",",
"nil",
",",
"&",
"apitypes",
".",
"Error",
"{",
"Err",
":",
"errs",
",",
"Type",
":",
"apitypes",
".",
"NotFoundError",
",",
"}",
"\n",
"}",
"\n\n",
"return",
"members",
",",
"machines",
",",
"nil",
"\n",
"}"
] | // findSystemTeams takes in a list of team objects and returns the members and machines
// teams. | [
"findSystemTeams",
"takes",
"in",
"a",
"list",
"of",
"team",
"objects",
"and",
"returns",
"the",
"members",
"and",
"machines",
"teams",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/daemon/logic/utils.go#L396-L430 |
1,684 | manifoldco/torus-cli | cmd/profile.go | profileView | func profileView(ctx *cli.Context) error {
cfg, err := config.LoadConfig()
if err != nil {
return err
}
client := api.NewClient(cfg)
c := context.Background()
session, err := client.Session.Who(c)
if err != nil {
return errs.NewErrorExitError("Error fetching user details", err)
}
printProfile(session)
return nil
} | go | func profileView(ctx *cli.Context) error {
cfg, err := config.LoadConfig()
if err != nil {
return err
}
client := api.NewClient(cfg)
c := context.Background()
session, err := client.Session.Who(c)
if err != nil {
return errs.NewErrorExitError("Error fetching user details", err)
}
printProfile(session)
return nil
} | [
"func",
"profileView",
"(",
"ctx",
"*",
"cli",
".",
"Context",
")",
"error",
"{",
"cfg",
",",
"err",
":=",
"config",
".",
"LoadConfig",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"client",
":=",
"api",
".",
"NewClient",
"(",
"cfg",
")",
"\n",
"c",
":=",
"context",
".",
"Background",
"(",
")",
"\n\n",
"session",
",",
"err",
":=",
"client",
".",
"Session",
".",
"Who",
"(",
"c",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"errs",
".",
"NewErrorExitError",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"printProfile",
"(",
"session",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // profileView is used to view your account profile | [
"profileView",
"is",
"used",
"to",
"view",
"your",
"account",
"profile"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/cmd/profile.go#L45-L61 |
1,685 | manifoldco/torus-cli | validate/validate.go | Confirmer | func Confirmer(defaultYes bool) Func {
return func(input string) error {
if defaultYes {
if input == "" || input == "y" || input == "N" {
return nil
}
return NewValidationError("You must specify either 'y' for yes or 'N' for no.")
}
if input == "" || input == "Y" || input == "n" {
return nil
}
return NewValidationError("You must specify either 'Y' for yes or 'n' for no.")
}
} | go | func Confirmer(defaultYes bool) Func {
return func(input string) error {
if defaultYes {
if input == "" || input == "y" || input == "N" {
return nil
}
return NewValidationError("You must specify either 'y' for yes or 'N' for no.")
}
if input == "" || input == "Y" || input == "n" {
return nil
}
return NewValidationError("You must specify either 'Y' for yes or 'n' for no.")
