id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
159,400 | keybase/client | go/kbfs/libkbfs/disk_block_cache_remote.go | DeleteUnmarked | func (dbcr *DiskBlockCacheRemote) DeleteUnmarked(
_ context.Context, _ tlf.ID, _ string, _ DiskBlockCacheType) error {
panic("DeleteUnmarked() not implemented in DiskBlockCacheRemote")
} | go | func (dbcr *DiskBlockCacheRemote) DeleteUnmarked(
_ context.Context, _ tlf.ID, _ string, _ DiskBlockCacheType) error {
panic("DeleteUnmarked() not implemented in DiskBlockCacheRemote")
} | [
"func",
"(",
"dbcr",
"*",
"DiskBlockCacheRemote",
")",
"DeleteUnmarked",
"(",
"_",
"context",
".",
"Context",
",",
"_",
"tlf",
".",
"ID",
",",
"_",
"string",
",",
"_",
"DiskBlockCacheType",
")",
"error",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // DeleteUnmarked implements the DiskBlockCache interface for
// DiskBlockCacheRemote. | [
"DeleteUnmarked",
"implements",
"the",
"DiskBlockCache",
"interface",
"for",
"DiskBlockCacheRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_block_cache_remote.go#L233-L236 |
159,401 | keybase/client | go/kbfs/libkbfs/disk_block_cache_remote.go | AddHomeTLF | func (dbcr *DiskBlockCacheRemote) AddHomeTLF(ctx context.Context,
tlfID tlf.ID) error {
// Let the local cache care about home TLFs.
return nil
} | go | func (dbcr *DiskBlockCacheRemote) AddHomeTLF(ctx context.Context,
tlfID tlf.ID) error {
// Let the local cache care about home TLFs.
return nil
} | [
"func",
"(",
"dbcr",
"*",
"DiskBlockCacheRemote",
")",
"AddHomeTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"error",
"{",
"// Let the local cache care about home TLFs.",
"return",
"nil",
"\n",
"}"
] | // AddHomeTLF implements the DiskBlockCache interface for DiskBlockCacheRemote. | [
"AddHomeTLF",
"implements",
"the",
"DiskBlockCache",
"interface",
"for",
"DiskBlockCacheRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_block_cache_remote.go#L239-L243 |
159,402 | keybase/client | go/kbfs/libkbfs/disk_block_cache_remote.go | GetTlfSize | func (dbcr *DiskBlockCacheRemote) GetTlfSize(
_ context.Context, _ tlf.ID, _ DiskBlockCacheType) (uint64, error) {
panic("GetTlfSize() not implemented in DiskBlockCacheRemote")
} | go | func (dbcr *DiskBlockCacheRemote) GetTlfSize(
_ context.Context, _ tlf.ID, _ DiskBlockCacheType) (uint64, error) {
panic("GetTlfSize() not implemented in DiskBlockCacheRemote")
} | [
"func",
"(",
"dbcr",
"*",
"DiskBlockCacheRemote",
")",
"GetTlfSize",
"(",
"_",
"context",
".",
"Context",
",",
"_",
"tlf",
".",
"ID",
",",
"_",
"DiskBlockCacheType",
")",
"(",
"uint64",
",",
"error",
")",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // GetTlfSize implements the DiskBlockCache interface for
// DiskBlockCacheRemote. | [
"GetTlfSize",
"implements",
"the",
"DiskBlockCache",
"interface",
"for",
"DiskBlockCacheRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_block_cache_remote.go#L254-L257 |
159,403 | keybase/client | go/kbfs/libkbfs/disk_block_cache_remote.go | GetTlfIDs | func (dbcr *DiskBlockCacheRemote) GetTlfIDs(
_ context.Context, _ DiskBlockCacheType) ([]tlf.ID, error) {
panic("GetTlfIDs() not implemented in DiskBlockCacheRemote")
} | go | func (dbcr *DiskBlockCacheRemote) GetTlfIDs(
_ context.Context, _ DiskBlockCacheType) ([]tlf.ID, error) {
panic("GetTlfIDs() not implemented in DiskBlockCacheRemote")
} | [
"func",
"(",
"dbcr",
"*",
"DiskBlockCacheRemote",
")",
"GetTlfIDs",
"(",
"_",
"context",
".",
"Context",
",",
"_",
"DiskBlockCacheType",
")",
"(",
"[",
"]",
"tlf",
".",
"ID",
",",
"error",
")",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // GetTlfIDs implements the DiskBlockCache interface for
// DiskBlockCacheRemote. | [
"GetTlfIDs",
"implements",
"the",
"DiskBlockCache",
"interface",
"for",
"DiskBlockCacheRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_block_cache_remote.go#L261-L264 |
159,404 | keybase/client | go/git/get.go | formatUniqueRepoID | func formatUniqueRepoID(teamID keybase1.TeamID, repoID keybase1.RepoID) string {
return string(teamID) + "_" + string(repoID)
} | go | func formatUniqueRepoID(teamID keybase1.TeamID, repoID keybase1.RepoID) string {
return string(teamID) + "_" + string(repoID)
} | [
"func",
"formatUniqueRepoID",
"(",
"teamID",
"keybase1",
".",
"TeamID",
",",
"repoID",
"keybase1",
".",
"RepoID",
")",
"string",
"{",
"return",
"string",
"(",
"teamID",
")",
"+",
"\"",
"\"",
"+",
"string",
"(",
"repoID",
")",
"\n",
"}"
] | // The GUI needs a way to refer to repos | [
"The",
"GUI",
"needs",
"a",
"way",
"to",
"refer",
"to",
"repos"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/git/get.go#L66-L68 |
159,405 | keybase/client | go/git/get.go | folderFromTeamID | func folderFromTeamID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, isImplicit bool) (keybase1.Folder, error) {
if isImplicit {
return folderFromTeamIDImplicit(ctx, g, teamID)
}
return folderFromTeamIDNamed(ctx, g, teamID)
} | go | func folderFromTeamID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, isImplicit bool) (keybase1.Folder, error) {
if isImplicit {
return folderFromTeamIDImplicit(ctx, g, teamID)
}
return folderFromTeamIDNamed(ctx, g, teamID)
} | [
"func",
"folderFromTeamID",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"isImplicit",
"bool",
")",
"(",
"keybase1",
".",
"Folder",
",",
"error",
")",
"{",
"if",
"isImplicit",
"{",
"return",
"folderFromTeamIDImplicit",
"(",
"ctx",
",",
"g",
",",
"teamID",
")",
"\n",
"}",
"\n",
"return",
"folderFromTeamIDNamed",
"(",
"ctx",
",",
"g",
",",
"teamID",
")",
"\n",
"}"
] | // Implicit teams need to be converted back into the folder that matches their
// display name. Regular teams become a regular team folder. | [
"Implicit",
"teams",
"need",
"to",
"be",
"converted",
"back",
"into",
"the",
"folder",
"that",
"matches",
"their",
"display",
"name",
".",
"Regular",
"teams",
"become",
"a",
"regular",
"team",
"folder",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/git/get.go#L72-L77 |
159,406 | keybase/client | go/git/get.go | folderFromTeamIDImplicit | func folderFromTeamIDImplicit(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID) (keybase1.Folder, error) {
team, err := teams.Load(ctx, g, keybase1.LoadTeamArg{
ID: teamID,
Public: teamID.IsPublic(),
})
if err != nil {
return keybase1.Folder{}, err
}
if !team.IsImplicit() {
return keybase1.Folder{}, fmt.Errorf("Expected an implicit team, but team load said otherwise (%s)", teamID)
}
// TODO: This function doesn't currently support conflict info.
name, err := team.ImplicitTeamDisplayNameString(ctx)
if err != nil {
return keybase1.Folder{}, err
}
var folderType keybase1.FolderType
if team.IsPublic() {
folderType = keybase1.FolderType_PUBLIC
} else {
folderType = keybase1.FolderType_PRIVATE
}
return keybase1.Folder{
Name: name,
FolderType: folderType,
Private: !team.IsPublic(),
}, nil
} | go | func folderFromTeamIDImplicit(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID) (keybase1.Folder, error) {
team, err := teams.Load(ctx, g, keybase1.LoadTeamArg{
ID: teamID,
Public: teamID.IsPublic(),
})
if err != nil {
return keybase1.Folder{}, err
}
if !team.IsImplicit() {
return keybase1.Folder{}, fmt.Errorf("Expected an implicit team, but team load said otherwise (%s)", teamID)
}
// TODO: This function doesn't currently support conflict info.
name, err := team.ImplicitTeamDisplayNameString(ctx)
if err != nil {
return keybase1.Folder{}, err
}
var folderType keybase1.FolderType
if team.IsPublic() {
folderType = keybase1.FolderType_PUBLIC
} else {
folderType = keybase1.FolderType_PRIVATE
}
return keybase1.Folder{
Name: name,
FolderType: folderType,
Private: !team.IsPublic(),
}, nil
} | [
"func",
"folderFromTeamIDImplicit",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"(",
"keybase1",
".",
"Folder",
",",
"error",
")",
"{",
"team",
",",
"err",
":=",
"teams",
".",
"Load",
"(",
"ctx",
",",
"g",
",",
"keybase1",
".",
"LoadTeamArg",
"{",
"ID",
":",
"teamID",
",",
"Public",
":",
"teamID",
".",
"IsPublic",
"(",
")",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"Folder",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"if",
"!",
"team",
".",
"IsImplicit",
"(",
")",
"{",
"return",
"keybase1",
".",
"Folder",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"teamID",
")",
"\n",
"}",
"\n\n",
"// TODO: This function doesn't currently support conflict info.",
"name",
",",
"err",
":=",
"team",
".",
"ImplicitTeamDisplayNameString",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"Folder",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"var",
"folderType",
"keybase1",
".",
"FolderType",
"\n",
"if",
"team",
".",
"IsPublic",
"(",
")",
"{",
"folderType",
"=",
"keybase1",
".",
"FolderType_PUBLIC",
"\n",
"}",
"else",
"{",
"folderType",
"=",
"keybase1",
".",
"FolderType_PRIVATE",
"\n",
"}",
"\n",
"return",
"keybase1",
".",
"Folder",
"{",
"Name",
":",
"name",
",",
"FolderType",
":",
"folderType",
",",
"Private",
":",
"!",
"team",
".",
"IsPublic",
"(",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] | // folderFromTeamIDImplicit converts from a teamID for implicit teams | [
"folderFromTeamIDImplicit",
"converts",
"from",
"a",
"teamID",
"for",
"implicit",
"teams"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/git/get.go#L92-L121 |
159,407 | keybase/client | go/git/get.go | getMetadataInner | func getMetadataInner(ctx context.Context, g *libkb.GlobalContext, folder *keybase1.Folder) ([]keybase1.GitRepoResult, error) {
mctx := libkb.NewMetaContext(ctx, g)
teamer := NewTeamer(g)
apiArg := libkb.APIArg{
Endpoint: "kbfs/git/team/get",
SessionType: libkb.APISessionTypeREQUIRED,
Args: libkb.HTTPArgs{}, // a limit parameter exists, default 100, and we don't currently set it
}
// The team_id parameter is optional. Add it in if the caller supplied it.
if folder != nil {
teamIDVis, err := teamer.LookupOrCreate(ctx, *folder)
if err != nil {
return nil, err
}
apiArg.Args["team_id"] = libkb.S{Val: string(teamIDVis.TeamID)}
}
var serverResponse ServerResponse
err := mctx.G().GetAPI().GetDecode(mctx, apiArg, &serverResponse)
if err != nil {
return nil, err
}
// Unbox the repos in parallel
repoCh := make(chan ServerResponseRepo)
eg, ctx := errgroup.WithContext(ctx)
eg.Go(func() error {
defer close(repoCh)
for _, responseRepo := range serverResponse.Repos {
select {
case repoCh <- responseRepo:
case <-ctx.Done():
return ctx.Err()
}
}
return nil
})
// Initializing the results list to non-nil means that we end up seeing
// "[]" instead of "null" in the final JSON output on the CLI, which is
// preferable.
resultList := []keybase1.GitRepoResult{}
var resLock sync.Mutex
var firstErr error
var anySuccess bool
numUnboxThreads := 2
for i := 0; i < numUnboxThreads; i++ {
eg.Go(func() error {
for responseRepo := range repoCh {
info, skip, err := getMetadataInnerSingle(ctx, g, folder, responseRepo)
resLock.Lock()
if err != nil {
if firstErr == nil {
firstErr = err
}
mctx.Debug("git.getMetadataInner error (team:%v, repo:%v): %v", responseRepo.TeamID, responseRepo.RepoID, err)
resultList = append(resultList, keybase1.NewGitRepoResultWithErr(err.Error()))
} else {
if !skip {
anySuccess = true
resultList = append(resultList, keybase1.NewGitRepoResultWithOk(*info))
}
}
resLock.Unlock()
}
return nil
})
}
if err := eg.Wait(); err != nil {
return resultList, err
}
sort.Sort(ByRepoMtime(resultList))
// If there were no repos, return ok
// If all repos failed, return the first error (something is probably wrong that's not repo-specific)
// If no repos failed, return ok
if len(resultList) == 0 {
return resultList, nil
}
if !anySuccess {
return resultList, firstErr
}
return resultList, nil
} | go | func getMetadataInner(ctx context.Context, g *libkb.GlobalContext, folder *keybase1.Folder) ([]keybase1.GitRepoResult, error) {
mctx := libkb.NewMetaContext(ctx, g)
teamer := NewTeamer(g)
apiArg := libkb.APIArg{
Endpoint: "kbfs/git/team/get",
SessionType: libkb.APISessionTypeREQUIRED,
Args: libkb.HTTPArgs{}, // a limit parameter exists, default 100, and we don't currently set it
}
// The team_id parameter is optional. Add it in if the caller supplied it.
if folder != nil {
teamIDVis, err := teamer.LookupOrCreate(ctx, *folder)
if err != nil {
return nil, err
}
apiArg.Args["team_id"] = libkb.S{Val: string(teamIDVis.TeamID)}
}
var serverResponse ServerResponse
err := mctx.G().GetAPI().GetDecode(mctx, apiArg, &serverResponse)
if err != nil {
return nil, err
}
// Unbox the repos in parallel
repoCh := make(chan ServerResponseRepo)
eg, ctx := errgroup.WithContext(ctx)
eg.Go(func() error {
defer close(repoCh)
for _, responseRepo := range serverResponse.Repos {
select {
case repoCh <- responseRepo:
case <-ctx.Done():
return ctx.Err()
}
}
return nil
})
// Initializing the results list to non-nil means that we end up seeing
// "[]" instead of "null" in the final JSON output on the CLI, which is
// preferable.
resultList := []keybase1.GitRepoResult{}
var resLock sync.Mutex
var firstErr error
var anySuccess bool
numUnboxThreads := 2
for i := 0; i < numUnboxThreads; i++ {
eg.Go(func() error {
for responseRepo := range repoCh {
info, skip, err := getMetadataInnerSingle(ctx, g, folder, responseRepo)
resLock.Lock()
if err != nil {
if firstErr == nil {
firstErr = err
}
mctx.Debug("git.getMetadataInner error (team:%v, repo:%v): %v", responseRepo.TeamID, responseRepo.RepoID, err)
resultList = append(resultList, keybase1.NewGitRepoResultWithErr(err.Error()))
} else {
if !skip {
anySuccess = true
resultList = append(resultList, keybase1.NewGitRepoResultWithOk(*info))
}
}
resLock.Unlock()
}
return nil
})
}
if err := eg.Wait(); err != nil {
return resultList, err
}
sort.Sort(ByRepoMtime(resultList))
// If there were no repos, return ok
// If all repos failed, return the first error (something is probably wrong that's not repo-specific)
// If no repos failed, return ok
if len(resultList) == 0 {
return resultList, nil
}
if !anySuccess {
return resultList, firstErr
}
return resultList, nil
} | [
"func",
"getMetadataInner",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"folder",
"*",
"keybase1",
".",
"Folder",
")",
"(",
"[",
"]",
"keybase1",
".",
"GitRepoResult",
",",
"error",
")",
"{",
"mctx",
":=",
"libkb",
".",
"NewMetaContext",
"(",
"ctx",
",",
"g",
")",
"\n",
"teamer",
":=",
"NewTeamer",
"(",
"g",
")",
"\n\n",
"apiArg",
":=",
"libkb",
".",
"APIArg",
"{",
"Endpoint",
":",
"\"",
"\"",
",",
"SessionType",
":",
"libkb",
".",
"APISessionTypeREQUIRED",
",",
"Args",
":",
"libkb",
".",
"HTTPArgs",
"{",
"}",
",",
"// a limit parameter exists, default 100, and we don't currently set it",
"}",
"\n\n",
"// The team_id parameter is optional. Add it in if the caller supplied it.",
"if",
"folder",
"!=",
"nil",
"{",
"teamIDVis",
",",
"err",
":=",
"teamer",
".",
"LookupOrCreate",
"(",
"ctx",
",",
"*",
"folder",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"apiArg",
".",
"Args",
"[",
"\"",
"\"",
"]",
"=",
"libkb",
".",
"S",
"{",
"Val",
":",
"string",
"(",
"teamIDVis",
".",
"TeamID",
")",
"}",
"\n",
"}",
"\n",
"var",
"serverResponse",
"ServerResponse",
"\n",
"err",
":=",
"mctx",
".",
"G",
"(",
")",
".",
"GetAPI",
"(",
")",
".",
"GetDecode",
"(",
"mctx",
",",
"apiArg",
",",
"&",
"serverResponse",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Unbox the repos in parallel",
"repoCh",
":=",
"make",
"(",
"chan",
"ServerResponseRepo",
")",
"\n",
"eg",
",",
"ctx",
":=",
"errgroup",
".",
"WithContext",
"(",
"ctx",
")",
"\n",
"eg",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"defer",
"close",
"(",
"repoCh",
")",
"\n",
"for",
"_",
",",
"responseRepo",
":=",
"range",
"serverResponse",
".",
"Repos",
"{",
"select",
"{",
"case",
"repoCh",
"<-",
"responseRepo",
":",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"ctx",
".",
"Err",
"(",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
")",
"\n\n",
"// Initializing the results list to non-nil means that we end up seeing",
"// \"[]\" instead of \"null\" in the final JSON output on the CLI, which is",
"// preferable.",
"resultList",
":=",
"[",
"]",
"keybase1",
".",
"GitRepoResult",
"{",
"}",
"\n",
"var",
"resLock",
"sync",
".",
"Mutex",
"\n",
"var",
"firstErr",
"error",
"\n",
"var",
"anySuccess",
"bool",
"\n",
"numUnboxThreads",
":=",
"2",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"numUnboxThreads",
";",
"i",
"++",
"{",
"eg",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"for",
"responseRepo",
":=",
"range",
"repoCh",
"{",
"info",
",",
"skip",
",",
"err",
":=",
"getMetadataInnerSingle",
"(",
"ctx",
",",
"g",
",",
"folder",
",",
"responseRepo",
")",
"\n\n",
"resLock",
".",
"Lock",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"firstErr",
"==",
"nil",
"{",
"firstErr",
"=",
"err",
"\n",
"}",
"\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"responseRepo",
".",
"TeamID",
",",
"responseRepo",
".",
"RepoID",
",",
"err",
")",
"\n",
"resultList",
"=",
"append",
"(",
"resultList",
",",
"keybase1",
".",
"NewGitRepoResultWithErr",
"(",
"err",
".",
"Error",
"(",
")",
")",
")",
"\n",
"}",
"else",
"{",
"if",
"!",
"skip",
"{",
"anySuccess",
"=",
"true",
"\n",
"resultList",
"=",
"append",
"(",
"resultList",
",",
"keybase1",
".",
"NewGitRepoResultWithOk",
"(",
"*",
"info",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"resLock",
".",
"Unlock",
"(",
")",
"\n\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"eg",
".",
"Wait",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"resultList",
",",
"err",
"\n",
"}",
"\n",
"sort",
".",
"Sort",
"(",
"ByRepoMtime",
"(",
"resultList",
")",
")",
"\n\n",
"// If there were no repos, return ok",
"// If all repos failed, return the first error (something is probably wrong that's not repo-specific)",
"// If no repos failed, return ok",
"if",
"len",
"(",
"resultList",
")",
"==",
"0",
"{",
"return",
"resultList",
",",
"nil",
"\n",
"}",
"\n",
"if",
"!",
"anySuccess",
"{",
"return",
"resultList",
",",
"firstErr",
"\n",
"}",
"\n",
"return",
"resultList",
",",
"nil",
"\n",
"}"
] | // If folder is nil, get for all folders. | [
"If",
"folder",
"is",
"nil",
"get",
"for",
"all",
"folders",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/git/get.go#L124-L210 |
159,408 | keybase/client | go/libkb/gpg_cli.go | CanExec | func (g *GpgCLI) CanExec() (bool, error) {
err := g.Configure()
if IsExecError(err) {
return false, nil
}
if err != nil {
return false, err
}
return true, nil
} | go | func (g *GpgCLI) CanExec() (bool, error) {
err := g.Configure()
if IsExecError(err) {
return false, nil
}
if err != nil {
return false, err
}
return true, nil
} | [
"func",
"(",
"g",
"*",
"GpgCLI",
")",
"CanExec",
"(",
")",
"(",
"bool",
",",
"error",
")",
"{",
"err",
":=",
"g",
".",
"Configure",
"(",
")",
"\n",
"if",
"IsExecError",
"(",
"err",
")",
"{",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}"
] | // CanExec returns true if a gpg executable exists. | [
"CanExec",
"returns",
"true",
"if",
"a",
"gpg",
"executable",
"exists",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/gpg_cli.go#L75-L84 |
159,409 | keybase/client | go/minterm/minterm_windows.go | getReadWriter | func (m *MinTerm) getReadWriter() io.ReadWriter {
return WindowsReadWriter{r: m.termIn, w: logger.OutputWriterFromFile(m.termOut)}
} | go | func (m *MinTerm) getReadWriter() io.ReadWriter {
return WindowsReadWriter{r: m.termIn, w: logger.OutputWriterFromFile(m.termOut)}
} | [
"func",
"(",
"m",
"*",
"MinTerm",
")",
"getReadWriter",
"(",
")",
"io",
".",
"ReadWriter",
"{",
"return",
"WindowsReadWriter",
"{",
"r",
":",
"m",
".",
"termIn",
",",
"w",
":",
"logger",
".",
"OutputWriterFromFile",
"(",
"m",
".",
"termOut",
")",
"}",
"\n",
"}"
] | // Use a Windows output writer to eat control codes that look ugly on legacy terminals.
// As a bonus, we can do color prompts this way. | [
"Use",
"a",
"Windows",
"output",
"writer",
"to",
"eat",
"control",
"codes",
"that",
"look",
"ugly",
"on",
"legacy",
"terminals",
".",
"As",
"a",
"bonus",
"we",
"can",
"do",
"color",
"prompts",
"this",
"way",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/minterm/minterm_windows.go#L57-L59 |
159,410 | keybase/client | go/libkb/per_user_key.go | derivePrevKey | func (s *PerUserKeySeed) derivePrevKey() (res NaclSecretBoxKey, err error) {
return s.DeriveSymmetricKey(DeriveReasonPUKPrev)
} | go | func (s *PerUserKeySeed) derivePrevKey() (res NaclSecretBoxKey, err error) {
return s.DeriveSymmetricKey(DeriveReasonPUKPrev)
} | [
"func",
"(",
"s",
"*",
"PerUserKeySeed",
")",
"derivePrevKey",
"(",
")",
"(",
"res",
"NaclSecretBoxKey",
",",
"err",
"error",
")",
"{",
"return",
"s",
".",
"DeriveSymmetricKey",
"(",
"DeriveReasonPUKPrev",
")",
"\n",
"}"
] | // derivePrevKey derives the symmetric key used to secretbox the previous generation seed. | [
"derivePrevKey",
"derives",
"the",
"symmetric",
"key",
"used",
"to",
"secretbox",
"the",
"previous",
"generation",
"seed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L52-L54 |
159,411 | keybase/client | go/libkb/per_user_key.go | openPerUserKeyPrev | func openPerUserKeyPrev(sbox PerUserKeyPrev, symmetricKey NaclSecretBoxKey) (PerUserKeySeed, error) {
var res PerUserKeySeed
// decode b64
msgpacked, err := base64.StdEncoding.DecodeString(string(sbox))
if err != nil {
return res, err
}
// decode msgpack
mh := codec.MsgpackHandle{WriteExt: true}
dec := codec.NewDecoderBytes(msgpacked, &mh)
var parts struct {
Version int
Nonce []byte
Sealed []byte
}
err = dec.Decode(&parts)
if err != nil {
return res, err
}
// check parts
if parts.Version != 1 {
return res, fmt.Errorf("per user key secret box version %v != 1", parts.Version)
}
if len(parts.Nonce) != NaclDHNonceSize {
return res, fmt.Errorf("per user key secret box nonce length %v != %v",
len(parts.Nonce), NaclDHNonceSize)
}
var nonce [NaclDHNonceSize]byte
copy(nonce[:], parts.Nonce)
expectedSealedLength := PerUserKeySeedSize + secretbox.Overhead
if len(parts.Sealed) != expectedSealedLength {
return res, fmt.Errorf("per user key secret box sealed length %v != %v", len(parts.Sealed), expectedSealedLength)
}
// open secretbox
var symmetricKey2 [NaclSecretBoxKeySize]byte = symmetricKey
contents, ok := secretbox.Open(nil, parts.Sealed, &nonce, &symmetricKey2)
if !ok {
return res, errors.New("per user key secret box open failed")
}
if len(contents) != PerUserKeySeedSize {
return res, fmt.Errorf("per user key seed length %v != %v", len(contents), PerUserKeySeedSize)
}
return MakeByte32(contents), nil
} | go | func openPerUserKeyPrev(sbox PerUserKeyPrev, symmetricKey NaclSecretBoxKey) (PerUserKeySeed, error) {
var res PerUserKeySeed
// decode b64
msgpacked, err := base64.StdEncoding.DecodeString(string(sbox))
if err != nil {
return res, err
}
// decode msgpack
mh := codec.MsgpackHandle{WriteExt: true}
dec := codec.NewDecoderBytes(msgpacked, &mh)
var parts struct {
Version int
Nonce []byte
Sealed []byte
}
err = dec.Decode(&parts)
if err != nil {
return res, err
}
// check parts
if parts.Version != 1 {
return res, fmt.Errorf("per user key secret box version %v != 1", parts.Version)
}
if len(parts.Nonce) != NaclDHNonceSize {
return res, fmt.Errorf("per user key secret box nonce length %v != %v",
len(parts.Nonce), NaclDHNonceSize)
}
var nonce [NaclDHNonceSize]byte
copy(nonce[:], parts.Nonce)
expectedSealedLength := PerUserKeySeedSize + secretbox.Overhead
if len(parts.Sealed) != expectedSealedLength {
return res, fmt.Errorf("per user key secret box sealed length %v != %v", len(parts.Sealed), expectedSealedLength)
}
// open secretbox
var symmetricKey2 [NaclSecretBoxKeySize]byte = symmetricKey
contents, ok := secretbox.Open(nil, parts.Sealed, &nonce, &symmetricKey2)
if !ok {
return res, errors.New("per user key secret box open failed")
}
if len(contents) != PerUserKeySeedSize {
return res, fmt.Errorf("per user key seed length %v != %v", len(contents), PerUserKeySeedSize)
}
return MakeByte32(contents), nil
} | [
"func",
"openPerUserKeyPrev",
"(",
"sbox",
"PerUserKeyPrev",
",",
"symmetricKey",
"NaclSecretBoxKey",
")",
"(",
"PerUserKeySeed",
",",
"error",
")",
"{",
"var",
"res",
"PerUserKeySeed",
"\n\n",
"// decode b64",
"msgpacked",
",",
"err",
":=",
"base64",
".",
"StdEncoding",
".",
"DecodeString",
"(",
"string",
"(",
"sbox",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"// decode msgpack",
"mh",
":=",
"codec",
".",
"MsgpackHandle",
"{",
"WriteExt",
":",
"true",
"}",
"\n",
"dec",
":=",
"codec",
".",
"NewDecoderBytes",
"(",
"msgpacked",
",",
"&",
"mh",
")",
"\n",
"var",
"parts",
"struct",
"{",
"Version",
"int",
"\n",
"Nonce",
"[",
"]",
"byte",
"\n",
"Sealed",
"[",
"]",
"byte",
"\n",
"}",
"\n",
"err",
"=",
"dec",
".",
"Decode",
"(",
"&",
"parts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"// check parts",
"if",
"parts",
".",
"Version",
"!=",
"1",
"{",
"return",
"res",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"parts",
".",
"Version",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"parts",
".",
"Nonce",
")",
"!=",
"NaclDHNonceSize",
"{",
"return",
"res",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"parts",
".",
"Nonce",
")",
",",
"NaclDHNonceSize",
")",
"\n",
"}",
"\n",
"var",
"nonce",
"[",
"NaclDHNonceSize",
"]",
"byte",
"\n",
"copy",
"(",
"nonce",
"[",
":",
"]",
",",
"parts",
".",
"Nonce",
")",
"\n\n",
"expectedSealedLength",
":=",
"PerUserKeySeedSize",
"+",
"secretbox",
".",
"Overhead",
"\n",
"if",
"len",
"(",
"parts",
".",
"Sealed",
")",
"!=",
"expectedSealedLength",
"{",
"return",
"res",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"parts",
".",
"Sealed",
")",
",",
"expectedSealedLength",
")",
"\n",
"}",
"\n\n",
"// open secretbox",
"var",
"symmetricKey2",
"[",
"NaclSecretBoxKeySize",
"]",
"byte",
"=",
"symmetricKey",
"\n",
"contents",
",",
"ok",
":=",
"secretbox",
".",
"Open",
"(",
"nil",
",",
"parts",
".",
"Sealed",
",",
"&",
"nonce",
",",
"&",
"symmetricKey2",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"res",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"contents",
")",
"!=",
"PerUserKeySeedSize",
"{",
"return",
"res",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"contents",
")",
",",
"PerUserKeySeedSize",
")",
"\n",
"}",
"\n",
"return",
"MakeByte32",
"(",
"contents",
")",
",",
"nil",
"\n",
"}"
] | // Opens the output of NewPerUserKeyPrev | [
"Opens",
"the",
"output",
"of",
"NewPerUserKeyPrev"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L116-L165 |
159,412 | keybase/client | go/libkb/per_user_key.go | NewPerUserKeyring | func NewPerUserKeyring(g *GlobalContext, uid keybase1.UID) (*PerUserKeyring, error) {
if uid.IsNil() {
return nil, fmt.Errorf("NewPerUserKeyring called with nil uid")
}
return &PerUserKeyring{
Contextified: NewContextified(g),
uid: uid,
generations: make(perUserKeyMap),
seqgen: make(perUserKeySeqGenMap),
}, nil
} | go | func NewPerUserKeyring(g *GlobalContext, uid keybase1.UID) (*PerUserKeyring, error) {
if uid.IsNil() {
return nil, fmt.Errorf("NewPerUserKeyring called with nil uid")
}
return &PerUserKeyring{
Contextified: NewContextified(g),
uid: uid,
generations: make(perUserKeyMap),
seqgen: make(perUserKeySeqGenMap),
}, nil
} | [
"func",
"NewPerUserKeyring",
"(",
"g",
"*",
"GlobalContext",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"*",
"PerUserKeyring",
",",
"error",
")",
"{",
"if",
"uid",
".",
"IsNil",
"(",
")",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"&",
"PerUserKeyring",
"{",
"Contextified",
":",
"NewContextified",
"(",
"g",
")",
",",
"uid",
":",
"uid",
",",
"generations",
":",
"make",
"(",
"perUserKeyMap",
")",
",",
"seqgen",
":",
"make",
"(",
"perUserKeySeqGenMap",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewPerUserKeyring makes a new per-user-key keyring for a given UID. | [
"NewPerUserKeyring",
"makes",
"a",
"new",
"per",
"-",
"user",
"-",
"key",
"keyring",
"for",
"a",
"given",
"UID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L188-L198 |
159,413 | keybase/client | go/libkb/per_user_key.go | PrepareBoxForNewDevice | func (s *PerUserKeyring) PrepareBoxForNewDevice(m MetaContext, receiverKey NaclDHKeyPair,
senderKey NaclDHKeyPair) (box keybase1.PerUserKeyBox, err error) {
s.Lock()
defer s.Unlock()
gen := s.currentGenerationLocked()
if gen < 1 {
return box, errors.New("PerUserKeyring#PrepareBoxForNewDevice no keys loaded")
}
full, ok := s.generations[gen]
if !ok {
return box, errors.New("PerUserKeyring#PrepareBoxForNewDevice missing entry for current generation")
}
box, err = NewPerUserKeyBox(full.seed, receiverKey, senderKey, gen)
return box, err
} | go | func (s *PerUserKeyring) PrepareBoxForNewDevice(m MetaContext, receiverKey NaclDHKeyPair,
senderKey NaclDHKeyPair) (box keybase1.PerUserKeyBox, err error) {
s.Lock()
defer s.Unlock()
gen := s.currentGenerationLocked()
if gen < 1 {
return box, errors.New("PerUserKeyring#PrepareBoxForNewDevice no keys loaded")
}
full, ok := s.generations[gen]
if !ok {
return box, errors.New("PerUserKeyring#PrepareBoxForNewDevice missing entry for current generation")
}
box, err = NewPerUserKeyBox(full.seed, receiverKey, senderKey, gen)
return box, err
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"PrepareBoxForNewDevice",
"(",
"m",
"MetaContext",
",",
"receiverKey",
"NaclDHKeyPair",
",",
"senderKey",
"NaclDHKeyPair",
")",
"(",
"box",
"keybase1",
".",
"PerUserKeyBox",
",",
"err",
"error",
")",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"gen",
":=",
"s",
".",
"currentGenerationLocked",
"(",
")",
"\n",
"if",
"gen",
"<",
"1",
"{",
"return",
"box",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"full",
",",
"ok",
":=",
"s",
".",
"generations",
"[",
"gen",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"box",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"box",
",",
"err",
"=",
"NewPerUserKeyBox",
"(",
"full",
".",
"seed",
",",
"receiverKey",
",",
"senderKey",
",",
"gen",
")",
"\n",
"return",
"box",
",",
"err",
"\n",
"}"
] | // PrepareBoxForNewDevice encrypts the latest shared key seed for a new device.
