id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequencelengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
sequencelengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
158,400
casbin/casbin
enforcer_synced.go
HasGroupingPolicy
func (e *SyncedEnforcer) HasGroupingPolicy(params ...interface{}) bool { e.m.RLock() defer e.m.RUnlock() return e.Enforcer.HasGroupingPolicy(params...) }
go
func (e *SyncedEnforcer) HasGroupingPolicy(params ...interface{}) bool { e.m.RLock() defer e.m.RUnlock() return e.Enforcer.HasGroupingPolicy(params...) }
[ "func", "(", "e", "*", "SyncedEnforcer", ")", "HasGroupingPolicy", "(", "params", "...", "interface", "{", "}", ")", "bool", "{", "e", ".", "m", ".", "RLock", "(", ")", "\n", "defer", "e", ".", "m", ".", "RUnlock", "(", ")", "\n", "return", "e", ".", "Enforcer", ".", "HasGroupingPolicy", "(", "params", "...", ")", "\n", "}" ]
// HasGroupingPolicy determines whether a role inheritance rule exists.
[ "HasGroupingPolicy", "determines", "whether", "a", "role", "inheritance", "rule", "exists", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_synced.go#L196-L200
158,401
casbin/casbin
util/util.go
EscapeAssertion
func EscapeAssertion(s string) string { //Replace the first dot, because it can't be recognized by the regexp. if (strings.HasPrefix(s, "r") || strings.HasPrefix(s, "p")) { s = strings.Replace(s, ".", "_",1) } var regex = regexp.MustCompile(`(\|| |=|\)|\(|&|<|>|,|\+|-|!|\*|\/)(r|p)\.`) s = regex.ReplaceAllStringFunc(s, func(m string) string { return strings.Replace(m, ".", "_", 1) }) return s }
go
func EscapeAssertion(s string) string { //Replace the first dot, because it can't be recognized by the regexp. if (strings.HasPrefix(s, "r") || strings.HasPrefix(s, "p")) { s = strings.Replace(s, ".", "_",1) } var regex = regexp.MustCompile(`(\|| |=|\)|\(|&|<|>|,|\+|-|!|\*|\/)(r|p)\.`) s = regex.ReplaceAllStringFunc(s, func(m string) string { return strings.Replace(m, ".", "_", 1) }) return s }
[ "func", "EscapeAssertion", "(", "s", "string", ")", "string", "{", "//Replace the first dot, because it can't be recognized by the regexp.", "if", "(", "strings", ".", "HasPrefix", "(", "s", ",", "\"", "\"", ")", "||", "strings", ".", "HasPrefix", "(", "s", ",", "\"", "\"", ")", ")", "{", "s", "=", "strings", ".", "Replace", "(", "s", ",", "\"", "\"", ",", "\"", "\"", ",", "1", ")", "\n", "}", "\n", "var", "regex", "=", "regexp", ".", "MustCompile", "(", "`(\\|| |=|\\)|\\(|&|<|>|,|\\+|-|!|\\*|\\/)(r|p)\\.`", ")", "\n", "s", "=", "regex", ".", "ReplaceAllStringFunc", "(", "s", ",", "func", "(", "m", "string", ")", "string", "{", "return", "strings", ".", "Replace", "(", "m", ",", "\"", "\"", ",", "\"", "\"", ",", "1", ")", "\n", "}", ")", "\n", "return", "s", "\n", "}" ]
// EscapeAssertion escapes the dots in the assertion, because the expression evaluation doesn't support such variable names.
[ "EscapeAssertion", "escapes", "the", "dots", "in", "the", "assertion", "because", "the", "expression", "evaluation", "doesn", "t", "support", "such", "variable", "names", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/util/util.go#L24-L34
158,402
casbin/casbin
util/util.go
ArrayRemoveDuplicates
func ArrayRemoveDuplicates(s *[]string) { found := make(map[string]bool) j := 0 for i, x := range *s { if !found[x] { found[x] = true (*s)[j] = (*s)[i] j++ } } *s = (*s)[:j] }
go
func ArrayRemoveDuplicates(s *[]string) { found := make(map[string]bool) j := 0 for i, x := range *s { if !found[x] { found[x] = true (*s)[j] = (*s)[i] j++ } } *s = (*s)[:j] }
[ "func", "ArrayRemoveDuplicates", "(", "s", "*", "[", "]", "string", ")", "{", "found", ":=", "make", "(", "map", "[", "string", "]", "bool", ")", "\n", "j", ":=", "0", "\n", "for", "i", ",", "x", ":=", "range", "*", "s", "{", "if", "!", "found", "[", "x", "]", "{", "found", "[", "x", "]", "=", "true", "\n", "(", "*", "s", ")", "[", "j", "]", "=", "(", "*", "s", ")", "[", "i", "]", "\n", "j", "++", "\n", "}", "\n", "}", "\n", "*", "s", "=", "(", "*", "s", ")", "[", ":", "j", "]", "\n", "}" ]
// ArrayRemoveDuplicates removes any duplicated elements in a string array.
[ "ArrayRemoveDuplicates", "removes", "any", "duplicated", "elements", "in", "a", "string", "array", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/util/util.go#L74-L85
158,403
casbin/casbin
persist/file-adapter/adapter_mock.go
NewAdapterMock
func NewAdapterMock(filePath string) *AdapterMock { a := AdapterMock{} a.filePath = filePath return &a }
go
func NewAdapterMock(filePath string) *AdapterMock { a := AdapterMock{} a.filePath = filePath return &a }
[ "func", "NewAdapterMock", "(", "filePath", "string", ")", "*", "AdapterMock", "{", "a", ":=", "AdapterMock", "{", "}", "\n", "a", ".", "filePath", "=", "filePath", "\n", "return", "&", "a", "\n", "}" ]
// NewAdapterMock is the constructor for AdapterMock.
[ "NewAdapterMock", "is", "the", "constructor", "for", "AdapterMock", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/persist/file-adapter/adapter_mock.go#L36-L40
158,404
casbin/casbin
persist/file-adapter/adapter_mock.go
GetMockErr
func (a *AdapterMock) GetMockErr() error { var returnError error if a.errorValue != "" { returnError = errors.New(a.errorValue) } return returnError }
go
func (a *AdapterMock) GetMockErr() error { var returnError error if a.errorValue != "" { returnError = errors.New(a.errorValue) } return returnError }
[ "func", "(", "a", "*", "AdapterMock", ")", "GetMockErr", "(", ")", "error", "{", "var", "returnError", "error", "\n", "if", "a", ".", "errorValue", "!=", "\"", "\"", "{", "returnError", "=", "errors", ".", "New", "(", "a", ".", "errorValue", ")", "\n", "}", "\n", "return", "returnError", "\n", "}" ]
// GetMockErr returns a mock error or nil
[ "GetMockErr", "returns", "a", "mock", "error", "or", "nil" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/persist/file-adapter/adapter_mock.go#L79-L85
158,405
casbin/casbin
persist/adapter.go
LoadPolicyLine
func LoadPolicyLine(line string, model model.Model) { if line == "" { return } if strings.HasPrefix(line, "#") { return } tokens := strings.Split(line, ",") for i := range tokens { tokens[i] = strings.TrimSpace(tokens[i]) } key := tokens[0] sec := key[:1] model[sec][key].Policy = append(model[sec][key].Policy, tokens[1:]) }
go
func LoadPolicyLine(line string, model model.Model) { if line == "" { return } if strings.HasPrefix(line, "#") { return } tokens := strings.Split(line, ",") for i := range tokens { tokens[i] = strings.TrimSpace(tokens[i]) } key := tokens[0] sec := key[:1] model[sec][key].Policy = append(model[sec][key].Policy, tokens[1:]) }
[ "func", "LoadPolicyLine", "(", "line", "string", ",", "model", "model", ".", "Model", ")", "{", "if", "line", "==", "\"", "\"", "{", "return", "\n", "}", "\n\n", "if", "strings", ".", "HasPrefix", "(", "line", ",", "\"", "\"", ")", "{", "return", "\n", "}", "\n\n", "tokens", ":=", "strings", ".", "Split", "(", "line", ",", "\"", "\"", ")", "\n", "for", "i", ":=", "range", "tokens", "{", "tokens", "[", "i", "]", "=", "strings", ".", "TrimSpace", "(", "tokens", "[", "i", "]", ")", "\n", "}", "\n\n", "key", ":=", "tokens", "[", "0", "]", "\n", "sec", ":=", "key", "[", ":", "1", "]", "\n", "model", "[", "sec", "]", "[", "key", "]", ".", "Policy", "=", "append", "(", "model", "[", "sec", "]", "[", "key", "]", ".", "Policy", ",", "tokens", "[", "1", ":", "]", ")", "\n", "}" ]
// LoadPolicyLine loads a text line as a policy rule to model.
[ "LoadPolicyLine", "loads", "a", "text", "line", "as", "a", "policy", "rule", "to", "model", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/persist/adapter.go#L24-L41
158,406
casbin/casbin
effect/default_effector.go
MergeEffects
func (e *DefaultEffector) MergeEffects(expr string, effects []Effect, results []float64) (bool, error) { result := false if expr == "some(where (p_eft == allow))" { result = false for _, eft := range effects { if eft == Allow { result = true break } } } else if expr == "!some(where (p_eft == deny))" { result = true for _, eft := range effects { if eft == Deny { result = false break } } } else if expr == "some(where (p_eft == allow)) && !some(where (p_eft == deny))" { result = false for _, eft := range effects { if eft == Allow { result = true } else if eft == Deny { result = false break } } } else if expr == "priority(p_eft) || deny" { result = false for _, eft := range effects { if eft != Indeterminate { if eft == Allow { result = true } else { result = false } break } } } else { return false, errors.New("unsupported effect") } return result, nil }
go
func (e *DefaultEffector) MergeEffects(expr string, effects []Effect, results []float64) (bool, error) { result := false if expr == "some(where (p_eft == allow))" { result = false for _, eft := range effects { if eft == Allow { result = true break } } } else if expr == "!some(where (p_eft == deny))" { result = true for _, eft := range effects { if eft == Deny { result = false break } } } else if expr == "some(where (p_eft == allow)) && !some(where (p_eft == deny))" { result = false for _, eft := range effects { if eft == Allow { result = true } else if eft == Deny { result = false break } } } else if expr == "priority(p_eft) || deny" { result = false for _, eft := range effects { if eft != Indeterminate { if eft == Allow { result = true } else { result = false } break } } } else { return false, errors.New("unsupported effect") } return result, nil }
[ "func", "(", "e", "*", "DefaultEffector", ")", "MergeEffects", "(", "expr", "string", ",", "effects", "[", "]", "Effect", ",", "results", "[", "]", "float64", ")", "(", "bool", ",", "error", ")", "{", "result", ":=", "false", "\n", "if", "expr", "==", "\"", "\"", "{", "result", "=", "false", "\n", "for", "_", ",", "eft", ":=", "range", "effects", "{", "if", "eft", "==", "Allow", "{", "result", "=", "true", "\n", "break", "\n", "}", "\n", "}", "\n", "}", "else", "if", "expr", "==", "\"", "\"", "{", "result", "=", "true", "\n", "for", "_", ",", "eft", ":=", "range", "effects", "{", "if", "eft", "==", "Deny", "{", "result", "=", "false", "\n", "break", "\n", "}", "\n", "}", "\n", "}", "else", "if", "expr", "==", "\"", "\"", "{", "result", "=", "false", "\n", "for", "_", ",", "eft", ":=", "range", "effects", "{", "if", "eft", "==", "Allow", "{", "result", "=", "true", "\n", "}", "else", "if", "eft", "==", "Deny", "{", "result", "=", "false", "\n", "break", "\n", "}", "\n", "}", "\n", "}", "else", "if", "expr", "==", "\"", "\"", "{", "result", "=", "false", "\n", "for", "_", ",", "eft", ":=", "range", "effects", "{", "if", "eft", "!=", "Indeterminate", "{", "if", "eft", "==", "Allow", "{", "result", "=", "true", "\n", "}", "else", "{", "result", "=", "false", "\n", "}", "\n", "break", "\n", "}", "\n", "}", "\n", "}", "else", "{", "return", "false", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "result", ",", "nil", "\n", "}" ]
// MergeEffects merges all matching results collected by the enforcer into a single decision.
[ "MergeEffects", "merges", "all", "matching", "results", "collected", "by", "the", "enforcer", "into", "a", "single", "decision", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/effect/default_effector.go#L30-L75
158,407
casbin/casbin
internal_api.go
addPolicy
func (e *Enforcer) addPolicy(sec string, ptype string, rule []string) bool { ruleAdded := e.model.AddPolicy(sec, ptype, rule) if !ruleAdded { return ruleAdded } if e.adapter != nil && e.autoSave { if err := e.adapter.AddPolicy(sec, ptype, rule); err != nil { if err.Error() != notImplemented { panic(err) } } if e.watcher != nil { // error intentionally ignored e.watcher.Update() } } return ruleAdded }
go
func (e *Enforcer) addPolicy(sec string, ptype string, rule []string) bool { ruleAdded := e.model.AddPolicy(sec, ptype, rule) if !ruleAdded { return ruleAdded } if e.adapter != nil && e.autoSave { if err := e.adapter.AddPolicy(sec, ptype, rule); err != nil { if err.Error() != notImplemented { panic(err) } } if e.watcher != nil { // error intentionally ignored e.watcher.Update() } } return ruleAdded }
[ "func", "(", "e", "*", "Enforcer", ")", "addPolicy", "(", "sec", "string", ",", "ptype", "string", ",", "rule", "[", "]", "string", ")", "bool", "{", "ruleAdded", ":=", "e", ".", "model", ".", "AddPolicy", "(", "sec", ",", "ptype", ",", "rule", ")", "\n", "if", "!", "ruleAdded", "{", "return", "ruleAdded", "\n", "}", "\n\n", "if", "e", ".", "adapter", "!=", "nil", "&&", "e", ".", "autoSave", "{", "if", "err", ":=", "e", ".", "adapter", ".", "AddPolicy", "(", "sec", ",", "ptype", ",", "rule", ")", ";", "err", "!=", "nil", "{", "if", "err", ".", "Error", "(", ")", "!=", "notImplemented", "{", "panic", "(", "err", ")", "\n", "}", "\n", "}", "\n", "if", "e", ".", "watcher", "!=", "nil", "{", "// error intentionally ignored", "e", ".", "watcher", ".", "Update", "(", ")", "\n", "}", "\n", "}", "\n\n", "return", "ruleAdded", "\n", "}" ]
// addPolicy adds a rule to the current policy.
[ "addPolicy", "adds", "a", "rule", "to", "the", "current", "policy", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/internal_api.go#L22-L41
158,408
casbin/casbin
internal_api.go
removePolicy
func (e *Enforcer) removePolicy(sec string, ptype string, rule []string) bool { ruleRemoved := e.model.RemovePolicy(sec, ptype, rule) if !ruleRemoved { return ruleRemoved } if e.adapter != nil && e.autoSave { if err := e.adapter.RemovePolicy(sec, ptype, rule); err != nil { if err.Error() != notImplemented { panic(err) } } if e.watcher != nil { // error intentionally ignored e.watcher.Update() } } return ruleRemoved }
go
func (e *Enforcer) removePolicy(sec string, ptype string, rule []string) bool { ruleRemoved := e.model.RemovePolicy(sec, ptype, rule) if !ruleRemoved { return ruleRemoved } if e.adapter != nil && e.autoSave { if err := e.adapter.RemovePolicy(sec, ptype, rule); err != nil { if err.Error() != notImplemented { panic(err) } } if e.watcher != nil { // error intentionally ignored e.watcher.Update() } } return ruleRemoved }
[ "func", "(", "e", "*", "Enforcer", ")", "removePolicy", "(", "sec", "string", ",", "ptype", "string", ",", "rule", "[", "]", "string", ")", "bool", "{", "ruleRemoved", ":=", "e", ".", "model", ".", "RemovePolicy", "(", "sec", ",", "ptype", ",", "rule", ")", "\n", "if", "!", "ruleRemoved", "{", "return", "ruleRemoved", "\n", "}", "\n\n", "if", "e", ".", "adapter", "!=", "nil", "&&", "e", ".", "autoSave", "{", "if", "err", ":=", "e", ".", "adapter", ".", "RemovePolicy", "(", "sec", ",", "ptype", ",", "rule", ")", ";", "err", "!=", "nil", "{", "if", "err", ".", "Error", "(", ")", "!=", "notImplemented", "{", "panic", "(", "err", ")", "\n", "}", "\n", "}", "\n", "if", "e", ".", "watcher", "!=", "nil", "{", "// error intentionally ignored", "e", ".", "watcher", ".", "Update", "(", ")", "\n", "}", "\n", "}", "\n\n", "return", "ruleRemoved", "\n", "}" ]
// removePolicy removes a rule from the current policy.
[ "removePolicy", "removes", "a", "rule", "from", "the", "current", "policy", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/internal_api.go#L44-L63
158,409
casbin/casbin
internal_api.go
removeFilteredPolicy
func (e *Enforcer) removeFilteredPolicy(sec string, ptype string, fieldIndex int, fieldValues ...string) bool { ruleRemoved := e.model.RemoveFilteredPolicy(sec, ptype, fieldIndex, fieldValues...) if !ruleRemoved { return ruleRemoved } if e.adapter != nil && e.autoSave { if err := e.adapter.RemoveFilteredPolicy(sec, ptype, fieldIndex, fieldValues...); err != nil { if err.Error() != notImplemented { panic(err) } } if e.watcher != nil { // error intentionally ignored e.watcher.Update() } } return ruleRemoved }
go
func (e *Enforcer) removeFilteredPolicy(sec string, ptype string, fieldIndex int, fieldValues ...string) bool { ruleRemoved := e.model.RemoveFilteredPolicy(sec, ptype, fieldIndex, fieldValues...) if !ruleRemoved { return ruleRemoved } if e.adapter != nil && e.autoSave { if err := e.adapter.RemoveFilteredPolicy(sec, ptype, fieldIndex, fieldValues...); err != nil { if err.Error() != notImplemented { panic(err) } } if e.watcher != nil { // error intentionally ignored e.watcher.Update() } } return ruleRemoved }
[ "func", "(", "e", "*", "Enforcer", ")", "removeFilteredPolicy", "(", "sec", "string", ",", "ptype", "string", ",", "fieldIndex", "int", ",", "fieldValues", "...", "string", ")", "bool", "{", "ruleRemoved", ":=", "e", ".", "model", ".", "RemoveFilteredPolicy", "(", "sec", ",", "ptype", ",", "fieldIndex", ",", "fieldValues", "...", ")", "\n", "if", "!", "ruleRemoved", "{", "return", "ruleRemoved", "\n", "}", "\n\n", "if", "e", ".", "adapter", "!=", "nil", "&&", "e", ".", "autoSave", "{", "if", "err", ":=", "e", ".", "adapter", ".", "RemoveFilteredPolicy", "(", "sec", ",", "ptype", ",", "fieldIndex", ",", "fieldValues", "...", ")", ";", "err", "!=", "nil", "{", "if", "err", ".", "Error", "(", ")", "!=", "notImplemented", "{", "panic", "(", "err", ")", "\n", "}", "\n", "}", "\n", "if", "e", ".", "watcher", "!=", "nil", "{", "// error intentionally ignored", "e", ".", "watcher", ".", "Update", "(", ")", "\n", "}", "\n", "}", "\n\n", "return", "ruleRemoved", "\n", "}" ]
// removeFilteredPolicy removes rules based on field filters from the current policy.
[ "removeFilteredPolicy", "removes", "rules", "based", "on", "field", "filters", "from", "the", "current", "policy", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/internal_api.go#L66-L85
158,410
casbin/casbin
model/policy.go
BuildRoleLinks
func (model Model) BuildRoleLinks(rm rbac.RoleManager) { for _, ast := range model["g"] { ast.buildRoleLinks(rm) } }
go
func (model Model) BuildRoleLinks(rm rbac.RoleManager) { for _, ast := range model["g"] { ast.buildRoleLinks(rm) } }
[ "func", "(", "model", "Model", ")", "BuildRoleLinks", "(", "rm", "rbac", ".", "RoleManager", ")", "{", "for", "_", ",", "ast", ":=", "range", "model", "[", "\"", "\"", "]", "{", "ast", ".", "buildRoleLinks", "(", "rm", ")", "\n", "}", "\n", "}" ]
// BuildRoleLinks initializes the roles in RBAC.
[ "BuildRoleLinks", "initializes", "the", "roles", "in", "RBAC", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L24-L28
158,411
casbin/casbin
model/policy.go
PrintPolicy
func (model Model) PrintPolicy() { log.LogPrint("Policy:") for key, ast := range model["p"] { log.LogPrint(key, ": ", ast.Value, ": ", ast.Policy) } for key, ast := range model["g"] { log.LogPrint(key, ": ", ast.Value, ": ", ast.Policy) } }
go
func (model Model) PrintPolicy() { log.LogPrint("Policy:") for key, ast := range model["p"] { log.LogPrint(key, ": ", ast.Value, ": ", ast.Policy) } for key, ast := range model["g"] { log.LogPrint(key, ": ", ast.Value, ": ", ast.Policy) } }
[ "func", "(", "model", "Model", ")", "PrintPolicy", "(", ")", "{", "log", ".", "LogPrint", "(", "\"", "\"", ")", "\n", "for", "key", ",", "ast", ":=", "range", "model", "[", "\"", "\"", "]", "{", "log", ".", "LogPrint", "(", "key", ",", "\"", "\"", ",", "ast", ".", "Value", ",", "\"", "\"", ",", "ast", ".", "Policy", ")", "\n", "}", "\n\n", "for", "key", ",", "ast", ":=", "range", "model", "[", "\"", "\"", "]", "{", "log", ".", "LogPrint", "(", "key", ",", "\"", "\"", ",", "ast", ".", "Value", ",", "\"", "\"", ",", "ast", ".", "Policy", ")", "\n", "}", "\n", "}" ]
// PrintPolicy prints the policy to log.
[ "PrintPolicy", "prints", "the", "policy", "to", "log", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L31-L40
158,412
casbin/casbin
model/policy.go
ClearPolicy
func (model Model) ClearPolicy() { for _, ast := range model["p"] { ast.Policy = nil } for _, ast := range model["g"] { ast.Policy = nil } }
go
func (model Model) ClearPolicy() { for _, ast := range model["p"] { ast.Policy = nil } for _, ast := range model["g"] { ast.Policy = nil } }
[ "func", "(", "model", "Model", ")", "ClearPolicy", "(", ")", "{", "for", "_", ",", "ast", ":=", "range", "model", "[", "\"", "\"", "]", "{", "ast", ".", "Policy", "=", "nil", "\n", "}", "\n\n", "for", "_", ",", "ast", ":=", "range", "model", "[", "\"", "\"", "]", "{", "ast", ".", "Policy", "=", "nil", "\n", "}", "\n", "}" ]
// ClearPolicy clears all current policy.
[ "ClearPolicy", "clears", "all", "current", "policy", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L43-L51
158,413
casbin/casbin
model/policy.go
GetPolicy
func (model Model) GetPolicy(sec string, ptype string) [][]string { return model[sec][ptype].Policy }
go
func (model Model) GetPolicy(sec string, ptype string) [][]string { return model[sec][ptype].Policy }
[ "func", "(", "model", "Model", ")", "GetPolicy", "(", "sec", "string", ",", "ptype", "string", ")", "[", "]", "[", "]", "string", "{", "return", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "\n", "}" ]
// GetPolicy gets all rules in a policy.
[ "GetPolicy", "gets", "all", "rules", "in", "a", "policy", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L54-L56
158,414
casbin/casbin
model/policy.go
GetFilteredPolicy
func (model Model) GetFilteredPolicy(sec string, ptype string, fieldIndex int, fieldValues ...string) [][]string { res := [][]string{} for _, rule := range model[sec][ptype].Policy { matched := true for i, fieldValue := range fieldValues { if fieldValue != "" && rule[fieldIndex+i] != fieldValue { matched = false break } } if matched { res = append(res, rule) } } return res }
go
func (model Model) GetFilteredPolicy(sec string, ptype string, fieldIndex int, fieldValues ...string) [][]string { res := [][]string{} for _, rule := range model[sec][ptype].Policy { matched := true for i, fieldValue := range fieldValues { if fieldValue != "" && rule[fieldIndex+i] != fieldValue { matched = false break } } if matched { res = append(res, rule) } } return res }
[ "func", "(", "model", "Model", ")", "GetFilteredPolicy", "(", "sec", "string", ",", "ptype", "string", ",", "fieldIndex", "int", ",", "fieldValues", "...", "string", ")", "[", "]", "[", "]", "string", "{", "res", ":=", "[", "]", "[", "]", "string", "{", "}", "\n\n", "for", "_", ",", "rule", ":=", "range", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "{", "matched", ":=", "true", "\n", "for", "i", ",", "fieldValue", ":=", "range", "fieldValues", "{", "if", "fieldValue", "!=", "\"", "\"", "&&", "rule", "[", "fieldIndex", "+", "i", "]", "!=", "fieldValue", "{", "matched", "=", "false", "\n", "break", "\n", "}", "\n", "}", "\n\n", "if", "matched", "{", "res", "=", "append", "(", "res", ",", "rule", ")", "\n", "}", "\n", "}", "\n\n", "return", "res", "\n", "}" ]
// GetFilteredPolicy gets rules based on field filters from a policy.
[ "GetFilteredPolicy", "gets", "rules", "based", "on", "field", "filters", "from", "a", "policy", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L59-L77
158,415
casbin/casbin
model/policy.go
HasPolicy
func (model Model) HasPolicy(sec string, ptype string, rule []string) bool { for _, r := range model[sec][ptype].Policy { if util.ArrayEquals(rule, r) { return true } } return false }
go
func (model Model) HasPolicy(sec string, ptype string, rule []string) bool { for _, r := range model[sec][ptype].Policy { if util.ArrayEquals(rule, r) { return true } } return false }
[ "func", "(", "model", "Model", ")", "HasPolicy", "(", "sec", "string", ",", "ptype", "string", ",", "rule", "[", "]", "string", ")", "bool", "{", "for", "_", ",", "r", ":=", "range", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "{", "if", "util", ".", "ArrayEquals", "(", "rule", ",", "r", ")", "{", "return", "true", "\n", "}", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// HasPolicy determines whether a model has the specified policy rule.
[ "HasPolicy", "determines", "whether", "a", "model", "has", "the", "specified", "policy", "rule", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L80-L88
158,416
casbin/casbin
model/policy.go
AddPolicy
func (model Model) AddPolicy(sec string, ptype string, rule []string) bool { if !model.HasPolicy(sec, ptype, rule) { model[sec][ptype].Policy = append(model[sec][ptype].Policy, rule) return true } return false }
go
func (model Model) AddPolicy(sec string, ptype string, rule []string) bool { if !model.HasPolicy(sec, ptype, rule) { model[sec][ptype].Policy = append(model[sec][ptype].Policy, rule) return true } return false }
[ "func", "(", "model", "Model", ")", "AddPolicy", "(", "sec", "string", ",", "ptype", "string", ",", "rule", "[", "]", "string", ")", "bool", "{", "if", "!", "model", ".", "HasPolicy", "(", "sec", ",", "ptype", ",", "rule", ")", "{", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "=", "append", "(", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", ",", "rule", ")", "\n", "return", "true", "\n", "}", "\n", "return", "false", "\n", "}" ]
// AddPolicy adds a policy rule to the model.