}
} | [
"func",
"Confirmer",
"(",
"defaultYes",
"bool",
")",
"Func",
"{",
"return",
"func",
"(",
"input",
"string",
")",
"error",
"{",
"if",
"defaultYes",
"{",
"if",
"input",
"==",
"\"",
"\"",
"||",
"input",
"==",
"\"",
"\"",
"||",
"input",
"==",
"\"",
"\"",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"input",
"==",
"\"",
"\"",
"||",
"input",
"==",
"\"",
"\"",
"||",
"input",
"==",
"\"",
"\"",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // Confirmer returns a confirmation validation function which validates the
// input depending on whether or not this prompt is default Yes or No. | [
"Confirmer",
"returns",
"a",
"confirmation",
"validation",
"function",
"which",
"validates",
"the",
"input",
"depending",
"on",
"whether",
"or",
"not",
"this",
"prompt",
"is",
"default",
"Yes",
"or",
"No",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L66-L82 |
1,686 | manifoldco/torus-cli | validate/validate.go | OneOf | func OneOf(choices []string) Func {
return func(input string) error {
for _, v := range choices {
if input == v {
return nil
}
}
return NewValidationError(fmt.Sprintf("%s is not a valid option.", input))
}
} | go | func OneOf(choices []string) Func {
return func(input string) error {
for _, v := range choices {
if input == v {
return nil
}
}
return NewValidationError(fmt.Sprintf("%s is not a valid option.", input))
}
} | [
"func",
"OneOf",
"(",
"choices",
"[",
"]",
"string",
")",
"Func",
"{",
"return",
"func",
"(",
"input",
"string",
")",
"error",
"{",
"for",
"_",
",",
"v",
":=",
"range",
"choices",
"{",
"if",
"input",
"==",
"v",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"input",
")",
")",
"\n",
"}",
"\n",
"}"
] | // OneOf returns a validation function which validates whether or not the input
// matches one of the given options. | [
"OneOf",
"returns",
"a",
"validation",
"function",
"which",
"validates",
"whether",
"or",
"not",
"the",
"input",
"matches",
"one",
"of",
"the",
"given",
"options",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L86-L96 |
1,687 | manifoldco/torus-cli | validate/validate.go | SlugValidator | func SlugValidator(fieldName string) Func {
return func(input string) error {
if govalidator.StringMatches(input, slugPattern) {
return nil
}
return NewValidationError(fmt.Sprintf(slugErrorPattern, fieldName))
}
} | go | func SlugValidator(fieldName string) Func {
return func(input string) error {
if govalidator.StringMatches(input, slugPattern) {
return nil
}
return NewValidationError(fmt.Sprintf(slugErrorPattern, fieldName))
}
} | [
"func",
"SlugValidator",
"(",
"fieldName",
"string",
")",
"Func",
"{",
"return",
"func",
"(",
"input",
"string",
")",
"error",
"{",
"if",
"govalidator",
".",
"StringMatches",
"(",
"input",
",",
"slugPattern",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"fmt",
".",
"Sprintf",
"(",
"slugErrorPattern",
",",
"fieldName",
")",
")",
"\n",
"}",
"\n",
"}"
] | // SlugValidator returns a validation function | [
"SlugValidator",
"returns",
"a",
"validation",
"function"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L99-L107 |
1,688 | manifoldco/torus-cli | validate/validate.go | InviteCode | func InviteCode(input string) error {
if govalidator.StringMatches(input, inviteCodePattern) {
return nil
}
return NewValidationError("Please enter a valid invite code. Make sure to copy the entire code from the email!")
} | go | func InviteCode(input string) error {
if govalidator.StringMatches(input, inviteCodePattern) {
return nil
}
return NewValidationError("Please enter a valid invite code. Make sure to copy the entire code from the email!")
} | [
"func",
"InviteCode",
"(",
"input",
"string",
")",
"error",
"{",
"if",
"govalidator",
".",
"StringMatches",
"(",
"input",
",",
"inviteCodePattern",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // InviteCode validates whether the input meets the invite code requirements | [
"InviteCode",
"validates",
"whether",
"the",
"input",
"meets",
"the",
"invite",
"code",
"requirements"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L110-L116 |
1,689 | manifoldco/torus-cli | validate/validate.go | VerificationCode | func VerificationCode(input string) error {
if govalidator.StringMatches(input, verifyCodePattern) {
return nil
}
return NewValidationError("Please enter a valid verification code. Make sure to copy the entire code from the email!")
} | go | func VerificationCode(input string) error {
if govalidator.StringMatches(input, verifyCodePattern) {
return nil
}
return NewValidationError("Please enter a valid verification code. Make sure to copy the entire code from the email!")