// The returned box should be pushed to the server. | [
"PrepareBoxForNewDevice",
"encrypts",
"the",
"latest",
"shared",
"key",
"seed",
"for",
"a",
"new",
"device",
".",
"The",
"returned",
"box",
"should",
"be",
"pushed",
"to",
"the",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L206-L221 |
159,414 | keybase/client | go/libkb/per_user_key.go | PrepareBoxesForDevices | func (s *PerUserKeyring) PrepareBoxesForDevices(m MetaContext, contents PerUserKeySeed,
generation keybase1.PerUserKeyGeneration, receiverKeys []NaclDHKeyPair,
senderKey GenericKey) (boxes []keybase1.PerUserKeyBox, err error) {
// Do not lock self because we do not use self.
if contents.IsBlank() {
return nil, errors.New("attempt to box blank per-user-key")
}
senderKeyDH, ok := senderKey.(NaclDHKeyPair)
if !ok {
return nil, fmt.Errorf("Unexpected encryption key type: %T", senderKey)
}
for _, receiverKey := range receiverKeys {
box, err := NewPerUserKeyBox(contents, receiverKey, senderKeyDH, generation)
if err != nil {
return nil, err
}
boxes = append(boxes, box)
}
return boxes, nil
} | go | func (s *PerUserKeyring) PrepareBoxesForDevices(m MetaContext, contents PerUserKeySeed,
generation keybase1.PerUserKeyGeneration, receiverKeys []NaclDHKeyPair,
senderKey GenericKey) (boxes []keybase1.PerUserKeyBox, err error) {
// Do not lock self because we do not use self.
if contents.IsBlank() {
return nil, errors.New("attempt to box blank per-user-key")
}
senderKeyDH, ok := senderKey.(NaclDHKeyPair)
if !ok {
return nil, fmt.Errorf("Unexpected encryption key type: %T", senderKey)
}
for _, receiverKey := range receiverKeys {
box, err := NewPerUserKeyBox(contents, receiverKey, senderKeyDH, generation)
if err != nil {
return nil, err
}
boxes = append(boxes, box)
}
return boxes, nil
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"PrepareBoxesForDevices",
"(",
"m",
"MetaContext",
",",
"contents",
"PerUserKeySeed",
",",
"generation",
"keybase1",
".",
"PerUserKeyGeneration",
",",
"receiverKeys",
"[",
"]",
"NaclDHKeyPair",
",",
"senderKey",
"GenericKey",
")",
"(",
"boxes",
"[",
"]",
"keybase1",
".",
"PerUserKeyBox",
",",
"err",
"error",
")",
"{",
"// Do not lock self because we do not use self.",
"if",
"contents",
".",
"IsBlank",
"(",
")",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"senderKeyDH",
",",
"ok",
":=",
"senderKey",
".",
"(",
"NaclDHKeyPair",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"senderKey",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"receiverKey",
":=",
"range",
"receiverKeys",
"{",
"box",
",",
"err",
":=",
"NewPerUserKeyBox",
"(",
"contents",
",",
"receiverKey",
",",
"senderKeyDH",
",",
"generation",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"boxes",
"=",
"append",
"(",
"boxes",
",",
"box",
")",
"\n",
"}",
"\n",
"return",
"boxes",
",",
"nil",
"\n",
"}"
] | // Encrypt seed for receiverKeys. Use senderKey to encrypt.
// Does not use the keyring at all. Attached for organizational purposes.
// Used when creating a new seed. | [
"Encrypt",
"seed",
"for",
"receiverKeys",
".",
"Use",
"senderKey",
"to",
"encrypt",
".",
"Does",
"not",
"use",
"the",
"keyring",
"at",
"all",
".",
"Attached",
"for",
"organizational",
"purposes",
".",
"Used",
"when",
"creating",
"a",
"new",
"seed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L226-L248 |
159,415 | keybase/client | go/libkb/per_user_key.go | PreparePrev | func (s *PerUserKeyring) PreparePrev(m MetaContext, newSeed PerUserKeySeed,
newGeneration keybase1.PerUserKeyGeneration) (PerUserKeyPrev, error) {
s.Lock()
defer s.Unlock()
if newSeed.IsBlank() {
return "", errors.New("attempt to prev with blank per-user-key")
}
currentGen := s.currentGenerationLocked()
if currentGen == 0 {
return "", errors.New("attempt to prepare per-user-key prev with no keys")
}
if currentGen != newGeneration-1 {
return "", fmt.Errorf("incompatible prev generations %v != %v-1", currentGen, newGeneration)
}
symmetricKey, err := newSeed.derivePrevKey()
if err != nil {
return "", err
}
contents := s.generations[currentGen].seed
return newPerUserKeyPrev(contents, symmetricKey)
} | go | func (s *PerUserKeyring) PreparePrev(m MetaContext, newSeed PerUserKeySeed,
newGeneration keybase1.PerUserKeyGeneration) (PerUserKeyPrev, error) {
s.Lock()
defer s.Unlock()
if newSeed.IsBlank() {
return "", errors.New("attempt to prev with blank per-user-key")
}
currentGen := s.currentGenerationLocked()
if currentGen == 0 {
return "", errors.New("attempt to prepare per-user-key prev with no keys")
}
if currentGen != newGeneration-1 {
return "", fmt.Errorf("incompatible prev generations %v != %v-1", currentGen, newGeneration)
}
symmetricKey, err := newSeed.derivePrevKey()
if err != nil {
return "", err
}
contents := s.generations[currentGen].seed
return newPerUserKeyPrev(contents, symmetricKey)
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"PreparePrev",
"(",
"m",
"MetaContext",
",",
"newSeed",
"PerUserKeySeed",
",",
"newGeneration",
"keybase1",
".",
"PerUserKeyGeneration",
")",
"(",
"PerUserKeyPrev",
",",
"error",
")",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"newSeed",
".",
"IsBlank",
"(",
")",
"{",
"return",
"\"",
"\"",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"currentGen",
":=",
"s",
".",
"currentGenerationLocked",
"(",
")",
"\n",
"if",
"currentGen",
"==",
"0",
"{",
"return",
"\"",
"\"",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"currentGen",
"!=",
"newGeneration",
"-",
"1",
"{",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"currentGen",
",",
"newGeneration",
")",
"\n",
"}",
"\n\n",
"symmetricKey",
",",
"err",
":=",
"newSeed",
".",
"derivePrevKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"contents",
":=",
"s",
".",
"generations",
"[",
"currentGen",
"]",
".",
"seed",
"\n\n",
"return",
"newPerUserKeyPrev",
"(",
"contents",
",",
"symmetricKey",
")",
"\n",
"}"
] | // Prepares a prev secretbox containing generation n-1 encrypted for generation n.
// Asserts that the current generation is n-1.
// The `generation` parameter is n. | [
"Prepares",
"a",
"prev",
"secretbox",
"containing",
"generation",
"n",
"-",
"1",
"encrypted",
"for",
"generation",
"n",
".",
"Asserts",
"that",
"the",
"current",
"generation",
"is",
"n",
"-",
"1",
".",
"The",
"generation",
"parameter",
"is",
"n",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L253-L278 |
159,416 | keybase/client | go/libkb/per_user_key.go | AddKey | func (s *PerUserKeyring) AddKey(m MetaContext, generation keybase1.PerUserKeyGeneration,
seqno keybase1.Seqno, seed PerUserKeySeed) error {
s.Lock()
defer s.Unlock()
m.Debug("PerUserKeyring#AddKey(generation: %v, seqno:%v)", generation, seqno)
if seed.IsBlank() {
return errors.New("attempt to add blank per-user-key")
}
currentGen := s.currentGenerationLocked()
if generation != currentGen+1 {
return fmt.Errorf("cannot add key for non-next generation: %v != %v+1",
generation, currentGen)
}
_, exists := s.generations[generation]
if exists {
return fmt.Errorf("AddKey duplicate for generation: %v", generation)
}
expanded, err := expandPerUserKey(seed)
if err != nil {
return err
}
s.generations[generation] = expanded.lower()
s.seqgen[seqno] = generation
return nil
} | go | func (s *PerUserKeyring) AddKey(m MetaContext, generation keybase1.PerUserKeyGeneration,
seqno keybase1.Seqno, seed PerUserKeySeed) error {
s.Lock()
defer s.Unlock()
m.Debug("PerUserKeyring#AddKey(generation: %v, seqno:%v)", generation, seqno)
if seed.IsBlank() {
return errors.New("attempt to add blank per-user-key")
}
currentGen := s.currentGenerationLocked()
if generation != currentGen+1 {
return fmt.Errorf("cannot add key for non-next generation: %v != %v+1",
generation, currentGen)
}
_, exists := s.generations[generation]
if exists {
return fmt.Errorf("AddKey duplicate for generation: %v", generation)
}
expanded, err := expandPerUserKey(seed)
if err != nil {
return err
}
s.generations[generation] = expanded.lower()
s.seqgen[seqno] = generation
return nil
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"AddKey",
"(",
"m",
"MetaContext",
",",
"generation",
"keybase1",
".",
"PerUserKeyGeneration",
",",
"seqno",
"keybase1",
".",
"Seqno",
",",
"seed",
"PerUserKeySeed",
")",
"error",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"generation",
",",
"seqno",
")",
"\n\n",
"if",
"seed",
".",
"IsBlank",
"(",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"currentGen",
":=",
"s",
".",
"currentGenerationLocked",
"(",
")",
"\n\n",
"if",
"generation",
"!=",
"currentGen",
"+",
"1",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"generation",
",",
"currentGen",
")",
"\n",
"}",
"\n\n",
"_",
",",
"exists",
":=",
"s",
".",
"generations",
"[",
"generation",
"]",
"\n",
"if",
"exists",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"generation",
")",
"\n",
"}",
"\n\n",
"expanded",
",",
"err",
":=",
"expandPerUserKey",
"(",
"seed",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"s",
".",
"generations",
"[",
"generation",
"]",
"=",
"expanded",
".",
"lower",
"(",
")",
"\n",
"s",
".",
"seqgen",
"[",
"seqno",
"]",
"=",
"generation",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // AddKey registers a full key locally. | [
"AddKey",
"registers",
"a",
"full",
"key",
"locally",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L281-L312 |
159,417 | keybase/client | go/libkb/per_user_key.go | CurrentGeneration | func (s *PerUserKeyring) CurrentGeneration() keybase1.PerUserKeyGeneration {
s.Lock()
defer s.Unlock()
return s.currentGenerationLocked()
} | go | func (s *PerUserKeyring) CurrentGeneration() keybase1.PerUserKeyGeneration {
s.Lock()
defer s.Unlock()
return s.currentGenerationLocked()
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"CurrentGeneration",
"(",
")",
"keybase1",
".",
"PerUserKeyGeneration",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n",
"return",
"s",
".",
"currentGenerationLocked",
"(",
")",
"\n",
"}"
] | // CurrentGeneration returns what generation we're on. The version possible
// Version is 1. Version 0 implies no keys are available. | [
"CurrentGeneration",
"returns",
"what",
"generation",
"we",
"re",
"on",
".",
"The",
"version",
"possible",
"Version",
"is",
"1",
".",
"Version",
"0",
"implies",
"no",
"keys",
"are",
"available",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L320-L324 |
159,418 | keybase/client | go/libkb/per_user_key.go | GetEncryptionKeyByGeneration | func (s *PerUserKeyring) GetEncryptionKeyByGeneration(m MetaContext, gen keybase1.PerUserKeyGeneration) (*NaclDHKeyPair, error) {
s.Lock()
defer s.Unlock()
return s.getEncryptionKeyByGenerationLocked(m, gen)
} | go | func (s *PerUserKeyring) GetEncryptionKeyByGeneration(m MetaContext, gen keybase1.PerUserKeyGeneration) (*NaclDHKeyPair, error) {
s.Lock()
defer s.Unlock()
return s.getEncryptionKeyByGenerationLocked(m, gen)
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"GetEncryptionKeyByGeneration",
"(",
"m",
"MetaContext",
",",
"gen",
"keybase1",
".",
"PerUserKeyGeneration",
")",
"(",
"*",
"NaclDHKeyPair",
",",
"error",
")",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"s",
".",
"getEncryptionKeyByGenerationLocked",
"(",
"m",
",",
"gen",
")",
"\n",
"}"
] | // Get the encryption key of a generation. | [
"Get",
"the",
"encryption",
"key",
"of",
"a",
"generation",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L372-L377 |
159,419 | keybase/client | go/libkb/per_user_key.go | GetEncryptionKeyBySeqno | func (s *PerUserKeyring) GetEncryptionKeyBySeqno(m MetaContext, seqno keybase1.Seqno) (*NaclDHKeyPair, error) {
s.Lock()
defer s.Unlock()
gen, ok := s.seqgen[seqno]
if !ok {
return nil, fmt.Errorf("no encrypted key for seqno %v", seqno)
}
return s.getEncryptionKeyByGenerationLocked(m, gen)
} | go | func (s *PerUserKeyring) GetEncryptionKeyBySeqno(m MetaContext, seqno keybase1.Seqno) (*NaclDHKeyPair, error) {
s.Lock()
defer s.Unlock()
gen, ok := s.seqgen[seqno]
if !ok {
return nil, fmt.Errorf("no encrypted key for seqno %v", seqno)
}
return s.getEncryptionKeyByGenerationLocked(m, gen)
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"GetEncryptionKeyBySeqno",
"(",
"m",
"MetaContext",
",",
"seqno",
"keybase1",
".",
"Seqno",
")",
"(",
"*",
"NaclDHKeyPair",
",",
"error",
")",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"gen",
",",
"ok",
":=",
"s",
".",
"seqgen",
"[",
"seqno",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"seqno",
")",
"\n",
"}",
"\n",
"return",
"s",
".",
"getEncryptionKeyByGenerationLocked",
"(",
"m",
",",
"gen",
")",
"\n",
"}"
] | // Get the encryption key at the user sigchain seqno. | [
"Get",
"the",
"encryption",
"key",
"at",
"the",
"user",
"sigchain",
"seqno",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L391-L400 |
159,420 | keybase/client | go/libkb/per_user_key.go | GetEncryptionKeyByKID | func (s *PerUserKeyring) GetEncryptionKeyByKID(m MetaContext, kid keybase1.KID) (*NaclDHKeyPair, error) {
s.Lock()
defer s.Unlock()
for _, key := range s.generations {
if key.encKey.GetKID().Equal(kid) {
return key.encKey, nil
}
}
return nil, NotFoundError{Msg: fmt.Sprintf("no per-user encryption key found for KID %s", kid)}
} | go | func (s *PerUserKeyring) GetEncryptionKeyByKID(m MetaContext, kid keybase1.KID) (*NaclDHKeyPair, error) {
s.Lock()
defer s.Unlock()
for _, key := range s.generations {
if key.encKey.GetKID().Equal(kid) {
return key.encKey, nil
}
}
return nil, NotFoundError{Msg: fmt.Sprintf("no per-user encryption key found for KID %s", kid)}
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"GetEncryptionKeyByKID",
"(",
"m",
"MetaContext",
",",
"kid",
"keybase1",
".",
"KID",
")",
"(",
"*",
"NaclDHKeyPair",
",",
"error",
")",
"{",
"s",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"Unlock",
"(",
")",
"\n\n",
"for",
"_",
",",
"key",
":=",
"range",
"s",
".",
"generations",
"{",
"if",
"key",
".",
"encKey",
".",
"GetKID",
"(",
")",
".",
"Equal",
"(",
"kid",
")",
"{",
"return",
"key",
".",
"encKey",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
",",
"NotFoundError",
"{",
"Msg",
":",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"kid",
")",
"}",
"\n",
"}"
] | // GetEncryptionKeyByKID finds an encryption key that matches kid. | [
"GetEncryptionKeyByKID",
"finds",
"an",
"encryption",
"key",
"that",
"matches",
"kid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L414-L424 |
159,421 | keybase/client | go/libkb/per_user_key.go | Sync | func (s *PerUserKeyring) Sync(m MetaContext) (err error) {
return s.syncAsConfiguredDevice(m, nil)
} | go | func (s *PerUserKeyring) Sync(m MetaContext) (err error) {
return s.syncAsConfiguredDevice(m, nil)
} | [
"func",
"(",
"s",
"*",
"PerUserKeyring",
")",
"Sync",
"(",
"m",
"MetaContext",
")",
"(",
"err",
"error",
")",
"{",
"return",
"s",
".",
"syncAsConfiguredDevice",
"(",
"m",
",",
"nil",
")",
"\n",
"}"
] | // Sync our PerUserKeyring with the server. It will either add all new
// keys since our last update, or not at all if there was an error.
// Pass it a standard Go network context. | [
"Sync",
"our",
"PerUserKeyring",
"with",
"the",
"server",
".",
"It",
"will",
"either",
"add",
"all",
"new",
"keys",
"since",
"our",
"last",
"update",
"or",
"not",
"at",
"all",
"if",
"there",
"was",
"an",
"error",
".",
"Pass",
"it",
"a",
"standard",
"Go",
"network",
"context",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L429-L431 |
159,422 | keybase/client | go/libkb/per_user_key.go | checkPublic | func (c *perUserKeyChecker) checkPublic(key importedPerUserKey, generation keybase1.PerUserKeyGeneration) error {
// sig key
if expectedSigKID, ok := c.expectedPUKSigKIDs[generation]; ok {
if !expectedSigKID.SecureEqual(key.sigKey.GetKID()) {
return fmt.Errorf("import per-user-key: wrong sigKID expected %v", expectedSigKID.String())
}
} else {
return fmt.Errorf("import per-user-key: no sigKID for generation: %v", generation)
}
// enc key
if expectedEncKID, ok := c.expectedPUKEncKIDs[generation]; ok {
if !expectedEncKID.SecureEqual(key.encKey.GetKID()) {
return fmt.Errorf("import per-user-key: wrong sigKID expected %v", expectedEncKID.String())
}
} else {
return fmt.Errorf("import per-user-key: no sigKID for generation: %v", generation)
}
return nil
} | go | func (c *perUserKeyChecker) checkPublic(key importedPerUserKey, generation keybase1.PerUserKeyGeneration) error {
// sig key
if expectedSigKID, ok := c.expectedPUKSigKIDs[generation]; ok {
if !expectedSigKID.SecureEqual(key.sigKey.GetKID()) {
return fmt.Errorf("import per-user-key: wrong sigKID expected %v", expectedSigKID.String())
}
} else {
return fmt.Errorf("import per-user-key: no sigKID for generation: %v", generation)
}
// enc key
if expectedEncKID, ok := c.expectedPUKEncKIDs[generation]; ok {
if !expectedEncKID.SecureEqual(key.encKey.GetKID()) {
return fmt.Errorf("import per-user-key: wrong sigKID expected %v", expectedEncKID.String())
}
} else {
return fmt.Errorf("import per-user-key: no sigKID for generation: %v", generation)
}
return nil
} | [
"func",
"(",
"c",
"*",
"perUserKeyChecker",
")",
"checkPublic",
"(",
"key",
"importedPerUserKey",
",",
"generation",
"keybase1",
".",
"PerUserKeyGeneration",
")",
"error",
"{",
"// sig key",
"if",
"expectedSigKID",
",",
"ok",
":=",
"c",
".",
"expectedPUKSigKIDs",
"[",
"generation",
"]",
";",
"ok",
"{",
"if",
"!",
"expectedSigKID",
".",
"SecureEqual",
"(",
"key",
".",
"sigKey",
".",
"GetKID",
"(",
")",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"expectedSigKID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"generation",
")",
"\n",
"}",
"\n\n",
"// enc key",
"if",
"expectedEncKID",
",",
"ok",
":=",
"c",
".",
"expectedPUKEncKIDs",
"[",
"generation",
"]",
";",
"ok",
"{",
"if",
"!",
"expectedEncKID",
".",
"SecureEqual",
"(",
"key",
".",
"encKey",
".",
"GetKID",
"(",
")",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"expectedEncKID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"generation",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // checkPublic checks that a key matches the KIDs published by the user. | [
"checkPublic",
"checks",
"that",
"a",
"key",
"matches",
"the",
"KIDs",
"published",
"by",
"the",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L602-L622 |
159,423 | keybase/client | go/libkb/per_user_key.go | importPerUserKeyBox | func importPerUserKeyBox(box *keybase1.PerUserKeyBox, decryptionKey GenericKey,
wantedGeneration keybase1.PerUserKeyGeneration, checker *perUserKeyChecker) (*importedPerUserKey, error) {
if box == nil {
return nil, NewPerUserKeyImportError("per-user-key box nil")
}
if box.Generation != wantedGeneration {
return nil, NewPerUserKeyImportError("bad generation returned: %d", box.Generation)
}
if !decryptionKey.GetKID().Equal(box.ReceiverKID) {
return nil, NewPerUserKeyImportError("wrong encryption kid: %s", box.ReceiverKID.String())
}
rawKey, encryptingKID, err := decryptionKey.DecryptFromString(box.Box)
if err != nil {
return nil, err
}
if len(checker.allowedEncryptingKIDs) == 0 {
return nil, NewPerUserKeyImportError("no allowed encrypting kids")
}
if !checker.allowedEncryptingKIDs[encryptingKID] {
return nil, NewPerUserKeyImportError("unexpected encrypting kid: %s", encryptingKID)
}
seed, err := MakeByte32Soft(rawKey)
if err != nil {
return nil, NewPerUserKeyImportError("%s", err)
}
imp, err := expandPerUserKey(seed)
if err != nil {
return nil, NewPerUserKeyImportError("%s", err)
}
err = checker.checkPublic(imp, wantedGeneration)
if err != nil {
return nil, err
}
return &imp, nil
} | go | func importPerUserKeyBox(box *keybase1.PerUserKeyBox, decryptionKey GenericKey,
wantedGeneration keybase1.PerUserKeyGeneration, checker *perUserKeyChecker) (*importedPerUserKey, error) {
if box == nil {
return nil, NewPerUserKeyImportError("per-user-key box nil")
}
if box.Generation != wantedGeneration {
return nil, NewPerUserKeyImportError("bad generation returned: %d", box.Generation)
}
if !decryptionKey.GetKID().Equal(box.ReceiverKID) {
return nil, NewPerUserKeyImportError("wrong encryption kid: %s", box.ReceiverKID.String())
}
rawKey, encryptingKID, err := decryptionKey.DecryptFromString(box.Box)
if err != nil {
return nil, err
}
if len(checker.allowedEncryptingKIDs) == 0 {
return nil, NewPerUserKeyImportError("no allowed encrypting kids")
}
if !checker.allowedEncryptingKIDs[encryptingKID] {
return nil, NewPerUserKeyImportError("unexpected encrypting kid: %s", encryptingKID)
}
seed, err := MakeByte32Soft(rawKey)
if err != nil {
return nil, NewPerUserKeyImportError("%s", err)
}
imp, err := expandPerUserKey(seed)
if err != nil {
return nil, NewPerUserKeyImportError("%s", err)
}
err = checker.checkPublic(imp, wantedGeneration)
if err != nil {
return nil, err
}
return &imp, nil
} | [
"func",
"importPerUserKeyBox",
"(",
"box",
"*",
"keybase1",
".",
"PerUserKeyBox",
",",
"decryptionKey",
"GenericKey",
",",
"wantedGeneration",
"keybase1",
".",
"PerUserKeyGeneration",
",",
"checker",
"*",
"perUserKeyChecker",
")",
"(",
"*",
"importedPerUserKey",
",",
"error",
")",
"{",
"if",
"box",
"==",
"nil",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"box",
".",
"Generation",
"!=",
"wantedGeneration",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
",",
"box",
".",
"Generation",
")",
"\n",
"}",
"\n",
"if",
"!",
"decryptionKey",
".",
"GetKID",
"(",
")",
".",
"Equal",
"(",
"box",
".",
"ReceiverKID",
")",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
",",
"box",
".",
"ReceiverKID",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"rawKey",
",",
"encryptingKID",
",",
"err",
":=",
"decryptionKey",
".",
"DecryptFromString",
"(",
"box",
".",
"Box",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"checker",
".",
"allowedEncryptingKIDs",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"!",
"checker",
".",
"allowedEncryptingKIDs",
"[",
"encryptingKID",
"]",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
",",
"encryptingKID",
")",
"\n",
"}",
"\n",
"seed",
",",
"err",
":=",
"MakeByte32Soft",
"(",
"rawKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"imp",
",",
"err",
":=",
"expandPerUserKey",
"(",
"seed",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"NewPerUserKeyImportError",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"err",
"=",
"checker",
".",
"checkPublic",
"(",
"imp",
",",
"wantedGeneration",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"imp",
",",
"nil",
"\n",
"}"
] | // Decrypt, expand, and check a per-user-key from a Box. | [
"Decrypt",
"expand",
"and",
"check",
"a",
"per",
"-",
"user",
"-",
"key",
"from",
"a",
"Box",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L696-L730 |
159,424 | keybase/client | go/libkb/per_user_key.go | importPerUserKeyPrev | func importPerUserKeyPrev(generation keybase1.PerUserKeyGeneration, prev perUserKeyPrevResp, decryptionKey NaclSecretBoxKey,
wantedGeneration keybase1.PerUserKeyGeneration, checker *perUserKeyChecker) (*importedPerUserKey, error) {
if generation != prev.Generation {
return nil, fmt.Errorf("import per-user-key mismatched generation: %v != %v",
generation, prev.Generation)
}
seed, err := openPerUserKeyPrev(prev.Ctext, decryptionKey)
if err != nil {
return nil, err
}
imp, err := expandPerUserKey(seed)
if err != nil {
return nil, err
}
err = checker.checkPublic(imp, generation)
if err != nil {
return nil, err
}
return &imp, nil
} | go | func importPerUserKeyPrev(generation keybase1.PerUserKeyGeneration, prev perUserKeyPrevResp, decryptionKey NaclSecretBoxKey,
wantedGeneration keybase1.PerUserKeyGeneration, checker *perUserKeyChecker) (*importedPerUserKey, error) {
if generation != prev.Generation {
return nil, fmt.Errorf("import per-user-key mismatched generation: %v != %v",
generation, prev.Generation)
}
seed, err := openPerUserKeyPrev(prev.Ctext, decryptionKey)
if err != nil {
return nil, err
}
imp, err := expandPerUserKey(seed)
if err != nil {
return nil, err
}
err = checker.checkPublic(imp, generation)
if err != nil {
return nil, err
}
return &imp, nil
} | [
"func",
"importPerUserKeyPrev",
"(",
"generation",
"keybase1",
".",
"PerUserKeyGeneration",
",",
"prev",
"perUserKeyPrevResp",
",",
"decryptionKey",
"NaclSecretBoxKey",
",",
"wantedGeneration",
"keybase1",
".",
"PerUserKeyGeneration",
",",
"checker",
"*",
"perUserKeyChecker",
")",
"(",
"*",
"importedPerUserKey",
",",
"error",
")",
"{",
"if",
"generation",
"!=",
"prev",
".",
"Generation",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"generation",
",",
"prev",
".",
"Generation",
")",
"\n",
"}",
"\n\n",
"seed",
",",
"err",
":=",
"openPerUserKeyPrev",
"(",
"prev",
".",
"Ctext",
",",
"decryptionKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"imp",
",",
"err",
":=",
"expandPerUserKey",
"(",
"seed",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"checker",
".",
"checkPublic",
"(",
"imp",
",",
"generation",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"imp",
",",
"nil",
"\n",
"}"
] | // Decrypt, expand, and check a per-user-key from a SecretBox. | [
"Decrypt",
"expand",
"and",
"check",
"a",
"per",
"-",
"user",
"-",
"key",
"from",
"a",
"SecretBox",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/per_user_key.go#L733-L757 |
159,425 | keybase/client | go/kbfs/idutil/local.go | MakeLocalUsers | func MakeLocalUsers(users []kbname.NormalizedUsername) []LocalUser {
localUsers := make([]LocalUser, len(users))
for i := 0; i < len(users); i++ {
verifyingKey := MakeLocalUserVerifyingKeyOrBust(users[i])
cryptPublicKey := MakeLocalUserCryptPublicKeyOrBust(users[i])
localUsers[i] = LocalUser{
UserInfo: UserInfo{
Name: users[i],
UID: keybase1.MakeTestUID(uint32(i + 1)),
VerifyingKeys: []kbfscrypto.VerifyingKey{verifyingKey},
CryptPublicKeys: []kbfscrypto.CryptPublicKey{cryptPublicKey},
KIDNames: map[keybase1.KID]string{
verifyingKey.KID(): "dev1",
},
},
CurrentCryptPublicKeyIndex: 0,
CurrentVerifyingKeyIndex: 0,
}
}
return localUsers
} | go | func MakeLocalUsers(users []kbname.NormalizedUsername) []LocalUser {
localUsers := make([]LocalUser, len(users))
for i := 0; i < len(users); i++ {
verifyingKey := MakeLocalUserVerifyingKeyOrBust(users[i])
cryptPublicKey := MakeLocalUserCryptPublicKeyOrBust(users[i])
localUsers[i] = LocalUser{
UserInfo: UserInfo{
Name: users[i],
UID: keybase1.MakeTestUID(uint32(i + 1)),
VerifyingKeys: []kbfscrypto.VerifyingKey{verifyingKey},
CryptPublicKeys: []kbfscrypto.CryptPublicKey{cryptPublicKey},
KIDNames: map[keybase1.KID]string{
verifyingKey.KID(): "dev1",
},
},
CurrentCryptPublicKeyIndex: 0,
CurrentVerifyingKeyIndex: 0,
}
}
return localUsers
} | [
"func",
"MakeLocalUsers",
"(",
"users",
"[",
"]",
"kbname",
".",
"NormalizedUsername",
")",
"[",
"]",
"LocalUser",
"{",
"localUsers",
":=",
"make",
"(",
"[",
"]",
"LocalUser",
",",
"len",
"(",
"users",
")",
")",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"len",
"(",
"users",
")",
";",
"i",
"++",
"{",
"verifyingKey",
":=",
"MakeLocalUserVerifyingKeyOrBust",
"(",
"users",
"[",
"i",
"]",
")",
"\n",
"cryptPublicKey",
":=",
"MakeLocalUserCryptPublicKeyOrBust",
"(",
"users",
"[",
"i",
"]",
")",
"\n",
"localUsers",
"[",
"i",
"]",
"=",
"LocalUser",
"{",
"UserInfo",
":",
"UserInfo",
"{",
"Name",
":",
"users",
"[",
"i",
"]",
",",
"UID",
":",
"keybase1",
".",
"MakeTestUID",
"(",
"uint32",
"(",
"i",
"+",
"1",
")",
")",
",",
"VerifyingKeys",
":",
"[",
"]",
"kbfscrypto",
".",
"VerifyingKey",
"{",
"verifyingKey",
"}",
",",
"CryptPublicKeys",
":",
"[",
"]",
"kbfscrypto",
".",
"CryptPublicKey",
"{",
"cryptPublicKey",
"}",
",",
"KIDNames",
":",
"map",
"[",
"keybase1",
".",
"KID",
"]",
"string",
"{",
"verifyingKey",
".",
"KID",
"(",
")",
":",
"\"",
"\"",
",",
"}",
",",
"}",
",",
"CurrentCryptPublicKeyIndex",
":",
"0",
",",
"CurrentVerifyingKeyIndex",
":",
"0",
",",
"}",
"\n",
"}",
"\n",
"return",
"localUsers",
"\n",
"}"
] | // MakeLocalUsers is a helper function to generate a list of
// LocalUsers suitable to use with KeybaseDaemonLocal. | [
"MakeLocalUsers",
"is",
"a",
"helper",
"function",
"to",
"generate",
"a",
"list",
"of",
"LocalUsers",
"suitable",
"to",
"use",
"with",
"KeybaseDaemonLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/local.go#L41-L61 |
159,426 | keybase/client | go/kbfs/idutil/local.go | GetPublicKeys | func (lu *LocalUser) GetPublicKeys() []keybase1.PublicKey {
sibkeys := verifyingKeysToPublicKeys(lu.VerifyingKeys)
subkeys := cryptPublicKeysToPublicKeys(lu.CryptPublicKeys)
return append(sibkeys, subkeys...)
