id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
159,900 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetRevision | func (md *RootMetadata) SetRevision(revision kbfsmd.Revision) {
md.bareMd.SetRevision(revision)
} | go | func (md *RootMetadata) SetRevision(revision kbfsmd.Revision) {
md.bareMd.SetRevision(revision)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetRevision",
"(",
"revision",
"kbfsmd",
".",
"Revision",
")",
"{",
"md",
".",
"bareMd",
".",
"SetRevision",
"(",
"revision",
")",
"\n",
"}"
] | // SetRevision wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetRevision",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L769-L771 |
159,901 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetWriters | func (md *RootMetadata) SetWriters(writers []keybase1.UserOrTeamID) {
md.bareMd.SetWriters(writers)
} | go | func (md *RootMetadata) SetWriters(writers []keybase1.UserOrTeamID) {
md.bareMd.SetWriters(writers)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetWriters",
"(",
"writers",
")",
"\n",
"}"
] | // SetWriters wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetWriters",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L774-L776 |
159,902 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetUnresolvedReaders | func (md *RootMetadata) SetUnresolvedReaders(readers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedReaders(readers)
} | go | func (md *RootMetadata) SetUnresolvedReaders(readers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedReaders(readers)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetUnresolvedReaders",
"(",
"readers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
")",
"{",
"md",
".",
"bareMd",
".",
"SetUnresolvedReaders",
"(",
"readers",
")",
"\n",
"}"
] | // SetUnresolvedReaders wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetUnresolvedReaders",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L779-L781 |
159,903 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetUnresolvedWriters | func (md *RootMetadata) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedWriters(writers)
} | go | func (md *RootMetadata) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedWriters(writers)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetUnresolvedWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
")",
"{",
"md",
".",
"bareMd",
".",
"SetUnresolvedWriters",
"(",
"writers",
")",
"\n",
"}"
] | // SetUnresolvedWriters wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetUnresolvedWriters",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L784-L786 |
159,904 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetConflictInfo | func (md *RootMetadata) SetConflictInfo(ci *tlf.HandleExtension) {
md.bareMd.SetConflictInfo(ci)
} | go | func (md *RootMetadata) SetConflictInfo(ci *tlf.HandleExtension) {
md.bareMd.SetConflictInfo(ci)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetConflictInfo",
"(",
"ci",
"*",
"tlf",
".",
"HandleExtension",
")",
"{",
"md",
".",
"bareMd",
".",
"SetConflictInfo",
"(",
"ci",
")",
"\n",
"}"
] | // SetConflictInfo wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetConflictInfo",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L789-L791 |
159,905 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetFinalizedInfo | func (md *RootMetadata) SetFinalizedInfo(fi *tlf.HandleExtension) {
md.bareMd.SetFinalizedInfo(fi)
} | go | func (md *RootMetadata) SetFinalizedInfo(fi *tlf.HandleExtension) {
md.bareMd.SetFinalizedInfo(fi)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetFinalizedInfo",
"(",
"fi",
"*",
"tlf",
".",
"HandleExtension",
")",
"{",
"md",
".",
"bareMd",
".",
"SetFinalizedInfo",
"(",
"fi",
")",
"\n",
"}"
] | // SetFinalizedInfo wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetFinalizedInfo",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L794-L796 |
159,906 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetLastModifyingWriter | func (md *RootMetadata) SetLastModifyingWriter(user keybase1.UID) {
md.bareMd.SetLastModifyingWriter(user)
} | go | func (md *RootMetadata) SetLastModifyingWriter(user keybase1.UID) {
