id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequencelengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
sequencelengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
159,800
keybase/client
go/teams/loader.go
NewTeamLoaderAndInstall
func NewTeamLoaderAndInstall(g *libkb.GlobalContext) *TeamLoader { world := NewLoaderContextFromG(g) st := NewStorage(g) l := NewTeamLoader(g, world, st) g.SetTeamLoader(l) g.AddLogoutHook(l, "teamLoader") g.AddDbNukeHook(l, "teamLoader") return l }
go
func NewTeamLoaderAndInstall(g *libkb.GlobalContext) *TeamLoader { world := NewLoaderContextFromG(g) st := NewStorage(g) l := NewTeamLoader(g, world, st) g.SetTeamLoader(l) g.AddLogoutHook(l, "teamLoader") g.AddDbNukeHook(l, "teamLoader") return l }
[ "func", "NewTeamLoaderAndInstall", "(", "g", "*", "libkb", ".", "GlobalContext", ")", "*", "TeamLoader", "{", "world", ":=", "NewLoaderContextFromG", "(", "g", ")", "\n", "st", ":=", "NewStorage", "(", "g", ")", "\n", "l", ":=", "NewTeamLoader", "(", "g", ",", "world", ",", "st", ")", "\n", "g", ".", "SetTeamLoader", "(", "l", ")", "\n", "g", ".", "AddLogoutHook", "(", "l", ",", "\"", "\"", ")", "\n", "g", ".", "AddDbNukeHook", "(", "l", ",", "\"", "\"", ")", "\n", "return", "l", "\n", "}" ]
// NewTeamLoaderAndInstall creates a new loader and installs it into G.
[ "NewTeamLoaderAndInstall", "creates", "a", "new", "loader", "and", "installs", "it", "into", "G", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L93-L101
159,801
keybase/client
go/teams/loader.go
ResolveNameToIDUntrusted
func (l *TeamLoader) ResolveNameToIDUntrusted(ctx context.Context, teamName keybase1.TeamName, public bool, allowCache bool) (id keybase1.TeamID, err error) { defer l.G().CVTrace(ctx, libkb.VLog0, fmt.Sprintf("resolveNameToUIDUntrusted(%s,%v,%v)", teamName.String(), public, allowCache), func() error { return err })() // For root team names, just hash. if teamName.IsRootTeam() { return teamName.ToTeamID(public), nil } if !allowCache { return resolveNameToIDUntrustedAPICall(ctx, l.G(), teamName, public) } var idVoidPointer interface{} key := nameLookupBurstCacheKey{teamName, public} idVoidPointer, err = l.nameLookupBurstCache.Load(ctx, key, l.makeNameLookupBurstCacheLoader(ctx, l.G(), key)) if err != nil { return keybase1.TeamID(""), err } if idPointer, ok := idVoidPointer.(*keybase1.TeamID); ok && idPointer != nil { id = *idPointer } else { return keybase1.TeamID(""), errors.New("bad cast out of nameLookupBurstCache") } return id, nil }
go
func (l *TeamLoader) ResolveNameToIDUntrusted(ctx context.Context, teamName keybase1.TeamName, public bool, allowCache bool) (id keybase1.TeamID, err error) { defer l.G().CVTrace(ctx, libkb.VLog0, fmt.Sprintf("resolveNameToUIDUntrusted(%s,%v,%v)", teamName.String(), public, allowCache), func() error { return err })() // For root team names, just hash. if teamName.IsRootTeam() { return teamName.ToTeamID(public), nil } if !allowCache { return resolveNameToIDUntrustedAPICall(ctx, l.G(), teamName, public) } var idVoidPointer interface{} key := nameLookupBurstCacheKey{teamName, public} idVoidPointer, err = l.nameLookupBurstCache.Load(ctx, key, l.makeNameLookupBurstCacheLoader(ctx, l.G(), key)) if err != nil { return keybase1.TeamID(""), err } if idPointer, ok := idVoidPointer.(*keybase1.TeamID); ok && idPointer != nil { id = *idPointer } else { return keybase1.TeamID(""), errors.New("bad cast out of nameLookupBurstCache") } return id, nil }
[ "func", "(", "l", "*", "TeamLoader", ")", "ResolveNameToIDUntrusted", "(", "ctx", "context", ".", "Context", ",", "teamName", "keybase1", ".", "TeamName", ",", "public", "bool", ",", "allowCache", "bool", ")", "(", "id", "keybase1", ".", "TeamID", ",", "err", "error", ")", "{", "defer", "l", ".", "G", "(", ")", ".", "CVTrace", "(", "ctx", ",", "libkb", ".", "VLog0", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "teamName", ".", "String", "(", ")", ",", "public", ",", "allowCache", ")", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "// For root team names, just hash.", "if", "teamName", ".", "IsRootTeam", "(", ")", "{", "return", "teamName", ".", "ToTeamID", "(", "public", ")", ",", "nil", "\n", "}", "\n\n", "if", "!", "allowCache", "{", "return", "resolveNameToIDUntrustedAPICall", "(", "ctx", ",", "l", ".", "G", "(", ")", ",", "teamName", ",", "public", ")", "\n", "}", "\n\n", "var", "idVoidPointer", "interface", "{", "}", "\n", "key", ":=", "nameLookupBurstCacheKey", "{", "teamName", ",", "public", "}", "\n", "idVoidPointer", ",", "err", "=", "l", ".", "nameLookupBurstCache", ".", "Load", "(", "ctx", ",", "key", ",", "l", ".", "makeNameLookupBurstCacheLoader", "(", "ctx", ",", "l", ".", "G", "(", ")", ",", "key", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "keybase1", ".", "TeamID", "(", "\"", "\"", ")", ",", "err", "\n", "}", "\n", "if", "idPointer", ",", "ok", ":=", "idVoidPointer", ".", "(", "*", "keybase1", ".", "TeamID", ")", ";", "ok", "&&", "idPointer", "!=", "nil", "{", "id", "=", "*", "idPointer", "\n", "}", "else", "{", "return", "keybase1", ".", "TeamID", "(", "\"", "\"", ")", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "id", ",", "nil", "\n", "}" ]
// Resolve a team name to a team ID. // Will always hit the server for subteams. The server can lie in this return value.
[ "Resolve", "a", "team", "name", "to", "a", "team", "ID", ".", "Will", "always", "hit", "the", "server", "for", "subteams", ".", "The", "server", "can", "lie", "in", "this", "return", "value", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L158-L183
159,802
keybase/client
go/teams/loader.go
load2
func (l *TeamLoader) load2(ctx context.Context, arg load2ArgT) (ret *load2ResT, err error) { ctx = libkb.WithLogTag(ctx, "LT") // Load team if arg.reason != "" { ctx = libkb.WithLogTag(ctx, "LT2") // Load team recursive } traceLabel := fmt.Sprintf("TeamLoader#load2(%v, public:%v)", arg.teamID, arg.public) if len(arg.reason) > 0 { traceLabel = traceLabel + " '" + arg.reason + "'" } defer l.G().CTraceTimed(ctx, traceLabel, func() error { return err })() ret, err = l.load2Inner(ctx, arg) return ret, err }
go
func (l *TeamLoader) load2(ctx context.Context, arg load2ArgT) (ret *load2ResT, err error) { ctx = libkb.WithLogTag(ctx, "LT") // Load team if arg.reason != "" { ctx = libkb.WithLogTag(ctx, "LT2") // Load team recursive } traceLabel := fmt.Sprintf("TeamLoader#load2(%v, public:%v)", arg.teamID, arg.public) if len(arg.reason) > 0 { traceLabel = traceLabel + " '" + arg.reason + "'" } defer l.G().CTraceTimed(ctx, traceLabel, func() error { return err })() ret, err = l.load2Inner(ctx, arg) return ret, err }
[ "func", "(", "l", "*", "TeamLoader", ")", "load2", "(", "ctx", "context", ".", "Context", ",", "arg", "load2ArgT", ")", "(", "ret", "*", "load2ResT", ",", "err", "error", ")", "{", "ctx", "=", "libkb", ".", "WithLogTag", "(", "ctx", ",", "\"", "\"", ")", "// Load team", "\n", "if", "arg", ".", "reason", "!=", "\"", "\"", "{", "ctx", "=", "libkb", ".", "WithLogTag", "(", "ctx", ",", "\"", "\"", ")", "// Load team recursive", "\n", "}", "\n", "traceLabel", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "arg", ".", "teamID", ",", "arg", ".", "public", ")", "\n", "if", "len", "(", "arg", ".", "reason", ")", ">", "0", "{", "traceLabel", "=", "traceLabel", "+", "\"", "\"", "+", "arg", ".", "reason", "+", "\"", "\"", "\n", "}", "\n\n", "defer", "l", ".", "G", "(", ")", ".", "CTraceTimed", "(", "ctx", ",", "traceLabel", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n", "ret", ",", "err", "=", "l", ".", "load2Inner", "(", "ctx", ",", "arg", ")", "\n", "return", "ret", ",", "err", "\n", "}" ]
// Load2 does the rest of the work loading a team. // It is `playchain` described in the pseudocode in teamplayer.txt
[ "Load2", "does", "the", "rest", "of", "the", "work", "loading", "a", "team", ".", "It", "is", "playchain", "described", "in", "the", "pseudocode", "in", "teamplayer", ".", "txt" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L386-L399
159,803
keybase/client
go/teams/loader.go
userPreload
func (l *TeamLoader) userPreload(ctx context.Context, links []*ChainLinkUnpacked, fullVerifyCutoff keybase1.Seqno) (cancel func()) { ctx, cancel = context.WithCancel(ctx) if teamEnv.UserPreloadEnable { uidSet := make(map[keybase1.UID]struct{}) for _, link := range links { // fullVerify definition copied from verifyLink fullVerify := (link.LinkType() != libkb.SigchainV2TypeTeamLeave) || (link.Seqno() >= fullVerifyCutoff) || (link.source.EldestSeqno == 0) if !link.isStubbed() && fullVerify { uidSet[link.inner.Body.Key.UID] = struct{}{} } } l.G().Log.CDebugf(ctx, "TeamLoader userPreload uids: %v", len(uidSet)) if teamEnv.UserPreloadParallel { // Note this is full-parallel. Probably want pipelining if this is to be turned on by default. var wg sync.WaitGroup for uid := range uidSet { wg.Add(1) go func(uid keybase1.UID) { _, _, err := l.G().GetUPAKLoader().LoadV2( libkb.NewLoadUserArg(l.G()).WithUID(uid).WithPublicKeyOptional().WithNetContext(ctx)) if err != nil { l.G().Log.CDebugf(ctx, "error preloading uid %v", uid) } wg.Done() }(uid) } if teamEnv.UserPreloadWait { wg.Wait() } } else { for uid := range uidSet { _, _, err := l.G().GetUPAKLoader().LoadV2( libkb.NewLoadUserArg(l.G()).WithUID(uid).WithPublicKeyOptional().WithNetContext(ctx)) if err != nil { l.G().Log.CDebugf(ctx, "error preloading uid %v", uid) } } } } return cancel }
go
func (l *TeamLoader) userPreload(ctx context.Context, links []*ChainLinkUnpacked, fullVerifyCutoff keybase1.Seqno) (cancel func()) { ctx, cancel = context.WithCancel(ctx) if teamEnv.UserPreloadEnable { uidSet := make(map[keybase1.UID]struct{}) for _, link := range links { // fullVerify definition copied from verifyLink fullVerify := (link.LinkType() != libkb.SigchainV2TypeTeamLeave) || (link.Seqno() >= fullVerifyCutoff) || (link.source.EldestSeqno == 0) if !link.isStubbed() && fullVerify { uidSet[link.inner.Body.Key.UID] = struct{}{} } } l.G().Log.CDebugf(ctx, "TeamLoader userPreload uids: %v", len(uidSet)) if teamEnv.UserPreloadParallel { // Note this is full-parallel. Probably want pipelining if this is to be turned on by default. var wg sync.WaitGroup for uid := range uidSet { wg.Add(1) go func(uid keybase1.UID) { _, _, err := l.G().GetUPAKLoader().LoadV2( libkb.NewLoadUserArg(l.G()).WithUID(uid).WithPublicKeyOptional().WithNetContext(ctx)) if err != nil { l.G().Log.CDebugf(ctx, "error preloading uid %v", uid) } wg.Done() }(uid) } if teamEnv.UserPreloadWait { wg.Wait() } } else { for uid := range uidSet { _, _, err := l.G().GetUPAKLoader().LoadV2( libkb.NewLoadUserArg(l.G()).WithUID(uid).WithPublicKeyOptional().WithNetContext(ctx)) if err != nil { l.G().Log.CDebugf(ctx, "error preloading uid %v", uid) } } } } return cancel }
[ "func", "(", "l", "*", "TeamLoader", ")", "userPreload", "(", "ctx", "context", ".", "Context", ",", "links", "[", "]", "*", "ChainLinkUnpacked", ",", "fullVerifyCutoff", "keybase1", ".", "Seqno", ")", "(", "cancel", "func", "(", ")", ")", "{", "ctx", ",", "cancel", "=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "if", "teamEnv", ".", "UserPreloadEnable", "{", "uidSet", ":=", "make", "(", "map", "[", "keybase1", ".", "UID", "]", "struct", "{", "}", ")", "\n", "for", "_", ",", "link", ":=", "range", "links", "{", "// fullVerify definition copied from verifyLink", "fullVerify", ":=", "(", "link", ".", "LinkType", "(", ")", "!=", "libkb", ".", "SigchainV2TypeTeamLeave", ")", "||", "(", "link", ".", "Seqno", "(", ")", ">=", "fullVerifyCutoff", ")", "||", "(", "link", ".", "source", ".", "EldestSeqno", "==", "0", ")", "\n", "if", "!", "link", ".", "isStubbed", "(", ")", "&&", "fullVerify", "{", "uidSet", "[", "link", ".", "inner", ".", "Body", ".", "Key", ".", "UID", "]", "=", "struct", "{", "}", "{", "}", "\n", "}", "\n", "}", "\n", "l", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "len", "(", "uidSet", ")", ")", "\n", "if", "teamEnv", ".", "UserPreloadParallel", "{", "// Note this is full-parallel. Probably want pipelining if this is to be turned on by default.", "var", "wg", "sync", ".", "WaitGroup", "\n", "for", "uid", ":=", "range", "uidSet", "{", "wg", ".", "Add", "(", "1", ")", "\n", "go", "func", "(", "uid", "keybase1", ".", "UID", ")", "{", "_", ",", "_", ",", "err", ":=", "l", ".", "G", "(", ")", ".", "GetUPAKLoader", "(", ")", ".", "LoadV2", "(", "libkb", ".", "NewLoadUserArg", "(", "l", ".", "G", "(", ")", ")", ".", "WithUID", "(", "uid", ")", ".", "WithPublicKeyOptional", "(", ")", ".", "WithNetContext", "(", "ctx", ")", ")", "\n", "if", "err", "!=", "nil", "{", "l", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "uid", ")", "\n", "}", "\n", "wg", ".", "Done", "(", ")", "\n", "}", "(", "uid", ")", "\n", "}", "\n", "if", "teamEnv", ".", "UserPreloadWait", "{", "wg", ".", "Wait", "(", ")", "\n", "}", "\n", "}", "else", "{", "for", "uid", ":=", "range", "uidSet", "{", "_", ",", "_", ",", "err", ":=", "l", ".", "G", "(", ")", ".", "GetUPAKLoader", "(", ")", ".", "LoadV2", "(", "libkb", ".", "NewLoadUserArg", "(", "l", ".", "G", "(", ")", ")", ".", "WithUID", "(", "uid", ")", ".", "WithPublicKeyOptional", "(", ")", ".", "WithNetContext", "(", "ctx", ")", ")", "\n", "if", "err", "!=", "nil", "{", "l", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "uid", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "cancel", "\n", "}" ]
// userPreload warms the upak cache with users who will probably need to be loaded to verify the chain. // Uses teamEnv and may be disabled.
[ "userPreload", "warms", "the", "upak", "cache", "with", "users", "who", "will", "probably", "need", "to", "be", "loaded", "to", "verify", "the", "chain", ".", "Uses", "teamEnv", "and", "may", "be", "disabled", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L820-L862
159,804
keybase/client
go/teams/loader.go
satisfiesNeedAdmin
func (l *TeamLoader) satisfiesNeedAdmin(ctx context.Context, me keybase1.UserVersion, teamData *keybase1.TeamData) bool { if teamData == nil { return false } if (TeamSigChainState{inner: teamData.Chain}.HasAnyStubbedLinks()) { return false } if !l.hasSyncedSecrets(teamData) { return false } state := TeamSigChainState{inner: teamData.Chain} role, err := state.GetUserRole(me) if err != nil { l.G().Log.CDebugf(ctx, "TeamLoader error getting my role: %v", err) return false } if !role.IsAdminOrAbove() { if !state.IsSubteam() { return false } yes, err := l.isImplicitAdminOf(ctx, state.GetID(), state.GetParentID(), me, me) if err != nil { l.G().Log.CDebugf(ctx, "TeamLoader error getting checking implicit admin: %s", err) return false } if !yes { return false } } return true }
go
func (l *TeamLoader) satisfiesNeedAdmin(ctx context.Context, me keybase1.UserVersion, teamData *keybase1.TeamData) bool { if teamData == nil { return false } if (TeamSigChainState{inner: teamData.Chain}.HasAnyStubbedLinks()) { return false } if !l.hasSyncedSecrets(teamData) { return false } state := TeamSigChainState{inner: teamData.Chain} role, err := state.GetUserRole(me) if err != nil { l.G().Log.CDebugf(ctx, "TeamLoader error getting my role: %v", err) return false } if !role.IsAdminOrAbove() { if !state.IsSubteam() { return false } yes, err := l.isImplicitAdminOf(ctx, state.GetID(), state.GetParentID(), me, me) if err != nil { l.G().Log.CDebugf(ctx, "TeamLoader error getting checking implicit admin: %s", err) return false } if !yes { return false } } return true }
[ "func", "(", "l", "*", "TeamLoader", ")", "satisfiesNeedAdmin", "(", "ctx", "context", ".", "Context", ",", "me", "keybase1", ".", "UserVersion", ",", "teamData", "*", "keybase1", ".", "TeamData", ")", "bool", "{", "if", "teamData", "==", "nil", "{", "return", "false", "\n", "}", "\n", "if", "(", "TeamSigChainState", "{", "inner", ":", "teamData", ".", "Chain", "}", ".", "HasAnyStubbedLinks", "(", ")", ")", "{", "return", "false", "\n", "}", "\n", "if", "!", "l", ".", "hasSyncedSecrets", "(", "teamData", ")", "{", "return", "false", "\n", "}", "\n", "state", ":=", "TeamSigChainState", "{", "inner", ":", "teamData", ".", "Chain", "}", "\n", "role", ",", "err", ":=", "state", ".", "GetUserRole", "(", "me", ")", "\n", "if", "err", "!=", "nil", "{", "l", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "err", ")", "\n", "return", "false", "\n", "}", "\n", "if", "!", "role", ".", "IsAdminOrAbove", "(", ")", "{", "if", "!", "state", ".", "IsSubteam", "(", ")", "{", "return", "false", "\n", "}", "\n", "yes", ",", "err", ":=", "l", ".", "isImplicitAdminOf", "(", "ctx", ",", "state", ".", "GetID", "(", ")", ",", "state", ".", "GetParentID", "(", ")", ",", "me", ",", "me", ")", "\n", "if", "err", "!=", "nil", "{", "l", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "err", ")", "\n", "return", "false", "\n", "}", "\n", "if", "!", "yes", "{", "return", "false", "\n", "}", "\n", "}", "\n", "return", "true", "\n", "}" ]
// Whether the user is an admin at the snapshot, and there are no stubbed links, and keys are up to date.
[ "Whether", "the", "user", "is", "an", "admin", "at", "the", "snapshot", "and", "there", "are", "no", "stubbed", "links", "and", "keys", "are", "up", "to", "date", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1027-L1057
159,805
keybase/client
go/teams/loader.go
isImplicitAdminOf
func (l *TeamLoader) isImplicitAdminOf(ctx context.Context, teamID keybase1.TeamID, ancestorID *keybase1.TeamID, me keybase1.UserVersion, uv keybase1.UserVersion) (bool, error) { // IDs of ancestors that were not freshly polled. // Check them again with forceRepoll if the affirmative is not found cached. checkAgain := make(map[keybase1.TeamID]bool) check1 := func(chain *TeamSigChainState) bool { role, err := chain.GetUserRole(uv) if err != nil { return false } return role.IsAdminOrAbove() } i := 0 for { i++ if i >= 100 { // Break in case there's a bug in this loop. return false, fmt.Errorf("stuck in a loop while checking for implicit admin: %v", ancestorID) } // Use load2 so that we can use subteam-reader and get secretless teams. ancestor, err := l.load2(ctx, load2ArgT{ teamID: *ancestorID, reason: "isImplicitAdminOf-1", me: me, readSubteamID: &teamID, }) if err != nil { return false, err } // Be wary, `ancestor` could be, and is likely, a secretless team. // Do not let it out of sight. ancestorChain := TeamSigChainState{inner: ancestor.team.Chain} if !ancestor.didRepoll { checkAgain[ancestorChain.GetID()] = true } if check1(&ancestorChain) { return true, nil } if !ancestorChain.IsSubteam() { break } // Get the next level up. ancestorID = ancestorChain.GetParentID() } // The answer was not found to be yes in the cache. // Try again with the teams that were not polled as they might have unseen updates. for ancestorID := range checkAgain { ancestor, err := l.load2(ctx, load2ArgT{ teamID: ancestorID, reason: "isImplicitAdminOf-again", me: me, forceRepoll: true, // Get the latest info. readSubteamID: &teamID, }) if err != nil { return false, err } // Be wary, `ancestor` could be, and is likely, a secretless team. // Do not let it out of sight. ancestorChain := TeamSigChainState{inner: ancestor.team.Chain} if check1(&ancestorChain) { return true, nil } } return false, nil }
go
func (l *TeamLoader) isImplicitAdminOf(ctx context.Context, teamID keybase1.TeamID, ancestorID *keybase1.TeamID, me keybase1.UserVersion, uv keybase1.UserVersion) (bool, error) { // IDs of ancestors that were not freshly polled. // Check them again with forceRepoll if the affirmative is not found cached. checkAgain := make(map[keybase1.TeamID]bool) check1 := func(chain *TeamSigChainState) bool { role, err := chain.GetUserRole(uv) if err != nil { return false } return role.IsAdminOrAbove() } i := 0 for { i++ if i >= 100 { // Break in case there's a bug in this loop. return false, fmt.Errorf("stuck in a loop while checking for implicit admin: %v", ancestorID) } // Use load2 so that we can use subteam-reader and get secretless teams. ancestor, err := l.load2(ctx, load2ArgT{ teamID: *ancestorID, reason: "isImplicitAdminOf-1", me: me, readSubteamID: &teamID, }) if err != nil { return false, err } // Be wary, `ancestor` could be, and is likely, a secretless team. // Do not let it out of sight. ancestorChain := TeamSigChainState{inner: ancestor.team.Chain} if !ancestor.didRepoll { checkAgain[ancestorChain.GetID()] = true } if check1(&ancestorChain) { return true, nil } if !ancestorChain.IsSubteam() { break } // Get the next level up. ancestorID = ancestorChain.GetParentID() } // The answer was not found to be yes in the cache. // Try again with the teams that were not polled as they might have unseen updates. for ancestorID := range checkAgain { ancestor, err := l.load2(ctx, load2ArgT{ teamID: ancestorID, reason: "isImplicitAdminOf-again", me: me, forceRepoll: true, // Get the latest info. readSubteamID: &teamID, }) if err != nil { return false, err } // Be wary, `ancestor` could be, and is likely, a secretless team. // Do not let it out of sight. ancestorChain := TeamSigChainState{inner: ancestor.team.Chain} if check1(&ancestorChain) { return true, nil } } return false, nil }
[ "func", "(", "l", "*", "TeamLoader", ")", "isImplicitAdminOf", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ",", "ancestorID", "*", "keybase1", ".", "TeamID", ",", "me", "keybase1", ".", "UserVersion", ",", "uv", "keybase1", ".", "UserVersion", ")", "(", "bool", ",", "error", ")", "{", "// IDs of ancestors that were not freshly polled.", "// Check them again with forceRepoll if the affirmative is not found cached.", "checkAgain", ":=", "make", "(", "map", "[", "keybase1", ".", "TeamID", "]", "bool", ")", "\n\n", "check1", ":=", "func", "(", "chain", "*", "TeamSigChainState", ")", "bool", "{", "role", ",", "err", ":=", "chain", ".", "GetUserRole", "(", "uv", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", "\n", "}", "\n", "return", "role", ".", "IsAdminOrAbove", "(", ")", "\n", "}", "\n\n", "i", ":=", "0", "\n", "for", "{", "i", "++", "\n", "if", "i", ">=", "100", "{", "// Break in case there's a bug in this loop.", "return", "false", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "ancestorID", ")", "\n", "}", "\n\n", "// Use load2 so that we can use subteam-reader and get secretless teams.", "ancestor", ",", "err", ":=", "l", ".", "load2", "(", "ctx", ",", "load2ArgT", "{", "teamID", ":", "*", "ancestorID", ",", "reason", ":", "\"", "\"", ",", "me", ":", "me", ",", "readSubteamID", ":", "&", "teamID", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "// Be wary, `ancestor` could be, and is likely, a secretless team.", "// Do not let it out of sight.", "ancestorChain", ":=", "TeamSigChainState", "{", "inner", ":", "ancestor", ".", "team", ".", "Chain", "}", "\n\n", "if", "!", "ancestor", ".", "didRepoll", "{", "checkAgain", "[", "ancestorChain", ".", "GetID", "(", ")", "]", "=", "true", "\n", "}", "\n\n", "if", "check1", "(", "&", "ancestorChain", ")", "{", "return", "true", ",", "nil", "\n", "}", "\n\n", "if", "!", "ancestorChain", ".", "IsSubteam", "(", ")", "{", "break", "\n", "}", "\n", "// Get the next level up.", "ancestorID", "=", "ancestorChain", ".", "GetParentID", "(", ")", "\n", "}", "\n\n", "// The answer was not found to be yes in the cache.", "// Try again with the teams that were not polled as they might have unseen updates.", "for", "ancestorID", ":=", "range", "checkAgain", "{", "ancestor", ",", "err", ":=", "l", ".", "load2", "(", "ctx", ",", "load2ArgT", "{", "teamID", ":", "ancestorID", ",", "reason", ":", "\"", "\"", ",", "me", ":", "me", ",", "forceRepoll", ":", "true", ",", "// Get the latest info.", "readSubteamID", ":", "&", "teamID", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "// Be wary, `ancestor` could be, and is likely, a secretless team.", "// Do not let it out of sight.", "ancestorChain", ":=", "TeamSigChainState", "{", "inner", ":", "ancestor", ".", "team", ".", "Chain", "}", "\n", "if", "check1", "(", "&", "ancestorChain", ")", "{", "return", "true", ",", "nil", "\n", "}", "\n", "}", "\n\n", "return", "false", ",", "nil", "\n", "}" ]
// Check whether a user is an implicit admin of a team.
[ "Check", "whether", "a", "user", "is", "an", "implicit", "admin", "of", "a", "team", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1060-L1134
159,806
keybase/client
go/teams/loader.go
satisfiesNeedKeyGeneration
func (l *TeamLoader) satisfiesNeedKeyGeneration(ctx context.Context, needKeyGeneration keybase1.PerTeamKeyGeneration, state *keybase1.TeamData) error { if needKeyGeneration == 0 { return nil } if state == nil { return fmt.Errorf("nil team does not contain key generation: %v", needKeyGeneration) } key, err := TeamSigChainState{inner: state.Chain}.GetLatestPerTeamKey() if err != nil { return err } if needKeyGeneration > key.Gen { return fmt.Errorf("team key generation too low: %v < %v", key.Gen, needKeyGeneration) } _, ok := state.PerTeamKeySeedsUnverified[needKeyGeneration] if !ok { return fmt.Errorf("team key secret missing for generation: %v", needKeyGeneration) } return nil }
go
func (l *TeamLoader) satisfiesNeedKeyGeneration(ctx context.Context, needKeyGeneration keybase1.PerTeamKeyGeneration, state *keybase1.TeamData) error { if needKeyGeneration == 0 { return nil } if state == nil { return fmt.Errorf("nil team does not contain key generation: %v", needKeyGeneration) } key, err := TeamSigChainState{inner: state.Chain}.GetLatestPerTeamKey() if err != nil { return err } if needKeyGeneration > key.Gen { return fmt.Errorf("team key generation too low: %v < %v", key.Gen, needKeyGeneration) } _, ok := state.PerTeamKeySeedsUnverified[needKeyGeneration] if !ok { return fmt.Errorf("team key secret missing for generation: %v", needKeyGeneration) } return nil }
[ "func", "(", "l", "*", "TeamLoader", ")", "satisfiesNeedKeyGeneration", "(", "ctx", "context", ".", "Context", ",", "needKeyGeneration", "keybase1", ".", "PerTeamKeyGeneration", ",", "state", "*", "keybase1", ".", "TeamData", ")", "error", "{", "if", "needKeyGeneration", "==", "0", "{", "return", "nil", "\n", "}", "\n", "if", "state", "==", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "needKeyGeneration", ")", "\n", "}", "\n", "key", ",", "err", ":=", "TeamSigChainState", "{", "inner", ":", "state", ".", "Chain", "}", ".", "GetLatestPerTeamKey", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "if", "needKeyGeneration", ">", "key", ".", "Gen", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "key", ".", "Gen", ",", "needKeyGeneration", ")", "\n", "}", "\n", "_", ",", "ok", ":=", "state", ".", "PerTeamKeySeedsUnverified", "[", "needKeyGeneration", "]", "\n", "if", "!", "ok", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "needKeyGeneration", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Whether the snapshot has loaded at least up to the key generation and has the secret.