} | go | func (lu *LocalUser) GetPublicKeys() []keybase1.PublicKey {
sibkeys := verifyingKeysToPublicKeys(lu.VerifyingKeys)
subkeys := cryptPublicKeysToPublicKeys(lu.CryptPublicKeys)
return append(sibkeys, subkeys...)
} | [
"func",
"(",
"lu",
"*",
"LocalUser",
")",
"GetPublicKeys",
"(",
")",
"[",
"]",
"keybase1",
".",
"PublicKey",
"{",
"sibkeys",
":=",
"verifyingKeysToPublicKeys",
"(",
"lu",
".",
"VerifyingKeys",
")",
"\n",
"subkeys",
":=",
"cryptPublicKeysToPublicKeys",
"(",
"lu",
".",
"CryptPublicKeys",
")",
"\n",
"return",
"append",
"(",
"sibkeys",
",",
"subkeys",
"...",
")",
"\n",
"}"
] | // GetPublicKeys returns all of this LocalUser's public encryption keys. | [
"GetPublicKeys",
"returns",
"all",
"of",
"this",
"LocalUser",
"s",
"public",
"encryption",
"keys",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/local.go#L88-L92 |
159,427 | keybase/client | go/kbfs/idutil/local.go | DeepCopy | func (lu LocalUser) DeepCopy() LocalUser {
luCopy := lu
luCopy.VerifyingKeys = make(
[]kbfscrypto.VerifyingKey, len(lu.VerifyingKeys))
copy(luCopy.VerifyingKeys, lu.VerifyingKeys)
luCopy.CryptPublicKeys = make(
[]kbfscrypto.CryptPublicKey, len(lu.CryptPublicKeys))
copy(luCopy.CryptPublicKeys, lu.CryptPublicKeys)
luCopy.KIDNames = make(map[keybase1.KID]string, len(lu.KIDNames))
for k, v := range lu.KIDNames {
luCopy.KIDNames[k] = v
}
luCopy.RevokedVerifyingKeys = make(
map[kbfscrypto.VerifyingKey]RevokedKeyInfo,
len(lu.RevokedVerifyingKeys))
for k, v := range lu.RevokedVerifyingKeys {
luCopy.RevokedVerifyingKeys[k] = v
}
luCopy.RevokedCryptPublicKeys = make(
map[kbfscrypto.CryptPublicKey]RevokedKeyInfo,
len(lu.RevokedCryptPublicKeys))
for k, v := range lu.RevokedCryptPublicKeys {
luCopy.RevokedCryptPublicKeys[k] = v
}
luCopy.Asserts = make([]string, len(lu.Asserts))
copy(luCopy.Asserts, lu.Asserts)
luCopy.UnverifiedKeys = make([]keybase1.PublicKey, len(lu.UnverifiedKeys))
copy(luCopy.UnverifiedKeys, lu.UnverifiedKeys)
return luCopy
} | go | func (lu LocalUser) DeepCopy() LocalUser {
luCopy := lu
luCopy.VerifyingKeys = make(
[]kbfscrypto.VerifyingKey, len(lu.VerifyingKeys))
copy(luCopy.VerifyingKeys, lu.VerifyingKeys)
luCopy.CryptPublicKeys = make(
[]kbfscrypto.CryptPublicKey, len(lu.CryptPublicKeys))
copy(luCopy.CryptPublicKeys, lu.CryptPublicKeys)
luCopy.KIDNames = make(map[keybase1.KID]string, len(lu.KIDNames))
for k, v := range lu.KIDNames {
luCopy.KIDNames[k] = v
}
luCopy.RevokedVerifyingKeys = make(
map[kbfscrypto.VerifyingKey]RevokedKeyInfo,
len(lu.RevokedVerifyingKeys))
for k, v := range lu.RevokedVerifyingKeys {
luCopy.RevokedVerifyingKeys[k] = v
}
luCopy.RevokedCryptPublicKeys = make(
map[kbfscrypto.CryptPublicKey]RevokedKeyInfo,
len(lu.RevokedCryptPublicKeys))
for k, v := range lu.RevokedCryptPublicKeys {
luCopy.RevokedCryptPublicKeys[k] = v
}
luCopy.Asserts = make([]string, len(lu.Asserts))
copy(luCopy.Asserts, lu.Asserts)
luCopy.UnverifiedKeys = make([]keybase1.PublicKey, len(lu.UnverifiedKeys))
copy(luCopy.UnverifiedKeys, lu.UnverifiedKeys)
return luCopy
} | [
"func",
"(",
"lu",
"LocalUser",
")",
"DeepCopy",
"(",
")",
"LocalUser",
"{",
"luCopy",
":=",
"lu",
"\n\n",
"luCopy",
".",
"VerifyingKeys",
"=",
"make",
"(",
"[",
"]",
"kbfscrypto",
".",
"VerifyingKey",
",",
"len",
"(",
"lu",
".",
"VerifyingKeys",
")",
")",
"\n",
"copy",
"(",
"luCopy",
".",
"VerifyingKeys",
",",
"lu",
".",
"VerifyingKeys",
")",
"\n\n",
"luCopy",
".",
"CryptPublicKeys",
"=",
"make",
"(",
"[",
"]",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"len",
"(",
"lu",
".",
"CryptPublicKeys",
")",
")",
"\n",
"copy",
"(",
"luCopy",
".",
"CryptPublicKeys",
",",
"lu",
".",
"CryptPublicKeys",
")",
"\n\n",
"luCopy",
".",
"KIDNames",
"=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"KID",
"]",
"string",
",",
"len",
"(",
"lu",
".",
"KIDNames",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"lu",
".",
"KIDNames",
"{",
"luCopy",
".",
"KIDNames",
"[",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n\n",
"luCopy",
".",
"RevokedVerifyingKeys",
"=",
"make",
"(",
"map",
"[",
"kbfscrypto",
".",
"VerifyingKey",
"]",
"RevokedKeyInfo",
",",
"len",
"(",
"lu",
".",
"RevokedVerifyingKeys",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"lu",
".",
"RevokedVerifyingKeys",
"{",
"luCopy",
".",
"RevokedVerifyingKeys",
"[",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n\n",
"luCopy",
".",
"RevokedCryptPublicKeys",
"=",
"make",
"(",
"map",
"[",
"kbfscrypto",
".",
"CryptPublicKey",
"]",
"RevokedKeyInfo",
",",
"len",
"(",
"lu",
".",
"RevokedCryptPublicKeys",
")",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"lu",
".",
"RevokedCryptPublicKeys",
"{",
"luCopy",
".",
"RevokedCryptPublicKeys",
"[",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n\n",
"luCopy",
".",
"Asserts",
"=",
"make",
"(",
"[",
"]",
"string",
",",
"len",
"(",
"lu",
".",
"Asserts",
")",
")",
"\n",
"copy",
"(",
"luCopy",
".",
"Asserts",
",",
"lu",
".",
"Asserts",
")",
"\n",
"luCopy",
".",
"UnverifiedKeys",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"PublicKey",
",",
"len",
"(",
"lu",
".",
"UnverifiedKeys",
")",
")",
"\n",
"copy",
"(",
"luCopy",
".",
"UnverifiedKeys",
",",
"lu",
".",
"UnverifiedKeys",
")",
"\n\n",
"return",
"luCopy",
"\n",
"}"
] | // DeepCopy returns a deep copy of this `LocalUser`. | [
"DeepCopy",
"returns",
"a",
"deep",
"copy",
"of",
"this",
"LocalUser",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/local.go#L95-L131 |
159,428 | keybase/client | go/kbfs/idutil/local.go | MakeLocalUserSigningKeyOrBust | func MakeLocalUserSigningKeyOrBust(
name kbname.NormalizedUsername) kbfscrypto.SigningKey {
return kbfscrypto.MakeFakeSigningKeyOrBust(
string(name) + " signing key")
} | go | func MakeLocalUserSigningKeyOrBust(
name kbname.NormalizedUsername) kbfscrypto.SigningKey {
return kbfscrypto.MakeFakeSigningKeyOrBust(
string(name) + " signing key")
} | [
"func",
"MakeLocalUserSigningKeyOrBust",
"(",
"name",
"kbname",
".",
"NormalizedUsername",
")",
"kbfscrypto",
".",
"SigningKey",
"{",
"return",
"kbfscrypto",
".",
"MakeFakeSigningKeyOrBust",
"(",
"string",
"(",
"name",
")",
"+",
"\"",
"\"",
")",
"\n",
"}"
] | // Helper functions to get a various keys for a local user. Each
// function will return the same key will always be returned for a
// given user.
// MakeLocalUserSigningKeyOrBust returns a unique signing key for this user. | [
"Helper",
"functions",
"to",
"get",
"a",
"various",
"keys",
"for",
"a",
"local",
"user",
".",
"Each",
"function",
"will",
"return",
"the",
"same",
"key",
"will",
"always",
"be",
"returned",
"for",
"a",
"given",
"user",
".",
"MakeLocalUserSigningKeyOrBust",
"returns",
"a",
"unique",
"signing",
"key",
"for",
"this",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/local.go#L176-L180 |
159,429 | keybase/client | go/kbfs/idutil/local.go | MakeLocalUserCryptPrivateKeyOrBust | func MakeLocalUserCryptPrivateKeyOrBust(
name kbname.NormalizedUsername) kbfscrypto.CryptPrivateKey {
return kbfscrypto.MakeFakeCryptPrivateKeyOrBust(
string(name) + " crypt key")
} | go | func MakeLocalUserCryptPrivateKeyOrBust(
name kbname.NormalizedUsername) kbfscrypto.CryptPrivateKey {
return kbfscrypto.MakeFakeCryptPrivateKeyOrBust(
string(name) + " crypt key")
} | [
"func",
"MakeLocalUserCryptPrivateKeyOrBust",
"(",
"name",
"kbname",
".",
"NormalizedUsername",
")",
"kbfscrypto",
".",
"CryptPrivateKey",
"{",
"return",
"kbfscrypto",
".",
"MakeFakeCryptPrivateKeyOrBust",
"(",
"string",
"(",
"name",
")",
"+",
"\"",
"\"",
")",
"\n",
"}"
] | // MakeLocalUserCryptPrivateKeyOrBust returns a unique private
// encryption key for this user. | [
"MakeLocalUserCryptPrivateKeyOrBust",
"returns",
"a",
"unique",
"private",
"encryption",
"key",
"for",
"this",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/local.go#L198-L202 |
159,430 | keybase/client | go/kbfs/idutil/local.go | MakeLocalTLFCryptKeyOrBust | func MakeLocalTLFCryptKeyOrBust(
name string, keyGen kbfsmd.KeyGen) kbfscrypto.TLFCryptKey {
// Put the key gen first to make it more likely to fit into the
// 32-character "random" seed.
return kbfscrypto.MakeFakeTLFCryptKeyOrBust(
string(name) + " " + string(keyGen) + " crypt key ")
} | go | func MakeLocalTLFCryptKeyOrBust(
name string, keyGen kbfsmd.KeyGen) kbfscrypto.TLFCryptKey {
// Put the key gen first to make it more likely to fit into the
// 32-character "random" seed.
return kbfscrypto.MakeFakeTLFCryptKeyOrBust(
string(name) + " " + string(keyGen) + " crypt key ")
} | [
"func",
"MakeLocalTLFCryptKeyOrBust",
"(",
"name",
"string",
",",
"keyGen",
"kbfsmd",
".",
"KeyGen",
")",
"kbfscrypto",
".",
"TLFCryptKey",
"{",
"// Put the key gen first to make it more likely to fit into the",
"// 32-character \"random\" seed.",
"return",
"kbfscrypto",
".",
"MakeFakeTLFCryptKeyOrBust",
"(",
"string",
"(",
"name",
")",
"+",
"\"",
"\"",
"+",
"string",
"(",
"keyGen",
")",
"+",
"\"",
"\"",
")",
"\n",
"}"
] | // MakeLocalTLFCryptKeyOrBust returns a unique private symmetric key
// for a TLF. | [
"MakeLocalTLFCryptKeyOrBust",
"returns",
"a",
"unique",
"private",
"symmetric",
"key",
"for",
"a",
"TLF",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/local.go#L206-L212 |
159,431 | keybase/client | go/libkb/service_info.go | KeybaseServiceInfo | func KeybaseServiceInfo(g *GlobalContext) ServiceInfo {
return ServiceInfo{
Version: VersionString(),
Label: g.Env.GetLabel(),
Pid: os.Getpid(),
}
} | go | func KeybaseServiceInfo(g *GlobalContext) ServiceInfo {
return ServiceInfo{
Version: VersionString(),
Label: g.Env.GetLabel(),
Pid: os.Getpid(),
}
} | [
"func",
"KeybaseServiceInfo",
"(",
"g",
"*",
"GlobalContext",
")",
"ServiceInfo",
"{",
"return",
"ServiceInfo",
"{",
"Version",
":",
"VersionString",
"(",
")",
",",
"Label",
":",
"g",
".",
"Env",
".",
"GetLabel",
"(",
")",
",",
"Pid",
":",
"os",
".",
"Getpid",
"(",
")",
",",
"}",
"\n",
"}"
] | // KeybaseServiceInfo is runtime info for the Keybase service. | [
"KeybaseServiceInfo",
"is",
"runtime",
"info",
"for",
"the",
"Keybase",
"service",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/service_info.go#L25-L31 |
159,432 | keybase/client | go/libkb/service_info.go | WriteFile | func (s ServiceInfo) WriteFile(path string, log logger.Logger) error {
out, err := json.MarshalIndent(s, "", " ")
if err != nil {
return err
}
file := NewFile(path, []byte(out), 0644)
return file.Save(log)
} | go | func (s ServiceInfo) WriteFile(path string, log logger.Logger) error {
out, err := json.MarshalIndent(s, "", " ")
if err != nil {
return err
}
file := NewFile(path, []byte(out), 0644)
return file.Save(log)
} | [
"func",
"(",
"s",
"ServiceInfo",
")",
"WriteFile",
"(",
"path",
"string",
",",
"log",
"logger",
".",
"Logger",
")",
"error",
"{",
"out",
",",
"err",
":=",
"json",
".",
"MarshalIndent",
"(",
"s",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"file",
":=",
"NewFile",
"(",
"path",
",",
"[",
"]",
"byte",
"(",
"out",
")",
",",
"0644",
")",
"\n",
"return",
"file",
".",
"Save",
"(",
"log",
")",
"\n",
"}"
] | // WriteFile writes service info as JSON in runtimeDir. | [
"WriteFile",
"writes",
"service",
"info",
"as",
"JSON",
"in",
"runtimeDir",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/service_info.go#L46-L54 |
159,433 | keybase/client | go/libkb/service_info.go | WaitForServiceInfoFile | func WaitForServiceInfoFile(path string, label string, pid string, timeout time.Duration, log serviceLog) (*ServiceInfo, error) {
if pid == "" {
return nil, fmt.Errorf("No pid to wait for")
}
lookForServiceInfo := func() (*ServiceInfo, error) {
serviceInfo, err := LoadServiceInfo(path)
if err != nil {
return nil, err
}
if serviceInfo == nil {
return nil, nil
}
// Make sure the info file is the pid we are waiting for, otherwise it is
// still starting up.
if pid != fmt.Sprintf("%d", serviceInfo.Pid) {
return nil, nil
}
// PIDs match, the service has started up
return serviceInfo, nil
}
log.Debug("Looking for service info file (timeout=%s)", timeout)
serviceInfo, err := waitForServiceInfo(timeout, time.Millisecond*100, lookForServiceInfo)
// If no service info was found, let's return an error
if serviceInfo == nil {
if err == nil {
err = fmt.Errorf("%s isn't running (expecting pid=%s)", label, pid)
}
return nil, err
}
// We succeeded in finding service info
log.Debug("Found service info: %#v", *serviceInfo)
return serviceInfo, nil
} | go | func WaitForServiceInfoFile(path string, label string, pid string, timeout time.Duration, log serviceLog) (*ServiceInfo, error) {
if pid == "" {
return nil, fmt.Errorf("No pid to wait for")
}
lookForServiceInfo := func() (*ServiceInfo, error) {
serviceInfo, err := LoadServiceInfo(path)
if err != nil {
return nil, err
}
if serviceInfo == nil {
return nil, nil
}
// Make sure the info file is the pid we are waiting for, otherwise it is
// still starting up.
if pid != fmt.Sprintf("%d", serviceInfo.Pid) {
return nil, nil
}
// PIDs match, the service has started up
return serviceInfo, nil
}
log.Debug("Looking for service info file (timeout=%s)", timeout)
serviceInfo, err := waitForServiceInfo(timeout, time.Millisecond*100, lookForServiceInfo)
// If no service info was found, let's return an error
if serviceInfo == nil {
if err == nil {
err = fmt.Errorf("%s isn't running (expecting pid=%s)", label, pid)
}
return nil, err
}
// We succeeded in finding service info
log.Debug("Found service info: %#v", *serviceInfo)
return serviceInfo, nil
} | [
"func",
"WaitForServiceInfoFile",
"(",
"path",
"string",
",",
"label",
"string",
",",
"pid",
"string",
",",
"timeout",
"time",
".",
"Duration",
",",
"log",
"serviceLog",
")",
"(",
"*",
"ServiceInfo",
",",
"error",
")",
"{",
"if",
"pid",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"lookForServiceInfo",
":=",
"func",
"(",
")",
"(",
"*",
"ServiceInfo",
",",
"error",
")",
"{",
"serviceInfo",
",",
"err",
":=",
"LoadServiceInfo",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"serviceInfo",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"// Make sure the info file is the pid we are waiting for, otherwise it is",
"// still starting up.",
"if",
"pid",
"!=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"serviceInfo",
".",
"Pid",
")",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"// PIDs match, the service has started up",
"return",
"serviceInfo",
",",
"nil",
"\n",
"}",
"\n\n",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"timeout",
")",
"\n",
"serviceInfo",
",",
"err",
":=",
"waitForServiceInfo",
"(",
"timeout",
",",
"time",
".",
"Millisecond",
"*",
"100",
",",
"lookForServiceInfo",
")",
"\n\n",
"// If no service info was found, let's return an error",
"if",
"serviceInfo",
"==",
"nil",
"{",
"if",
"err",
"==",
"nil",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"label",
",",
"pid",
")",
"\n",
"}",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// We succeeded in finding service info",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"*",
"serviceInfo",
")",
"\n",
"return",
"serviceInfo",
",",
"nil",
"\n",
"}"
] | // WaitForServiceInfoFile tries to wait for a service info file, which should be
// written on successful service startup. | [
"WaitForServiceInfoFile",
"tries",
"to",
"wait",
"for",
"a",
"service",
"info",
"file",
"which",
"should",
"be",
"written",
"on",
"successful",
"service",
"startup",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/service_info.go#L80-L118 |
159,434 | keybase/client | go/chat/helper.go | GetChannelTopicName | func (h *Helper) GetChannelTopicName(ctx context.Context, teamID keybase1.TeamID,
topicType chat1.TopicType, convID chat1.ConversationID) (topicName string, err error) {
defer h.Trace(ctx, func() error { return err }, "ChatHelper.GetChannelTopicName")()
h.Debug(ctx, "for teamID:%v convID:%v", teamID.String(), convID.String())
kuid, err := CurrentUID(h.G())
if err != nil {
return topicName, err
}
uid := gregor1.UID(kuid.ToBytes())
tlfID, err := chat1.TeamIDToTLFID(teamID)
if err != nil {
return topicName, err
}
query := &chat1.GetInboxLocalQuery{
ConvIDs: []chat1.ConversationID{convID},
}
inbox, _, err := h.G().InboxSource.Read(ctx, uid, types.ConversationLocalizerBlocking,
types.InboxSourceDataSourceAll, nil, query, nil)
if err != nil {
return topicName, err
}
h.Debug(ctx, "found inbox convs: %v", len(inbox.Convs))
for _, conv := range inbox.Convs {
if conv.GetConvID().Eq(convID) && conv.GetMembersType() == chat1.ConversationMembersType_TEAM {
return conv.Info.TopicName, nil
}
}
// Fallback to TeamChannelSource
h.Debug(ctx, "using TeamChannelSource")
topicName, err = h.G().TeamChannelSource.GetChannelTopicName(ctx, uid, tlfID, topicType, convID)
return topicName, err
} | go | func (h *Helper) GetChannelTopicName(ctx context.Context, teamID keybase1.TeamID,
topicType chat1.TopicType, convID chat1.ConversationID) (topicName string, err error) {
defer h.Trace(ctx, func() error { return err }, "ChatHelper.GetChannelTopicName")()
h.Debug(ctx, "for teamID:%v convID:%v", teamID.String(), convID.String())
kuid, err := CurrentUID(h.G())
if err != nil {
return topicName, err
}
uid := gregor1.UID(kuid.ToBytes())
tlfID, err := chat1.TeamIDToTLFID(teamID)
if err != nil {
return topicName, err
}
query := &chat1.GetInboxLocalQuery{
ConvIDs: []chat1.ConversationID{convID},
}
inbox, _, err := h.G().InboxSource.Read(ctx, uid, types.ConversationLocalizerBlocking,
types.InboxSourceDataSourceAll, nil, query, nil)
if err != nil {
return topicName, err
}
h.Debug(ctx, "found inbox convs: %v", len(inbox.Convs))
for _, conv := range inbox.Convs {
if conv.GetConvID().Eq(convID) && conv.GetMembersType() == chat1.ConversationMembersType_TEAM {
return conv.Info.TopicName, nil
}
}
// Fallback to TeamChannelSource
h.Debug(ctx, "using TeamChannelSource")
topicName, err = h.G().TeamChannelSource.GetChannelTopicName(ctx, uid, tlfID, topicType, convID)
return topicName, err
} | [
"func",
"(",
"h",
"*",
"Helper",
")",
"GetChannelTopicName",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"topicType",
"chat1",
".",
"TopicType",
",",
"convID",
"chat1",
".",
"ConversationID",
")",
"(",
"topicName",
"string",
",",
"err",
"error",
")",
"{",
"defer",
"h",
".",
"Trace",
"(",
"ctx",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
",",
"\"",
"\"",
")",
"(",
")",
"\n",
"h",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
",",
"teamID",
".",
"String",
"(",
")",
",",
"convID",
".",
"String",
"(",
")",
")",
"\n",
"kuid",
",",
"err",
":=",
"CurrentUID",
"(",
"h",
".",
"G",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"topicName",
",",
"err",
"\n",
"}",
"\n",
"uid",
":=",
"gregor1",
".",
"UID",
"(",
"kuid",
".",
"ToBytes",
"(",
")",
")",
"\n",
"tlfID",
",",
"err",
":=",
"chat1",
".",
"TeamIDToTLFID",
"(",
"teamID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"topicName",
",",
"err",
"\n",
"}",
"\n",
"query",
":=",
"&",
"chat1",
".",
"GetInboxLocalQuery",
"{",
"ConvIDs",
":",
"[",
"]",
"chat1",
".",
"ConversationID",
"{",
"convID",
"}",
",",
"}",
"\n",
"inbox",
",",
"_",
",",
"err",
":=",
"h",
".",
"G",
"(",
")",
".",
"InboxSource",
".",
"Read",
"(",
"ctx",
",",
"uid",
",",
"types",
".",
"ConversationLocalizerBlocking",
",",
"types",
".",
"InboxSourceDataSourceAll",
",",
"nil",
",",
"query",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"topicName",
",",
"err",
"\n",
"}",
"\n",
"h",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
",",
"len",
"(",
"inbox",
".",
"Convs",
")",
")",
"\n",
"for",
"_",
",",
"conv",
":=",
"range",
"inbox",
".",
"Convs",
"{",
"if",
"conv",
".",
"GetConvID",
"(",
")",
".",
"Eq",
"(",
"convID",
")",
"&&",
"conv",
".",
"GetMembersType",
"(",
")",
"==",
"chat1",
".",
"ConversationMembersType_TEAM",
"{",
"return",
"conv",
".",
"Info",
".",
"TopicName",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"// Fallback to TeamChannelSource",
"h",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"topicName",
",",
"err",
"=",
"h",
".",
"G",
"(",
")",
".",
"TeamChannelSource",
".",
"GetChannelTopicName",
"(",
"ctx",
",",
"uid",
",",
"tlfID",
",",
"topicType",
",",
"convID",
")",
"\n",
"return",
"topicName",
",",
"err",
"\n",
"}"
] | // GetChannelTopicName gets the name of a team channel even if it's not in the inbox. | [
"GetChannelTopicName",
"gets",
"the",
"name",
"of",
"a",
"team",
"channel",
"even",
"if",
"it",
"s",
"not",
"in",
"the",
"inbox",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/helper.go#L181-L212 |
159,435 | keybase/client | go/chat/helper.go | postJoinLeave | func postJoinLeave(ctx context.Context, g *globals.Context, ri func() chat1.RemoteInterface, uid gregor1.UID,
convID chat1.ConversationID, body chat1.MessageBody) (err error) {
typ, err := body.MessageType()
if err != nil {
return fmt.Errorf("message type for postJoinLeave: %v", err)
}
switch typ {
case chat1.MessageType_JOIN, chat1.MessageType_LEAVE:
// good
default:
return fmt.Errorf("invalid message type for postJoinLeave: %v", typ)
}
// Get the conversation from the inbox.
query := chat1.GetInboxLocalQuery{
ConvIDs: []chat1.ConversationID{convID},
}
ib, _, err := g.InboxSource.Read(ctx, uid, types.ConversationLocalizerBlocking,
types.InboxSourceDataSourceAll, nil, &query, nil)
if err != nil {
return fmt.Errorf("inbox read error: %s", err)
}
if len(ib.Convs) != 1 {
return fmt.Errorf("post join/leave: found %d conversations", len(ib.Convs))
}
conv := ib.Convs[0]
if conv.GetTopicType() != chat1.TopicType_CHAT {
// only post these in chat convs
return nil
}
plaintext := chat1.MessagePlaintext{
ClientHeader: chat1.MessageClientHeader{
Conv: conv.Info.Triple,
TlfName: conv.Info.TlfName,
TlfPublic: conv.Info.Visibility == keybase1.TLFVisibility_PUBLIC,
MessageType: typ,
Supersedes: chat1.MessageID(0),
Deletes: nil,
Prev: nil, // Filled by Sender
Sender: nil, // Filled by Sender
SenderDevice: nil, // Filled by Sender
MerkleRoot: nil, // Filled by Boxer
OutboxID: nil,
OutboxInfo: nil,
},
MessageBody: body,
}
// Send with a blocking sender
sender := NewBlockingSender(g, NewBoxer(g), ri)
_, _, err = sender.Send(ctx, convID, plaintext, 0, nil, nil, nil)
return err
} | go | func postJoinLeave(ctx context.Context, g *globals.Context, ri func() chat1.RemoteInterface, uid gregor1.UID,
convID chat1.ConversationID, body chat1.MessageBody) (err error) {
typ, err := body.MessageType()
if err != nil {
return fmt.Errorf("message type for postJoinLeave: %v", err)
}
switch typ {
case chat1.MessageType_JOIN, chat1.MessageType_LEAVE:
// good
default:
return fmt.Errorf("invalid message type for postJoinLeave: %v", typ)
}
// Get the conversation from the inbox.
query := chat1.GetInboxLocalQuery{
ConvIDs: []chat1.ConversationID{convID},
}
ib, _, err := g.InboxSource.Read(ctx, uid, types.ConversationLocalizerBlocking,
types.InboxSourceDataSourceAll, nil, &query, nil)
if err != nil {
return fmt.Errorf("inbox read error: %s", err)
}
if len(ib.Convs) != 1 {
return fmt.Errorf("post join/leave: found %d conversations", len(ib.Convs))
}
conv := ib.Convs[0]
if conv.GetTopicType() != chat1.TopicType_CHAT {
// only post these in chat convs
return nil
}
plaintext := chat1.MessagePlaintext{
ClientHeader: chat1.MessageClientHeader{
Conv: conv.Info.Triple,
TlfName: conv.Info.TlfName,
TlfPublic: conv.Info.Visibility == keybase1.TLFVisibility_PUBLIC,
MessageType: typ,
Supersedes: chat1.MessageID(0),
Deletes: nil,
Prev: nil, // Filled by Sender
Sender: nil, // Filled by Sender
SenderDevice: nil, // Filled by Sender
MerkleRoot: nil, // Filled by Boxer
OutboxID: nil,
OutboxInfo: nil,
},
MessageBody: body,
}
// Send with a blocking sender
sender := NewBlockingSender(g, NewBoxer(g), ri)
_, _, err = sender.Send(ctx, convID, plaintext, 0, nil, nil, nil)
return err
} | [
"func",
"postJoinLeave",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"globals",
".",
"Context",
",",
"ri",
"func",
"(",
")",
"chat1",
".",
"RemoteInterface",
",",
"uid",
"gregor1",
".",
"UID",
",",
"convID",
"chat1",
".",
"ConversationID",
",",
"body",
"chat1",
".",
"MessageBody",
")",
"(",
"err",
"error",
")",
"{",
"typ",
",",
"err",
":=",
"body",
".",
"MessageType",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"switch",
"typ",
"{",
"case",
"chat1",
".",
"MessageType_JOIN",
",",
"chat1",
".",
"MessageType_LEAVE",
":",
"// good",
"default",
":",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"typ",
")",
"\n",
"}",
"\n\n",
"// Get the conversation from the inbox.",
"query",
":=",
"chat1",
".",
"GetInboxLocalQuery",
"{",
"ConvIDs",
":",
"[",
"]",
"chat1",
".",
"ConversationID",
"{",
"convID",
"}",
",",
"}",
"\n",
"ib",
",",
"_",
",",
"err",
":=",
"g",
".",
"InboxSource",
".",
"Read",
"(",
"ctx",
",",
"uid",
",",
"types",
".",
"ConversationLocalizerBlocking",
",",
"types",
".",
"InboxSourceDataSourceAll",
",",
"nil",
",",
"&",
"query",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"ib",
".",
"Convs",
")",
"!=",
"1",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"ib",
".",
"Convs",
")",
")",
"\n",
"}",
"\n\n",
"conv",
":=",
"ib",
".",
"Convs",
"[",
"0",
"]",
"\n",
"if",
"conv",
".",
"GetTopicType",
"(",
")",
"!=",
"chat1",
".",
"TopicType_CHAT",
"{",
"// only post these in chat convs",
"return",
"nil",
"\n",
"}",
"\n",
"plaintext",
":=",
"chat1",
".",
"MessagePlaintext",
"{",
"ClientHeader",
":",
"chat1",
".",
"MessageClientHeader",
"{",
"Conv",
":",
"conv",
".",
"Info",
".",
"Triple",
",",
"TlfName",
":",
"conv",
".",
"Info",
".",
"TlfName",
",",
"TlfPublic",
":",
"conv",
".",
"Info",
".",
"Visibility",
"==",
"keybase1",
".",
"TLFVisibility_PUBLIC",
",",
"MessageType",
":",
"typ",
",",
"Supersedes",
":",
"chat1",
".",
"MessageID",
"(",
"0",
")",
",",
"Deletes",
":",
"nil",
",",
"Prev",
":",
"nil",
",",
"// Filled by Sender",
"Sender",
":",
"nil",
",",
"// Filled by Sender",
"SenderDevice",
":",
"nil",
",",
"// Filled by Sender",
"MerkleRoot",
":",
"nil",
",",
"// Filled by Boxer",
"OutboxID",
":",
"nil",
",",
"OutboxInfo",
":",
"nil",
",",
"}",
",",
"MessageBody",
":",
"body",
",",
"}",
"\n\n",
"// Send with a blocking sender",
"sender",
":=",
"NewBlockingSender",
"(",
"g",
",",
"NewBoxer",
"(",
"g",
")",
",",
"ri",
")",
"\n",
"_",
",",
"_",
",",
"err",
"=",
"sender",
".",
"Send",
"(",
"ctx",
",",
"convID",
",",
"plaintext",
",",
"0",
",",
"nil",
",",
"nil",
",",
"nil",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // Post a join or leave message. Must be called when the user is in the conv.