} | [
"func",
"VerificationCode",
"(",
"input",
"string",
")",
"error",
"{",
"if",
"govalidator",
".",
"StringMatches",
"(",
"input",
",",
"verifyCodePattern",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // VerificationCode validates whether the input meets the verification code requirements | [
"VerificationCode",
"validates",
"whether",
"the",
"input",
"meets",
"the",
"verification",
"code",
"requirements"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L119-L125 |
1,690 | manifoldco/torus-cli | validate/validate.go | Description | func Description(input, fieldName string) error {
if len(input) <= 500 {
return nil
}
return NewValidationError(fieldName + " descriptions must be less than 500 characters")
} | go | func Description(input, fieldName string) error {
if len(input) <= 500 {
return nil
}
return NewValidationError(fieldName + " descriptions must be less than 500 characters")
} | [
"func",
"Description",
"(",
"input",
",",
"fieldName",
"string",
")",
"error",
"{",
"if",
"len",
"(",
"input",
")",
"<=",
"500",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"fieldName",
"+",
"\"",
"\"",
")",
"\n",
"}"
] | // Description validates whether the input meets the descriptin requirements | [
"Description",
"validates",
"whether",
"the",
"input",
"meets",
"the",
"descriptin",
"requirements"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L128-L134 |
1,691 | manifoldco/torus-cli | validate/validate.go | Name | func Name(input string) error {
if govalidator.StringMatches(input, namePattern) {
return nil
}
return NewValidationError(fmt.Sprintf(nameErrorPattern, "Names"))
} | go | func Name(input string) error {
if govalidator.StringMatches(input, namePattern) {
return nil
}
return NewValidationError(fmt.Sprintf(nameErrorPattern, "Names"))
} | [
"func",
"Name",
"(",
"input",
"string",
")",
"error",
"{",
"if",
"govalidator",
".",
"StringMatches",
"(",
"input",
",",
"namePattern",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"fmt",
".",
"Sprintf",
"(",
"nameErrorPattern",
",",
"\"",
"\"",
")",
")",
"\n",
"}"
] | // Name validates whether the input meets first name last name requirements | [
"Name",
"validates",
"whether",
"the",
"input",
"meets",
"first",
"name",
"last",
"name",
"requirements"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L146-L152 |
1,692 | manifoldco/torus-cli | validate/validate.go | Password | func Password(input string) error {
length := len(input)
if length >= 8 {
return nil
}
if length > 0 {
return NewValidationError("Passwords must be at least 8 characters")
}
return NewValidationError("Please enter a password")
} | go | func Password(input string) error {
length := len(input)
if length >= 8 {
return nil
}
if length > 0 {
return NewValidationError("Passwords must be at least 8 characters")
}
return NewValidationError("Please enter a password")
} | [
"func",
"Password",
"(",
"input",
"string",
")",
"error",
"{",
"length",
":=",
"len",
"(",
"input",
")",
"\n",
"if",
"length",
">=",
"8",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"if",
"length",
">",
"0",
"{",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // Password ensures the input meets password requirements | [
"Password",
"ensures",
"the",
"input",
"meets",
"password",
"requirements"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L155-L165 |
1,693 | manifoldco/torus-cli | validate/validate.go | ConfirmPassword | func ConfirmPassword(previous string) Func {
return func(input string) error {
err := Password(input)
if err != nil {
return err
}
if input != previous {
return NewValidationError("The password you provided does not match the previous password you provided!")
}
return nil
}
} | go | func ConfirmPassword(previous string) Func {
return func(input string) error {
err := Password(input)
if err != nil {
return err
}
if input != previous {
return NewValidationError("The password you provided does not match the previous password you provided!")