[ "Whether", "the", "snapshot", "has", "loaded", "at", "least", "up", "to", "the", "key", "generation", "and", "has", "the", "secret", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1156-L1175
159,807
keybase/client
go/teams/loader.go
satisfiesNeedApplicationsAtGenerations
func (l *TeamLoader) satisfiesNeedApplicationsAtGenerations(ctx context.Context, needApplicationsAtGenerations map[keybase1.PerTeamKeyGeneration][]keybase1.TeamApplication, state *keybase1.TeamData) error { if len(needApplicationsAtGenerations) == 0 { return nil } if state == nil { return fmt.Errorf("nil team does not contain applications: %v", needApplicationsAtGenerations) } for ptkGen, apps := range needApplicationsAtGenerations { for _, app := range apps { if _, err := ApplicationKeyAtGeneration(libkb.NewMetaContext(ctx, l.G()), state, app, ptkGen); err != nil { return err } } } return nil }
go
func (l *TeamLoader) satisfiesNeedApplicationsAtGenerations(ctx context.Context, needApplicationsAtGenerations map[keybase1.PerTeamKeyGeneration][]keybase1.TeamApplication, state *keybase1.TeamData) error { if len(needApplicationsAtGenerations) == 0 { return nil } if state == nil { return fmt.Errorf("nil team does not contain applications: %v", needApplicationsAtGenerations) } for ptkGen, apps := range needApplicationsAtGenerations { for _, app := range apps { if _, err := ApplicationKeyAtGeneration(libkb.NewMetaContext(ctx, l.G()), state, app, ptkGen); err != nil { return err } } } return nil }
[ "func", "(", "l", "*", "TeamLoader", ")", "satisfiesNeedApplicationsAtGenerations", "(", "ctx", "context", ".", "Context", ",", "needApplicationsAtGenerations", "map", "[", "keybase1", ".", "PerTeamKeyGeneration", "]", "[", "]", "keybase1", ".", "TeamApplication", ",", "state", "*", "keybase1", ".", "TeamData", ")", "error", "{", "if", "len", "(", "needApplicationsAtGenerations", ")", "==", "0", "{", "return", "nil", "\n", "}", "\n", "if", "state", "==", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "needApplicationsAtGenerations", ")", "\n", "}", "\n", "for", "ptkGen", ",", "apps", ":=", "range", "needApplicationsAtGenerations", "{", "for", "_", ",", "app", ":=", "range", "apps", "{", "if", "_", ",", "err", ":=", "ApplicationKeyAtGeneration", "(", "libkb", ".", "NewMetaContext", "(", "ctx", ",", "l", ".", "G", "(", ")", ")", ",", "state", ",", "app", ",", "ptkGen", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Whether the snapshot has loaded the reader key masks and key generations we // need.
[ "Whether", "the", "snapshot", "has", "loaded", "the", "reader", "key", "masks", "and", "key", "generations", "we", "need", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1179-L1195
159,808
keybase/client
go/teams/loader.go
satisfiesWantMembers
func (l *TeamLoader) satisfiesWantMembers(ctx context.Context, wantMembers []keybase1.UserVersion, wantMembersRole keybase1.TeamRole, state *keybase1.TeamData) error { if wantMembersRole == keybase1.TeamRole_NONE { // Default to writer. wantMembersRole = keybase1.TeamRole_WRITER } if len(wantMembers) == 0 { return nil } if state == nil { return fmt.Errorf("nil team does not have wanted members") } for _, uv := range wantMembers { role, err := TeamSigChainState{inner: state.Chain}.GetUserRole(uv) if err != nil { return fmt.Errorf("could not get wanted user role: %v", err) } if !role.IsOrAbove(wantMembersRole) { return fmt.Errorf("wanted user %v is a %v which is not at least %v", uv, role, wantMembersRole) } } return nil }
go
func (l *TeamLoader) satisfiesWantMembers(ctx context.Context, wantMembers []keybase1.UserVersion, wantMembersRole keybase1.TeamRole, state *keybase1.TeamData) error { if wantMembersRole == keybase1.TeamRole_NONE { // Default to writer. wantMembersRole = keybase1.TeamRole_WRITER } if len(wantMembers) == 0 { return nil } if state == nil { return fmt.Errorf("nil team does not have wanted members") } for _, uv := range wantMembers { role, err := TeamSigChainState{inner: state.Chain}.GetUserRole(uv) if err != nil { return fmt.Errorf("could not get wanted user role: %v", err) } if !role.IsOrAbove(wantMembersRole) { return fmt.Errorf("wanted user %v is a %v which is not at least %v", uv, role, wantMembersRole) } } return nil }
[ "func", "(", "l", "*", "TeamLoader", ")", "satisfiesWantMembers", "(", "ctx", "context", ".", "Context", ",", "wantMembers", "[", "]", "keybase1", ".", "UserVersion", ",", "wantMembersRole", "keybase1", ".", "TeamRole", ",", "state", "*", "keybase1", ".", "TeamData", ")", "error", "{", "if", "wantMembersRole", "==", "keybase1", ".", "TeamRole_NONE", "{", "// Default to writer.", "wantMembersRole", "=", "keybase1", ".", "TeamRole_WRITER", "\n", "}", "\n", "if", "len", "(", "wantMembers", ")", "==", "0", "{", "return", "nil", "\n", "}", "\n", "if", "state", "==", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "for", "_", ",", "uv", ":=", "range", "wantMembers", "{", "role", ",", "err", ":=", "TeamSigChainState", "{", "inner", ":", "state", ".", "Chain", "}", ".", "GetUserRole", "(", "uv", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "if", "!", "role", ".", "IsOrAbove", "(", "wantMembersRole", ")", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "uv", ",", "role", ",", "wantMembersRole", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Whether the snapshot has each of `wantMembers` as a member.
[ "Whether", "the", "snapshot", "has", "each", "of", "wantMembers", "as", "a", "member", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1218-L1241
159,809
keybase/client
go/teams/loader.go
seqnosContains
func (l *TeamLoader) seqnosContains(xs []keybase1.Seqno, y keybase1.Seqno) bool { for _, x := range xs { if x.Eq(y) { return true } } return false }
go
func (l *TeamLoader) seqnosContains(xs []keybase1.Seqno, y keybase1.Seqno) bool { for _, x := range xs { if x.Eq(y) { return true } } return false }
[ "func", "(", "l", "*", "TeamLoader", ")", "seqnosContains", "(", "xs", "[", "]", "keybase1", ".", "Seqno", ",", "y", "keybase1", ".", "Seqno", ")", "bool", "{", "for", "_", ",", "x", ":=", "range", "xs", "{", "if", "x", ".", "Eq", "(", "y", ")", "{", "return", "true", "\n", "}", "\n", "}", "\n", "return", "false", "\n", "}" ]
// Whether y is in xs.
[ "Whether", "y", "is", "in", "xs", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1261-L1268
159,810
keybase/client
go/teams/loader.go
seqnosMax
func (l *TeamLoader) seqnosMax(seqnos []keybase1.Seqno) (ret keybase1.Seqno) { for _, x := range seqnos { if x > ret { ret = x } } return ret }
go
func (l *TeamLoader) seqnosMax(seqnos []keybase1.Seqno) (ret keybase1.Seqno) { for _, x := range seqnos { if x > ret { ret = x } } return ret }
[ "func", "(", "l", "*", "TeamLoader", ")", "seqnosMax", "(", "seqnos", "[", "]", "keybase1", ".", "Seqno", ")", "(", "ret", "keybase1", ".", "Seqno", ")", "{", "for", "_", ",", "x", ":=", "range", "seqnos", "{", "if", "x", ">", "ret", "{", "ret", "=", "x", "\n", "}", "\n", "}", "\n", "return", "ret", "\n", "}" ]
// Return the max in a list of positive seqnos. Returns 0 if the list is empty
[ "Return", "the", "max", "in", "a", "list", "of", "positive", "seqnos", ".", "Returns", "0", "if", "the", "list", "is", "empty" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1271-L1278
159,811
keybase/client
go/teams/loader.go
isFresh
func (l *TeamLoader) isFresh(ctx context.Context, cachedAt keybase1.Time) bool { if cachedAt.IsZero() { // This should never happen. l.G().Log.CWarningf(ctx, "TeamLoader encountered zero cached time") return false } diff := l.G().Clock().Now().Sub(cachedAt.Time()) fresh := (diff <= freshnessLimit) if !fresh { l.G().Log.CDebugf(ctx, "TeamLoader cached snapshot is old: %v", diff) } return fresh }
go
func (l *TeamLoader) isFresh(ctx context.Context, cachedAt keybase1.Time) bool { if cachedAt.IsZero() { // This should never happen. l.G().Log.CWarningf(ctx, "TeamLoader encountered zero cached time") return false } diff := l.G().Clock().Now().Sub(cachedAt.Time()) fresh := (diff <= freshnessLimit) if !fresh { l.G().Log.CDebugf(ctx, "TeamLoader cached snapshot is old: %v", diff) } return fresh }
[ "func", "(", "l", "*", "TeamLoader", ")", "isFresh", "(", "ctx", "context", ".", "Context", ",", "cachedAt", "keybase1", ".", "Time", ")", "bool", "{", "if", "cachedAt", ".", "IsZero", "(", ")", "{", "// This should never happen.", "l", ".", "G", "(", ")", ".", "Log", ".", "CWarningf", "(", "ctx", ",", "\"", "\"", ")", "\n", "return", "false", "\n", "}", "\n", "diff", ":=", "l", ".", "G", "(", ")", ".", "Clock", "(", ")", ".", "Now", "(", ")", ".", "Sub", "(", "cachedAt", ".", "Time", "(", ")", ")", "\n", "fresh", ":=", "(", "diff", "<=", "freshnessLimit", ")", "\n", "if", "!", "fresh", "{", "l", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "diff", ")", "\n", "}", "\n", "return", "fresh", "\n", "}" ]
// Whether a TeamData from the cache is fresh.
[ "Whether", "a", "TeamData", "from", "the", "cache", "is", "fresh", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1281-L1293
159,812
keybase/client
go/teams/loader.go
hasSyncedSecrets
func (l *TeamLoader) hasSyncedSecrets(state *keybase1.TeamData) bool { onChainGen := keybase1.PerTeamKeyGeneration(len(state.Chain.PerTeamKeys)) offChainGen := keybase1.PerTeamKeyGeneration(len(state.PerTeamKeySeedsUnverified)) return onChainGen == offChainGen }
go
func (l *TeamLoader) hasSyncedSecrets(state *keybase1.TeamData) bool { onChainGen := keybase1.PerTeamKeyGeneration(len(state.Chain.PerTeamKeys)) offChainGen := keybase1.PerTeamKeyGeneration(len(state.PerTeamKeySeedsUnverified)) return onChainGen == offChainGen }
[ "func", "(", "l", "*", "TeamLoader", ")", "hasSyncedSecrets", "(", "state", "*", "keybase1", ".", "TeamData", ")", "bool", "{", "onChainGen", ":=", "keybase1", ".", "PerTeamKeyGeneration", "(", "len", "(", "state", ".", "Chain", ".", "PerTeamKeys", ")", ")", "\n", "offChainGen", ":=", "keybase1", ".", "PerTeamKeyGeneration", "(", "len", "(", "state", ".", "PerTeamKeySeedsUnverified", ")", ")", "\n", "return", "onChainGen", "==", "offChainGen", "\n", "}" ]
// Whether the teams secrets are synced to the same point as its sigchain // Does not check RKMs.
[ "Whether", "the", "teams", "secrets", "are", "synced", "to", "the", "same", "point", "as", "its", "sigchain", "Does", "not", "check", "RKMs", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1297-L1301
159,813
keybase/client
go/teams/loader.go
ImplicitAdmins
func (l *TeamLoader) ImplicitAdmins(ctx context.Context, teamID keybase1.TeamID) (impAdmins []keybase1.UserVersion, err error) { impAdminsMap := make(map[string]keybase1.UserVersion) // map to remove dups err = l.MapTeamAncestors(ctx, func(t keybase1.TeamSigChainState) error { ancestorChain := TeamSigChainState{inner: t} // Gather the admins. adminRoles := []keybase1.TeamRole{keybase1.TeamRole_OWNER, keybase1.TeamRole_ADMIN} for _, role := range adminRoles { uvs, err := ancestorChain.GetUsersWithRole(role) if err != nil { return err } for _, uv := range uvs { impAdminsMap[uv.String()] = uv } } return nil }, teamID, "implicitAdminsAncestor", func(keybase1.TeamSigChainState) bool { return true }) if err != nil { return nil, err } for _, uv := range impAdminsMap { impAdmins = append(impAdmins, uv) } return impAdmins, nil }
go
func (l *TeamLoader) ImplicitAdmins(ctx context.Context, teamID keybase1.TeamID) (impAdmins []keybase1.UserVersion, err error) { impAdminsMap := make(map[string]keybase1.UserVersion) // map to remove dups err = l.MapTeamAncestors(ctx, func(t keybase1.TeamSigChainState) error { ancestorChain := TeamSigChainState{inner: t} // Gather the admins. adminRoles := []keybase1.TeamRole{keybase1.TeamRole_OWNER, keybase1.TeamRole_ADMIN} for _, role := range adminRoles { uvs, err := ancestorChain.GetUsersWithRole(role) if err != nil { return err } for _, uv := range uvs { impAdminsMap[uv.String()] = uv } } return nil }, teamID, "implicitAdminsAncestor", func(keybase1.TeamSigChainState) bool { return true }) if err != nil { return nil, err } for _, uv := range impAdminsMap { impAdmins = append(impAdmins, uv) } return impAdmins, nil }
[ "func", "(", "l", "*", "TeamLoader", ")", "ImplicitAdmins", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ")", "(", "impAdmins", "[", "]", "keybase1", ".", "UserVersion", ",", "err", "error", ")", "{", "impAdminsMap", ":=", "make", "(", "map", "[", "string", "]", "keybase1", ".", "UserVersion", ")", "// map to remove dups", "\n", "err", "=", "l", ".", "MapTeamAncestors", "(", "ctx", ",", "func", "(", "t", "keybase1", ".", "TeamSigChainState", ")", "error", "{", "ancestorChain", ":=", "TeamSigChainState", "{", "inner", ":", "t", "}", "\n", "// Gather the admins.", "adminRoles", ":=", "[", "]", "keybase1", ".", "TeamRole", "{", "keybase1", ".", "TeamRole_OWNER", ",", "keybase1", ".", "TeamRole_ADMIN", "}", "\n", "for", "_", ",", "role", ":=", "range", "adminRoles", "{", "uvs", ",", "err", ":=", "ancestorChain", ".", "GetUsersWithRole", "(", "role", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "for", "_", ",", "uv", ":=", "range", "uvs", "{", "impAdminsMap", "[", "uv", ".", "String", "(", ")", "]", "=", "uv", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}", ",", "teamID", ",", "\"", "\"", ",", "func", "(", "keybase1", ".", "TeamSigChainState", ")", "bool", "{", "return", "true", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "for", "_", ",", "uv", ":=", "range", "impAdminsMap", "{", "impAdmins", "=", "append", "(", "impAdmins", ",", "uv", ")", "\n", "}", "\n", "return", "impAdmins", ",", "nil", "\n", "}" ]
// List all the admins of ancestor teams. // Includes admins of the specified team only if they are also admins of ancestor teams. // The specified team must be a subteam, or an error is returned. // Always sends a flurry of RPCs to get the most up to date info.
[ "List", "all", "the", "admins", "of", "ancestor", "teams", ".", "Includes", "admins", "of", "the", "specified", "team", "only", "if", "they", "are", "also", "admins", "of", "ancestor", "teams", ".", "The", "specified", "team", "must", "be", "a", "subteam", "or", "an", "error", "is", "returned", ".", "Always", "sends", "a", "flurry", "of", "RPCs", "to", "get", "the", "most", "up", "to", "date", "info", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1368-L1392
159,814
keybase/client
go/teams/loader.go
MapTeamAncestors
func (l *TeamLoader) MapTeamAncestors(ctx context.Context, f func(t keybase1.TeamSigChainState) error, teamID keybase1.TeamID, reason string, forceFullReloadOnceToAssert func(t keybase1.TeamSigChainState) bool) (err error) { me, err := l.world.getMe(ctx) if err != nil { return err } // Load the argument team team, err := l.load1(ctx, me, keybase1.LoadTeamArg{ ID: teamID, Public: teamID.IsPublic(), StaleOK: true, // We only use immutable fields. }) if err != nil { return err } teamChain := TeamSigChainState{inner: team.Chain} if !teamChain.IsSubteam() { return fmt.Errorf("cannot map over parents of a root team: %v", teamID) } return l.mapTeamAncestorsHelper(ctx, f, teamID, teamChain.GetParentID(), reason, forceFullReloadOnceToAssert) }
go
func (l *TeamLoader) MapTeamAncestors(ctx context.Context, f func(t keybase1.TeamSigChainState) error, teamID keybase1.TeamID, reason string, forceFullReloadOnceToAssert func(t keybase1.TeamSigChainState) bool) (err error) { me, err := l.world.getMe(ctx) if err != nil { return err } // Load the argument team team, err := l.load1(ctx, me, keybase1.LoadTeamArg{ ID: teamID, Public: teamID.IsPublic(), StaleOK: true, // We only use immutable fields. }) if err != nil { return err } teamChain := TeamSigChainState{inner: team.Chain} if !teamChain.IsSubteam() { return fmt.Errorf("cannot map over parents of a root team: %v", teamID) } return l.mapTeamAncestorsHelper(ctx, f, teamID, teamChain.GetParentID(), reason, forceFullReloadOnceToAssert) }
[ "func", "(", "l", "*", "TeamLoader", ")", "MapTeamAncestors", "(", "ctx", "context", ".", "Context", ",", "f", "func", "(", "t", "keybase1", ".", "TeamSigChainState", ")", "error", ",", "teamID", "keybase1", ".", "TeamID", ",", "reason", "string", ",", "forceFullReloadOnceToAssert", "func", "(", "t", "keybase1", ".", "TeamSigChainState", ")", "bool", ")", "(", "err", "error", ")", "{", "me", ",", "err", ":=", "l", ".", "world", ".", "getMe", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// Load the argument team", "team", ",", "err", ":=", "l", ".", "load1", "(", "ctx", ",", "me", ",", "keybase1", ".", "LoadTeamArg", "{", "ID", ":", "teamID", ",", "Public", ":", "teamID", ".", "IsPublic", "(", ")", ",", "StaleOK", ":", "true", ",", "// We only use immutable fields.", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "teamChain", ":=", "TeamSigChainState", "{", "inner", ":", "team", ".", "Chain", "}", "\n", "if", "!", "teamChain", ".", "IsSubteam", "(", ")", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "teamID", ")", "\n", "}", "\n", "return", "l", ".", "mapTeamAncestorsHelper", "(", "ctx", ",", "f", ",", "teamID", ",", "teamChain", ".", "GetParentID", "(", ")", ",", "reason", ",", "forceFullReloadOnceToAssert", ")", "\n", "}" ]
// MapTeamAncestors does NOT map over the team itself.
[ "MapTeamAncestors", "does", "NOT", "map", "over", "the", "team", "itself", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader.go#L1395-L1415
159,815
keybase/client
go/service/ctl.go
Stop
func (c *CtlHandler) Stop(ctx context.Context, args keybase1.StopArg) error { c.G().Log.Info("Ctl: Stop: StopAllButService") install.StopAllButService(libkb.NewMetaContext(ctx, c.G()), args.ExitCode) c.G().Log.Info("Ctl: Stop: Stopping service") c.service.Stop(args.ExitCode) return nil }
go
func (c *CtlHandler) Stop(ctx context.Context, args keybase1.StopArg) error { c.G().Log.Info("Ctl: Stop: StopAllButService") install.StopAllButService(libkb.NewMetaContext(ctx, c.G()), args.ExitCode) c.G().Log.Info("Ctl: Stop: Stopping service") c.service.Stop(args.ExitCode) return nil }
[ "func", "(", "c", "*", "CtlHandler", ")", "Stop", "(", "ctx", "context", ".", "Context", ",", "args", "keybase1", ".", "StopArg", ")", "error", "{", "c", ".", "G", "(", ")", ".", "Log", ".", "Info", "(", "\"", "\"", ")", "\n", "install", ".", "StopAllButService", "(", "libkb", ".", "NewMetaContext", "(", "ctx", ",", "c", ".", "G", "(", ")", ")", ",", "args", ".", "ExitCode", ")", "\n", "c", ".", "G", "(", ")", ".", "Log", ".", "Info", "(", "\"", "\"", ")", "\n", "c", ".", "service", ".", "Stop", "(", "args", ".", "ExitCode", ")", "\n", "return", "nil", "\n", "}" ]
// Stop is called on the rpc keybase.1.ctl.stop, which shuts down the service.
[ "Stop", "is", "called", "on", "the", "rpc", "keybase", ".", "1", ".", "ctl", ".", "stop", "which", "shuts", "down", "the", "service", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/ctl.go#L30-L36
159,816
keybase/client
go/kbfs/libkbfs/md_util.go
isReadableOrError
func isReadableOrError( ctx context.Context, kbpki KBPKI, syncGetter syncedTlfGetterSetter, md ReadOnlyRootMetadata) error { if !md.IsInitialized() || md.IsReadable() { return nil } // this should only be the case if we're a new device not yet // added to the set of reader/writer keys. session, err := kbpki.GetCurrentSession(ctx) if err != nil { return err } err = errors.Errorf("%s is not readable by %s (uid:%s)", md.TlfID(), session.Name, session.UID) return makeRekeyReadError( ctx, err, kbpki, syncGetter, md, session.UID, session.Name) }
go
func isReadableOrError( ctx context.Context, kbpki KBPKI, syncGetter syncedTlfGetterSetter, md ReadOnlyRootMetadata) error { if !md.IsInitialized() || md.IsReadable() { return nil } // this should only be the case if we're a new device not yet // added to the set of reader/writer keys. session, err := kbpki.GetCurrentSession(ctx) if err != nil { return err } err = errors.Errorf("%s is not readable by %s (uid:%s)", md.TlfID(), session.Name, session.UID) return makeRekeyReadError( ctx, err, kbpki, syncGetter, md, session.UID, session.Name) }
[ "func", "isReadableOrError", "(", "ctx", "context", ".", "Context", ",", "kbpki", "KBPKI", ",", "syncGetter", "syncedTlfGetterSetter", ",", "md", "ReadOnlyRootMetadata", ")", "error", "{", "if", "!", "md", ".", "IsInitialized", "(", ")", "||", "md", ".", "IsReadable", "(", ")", "{", "return", "nil", "\n", "}", "\n", "// this should only be the case if we're a new device not yet", "// added to the set of reader/writer keys.", "session", ",", "err", ":=", "kbpki", ".", "GetCurrentSession", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "err", "=", "errors", ".", "Errorf", "(", "\"", "\"", ",", "md", ".", "TlfID", "(", ")", ",", "session", ".", "Name", ",", "session", ".", "UID", ")", "\n", "return", "makeRekeyReadError", "(", "ctx", ",", "err", ",", "kbpki", ",", "syncGetter", ",", "md", ",", "session", ".", "UID", ",", "session", ".", "Name", ")", "\n", "}" ]
// Helper which returns nil if the md block is uninitialized or readable by // the current user. Otherwise an appropriate read access error is returned.
[ "Helper", "which", "returns", "nil", "if", "the", "md", "block", "is", "uninitialized", "or", "readable", "by", "the", "current", "user", ".", "Otherwise", "an", "appropriate", "read", "access", "error", "is", "returned", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/md_util.go#L70-L86
159,817
keybase/client
go/kbfs/libkbfs/md_util.go
getSingleMD
func getSingleMD(ctx context.Context, config Config, id tlf.ID, bid kbfsmd.BranchID, rev kbfsmd.Revision, mStatus kbfsmd.MergeStatus, lockBeforeGet *keybase1.LockID) ( ImmutableRootMetadata, error) { rmds, err := getMDRange( ctx, config, id, bid, rev, rev, mStatus, lockBeforeGet) if err != nil { return ImmutableRootMetadata{}, err } if len(rmds) != 1 { return ImmutableRootMetadata{}, fmt.Errorf("Single expected revision %d not found", rev) } return rmds[0], nil }
go
func getSingleMD(ctx context.Context, config Config, id tlf.ID, bid kbfsmd.BranchID, rev kbfsmd.Revision, mStatus kbfsmd.MergeStatus, lockBeforeGet *keybase1.LockID) ( ImmutableRootMetadata, error) { rmds, err := getMDRange( ctx, config, id, bid, rev, rev, mStatus, lockBeforeGet) if err != nil { return ImmutableRootMetadata{}, err } if len(rmds) != 1 { return ImmutableRootMetadata{}, fmt.Errorf("Single expected revision %d not found", rev) } return rmds[0], nil }
[ "func", "getSingleMD", "(", "ctx", "context", ".", "Context", ",", "config", "Config", ",", "id", "tlf", ".", "ID", ",", "bid", "kbfsmd", ".", "BranchID", ",", "rev", "kbfsmd", ".", "Revision", ",", "mStatus", "kbfsmd", ".", "MergeStatus", ",", "lockBeforeGet", "*", "keybase1", ".", "LockID", ")", "(", "ImmutableRootMetadata", ",", "error", ")", "{", "rmds", ",", "err", ":=", "getMDRange", "(", "ctx", ",", "config", ",", "id", ",", "bid", ",", "rev", ",", "rev", ",", "mStatus", ",", "lockBeforeGet", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ImmutableRootMetadata", "{", "}", ",", "err", "\n", "}", "\n\n", "if", "len", "(", "rmds", ")", "!=", "1", "{", "return", "ImmutableRootMetadata", "{", "}", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "rev", ")", "\n", "}", "\n", "return", "rmds", "[", "0", "]", ",", "nil", "\n", "}" ]
// getSingleMD returns an MD that is required to exist.
[ "getSingleMD", "returns", "an", "MD", "that", "is", "required", "to", "exist", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/md_util.go#L177-L191
159,818
keybase/client
go/kbfs/libkbfs/md_util.go
MakeCopyWithDecryptedPrivateData
func MakeCopyWithDecryptedPrivateData( ctx context.Context, config Config, irmdToDecrypt, irmdWithKeys ImmutableRootMetadata, uid keybase1.UID) ( rmdDecrypted ImmutableRootMetadata, err error) { pmd, err := decryptMDPrivateData( ctx, config.Codec(), config.Crypto(), config.BlockCache(), config.BlockOps(), config.KeyManager(), config.KBPKI(), config, config.Mode(), uid, irmdToDecrypt.GetSerializedPrivateMetadata(), irmdToDecrypt, irmdWithKeys, config.MakeLogger("")) if err != nil { return ImmutableRootMetadata{}, err } rmdCopy, err := irmdToDecrypt.deepCopy(config.Codec()) if err != nil { return ImmutableRootMetadata{}, err } rmdCopy.data = pmd return MakeImmutableRootMetadata(rmdCopy, irmdToDecrypt.LastModifyingWriterVerifyingKey(), irmdToDecrypt.MdID(), irmdToDecrypt.LocalTimestamp(), irmdToDecrypt.putToServer), nil }
go
func MakeCopyWithDecryptedPrivateData( ctx context.Context, config Config, irmdToDecrypt, irmdWithKeys ImmutableRootMetadata, uid keybase1.UID) ( rmdDecrypted ImmutableRootMetadata, err error) { pmd, err := decryptMDPrivateData( ctx, config.Codec(), config.Crypto(), config.BlockCache(), config.BlockOps(), config.KeyManager(), config.KBPKI(), config, config.Mode(), uid, irmdToDecrypt.GetSerializedPrivateMetadata(), irmdToDecrypt, irmdWithKeys, config.MakeLogger("")) if err != nil { return ImmutableRootMetadata{}, err } rmdCopy, err := irmdToDecrypt.deepCopy(config.Codec()) if err != nil { return ImmutableRootMetadata{}, err } rmdCopy.data = pmd return MakeImmutableRootMetadata(rmdCopy, irmdToDecrypt.LastModifyingWriterVerifyingKey(), irmdToDecrypt.MdID(), irmdToDecrypt.LocalTimestamp(), irmdToDecrypt.putToServer), nil }
[ "func", "MakeCopyWithDecryptedPrivateData", "(", "ctx", "context", ".", "Context", ",", "config", "Config", ",", "irmdToDecrypt", ",", "irmdWithKeys", "ImmutableRootMetadata", ",", "uid", "keybase1", ".", "UID", ")", "(", "rmdDecrypted", "ImmutableRootMetadata", ",", "err", "error", ")", "{", "pmd", ",", "err", ":=", "decryptMDPrivateData", "(", "ctx", ",", "config", ".", "Codec", "(", ")", ",", "config", ".", "Crypto", "(", ")", ",", "config", ".", "BlockCache", "(", ")", ",", "config", ".", "BlockOps", "(", ")", ",", "config", ".", "KeyManager", "(", ")", ",", "config", ".", "KBPKI", "(", ")", ",", "config", ",", "config", ".", "Mode", "(", ")", ",", "uid", ",", "irmdToDecrypt", ".", "GetSerializedPrivateMetadata", "(", ")", ",", "irmdToDecrypt", ",", "irmdWithKeys", ",", "config", ".", "MakeLogger", "(", "\"", "\"", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ImmutableRootMetadata", "{", "}", ",", "err", "\n", "}", "\n\n", "rmdCopy", ",", "err", ":=", "irmdToDecrypt", ".", "deepCopy", "(", "config", ".", "Codec", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ImmutableRootMetadata", "{", "}", ",", "err", "\n", "}", "\n", "rmdCopy", ".", "data", "=", "pmd", "\n", "return", "MakeImmutableRootMetadata", "(", "rmdCopy", ",", "irmdToDecrypt", ".", "LastModifyingWriterVerifyingKey", "(", ")", ",", "irmdToDecrypt", ".", "MdID", "(", ")", ",", "irmdToDecrypt", ".", "LocalTimestamp", "(", ")", ",", "irmdToDecrypt", ".", "putToServer", ")", ",", "nil", "\n", "}" ]
// MakeCopyWithDecryptedPrivateData makes a copy of the given IRMD, // decrypting it with the given IRMD with keys.