[ "AddPolicy", "adds", "a", "policy", "rule", "to", "the", "model", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L91-L97
158,417
casbin/casbin
model/policy.go
RemovePolicy
func (model Model) RemovePolicy(sec string, ptype string, rule []string) bool { for i, r := range model[sec][ptype].Policy { if util.ArrayEquals(rule, r) { model[sec][ptype].Policy = append(model[sec][ptype].Policy[:i], model[sec][ptype].Policy[i+1:]...) return true } } return false }
go
func (model Model) RemovePolicy(sec string, ptype string, rule []string) bool { for i, r := range model[sec][ptype].Policy { if util.ArrayEquals(rule, r) { model[sec][ptype].Policy = append(model[sec][ptype].Policy[:i], model[sec][ptype].Policy[i+1:]...) return true } } return false }
[ "func", "(", "model", "Model", ")", "RemovePolicy", "(", "sec", "string", ",", "ptype", "string", ",", "rule", "[", "]", "string", ")", "bool", "{", "for", "i", ",", "r", ":=", "range", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "{", "if", "util", ".", "ArrayEquals", "(", "rule", ",", "r", ")", "{", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "=", "append", "(", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "[", ":", "i", "]", ",", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "[", "i", "+", "1", ":", "]", "...", ")", "\n", "return", "true", "\n", "}", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// RemovePolicy removes a policy rule from the model.
[ "RemovePolicy", "removes", "a", "policy", "rule", "from", "the", "model", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L100-L109
158,418
casbin/casbin
model/policy.go
GetValuesForFieldInPolicy
func (model Model) GetValuesForFieldInPolicy(sec string, ptype string, fieldIndex int) []string { values := []string{} for _, rule := range model[sec][ptype].Policy { values = append(values, rule[fieldIndex]) } util.ArrayRemoveDuplicates(&values) return values }
go
func (model Model) GetValuesForFieldInPolicy(sec string, ptype string, fieldIndex int) []string { values := []string{} for _, rule := range model[sec][ptype].Policy { values = append(values, rule[fieldIndex]) } util.ArrayRemoveDuplicates(&values) return values }
[ "func", "(", "model", "Model", ")", "GetValuesForFieldInPolicy", "(", "sec", "string", ",", "ptype", "string", ",", "fieldIndex", "int", ")", "[", "]", "string", "{", "values", ":=", "[", "]", "string", "{", "}", "\n\n", "for", "_", ",", "rule", ":=", "range", "model", "[", "sec", "]", "[", "ptype", "]", ".", "Policy", "{", "values", "=", "append", "(", "values", ",", "rule", "[", "fieldIndex", "]", ")", "\n", "}", "\n\n", "util", ".", "ArrayRemoveDuplicates", "(", "&", "values", ")", "\n\n", "return", "values", "\n", "}" ]
// GetValuesForFieldInPolicy gets all values for a field for all rules in a policy, duplicated values are removed.
[ "GetValuesForFieldInPolicy", "gets", "all", "values", "for", "a", "field", "for", "all", "rules", "in", "a", "policy", "duplicated", "values", "are", "removed", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/policy.go#L136-L146
158,419
casbin/casbin
model/model.go
AddDef
func (model Model) AddDef(sec string, key string, value string) bool { ast := Assertion{} ast.Key = key ast.Value = value if ast.Value == "" { return false } if sec == "r" || sec == "p" { ast.Tokens = strings.Split(ast.Value, ", ") for i := range ast.Tokens { ast.Tokens[i] = key + "_" + ast.Tokens[i] } } else { ast.Value = util.RemoveComments(util.EscapeAssertion(ast.Value)) } _, ok := model[sec] if !ok { model[sec] = make(AssertionMap) } model[sec][key] = &ast return true }
go
func (model Model) AddDef(sec string, key string, value string) bool { ast := Assertion{} ast.Key = key ast.Value = value if ast.Value == "" { return false } if sec == "r" || sec == "p" { ast.Tokens = strings.Split(ast.Value, ", ") for i := range ast.Tokens { ast.Tokens[i] = key + "_" + ast.Tokens[i] } } else { ast.Value = util.RemoveComments(util.EscapeAssertion(ast.Value)) } _, ok := model[sec] if !ok { model[sec] = make(AssertionMap) } model[sec][key] = &ast return true }
[ "func", "(", "model", "Model", ")", "AddDef", "(", "sec", "string", ",", "key", "string", ",", "value", "string", ")", "bool", "{", "ast", ":=", "Assertion", "{", "}", "\n", "ast", ".", "Key", "=", "key", "\n", "ast", ".", "Value", "=", "value", "\n\n", "if", "ast", ".", "Value", "==", "\"", "\"", "{", "return", "false", "\n", "}", "\n\n", "if", "sec", "==", "\"", "\"", "||", "sec", "==", "\"", "\"", "{", "ast", ".", "Tokens", "=", "strings", ".", "Split", "(", "ast", ".", "Value", ",", "\"", "\"", ")", "\n", "for", "i", ":=", "range", "ast", ".", "Tokens", "{", "ast", ".", "Tokens", "[", "i", "]", "=", "key", "+", "\"", "\"", "+", "ast", ".", "Tokens", "[", "i", "]", "\n", "}", "\n", "}", "else", "{", "ast", ".", "Value", "=", "util", ".", "RemoveComments", "(", "util", ".", "EscapeAssertion", "(", "ast", ".", "Value", ")", ")", "\n", "}", "\n\n", "_", ",", "ok", ":=", "model", "[", "sec", "]", "\n", "if", "!", "ok", "{", "model", "[", "sec", "]", "=", "make", "(", "AssertionMap", ")", "\n", "}", "\n\n", "model", "[", "sec", "]", "[", "key", "]", "=", "&", "ast", "\n", "return", "true", "\n", "}" ]
// AddDef adds an assertion to the model.
[ "AddDef", "adds", "an", "assertion", "to", "the", "model", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/model.go#L46-L71
158,420
casbin/casbin
model/model.go
LoadModel
func (model Model) LoadModel(path string) { cfg, err := config.NewConfig(path) if err != nil { panic(err) } loadSection(model, cfg, "r") loadSection(model, cfg, "p") loadSection(model, cfg, "e") loadSection(model, cfg, "m") loadSection(model, cfg, "g") }
go
func (model Model) LoadModel(path string) { cfg, err := config.NewConfig(path) if err != nil { panic(err) } loadSection(model, cfg, "r") loadSection(model, cfg, "p") loadSection(model, cfg, "e") loadSection(model, cfg, "m") loadSection(model, cfg, "g") }
[ "func", "(", "model", "Model", ")", "LoadModel", "(", "path", "string", ")", "{", "cfg", ",", "err", ":=", "config", ".", "NewConfig", "(", "path", ")", "\n", "if", "err", "!=", "nil", "{", "panic", "(", "err", ")", "\n", "}", "\n\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "}" ]
// LoadModel loads the model from model CONF file.
[ "LoadModel", "loads", "the", "model", "from", "model", "CONF", "file", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/model.go#L93-L105
158,421
casbin/casbin
model/model.go
LoadModelFromText
func (model Model) LoadModelFromText(text string) { cfg, err := config.NewConfigFromText(text) if err != nil { panic(err) } loadSection(model, cfg, "r") loadSection(model, cfg, "p") loadSection(model, cfg, "e") loadSection(model, cfg, "m") loadSection(model, cfg, "g") }
go
func (model Model) LoadModelFromText(text string) { cfg, err := config.NewConfigFromText(text) if err != nil { panic(err) } loadSection(model, cfg, "r") loadSection(model, cfg, "p") loadSection(model, cfg, "e") loadSection(model, cfg, "m") loadSection(model, cfg, "g") }
[ "func", "(", "model", "Model", ")", "LoadModelFromText", "(", "text", "string", ")", "{", "cfg", ",", "err", ":=", "config", ".", "NewConfigFromText", "(", "text", ")", "\n", "if", "err", "!=", "nil", "{", "panic", "(", "err", ")", "\n", "}", "\n\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n\n", "loadSection", "(", "model", ",", "cfg", ",", "\"", "\"", ")", "\n", "}" ]
// LoadModelFromText loads the model from the text.
[ "LoadModelFromText", "loads", "the", "model", "from", "the", "text", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/model.go#L108-L120
158,422
casbin/casbin
model/model.go
PrintModel
func (model Model) PrintModel() { log.LogPrint("Model:") for k, v := range model { for i, j := range v { log.LogPrintf("%s.%s: %s", k, i, j.Value) } } }
go
func (model Model) PrintModel() { log.LogPrint("Model:") for k, v := range model { for i, j := range v { log.LogPrintf("%s.%s: %s", k, i, j.Value) } } }
[ "func", "(", "model", "Model", ")", "PrintModel", "(", ")", "{", "log", ".", "LogPrint", "(", "\"", "\"", ")", "\n", "for", "k", ",", "v", ":=", "range", "model", "{", "for", "i", ",", "j", ":=", "range", "v", "{", "log", ".", "LogPrintf", "(", "\"", "\"", ",", "k", ",", "i", ",", "j", ".", "Value", ")", "\n", "}", "\n", "}", "\n", "}" ]
// PrintModel prints the model to the log.
[ "PrintModel", "prints", "the", "model", "to", "the", "log", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/model.go#L123-L130
158,423
casbin/casbin
rbac/default-role-manager/role_manager.go
NewRoleManager
func NewRoleManager(maxHierarchyLevel int) rbac.RoleManager { rm := RoleManager{} rm.allRoles = &sync.Map{} rm.maxHierarchyLevel = maxHierarchyLevel rm.hasPattern = false return &rm }
go
func NewRoleManager(maxHierarchyLevel int) rbac.RoleManager { rm := RoleManager{} rm.allRoles = &sync.Map{} rm.maxHierarchyLevel = maxHierarchyLevel rm.hasPattern = false return &rm }
[ "func", "NewRoleManager", "(", "maxHierarchyLevel", "int", ")", "rbac", ".", "RoleManager", "{", "rm", ":=", "RoleManager", "{", "}", "\n", "rm", ".", "allRoles", "=", "&", "sync", ".", "Map", "{", "}", "\n", "rm", ".", "maxHierarchyLevel", "=", "maxHierarchyLevel", "\n", "rm", ".", "hasPattern", "=", "false", "\n\n", "return", "&", "rm", "\n", "}" ]
// NewRoleManager is the constructor for creating an instance of the // default RoleManager implementation.
[ "NewRoleManager", "is", "the", "constructor", "for", "creating", "an", "instance", "of", "the", "default", "RoleManager", "implementation", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac/default-role-manager/role_manager.go#L37-L44
158,424
casbin/casbin
rbac/default-role-manager/role_manager.go
GetRoles
func (rm *RoleManager) GetRoles(name string, domain ...string) ([]string, error) { if len(domain) == 1 { name = domain[0] + "::" + name } else if len(domain) > 1 { return nil, errors.New("error: domain should be 1 parameter") } if !rm.hasRole(name) { return []string{}, nil } roles := rm.createRole(name).getRoles() if len(domain) == 1 { for i := range roles { roles[i] = roles[i][len(domain[0])+2:] } } return roles, nil }
go
func (rm *RoleManager) GetRoles(name string, domain ...string) ([]string, error) { if len(domain) == 1 { name = domain[0] + "::" + name } else if len(domain) > 1 { return nil, errors.New("error: domain should be 1 parameter") } if !rm.hasRole(name) { return []string{}, nil } roles := rm.createRole(name).getRoles() if len(domain) == 1 { for i := range roles { roles[i] = roles[i][len(domain[0])+2:] } } return roles, nil }
[ "func", "(", "rm", "*", "RoleManager", ")", "GetRoles", "(", "name", "string", ",", "domain", "...", "string", ")", "(", "[", "]", "string", ",", "error", ")", "{", "if", "len", "(", "domain", ")", "==", "1", "{", "name", "=", "domain", "[", "0", "]", "+", "\"", "\"", "+", "name", "\n", "}", "else", "if", "len", "(", "domain", ")", ">", "1", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "!", "rm", ".", "hasRole", "(", "name", ")", "{", "return", "[", "]", "string", "{", "}", ",", "nil", "\n", "}", "\n\n", "roles", ":=", "rm", ".", "createRole", "(", "name", ")", ".", "getRoles", "(", ")", "\n", "if", "len", "(", "domain", ")", "==", "1", "{", "for", "i", ":=", "range", "roles", "{", "roles", "[", "i", "]", "=", "roles", "[", "i", "]", "[", "len", "(", "domain", "[", "0", "]", ")", "+", "2", ":", "]", "\n", "}", "\n", "}", "\n", "return", "roles", ",", "nil", "\n", "}" ]
// GetRoles gets the roles that a subject inherits. // domain is a prefix to the roles.
[ "GetRoles", "gets", "the", "roles", "that", "a", "subject", "inherits", ".", "domain", "is", "a", "prefix", "to", "the", "roles", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac/default-role-manager/role_manager.go#L148-L166
158,425
casbin/casbin
rbac/default-role-manager/role_manager.go
GetUsers
func (rm *RoleManager) GetUsers(name string, domain ...string) ([]string, error) { if len(domain) == 1 { name = domain[0] + "::" + name } else if len(domain) > 1 { return nil, errors.New("error: domain should be 1 parameter") } if !rm.hasRole(name) { return nil, errors.New("error: name does not exist") } names := []string{} rm.allRoles.Range(func(_, value interface{}) bool { role := value.(*Role) if role.hasDirectRole(name) { names = append(names, role.name) } return true }) if len(domain) == 1 { for i := range names { names[i] = names[i][len(domain[0])+2:] } } return names, nil }
go
func (rm *RoleManager) GetUsers(name string, domain ...string) ([]string, error) { if len(domain) == 1 { name = domain[0] + "::" + name } else if len(domain) > 1 { return nil, errors.New("error: domain should be 1 parameter") } if !rm.hasRole(name) { return nil, errors.New("error: name does not exist") } names := []string{} rm.allRoles.Range(func(_, value interface{}) bool { role := value.(*Role) if role.hasDirectRole(name) { names = append(names, role.name) } return true }) if len(domain) == 1 { for i := range names { names[i] = names[i][len(domain[0])+2:] } } return names, nil }
[ "func", "(", "rm", "*", "RoleManager", ")", "GetUsers", "(", "name", "string", ",", "domain", "...", "string", ")", "(", "[", "]", "string", ",", "error", ")", "{", "if", "len", "(", "domain", ")", "==", "1", "{", "name", "=", "domain", "[", "0", "]", "+", "\"", "\"", "+", "name", "\n", "}", "else", "if", "len", "(", "domain", ")", ">", "1", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "!", "rm", ".", "hasRole", "(", "name", ")", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "names", ":=", "[", "]", "string", "{", "}", "\n", "rm", ".", "allRoles", ".", "Range", "(", "func", "(", "_", ",", "value", "interface", "{", "}", ")", "bool", "{", "role", ":=", "value", ".", "(", "*", "Role", ")", "\n", "if", "role", ".", "hasDirectRole", "(", "name", ")", "{", "names", "=", "append", "(", "names", ",", "role", ".", "name", ")", "\n", "}", "\n", "return", "true", "\n", "}", ")", "\n", "if", "len", "(", "domain", ")", "==", "1", "{", "for", "i", ":=", "range", "names", "{", "names", "[", "i", "]", "=", "names", "[", "i", "]", "[", "len", "(", "domain", "[", "0", "]", ")", "+", "2", ":", "]", "\n", "}", "\n", "}", "\n", "return", "names", ",", "nil", "\n", "}" ]
// GetUsers gets the users that inherits a subject. // domain is an unreferenced parameter here, may be used in other implementations.
[ "GetUsers", "gets", "the", "users", "that", "inherits", "a", "subject", ".", "domain", "is", "an", "unreferenced", "parameter", "here", "may", "be", "used", "in", "other", "implementations", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac/default-role-manager/role_manager.go#L170-L195
158,426
casbin/casbin
rbac/default-role-manager/role_manager.go
PrintRoles
func (rm *RoleManager) PrintRoles() error { line := "" rm.allRoles.Range(func(_, value interface{}) bool { if text := value.(*Role).toString(); text != "" { if line == "" { line = text } else { line += ", " + text } } return true }) log.LogPrint(line) return nil }
go
func (rm *RoleManager) PrintRoles() error { line := "" rm.allRoles.Range(func(_, value interface{}) bool { if text := value.(*Role).toString(); text != "" { if line == "" { line = text } else { line += ", " + text } } return true }) log.LogPrint(line) return nil }
[ "func", "(", "rm", "*", "RoleManager", ")", "PrintRoles", "(", ")", "error", "{", "line", ":=", "\"", "\"", "\n", "rm", ".", "allRoles", ".", "Range", "(", "func", "(", "_", ",", "value", "interface", "{", "}", ")", "bool", "{", "if", "text", ":=", "value", ".", "(", "*", "Role", ")", ".", "toString", "(", ")", ";", "text", "!=", "\"", "\"", "{", "if", "line", "==", "\"", "\"", "{", "line", "=", "text", "\n", "}", "else", "{", "line", "+=", "\"", "\"", "+", "text", "\n", "}", "\n", "}", "\n", "return", "true", "\n", "}", ")", "\n", "log", ".", "LogPrint", "(", "line", ")", "\n", "return", "nil", "\n", "}" ]
// PrintRoles prints all the roles to log.
[ "PrintRoles", "prints", "all", "the", "roles", "to", "log", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac/default-role-manager/role_manager.go#L198-L212
158,427
casbin/casbin
model/function.go
AddFunction
func (fm FunctionMap) AddFunction(name string, function Function) { fm[name] = function }
go
func (fm FunctionMap) AddFunction(name string, function Function) { fm[name] = function }
[ "func", "(", "fm", "FunctionMap", ")", "AddFunction", "(", "name", "string", ",", "function", "Function", ")", "{", "fm", "[", "name", "]", "=", "function", "\n", "}" ]
// AddFunction adds an expression function.
[ "AddFunction", "adds", "an", "expression", "function", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/function.go#L26-L28
158,428
casbin/casbin
model/function.go
LoadFunctionMap
func LoadFunctionMap() FunctionMap { fm := make(FunctionMap) fm.AddFunction("keyMatch", util.KeyMatchFunc) fm.AddFunction("keyMatch2", util.KeyMatch2Func) fm.AddFunction("regexMatch", util.RegexMatchFunc) fm.AddFunction("ipMatch", util.IPMatchFunc) return fm }
go
func LoadFunctionMap() FunctionMap { fm := make(FunctionMap) fm.AddFunction("keyMatch", util.KeyMatchFunc) fm.AddFunction("keyMatch2", util.KeyMatch2Func) fm.AddFunction("regexMatch", util.RegexMatchFunc) fm.AddFunction("ipMatch", util.IPMatchFunc) return fm }
[ "func", "LoadFunctionMap", "(", ")", "FunctionMap", "{", "fm", ":=", "make", "(", "FunctionMap", ")", "\n\n", "fm", ".", "AddFunction", "(", "\"", "\"", ",", "util", ".", "KeyMatchFunc", ")", "\n", "fm", ".", "AddFunction", "(", "\"", "\"", ",", "util", ".", "KeyMatch2Func", ")", "\n", "fm", ".", "AddFunction", "(", "\"", "\"", ",", "util", ".", "RegexMatchFunc", ")", "\n", "fm", ".", "AddFunction", "(", "\"", "\"", ",", "util", ".", "IPMatchFunc", ")", "\n\n", "return", "fm", "\n", "}" ]
// LoadFunctionMap loads an initial function map.
[ "LoadFunctionMap", "loads", "an", "initial", "function", "map", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/model/function.go#L31-L40
158,429
casbin/casbin
rbac_api.go
GetUsersForRole
func (e *Enforcer) GetUsersForRole(name string) []string { res, _ := e.model["g"]["g"].RM.GetUsers(name) return res }
go
func (e *Enforcer) GetUsersForRole(name string) []string { res, _ := e.model["g"]["g"].RM.GetUsers(name) return res }
[ "func", "(", "e", "*", "Enforcer", ")", "GetUsersForRole", "(", "name", "string", ")", "[", "]", "string", "{", "res", ",", "_", ":=", "e", ".", "model", "[", "\"", "\"", "]", "[", "\"", "\"", "]", ".", "RM", ".", "GetUsers", "(", "name", ")", "\n", "return", "res", "\n", "}" ]
// GetUsersForRole gets the users that has a role.
[ "GetUsersForRole", "gets", "the", "users", "that", "has", "a", "role", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac_api.go#L24-L27
158,430
casbin/casbin
rbac_api_with_domains.go
GetUsersForRoleInDomain
func (e *Enforcer) GetUsersForRoleInDomain(name string, domain string) []string { res, _ := e.model["g"]["g"].RM.GetUsers(name, domain) return res }
go
func (e *Enforcer) GetUsersForRoleInDomain(name string, domain string) []string { res, _ := e.model["g"]["g"].RM.GetUsers(name, domain) return res }
[ "func", "(", "e", "*", "Enforcer", ")", "GetUsersForRoleInDomain", "(", "name", "string", ",", "domain", "string", ")", "[", "]", "string", "{", "res", ",", "_", ":=", "e", ".", "model", "[", "\"", "\"", "]", "[", "\"", "\"", "]", ".", "RM", ".", "GetUsers", "(", "name", ",", "domain", ")", "\n", "return", "res", "\n", "}" ]
// GetUsersForRoleInDomain gets the users that has a role inside a domain. Add by Gordon
[ "GetUsersForRoleInDomain", "gets", "the", "users", "that", "has", "a", "role", "inside", "a", "domain", ".", "Add", "by", "Gordon" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac_api_with_domains.go#L18-L21
158,431
casbin/casbin
enforcer_synced_safe.go
NewSyncedEnforcerSafe
func NewSyncedEnforcerSafe(params ...interface{}) (enforcer *SyncedEnforcer, err error) { e := &SyncedEnforcer{} e.Enforcer, err = NewEnforcerSafe(params...) if err != nil { return nil, err } e.autoLoad = false return e, nil }
go
func NewSyncedEnforcerSafe(params ...interface{}) (enforcer *SyncedEnforcer, err error) { e := &SyncedEnforcer{} e.Enforcer, err = NewEnforcerSafe(params...) if err != nil { return nil, err } e.autoLoad = false return e, nil }
[ "func", "NewSyncedEnforcerSafe", "(", "params", "...", "interface", "{", "}", ")", "(", "enforcer", "*", "SyncedEnforcer", ",", "err", "error", ")", "{", "e", ":=", "&", "SyncedEnforcer", "{", "}", "\n", "e", ".", "Enforcer", ",", "err", "=", "NewEnforcerSafe", "(", "params", "...", ")", "\n\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "e", ".", "autoLoad", "=", "false", "\n", "return", "e", ",", "nil", "\n", "}" ]
// NewSyncedEnforcerSafe creates a synchronized enforcer via file or DB.
[ "NewSyncedEnforcerSafe", "creates", "a", "synchronized", "enforcer", "via", "file", "or", "DB", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_synced_safe.go#L18-L28
158,432
casbin/casbin
enforcer_synced_safe.go
RemoveFilteredPolicySafe
func (e *SyncedEnforcer) RemoveFilteredPolicySafe(fieldIndex int, fieldValues ...string) (result bool, err error) { e.m.Lock() defer e.m.Unlock() return e.Enforcer.RemoveFilteredPolicySafe(fieldIndex, fieldValues...) }
go
func (e *SyncedEnforcer) RemoveFilteredPolicySafe(fieldIndex int, fieldValues ...string) (result bool, err error) { e.m.Lock() defer e.m.Unlock() return e.Enforcer.RemoveFilteredPolicySafe(fieldIndex, fieldValues...) }
[ "func", "(", "e", "*", "SyncedEnforcer", ")", "RemoveFilteredPolicySafe", "(", "fieldIndex", "int", ",", "fieldValues", "...", "string", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "e", ".", "m", ".", "Lock", "(", ")", "\n", "defer", "e", ".", "m", ".", "Unlock", "(", ")", "\n", "return", "e", ".", "Enforcer", ".", "RemoveFilteredPolicySafe", "(", "fieldIndex", ",", "fieldValues", "...", ")", "\n", "}" ]
// RemoveFilteredPolicySafe calls RemoveFilteredPolicy in a safe way, returns error instead of causing panic.
[ "RemoveFilteredPolicySafe", "calls", "RemoveFilteredPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_synced_safe.go#L59-L63
158,433
casbin/casbin
persist/file-adapter/adapter_filtered.go
NewFilteredAdapter
func NewFilteredAdapter(filePath string) *FilteredAdapter { a := FilteredAdapter{} a.filtered = true a.Adapter = NewAdapter(filePath) return &a }
go
func NewFilteredAdapter(filePath string) *FilteredAdapter { a := FilteredAdapter{} a.filtered = true a.Adapter = NewAdapter(filePath) return &a }
[ "func", "NewFilteredAdapter", "(", "filePath", "string", ")", "*", "FilteredAdapter", "{", "a", ":=", "FilteredAdapter", "{", "}", "\n", "a", ".", "filtered", "=", "true", "\n", "a", ".", "Adapter", "=", "NewAdapter", "(", "filePath", ")", "\n", "return", "&", "a", "\n", "}" ]
// NewFilteredAdapter is the constructor for FilteredAdapter.
[ "NewFilteredAdapter", "is", "the", "constructor", "for", "FilteredAdapter", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/persist/file-adapter/adapter_filtered.go#L42-L47
158,434
casbin/casbin
persist/file-adapter/adapter_filtered.go
LoadFilteredPolicy
func (a *FilteredAdapter) LoadFilteredPolicy(model model.Model, filter interface{}) error { if filter == nil { return a.LoadPolicy(model) } if a.filePath == "" { return errors.New("invalid file path, file path cannot be empty") } filterValue, ok := filter.(*Filter) if !ok { return errors.New("invalid filter type") } err := a.loadFilteredPolicyFile(model, filterValue, persist.LoadPolicyLine) if err == nil { a.filtered = true } return err }
go
func (a *FilteredAdapter) LoadFilteredPolicy(model model.Model, filter interface{}) error { if filter == nil { return a.LoadPolicy(model) } if a.filePath == "" { return errors.New("invalid file path, file path cannot be empty") } filterValue, ok := filter.(*Filter) if !ok { return errors.New("invalid filter type") } err := a.loadFilteredPolicyFile(model, filterValue, persist.LoadPolicyLine) if err == nil { a.filtered = true } return err }
[ "func", "(", "a", "*", "FilteredAdapter", ")", "LoadFilteredPolicy", "(", "model", "model", ".", "Model", ",", "filter", "interface", "{", "}", ")", "error", "{", "if", "filter", "==", "nil", "{", "return", "a", ".", "LoadPolicy", "(", "model", ")", "\n", "}", "\n", "if", "a", ".", "filePath", "==", "\"", "\"", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "filterValue", ",", "ok", ":=", "filter", ".", "(", "*", "Filter", ")", "\n", "if", "!", "ok", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "err", ":=", "a", ".", "loadFilteredPolicyFile", "(", "model", ",", "filterValue", ",", "persist", ".", "LoadPolicyLine", ")", "\n", "if", "err", "==", "nil", "{", "a", ".", "filtered", "=", "true", "\n", "}", "\n", "return", "err", "\n", "}" ]
// LoadFilteredPolicy loads only policy rules that match the filter.