// Uses a blocking sender. | [
"Post",
"a",
"join",
"or",
"leave",
"message",
".",
"Must",
"be",
"called",
"when",
"the",
"user",
"is",
"in",
"the",
"conv",
".",
"Uses",
"a",
"blocking",
"sender",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/helper.go#L683-L736 |
159,436 | keybase/client | go/chat/storage/checkers.go | CheckAndRecordBodyHash | func CheckAndRecordBodyHash(ctx context.Context, g *globals.Context, bodyHash chat1.Hash, uniqueMsgID chat1.MessageID, uniqueConvID chat1.ConversationID) error {
bodyHashKey := makeBodyHashIndexKey(bodyHash)
bodyHashValue := []byte(fmt.Sprintf("%s:%s", uniqueConvID, uniqueMsgID))
existingVal, found, err := g.LocalChatDb.GetRaw(bodyHashKey)
// Log errors as warnings, and skip this check. That prevents a corrupt
// leveldb cache from breaking chat.
if err != nil {
g.Log.CDebugf(ctx, "error getting body hash key from chat db: %s", err)
return nil
}
if found {
if !bytes.Equal(existingVal, bodyHashValue) {
err := fmt.Errorf("chat message body hash replay detected, %s != %s", string(existingVal), string(bodyHashValue))
g.Log.CDebugf(ctx, "%s", err)
return err
}
return nil
}
err = g.LocalChatDb.PutRaw(bodyHashKey, bodyHashValue)
// Also suppress write errors.
if err != nil {
g.Log.CDebugf(ctx, "error writing body hash key to chat db: %s", err)
}
return nil
} | go | func CheckAndRecordBodyHash(ctx context.Context, g *globals.Context, bodyHash chat1.Hash, uniqueMsgID chat1.MessageID, uniqueConvID chat1.ConversationID) error {
bodyHashKey := makeBodyHashIndexKey(bodyHash)
bodyHashValue := []byte(fmt.Sprintf("%s:%s", uniqueConvID, uniqueMsgID))
existingVal, found, err := g.LocalChatDb.GetRaw(bodyHashKey)
// Log errors as warnings, and skip this check. That prevents a corrupt
// leveldb cache from breaking chat.
if err != nil {
g.Log.CDebugf(ctx, "error getting body hash key from chat db: %s", err)
return nil
}
if found {
if !bytes.Equal(existingVal, bodyHashValue) {
err := fmt.Errorf("chat message body hash replay detected, %s != %s", string(existingVal), string(bodyHashValue))
g.Log.CDebugf(ctx, "%s", err)
return err
}
return nil
}
err = g.LocalChatDb.PutRaw(bodyHashKey, bodyHashValue)
// Also suppress write errors.
if err != nil {
g.Log.CDebugf(ctx, "error writing body hash key to chat db: %s", err)
}
return nil
} | [
"func",
"CheckAndRecordBodyHash",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"globals",
".",
"Context",
",",
"bodyHash",
"chat1",
".",
"Hash",
",",
"uniqueMsgID",
"chat1",
".",
"MessageID",
",",
"uniqueConvID",
"chat1",
".",
"ConversationID",
")",
"error",
"{",
"bodyHashKey",
":=",
"makeBodyHashIndexKey",
"(",
"bodyHash",
")",
"\n",
"bodyHashValue",
":=",
"[",
"]",
"byte",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"uniqueConvID",
",",
"uniqueMsgID",
")",
")",
"\n",
"existingVal",
",",
"found",
",",
"err",
":=",
"g",
".",
"LocalChatDb",
".",
"GetRaw",
"(",
"bodyHashKey",
")",
"\n",
"// Log errors as warnings, and skip this check. That prevents a corrupt",
"// leveldb cache from breaking chat.",
"if",
"err",
"!=",
"nil",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"if",
"found",
"{",
"if",
"!",
"bytes",
".",
"Equal",
"(",
"existingVal",
",",
"bodyHashValue",
")",
"{",
"err",
":=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"string",
"(",
"existingVal",
")",
",",
"string",
"(",
"bodyHashValue",
")",
")",
"\n",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"err",
"=",
"g",
".",
"LocalChatDb",
".",
"PutRaw",
"(",
"bodyHashKey",
",",
"bodyHashValue",
")",
"\n",
"// Also suppress write errors.",
"if",
"err",
"!=",
"nil",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CheckAndRecordBodyHash checks the current message's body hash against all the body hashes we've
// seen, to prevent replays. If the header hash is new, add it to the set. | [
"CheckAndRecordBodyHash",
"checks",
"the",
"current",
"message",
"s",
"body",
"hash",
"against",
"all",
"the",
"body",
"hashes",
"we",
"ve",
"seen",
"to",
"prevent",
"replays",
".",
"If",
"the",
"header",
"hash",
"is",
"new",
"add",
"it",
"to",
"the",
"set",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/storage/checkers.go#L31-L55 |
159,437 | keybase/client | go/chat/storage/checkers.go | CheckAndRecordPrevPointer | func CheckAndRecordPrevPointer(ctx context.Context, g *globals.Context, msgID chat1.MessageID, convID chat1.ConversationID, uniqueHeaderHash chat1.Hash) error {
prevKey := makePrevIndexKey(convID, msgID)
headerHashVal := makePrevIndexValue(uniqueHeaderHash)
existingVal, found, err := g.LocalChatDb.GetRaw(prevKey)
// Log errors as warnings, and skip this check. That prevents a corrupt
// leveldb cache from breaking chat.
if err != nil {
g.Log.CWarningf(ctx, "error getting prev pointer key from chat db: %s", err)
return nil
}
if found {
if !bytes.Equal(existingVal, headerHashVal) {
g.Log.CDebugf(ctx, "chat message prev pointer inconsistency detected")
g.Log.CDebugf(ctx, "in conv_id %s, msg_id %s", convID.String(), msgID.String())
g.Log.CDebugf(ctx, "mismatch: %s (stored) != %s (new)", string(existingVal), string(headerHashVal))
err := fmt.Errorf("chat message prev pointer inconsistency detected, %s != %s", string(existingVal), string(headerHashVal))
return err
}
return nil
}
g.Log.CDebugf(ctx, "storing header hash %s for conv_id %s, msg_id %s", string(headerHashVal), convID.String(), msgID.String())
err = g.LocalChatDb.PutRaw(prevKey, headerHashVal)
// Also suppress write errors.
if err != nil {
g.Log.CDebugf(ctx, "error writing body hash key to chat db: %s", err)
}
return nil
} | go | func CheckAndRecordPrevPointer(ctx context.Context, g *globals.Context, msgID chat1.MessageID, convID chat1.ConversationID, uniqueHeaderHash chat1.Hash) error {
prevKey := makePrevIndexKey(convID, msgID)
headerHashVal := makePrevIndexValue(uniqueHeaderHash)
existingVal, found, err := g.LocalChatDb.GetRaw(prevKey)
// Log errors as warnings, and skip this check. That prevents a corrupt
// leveldb cache from breaking chat.
if err != nil {
g.Log.CWarningf(ctx, "error getting prev pointer key from chat db: %s", err)
return nil
}
if found {
if !bytes.Equal(existingVal, headerHashVal) {
g.Log.CDebugf(ctx, "chat message prev pointer inconsistency detected")
g.Log.CDebugf(ctx, "in conv_id %s, msg_id %s", convID.String(), msgID.String())
g.Log.CDebugf(ctx, "mismatch: %s (stored) != %s (new)", string(existingVal), string(headerHashVal))
err := fmt.Errorf("chat message prev pointer inconsistency detected, %s != %s", string(existingVal), string(headerHashVal))
return err
}
return nil
}
g.Log.CDebugf(ctx, "storing header hash %s for conv_id %s, msg_id %s", string(headerHashVal), convID.String(), msgID.String())
err = g.LocalChatDb.PutRaw(prevKey, headerHashVal)
// Also suppress write errors.
if err != nil {
g.Log.CDebugf(ctx, "error writing body hash key to chat db: %s", err)
}
return nil
} | [
"func",
"CheckAndRecordPrevPointer",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"globals",
".",
"Context",
",",
"msgID",
"chat1",
".",
"MessageID",
",",
"convID",
"chat1",
".",
"ConversationID",
",",
"uniqueHeaderHash",
"chat1",
".",
"Hash",
")",
"error",
"{",
"prevKey",
":=",
"makePrevIndexKey",
"(",
"convID",
",",
"msgID",
")",
"\n",
"headerHashVal",
":=",
"makePrevIndexValue",
"(",
"uniqueHeaderHash",
")",
"\n",
"existingVal",
",",
"found",
",",
"err",
":=",
"g",
".",
"LocalChatDb",
".",
"GetRaw",
"(",
"prevKey",
")",
"\n",
"// Log errors as warnings, and skip this check. That prevents a corrupt",
"// leveldb cache from breaking chat.",
"if",
"err",
"!=",
"nil",
"{",
"g",
".",
"Log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"if",
"found",
"{",
"if",
"!",
"bytes",
".",
"Equal",
"(",
"existingVal",
",",
"headerHashVal",
")",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"convID",
".",
"String",
"(",
")",
",",
"msgID",
".",
"String",
"(",
")",
")",
"\n",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"string",
"(",
"existingVal",
")",
",",
"string",
"(",
"headerHashVal",
")",
")",
"\n",
"err",
":=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"string",
"(",
"existingVal",
")",
",",
"string",
"(",
"headerHashVal",
")",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"string",
"(",
"headerHashVal",
")",
",",
"convID",
".",
"String",
"(",
")",
",",
"msgID",
".",
"String",
"(",
")",
")",
"\n",
"err",
"=",
"g",
".",
"LocalChatDb",
".",
"PutRaw",
"(",
"prevKey",
",",
"headerHashVal",
")",
"\n",
"// Also suppress write errors.",
"if",
"err",
"!=",
"nil",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CheckAndRecordPrevPointer checks the current message's header hash against all the prev pointers we've
// ever seen. If the current message is new, add it to the set. | [
"CheckAndRecordPrevPointer",
"checks",
"the",
"current",
"message",
"s",
"header",
"hash",
"against",
"all",
"the",
"prev",
"pointers",
"we",
"ve",
"ever",
"seen",
".",
"If",
"the",
"current",
"message",
"is",
"new",
"add",
"it",
"to",
"the",
"set",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/storage/checkers.go#L71-L98 |
159,438 | keybase/client | go/logger/file.go | SetLogFileConfig | func SetLogFileConfig(lfc *LogFileConfig) error {
globalLock.Lock()
defer globalLock.Unlock()
first := true
var w = currentLogFileWriter
if w != nil {
first = false
w.lock.Lock()
defer w.lock.Unlock()
w.Close()
w.config = *lfc
} else {
w = NewLogFileWriter(*lfc)
// Clean up the default logger, if it is in use
select {
case stdErrLoggingShutdown <- struct{}{}:
default:
}
}
if err := w.Open(time.Now()); err != nil {
return err
}
if first {
buf, shutdown, _ := NewAutoFlushingBufferedWriter(w, loggingFrequency)
w.stopFlushing = shutdown
fileBackend := logging.NewLogBackend(buf, "", 0)
logging.SetBackend(fileBackend)
stderrIsTerminal = false
currentLogFileWriter = w
}
return nil
} | go | func SetLogFileConfig(lfc *LogFileConfig) error {
globalLock.Lock()
defer globalLock.Unlock()
first := true
var w = currentLogFileWriter
if w != nil {
first = false
w.lock.Lock()
defer w.lock.Unlock()
w.Close()
w.config = *lfc
} else {
w = NewLogFileWriter(*lfc)
// Clean up the default logger, if it is in use
select {
case stdErrLoggingShutdown <- struct{}{}:
default:
}
}
if err := w.Open(time.Now()); err != nil {
return err
}
if first {
buf, shutdown, _ := NewAutoFlushingBufferedWriter(w, loggingFrequency)
w.stopFlushing = shutdown
fileBackend := logging.NewLogBackend(buf, "", 0)
logging.SetBackend(fileBackend)
stderrIsTerminal = false
currentLogFileWriter = w
}
return nil
} | [
"func",
"SetLogFileConfig",
"(",
"lfc",
"*",
"LogFileConfig",
")",
"error",
"{",
"globalLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"globalLock",
".",
"Unlock",
"(",
")",
"\n\n",
"first",
":=",
"true",
"\n",
"var",
"w",
"=",
"currentLogFileWriter",
"\n",
"if",
"w",
"!=",
"nil",
"{",
"first",
"=",
"false",
"\n",
"w",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"w",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"w",
".",
"Close",
"(",
")",
"\n",
"w",
".",
"config",
"=",
"*",
"lfc",
"\n",
"}",
"else",
"{",
"w",
"=",
"NewLogFileWriter",
"(",
"*",
"lfc",
")",
"\n\n",
"// Clean up the default logger, if it is in use",
"select",
"{",
"case",
"stdErrLoggingShutdown",
"<-",
"struct",
"{",
"}",
"{",
"}",
":",
"default",
":",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"w",
".",
"Open",
"(",
"time",
".",
"Now",
"(",
")",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"if",
"first",
"{",
"buf",
",",
"shutdown",
",",
"_",
":=",
"NewAutoFlushingBufferedWriter",
"(",
"w",
",",
"loggingFrequency",
")",
"\n",
"w",
".",
"stopFlushing",
"=",
"shutdown",
"\n",
"fileBackend",
":=",
"logging",
".",
"NewLogBackend",
"(",
"buf",
",",
"\"",
"\"",
",",
"0",
")",
"\n",
"logging",
".",
"SetBackend",
"(",
"fileBackend",
")",
"\n\n",
"stderrIsTerminal",
"=",
"false",
"\n",
"currentLogFileWriter",
"=",
"w",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetLogFileConfig sets the log file config to be used globally. | [
"SetLogFileConfig",
"sets",
"the",
"log",
"file",
"config",
"to",
"be",
"used",
"globally",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/logger/file.go#L36-L72 |
159,439 | keybase/client | go/logger/file.go | scanOldLogFiles | func scanOldLogFiles(path string) ([]string, error) {
dname, fname := filepath.Split(path)
if dname == "" {
dname = "."
}
dir, err := os.Open(dname)
if err != nil {
return nil, err
}
defer dir.Close()
ns, err := dir.Readdirnames(-1)
if err != nil {
return nil, err
}
names, err := getLogFilenamesOrderByTime(fname, ns)
if err != nil {
return nil, err
}
var res []string
for _, name := range names {
res = append(res, filepath.Join(dname, name))
}
return res, nil
} | go | func scanOldLogFiles(path string) ([]string, error) {
dname, fname := filepath.Split(path)
if dname == "" {
dname = "."
}
dir, err := os.Open(dname)
if err != nil {
return nil, err
}
defer dir.Close()
ns, err := dir.Readdirnames(-1)
if err != nil {
return nil, err
}
names, err := getLogFilenamesOrderByTime(fname, ns)
if err != nil {
return nil, err
}
var res []string
for _, name := range names {
res = append(res, filepath.Join(dname, name))
}
return res, nil
} | [
"func",
"scanOldLogFiles",
"(",
"path",
"string",
")",
"(",
"[",
"]",
"string",
",",
"error",
")",
"{",
"dname",
",",
"fname",
":=",
"filepath",
".",
"Split",
"(",
"path",
")",
"\n",
"if",
"dname",
"==",
"\"",
"\"",
"{",
"dname",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"dir",
",",
"err",
":=",
"os",
".",
"Open",
"(",
"dname",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"dir",
".",
"Close",
"(",
")",
"\n",
"ns",
",",
"err",
":=",
"dir",
".",
"Readdirnames",
"(",
"-",
"1",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"names",
",",
"err",
":=",
"getLogFilenamesOrderByTime",
"(",
"fname",
",",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"var",
"res",
"[",
"]",
"string",
"\n",
"for",
"_",
",",
"name",
":=",
"range",
"names",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"filepath",
".",
"Join",
"(",
"dname",
",",
"name",
")",
")",
"\n",
"}",
"\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // scanOldLogFiles finds old archived log files corresponding to the log file path.
// Returns the list of such log files sorted with the eldest one first. | [
"scanOldLogFiles",
"finds",
"old",
"archived",
"log",
"files",
"corresponding",
"to",
"the",
"log",
"file",
"path",
".",
"Returns",
"the",
"list",
"of",
"such",
"log",
"files",
"sorted",
"with",
"the",
"eldest",
"one",
"first",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/logger/file.go#L258-L281 |
159,440 | keybase/client | go/kbfs/tlfhandle/identify_util.go | OnError | func (ei *ExtendedIdentify) OnError(ctx context.Context) {
if ei.userBreaks == nil {
return
}
// The identify got an error, so just send a nil breaks list so
// that the goroutine waiting on the breaks can finish and the
// error can be returned.
select {
case ei.userBreaks <- keybase1.TLFIdentifyFailure{
Breaks: nil,
User: keybase1.User{},
}:
case <-ctx.Done():
}
} | go | func (ei *ExtendedIdentify) OnError(ctx context.Context) {
if ei.userBreaks == nil {
return
}
// The identify got an error, so just send a nil breaks list so
// that the goroutine waiting on the breaks can finish and the
// error can be returned.
select {
case ei.userBreaks <- keybase1.TLFIdentifyFailure{
Breaks: nil,
User: keybase1.User{},
}:
case <-ctx.Done():
}
} | [
"func",
"(",
"ei",
"*",
"ExtendedIdentify",
")",
"OnError",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"if",
"ei",
".",
"userBreaks",
"==",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"// The identify got an error, so just send a nil breaks list so",
"// that the goroutine waiting on the breaks can finish and the",
"// error can be returned.",
"select",
"{",
"case",
"ei",
".",
"userBreaks",
"<-",
"keybase1",
".",
"TLFIdentifyFailure",
"{",
"Breaks",
":",
"nil",
",",
"User",
":",
"keybase1",
".",
"User",
"{",
"}",
",",
"}",
":",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"}",
"\n",
"}"
] | // OnError is called when the identify process has encountered a hard
// error. | [
"OnError",
"is",
"called",
"when",
"the",
"identify",
"process",
"has",
"encountered",
"a",
"hard",
"error",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L79-L94 |
159,441 | keybase/client | go/kbfs/tlfhandle/identify_util.go | MakeExtendedIdentify | func MakeExtendedIdentify(ctx context.Context,
behavior keybase1.TLFIdentifyBehavior) (context.Context, error) {
if _, ok := ctx.Value(ctxExtendedIdentifyKey).(*ExtendedIdentify); ok {
return nil, ExtendedIdentifyAlreadyExists{}
}
if !behavior.WarningInsteadOfErrorOnBrokenTracks() {
return libcontext.NewContextReplayable(
ctx, func(ctx context.Context) context.Context {
return context.WithValue(
ctx, ctxExtendedIdentifyKey, &ExtendedIdentify{
Behavior: behavior,
})
}), nil
}
ch := make(chan keybase1.TLFIdentifyFailure)
return libcontext.NewContextReplayable(
ctx, func(ctx context.Context) context.Context {
return context.WithValue(
ctx, ctxExtendedIdentifyKey, &ExtendedIdentify{
Behavior: behavior,
userBreaks: ch,
})
}), nil
} | go | func MakeExtendedIdentify(ctx context.Context,
behavior keybase1.TLFIdentifyBehavior) (context.Context, error) {
if _, ok := ctx.Value(ctxExtendedIdentifyKey).(*ExtendedIdentify); ok {
return nil, ExtendedIdentifyAlreadyExists{}
}
if !behavior.WarningInsteadOfErrorOnBrokenTracks() {
return libcontext.NewContextReplayable(
ctx, func(ctx context.Context) context.Context {
return context.WithValue(
ctx, ctxExtendedIdentifyKey, &ExtendedIdentify{
Behavior: behavior,
})
}), nil
}
ch := make(chan keybase1.TLFIdentifyFailure)
return libcontext.NewContextReplayable(
ctx, func(ctx context.Context) context.Context {
return context.WithValue(
ctx, ctxExtendedIdentifyKey, &ExtendedIdentify{
Behavior: behavior,
userBreaks: ch,
})
}), nil
} | [
"func",
"MakeExtendedIdentify",
"(",
"ctx",
"context",
".",
"Context",
",",
"behavior",
"keybase1",
".",
"TLFIdentifyBehavior",
")",
"(",
"context",
".",
"Context",
",",
"error",
")",
"{",
"if",
"_",
",",
"ok",
":=",
"ctx",
".",
"Value",
"(",
"ctxExtendedIdentifyKey",
")",
".",
"(",
"*",
"ExtendedIdentify",
")",
";",
"ok",
"{",
"return",
"nil",
",",
"ExtendedIdentifyAlreadyExists",
"{",
"}",
"\n",
"}",
"\n\n",
"if",
"!",
"behavior",
".",
"WarningInsteadOfErrorOnBrokenTracks",
"(",
")",
"{",
"return",
"libcontext",
".",
"NewContextReplayable",
"(",
"ctx",
",",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"context",
".",
"Context",
"{",
"return",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"ctxExtendedIdentifyKey",
",",
"&",
"ExtendedIdentify",
"{",
"Behavior",
":",
"behavior",
",",
"}",
")",
"\n",
"}",
")",
",",
"nil",
"\n",
"}",
"\n\n",
"ch",
":=",
"make",
"(",
"chan",
"keybase1",
".",
"TLFIdentifyFailure",
")",
"\n",
"return",
"libcontext",
".",
"NewContextReplayable",
"(",
"ctx",
",",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"context",
".",
"Context",
"{",
"return",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"ctxExtendedIdentifyKey",
",",
"&",
"ExtendedIdentify",
"{",
"Behavior",
":",
"behavior",
",",
"userBreaks",
":",
"ch",
",",
"}",
")",
"\n",
"}",
")",
",",
"nil",
"\n",
"}"
] | // MakeExtendedIdentify populates a context with an ExtendedIdentify directive. | [
"MakeExtendedIdentify",
"populates",
"a",
"context",
"with",
"an",
"ExtendedIdentify",
"directive",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L169-L194 |
159,442 | keybase/client | go/kbfs/tlfhandle/identify_util.go | GetExtendedIdentify | func GetExtendedIdentify(ctx context.Context) (ei *ExtendedIdentify) {
if ei, ok := ctx.Value(ctxExtendedIdentifyKey).(*ExtendedIdentify); ok {
return ei
}
return &ExtendedIdentify{
Behavior: keybase1.TLFIdentifyBehavior_DEFAULT_KBFS,
}
} | go | func GetExtendedIdentify(ctx context.Context) (ei *ExtendedIdentify) {
if ei, ok := ctx.Value(ctxExtendedIdentifyKey).(*ExtendedIdentify); ok {
return ei
}
return &ExtendedIdentify{
Behavior: keybase1.TLFIdentifyBehavior_DEFAULT_KBFS,
}
} | [
"func",
"GetExtendedIdentify",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"ei",
"*",
"ExtendedIdentify",
")",
"{",
"if",
"ei",
",",
"ok",
":=",
"ctx",
".",
"Value",
"(",
"ctxExtendedIdentifyKey",
")",
".",
"(",
"*",
"ExtendedIdentify",
")",
";",
"ok",
"{",
"return",
"ei",
"\n",
"}",
"\n",
"return",
"&",
"ExtendedIdentify",
"{",
"Behavior",
":",
"keybase1",
".",
"TLFIdentifyBehavior_DEFAULT_KBFS",
",",
"}",
"\n",
"}"
] | // GetExtendedIdentify returns the extended identify info associated
// with the given context. | [
"GetExtendedIdentify",
"returns",
"the",
"extended",
"identify",
"info",
"associated",
"with",
"the",
"given",
"context",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L198-L205 |
159,443 | keybase/client | go/kbfs/tlfhandle/identify_util.go | identifyUser | func identifyUser(ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, name kbname.NormalizedUsername,
id keybase1.UserOrTeamID, t tlf.Type,
offline keybase1.OfflineAvailability) error {
// Check to see if identify should be skipped altogether.
ei := GetExtendedIdentify(ctx)
if ei.Behavior == keybase1.TLFIdentifyBehavior_CHAT_SKIP {
return nil
}
var reason string
nameAssertion := name.String()
isImplicit := false
switch t {
case tlf.Public:
if id.IsTeam() {
isImplicit = true
}
reason = "You accessed a public folder."
case tlf.Private:
if id.IsTeam() {
isImplicit = true
reason = fmt.Sprintf(
"You accessed a folder for private team %s.", nameAssertion)
} else {
reason = fmt.Sprintf(
"You accessed a private folder with %s.", nameAssertion)
}
case tlf.SingleTeam:
reason = fmt.Sprintf(
"You accessed a folder for private team %s.", nameAssertion)
nameAssertion = "team:" + nameAssertion
}
var resultName kbname.NormalizedUsername
var resultID keybase1.UserOrTeamID
if isImplicit {
assertions, extensionSuffix, err := tlf.SplitExtension(name.String())
if err != nil {
return err
}
iteamInfo, err := identifier.IdentifyImplicitTeam(
ctx, assertions, extensionSuffix, t, reason, offline)
if err != nil {
return err
}
resultName = iteamInfo.Name
resultID = iteamInfo.TID.AsUserOrTeam()
} else {
var err error
resultName, resultID, err =
identifier.Identify(ctx, nameAssertion, reason, offline)
if err != nil {
// Convert libkb.NoSigChainError into one we can report. (See
// KBFS-1252).
if _, ok := err.(libkb.NoSigChainError); ok {
return idutil.NoSigChainError{User: name}
}
return err
}
}
// The names of implicit teams can change out from under us,
// unlike for regular users, so don't require that they remain the
// same.
if resultName != name && !isImplicit {
return fmt.Errorf("Identify returned name=%s, expected %s",
resultName, name)
}
if resultID != id {
return fmt.Errorf("Identify returned uid=%s, expected %s", resultID, id)
}
return nil
} | go | func identifyUser(ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, name kbname.NormalizedUsername,
id keybase1.UserOrTeamID, t tlf.Type,
offline keybase1.OfflineAvailability) error {
// Check to see if identify should be skipped altogether.
ei := GetExtendedIdentify(ctx)
if ei.Behavior == keybase1.TLFIdentifyBehavior_CHAT_SKIP {
return nil
}
var reason string
nameAssertion := name.String()
isImplicit := false
switch t {
case tlf.Public:
if id.IsTeam() {
isImplicit = true
}
reason = "You accessed a public folder."
case tlf.Private:
if id.IsTeam() {
isImplicit = true
reason = fmt.Sprintf(
"You accessed a folder for private team %s.", nameAssertion)
} else {
reason = fmt.Sprintf(
"You accessed a private folder with %s.", nameAssertion)
}
case tlf.SingleTeam:
reason = fmt.Sprintf(
"You accessed a folder for private team %s.", nameAssertion)
nameAssertion = "team:" + nameAssertion
}
var resultName kbname.NormalizedUsername
var resultID keybase1.UserOrTeamID
if isImplicit {
assertions, extensionSuffix, err := tlf.SplitExtension(name.String())
if err != nil {
return err
}
iteamInfo, err := identifier.IdentifyImplicitTeam(
ctx, assertions, extensionSuffix, t, reason, offline)
if err != nil {
return err
}
resultName = iteamInfo.Name
resultID = iteamInfo.TID.AsUserOrTeam()
} else {
var err error
resultName, resultID, err =
identifier.Identify(ctx, nameAssertion, reason, offline)
if err != nil {
// Convert libkb.NoSigChainError into one we can report. (See
// KBFS-1252).
if _, ok := err.(libkb.NoSigChainError); ok {
return idutil.NoSigChainError{User: name}
}
return err
}
}
// The names of implicit teams can change out from under us,
// unlike for regular users, so don't require that they remain the
// same.
if resultName != name && !isImplicit {
return fmt.Errorf("Identify returned name=%s, expected %s",
resultName, name)
}
if resultID != id {
return fmt.Errorf("Identify returned uid=%s, expected %s", resultID, id)
}
return nil
} | [
"func",
"identifyUser",
"(",
"ctx",
"context",
".",
"Context",
",",
"nug",
"idutil",
".",
"NormalizedUsernameGetter",
",",
"identifier",
"idutil",
".",
"Identifier",
",",
"name",
"kbname",
".",
"NormalizedUsername",
",",
"id",
"keybase1",
".",
"UserOrTeamID",
",",
"t",
"tlf",
".",
"Type",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"error",
"{",
"// Check to see if identify should be skipped altogether.",
"ei",
":=",
"GetExtendedIdentify",
"(",
"ctx",
")",
"\n",
"if",
"ei",
".",
"Behavior",
"==",
"keybase1",
".",
"TLFIdentifyBehavior_CHAT_SKIP",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"var",
"reason",
"string",
"\n",
"nameAssertion",
":=",
"name",
".",
"String",
"(",
")",
"\n",
"isImplicit",
":=",
"false",
"\n",
"switch",
"t",
"{",
"case",
"tlf",
".",
"Public",
":",
"if",
"id",
".",
"IsTeam",
"(",
")",
"{",
"isImplicit",
"=",
"true",
"\n",
"}",
"\n",
"reason",
"=",
"\"",
"\"",
"\n",
"case",
"tlf",
".",
"Private",
":",
"if",
"id",
".",
"IsTeam",
"(",
")",
"{",
"isImplicit",
"=",
"true",
"\n",
"reason",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"nameAssertion",
")",
"\n",
"}",
"else",
"{",
"reason",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"nameAssertion",
")",
"\n",
"}",
"\n",
"case",
"tlf",
".",
"SingleTeam",
":",
"reason",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"nameAssertion",
")",
"\n",
"nameAssertion",
"=",
"\"",
"\"",
"+",
"nameAssertion",
"\n",
"}",
"\n",
"var",
"resultName",
"kbname",
".",
"NormalizedUsername",
"\n",
"var",
"resultID",
"keybase1",
".",
"UserOrTeamID",
"\n",
"if",
"isImplicit",
"{",
"assertions",
",",
"extensionSuffix",
",",
"err",
":=",
"tlf",
".",
"SplitExtension",
"(",
"name",
".",
"String",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"iteamInfo",
",",
"err",
":=",
"identifier",
".",
"IdentifyImplicitTeam",
"(",
"ctx",
",",
"assertions",
",",
"extensionSuffix",
",",
"t",
",",
"reason",
",",
"offline",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"resultName",
"=",
"iteamInfo",
".",
"Name",
"\n",
"resultID",
"=",
"iteamInfo",
".",
"TID",
".",
"AsUserOrTeam",
"(",
")",
"\n",
"}",
"else",
"{",
"var",
"err",
"error",
"\n",
"resultName",
",",
"resultID",
",",
"err",
"=",
"identifier",
".",
"Identify",
"(",
"ctx",
",",
"nameAssertion",
",",
"reason",
",",
"offline",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// Convert libkb.NoSigChainError into one we can report. (See",
"// KBFS-1252).",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"libkb",
".",
"NoSigChainError",
")",
";",
"ok",
"{",
"return",
"idutil",
".",
"NoSigChainError",
"{",
"User",
":",
"name",
"}",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"// The names of implicit teams can change out from under us,",
"// unlike for regular users, so don't require that they remain the",
"// same.",
"if",
"resultName",
"!=",
"name",
"&&",
"!",
"isImplicit",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"resultName",
",",
"name",
")",
"\n",
"}",
"\n",
"if",
"resultID",
"!=",
"id",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"resultID",
",",
"id",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // identifyUser is the preferred way to run identifies. | [
"identifyUser",
"is",
"the",
"preferred",
"way",
"to",
"run",
"identifies",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L220-L291 |
159,444 | keybase/client | go/kbfs/tlfhandle/identify_util.go | identifyUserToChan | func identifyUserToChan(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, name kbname.NormalizedUsername,
id keybase1.UserOrTeamID, t tlf.Type, offline keybase1.OfflineAvailability,
errChan chan error) {
errChan <- identifyUser(ctx, nug, identifier, name, id, t, offline)
} | go | func identifyUserToChan(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, name kbname.NormalizedUsername,
id keybase1.UserOrTeamID, t tlf.Type, offline keybase1.OfflineAvailability,
errChan chan error) {
errChan <- identifyUser(ctx, nug, identifier, name, id, t, offline)
} | [
"func",
"identifyUserToChan",
"(",
"ctx",
"context",
".",
"Context",
",",
"nug",
"idutil",
".",
"NormalizedUsernameGetter",
",",
"identifier",
"idutil",
".",
"Identifier",
",",
"name",
"kbname",
".",
"NormalizedUsername",
",",
"id",
"keybase1",
".",
"UserOrTeamID",
",",
"t",
"tlf",
".",
"Type",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
",",
"errChan",
"chan",
"error",
")",
"{",
"errChan",
"<-",
"identifyUser",
"(",
"ctx",
",",
"nug",
",",
"identifier",
",",
"name",
",",
"id",
",",
"t",
",",
"offline",
")",
"\n",
"}"
] | // identifyUserToChan calls identifyUser and plugs the result into the error channnel. | [
"identifyUserToChan",
"calls",
"identifyUser",
"and",
"plugs",
"the",
"result",
"into",
"the",
"error",
"channnel",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L294-L300 |
159,445 | keybase/client | go/kbfs/tlfhandle/identify_util.go | identifyUsers | func identifyUsers(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier,
names map[keybase1.UserOrTeamID]kbname.NormalizedUsername,
t tlf.Type, offline keybase1.OfflineAvailability) error {
eg, ctx := errgroup.WithContext(ctx)
// TODO: limit the number of concurrent identifies?