[ "MakeCopyWithDecryptedPrivateData", "makes", "a", "copy", "of", "the", "given", "IRMD", "decrypting", "it", "with", "the", "given", "IRMD", "with", "keys", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/md_util.go#L195-L219
159,819
keybase/client
go/kbfs/libkbfs/md_util.go
GetMDRevisionByTime
func GetMDRevisionByTime( ctx context.Context, config Config, handle *tlfhandle.Handle, serverTime time.Time) (kbfsmd.Revision, error) { id := handle.TlfID() if id == tlf.NullID { return kbfsmd.RevisionUninitialized, errors.Errorf( "No ID set in handle %s", handle.GetCanonicalPath()) } md, err := config.MDOps().GetForTLFByTime(ctx, id, serverTime) if err != nil { return kbfsmd.RevisionUninitialized, err } return md.Revision(), nil }
go
func GetMDRevisionByTime( ctx context.Context, config Config, handle *tlfhandle.Handle, serverTime time.Time) (kbfsmd.Revision, error) { id := handle.TlfID() if id == tlf.NullID { return kbfsmd.RevisionUninitialized, errors.Errorf( "No ID set in handle %s", handle.GetCanonicalPath()) } md, err := config.MDOps().GetForTLFByTime(ctx, id, serverTime) if err != nil { return kbfsmd.RevisionUninitialized, err } return md.Revision(), nil }
[ "func", "GetMDRevisionByTime", "(", "ctx", "context", ".", "Context", ",", "config", "Config", ",", "handle", "*", "tlfhandle", ".", "Handle", ",", "serverTime", "time", ".", "Time", ")", "(", "kbfsmd", ".", "Revision", ",", "error", ")", "{", "id", ":=", "handle", ".", "TlfID", "(", ")", "\n", "if", "id", "==", "tlf", ".", "NullID", "{", "return", "kbfsmd", ".", "RevisionUninitialized", ",", "errors", ".", "Errorf", "(", "\"", "\"", ",", "handle", ".", "GetCanonicalPath", "(", ")", ")", "\n", "}", "\n\n", "md", ",", "err", ":=", "config", ".", "MDOps", "(", ")", ".", "GetForTLFByTime", "(", "ctx", ",", "id", ",", "serverTime", ")", "\n", "if", "err", "!=", "nil", "{", "return", "kbfsmd", ".", "RevisionUninitialized", ",", "err", "\n", "}", "\n\n", "return", "md", ".", "Revision", "(", ")", ",", "nil", "\n", "}" ]
// GetMDRevisionByTime returns the revision number of the earliest // merged MD of `handle` with a server timestamp greater or equal to // `serverTime`.
[ "GetMDRevisionByTime", "returns", "the", "revision", "number", "of", "the", "earliest", "merged", "MD", "of", "handle", "with", "a", "server", "timestamp", "greater", "or", "equal", "to", "serverTime", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/md_util.go#L396-L411
159,820
keybase/client
go/kbfs/libkbfs/md_util.go
decryptMDPrivateData
func decryptMDPrivateData(ctx context.Context, codec kbfscodec.Codec, crypto Crypto, bcache data.BlockCache, bops BlockOps, keyGetter mdDecryptionKeyGetter, teamChecker kbfsmd.TeamMembershipChecker, osg idutil.OfflineStatusGetter, mode InitMode, uid keybase1.UID, serializedPrivateMetadata []byte, rmdToDecrypt, rmdWithKeys libkey.KeyMetadata, log logger.Logger) (PrivateMetadata, error) { handle := rmdToDecrypt.GetTlfHandle() var pmd PrivateMetadata if handle.TypeForKeying() == tlf.PublicKeying { if err := codec.Decode(serializedPrivateMetadata, &pmd); err != nil { return PrivateMetadata{}, err } } else { // decrypt the root data for non-public directories var encryptedPrivateMetadata kbfscrypto.EncryptedPrivateMetadata if err := codec.Decode(serializedPrivateMetadata, &encryptedPrivateMetadata); err != nil { return PrivateMetadata{}, err } k, err := keyGetter.GetTLFCryptKeyForMDDecryption(ctx, rmdToDecrypt, rmdWithKeys) if err != nil { log.CDebugf(ctx, "Couldn't get crypt key for %s (%s): %+v", handle.GetCanonicalPath(), rmdToDecrypt.TlfID(), err) isReader, readerErr := isReaderFromHandle( ctx, handle, teamChecker, osg, uid) if readerErr != nil { return PrivateMetadata{}, readerErr } _, isSelfRekeyError := err.(NeedSelfRekeyError) _, isOtherRekeyError := err.(NeedOtherRekeyError) if isReader && (isOtherRekeyError || isSelfRekeyError) { // Rekey errors are expected if this client is a // valid folder participant but doesn't have the // shared crypt key. } else { return PrivateMetadata{}, err } } else { pmd, err = crypto.DecryptPrivateMetadata( encryptedPrivateMetadata, k) if err != nil { return PrivateMetadata{}, err } } } // Re-embed the block changes if it's needed. err := reembedBlockChanges( ctx, codec, bcache, bops, mode, rmdWithKeys.TlfID(), &pmd, rmdWithKeys, log) if err != nil { return PrivateMetadata{}, err } return pmd, nil }
go
func decryptMDPrivateData(ctx context.Context, codec kbfscodec.Codec, crypto Crypto, bcache data.BlockCache, bops BlockOps, keyGetter mdDecryptionKeyGetter, teamChecker kbfsmd.TeamMembershipChecker, osg idutil.OfflineStatusGetter, mode InitMode, uid keybase1.UID, serializedPrivateMetadata []byte, rmdToDecrypt, rmdWithKeys libkey.KeyMetadata, log logger.Logger) (PrivateMetadata, error) { handle := rmdToDecrypt.GetTlfHandle() var pmd PrivateMetadata if handle.TypeForKeying() == tlf.PublicKeying { if err := codec.Decode(serializedPrivateMetadata, &pmd); err != nil { return PrivateMetadata{}, err } } else { // decrypt the root data for non-public directories var encryptedPrivateMetadata kbfscrypto.EncryptedPrivateMetadata if err := codec.Decode(serializedPrivateMetadata, &encryptedPrivateMetadata); err != nil { return PrivateMetadata{}, err } k, err := keyGetter.GetTLFCryptKeyForMDDecryption(ctx, rmdToDecrypt, rmdWithKeys) if err != nil { log.CDebugf(ctx, "Couldn't get crypt key for %s (%s): %+v", handle.GetCanonicalPath(), rmdToDecrypt.TlfID(), err) isReader, readerErr := isReaderFromHandle( ctx, handle, teamChecker, osg, uid) if readerErr != nil { return PrivateMetadata{}, readerErr } _, isSelfRekeyError := err.(NeedSelfRekeyError) _, isOtherRekeyError := err.(NeedOtherRekeyError) if isReader && (isOtherRekeyError || isSelfRekeyError) { // Rekey errors are expected if this client is a // valid folder participant but doesn't have the // shared crypt key. } else { return PrivateMetadata{}, err } } else { pmd, err = crypto.DecryptPrivateMetadata( encryptedPrivateMetadata, k) if err != nil { return PrivateMetadata{}, err } } } // Re-embed the block changes if it's needed. err := reembedBlockChanges( ctx, codec, bcache, bops, mode, rmdWithKeys.TlfID(), &pmd, rmdWithKeys, log) if err != nil { return PrivateMetadata{}, err } return pmd, nil }
[ "func", "decryptMDPrivateData", "(", "ctx", "context", ".", "Context", ",", "codec", "kbfscodec", ".", "Codec", ",", "crypto", "Crypto", ",", "bcache", "data", ".", "BlockCache", ",", "bops", "BlockOps", ",", "keyGetter", "mdDecryptionKeyGetter", ",", "teamChecker", "kbfsmd", ".", "TeamMembershipChecker", ",", "osg", "idutil", ".", "OfflineStatusGetter", ",", "mode", "InitMode", ",", "uid", "keybase1", ".", "UID", ",", "serializedPrivateMetadata", "[", "]", "byte", ",", "rmdToDecrypt", ",", "rmdWithKeys", "libkey", ".", "KeyMetadata", ",", "log", "logger", ".", "Logger", ")", "(", "PrivateMetadata", ",", "error", ")", "{", "handle", ":=", "rmdToDecrypt", ".", "GetTlfHandle", "(", ")", "\n\n", "var", "pmd", "PrivateMetadata", "\n", "if", "handle", ".", "TypeForKeying", "(", ")", "==", "tlf", ".", "PublicKeying", "{", "if", "err", ":=", "codec", ".", "Decode", "(", "serializedPrivateMetadata", ",", "&", "pmd", ")", ";", "err", "!=", "nil", "{", "return", "PrivateMetadata", "{", "}", ",", "err", "\n", "}", "\n", "}", "else", "{", "// decrypt the root data for non-public directories", "var", "encryptedPrivateMetadata", "kbfscrypto", ".", "EncryptedPrivateMetadata", "\n", "if", "err", ":=", "codec", ".", "Decode", "(", "serializedPrivateMetadata", ",", "&", "encryptedPrivateMetadata", ")", ";", "err", "!=", "nil", "{", "return", "PrivateMetadata", "{", "}", ",", "err", "\n", "}", "\n\n", "k", ",", "err", ":=", "keyGetter", ".", "GetTLFCryptKeyForMDDecryption", "(", "ctx", ",", "rmdToDecrypt", ",", "rmdWithKeys", ")", "\n\n", "if", "err", "!=", "nil", "{", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "handle", ".", "GetCanonicalPath", "(", ")", ",", "rmdToDecrypt", ".", "TlfID", "(", ")", ",", "err", ")", "\n", "isReader", ",", "readerErr", ":=", "isReaderFromHandle", "(", "ctx", ",", "handle", ",", "teamChecker", ",", "osg", ",", "uid", ")", "\n", "if", "readerErr", "!=", "nil", "{", "return", "PrivateMetadata", "{", "}", ",", "readerErr", "\n", "}", "\n", "_", ",", "isSelfRekeyError", ":=", "err", ".", "(", "NeedSelfRekeyError", ")", "\n", "_", ",", "isOtherRekeyError", ":=", "err", ".", "(", "NeedOtherRekeyError", ")", "\n", "if", "isReader", "&&", "(", "isOtherRekeyError", "||", "isSelfRekeyError", ")", "{", "// Rekey errors are expected if this client is a", "// valid folder participant but doesn't have the", "// shared crypt key.", "}", "else", "{", "return", "PrivateMetadata", "{", "}", ",", "err", "\n", "}", "\n", "}", "else", "{", "pmd", ",", "err", "=", "crypto", ".", "DecryptPrivateMetadata", "(", "encryptedPrivateMetadata", ",", "k", ")", "\n", "if", "err", "!=", "nil", "{", "return", "PrivateMetadata", "{", "}", ",", "err", "\n", "}", "\n", "}", "\n", "}", "\n\n", "// Re-embed the block changes if it's needed.", "err", ":=", "reembedBlockChanges", "(", "ctx", ",", "codec", ",", "bcache", ",", "bops", ",", "mode", ",", "rmdWithKeys", ".", "TlfID", "(", ")", ",", "&", "pmd", ",", "rmdWithKeys", ",", "log", ")", "\n", "if", "err", "!=", "nil", "{", "return", "PrivateMetadata", "{", "}", ",", "err", "\n", "}", "\n\n", "return", "pmd", ",", "nil", "\n", "}" ]
// decryptMDPrivateData does not use uid if the handle is a public one.
[ "decryptMDPrivateData", "does", "not", "use", "uid", "if", "the", "handle", "is", "a", "public", "one", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/md_util.go#L609-L669
159,821
keybase/client
go/client/cmd_simplefs.go
NewCmdSimpleFS
func NewCmdSimpleFS(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command { return cli.Command{ Name: "fs", Usage: "Perform filesystem operations", ArgumentHelp: "[arguments...]", Subcommands: append([]cli.Command{ NewCmdSimpleFSList(cl, g), NewCmdSimpleFSCopy(cl, g), NewCmdSimpleFSMove(cl, g), NewCmdSimpleFSSymlink(cl, g), NewCmdSimpleFSRead(cl, g), NewCmdSimpleFSRemove(cl, g), NewCmdSimpleFSMkdir(cl, g), NewCmdSimpleFSStat(cl, g), NewCmdSimpleFSGetStatus(cl, g), NewCmdSimpleFSKill(cl, g), NewCmdSimpleFSPs(cl, g), NewCmdSimpleFSWrite(cl, g), NewCmdSimpleFSDebug(cl, g), NewCmdSimpleFSSetDebugLevel(cl, g), NewCmdSimpleFSHistory(cl, g), NewCmdSimpleFSQuota(cl, g), NewCmdSimpleFSRecover(cl, g), NewCmdSimpleFSReset(cl, g), NewCmdSimpleFSClearConflicts(cl, g), NewCmdSimpleFSSync(cl, g), }, getBuildSpecificFSCommands(cl, g)...), } }
go
func NewCmdSimpleFS(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command { return cli.Command{ Name: "fs", Usage: "Perform filesystem operations", ArgumentHelp: "[arguments...]", Subcommands: append([]cli.Command{ NewCmdSimpleFSList(cl, g), NewCmdSimpleFSCopy(cl, g), NewCmdSimpleFSMove(cl, g), NewCmdSimpleFSSymlink(cl, g), NewCmdSimpleFSRead(cl, g), NewCmdSimpleFSRemove(cl, g), NewCmdSimpleFSMkdir(cl, g), NewCmdSimpleFSStat(cl, g), NewCmdSimpleFSGetStatus(cl, g), NewCmdSimpleFSKill(cl, g), NewCmdSimpleFSPs(cl, g), NewCmdSimpleFSWrite(cl, g), NewCmdSimpleFSDebug(cl, g), NewCmdSimpleFSSetDebugLevel(cl, g), NewCmdSimpleFSHistory(cl, g), NewCmdSimpleFSQuota(cl, g), NewCmdSimpleFSRecover(cl, g), NewCmdSimpleFSReset(cl, g), NewCmdSimpleFSClearConflicts(cl, g), NewCmdSimpleFSSync(cl, g), }, getBuildSpecificFSCommands(cl, g)...), } }
[ "func", "NewCmdSimpleFS", "(", "cl", "*", "libcmdline", ".", "CommandLine", ",", "g", "*", "libkb", ".", "GlobalContext", ")", "cli", ".", "Command", "{", "return", "cli", ".", "Command", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "ArgumentHelp", ":", "\"", "\"", ",", "Subcommands", ":", "append", "(", "[", "]", "cli", ".", "Command", "{", "NewCmdSimpleFSList", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSCopy", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSMove", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSSymlink", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSRead", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSRemove", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSMkdir", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSStat", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSGetStatus", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSKill", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSPs", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSWrite", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSDebug", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSSetDebugLevel", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSHistory", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSQuota", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSRecover", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSReset", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSClearConflicts", "(", "cl", ",", "g", ")", ",", "NewCmdSimpleFSSync", "(", "cl", ",", "g", ")", ",", "}", ",", "getBuildSpecificFSCommands", "(", "cl", ",", "g", ")", "...", ")", ",", "}", "\n", "}" ]
// NewCmdSimpleFS creates the device command, which is just a holder // for subcommands.
[ "NewCmdSimpleFS", "creates", "the", "device", "command", "which", "is", "just", "a", "holder", "for", "subcommands", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs.go#L27-L55
159,822
keybase/client
go/client/cmd_simplefs.go
checkPathIsDir
func checkPathIsDir(ctx context.Context, cli keybase1.SimpleFSInterface, path keybase1.Path) (bool, string, error) { var isDir bool var pathString string var err error pathType, _ := path.PathType() switch pathType { case keybase1.PathType_KBFS, keybase1.PathType_KBFS_ARCHIVED: if pathType == keybase1.PathType_KBFS { pathString = path.Kbfs() } else { pathString = path.KbfsArchived().Path } // See if the dest is a path or file destEnt, err := cli.SimpleFSStat(ctx, keybase1.SimpleFSStatArg{Path: path}) if err != nil { return false, "", err } if destEnt.DirentType == keybase1.DirentType_DIR { isDir = true } case keybase1.PathType_LOCAL: pathString = path.Local() // An error is OK, could be a target filename // that does not exist yet fileInfo, err := os.Stat(pathString) if err == nil { if fileInfo.IsDir() { isDir = true } } } return isDir, pathString, err }
go
func checkPathIsDir(ctx context.Context, cli keybase1.SimpleFSInterface, path keybase1.Path) (bool, string, error) { var isDir bool var pathString string var err error pathType, _ := path.PathType() switch pathType { case keybase1.PathType_KBFS, keybase1.PathType_KBFS_ARCHIVED: if pathType == keybase1.PathType_KBFS { pathString = path.Kbfs() } else { pathString = path.KbfsArchived().Path } // See if the dest is a path or file destEnt, err := cli.SimpleFSStat(ctx, keybase1.SimpleFSStatArg{Path: path}) if err != nil { return false, "", err } if destEnt.DirentType == keybase1.DirentType_DIR { isDir = true } case keybase1.PathType_LOCAL: pathString = path.Local() // An error is OK, could be a target filename // that does not exist yet fileInfo, err := os.Stat(pathString) if err == nil { if fileInfo.IsDir() { isDir = true } } } return isDir, pathString, err }
[ "func", "checkPathIsDir", "(", "ctx", "context", ".", "Context", ",", "cli", "keybase1", ".", "SimpleFSInterface", ",", "path", "keybase1", ".", "Path", ")", "(", "bool", ",", "string", ",", "error", ")", "{", "var", "isDir", "bool", "\n", "var", "pathString", "string", "\n", "var", "err", "error", "\n\n", "pathType", ",", "_", ":=", "path", ".", "PathType", "(", ")", "\n", "switch", "pathType", "{", "case", "keybase1", ".", "PathType_KBFS", ",", "keybase1", ".", "PathType_KBFS_ARCHIVED", ":", "if", "pathType", "==", "keybase1", ".", "PathType_KBFS", "{", "pathString", "=", "path", ".", "Kbfs", "(", ")", "\n", "}", "else", "{", "pathString", "=", "path", ".", "KbfsArchived", "(", ")", ".", "Path", "\n", "}", "\n", "// See if the dest is a path or file", "destEnt", ",", "err", ":=", "cli", ".", "SimpleFSStat", "(", "ctx", ",", "keybase1", ".", "SimpleFSStatArg", "{", "Path", ":", "path", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "\"", "\"", ",", "err", "\n", "}", "\n\n", "if", "destEnt", ".", "DirentType", "==", "keybase1", ".", "DirentType_DIR", "{", "isDir", "=", "true", "\n", "}", "\n", "case", "keybase1", ".", "PathType_LOCAL", ":", "pathString", "=", "path", ".", "Local", "(", ")", "\n", "// An error is OK, could be a target filename", "// that does not exist yet", "fileInfo", ",", "err", ":=", "os", ".", "Stat", "(", "pathString", ")", "\n", "if", "err", "==", "nil", "{", "if", "fileInfo", ".", "IsDir", "(", ")", "{", "isDir", "=", "true", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "isDir", ",", "pathString", ",", "err", "\n", "}" ]
// Check whether the given path is a directory and return its string
[ "Check", "whether", "the", "given", "path", "is", "a", "directory", "and", "return", "its", "string" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs.go#L160-L194
159,823
keybase/client
go/client/cmd_simplefs.go
makeDestPath
func makeDestPath( ctx context.Context, g *libkb.GlobalContext, cli keybase1.SimpleFSInterface, src keybase1.Path, dest keybase1.Path, isDestPath bool, destPathString string) (keybase1.Path, error) { isSrcDir, srcPathString, err := checkPathIsDir(ctx, cli, src) // TODO: this error should really be checked, but when I added // code to check it, tests broke and it wasn't clear how to fix. g.Log.Debug("makeDestPath: srcPathString: %s isSrcDir: %v", src, isSrcDir) if isDestPath { // Source file and dest dir is an append case appendDest := !isSrcDir if isSrcDir { // Here, we have both source and dest as paths, so // we have to check whether dest exists. If so, append. err2 := checkElementExists(ctx, cli, dest) if err2 == ErrTargetFileExists { appendDest = true } g.Log.Debug("makeDestPath: src and dest both dir. append: %v", appendDest) } if appendDest { destType, _ := dest.PathType() // In this case, we must append the destination filename dest = joinSimpleFSPaths(destType, destPathString, srcPathString) g.Log.Debug("makeDestPath: new path with file: %s", dest) } } err = checkElementExists(ctx, cli, dest) return dest, err }
go
func makeDestPath( ctx context.Context, g *libkb.GlobalContext, cli keybase1.SimpleFSInterface, src keybase1.Path, dest keybase1.Path, isDestPath bool, destPathString string) (keybase1.Path, error) { isSrcDir, srcPathString, err := checkPathIsDir(ctx, cli, src) // TODO: this error should really be checked, but when I added // code to check it, tests broke and it wasn't clear how to fix. g.Log.Debug("makeDestPath: srcPathString: %s isSrcDir: %v", src, isSrcDir) if isDestPath { // Source file and dest dir is an append case appendDest := !isSrcDir if isSrcDir { // Here, we have both source and dest as paths, so // we have to check whether dest exists. If so, append. err2 := checkElementExists(ctx, cli, dest) if err2 == ErrTargetFileExists { appendDest = true } g.Log.Debug("makeDestPath: src and dest both dir. append: %v", appendDest) } if appendDest { destType, _ := dest.PathType() // In this case, we must append the destination filename dest = joinSimpleFSPaths(destType, destPathString, srcPathString) g.Log.Debug("makeDestPath: new path with file: %s", dest) } } err = checkElementExists(ctx, cli, dest) return dest, err }
[ "func", "makeDestPath", "(", "ctx", "context", ".", "Context", ",", "g", "*", "libkb", ".", "GlobalContext", ",", "cli", "keybase1", ".", "SimpleFSInterface", ",", "src", "keybase1", ".", "Path", ",", "dest", "keybase1", ".", "Path", ",", "isDestPath", "bool", ",", "destPathString", "string", ")", "(", "keybase1", ".", "Path", ",", "error", ")", "{", "isSrcDir", ",", "srcPathString", ",", "err", ":=", "checkPathIsDir", "(", "ctx", ",", "cli", ",", "src", ")", "\n", "// TODO: this error should really be checked, but when I added", "// code to check it, tests broke and it wasn't clear how to fix.", "g", ".", "Log", ".", "Debug", "(", "\"", "\"", ",", "src", ",", "isSrcDir", ")", "\n\n", "if", "isDestPath", "{", "// Source file and dest dir is an append case", "appendDest", ":=", "!", "isSrcDir", "\n", "if", "isSrcDir", "{", "// Here, we have both source and dest as paths, so", "// we have to check whether dest exists. If so, append.", "err2", ":=", "checkElementExists", "(", "ctx", ",", "cli", ",", "dest", ")", "\n", "if", "err2", "==", "ErrTargetFileExists", "{", "appendDest", "=", "true", "\n", "}", "\n", "g", ".", "Log", ".", "Debug", "(", "\"", "\"", ",", "appendDest", ")", "\n", "}", "\n", "if", "appendDest", "{", "destType", ",", "_", ":=", "dest", ".", "PathType", "(", ")", "\n", "// In this case, we must append the destination filename", "dest", "=", "joinSimpleFSPaths", "(", "destType", ",", "destPathString", ",", "srcPathString", ")", "\n", "g", ".", "Log", ".", "Debug", "(", "\"", "\"", ",", "dest", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "checkElementExists", "(", "ctx", ",", "cli", ",", "dest", ")", "\n\n", "return", "dest", ",", "err", "\n", "}" ]
// Make sure the destination ends with the same filename as the source, // if any, unless the destination is not a directory
[ "Make", "sure", "the", "destination", "ends", "with", "the", "same", "filename", "as", "the", "source", "if", "any", "unless", "the", "destination", "is", "not", "a", "directory" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs.go#L226-L264
159,824
keybase/client
go/client/cmd_simplefs.go
parseSrcDestArgs
func parseSrcDestArgs(g *libkb.GlobalContext, ctx *cli.Context, name string) ([]keybase1.Path, keybase1.Path, error) { nargs := len(ctx.Args()) var srcType, destType keybase1.PathType var srcPaths []keybase1.Path var destPath keybase1.Path if nargs < 2 { return srcPaths, destPath, errors.New(name + " requires one or more source arguments and a destination argument") } for i, src := range ctx.Args() { rev := int64(0) timeString := "" relTimeString := "" if i != nargs-1 { // All source paths use the same revision. rev = int64(ctx.Int("rev")) timeString = ctx.String("time") relTimeString = getRelTime(ctx) } argPath, err := makeSimpleFSPathWithArchiveParams( src, rev, timeString, relTimeString) if err != nil { return nil, keybase1.Path{}, err } tempPathType, err := argPath.PathType() if err != nil { return srcPaths, destPath, err } // Make sure all source paths are the same type if i == 0 { srcType = tempPathType } else if i == nargs-1 { destPath = argPath destType = tempPathType break } else if tempPathType != srcType { return srcPaths, destPath, errors.New(name + " requires all sources to be the same type") } srcPaths = append(srcPaths, argPath) } if srcType == keybase1.PathType_LOCAL && destType == keybase1.PathType_LOCAL { return srcPaths, destPath, errors.New(name + " requires KBFS source and/or destination") } return srcPaths, destPath, nil }
go
func parseSrcDestArgs(g *libkb.GlobalContext, ctx *cli.Context, name string) ([]keybase1.Path, keybase1.Path, error) { nargs := len(ctx.Args()) var srcType, destType keybase1.PathType var srcPaths []keybase1.Path var destPath keybase1.Path if nargs < 2 { return srcPaths, destPath, errors.New(name + " requires one or more source arguments and a destination argument") } for i, src := range ctx.Args() { rev := int64(0) timeString := "" relTimeString := "" if i != nargs-1 { // All source paths use the same revision. rev = int64(ctx.Int("rev")) timeString = ctx.String("time") relTimeString = getRelTime(ctx) } argPath, err := makeSimpleFSPathWithArchiveParams( src, rev, timeString, relTimeString) if err != nil { return nil, keybase1.Path{}, err } tempPathType, err := argPath.PathType() if err != nil { return srcPaths, destPath, err } // Make sure all source paths are the same type if i == 0 { srcType = tempPathType } else if i == nargs-1 { destPath = argPath destType = tempPathType break } else if tempPathType != srcType { return srcPaths, destPath, errors.New(name + " requires all sources to be the same type") } srcPaths = append(srcPaths, argPath) } if srcType == keybase1.PathType_LOCAL && destType == keybase1.PathType_LOCAL { return srcPaths, destPath, errors.New(name + " requires KBFS source and/or destination") } return srcPaths, destPath, nil }
[ "func", "parseSrcDestArgs", "(", "g", "*", "libkb", ".", "GlobalContext", ",", "ctx", "*", "cli", ".", "Context", ",", "name", "string", ")", "(", "[", "]", "keybase1", ".", "Path", ",", "keybase1", ".", "Path", ",", "error", ")", "{", "nargs", ":=", "len", "(", "ctx", ".", "Args", "(", ")", ")", "\n\n", "var", "srcType", ",", "destType", "keybase1", ".", "PathType", "\n", "var", "srcPaths", "[", "]", "keybase1", ".", "Path", "\n", "var", "destPath", "keybase1", ".", "Path", "\n\n", "if", "nargs", "<", "2", "{", "return", "srcPaths", ",", "destPath", ",", "errors", ".", "New", "(", "name", "+", "\"", "\"", ")", "\n", "}", "\n", "for", "i", ",", "src", ":=", "range", "ctx", ".", "Args", "(", ")", "{", "rev", ":=", "int64", "(", "0", ")", "\n", "timeString", ":=", "\"", "\"", "\n", "relTimeString", ":=", "\"", "\"", "\n", "if", "i", "!=", "nargs", "-", "1", "{", "// All source paths use the same revision.", "rev", "=", "int64", "(", "ctx", ".", "Int", "(", "\"", "\"", ")", ")", "\n", "timeString", "=", "ctx", ".", "String", "(", "\"", "\"", ")", "\n", "relTimeString", "=", "getRelTime", "(", "ctx", ")", "\n", "}", "\n", "argPath", ",", "err", ":=", "makeSimpleFSPathWithArchiveParams", "(", "src", ",", "rev", ",", "timeString", ",", "relTimeString", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "keybase1", ".", "Path", "{", "}", ",", "err", "\n", "}", "\n", "tempPathType", ",", "err", ":=", "argPath", ".", "PathType", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "srcPaths", ",", "destPath", ",", "err", "\n", "}", "\n", "// Make sure all source paths are the same type", "if", "i", "==", "0", "{", "srcType", "=", "tempPathType", "\n", "}", "else", "if", "i", "==", "nargs", "-", "1", "{", "destPath", "=", "argPath", "\n", "destType", "=", "tempPathType", "\n", "break", "\n", "}", "else", "if", "tempPathType", "!=", "srcType", "{", "return", "srcPaths", ",", "destPath", ",", "errors", ".", "New", "(", "name", "+", "\"", "\"", ")", "\n", "}", "\n", "srcPaths", "=", "append", "(", "srcPaths", ",", "argPath", ")", "\n", "}", "\n\n", "if", "srcType", "==", "keybase1", ".", "PathType_LOCAL", "&&", "destType", "==", "keybase1", ".", "PathType_LOCAL", "{", "return", "srcPaths", ",", "destPath", ",", "errors", ".", "New", "(", "name", "+", "\"", "\"", ")", "\n", "}", "\n", "return", "srcPaths", ",", "destPath", ",", "nil", "\n", "}" ]
// Make a list of source paths and one destination path from the given command line args
[ "Make", "a", "list", "of", "source", "paths", "and", "one", "destination", "path", "from", "the", "given", "command", "line", "args" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs.go#L275-L321
159,825
keybase/client
go/slotctx/slotctx.go
Use
func (s *Slot) Use(ctx context.Context) context.Context { ctx, cancel := context.WithCancel(ctx) s.mu.Lock() s.cancel, cancel = cancel, s.cancel s.mu.Unlock() if cancel != nil { cancel() } return ctx }
go
func (s *Slot) Use(ctx context.Context) context.Context { ctx, cancel := context.WithCancel(ctx) s.mu.Lock() s.cancel, cancel = cancel, s.cancel s.mu.Unlock() if cancel != nil { cancel() } return ctx }
[ "func", "(", "s", "*", "Slot", ")", "Use", "(", "ctx", "context", ".", "Context", ")", "context", ".", "Context", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "s", ".", "cancel", ",", "cancel", "=", "cancel", ",", "s", ".", "cancel", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "if", "cancel", "!=", "nil", "{", "cancel", "(", ")", "\n", "}", "\n", "return", "ctx", "\n", "}" ]
// Use derives a context bound to the slot. // Cancels any context previously bound to the slot.