[ "LoadFilteredPolicy", "loads", "only", "policy", "rules", "that", "match", "the", "filter", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/persist/file-adapter/adapter_filtered.go#L56-L73
158,435
casbin/casbin
config/config.go
NewConfig
func NewConfig(confName string) (ConfigInterface, error) { c := &Config{ data: make(map[string]map[string]string), } err := c.parse(confName) return c, err }
go
func NewConfig(confName string) (ConfigInterface, error) { c := &Config{ data: make(map[string]map[string]string), } err := c.parse(confName) return c, err }
[ "func", "NewConfig", "(", "confName", "string", ")", "(", "ConfigInterface", ",", "error", ")", "{", "c", ":=", "&", "Config", "{", "data", ":", "make", "(", "map", "[", "string", "]", "map", "[", "string", "]", "string", ")", ",", "}", "\n", "err", ":=", "c", ".", "parse", "(", "confName", ")", "\n", "return", "c", ",", "err", "\n", "}" ]
// NewConfig create an empty configuration representation from file.
[ "NewConfig", "create", "an", "empty", "configuration", "representation", "from", "file", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L60-L66
158,436
casbin/casbin
config/config.go
NewConfigFromText
func NewConfigFromText(text string) (ConfigInterface, error) { c := &Config{ data: make(map[string]map[string]string), } err := c.parseBuffer(bufio.NewReader(strings.NewReader(text))) return c, err }
go
func NewConfigFromText(text string) (ConfigInterface, error) { c := &Config{ data: make(map[string]map[string]string), } err := c.parseBuffer(bufio.NewReader(strings.NewReader(text))) return c, err }
[ "func", "NewConfigFromText", "(", "text", "string", ")", "(", "ConfigInterface", ",", "error", ")", "{", "c", ":=", "&", "Config", "{", "data", ":", "make", "(", "map", "[", "string", "]", "map", "[", "string", "]", "string", ")", ",", "}", "\n", "err", ":=", "c", ".", "parseBuffer", "(", "bufio", ".", "NewReader", "(", "strings", ".", "NewReader", "(", "text", ")", ")", ")", "\n", "return", "c", ",", "err", "\n", "}" ]
// NewConfigFromText create an empty configuration representation from text.
[ "NewConfigFromText", "create", "an", "empty", "configuration", "representation", "from", "text", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L69-L75
158,437
casbin/casbin
config/config.go
Bool
func (c *Config) Bool(key string) (bool, error) { return strconv.ParseBool(c.get(key)) }
go
func (c *Config) Bool(key string) (bool, error) { return strconv.ParseBool(c.get(key)) }
[ "func", "(", "c", "*", "Config", ")", "Bool", "(", "key", "string", ")", "(", "bool", ",", "error", ")", "{", "return", "strconv", ".", "ParseBool", "(", "c", ".", "get", "(", "key", ")", ")", "\n", "}" ]
// Bool lookups up the value using the provided key and converts the value to a bool
[ "Bool", "lookups", "up", "the", "value", "using", "the", "provided", "key", "and", "converts", "the", "value", "to", "a", "bool" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L186-L188
158,438
casbin/casbin
config/config.go
Int
func (c *Config) Int(key string) (int, error) { return strconv.Atoi(c.get(key)) }
go
func (c *Config) Int(key string) (int, error) { return strconv.Atoi(c.get(key)) }
[ "func", "(", "c", "*", "Config", ")", "Int", "(", "key", "string", ")", "(", "int", ",", "error", ")", "{", "return", "strconv", ".", "Atoi", "(", "c", ".", "get", "(", "key", ")", ")", "\n", "}" ]
// Int lookups up the value using the provided key and converts the value to a int
[ "Int", "lookups", "up", "the", "value", "using", "the", "provided", "key", "and", "converts", "the", "value", "to", "a", "int" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L191-L193
158,439
casbin/casbin
config/config.go
Int64
func (c *Config) Int64(key string) (int64, error) { return strconv.ParseInt(c.get(key), 10, 64) }
go
func (c *Config) Int64(key string) (int64, error) { return strconv.ParseInt(c.get(key), 10, 64) }
[ "func", "(", "c", "*", "Config", ")", "Int64", "(", "key", "string", ")", "(", "int64", ",", "error", ")", "{", "return", "strconv", ".", "ParseInt", "(", "c", ".", "get", "(", "key", ")", ",", "10", ",", "64", ")", "\n", "}" ]
// Int64 lookups up the value using the provided key and converts the value to a int64
[ "Int64", "lookups", "up", "the", "value", "using", "the", "provided", "key", "and", "converts", "the", "value", "to", "a", "int64" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L196-L198
158,440
casbin/casbin
config/config.go
Float64
func (c *Config) Float64(key string) (float64, error) { return strconv.ParseFloat(c.get(key), 64) }
go
func (c *Config) Float64(key string) (float64, error) { return strconv.ParseFloat(c.get(key), 64) }
[ "func", "(", "c", "*", "Config", ")", "Float64", "(", "key", "string", ")", "(", "float64", ",", "error", ")", "{", "return", "strconv", ".", "ParseFloat", "(", "c", ".", "get", "(", "key", ")", ",", "64", ")", "\n", "}" ]
// Float64 lookups up the value using the provided key and converts the value to a float64
[ "Float64", "lookups", "up", "the", "value", "using", "the", "provided", "key", "and", "converts", "the", "value", "to", "a", "float64" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L201-L203
158,441
casbin/casbin
config/config.go
Strings
func (c *Config) Strings(key string) []string { v := c.get(key) if v == "" { return nil } return strings.Split(v, ",") }
go
func (c *Config) Strings(key string) []string { v := c.get(key) if v == "" { return nil } return strings.Split(v, ",") }
[ "func", "(", "c", "*", "Config", ")", "Strings", "(", "key", "string", ")", "[", "]", "string", "{", "v", ":=", "c", ".", "get", "(", "key", ")", "\n", "if", "v", "==", "\"", "\"", "{", "return", "nil", "\n", "}", "\n", "return", "strings", ".", "Split", "(", "v", ",", "\"", "\"", ")", "\n", "}" ]
// Strings lookups up the value using the provided key and converts the value to an array of string // by splitting the string by comma
[ "Strings", "lookups", "up", "the", "value", "using", "the", "provided", "key", "and", "converts", "the", "value", "to", "an", "array", "of", "string", "by", "splitting", "the", "string", "by", "comma" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L212-L218
158,442
casbin/casbin
config/config.go
Set
func (c *Config) Set(key string, value string) error { c.Lock() defer c.Unlock() if len(key) == 0 { return errors.New("key is empty") } var ( section string option string ) keys := strings.Split(strings.ToLower(key), "::") if len(keys) >= 2 { section = keys[0] option = keys[1] } else { option = keys[0] } c.AddConfig(section, option, value) return nil }
go
func (c *Config) Set(key string, value string) error { c.Lock() defer c.Unlock() if len(key) == 0 { return errors.New("key is empty") } var ( section string option string ) keys := strings.Split(strings.ToLower(key), "::") if len(keys) >= 2 { section = keys[0] option = keys[1] } else { option = keys[0] } c.AddConfig(section, option, value) return nil }
[ "func", "(", "c", "*", "Config", ")", "Set", "(", "key", "string", ",", "value", "string", ")", "error", "{", "c", ".", "Lock", "(", ")", "\n", "defer", "c", ".", "Unlock", "(", ")", "\n", "if", "len", "(", "key", ")", "==", "0", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "var", "(", "section", "string", "\n", "option", "string", "\n", ")", "\n\n", "keys", ":=", "strings", ".", "Split", "(", "strings", ".", "ToLower", "(", "key", ")", ",", "\"", "\"", ")", "\n", "if", "len", "(", "keys", ")", ">=", "2", "{", "section", "=", "keys", "[", "0", "]", "\n", "option", "=", "keys", "[", "1", "]", "\n", "}", "else", "{", "option", "=", "keys", "[", "0", "]", "\n", "}", "\n\n", "c", ".", "AddConfig", "(", "section", ",", "option", ",", "value", ")", "\n", "return", "nil", "\n", "}" ]
// Set sets the value for the specific key in the Config
[ "Set", "sets", "the", "value", "for", "the", "specific", "key", "in", "the", "Config" ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/config/config.go#L221-L243
158,443
casbin/casbin
enforcer_safe.go
NewEnforcerSafe
func NewEnforcerSafe(params ...interface{}) (e *Enforcer, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) e = nil } }() e = NewEnforcer(params...) err = nil return }
go
func NewEnforcerSafe(params ...interface{}) (e *Enforcer, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) e = nil } }() e = NewEnforcer(params...) err = nil return }
[ "func", "NewEnforcerSafe", "(", "params", "...", "interface", "{", "}", ")", "(", "e", "*", "Enforcer", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "e", "=", "nil", "\n", "}", "\n", "}", "(", ")", "\n\n", "e", "=", "NewEnforcer", "(", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// NewEnforcerSafe calls NewEnforcer in a safe way, returns error instead of causing panic.
[ "NewEnforcerSafe", "calls", "NewEnforcer", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L22-L33
158,444
casbin/casbin
enforcer_safe.go
RemovePolicySafe
func (e *Enforcer) RemovePolicySafe(params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveNamedPolicy("p", params...) err = nil return }
go
func (e *Enforcer) RemovePolicySafe(params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveNamedPolicy("p", params...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "RemovePolicySafe", "(", "params", "...", "interface", "{", "}", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "RemoveNamedPolicy", "(", "\"", "\"", ",", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// RemovePolicySafe calls RemovePolicy in a safe way, returns error instead of causing panic.
[ "RemovePolicySafe", "calls", "RemovePolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L77-L88
158,445
casbin/casbin
enforcer_safe.go
AddGroupingPolicySafe
func (e *Enforcer) AddGroupingPolicySafe(params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.AddGroupingPolicy(params...) err = nil return }
go
func (e *Enforcer) AddGroupingPolicySafe(params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.AddGroupingPolicy(params...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "AddGroupingPolicySafe", "(", "params", "...", "interface", "{", "}", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "AddGroupingPolicy", "(", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// AddGroupingPolicySafe calls AddGroupingPolicy in a safe way, returns error instead of causing panic.
[ "AddGroupingPolicySafe", "calls", "AddGroupingPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L105-L116
158,446
casbin/casbin
enforcer_safe.go
AddNamedGroupingPolicySafe
func (e *Enforcer) AddNamedGroupingPolicySafe(ptype string, params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.AddNamedGroupingPolicy(ptype, params...) err = nil return }
go
func (e *Enforcer) AddNamedGroupingPolicySafe(ptype string, params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.AddNamedGroupingPolicy(ptype, params...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "AddNamedGroupingPolicySafe", "(", "ptype", "string", ",", "params", "...", "interface", "{", "}", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "AddNamedGroupingPolicy", "(", "ptype", ",", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// AddNamedGroupingPolicySafe calls AddNamedGroupingPolicy in a safe way, returns error instead of causing panic.
[ "AddNamedGroupingPolicySafe", "calls", "AddNamedGroupingPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L119-L130
158,447
casbin/casbin
enforcer_safe.go
AddNamedPolicySafe
func (e *Enforcer) AddNamedPolicySafe(ptype string, params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.AddNamedPolicy(ptype, params...) err = nil return }
go
func (e *Enforcer) AddNamedPolicySafe(ptype string, params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.AddNamedPolicy(ptype, params...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "AddNamedPolicySafe", "(", "ptype", "string", ",", "params", "...", "interface", "{", "}", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "AddNamedPolicy", "(", "ptype", ",", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// AddNamedPolicySafe calls AddNamedPolicy in a safe way, returns error instead of causing panic.
[ "AddNamedPolicySafe", "calls", "AddNamedPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L133-L144
158,448
casbin/casbin
enforcer_safe.go
RemoveGroupingPolicySafe
func (e *Enforcer) RemoveGroupingPolicySafe(params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveGroupingPolicy(params...) err = nil return }
go
func (e *Enforcer) RemoveGroupingPolicySafe(params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveGroupingPolicy(params...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "RemoveGroupingPolicySafe", "(", "params", "...", "interface", "{", "}", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "RemoveGroupingPolicy", "(", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// RemoveGroupingPolicySafe calls RemoveGroupingPolicy in a safe way, returns error instead of causing panic.
[ "RemoveGroupingPolicySafe", "calls", "RemoveGroupingPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L147-L158
158,449
casbin/casbin
enforcer_safe.go
RemoveFilteredGroupingPolicySafe
func (e *Enforcer) RemoveFilteredGroupingPolicySafe(fieldIndex int, fieldValues ...string) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveFilteredGroupingPolicy(fieldIndex, fieldValues...) err = nil return }
go
func (e *Enforcer) RemoveFilteredGroupingPolicySafe(fieldIndex int, fieldValues ...string) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveFilteredGroupingPolicy(fieldIndex, fieldValues...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "RemoveFilteredGroupingPolicySafe", "(", "fieldIndex", "int", ",", "fieldValues", "...", "string", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "RemoveFilteredGroupingPolicy", "(", "fieldIndex", ",", "fieldValues", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// RemoveFilteredGroupingPolicySafe calls RemoveFilteredGroupingPolicy in a safe way, returns error instead of causing panic.
[ "RemoveFilteredGroupingPolicySafe", "calls", "RemoveFilteredGroupingPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L161-L172
158,450
casbin/casbin
enforcer_safe.go
RemoveNamedGroupingPolicySafe
func (e *Enforcer) RemoveNamedGroupingPolicySafe(ptype string, params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveNamedGroupingPolicy(ptype, params...) err = nil return }
go
func (e *Enforcer) RemoveNamedGroupingPolicySafe(ptype string, params ...interface{}) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveNamedGroupingPolicy(ptype, params...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "RemoveNamedGroupingPolicySafe", "(", "ptype", "string", ",", "params", "...", "interface", "{", "}", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "RemoveNamedGroupingPolicy", "(", "ptype", ",", "params", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// RemoveNamedGroupingPolicySafe calls RemoveNamedGroupingPolicy in a safe way, returns error instead of causing panic.
[ "RemoveNamedGroupingPolicySafe", "calls", "RemoveNamedGroupingPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L175-L186
158,451
casbin/casbin
enforcer_safe.go
RemoveFilteredNamedGroupingPolicySafe
func (e *Enforcer) RemoveFilteredNamedGroupingPolicySafe(ptype string, fieldIndex int, fieldValues ...string) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveFilteredNamedGroupingPolicy(ptype, fieldIndex, fieldValues...) err = nil return }
go
func (e *Enforcer) RemoveFilteredNamedGroupingPolicySafe(ptype string, fieldIndex int, fieldValues ...string) (result bool, err error) { defer func() { if r := recover(); r != nil { err = fmt.Errorf("%v", r) result = false } }() result = e.RemoveFilteredNamedGroupingPolicy(ptype, fieldIndex, fieldValues...) err = nil return }
[ "func", "(", "e", "*", "Enforcer", ")", "RemoveFilteredNamedGroupingPolicySafe", "(", "ptype", "string", ",", "fieldIndex", "int", ",", "fieldValues", "...", "string", ")", "(", "result", "bool", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "r", ":=", "recover", "(", ")", ";", "r", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ")", "\n", "result", "=", "false", "\n", "}", "\n", "}", "(", ")", "\n\n", "result", "=", "e", ".", "RemoveFilteredNamedGroupingPolicy", "(", "ptype", ",", "fieldIndex", ",", "fieldValues", "...", ")", "\n", "err", "=", "nil", "\n", "return", "\n", "}" ]
// RemoveFilteredNamedGroupingPolicySafe calls RemoveFilteredNamedGroupingPolicy in a safe way, returns error instead of causing panic.
[ "RemoveFilteredNamedGroupingPolicySafe", "calls", "RemoveFilteredNamedGroupingPolicy", "in", "a", "safe", "way", "returns", "error", "instead", "of", "causing", "panic", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer_safe.go#L189-L200
158,452
casbin/casbin
rbac_api_synced.go
GetPermissionsForUser
func (e *SyncedEnforcer) GetPermissionsForUser(user string) [][]string { e.m.Lock() defer e.m.Unlock() return e.Enforcer.GetPermissionsForUser(user) }
go
func (e *SyncedEnforcer) GetPermissionsForUser(user string) [][]string { e.m.Lock() defer e.m.Unlock() return e.Enforcer.GetPermissionsForUser(user) }
[ "func", "(", "e", "*", "SyncedEnforcer", ")", "GetPermissionsForUser", "(", "user", "string", ")", "[", "]", "[", "]", "string", "{", "e", ".", "m", ".", "Lock", "(", ")", "\n", "defer", "e", ".", "m", ".", "Unlock", "(", ")", "\n", "return", "e", ".", "Enforcer", ".", "GetPermissionsForUser", "(", "user", ")", "\n", "}" ]
// GetPermissionsForUser gets permissions for a user or role.
[ "GetPermissionsForUser", "gets", "permissions", "for", "a", "user", "or", "role", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/rbac_api_synced.go#L110-L114
158,453
casbin/casbin
enforcer.go
InitWithFile
func (e *Enforcer) InitWithFile(modelPath string, policyPath string) { a := fileadapter.NewAdapter(policyPath) e.InitWithAdapter(modelPath, a) }
go
func (e *Enforcer) InitWithFile(modelPath string, policyPath string) { a := fileadapter.NewAdapter(policyPath) e.InitWithAdapter(modelPath, a) }
[ "func", "(", "e", "*", "Enforcer", ")", "InitWithFile", "(", "modelPath", "string", ",", "policyPath", "string", ")", "{", "a", ":=", "fileadapter", ".", "NewAdapter", "(", "policyPath", ")", "\n", "e", ".", "InitWithAdapter", "(", "modelPath", ",", "a", ")", "\n", "}" ]
// InitWithFile initializes an enforcer with a model file and a policy file.
[ "InitWithFile", "initializes", "an", "enforcer", "with", "a", "model", "file", "and", "a", "policy", "file", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer.go#L101-L104
158,454
casbin/casbin
enforcer.go
InitWithAdapter
func (e *Enforcer) InitWithAdapter(modelPath string, adapter persist.Adapter) { m := NewModel(modelPath, "") e.InitWithModelAndAdapter(m, adapter) e.modelPath = modelPath }
go
func (e *Enforcer) InitWithAdapter(modelPath string, adapter persist.Adapter) { m := NewModel(modelPath, "") e.InitWithModelAndAdapter(m, adapter) e.modelPath = modelPath }
[ "func", "(", "e", "*", "Enforcer", ")", "InitWithAdapter", "(", "modelPath", "string", ",", "adapter", "persist", ".", "Adapter", ")", "{", "m", ":=", "NewModel", "(", "modelPath", ",", "\"", "\"", ")", "\n", "e", ".", "InitWithModelAndAdapter", "(", "m", ",", "adapter", ")", "\n\n", "e", ".", "modelPath", "=", "modelPath", "\n", "}" ]
// InitWithAdapter initializes an enforcer with a database adapter.
[ "InitWithAdapter", "initializes", "an", "enforcer", "with", "a", "database", "adapter", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer.go#L107-L112
158,455
casbin/casbin
enforcer.go
InitWithModelAndAdapter
func (e *Enforcer) InitWithModelAndAdapter(m model.Model, adapter persist.Adapter) { e.adapter = adapter e.model = m e.model.PrintModel() e.fm = model.LoadFunctionMap() e.initialize() // Do not initialize the full policy when using a filtered adapter fa, ok := e.adapter.(persist.FilteredAdapter) if e.adapter != nil && (!ok || ok && !fa.IsFiltered()) { // error intentionally ignored e.LoadPolicy() } }
go
func (e *Enforcer) InitWithModelAndAdapter(m model.Model, adapter persist.Adapter) { e.adapter = adapter e.model = m e.model.PrintModel() e.fm = model.LoadFunctionMap() e.initialize() // Do not initialize the full policy when using a filtered adapter fa, ok := e.adapter.(persist.FilteredAdapter) if e.adapter != nil && (!ok || ok && !fa.IsFiltered()) { // error intentionally ignored e.LoadPolicy() } }
[ "func", "(", "e", "*", "Enforcer", ")", "InitWithModelAndAdapter", "(", "m", "model", ".", "Model", ",", "adapter", "persist", ".", "Adapter", ")", "{", "e", ".", "adapter", "=", "adapter", "\n\n", "e", ".", "model", "=", "m", "\n", "e", ".", "model", ".", "PrintModel", "(", ")", "\n", "e", ".", "fm", "=", "model", ".", "LoadFunctionMap", "(", ")", "\n\n", "e", ".", "initialize", "(", ")", "\n\n", "// Do not initialize the full policy when using a filtered adapter", "fa", ",", "ok", ":=", "e", ".", "adapter", ".", "(", "persist", ".", "FilteredAdapter", ")", "\n", "if", "e", ".", "adapter", "!=", "nil", "&&", "(", "!", "ok", "||", "ok", "&&", "!", "fa", ".", "IsFiltered", "(", ")", ")", "{", "// error intentionally ignored", "e", ".", "LoadPolicy", "(", ")", "\n", "}", "\n", "}" ]
// InitWithModelAndAdapter initializes an enforcer with a model and a database adapter.
[ "InitWithModelAndAdapter", "initializes", "an", "enforcer", "with", "a", "model", "and", "a", "database", "adapter", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer.go#L115-L130
158,456
casbin/casbin
enforcer.go
NewModel
func NewModel(text ...string) model.Model { m := make(model.Model) if len(text) == 2 { if text[0] != "" { m.LoadModel(text[0]) } } else if len(text) == 1 { m.LoadModelFromText(text[0]) } else if len(text) != 0 { panic("Invalid parameters for model.") } return m }
go
func NewModel(text ...string) model.Model { m := make(model.Model) if len(text) == 2 { if text[0] != "" { m.LoadModel(text[0]) } } else if len(text) == 1 { m.LoadModelFromText(text[0]) } else if len(text) != 0 { panic("Invalid parameters for model.") } return m }
[ "func", "NewModel", "(", "text", "...", "string", ")", "model", ".", "Model", "{", "m", ":=", "make", "(", "model", ".", "Model", ")", "\n\n", "if", "len", "(", "text", ")", "==", "2", "{", "if", "text", "[", "0", "]", "!=", "\"", "\"", "{", "m", ".", "LoadModel", "(", "text", "[", "0", "]", ")", "\n", "}", "\n", "}", "else", "if", "len", "(", "text", ")", "==", "1", "{", "m", ".", "LoadModelFromText", "(", "text", "[", "0", "]", ")", "\n", "}", "else", "if", "len", "(", "text", ")", "!=", "0", "{", "panic", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "m", "\n", "}" ]
// NewModel creates a model.
[ "NewModel", "creates", "a", "model", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer.go#L143-L157
158,457
casbin/casbin
enforcer.go
SetModel
func (e *Enforcer) SetModel(m model.Model) { e.model = m e.fm = model.LoadFunctionMap() }
go
func (e *Enforcer) SetModel(m model.Model) { e.model = m e.fm = model.LoadFunctionMap() }
[ "func", "(", "e", "*", "Enforcer", ")", "SetModel", "(", "m", "model", ".", "Model", ")", "{", "e", ".", "model", "=", "m", "\n", "e", ".", "fm", "=", "model", ".", "LoadFunctionMap", "(", ")", "\n", "}" ]
// SetModel sets the current model.
[ "SetModel", "sets", "the", "current", "model", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer.go#L174-L177
158,458
casbin/casbin
enforcer.go
IsFiltered
func (e *Enforcer) IsFiltered() bool { filteredAdapter, ok := e.adapter.(persist.FilteredAdapter) if !ok { return false } return filteredAdapter.IsFiltered() }
go
func (e *Enforcer) IsFiltered() bool { filteredAdapter, ok := e.adapter.(persist.FilteredAdapter) if !ok { return false } return filteredAdapter.IsFiltered() }
[ "func", "(", "e", "*", "Enforcer", ")", "IsFiltered", "(", ")", "bool", "{", "filteredAdapter", ",", "ok", ":=", "e", ".", "adapter", ".", "(", "persist", ".", "FilteredAdapter", ")", "\n", "if", "!", "ok", "{", "return", "false", "\n", "}", "\n", "return", "filteredAdapter", ".", "IsFiltered", "(", ")", "\n", "}" ]
// IsFiltered returns true if the loaded policy has been filtered.
[ "IsFiltered", "returns", "true", "if", "the", "loaded", "policy", "has", "been", "filtered", "." ]
9814ac94c19c922c0afd5c2f34255e0d543ef372
https://github.com/casbin/casbin/blob/9814ac94c19c922c0afd5c2f34255e0d543ef372/enforcer.go#L250-L256
158,459
keybase/client
go/kbfs/libkbfs/leveldb.go
Close
func (ldb *LevelDb) Close() (err error) { err = ldb.DB.Close() // Hide the closer error. _ = ldb.closer.Close() return err }
go
func (ldb *LevelDb) Close() (err error) { err = ldb.DB.Close() // Hide the closer error. _ = ldb.closer.Close() return err }
[ "func", "(", "ldb", "*", "LevelDb", ")", "Close", "(", ")", "(", "err", "error", ")", "{", "err", "=", "ldb", ".", "DB", ".", "Close", "(", ")", "\n", "// Hide the closer error.", "_", "=", "ldb", ".", "closer", ".", "Close", "(", ")", "\n", "return", "err", "\n", "}" ]
// Close closes the DB.
[ "Close", "closes", "the", "DB", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L47-L52
158,460
keybase/client
go/kbfs/libkbfs/leveldb.go
Get
func (ldb *LevelDb) Get(key []byte, ro *opt.ReadOptions) ( value []byte, err error) { defer func() { if err != nil { err = errors.WithStack(err) } }() return ldb.DB.Get(key, ro) }
go
func (ldb *LevelDb) Get(key []byte, ro *opt.ReadOptions) ( value []byte, err error) { defer func() { if err != nil { err = errors.WithStack(err) } }() return ldb.DB.Get(key, ro) }
[ "func", "(", "ldb", "*", "LevelDb", ")", "Get", "(", "key", "[", "]", "byte", ",", "ro", "*", "opt", ".", "ReadOptions", ")", "(", "value", "[", "]", "byte", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "err", "!=", "nil", "{", "err", "=", "errors", ".", "WithStack", "(", "err", ")", "\n", "}", "\n", "}", "(", ")", "\n", "return", "ldb", ".", "DB", ".", "Get", "(", "key", ",", "ro", ")", "\n", "}" ]
// Get gets data from the DB.