}
return nil
}
} | [
"func",
"ConfirmPassword",
"(",
"previous",
"string",
")",
"Func",
"{",
"return",
"func",
"(",
"input",
"string",
")",
"error",
"{",
"err",
":=",
"Password",
"(",
"input",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"input",
"!=",
"previous",
"{",
"return",
"NewValidationError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}",
"\n",
"}"
] | // ConfirmPassword ensures the input meets the password requirements and
// matches the previously provided password | [
"ConfirmPassword",
"ensures",
"the",
"input",
"meets",
"the",
"password",
"requirements",
"and",
"matches",
"the",
"previously",
"provided",
"password"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/validate/validate.go#L169-L182 |
1,694 | manifoldco/torus-cli | pathexp/pathexp.go | GlobContains | func GlobContains(value, subject string) bool {
gl := glob(value)
return gl.Contains(subject)
} | go | func GlobContains(value, subject string) bool {
gl := glob(value)
return gl.Contains(subject)
} | [
"func",
"GlobContains",
"(",
"value",
",",
"subject",
"string",
")",
"bool",
"{",
"gl",
":=",
"glob",
"(",
"value",
")",
"\n",
"return",
"gl",
".",
"Contains",
"(",
"subject",
")",
"\n",
"}"
] | // GlobContains returns whether a glob, built from the value, contains the subject | [
"GlobContains",
"returns",
"whether",
"a",
"glob",
"built",
"from",
"the",
"value",
"contains",
"the",
"subject"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/pathexp/pathexp.go#L92-L95 |
1,695 | manifoldco/torus-cli | pathexp/pathexp.go | compareSegmentType | func compareSegmentType(a, b segment) int {
segs := []segment{a, b}
ranks := make([]int, 2)
for i, seg := range segs {
switch seg.(type) {
case literal:
ranks[i] = 3
case glob:
ranks[i] = 2
case alternation:
ranks[i] = 1
case fullglob:
ranks[i] = 0
default:
panic("Bad type for segment!")
}
}
switch {
case ranks[0] < ranks[1]:
return -1
case ranks[0] > ranks[1]:
return 1
default:
return 0
}
} | go | func compareSegmentType(a, b segment) int {
segs := []segment{a, b}
ranks := make([]int, 2)
for i, seg := range segs {
switch seg.(type) {
case literal:
ranks[i] = 3
case glob:
ranks[i] = 2
case alternation:
ranks[i] = 1
case fullglob:
ranks[i] = 0
default:
panic("Bad type for segment!")
}
}
switch {
case ranks[0] < ranks[1]:
return -1
case ranks[0] > ranks[1]:
return 1
default:
return 0
}
} | [
"func",
"compareSegmentType",
"(",
"a",
",",
"b",
"segment",
")",
"int",
"{",
"segs",
":=",
"[",
"]",
"segment",
"{",
"a",
",",
"b",
"}",
"\n",
"ranks",
":=",
"make",
"(",
"[",
"]",
"int",
",",
"2",
")",
"\n",
"for",
"i",
",",
"seg",
":=",
"range",
"segs",
"{",
"switch",
"seg",
".",
"(",
"type",
")",
"{",
"case",
"literal",
":",
"ranks",
"[",
"i",
"]",
"=",
"3",
"\n",
"case",
"glob",
":",
"ranks",
"[",
"i",
"]",
"=",
"2",
"\n",
"case",
"alternation",
":",
"ranks",
"[",
"i",
"]",
"=",
"1",
"\n",
"case",
"fullglob",
":",
"ranks",
"[",
"i",
"]",
"=",
"0",
"\n",
"default",
":",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"switch",
"{",
"case",
"ranks",
"[",
"0",
"]",
"<",
"ranks",
"[",
"1",
"]",
":",
"return",
"-",
"1",
"\n",
"case",
"ranks",
"[",
"0",
"]",
">",
"ranks",
"[",
"1",
"]",
":",
"return",
"1",
"\n",
"default",
":",
"return",
"0",
"\n",
"}",
"\n",
"}"
] | // compareSegmentType ranks the segments by their type specificity | [
"compareSegmentType",
"ranks",
"the",
"segments",
"by",
"their",
"type",
"specificity"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/pathexp/pathexp.go#L136-L162 |