[ "Use", "derives", "a", "context", "bound", "to", "the", "slot", ".", "Cancels", "any", "context", "previously", "bound", "to", "the", "slot", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/slotctx/slotctx.go#L20-L29
159,826
keybase/client
go/slotctx/slotctx.go
Use
func (s *PrioritySlot) Use(ctx context.Context, priority int) context.Context { ctx, cancel := context.WithCancel(ctx) s.mu.Lock() defer s.mu.Unlock() if s.shutdown { // Not accepting new processes. cancel() return ctx } if s.cancel == nil { // First use s.cancel = cancel s.priority = priority return ctx } if s.priority <= priority { // Argument wins s.cancel() s.cancel = cancel s.priority = priority return ctx } // Incumbent wins cancel() return ctx }
go
func (s *PrioritySlot) Use(ctx context.Context, priority int) context.Context { ctx, cancel := context.WithCancel(ctx) s.mu.Lock() defer s.mu.Unlock() if s.shutdown { // Not accepting new processes. cancel() return ctx } if s.cancel == nil { // First use s.cancel = cancel s.priority = priority return ctx } if s.priority <= priority { // Argument wins s.cancel() s.cancel = cancel s.priority = priority return ctx } // Incumbent wins cancel() return ctx }
[ "func", "(", "s", "*", "PrioritySlot", ")", "Use", "(", "ctx", "context", ".", "Context", ",", "priority", "int", ")", "context", ".", "Context", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "if", "s", ".", "shutdown", "{", "// Not accepting new processes.", "cancel", "(", ")", "\n", "return", "ctx", "\n", "}", "\n", "if", "s", ".", "cancel", "==", "nil", "{", "// First use", "s", ".", "cancel", "=", "cancel", "\n", "s", ".", "priority", "=", "priority", "\n", "return", "ctx", "\n", "}", "\n", "if", "s", ".", "priority", "<=", "priority", "{", "// Argument wins", "s", ".", "cancel", "(", ")", "\n", "s", ".", "cancel", "=", "cancel", "\n", "s", ".", "priority", "=", "priority", "\n", "return", "ctx", "\n", "}", "\n", "// Incumbent wins", "cancel", "(", ")", "\n", "return", "ctx", "\n", "}" ]
// Use derives a new context. // Whichever of the argument and the incumbent are lower priority is canceled. // In a tie the incumbent is canceled.
[ "Use", "derives", "a", "new", "context", ".", "Whichever", "of", "the", "argument", "and", "the", "incumbent", "are", "lower", "priority", "is", "canceled", ".", "In", "a", "tie", "the", "incumbent", "is", "canceled", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/slotctx/slotctx.go#L56-L81
159,827
keybase/client
go/slotctx/slotctx.go
Shutdown
func (s *PrioritySlot) Shutdown() { s.mu.Lock() defer s.mu.Unlock() if s.cancel != nil { s.cancel() s.cancel = nil s.priority = 0 } s.shutdown = true }
go
func (s *PrioritySlot) Shutdown() { s.mu.Lock() defer s.mu.Unlock() if s.cancel != nil { s.cancel() s.cancel = nil s.priority = 0 } s.shutdown = true }
[ "func", "(", "s", "*", "PrioritySlot", ")", "Shutdown", "(", ")", "{", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "if", "s", ".", "cancel", "!=", "nil", "{", "s", ".", "cancel", "(", ")", "\n", "s", ".", "cancel", "=", "nil", "\n", "s", ".", "priority", "=", "0", "\n", "}", "\n", "s", ".", "shutdown", "=", "true", "\n", "}" ]
// Shutdown disables the slot forever.
[ "Shutdown", "disables", "the", "slot", "forever", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/slotctx/slotctx.go#L95-L104
159,828
keybase/client
go/chat/s3/ctx.go
NewFakeS3Context
func NewFakeS3Context(ctx context.Context) context.Context { return context.WithValue(ctx, fakeS3Key, true) }
go
func NewFakeS3Context(ctx context.Context) context.Context { return context.WithValue(ctx, fakeS3Key, true) }
[ "func", "NewFakeS3Context", "(", "ctx", "context", ".", "Context", ")", "context", ".", "Context", "{", "return", "context", ".", "WithValue", "(", "ctx", ",", "fakeS3Key", ",", "true", ")", "\n", "}" ]
// NewFakeS3Context returns a context with the fakeS3Key flag set.
[ "NewFakeS3Context", "returns", "a", "context", "with", "the", "fakeS3Key", "flag", "set", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/s3/ctx.go#L12-L14
159,829
keybase/client
go/protocol/stellar1/extras.go
CheckInvariants
func (r Bundle) CheckInvariants() error { accountIDs := make(map[AccountID]bool) var foundPrimary bool for _, entry := range r.Accounts { _, found := accountIDs[entry.AccountID] if found { return fmt.Errorf("duplicate account ID: %v", entry.AccountID) } accountIDs[entry.AccountID] = true if entry.IsPrimary { if foundPrimary { return errors.New("multiple primary accounts") } foundPrimary = true } if entry.Mode == AccountMode_NONE { return errors.New("account missing mode") } if entry.AcctBundleRevision < 1 { return fmt.Errorf("account bundle revision %v < 1 for %v", entry.AcctBundleRevision, entry.AccountID) } } if !foundPrimary { return errors.New("missing primary account") } if r.Revision < 1 { return fmt.Errorf("revision %v < 1", r.Revision) } for accID, accBundle := range r.AccountBundles { if accID != accBundle.AccountID { return fmt.Errorf("account ID mismatch in bundle for %v", accID) } var AccountBundleInAccounts bool for _, accountListAccount := range r.Accounts { if accountListAccount.AccountID == accID { AccountBundleInAccounts = true } } if !AccountBundleInAccounts { return fmt.Errorf("account in AccountBundles not in Accounts %v", accID) } } return nil }
go
func (r Bundle) CheckInvariants() error { accountIDs := make(map[AccountID]bool) var foundPrimary bool for _, entry := range r.Accounts { _, found := accountIDs[entry.AccountID] if found { return fmt.Errorf("duplicate account ID: %v", entry.AccountID) } accountIDs[entry.AccountID] = true if entry.IsPrimary { if foundPrimary { return errors.New("multiple primary accounts") } foundPrimary = true } if entry.Mode == AccountMode_NONE { return errors.New("account missing mode") } if entry.AcctBundleRevision < 1 { return fmt.Errorf("account bundle revision %v < 1 for %v", entry.AcctBundleRevision, entry.AccountID) } } if !foundPrimary { return errors.New("missing primary account") } if r.Revision < 1 { return fmt.Errorf("revision %v < 1", r.Revision) } for accID, accBundle := range r.AccountBundles { if accID != accBundle.AccountID { return fmt.Errorf("account ID mismatch in bundle for %v", accID) } var AccountBundleInAccounts bool for _, accountListAccount := range r.Accounts { if accountListAccount.AccountID == accID { AccountBundleInAccounts = true } } if !AccountBundleInAccounts { return fmt.Errorf("account in AccountBundles not in Accounts %v", accID) } } return nil }
[ "func", "(", "r", "Bundle", ")", "CheckInvariants", "(", ")", "error", "{", "accountIDs", ":=", "make", "(", "map", "[", "AccountID", "]", "bool", ")", "\n", "var", "foundPrimary", "bool", "\n", "for", "_", ",", "entry", ":=", "range", "r", ".", "Accounts", "{", "_", ",", "found", ":=", "accountIDs", "[", "entry", ".", "AccountID", "]", "\n", "if", "found", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "entry", ".", "AccountID", ")", "\n", "}", "\n", "accountIDs", "[", "entry", ".", "AccountID", "]", "=", "true", "\n", "if", "entry", ".", "IsPrimary", "{", "if", "foundPrimary", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "foundPrimary", "=", "true", "\n", "}", "\n", "if", "entry", ".", "Mode", "==", "AccountMode_NONE", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "entry", ".", "AcctBundleRevision", "<", "1", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "entry", ".", "AcctBundleRevision", ",", "entry", ".", "AccountID", ")", "\n", "}", "\n", "}", "\n", "if", "!", "foundPrimary", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "r", ".", "Revision", "<", "1", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "r", ".", "Revision", ")", "\n", "}", "\n", "for", "accID", ",", "accBundle", ":=", "range", "r", ".", "AccountBundles", "{", "if", "accID", "!=", "accBundle", ".", "AccountID", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "accID", ")", "\n", "}", "\n", "var", "AccountBundleInAccounts", "bool", "\n", "for", "_", ",", "accountListAccount", ":=", "range", "r", ".", "Accounts", "{", "if", "accountListAccount", ".", "AccountID", "==", "accID", "{", "AccountBundleInAccounts", "=", "true", "\n", "}", "\n", "}", "\n", "if", "!", "AccountBundleInAccounts", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "accID", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckInvariants checks that the Bundle satisfies // 1. No duplicate account IDs // 2. Exactly one primary account // 3. Non-negative revision numbers // 4. Account Bundle accountIDs are consistent // 5. every account in AccountBundles is also in Accounts
[ "CheckInvariants", "checks", "that", "the", "Bundle", "satisfies", "1", ".", "No", "duplicate", "account", "IDs", "2", ".", "Exactly", "one", "primary", "account", "3", ".", "Non", "-", "negative", "revision", "numbers", "4", ".", "Account", "Bundle", "accountIDs", "are", "consistent", "5", ".", "every", "account", "in", "AccountBundles", "is", "also", "in", "Accounts" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/stellar1/extras.go#L141-L184
159,830
keybase/client
go/engine/prove_check.go
NewProveCheck
func NewProveCheck(g *libkb.GlobalContext, sigID keybase1.SigID) *ProveCheck { return &ProveCheck{ Contextified: libkb.NewContextified(g), sigID: sigID, } }
go
func NewProveCheck(g *libkb.GlobalContext, sigID keybase1.SigID) *ProveCheck { return &ProveCheck{ Contextified: libkb.NewContextified(g), sigID: sigID, } }
[ "func", "NewProveCheck", "(", "g", "*", "libkb", ".", "GlobalContext", ",", "sigID", "keybase1", ".", "SigID", ")", "*", "ProveCheck", "{", "return", "&", "ProveCheck", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "sigID", ":", "sigID", ",", "}", "\n", "}" ]
// NewProveCheck creates a ProveCheck engine.
[ "NewProveCheck", "creates", "a", "ProveCheck", "engine", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/prove_check.go#L27-L32
159,831
keybase/client
go/libkb/resolve.go
putToMemCache
func (r *ResolverImpl) putToMemCache(m MetaContext, key string, res ResolveResult) { if r.cache == nil { return } // Don't cache errors or deleted users if res.err != nil || res.deleted { return } if !res.HasPrimaryKey() { m.Warning("Mistaken UID put to mem cache") if m.G().Env.GetDebug() { debug.PrintStack() } return } res.cachedAt = m.G().Clock().Now() res.body = nil // Don't cache body r.cache.Set(key, &res) }
go
func (r *ResolverImpl) putToMemCache(m MetaContext, key string, res ResolveResult) { if r.cache == nil { return } // Don't cache errors or deleted users if res.err != nil || res.deleted { return } if !res.HasPrimaryKey() { m.Warning("Mistaken UID put to mem cache") if m.G().Env.GetDebug() { debug.PrintStack() } return } res.cachedAt = m.G().Clock().Now() res.body = nil // Don't cache body r.cache.Set(key, &res) }
[ "func", "(", "r", "*", "ResolverImpl", ")", "putToMemCache", "(", "m", "MetaContext", ",", "key", "string", ",", "res", "ResolveResult", ")", "{", "if", "r", ".", "cache", "==", "nil", "{", "return", "\n", "}", "\n", "// Don't cache errors or deleted users", "if", "res", ".", "err", "!=", "nil", "||", "res", ".", "deleted", "{", "return", "\n", "}", "\n", "if", "!", "res", ".", "HasPrimaryKey", "(", ")", "{", "m", ".", "Warning", "(", "\"", "\"", ")", "\n", "if", "m", ".", "G", "(", ")", ".", "Env", ".", "GetDebug", "(", ")", "{", "debug", ".", "PrintStack", "(", ")", "\n", "}", "\n", "return", "\n", "}", "\n", "res", ".", "cachedAt", "=", "m", ".", "G", "(", ")", ".", "Clock", "(", ")", ".", "Now", "(", ")", "\n", "res", ".", "body", "=", "nil", "// Don't cache body", "\n", "r", ".", "cache", ".", "Set", "(", "key", ",", "&", "res", ")", "\n", "}" ]
// Put receives a copy of a ResolveResult, clears out the body // to avoid caching data that can go stale, and stores the result.
[ "Put", "receives", "a", "copy", "of", "a", "ResolveResult", "clears", "out", "the", "body", "to", "avoid", "caching", "data", "that", "can", "go", "stale", "and", "stores", "the", "result", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/resolve.go#L687-L705
159,832
keybase/client
go/engine/login_provisioned_device.go
NewLoginProvisionedDevice
func NewLoginProvisionedDevice(g *libkb.GlobalContext, username string) *LoginProvisionedDevice { return &LoginProvisionedDevice{ username: libkb.NewNormalizedUsername(username), Contextified: libkb.NewContextified(g), } }
go
func NewLoginProvisionedDevice(g *libkb.GlobalContext, username string) *LoginProvisionedDevice { return &LoginProvisionedDevice{ username: libkb.NewNormalizedUsername(username), Contextified: libkb.NewContextified(g), } }
[ "func", "NewLoginProvisionedDevice", "(", "g", "*", "libkb", ".", "GlobalContext", ",", "username", "string", ")", "*", "LoginProvisionedDevice", "{", "return", "&", "LoginProvisionedDevice", "{", "username", ":", "libkb", ".", "NewNormalizedUsername", "(", "username", ")", ",", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "}", "\n", "}" ]
// newLoginCurrentDevice creates a loginProvisionedDevice engine.
[ "newLoginCurrentDevice", "creates", "a", "loginProvisionedDevice", "engine", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/login_provisioned_device.go#L24-L29
159,833
keybase/client
go/chat/storage/outbox.go
PullAllConversations
func (o *Outbox) PullAllConversations(ctx context.Context, includeErrors bool, remove bool) ([]chat1.OutboxRecord, error) { locks.Outbox.Lock() defer locks.Outbox.Unlock() // Read outbox for the user obox, err := o.readStorage(ctx) if err != nil { return nil, err } var res, errors []chat1.OutboxRecord for _, obr := range obox.Records { state, err := obr.State.State() if err != nil { o.Debug(ctx, "PullAllConversations: unknown state item: skipping: err: %s", err.Error()) continue } if state == chat1.OutboxStateType_ERROR { if includeErrors { res = append(res, obr) } else { errors = append(errors, obr) } } else { res = append(res, obr) } } if remove { // Write out diskbox obox.Records = errors obox.Version = outboxVersion if err := o.writeStorage(ctx, obox); err != nil { return nil, err } } return res, nil }
go
func (o *Outbox) PullAllConversations(ctx context.Context, includeErrors bool, remove bool) ([]chat1.OutboxRecord, error) { locks.Outbox.Lock() defer locks.Outbox.Unlock() // Read outbox for the user obox, err := o.readStorage(ctx) if err != nil { return nil, err } var res, errors []chat1.OutboxRecord for _, obr := range obox.Records { state, err := obr.State.State() if err != nil { o.Debug(ctx, "PullAllConversations: unknown state item: skipping: err: %s", err.Error()) continue } if state == chat1.OutboxStateType_ERROR { if includeErrors { res = append(res, obr) } else { errors = append(errors, obr) } } else { res = append(res, obr) } } if remove { // Write out diskbox obox.Records = errors obox.Version = outboxVersion if err := o.writeStorage(ctx, obox); err != nil { return nil, err } } return res, nil }
[ "func", "(", "o", "*", "Outbox", ")", "PullAllConversations", "(", "ctx", "context", ".", "Context", ",", "includeErrors", "bool", ",", "remove", "bool", ")", "(", "[", "]", "chat1", ".", "OutboxRecord", ",", "error", ")", "{", "locks", ".", "Outbox", ".", "Lock", "(", ")", "\n", "defer", "locks", ".", "Outbox", ".", "Unlock", "(", ")", "\n\n", "// Read outbox for the user", "obox", ",", "err", ":=", "o", ".", "readStorage", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "var", "res", ",", "errors", "[", "]", "chat1", ".", "OutboxRecord", "\n", "for", "_", ",", "obr", ":=", "range", "obox", ".", "Records", "{", "state", ",", "err", ":=", "obr", ".", "State", ".", "State", "(", ")", "\n", "if", "err", "!=", "nil", "{", "o", ".", "Debug", "(", "ctx", ",", "\"", "\"", ",", "err", ".", "Error", "(", ")", ")", "\n", "continue", "\n", "}", "\n", "if", "state", "==", "chat1", ".", "OutboxStateType_ERROR", "{", "if", "includeErrors", "{", "res", "=", "append", "(", "res", ",", "obr", ")", "\n", "}", "else", "{", "errors", "=", "append", "(", "errors", ",", "obr", ")", "\n", "}", "\n", "}", "else", "{", "res", "=", "append", "(", "res", ",", "obr", ")", "\n", "}", "\n", "}", "\n", "if", "remove", "{", "// Write out diskbox", "obox", ".", "Records", "=", "errors", "\n", "obox", ".", "Version", "=", "outboxVersion", "\n", "if", "err", ":=", "o", ".", "writeStorage", "(", "ctx", ",", "obox", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// PullAllConversations grabs all outbox entries for the current outbox, and optionally deletes them // from storage
[ "PullAllConversations", "grabs", "all", "outbox", "entries", "for", "the", "current", "outbox", "and", "optionally", "deletes", "them", "from", "storage" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/storage/outbox.go#L210-L247
159,834
keybase/client
go/chat/storage/outbox.go
MarkAsError
func (o *Outbox) MarkAsError(ctx context.Context, obr chat1.OutboxRecord, errRec chat1.OutboxStateError) (res chat1.OutboxRecord, err error) { locks.Outbox.Lock() defer locks.Outbox.Unlock() // Read outbox for the user obox, err := o.readStorage(ctx) if err != nil { return res, err } // Loop through and find record var recs []chat1.OutboxRecord added := false for _, iobr := range obox.Records { if iobr.OutboxID.Eq(&obr.OutboxID) { iobr.State = chat1.NewOutboxStateWithError(errRec) added = true res = iobr } recs = append(recs, iobr) } if !added { obr.State = chat1.NewOutboxStateWithError(errRec) res = obr recs = append(recs, obr) sort.Sort(ByCtimeOrder(recs)) } // Write out diskbox obox.Records = recs if err := o.writeStorage(ctx, obox); err != nil { return res, err } return res, nil }
go
func (o *Outbox) MarkAsError(ctx context.Context, obr chat1.OutboxRecord, errRec chat1.OutboxStateError) (res chat1.OutboxRecord, err error) { locks.Outbox.Lock() defer locks.Outbox.Unlock() // Read outbox for the user obox, err := o.readStorage(ctx) if err != nil { return res, err } // Loop through and find record var recs []chat1.OutboxRecord added := false for _, iobr := range obox.Records { if iobr.OutboxID.Eq(&obr.OutboxID) { iobr.State = chat1.NewOutboxStateWithError(errRec) added = true res = iobr } recs = append(recs, iobr) } if !added { obr.State = chat1.NewOutboxStateWithError(errRec) res = obr recs = append(recs, obr) sort.Sort(ByCtimeOrder(recs)) } // Write out diskbox obox.Records = recs if err := o.writeStorage(ctx, obox); err != nil { return res, err } return res, nil }
[ "func", "(", "o", "*", "Outbox", ")", "MarkAsError", "(", "ctx", "context", ".", "Context", ",", "obr", "chat1", ".", "OutboxRecord", ",", "errRec", "chat1", ".", "OutboxStateError", ")", "(", "res", "chat1", ".", "OutboxRecord", ",", "err", "error", ")", "{", "locks", ".", "Outbox", ".", "Lock", "(", ")", "\n", "defer", "locks", ".", "Outbox", ".", "Unlock", "(", ")", "\n\n", "// Read outbox for the user", "obox", ",", "err", ":=", "o", ".", "readStorage", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "res", ",", "err", "\n", "}", "\n\n", "// Loop through and find record", "var", "recs", "[", "]", "chat1", ".", "OutboxRecord", "\n", "added", ":=", "false", "\n", "for", "_", ",", "iobr", ":=", "range", "obox", ".", "Records", "{", "if", "iobr", ".", "OutboxID", ".", "Eq", "(", "&", "obr", ".", "OutboxID", ")", "{", "iobr", ".", "State", "=", "chat1", ".", "NewOutboxStateWithError", "(", "errRec", ")", "\n", "added", "=", "true", "\n", "res", "=", "iobr", "\n", "}", "\n", "recs", "=", "append", "(", "recs", ",", "iobr", ")", "\n", "}", "\n", "if", "!", "added", "{", "obr", ".", "State", "=", "chat1", ".", "NewOutboxStateWithError", "(", "errRec", ")", "\n", "res", "=", "obr", "\n", "recs", "=", "append", "(", "recs", ",", "obr", ")", "\n", "sort", ".", "Sort", "(", "ByCtimeOrder", "(", "recs", ")", ")", "\n", "}", "\n\n", "// Write out diskbox", "obox", ".", "Records", "=", "recs", "\n", "if", "err", ":=", "o", ".", "writeStorage", "(", "ctx", ",", "obox", ")", ";", "err", "!=", "nil", "{", "return", "res", ",", "err", "\n", "}", "\n", "return", "res", ",", "nil", "\n", "}" ]
// MarkAsError will either mark an existing record as an error, or it will add the passed // record as an error with the specified error state
[ "MarkAsError", "will", "either", "mark", "an", "existing", "record", "as", "an", "error", "or", "it", "will", "add", "the", "passed", "record", "as", "an", "error", "with", "the", "specified", "error", "state" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/storage/outbox.go#L333-L367
159,835
keybase/client
go/engine/pgp_purge.go
NewPGPPurge
func NewPGPPurge(g *libkb.GlobalContext, arg keybase1.PGPPurgeArg) *PGPPurge { return &PGPPurge{ Contextified: libkb.NewContextified(g), arg: arg, } }
go
func NewPGPPurge(g *libkb.GlobalContext, arg keybase1.PGPPurgeArg) *PGPPurge { return &PGPPurge{ Contextified: libkb.NewContextified(g), arg: arg, } }
[ "func", "NewPGPPurge", "(", "g", "*", "libkb", ".", "GlobalContext", ",", "arg", "keybase1", ".", "PGPPurgeArg", ")", "*", "PGPPurge", "{", "return", "&", "PGPPurge", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "arg", ":", "arg", ",", "}", "\n", "}" ]
// NewPGPPurge creates a PGPPurge engine.
[ "NewPGPPurge", "creates", "a", "PGPPurge", "engine", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/pgp_purge.go#L25-L30
159,836
keybase/client
go/kbfs/libfs/metrics_file.go
GetEncodedMetrics
func GetEncodedMetrics(config libkbfs.Config) func(context.Context) ([]byte, time.Time, error) { return func(context.Context) ([]byte, time.Time, error) { if registry := config.MetricsRegistry(); registry != nil { b := bytes.NewBuffer(nil) metricsutil.WriteMetrics(registry, b) return b.Bytes(), time.Time{}, nil } return []byte("Metrics have been turned off.\n"), time.Time{}, nil } }
go
func GetEncodedMetrics(config libkbfs.Config) func(context.Context) ([]byte, time.Time, error) { return func(context.Context) ([]byte, time.Time, error) { if registry := config.MetricsRegistry(); registry != nil { b := bytes.NewBuffer(nil) metricsutil.WriteMetrics(registry, b) return b.Bytes(), time.Time{}, nil } return []byte("Metrics have been turned off.\n"), time.Time{}, nil } }
[ "func", "GetEncodedMetrics", "(", "config", "libkbfs", ".", "Config", ")", "func", "(", "context", ".", "Context", ")", "(", "[", "]", "byte", ",", "time", ".", "Time", ",", "error", ")", "{", "return", "func", "(", "context", ".", "Context", ")", "(", "[", "]", "byte", ",", "time", ".", "Time", ",", "error", ")", "{", "if", "registry", ":=", "config", ".", "MetricsRegistry", "(", ")", ";", "registry", "!=", "nil", "{", "b", ":=", "bytes", ".", "NewBuffer", "(", "nil", ")", "\n", "metricsutil", ".", "WriteMetrics", "(", "registry", ",", "b", ")", "\n", "return", "b", ".", "Bytes", "(", ")", ",", "time", ".", "Time", "{", "}", ",", "nil", "\n", "}", "\n", "return", "[", "]", "byte", "(", "\"", "\\n", "\"", ")", ",", "time", ".", "Time", "{", "}", ",", "nil", "\n", "}", "\n", "}" ]
// GetEncodedMetrics returns metrics encoded as bytes for metrics file.
[ "GetEncodedMetrics", "returns", "metrics", "encoded", "as", "bytes", "for", "metrics", "file", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/metrics_file.go#L17-L26
159,837
keybase/client
go/chat/flip/flip.go
NewDealer
func NewDealer(dh DealersHelper) *Dealer { return &Dealer{ dh: dh, games: make(map[GameKey](chan<- *GameMessageWrapped)), gameIDs: make(map[GameIDKey]GameMetadata), chatInputCh: make(chan *GameMessageWrapped), gameUpdateCh: make(chan GameStateUpdateMessage, 500), previousGames: make(map[GameIDKey]bool), } }
go
func NewDealer(dh DealersHelper) *Dealer { return &Dealer{ dh: dh, games: make(map[GameKey](chan<- *GameMessageWrapped)), gameIDs: make(map[GameIDKey]GameMetadata), chatInputCh: make(chan *GameMessageWrapped), gameUpdateCh: make(chan GameStateUpdateMessage, 500), previousGames: make(map[GameIDKey]bool), } }
[ "func", "NewDealer", "(", "dh", "DealersHelper", ")", "*", "Dealer", "{", "return", "&", "Dealer", "{", "dh", ":", "dh", ",", "games", ":", "make", "(", "map", "[", "GameKey", "]", "(", "chan", "<-", "*", "GameMessageWrapped", ")", ")", ",", "gameIDs", ":", "make", "(", "map", "[", "GameIDKey", "]", "GameMetadata", ")", ",", "chatInputCh", ":", "make", "(", "chan", "*", "GameMessageWrapped", ")", ",", "gameUpdateCh", ":", "make", "(", "chan", "GameStateUpdateMessage", ",", "500", ")", ",", "previousGames", ":", "make", "(", "map", "[", "GameIDKey", "]", "bool", ")", ",", "}", "\n", "}" ]
// NewDealer makes a new Dealer with a given DealersHelper
[ "NewDealer", "makes", "a", "new", "Dealer", "with", "a", "given", "DealersHelper" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L79-L88
159,838
keybase/client
go/chat/flip/flip.go
Run
func (d *Dealer) Run(ctx context.Context) error { d.shutdownMu.Lock() shutdownCh := make(chan struct{}) d.shutdownCh = shutdownCh d.shutdownMu.Unlock() for { select { case <-ctx.Done(): return ctx.Err() // This channel never closes case msg := <-d.chatInputCh: err := d.handleMessage(ctx, msg) if err != nil { d.dh.CLogf(ctx, "Error reading message: %s", err.Error()) } // exit the loop if we've shutdown case <-shutdownCh: return io.EOF } } }
go
func (d *Dealer) Run(ctx context.Context) error { d.shutdownMu.Lock() shutdownCh := make(chan struct{}) d.shutdownCh = shutdownCh d.shutdownMu.Unlock() for { select { case <-ctx.Done(): return ctx.Err() // This channel never closes case msg := <-d.chatInputCh: err := d.handleMessage(ctx, msg) if err != nil { d.dh.CLogf(ctx, "Error reading message: %s", err.Error()) } // exit the loop if we've shutdown case <-shutdownCh: return io.EOF } } }
[ "func", "(", "d", "*", "Dealer", ")", "Run", "(", "ctx", "context", ".", "Context", ")", "error", "{", "d", ".", "shutdownMu", ".", "Lock", "(", ")", "\n", "shutdownCh", ":=", "make", "(", "chan", "struct", "{", "}", ")", "\n", "d", ".", "shutdownCh", "=", "shutdownCh", "\n", "d", ".", "shutdownMu", ".", "Unlock", "(", ")", "\n", "for", "{", "select", "{", "case", "<-", "ctx", ".", "Done", "(", ")", ":", "return", "ctx", ".", "Err", "(", ")", "\n\n", "// This channel never closes", "case", "msg", ":=", "<-", "d", ".", "chatInputCh", ":", "err", ":=", "d", ".", "handleMessage", "(", "ctx", ",", "msg", ")", "\n", "if", "err", "!=", "nil", "{", "d", ".", "dh", ".", "CLogf", "(", "ctx", ",", "\"", "\"", ",", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n\n", "// exit the loop if we've shutdown", "case", "<-", "shutdownCh", ":", "return", "io", ".", "EOF", "\n\n", "}", "\n", "}", "\n", "}" ]
// Run a dealer in a given context. It will run as long as it isn't shutdown.
[ "Run", "a", "dealer", "in", "a", "given", "context", ".", "It", "will", "run", "as", "long", "as", "it", "isn", "t", "shutdown", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L97-L121
159,839
keybase/client
go/chat/flip/flip.go
Stop
func (d *Dealer) Stop() { d.shutdownMu.Lock() if d.shutdownCh != nil { close(d.shutdownCh) d.shutdownCh = nil } d.shutdownMu.Unlock() d.stopGames() }
go
func (d *Dealer) Stop() { d.shutdownMu.Lock() if d.shutdownCh != nil { close(d.shutdownCh) d.shutdownCh = nil } d.shutdownMu.Unlock() d.stopGames() }
[ "func", "(", "d", "*", "Dealer", ")", "Stop", "(", ")", "{", "d", ".", "shutdownMu", ".", "Lock", "(", ")", "\n", "if", "d", ".", "shutdownCh", "!=", "nil", "{", "close", "(", "d", ".", "shutdownCh", ")", "\n", "d", ".", "shutdownCh", "=", "nil", "\n", "}", "\n", "d", ".", "shutdownMu", ".", "Unlock", "(", ")", "\n", "d", ".", "stopGames", "(", ")", "\n", "}" ]
// Stop a dealer on process shutdown.
[ "Stop", "a", "dealer", "on", "process", "shutdown", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L124-L132
159,840
keybase/client
go/chat/flip/flip.go
StartFlip
func (d *Dealer) StartFlip(ctx context.Context, start Start, conversationID chat1.ConversationID) (err error) { _, err = d.startFlip(ctx, start, conversationID) return err }
go
func (d *Dealer) StartFlip(ctx context.Context, start Start, conversationID chat1.ConversationID) (err error) { _, err = d.startFlip(ctx, start, conversationID) return err }
[ "func", "(", "d", "*", "Dealer", ")", "StartFlip", "(", "ctx", "context", ".", "Context", ",", "start", "Start", ",", "conversationID", "chat1", ".", "ConversationID", ")", "(", "err", "error", ")", "{", "_", ",", "err", "=", "d", ".", "startFlip", "(", "ctx", ",", "start", ",", "conversationID", ")", "\n", "return", "err", "\n", "}" ]
// StartFlip starts a new flip. Pass it some start parameters as well as a chat conversationID that it // will take place in.