[ "Get", "gets", "data", "from", "the", "DB", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L55-L63
158,461
keybase/client
go/kbfs/libkbfs/leveldb.go
GetWithMeter
func (ldb *LevelDb) GetWithMeter(key []byte, hitMeter, missMeter *CountMeter) ( value []byte, err error) { defer func() { if err == nil { if hitMeter != nil { hitMeter.Mark(1) } } else if missMeter != nil { missMeter.Mark(1) } }() return ldb.Get(key, nil) }
go
func (ldb *LevelDb) GetWithMeter(key []byte, hitMeter, missMeter *CountMeter) ( value []byte, err error) { defer func() { if err == nil { if hitMeter != nil { hitMeter.Mark(1) } } else if missMeter != nil { missMeter.Mark(1) } }() return ldb.Get(key, nil) }
[ "func", "(", "ldb", "*", "LevelDb", ")", "GetWithMeter", "(", "key", "[", "]", "byte", ",", "hitMeter", ",", "missMeter", "*", "CountMeter", ")", "(", "value", "[", "]", "byte", ",", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "err", "==", "nil", "{", "if", "hitMeter", "!=", "nil", "{", "hitMeter", ".", "Mark", "(", "1", ")", "\n", "}", "\n", "}", "else", "if", "missMeter", "!=", "nil", "{", "missMeter", ".", "Mark", "(", "1", ")", "\n", "}", "\n", "}", "(", ")", "\n", "return", "ldb", ".", "Get", "(", "key", ",", "nil", ")", "\n", "}" ]
// GetWithMeter gets data from the DB while tracking the hit rate.
[ "GetWithMeter", "gets", "data", "from", "the", "DB", "while", "tracking", "the", "hit", "rate", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L66-L78
158,462
keybase/client
go/kbfs/libkbfs/leveldb.go
Put
func (ldb *LevelDb) Put(key, value []byte, wo *opt.WriteOptions) (err error) { defer func() { if err != nil { err = errors.WithStack(err) } }() return ldb.DB.Put(key, value, wo) }
go
func (ldb *LevelDb) Put(key, value []byte, wo *opt.WriteOptions) (err error) { defer func() { if err != nil { err = errors.WithStack(err) } }() return ldb.DB.Put(key, value, wo) }
[ "func", "(", "ldb", "*", "LevelDb", ")", "Put", "(", "key", ",", "value", "[", "]", "byte", ",", "wo", "*", "opt", ".", "WriteOptions", ")", "(", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "err", "!=", "nil", "{", "err", "=", "errors", ".", "WithStack", "(", "err", ")", "\n", "}", "\n", "}", "(", ")", "\n", "return", "ldb", ".", "DB", ".", "Put", "(", "key", ",", "value", ",", "wo", ")", "\n", "}" ]
// Put puts data into the DB.
[ "Put", "puts", "data", "into", "the", "DB", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L81-L88
158,463
keybase/client
go/kbfs/libkbfs/leveldb.go
PutWithMeter
func (ldb *LevelDb) PutWithMeter(key, value []byte, putMeter *CountMeter) ( err error) { defer func() { if err == nil && putMeter != nil { putMeter.Mark(1) } }() return ldb.Put(key, value, nil) }
go
func (ldb *LevelDb) PutWithMeter(key, value []byte, putMeter *CountMeter) ( err error) { defer func() { if err == nil && putMeter != nil { putMeter.Mark(1) } }() return ldb.Put(key, value, nil) }
[ "func", "(", "ldb", "*", "LevelDb", ")", "PutWithMeter", "(", "key", ",", "value", "[", "]", "byte", ",", "putMeter", "*", "CountMeter", ")", "(", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "if", "err", "==", "nil", "&&", "putMeter", "!=", "nil", "{", "putMeter", ".", "Mark", "(", "1", ")", "\n", "}", "\n", "}", "(", ")", "\n", "return", "ldb", ".", "Put", "(", "key", ",", "value", ",", "nil", ")", "\n", "}" ]
// PutWithMeter gets data from the DB while tracking the hit rate.
[ "PutWithMeter", "gets", "data", "from", "the", "DB", "while", "tracking", "the", "hit", "rate", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L91-L99
158,464
keybase/client
go/kbfs/libkbfs/leveldb.go
openLevelDBWithOptions
func openLevelDBWithOptions(stor storage.Storage, options *opt.Options) ( *LevelDb, error) { db, err := leveldb.Open(stor, options) if ldberrors.IsCorrupted(err) { // There's a possibility that if the leveldb wasn't closed properly // last time while it was being written, then the manifest is corrupt. // This means leveldb must rebuild its manifest, which takes longer // than a simple `Open`. // TODO: log here db, err = leveldb.Recover(stor, options) } if err != nil { stor.Close() return nil, err } return &LevelDb{db, stor}, nil }
go
func openLevelDBWithOptions(stor storage.Storage, options *opt.Options) ( *LevelDb, error) { db, err := leveldb.Open(stor, options) if ldberrors.IsCorrupted(err) { // There's a possibility that if the leveldb wasn't closed properly // last time while it was being written, then the manifest is corrupt. // This means leveldb must rebuild its manifest, which takes longer // than a simple `Open`. // TODO: log here db, err = leveldb.Recover(stor, options) } if err != nil { stor.Close() return nil, err } return &LevelDb{db, stor}, nil }
[ "func", "openLevelDBWithOptions", "(", "stor", "storage", ".", "Storage", ",", "options", "*", "opt", ".", "Options", ")", "(", "*", "LevelDb", ",", "error", ")", "{", "db", ",", "err", ":=", "leveldb", ".", "Open", "(", "stor", ",", "options", ")", "\n", "if", "ldberrors", ".", "IsCorrupted", "(", "err", ")", "{", "// There's a possibility that if the leveldb wasn't closed properly", "// last time while it was being written, then the manifest is corrupt.", "// This means leveldb must rebuild its manifest, which takes longer", "// than a simple `Open`.", "// TODO: log here", "db", ",", "err", "=", "leveldb", ".", "Recover", "(", "stor", ",", "options", ")", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "stor", ".", "Close", "(", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "LevelDb", "{", "db", ",", "stor", "}", ",", "nil", "\n", "}" ]
// openLevelDB opens or recovers a leveldb.DB with a passed-in storage.Storage // as its underlying storage layer, and with the options specified.
[ "openLevelDB", "opens", "or", "recovers", "a", "leveldb", ".", "DB", "with", "a", "passed", "-", "in", "storage", ".", "Storage", "as", "its", "underlying", "storage", "layer", "and", "with", "the", "options", "specified", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L103-L119
158,465
keybase/client
go/kbfs/libkbfs/leveldb.go
openLevelDB
func openLevelDB(stor storage.Storage) (*LevelDb, error) { options := *leveldbOptions options.Filter = filter.NewBloomFilter(16) return openLevelDBWithOptions(stor, &options) }
go
func openLevelDB(stor storage.Storage) (*LevelDb, error) { options := *leveldbOptions options.Filter = filter.NewBloomFilter(16) return openLevelDBWithOptions(stor, &options) }
[ "func", "openLevelDB", "(", "stor", "storage", ".", "Storage", ")", "(", "*", "LevelDb", ",", "error", ")", "{", "options", ":=", "*", "leveldbOptions", "\n", "options", ".", "Filter", "=", "filter", ".", "NewBloomFilter", "(", "16", ")", "\n", "return", "openLevelDBWithOptions", "(", "stor", ",", "&", "options", ")", "\n", "}" ]
// openLevelDB opens or recovers a leveldb.DB with a passed-in storage.Storage // as its underlying storage layer.
[ "openLevelDB", "opens", "or", "recovers", "a", "leveldb", ".", "DB", "with", "a", "passed", "-", "in", "storage", ".", "Storage", "as", "its", "underlying", "storage", "layer", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L123-L127
158,466
keybase/client
go/kbfs/libkbfs/leveldb.go
openVersionedLevelDB
func openVersionedLevelDB(log logger.Logger, storageRoot string, dbFolderName string, currentDiskCacheVersion uint64, dbFilename string) ( db *LevelDb, err error) { dbPath := filepath.Join(storageRoot, dbFolderName) versionPath, err := getVersionedPathForDiskCache( log, dbPath, dbFolderName, currentDiskCacheVersion) if err != nil { return nil, err } p := filepath.Join(versionPath, dbFilename) log.Debug("opening LevelDB: %s", p) storage, err := storage.OpenFile(p, false) if err != nil { return nil, err } defer func() { if err != nil { storage.Close() } }() options := *leveldbOptions if db, err = openLevelDBWithOptions(storage, &options); err != nil { return nil, err } return db, nil }
go
func openVersionedLevelDB(log logger.Logger, storageRoot string, dbFolderName string, currentDiskCacheVersion uint64, dbFilename string) ( db *LevelDb, err error) { dbPath := filepath.Join(storageRoot, dbFolderName) versionPath, err := getVersionedPathForDiskCache( log, dbPath, dbFolderName, currentDiskCacheVersion) if err != nil { return nil, err } p := filepath.Join(versionPath, dbFilename) log.Debug("opening LevelDB: %s", p) storage, err := storage.OpenFile(p, false) if err != nil { return nil, err } defer func() { if err != nil { storage.Close() } }() options := *leveldbOptions if db, err = openLevelDBWithOptions(storage, &options); err != nil { return nil, err } return db, nil }
[ "func", "openVersionedLevelDB", "(", "log", "logger", ".", "Logger", ",", "storageRoot", "string", ",", "dbFolderName", "string", ",", "currentDiskCacheVersion", "uint64", ",", "dbFilename", "string", ")", "(", "db", "*", "LevelDb", ",", "err", "error", ")", "{", "dbPath", ":=", "filepath", ".", "Join", "(", "storageRoot", ",", "dbFolderName", ")", "\n", "versionPath", ",", "err", ":=", "getVersionedPathForDiskCache", "(", "log", ",", "dbPath", ",", "dbFolderName", ",", "currentDiskCacheVersion", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "p", ":=", "filepath", ".", "Join", "(", "versionPath", ",", "dbFilename", ")", "\n", "log", ".", "Debug", "(", "\"", "\"", ",", "p", ")", "\n", "storage", ",", "err", ":=", "storage", ".", "OpenFile", "(", "p", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "func", "(", ")", "{", "if", "err", "!=", "nil", "{", "storage", ".", "Close", "(", ")", "\n", "}", "\n", "}", "(", ")", "\n", "options", ":=", "*", "leveldbOptions", "\n", "if", "db", ",", "err", "=", "openLevelDBWithOptions", "(", "storage", ",", "&", "options", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "db", ",", "nil", "\n", "}" ]
// openVersionedLevelDB opens a level DB under a versioned path on the local filesystem // under storageRoot. The path include dbFolderName and dbFilename. Note that // dbFilename is actually created as a folder; it's just where raw LevelDb // lives.
[ "openVersionedLevelDB", "opens", "a", "level", "DB", "under", "a", "versioned", "path", "on", "the", "local", "filesystem", "under", "storageRoot", ".", "The", "path", "include", "dbFolderName", "and", "dbFilename", ".", "Note", "that", "dbFilename", "is", "actually", "created", "as", "a", "folder", ";", "it", "s", "just", "where", "raw", "LevelDb", "lives", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/leveldb.go#L212-L237
158,467
keybase/client
go/libkb/stream_classifier.go
ClassifyStream
func ClassifyStream(r io.Reader) (sc StreamClassification, out io.Reader, err error) { // 4096 is currently the default buffer size. It is specified explicitly because go 1.9 does not // expose the size of a bufio.Reader (go 1.10 does). stream := bufio.NewReaderSize(r, 4096) buf, err := stream.Peek(4096) if err != nil { // If we had a short peek (for example, due to a short stream), we can still continue and ignore the error if len(buf) == 0 { return sc, stream, err } err = nil } sb := string(buf) switch { case strings.HasPrefix(sb, "-----BEGIN PGP MESSAGE-----"): sc.Format = CryptoMessageFormatPGP sc.Armored = true sc.Type = CryptoMessageTypeAmbiguous case strings.HasPrefix(sb, "-----BEGIN PGP SIGNATURE-----"): sc.Format = CryptoMessageFormatPGP sc.Armored = true sc.Type = CryptoMessageTypeDetachedSignature case strings.HasPrefix(sb, "-----BEGIN PGP SIGNED MESSAGE-----"): sc.Format = CryptoMessageFormatPGP sc.Armored = true sc.Type = CryptoMessageTypeClearSignature case isSaltpackMessage(stream, &sc): // Format etc. set by isSaltpackBinary(). case isBase64KeybaseV0Sig(sb): sc.Format = CryptoMessageFormatKeybaseV0 sc.Armored = true sc.Type = CryptoMessageTypeAttachedSignature case isPGPBinary(buf, &sc): // Format etc. set by isPGPBinary(). case isUTF16Mark(buf): err = UTF16UnsupportedError{} default: err = UnknownStreamError{} } return sc, stream, err }
go
func ClassifyStream(r io.Reader) (sc StreamClassification, out io.Reader, err error) { // 4096 is currently the default buffer size. It is specified explicitly because go 1.9 does not // expose the size of a bufio.Reader (go 1.10 does). stream := bufio.NewReaderSize(r, 4096) buf, err := stream.Peek(4096) if err != nil { // If we had a short peek (for example, due to a short stream), we can still continue and ignore the error if len(buf) == 0 { return sc, stream, err } err = nil } sb := string(buf) switch { case strings.HasPrefix(sb, "-----BEGIN PGP MESSAGE-----"): sc.Format = CryptoMessageFormatPGP sc.Armored = true sc.Type = CryptoMessageTypeAmbiguous case strings.HasPrefix(sb, "-----BEGIN PGP SIGNATURE-----"): sc.Format = CryptoMessageFormatPGP sc.Armored = true sc.Type = CryptoMessageTypeDetachedSignature case strings.HasPrefix(sb, "-----BEGIN PGP SIGNED MESSAGE-----"): sc.Format = CryptoMessageFormatPGP sc.Armored = true sc.Type = CryptoMessageTypeClearSignature case isSaltpackMessage(stream, &sc): // Format etc. set by isSaltpackBinary(). case isBase64KeybaseV0Sig(sb): sc.Format = CryptoMessageFormatKeybaseV0 sc.Armored = true sc.Type = CryptoMessageTypeAttachedSignature case isPGPBinary(buf, &sc): // Format etc. set by isPGPBinary(). case isUTF16Mark(buf): err = UTF16UnsupportedError{} default: err = UnknownStreamError{} } return sc, stream, err }
[ "func", "ClassifyStream", "(", "r", "io", ".", "Reader", ")", "(", "sc", "StreamClassification", ",", "out", "io", ".", "Reader", ",", "err", "error", ")", "{", "// 4096 is currently the default buffer size. It is specified explicitly because go 1.9 does not", "// expose the size of a bufio.Reader (go 1.10 does).", "stream", ":=", "bufio", ".", "NewReaderSize", "(", "r", ",", "4096", ")", "\n\n", "buf", ",", "err", ":=", "stream", ".", "Peek", "(", "4096", ")", "\n", "if", "err", "!=", "nil", "{", "// If we had a short peek (for example, due to a short stream), we can still continue and ignore the error", "if", "len", "(", "buf", ")", "==", "0", "{", "return", "sc", ",", "stream", ",", "err", "\n", "}", "\n", "err", "=", "nil", "\n", "}", "\n\n", "sb", ":=", "string", "(", "buf", ")", "\n", "switch", "{", "case", "strings", ".", "HasPrefix", "(", "sb", ",", "\"", "\"", ")", ":", "sc", ".", "Format", "=", "CryptoMessageFormatPGP", "\n", "sc", ".", "Armored", "=", "true", "\n", "sc", ".", "Type", "=", "CryptoMessageTypeAmbiguous", "\n", "case", "strings", ".", "HasPrefix", "(", "sb", ",", "\"", "\"", ")", ":", "sc", ".", "Format", "=", "CryptoMessageFormatPGP", "\n", "sc", ".", "Armored", "=", "true", "\n", "sc", ".", "Type", "=", "CryptoMessageTypeDetachedSignature", "\n", "case", "strings", ".", "HasPrefix", "(", "sb", ",", "\"", "\"", ")", ":", "sc", ".", "Format", "=", "CryptoMessageFormatPGP", "\n", "sc", ".", "Armored", "=", "true", "\n", "sc", ".", "Type", "=", "CryptoMessageTypeClearSignature", "\n", "case", "isSaltpackMessage", "(", "stream", ",", "&", "sc", ")", ":", "// Format etc. set by isSaltpackBinary().", "case", "isBase64KeybaseV0Sig", "(", "sb", ")", ":", "sc", ".", "Format", "=", "CryptoMessageFormatKeybaseV0", "\n", "sc", ".", "Armored", "=", "true", "\n", "sc", ".", "Type", "=", "CryptoMessageTypeAttachedSignature", "\n", "case", "isPGPBinary", "(", "buf", ",", "&", "sc", ")", ":", "// Format etc. set by isPGPBinary().", "case", "isUTF16Mark", "(", "buf", ")", ":", "err", "=", "UTF16UnsupportedError", "{", "}", "\n", "default", ":", "err", "=", "UnknownStreamError", "{", "}", "\n", "}", "\n", "return", "sc", ",", "stream", ",", "err", "\n", "}" ]
// ClassifyStream takes a stream reader in, and returns a likely classification // of that stream without consuming any data from it. It returns a reader that you // should read from instead, in addition to the classification. If classification // fails, there will be a `UnknownStreamError`, or additional EOF errors if the // stream ended before classification could go.
[ "ClassifyStream", "takes", "a", "stream", "reader", "in", "and", "returns", "a", "likely", "classification", "of", "that", "stream", "without", "consuming", "any", "data", "from", "it", ".", "It", "returns", "a", "reader", "that", "you", "should", "read", "from", "instead", "in", "addition", "to", "the", "classification", ".", "If", "classification", "fails", "there", "will", "be", "a", "UnknownStreamError", "or", "additional", "EOF", "errors", "if", "the", "stream", "ended", "before", "classification", "could", "go", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/stream_classifier.go#L156-L198
158,468
keybase/client
go/libkb/identify3.go
markShutdown
func (s *Identify3State) markShutdown(ch chan struct{}) bool { s.shutdownMu.Lock() defer s.shutdownMu.Unlock() if s.shutdown { return false } s.shutdownCh <- ch s.shutdownCh = nil s.shutdown = true return true }
go
func (s *Identify3State) markShutdown(ch chan struct{}) bool { s.shutdownMu.Lock() defer s.shutdownMu.Unlock() if s.shutdown { return false } s.shutdownCh <- ch s.shutdownCh = nil s.shutdown = true return true }
[ "func", "(", "s", "*", "Identify3State", ")", "markShutdown", "(", "ch", "chan", "struct", "{", "}", ")", "bool", "{", "s", ".", "shutdownMu", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "shutdownMu", ".", "Unlock", "(", ")", "\n", "if", "s", ".", "shutdown", "{", "return", "false", "\n", "}", "\n", "s", ".", "shutdownCh", "<-", "ch", "\n", "s", ".", "shutdownCh", "=", "nil", "\n", "s", ".", "shutdown", "=", "true", "\n", "return", "true", "\n", "}" ]
// markShutdown marks this state as having shutdown. Will return true the first // time through, and false every other time.
[ "markShutdown", "marks", "this", "state", "as", "having", "shutdown", ".", "Will", "return", "true", "the", "first", "time", "through", "and", "false", "every", "other", "time", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/identify3.go#L162-L172
158,469
keybase/client
go/libkb/identify3.go
getSessionToExpire
func (s *Identify3State) getSessionToExpire(mctx MetaContext, now time.Time) (*Identify3Session, time.Duration) { sess := s.expirationQueue[0] sess.Lock() defer sess.Unlock() expireAt := sess.created.Add(s.expireTime) diff := expireAt.Sub(now) if diff > 0 { return nil, diff } s.expirationQueue = s.expirationQueue[1:] // Only send the expiration if the session is still in the cache table. // If not, that means it was already acted upon if _, found := s.cache[sess.id]; !found { return nil, diff } mctx.Debug("Identify3State#getSessionToExpire: removing %s", sess.id) s.removeFromTableLocked(sess.id) return sess, diff }
go
func (s *Identify3State) getSessionToExpire(mctx MetaContext, now time.Time) (*Identify3Session, time.Duration) { sess := s.expirationQueue[0] sess.Lock() defer sess.Unlock() expireAt := sess.created.Add(s.expireTime) diff := expireAt.Sub(now) if diff > 0 { return nil, diff } s.expirationQueue = s.expirationQueue[1:] // Only send the expiration if the session is still in the cache table. // If not, that means it was already acted upon if _, found := s.cache[sess.id]; !found { return nil, diff } mctx.Debug("Identify3State#getSessionToExpire: removing %s", sess.id) s.removeFromTableLocked(sess.id) return sess, diff }
[ "func", "(", "s", "*", "Identify3State", ")", "getSessionToExpire", "(", "mctx", "MetaContext", ",", "now", "time", ".", "Time", ")", "(", "*", "Identify3Session", ",", "time", ".", "Duration", ")", "{", "sess", ":=", "s", ".", "expirationQueue", "[", "0", "]", "\n", "sess", ".", "Lock", "(", ")", "\n", "defer", "sess", ".", "Unlock", "(", ")", "\n", "expireAt", ":=", "sess", ".", "created", ".", "Add", "(", "s", ".", "expireTime", ")", "\n", "diff", ":=", "expireAt", ".", "Sub", "(", "now", ")", "\n", "if", "diff", ">", "0", "{", "return", "nil", ",", "diff", "\n", "}", "\n", "s", ".", "expirationQueue", "=", "s", ".", "expirationQueue", "[", "1", ":", "]", "\n\n", "// Only send the expiration if the session is still in the cache table.", "// If not, that means it was already acted upon", "if", "_", ",", "found", ":=", "s", ".", "cache", "[", "sess", ".", "id", "]", ";", "!", "found", "{", "return", "nil", ",", "diff", "\n", "}", "\n", "mctx", ".", "Debug", "(", "\"", "\"", ",", "sess", ".", "id", ")", "\n", "s", ".", "removeFromTableLocked", "(", "sess", ".", "id", ")", "\n", "return", "sess", ",", "diff", "\n", "}" ]
// getSessionToExpire should be called when holding the Identify3State Mutex. It looks in the // expiration queue and pops off those sessions that are ready to be marked expired.
[ "getSessionToExpire", "should", "be", "called", "when", "holding", "the", "Identify3State", "Mutex", ".", "It", "looks", "in", "the", "expiration", "queue", "and", "pops", "off", "those", "sessions", "that", "are", "ready", "to", "be", "marked", "expired", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/identify3.go#L290-L309
158,470
keybase/client
go/client/cmd_config.go
looksLikeBool
func (v *CmdConfigSet) looksLikeBool(s string) bool { switch s { case "t", "T", "true", "TRUE", "True": return true case "f", "F", "false", "FALSE", "False": return true } return false }
go
func (v *CmdConfigSet) looksLikeBool(s string) bool { switch s { case "t", "T", "true", "TRUE", "True": return true case "f", "F", "false", "FALSE", "False": return true } return false }
[ "func", "(", "v", "*", "CmdConfigSet", ")", "looksLikeBool", "(", "s", "string", ")", "bool", "{", "switch", "s", "{", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "return", "true", "\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "return", "true", "\n", "}", "\n", "return", "false", "\n", "}" ]
// like strconv.ParseBool, but without 0 and 1.
[ "like", "strconv", ".", "ParseBool", "but", "without", "0", "and", "1", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_config.go#L149-L157
158,471
keybase/client
go/client/cmd_simplefs_move.go
NewCmdSimpleFSMove
func NewCmdSimpleFSMove(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command { return cli.Command{ Name: "mv", ArgumentHelp: "<source> [source] <dest>", Usage: "move one or more directory elements to dest", Action: func(c *cli.Context) { cl.ChooseCommand(&CmdSimpleFSMove{ Contextified: libkb.NewContextified(g), opCanceler: NewOpCanceler(g), }, "mv", c) cl.SetNoStandalone() }, Flags: []cli.Flag{ cli.BoolFlag{ Name: "i, interactive", Usage: "Prompt before overwrite", }, cli.BoolFlag{ Name: "f, force", Usage: "force overwrite", }, }, } }
go
func NewCmdSimpleFSMove(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command { return cli.Command{ Name: "mv", ArgumentHelp: "<source> [source] <dest>", Usage: "move one or more directory elements to dest", Action: func(c *cli.Context) { cl.ChooseCommand(&CmdSimpleFSMove{ Contextified: libkb.NewContextified(g), opCanceler: NewOpCanceler(g), }, "mv", c) cl.SetNoStandalone() }, Flags: []cli.Flag{ cli.BoolFlag{ Name: "i, interactive", Usage: "Prompt before overwrite", }, cli.BoolFlag{ Name: "f, force", Usage: "force overwrite", }, }, } }
[ "func", "NewCmdSimpleFSMove", "(", "cl", "*", "libcmdline", ".", "CommandLine", ",", "g", "*", "libkb", ".", "GlobalContext", ")", "cli", ".", "Command", "{", "return", "cli", ".", "Command", "{", "Name", ":", "\"", "\"", ",", "ArgumentHelp", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "Action", ":", "func", "(", "c", "*", "cli", ".", "Context", ")", "{", "cl", ".", "ChooseCommand", "(", "&", "CmdSimpleFSMove", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "opCanceler", ":", "NewOpCanceler", "(", "g", ")", ",", "}", ",", "\"", "\"", ",", "c", ")", "\n", "cl", ".", "SetNoStandalone", "(", ")", "\n", "}", ",", "Flags", ":", "[", "]", "cli", ".", "Flag", "{", "cli", ".", "BoolFlag", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "cli", ".", "BoolFlag", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "}", ",", "}", "\n", "}" ]
// NewCmdSimpleFSMove creates a new cli.Command.