// TODO: implement a version of errgroup with limited concurrency.
for id, name := range names {
// Capture range variables.
id, name := id, name
eg.Go(func() error {
return identifyUser(ctx, nug, identifier, name, id, t, offline)
})
}
return eg.Wait()
} | go | func identifyUsers(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier,
names map[keybase1.UserOrTeamID]kbname.NormalizedUsername,
t tlf.Type, offline keybase1.OfflineAvailability) error {
eg, ctx := errgroup.WithContext(ctx)
// TODO: limit the number of concurrent identifies?
// TODO: implement a version of errgroup with limited concurrency.
for id, name := range names {
// Capture range variables.
id, name := id, name
eg.Go(func() error {
return identifyUser(ctx, nug, identifier, name, id, t, offline)
})
}
return eg.Wait()
} | [
"func",
"identifyUsers",
"(",
"ctx",
"context",
".",
"Context",
",",
"nug",
"idutil",
".",
"NormalizedUsernameGetter",
",",
"identifier",
"idutil",
".",
"Identifier",
",",
"names",
"map",
"[",
"keybase1",
".",
"UserOrTeamID",
"]",
"kbname",
".",
"NormalizedUsername",
",",
"t",
"tlf",
".",
"Type",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"error",
"{",
"eg",
",",
"ctx",
":=",
"errgroup",
".",
"WithContext",
"(",
"ctx",
")",
"\n\n",
"// TODO: limit the number of concurrent identifies?",
"// TODO: implement a version of errgroup with limited concurrency.",
"for",
"id",
",",
"name",
":=",
"range",
"names",
"{",
"// Capture range variables.",
"id",
",",
"name",
":=",
"id",
",",
"name",
"\n",
"eg",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"return",
"identifyUser",
"(",
"ctx",
",",
"nug",
",",
"identifier",
",",
"name",
",",
"id",
",",
"t",
",",
"offline",
")",
"\n",
"}",
")",
"\n",
"}",
"\n\n",
"return",
"eg",
".",
"Wait",
"(",
")",
"\n",
"}"
] | // identifyUsers identifies the users in the given maps. | [
"identifyUsers",
"identifies",
"the",
"users",
"in",
"the",
"given",
"maps",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L303-L321 |
159,446 | keybase/client | go/kbfs/tlfhandle/identify_util.go | IdentifyUserList | func IdentifyUserList(ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, ids []keybase1.UserOrTeamID, t tlf.Type,
offline keybase1.OfflineAvailability) error {
eg, ctx := errgroup.WithContext(ctx)
// TODO: limit the number of concurrent identifies?
// TODO: implement concurrency limited version of errgroup.
for _, id := range ids {
// Capture range variable.
id := id
eg.Go(func() error {
return identifyUID(
ctx, nug, identifier, id, t, offline)
})
}
return eg.Wait()
} | go | func IdentifyUserList(ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, ids []keybase1.UserOrTeamID, t tlf.Type,
offline keybase1.OfflineAvailability) error {
eg, ctx := errgroup.WithContext(ctx)
// TODO: limit the number of concurrent identifies?
// TODO: implement concurrency limited version of errgroup.
for _, id := range ids {
// Capture range variable.
id := id
eg.Go(func() error {
return identifyUID(
ctx, nug, identifier, id, t, offline)
})
}
return eg.Wait()
} | [
"func",
"IdentifyUserList",
"(",
"ctx",
"context",
".",
"Context",
",",
"nug",
"idutil",
".",
"NormalizedUsernameGetter",
",",
"identifier",
"idutil",
".",
"Identifier",
",",
"ids",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"t",
"tlf",
".",
"Type",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"error",
"{",
"eg",
",",
"ctx",
":=",
"errgroup",
".",
"WithContext",
"(",
"ctx",
")",
"\n\n",
"// TODO: limit the number of concurrent identifies?",
"// TODO: implement concurrency limited version of errgroup.",
"for",
"_",
",",
"id",
":=",
"range",
"ids",
"{",
"// Capture range variable.",
"id",
":=",
"id",
"\n",
"eg",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"return",
"identifyUID",
"(",
"ctx",
",",
"nug",
",",
"identifier",
",",
"id",
",",
"t",
",",
"offline",
")",
"\n",
"}",
")",
"\n",
"}",
"\n\n",
"return",
"eg",
".",
"Wait",
"(",
")",
"\n",
"}"
] | // IdentifyUserList identifies the users in the given list. Only use
// this when the usernames are not known - like when rekeying. | [
"IdentifyUserList",
"identifies",
"the",
"users",
"in",
"the",
"given",
"list",
".",
"Only",
"use",
"this",
"when",
"the",
"usernames",
"are",
"not",
"known",
"-",
"like",
"when",
"rekeying",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L325-L342 |
159,447 | keybase/client | go/kbfs/tlfhandle/identify_util.go | identifyUsersForTLF | func identifyUsersForTLF(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier,
names map[keybase1.UserOrTeamID]kbname.NormalizedUsername,
t tlf.Type, offline keybase1.OfflineAvailability) error {
ei := GetExtendedIdentify(ctx)
if ei.Behavior == keybase1.TLFIdentifyBehavior_CHAT_SKIP {
return nil
}
eg, ctx := errgroup.WithContext(ctx)
eg.Go(func() error {
return ei.makeTlfBreaksIfNeeded(ctx, len(names))
})
eg.Go(func() error {
return identifyUsers(ctx, nug, identifier, names, t, offline)
})
return eg.Wait()
} | go | func identifyUsersForTLF(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier,
names map[keybase1.UserOrTeamID]kbname.NormalizedUsername,
t tlf.Type, offline keybase1.OfflineAvailability) error {
ei := GetExtendedIdentify(ctx)
if ei.Behavior == keybase1.TLFIdentifyBehavior_CHAT_SKIP {
return nil
}
eg, ctx := errgroup.WithContext(ctx)
eg.Go(func() error {
return ei.makeTlfBreaksIfNeeded(ctx, len(names))
})
eg.Go(func() error {
return identifyUsers(ctx, nug, identifier, names, t, offline)
})
return eg.Wait()
} | [
"func",
"identifyUsersForTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"nug",
"idutil",
".",
"NormalizedUsernameGetter",
",",
"identifier",
"idutil",
".",
"Identifier",
",",
"names",
"map",
"[",
"keybase1",
".",
"UserOrTeamID",
"]",
"kbname",
".",
"NormalizedUsername",
",",
"t",
"tlf",
".",
"Type",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"error",
"{",
"ei",
":=",
"GetExtendedIdentify",
"(",
"ctx",
")",
"\n",
"if",
"ei",
".",
"Behavior",
"==",
"keybase1",
".",
"TLFIdentifyBehavior_CHAT_SKIP",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"eg",
",",
"ctx",
":=",
"errgroup",
".",
"WithContext",
"(",
"ctx",
")",
"\n\n",
"eg",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"return",
"ei",
".",
"makeTlfBreaksIfNeeded",
"(",
"ctx",
",",
"len",
"(",
"names",
")",
")",
"\n",
"}",
")",
"\n\n",
"eg",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"return",
"identifyUsers",
"(",
"ctx",
",",
"nug",
",",
"identifier",
",",
"names",
",",
"t",
",",
"offline",
")",
"\n",
"}",
")",
"\n\n",
"return",
"eg",
".",
"Wait",
"(",
")",
"\n",
"}"
] | // identifyUsersForTLF is a helper for identifyHandle for easier testing. | [
"identifyUsersForTLF",
"is",
"a",
"helper",
"for",
"identifyHandle",
"for",
"easier",
"testing",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L345-L366 |
159,448 | keybase/client | go/kbfs/tlfhandle/identify_util.go | IdentifyHandle | func IdentifyHandle(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, osg idutil.OfflineStatusGetter,
h *Handle) error {
offline := keybase1.OfflineAvailability_NONE
if osg != nil {
offline = osg.OfflineAvailabilityForID(h.tlfID)
}
return identifyUsersForTLF(
ctx, nug, identifier, h.ResolvedUsersMap(), h.Type(), offline)
} | go | func IdentifyHandle(
ctx context.Context, nug idutil.NormalizedUsernameGetter,
identifier idutil.Identifier, osg idutil.OfflineStatusGetter,
h *Handle) error {
offline := keybase1.OfflineAvailability_NONE
if osg != nil {
offline = osg.OfflineAvailabilityForID(h.tlfID)
}
return identifyUsersForTLF(
ctx, nug, identifier, h.ResolvedUsersMap(), h.Type(), offline)
} | [
"func",
"IdentifyHandle",
"(",
"ctx",
"context",
".",
"Context",
",",
"nug",
"idutil",
".",
"NormalizedUsernameGetter",
",",
"identifier",
"idutil",
".",
"Identifier",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"h",
"*",
"Handle",
")",
"error",
"{",
"offline",
":=",
"keybase1",
".",
"OfflineAvailability_NONE",
"\n",
"if",
"osg",
"!=",
"nil",
"{",
"offline",
"=",
"osg",
".",
"OfflineAvailabilityForID",
"(",
"h",
".",
"tlfID",
")",
"\n",
"}",
"\n",
"return",
"identifyUsersForTLF",
"(",
"ctx",
",",
"nug",
",",
"identifier",
",",
"h",
".",
"ResolvedUsersMap",
"(",
")",
",",
"h",
".",
"Type",
"(",
")",
",",
"offline",
")",
"\n",
"}"
] | // IdentifyHandle identifies the canonical names in the given handle. | [
"IdentifyHandle",
"identifies",
"the",
"canonical",
"names",
"in",
"the",
"given",
"handle",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/identify_util.go#L369-L379 |
159,449 | keybase/client | go/kbfs/libdokan/fs.go | NewFS | func NewFS(ctx context.Context, config libkbfs.Config, log logger.Logger) (*FS, error) {
if currentUserSIDErr != nil {
return nil, currentUserSIDErr
}
quLog := config.MakeLogger(libkbfs.QuotaUsageLogModule("FS"))
f := &FS{
config: config,
log: log,
vlog: config.MakeVLogger(log),
notifications: libfs.NewFSNotifications(log),
quotaUsage: libkbfs.NewEventuallyConsistentQuotaUsage(
config, quLog, config.MakeVLogger(quLog)),
}
f.root = &Root{
private: &FolderList{
fs: f,
tlfType: tlf.Private,
folders: make(map[string]fileOpener),
aliasCache: map[string]string{},
},
public: &FolderList{
fs: f,
tlfType: tlf.Public,
folders: make(map[string]fileOpener),
aliasCache: map[string]string{},
},
team: &FolderList{
fs: f,
tlfType: tlf.SingleTeam,
folders: make(map[string]fileOpener),
aliasCache: map[string]string{},
}}
ctx = wrapContext(ctx, f)
f.remoteStatus.Init(ctx, f.log, f.config, f)
f.notifications.LaunchProcessor(ctx)
go clearFolderListCacheLoop(ctx, f.root)
return f, nil
} | go | func NewFS(ctx context.Context, config libkbfs.Config, log logger.Logger) (*FS, error) {
if currentUserSIDErr != nil {
return nil, currentUserSIDErr
}
quLog := config.MakeLogger(libkbfs.QuotaUsageLogModule("FS"))
f := &FS{
config: config,
log: log,
vlog: config.MakeVLogger(log),
notifications: libfs.NewFSNotifications(log),
quotaUsage: libkbfs.NewEventuallyConsistentQuotaUsage(
config, quLog, config.MakeVLogger(quLog)),
}
f.root = &Root{
private: &FolderList{
fs: f,
tlfType: tlf.Private,
folders: make(map[string]fileOpener),
aliasCache: map[string]string{},
},
public: &FolderList{
fs: f,
tlfType: tlf.Public,
folders: make(map[string]fileOpener),
aliasCache: map[string]string{},
},
team: &FolderList{
fs: f,
tlfType: tlf.SingleTeam,
folders: make(map[string]fileOpener),
aliasCache: map[string]string{},
}}
ctx = wrapContext(ctx, f)
f.remoteStatus.Init(ctx, f.log, f.config, f)
f.notifications.LaunchProcessor(ctx)
go clearFolderListCacheLoop(ctx, f.root)
return f, nil
} | [
"func",
"NewFS",
"(",
"ctx",
"context",
".",
"Context",
",",
"config",
"libkbfs",
".",
"Config",
",",
"log",
"logger",
".",
"Logger",
")",
"(",
"*",
"FS",
",",
"error",
")",
"{",
"if",
"currentUserSIDErr",
"!=",
"nil",
"{",
"return",
"nil",
",",
"currentUserSIDErr",
"\n",
"}",
"\n",
"quLog",
":=",
"config",
".",
"MakeLogger",
"(",
"libkbfs",
".",
"QuotaUsageLogModule",
"(",
"\"",
"\"",
")",
")",
"\n",
"f",
":=",
"&",
"FS",
"{",
"config",
":",
"config",
",",
"log",
":",
"log",
",",
"vlog",
":",
"config",
".",
"MakeVLogger",
"(",
"log",
")",
",",
"notifications",
":",
"libfs",
".",
"NewFSNotifications",
"(",
"log",
")",
",",
"quotaUsage",
":",
"libkbfs",
".",
"NewEventuallyConsistentQuotaUsage",
"(",
"config",
",",
"quLog",
",",
"config",
".",
"MakeVLogger",
"(",
"quLog",
")",
")",
",",
"}",
"\n\n",
"f",
".",
"root",
"=",
"&",
"Root",
"{",
"private",
":",
"&",
"FolderList",
"{",
"fs",
":",
"f",
",",
"tlfType",
":",
"tlf",
".",
"Private",
",",
"folders",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"fileOpener",
")",
",",
"aliasCache",
":",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
",",
"}",
",",
"public",
":",
"&",
"FolderList",
"{",
"fs",
":",
"f",
",",
"tlfType",
":",
"tlf",
".",
"Public",
",",
"folders",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"fileOpener",
")",
",",
"aliasCache",
":",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
",",
"}",
",",
"team",
":",
"&",
"FolderList",
"{",
"fs",
":",
"f",
",",
"tlfType",
":",
"tlf",
".",
"SingleTeam",
",",
"folders",
":",
"make",
"(",
"map",
"[",
"string",
"]",
"fileOpener",
")",
",",
"aliasCache",
":",
"map",
"[",
"string",
"]",
"string",
"{",
"}",
",",
"}",
"}",
"\n\n",
"ctx",
"=",
"wrapContext",
"(",
"ctx",
",",
"f",
")",
"\n\n",
"f",
".",
"remoteStatus",
".",
"Init",
"(",
"ctx",
",",
"f",
".",
"log",
",",
"f",
".",
"config",
",",
"f",
")",
"\n",
"f",
".",
"notifications",
".",
"LaunchProcessor",
"(",
"ctx",
")",
"\n",
"go",
"clearFolderListCacheLoop",
"(",
"ctx",
",",
"f",
".",
"root",
")",
"\n\n",
"return",
"f",
",",
"nil",
"\n",
"}"
] | // NewFS creates an FS | [
"NewFS",
"creates",
"an",
"FS"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L55-L96 |
159,450 | keybase/client | go/kbfs/libdokan/fs.go | wrapContext | func wrapContext(ctx context.Context, f *FS) context.Context {
ctx = context.WithValue(ctx, libfs.CtxAppIDKey, f)
logTags := make(logger.CtxLogTags)
logTags[CtxIDKey] = CtxOpID
ctx = logger.NewContextWithLogTags(ctx, logTags)
return ctx
} | go | func wrapContext(ctx context.Context, f *FS) context.Context {
ctx = context.WithValue(ctx, libfs.CtxAppIDKey, f)
logTags := make(logger.CtxLogTags)
logTags[CtxIDKey] = CtxOpID
ctx = logger.NewContextWithLogTags(ctx, logTags)
return ctx
} | [
"func",
"wrapContext",
"(",
"ctx",
"context",
".",
"Context",
",",
"f",
"*",
"FS",
")",
"context",
".",
"Context",
"{",
"ctx",
"=",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"libfs",
".",
"CtxAppIDKey",
",",
"f",
")",
"\n",
"logTags",
":=",
"make",
"(",
"logger",
".",
"CtxLogTags",
")",
"\n",
"logTags",
"[",
"CtxIDKey",
"]",
"=",
"CtxOpID",
"\n",
"ctx",
"=",
"logger",
".",
"NewContextWithLogTags",
"(",
"ctx",
",",
"logTags",
")",
"\n",
"return",
"ctx",
"\n",
"}"
] | // Adds log tags etc | [
"Adds",
"log",
"tags",
"etc"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L99-L105 |
159,451 | keybase/client | go/kbfs/libdokan/fs.go | WithContext | func (f *FS) WithContext(ctx context.Context) (context.Context, context.CancelFunc) {
id, err := libkbfs.MakeRandomRequestID()
if err != nil {
f.log.CErrorf(ctx, "Couldn't make request ID: %v", err)
return ctx, func() {}
}
ctx, cancel := context.WithCancel(ctx)
// context.WithDeadline uses clock from `time` package, so we are not using
// f.config.Clock() here
start := time.Now()
ctx, err = libcontext.NewContextWithCancellationDelayer(
libcontext.NewContextReplayable(ctx, func(ctx context.Context) context.Context {
ctx = wrapContext(context.WithValue(ctx, CtxIDKey, id), f)
ctx, _ = context.WithDeadline(ctx, start.Add(29*time.Second))
return ctx
}))
if err != nil {
panic(err)
}
return ctx, cancel
} | go | func (f *FS) WithContext(ctx context.Context) (context.Context, context.CancelFunc) {
id, err := libkbfs.MakeRandomRequestID()
if err != nil {
f.log.CErrorf(ctx, "Couldn't make request ID: %v", err)
return ctx, func() {}
}
ctx, cancel := context.WithCancel(ctx)
// context.WithDeadline uses clock from `time` package, so we are not using
// f.config.Clock() here
start := time.Now()
ctx, err = libcontext.NewContextWithCancellationDelayer(
libcontext.NewContextReplayable(ctx, func(ctx context.Context) context.Context {
ctx = wrapContext(context.WithValue(ctx, CtxIDKey, id), f)
ctx, _ = context.WithDeadline(ctx, start.Add(29*time.Second))
return ctx
}))
if err != nil {
panic(err)
}
return ctx, cancel
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"context",
".",
"Context",
",",
"context",
".",
"CancelFunc",
")",
"{",
"id",
",",
"err",
":=",
"libkbfs",
".",
"MakeRandomRequestID",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"f",
".",
"log",
".",
"CErrorf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"ctx",
",",
"func",
"(",
")",
"{",
"}",
"\n",
"}",
"\n\n",
"ctx",
",",
"cancel",
":=",
"context",
".",
"WithCancel",
"(",
"ctx",
")",
"\n\n",
"// context.WithDeadline uses clock from `time` package, so we are not using",
"// f.config.Clock() here",
"start",
":=",
"time",
".",
"Now",
"(",
")",
"\n",
"ctx",
",",
"err",
"=",
"libcontext",
".",
"NewContextWithCancellationDelayer",
"(",
"libcontext",
".",
"NewContextReplayable",
"(",
"ctx",
",",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"context",
".",
"Context",
"{",
"ctx",
"=",
"wrapContext",
"(",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"CtxIDKey",
",",
"id",
")",
",",
"f",
")",
"\n",
"ctx",
",",
"_",
"=",
"context",
".",
"WithDeadline",
"(",
"ctx",
",",
"start",
".",
"Add",
"(",
"29",
"*",
"time",
".",
"Second",
")",
")",
"\n",
"return",
"ctx",
"\n",
"}",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"ctx",
",",
"cancel",
"\n",
"}"
] | // WithContext creates context for filesystem operations. | [
"WithContext",
"creates",
"context",
"for",
"filesystem",
"operations",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L108-L130 |
159,452 | keybase/client | go/kbfs/libdokan/fs.go | GetVolumeInformation | func (f *FS) GetVolumeInformation(ctx context.Context) (dokan.VolumeInformation, error) {
// TODO should this be explicitely refused to other users?
// As the mount is limited to current session there is little need.
return vinfo, nil
} | go | func (f *FS) GetVolumeInformation(ctx context.Context) (dokan.VolumeInformation, error) {
// TODO should this be explicitely refused to other users?
// As the mount is limited to current session there is little need.
return vinfo, nil
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"GetVolumeInformation",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"dokan",
".",
"VolumeInformation",
",",
"error",
")",
"{",
"// TODO should this be explicitely refused to other users?",
"// As the mount is limited to current session there is little need.",
"return",
"vinfo",
",",
"nil",
"\n",
"}"
] | // GetVolumeInformation returns information about the whole filesystem for dokan. | [
"GetVolumeInformation",
"returns",
"information",
"about",
"the",
"whole",
"filesystem",
"for",
"dokan",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L142-L146 |
159,453 | keybase/client | go/kbfs/libdokan/fs.go | GetDiskFreeSpace | func (f *FS) GetDiskFreeSpace(ctx context.Context) (freeSpace dokan.FreeSpace, err error) {
// TODO should this be refused to other users?
// As the mount is limited to current session there is little need.
f.logEnter(ctx, "FS GetDiskFreeSpace")
// Refuse private directories while we are in a error state.
if f.remoteStatus.ExtraFileName() != "" {
f.log.Warning("Dummy disk free space while errors are present!")
return dokan.FreeSpace{
TotalNumberOfBytes: dummyFreeSpace,
TotalNumberOfFreeBytes: dummyFreeSpace,
FreeBytesAvailable: dummyFreeSpace,
}, nil
}
defer func() {
if err == nil {
f.vlog.CLogf(ctx, libkb.VLog1, "Request complete")
} else {
// Don't report the error (perhaps resulting in a user
// notification) since this method is mostly called by the
// OS and not because of a user action.
f.log.CDebugf(ctx, err.Error())
}
}()
_, usageBytes, _, limitBytes, err := f.quotaUsage.Get(
ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance)
if err != nil {
return dokan.FreeSpace{}, errToDokan(err)
}
free := uint64(limitBytes - usageBytes)
return dokan.FreeSpace{
TotalNumberOfBytes: uint64(limitBytes),
TotalNumberOfFreeBytes: free,
FreeBytesAvailable: free,
}, nil
} | go | func (f *FS) GetDiskFreeSpace(ctx context.Context) (freeSpace dokan.FreeSpace, err error) {
// TODO should this be refused to other users?
// As the mount is limited to current session there is little need.
f.logEnter(ctx, "FS GetDiskFreeSpace")
// Refuse private directories while we are in a error state.
if f.remoteStatus.ExtraFileName() != "" {
f.log.Warning("Dummy disk free space while errors are present!")
return dokan.FreeSpace{
TotalNumberOfBytes: dummyFreeSpace,
TotalNumberOfFreeBytes: dummyFreeSpace,
FreeBytesAvailable: dummyFreeSpace,
}, nil
}
defer func() {
if err == nil {
f.vlog.CLogf(ctx, libkb.VLog1, "Request complete")
} else {
// Don't report the error (perhaps resulting in a user
// notification) since this method is mostly called by the
// OS and not because of a user action.