[ "StartFlip", "starts", "a", "new", "flip", ".", "Pass", "it", "some", "start", "parameters", "as", "well", "as", "a", "chat", "conversationID", "that", "it", "will", "take", "place", "in", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L136-L139
159,841
keybase/client
go/chat/flip/flip.go
StartFlipWithGameID
func (d *Dealer) StartFlipWithGameID(ctx context.Context, start Start, conversationID chat1.ConversationID, gameID chat1.FlipGameID) (err error) { _, err = d.startFlipWithGameID(ctx, start, conversationID, gameID) return err }
go
func (d *Dealer) StartFlipWithGameID(ctx context.Context, start Start, conversationID chat1.ConversationID, gameID chat1.FlipGameID) (err error) { _, err = d.startFlipWithGameID(ctx, start, conversationID, gameID) return err }
[ "func", "(", "d", "*", "Dealer", ")", "StartFlipWithGameID", "(", "ctx", "context", ".", "Context", ",", "start", "Start", ",", "conversationID", "chat1", ".", "ConversationID", ",", "gameID", "chat1", ".", "FlipGameID", ")", "(", "err", "error", ")", "{", "_", ",", "err", "=", "d", ".", "startFlipWithGameID", "(", "ctx", ",", "start", ",", "conversationID", ",", "gameID", ")", "\n", "return", "err", "\n", "}" ]
// StartFlipWithGameID starts a new flip. Pass it some start parameters as well as a chat conversationID // that it will take place in. Also takes a GameID
[ "StartFlipWithGameID", "starts", "a", "new", "flip", ".", "Pass", "it", "some", "start", "parameters", "as", "well", "as", "a", "chat", "conversationID", "that", "it", "will", "take", "place", "in", ".", "Also", "takes", "a", "GameID" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L143-L147
159,842
keybase/client
go/chat/flip/flip.go
InjectIncomingChat
func (d *Dealer) InjectIncomingChat(ctx context.Context, sender UserDevice, conversationID chat1.ConversationID, gameID chat1.FlipGameID, body GameMessageEncoded, firstInConversation bool) error { gmwe := GameMessageWrappedEncoded{ Sender: sender, GameID: gameID, Body: body, FirstInConversation: firstInConversation, } msg, err := gmwe.Decode() if err != nil { return err } if !msg.Msg.Md.ConversationID.Eq(conversationID) { return BadChannelError{G: msg.Msg.Md, C: conversationID} } if !msg.isForwardable() { return UnforwardableMessageError{G: msg.Msg.Md} } if !msg.Msg.Md.GameID.Eq(gameID) { return BadGameIDError{G: msg.Msg.Md, I: gameID} } d.chatInputCh <- msg return nil }
go
func (d *Dealer) InjectIncomingChat(ctx context.Context, sender UserDevice, conversationID chat1.ConversationID, gameID chat1.FlipGameID, body GameMessageEncoded, firstInConversation bool) error { gmwe := GameMessageWrappedEncoded{ Sender: sender, GameID: gameID, Body: body, FirstInConversation: firstInConversation, } msg, err := gmwe.Decode() if err != nil { return err } if !msg.Msg.Md.ConversationID.Eq(conversationID) { return BadChannelError{G: msg.Msg.Md, C: conversationID} } if !msg.isForwardable() { return UnforwardableMessageError{G: msg.Msg.Md} } if !msg.Msg.Md.GameID.Eq(gameID) { return BadGameIDError{G: msg.Msg.Md, I: gameID} } d.chatInputCh <- msg return nil }
[ "func", "(", "d", "*", "Dealer", ")", "InjectIncomingChat", "(", "ctx", "context", ".", "Context", ",", "sender", "UserDevice", ",", "conversationID", "chat1", ".", "ConversationID", ",", "gameID", "chat1", ".", "FlipGameID", ",", "body", "GameMessageEncoded", ",", "firstInConversation", "bool", ")", "error", "{", "gmwe", ":=", "GameMessageWrappedEncoded", "{", "Sender", ":", "sender", ",", "GameID", ":", "gameID", ",", "Body", ":", "body", ",", "FirstInConversation", ":", "firstInConversation", ",", "}", "\n", "msg", ",", "err", ":=", "gmwe", ".", "Decode", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "if", "!", "msg", ".", "Msg", ".", "Md", ".", "ConversationID", ".", "Eq", "(", "conversationID", ")", "{", "return", "BadChannelError", "{", "G", ":", "msg", ".", "Msg", ".", "Md", ",", "C", ":", "conversationID", "}", "\n", "}", "\n", "if", "!", "msg", ".", "isForwardable", "(", ")", "{", "return", "UnforwardableMessageError", "{", "G", ":", "msg", ".", "Msg", ".", "Md", "}", "\n", "}", "\n", "if", "!", "msg", ".", "Msg", ".", "Md", ".", "GameID", ".", "Eq", "(", "gameID", ")", "{", "return", "BadGameIDError", "{", "G", ":", "msg", ".", "Msg", ".", "Md", ",", "I", ":", "gameID", "}", "\n", "}", "\n", "d", ".", "chatInputCh", "<-", "msg", "\n", "return", "nil", "\n", "}" ]
// InjectIncomingChat should be called whenever a new flip game comes in that's relevant for flips. // Call this with the sender's information, the channel information, and the body data that came in. // The last bool is true only if this is the first message in the channel. The current model is that only // one "game" is allowed for each chat channel. So any prior messages in the channel mean it might be replay. // This is significantly less general than an earlier model, which is why we introduced the concept of // a gameID, so it might be changed in the future.
[ "InjectIncomingChat", "should", "be", "called", "whenever", "a", "new", "flip", "game", "comes", "in", "that", "s", "relevant", "for", "flips", ".", "Call", "this", "with", "the", "sender", "s", "information", "the", "channel", "information", "and", "the", "body", "data", "that", "came", "in", ".", "The", "last", "bool", "is", "true", "only", "if", "this", "is", "the", "first", "message", "in", "the", "channel", ".", "The", "current", "model", "is", "that", "only", "one", "game", "is", "allowed", "for", "each", "chat", "channel", ".", "So", "any", "prior", "messages", "in", "the", "channel", "mean", "it", "might", "be", "replay", ".", "This", "is", "significantly", "less", "general", "than", "an", "earlier", "model", "which", "is", "why", "we", "introduced", "the", "concept", "of", "a", "gameID", "so", "it", "might", "be", "changed", "in", "the", "future", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L155-L179
159,843
keybase/client
go/chat/flip/flip.go
NewStartWithBool
func NewStartWithBool(now time.Time, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithBool() return ret }
go
func NewStartWithBool(now time.Time, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithBool() return ret }
[ "func", "NewStartWithBool", "(", "now", "time", ".", "Time", ",", "nPlayers", "int", ")", "Start", "{", "ret", ":=", "newStart", "(", "now", ",", "nPlayers", ")", "\n", "ret", ".", "Params", "=", "NewFlipParametersWithBool", "(", ")", "\n", "return", "ret", "\n", "}" ]
// NewStartWithBool makes new start parameters that yield a coinflip game.
[ "NewStartWithBool", "makes", "new", "start", "parameters", "that", "yield", "a", "coinflip", "game", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L182-L186
159,844
keybase/client
go/chat/flip/flip.go
NewStartWithInt
func NewStartWithInt(now time.Time, mod int64, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithInt(mod) return ret }
go
func NewStartWithInt(now time.Time, mod int64, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithInt(mod) return ret }
[ "func", "NewStartWithInt", "(", "now", "time", ".", "Time", ",", "mod", "int64", ",", "nPlayers", "int", ")", "Start", "{", "ret", ":=", "newStart", "(", "now", ",", "nPlayers", ")", "\n", "ret", ".", "Params", "=", "NewFlipParametersWithInt", "(", "mod", ")", "\n", "return", "ret", "\n", "}" ]
// NewStartWithInt makes new start parameters that yield a coinflip game that picks an int between // 0 and mod.
[ "NewStartWithInt", "makes", "new", "start", "parameters", "that", "yield", "a", "coinflip", "game", "that", "picks", "an", "int", "between", "0", "and", "mod", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L190-L194
159,845
keybase/client
go/chat/flip/flip.go
NewStartWithBigInt
func NewStartWithBigInt(now time.Time, mod *big.Int, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithBig(mod.Bytes()) return ret }
go
func NewStartWithBigInt(now time.Time, mod *big.Int, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithBig(mod.Bytes()) return ret }
[ "func", "NewStartWithBigInt", "(", "now", "time", ".", "Time", ",", "mod", "*", "big", ".", "Int", ",", "nPlayers", "int", ")", "Start", "{", "ret", ":=", "newStart", "(", "now", ",", "nPlayers", ")", "\n", "ret", ".", "Params", "=", "NewFlipParametersWithBig", "(", "mod", ".", "Bytes", "(", ")", ")", "\n", "return", "ret", "\n", "}" ]
// NewStartWithBigInt makes new start parameters that yield a coinflip game that picks big int between // 0 and mod.
[ "NewStartWithBigInt", "makes", "new", "start", "parameters", "that", "yield", "a", "coinflip", "game", "that", "picks", "big", "int", "between", "0", "and", "mod", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L198-L202
159,846
keybase/client
go/chat/flip/flip.go
NewStartWithShuffle
func NewStartWithShuffle(now time.Time, n int64, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithShuffle(n) return ret }
go
func NewStartWithShuffle(now time.Time, n int64, nPlayers int) Start { ret := newStart(now, nPlayers) ret.Params = NewFlipParametersWithShuffle(n) return ret }
[ "func", "NewStartWithShuffle", "(", "now", "time", ".", "Time", ",", "n", "int64", ",", "nPlayers", "int", ")", "Start", "{", "ret", ":=", "newStart", "(", "now", ",", "nPlayers", ")", "\n", "ret", ".", "Params", "=", "NewFlipParametersWithShuffle", "(", "n", ")", "\n", "return", "ret", "\n", "}" ]
// NewStartWithShuffle makes new start parameters for a coinflip that randomly permutes the numbers // between 0 and n, exclusive. This can be used to shuffle an array of names.
[ "NewStartWithShuffle", "makes", "new", "start", "parameters", "for", "a", "coinflip", "that", "randomly", "permutes", "the", "numbers", "between", "0", "and", "n", "exclusive", ".", "This", "can", "be", "used", "to", "shuffle", "an", "array", "of", "names", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/flip/flip.go#L206-L210
159,847
keybase/client
go/kbfs/kbfsedits/tlf_history.go
AddNotifications
func (th *TlfHistory) AddNotifications( writerName string, messages []string) (maxRev kbfsmd.Revision, err error) { newEdits := make(notificationsByRevision, 0, len(messages)) // Unmarshal and sort the new messages. for _, msg := range messages { var revList []NotificationMessage err := json.Unmarshal([]byte(msg), &revList) if err != nil { // The messages might be from a new version we don't // understand, so swallow the error. continue } for j := len(revList) - 1; j >= 0; j-- { revMsg := revList[j] if revMsg.Version != NotificationV2 { // Ignore messages that are too new for us to understand. continue } revMsg.numWithinRevision = j newEdits = append(newEdits, revMsg) } } th.lock.Lock() defer th.lock.Unlock() wn, existed := th.byWriter[writerName] if !existed { wn = &writerNotifications{writerName, nil, nil} } oldLen := len(wn.notifications) newEdits = append(newEdits, wn.notifications...) sort.Sort(newEdits) if len(newEdits) > 0 { maxRev = newEdits[0].Revision } wn.notifications = newEdits.uniquify() if len(wn.notifications) == oldLen { // No new messages. return maxRev, nil } if !existed { th.byWriter[writerName] = wn } // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" return maxRev, nil }
go
func (th *TlfHistory) AddNotifications( writerName string, messages []string) (maxRev kbfsmd.Revision, err error) { newEdits := make(notificationsByRevision, 0, len(messages)) // Unmarshal and sort the new messages. for _, msg := range messages { var revList []NotificationMessage err := json.Unmarshal([]byte(msg), &revList) if err != nil { // The messages might be from a new version we don't // understand, so swallow the error. continue } for j := len(revList) - 1; j >= 0; j-- { revMsg := revList[j] if revMsg.Version != NotificationV2 { // Ignore messages that are too new for us to understand. continue } revMsg.numWithinRevision = j newEdits = append(newEdits, revMsg) } } th.lock.Lock() defer th.lock.Unlock() wn, existed := th.byWriter[writerName] if !existed { wn = &writerNotifications{writerName, nil, nil} } oldLen := len(wn.notifications) newEdits = append(newEdits, wn.notifications...) sort.Sort(newEdits) if len(newEdits) > 0 { maxRev = newEdits[0].Revision } wn.notifications = newEdits.uniquify() if len(wn.notifications) == oldLen { // No new messages. return maxRev, nil } if !existed { th.byWriter[writerName] = wn } // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" return maxRev, nil }
[ "func", "(", "th", "*", "TlfHistory", ")", "AddNotifications", "(", "writerName", "string", ",", "messages", "[", "]", "string", ")", "(", "maxRev", "kbfsmd", ".", "Revision", ",", "err", "error", ")", "{", "newEdits", ":=", "make", "(", "notificationsByRevision", ",", "0", ",", "len", "(", "messages", ")", ")", "\n\n", "// Unmarshal and sort the new messages.", "for", "_", ",", "msg", ":=", "range", "messages", "{", "var", "revList", "[", "]", "NotificationMessage", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "[", "]", "byte", "(", "msg", ")", ",", "&", "revList", ")", "\n", "if", "err", "!=", "nil", "{", "// The messages might be from a new version we don't", "// understand, so swallow the error.", "continue", "\n", "}", "\n\n", "for", "j", ":=", "len", "(", "revList", ")", "-", "1", ";", "j", ">=", "0", ";", "j", "--", "{", "revMsg", ":=", "revList", "[", "j", "]", "\n", "if", "revMsg", ".", "Version", "!=", "NotificationV2", "{", "// Ignore messages that are too new for us to understand.", "continue", "\n", "}", "\n", "revMsg", ".", "numWithinRevision", "=", "j", "\n", "newEdits", "=", "append", "(", "newEdits", ",", "revMsg", ")", "\n", "}", "\n", "}", "\n\n", "th", ".", "lock", ".", "Lock", "(", ")", "\n", "defer", "th", ".", "lock", ".", "Unlock", "(", ")", "\n", "wn", ",", "existed", ":=", "th", ".", "byWriter", "[", "writerName", "]", "\n", "if", "!", "existed", "{", "wn", "=", "&", "writerNotifications", "{", "writerName", ",", "nil", ",", "nil", "}", "\n", "}", "\n", "oldLen", ":=", "len", "(", "wn", ".", "notifications", ")", "\n", "newEdits", "=", "append", "(", "newEdits", ",", "wn", ".", "notifications", "...", ")", "\n", "sort", ".", "Sort", "(", "newEdits", ")", "\n", "if", "len", "(", "newEdits", ")", ">", "0", "{", "maxRev", "=", "newEdits", "[", "0", "]", ".", "Revision", "\n", "}", "\n\n", "wn", ".", "notifications", "=", "newEdits", ".", "uniquify", "(", ")", "\n", "if", "len", "(", "wn", ".", "notifications", ")", "==", "oldLen", "{", "// No new messages.", "return", "maxRev", ",", "nil", "\n", "}", "\n", "if", "!", "existed", "{", "th", ".", "byWriter", "[", "writerName", "]", "=", "wn", "\n", "}", "\n", "// Invalidate the cached results.", "th", ".", "computed", "=", "false", "\n", "th", ".", "cachedLoggedInUser", "=", "\"", "\"", "\n", "return", "maxRev", ",", "nil", "\n", "}" ]
// AddNotifications takes in a set of messages in this TLF by // `writer`, and adds them to the history. Once done adding messages, // the caller should call `Recompute` to find out if more messages // should be added for any particular writer. It returns the maximum // known revision including an update from this writer.
[ "AddNotifications", "takes", "in", "a", "set", "of", "messages", "in", "this", "TLF", "by", "writer", "and", "adds", "them", "to", "the", "history", ".", "Once", "done", "adding", "messages", "the", "caller", "should", "call", "Recompute", "to", "find", "out", "if", "more", "messages", "should", "be", "added", "for", "any", "particular", "writer", ".", "It", "returns", "the", "maximum", "known", "revision", "including", "an", "update", "from", "this", "writer", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsedits/tlf_history.go#L126-L176
159,848
keybase/client
go/kbfs/kbfsedits/tlf_history.go
AddUnflushedNotifications
func (th *TlfHistory) AddUnflushedNotifications( loggedInUser string, msgs []NotificationMessage) { th.lock.Lock() defer th.lock.Unlock() if th.unflushed == nil { th.unflushed = &writerNotifications{loggedInUser, nil, nil} } if th.unflushed.writerName != loggedInUser { panic(fmt.Sprintf("Logged-in user %s doesn't match unflushed user %s", loggedInUser, th.unflushed.writerName)) } newEdits := append( notificationsByRevision(msgs), th.unflushed.notifications...) sort.Sort(newEdits) th.unflushed.notifications = newEdits.uniquify() // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" }
go
func (th *TlfHistory) AddUnflushedNotifications( loggedInUser string, msgs []NotificationMessage) { th.lock.Lock() defer th.lock.Unlock() if th.unflushed == nil { th.unflushed = &writerNotifications{loggedInUser, nil, nil} } if th.unflushed.writerName != loggedInUser { panic(fmt.Sprintf("Logged-in user %s doesn't match unflushed user %s", loggedInUser, th.unflushed.writerName)) } newEdits := append( notificationsByRevision(msgs), th.unflushed.notifications...) sort.Sort(newEdits) th.unflushed.notifications = newEdits.uniquify() // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" }
[ "func", "(", "th", "*", "TlfHistory", ")", "AddUnflushedNotifications", "(", "loggedInUser", "string", ",", "msgs", "[", "]", "NotificationMessage", ")", "{", "th", ".", "lock", ".", "Lock", "(", ")", "\n", "defer", "th", ".", "lock", ".", "Unlock", "(", ")", "\n", "if", "th", ".", "unflushed", "==", "nil", "{", "th", ".", "unflushed", "=", "&", "writerNotifications", "{", "loggedInUser", ",", "nil", ",", "nil", "}", "\n", "}", "\n", "if", "th", ".", "unflushed", ".", "writerName", "!=", "loggedInUser", "{", "panic", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "loggedInUser", ",", "th", ".", "unflushed", ".", "writerName", ")", ")", "\n", "}", "\n", "newEdits", ":=", "append", "(", "notificationsByRevision", "(", "msgs", ")", ",", "th", ".", "unflushed", ".", "notifications", "...", ")", "\n", "sort", ".", "Sort", "(", "newEdits", ")", "\n", "th", ".", "unflushed", ".", "notifications", "=", "newEdits", ".", "uniquify", "(", ")", "\n", "// Invalidate the cached results.", "th", ".", "computed", "=", "false", "\n", "th", ".", "cachedLoggedInUser", "=", "\"", "\"", "\n", "}" ]
// AddUnflushedNotifications adds notifications to a special // "unflushed" list that takes precedences over the regular // notifications with revision numbers equal or greater to the minimum // unflushed revision.
[ "AddUnflushedNotifications", "adds", "notifications", "to", "a", "special", "unflushed", "list", "that", "takes", "precedences", "over", "the", "regular", "notifications", "with", "revision", "numbers", "equal", "or", "greater", "to", "the", "minimum", "unflushed", "revision", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsedits/tlf_history.go#L182-L200
159,849
keybase/client
go/kbfs/kbfsedits/tlf_history.go
FlushRevision
func (th *TlfHistory) FlushRevision(rev kbfsmd.Revision) { th.lock.Lock() defer th.lock.Unlock() if th.unflushed == nil { return } lastToKeep := len(th.unflushed.notifications) - 1 for ; lastToKeep >= 0; lastToKeep-- { if th.unflushed.notifications[lastToKeep].Revision > rev { break } } if lastToKeep < len(th.unflushed.notifications)-1 { th.unflushed.notifications = th.unflushed.notifications[:lastToKeep+1] // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" } }
go
func (th *TlfHistory) FlushRevision(rev kbfsmd.Revision) { th.lock.Lock() defer th.lock.Unlock() if th.unflushed == nil { return } lastToKeep := len(th.unflushed.notifications) - 1 for ; lastToKeep >= 0; lastToKeep-- { if th.unflushed.notifications[lastToKeep].Revision > rev { break } } if lastToKeep < len(th.unflushed.notifications)-1 { th.unflushed.notifications = th.unflushed.notifications[:lastToKeep+1] // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" } }
[ "func", "(", "th", "*", "TlfHistory", ")", "FlushRevision", "(", "rev", "kbfsmd", ".", "Revision", ")", "{", "th", ".", "lock", ".", "Lock", "(", ")", "\n", "defer", "th", ".", "lock", ".", "Unlock", "(", ")", "\n", "if", "th", ".", "unflushed", "==", "nil", "{", "return", "\n", "}", "\n", "lastToKeep", ":=", "len", "(", "th", ".", "unflushed", ".", "notifications", ")", "-", "1", "\n", "for", ";", "lastToKeep", ">=", "0", ";", "lastToKeep", "--", "{", "if", "th", ".", "unflushed", ".", "notifications", "[", "lastToKeep", "]", ".", "Revision", ">", "rev", "{", "break", "\n", "}", "\n", "}", "\n", "if", "lastToKeep", "<", "len", "(", "th", ".", "unflushed", ".", "notifications", ")", "-", "1", "{", "th", ".", "unflushed", ".", "notifications", "=", "th", ".", "unflushed", ".", "notifications", "[", ":", "lastToKeep", "+", "1", "]", "\n", "// Invalidate the cached results.", "th", ".", "computed", "=", "false", "\n", "th", ".", "cachedLoggedInUser", "=", "\"", "\"", "\n", "}", "\n", "}" ]
// FlushRevision clears all any unflushed notifications with a // revision equal or less than `rev`.
[ "FlushRevision", "clears", "all", "any", "unflushed", "notifications", "with", "a", "revision", "equal", "or", "less", "than", "rev", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsedits/tlf_history.go#L204-L222
159,850
keybase/client
go/kbfs/kbfsedits/tlf_history.go
ClearAllUnflushed
func (th *TlfHistory) ClearAllUnflushed() { th.lock.Lock() defer th.lock.Unlock() if th.unflushed != nil { // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" } th.unflushed = nil }
go
func (th *TlfHistory) ClearAllUnflushed() { th.lock.Lock() defer th.lock.Unlock() if th.unflushed != nil { // Invalidate the cached results. th.computed = false th.cachedLoggedInUser = "" } th.unflushed = nil }
[ "func", "(", "th", "*", "TlfHistory", ")", "ClearAllUnflushed", "(", ")", "{", "th", ".", "lock", ".", "Lock", "(", ")", "\n", "defer", "th", ".", "lock", ".", "Unlock", "(", ")", "\n", "if", "th", ".", "unflushed", "!=", "nil", "{", "// Invalidate the cached results.", "th", ".", "computed", "=", "false", "\n", "th", ".", "cachedLoggedInUser", "=", "\"", "\"", "\n", "}", "\n", "th", ".", "unflushed", "=", "nil", "\n", "}" ]
// ClearAllUnflushed clears all unflushed notifications.
[ "ClearAllUnflushed", "clears", "all", "unflushed", "notifications", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsedits/tlf_history.go#L225-L234
159,851
keybase/client
go/kbfs/kbfsblock/server_errors.go
ToStatus
func (e ServerErrorUnauthorized) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorUnauthorized s.Name = "SESSION_UNAUTHORIZED" s.Desc = e.Msg return }
go
func (e ServerErrorUnauthorized) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorUnauthorized s.Name = "SESSION_UNAUTHORIZED" s.Desc = e.Msg return }
[ "func", "(", "e", "ServerErrorUnauthorized", ")", "ToStatus", "(", ")", "(", "s", "keybase1", ".", "Status", ")", "{", "s", ".", "Code", "=", "StatusCodeServerErrorUnauthorized", "\n", "s", ".", "Name", "=", "\"", "\"", "\n", "s", ".", "Desc", "=", "e", ".", "Msg", "\n", "return", "\n", "}" ]
// ToStatus implements the ExportableError interface for ServerErrorUnauthorized.
[ "ToStatus", "implements", "the", "ExportableError", "interface", "for", "ServerErrorUnauthorized", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L87-L92
159,852
keybase/client
go/kbfs/kbfsblock/server_errors.go
ToStatus
func (e ServerErrorOverQuota) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorOverQuota s.Name = "QUOTA_EXCEEDED" s.Desc = e.Msg s.Fields = append(s.Fields, keybase1.StringKVPair{ Key: "QUOTA_USAGE", Value: strconv.FormatInt(e.Usage, 10), }) s.Fields = append(s.Fields, keybase1.StringKVPair{ Key: "QUOTA_LIMIT", Value: strconv.FormatInt(e.Limit, 10), }) s.Fields = append(s.Fields, keybase1.StringKVPair{ Key: "QUOTA_THROTTLE", Value: strconv.FormatBool(e.Throttled), }) return }
go
func (e ServerErrorOverQuota) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorOverQuota s.Name = "QUOTA_EXCEEDED" s.Desc = e.Msg s.Fields = append(s.Fields, keybase1.StringKVPair{ Key: "QUOTA_USAGE", Value: strconv.FormatInt(e.Usage, 10), }) s.Fields = append(s.Fields, keybase1.StringKVPair{ Key: "QUOTA_LIMIT", Value: strconv.FormatInt(e.Limit, 10), }) s.Fields = append(s.Fields, keybase1.StringKVPair{ Key: "QUOTA_THROTTLE", Value: strconv.FormatBool(e.Throttled), }) return }
[ "func", "(", "e", "ServerErrorOverQuota", ")", "ToStatus", "(", ")", "(", "s", "keybase1", ".", "Status", ")", "{", "s", ".", "Code", "=", "StatusCodeServerErrorOverQuota", "\n", "s", ".", "Name", "=", "\"", "\"", "\n", "s", ".", "Desc", "=", "e", ".", "Msg", "\n", "s", ".", "Fields", "=", "append", "(", "s", ".", "Fields", ",", "keybase1", ".", "StringKVPair", "{", "Key", ":", "\"", "\"", ",", "Value", ":", "strconv", ".", "FormatInt", "(", "e", ".", "Usage", ",", "10", ")", ",", "}", ")", "\n", "s", ".", "Fields", "=", "append", "(", "s", ".", "Fields", ",", "keybase1", ".", "StringKVPair", "{", "Key", ":", "\"", "\"", ",", "Value", ":", "strconv", ".", "FormatInt", "(", "e", ".", "Limit", ",", "10", ")", ",", "}", ")", "\n", "s", ".", "Fields", "=", "append", "(", "s", ".", "Fields", ",", "keybase1", ".", "StringKVPair", "{", "Key", ":", "\"", "\"", ",", "Value", ":", "strconv", ".", "FormatBool", "(", "e", ".", "Throttled", ")", ",", "}", ")", "\n", "return", "\n", "}" ]
// ToStatus implements the ExportableError interface for ServerErrorOverQuota.
[ "ToStatus", "implements", "the", "ExportableError", "interface", "for", "ServerErrorOverQuota", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L114-L131
159,853
keybase/client
go/kbfs/kbfsblock/server_errors.go
Error
func (e ServerErrorOverQuota) Error() string { return fmt.Sprintf( "ServerErrorOverQuota{Msg: %q, Usage: %d, Limit: %d, Throttled: %t}", e.Msg, e.Usage, e.Limit, e.Throttled) }
go
func (e ServerErrorOverQuota) Error() string { return fmt.Sprintf( "ServerErrorOverQuota{Msg: %q, Usage: %d, Limit: %d, Throttled: %t}", e.Msg, e.Usage, e.Limit, e.Throttled) }
[ "func", "(", "e", "ServerErrorOverQuota", ")", "Error", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "e", ".", "Msg", ",", "e", ".", "Usage", ",", "e", ".", "Limit", ",", "e", ".", "Throttled", ")", "\n", "}" ]
// Error implements the Error interface for ServerErrorOverQuota.