[ "NewCmdSimpleFSMove", "creates", "a", "new", "cli", ".", "Command", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs_move.go#L30-L53
158,472
keybase/client
go/install/install_default.go
Install
func Install(context Context, binPath string, sourcePath string, components []string, force bool, timeout time.Duration, log Log) keybase1.InstallResult { return keybase1.InstallResult{} }
go
func Install(context Context, binPath string, sourcePath string, components []string, force bool, timeout time.Duration, log Log) keybase1.InstallResult { return keybase1.InstallResult{} }
[ "func", "Install", "(", "context", "Context", ",", "binPath", "string", ",", "sourcePath", "string", ",", "components", "[", "]", "string", ",", "force", "bool", ",", "timeout", "time", ".", "Duration", ",", "log", "Log", ")", "keybase1", ".", "InstallResult", "{", "return", "keybase1", ".", "InstallResult", "{", "}", "\n", "}" ]
// Install empty implementation for unsupported platforms
[ "Install", "empty", "implementation", "for", "unsupported", "platforms" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/install/install_default.go#L17-L19
158,473
keybase/client
go/install/install_default.go
Uninstall
func Uninstall(context Context, components []string, log Log) keybase1.UninstallResult { return keybase1.UninstallResult{} }
go
func Uninstall(context Context, components []string, log Log) keybase1.UninstallResult { return keybase1.UninstallResult{} }
[ "func", "Uninstall", "(", "context", "Context", ",", "components", "[", "]", "string", ",", "log", "Log", ")", "keybase1", ".", "UninstallResult", "{", "return", "keybase1", ".", "UninstallResult", "{", "}", "\n", "}" ]
// Uninstall empty implementation for unsupported platforms
[ "Uninstall", "empty", "implementation", "for", "unsupported", "platforms" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/install/install_default.go#L22-L24
158,474
keybase/client
go/kbfs/libkbfs/cr_actions.go
trackSyncPtrChangesInCreate
func trackSyncPtrChangesInCreate( mostRecentTargetPtr data.BlockPointer, unmergedChain *crChain, unmergedChains *crChains, toName string) { targetChain, ok := unmergedChains.byMostRecent[mostRecentTargetPtr] var refs, unrefs []data.BlockPointer if ok && targetChain.isFile() { // The create op also needs to reference the child block ptrs // created by any sync ops (and not unreferenced by future // ones). for _, op := range targetChain.ops { syncOp, ok := op.(*syncOp) if !ok { continue } for _, ref := range op.Refs() { if !unmergedChains.isDeleted(ref) { refs = append(refs, ref) } } for _, unref := range op.Unrefs() { unrefs = append(unrefs, unref) } // Account for the file ptr too, if it's the most recent. filePtr := syncOp.File.Ref _, isMostRecent := unmergedChains.byMostRecent[filePtr] if isMostRecent && !unmergedChains.isDeleted(filePtr) { refs = append(refs, filePtr) } } } if len(refs) > 0 { for _, uop := range unmergedChain.ops { cop, ok := uop.(*createOp) if !ok || cop.NewName != toName { continue } for _, ref := range refs { cop.AddRefBlock(ref) } for _, unref := range unrefs { cop.AddUnrefBlock(unref) } break } } }
go
func trackSyncPtrChangesInCreate( mostRecentTargetPtr data.BlockPointer, unmergedChain *crChain, unmergedChains *crChains, toName string) { targetChain, ok := unmergedChains.byMostRecent[mostRecentTargetPtr] var refs, unrefs []data.BlockPointer if ok && targetChain.isFile() { // The create op also needs to reference the child block ptrs // created by any sync ops (and not unreferenced by future // ones). for _, op := range targetChain.ops { syncOp, ok := op.(*syncOp) if !ok { continue } for _, ref := range op.Refs() { if !unmergedChains.isDeleted(ref) { refs = append(refs, ref) } } for _, unref := range op.Unrefs() { unrefs = append(unrefs, unref) } // Account for the file ptr too, if it's the most recent. filePtr := syncOp.File.Ref _, isMostRecent := unmergedChains.byMostRecent[filePtr] if isMostRecent && !unmergedChains.isDeleted(filePtr) { refs = append(refs, filePtr) } } } if len(refs) > 0 { for _, uop := range unmergedChain.ops { cop, ok := uop.(*createOp) if !ok || cop.NewName != toName { continue } for _, ref := range refs { cop.AddRefBlock(ref) } for _, unref := range unrefs { cop.AddUnrefBlock(unref) } break } } }
[ "func", "trackSyncPtrChangesInCreate", "(", "mostRecentTargetPtr", "data", ".", "BlockPointer", ",", "unmergedChain", "*", "crChain", ",", "unmergedChains", "*", "crChains", ",", "toName", "string", ")", "{", "targetChain", ",", "ok", ":=", "unmergedChains", ".", "byMostRecent", "[", "mostRecentTargetPtr", "]", "\n", "var", "refs", ",", "unrefs", "[", "]", "data", ".", "BlockPointer", "\n", "if", "ok", "&&", "targetChain", ".", "isFile", "(", ")", "{", "// The create op also needs to reference the child block ptrs", "// created by any sync ops (and not unreferenced by future", "// ones).", "for", "_", ",", "op", ":=", "range", "targetChain", ".", "ops", "{", "syncOp", ",", "ok", ":=", "op", ".", "(", "*", "syncOp", ")", "\n", "if", "!", "ok", "{", "continue", "\n", "}", "\n", "for", "_", ",", "ref", ":=", "range", "op", ".", "Refs", "(", ")", "{", "if", "!", "unmergedChains", ".", "isDeleted", "(", "ref", ")", "{", "refs", "=", "append", "(", "refs", ",", "ref", ")", "\n", "}", "\n", "}", "\n", "for", "_", ",", "unref", ":=", "range", "op", ".", "Unrefs", "(", ")", "{", "unrefs", "=", "append", "(", "unrefs", ",", "unref", ")", "\n", "}", "\n", "// Account for the file ptr too, if it's the most recent.", "filePtr", ":=", "syncOp", ".", "File", ".", "Ref", "\n", "_", ",", "isMostRecent", ":=", "unmergedChains", ".", "byMostRecent", "[", "filePtr", "]", "\n", "if", "isMostRecent", "&&", "!", "unmergedChains", ".", "isDeleted", "(", "filePtr", ")", "{", "refs", "=", "append", "(", "refs", ",", "filePtr", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "if", "len", "(", "refs", ")", ">", "0", "{", "for", "_", ",", "uop", ":=", "range", "unmergedChain", ".", "ops", "{", "cop", ",", "ok", ":=", "uop", ".", "(", "*", "createOp", ")", "\n", "if", "!", "ok", "||", "cop", ".", "NewName", "!=", "toName", "{", "continue", "\n", "}", "\n", "for", "_", ",", "ref", ":=", "range", "refs", "{", "cop", ".", "AddRefBlock", "(", "ref", ")", "\n", "}", "\n", "for", "_", ",", "unref", ":=", "range", "unrefs", "{", "cop", ".", "AddUnrefBlock", "(", "unref", ")", "\n", "}", "\n", "break", "\n", "}", "\n", "}", "\n", "}" ]
// trackSyncPtrChangesInCreate makes sure the correct set of refs and // unrefs, from the syncOps on the unmerged branch, makes it into the // createOp for a new file.
[ "trackSyncPtrChangesInCreate", "makes", "sure", "the", "correct", "set", "of", "refs", "and", "unrefs", "from", "the", "syncOps", "on", "the", "unmerged", "branch", "makes", "it", "into", "the", "createOp", "for", "a", "new", "file", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_actions.go#L276-L321
158,475
keybase/client
go/kbfs/libkbfs/cr_actions.go
collapse
func (cal crActionList) collapse() crActionList { // Order of precedence for a given fromName: // 1) renameUnmergedAction // 2) copyUnmergedEntryAction // 3) copyUnmergedAttrAction infoMap := make(map[string]collapseActionInfo) // fromName -> info indicesToRemove := make(map[int]bool) for i, untypedAction := range cal { switch action := untypedAction.(type) { // Unmerged actions: case *renameUnmergedAction: setTopAction(action, action.fromName, i, infoMap, indicesToRemove) case *copyUnmergedEntryAction: untypedTopAction := infoMap[action.fromName].topAction switch untypedTopAction.(type) { case *renameUnmergedAction: indicesToRemove[i] = true default: setTopAction(action, action.fromName, i, infoMap, indicesToRemove) } case *copyUnmergedAttrAction: untypedTopAction := infoMap[action.fromName].topAction switch topAction := untypedTopAction.(type) { case *renameUnmergedAction: indicesToRemove[i] = true case *copyUnmergedEntryAction: indicesToRemove[i] = true case *copyUnmergedAttrAction: // Add attributes to the current top action, if not // already there. for _, a := range action.attr { found := false for _, topA := range topAction.attr { if a == topA { found = true break } } if !found { topAction.attr = append(topAction.attr, a) } } indicesToRemove[i] = true default: setTopAction(action, action.fromName, i, infoMap, indicesToRemove) } // Merged actions case *renameMergedAction: // Prefix merged actions with a reserved prefix to keep // them separate from the unmerged actions. setTopAction(action, ".kbfs_merged_"+action.fromName, i, infoMap, indicesToRemove) } } if len(indicesToRemove) == 0 { return cal } newList := make(crActionList, 0, len(cal)-len(indicesToRemove)) for i, action := range cal { if indicesToRemove[i] { continue } newList = append(newList, action) } return newList }
go
func (cal crActionList) collapse() crActionList { // Order of precedence for a given fromName: // 1) renameUnmergedAction // 2) copyUnmergedEntryAction // 3) copyUnmergedAttrAction infoMap := make(map[string]collapseActionInfo) // fromName -> info indicesToRemove := make(map[int]bool) for i, untypedAction := range cal { switch action := untypedAction.(type) { // Unmerged actions: case *renameUnmergedAction: setTopAction(action, action.fromName, i, infoMap, indicesToRemove) case *copyUnmergedEntryAction: untypedTopAction := infoMap[action.fromName].topAction switch untypedTopAction.(type) { case *renameUnmergedAction: indicesToRemove[i] = true default: setTopAction(action, action.fromName, i, infoMap, indicesToRemove) } case *copyUnmergedAttrAction: untypedTopAction := infoMap[action.fromName].topAction switch topAction := untypedTopAction.(type) { case *renameUnmergedAction: indicesToRemove[i] = true case *copyUnmergedEntryAction: indicesToRemove[i] = true case *copyUnmergedAttrAction: // Add attributes to the current top action, if not // already there. for _, a := range action.attr { found := false for _, topA := range topAction.attr { if a == topA { found = true break } } if !found { topAction.attr = append(topAction.attr, a) } } indicesToRemove[i] = true default: setTopAction(action, action.fromName, i, infoMap, indicesToRemove) } // Merged actions case *renameMergedAction: // Prefix merged actions with a reserved prefix to keep // them separate from the unmerged actions. setTopAction(action, ".kbfs_merged_"+action.fromName, i, infoMap, indicesToRemove) } } if len(indicesToRemove) == 0 { return cal } newList := make(crActionList, 0, len(cal)-len(indicesToRemove)) for i, action := range cal { if indicesToRemove[i] { continue } newList = append(newList, action) } return newList }
[ "func", "(", "cal", "crActionList", ")", "collapse", "(", ")", "crActionList", "{", "// Order of precedence for a given fromName:", "// 1) renameUnmergedAction", "// 2) copyUnmergedEntryAction", "// 3) copyUnmergedAttrAction", "infoMap", ":=", "make", "(", "map", "[", "string", "]", "collapseActionInfo", ")", "// fromName -> info", "\n", "indicesToRemove", ":=", "make", "(", "map", "[", "int", "]", "bool", ")", "\n", "for", "i", ",", "untypedAction", ":=", "range", "cal", "{", "switch", "action", ":=", "untypedAction", ".", "(", "type", ")", "{", "// Unmerged actions:", "case", "*", "renameUnmergedAction", ":", "setTopAction", "(", "action", ",", "action", ".", "fromName", ",", "i", ",", "infoMap", ",", "indicesToRemove", ")", "\n", "case", "*", "copyUnmergedEntryAction", ":", "untypedTopAction", ":=", "infoMap", "[", "action", ".", "fromName", "]", ".", "topAction", "\n", "switch", "untypedTopAction", ".", "(", "type", ")", "{", "case", "*", "renameUnmergedAction", ":", "indicesToRemove", "[", "i", "]", "=", "true", "\n", "default", ":", "setTopAction", "(", "action", ",", "action", ".", "fromName", ",", "i", ",", "infoMap", ",", "indicesToRemove", ")", "\n", "}", "\n", "case", "*", "copyUnmergedAttrAction", ":", "untypedTopAction", ":=", "infoMap", "[", "action", ".", "fromName", "]", ".", "topAction", "\n", "switch", "topAction", ":=", "untypedTopAction", ".", "(", "type", ")", "{", "case", "*", "renameUnmergedAction", ":", "indicesToRemove", "[", "i", "]", "=", "true", "\n", "case", "*", "copyUnmergedEntryAction", ":", "indicesToRemove", "[", "i", "]", "=", "true", "\n", "case", "*", "copyUnmergedAttrAction", ":", "// Add attributes to the current top action, if not", "// already there.", "for", "_", ",", "a", ":=", "range", "action", ".", "attr", "{", "found", ":=", "false", "\n", "for", "_", ",", "topA", ":=", "range", "topAction", ".", "attr", "{", "if", "a", "==", "topA", "{", "found", "=", "true", "\n", "break", "\n", "}", "\n", "}", "\n", "if", "!", "found", "{", "topAction", ".", "attr", "=", "append", "(", "topAction", ".", "attr", ",", "a", ")", "\n", "}", "\n", "}", "\n", "indicesToRemove", "[", "i", "]", "=", "true", "\n", "default", ":", "setTopAction", "(", "action", ",", "action", ".", "fromName", ",", "i", ",", "infoMap", ",", "indicesToRemove", ")", "\n", "}", "\n\n", "// Merged actions", "case", "*", "renameMergedAction", ":", "// Prefix merged actions with a reserved prefix to keep", "// them separate from the unmerged actions.", "setTopAction", "(", "action", ",", "\"", "\"", "+", "action", ".", "fromName", ",", "i", ",", "infoMap", ",", "indicesToRemove", ")", "\n", "}", "\n", "}", "\n\n", "if", "len", "(", "indicesToRemove", ")", "==", "0", "{", "return", "cal", "\n", "}", "\n\n", "newList", ":=", "make", "(", "crActionList", ",", "0", ",", "len", "(", "cal", ")", "-", "len", "(", "indicesToRemove", ")", ")", "\n", "for", "i", ",", "action", ":=", "range", "cal", "{", "if", "indicesToRemove", "[", "i", "]", "{", "continue", "\n", "}", "\n", "newList", "=", "append", "(", "newList", ",", "action", ")", "\n", "}", "\n\n", "return", "newList", "\n", "}" ]
// collapse drops any actions that are made irrelevant by other // actions in the list. It assumes that file-related actions have // already been merged into their parent directory action lists.
[ "collapse", "drops", "any", "actions", "that", "are", "made", "irrelevant", "by", "other", "actions", "in", "the", "list", ".", "It", "assumes", "that", "file", "-", "related", "actions", "have", "already", "been", "merged", "into", "their", "parent", "directory", "action", "lists", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_actions.go#L1016-L1088
158,476
keybase/client
go/ephemeral/user_ek.go
prepareNewUserEK
func prepareNewUserEK(mctx libkb.MetaContext, merkleRoot libkb.MerkleRoot, pukSigning *libkb.NaclSigningKeyPair) (sig string, boxes []keybase1.UserEkBoxMetadata, newMetadata keybase1.UserEkMetadata, myBox *keybase1.UserEkBoxed, err error) { defer mctx.TraceTimed("prepareNewUserEK", func() error { return err })() seed, err := newUserEphemeralSeed() if err != nil { return "", nil, newMetadata, nil, err } prevStatement, latestGeneration, wrongKID, err := fetchUserEKStatement(mctx, mctx.G().Env.GetUID()) if !wrongKID && err != nil { return "", nil, newMetadata, nil, err } var newGeneration keybase1.EkGeneration if prevStatement == nil { // Even if the userEK statement was signed by the wrong key (this can // happen when legacy clients roll the PUK), fetchUserEKStatement will // return the generation number from the last (unverifiable) statement. // If there was never any statement, latestGeneration will be 0, so // adding one is correct in all cases. newGeneration = latestGeneration + 1 } else { newGeneration = prevStatement.CurrentUserEkMetadata.Generation + 1 } dhKeypair := seed.DeriveDHKey() metadata := keybase1.UserEkMetadata{ Kid: dhKeypair.GetKID(), Generation: newGeneration, HashMeta: merkleRoot.HashMeta(), // The ctime is derivable from the hash meta, by fetching the hashed // root from the server, but including it saves readers a potential // extra round trip. Ctime: keybase1.TimeFromSeconds(merkleRoot.Ctime()), } statement := keybase1.UserEkStatement{ CurrentUserEkMetadata: metadata, } statementJSON, err := json.Marshal(statement) if err != nil { return "", nil, newMetadata, nil, err } sig, _, err = pukSigning.SignToString(statementJSON) if err != nil { return "", nil, newMetadata, nil, err } boxes, myUserEKBoxed, err := boxUserEKForDevices(mctx, merkleRoot, seed, metadata) if err != nil { return "", nil, newMetadata, nil, err } return sig, boxes, metadata, myUserEKBoxed, nil }
go
func prepareNewUserEK(mctx libkb.MetaContext, merkleRoot libkb.MerkleRoot, pukSigning *libkb.NaclSigningKeyPair) (sig string, boxes []keybase1.UserEkBoxMetadata, newMetadata keybase1.UserEkMetadata, myBox *keybase1.UserEkBoxed, err error) { defer mctx.TraceTimed("prepareNewUserEK", func() error { return err })() seed, err := newUserEphemeralSeed() if err != nil { return "", nil, newMetadata, nil, err } prevStatement, latestGeneration, wrongKID, err := fetchUserEKStatement(mctx, mctx.G().Env.GetUID()) if !wrongKID && err != nil { return "", nil, newMetadata, nil, err } var newGeneration keybase1.EkGeneration if prevStatement == nil { // Even if the userEK statement was signed by the wrong key (this can // happen when legacy clients roll the PUK), fetchUserEKStatement will // return the generation number from the last (unverifiable) statement. // If there was never any statement, latestGeneration will be 0, so // adding one is correct in all cases. newGeneration = latestGeneration + 1 } else { newGeneration = prevStatement.CurrentUserEkMetadata.Generation + 1 } dhKeypair := seed.DeriveDHKey() metadata := keybase1.UserEkMetadata{ Kid: dhKeypair.GetKID(), Generation: newGeneration, HashMeta: merkleRoot.HashMeta(), // The ctime is derivable from the hash meta, by fetching the hashed // root from the server, but including it saves readers a potential // extra round trip. Ctime: keybase1.TimeFromSeconds(merkleRoot.Ctime()), } statement := keybase1.UserEkStatement{ CurrentUserEkMetadata: metadata, } statementJSON, err := json.Marshal(statement) if err != nil { return "", nil, newMetadata, nil, err } sig, _, err = pukSigning.SignToString(statementJSON) if err != nil { return "", nil, newMetadata, nil, err } boxes, myUserEKBoxed, err := boxUserEKForDevices(mctx, merkleRoot, seed, metadata) if err != nil { return "", nil, newMetadata, nil, err } return sig, boxes, metadata, myUserEKBoxed, nil }
[ "func", "prepareNewUserEK", "(", "mctx", "libkb", ".", "MetaContext", ",", "merkleRoot", "libkb", ".", "MerkleRoot", ",", "pukSigning", "*", "libkb", ".", "NaclSigningKeyPair", ")", "(", "sig", "string", ",", "boxes", "[", "]", "keybase1", ".", "UserEkBoxMetadata", ",", "newMetadata", "keybase1", ".", "UserEkMetadata", ",", "myBox", "*", "keybase1", ".", "UserEkBoxed", ",", "err", "error", ")", "{", "defer", "mctx", ".", "TraceTimed", "(", "\"", "\"", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "seed", ",", "err", ":=", "newUserEphemeralSeed", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "newMetadata", ",", "nil", ",", "err", "\n", "}", "\n\n", "prevStatement", ",", "latestGeneration", ",", "wrongKID", ",", "err", ":=", "fetchUserEKStatement", "(", "mctx", ",", "mctx", ".", "G", "(", ")", ".", "Env", ".", "GetUID", "(", ")", ")", "\n", "if", "!", "wrongKID", "&&", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "newMetadata", ",", "nil", ",", "err", "\n", "}", "\n", "var", "newGeneration", "keybase1", ".", "EkGeneration", "\n", "if", "prevStatement", "==", "nil", "{", "// Even if the userEK statement was signed by the wrong key (this can", "// happen when legacy clients roll the PUK), fetchUserEKStatement will", "// return the generation number from the last (unverifiable) statement.", "// If there was never any statement, latestGeneration will be 0, so", "// adding one is correct in all cases.", "newGeneration", "=", "latestGeneration", "+", "1", "\n", "}", "else", "{", "newGeneration", "=", "prevStatement", ".", "CurrentUserEkMetadata", ".", "Generation", "+", "1", "\n", "}", "\n\n", "dhKeypair", ":=", "seed", ".", "DeriveDHKey", "(", ")", "\n\n", "metadata", ":=", "keybase1", ".", "UserEkMetadata", "{", "Kid", ":", "dhKeypair", ".", "GetKID", "(", ")", ",", "Generation", ":", "newGeneration", ",", "HashMeta", ":", "merkleRoot", ".", "HashMeta", "(", ")", ",", "// The ctime is derivable from the hash meta, by fetching the hashed", "// root from the server, but including it saves readers a potential", "// extra round trip.", "Ctime", ":", "keybase1", ".", "TimeFromSeconds", "(", "merkleRoot", ".", "Ctime", "(", ")", ")", ",", "}", "\n\n", "statement", ":=", "keybase1", ".", "UserEkStatement", "{", "CurrentUserEkMetadata", ":", "metadata", ",", "}", "\n", "statementJSON", ",", "err", ":=", "json", ".", "Marshal", "(", "statement", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "newMetadata", ",", "nil", ",", "err", "\n", "}", "\n", "sig", ",", "_", ",", "err", "=", "pukSigning", ".", "SignToString", "(", "statementJSON", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "newMetadata", ",", "nil", ",", "err", "\n", "}", "\n\n", "boxes", ",", "myUserEKBoxed", ",", "err", ":=", "boxUserEKForDevices", "(", "mctx", ",", "merkleRoot", ",", "seed", ",", "metadata", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "newMetadata", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "sig", ",", "boxes", ",", "metadata", ",", "myUserEKBoxed", ",", "nil", "\n", "}" ]
// There are two cases where we need to generate a new userEK. One is where // we're rolling the userEK by itself, and we need to sign it with the current // PUK. The other is where we're rolling the PUK, and we need to sign a new // userEK with the new PUK to upload both together. This helper covers the // steps common to both cases.
[ "There", "are", "two", "cases", "where", "we", "need", "to", "generate", "a", "new", "userEK", ".", "One", "is", "where", "we", "re", "rolling", "the", "userEK", "by", "itself", "and", "we", "need", "to", "sign", "it", "with", "the", "current", "PUK", ".", "The", "other", "is", "where", "we", "re", "rolling", "the", "PUK", "and", "we", "need", "to", "sign", "a", "new", "userEK", "with", "the", "new", "PUK", "to", "upload", "both", "together", ".", "This", "helper", "covers", "the", "steps", "common", "to", "both", "cases", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/user_ek.go#L61-L117
158,477
keybase/client
go/ephemeral/user_ek.go
publishNewUserEK
func publishNewUserEK(mctx libkb.MetaContext, merkleRoot libkb.MerkleRoot) ( metadata keybase1.UserEkMetadata, err error) { defer mctx.TraceTimed("publishNewUserEK", func() error { return err })() // Sign the statement blob with the latest PUK. pukKeyring, err := mctx.G().GetPerUserKeyring(mctx.Ctx()) if err != nil { return metadata, err } if err := pukKeyring.Sync(mctx); err != nil { return metadata, err } if !pukKeyring.HasAnyKeys() { return metadata, fmt.Errorf("A PUK is needed to generate ephemeral keys. Aborting.") } pukSigning, err := pukKeyring.GetLatestSigningKey(mctx) if err != nil { return metadata, err } sig, boxes, newMetadata, myBox, err := prepareNewUserEK(mctx, merkleRoot, pukSigning) if err != nil { return metadata, err } if err = postNewUserEK(mctx, sig, boxes); err != nil { return metadata, err } // Cache the new box after we see the post succeeded. if myBox == nil { mctx.Debug("No box made for own deviceEK") } else { storage := mctx.G().GetUserEKBoxStorage() err = storage.Put(mctx, newMetadata.Generation, *myBox) } return newMetadata, err }
go
func publishNewUserEK(mctx libkb.MetaContext, merkleRoot libkb.MerkleRoot) ( metadata keybase1.UserEkMetadata, err error) { defer mctx.TraceTimed("publishNewUserEK", func() error { return err })() // Sign the statement blob with the latest PUK. pukKeyring, err := mctx.G().GetPerUserKeyring(mctx.Ctx()) if err != nil { return metadata, err } if err := pukKeyring.Sync(mctx); err != nil { return metadata, err } if !pukKeyring.HasAnyKeys() { return metadata, fmt.Errorf("A PUK is needed to generate ephemeral keys. Aborting.") } pukSigning, err := pukKeyring.GetLatestSigningKey(mctx) if err != nil { return metadata, err } sig, boxes, newMetadata, myBox, err := prepareNewUserEK(mctx, merkleRoot, pukSigning) if err != nil { return metadata, err } if err = postNewUserEK(mctx, sig, boxes); err != nil { return metadata, err } // Cache the new box after we see the post succeeded. if myBox == nil { mctx.Debug("No box made for own deviceEK") } else { storage := mctx.G().GetUserEKBoxStorage() err = storage.Put(mctx, newMetadata.Generation, *myBox) } return newMetadata, err }
[ "func", "publishNewUserEK", "(", "mctx", "libkb", ".", "MetaContext", ",", "merkleRoot", "libkb", ".", "MerkleRoot", ")", "(", "metadata", "keybase1", ".", "UserEkMetadata", ",", "err", "error", ")", "{", "defer", "mctx", ".", "TraceTimed", "(", "\"", "\"", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "// Sign the statement blob with the latest PUK.", "pukKeyring", ",", "err", ":=", "mctx", ".", "G", "(", ")", ".", "GetPerUserKeyring", "(", "mctx", ".", "Ctx", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "metadata", ",", "err", "\n", "}", "\n", "if", "err", ":=", "pukKeyring", ".", "Sync", "(", "mctx", ")", ";", "err", "!=", "nil", "{", "return", "metadata", ",", "err", "\n", "}", "\n", "if", "!", "pukKeyring", ".", "HasAnyKeys", "(", ")", "{", "return", "metadata", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "pukSigning", ",", "err", ":=", "pukKeyring", ".", "GetLatestSigningKey", "(", "mctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "metadata", ",", "err", "\n", "}", "\n\n", "sig", ",", "boxes", ",", "newMetadata", ",", "myBox", ",", "err", ":=", "prepareNewUserEK", "(", "mctx", ",", "merkleRoot", ",", "pukSigning", ")", "\n", "if", "err", "!=", "nil", "{", "return", "metadata", ",", "err", "\n", "}", "\n\n", "if", "err", "=", "postNewUserEK", "(", "mctx", ",", "sig", ",", "boxes", ")", ";", "err", "!=", "nil", "{", "return", "metadata", ",", "err", "\n", "}", "\n\n", "// Cache the new box after we see the post succeeded.", "if", "myBox", "==", "nil", "{", "mctx", ".", "Debug", "(", "\"", "\"", ")", "\n", "}", "else", "{", "storage", ":=", "mctx", ".", "G", "(", ")", ".", "GetUserEKBoxStorage", "(", ")", "\n", "err", "=", "storage", ".", "Put", "(", "mctx", ",", "newMetadata", ".", "Generation", ",", "*", "myBox", ")", "\n", "}", "\n", "return", "newMetadata", ",", "err", "\n", "}" ]
// Create a new userEK and upload it. Add our box to the local box store.