f.log.CDebugf(ctx, err.Error())
}
}()
_, usageBytes, _, limitBytes, err := f.quotaUsage.Get(
ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance)
if err != nil {
return dokan.FreeSpace{}, errToDokan(err)
}
free := uint64(limitBytes - usageBytes)
return dokan.FreeSpace{
TotalNumberOfBytes: uint64(limitBytes),
TotalNumberOfFreeBytes: free,
FreeBytesAvailable: free,
}, nil
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"GetDiskFreeSpace",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"freeSpace",
"dokan",
".",
"FreeSpace",
",",
"err",
"error",
")",
"{",
"// TODO should this be refused to other users?",
"// As the mount is limited to current session there is little need.",
"f",
".",
"logEnter",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"// Refuse private directories while we are in a error state.",
"if",
"f",
".",
"remoteStatus",
".",
"ExtraFileName",
"(",
")",
"!=",
"\"",
"\"",
"{",
"f",
".",
"log",
".",
"Warning",
"(",
"\"",
"\"",
")",
"\n",
"return",
"dokan",
".",
"FreeSpace",
"{",
"TotalNumberOfBytes",
":",
"dummyFreeSpace",
",",
"TotalNumberOfFreeBytes",
":",
"dummyFreeSpace",
",",
"FreeBytesAvailable",
":",
"dummyFreeSpace",
",",
"}",
",",
"nil",
"\n",
"}",
"\n",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"==",
"nil",
"{",
"f",
".",
"vlog",
".",
"CLogf",
"(",
"ctx",
",",
"libkb",
".",
"VLog1",
",",
"\"",
"\"",
")",
"\n",
"}",
"else",
"{",
"// Don't report the error (perhaps resulting in a user",
"// notification) since this method is mostly called by the",
"// OS and not because of a user action.",
"f",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"_",
",",
"usageBytes",
",",
"_",
",",
"limitBytes",
",",
"err",
":=",
"f",
".",
"quotaUsage",
".",
"Get",
"(",
"ctx",
",",
"quotaUsageStaleTolerance",
"/",
"2",
",",
"quotaUsageStaleTolerance",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"dokan",
".",
"FreeSpace",
"{",
"}",
",",
"errToDokan",
"(",
"err",
")",
"\n",
"}",
"\n",
"free",
":=",
"uint64",
"(",
"limitBytes",
"-",
"usageBytes",
")",
"\n",
"return",
"dokan",
".",
"FreeSpace",
"{",
"TotalNumberOfBytes",
":",
"uint64",
"(",
"limitBytes",
")",
",",
"TotalNumberOfFreeBytes",
":",
"free",
",",
"FreeBytesAvailable",
":",
"free",
",",
"}",
",",
"nil",
"\n",
"}"
] | // GetDiskFreeSpace returns information about free space on the volume for dokan. | [
"GetDiskFreeSpace",
"returns",
"information",
"about",
"free",
"space",
"on",
"the",
"volume",
"for",
"dokan",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L156-L190 |
159,454 | keybase/client | go/kbfs/libdokan/fs.go | isCreation | func (oc *openContext) isCreation() bool {
switch oc.CreateDisposition {
case dokan.FileSupersede, dokan.FileCreate, dokan.FileOpenIf, dokan.FileOverwriteIf:
return true
}
return false
} | go | func (oc *openContext) isCreation() bool {
switch oc.CreateDisposition {
case dokan.FileSupersede, dokan.FileCreate, dokan.FileOpenIf, dokan.FileOverwriteIf:
return true
}
return false
} | [
"func",
"(",
"oc",
"*",
"openContext",
")",
"isCreation",
"(",
")",
"bool",
"{",
"switch",
"oc",
".",
"CreateDisposition",
"{",
"case",
"dokan",
".",
"FileSupersede",
",",
"dokan",
".",
"FileCreate",
",",
"dokan",
".",
"FileOpenIf",
",",
"dokan",
".",
"FileOverwriteIf",
":",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // isCreation checks the flags whether a file creation is wanted. | [
"isCreation",
"checks",
"the",
"flags",
"whether",
"a",
"file",
"creation",
"is",
"wanted",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L218-L224 |
159,455 | keybase/client | go/kbfs/libdokan/fs.go | isTruncate | func (oc *openContext) isTruncate() bool {
switch oc.CreateDisposition {
case dokan.FileSupersede, dokan.FileOverwrite, dokan.FileOverwriteIf:
return true
}
return false
} | go | func (oc *openContext) isTruncate() bool {
switch oc.CreateDisposition {
case dokan.FileSupersede, dokan.FileOverwrite, dokan.FileOverwriteIf:
return true
}
return false
} | [
"func",
"(",
"oc",
"*",
"openContext",
")",
"isTruncate",
"(",
")",
"bool",
"{",
"switch",
"oc",
".",
"CreateDisposition",
"{",
"case",
"dokan",
".",
"FileSupersede",
",",
"dokan",
".",
"FileOverwrite",
",",
"dokan",
".",
"FileOverwriteIf",
":",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // isTruncate checks the flags whether a file truncation is wanted. | [
"isTruncate",
"checks",
"the",
"flags",
"whether",
"a",
"file",
"truncation",
"is",
"wanted",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L234-L240 |
159,456 | keybase/client | go/kbfs/libdokan/fs.go | returnDirNoCleanup | func (oc *openContext) returnDirNoCleanup(f dokan.File) (
dokan.File, dokan.CreateStatus, error) {
if err := oc.ReturningDirAllowed(); err != nil {
return nil, 0, err
}
return f, dokan.ExistingDir, nil
} | go | func (oc *openContext) returnDirNoCleanup(f dokan.File) (
dokan.File, dokan.CreateStatus, error) {
if err := oc.ReturningDirAllowed(); err != nil {
return nil, 0, err
}
return f, dokan.ExistingDir, nil
} | [
"func",
"(",
"oc",
"*",
"openContext",
")",
"returnDirNoCleanup",
"(",
"f",
"dokan",
".",
"File",
")",
"(",
"dokan",
".",
"File",
",",
"dokan",
".",
"CreateStatus",
",",
"error",
")",
"{",
"if",
"err",
":=",
"oc",
".",
"ReturningDirAllowed",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n",
"return",
"f",
",",
"dokan",
".",
"ExistingDir",
",",
"nil",
"\n",
"}"
] | // returnDirNoCleanup returns a dir or nothing depending on the open
// flags and does not call .Cleanup on error. | [
"returnDirNoCleanup",
"returns",
"a",
"dir",
"or",
"nothing",
"depending",
"on",
"the",
"open",
"flags",
"and",
"does",
"not",
"call",
".",
"Cleanup",
"on",
"error",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L249-L255 |
159,457 | keybase/client | go/kbfs/libdokan/fs.go | returnFileNoCleanup | func (oc *openContext) returnFileNoCleanup(f dokan.File) (
dokan.File, dokan.CreateStatus, error) {
if err := oc.ReturningFileAllowed(); err != nil {
return nil, 0, err
}
return f, dokan.ExistingFile, nil
} | go | func (oc *openContext) returnFileNoCleanup(f dokan.File) (
dokan.File, dokan.CreateStatus, error) {
if err := oc.ReturningFileAllowed(); err != nil {
return nil, 0, err
}
return f, dokan.ExistingFile, nil
} | [
"func",
"(",
"oc",
"*",
"openContext",
")",
"returnFileNoCleanup",
"(",
"f",
"dokan",
".",
"File",
")",
"(",
"dokan",
".",
"File",
",",
"dokan",
".",
"CreateStatus",
",",
"error",
")",
"{",
"if",
"err",
":=",
"oc",
".",
"ReturningFileAllowed",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n",
"return",
"f",
",",
"dokan",
".",
"ExistingFile",
",",
"nil",
"\n",
"}"
] | // returnFileNoCleanup returns a file or nothing depending on the open
// flags and does not call .Cleanup on error. | [
"returnFileNoCleanup",
"returns",
"a",
"file",
"or",
"nothing",
"depending",
"on",
"the",
"open",
"flags",
"and",
"does",
"not",
"call",
".",
"Cleanup",
"on",
"error",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L259-L265 |
159,458 | keybase/client | go/kbfs/libdokan/fs.go | CreateFile | func (f *FS) CreateFile(ctx context.Context, fi *dokan.FileInfo, cd *dokan.CreateData) (dokan.File, dokan.CreateStatus, error) {
// Only allow the current user access
if !fi.IsRequestorUserSidEqualTo(currentUserSID) {
f.log.CErrorf(ctx, "FS CreateFile - Refusing real access: SID match error")
return openFakeRoot(ctx, f, fi)
}
return f.openRaw(ctx, fi, cd)
} | go | func (f *FS) CreateFile(ctx context.Context, fi *dokan.FileInfo, cd *dokan.CreateData) (dokan.File, dokan.CreateStatus, error) {
// Only allow the current user access
if !fi.IsRequestorUserSidEqualTo(currentUserSID) {
f.log.CErrorf(ctx, "FS CreateFile - Refusing real access: SID match error")
return openFakeRoot(ctx, f, fi)
}
return f.openRaw(ctx, fi, cd)
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"CreateFile",
"(",
"ctx",
"context",
".",
"Context",
",",
"fi",
"*",
"dokan",
".",
"FileInfo",
",",
"cd",
"*",
"dokan",
".",
"CreateData",
")",
"(",
"dokan",
".",
"File",
",",
"dokan",
".",
"CreateStatus",
",",
"error",
")",
"{",
"// Only allow the current user access",
"if",
"!",
"fi",
".",
"IsRequestorUserSidEqualTo",
"(",
"currentUserSID",
")",
"{",
"f",
".",
"log",
".",
"CErrorf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"return",
"openFakeRoot",
"(",
"ctx",
",",
"f",
",",
"fi",
")",
"\n",
"}",
"\n",
"return",
"f",
".",
"openRaw",
"(",
"ctx",
",",
"fi",
",",
"cd",
")",
"\n",
"}"
] | // CreateFile called from dokan, may be a file or directory. | [
"CreateFile",
"called",
"from",
"dokan",
"may",
"be",
"a",
"file",
"or",
"directory",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L280-L287 |
159,459 | keybase/client | go/kbfs/libdokan/fs.go | windowsPathSplit | func windowsPathSplit(raw string) ([]string, error) {
if raw == `` {
raw = `\`
}
if raw[0] != '\\' || raw[len(raw)-1] == '*' {
return nil, dokan.ErrObjectNameNotFound
}
return strings.Split(raw[1:], `\`), nil
} | go | func windowsPathSplit(raw string) ([]string, error) {
if raw == `` {
raw = `\`
}
if raw[0] != '\\' || raw[len(raw)-1] == '*' {
return nil, dokan.ErrObjectNameNotFound
}
return strings.Split(raw[1:], `\`), nil
} | [
"func",
"windowsPathSplit",
"(",
"raw",
"string",
")",
"(",
"[",
"]",
"string",
",",
"error",
")",
"{",
"if",
"raw",
"==",
"``",
"{",
"raw",
"=",
"`\\`",
"\n",
"}",
"\n",
"if",
"raw",
"[",
"0",
"]",
"!=",
"'\\\\'",
"||",
"raw",
"[",
"len",
"(",
"raw",
")",
"-",
"1",
"]",
"==",
"'*'",
"{",
"return",
"nil",
",",
"dokan",
".",
"ErrObjectNameNotFound",
"\n",
"}",
"\n",
"return",
"strings",
".",
"Split",
"(",
"raw",
"[",
"1",
":",
"]",
",",
"`\\`",
")",
",",
"nil",
"\n",
"}"
] | // windowsPathSplit handles paths we get from Dokan.
// As a special case `` means `\`, it gets generated
// on special occasions. | [
"windowsPathSplit",
"handles",
"paths",
"we",
"get",
"from",
"Dokan",
".",
"As",
"a",
"special",
"case",
"means",
"\\",
"it",
"gets",
"generated",
"on",
"special",
"occasions",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L411-L419 |
159,460 | keybase/client | go/kbfs/libdokan/fs.go | Printf | func (f *FS) Printf(fmt string, args ...interface{}) {
f.log.Info("Dokan info: "+fmt, args...)
} | go | func (f *FS) Printf(fmt string, args ...interface{}) {
f.log.Info("Dokan info: "+fmt, args...)
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"Printf",
"(",
"fmt",
"string",
",",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"f",
".",
"log",
".",
"Info",
"(",
"\"",
"\"",
"+",
"fmt",
",",
"args",
"...",
")",
"\n",
"}"
] | // Printf prints information from the Dokan library. | [
"Printf",
"prints",
"information",
"from",
"the",
"Dokan",
"library",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L427-L429 |
159,461 | keybase/client | go/kbfs/libdokan/fs.go | UserChanged | func (f *FS) UserChanged(ctx context.Context, oldName, newName kbname.NormalizedUsername) {
f.log.CDebugf(ctx, "User changed: %q -> %q", oldName, newName)
f.root.public.userChanged(ctx, oldName, newName)
f.root.private.userChanged(ctx, oldName, newName)
} | go | func (f *FS) UserChanged(ctx context.Context, oldName, newName kbname.NormalizedUsername) {
f.log.CDebugf(ctx, "User changed: %q -> %q", oldName, newName)
f.root.public.userChanged(ctx, oldName, newName)
f.root.private.userChanged(ctx, oldName, newName)
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"UserChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"oldName",
",",
"newName",
"kbname",
".",
"NormalizedUsername",
")",
"{",
"f",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"oldName",
",",
"newName",
")",
"\n",
"f",
".",
"root",
".",
"public",
".",
"userChanged",
"(",
"ctx",
",",
"oldName",
",",
"newName",
")",
"\n",
"f",
".",
"root",
".",
"private",
".",
"userChanged",
"(",
"ctx",
",",
"oldName",
",",
"newName",
")",
"\n",
"}"
] | // UserChanged is called from libfs. | [
"UserChanged",
"is",
"called",
"from",
"libfs",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L658-L662 |
159,462 | keybase/client | go/kbfs/libdokan/fs.go | GetFileInformation | func (r *Root) GetFileInformation(ctx context.Context, fi *dokan.FileInfo) (*dokan.Stat, error) {
return defaultDirectoryInformation()
} | go | func (r *Root) GetFileInformation(ctx context.Context, fi *dokan.FileInfo) (*dokan.Stat, error) {
return defaultDirectoryInformation()
} | [
"func",
"(",
"r",
"*",
"Root",
")",
"GetFileInformation",
"(",
"ctx",
"context",
".",
"Context",
",",
"fi",
"*",
"dokan",
".",
"FileInfo",
")",
"(",
"*",
"dokan",
".",
"Stat",
",",
"error",
")",
"{",
"return",
"defaultDirectoryInformation",
"(",
")",
"\n",
"}"
] | // GetFileInformation for dokan stats. | [
"GetFileInformation",
"for",
"dokan",
"stats",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L675-L677 |
159,463 | keybase/client | go/kbfs/libdokan/fs.go | FindFiles | func (r *Root) FindFiles(ctx context.Context, fi *dokan.FileInfo, ignored string, callback func(*dokan.NamedStat) error) error {
var ns dokan.NamedStat
var err error
ns.FileAttributes = dokan.FileAttributeDirectory
ename, esize := r.private.fs.remoteStatus.ExtraFileNameAndSize()
switch ename {
case "":
ns.Name = PrivateName
err = callback(&ns)
if err != nil {
return err
}
ns.Name = TeamName
err = callback(&ns)
if err != nil {
return err
}
fallthrough
case libfs.HumanNoLoginFileName:
ns.Name = PublicName
err = callback(&ns)
if err != nil {
return err
}
}
if ename != "" {
ns.Name = ename
ns.FileAttributes = dokan.FileAttributeNormal
ns.FileSize = esize
err = callback(&ns)
if err != nil {
return err
}
}
return nil
} | go | func (r *Root) FindFiles(ctx context.Context, fi *dokan.FileInfo, ignored string, callback func(*dokan.NamedStat) error) error {
var ns dokan.NamedStat
var err error
ns.FileAttributes = dokan.FileAttributeDirectory
ename, esize := r.private.fs.remoteStatus.ExtraFileNameAndSize()
switch ename {
case "":
ns.Name = PrivateName
err = callback(&ns)
if err != nil {
return err
}
ns.Name = TeamName
err = callback(&ns)
if err != nil {
return err
}
fallthrough
case libfs.HumanNoLoginFileName:
ns.Name = PublicName
err = callback(&ns)
if err != nil {
return err
}
}
if ename != "" {
ns.Name = ename
ns.FileAttributes = dokan.FileAttributeNormal
ns.FileSize = esize
err = callback(&ns)
if err != nil {
return err
}
}
return nil
} | [
"func",
"(",
"r",
"*",
"Root",
")",
"FindFiles",
"(",
"ctx",
"context",
".",
"Context",
",",
"fi",
"*",
"dokan",
".",
"FileInfo",
",",
"ignored",
"string",
",",
"callback",
"func",
"(",
"*",
"dokan",
".",
"NamedStat",
")",
"error",
")",
"error",
"{",
"var",
"ns",
"dokan",
".",
"NamedStat",
"\n",
"var",
"err",
"error",
"\n",
"ns",
".",
"FileAttributes",
"=",
"dokan",
".",
"FileAttributeDirectory",
"\n",
"ename",
",",
"esize",
":=",
"r",
".",
"private",
".",
"fs",
".",
"remoteStatus",
".",
"ExtraFileNameAndSize",
"(",
")",
"\n",
"switch",
"ename",
"{",
"case",
"\"",
"\"",
":",
"ns",
".",
"Name",
"=",
"PrivateName",
"\n",
"err",
"=",
"callback",
"(",
"&",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"ns",
".",
"Name",
"=",
"TeamName",
"\n",
"err",
"=",
"callback",
"(",
"&",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"fallthrough",
"\n",
"case",
"libfs",
".",
"HumanNoLoginFileName",
":",
"ns",
".",
"Name",
"=",
"PublicName",
"\n",
"err",
"=",
"callback",
"(",
"&",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"ename",
"!=",
"\"",
"\"",
"{",
"ns",
".",
"Name",
"=",
"ename",
"\n",
"ns",
".",
"FileAttributes",
"=",
"dokan",
".",
"FileAttributeNormal",
"\n",
"ns",
".",
"FileSize",
"=",
"esize",
"\n",
"err",
"=",
"callback",
"(",
"&",
"ns",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // FindFiles for dokan readdir. | [
"FindFiles",
"for",
"dokan",
"readdir",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/fs.go#L680-L715 |
159,464 | keybase/client | go/kbfs/libfs/file_info_file.go | GetFileInfo | func GetFileInfo(
ctx context.Context, config libkbfs.Config, dir libkbfs.Node, name string) (
data []byte, t time.Time, err error) {
node, ei, err := config.KBFSOps().Lookup(ctx, dir, name)
if err != nil {
return nil, time.Time{}, err
}
nmd, err := config.KBFSOps().GetNodeMetadata(ctx, node)
if err != nil {
return nil, time.Time{}, err
}
data, err = PrettyJSON(fileInfoFile{nmd, ei.PrevRevisions})
if err != nil {
return nil, time.Time{}, err
}
return data, time.Unix(0, ei.Mtime), nil
} | go | func GetFileInfo(
ctx context.Context, config libkbfs.Config, dir libkbfs.Node, name string) (
data []byte, t time.Time, err error) {
node, ei, err := config.KBFSOps().Lookup(ctx, dir, name)
if err != nil {
return nil, time.Time{}, err
}
nmd, err := config.KBFSOps().GetNodeMetadata(ctx, node)
if err != nil {
return nil, time.Time{}, err
}
data, err = PrettyJSON(fileInfoFile{nmd, ei.PrevRevisions})
if err != nil {
return nil, time.Time{}, err
}
return data, time.Unix(0, ei.Mtime), nil
} | [
"func",
"GetFileInfo",
"(",
"ctx",
"context",
".",
"Context",
",",
"config",
"libkbfs",
".",
"Config",
",",
"dir",
"libkbfs",
".",
"Node",
",",
"name",
"string",
")",
"(",
"data",
"[",
"]",
"byte",
",",
"t",
"time",
".",
"Time",
",",
"err",
"error",
")",
"{",
"node",
",",
"ei",
",",
"err",
":=",
"config",
".",
"KBFSOps",
"(",
")",
".",
"Lookup",
"(",
"ctx",
",",
"dir",
",",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"nmd",
",",
"err",
":=",
"config",
".",
"KBFSOps",
"(",
")",
".",
"GetNodeMetadata",
"(",
"ctx",
",",
"node",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"data",
",",
"err",
"=",
"PrettyJSON",
"(",
"fileInfoFile",
"{",
"nmd",
",",
"ei",
".",
"PrevRevisions",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"return",
"data",
",",
"time",
".",
"Unix",
"(",
"0",
",",
"ei",
".",
"Mtime",
")",
",",
"nil",
"\n",
"}"
] | // GetFileInfo returns serialized JSON containing status information
// for a file or directory entry. | [
"GetFileInfo",
"returns",
"serialized",
"JSON",
"containing",
"status",
"information",
"for",
"a",
"file",
"or",
"directory",
"entry",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/file_info_file.go#L22-L38 |
159,465 | keybase/client | go/engine/favorite_list.go | NewFavoriteList | func NewFavoriteList(g *libkb.GlobalContext) *FavoriteList {
return &FavoriteList{
Contextified: libkb.NewContextified(g),
}
} | go | func NewFavoriteList(g *libkb.GlobalContext) *FavoriteList {
return &FavoriteList{
Contextified: libkb.NewContextified(g),
}
} | [
"func",
"NewFavoriteList",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"FavoriteList",
"{",
"return",
"&",
"FavoriteList",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
",",
"}",
"\n",
"}"
] | // NewFavoriteList creates a FavoriteList engine. | [
"NewFavoriteList",
"creates",
"a",
"FavoriteList",
"engine",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/favorite_list.go#L18-L22 |
159,466 | keybase/client | go/engine/favorite_list.go | Result | func (e *FavoriteList) Result() keybase1.FavoritesResult {
return keybase1.FavoritesResult{
FavoriteFolders: e.result.Favorites,
IgnoredFolders: e.result.Ignored,
NewFolders: e.result.New,
}
} | go | func (e *FavoriteList) Result() keybase1.FavoritesResult {
return keybase1.FavoritesResult{
FavoriteFolders: e.result.Favorites,
IgnoredFolders: e.result.Ignored,
NewFolders: e.result.New,
}
} | [
"func",
"(",
"e",
"*",
"FavoriteList",
")",
"Result",
"(",
")",
"keybase1",
".",
"FavoritesResult",
"{",
"return",
"keybase1",
".",
"FavoritesResult",
"{",
"FavoriteFolders",
":",
"e",
".",
"result",
".",
"Favorites",
",",
"IgnoredFolders",
":",
"e",
".",
"result",
".",
"Ignored",
",",
"NewFolders",
":",
"e",
".",
"result",
".",
"New",
",",
"}",
"\n",
"}"
] | // Favorites returns the list of favorites that Run generated. | [
"Favorites",
"returns",
"the",
"list",
"of",
"favorites",
"that",
"Run",
"generated",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/favorite_list.go#L89-L95 |
159,467 | keybase/client | go/client/wallet_api_handler.go | newWalletAPIHandler | func newWalletAPIHandler(g *libkb.GlobalContext, indentOutput bool) *walletAPIHandler {
return &walletAPIHandler{Contextified: libkb.NewContextified(g), indent: indentOutput}
} | go | func newWalletAPIHandler(g *libkb.GlobalContext, indentOutput bool) *walletAPIHandler {
return &walletAPIHandler{Contextified: libkb.NewContextified(g), indent: indentOutput}
} | [
"func",
"newWalletAPIHandler",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"indentOutput",
"bool",
")",
"*",
"walletAPIHandler",
"{",
"return",
"&",
"walletAPIHandler",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
",",
"indent",
":",
"indentOutput",
"}",
"\n",
"}"
] | // newWalletAPIHandler makes a walletAPIHandler. | [
"newWalletAPIHandler",
"makes",
"a",
"walletAPIHandler",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L51-L53 |
159,468 | keybase/client | go/client/wallet_api_handler.go | handle | func (w *walletAPIHandler) handle(ctx context.Context, c Call, wr io.Writer) error {
switch c.Params.Version {
case 0, 1:
return w.handleV1(ctx, c, wr)
default:
return ErrInvalidVersion{version: c.Params.Version}
}
} | go | func (w *walletAPIHandler) handle(ctx context.Context, c Call, wr io.Writer) error {
switch c.Params.Version {
case 0, 1:
return w.handleV1(ctx, c, wr)
default:
return ErrInvalidVersion{version: c.Params.Version}
}
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"handle",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"switch",
"c",
".",
"Params",
".",
"Version",
"{",
"case",
"0",
",",
"1",
":",
"return",
"w",
".",
"handleV1",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"default",
":",
"return",
"ErrInvalidVersion",
"{",
"version",
":",
"c",
".",
"Params",
".",
"Version",
"}",
"\n",
"}",
"\n",
"}"
] | // handle processes the Call based on the version. | [
"handle",
"processes",
"the",
"Call",
"based",
"on",
"the",
"version",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L56-L63 |
159,469 | keybase/client | go/client/wallet_api_handler.go | handleV1 | func (w *walletAPIHandler) handleV1(ctx context.Context, c Call, wr io.Writer) error {
if !validWalletMethodsV1[c.Method] {
return ErrInvalidMethod{name: c.Method, version: 1}
}
cli, err := GetWalletClient(w.G())
if err != nil {
return err
}
w.cli = cli
switch c.Method {
case balancesMethod:
return w.balances(ctx, c, wr)
case batchMethod:
return w.batch(ctx, c, wr)
case cancelMethod:
return w.cancelPayment(ctx, c, wr)
case detailsMethod:
return w.details(ctx, c, wr)
case getInflationMethod:
return w.getInflation(ctx, c, wr)
case historyMethod:
return w.history(ctx, c, wr)
case initializeMethod:
return w.initializeWallet(ctx, c, wr)
case lookupMethod:
return w.lookup(ctx, c, wr)
case sendMethod:
return w.send(ctx, c, wr)
case setInflationMethod:
return w.setInflation(ctx, c, wr)
default:
return ErrInvalidMethod{name: c.Method, version: 1}
}
} | go | func (w *walletAPIHandler) handleV1(ctx context.Context, c Call, wr io.Writer) error {
if !validWalletMethodsV1[c.Method] {
return ErrInvalidMethod{name: c.Method, version: 1}
}
cli, err := GetWalletClient(w.G())
if err != nil {
return err
}
w.cli = cli
switch c.Method {
case balancesMethod:
return w.balances(ctx, c, wr)
case batchMethod:
return w.batch(ctx, c, wr)
case cancelMethod:
return w.cancelPayment(ctx, c, wr)
case detailsMethod:
return w.details(ctx, c, wr)
case getInflationMethod:
return w.getInflation(ctx, c, wr)
case historyMethod:
return w.history(ctx, c, wr)
case initializeMethod:
return w.initializeWallet(ctx, c, wr)
case lookupMethod:
return w.lookup(ctx, c, wr)
case sendMethod:
return w.send(ctx, c, wr)
case setInflationMethod:
return w.setInflation(ctx, c, wr)
default:
return ErrInvalidMethod{name: c.Method, version: 1}
}
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"handleV1",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"if",
"!",
"validWalletMethodsV1",
"[",
"c",
".",
"Method",
"]",
"{",
"return",
"ErrInvalidMethod",
"{",
"name",
":",
"c",
".",
"Method",
",",
"version",
":",
"1",
"}",
"\n",
"}",
"\n\n",
"cli",
",",
"err",
":=",
"GetWalletClient",
"(",
"w",
".",
"G",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"w",
".",
"cli",
"=",
"cli",
"\n\n",
"switch",
"c",
".",
"Method",
"{",
"case",
"balancesMethod",
":",
"return",
"w",
".",
"balances",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"batchMethod",
":",
"return",
"w",
".",
"batch",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"cancelMethod",
":",
"return",
"w",
".",
"cancelPayment",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"detailsMethod",
":",
"return",
"w",
".",
"details",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"getInflationMethod",
":",
"return",
"w",
".",
"getInflation",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"historyMethod",
":",
"return",
"w",
".",
"history",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"initializeMethod",
":",
"return",
"w",
".",
"initializeWallet",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"lookupMethod",
":",
"return",
"w",
".",
"lookup",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"sendMethod",
":",
"return",
"w",
".",
"send",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"case",
"setInflationMethod",
":",
"return",
"w",
".",
"setInflation",
"(",
"ctx",
",",
"c",
",",
"wr",
")",
"\n",
"default",
":",
"return",
"ErrInvalidMethod",
"{",
"name",
":",
"c",
".",
"Method",
",",
"version",
":",
"1",
"}",
"\n",
"}",
"\n",
"}"
] | // handleV1 processes Call for version 1 of the wallet JSON API. | [
"handleV1",
"processes",
"Call",
"for",
"version",
"1",
"of",
"the",
"wallet",
"JSON",
"API",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L94-L129 |
159,470 | keybase/client | go/client/wallet_api_handler.go | balances | func (w *walletAPIHandler) balances(ctx context.Context, c Call, wr io.Writer) error {
accounts, err := w.cli.WalletGetAccountsCLILocal(ctx)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, accounts, wr)
} | go | func (w *walletAPIHandler) balances(ctx context.Context, c Call, wr io.Writer) error {
accounts, err := w.cli.WalletGetAccountsCLILocal(ctx)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, accounts, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"balances",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"accounts",
",",
"err",
":=",
"w",
".",
"cli",
".",
"WalletGetAccountsCLILocal",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"accounts",
",",
"wr",
")",
"\n",
"}"
] | // balances returns the account balances for all accounts owned by the current user. | [
"balances",
"returns",
"the",
"account",
"balances",
"for",
"all",
"accounts",
"owned",
"by",
"the",
"current",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L132-L138 |
159,471 | keybase/client | go/client/wallet_api_handler.go | batch | func (w *walletAPIHandler) batch(ctx context.Context, c Call, wr io.Writer) error {
var opts batchOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
arg := stellar1.BatchLocalArg{
BatchID: opts.BatchID,
TimeoutSecs: opts.Timeout,
UseMulti: true,
}
for _, p := range opts.Payments {
arg.Payments = append(arg.Payments, stellar1.BatchPaymentArg{Recipient: p.Recipient, Amount: p.Amount, Message: p.Message})
}
result, err := w.cli.BatchLocal(ctx, arg)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, result, wr)
} | go | func (w *walletAPIHandler) batch(ctx context.Context, c Call, wr io.Writer) error {
var opts batchOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
arg := stellar1.BatchLocalArg{
BatchID: opts.BatchID,
TimeoutSecs: opts.Timeout,
UseMulti: true,
}
for _, p := range opts.Payments {
arg.Payments = append(arg.Payments, stellar1.BatchPaymentArg{Recipient: p.Recipient, Amount: p.Amount, Message: p.Message})
}
result, err := w.cli.BatchLocal(ctx, arg)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, result, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"batch",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"batchOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"arg",
":=",
"stellar1",
".",
"BatchLocalArg",
"{",
"BatchID",
":",
"opts",
".",
"BatchID",
",",
"TimeoutSecs",
":",
"opts",
".",
"Timeout",
",",
"UseMulti",
":",
"true",
",",
"}",
"\n",
"for",
"_",
",",
"p",
":=",
"range",
"opts",
".",
"Payments",
"{",
"arg",
".",
"Payments",
"=",
"append",
"(",
"arg",
".",
"Payments",
",",
"stellar1",
".",
"BatchPaymentArg",
"{",
"Recipient",
":",
"p",
".",
"Recipient",
",",
"Amount",
":",
"p",
".",
"Amount",
",",
"Message",
":",
"p",
".",
"Message",
"}",
")",
"\n",
"}",
"\n\n",
"result",
",",
"err",
":=",
"w",
".",
"cli",
".",
"BatchLocal",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"result",
",",
"wr",
")",
"\n",
"}"
] | // batch submits a batch of payments as fast as it can. | [
"batch",
"submits",
"a",
"batch",
"of",
"payments",
"as",
"fast",
"as",
"it",
"can",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L141-L162 |
159,472 | keybase/client | go/client/wallet_api_handler.go | cancelPayment | func (w *walletAPIHandler) cancelPayment(ctx context.Context, c Call, wr io.Writer) error {
var opts txIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
result, err := w.cli.ClaimCLILocal(ctx, stellar1.ClaimCLILocalArg{TxID: opts.TxID})
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, result, wr)
} | go | func (w *walletAPIHandler) cancelPayment(ctx context.Context, c Call, wr io.Writer) error {
var opts txIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
result, err := w.cli.ClaimCLILocal(ctx, stellar1.ClaimCLILocalArg{TxID: opts.TxID})
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, result, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"cancelPayment",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"txIDOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"result",
",",
"err",
":=",
"w",
".",
"cli",
".",
"ClaimCLILocal",
"(",
"ctx",
",",
"stellar1",
".",
"ClaimCLILocalArg",
"{",
"TxID",
":",
"opts",
".",
"TxID",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"result",
",",
"wr",
")",
"\n",
"}"
] | // cancelPayment cancels a pending relay payment and yanks back the funds. | [
"cancelPayment",
"cancels",
"a",
"pending",
"relay",
"payment",
"and",
"yanks",
"back",
"the",
"funds",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L165-L175 |
159,473 | keybase/client | go/client/wallet_api_handler.go | details | func (w *walletAPIHandler) details(ctx context.Context, c Call, wr io.Writer) error {
var opts txIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
detail, err := w.cli.PaymentDetailCLILocal(ctx, opts.TxID)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, detail, wr)
} | go | func (w *walletAPIHandler) details(ctx context.Context, c Call, wr io.Writer) error {
var opts txIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
detail, err := w.cli.PaymentDetailCLILocal(ctx, opts.TxID)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, detail, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"details",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"txIDOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"detail",
",",
"err",
":=",
"w",
".",
"cli",
".",
"PaymentDetailCLILocal",
"(",
"ctx",
",",
"opts",
".",
"TxID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"detail",
",",
"wr",
")",
"\n",
"}"
] | // details outputs details for a single transaction. | [
"details",
"outputs",
"details",
"for",
"a",
"single",
"transaction",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L178-L188 |
159,474 | keybase/client | go/client/wallet_api_handler.go | getInflation | func (w *walletAPIHandler) getInflation(ctx context.Context, c Call, wr io.Writer) error {