[ "Error", "implements", "the", "Error", "interface", "for", "ServerErrorOverQuota", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L134-L138
159,854
keybase/client
go/kbfs/kbfsblock/server_errors.go
ToStatus
func (e ServerErrorBlockNonExistent) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorBlockNonExistent s.Name = "BLOCK_NONEXISTENT" s.Desc = e.Msg return }
go
func (e ServerErrorBlockNonExistent) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorBlockNonExistent s.Name = "BLOCK_NONEXISTENT" s.Desc = e.Msg return }
[ "func", "(", "e", "ServerErrorBlockNonExistent", ")", "ToStatus", "(", ")", "(", "s", "keybase1", ".", "Status", ")", "{", "s", ".", "Code", "=", "StatusCodeServerErrorBlockNonExistent", "\n", "s", ".", "Name", "=", "\"", "\"", "\n", "s", ".", "Desc", "=", "e", ".", "Msg", "\n", "return", "\n", "}" ]
// ToStatus implements the ExportableError interface for ServerErrorBlockNonExistent
[ "ToStatus", "implements", "the", "ExportableError", "interface", "for", "ServerErrorBlockNonExistent" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L146-L151
159,855
keybase/client
go/kbfs/kbfsblock/server_errors.go
ToStatus
func (e ServerErrorBlockDeleted) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorBlockDeleted s.Name = "BLOCK_DELETED" s.Desc = e.Msg return }
go
func (e ServerErrorBlockDeleted) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorBlockDeleted s.Name = "BLOCK_DELETED" s.Desc = e.Msg return }
[ "func", "(", "e", "ServerErrorBlockDeleted", ")", "ToStatus", "(", ")", "(", "s", "keybase1", ".", "Status", ")", "{", "s", ".", "Code", "=", "StatusCodeServerErrorBlockDeleted", "\n", "s", ".", "Name", "=", "\"", "\"", "\n", "s", ".", "Desc", "=", "e", ".", "Msg", "\n", "return", "\n", "}" ]
// ToStatus implements the ExportableError interface for ServerErrorBlockDeleted
[ "ToStatus", "implements", "the", "ExportableError", "interface", "for", "ServerErrorBlockDeleted" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L188-L193
159,856
keybase/client
go/kbfs/kbfsblock/server_errors.go
ToStatus
func (e ServerErrorNonceNonExistent) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorNonceNonExistent s.Name = "BLOCK_NONCENONEXISTENT" s.Desc = e.Msg return }
go
func (e ServerErrorNonceNonExistent) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorNonceNonExistent s.Name = "BLOCK_NONCENONEXISTENT" s.Desc = e.Msg return }
[ "func", "(", "e", "ServerErrorNonceNonExistent", ")", "ToStatus", "(", ")", "(", "s", "keybase1", ".", "Status", ")", "{", "s", ".", "Code", "=", "StatusCodeServerErrorNonceNonExistent", "\n", "s", ".", "Name", "=", "\"", "\"", "\n", "s", ".", "Desc", "=", "e", ".", "Msg", "\n", "return", "\n", "}" ]
// ToStatus implements the ExportableError interface for ServerErrorNonceNonExistent
[ "ToStatus", "implements", "the", "ExportableError", "interface", "for", "ServerErrorNonceNonExistent" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L230-L235
159,857
keybase/client
go/kbfs/kbfsblock/server_errors.go
ToStatus
func (e ServerErrorMaxRefExceeded) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorMaxRefExceeded s.Name = "BLOCK_MAXREFEXCEEDED" s.Desc = e.Msg return }
go
func (e ServerErrorMaxRefExceeded) ToStatus() (s keybase1.Status) { s.Code = StatusCodeServerErrorMaxRefExceeded s.Name = "BLOCK_MAXREFEXCEEDED" s.Desc = e.Msg return }
[ "func", "(", "e", "ServerErrorMaxRefExceeded", ")", "ToStatus", "(", ")", "(", "s", "keybase1", ".", "Status", ")", "{", "s", ".", "Code", "=", "StatusCodeServerErrorMaxRefExceeded", "\n", "s", ".", "Name", "=", "\"", "\"", "\n", "s", ".", "Desc", "=", "e", ".", "Msg", "\n", "return", "\n", "}" ]
// ToStatus implements the ExportableError interface for ServerErrorMaxRefExceeded
[ "ToStatus", "implements", "the", "ExportableError", "interface", "for", "ServerErrorMaxRefExceeded" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L251-L256
159,858
keybase/client
go/kbfs/kbfsblock/server_errors.go
IsThrottleError
func IsThrottleError(err error) bool { if _, ok := err.(ServerErrorThrottle); ok { return true } if quotaErr, ok := err.(ServerErrorOverQuota); ok && quotaErr.Throttled { return true } return false }
go
func IsThrottleError(err error) bool { if _, ok := err.(ServerErrorThrottle); ok { return true } if quotaErr, ok := err.(ServerErrorOverQuota); ok && quotaErr.Throttled { return true } return false }
[ "func", "IsThrottleError", "(", "err", "error", ")", "bool", "{", "if", "_", ",", "ok", ":=", "err", ".", "(", "ServerErrorThrottle", ")", ";", "ok", "{", "return", "true", "\n", "}", "\n", "if", "quotaErr", ",", "ok", ":=", "err", ".", "(", "ServerErrorOverQuota", ")", ";", "ok", "&&", "quotaErr", ".", "Throttled", "{", "return", "true", "\n", "}", "\n", "return", "false", "\n", "}" ]
// IsThrottleError returns whether or not the given error signals // throttling.
[ "IsThrottleError", "returns", "whether", "or", "not", "the", "given", "error", "signals", "throttling", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/server_errors.go#L367-L375
159,859
keybase/client
go/engine/selfprovision.go
NewSelfProvisionEngine
func NewSelfProvisionEngine(g *libkb.GlobalContext, deviceName string) *SelfProvisionEngine { return &SelfProvisionEngine{ Contextified: libkb.NewContextified(g), DeviceName: deviceName, } }
go
func NewSelfProvisionEngine(g *libkb.GlobalContext, deviceName string) *SelfProvisionEngine { return &SelfProvisionEngine{ Contextified: libkb.NewContextified(g), DeviceName: deviceName, } }
[ "func", "NewSelfProvisionEngine", "(", "g", "*", "libkb", ".", "GlobalContext", ",", "deviceName", "string", ")", "*", "SelfProvisionEngine", "{", "return", "&", "SelfProvisionEngine", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "DeviceName", ":", "deviceName", ",", "}", "\n", "}" ]
// If a device is cloned, we can provision a new device from the current device // to get out of the cloned state.
[ "If", "a", "device", "is", "cloned", "we", "can", "provision", "a", "new", "device", "from", "the", "current", "device", "to", "get", "out", "of", "the", "cloned", "state", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/selfprovision.go#L24-L29
159,860
keybase/client
go/engine/selfprovision.go
makeDeviceKeysWithSigner
func (e *SelfProvisionEngine) makeDeviceKeysWithSigner(m libkb.MetaContext, signer libkb.GenericKey) error { if err := e.ensureLKSec(m); err != nil { return err } _, _, deviceType, err := m.G().GetUPAKLoader().LookupUsernameAndDevice(m.Ctx(), e.User.GetUID(), e.G().ActiveDevice.DeviceID()) if err != nil { return err } args := &DeviceWrapArgs{ Me: e.User, DeviceName: e.DeviceName, DeviceType: deviceType, Lks: e.lks, IsEldest: false, // just to be explicit IsSelfProvision: true, PerUserKeyring: e.perUserKeyring, EldestKID: e.User.GetEldestKID(), Signer: signer, EkReboxer: e.ekReboxer, } e.deviceWrapEng = NewDeviceWrap(m.G(), args) return RunEngine2(m, e.deviceWrapEng) }
go
func (e *SelfProvisionEngine) makeDeviceKeysWithSigner(m libkb.MetaContext, signer libkb.GenericKey) error { if err := e.ensureLKSec(m); err != nil { return err } _, _, deviceType, err := m.G().GetUPAKLoader().LookupUsernameAndDevice(m.Ctx(), e.User.GetUID(), e.G().ActiveDevice.DeviceID()) if err != nil { return err } args := &DeviceWrapArgs{ Me: e.User, DeviceName: e.DeviceName, DeviceType: deviceType, Lks: e.lks, IsEldest: false, // just to be explicit IsSelfProvision: true, PerUserKeyring: e.perUserKeyring, EldestKID: e.User.GetEldestKID(), Signer: signer, EkReboxer: e.ekReboxer, } e.deviceWrapEng = NewDeviceWrap(m.G(), args) return RunEngine2(m, e.deviceWrapEng) }
[ "func", "(", "e", "*", "SelfProvisionEngine", ")", "makeDeviceKeysWithSigner", "(", "m", "libkb", ".", "MetaContext", ",", "signer", "libkb", ".", "GenericKey", ")", "error", "{", "if", "err", ":=", "e", ".", "ensureLKSec", "(", "m", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "_", ",", "_", ",", "deviceType", ",", "err", ":=", "m", ".", "G", "(", ")", ".", "GetUPAKLoader", "(", ")", ".", "LookupUsernameAndDevice", "(", "m", ".", "Ctx", "(", ")", ",", "e", ".", "User", ".", "GetUID", "(", ")", ",", "e", ".", "G", "(", ")", ".", "ActiveDevice", ".", "DeviceID", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "args", ":=", "&", "DeviceWrapArgs", "{", "Me", ":", "e", ".", "User", ",", "DeviceName", ":", "e", ".", "DeviceName", ",", "DeviceType", ":", "deviceType", ",", "Lks", ":", "e", ".", "lks", ",", "IsEldest", ":", "false", ",", "// just to be explicit", "IsSelfProvision", ":", "true", ",", "PerUserKeyring", ":", "e", ".", "perUserKeyring", ",", "EldestKID", ":", "e", ".", "User", ".", "GetEldestKID", "(", ")", ",", "Signer", ":", "signer", ",", "EkReboxer", ":", "e", ".", "ekReboxer", ",", "}", "\n\n", "e", ".", "deviceWrapEng", "=", "NewDeviceWrap", "(", "m", ".", "G", "(", ")", ",", "args", ")", "\n", "return", "RunEngine2", "(", "m", ",", "e", ".", "deviceWrapEng", ")", "\n", "}" ]
// makeDeviceKeysWithSigner creates device keys given a signing key.
[ "makeDeviceKeysWithSigner", "creates", "device", "keys", "given", "a", "signing", "key", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/selfprovision.go#L183-L208
159,861
keybase/client
go/engine/selfprovision.go
ppStream
func (e *SelfProvisionEngine) ppStream(m libkb.MetaContext) (*libkb.PassphraseStream, error) { if m.LoginContext() == nil { return nil, errors.New("SelfProvisionEngine: ppStream() -> nil ctx.LoginContext") } cached := m.LoginContext().PassphraseStreamCache() if cached == nil { return nil, errors.New("SelfProvisionEngine: ppStream() -> nil PassphraseStreamCache") } return cached.PassphraseStream(), nil }
go
func (e *SelfProvisionEngine) ppStream(m libkb.MetaContext) (*libkb.PassphraseStream, error) { if m.LoginContext() == nil { return nil, errors.New("SelfProvisionEngine: ppStream() -> nil ctx.LoginContext") } cached := m.LoginContext().PassphraseStreamCache() if cached == nil { return nil, errors.New("SelfProvisionEngine: ppStream() -> nil PassphraseStreamCache") } return cached.PassphraseStream(), nil }
[ "func", "(", "e", "*", "SelfProvisionEngine", ")", "ppStream", "(", "m", "libkb", ".", "MetaContext", ")", "(", "*", "libkb", ".", "PassphraseStream", ",", "error", ")", "{", "if", "m", ".", "LoginContext", "(", ")", "==", "nil", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "cached", ":=", "m", ".", "LoginContext", "(", ")", ".", "PassphraseStreamCache", "(", ")", "\n", "if", "cached", "==", "nil", "{", "return", "nil", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "cached", ".", "PassphraseStream", "(", ")", ",", "nil", "\n", "}" ]
// copied from loginProvision // ppStream gets the passphrase stream from the cache
[ "copied", "from", "loginProvision", "ppStream", "gets", "the", "passphrase", "stream", "from", "the", "cache" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/selfprovision.go#L228-L237
159,862
keybase/client
go/engine/engine.go
isLoggedInWithUIDAndError
func isLoggedInWithUIDAndError(m libkb.MetaContext) (ret bool, uid keybase1.UID, err error) { ret, uid, err = libkb.BootstrapActiveDeviceWithMetaContext(m) return ret, uid, err }
go
func isLoggedInWithUIDAndError(m libkb.MetaContext) (ret bool, uid keybase1.UID, err error) { ret, uid, err = libkb.BootstrapActiveDeviceWithMetaContext(m) return ret, uid, err }
[ "func", "isLoggedInWithUIDAndError", "(", "m", "libkb", ".", "MetaContext", ")", "(", "ret", "bool", ",", "uid", "keybase1", ".", "UID", ",", "err", "error", ")", "{", "ret", ",", "uid", ",", "err", "=", "libkb", ".", "BootstrapActiveDeviceWithMetaContext", "(", "m", ")", "\n", "return", "ret", ",", "uid", ",", "err", "\n", "}" ]
// isLoggedInWithUIDAndError conveys if the user is in a logged-in state or not. // If this function returns `true`, it's because the user is logged in, // is on a provisioned device, and has an unlocked device key, If this // function returns `false`, it's because either no one has ever logged onto // this device, or someone has, and then clicked `logout`. If the return // value is `false`, and `err` is `nil`, then the service is in one of // those expected "logged out" states. If the return value is `false` // and `err` is non-`nil`, then something went wrong, and the app is in some // sort of unexpected state. If `ret` is `true`, then `uid` will convey // which user is logged in. // // Under the hood, IsLoggedIn is going through the BootstrapActiveDevice // flow and therefore will try its best to unlocked locked keys if it can // without user interaction.
[ "isLoggedInWithUIDAndError", "conveys", "if", "the", "user", "is", "in", "a", "logged", "-", "in", "state", "or", "not", ".", "If", "this", "function", "returns", "true", "it", "s", "because", "the", "user", "is", "logged", "in", "is", "on", "a", "provisioned", "device", "and", "has", "an", "unlocked", "device", "key", "If", "this", "function", "returns", "false", "it", "s", "because", "either", "no", "one", "has", "ever", "logged", "onto", "this", "device", "or", "someone", "has", "and", "then", "clicked", "logout", ".", "If", "the", "return", "value", "is", "false", "and", "err", "is", "nil", "then", "the", "service", "is", "in", "one", "of", "those", "expected", "logged", "out", "states", ".", "If", "the", "return", "value", "is", "false", "and", "err", "is", "non", "-", "nil", "then", "something", "went", "wrong", "and", "the", "app", "is", "in", "some", "sort", "of", "unexpected", "state", ".", "If", "ret", "is", "true", "then", "uid", "will", "convey", "which", "user", "is", "logged", "in", ".", "Under", "the", "hood", "IsLoggedIn", "is", "going", "through", "the", "BootstrapActiveDevice", "flow", "and", "therefore", "will", "try", "its", "best", "to", "unlocked", "locked", "keys", "if", "it", "can", "without", "user", "interaction", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/engine.go#L49-L52
159,863
keybase/client
go/libkb/client.go
genClientConfigForInternalAPI
func genClientConfigForInternalAPI(g *GlobalContext) (*ClientConfig, error) { e := g.Env serverURI := e.GetServerURI() if e.GetTorMode().Enabled() { serverURI = e.GetTorHiddenAddress() } if serverURI == "" { err := fmt.Errorf("Cannot find a server URL") return nil, err } url, err := url.Parse(serverURI) if err != nil { return nil, err } if url.Scheme == "" { return nil, fmt.Errorf("Server URL missing Scheme") } if url.Host == "" { return nil, fmt.Errorf("Server URL missing Host") } useTLS := (url.Scheme == "https") host, port, e2 := SplitHost(url.Host) if e2 != nil { return nil, e2 } var rootCAs *x509.CertPool if rawCA := e.GetBundledCA(host); len(rawCA) > 0 { rootCAs, err = ParseCA(rawCA) if err != nil { err = fmt.Errorf("In parsing CAs for %s: %s", host, err) return nil, err } g.Log.Debug(fmt.Sprintf("Using special root CA for %s: %s", host, ShortCA(rawCA))) } // If we're using proxies, they might have their own CAs. if rootCAs, err = GetProxyCAs(rootCAs, e.config); err != nil { return nil, err } ret := &ClientConfig{host, port, useTLS, url, rootCAs, url.Path, true, e.GetAPITimeout()} return ret, nil }
go
func genClientConfigForInternalAPI(g *GlobalContext) (*ClientConfig, error) { e := g.Env serverURI := e.GetServerURI() if e.GetTorMode().Enabled() { serverURI = e.GetTorHiddenAddress() } if serverURI == "" { err := fmt.Errorf("Cannot find a server URL") return nil, err } url, err := url.Parse(serverURI) if err != nil { return nil, err } if url.Scheme == "" { return nil, fmt.Errorf("Server URL missing Scheme") } if url.Host == "" { return nil, fmt.Errorf("Server URL missing Host") } useTLS := (url.Scheme == "https") host, port, e2 := SplitHost(url.Host) if e2 != nil { return nil, e2 } var rootCAs *x509.CertPool if rawCA := e.GetBundledCA(host); len(rawCA) > 0 { rootCAs, err = ParseCA(rawCA) if err != nil { err = fmt.Errorf("In parsing CAs for %s: %s", host, err) return nil, err } g.Log.Debug(fmt.Sprintf("Using special root CA for %s: %s", host, ShortCA(rawCA))) } // If we're using proxies, they might have their own CAs. if rootCAs, err = GetProxyCAs(rootCAs, e.config); err != nil { return nil, err } ret := &ClientConfig{host, port, useTLS, url, rootCAs, url.Path, true, e.GetAPITimeout()} return ret, nil }
[ "func", "genClientConfigForInternalAPI", "(", "g", "*", "GlobalContext", ")", "(", "*", "ClientConfig", ",", "error", ")", "{", "e", ":=", "g", ".", "Env", "\n", "serverURI", ":=", "e", ".", "GetServerURI", "(", ")", "\n\n", "if", "e", ".", "GetTorMode", "(", ")", ".", "Enabled", "(", ")", "{", "serverURI", "=", "e", ".", "GetTorHiddenAddress", "(", ")", "\n", "}", "\n\n", "if", "serverURI", "==", "\"", "\"", "{", "err", ":=", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "url", ",", "err", ":=", "url", ".", "Parse", "(", "serverURI", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "if", "url", ".", "Scheme", "==", "\"", "\"", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "url", ".", "Host", "==", "\"", "\"", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "useTLS", ":=", "(", "url", ".", "Scheme", "==", "\"", "\"", ")", "\n", "host", ",", "port", ",", "e2", ":=", "SplitHost", "(", "url", ".", "Host", ")", "\n", "if", "e2", "!=", "nil", "{", "return", "nil", ",", "e2", "\n", "}", "\n", "var", "rootCAs", "*", "x509", ".", "CertPool", "\n", "if", "rawCA", ":=", "e", ".", "GetBundledCA", "(", "host", ")", ";", "len", "(", "rawCA", ")", ">", "0", "{", "rootCAs", ",", "err", "=", "ParseCA", "(", "rawCA", ")", "\n", "if", "err", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "host", ",", "err", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "g", ".", "Log", ".", "Debug", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "host", ",", "ShortCA", "(", "rawCA", ")", ")", ")", "\n", "}", "\n\n", "// If we're using proxies, they might have their own CAs.", "if", "rootCAs", ",", "err", "=", "GetProxyCAs", "(", "rootCAs", ",", "e", ".", "config", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "ret", ":=", "&", "ClientConfig", "{", "host", ",", "port", ",", "useTLS", ",", "url", ",", "rootCAs", ",", "url", ".", "Path", ",", "true", ",", "e", ".", "GetAPITimeout", "(", ")", "}", "\n", "return", "ret", ",", "nil", "\n", "}" ]
// GenClientConfigForInternalAPI pulls the information out of the environment configuration, // and build a Client config that will be used in all API server // requests
[ "GenClientConfigForInternalAPI", "pulls", "the", "information", "out", "of", "the", "environment", "configuration", "and", "build", "a", "Client", "config", "that", "will", "be", "used", "in", "all", "API", "server", "requests" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/client.go#L83-L131
159,864
keybase/client
go/kbfs/libpages/server.go
allowDomain
func (s *Server) allowDomain(ctx context.Context, host string) (err error) { host = strings.ToLower(strings.TrimSpace(host)) if err = s.config.checkDomainLists(host); err != nil { return err } // DoS protection: look up kbp TXT record before attempting ACME cert // issuance, and only allow those that have DNS records configured. This is // in case someone keeps sending us TLS handshakes with random SNIs, // causing us to be rate-limited by the ACME server. // // TODO: cache the parsed root somewhere so we don't end up doing it twice // for each connection. if _, err = s.rootLoader.LoadRoot(host); err != nil { return err } return nil }
go
func (s *Server) allowDomain(ctx context.Context, host string) (err error) { host = strings.ToLower(strings.TrimSpace(host)) if err = s.config.checkDomainLists(host); err != nil { return err } // DoS protection: look up kbp TXT record before attempting ACME cert // issuance, and only allow those that have DNS records configured. This is // in case someone keeps sending us TLS handshakes with random SNIs, // causing us to be rate-limited by the ACME server. // // TODO: cache the parsed root somewhere so we don't end up doing it twice // for each connection. if _, err = s.rootLoader.LoadRoot(host); err != nil { return err } return nil }
[ "func", "(", "s", "*", "Server", ")", "allowDomain", "(", "ctx", "context", ".", "Context", ",", "host", "string", ")", "(", "err", "error", ")", "{", "host", "=", "strings", ".", "ToLower", "(", "strings", ".", "TrimSpace", "(", "host", ")", ")", "\n", "if", "err", "=", "s", ".", "config", ".", "checkDomainLists", "(", "host", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// DoS protection: look up kbp TXT record before attempting ACME cert", "// issuance, and only allow those that have DNS records configured. This is", "// in case someone keeps sending us TLS handshakes with random SNIs,", "// causing us to be rate-limited by the ACME server.", "//", "// TODO: cache the parsed root somewhere so we don't end up doing it twice", "// for each connection.", "if", "_", ",", "err", "=", "s", ".", "rootLoader", ".", "LoadRoot", "(", "host", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// allowDomain is used to determine whether a given domain should be // served. It's also used as a HostPolicy in autocert package.
[ "allowDomain", "is", "used", "to", "determine", "whether", "a", "given", "domain", "should", "be", "served", ".", "It", "s", "also", "used", "as", "a", "HostPolicy", "in", "autocert", "package", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/server.go#L435-L453
159,865
keybase/client
go/kbfs/libpages/server.go
ListenAndServe
func ListenAndServe(ctx context.Context, config *ServerConfig, kbfsConfig libkbfs.Config) (err error) { ctx, cancel := context.WithCancel(ctx) defer cancel() libmime.Patch(additionalMimeTypes) server := &Server{ config: config, kbfsConfig: kbfsConfig, rootLoader: DNSRootLoader{log: config.Logger}, } server.siteCache, err = lru.NewWithEvict(fsCacheSize, server.siteCacheEvict) if err != nil { return err } manager, err := makeACMEManager( config.UseStaging, config.UseDiskCertCache, server.allowDomain) if err != nil { return err } httpsServer := http.Server{ Handler: server, ReadHeaderTimeout: httpReadHeaderTimeout, IdleTimeout: httpIdleTimeout, } httpServer := http.Server{ Addr: ":80", // Enable http-01 by calling the HTTPHandler method, and set the // fallback HTTP handler to nil. As described in the autocert doc // (https://github.com/golang/crypto/blob/13931e22f9e72ea58bb73048bc752b48c6d4d4ac/acme/autocert/autocert.go#L248-L251), // this means for requests not for ACME domain verification, a default // fallback handler is used, which redirects all HTTP traffic using GET // and HEAD to HTTPS using 302 Found, and responds with 400 Bad Request // for requests with other methods. Handler: manager.HTTPHandler(nil), ReadHeaderTimeout: httpReadHeaderTimeout, IdleTimeout: httpIdleTimeout, } go func() { <-ctx.Done() shutdownCtx, cancel := context.WithTimeout( context.Background(), gracefulShutdownTimeout) defer cancel() httpsServer.Shutdown(shutdownCtx) httpServer.Shutdown(shutdownCtx) }() go func() { err := httpServer.ListenAndServe() if err != nil { config.Logger.Error("http.ListenAndServe:80", zap.Error(err)) } }() return httpsServer.Serve(manager.Listener()) }
go
func ListenAndServe(ctx context.Context, config *ServerConfig, kbfsConfig libkbfs.Config) (err error) { ctx, cancel := context.WithCancel(ctx) defer cancel() libmime.Patch(additionalMimeTypes) server := &Server{ config: config, kbfsConfig: kbfsConfig, rootLoader: DNSRootLoader{log: config.Logger}, } server.siteCache, err = lru.NewWithEvict(fsCacheSize, server.siteCacheEvict) if err != nil { return err } manager, err := makeACMEManager( config.UseStaging, config.UseDiskCertCache, server.allowDomain) if err != nil { return err } httpsServer := http.Server{ Handler: server, ReadHeaderTimeout: httpReadHeaderTimeout, IdleTimeout: httpIdleTimeout, } httpServer := http.Server{ Addr: ":80", // Enable http-01 by calling the HTTPHandler method, and set the // fallback HTTP handler to nil. As described in the autocert doc // (https://github.com/golang/crypto/blob/13931e22f9e72ea58bb73048bc752b48c6d4d4ac/acme/autocert/autocert.go#L248-L251), // this means for requests not for ACME domain verification, a default // fallback handler is used, which redirects all HTTP traffic using GET // and HEAD to HTTPS using 302 Found, and responds with 400 Bad Request // for requests with other methods. Handler: manager.HTTPHandler(nil), ReadHeaderTimeout: httpReadHeaderTimeout, IdleTimeout: httpIdleTimeout, } go func() { <-ctx.Done() shutdownCtx, cancel := context.WithTimeout( context.Background(), gracefulShutdownTimeout) defer cancel() httpsServer.Shutdown(shutdownCtx) httpServer.Shutdown(shutdownCtx) }() go func() { err := httpServer.ListenAndServe() if err != nil { config.Logger.Error("http.ListenAndServe:80", zap.Error(err)) } }() return httpsServer.Serve(manager.Listener()) }
[ "func", "ListenAndServe", "(", "ctx", "context", ".", "Context", ",", "config", "*", "ServerConfig", ",", "kbfsConfig", "libkbfs", ".", "Config", ")", "(", "err", "error", ")", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "defer", "cancel", "(", ")", "\n\n", "libmime", ".", "Patch", "(", "additionalMimeTypes", ")", "\n\n", "server", ":=", "&", "Server", "{", "config", ":", "config", ",", "kbfsConfig", ":", "kbfsConfig", ",", "rootLoader", ":", "DNSRootLoader", "{", "log", ":", "config", ".", "Logger", "}", ",", "}", "\n", "server", ".", "siteCache", ",", "err", "=", "lru", ".", "NewWithEvict", "(", "fsCacheSize", ",", "server", ".", "siteCacheEvict", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "manager", ",", "err", ":=", "makeACMEManager", "(", "config", ".", "UseStaging", ",", "config", ".", "UseDiskCertCache", ",", "server", ".", "allowDomain", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "httpsServer", ":=", "http", ".", "Server", "{", "Handler", ":", "server", ",", "ReadHeaderTimeout", ":", "httpReadHeaderTimeout", ",", "IdleTimeout", ":", "httpIdleTimeout", ",", "}", "\n\n", "httpServer", ":=", "http", ".", "Server", "{", "Addr", ":", "\"", "\"", ",", "// Enable http-01 by calling the HTTPHandler method, and set the", "// fallback HTTP handler to nil. As described in the autocert doc", "// (https://github.com/golang/crypto/blob/13931e22f9e72ea58bb73048bc752b48c6d4d4ac/acme/autocert/autocert.go#L248-L251),", "// this means for requests not for ACME domain verification, a default", "// fallback handler is used, which redirects all HTTP traffic using GET", "// and HEAD to HTTPS using 302 Found, and responds with 400 Bad Request", "// for requests with other methods.", "Handler", ":", "manager", ".", "HTTPHandler", "(", "nil", ")", ",", "ReadHeaderTimeout", ":", "httpReadHeaderTimeout", ",", "IdleTimeout", ":", "httpIdleTimeout", ",", "}", "\n\n", "go", "func", "(", ")", "{", "<-", "ctx", ".", "Done", "(", ")", "\n", "shutdownCtx", ",", "cancel", ":=", "context", ".", "WithTimeout", "(", "context", ".", "Background", "(", ")", ",", "gracefulShutdownTimeout", ")", "\n", "defer", "cancel", "(", ")", "\n", "httpsServer", ".", "Shutdown", "(", "shutdownCtx", ")", "\n", "httpServer", ".", "Shutdown", "(", "shutdownCtx", ")", "\n", "}", "(", ")", "\n\n", "go", "func", "(", ")", "{", "err", ":=", "httpServer", ".", "ListenAndServe", "(", ")", "\n", "if", "err", "!=", "nil", "{", "config", ".", "Logger", ".", "Error", "(", "\"", "\"", ",", "zap", ".", "Error", "(", "err", ")", ")", "\n", "}", "\n", "}", "(", ")", "\n\n", "return", "httpsServer", ".", "Serve", "(", "manager", ".", "Listener", "(", ")", ")", "\n", "}" ]
// ListenAndServe listens on 443 and 80 ports of all addresses, and serve // Keybase Pages based on config and kbfsConfig. HTTPs setup is handled with // ACME.
[ "ListenAndServe", "listens", "on", "443", "and", "80", "ports", "of", "all", "addresses", "and", "serve", "Keybase", "Pages", "based", "on", "config", "and", "kbfsConfig", ".", "HTTPs", "setup", "is", "handled", "with", "ACME", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/server.go#L500-L560
159,866
keybase/client
go/kbfs/libpages/stats.go
ReportServedRequest
func (m multiStatReporter) ReportServedRequest( r *ServedRequestInfo) { for _, reporter := range m { reporter.ReportServedRequest(r) } }
go
func (m multiStatReporter) ReportServedRequest( r *ServedRequestInfo) { for _, reporter := range m { reporter.ReportServedRequest(r) } }
[ "func", "(", "m", "multiStatReporter", ")", "ReportServedRequest", "(", "r", "*", "ServedRequestInfo", ")", "{", "for", "_", ",", "reporter", ":=", "range", "m", "{", "reporter", ".", "ReportServedRequest", "(", "r", ")", "\n", "}", "\n", "}" ]
// ReportServedRequest implements the StatsReporter interface.
[ "ReportServedRequest", "implements", "the", "StatsReporter", "interface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/stats.go#L85-L90
159,867
keybase/client
go/kbfs/libpages/stats.go
NewFileBasedActivityStatsStorer
func NewFileBasedActivityStatsStorer( rootPath string, logger *zap.Logger) (ActivityStatsStorer, error) { err := os.MkdirAll(filepath.Join(rootPath, dirnameTlfStamps), os.ModeDir|0700) if err != nil { return nil, err } err = os.MkdirAll(filepath.Join(rootPath, dirnameHostStamps), os.ModeDir|0700) if err != nil { return nil, err } s := &fileBasedActivityStatsStorer{ root: rootPath, logger: logger, ch: make(chan activity, fbassChSize), } go s.processLoop() return s, nil }
go
func NewFileBasedActivityStatsStorer( rootPath string, logger *zap.Logger) (ActivityStatsStorer, error) { err := os.MkdirAll(filepath.Join(rootPath, dirnameTlfStamps), os.ModeDir|0700) if err != nil { return nil, err } err = os.MkdirAll(filepath.Join(rootPath, dirnameHostStamps), os.ModeDir|0700) if err != nil { return nil, err } s := &fileBasedActivityStatsStorer{ root: rootPath, logger: logger, ch: make(chan activity, fbassChSize), } go s.processLoop() return s, nil }
[ "func", "NewFileBasedActivityStatsStorer", "(", "rootPath", "string", ",", "logger", "*", "zap", ".", "Logger", ")", "(", "ActivityStatsStorer", ",", "error", ")", "{", "err", ":=", "os", ".", "MkdirAll", "(", "filepath", ".", "Join", "(", "rootPath", ",", "dirnameTlfStamps", ")", ",", "os", ".", "ModeDir", "|", "0700", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "err", "=", "os", ".", "MkdirAll", "(", "filepath", ".", "Join", "(", "rootPath", ",", "dirnameHostStamps", ")", ",", "os", ".", "ModeDir", "|", "0700", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "s", ":=", "&", "fileBasedActivityStatsStorer", "{", "root", ":", "rootPath", ",", "logger", ":", "logger", ",", "ch", ":", "make", "(", "chan", "activity", ",", "fbassChSize", ")", ",", "}", "\n", "go", "s", ".", "processLoop", "(", ")", "\n", "return", "s", ",", "nil", "\n", "}" ]
// NewFileBasedActivityStatsStorer creates an ActivityStatsStorer that stores // activities on a local filesystem. // // NOTE that this is meant to be for development and // testing only and does not scale well.