[ "Create", "a", "new", "userEK", "and", "upload", "it", ".", "Add", "our", "box", "to", "the", "local", "box", "store", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/user_ek.go#L120-L157
158,478
keybase/client
go/ephemeral/user_ek.go
fetchUserEKStatements
func fetchUserEKStatements(mctx libkb.MetaContext, uids []keybase1.UID) ( statements map[keybase1.UID]*keybase1.UserEkStatement, err error) { defer mctx.TraceTimed(fmt.Sprintf("fetchUserEKStatements: numUids: %v", len(uids)), func() error { return err })() apiArg := libkb.APIArg{ Endpoint: "user/get_user_ek_batch", SessionType: libkb.APISessionTypeREQUIRED, Args: libkb.HTTPArgs{ "uids": libkb.S{Val: libkb.UidsToString(uids)}, }, } res, err := mctx.G().GetAPI().Post(mctx, apiArg) if err != nil { return nil, err } parsedResponse := userEKStatementResponse{} err = res.Body.UnmarshalAgain(&parsedResponse) if err != nil { return nil, err } statements = make(map[keybase1.UID]*keybase1.UserEkStatement) for uid, sig := range parsedResponse.Sigs { statement, _, wrongKID, err := verifySigWithLatestPUK(mctx, uid, *sig) // Check the wrongKID condition before checking the error, since an error // is still returned in this case. TODO: Turn this warning into an error // after EK support is sufficiently widespread. if wrongKID { mctx.Debug("It looks like you revoked a device without generating new ephemeral keys. Are you running an old version?") // Don't include this statement since it is invalid. continue } else if err != nil { return nil, err } statements[uid] = statement } return statements, nil }
go
func fetchUserEKStatements(mctx libkb.MetaContext, uids []keybase1.UID) ( statements map[keybase1.UID]*keybase1.UserEkStatement, err error) { defer mctx.TraceTimed(fmt.Sprintf("fetchUserEKStatements: numUids: %v", len(uids)), func() error { return err })() apiArg := libkb.APIArg{ Endpoint: "user/get_user_ek_batch", SessionType: libkb.APISessionTypeREQUIRED, Args: libkb.HTTPArgs{ "uids": libkb.S{Val: libkb.UidsToString(uids)}, }, } res, err := mctx.G().GetAPI().Post(mctx, apiArg) if err != nil { return nil, err } parsedResponse := userEKStatementResponse{} err = res.Body.UnmarshalAgain(&parsedResponse) if err != nil { return nil, err } statements = make(map[keybase1.UID]*keybase1.UserEkStatement) for uid, sig := range parsedResponse.Sigs { statement, _, wrongKID, err := verifySigWithLatestPUK(mctx, uid, *sig) // Check the wrongKID condition before checking the error, since an error // is still returned in this case. TODO: Turn this warning into an error // after EK support is sufficiently widespread. if wrongKID { mctx.Debug("It looks like you revoked a device without generating new ephemeral keys. Are you running an old version?") // Don't include this statement since it is invalid. continue } else if err != nil { return nil, err } statements[uid] = statement } return statements, nil }
[ "func", "fetchUserEKStatements", "(", "mctx", "libkb", ".", "MetaContext", ",", "uids", "[", "]", "keybase1", ".", "UID", ")", "(", "statements", "map", "[", "keybase1", ".", "UID", "]", "*", "keybase1", ".", "UserEkStatement", ",", "err", "error", ")", "{", "defer", "mctx", ".", "TraceTimed", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "len", "(", "uids", ")", ")", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "apiArg", ":=", "libkb", ".", "APIArg", "{", "Endpoint", ":", "\"", "\"", ",", "SessionType", ":", "libkb", ".", "APISessionTypeREQUIRED", ",", "Args", ":", "libkb", ".", "HTTPArgs", "{", "\"", "\"", ":", "libkb", ".", "S", "{", "Val", ":", "libkb", ".", "UidsToString", "(", "uids", ")", "}", ",", "}", ",", "}", "\n", "res", ",", "err", ":=", "mctx", ".", "G", "(", ")", ".", "GetAPI", "(", ")", ".", "Post", "(", "mctx", ",", "apiArg", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "parsedResponse", ":=", "userEKStatementResponse", "{", "}", "\n", "err", "=", "res", ".", "Body", ".", "UnmarshalAgain", "(", "&", "parsedResponse", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "statements", "=", "make", "(", "map", "[", "keybase1", ".", "UID", "]", "*", "keybase1", ".", "UserEkStatement", ")", "\n", "for", "uid", ",", "sig", ":=", "range", "parsedResponse", ".", "Sigs", "{", "statement", ",", "_", ",", "wrongKID", ",", "err", ":=", "verifySigWithLatestPUK", "(", "mctx", ",", "uid", ",", "*", "sig", ")", "\n", "// Check the wrongKID condition before checking the error, since an error", "// is still returned in this case. TODO: Turn this warning into an error", "// after EK support is sufficiently widespread.", "if", "wrongKID", "{", "mctx", ".", "Debug", "(", "\"", "\"", ")", "\n", "// Don't include this statement since it is invalid.", "continue", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "statements", "[", "uid", "]", "=", "statement", "\n", "}", "\n\n", "return", "statements", ",", "nil", "\n", "}" ]
// Returns nil if the user has never published a userEK. If the user has // published a userEK, but has since rolled their PUK without publishing a new // one, this function will also return nil and log a warning. This is a // transitional thing, and eventually when all "reasonably up to date" clients // in the wild have EK support, we will make that case an error.
[ "Returns", "nil", "if", "the", "user", "has", "never", "published", "a", "userEK", ".", "If", "the", "user", "has", "published", "a", "userEK", "but", "has", "since", "rolled", "their", "PUK", "without", "publishing", "a", "new", "one", "this", "function", "will", "also", "return", "nil", "and", "log", "a", "warning", ".", "This", "is", "a", "transitional", "thing", "and", "eventually", "when", "all", "reasonably", "up", "to", "date", "clients", "in", "the", "wild", "have", "EK", "support", "we", "will", "make", "that", "case", "an", "error", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/user_ek.go#L212-L251
158,479
keybase/client
go/ephemeral/user_ek.go
fetchUserEKStatement
func fetchUserEKStatement(mctx libkb.MetaContext, uid keybase1.UID) ( statement *keybase1.UserEkStatement, latestGeneration keybase1.EkGeneration, wrongKID bool, err error) { defer mctx.TraceTimed("fetchUserEKStatement", func() error { return err })() apiArg := libkb.APIArg{ Endpoint: "user/user_ek", SessionType: libkb.APISessionTypeREQUIRED, Args: libkb.HTTPArgs{ "uids": libkb.S{Val: libkb.UidsToString([]keybase1.UID{uid})}, }, } res, err := mctx.G().GetAPI().Get(mctx, apiArg) if err != nil { return nil, latestGeneration, false, err } parsedResponse := userEKStatementResponse{} err = res.Body.UnmarshalAgain(&parsedResponse) if err != nil { return nil, latestGeneration, false, err } // User has no statements if len(parsedResponse.Sigs) == 0 { return nil, latestGeneration, false, nil } if len(parsedResponse.Sigs) != 1 { return nil, latestGeneration, false, fmt.Errorf("Invalid server response, multiple userEK statements returned") } sig, ok := parsedResponse.Sigs[uid] if !ok { return nil, latestGeneration, false, fmt.Errorf("Invalid server response, wrong uid returned") } statement, latestGeneration, wrongKID, err = verifySigWithLatestPUK(mctx, uid, *sig) // Check the wrongKID condition before checking the error, since an error // is still returned in this case. TODO: Turn this warning into an error // after EK support is sufficiently widespread. if wrongKID { mctx.Debug("It looks like you revoked a device without generating new ephemeral keys. Are you running an old version?") return nil, latestGeneration, true, nil } else if err != nil { return nil, latestGeneration, false, err } return statement, latestGeneration, false, nil }
go
func fetchUserEKStatement(mctx libkb.MetaContext, uid keybase1.UID) ( statement *keybase1.UserEkStatement, latestGeneration keybase1.EkGeneration, wrongKID bool, err error) { defer mctx.TraceTimed("fetchUserEKStatement", func() error { return err })() apiArg := libkb.APIArg{ Endpoint: "user/user_ek", SessionType: libkb.APISessionTypeREQUIRED, Args: libkb.HTTPArgs{ "uids": libkb.S{Val: libkb.UidsToString([]keybase1.UID{uid})}, }, } res, err := mctx.G().GetAPI().Get(mctx, apiArg) if err != nil { return nil, latestGeneration, false, err } parsedResponse := userEKStatementResponse{} err = res.Body.UnmarshalAgain(&parsedResponse) if err != nil { return nil, latestGeneration, false, err } // User has no statements if len(parsedResponse.Sigs) == 0 { return nil, latestGeneration, false, nil } if len(parsedResponse.Sigs) != 1 { return nil, latestGeneration, false, fmt.Errorf("Invalid server response, multiple userEK statements returned") } sig, ok := parsedResponse.Sigs[uid] if !ok { return nil, latestGeneration, false, fmt.Errorf("Invalid server response, wrong uid returned") } statement, latestGeneration, wrongKID, err = verifySigWithLatestPUK(mctx, uid, *sig) // Check the wrongKID condition before checking the error, since an error // is still returned in this case. TODO: Turn this warning into an error // after EK support is sufficiently widespread. if wrongKID { mctx.Debug("It looks like you revoked a device without generating new ephemeral keys. Are you running an old version?") return nil, latestGeneration, true, nil } else if err != nil { return nil, latestGeneration, false, err } return statement, latestGeneration, false, nil }
[ "func", "fetchUserEKStatement", "(", "mctx", "libkb", ".", "MetaContext", ",", "uid", "keybase1", ".", "UID", ")", "(", "statement", "*", "keybase1", ".", "UserEkStatement", ",", "latestGeneration", "keybase1", ".", "EkGeneration", ",", "wrongKID", "bool", ",", "err", "error", ")", "{", "defer", "mctx", ".", "TraceTimed", "(", "\"", "\"", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "apiArg", ":=", "libkb", ".", "APIArg", "{", "Endpoint", ":", "\"", "\"", ",", "SessionType", ":", "libkb", ".", "APISessionTypeREQUIRED", ",", "Args", ":", "libkb", ".", "HTTPArgs", "{", "\"", "\"", ":", "libkb", ".", "S", "{", "Val", ":", "libkb", ".", "UidsToString", "(", "[", "]", "keybase1", ".", "UID", "{", "uid", "}", ")", "}", ",", "}", ",", "}", "\n", "res", ",", "err", ":=", "mctx", ".", "G", "(", ")", ".", "GetAPI", "(", ")", ".", "Get", "(", "mctx", ",", "apiArg", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "latestGeneration", ",", "false", ",", "err", "\n", "}", "\n\n", "parsedResponse", ":=", "userEKStatementResponse", "{", "}", "\n", "err", "=", "res", ".", "Body", ".", "UnmarshalAgain", "(", "&", "parsedResponse", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "latestGeneration", ",", "false", ",", "err", "\n", "}", "\n", "// User has no statements", "if", "len", "(", "parsedResponse", ".", "Sigs", ")", "==", "0", "{", "return", "nil", ",", "latestGeneration", ",", "false", ",", "nil", "\n", "}", "\n", "if", "len", "(", "parsedResponse", ".", "Sigs", ")", "!=", "1", "{", "return", "nil", ",", "latestGeneration", ",", "false", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "sig", ",", "ok", ":=", "parsedResponse", ".", "Sigs", "[", "uid", "]", "\n", "if", "!", "ok", "{", "return", "nil", ",", "latestGeneration", ",", "false", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "statement", ",", "latestGeneration", ",", "wrongKID", ",", "err", "=", "verifySigWithLatestPUK", "(", "mctx", ",", "uid", ",", "*", "sig", ")", "\n", "// Check the wrongKID condition before checking the error, since an error", "// is still returned in this case. TODO: Turn this warning into an error", "// after EK support is sufficiently widespread.", "if", "wrongKID", "{", "mctx", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "nil", ",", "latestGeneration", ",", "true", ",", "nil", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "latestGeneration", ",", "false", ",", "err", "\n", "}", "\n\n", "return", "statement", ",", "latestGeneration", ",", "false", ",", "nil", "\n", "}" ]
// Returns nil if the user has never published a userEK. If the user has // published a userEK, but has since rolled their PUK without publishing a new // one, this function will return wrongKID. This allows clients to chose the // correct generation number but not include the statement when generating a // new userEK.
[ "Returns", "nil", "if", "the", "user", "has", "never", "published", "a", "userEK", ".", "If", "the", "user", "has", "published", "a", "userEK", "but", "has", "since", "rolled", "their", "PUK", "without", "publishing", "a", "new", "one", "this", "function", "will", "return", "wrongKID", ".", "This", "allows", "clients", "to", "chose", "the", "correct", "generation", "number", "but", "not", "include", "the", "statement", "when", "generating", "a", "new", "userEK", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/user_ek.go#L258-L303
158,480
keybase/client
go/kbfs/kbfsmd/key_bundle_v2.go
GetEphemeralPublicKeyInfoV2
func GetEphemeralPublicKeyInfoV2(info TLFCryptKeyInfo, wkb TLFWriterKeyBundleV2, rkb TLFReaderKeyBundleV2) ( keyLocation EPubKeyLocationV2, index int, ePubKey kbfscrypto.TLFEphemeralPublicKey, err error) { var publicKeys kbfscrypto.TLFEphemeralPublicKeys if info.EPubKeyIndex >= 0 { index = info.EPubKeyIndex publicKeys = wkb.TLFEphemeralPublicKeys keyLocation = WriterEPubKeys } else { index = -1 - info.EPubKeyIndex publicKeys = rkb.TLFReaderEphemeralPublicKeys keyLocation = ReaderEPubKeys } keyCount := len(publicKeys) if index >= keyCount { return EPubKeyLocationV2(0), 0, kbfscrypto.TLFEphemeralPublicKey{}, fmt.Errorf("Invalid key in %s with index %d >= %d", keyLocation, index, keyCount) } return keyLocation, index, publicKeys[index], nil }
go
func GetEphemeralPublicKeyInfoV2(info TLFCryptKeyInfo, wkb TLFWriterKeyBundleV2, rkb TLFReaderKeyBundleV2) ( keyLocation EPubKeyLocationV2, index int, ePubKey kbfscrypto.TLFEphemeralPublicKey, err error) { var publicKeys kbfscrypto.TLFEphemeralPublicKeys if info.EPubKeyIndex >= 0 { index = info.EPubKeyIndex publicKeys = wkb.TLFEphemeralPublicKeys keyLocation = WriterEPubKeys } else { index = -1 - info.EPubKeyIndex publicKeys = rkb.TLFReaderEphemeralPublicKeys keyLocation = ReaderEPubKeys } keyCount := len(publicKeys) if index >= keyCount { return EPubKeyLocationV2(0), 0, kbfscrypto.TLFEphemeralPublicKey{}, fmt.Errorf("Invalid key in %s with index %d >= %d", keyLocation, index, keyCount) } return keyLocation, index, publicKeys[index], nil }
[ "func", "GetEphemeralPublicKeyInfoV2", "(", "info", "TLFCryptKeyInfo", ",", "wkb", "TLFWriterKeyBundleV2", ",", "rkb", "TLFReaderKeyBundleV2", ")", "(", "keyLocation", "EPubKeyLocationV2", ",", "index", "int", ",", "ePubKey", "kbfscrypto", ".", "TLFEphemeralPublicKey", ",", "err", "error", ")", "{", "var", "publicKeys", "kbfscrypto", ".", "TLFEphemeralPublicKeys", "\n", "if", "info", ".", "EPubKeyIndex", ">=", "0", "{", "index", "=", "info", ".", "EPubKeyIndex", "\n", "publicKeys", "=", "wkb", ".", "TLFEphemeralPublicKeys", "\n", "keyLocation", "=", "WriterEPubKeys", "\n", "}", "else", "{", "index", "=", "-", "1", "-", "info", ".", "EPubKeyIndex", "\n", "publicKeys", "=", "rkb", ".", "TLFReaderEphemeralPublicKeys", "\n", "keyLocation", "=", "ReaderEPubKeys", "\n", "}", "\n", "keyCount", ":=", "len", "(", "publicKeys", ")", "\n", "if", "index", ">=", "keyCount", "{", "return", "EPubKeyLocationV2", "(", "0", ")", ",", "0", ",", "kbfscrypto", ".", "TLFEphemeralPublicKey", "{", "}", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "keyLocation", ",", "index", ",", "keyCount", ")", "\n", "}", "\n\n", "return", "keyLocation", ",", "index", ",", "publicKeys", "[", "index", "]", ",", "nil", "\n", "}" ]
// GetEphemeralPublicKeyInfoV2 encapsulates all the ugly logic needed to // deal with the "negative hack" from // RootMetadataV2.UpdateKeyGeneration.
[ "GetEphemeralPublicKeyInfoV2", "encapsulates", "all", "the", "ugly", "logic", "needed", "to", "deal", "with", "the", "negative", "hack", "from", "RootMetadataV2", ".", "UpdateKeyGeneration", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/key_bundle_v2.go#L49-L72
158,481
keybase/client
go/kbfs/kbfsmd/key_bundle_v2.go
IsWriter
func (wkb TLFWriterKeyBundleV2) IsWriter(user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey) bool { _, ok := wkb.WKeys[user][deviceKey.KID()] return ok }
go
func (wkb TLFWriterKeyBundleV2) IsWriter(user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey) bool { _, ok := wkb.WKeys[user][deviceKey.KID()] return ok }
[ "func", "(", "wkb", "TLFWriterKeyBundleV2", ")", "IsWriter", "(", "user", "keybase1", ".", "UID", ",", "deviceKey", "kbfscrypto", ".", "CryptPublicKey", ")", "bool", "{", "_", ",", "ok", ":=", "wkb", ".", "WKeys", "[", "user", "]", "[", "deviceKey", ".", "KID", "(", ")", "]", "\n", "return", "ok", "\n", "}" ]
// IsWriter returns true if the given user device is in the writer set.
[ "IsWriter", "returns", "true", "if", "the", "given", "user", "device", "is", "in", "the", "writer", "set", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/key_bundle_v2.go#L221-L224
158,482
keybase/client
go/kbfs/kbfsmd/key_bundle_v2.go
IsWriter
func (wkg TLFWriterKeyGenerationsV2) IsWriter(user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey) bool { keyGen := wkg.LatestKeyGeneration() if keyGen < 1 { return false } return wkg[keyGen-1].IsWriter(user, deviceKey) }
go
func (wkg TLFWriterKeyGenerationsV2) IsWriter(user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey) bool { keyGen := wkg.LatestKeyGeneration() if keyGen < 1 { return false } return wkg[keyGen-1].IsWriter(user, deviceKey) }
[ "func", "(", "wkg", "TLFWriterKeyGenerationsV2", ")", "IsWriter", "(", "user", "keybase1", ".", "UID", ",", "deviceKey", "kbfscrypto", ".", "CryptPublicKey", ")", "bool", "{", "keyGen", ":=", "wkg", ".", "LatestKeyGeneration", "(", ")", "\n", "if", "keyGen", "<", "1", "{", "return", "false", "\n", "}", "\n", "return", "wkg", "[", "keyGen", "-", "1", "]", ".", "IsWriter", "(", "user", ",", "deviceKey", ")", "\n", "}" ]
// IsWriter returns whether or not the user+device is an authorized writer // for the latest generation.
[ "IsWriter", "returns", "whether", "or", "not", "the", "user", "+", "device", "is", "an", "authorized", "writer", "for", "the", "latest", "generation", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/key_bundle_v2.go#L237-L243
158,483
keybase/client
go/kbfs/kbfsmd/key_bundle_v2.go
ToTLFWriterKeyBundleV3
func (wkg TLFWriterKeyGenerationsV2) ToTLFWriterKeyBundleV3( codec kbfscodec.Codec, tlfCryptKeyGetter func() ([]kbfscrypto.TLFCryptKey, error)) ( TLFWriterKeyBundleV2, TLFWriterKeyBundleV3, error) { keyGen := wkg.LatestKeyGeneration() if keyGen < FirstValidKeyGen { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, errors.New("No key generations to convert") } // Copy the latest UserDeviceKeyInfoMap. wkbV2 := wkg[keyGen-FirstValidKeyGen] ePubKeyCount := len(wkbV2.TLFEphemeralPublicKeys) udkimV3, err := writerUDKIMV2ToV3(codec, wkbV2.WKeys, ePubKeyCount) if err != nil { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, err } wkbV3 := TLFWriterKeyBundleV3{ Keys: udkimV3, TLFEphemeralPublicKeys: make( kbfscrypto.TLFEphemeralPublicKeys, ePubKeyCount), TLFPublicKey: wkbV2.TLFPublicKey, } // Copy all of the TLFEphemeralPublicKeys at this generation. copy(wkbV3.TLFEphemeralPublicKeys[:], wkbV2.TLFEphemeralPublicKeys) if keyGen > FirstValidKeyGen { // Fetch all of the TLFCryptKeys. keys, err := tlfCryptKeyGetter() if err != nil { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, err } // Sanity check. if len(keys) != int(keyGen) { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, fmt.Errorf("expected %d keys, found %d", keyGen, len(keys)) } // Save the current key. currKey := keys[len(keys)-1] // Get rid of the most current generation as that's in the UserDeviceKeyInfoMap already. keys = keys[:len(keys)-1] // Encrypt the historic keys with the current key. wkbV3.EncryptedHistoricTLFCryptKeys, err = kbfscrypto.EncryptTLFCryptKeys(codec, keys, currKey) if err != nil { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, err } } return wkbV2, wkbV3, nil }
go
func (wkg TLFWriterKeyGenerationsV2) ToTLFWriterKeyBundleV3( codec kbfscodec.Codec, tlfCryptKeyGetter func() ([]kbfscrypto.TLFCryptKey, error)) ( TLFWriterKeyBundleV2, TLFWriterKeyBundleV3, error) { keyGen := wkg.LatestKeyGeneration() if keyGen < FirstValidKeyGen { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, errors.New("No key generations to convert") } // Copy the latest UserDeviceKeyInfoMap. wkbV2 := wkg[keyGen-FirstValidKeyGen] ePubKeyCount := len(wkbV2.TLFEphemeralPublicKeys) udkimV3, err := writerUDKIMV2ToV3(codec, wkbV2.WKeys, ePubKeyCount) if err != nil { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, err } wkbV3 := TLFWriterKeyBundleV3{ Keys: udkimV3, TLFEphemeralPublicKeys: make( kbfscrypto.TLFEphemeralPublicKeys, ePubKeyCount), TLFPublicKey: wkbV2.TLFPublicKey, } // Copy all of the TLFEphemeralPublicKeys at this generation. copy(wkbV3.TLFEphemeralPublicKeys[:], wkbV2.TLFEphemeralPublicKeys) if keyGen > FirstValidKeyGen { // Fetch all of the TLFCryptKeys. keys, err := tlfCryptKeyGetter() if err != nil { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, err } // Sanity check. if len(keys) != int(keyGen) { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, fmt.Errorf("expected %d keys, found %d", keyGen, len(keys)) } // Save the current key. currKey := keys[len(keys)-1] // Get rid of the most current generation as that's in the UserDeviceKeyInfoMap already. keys = keys[:len(keys)-1] // Encrypt the historic keys with the current key. wkbV3.EncryptedHistoricTLFCryptKeys, err = kbfscrypto.EncryptTLFCryptKeys(codec, keys, currKey) if err != nil { return TLFWriterKeyBundleV2{}, TLFWriterKeyBundleV3{}, err } } return wkbV2, wkbV3, nil }
[ "func", "(", "wkg", "TLFWriterKeyGenerationsV2", ")", "ToTLFWriterKeyBundleV3", "(", "codec", "kbfscodec", ".", "Codec", ",", "tlfCryptKeyGetter", "func", "(", ")", "(", "[", "]", "kbfscrypto", ".", "TLFCryptKey", ",", "error", ")", ")", "(", "TLFWriterKeyBundleV2", ",", "TLFWriterKeyBundleV3", ",", "error", ")", "{", "keyGen", ":=", "wkg", ".", "LatestKeyGeneration", "(", ")", "\n", "if", "keyGen", "<", "FirstValidKeyGen", "{", "return", "TLFWriterKeyBundleV2", "{", "}", ",", "TLFWriterKeyBundleV3", "{", "}", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// Copy the latest UserDeviceKeyInfoMap.", "wkbV2", ":=", "wkg", "[", "keyGen", "-", "FirstValidKeyGen", "]", "\n", "ePubKeyCount", ":=", "len", "(", "wkbV2", ".", "TLFEphemeralPublicKeys", ")", "\n", "udkimV3", ",", "err", ":=", "writerUDKIMV2ToV3", "(", "codec", ",", "wkbV2", ".", "WKeys", ",", "ePubKeyCount", ")", "\n", "if", "err", "!=", "nil", "{", "return", "TLFWriterKeyBundleV2", "{", "}", ",", "TLFWriterKeyBundleV3", "{", "}", ",", "err", "\n", "}", "\n", "wkbV3", ":=", "TLFWriterKeyBundleV3", "{", "Keys", ":", "udkimV3", ",", "TLFEphemeralPublicKeys", ":", "make", "(", "kbfscrypto", ".", "TLFEphemeralPublicKeys", ",", "ePubKeyCount", ")", ",", "TLFPublicKey", ":", "wkbV2", ".", "TLFPublicKey", ",", "}", "\n", "// Copy all of the TLFEphemeralPublicKeys at this generation.", "copy", "(", "wkbV3", ".", "TLFEphemeralPublicKeys", "[", ":", "]", ",", "wkbV2", ".", "TLFEphemeralPublicKeys", ")", "\n\n", "if", "keyGen", ">", "FirstValidKeyGen", "{", "// Fetch all of the TLFCryptKeys.", "keys", ",", "err", ":=", "tlfCryptKeyGetter", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "TLFWriterKeyBundleV2", "{", "}", ",", "TLFWriterKeyBundleV3", "{", "}", ",", "err", "\n", "}", "\n", "// Sanity check.", "if", "len", "(", "keys", ")", "!=", "int", "(", "keyGen", ")", "{", "return", "TLFWriterKeyBundleV2", "{", "}", ",", "TLFWriterKeyBundleV3", "{", "}", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "keyGen", ",", "len", "(", "keys", ")", ")", "\n", "}", "\n", "// Save the current key.", "currKey", ":=", "keys", "[", "len", "(", "keys", ")", "-", "1", "]", "\n", "// Get rid of the most current generation as that's in the UserDeviceKeyInfoMap already.", "keys", "=", "keys", "[", ":", "len", "(", "keys", ")", "-", "1", "]", "\n", "// Encrypt the historic keys with the current key.", "wkbV3", ".", "EncryptedHistoricTLFCryptKeys", ",", "err", "=", "kbfscrypto", ".", "EncryptTLFCryptKeys", "(", "codec", ",", "keys", ",", "currKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "TLFWriterKeyBundleV2", "{", "}", ",", "TLFWriterKeyBundleV3", "{", "}", ",", "err", "\n", "}", "\n", "}", "\n\n", "return", "wkbV2", ",", "wkbV3", ",", "nil", "\n", "}" ]
// ToTLFWriterKeyBundleV3 converts a TLFWriterKeyGenerationsV2 to a TLFWriterKeyBundleV3.