var opts accountIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
inflation, err := w.getInflationLocal(ctx, opts.Convert())
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, inflation, wr)
} | go | func (w *walletAPIHandler) getInflation(ctx context.Context, c Call, wr io.Writer) error {
var opts accountIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
inflation, err := w.getInflationLocal(ctx, opts.Convert())
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, inflation, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"getInflation",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"accountIDOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"inflation",
",",
"err",
":=",
"w",
".",
"getInflationLocal",
"(",
"ctx",
",",
"opts",
".",
"Convert",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"inflation",
",",
"wr",
")",
"\n",
"}"
] | // getInflation gets the inflation destination for an account. | [
"getInflation",
"gets",
"the",
"inflation",
"destination",
"for",
"an",
"account",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L191-L203 |
159,475 | keybase/client | go/client/wallet_api_handler.go | history | func (w *walletAPIHandler) history(ctx context.Context, c Call, wr io.Writer) error {
var opts accountIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
a := opts.Convert()
payments, err := w.cli.RecentPaymentsCLILocal(ctx, &a)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, payments, wr)
} | go | func (w *walletAPIHandler) history(ctx context.Context, c Call, wr io.Writer) error {
var opts accountIDOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
a := opts.Convert()
payments, err := w.cli.RecentPaymentsCLILocal(ctx, &a)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, payments, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"history",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"accountIDOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"a",
":=",
"opts",
".",
"Convert",
"(",
")",
"\n",
"payments",
",",
"err",
":=",
"w",
".",
"cli",
".",
"RecentPaymentsCLILocal",
"(",
"ctx",
",",
"&",
"a",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"payments",
",",
"wr",
")",
"\n",
"}"
] | // history outputs recent payment history for the specified account ID. | [
"history",
"outputs",
"recent",
"payment",
"history",
"for",
"the",
"specified",
"account",
"ID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L206-L217 |
159,476 | keybase/client | go/client/wallet_api_handler.go | lookup | func (w *walletAPIHandler) lookup(ctx context.Context, c Call, wr io.Writer) error {
var opts nameOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
if err := w.registerIdentifyUI(); err != nil {
return w.encodeErr(c, err, wr)
}
result, err := w.cli.LookupCLILocal(ctx, opts.Name)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, result, wr)
} | go | func (w *walletAPIHandler) lookup(ctx context.Context, c Call, wr io.Writer) error {
var opts nameOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
if err := w.registerIdentifyUI(); err != nil {
return w.encodeErr(c, err, wr)
}
result, err := w.cli.LookupCLILocal(ctx, opts.Name)
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, result, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"lookup",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"nameOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"w",
".",
"registerIdentifyUI",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"result",
",",
"err",
":=",
"w",
".",
"cli",
".",
"LookupCLILocal",
"(",
"ctx",
",",
"opts",
".",
"Name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"result",
",",
"wr",
")",
"\n",
"}"
] | // lookup outputs an account ID for a keybase username or federation address. | [
"lookup",
"outputs",
"an",
"account",
"ID",
"for",
"a",
"keybase",
"username",
"or",
"federation",
"address",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L230-L244 |
159,477 | keybase/client | go/client/wallet_api_handler.go | send | func (w *walletAPIHandler) send(ctx context.Context, c Call, wr io.Writer) error {
var opts sendOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
if err := w.registerIdentifyUI(); err != nil {
return w.encodeErr(c, err, wr)
}
// convert the amount if necessary
amount := opts.Amount
var displayAmount, displayCurrency string
if opts.Currency != "" && strings.ToUpper(opts.Currency) != "XLM" {
exchangeRate, err := w.cli.ExchangeRateLocal(ctx, stellar1.OutsideCurrencyCode(opts.Currency))
if err != nil {
return w.encodeErr(c, err, wr)
}
amount, err = stellarnet.ConvertOutsideToXLM(opts.Amount, exchangeRate.Rate)
if err != nil {
return w.encodeErr(c, err, wr)
}
displayAmount = opts.Amount
displayCurrency = opts.Currency
}
arg := stellar1.SendCLILocalArg{
Recipient: opts.Recipient,
Amount: amount,
Asset: stellar1.AssetNative(),
Note: opts.Message,
DisplayAmount: displayAmount,
DisplayCurrency: displayCurrency,
FromAccountID: stellar1.AccountID(opts.FromAccountID),
}
result, err := w.cli.SendCLILocal(ctx, arg)
if err != nil {
return w.encodeErr(c, err, wr)
}
detail, err := w.cli.PaymentDetailCLILocal(ctx, string(result.TxID))
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, detail, wr)
} | go | func (w *walletAPIHandler) send(ctx context.Context, c Call, wr io.Writer) error {
var opts sendOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
if err := w.registerIdentifyUI(); err != nil {
return w.encodeErr(c, err, wr)
}
// convert the amount if necessary
amount := opts.Amount
var displayAmount, displayCurrency string
if opts.Currency != "" && strings.ToUpper(opts.Currency) != "XLM" {
exchangeRate, err := w.cli.ExchangeRateLocal(ctx, stellar1.OutsideCurrencyCode(opts.Currency))
if err != nil {
return w.encodeErr(c, err, wr)
}
amount, err = stellarnet.ConvertOutsideToXLM(opts.Amount, exchangeRate.Rate)
if err != nil {
return w.encodeErr(c, err, wr)
}
displayAmount = opts.Amount
displayCurrency = opts.Currency
}
arg := stellar1.SendCLILocalArg{
Recipient: opts.Recipient,
Amount: amount,
Asset: stellar1.AssetNative(),
Note: opts.Message,
DisplayAmount: displayAmount,
DisplayCurrency: displayCurrency,
FromAccountID: stellar1.AccountID(opts.FromAccountID),
}
result, err := w.cli.SendCLILocal(ctx, arg)
if err != nil {
return w.encodeErr(c, err, wr)
}
detail, err := w.cli.PaymentDetailCLILocal(ctx, string(result.TxID))
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, detail, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"send",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"sendOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"w",
".",
"registerIdentifyUI",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"// convert the amount if necessary",
"amount",
":=",
"opts",
".",
"Amount",
"\n",
"var",
"displayAmount",
",",
"displayCurrency",
"string",
"\n",
"if",
"opts",
".",
"Currency",
"!=",
"\"",
"\"",
"&&",
"strings",
".",
"ToUpper",
"(",
"opts",
".",
"Currency",
")",
"!=",
"\"",
"\"",
"{",
"exchangeRate",
",",
"err",
":=",
"w",
".",
"cli",
".",
"ExchangeRateLocal",
"(",
"ctx",
",",
"stellar1",
".",
"OutsideCurrencyCode",
"(",
"opts",
".",
"Currency",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"amount",
",",
"err",
"=",
"stellarnet",
".",
"ConvertOutsideToXLM",
"(",
"opts",
".",
"Amount",
",",
"exchangeRate",
".",
"Rate",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"displayAmount",
"=",
"opts",
".",
"Amount",
"\n",
"displayCurrency",
"=",
"opts",
".",
"Currency",
"\n",
"}",
"\n\n",
"arg",
":=",
"stellar1",
".",
"SendCLILocalArg",
"{",
"Recipient",
":",
"opts",
".",
"Recipient",
",",
"Amount",
":",
"amount",
",",
"Asset",
":",
"stellar1",
".",
"AssetNative",
"(",
")",
",",
"Note",
":",
"opts",
".",
"Message",
",",
"DisplayAmount",
":",
"displayAmount",
",",
"DisplayCurrency",
":",
"displayCurrency",
",",
"FromAccountID",
":",
"stellar1",
".",
"AccountID",
"(",
"opts",
".",
"FromAccountID",
")",
",",
"}",
"\n",
"result",
",",
"err",
":=",
"w",
".",
"cli",
".",
"SendCLILocal",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"detail",
",",
"err",
":=",
"w",
".",
"cli",
".",
"PaymentDetailCLILocal",
"(",
"ctx",
",",
"string",
"(",
"result",
".",
"TxID",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"detail",
",",
"wr",
")",
"\n",
"}"
] | // send sends XLM to an account. | [
"send",
"sends",
"XLM",
"to",
"an",
"account",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L247-L294 |
159,478 | keybase/client | go/client/wallet_api_handler.go | setInflation | func (w *walletAPIHandler) setInflation(ctx context.Context, c Call, wr io.Writer) error {
var opts inflationOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
destination, err := getInflationDestinationAddrFromString(w.cli, opts.AccountIDConvert(), opts.Destination)
if err != nil {
return w.encodeErr(c, err, wr)
}
arg := stellar1.SetInflationDestinationLocalArg{
AccountID: opts.AccountIDConvert(),
Destination: destination,
}
if err := w.cli.SetInflationDestinationLocal(ctx, arg); err != nil {
return w.encodeErr(c, err, wr)
}
// get it for display
inflation, err := w.getInflationLocal(ctx, opts.AccountIDConvert())
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, inflation, wr)
} | go | func (w *walletAPIHandler) setInflation(ctx context.Context, c Call, wr io.Writer) error {
var opts inflationOptions
if err := unmarshalOptions(c, &opts); err != nil {
return w.encodeErr(c, err, wr)
}
destination, err := getInflationDestinationAddrFromString(w.cli, opts.AccountIDConvert(), opts.Destination)
if err != nil {
return w.encodeErr(c, err, wr)
}
arg := stellar1.SetInflationDestinationLocalArg{
AccountID: opts.AccountIDConvert(),
Destination: destination,
}
if err := w.cli.SetInflationDestinationLocal(ctx, arg); err != nil {
return w.encodeErr(c, err, wr)
}
// get it for display
inflation, err := w.getInflationLocal(ctx, opts.AccountIDConvert())
if err != nil {
return w.encodeErr(c, err, wr)
}
return w.encodeResult(c, inflation, wr)
} | [
"func",
"(",
"w",
"*",
"walletAPIHandler",
")",
"setInflation",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"Call",
",",
"wr",
"io",
".",
"Writer",
")",
"error",
"{",
"var",
"opts",
"inflationOptions",
"\n",
"if",
"err",
":=",
"unmarshalOptions",
"(",
"c",
",",
"&",
"opts",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"destination",
",",
"err",
":=",
"getInflationDestinationAddrFromString",
"(",
"w",
".",
"cli",
",",
"opts",
".",
"AccountIDConvert",
"(",
")",
",",
"opts",
".",
"Destination",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"arg",
":=",
"stellar1",
".",
"SetInflationDestinationLocalArg",
"{",
"AccountID",
":",
"opts",
".",
"AccountIDConvert",
"(",
")",
",",
"Destination",
":",
"destination",
",",
"}",
"\n",
"if",
"err",
":=",
"w",
".",
"cli",
".",
"SetInflationDestinationLocal",
"(",
"ctx",
",",
"arg",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"// get it for display",
"inflation",
",",
"err",
":=",
"w",
".",
"getInflationLocal",
"(",
"ctx",
",",
"opts",
".",
"AccountIDConvert",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"w",
".",
"encodeErr",
"(",
"c",
",",
"err",
",",
"wr",
")",
"\n",
"}",
"\n\n",
"return",
"w",
".",
"encodeResult",
"(",
"c",
",",
"inflation",
",",
"wr",
")",
"\n",
"}"
] | // setInflation sets the inflation destination for an account. | [
"setInflation",
"sets",
"the",
"inflation",
"destination",
"for",
"an",
"account",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L297-L323 |
159,479 | keybase/client | go/client/wallet_api_handler.go | Check | func (c *accountIDOptions) Check() error {
_, err := strkey.Decode(strkey.VersionByteAccountID, c.AccountID)
if err != nil {
return ErrInvalidAccountID
}
return nil
} | go | func (c *accountIDOptions) Check() error {
_, err := strkey.Decode(strkey.VersionByteAccountID, c.AccountID)
if err != nil {
return ErrInvalidAccountID
}
return nil
} | [
"func",
"(",
"c",
"*",
"accountIDOptions",
")",
"Check",
"(",
")",
"error",
"{",
"_",
",",
"err",
":=",
"strkey",
".",
"Decode",
"(",
"strkey",
".",
"VersionByteAccountID",
",",
"c",
".",
"AccountID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ErrInvalidAccountID",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Check makes sure that AccountID exists and is valid. | [
"Check",
"makes",
"sure",
"that",
"AccountID",
"exists",
"and",
"is",
"valid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L364-L370 |
159,480 | keybase/client | go/client/wallet_api_handler.go | Check | func (c *txIDOptions) Check() error {
if len(c.TxID) != 64 {
return ErrInvalidTxID
}
if _, err := hex.DecodeString(c.TxID); err != nil {
return ErrInvalidTxID
}
return nil
} | go | func (c *txIDOptions) Check() error {
if len(c.TxID) != 64 {
return ErrInvalidTxID
}
if _, err := hex.DecodeString(c.TxID); err != nil {
return ErrInvalidTxID
}
return nil
} | [
"func",
"(",
"c",
"*",
"txIDOptions",
")",
"Check",
"(",
")",
"error",
"{",
"if",
"len",
"(",
"c",
".",
"TxID",
")",
"!=",
"64",
"{",
"return",
"ErrInvalidTxID",
"\n",
"}",
"\n",
"if",
"_",
",",
"err",
":=",
"hex",
".",
"DecodeString",
"(",
"c",
".",
"TxID",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"ErrInvalidTxID",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Check makes sure that TxID exists and is valid. | [
"Check",
"makes",
"sure",
"that",
"TxID",
"exists",
"and",
"is",
"valid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L382-L390 |
159,481 | keybase/client | go/client/wallet_api_handler.go | Check | func (c *inflationOptions) Check() error {
_, err := strkey.Decode(strkey.VersionByteAccountID, c.AccountID)
if err != nil {
return ErrInvalidAccountID
}
if c.Destination == "" {
return ErrDestinationMissing
}
return nil
} | go | func (c *inflationOptions) Check() error {
_, err := strkey.Decode(strkey.VersionByteAccountID, c.AccountID)
if err != nil {
return ErrInvalidAccountID
}
if c.Destination == "" {
return ErrDestinationMissing
}
return nil
} | [
"func",
"(",
"c",
"*",
"inflationOptions",
")",
"Check",
"(",
")",
"error",
"{",
"_",
",",
"err",
":=",
"strkey",
".",
"Decode",
"(",
"strkey",
".",
"VersionByteAccountID",
",",
"c",
".",
"AccountID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ErrInvalidAccountID",
"\n",
"}",
"\n",
"if",
"c",
".",
"Destination",
"==",
"\"",
"\"",
"{",
"return",
"ErrDestinationMissing",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Check makes sure that AccountID is valid and that Destination isn't empty. | [
"Check",
"makes",
"sure",
"that",
"AccountID",
"is",
"valid",
"and",
"that",
"Destination",
"isn",
"t",
"empty",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L412-L422 |
159,482 | keybase/client | go/client/wallet_api_handler.go | Check | func (c *sendOptions) Check() error {
if strings.TrimSpace(c.Recipient) == "" {
return ErrRecipientMissing
}
if strings.TrimSpace(c.Amount) == "" {
return ErrAmountMissing
}
namt, err := stellarnet.ParseStellarAmount(c.Amount)
if err != nil {
return ErrInvalidAmount
}
if namt < 0 {
return ErrInvalidAmount
}
if c.FromAccountID != "" {
_, err := strkey.Decode(strkey.VersionByteAccountID, c.FromAccountID)
if err != nil {
return ErrInvalidAccountID
}
}
if len(c.Message) > libkb.MaxStellarPaymentNoteLength {
return ErrMessageTooLong
}
return nil
} | go | func (c *sendOptions) Check() error {
if strings.TrimSpace(c.Recipient) == "" {
return ErrRecipientMissing
}
if strings.TrimSpace(c.Amount) == "" {
return ErrAmountMissing
}
namt, err := stellarnet.ParseStellarAmount(c.Amount)
if err != nil {
return ErrInvalidAmount
}
if namt < 0 {
return ErrInvalidAmount
}
if c.FromAccountID != "" {
_, err := strkey.Decode(strkey.VersionByteAccountID, c.FromAccountID)
if err != nil {
return ErrInvalidAccountID
}
}
if len(c.Message) > libkb.MaxStellarPaymentNoteLength {
return ErrMessageTooLong
}
return nil
} | [
"func",
"(",
"c",
"*",
"sendOptions",
")",
"Check",
"(",
")",
"error",
"{",
"if",
"strings",
".",
"TrimSpace",
"(",
"c",
".",
"Recipient",
")",
"==",
"\"",
"\"",
"{",
"return",
"ErrRecipientMissing",
"\n",
"}",
"\n",
"if",
"strings",
".",
"TrimSpace",
"(",
"c",
".",
"Amount",
")",
"==",
"\"",
"\"",
"{",
"return",
"ErrAmountMissing",
"\n",
"}",
"\n",
"namt",
",",
"err",
":=",
"stellarnet",
".",
"ParseStellarAmount",
"(",
"c",
".",
"Amount",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ErrInvalidAmount",
"\n",
"}",
"\n",
"if",
"namt",
"<",
"0",
"{",
"return",
"ErrInvalidAmount",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"FromAccountID",
"!=",
"\"",
"\"",
"{",
"_",
",",
"err",
":=",
"strkey",
".",
"Decode",
"(",
"strkey",
".",
"VersionByteAccountID",
",",
"c",
".",
"FromAccountID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ErrInvalidAccountID",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"c",
".",
"Message",
")",
">",
"libkb",
".",
"MaxStellarPaymentNoteLength",
"{",
"return",
"ErrMessageTooLong",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Check makes sure that the send options are valid. | [
"Check",
"makes",
"sure",
"that",
"the",
"send",
"options",
"are",
"valid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L439-L465 |
159,483 | keybase/client | go/client/wallet_api_handler.go | Check | func (c *batchOptions) Check() error {
for i, p := range c.Payments {
if strings.TrimSpace(p.Recipient) == "" {
return fmt.Errorf("payment %d: %s", i, ErrRecipientMissing)
}
if strings.TrimSpace(p.Amount) == "" {
return fmt.Errorf("payment %d: %s", i, ErrAmountMissing)
}
namt, err := stellarnet.ParseStellarAmount(p.Amount)
if err != nil {
return fmt.Errorf("payment %d: %s", i, ErrInvalidAmount)
}
if namt < 0 {
return fmt.Errorf("payment %d: %s", i, ErrInvalidAmount)
}
if len(p.Message) > libkb.MaxStellarPaymentNoteLength {
return fmt.Errorf("payment %d: %s", i, ErrMessageTooLong)
}
}
if c.Timeout <= 0 {
c.Timeout = 15 * len(c.Payments)
}
return nil
} | go | func (c *batchOptions) Check() error {
for i, p := range c.Payments {
if strings.TrimSpace(p.Recipient) == "" {
return fmt.Errorf("payment %d: %s", i, ErrRecipientMissing)
}
if strings.TrimSpace(p.Amount) == "" {
return fmt.Errorf("payment %d: %s", i, ErrAmountMissing)
}
namt, err := stellarnet.ParseStellarAmount(p.Amount)
if err != nil {
return fmt.Errorf("payment %d: %s", i, ErrInvalidAmount)
}
if namt < 0 {
return fmt.Errorf("payment %d: %s", i, ErrInvalidAmount)
}
if len(p.Message) > libkb.MaxStellarPaymentNoteLength {
return fmt.Errorf("payment %d: %s", i, ErrMessageTooLong)
}
}
if c.Timeout <= 0 {
c.Timeout = 15 * len(c.Payments)
}
return nil
} | [
"func",
"(",
"c",
"*",
"batchOptions",
")",
"Check",
"(",
")",
"error",
"{",
"for",
"i",
",",
"p",
":=",
"range",
"c",
".",
"Payments",
"{",
"if",
"strings",
".",
"TrimSpace",
"(",
"p",
".",
"Recipient",
")",
"==",
"\"",
"\"",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"i",
",",
"ErrRecipientMissing",
")",
"\n",
"}",
"\n",
"if",
"strings",
".",
"TrimSpace",
"(",
"p",
".",
"Amount",
")",
"==",
"\"",
"\"",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"i",
",",
"ErrAmountMissing",
")",
"\n",
"}",
"\n",
"namt",
",",
"err",
":=",
"stellarnet",
".",
"ParseStellarAmount",
"(",
"p",
".",
"Amount",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"i",
",",
"ErrInvalidAmount",
")",
"\n",
"}",
"\n",
"if",
"namt",
"<",
"0",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"i",
",",
"ErrInvalidAmount",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"p",
".",
"Message",
")",
">",
"libkb",
".",
"MaxStellarPaymentNoteLength",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"i",
",",
"ErrMessageTooLong",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"c",
".",
"Timeout",
"<=",
"0",
"{",
"c",
".",
"Timeout",
"=",
"15",
"*",
"len",
"(",
"c",
".",
"Payments",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Check makes sure that the batch options are valid. | [
"Check",
"makes",
"sure",
"that",
"the",
"batch",
"options",
"are",
"valid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/wallet_api_handler.go#L481-L506 |
159,484 | keybase/client | go/kbfs/libkbfs/cr_chains.go | addNoopChain | func (ccs *crChains) addNoopChain(ptr data.BlockPointer) {
if _, ok := ccs.byMostRecent[ptr]; ok {
return
}
if _, ok := ccs.byOriginal[ptr]; ok {
return
}
if _, ok := ccs.originals[ptr]; ok {
return
}
chain := &crChain{original: ptr, mostRecent: ptr}
ccs.byOriginal[ptr] = chain
ccs.byMostRecent[ptr] = chain
} | go | func (ccs *crChains) addNoopChain(ptr data.BlockPointer) {
if _, ok := ccs.byMostRecent[ptr]; ok {
return
}
if _, ok := ccs.byOriginal[ptr]; ok {
return
}
if _, ok := ccs.originals[ptr]; ok {
return
}
chain := &crChain{original: ptr, mostRecent: ptr}
ccs.byOriginal[ptr] = chain
ccs.byMostRecent[ptr] = chain
} | [
"func",
"(",
"ccs",
"*",
"crChains",
")",
"addNoopChain",
"(",
"ptr",
"data",
".",
"BlockPointer",
")",
"{",
"if",
"_",
",",
"ok",
":=",
"ccs",
".",
"byMostRecent",
"[",
"ptr",
"]",
";",
"ok",
"{",
"return",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"ccs",
".",
"byOriginal",
"[",
"ptr",
"]",
";",
"ok",
"{",
"return",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"ccs",
".",
"originals",
"[",
"ptr",
"]",
";",
"ok",
"{",
"return",
"\n",
"}",
"\n",
"chain",
":=",
"&",
"crChain",
"{",
"original",
":",
"ptr",
",",
"mostRecent",
":",
"ptr",
"}",
"\n",
"ccs",
".",
"byOriginal",
"[",
"ptr",
"]",
"=",
"chain",
"\n",
"ccs",
".",
"byMostRecent",
"[",
"ptr",
"]",
"=",
"chain",
"\n",
"}"
] | // addNoopChain adds a new chain with no ops to the chains struct, if
// that pointer isn't involved in any chains yet. | [
"addNoopChain",
"adds",
"a",
"new",
"chain",
"with",
"no",
"ops",
"to",
"the",
"chains",
"struct",
"if",
"that",
"pointer",
"isn",
"t",
"involved",
"in",
"any",
"chains",
"yet",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L460-L473 |
159,485 | keybase/client | go/kbfs/libkbfs/cr_chains.go | makeChainForNewOp | func (ccs *crChains) makeChainForNewOp(targetPtr data.BlockPointer, newOp op) error {
switch realOp := newOp.(type) {
case *createOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.Dir)
case *rmOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.Dir)
case *renameOp:
// In this case, we don't want to split the rename chain, so
// just make up a new operation and later overwrite it with
// the rename op.
co, err := newCreateOp(realOp.NewName, realOp.NewDir.Unref, data.File)
if err != nil {
return err
}
err = ccs.makeChainForNewOpWithUpdate(targetPtr, co, &co.Dir)
if err != nil {
return err
}
chain, ok := ccs.byMostRecent[targetPtr]
if !ok {
return errors.Errorf("Couldn't find chain for %v after making it",
targetPtr)
}
if len(chain.ops) != 1 {
return errors.Errorf("Chain of unexpected length for %v after "+
"making it", targetPtr)
}
chain.ops[0] = realOp
return nil
case *setAttrOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.Dir)
case *syncOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.File)
default:
return errors.Errorf("Couldn't make chain with unknown operation %s",
newOp)
}
} | go | func (ccs *crChains) makeChainForNewOp(targetPtr data.BlockPointer, newOp op) error {
switch realOp := newOp.(type) {
case *createOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.Dir)
case *rmOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.Dir)
case *renameOp:
// In this case, we don't want to split the rename chain, so
// just make up a new operation and later overwrite it with
// the rename op.
co, err := newCreateOp(realOp.NewName, realOp.NewDir.Unref, data.File)
if err != nil {
return err
}
err = ccs.makeChainForNewOpWithUpdate(targetPtr, co, &co.Dir)
if err != nil {
return err
}
chain, ok := ccs.byMostRecent[targetPtr]
if !ok {
return errors.Errorf("Couldn't find chain for %v after making it",
targetPtr)
}
if len(chain.ops) != 1 {
return errors.Errorf("Chain of unexpected length for %v after "+
"making it", targetPtr)
}
chain.ops[0] = realOp
return nil
case *setAttrOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.Dir)
case *syncOp:
return ccs.makeChainForNewOpWithUpdate(targetPtr, newOp, &realOp.File)
default:
return errors.Errorf("Couldn't make chain with unknown operation %s",
newOp)
}
} | [
"func",
"(",
"ccs",
"*",
"crChains",
")",
"makeChainForNewOp",
"(",
"targetPtr",
"data",
".",
"BlockPointer",
",",
"newOp",
"op",
")",
"error",
"{",
"switch",
"realOp",
":=",
"newOp",
".",
"(",
"type",
")",
"{",
"case",
"*",
"createOp",
":",
"return",
"ccs",
".",
"makeChainForNewOpWithUpdate",
"(",
"targetPtr",
",",
"newOp",
",",
"&",
"realOp",
".",
"Dir",
")",
"\n",
"case",
"*",
"rmOp",
":",
"return",
"ccs",
".",
"makeChainForNewOpWithUpdate",
"(",
"targetPtr",
",",
"newOp",
",",
"&",
"realOp",
".",
"Dir",
")",
"\n",
"case",
"*",
"renameOp",
":",
"// In this case, we don't want to split the rename chain, so",
"// just make up a new operation and later overwrite it with",
"// the rename op.",
"co",
",",
"err",
":=",
"newCreateOp",
"(",
"realOp",
".",
"NewName",
",",
"realOp",
".",
"NewDir",
".",
"Unref",
",",
"data",
".",
"File",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"err",
"=",
"ccs",
".",
"makeChainForNewOpWithUpdate",
"(",
"targetPtr",
",",
"co",
",",
"&",
"co",
".",
"Dir",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"chain",
",",
"ok",
":=",
"ccs",
".",
"byMostRecent",
"[",
"targetPtr",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"targetPtr",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"chain",
".",
"ops",
")",
"!=",
"1",
"{",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"targetPtr",
")",
"\n",
"}",
"\n",
"chain",
".",
"ops",
"[",
"0",
"]",
"=",
"realOp",
"\n",
"return",
"nil",
"\n",
"case",
"*",
"setAttrOp",
":",
"return",
"ccs",
".",
"makeChainForNewOpWithUpdate",
"(",
"targetPtr",
",",
"newOp",
",",
"&",
"realOp",
".",
"Dir",
")",
"\n",
"case",
"*",
"syncOp",
":",
"return",
"ccs",
".",
"makeChainForNewOpWithUpdate",
"(",
"targetPtr",
",",
"newOp",
",",
"&",
"realOp",
".",
"File",
")",
"\n",
"default",
":",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"newOp",
")",
"\n",
"}",
"\n",
"}"
] | // makeChainForNewOp makes a new chain for an op that does not yet
// have its pointers initialized. It does so by setting Unref and Ref
// to be the same for the duration of this function, and calling the
// usual makeChainForOp method. This function is not goroutine-safe
// with respect to newOp. Also note that rename ops will not be split
// into two ops; they will be placed only in the new directory chain. | [
"makeChainForNewOp",
"makes",
"a",
"new",
"chain",
"for",
"an",
"op",
"that",
"does",
"not",
"yet",
"have",
"its",
"pointers",
"initialized",
".",
"It",
"does",
"so",
"by",
"setting",
"Unref",
"and",
"Ref",
"to",
"be",
"the",
"same",
"for",
"the",
"duration",
"of",
"this",
"function",
"and",
"calling",
"the",
"usual",
"makeChainForOp",
"method",
".",
"This",
"function",
"is",
"not",
"goroutine",
"-",
"safe",
"with",
"respect",
"to",
"newOp",
".",
"Also",
"note",
"that",
"rename",
"ops",
"will",
"not",
"be",
"split",
"into",
"two",
"ops",
";",
"they",
"will",
"be",
"placed",
"only",
"in",
"the",
"new",
"directory",
"chain",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L718-L755 |
159,486 | keybase/client | go/kbfs/libkbfs/cr_chains.go | newCRChains | func newCRChains(
ctx context.Context, codec kbfscodec.Codec, osg idutil.OfflineStatusGetter,
chainMDs []chainMetadata, fbo *folderBlockOps, identifyTypes bool) (
ccs *crChains, err error) {
ccs = newCRChainsEmpty()
// For each MD update, turn each update in each op into map
// entries and create chains for the BlockPointers that are
// affected directly by the operation.
for _, chainMD := range chainMDs {
// No new operations in these.
if chainMD.IsWriterMetadataCopiedSet() {
continue
}
offline := keybase1.OfflineAvailability_NONE
if osg != nil {
offline = osg.OfflineAvailabilityForID(chainMD.TlfID())
}
winfo := newWriterInfo(
chainMD.LastModifyingWriter(),
chainMD.LastModifyingWriterVerifyingKey(),
chainMD.Revision(), offline)
if err != nil {
return nil, err
}
chainData := *chainMD.Data()
err = ccs.addOps(codec, chainData, winfo, chainMD.LocalTimestamp())
if ptr := chainData.cachedChanges.Info.BlockPointer; ptr != data.ZeroPtr {
ccs.blockChangePointers[ptr] = true
// Any child block change pointers?
infos, err := fbo.GetIndirectFileBlockInfos(
ctx, makeFBOLockState(), chainMD,
data.Path{
FolderBranch: fbo.folderBranch,
Path: []data.PathNode{{
BlockPointer: ptr,
Name: fmt.Sprintf(
"<MD rev %d>", chainMD.Revision()),
}},
})
if err != nil {
return nil, err
}
for _, info := range infos {
ccs.blockChangePointers[info.BlockPointer] = true
}
}
if err != nil {
return nil, err
}
if !ccs.originalRoot.IsInitialized() {
// Find the original pointer for the root directory
if rootChain, ok :=
ccs.byMostRecent[chainData.Dir.BlockPointer]; ok {
ccs.originalRoot = rootChain.original
}
}
}
mostRecentMD := chainMDs[len(chainMDs)-1]
for _, chain := range ccs.byOriginal {
toUnrefs := chain.collapse(ccs.createdOriginals, ccs.originals)
for _, unref := range toUnrefs {
ccs.toUnrefPointers[unref] = true
}
// NOTE: even if we've removed all its ops, still keep the
// chain around so we can see the mapping between the original
// and most recent pointers.
// Figure out if this chain is a file or directory. We don't
// need to do this for chains that represent a resolution in
// progress, since in that case all actions are already
// completed.
if identifyTypes {
err := chain.identifyType(ctx, fbo, mostRecentMD, ccs)
if err != nil {
return nil, err
}
}
}
ccs.mostRecentChainMDInfo = mostRecentMD
return ccs, nil
} | go | func newCRChains(
ctx context.Context, codec kbfscodec.Codec, osg idutil.OfflineStatusGetter,
chainMDs []chainMetadata, fbo *folderBlockOps, identifyTypes bool) (
ccs *crChains, err error) {
ccs = newCRChainsEmpty()
// For each MD update, turn each update in each op into map
// entries and create chains for the BlockPointers that are
// affected directly by the operation.
for _, chainMD := range chainMDs {
// No new operations in these.
if chainMD.IsWriterMetadataCopiedSet() {
continue
}
offline := keybase1.OfflineAvailability_NONE
if osg != nil {
offline = osg.OfflineAvailabilityForID(chainMD.TlfID())
}
winfo := newWriterInfo(
chainMD.LastModifyingWriter(),
chainMD.LastModifyingWriterVerifyingKey(),
chainMD.Revision(), offline)
if err != nil {
return nil, err
}
chainData := *chainMD.Data()
err = ccs.addOps(codec, chainData, winfo, chainMD.LocalTimestamp())
if ptr := chainData.cachedChanges.Info.BlockPointer; ptr != data.ZeroPtr {
ccs.blockChangePointers[ptr] = true
// Any child block change pointers?
infos, err := fbo.GetIndirectFileBlockInfos(
ctx, makeFBOLockState(), chainMD,
data.Path{
FolderBranch: fbo.folderBranch,
Path: []data.PathNode{{
BlockPointer: ptr,
Name: fmt.Sprintf(
"<MD rev %d>", chainMD.Revision()),
}},
})
if err != nil {
return nil, err
}
for _, info := range infos {
ccs.blockChangePointers[info.BlockPointer] = true
}
}
if err != nil {
return nil, err
}
if !ccs.originalRoot.IsInitialized() {
// Find the original pointer for the root directory
if rootChain, ok :=
ccs.byMostRecent[chainData.Dir.BlockPointer]; ok {
ccs.originalRoot = rootChain.original
}
}
}
mostRecentMD := chainMDs[len(chainMDs)-1]
for _, chain := range ccs.byOriginal {
toUnrefs := chain.collapse(ccs.createdOriginals, ccs.originals)
for _, unref := range toUnrefs {
ccs.toUnrefPointers[unref] = true
}
// NOTE: even if we've removed all its ops, still keep the
// chain around so we can see the mapping between the original
// and most recent pointers.