[ "NewFileBasedActivityStatsStorer", "creates", "an", "ActivityStatsStorer", "that", "stores", "activities", "on", "a", "local", "filesystem", ".", "NOTE", "that", "this", "is", "meant", "to", "be", "for", "development", "and", "testing", "only", "and", "does", "not", "scale", "well", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/stats.go#L161-L178
159,868
keybase/client
go/kbfs/libpages/stats.go
RecordActives
func (s *fileBasedActivityStatsStorer) RecordActives(tlf tlf.ID, host string) { s.ch <- activity{tlfID: tlf, host: host} }
go
func (s *fileBasedActivityStatsStorer) RecordActives(tlf tlf.ID, host string) { s.ch <- activity{tlfID: tlf, host: host} }
[ "func", "(", "s", "*", "fileBasedActivityStatsStorer", ")", "RecordActives", "(", "tlf", "tlf", ".", "ID", ",", "host", "string", ")", "{", "s", ".", "ch", "<-", "activity", "{", "tlfID", ":", "tlf", ",", "host", ":", "host", "}", "\n", "}" ]
// RecordActives implement the ActivityStatsStorer interface.
[ "RecordActives", "implement", "the", "ActivityStatsStorer", "interface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/stats.go#L181-L183
159,869
keybase/client
go/kbfs/libpages/stats.go
GetActivesGetter
func (s *fileBasedActivityStatsStorer) GetActivesGetter() ( getter ActivesGetter, err error) { tlfStamps, err := ioutil.ReadDir(filepath.Join(s.root, dirnameTlfStamps)) if err != nil { return nil, err } hostStamps, err := ioutil.ReadDir(filepath.Join(s.root, dirnameHostStamps)) if err != nil { return nil, err } return &fileinfoActivesGetter{ tlfs: tlfStamps, hosts: hostStamps, }, nil }
go
func (s *fileBasedActivityStatsStorer) GetActivesGetter() ( getter ActivesGetter, err error) { tlfStamps, err := ioutil.ReadDir(filepath.Join(s.root, dirnameTlfStamps)) if err != nil { return nil, err } hostStamps, err := ioutil.ReadDir(filepath.Join(s.root, dirnameHostStamps)) if err != nil { return nil, err } return &fileinfoActivesGetter{ tlfs: tlfStamps, hosts: hostStamps, }, nil }
[ "func", "(", "s", "*", "fileBasedActivityStatsStorer", ")", "GetActivesGetter", "(", ")", "(", "getter", "ActivesGetter", ",", "err", "error", ")", "{", "tlfStamps", ",", "err", ":=", "ioutil", ".", "ReadDir", "(", "filepath", ".", "Join", "(", "s", ".", "root", ",", "dirnameTlfStamps", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "hostStamps", ",", "err", ":=", "ioutil", ".", "ReadDir", "(", "filepath", ".", "Join", "(", "s", ".", "root", ",", "dirnameHostStamps", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "fileinfoActivesGetter", "{", "tlfs", ":", "tlfStamps", ",", "hosts", ":", "hostStamps", ",", "}", ",", "nil", "\n", "}" ]
// GetActiveTlfs implement the ActivityStatsStorer interface.
[ "GetActiveTlfs", "implement", "the", "ActivityStatsStorer", "interface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/stats.go#L216-L230
159,870
keybase/client
go/kbfs/libfs/time_equal.go
TimeEqual
func TimeEqual(a, b time.Time) bool { if runtime.GOOS == "darwin" { a = a.Truncate(1 * time.Second) b = b.Truncate(1 * time.Second) } return a.Equal(b) }
go
func TimeEqual(a, b time.Time) bool { if runtime.GOOS == "darwin" { a = a.Truncate(1 * time.Second) b = b.Truncate(1 * time.Second) } return a.Equal(b) }
[ "func", "TimeEqual", "(", "a", ",", "b", "time", ".", "Time", ")", "bool", "{", "if", "runtime", ".", "GOOS", "==", "\"", "\"", "{", "a", "=", "a", ".", "Truncate", "(", "1", "*", "time", ".", "Second", ")", "\n", "b", "=", "b", ".", "Truncate", "(", "1", "*", "time", ".", "Second", ")", "\n", "}", "\n", "return", "a", ".", "Equal", "(", "b", ")", "\n", "}" ]
// TimeEqual compares two filesystem-related timestamps. // // On platforms that don't use nanosecond-accurate timestamps in their // filesystem APIs, it truncates the timestamps to make them // comparable.
[ "TimeEqual", "compares", "two", "filesystem", "-", "related", "timestamps", ".", "On", "platforms", "that", "don", "t", "use", "nanosecond", "-", "accurate", "timestamps", "in", "their", "filesystem", "APIs", "it", "truncates", "the", "timestamps", "to", "make", "them", "comparable", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/time_equal.go#L17-L23
159,871
keybase/client
go/teams/proofs.go
AddNeededHappensBeforeProof
func (p *proofSetT) AddNeededHappensBeforeProof(ctx context.Context, a proofTerm, b proofTerm, reason string) { var action string defer func() { if action != "discard-easy" && !ShouldSuppressLogging(ctx) { p.G().Log.CDebugf(ctx, "proofSet add(%v --> %v) [%v] '%v'", a.shortForm(), b.shortForm(), action, reason) } }() idx := newProofIndex(a.leafID, b.leafID) if idx.a.Equal(idx.b) { // If both terms are on the same chain if a.lessThanOrEqual(b) { // The proof is self-evident. // Discard it. action = "discard-easy" return } // The proof is self-evident FALSE. // Add it and return immediately so the rest of this function doesn't have to trip over it. // It should be failed later by the checker. action = "added-easy-false" p.proofs[idx] = append(p.proofs[idx], proof{a, b, reason}) return } set := p.proofs[idx] for i := len(set) - 1; i >= 0; i-- { existing := set[i] if existing.a.lessThanOrEqual(a) && b.lessThanOrEqual(existing.b) { // If the new proof is surrounded by the old proof. existing.a = existing.a.max(a) existing.b = existing.b.min(b) set[i] = existing action = "collapsed" return } if existing.a.equal(a) && existing.b.lessThanOrEqual(b) { // If the new proof is the same on the left and weaker on the right. // Discard the new proof, as it is implied by the existing one. action = "discard-weak" return } } action = "added" p.proofs[idx] = append(p.proofs[idx], proof{a, b, reason}) return }
go
func (p *proofSetT) AddNeededHappensBeforeProof(ctx context.Context, a proofTerm, b proofTerm, reason string) { var action string defer func() { if action != "discard-easy" && !ShouldSuppressLogging(ctx) { p.G().Log.CDebugf(ctx, "proofSet add(%v --> %v) [%v] '%v'", a.shortForm(), b.shortForm(), action, reason) } }() idx := newProofIndex(a.leafID, b.leafID) if idx.a.Equal(idx.b) { // If both terms are on the same chain if a.lessThanOrEqual(b) { // The proof is self-evident. // Discard it. action = "discard-easy" return } // The proof is self-evident FALSE. // Add it and return immediately so the rest of this function doesn't have to trip over it. // It should be failed later by the checker. action = "added-easy-false" p.proofs[idx] = append(p.proofs[idx], proof{a, b, reason}) return } set := p.proofs[idx] for i := len(set) - 1; i >= 0; i-- { existing := set[i] if existing.a.lessThanOrEqual(a) && b.lessThanOrEqual(existing.b) { // If the new proof is surrounded by the old proof. existing.a = existing.a.max(a) existing.b = existing.b.min(b) set[i] = existing action = "collapsed" return } if existing.a.equal(a) && existing.b.lessThanOrEqual(b) { // If the new proof is the same on the left and weaker on the right. // Discard the new proof, as it is implied by the existing one. action = "discard-weak" return } } action = "added" p.proofs[idx] = append(p.proofs[idx], proof{a, b, reason}) return }
[ "func", "(", "p", "*", "proofSetT", ")", "AddNeededHappensBeforeProof", "(", "ctx", "context", ".", "Context", ",", "a", "proofTerm", ",", "b", "proofTerm", ",", "reason", "string", ")", "{", "var", "action", "string", "\n", "defer", "func", "(", ")", "{", "if", "action", "!=", "\"", "\"", "&&", "!", "ShouldSuppressLogging", "(", "ctx", ")", "{", "p", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "a", ".", "shortForm", "(", ")", ",", "b", ".", "shortForm", "(", ")", ",", "action", ",", "reason", ")", "\n", "}", "\n", "}", "(", ")", "\n\n", "idx", ":=", "newProofIndex", "(", "a", ".", "leafID", ",", "b", ".", "leafID", ")", "\n\n", "if", "idx", ".", "a", ".", "Equal", "(", "idx", ".", "b", ")", "{", "// If both terms are on the same chain", "if", "a", ".", "lessThanOrEqual", "(", "b", ")", "{", "// The proof is self-evident.", "// Discard it.", "action", "=", "\"", "\"", "\n", "return", "\n", "}", "\n", "// The proof is self-evident FALSE.", "// Add it and return immediately so the rest of this function doesn't have to trip over it.", "// It should be failed later by the checker.", "action", "=", "\"", "\"", "\n", "p", ".", "proofs", "[", "idx", "]", "=", "append", "(", "p", ".", "proofs", "[", "idx", "]", ",", "proof", "{", "a", ",", "b", ",", "reason", "}", ")", "\n", "return", "\n", "}", "\n\n", "set", ":=", "p", ".", "proofs", "[", "idx", "]", "\n", "for", "i", ":=", "len", "(", "set", ")", "-", "1", ";", "i", ">=", "0", ";", "i", "--", "{", "existing", ":=", "set", "[", "i", "]", "\n", "if", "existing", ".", "a", ".", "lessThanOrEqual", "(", "a", ")", "&&", "b", ".", "lessThanOrEqual", "(", "existing", ".", "b", ")", "{", "// If the new proof is surrounded by the old proof.", "existing", ".", "a", "=", "existing", ".", "a", ".", "max", "(", "a", ")", "\n", "existing", ".", "b", "=", "existing", ".", "b", ".", "min", "(", "b", ")", "\n", "set", "[", "i", "]", "=", "existing", "\n", "action", "=", "\"", "\"", "\n", "return", "\n", "}", "\n", "if", "existing", ".", "a", ".", "equal", "(", "a", ")", "&&", "existing", ".", "b", ".", "lessThanOrEqual", "(", "b", ")", "{", "// If the new proof is the same on the left and weaker on the right.", "// Discard the new proof, as it is implied by the existing one.", "action", "=", "\"", "\"", "\n", "return", "\n", "}", "\n", "}", "\n", "action", "=", "\"", "\"", "\n", "p", ".", "proofs", "[", "idx", "]", "=", "append", "(", "p", ".", "proofs", "[", "idx", "]", ",", "proof", "{", "a", ",", "b", ",", "reason", "}", ")", "\n", "return", "\n", "}" ]
// AddNeededHappensBeforeProof adds a new needed proof to the proof set. The // proof is that `a` happened before `b`. If there are other proofs in the proof set // that prove the same thing, then we can tighten those proofs with a and b if // it makes sense. For instance, if there is an existing proof that c<d, // but we know that c<a and b<d, then it suffices to replace c<d with a<b as // the needed proof. Each proof in the proof set in the end will correspond // to a merkle tree lookup, so it makes sense to be stingy. Return the modified // proof set with the new proofs needed, but the original argument p will // be mutated.
[ "AddNeededHappensBeforeProof", "adds", "a", "new", "needed", "proof", "to", "the", "proof", "set", ".", "The", "proof", "is", "that", "a", "happened", "before", "b", ".", "If", "there", "are", "other", "proofs", "in", "the", "proof", "set", "that", "prove", "the", "same", "thing", "then", "we", "can", "tighten", "those", "proofs", "with", "a", "and", "b", "if", "it", "makes", "sense", ".", "For", "instance", "if", "there", "is", "an", "existing", "proof", "that", "c<d", "but", "we", "know", "that", "c<a", "and", "b<d", "then", "it", "suffices", "to", "replace", "c<d", "with", "a<b", "as", "the", "needed", "proof", ".", "Each", "proof", "in", "the", "proof", "set", "in", "the", "end", "will", "correspond", "to", "a", "merkle", "tree", "lookup", "so", "it", "makes", "sense", "to", "be", "stingy", ".", "Return", "the", "modified", "proof", "set", "with", "the", "new", "proofs", "needed", "but", "the", "original", "argument", "p", "will", "be", "mutated", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/proofs.go#L112-L160
159,872
keybase/client
go/teams/proofs.go
SetTeamLinkMap
func (p *proofSetT) SetTeamLinkMap(ctx context.Context, teamID keybase1.TeamID, linkMap linkMapT) { p.teamLinkMaps[teamID] = linkMap }
go
func (p *proofSetT) SetTeamLinkMap(ctx context.Context, teamID keybase1.TeamID, linkMap linkMapT) { p.teamLinkMaps[teamID] = linkMap }
[ "func", "(", "p", "*", "proofSetT", ")", "SetTeamLinkMap", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ",", "linkMap", "linkMapT", ")", "{", "p", ".", "teamLinkMaps", "[", "teamID", "]", "=", "linkMap", "\n", "}" ]
// Set the latest link map for the team
[ "Set", "the", "latest", "link", "map", "for", "the", "team" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/proofs.go#L163-L165
159,873
keybase/client
go/teams/proofs.go
lookupMerkleTreeChain
func (p proof) lookupMerkleTreeChain(ctx context.Context, world LoaderContext) (ret *libkb.MerkleTriple, err error) { return world.merkleLookupTripleAtHashMeta(ctx, p.a.isPublic(), p.a.leafID, p.b.sigMeta.PrevMerkleRootSigned.HashMeta) }
go
func (p proof) lookupMerkleTreeChain(ctx context.Context, world LoaderContext) (ret *libkb.MerkleTriple, err error) { return world.merkleLookupTripleAtHashMeta(ctx, p.a.isPublic(), p.a.leafID, p.b.sigMeta.PrevMerkleRootSigned.HashMeta) }
[ "func", "(", "p", "proof", ")", "lookupMerkleTreeChain", "(", "ctx", "context", ".", "Context", ",", "world", "LoaderContext", ")", "(", "ret", "*", "libkb", ".", "MerkleTriple", ",", "err", "error", ")", "{", "return", "world", ".", "merkleLookupTripleAtHashMeta", "(", "ctx", ",", "p", ".", "a", ".", "isPublic", "(", ")", ",", "p", ".", "a", ".", "leafID", ",", "p", ".", "b", ".", "sigMeta", ".", "PrevMerkleRootSigned", ".", "HashMeta", ")", "\n", "}" ]
// lookupMerkleTreeChain loads the path up to the merkle tree and back down that corresponds // to this proof. It will contact the API server. Returns the sigchain tail on success.
[ "lookupMerkleTreeChain", "loads", "the", "path", "up", "to", "the", "merkle", "tree", "and", "back", "down", "that", "corresponds", "to", "this", "proof", ".", "It", "will", "contact", "the", "API", "server", ".", "Returns", "the", "sigchain", "tail", "on", "success", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/proofs.go#L205-L207
159,874
keybase/client
go/teams/proofs.go
check
func (p proof) check(ctx context.Context, g *libkb.GlobalContext, world LoaderContext, proofSet *proofSetT) (err error) { defer func() { g.Log.CDebugf(ctx, "TeamLoader proofSet check1(%v) -> %v", p.shortForm(), err) }() triple, err := p.lookupMerkleTreeChain(ctx, world) if err != nil { return err } // laterSeqno is the tail of chain A at the time when B was signed // earlierSeqno is the tail of chain A at the time when A was signed laterSeqno := triple.Seqno earlierSeqno := p.a.sigMeta.SigChainLocation.Seqno if earlierSeqno > laterSeqno { return NewProofError(p, fmt.Sprintf("seqno %d > %d", earlierSeqno, laterSeqno)) } linkID, err := p.findLink(ctx, g, world, p.a.leafID, laterSeqno, p.a.linkMap, proofSet) if err != nil { return err } if !triple.LinkID.Export().Eq(linkID) { g.Log.CDebugf(ctx, "proof error: %s", spew.Sdump(p)) return NewProofError(p, fmt.Sprintf("hash mismatch: %s != %s", triple.LinkID, linkID)) } return nil }
go
func (p proof) check(ctx context.Context, g *libkb.GlobalContext, world LoaderContext, proofSet *proofSetT) (err error) { defer func() { g.Log.CDebugf(ctx, "TeamLoader proofSet check1(%v) -> %v", p.shortForm(), err) }() triple, err := p.lookupMerkleTreeChain(ctx, world) if err != nil { return err } // laterSeqno is the tail of chain A at the time when B was signed // earlierSeqno is the tail of chain A at the time when A was signed laterSeqno := triple.Seqno earlierSeqno := p.a.sigMeta.SigChainLocation.Seqno if earlierSeqno > laterSeqno { return NewProofError(p, fmt.Sprintf("seqno %d > %d", earlierSeqno, laterSeqno)) } linkID, err := p.findLink(ctx, g, world, p.a.leafID, laterSeqno, p.a.linkMap, proofSet) if err != nil { return err } if !triple.LinkID.Export().Eq(linkID) { g.Log.CDebugf(ctx, "proof error: %s", spew.Sdump(p)) return NewProofError(p, fmt.Sprintf("hash mismatch: %s != %s", triple.LinkID, linkID)) } return nil }
[ "func", "(", "p", "proof", ")", "check", "(", "ctx", "context", ".", "Context", ",", "g", "*", "libkb", ".", "GlobalContext", ",", "world", "LoaderContext", ",", "proofSet", "*", "proofSetT", ")", "(", "err", "error", ")", "{", "defer", "func", "(", ")", "{", "g", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "p", ".", "shortForm", "(", ")", ",", "err", ")", "\n", "}", "(", ")", "\n\n", "triple", ",", "err", ":=", "p", ".", "lookupMerkleTreeChain", "(", "ctx", ",", "world", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// laterSeqno is the tail of chain A at the time when B was signed", "// earlierSeqno is the tail of chain A at the time when A was signed", "laterSeqno", ":=", "triple", ".", "Seqno", "\n", "earlierSeqno", ":=", "p", ".", "a", ".", "sigMeta", ".", "SigChainLocation", ".", "Seqno", "\n", "if", "earlierSeqno", ">", "laterSeqno", "{", "return", "NewProofError", "(", "p", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "earlierSeqno", ",", "laterSeqno", ")", ")", "\n", "}", "\n\n", "linkID", ",", "err", ":=", "p", ".", "findLink", "(", "ctx", ",", "g", ",", "world", ",", "p", ".", "a", ".", "leafID", ",", "laterSeqno", ",", "p", ".", "a", ".", "linkMap", ",", "proofSet", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "!", "triple", ".", "LinkID", ".", "Export", "(", ")", ".", "Eq", "(", "linkID", ")", "{", "g", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "spew", ".", "Sdump", "(", "p", ")", ")", "\n", "return", "NewProofError", "(", "p", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "triple", ".", "LinkID", ",", "linkID", ")", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// check a single proof. Call to the merkle API endpoint, and then ensure that the // data that comes back fits the proof and previously checked sigchain links.
[ "check", "a", "single", "proof", ".", "Call", "to", "the", "merkle", "API", "endpoint", "and", "then", "ensure", "that", "the", "data", "that", "comes", "back", "fits", "the", "proof", "and", "previously", "checked", "sigchain", "links", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/proofs.go#L211-L239
159,875
keybase/client
go/teams/proofs.go
findLink
func (p proof) findLink(ctx context.Context, g *libkb.GlobalContext, world LoaderContext, leafID keybase1.UserOrTeamID, seqno keybase1.Seqno, firstLinkMap linkMapT, proofSet *proofSetT) (linkID keybase1.LinkID, err error) { lm := firstLinkMap if leafID.IsTeamOrSubteam() { // Pull in the latest link map, instead of the one from the proof object. tid := leafID.AsTeamOrBust() lm2, ok := proofSet.teamLinkMaps[tid] if ok { lm = lm2 } } if lm == nil { return linkID, NewProofError(p, "nil link map") } linkID, ok := lm[seqno] if ok { return linkID, nil } // We loaded this user originally to get a sigchain as fresh as a certain key provisioning. // In this scenario, we might need a fresher version, so force a poll all the way through // the server, and then try again. If we fail the second time, we a force repoll, then // we're toast. if leafID.IsUser() { g.Log.CDebugf(ctx, "proof#findLink: missed load for %s at %d; trying a force repoll", leafID.String(), seqno) lm, err := world.forceLinkMapRefreshForUser(ctx, leafID.AsUserOrBust()) if err != nil { return linkID, err } linkID, ok = lm[seqno] } if !ok { return linkID, NewProofError(p, fmt.Sprintf("no linkID for seqno %d", seqno)) } return linkID, nil }
go
func (p proof) findLink(ctx context.Context, g *libkb.GlobalContext, world LoaderContext, leafID keybase1.UserOrTeamID, seqno keybase1.Seqno, firstLinkMap linkMapT, proofSet *proofSetT) (linkID keybase1.LinkID, err error) { lm := firstLinkMap if leafID.IsTeamOrSubteam() { // Pull in the latest link map, instead of the one from the proof object. tid := leafID.AsTeamOrBust() lm2, ok := proofSet.teamLinkMaps[tid] if ok { lm = lm2 } } if lm == nil { return linkID, NewProofError(p, "nil link map") } linkID, ok := lm[seqno] if ok { return linkID, nil } // We loaded this user originally to get a sigchain as fresh as a certain key provisioning. // In this scenario, we might need a fresher version, so force a poll all the way through // the server, and then try again. If we fail the second time, we a force repoll, then // we're toast. if leafID.IsUser() { g.Log.CDebugf(ctx, "proof#findLink: missed load for %s at %d; trying a force repoll", leafID.String(), seqno) lm, err := world.forceLinkMapRefreshForUser(ctx, leafID.AsUserOrBust()) if err != nil { return linkID, err } linkID, ok = lm[seqno] } if !ok { return linkID, NewProofError(p, fmt.Sprintf("no linkID for seqno %d", seqno)) } return linkID, nil }
[ "func", "(", "p", "proof", ")", "findLink", "(", "ctx", "context", ".", "Context", ",", "g", "*", "libkb", ".", "GlobalContext", ",", "world", "LoaderContext", ",", "leafID", "keybase1", ".", "UserOrTeamID", ",", "seqno", "keybase1", ".", "Seqno", ",", "firstLinkMap", "linkMapT", ",", "proofSet", "*", "proofSetT", ")", "(", "linkID", "keybase1", ".", "LinkID", ",", "err", "error", ")", "{", "lm", ":=", "firstLinkMap", "\n\n", "if", "leafID", ".", "IsTeamOrSubteam", "(", ")", "{", "// Pull in the latest link map, instead of the one from the proof object.", "tid", ":=", "leafID", ".", "AsTeamOrBust", "(", ")", "\n", "lm2", ",", "ok", ":=", "proofSet", ".", "teamLinkMaps", "[", "tid", "]", "\n", "if", "ok", "{", "lm", "=", "lm2", "\n", "}", "\n", "}", "\n", "if", "lm", "==", "nil", "{", "return", "linkID", ",", "NewProofError", "(", "p", ",", "\"", "\"", ")", "\n", "}", "\n\n", "linkID", ",", "ok", ":=", "lm", "[", "seqno", "]", "\n", "if", "ok", "{", "return", "linkID", ",", "nil", "\n", "}", "\n\n", "// We loaded this user originally to get a sigchain as fresh as a certain key provisioning.", "// In this scenario, we might need a fresher version, so force a poll all the way through", "// the server, and then try again. If we fail the second time, we a force repoll, then", "// we're toast.", "if", "leafID", ".", "IsUser", "(", ")", "{", "g", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "leafID", ".", "String", "(", ")", ",", "seqno", ")", "\n", "lm", ",", "err", ":=", "world", ".", "forceLinkMapRefreshForUser", "(", "ctx", ",", "leafID", ".", "AsUserOrBust", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "linkID", ",", "err", "\n", "}", "\n", "linkID", ",", "ok", "=", "lm", "[", "seqno", "]", "\n", "}", "\n\n", "if", "!", "ok", "{", "return", "linkID", ",", "NewProofError", "(", "p", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "seqno", ")", ")", "\n", "}", "\n", "return", "linkID", ",", "nil", "\n", "}" ]
// Find the LinkID for the leaf at the seqno.
[ "Find", "the", "LinkID", "for", "the", "leaf", "at", "the", "seqno", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/proofs.go#L242-L279
159,876
keybase/client
go/teams/proofs.go
check
func (p *proofSetT) check(ctx context.Context, world LoaderContext, parallel bool) (err error) { defer p.G().CTrace(ctx, "TeamLoader proofSet check", func() error { return err })() if parallel { return p.checkParallel(ctx, world) } var total int for _, v := range p.proofs { total += len(v) } var i int for _, v := range p.proofs { for _, proof := range v { p.G().Log.CDebugf(ctx, "TeamLoader proofSet check [%v / %v]", i, total) err = proof.check(ctx, p.G(), world, p) if err != nil { return err } i++ } } return nil }
go
func (p *proofSetT) check(ctx context.Context, world LoaderContext, parallel bool) (err error) { defer p.G().CTrace(ctx, "TeamLoader proofSet check", func() error { return err })() if parallel { return p.checkParallel(ctx, world) } var total int for _, v := range p.proofs { total += len(v) } var i int for _, v := range p.proofs { for _, proof := range v { p.G().Log.CDebugf(ctx, "TeamLoader proofSet check [%v / %v]", i, total) err = proof.check(ctx, p.G(), world, p) if err != nil { return err } i++ } } return nil }
[ "func", "(", "p", "*", "proofSetT", ")", "check", "(", "ctx", "context", ".", "Context", ",", "world", "LoaderContext", ",", "parallel", "bool", ")", "(", "err", "error", ")", "{", "defer", "p", ".", "G", "(", ")", ".", "CTrace", "(", "ctx", ",", "\"", "\"", ",", "func", "(", ")", "error", "{", "return", "err", "}", ")", "(", ")", "\n\n", "if", "parallel", "{", "return", "p", ".", "checkParallel", "(", "ctx", ",", "world", ")", "\n", "}", "\n\n", "var", "total", "int", "\n", "for", "_", ",", "v", ":=", "range", "p", ".", "proofs", "{", "total", "+=", "len", "(", "v", ")", "\n", "}", "\n\n", "var", "i", "int", "\n", "for", "_", ",", "v", ":=", "range", "p", ".", "proofs", "{", "for", "_", ",", "proof", ":=", "range", "v", "{", "p", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "i", ",", "total", ")", "\n", "err", "=", "proof", ".", "check", "(", "ctx", ",", "p", ".", "G", "(", ")", ",", "world", ",", "p", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "i", "++", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// check the entire proof set, failing if any one proof fails.
[ "check", "the", "entire", "proof", "set", "failing", "if", "any", "one", "proof", "fails", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/proofs.go#L286-L310
159,877
keybase/client
go/kbfs/kbfscrypto/auth_token.go
NewAuthToken
func NewAuthToken(signer Signer, tokenType string, expireIn int, submoduleName, version string, rh AuthTokenRefreshHandler) *AuthToken { clientName := fmt.Sprintf("go %s %s %s", submoduleName, libkb.GetPlatformString(), runtime.GOARCH) authToken := &AuthToken{ signer: signer, tokenType: tokenType, expireIn: expireIn, clientName: clientName, clientVersion: version, refreshHandler: rh, } return authToken }
go
func NewAuthToken(signer Signer, tokenType string, expireIn int, submoduleName, version string, rh AuthTokenRefreshHandler) *AuthToken { clientName := fmt.Sprintf("go %s %s %s", submoduleName, libkb.GetPlatformString(), runtime.GOARCH) authToken := &AuthToken{ signer: signer, tokenType: tokenType, expireIn: expireIn, clientName: clientName, clientVersion: version, refreshHandler: rh, } return authToken }
[ "func", "NewAuthToken", "(", "signer", "Signer", ",", "tokenType", "string", ",", "expireIn", "int", ",", "submoduleName", ",", "version", "string", ",", "rh", "AuthTokenRefreshHandler", ")", "*", "AuthToken", "{", "clientName", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "submoduleName", ",", "libkb", ".", "GetPlatformString", "(", ")", ",", "runtime", ".", "GOARCH", ")", "\n", "authToken", ":=", "&", "AuthToken", "{", "signer", ":", "signer", ",", "tokenType", ":", "tokenType", ",", "expireIn", ":", "expireIn", ",", "clientName", ":", "clientName", ",", "clientVersion", ":", "version", ",", "refreshHandler", ":", "rh", ",", "}", "\n", "return", "authToken", "\n", "}" ]
// NewAuthToken creates a new authentication token.