[ "ToTLFWriterKeyBundleV3", "converts", "a", "TLFWriterKeyGenerationsV2", "to", "a", "TLFWriterKeyBundleV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/key_bundle_v2.go#L246-L295
158,484
keybase/client
go/kbfs/kbfsmd/key_bundle_v2.go
IsReader
func (rkg TLFReaderKeyGenerationsV2) IsReader(user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey) bool { keyGen := rkg.LatestKeyGeneration() if keyGen < 1 { return false } return rkg[keyGen-1].IsReader(user, deviceKey) }
go
func (rkg TLFReaderKeyGenerationsV2) IsReader(user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey) bool { keyGen := rkg.LatestKeyGeneration() if keyGen < 1 { return false } return rkg[keyGen-1].IsReader(user, deviceKey) }
[ "func", "(", "rkg", "TLFReaderKeyGenerationsV2", ")", "IsReader", "(", "user", "keybase1", ".", "UID", ",", "deviceKey", "kbfscrypto", ".", "CryptPublicKey", ")", "bool", "{", "keyGen", ":=", "rkg", ".", "LatestKeyGeneration", "(", ")", "\n", "if", "keyGen", "<", "1", "{", "return", "false", "\n", "}", "\n", "return", "rkg", "[", "keyGen", "-", "1", "]", ".", "IsReader", "(", "user", ",", "deviceKey", ")", "\n", "}" ]
// IsReader returns whether or not the user+device is an authorized reader // for the latest generation.
[ "IsReader", "returns", "whether", "or", "not", "the", "user", "+", "device", "is", "an", "authorized", "reader", "for", "the", "latest", "generation", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/key_bundle_v2.go#L331-L337
158,485
keybase/client
go/kbfs/kbfsmd/key_bundle_v2.go
ToTLFReaderKeyBundleV3
func (rkg TLFReaderKeyGenerationsV2) ToTLFReaderKeyBundleV3( codec kbfscodec.Codec, wkb TLFWriterKeyBundleV2) ( TLFReaderKeyBundleV3, error) { keyGen := rkg.LatestKeyGeneration() if keyGen < FirstValidKeyGen { return TLFReaderKeyBundleV3{}, errors.New("No key generations to convert") } rkbV3 := TLFReaderKeyBundleV3{ Keys: make(UserDeviceKeyInfoMapV3), } // Copy the latest UserDeviceKeyInfoMap. rkb := rkg[keyGen-FirstValidKeyGen] // Copy all of the TLFReaderEphemeralPublicKeys. rkbV3.TLFEphemeralPublicKeys = make(kbfscrypto.TLFEphemeralPublicKeys, len(rkb.TLFReaderEphemeralPublicKeys)) copy(rkbV3.TLFEphemeralPublicKeys[:], rkb.TLFReaderEphemeralPublicKeys) // Track a mapping of old writer ephemeral pubkey index to new // reader ephemeral pubkey index. pubKeyIndicesMap := make(map[int]int) // We need to copy these in a slightly annoying way to work around // the negative index hack. In V3 readers always have their ePubKey // in the TLFReaderEphemeralPublicKeys list. In V2 they only do if // the index is negative. Otherwise it's in the writer's list. for uid, dkim := range rkb.RKeys { dkimV3 := make(DeviceKeyInfoMapV3) for kid, info := range dkim { var infoCopy TLFCryptKeyInfo err := kbfscodec.Update(codec, &infoCopy, info) if err != nil { return TLFReaderKeyBundleV3{}, err } keyLocation, index, ePubKey, err := GetEphemeralPublicKeyInfoV2(info, wkb, rkb) if err != nil { return TLFReaderKeyBundleV3{}, err } switch keyLocation { case WriterEPubKeys: // Map the old index in the writer list to a new index // at the end of the reader list. newIndex, ok := pubKeyIndicesMap[index] if !ok { rkbV3.TLFEphemeralPublicKeys = append(rkbV3.TLFEphemeralPublicKeys, ePubKey) // TODO: This index depends on // map iteration order, which // varies. Impose a consistent // order on these indices. newIndex = len(rkbV3.TLFEphemeralPublicKeys) - 1 pubKeyIndicesMap[index] = newIndex } infoCopy.EPubKeyIndex = newIndex case ReaderEPubKeys: // Use the real index in the reader list. infoCopy.EPubKeyIndex = index default: return TLFReaderKeyBundleV3{}, fmt.Errorf("Unknown key location %s", keyLocation) } dkimV3[kbfscrypto.MakeCryptPublicKey(kid)] = infoCopy } rkbV3.Keys[uid] = dkimV3 } return rkbV3, nil }
go
func (rkg TLFReaderKeyGenerationsV2) ToTLFReaderKeyBundleV3( codec kbfscodec.Codec, wkb TLFWriterKeyBundleV2) ( TLFReaderKeyBundleV3, error) { keyGen := rkg.LatestKeyGeneration() if keyGen < FirstValidKeyGen { return TLFReaderKeyBundleV3{}, errors.New("No key generations to convert") } rkbV3 := TLFReaderKeyBundleV3{ Keys: make(UserDeviceKeyInfoMapV3), } // Copy the latest UserDeviceKeyInfoMap. rkb := rkg[keyGen-FirstValidKeyGen] // Copy all of the TLFReaderEphemeralPublicKeys. rkbV3.TLFEphemeralPublicKeys = make(kbfscrypto.TLFEphemeralPublicKeys, len(rkb.TLFReaderEphemeralPublicKeys)) copy(rkbV3.TLFEphemeralPublicKeys[:], rkb.TLFReaderEphemeralPublicKeys) // Track a mapping of old writer ephemeral pubkey index to new // reader ephemeral pubkey index. pubKeyIndicesMap := make(map[int]int) // We need to copy these in a slightly annoying way to work around // the negative index hack. In V3 readers always have their ePubKey // in the TLFReaderEphemeralPublicKeys list. In V2 they only do if // the index is negative. Otherwise it's in the writer's list. for uid, dkim := range rkb.RKeys { dkimV3 := make(DeviceKeyInfoMapV3) for kid, info := range dkim { var infoCopy TLFCryptKeyInfo err := kbfscodec.Update(codec, &infoCopy, info) if err != nil { return TLFReaderKeyBundleV3{}, err } keyLocation, index, ePubKey, err := GetEphemeralPublicKeyInfoV2(info, wkb, rkb) if err != nil { return TLFReaderKeyBundleV3{}, err } switch keyLocation { case WriterEPubKeys: // Map the old index in the writer list to a new index // at the end of the reader list. newIndex, ok := pubKeyIndicesMap[index] if !ok { rkbV3.TLFEphemeralPublicKeys = append(rkbV3.TLFEphemeralPublicKeys, ePubKey) // TODO: This index depends on // map iteration order, which // varies. Impose a consistent // order on these indices. newIndex = len(rkbV3.TLFEphemeralPublicKeys) - 1 pubKeyIndicesMap[index] = newIndex } infoCopy.EPubKeyIndex = newIndex case ReaderEPubKeys: // Use the real index in the reader list. infoCopy.EPubKeyIndex = index default: return TLFReaderKeyBundleV3{}, fmt.Errorf("Unknown key location %s", keyLocation) } dkimV3[kbfscrypto.MakeCryptPublicKey(kid)] = infoCopy } rkbV3.Keys[uid] = dkimV3 } return rkbV3, nil }
[ "func", "(", "rkg", "TLFReaderKeyGenerationsV2", ")", "ToTLFReaderKeyBundleV3", "(", "codec", "kbfscodec", ".", "Codec", ",", "wkb", "TLFWriterKeyBundleV2", ")", "(", "TLFReaderKeyBundleV3", ",", "error", ")", "{", "keyGen", ":=", "rkg", ".", "LatestKeyGeneration", "(", ")", "\n", "if", "keyGen", "<", "FirstValidKeyGen", "{", "return", "TLFReaderKeyBundleV3", "{", "}", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "rkbV3", ":=", "TLFReaderKeyBundleV3", "{", "Keys", ":", "make", "(", "UserDeviceKeyInfoMapV3", ")", ",", "}", "\n\n", "// Copy the latest UserDeviceKeyInfoMap.", "rkb", ":=", "rkg", "[", "keyGen", "-", "FirstValidKeyGen", "]", "\n\n", "// Copy all of the TLFReaderEphemeralPublicKeys.", "rkbV3", ".", "TLFEphemeralPublicKeys", "=", "make", "(", "kbfscrypto", ".", "TLFEphemeralPublicKeys", ",", "len", "(", "rkb", ".", "TLFReaderEphemeralPublicKeys", ")", ")", "\n", "copy", "(", "rkbV3", ".", "TLFEphemeralPublicKeys", "[", ":", "]", ",", "rkb", ".", "TLFReaderEphemeralPublicKeys", ")", "\n\n", "// Track a mapping of old writer ephemeral pubkey index to new", "// reader ephemeral pubkey index.", "pubKeyIndicesMap", ":=", "make", "(", "map", "[", "int", "]", "int", ")", "\n\n", "// We need to copy these in a slightly annoying way to work around", "// the negative index hack. In V3 readers always have their ePubKey", "// in the TLFReaderEphemeralPublicKeys list. In V2 they only do if", "// the index is negative. Otherwise it's in the writer's list.", "for", "uid", ",", "dkim", ":=", "range", "rkb", ".", "RKeys", "{", "dkimV3", ":=", "make", "(", "DeviceKeyInfoMapV3", ")", "\n", "for", "kid", ",", "info", ":=", "range", "dkim", "{", "var", "infoCopy", "TLFCryptKeyInfo", "\n", "err", ":=", "kbfscodec", ".", "Update", "(", "codec", ",", "&", "infoCopy", ",", "info", ")", "\n", "if", "err", "!=", "nil", "{", "return", "TLFReaderKeyBundleV3", "{", "}", ",", "err", "\n", "}", "\n\n", "keyLocation", ",", "index", ",", "ePubKey", ",", "err", ":=", "GetEphemeralPublicKeyInfoV2", "(", "info", ",", "wkb", ",", "rkb", ")", "\n", "if", "err", "!=", "nil", "{", "return", "TLFReaderKeyBundleV3", "{", "}", ",", "err", "\n", "}", "\n\n", "switch", "keyLocation", "{", "case", "WriterEPubKeys", ":", "// Map the old index in the writer list to a new index", "// at the end of the reader list.", "newIndex", ",", "ok", ":=", "pubKeyIndicesMap", "[", "index", "]", "\n", "if", "!", "ok", "{", "rkbV3", ".", "TLFEphemeralPublicKeys", "=", "append", "(", "rkbV3", ".", "TLFEphemeralPublicKeys", ",", "ePubKey", ")", "\n", "// TODO: This index depends on", "// map iteration order, which", "// varies. Impose a consistent", "// order on these indices.", "newIndex", "=", "len", "(", "rkbV3", ".", "TLFEphemeralPublicKeys", ")", "-", "1", "\n", "pubKeyIndicesMap", "[", "index", "]", "=", "newIndex", "\n", "}", "\n", "infoCopy", ".", "EPubKeyIndex", "=", "newIndex", "\n", "case", "ReaderEPubKeys", ":", "// Use the real index in the reader list.", "infoCopy", ".", "EPubKeyIndex", "=", "index", "\n", "default", ":", "return", "TLFReaderKeyBundleV3", "{", "}", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "keyLocation", ")", "\n", "}", "\n", "dkimV3", "[", "kbfscrypto", ".", "MakeCryptPublicKey", "(", "kid", ")", "]", "=", "infoCopy", "\n", "}", "\n", "rkbV3", ".", "Keys", "[", "uid", "]", "=", "dkimV3", "\n", "}", "\n", "return", "rkbV3", ",", "nil", "\n", "}" ]
// ToTLFReaderKeyBundleV3 converts a TLFReaderKeyGenerationsV2 to a TLFReaderkeyBundleV3.
[ "ToTLFReaderKeyBundleV3", "converts", "a", "TLFReaderKeyGenerationsV2", "to", "a", "TLFReaderkeyBundleV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/key_bundle_v2.go#L340-L410
158,486
keybase/client
go/engine/paperkey.go
NewPaperKey
func NewPaperKey(g *libkb.GlobalContext) *PaperKey { return &PaperKey{ Contextified: libkb.NewContextified(g), } }
go
func NewPaperKey(g *libkb.GlobalContext) *PaperKey { return &PaperKey{ Contextified: libkb.NewContextified(g), } }
[ "func", "NewPaperKey", "(", "g", "*", "libkb", ".", "GlobalContext", ")", "*", "PaperKey", "{", "return", "&", "PaperKey", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "}", "\n", "}" ]
// NewPaperKey creates a PaperKey engine.
[ "NewPaperKey", "creates", "a", "PaperKey", "engine", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/paperkey.go#L28-L32
158,487
keybase/client
go/teams/keys.go
GetAndVerifyPerTeamKey
func GetAndVerifyPerTeamKey(mctx libkb.MetaContext, teamData *keybase1.TeamData, gen keybase1.PerTeamKeyGeneration) (ret keybase1.PerTeamKeySeedItem, err error) { ret, ok := teamData.PerTeamKeySeedsUnverified[gen] if !ok { return ret, libkb.NotFoundError{ Msg: fmt.Sprintf("no team secret found at generation %v", gen)} } km, err := NewTeamKeyManagerWithSecret(ret.Seed, gen) if err != nil { return ret, err } chainKey, err := TeamSigChainState{inner: teamData.Chain}.GetPerTeamKeyAtGeneration(gen) if err != nil { return ret, err } // Takes roughly 280us on android (Honor 6X) localSigKey, err := km.SigningKey() if err != nil { return ret, err } // Takes roughly 900us on android (Honor 6X) localEncKey, err := km.EncryptionKey() if err != nil { return ret, err } if !chainKey.SigKID.SecureEqual(localSigKey.GetKID()) { mctx.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, localSigKey.GetKID(), chainKey.SigKID) return ret, fmt.Errorf("wrong team key found at generation %v", gen) } if !chainKey.EncKID.SecureEqual(localEncKey.GetKID()) { mctx.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, localEncKey.GetKID(), chainKey.EncKID) return ret, fmt.Errorf("wrong team key (enc) found at generation %v", gen) } return ret, nil }
go
func GetAndVerifyPerTeamKey(mctx libkb.MetaContext, teamData *keybase1.TeamData, gen keybase1.PerTeamKeyGeneration) (ret keybase1.PerTeamKeySeedItem, err error) { ret, ok := teamData.PerTeamKeySeedsUnverified[gen] if !ok { return ret, libkb.NotFoundError{ Msg: fmt.Sprintf("no team secret found at generation %v", gen)} } km, err := NewTeamKeyManagerWithSecret(ret.Seed, gen) if err != nil { return ret, err } chainKey, err := TeamSigChainState{inner: teamData.Chain}.GetPerTeamKeyAtGeneration(gen) if err != nil { return ret, err } // Takes roughly 280us on android (Honor 6X) localSigKey, err := km.SigningKey() if err != nil { return ret, err } // Takes roughly 900us on android (Honor 6X) localEncKey, err := km.EncryptionKey() if err != nil { return ret, err } if !chainKey.SigKID.SecureEqual(localSigKey.GetKID()) { mctx.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, localSigKey.GetKID(), chainKey.SigKID) return ret, fmt.Errorf("wrong team key found at generation %v", gen) } if !chainKey.EncKID.SecureEqual(localEncKey.GetKID()) { mctx.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, localEncKey.GetKID(), chainKey.EncKID) return ret, fmt.Errorf("wrong team key (enc) found at generation %v", gen) } return ret, nil }
[ "func", "GetAndVerifyPerTeamKey", "(", "mctx", "libkb", ".", "MetaContext", ",", "teamData", "*", "keybase1", ".", "TeamData", ",", "gen", "keybase1", ".", "PerTeamKeyGeneration", ")", "(", "ret", "keybase1", ".", "PerTeamKeySeedItem", ",", "err", "error", ")", "{", "ret", ",", "ok", ":=", "teamData", ".", "PerTeamKeySeedsUnverified", "[", "gen", "]", "\n", "if", "!", "ok", "{", "return", "ret", ",", "libkb", ".", "NotFoundError", "{", "Msg", ":", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "gen", ")", "}", "\n", "}", "\n\n", "km", ",", "err", ":=", "NewTeamKeyManagerWithSecret", "(", "ret", ".", "Seed", ",", "gen", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ret", ",", "err", "\n", "}", "\n\n", "chainKey", ",", "err", ":=", "TeamSigChainState", "{", "inner", ":", "teamData", ".", "Chain", "}", ".", "GetPerTeamKeyAtGeneration", "(", "gen", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ret", ",", "err", "\n", "}", "\n\n", "// Takes roughly 280us on android (Honor 6X)", "localSigKey", ",", "err", ":=", "km", ".", "SigningKey", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ret", ",", "err", "\n", "}", "\n\n", "// Takes roughly 900us on android (Honor 6X)", "localEncKey", ",", "err", ":=", "km", ".", "EncryptionKey", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ret", ",", "err", "\n", "}", "\n\n", "if", "!", "chainKey", ".", "SigKID", ".", "SecureEqual", "(", "localSigKey", ".", "GetKID", "(", ")", ")", "{", "mctx", ".", "Debug", "(", "\"", "\"", ",", "gen", ",", "localSigKey", ".", "GetKID", "(", ")", ",", "chainKey", ".", "SigKID", ")", "\n", "return", "ret", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "gen", ")", "\n", "}", "\n\n", "if", "!", "chainKey", ".", "EncKID", ".", "SecureEqual", "(", "localEncKey", ".", "GetKID", "(", ")", ")", "{", "mctx", ".", "Debug", "(", "\"", "\"", ",", "gen", ",", "localEncKey", ".", "GetKID", "(", ")", ",", "chainKey", ".", "EncKID", ")", "\n", "return", "ret", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "gen", ")", "\n", "}", "\n\n", "return", "ret", ",", "nil", "\n", "}" ]
// Get a PTK seed and verify against the sigchain that is the correct key.
[ "Get", "a", "PTK", "seed", "and", "verify", "against", "the", "sigchain", "that", "is", "the", "correct", "key", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/keys.go#L19-L61
158,488
keybase/client
go/teams/keys.go
SigningKey
func (t *TeamKeyManager) SigningKey() (libkb.NaclSigningKeyPair, error) { if t.signingKey == nil { key, err := libkb.MakeNaclSigningKeyPairFromSecretBytes(derivedSecret(t.sharedSecret, libkb.TeamEdDSADerivationString)) if err != nil { return libkb.NaclSigningKeyPair{}, err } t.signingKey = &key } return *t.signingKey, nil }
go
func (t *TeamKeyManager) SigningKey() (libkb.NaclSigningKeyPair, error) { if t.signingKey == nil { key, err := libkb.MakeNaclSigningKeyPairFromSecretBytes(derivedSecret(t.sharedSecret, libkb.TeamEdDSADerivationString)) if err != nil { return libkb.NaclSigningKeyPair{}, err } t.signingKey = &key } return *t.signingKey, nil }
[ "func", "(", "t", "*", "TeamKeyManager", ")", "SigningKey", "(", ")", "(", "libkb", ".", "NaclSigningKeyPair", ",", "error", ")", "{", "if", "t", ".", "signingKey", "==", "nil", "{", "key", ",", "err", ":=", "libkb", ".", "MakeNaclSigningKeyPairFromSecretBytes", "(", "derivedSecret", "(", "t", ".", "sharedSecret", ",", "libkb", ".", "TeamEdDSADerivationString", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "libkb", ".", "NaclSigningKeyPair", "{", "}", ",", "err", "\n", "}", "\n", "t", ".", "signingKey", "=", "&", "key", "\n", "}", "\n", "return", "*", "t", ".", "signingKey", ",", "nil", "\n", "}" ]
// EncryptionKey returns the derived NaclSigningKeyPair from the team's shared secret.
[ "EncryptionKey", "returns", "the", "derived", "NaclSigningKeyPair", "from", "the", "team", "s", "shared", "secret", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/keys.go#L110-L119
158,489
keybase/client
go/teams/keys.go
EncryptionKey
func (t *TeamKeyManager) EncryptionKey() (libkb.NaclDHKeyPair, error) { if t.encryptionKey == nil { key, err := libkb.MakeNaclDHKeyPairFromSecretBytes(derivedSecret(t.sharedSecret, libkb.TeamDHDerivationString)) if err != nil { return libkb.NaclDHKeyPair{}, err } t.encryptionKey = &key } return *t.encryptionKey, nil }
go
func (t *TeamKeyManager) EncryptionKey() (libkb.NaclDHKeyPair, error) { if t.encryptionKey == nil { key, err := libkb.MakeNaclDHKeyPairFromSecretBytes(derivedSecret(t.sharedSecret, libkb.TeamDHDerivationString)) if err != nil { return libkb.NaclDHKeyPair{}, err } t.encryptionKey = &key } return *t.encryptionKey, nil }
[ "func", "(", "t", "*", "TeamKeyManager", ")", "EncryptionKey", "(", ")", "(", "libkb", ".", "NaclDHKeyPair", ",", "error", ")", "{", "if", "t", ".", "encryptionKey", "==", "nil", "{", "key", ",", "err", ":=", "libkb", ".", "MakeNaclDHKeyPairFromSecretBytes", "(", "derivedSecret", "(", "t", ".", "sharedSecret", ",", "libkb", ".", "TeamDHDerivationString", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "libkb", ".", "NaclDHKeyPair", "{", "}", ",", "err", "\n", "}", "\n", "t", ".", "encryptionKey", "=", "&", "key", "\n", "}", "\n", "return", "*", "t", ".", "encryptionKey", ",", "nil", "\n", "}" ]
// EncryptionKey returns the derived NaclDHKeyPair from the team's shared secret.
[ "EncryptionKey", "returns", "the", "derived", "NaclDHKeyPair", "from", "the", "team", "s", "shared", "secret", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/keys.go#L122-L131
158,490
keybase/client
go/teams/keys.go
SharedSecretBoxes
func (t *TeamKeyManager) SharedSecretBoxes(mctx libkb.MetaContext, senderKey libkb.GenericKey, recipients map[keybase1.UserVersion]keybase1.PerUserKey) (boxes *PerTeamSharedSecretBoxes, err error) { defer mctx.Trace("SharedSecretBoxes", func() error { return err })() // make the nonce prefix, skipping the zero counter // (0 used for previous key encryption nonce) n, err := newNonce24SkipZero() if err != nil { return nil, err } // make the recipient boxes with the new secret and the nonce prefix return t.sharedBoxes(t.sharedSecret, t.generation, n, senderKey, recipients) }
go
func (t *TeamKeyManager) SharedSecretBoxes(mctx libkb.MetaContext, senderKey libkb.GenericKey, recipients map[keybase1.UserVersion]keybase1.PerUserKey) (boxes *PerTeamSharedSecretBoxes, err error) { defer mctx.Trace("SharedSecretBoxes", func() error { return err })() // make the nonce prefix, skipping the zero counter // (0 used for previous key encryption nonce) n, err := newNonce24SkipZero() if err != nil { return nil, err } // make the recipient boxes with the new secret and the nonce prefix return t.sharedBoxes(t.sharedSecret, t.generation, n, senderKey, recipients) }
[ "func", "(", "t", "*", "TeamKeyManager", ")", "SharedSecretBoxes", "(", "mctx", "libkb", ".", "MetaContext", ",", "senderKey", "libkb", ".", "GenericKey", ",", "recipients", "map", "[", "keybase1", ".", "UserVersion", "]", "keybase1", ".", "PerUserKey", ")", "(", "boxes", "*", "PerTeamSharedSecretBoxes", ",", "err", "error", ")", "{", "defer", "mctx", ".", "Trace", "(", "\"", "\"", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "// make the nonce prefix, skipping the zero counter", "// (0 used for previous key encryption nonce)", "n", ",", "err", ":=", "newNonce24SkipZero", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// make the recipient boxes with the new secret and the nonce prefix", "return", "t", ".", "sharedBoxes", "(", "t", ".", "sharedSecret", ",", "t", ".", "generation", ",", "n", ",", "senderKey", ",", "recipients", ")", "\n", "}" ]
// SharedSecretBoxes creates the PerTeamSharedSecretBoxes for recipients with the // existing team shared secret.