// Figure out if this chain is a file or directory. We don't
// need to do this for chains that represent a resolution in
// progress, since in that case all actions are already
// completed.
if identifyTypes {
err := chain.identifyType(ctx, fbo, mostRecentMD, ccs)
if err != nil {
return nil, err
}
}
}
ccs.mostRecentChainMDInfo = mostRecentMD
return ccs, nil
} | [
"func",
"newCRChains",
"(",
"ctx",
"context",
".",
"Context",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"chainMDs",
"[",
"]",
"chainMetadata",
",",
"fbo",
"*",
"folderBlockOps",
",",
"identifyTypes",
"bool",
")",
"(",
"ccs",
"*",
"crChains",
",",
"err",
"error",
")",
"{",
"ccs",
"=",
"newCRChainsEmpty",
"(",
")",
"\n\n",
"// For each MD update, turn each update in each op into map",
"// entries and create chains for the BlockPointers that are",
"// affected directly by the operation.",
"for",
"_",
",",
"chainMD",
":=",
"range",
"chainMDs",
"{",
"// No new operations in these.",
"if",
"chainMD",
".",
"IsWriterMetadataCopiedSet",
"(",
")",
"{",
"continue",
"\n",
"}",
"\n\n",
"offline",
":=",
"keybase1",
".",
"OfflineAvailability_NONE",
"\n",
"if",
"osg",
"!=",
"nil",
"{",
"offline",
"=",
"osg",
".",
"OfflineAvailabilityForID",
"(",
"chainMD",
".",
"TlfID",
"(",
")",
")",
"\n",
"}",
"\n\n",
"winfo",
":=",
"newWriterInfo",
"(",
"chainMD",
".",
"LastModifyingWriter",
"(",
")",
",",
"chainMD",
".",
"LastModifyingWriterVerifyingKey",
"(",
")",
",",
"chainMD",
".",
"Revision",
"(",
")",
",",
"offline",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"chainData",
":=",
"*",
"chainMD",
".",
"Data",
"(",
")",
"\n\n",
"err",
"=",
"ccs",
".",
"addOps",
"(",
"codec",
",",
"chainData",
",",
"winfo",
",",
"chainMD",
".",
"LocalTimestamp",
"(",
")",
")",
"\n\n",
"if",
"ptr",
":=",
"chainData",
".",
"cachedChanges",
".",
"Info",
".",
"BlockPointer",
";",
"ptr",
"!=",
"data",
".",
"ZeroPtr",
"{",
"ccs",
".",
"blockChangePointers",
"[",
"ptr",
"]",
"=",
"true",
"\n\n",
"// Any child block change pointers?",
"infos",
",",
"err",
":=",
"fbo",
".",
"GetIndirectFileBlockInfos",
"(",
"ctx",
",",
"makeFBOLockState",
"(",
")",
",",
"chainMD",
",",
"data",
".",
"Path",
"{",
"FolderBranch",
":",
"fbo",
".",
"folderBranch",
",",
"Path",
":",
"[",
"]",
"data",
".",
"PathNode",
"{",
"{",
"BlockPointer",
":",
"ptr",
",",
"Name",
":",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"chainMD",
".",
"Revision",
"(",
")",
")",
",",
"}",
"}",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"for",
"_",
",",
"info",
":=",
"range",
"infos",
"{",
"ccs",
".",
"blockChangePointers",
"[",
"info",
".",
"BlockPointer",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"!",
"ccs",
".",
"originalRoot",
".",
"IsInitialized",
"(",
")",
"{",
"// Find the original pointer for the root directory",
"if",
"rootChain",
",",
"ok",
":=",
"ccs",
".",
"byMostRecent",
"[",
"chainData",
".",
"Dir",
".",
"BlockPointer",
"]",
";",
"ok",
"{",
"ccs",
".",
"originalRoot",
"=",
"rootChain",
".",
"original",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"mostRecentMD",
":=",
"chainMDs",
"[",
"len",
"(",
"chainMDs",
")",
"-",
"1",
"]",
"\n\n",
"for",
"_",
",",
"chain",
":=",
"range",
"ccs",
".",
"byOriginal",
"{",
"toUnrefs",
":=",
"chain",
".",
"collapse",
"(",
"ccs",
".",
"createdOriginals",
",",
"ccs",
".",
"originals",
")",
"\n",
"for",
"_",
",",
"unref",
":=",
"range",
"toUnrefs",
"{",
"ccs",
".",
"toUnrefPointers",
"[",
"unref",
"]",
"=",
"true",
"\n",
"}",
"\n",
"// NOTE: even if we've removed all its ops, still keep the",
"// chain around so we can see the mapping between the original",
"// and most recent pointers.",
"// Figure out if this chain is a file or directory. We don't",
"// need to do this for chains that represent a resolution in",
"// progress, since in that case all actions are already",
"// completed.",
"if",
"identifyTypes",
"{",
"err",
":=",
"chain",
".",
"identifyType",
"(",
"ctx",
",",
"fbo",
",",
"mostRecentMD",
",",
"ccs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"ccs",
".",
"mostRecentChainMDInfo",
"=",
"mostRecentMD",
"\n",
"return",
"ccs",
",",
"nil",
"\n",
"}"
] | // newCRChains builds a new crChains object from the given list of
// chainMetadatas, which must be non-empty. | [
"newCRChains",
"builds",
"a",
"new",
"crChains",
"object",
"from",
"the",
"given",
"list",
"of",
"chainMetadatas",
"which",
"must",
"be",
"non",
"-",
"empty",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L880-L972 |
159,487 | keybase/client | go/kbfs/libkbfs/cr_chains.go | newCRChainsForIRMDs | func newCRChainsForIRMDs(
ctx context.Context, codec kbfscodec.Codec, osg idutil.OfflineStatusGetter,
irmds []ImmutableRootMetadata, fbo *folderBlockOps,
identifyTypes bool) (ccs *crChains, err error) {
chainMDs := make([]chainMetadata, len(irmds))
for i, irmd := range irmds {
chainMDs[i] = irmd
}
return newCRChains(ctx, codec, osg, chainMDs, fbo, identifyTypes)
} | go | func newCRChainsForIRMDs(
ctx context.Context, codec kbfscodec.Codec, osg idutil.OfflineStatusGetter,
irmds []ImmutableRootMetadata, fbo *folderBlockOps,
identifyTypes bool) (ccs *crChains, err error) {
chainMDs := make([]chainMetadata, len(irmds))
for i, irmd := range irmds {
chainMDs[i] = irmd
}
return newCRChains(ctx, codec, osg, chainMDs, fbo, identifyTypes)
} | [
"func",
"newCRChainsForIRMDs",
"(",
"ctx",
"context",
".",
"Context",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"irmds",
"[",
"]",
"ImmutableRootMetadata",
",",
"fbo",
"*",
"folderBlockOps",
",",
"identifyTypes",
"bool",
")",
"(",
"ccs",
"*",
"crChains",
",",
"err",
"error",
")",
"{",
"chainMDs",
":=",
"make",
"(",
"[",
"]",
"chainMetadata",
",",
"len",
"(",
"irmds",
")",
")",
"\n",
"for",
"i",
",",
"irmd",
":=",
"range",
"irmds",
"{",
"chainMDs",
"[",
"i",
"]",
"=",
"irmd",
"\n",
"}",
"\n",
"return",
"newCRChains",
"(",
"ctx",
",",
"codec",
",",
"osg",
",",
"chainMDs",
",",
"fbo",
",",
"identifyTypes",
")",
"\n",
"}"
] | // newCRChainsForIRMDs simply builds a list of chainMetadatas from the
// given list of ImmutableRootMetadatas and calls newCRChains with it. | [
"newCRChainsForIRMDs",
"simply",
"builds",
"a",
"list",
"of",
"chainMetadatas",
"from",
"the",
"given",
"list",
"of",
"ImmutableRootMetadatas",
"and",
"calls",
"newCRChains",
"with",
"it",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L976-L985 |
159,488 | keybase/client | go/kbfs/libkbfs/cr_chains.go | copyOpAndRevertUnrefsToOriginals | func (ccs *crChains) copyOpAndRevertUnrefsToOriginals(currOp op) op {
var unrefs []*data.BlockPointer
var newOp op
switch realOp := currOp.(type) {
case *createOp:
newCreateOp := *realOp
unrefs = append(unrefs, &newCreateOp.Dir.Unref)
newOp = &newCreateOp
case *rmOp:
newRmOp := *realOp
unrefs = append(unrefs, &newRmOp.Dir.Unref)
newOp = &newRmOp
case *renameOp:
newRenameOp := *realOp
unrefs = append(unrefs, &newRenameOp.OldDir.Unref,
&newRenameOp.NewDir.Unref, &newRenameOp.Renamed)
newOp = &newRenameOp
case *syncOp:
newSyncOp := *realOp
unrefs = append(unrefs, &newSyncOp.File.Unref)
newOp = &newSyncOp
case *setAttrOp:
newSetAttrOp := *realOp
unrefs = append(unrefs, &newSetAttrOp.Dir.Unref, &newSetAttrOp.File)
newOp = &newSetAttrOp
case *GCOp:
// No need to copy a GCOp, it won't be modified
newOp = realOp
case *rekeyOp:
newOp = realOp
}
for _, unref := range unrefs {
ok := true
// Loop over the originals, since if `changeOriginal` was
// called, there might be a path of them.
for ok {
var original data.BlockPointer
original, ok = ccs.originals[*unref]
if ok {
*unref = original
}
}
}
return newOp
} | go | func (ccs *crChains) copyOpAndRevertUnrefsToOriginals(currOp op) op {
var unrefs []*data.BlockPointer
var newOp op
switch realOp := currOp.(type) {
case *createOp:
newCreateOp := *realOp
unrefs = append(unrefs, &newCreateOp.Dir.Unref)
newOp = &newCreateOp
case *rmOp:
newRmOp := *realOp
unrefs = append(unrefs, &newRmOp.Dir.Unref)
newOp = &newRmOp
case *renameOp:
newRenameOp := *realOp
unrefs = append(unrefs, &newRenameOp.OldDir.Unref,
&newRenameOp.NewDir.Unref, &newRenameOp.Renamed)
newOp = &newRenameOp
case *syncOp:
newSyncOp := *realOp
unrefs = append(unrefs, &newSyncOp.File.Unref)
newOp = &newSyncOp
case *setAttrOp:
newSetAttrOp := *realOp
unrefs = append(unrefs, &newSetAttrOp.Dir.Unref, &newSetAttrOp.File)
newOp = &newSetAttrOp
case *GCOp:
// No need to copy a GCOp, it won't be modified
newOp = realOp
case *rekeyOp:
newOp = realOp
}
for _, unref := range unrefs {
ok := true
// Loop over the originals, since if `changeOriginal` was
// called, there might be a path of them.
for ok {
var original data.BlockPointer
original, ok = ccs.originals[*unref]
if ok {
*unref = original
}
}
}
return newOp
} | [
"func",
"(",
"ccs",
"*",
"crChains",
")",
"copyOpAndRevertUnrefsToOriginals",
"(",
"currOp",
"op",
")",
"op",
"{",
"var",
"unrefs",
"[",
"]",
"*",
"data",
".",
"BlockPointer",
"\n",
"var",
"newOp",
"op",
"\n",
"switch",
"realOp",
":=",
"currOp",
".",
"(",
"type",
")",
"{",
"case",
"*",
"createOp",
":",
"newCreateOp",
":=",
"*",
"realOp",
"\n",
"unrefs",
"=",
"append",
"(",
"unrefs",
",",
"&",
"newCreateOp",
".",
"Dir",
".",
"Unref",
")",
"\n",
"newOp",
"=",
"&",
"newCreateOp",
"\n",
"case",
"*",
"rmOp",
":",
"newRmOp",
":=",
"*",
"realOp",
"\n",
"unrefs",
"=",
"append",
"(",
"unrefs",
",",
"&",
"newRmOp",
".",
"Dir",
".",
"Unref",
")",
"\n",
"newOp",
"=",
"&",
"newRmOp",
"\n",
"case",
"*",
"renameOp",
":",
"newRenameOp",
":=",
"*",
"realOp",
"\n",
"unrefs",
"=",
"append",
"(",
"unrefs",
",",
"&",
"newRenameOp",
".",
"OldDir",
".",
"Unref",
",",
"&",
"newRenameOp",
".",
"NewDir",
".",
"Unref",
",",
"&",
"newRenameOp",
".",
"Renamed",
")",
"\n",
"newOp",
"=",
"&",
"newRenameOp",
"\n",
"case",
"*",
"syncOp",
":",
"newSyncOp",
":=",
"*",
"realOp",
"\n",
"unrefs",
"=",
"append",
"(",
"unrefs",
",",
"&",
"newSyncOp",
".",
"File",
".",
"Unref",
")",
"\n",
"newOp",
"=",
"&",
"newSyncOp",
"\n",
"case",
"*",
"setAttrOp",
":",
"newSetAttrOp",
":=",
"*",
"realOp",
"\n",
"unrefs",
"=",
"append",
"(",
"unrefs",
",",
"&",
"newSetAttrOp",
".",
"Dir",
".",
"Unref",
",",
"&",
"newSetAttrOp",
".",
"File",
")",
"\n",
"newOp",
"=",
"&",
"newSetAttrOp",
"\n",
"case",
"*",
"GCOp",
":",
"// No need to copy a GCOp, it won't be modified",
"newOp",
"=",
"realOp",
"\n",
"case",
"*",
"rekeyOp",
":",
"newOp",
"=",
"realOp",
"\n",
"}",
"\n",
"for",
"_",
",",
"unref",
":=",
"range",
"unrefs",
"{",
"ok",
":=",
"true",
"\n",
"// Loop over the originals, since if `changeOriginal` was",
"// called, there might be a path of them.",
"for",
"ok",
"{",
"var",
"original",
"data",
".",
"BlockPointer",
"\n",
"original",
",",
"ok",
"=",
"ccs",
".",
"originals",
"[",
"*",
"unref",
"]",
"\n",
"if",
"ok",
"{",
"*",
"unref",
"=",
"original",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"newOp",
"\n",
"}"
] | // copyOpAndRevertUnrefsToOriginals returns a shallow copy of the op,
// modifying each custom BlockPointer field to reference the original
// version of the corresponding blocks. | [
"copyOpAndRevertUnrefsToOriginals",
"returns",
"a",
"shallow",
"copy",
"of",
"the",
"op",
"modifying",
"each",
"custom",
"BlockPointer",
"field",
"to",
"reference",
"the",
"original",
"version",
"of",
"the",
"corresponding",
"blocks",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L1030-L1074 |
159,489 | keybase/client | go/kbfs/libkbfs/cr_chains.go | changeOriginal | func (ccs *crChains) changeOriginal(oldOriginal data.BlockPointer,
newOriginal data.BlockPointer) error {
if oldOriginal == newOriginal {
// This apparently can happen, but I'm not sure how. (See
// KBFS-2946.) Maybe because of a self-conflict in some weird
// error conditions. In this case, we can just pretend the
// change worked, and let CR continue it's normal process.
return nil
}
chain, ok := ccs.byOriginal[oldOriginal]
if !ok {
return errors.WithStack(NoChainFoundError{oldOriginal})
}
if _, ok := ccs.byOriginal[newOriginal]; ok {
return errors.Errorf("crChains.changeOriginal: New original %v "+
"already exists", newOriginal)
}
delete(ccs.byOriginal, oldOriginal)
chain.original = newOriginal
ccs.byOriginal[newOriginal] = chain
ccs.originals[oldOriginal] = newOriginal
if _, ok := ccs.deletedOriginals[oldOriginal]; ok {
delete(ccs.deletedOriginals, oldOriginal)
ccs.deletedOriginals[newOriginal] = true
}
if _, ok := ccs.createdOriginals[oldOriginal]; ok {
delete(ccs.createdOriginals, oldOriginal)
// We're swapping in an original made on some other branch, so
// it shouldn't go in the `createdOriginals` map.
}
if ri, ok := ccs.renamedOriginals[oldOriginal]; ok {
delete(ccs.renamedOriginals, oldOriginal)
ccs.renamedOriginals[newOriginal] = ri
}
for p, info := range ccs.renamedOriginals {
changed := false
if info.originalOldParent == oldOriginal {
info.originalOldParent = newOriginal
changed = true
}
if info.originalNewParent == oldOriginal {
info.originalNewParent = newOriginal
changed = true
}
if changed {
ccs.renamedOriginals[p] = info
}
}
return nil
} | go | func (ccs *crChains) changeOriginal(oldOriginal data.BlockPointer,
newOriginal data.BlockPointer) error {
if oldOriginal == newOriginal {
// This apparently can happen, but I'm not sure how. (See
// KBFS-2946.) Maybe because of a self-conflict in some weird
// error conditions. In this case, we can just pretend the
// change worked, and let CR continue it's normal process.
return nil
}
chain, ok := ccs.byOriginal[oldOriginal]
if !ok {
return errors.WithStack(NoChainFoundError{oldOriginal})
}
if _, ok := ccs.byOriginal[newOriginal]; ok {
return errors.Errorf("crChains.changeOriginal: New original %v "+
"already exists", newOriginal)
}
delete(ccs.byOriginal, oldOriginal)
chain.original = newOriginal
ccs.byOriginal[newOriginal] = chain
ccs.originals[oldOriginal] = newOriginal
if _, ok := ccs.deletedOriginals[oldOriginal]; ok {
delete(ccs.deletedOriginals, oldOriginal)
ccs.deletedOriginals[newOriginal] = true
}
if _, ok := ccs.createdOriginals[oldOriginal]; ok {
delete(ccs.createdOriginals, oldOriginal)
// We're swapping in an original made on some other branch, so
// it shouldn't go in the `createdOriginals` map.
}
if ri, ok := ccs.renamedOriginals[oldOriginal]; ok {
delete(ccs.renamedOriginals, oldOriginal)
ccs.renamedOriginals[newOriginal] = ri
}
for p, info := range ccs.renamedOriginals {
changed := false
if info.originalOldParent == oldOriginal {
info.originalOldParent = newOriginal
changed = true
}
if info.originalNewParent == oldOriginal {
info.originalNewParent = newOriginal
changed = true
}
if changed {
ccs.renamedOriginals[p] = info
}
}
return nil
} | [
"func",
"(",
"ccs",
"*",
"crChains",
")",
"changeOriginal",
"(",
"oldOriginal",
"data",
".",
"BlockPointer",
",",
"newOriginal",
"data",
".",
"BlockPointer",
")",
"error",
"{",
"if",
"oldOriginal",
"==",
"newOriginal",
"{",
"// This apparently can happen, but I'm not sure how. (See",
"// KBFS-2946.) Maybe because of a self-conflict in some weird",
"// error conditions. In this case, we can just pretend the",
"// change worked, and let CR continue it's normal process.",
"return",
"nil",
"\n",
"}",
"\n",
"chain",
",",
"ok",
":=",
"ccs",
".",
"byOriginal",
"[",
"oldOriginal",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"errors",
".",
"WithStack",
"(",
"NoChainFoundError",
"{",
"oldOriginal",
"}",
")",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"ccs",
".",
"byOriginal",
"[",
"newOriginal",
"]",
";",
"ok",
"{",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"newOriginal",
")",
"\n",
"}",
"\n\n",
"delete",
"(",
"ccs",
".",
"byOriginal",
",",
"oldOriginal",
")",
"\n",
"chain",
".",
"original",
"=",
"newOriginal",
"\n",
"ccs",
".",
"byOriginal",
"[",
"newOriginal",
"]",
"=",
"chain",
"\n",
"ccs",
".",
"originals",
"[",
"oldOriginal",
"]",
"=",
"newOriginal",
"\n\n",
"if",
"_",
",",
"ok",
":=",
"ccs",
".",
"deletedOriginals",
"[",
"oldOriginal",
"]",
";",
"ok",
"{",
"delete",
"(",
"ccs",
".",
"deletedOriginals",
",",
"oldOriginal",
")",
"\n",
"ccs",
".",
"deletedOriginals",
"[",
"newOriginal",
"]",
"=",
"true",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"ccs",
".",
"createdOriginals",
"[",
"oldOriginal",
"]",
";",
"ok",
"{",
"delete",
"(",
"ccs",
".",
"createdOriginals",
",",
"oldOriginal",
")",
"\n",
"// We're swapping in an original made on some other branch, so",
"// it shouldn't go in the `createdOriginals` map.",
"}",
"\n",
"if",
"ri",
",",
"ok",
":=",
"ccs",
".",
"renamedOriginals",
"[",
"oldOriginal",
"]",
";",
"ok",
"{",
"delete",
"(",
"ccs",
".",
"renamedOriginals",
",",
"oldOriginal",
")",
"\n",
"ccs",
".",
"renamedOriginals",
"[",
"newOriginal",
"]",
"=",
"ri",
"\n",
"}",
"\n",
"for",
"p",
",",
"info",
":=",
"range",
"ccs",
".",
"renamedOriginals",
"{",
"changed",
":=",
"false",
"\n",
"if",
"info",
".",
"originalOldParent",
"==",
"oldOriginal",
"{",
"info",
".",
"originalOldParent",
"=",
"newOriginal",
"\n",
"changed",
"=",
"true",
"\n",
"}",
"\n",
"if",
"info",
".",
"originalNewParent",
"==",
"oldOriginal",
"{",
"info",
".",
"originalNewParent",
"=",
"newOriginal",
"\n",
"changed",
"=",
"true",
"\n",
"}",
"\n",
"if",
"changed",
"{",
"ccs",
".",
"renamedOriginals",
"[",
"p",
"]",
"=",
"info",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // changeOriginal converts the original of a chain to a different
// original, which originated in some other branch. | [
"changeOriginal",
"converts",
"the",
"original",
"of",
"a",
"chain",
"to",
"a",
"different",
"original",
"which",
"originated",
"in",
"some",
"other",
"branch",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L1078-L1129 |
159,490 | keybase/client | go/kbfs/libkbfs/cr_chains.go | remove | func (ccs *crChains) remove(ctx context.Context, log logger.Logger,
revision kbfsmd.Revision) []*crChain {
var chainsWithRemovals []*crChain
for _, chain := range ccs.byOriginal {
if chain.remove(ctx, log, revision) {
chainsWithRemovals = append(chainsWithRemovals, chain)
}
}
return chainsWithRemovals
} | go | func (ccs *crChains) remove(ctx context.Context, log logger.Logger,
revision kbfsmd.Revision) []*crChain {
var chainsWithRemovals []*crChain
for _, chain := range ccs.byOriginal {
if chain.remove(ctx, log, revision) {
chainsWithRemovals = append(chainsWithRemovals, chain)
}
}
return chainsWithRemovals
} | [
"func",
"(",
"ccs",
"*",
"crChains",
")",
"remove",
"(",
"ctx",
"context",
".",
"Context",
",",
"log",
"logger",
".",
"Logger",
",",
"revision",
"kbfsmd",
".",
"Revision",
")",
"[",
"]",
"*",
"crChain",
"{",
"var",
"chainsWithRemovals",
"[",
"]",
"*",
"crChain",
"\n",
"for",
"_",
",",
"chain",
":=",
"range",
"ccs",
".",
"byOriginal",
"{",
"if",
"chain",
".",
"remove",
"(",
"ctx",
",",
"log",
",",
"revision",
")",
"{",
"chainsWithRemovals",
"=",
"append",
"(",
"chainsWithRemovals",
",",
"chain",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"chainsWithRemovals",
"\n",
"}"
] | // remove deletes all operations associated with the given revision
// from the chains. It leaves original block pointers in place
// though, even when removing operations from the head of the chain.
// It returns the set of chains with at least one operation removed. | [
"remove",
"deletes",
"all",
"operations",
"associated",
"with",
"the",
"given",
"revision",
"from",
"the",
"chains",
".",
"It",
"leaves",
"original",
"block",
"pointers",
"in",
"place",
"though",
"even",
"when",
"removing",
"operations",
"from",
"the",
"head",
"of",
"the",
"chain",
".",
"It",
"returns",
"the",
"set",
"of",
"chains",
"with",
"at",
"least",
"one",
"operation",
"removed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/cr_chains.go#L1352-L1361 |
159,491 | keybase/client | go/engine/bootstrap.go | NewBootstrap | func NewBootstrap(g *libkb.GlobalContext) *Bootstrap {
return &Bootstrap{
Contextified: libkb.NewContextified(g),
}
} | go | func NewBootstrap(g *libkb.GlobalContext) *Bootstrap {
return &Bootstrap{
Contextified: libkb.NewContextified(g),
}
} | [
"func",
"NewBootstrap",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"Bootstrap",
"{",
"return",
"&",
"Bootstrap",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
",",
"}",
"\n",
"}"
] | // NewBootstrap creates a Bootstrap engine. | [
"NewBootstrap",
"creates",
"a",
"Bootstrap",
"engine",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/bootstrap.go#L22-L26 |
159,492 | keybase/client | go/engine/bootstrap.go | signedUp | func (e *Bootstrap) signedUp(m libkb.MetaContext) bool {
cr := m.G().Env.GetConfig()
if cr == nil {
return false
}
if uid := cr.GetUID(); uid.Exists() {
return true
}
return false
} | go | func (e *Bootstrap) signedUp(m libkb.MetaContext) bool {
cr := m.G().Env.GetConfig()
if cr == nil {
return false
}
if uid := cr.GetUID(); uid.Exists() {
return true
}
return false
} | [
"func",
"(",
"e",
"*",
"Bootstrap",
")",
"signedUp",
"(",
"m",
"libkb",
".",
"MetaContext",
")",
"bool",
"{",
"cr",
":=",
"m",
".",
"G",
"(",
")",
".",
"Env",
".",
"GetConfig",
"(",
")",
"\n",
"if",
"cr",
"==",
"nil",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"uid",
":=",
"cr",
".",
"GetUID",
"(",
")",
";",
"uid",
".",
"Exists",
"(",
")",
"{",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // signedUp is true if there's a uid in config.json. | [
"signedUp",
"is",
"true",
"if",
"there",
"s",
"a",
"uid",
"in",
"config",
".",
"json",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/bootstrap.go#L131-L140 |
159,493 | keybase/client | go/kbfs/libkbfs/config_local.go | Set | func (m *DiskCacheMode) Set(s string) error {
*m = DiskCacheModeOff
switch strings.ToLower(strings.TrimSpace(s)) {
case "local":
*m = DiskCacheModeLocal
case "remote":
*m = DiskCacheModeRemote
}
return nil
} | go | func (m *DiskCacheMode) Set(s string) error {
*m = DiskCacheModeOff
switch strings.ToLower(strings.TrimSpace(s)) {
case "local":
*m = DiskCacheModeLocal
case "remote":
*m = DiskCacheModeRemote
}
return nil
} | [
"func",
"(",
"m",
"*",
"DiskCacheMode",
")",
"Set",
"(",
"s",
"string",
")",
"error",
"{",
"*",
"m",
"=",
"DiskCacheModeOff",
"\n",
"switch",
"strings",
".",
"ToLower",
"(",
"strings",
".",
"TrimSpace",
"(",
"s",
")",
")",
"{",
"case",
"\"",
"\"",
":",
"*",
"m",
"=",
"DiskCacheModeLocal",
"\n",
"case",
"\"",
"\"",
":",
"*",
"m",
"=",
"DiskCacheModeRemote",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Set parses a string representing a disk block cache initialization mode,
// and outputs the mode value corresponding to that string. Defaults to
// DiskCacheModeOff. | [
"Set",
"parses",
"a",
"string",
"representing",
"a",
"disk",
"block",
"cache",
"initialization",
"mode",
"and",
"outputs",
"the",
"mode",
"value",
"corresponding",
"to",
"that",
"string",
".",
"Defaults",
"to",
"DiskCacheModeOff",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L191-L200 |
159,494 | keybase/client | go/kbfs/libkbfs/config_local.go | KBFSOps | func (c *ConfigLocal) KBFSOps() KBFSOps {
c.lock.RLock()
defer c.lock.RUnlock()
return c.kbfs
} | go | func (c *ConfigLocal) KBFSOps() KBFSOps {
c.lock.RLock()
defer c.lock.RUnlock()
return c.kbfs
} | [
"func",
"(",
"c",
"*",
"ConfigLocal",
")",
"KBFSOps",
"(",
")",
"KBFSOps",
"{",
"c",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"c",
".",
"kbfs",
"\n",
"}"
] | // KBFSOps implements the Config interface for ConfigLocal. | [
"KBFSOps",
"implements",
"the",
"Config",
"interface",
"for",
"ConfigLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L298-L302 |
159,495 | keybase/client | go/kbfs/libkbfs/config_local.go | SetKBFSOps | func (c *ConfigLocal) SetKBFSOps(k KBFSOps) {
c.lock.Lock()
defer c.lock.Unlock()
c.kbfs = k
} | go | func (c *ConfigLocal) SetKBFSOps(k KBFSOps) {
c.lock.Lock()
defer c.lock.Unlock()
c.kbfs = k
} | [
"func",
"(",
"c",
"*",
"ConfigLocal",
")",
"SetKBFSOps",
"(",
"k",
"KBFSOps",
")",
"{",
"c",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"c",
".",
"kbfs",
"=",
"k",
"\n",
"}"
] | // SetKBFSOps implements the Config interface for ConfigLocal. | [
"SetKBFSOps",
"implements",
"the",
"Config",
"interface",
"for",
"ConfigLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L305-L309 |
159,496 | keybase/client | go/kbfs/libkbfs/config_local.go | KBPKI | func (c *ConfigLocal) KBPKI() KBPKI {
c.lock.RLock()
defer c.lock.RUnlock()
return c.kbpki
} | go | func (c *ConfigLocal) KBPKI() KBPKI {
c.lock.RLock()
defer c.lock.RUnlock()
return c.kbpki
} | [
"func",
"(",
"c",
"*",
"ConfigLocal",
")",
"KBPKI",
"(",
")",
"KBPKI",
"{",
"c",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"c",
".",
"kbpki",
"\n",
"}"
] | // KBPKI implements the Config interface for ConfigLocal. | [
"KBPKI",
"implements",
"the",
"Config",
"interface",
"for",
"ConfigLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L312-L316 |
159,497 | keybase/client | go/kbfs/libkbfs/config_local.go | CurrentSessionGetter | func (c *ConfigLocal) CurrentSessionGetter() idutil.CurrentSessionGetter {
c.lock.RLock()
defer c.lock.RUnlock()
return c.kbpki
} | go | func (c *ConfigLocal) CurrentSessionGetter() idutil.CurrentSessionGetter {
c.lock.RLock()
defer c.lock.RUnlock()
return c.kbpki
} | [
"func",
"(",
"c",
"*",
"ConfigLocal",
")",
"CurrentSessionGetter",
"(",
")",
"idutil",
".",
"CurrentSessionGetter",
"{",
"c",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"c",
".",
"kbpki",
"\n",
"}"
] | // CurrentSessionGetter implements the Config interface for ConfigLocal. | [
"CurrentSessionGetter",
"implements",
"the",
"Config",
"interface",
"for",
"ConfigLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L319-L323 |
159,498 | keybase/client | go/kbfs/libkbfs/config_local.go | SetKBPKI | func (c *ConfigLocal) SetKBPKI(k KBPKI) {
c.lock.Lock()
defer c.lock.Unlock()
c.kbpki = k
} | go | func (c *ConfigLocal) SetKBPKI(k KBPKI) {
c.lock.Lock()
defer c.lock.Unlock()
c.kbpki = k
} | [
"func",
"(",
"c",
"*",
"ConfigLocal",
")",
"SetKBPKI",
"(",
"k",
"KBPKI",
")",
"{",
"c",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"c",
".",
"kbpki",
"=",
"k",
"\n",
"}"
] | // SetKBPKI implements the Config interface for ConfigLocal. | [
"SetKBPKI",
"implements",
"the",
"Config",
"interface",
"for",
"ConfigLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L326-L330 |
159,499 | keybase/client | go/kbfs/libkbfs/config_local.go | KeyManager | func (c *ConfigLocal) KeyManager() KeyManager {
c.lock.RLock()
defer c.lock.RUnlock()
return c.keyman
} | go | func (c *ConfigLocal) KeyManager() KeyManager {
c.lock.RLock()
defer c.lock.RUnlock()
return c.keyman
} | [
"func",
"(",
"c",
"*",
"ConfigLocal",
")",
"KeyManager",
"(",
")",
"KeyManager",
"{",
"c",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"c",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"c",
".",
"keyman",
"\n",
"}"
] | // KeyManager implements the Config interface for ConfigLocal. | [
"KeyManager",
"implements",
"the",
"Config",
"interface",
"for",
"ConfigLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/config_local.go#L333-L337 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.