[ "NewAuthToken", "creates", "a", "new", "authentication", "token", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfscrypto/auth_token.go#L43-L56
159,878
keybase/client
go/kbfs/kbfscrypto/auth_token.go
signWithUserAndKeyInfo
func (a *AuthToken) signWithUserAndKeyInfo(ctx context.Context, challengeInfo keybase1.ChallengeInfo, uid keybase1.UID, username kbname.NormalizedUsername, key VerifyingKey) (string, error) { // create the token token := auth.NewToken(uid, username, key.KID(), a.tokenType, challengeInfo.Challenge, challengeInfo.Now, a.expireIn, a.clientName, a.clientVersion) // sign the token signature, err := a.signer.SignToString(ctx, token.Bytes()) if err != nil { return "", err } // reset the ticker refreshSeconds := a.expireIn / 2 if refreshSeconds < AuthTokenMinRefreshSeconds { refreshSeconds = AuthTokenMinRefreshSeconds } a.startTicker(refreshSeconds) return signature, nil }
go
func (a *AuthToken) signWithUserAndKeyInfo(ctx context.Context, challengeInfo keybase1.ChallengeInfo, uid keybase1.UID, username kbname.NormalizedUsername, key VerifyingKey) (string, error) { // create the token token := auth.NewToken(uid, username, key.KID(), a.tokenType, challengeInfo.Challenge, challengeInfo.Now, a.expireIn, a.clientName, a.clientVersion) // sign the token signature, err := a.signer.SignToString(ctx, token.Bytes()) if err != nil { return "", err } // reset the ticker refreshSeconds := a.expireIn / 2 if refreshSeconds < AuthTokenMinRefreshSeconds { refreshSeconds = AuthTokenMinRefreshSeconds } a.startTicker(refreshSeconds) return signature, nil }
[ "func", "(", "a", "*", "AuthToken", ")", "signWithUserAndKeyInfo", "(", "ctx", "context", ".", "Context", ",", "challengeInfo", "keybase1", ".", "ChallengeInfo", ",", "uid", "keybase1", ".", "UID", ",", "username", "kbname", ".", "NormalizedUsername", ",", "key", "VerifyingKey", ")", "(", "string", ",", "error", ")", "{", "// create the token", "token", ":=", "auth", ".", "NewToken", "(", "uid", ",", "username", ",", "key", ".", "KID", "(", ")", ",", "a", ".", "tokenType", ",", "challengeInfo", ".", "Challenge", ",", "challengeInfo", ".", "Now", ",", "a", ".", "expireIn", ",", "a", ".", "clientName", ",", "a", ".", "clientVersion", ")", "\n\n", "// sign the token", "signature", ",", "err", ":=", "a", ".", "signer", ".", "SignToString", "(", "ctx", ",", "token", ".", "Bytes", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "// reset the ticker", "refreshSeconds", ":=", "a", ".", "expireIn", "/", "2", "\n", "if", "refreshSeconds", "<", "AuthTokenMinRefreshSeconds", "{", "refreshSeconds", "=", "AuthTokenMinRefreshSeconds", "\n", "}", "\n", "a", ".", "startTicker", "(", "refreshSeconds", ")", "\n\n", "return", "signature", ",", "nil", "\n", "}" ]
// Sign is called to create a new signed authentication token.
[ "Sign", "is", "called", "to", "create", "a", "new", "signed", "authentication", "token", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfscrypto/auth_token.go#L59-L81
159,879
keybase/client
go/kbfs/kbfscrypto/auth_token.go
SignUserless
func (a *AuthToken) SignUserless( ctx context.Context, key VerifyingKey) ( string, error) { // Pass in a reserved, meaningless UID. return a.signWithUserAndKeyInfo(ctx, keybase1.ChallengeInfo{Now: time.Now().Unix()}, keybase1.PublicUID, "", key) }
go
func (a *AuthToken) SignUserless( ctx context.Context, key VerifyingKey) ( string, error) { // Pass in a reserved, meaningless UID. return a.signWithUserAndKeyInfo(ctx, keybase1.ChallengeInfo{Now: time.Now().Unix()}, keybase1.PublicUID, "", key) }
[ "func", "(", "a", "*", "AuthToken", ")", "SignUserless", "(", "ctx", "context", ".", "Context", ",", "key", "VerifyingKey", ")", "(", "string", ",", "error", ")", "{", "// Pass in a reserved, meaningless UID.", "return", "a", ".", "signWithUserAndKeyInfo", "(", "ctx", ",", "keybase1", ".", "ChallengeInfo", "{", "Now", ":", "time", ".", "Now", "(", ")", ".", "Unix", "(", ")", "}", ",", "keybase1", ".", "PublicUID", ",", "\"", "\"", ",", "key", ")", "\n", "}" ]
// SignUserless signs the token without a username, UID, or challenge. // This is useful for server-to-server communication where identity is // established using only the KID. Assume the client and server // clocks are roughly synchronized.
[ "SignUserless", "signs", "the", "token", "without", "a", "username", "UID", "or", "challenge", ".", "This", "is", "useful", "for", "server", "-", "to", "-", "server", "communication", "where", "identity", "is", "established", "using", "only", "the", "KID", ".", "Assume", "the", "client", "and", "server", "clocks", "are", "roughly", "synchronized", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfscrypto/auth_token.go#L103-L110
159,880
keybase/client
go/kbfs/kbfscrypto/auth_token.go
stopTicker
func (a *AuthToken) stopTicker() { a.tickerMu.Lock() defer a.tickerMu.Unlock() if a.tickerCancel != nil { a.tickerCancel() a.tickerCancel = nil } }
go
func (a *AuthToken) stopTicker() { a.tickerMu.Lock() defer a.tickerMu.Unlock() if a.tickerCancel != nil { a.tickerCancel() a.tickerCancel = nil } }
[ "func", "(", "a", "*", "AuthToken", ")", "stopTicker", "(", ")", "{", "a", ".", "tickerMu", ".", "Lock", "(", ")", "\n", "defer", "a", ".", "tickerMu", ".", "Unlock", "(", ")", "\n\n", "if", "a", ".", "tickerCancel", "!=", "nil", "{", "a", ".", "tickerCancel", "(", ")", "\n", "a", ".", "tickerCancel", "=", "nil", "\n", "}", "\n", "}" ]
// Helper to stop the refresh ticker.
[ "Helper", "to", "stop", "the", "refresh", "ticker", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfscrypto/auth_token.go#L143-L151
159,881
keybase/client
go/logger/rpc_adapter_depthadder.go
CloneWithAddedDepth
func (l LogOutputWithDepthAdder) CloneWithAddedDepth(depth int) rpc.LogOutputWithDepthAdder { return LogOutputWithDepthAdder{l.Logger.CloneWithAddedDepth(depth)} }
go
func (l LogOutputWithDepthAdder) CloneWithAddedDepth(depth int) rpc.LogOutputWithDepthAdder { return LogOutputWithDepthAdder{l.Logger.CloneWithAddedDepth(depth)} }
[ "func", "(", "l", "LogOutputWithDepthAdder", ")", "CloneWithAddedDepth", "(", "depth", "int", ")", "rpc", ".", "LogOutputWithDepthAdder", "{", "return", "LogOutputWithDepthAdder", "{", "l", ".", "Logger", ".", "CloneWithAddedDepth", "(", "depth", ")", "}", "\n", "}" ]
// CloneWithAddedDepth implements the rpc.LogOutput interface.
[ "CloneWithAddedDepth", "implements", "the", "rpc", ".", "LogOutput", "interface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/logger/rpc_adapter_depthadder.go#L12-L14
159,882
keybase/client
go/kbfs/libkbfs/root_metadata.go
DumpPrivateMetadata
func DumpPrivateMetadata( codec kbfscodec.Codec, serializedPMDLength int, pmd PrivateMetadata) (string, error) { s := fmt.Sprintf("Size: %d bytes\n", serializedPMDLength) eq, err := kbfscodec.Equal(codec, pmd, PrivateMetadata{}) if err != nil { return "", err } if eq { s += "<Undecryptable>\n" } else { c := kbfsmd.DumpConfig() // Hardcode the indent level, which depends on the // position of the Ops list. indent := strings.Repeat(c.Indent, 4) var pmdCopy PrivateMetadata kbfscodec.Update(codec, &pmdCopy, pmd) ops := pmdCopy.Changes.Ops for i, op := range ops { ops[i] = verboseOp{op, indent} } s += c.Sdump(pmdCopy) } return s, nil }
go
func DumpPrivateMetadata( codec kbfscodec.Codec, serializedPMDLength int, pmd PrivateMetadata) (string, error) { s := fmt.Sprintf("Size: %d bytes\n", serializedPMDLength) eq, err := kbfscodec.Equal(codec, pmd, PrivateMetadata{}) if err != nil { return "", err } if eq { s += "<Undecryptable>\n" } else { c := kbfsmd.DumpConfig() // Hardcode the indent level, which depends on the // position of the Ops list. indent := strings.Repeat(c.Indent, 4) var pmdCopy PrivateMetadata kbfscodec.Update(codec, &pmdCopy, pmd) ops := pmdCopy.Changes.Ops for i, op := range ops { ops[i] = verboseOp{op, indent} } s += c.Sdump(pmdCopy) } return s, nil }
[ "func", "DumpPrivateMetadata", "(", "codec", "kbfscodec", ".", "Codec", ",", "serializedPMDLength", "int", ",", "pmd", "PrivateMetadata", ")", "(", "string", ",", "error", ")", "{", "s", ":=", "fmt", ".", "Sprintf", "(", "\"", "\\n", "\"", ",", "serializedPMDLength", ")", "\n\n", "eq", ",", "err", ":=", "kbfscodec", ".", "Equal", "(", "codec", ",", "pmd", ",", "PrivateMetadata", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "if", "eq", "{", "s", "+=", "\"", "\\n", "\"", "\n", "}", "else", "{", "c", ":=", "kbfsmd", ".", "DumpConfig", "(", ")", "\n", "// Hardcode the indent level, which depends on the", "// position of the Ops list.", "indent", ":=", "strings", ".", "Repeat", "(", "c", ".", "Indent", ",", "4", ")", "\n\n", "var", "pmdCopy", "PrivateMetadata", "\n", "kbfscodec", ".", "Update", "(", "codec", ",", "&", "pmdCopy", ",", "pmd", ")", "\n", "ops", ":=", "pmdCopy", ".", "Changes", ".", "Ops", "\n", "for", "i", ",", "op", ":=", "range", "ops", "{", "ops", "[", "i", "]", "=", "verboseOp", "{", "op", ",", "indent", "}", "\n", "}", "\n\n", "s", "+=", "c", ".", "Sdump", "(", "pmdCopy", ")", "\n", "}", "\n", "return", "s", ",", "nil", "\n", "}" ]
// DumpPrivateMetadata returns a detailed dump of the given // PrivateMetadata's contents.
[ "DumpPrivateMetadata", "returns", "a", "detailed", "dump", "of", "the", "given", "PrivateMetadata", "s", "contents", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L63-L90
159,883
keybase/client
go/kbfs/libkbfs/root_metadata.go
makeRootMetadata
func makeRootMetadata(bareMd kbfsmd.MutableRootMetadata, extra kbfsmd.ExtraMetadata, handle *tlfhandle.Handle) *RootMetadata { if bareMd == nil { panic("nil kbfsmd.MutableRootMetadata") } // extra can be nil. if handle == nil { panic("nil handle") } return &RootMetadata{ bareMd: bareMd, extra: extra, tlfHandle: handle, } }
go
func makeRootMetadata(bareMd kbfsmd.MutableRootMetadata, extra kbfsmd.ExtraMetadata, handle *tlfhandle.Handle) *RootMetadata { if bareMd == nil { panic("nil kbfsmd.MutableRootMetadata") } // extra can be nil. if handle == nil { panic("nil handle") } return &RootMetadata{ bareMd: bareMd, extra: extra, tlfHandle: handle, } }
[ "func", "makeRootMetadata", "(", "bareMd", "kbfsmd", ".", "MutableRootMetadata", ",", "extra", "kbfsmd", ".", "ExtraMetadata", ",", "handle", "*", "tlfhandle", ".", "Handle", ")", "*", "RootMetadata", "{", "if", "bareMd", "==", "nil", "{", "panic", "(", "\"", "\"", ")", "\n", "}", "\n", "// extra can be nil.", "if", "handle", "==", "nil", "{", "panic", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "&", "RootMetadata", "{", "bareMd", ":", "bareMd", ",", "extra", ":", "extra", ",", "tlfHandle", ":", "handle", ",", "}", "\n", "}" ]
// makeRootMetadata makes a RootMetadata object from the given // parameters.
[ "makeRootMetadata", "makes", "a", "RootMetadata", "object", "from", "the", "given", "parameters", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L133-L147
159,884
keybase/client
go/kbfs/libkbfs/root_metadata.go
IsReadable
func (md *RootMetadata) IsReadable() bool { return md.TlfID().Type() == tlf.Public || md.data.Dir.IsInitialized() }
go
func (md *RootMetadata) IsReadable() bool { return md.TlfID().Type() == tlf.Public || md.data.Dir.IsInitialized() }
[ "func", "(", "md", "*", "RootMetadata", ")", "IsReadable", "(", ")", "bool", "{", "return", "md", ".", "TlfID", "(", ")", ".", "Type", "(", ")", "==", "tlf", ".", "Public", "||", "md", ".", "data", ".", "Dir", ".", "IsInitialized", "(", ")", "\n", "}" ]
// IsReadable returns true if the private metadata can be read.
[ "IsReadable", "returns", "true", "if", "the", "private", "metadata", "can", "be", "read", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L191-L193
159,885
keybase/client
go/kbfs/libkbfs/root_metadata.go
GetTlfHandle
func (md *RootMetadata) GetTlfHandle() *tlfhandle.Handle { if md.tlfHandle == nil { panic(fmt.Sprintf("RootMetadata %v with no handle", md)) } return md.tlfHandle }
go
func (md *RootMetadata) GetTlfHandle() *tlfhandle.Handle { if md.tlfHandle == nil { panic(fmt.Sprintf("RootMetadata %v with no handle", md)) } return md.tlfHandle }
[ "func", "(", "md", "*", "RootMetadata", ")", "GetTlfHandle", "(", ")", "*", "tlfhandle", ".", "Handle", "{", "if", "md", ".", "tlfHandle", "==", "nil", "{", "panic", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "md", ")", ")", "\n", "}", "\n\n", "return", "md", ".", "tlfHandle", "\n", "}" ]
// GetTlfHandle returns the TlfHandle for this RootMetadata.
[ "GetTlfHandle", "returns", "the", "TlfHandle", "for", "this", "RootMetadata", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L333-L339
159,886
keybase/client
go/kbfs/libkbfs/root_metadata.go
MakeBareTlfHandle
func (md *RootMetadata) MakeBareTlfHandle() (tlf.Handle, error) { if md.tlfHandle != nil { panic(errors.New("MakeBareTlfHandle called when md.tlfHandle exists")) } return md.bareMd.MakeBareTlfHandle(md.extra) }
go
func (md *RootMetadata) MakeBareTlfHandle() (tlf.Handle, error) { if md.tlfHandle != nil { panic(errors.New("MakeBareTlfHandle called when md.tlfHandle exists")) } return md.bareMd.MakeBareTlfHandle(md.extra) }
[ "func", "(", "md", "*", "RootMetadata", ")", "MakeBareTlfHandle", "(", ")", "(", "tlf", ".", "Handle", ",", "error", ")", "{", "if", "md", ".", "tlfHandle", "!=", "nil", "{", "panic", "(", "errors", ".", "New", "(", "\"", "\"", ")", ")", "\n", "}", "\n\n", "return", "md", ".", "bareMd", ".", "MakeBareTlfHandle", "(", "md", ".", "extra", ")", "\n", "}" ]
// MakeBareTlfHandle makes a BareTlfHandle for this // RootMetadata. Should be used only by servers and MDOps.
[ "MakeBareTlfHandle", "makes", "a", "BareTlfHandle", "for", "this", "RootMetadata", ".", "Should", "be", "used", "only", "by", "servers", "and", "MDOps", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L348-L354
159,887
keybase/client
go/kbfs/libkbfs/root_metadata.go
IsInitialized
func (md *RootMetadata) IsInitialized() bool { keyGen := md.LatestKeyGeneration() if md.TypeForKeying() == tlf.PublicKeying { return keyGen == kbfsmd.PublicKeyGen } // The data is only initialized once we have at least one set of keys return keyGen >= kbfsmd.FirstValidKeyGen }
go
func (md *RootMetadata) IsInitialized() bool { keyGen := md.LatestKeyGeneration() if md.TypeForKeying() == tlf.PublicKeying { return keyGen == kbfsmd.PublicKeyGen } // The data is only initialized once we have at least one set of keys return keyGen >= kbfsmd.FirstValidKeyGen }
[ "func", "(", "md", "*", "RootMetadata", ")", "IsInitialized", "(", ")", "bool", "{", "keyGen", ":=", "md", ".", "LatestKeyGeneration", "(", ")", "\n", "if", "md", ".", "TypeForKeying", "(", ")", "==", "tlf", ".", "PublicKeying", "{", "return", "keyGen", "==", "kbfsmd", ".", "PublicKeyGen", "\n", "}", "\n", "// The data is only initialized once we have at least one set of keys", "return", "keyGen", ">=", "kbfsmd", ".", "FirstValidKeyGen", "\n", "}" ]
// IsInitialized returns whether or not this RootMetadata has been initialized
[ "IsInitialized", "returns", "whether", "or", "not", "this", "RootMetadata", "has", "been", "initialized" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L357-L364
159,888
keybase/client
go/kbfs/libkbfs/root_metadata.go
AddRefBlock
func (md *RootMetadata) AddRefBlock(info data.BlockInfo) { md.AddRefBytes(uint64(info.EncodedSize)) md.AddDiskUsage(uint64(info.EncodedSize)) md.data.Changes.AddRefBlock(info.BlockPointer) }
go
func (md *RootMetadata) AddRefBlock(info data.BlockInfo) { md.AddRefBytes(uint64(info.EncodedSize)) md.AddDiskUsage(uint64(info.EncodedSize)) md.data.Changes.AddRefBlock(info.BlockPointer) }
[ "func", "(", "md", "*", "RootMetadata", ")", "AddRefBlock", "(", "info", "data", ".", "BlockInfo", ")", "{", "md", ".", "AddRefBytes", "(", "uint64", "(", "info", ".", "EncodedSize", ")", ")", "\n", "md", ".", "AddDiskUsage", "(", "uint64", "(", "info", ".", "EncodedSize", ")", ")", "\n", "md", ".", "data", ".", "Changes", ".", "AddRefBlock", "(", "info", ".", "BlockPointer", ")", "\n", "}" ]
// AddRefBlock adds the newly-referenced block to the add block change list.
[ "AddRefBlock", "adds", "the", "newly", "-", "referenced", "block", "to", "the", "add", "block", "change", "list", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L367-L371
159,889
keybase/client
go/kbfs/libkbfs/root_metadata.go
AddUnrefBlock
func (md *RootMetadata) AddUnrefBlock(info data.BlockInfo) { if info.EncodedSize > 0 { md.AddUnrefBytes(uint64(info.EncodedSize)) md.SetDiskUsage(md.DiskUsage() - uint64(info.EncodedSize)) md.data.Changes.AddUnrefBlock(info.BlockPointer) } }
go
func (md *RootMetadata) AddUnrefBlock(info data.BlockInfo) { if info.EncodedSize > 0 { md.AddUnrefBytes(uint64(info.EncodedSize)) md.SetDiskUsage(md.DiskUsage() - uint64(info.EncodedSize)) md.data.Changes.AddUnrefBlock(info.BlockPointer) } }
[ "func", "(", "md", "*", "RootMetadata", ")", "AddUnrefBlock", "(", "info", "data", ".", "BlockInfo", ")", "{", "if", "info", ".", "EncodedSize", ">", "0", "{", "md", ".", "AddUnrefBytes", "(", "uint64", "(", "info", ".", "EncodedSize", ")", ")", "\n", "md", ".", "SetDiskUsage", "(", "md", ".", "DiskUsage", "(", ")", "-", "uint64", "(", "info", ".", "EncodedSize", ")", ")", "\n", "md", ".", "data", ".", "Changes", ".", "AddUnrefBlock", "(", "info", ".", "BlockPointer", ")", "\n", "}", "\n", "}" ]
// AddUnrefBlock adds the newly-unreferenced block to the add block change list.
[ "AddUnrefBlock", "adds", "the", "newly", "-", "unreferenced", "block", "to", "the", "add", "block", "change", "list", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L374-L380
159,890
keybase/client
go/kbfs/libkbfs/root_metadata.go
AddUpdate
func (md *RootMetadata) AddUpdate(oldInfo data.BlockInfo, newInfo data.BlockInfo) { md.AddUnrefBytes(uint64(oldInfo.EncodedSize)) md.AddRefBytes(uint64(newInfo.EncodedSize)) md.AddDiskUsage(uint64(newInfo.EncodedSize)) md.SetDiskUsage(md.DiskUsage() - uint64(oldInfo.EncodedSize)) md.data.Changes.AddUpdate(oldInfo.BlockPointer, newInfo.BlockPointer) }
go
func (md *RootMetadata) AddUpdate(oldInfo data.BlockInfo, newInfo data.BlockInfo) { md.AddUnrefBytes(uint64(oldInfo.EncodedSize)) md.AddRefBytes(uint64(newInfo.EncodedSize)) md.AddDiskUsage(uint64(newInfo.EncodedSize)) md.SetDiskUsage(md.DiskUsage() - uint64(oldInfo.EncodedSize)) md.data.Changes.AddUpdate(oldInfo.BlockPointer, newInfo.BlockPointer) }
[ "func", "(", "md", "*", "RootMetadata", ")", "AddUpdate", "(", "oldInfo", "data", ".", "BlockInfo", ",", "newInfo", "data", ".", "BlockInfo", ")", "{", "md", ".", "AddUnrefBytes", "(", "uint64", "(", "oldInfo", ".", "EncodedSize", ")", ")", "\n", "md", ".", "AddRefBytes", "(", "uint64", "(", "newInfo", ".", "EncodedSize", ")", ")", "\n", "md", ".", "AddDiskUsage", "(", "uint64", "(", "newInfo", ".", "EncodedSize", ")", ")", "\n", "md", ".", "SetDiskUsage", "(", "md", ".", "DiskUsage", "(", ")", "-", "uint64", "(", "oldInfo", ".", "EncodedSize", ")", ")", "\n", "md", ".", "data", ".", "Changes", ".", "AddUpdate", "(", "oldInfo", ".", "BlockPointer", ",", "newInfo", ".", "BlockPointer", ")", "\n", "}" ]
// AddUpdate adds the newly-updated block to the add block change list.
[ "AddUpdate", "adds", "the", "newly", "-", "updated", "block", "to", "the", "add", "block", "change", "list", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L383-L389
159,891
keybase/client
go/kbfs/libkbfs/root_metadata.go
AddOp
func (md *RootMetadata) AddOp(o op) { md.data.Changes.AddOp(o) }
go
func (md *RootMetadata) AddOp(o op) { md.data.Changes.AddOp(o) }
[ "func", "(", "md", "*", "RootMetadata", ")", "AddOp", "(", "o", "op", ")", "{", "md", ".", "data", ".", "Changes", ".", "AddOp", "(", "o", ")", "\n", "}" ]
// AddOp starts a new operation for this MD update. Subsequent // AddRefBlock, AddUnrefBlock, and AddUpdate calls will be applied to // this operation.
[ "AddOp", "starts", "a", "new", "operation", "for", "this", "MD", "update", ".", "Subsequent", "AddRefBlock", "AddUnrefBlock", "and", "AddUpdate", "calls", "will", "be", "applied", "to", "this", "operation", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L394-L396
159,892
keybase/client
go/kbfs/libkbfs/root_metadata.go
ClearBlockChanges
func (md *RootMetadata) ClearBlockChanges() { md.SetRefBytes(0) md.SetUnrefBytes(0) md.SetMDRefBytes(0) md.data.Changes.sizeEstimate = 0 md.data.Changes.Info = data.BlockInfo{} md.data.Changes.Ops = nil }
go
func (md *RootMetadata) ClearBlockChanges() { md.SetRefBytes(0) md.SetUnrefBytes(0) md.SetMDRefBytes(0) md.data.Changes.sizeEstimate = 0 md.data.Changes.Info = data.BlockInfo{} md.data.Changes.Ops = nil }
[ "func", "(", "md", "*", "RootMetadata", ")", "ClearBlockChanges", "(", ")", "{", "md", ".", "SetRefBytes", "(", "0", ")", "\n", "md", ".", "SetUnrefBytes", "(", "0", ")", "\n", "md", ".", "SetMDRefBytes", "(", "0", ")", "\n", "md", ".", "data", ".", "Changes", ".", "sizeEstimate", "=", "0", "\n", "md", ".", "data", ".", "Changes", ".", "Info", "=", "data", ".", "BlockInfo", "{", "}", "\n", "md", ".", "data", ".", "Changes", ".", "Ops", "=", "nil", "\n", "}" ]
// ClearBlockChanges resets the block change lists to empty for this // RootMetadata.
[ "ClearBlockChanges", "resets", "the", "block", "change", "lists", "to", "empty", "for", "this", "RootMetadata", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L400-L407
159,893
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetLastGCRevision
func (md *RootMetadata) SetLastGCRevision(rev kbfsmd.Revision) { md.data.LastGCRevision = rev }
go
func (md *RootMetadata) SetLastGCRevision(rev kbfsmd.Revision) { md.data.LastGCRevision = rev }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetLastGCRevision", "(", "rev", "kbfsmd", ".", "Revision", ")", "{", "md", ".", "data", ".", "LastGCRevision", "=", "rev", "\n", "}" ]
// SetLastGCRevision sets the last revision up to and including which // garbage collection was performed on this TLF.
[ "SetLastGCRevision", "sets", "the", "last", "revision", "up", "to", "and", "including", "which", "garbage", "collection", "was", "performed", "on", "this", "TLF", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L411-L413
159,894
keybase/client
go/kbfs/libkbfs/root_metadata.go
GetTLFCryptKeyParams
func (md *RootMetadata) GetTLFCryptKeyParams( keyGen kbfsmd.KeyGen, user keybase1.UID, key kbfscrypto.CryptPublicKey) ( kbfscrypto.TLFEphemeralPublicKey, kbfscrypto.EncryptedTLFCryptKeyClientHalf, kbfscrypto.TLFCryptKeyServerHalfID, bool, error) { return md.bareMd.GetTLFCryptKeyParams(keyGen, user, key, md.extra) }
go
func (md *RootMetadata) GetTLFCryptKeyParams( keyGen kbfsmd.KeyGen, user keybase1.UID, key kbfscrypto.CryptPublicKey) ( kbfscrypto.TLFEphemeralPublicKey, kbfscrypto.EncryptedTLFCryptKeyClientHalf, kbfscrypto.TLFCryptKeyServerHalfID, bool, error) { return md.bareMd.GetTLFCryptKeyParams(keyGen, user, key, md.extra) }
[ "func", "(", "md", "*", "RootMetadata", ")", "GetTLFCryptKeyParams", "(", "keyGen", "kbfsmd", ".", "KeyGen", ",", "user", "keybase1", ".", "UID", ",", "key", "kbfscrypto", ".", "CryptPublicKey", ")", "(", "kbfscrypto", ".", "TLFEphemeralPublicKey", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", ",", "bool", ",", "error", ")", "{", "return", "md", ".", "bareMd", ".", "GetTLFCryptKeyParams", "(", "keyGen", ",", "user", ",", "key", ",", "md", ".", "extra", ")", "\n", "}" ]
// GetTLFCryptKeyParams wraps the respective method of the underlying BareRootMetadata for convenience.
[ "GetTLFCryptKeyParams", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L559-L564
159,895
keybase/client
go/kbfs/libkbfs/root_metadata.go
KeyGenerationsToUpdate
func (md *RootMetadata) KeyGenerationsToUpdate() (kbfsmd.KeyGen, kbfsmd.KeyGen) { return md.bareMd.KeyGenerationsToUpdate() }
go
func (md *RootMetadata) KeyGenerationsToUpdate() (kbfsmd.KeyGen, kbfsmd.KeyGen) { return md.bareMd.KeyGenerationsToUpdate() }
[ "func", "(", "md", "*", "RootMetadata", ")", "KeyGenerationsToUpdate", "(", ")", "(", "kbfsmd", ".", "KeyGen", ",", "kbfsmd", ".", "KeyGen", ")", "{", "return", "md", ".", "bareMd", ".", "KeyGenerationsToUpdate", "(", ")", "\n", "}" ]
// KeyGenerationsToUpdate wraps the respective method of the underlying BareRootMetadata for convenience.
[ "KeyGenerationsToUpdate", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L567-L569
159,896
keybase/client
go/kbfs/libkbfs/root_metadata.go
TlfID
func (md *RootMetadata) TlfID() tlf.ID { if md == nil || md.bareMd == nil { return tlf.NullID } return md.bareMd.TlfID() }
go
func (md *RootMetadata) TlfID() tlf.ID { if md == nil || md.bareMd == nil { return tlf.NullID } return md.bareMd.TlfID() }
[ "func", "(", "md", "*", "RootMetadata", ")", "TlfID", "(", ")", "tlf", ".", "ID", "{", "if", "md", "==", "nil", "||", "md", ".", "bareMd", "==", "nil", "{", "return", "tlf", ".", "NullID", "\n", "}", "\n", "return", "md", ".", "bareMd", ".", "TlfID", "(", ")", "\n", "}" ]
// TlfID wraps the respective method of the underlying BareRootMetadata for convenience.
[ "TlfID", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L577-L582
159,897
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetBranchID
func (md *RootMetadata) SetBranchID(bid kbfsmd.BranchID) { md.bareMd.SetBranchID(bid) }
go
func (md *RootMetadata) SetBranchID(bid kbfsmd.BranchID) { md.bareMd.SetBranchID(bid) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetBranchID", "(", "bid", "kbfsmd", ".", "BranchID", ")", "{", "md", ".", "bareMd", ".", "SetBranchID", "(", "bid", ")", "\n", "}" ]
// SetBranchID wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetBranchID", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L723-L725
159,898
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetPrevRoot
func (md *RootMetadata) SetPrevRoot(mdID kbfsmd.ID) { md.bareMd.SetPrevRoot(mdID) }
go
func (md *RootMetadata) SetPrevRoot(mdID kbfsmd.ID) { md.bareMd.SetPrevRoot(mdID) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetPrevRoot", "(", "mdID", "kbfsmd", ".", "ID", ")", "{", "md", ".", "bareMd", ".", "SetPrevRoot", "(", "mdID", ")", "\n", "}" ]
// SetPrevRoot wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetPrevRoot", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L728-L730
159,899
keybase/client
go/kbfs/libkbfs/root_metadata.go
GetSerializedWriterMetadata
func (md *RootMetadata) GetSerializedWriterMetadata( codec kbfscodec.Codec) ([]byte, error) { return md.bareMd.GetSerializedWriterMetadata(codec) }
go
func (md *RootMetadata) GetSerializedWriterMetadata( codec kbfscodec.Codec) ([]byte, error) { return md.bareMd.GetSerializedWriterMetadata(codec) }
[ "func", "(", "md", "*", "RootMetadata", ")", "GetSerializedWriterMetadata", "(", "codec", "kbfscodec", ".", "Codec", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "return", "md", ".", "bareMd", ".", "GetSerializedWriterMetadata", "(", "codec", ")", "\n", "}" ]
// GetSerializedWriterMetadata wraps the respective method of the underlying BareRootMetadata for convenience.
[ "GetSerializedWriterMetadata", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L738-L741