1,696 | manifoldco/torus-cli | pathexp/pathexp.go | New | func New(org, project string, envs, services, identities, instances []string) (*PathExp, error) {
return newPathexp(org, project, envs, services, identities, instances, true)
} | go | func New(org, project string, envs, services, identities, instances []string) (*PathExp, error) {
return newPathexp(org, project, envs, services, identities, instances, true)
} | [
"func",
"New",
"(",
"org",
",",
"project",
"string",
",",
"envs",
",",
"services",
",",
"identities",
",",
"instances",
"[",
"]",
"string",
")",
"(",
"*",
"PathExp",
",",
"error",
")",
"{",
"return",
"newPathexp",
"(",
"org",
",",
"project",
",",
"envs",
",",
"services",
",",
"identities",
",",
"instances",
",",
"true",
")",
"\n",
"}"
] | // New creates a new path expression from the given path segments
// It returns an error if any of the values fail to validate
// and it must contain all relevant parts | [
"New",
"creates",
"a",
"new",
"path",
"expression",
"from",
"the",
"given",
"path",
"segments",
"It",
"returns",
"an",
"error",
"if",
"any",
"of",
"the",
"values",
"fail",
"to",
"validate",
"and",
"it",
"must",
"contain",
"all",
"relevant",
"parts"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/pathexp/pathexp.go#L207-L209 |
1,697 | manifoldco/torus-cli | pathexp/pathexp.go | NewPartial | func NewPartial(org, project string, envs, services, identities, instances []string) (*PathExp, error) {
return newPathexp(org, project, envs, services, identities, instances, false)
} | go | func NewPartial(org, project string, envs, services, identities, instances []string) (*PathExp, error) {
return newPathexp(org, project, envs, services, identities, instances, false)
} | [
"func",
"NewPartial",
"(",
"org",
",",
"project",
"string",
",",
"envs",
",",
"services",
",",
"identities",
",",
"instances",
"[",
"]",
"string",
")",
"(",
"*",
"PathExp",
",",
"error",
")",
"{",
"return",
"newPathexp",
"(",
"org",
",",
"project",
",",
"envs",
",",
"services",
",",
"identities",
",",
"instances",
",",
"false",
")",
"\n",
"}"
] | // NewPartial creates a new path expression from the given path segments
// It returns an error if any of the values fail to validate
// but does not require any segments | [
"NewPartial",
"creates",
"a",
"new",
"path",
"expression",
"from",
"the",
"given",
"path",
"segments",
"It",
"returns",
"an",
"error",
"if",
"any",
"of",
"the",
"values",
"fail",
"to",
"validate",
"but",
"does",
"not",
"require",
"any",
"segments"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/pathexp/pathexp.go#L214-L216 |
1,698 | manifoldco/torus-cli | pathexp/pathexp.go | Split | func Split(name, segment string) ([]string, error) {
parts := []string{segment}
if len(segment) == 0 {
return parts, nil // let elsewhere handle the empty single segment
}
if segment[0] == '[' && segment[len(segment)-1] == ']' {
parts = strings.Split(segment[1:len(segment)-1], "|")
// zero length is checked in parseMultiple
if len(parts) == 1 {
return nil, errors.New("Single item in segment alternation for " + name + ".")
}
}
return parts, nil
} | go | func Split(name, segment string) ([]string, error) {
parts := []string{segment}
if len(segment) == 0 {
return parts, nil // let elsewhere handle the empty single segment
}
if segment[0] == '[' && segment[len(segment)-1] == ']' {
parts = strings.Split(segment[1:len(segment)-1], "|")
// zero length is checked in parseMultiple
if len(parts) == 1 {
return nil, errors.New("Single item in segment alternation for " + name + ".")