[ "SharedSecretBoxes", "creates", "the", "PerTeamSharedSecretBoxes", "for", "recipients", "with", "the", "existing", "team", "shared", "secret", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/keys.go#L135-L147
158,491
keybase/client
go/teams/keys.go
RotateSharedSecretBoxes
func (t *TeamKeyManager) RotateSharedSecretBoxes(mctx libkb.MetaContext, senderKey libkb.GenericKey, recipients map[keybase1.UserVersion]keybase1.PerUserKey) (boxes *PerTeamSharedSecretBoxes, keySection *SCPerTeamKey, err error) { defer mctx.Trace("RotateSharedSecretBoxes", func() error { return err })() // make a new secret nextSecret, err := newSharedSecret() if err != nil { return nil, nil, err } // derive new key from new secret for PrevKey key := derivedSecret(nextSecret, libkb.TeamPrevKeySecretBoxDerivationString) var keyb [32]byte copy(keyb[:], key) // encrypt existing secret with derived key and nonce counter 0 nonce, err := newNonce24() if err != nil { return nil, nil, err } nonceBytes, counter := nonce.Nonce() if counter != 0 { // this should never happen, but might as well make sure it is zero return nil, nil, errors.New("nonce counter not 0 for first use") } sealed := secretbox.Seal(nil, t.sharedSecret.ToBytes(), &nonceBytes, &keyb) // encode encrypted prev key prevKeyEncoded, err := encodeSealedPrevKey(nonceBytes, sealed) if err != nil { return nil, nil, err } // make the recipient boxes with the new secret and the incrementing nonce24 t.setNextSharedSecret(mctx, nextSecret) boxes, err = t.sharedBoxes(t.sharedSecret, t.generation, nonce, senderKey, recipients) if err != nil { return nil, nil, err } // insert encoded encrypted PrevKey boxes.PrevKey = &prevKeyEncoded // need a new PerTeamKey section since the key was rotated keySection, err = t.perTeamKeySection() if err != nil { return nil, nil, err } return boxes, keySection, nil }
go
func (t *TeamKeyManager) RotateSharedSecretBoxes(mctx libkb.MetaContext, senderKey libkb.GenericKey, recipients map[keybase1.UserVersion]keybase1.PerUserKey) (boxes *PerTeamSharedSecretBoxes, keySection *SCPerTeamKey, err error) { defer mctx.Trace("RotateSharedSecretBoxes", func() error { return err })() // make a new secret nextSecret, err := newSharedSecret() if err != nil { return nil, nil, err } // derive new key from new secret for PrevKey key := derivedSecret(nextSecret, libkb.TeamPrevKeySecretBoxDerivationString) var keyb [32]byte copy(keyb[:], key) // encrypt existing secret with derived key and nonce counter 0 nonce, err := newNonce24() if err != nil { return nil, nil, err } nonceBytes, counter := nonce.Nonce() if counter != 0 { // this should never happen, but might as well make sure it is zero return nil, nil, errors.New("nonce counter not 0 for first use") } sealed := secretbox.Seal(nil, t.sharedSecret.ToBytes(), &nonceBytes, &keyb) // encode encrypted prev key prevKeyEncoded, err := encodeSealedPrevKey(nonceBytes, sealed) if err != nil { return nil, nil, err } // make the recipient boxes with the new secret and the incrementing nonce24 t.setNextSharedSecret(mctx, nextSecret) boxes, err = t.sharedBoxes(t.sharedSecret, t.generation, nonce, senderKey, recipients) if err != nil { return nil, nil, err } // insert encoded encrypted PrevKey boxes.PrevKey = &prevKeyEncoded // need a new PerTeamKey section since the key was rotated keySection, err = t.perTeamKeySection() if err != nil { return nil, nil, err } return boxes, keySection, nil }
[ "func", "(", "t", "*", "TeamKeyManager", ")", "RotateSharedSecretBoxes", "(", "mctx", "libkb", ".", "MetaContext", ",", "senderKey", "libkb", ".", "GenericKey", ",", "recipients", "map", "[", "keybase1", ".", "UserVersion", "]", "keybase1", ".", "PerUserKey", ")", "(", "boxes", "*", "PerTeamSharedSecretBoxes", ",", "keySection", "*", "SCPerTeamKey", ",", "err", "error", ")", "{", "defer", "mctx", ".", "Trace", "(", "\"", "\"", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "// make a new secret", "nextSecret", ",", "err", ":=", "newSharedSecret", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "// derive new key from new secret for PrevKey", "key", ":=", "derivedSecret", "(", "nextSecret", ",", "libkb", ".", "TeamPrevKeySecretBoxDerivationString", ")", "\n", "var", "keyb", "[", "32", "]", "byte", "\n", "copy", "(", "keyb", "[", ":", "]", ",", "key", ")", "\n\n", "// encrypt existing secret with derived key and nonce counter 0", "nonce", ",", "err", ":=", "newNonce24", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n", "nonceBytes", ",", "counter", ":=", "nonce", ".", "Nonce", "(", ")", "\n", "if", "counter", "!=", "0", "{", "// this should never happen, but might as well make sure it is zero", "return", "nil", ",", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "sealed", ":=", "secretbox", ".", "Seal", "(", "nil", ",", "t", ".", "sharedSecret", ".", "ToBytes", "(", ")", ",", "&", "nonceBytes", ",", "&", "keyb", ")", "\n\n", "// encode encrypted prev key", "prevKeyEncoded", ",", "err", ":=", "encodeSealedPrevKey", "(", "nonceBytes", ",", "sealed", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "// make the recipient boxes with the new secret and the incrementing nonce24", "t", ".", "setNextSharedSecret", "(", "mctx", ",", "nextSecret", ")", "\n", "boxes", ",", "err", "=", "t", ".", "sharedBoxes", "(", "t", ".", "sharedSecret", ",", "t", ".", "generation", ",", "nonce", ",", "senderKey", ",", "recipients", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "// insert encoded encrypted PrevKey", "boxes", ".", "PrevKey", "=", "&", "prevKeyEncoded", "\n\n", "// need a new PerTeamKey section since the key was rotated", "keySection", ",", "err", "=", "t", ".", "perTeamKeySection", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "boxes", ",", "keySection", ",", "nil", "\n", "}" ]
// RotateSharedSecretBoxes creates a new shared secret for the team and the // required PerTeamKey section.
[ "RotateSharedSecretBoxes", "creates", "a", "new", "shared", "secret", "for", "the", "team", "and", "the", "required", "PerTeamKey", "section", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/keys.go#L151-L200
158,492
keybase/client
go/kbfs/libkbfs/dirty_bcache_disk.go
Get
func (d *DirtyBlockCacheDisk) Get( ctx context.Context, tlfID tlf.ID, ptr data.BlockPointer, branch data.BranchName) ( data.Block, error) { if branch != d.branch { return nil, errors.Errorf( "Branch %s doesn't match branch %s", branch, d.branch) } info, ok := d.getInfo(ptr) if !ok { return nil, data.NoSuchBlockError{ID: ptr.ID} } // Look it up under the temp ID, which is an actual hash that can // be verified. data, serverHalf, _, err := d.diskCache.Get(ctx, tlfID, info.tmpPtr.ID) if err != nil { return nil, err } block := info.newBlock() err = assembleBlock( ctx, d.config.keyGetter(), d.config.Codec(), d.config.cryptoPure(), d.kmd, info.tmpPtr, block, data, serverHalf) if err != nil { return nil, err } return block, nil }
go
func (d *DirtyBlockCacheDisk) Get( ctx context.Context, tlfID tlf.ID, ptr data.BlockPointer, branch data.BranchName) ( data.Block, error) { if branch != d.branch { return nil, errors.Errorf( "Branch %s doesn't match branch %s", branch, d.branch) } info, ok := d.getInfo(ptr) if !ok { return nil, data.NoSuchBlockError{ID: ptr.ID} } // Look it up under the temp ID, which is an actual hash that can // be verified. data, serverHalf, _, err := d.diskCache.Get(ctx, tlfID, info.tmpPtr.ID) if err != nil { return nil, err } block := info.newBlock() err = assembleBlock( ctx, d.config.keyGetter(), d.config.Codec(), d.config.cryptoPure(), d.kmd, info.tmpPtr, block, data, serverHalf) if err != nil { return nil, err } return block, nil }
[ "func", "(", "d", "*", "DirtyBlockCacheDisk", ")", "Get", "(", "ctx", "context", ".", "Context", ",", "tlfID", "tlf", ".", "ID", ",", "ptr", "data", ".", "BlockPointer", ",", "branch", "data", ".", "BranchName", ")", "(", "data", ".", "Block", ",", "error", ")", "{", "if", "branch", "!=", "d", ".", "branch", "{", "return", "nil", ",", "errors", ".", "Errorf", "(", "\"", "\"", ",", "branch", ",", "d", ".", "branch", ")", "\n", "}", "\n\n", "info", ",", "ok", ":=", "d", ".", "getInfo", "(", "ptr", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "data", ".", "NoSuchBlockError", "{", "ID", ":", "ptr", ".", "ID", "}", "\n", "}", "\n\n", "// Look it up under the temp ID, which is an actual hash that can", "// be verified.", "data", ",", "serverHalf", ",", "_", ",", "err", ":=", "d", ".", "diskCache", ".", "Get", "(", "ctx", ",", "tlfID", ",", "info", ".", "tmpPtr", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "block", ":=", "info", ".", "newBlock", "(", ")", "\n", "err", "=", "assembleBlock", "(", "ctx", ",", "d", ".", "config", ".", "keyGetter", "(", ")", ",", "d", ".", "config", ".", "Codec", "(", ")", ",", "d", ".", "config", ".", "cryptoPure", "(", ")", ",", "d", ".", "kmd", ",", "info", ".", "tmpPtr", ",", "block", ",", "data", ",", "serverHalf", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "block", ",", "nil", "\n", "}" ]
// Get implements the DirtyBlockCache interface for // DirtyBlockCacheDisk.
[ "Get", "implements", "the", "DirtyBlockCache", "interface", "for", "DirtyBlockCacheDisk", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/dirty_bcache_disk.go#L80-L108
158,493
keybase/client
go/kbfs/libkbfs/dirty_bcache_disk.go
Put
func (d *DirtyBlockCacheDisk) Put( ctx context.Context, tlfID tlf.ID, ptr data.BlockPointer, branch data.BranchName, block data.Block) error { if branch != d.branch { return errors.Errorf( "Branch %s doesn't match branch %s", branch, d.branch) } // Need to ready the block, since the disk cache expects encrypted // data and a block ID that can be verified against that data. id, _, readyBlockData, err := d.config.BlockOps().Ready(ctx, d.kmd, block) if err != nil { return err } err = d.diskCache.Put( ctx, tlfID, id, readyBlockData.Buf, readyBlockData.ServerHalf) if err != nil { return err } directType := data.DirectBlock if block.IsIndirect() { directType = data.IndirectBlock } _, isDir := block.(*data.DirBlock) info := dirtyBlockCacheDiskInfo{ tmpPtr: data.BlockPointer{ ID: id, KeyGen: d.kmd.LatestKeyGeneration(), DataVer: block.DataVersion(), DirectType: directType, }, isDir: isDir, } d.saveInfo(ptr, info) // TODO: have an in-memory LRU cache of limited size to optimize // frequent block access? return nil }
go
func (d *DirtyBlockCacheDisk) Put( ctx context.Context, tlfID tlf.ID, ptr data.BlockPointer, branch data.BranchName, block data.Block) error { if branch != d.branch { return errors.Errorf( "Branch %s doesn't match branch %s", branch, d.branch) } // Need to ready the block, since the disk cache expects encrypted // data and a block ID that can be verified against that data. id, _, readyBlockData, err := d.config.BlockOps().Ready(ctx, d.kmd, block) if err != nil { return err } err = d.diskCache.Put( ctx, tlfID, id, readyBlockData.Buf, readyBlockData.ServerHalf) if err != nil { return err } directType := data.DirectBlock if block.IsIndirect() { directType = data.IndirectBlock } _, isDir := block.(*data.DirBlock) info := dirtyBlockCacheDiskInfo{ tmpPtr: data.BlockPointer{ ID: id, KeyGen: d.kmd.LatestKeyGeneration(), DataVer: block.DataVersion(), DirectType: directType, }, isDir: isDir, } d.saveInfo(ptr, info) // TODO: have an in-memory LRU cache of limited size to optimize // frequent block access? return nil }
[ "func", "(", "d", "*", "DirtyBlockCacheDisk", ")", "Put", "(", "ctx", "context", ".", "Context", ",", "tlfID", "tlf", ".", "ID", ",", "ptr", "data", ".", "BlockPointer", ",", "branch", "data", ".", "BranchName", ",", "block", "data", ".", "Block", ")", "error", "{", "if", "branch", "!=", "d", ".", "branch", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "branch", ",", "d", ".", "branch", ")", "\n", "}", "\n\n", "// Need to ready the block, since the disk cache expects encrypted", "// data and a block ID that can be verified against that data.", "id", ",", "_", ",", "readyBlockData", ",", "err", ":=", "d", ".", "config", ".", "BlockOps", "(", ")", ".", "Ready", "(", "ctx", ",", "d", ".", "kmd", ",", "block", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "err", "=", "d", ".", "diskCache", ".", "Put", "(", "ctx", ",", "tlfID", ",", "id", ",", "readyBlockData", ".", "Buf", ",", "readyBlockData", ".", "ServerHalf", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "directType", ":=", "data", ".", "DirectBlock", "\n", "if", "block", ".", "IsIndirect", "(", ")", "{", "directType", "=", "data", ".", "IndirectBlock", "\n", "}", "\n", "_", ",", "isDir", ":=", "block", ".", "(", "*", "data", ".", "DirBlock", ")", "\n\n", "info", ":=", "dirtyBlockCacheDiskInfo", "{", "tmpPtr", ":", "data", ".", "BlockPointer", "{", "ID", ":", "id", ",", "KeyGen", ":", "d", ".", "kmd", ".", "LatestKeyGeneration", "(", ")", ",", "DataVer", ":", "block", ".", "DataVersion", "(", ")", ",", "DirectType", ":", "directType", ",", "}", ",", "isDir", ":", "isDir", ",", "}", "\n", "d", ".", "saveInfo", "(", "ptr", ",", "info", ")", "\n\n", "// TODO: have an in-memory LRU cache of limited size to optimize", "// frequent block access?", "return", "nil", "\n", "}" ]
// Put implements the DirtyBlockCache interface for // DirtyBlockCacheDisk. Note than any modifications made to `block` // after the `Put` will require another `Put` call, in order for them // to be reflected in the next `Get` call for that block pointer.
[ "Put", "implements", "the", "DirtyBlockCache", "interface", "for", "DirtyBlockCacheDisk", ".", "Note", "than", "any", "modifications", "made", "to", "block", "after", "the", "Put", "will", "require", "another", "Put", "call", "in", "order", "for", "them", "to", "be", "reflected", "in", "the", "next", "Get", "call", "for", "that", "block", "pointer", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/dirty_bcache_disk.go#L114-L155
158,494
keybase/client
go/client/cmd_team_delete.go
listSubteamsRecursive
func (c *CmdTeamDelete) listSubteamsRecursive(cli *keybase1.TeamsClient) (res []keybase1.TeamName, err error) { subs, err := cli.TeamListSubteamsRecursive(context.TODO(), keybase1.TeamListSubteamsRecursiveArg{ ParentTeamName: c.Team.String(), ForceRepoll: true, }) if err != nil { return res, err } // Sort the response alphabetically sort.Slice(subs, func(i, j int) bool { return subs[i].Name.String() < subs[j].Name.String() }) for _, sub := range subs { res = append(res, sub.Name) } return res, err }
go
func (c *CmdTeamDelete) listSubteamsRecursive(cli *keybase1.TeamsClient) (res []keybase1.TeamName, err error) { subs, err := cli.TeamListSubteamsRecursive(context.TODO(), keybase1.TeamListSubteamsRecursiveArg{ ParentTeamName: c.Team.String(), ForceRepoll: true, }) if err != nil { return res, err } // Sort the response alphabetically sort.Slice(subs, func(i, j int) bool { return subs[i].Name.String() < subs[j].Name.String() }) for _, sub := range subs { res = append(res, sub.Name) } return res, err }
[ "func", "(", "c", "*", "CmdTeamDelete", ")", "listSubteamsRecursive", "(", "cli", "*", "keybase1", ".", "TeamsClient", ")", "(", "res", "[", "]", "keybase1", ".", "TeamName", ",", "err", "error", ")", "{", "subs", ",", "err", ":=", "cli", ".", "TeamListSubteamsRecursive", "(", "context", ".", "TODO", "(", ")", ",", "keybase1", ".", "TeamListSubteamsRecursiveArg", "{", "ParentTeamName", ":", "c", ".", "Team", ".", "String", "(", ")", ",", "ForceRepoll", ":", "true", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "res", ",", "err", "\n", "}", "\n", "// Sort the response alphabetically", "sort", ".", "Slice", "(", "subs", ",", "func", "(", "i", ",", "j", "int", ")", "bool", "{", "return", "subs", "[", "i", "]", ".", "Name", ".", "String", "(", ")", "<", "subs", "[", "j", "]", ".", "Name", ".", "String", "(", ")", "\n", "}", ")", "\n", "for", "_", ",", "sub", ":=", "range", "subs", "{", "res", "=", "append", "(", "res", ",", "sub", ".", "Name", ")", "\n", "}", "\n", "return", "res", ",", "err", "\n", "}" ]
// List the subteams of c.Team
[ "List", "the", "subteams", "of", "c", ".", "Team" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_team_delete.go#L103-L119
158,495
keybase/client
go/service/prove.go
NewProveHandler
func NewProveHandler(xp rpc.Transporter, g *libkb.GlobalContext) *ProveHandler { return &ProveHandler{ BaseHandler: NewBaseHandler(g, xp), Contextified: libkb.NewContextified(g), } }
go
func NewProveHandler(xp rpc.Transporter, g *libkb.GlobalContext) *ProveHandler { return &ProveHandler{ BaseHandler: NewBaseHandler(g, xp), Contextified: libkb.NewContextified(g), } }
[ "func", "NewProveHandler", "(", "xp", "rpc", ".", "Transporter", ",", "g", "*", "libkb", ".", "GlobalContext", ")", "*", "ProveHandler", "{", "return", "&", "ProveHandler", "{", "BaseHandler", ":", "NewBaseHandler", "(", "g", ",", "xp", ")", ",", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "}", "\n", "}" ]
// NewProveHandler makes a new ProveHandler object from an RPC transport.
[ "NewProveHandler", "makes", "a", "new", "ProveHandler", "object", "from", "an", "RPC", "transport", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/prove.go#L29-L34
158,496
keybase/client
go/service/prove.go
StartProof
func (ph *ProveHandler) StartProof(ctx context.Context, arg keybase1.StartProofArg) (res keybase1.StartProofResult, err error) { ctx = libkb.WithLogTag(ctx, "PV") defer ph.G().CTraceTimed(ctx, fmt.Sprintf("StartProof: Service: %v, Username: %v", arg.Service, arg.Username), func() error { return err })() eng := engine.NewProve(ph.G(), &arg) uis := libkb.UIs{ ProveUI: ph.getProveUI(arg.SessionID), SecretUI: ph.getSecretUI(arg.SessionID, ph.G()), LogUI: ph.getLogUI(arg.SessionID), SessionID: arg.SessionID, } m := libkb.NewMetaContext(ctx, ph.G()).WithUIs(uis) if err = engine.RunEngine2(m, eng); err != nil { return res, err } res.SigID = eng.SigID() return res, err }
go
func (ph *ProveHandler) StartProof(ctx context.Context, arg keybase1.StartProofArg) (res keybase1.StartProofResult, err error) { ctx = libkb.WithLogTag(ctx, "PV") defer ph.G().CTraceTimed(ctx, fmt.Sprintf("StartProof: Service: %v, Username: %v", arg.Service, arg.Username), func() error { return err })() eng := engine.NewProve(ph.G(), &arg) uis := libkb.UIs{ ProveUI: ph.getProveUI(arg.SessionID), SecretUI: ph.getSecretUI(arg.SessionID, ph.G()), LogUI: ph.getLogUI(arg.SessionID), SessionID: arg.SessionID, } m := libkb.NewMetaContext(ctx, ph.G()).WithUIs(uis) if err = engine.RunEngine2(m, eng); err != nil { return res, err } res.SigID = eng.SigID() return res, err }
[ "func", "(", "ph", "*", "ProveHandler", ")", "StartProof", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "StartProofArg", ")", "(", "res", "keybase1", ".", "StartProofResult", ",", "err", "error", ")", "{", "ctx", "=", "libkb", ".", "WithLogTag", "(", "ctx", ",", "\"", "\"", ")", "\n", "defer", "ph", ".", "G", "(", ")", ".", "CTraceTimed", "(", "ctx", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "arg", ".", "Service", ",", "arg", ".", "Username", ")", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n", "eng", ":=", "engine", ".", "NewProve", "(", "ph", ".", "G", "(", ")", ",", "&", "arg", ")", "\n", "uis", ":=", "libkb", ".", "UIs", "{", "ProveUI", ":", "ph", ".", "getProveUI", "(", "arg", ".", "SessionID", ")", ",", "SecretUI", ":", "ph", ".", "getSecretUI", "(", "arg", ".", "SessionID", ",", "ph", ".", "G", "(", ")", ")", ",", "LogUI", ":", "ph", ".", "getLogUI", "(", "arg", ".", "SessionID", ")", ",", "SessionID", ":", "arg", ".", "SessionID", ",", "}", "\n", "m", ":=", "libkb", ".", "NewMetaContext", "(", "ctx", ",", "ph", ".", "G", "(", ")", ")", ".", "WithUIs", "(", "uis", ")", "\n", "if", "err", "=", "engine", ".", "RunEngine2", "(", "m", ",", "eng", ")", ";", "err", "!=", "nil", "{", "return", "res", ",", "err", "\n", "}", "\n", "res", ".", "SigID", "=", "eng", ".", "SigID", "(", ")", "\n", "return", "res", ",", "err", "\n", "}" ]
// Prove handles the `keybase.1.startProof` RPC.
[ "Prove", "handles", "the", "keybase", ".", "1", ".", "startProof", "RPC", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/prove.go#L77-L93
158,497
keybase/client
go/service/prove.go
CheckProof
func (ph *ProveHandler) CheckProof(ctx context.Context, arg keybase1.CheckProofArg) (res keybase1.CheckProofStatus, err error) { ctx = libkb.WithLogTag(ctx, "PV") defer ph.G().CTraceTimed(ctx, fmt.Sprintf("CheckProof: SigID: %v", arg.SigID), func() error { return err })() eng := engine.NewProveCheck(ph.G(), arg.SigID) m := libkb.NewMetaContext(ctx, ph.G()) if err = engine.RunEngine2(m, eng); err != nil { return res, err } found, status, state, text := eng.Results() return keybase1.CheckProofStatus{ Found: found, Status: status, State: state, ProofText: text, }, nil }
go
func (ph *ProveHandler) CheckProof(ctx context.Context, arg keybase1.CheckProofArg) (res keybase1.CheckProofStatus, err error) { ctx = libkb.WithLogTag(ctx, "PV") defer ph.G().CTraceTimed(ctx, fmt.Sprintf("CheckProof: SigID: %v", arg.SigID), func() error { return err })() eng := engine.NewProveCheck(ph.G(), arg.SigID) m := libkb.NewMetaContext(ctx, ph.G()) if err = engine.RunEngine2(m, eng); err != nil { return res, err } found, status, state, text := eng.Results() return keybase1.CheckProofStatus{ Found: found, Status: status, State: state, ProofText: text, }, nil }
[ "func", "(", "ph", "*", "ProveHandler", ")", "CheckProof", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "CheckProofArg", ")", "(", "res", "keybase1", ".", "CheckProofStatus", ",", "err", "error", ")", "{", "ctx", "=", "libkb", ".", "WithLogTag", "(", "ctx", ",", "\"", "\"", ")", "\n", "defer", "ph", ".", "G", "(", ")", ".", "CTraceTimed", "(", "ctx", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "arg", ".", "SigID", ")", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n", "eng", ":=", "engine", ".", "NewProveCheck", "(", "ph", ".", "G", "(", ")", ",", "arg", ".", "SigID", ")", "\n", "m", ":=", "libkb", ".", "NewMetaContext", "(", "ctx", ",", "ph", ".", "G", "(", ")", ")", "\n", "if", "err", "=", "engine", ".", "RunEngine2", "(", "m", ",", "eng", ")", ";", "err", "!=", "nil", "{", "return", "res", ",", "err", "\n", "}", "\n", "found", ",", "status", ",", "state", ",", "text", ":=", "eng", ".", "Results", "(", ")", "\n", "return", "keybase1", ".", "CheckProofStatus", "{", "Found", ":", "found", ",", "Status", ":", "status", ",", "State", ":", "state", ",", "ProofText", ":", "text", ",", "}", ",", "nil", "\n", "}" ]
// Prove handles the `keybase.1.checkProof` RPC.
[ "Prove", "handles", "the", "keybase", ".", "1", ".", "checkProof", "RPC", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/prove.go#L106-L121
158,498
keybase/client
go/service/prove.go
ListProofServices
func (ph *ProveHandler) ListProofServices(ctx context.Context) (res []string, err error) { ctx = libkb.WithLogTag(ctx, "PV") defer ph.G().CTraceTimed(ctx, fmt.Sprintf("ListProofServices"), func() error { return err })() mctx := libkb.NewMetaContext(ctx, ph.G()) return ph.G().GetProofServices().ListServicesThatAcceptNewProofs(mctx), nil }
go
func (ph *ProveHandler) ListProofServices(ctx context.Context) (res []string, err error) { ctx = libkb.WithLogTag(ctx, "PV") defer ph.G().CTraceTimed(ctx, fmt.Sprintf("ListProofServices"), func() error { return err })() mctx := libkb.NewMetaContext(ctx, ph.G()) return ph.G().GetProofServices().ListServicesThatAcceptNewProofs(mctx), nil }
[ "func", "(", "ph", "*", "ProveHandler", ")", "ListProofServices", "(", "ctx", "context", ".", "Context", ")", "(", "res", "[", "]", "string", ",", "err", "error", ")", "{", "ctx", "=", "libkb", ".", "WithLogTag", "(", "ctx", ",", "\"", "\"", ")", "\n", "defer", "ph", ".", "G", "(", ")", ".", "CTraceTimed", "(", "ctx", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ")", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n", "mctx", ":=", "libkb", ".", "NewMetaContext", "(", "ctx", ",", "ph", ".", "G", "(", ")", ")", "\n", "return", "ph", ".", "G", "(", ")", ".", "GetProofServices", "(", ")", ".", "ListServicesThatAcceptNewProofs", "(", "mctx", ")", ",", "nil", "\n", "}" ]
// Prove handles the `keybase.1.listProofServices` RPC.
[ "Prove", "handles", "the", "keybase", ".", "1", ".", "listProofServices", "RPC", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/prove.go#L124-L129
158,499
keybase/client
go/kbfs/libkbfs/conflict_renamer.go
ConflictRename
func (cr WriterDeviceDateConflictRenamer) ConflictRename( ctx context.Context, op op, original string) (string, error) { now := cr.config.Clock().Now() winfo := op.getWriterInfo() ui, err := cr.config.KeybaseService().LoadUserPlusKeys( ctx, winfo.uid, "", winfo.offline) if err != nil { return "", err } deviceName := ui.KIDNames[winfo.key.KID()] return cr.ConflictRenameHelper( now, string(ui.Name), deviceName, original), nil }
go
func (cr WriterDeviceDateConflictRenamer) ConflictRename( ctx context.Context, op op, original string) (string, error) { now := cr.config.Clock().Now() winfo := op.getWriterInfo() ui, err := cr.config.KeybaseService().LoadUserPlusKeys( ctx, winfo.uid, "", winfo.offline) if err != nil { return "", err } deviceName := ui.KIDNames[winfo.key.KID()] return cr.ConflictRenameHelper( now, string(ui.Name), deviceName, original), nil }
[ "func", "(", "cr", "WriterDeviceDateConflictRenamer", ")", "ConflictRename", "(", "ctx", "context", ".", "Context", ",", "op", "op", ",", "original", "string", ")", "(", "string", ",", "error", ")", "{", "now", ":=", "cr", ".", "config", ".", "Clock", "(", ")", ".", "Now", "(", ")", "\n", "winfo", ":=", "op", ".", "getWriterInfo", "(", ")", "\n", "ui", ",", "err", ":=", "cr", ".", "config", ".", "KeybaseService", "(", ")", ".", "LoadUserPlusKeys", "(", "ctx", ",", "winfo", ".", "uid", ",", "\"", "\"", ",", "winfo", ".", "offline", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n", "deviceName", ":=", "ui", ".", "KIDNames", "[", "winfo", ".", "key", ".", "KID", "(", ")", "]", "\n", "return", "cr", ".", "ConflictRenameHelper", "(", "now", ",", "string", "(", "ui", ".", "Name", ")", ",", "deviceName", ",", "original", ")", ",", "nil", "\n", "}" ]
// ConflictRename implements the ConflictRename interface for // TimeAndWriterConflictRenamer.
[ "ConflictRename", "implements", "the", "ConflictRename", "interface", "for", "TimeAndWriterConflictRenamer", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/conflict_renamer.go#L25-L37