}
}
return parts, nil
} | [
"func",
"Split",
"(",
"name",
",",
"segment",
"string",
")",
"(",
"[",
"]",
"string",
",",
"error",
")",
"{",
"parts",
":=",
"[",
"]",
"string",
"{",
"segment",
"}",
"\n\n",
"if",
"len",
"(",
"segment",
")",
"==",
"0",
"{",
"return",
"parts",
",",
"nil",
"// let elsewhere handle the empty single segment",
"\n",
"}",
"\n\n",
"if",
"segment",
"[",
"0",
"]",
"==",
"'['",
"&&",
"segment",
"[",
"len",
"(",
"segment",
")",
"-",
"1",
"]",
"==",
"']'",
"{",
"parts",
"=",
"strings",
".",
"Split",
"(",
"segment",
"[",
"1",
":",
"len",
"(",
"segment",
")",
"-",
"1",
"]",
",",
"\"",
"\"",
")",
"\n",
"// zero length is checked in parseMultiple",
"if",
"len",
"(",
"parts",
")",
"==",
"1",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
"+",
"name",
"+",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"parts",
",",
"nil",
"\n",
"}"
] | // Split separates alternation | [
"Split",
"separates",
"alternation"
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/pathexp/pathexp.go#L435-L451 |
1,699 | manifoldco/torus-cli | pathexp/pathexp.go | Equal | func (pe *PathExp) Equal(other *PathExp) bool {
switch {
case pe.Org != other.Org:
return false
case pe.Project != other.Project:
return false
case !segmentsEqual(pe.Envs, other.Envs):
return false
case !segmentsEqual(pe.Services, other.Services):
return false
case !segmentsEqual(pe.Identities, other.Identities):
return false
case !segmentsEqual(pe.Instances, other.Instances):
return false
default:
return true
}
} | go | func (pe *PathExp) Equal(other *PathExp) bool {
switch {
case pe.Org != other.Org:
return false
case pe.Project != other.Project:
return false
case !segmentsEqual(pe.Envs, other.Envs):
return false
case !segmentsEqual(pe.Services, other.Services):
return false
case !segmentsEqual(pe.Identities, other.Identities):
return false
case !segmentsEqual(pe.Instances, other.Instances):
return false
default:
return true
}
} | [
"func",
"(",
"pe",
"*",
"PathExp",
")",
"Equal",
"(",
"other",
"*",
"PathExp",
")",
"bool",
"{",
"switch",
"{",
"case",
"pe",
".",
"Org",
"!=",
"other",
".",
"Org",
":",
"return",
"false",
"\n",
"case",
"pe",
".",
"Project",
"!=",
"other",
".",
"Project",
":",
"return",
"false",
"\n",
"case",
"!",
"segmentsEqual",
"(",
"pe",
".",
"Envs",
",",
"other",
".",
"Envs",
")",
":",
"return",
"false",
"\n",
"case",
"!",
"segmentsEqual",
"(",
"pe",
".",
"Services",
",",
"other",
".",
"Services",
")",
":",
"return",
"false",
"\n",
"case",
"!",
"segmentsEqual",
"(",
"pe",
".",
"Identities",
",",
"other",
".",
"Identities",
")",
":",
"return",
"false",
"\n",
"case",
"!",
"segmentsEqual",
"(",
"pe",
".",
"Instances",
",",
"other",
".",
"Instances",
")",
":",
"return",
"false",
"\n",
"default",
":",
"return",
"true",
"\n",
"}",
"\n",
"}"
] | // Equal returns a bool indicating if the two PathExps are equivalent. | [
"Equal",
"returns",
"a",
"bool",
"indicating",
"if",
"the",
"two",
"PathExps",
"are",
"equivalent",
"."
] | 137599f985e6f676c081ffb4230aaad52fb7d26c | https://github.com/manifoldco/torus-cli/blob/137599f985e6f676c081ffb4230aaad52fb7d26c/pathexp/pathexp.go#L497-L515 |
Subsets and Splits