md.bareMd.SetLastModifyingWriter(user)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetLastModifyingWriter",
"(",
"user",
"keybase1",
".",
"UID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetLastModifyingWriter",
"(",
"user",
")",
"\n",
"}"
] | // SetLastModifyingWriter wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetLastModifyingWriter",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L799-L801 |
159,907 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetLastModifyingUser | func (md *RootMetadata) SetLastModifyingUser(user keybase1.UID) {
md.bareMd.SetLastModifyingUser(user)
} | go | func (md *RootMetadata) SetLastModifyingUser(user keybase1.UID) {
md.bareMd.SetLastModifyingUser(user)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetLastModifyingUser",
"(",
"user",
"keybase1",
".",
"UID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetLastModifyingUser",
"(",
"user",
")",
"\n",
"}"
] | // SetLastModifyingUser wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetLastModifyingUser",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L804-L806 |
159,908 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetTlfID | func (md *RootMetadata) SetTlfID(tlf tlf.ID) {
md.bareMd.SetTlfID(tlf)
} | go | func (md *RootMetadata) SetTlfID(tlf tlf.ID) {
md.bareMd.SetTlfID(tlf)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetTlfID",
"(",
"tlf",
"tlf",
".",
"ID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetTlfID",
"(",
"tlf",
")",
"\n",
"}"
] | // SetTlfID wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetTlfID",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L809-L811 |
159,909 | keybase/client | go/kbfs/libkbfs/root_metadata.go | HasKeyForUser | func (md *RootMetadata) HasKeyForUser(user keybase1.UID) (
bool, error) {
writers, readers, err := md.bareMd.GetUserDevicePublicKeys(md.extra)
if err != nil {
return false, err
}
return len(writers[user]) > 0 || len(readers[user]) > 0, nil
} | go | func (md *RootMetadata) HasKeyForUser(user keybase1.UID) (
bool, error) {
writers, readers, err := md.bareMd.GetUserDevicePublicKeys(md.extra)
if err != nil {
return false, err
}
return len(writers[user]) > 0 || len(readers[user]) > 0, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"HasKeyForUser",
"(",
"user",
"keybase1",
".",
"UID",
")",
"(",
"bool",
",",
"error",
")",
"{",
"writers",
",",
"readers",
",",
"err",
":=",
"md",
".",
"bareMd",
".",
"GetUserDevicePublicKeys",
"(",
"md",
".",
"extra",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"return",
"len",
"(",
"writers",
"[",
"user",
"]",
")",
">",
"0",
"||",
"len",
"(",
"readers",
"[",
"user",
"]",
")",
">",
"0",
",",
"nil",
"\n",
"}"
] | // HasKeyForUser wraps the respective method of the underlying BareRootMetadata for convenience. | [
"HasKeyForUser",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L814-L821 |
159,910 | keybase/client | go/kbfs/libkbfs/root_metadata.go | fakeInitialRekey | func (md *RootMetadata) fakeInitialRekey() {
bh, err := md.tlfHandle.ToBareHandle()
if err != nil {
panic(err)
}
md.extra = kbfsmd.FakeInitialRekey(md.bareMd, bh, kbfscrypto.TLFPublicKey{})
} | go | func (md *RootMetadata) fakeInitialRekey() {
bh, err := md.tlfHandle.ToBareHandle()
if err != nil {
panic(err)
}
md.extra = kbfsmd.FakeInitialRekey(md.bareMd, bh, kbfscrypto.TLFPublicKey{})
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"fakeInitialRekey",
"(",
")",
"{",
"bh",
",",
"err",
":=",
"md",
".",
"tlfHandle",
".",
"ToBareHandle",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"err",
")",
"\n",
"}",
"\n",
"md",
".",
"extra",
"=",
"kbfsmd",
".",
"FakeInitialRekey",
"(",
"md",
".",
"bareMd",
",",
"bh",
",",
"kbfscrypto",
".",
"TLFPublicKey",
"{",
"}",
")",
"\n",
"}"
] | // fakeInitialRekey wraps the FakeInitialRekey test function for
// convenience. | [
"fakeInitialRekey",
"wraps",
"the",
"FakeInitialRekey",
"test",
"function",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L825-L831 |
159,911 | keybase/client | go/kbfs/libkbfs/root_metadata.go | AddKeyGeneration | func (md *RootMetadata) AddKeyGeneration(codec kbfscodec.Codec,
wKeys, rKeys kbfsmd.UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
pubKey kbfscrypto.TLFPublicKey,
privKey kbfscrypto.TLFPrivateKey,
currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) (
serverHalves kbfsmd.UserDeviceKeyServerHalves, err error) {
nextExtra, serverHalves, err := md.bareMd.AddKeyGeneration(
codec, md.extra, wKeys, rKeys, ePubKey, ePrivKey,
pubKey, currCryptKey, nextCryptKey)
if err != nil {
return nil, err
}
md.extra = nextExtra
md.data.TLFPrivateKey = privKey
return serverHalves, nil
} | go | func (md *RootMetadata) AddKeyGeneration(codec kbfscodec.Codec,
wKeys, rKeys kbfsmd.UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
pubKey kbfscrypto.TLFPublicKey,
privKey kbfscrypto.TLFPrivateKey,
currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) (
serverHalves kbfsmd.UserDeviceKeyServerHalves, err error) {
nextExtra, serverHalves, err := md.bareMd.AddKeyGeneration(
codec, md.extra, wKeys, rKeys, ePubKey, ePrivKey,
pubKey, currCryptKey, nextCryptKey)
if err != nil {
return nil, err
}
md.extra = nextExtra
md.data.TLFPrivateKey = privKey
return serverHalves, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"AddKeyGeneration",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"wKeys",
",",
"rKeys",
"kbfsmd",
".",
"UserDevicePublicKeys",
",",
"ePubKey",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"ePrivKey",
"kbfscrypto",
".",
"TLFEphemeralPrivateKey",
",",
"pubKey",
"kbfscrypto",
".",
"TLFPublicKey",
",",
"privKey",
"kbfscrypto",
".",
"TLFPrivateKey",
",",
"currCryptKey",
",",
"nextCryptKey",
"kbfscrypto",
".",
"TLFCryptKey",
")",
"(",
"serverHalves",
"kbfsmd",
".",
"UserDeviceKeyServerHalves",
",",
"err",
"error",
")",
"{",
"nextExtra",
",",
"serverHalves",
",",
"err",
":=",
"md",
".",
"bareMd",
".",
"AddKeyGeneration",
"(",
"codec",
",",
"md",
".",
"extra",
",",
"wKeys",
",",
"rKeys",
",",
"ePubKey",
",",
"ePrivKey",
",",
"pubKey",
",",
"currCryptKey",
",",
"nextCryptKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"md",
".",
"extra",
"=",
"nextExtra",
"\n",
"md",
".",
"data",
".",
"TLFPrivateKey",
"=",
"privKey",
"\n",
"return",
"serverHalves",
",",
"nil",
"\n",
"}"
] | // AddKeyGeneration adds a new key generation to this revision of metadata. | [
"AddKeyGeneration",
"adds",
"a",
"new",
"key",
"generation",
"to",
"this",
"revision",
"of",
"metadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L839-L856 |
159,912 | keybase/client | go/kbfs/libkbfs/root_metadata.go | GetHistoricTLFCryptKey | func (md *RootMetadata) GetHistoricTLFCryptKey(
codec kbfscodec.Codec, keyGen kbfsmd.KeyGen,
currentKey kbfscrypto.TLFCryptKey) (kbfscrypto.TLFCryptKey, error) {
return md.bareMd.GetHistoricTLFCryptKey(
codec, keyGen, currentKey, md.extra)
} | go | func (md *RootMetadata) GetHistoricTLFCryptKey(
codec kbfscodec.Codec, keyGen kbfsmd.KeyGen,
currentKey kbfscrypto.TLFCryptKey) (kbfscrypto.TLFCryptKey, error) {
return md.bareMd.GetHistoricTLFCryptKey(
codec, keyGen, currentKey, md.extra)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"GetHistoricTLFCryptKey",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"keyGen",
"kbfsmd",
".",
"KeyGen",
",",
"currentKey",
"kbfscrypto",
".",
"TLFCryptKey",
")",
"(",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"error",
")",
"{",
"return",
"md",
".",
"bareMd",
".",
"GetHistoricTLFCryptKey",
"(",
"codec",
",",
"keyGen",
",",
"currentKey",
",",
"md",
".",
"extra",
")",
"\n",
"}"
] | // GetHistoricTLFCryptKey implements the KeyMetadata interface for RootMetadata. | [
"GetHistoricTLFCryptKey",
"implements",
"the",
"KeyMetadata",
"interface",
"for",
"RootMetadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L908-L913 |
159,913 | keybase/client | go/kbfs/libkbfs/root_metadata.go | IsWriter | func (md *RootMetadata) IsWriter(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID,
verifyingKey kbfscrypto.VerifyingKey) (bool, error) {
h := md.GetTlfHandle()
return IsWriterFromHandle(ctx, h, checker, osg, uid, verifyingKey)
} | go | func (md *RootMetadata) IsWriter(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID,
verifyingKey kbfscrypto.VerifyingKey) (bool, error) {
h := md.GetTlfHandle()
return IsWriterFromHandle(ctx, h, checker, osg, uid, verifyingKey)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"IsWriter",
"(",
"ctx",
"context",
".",
"Context",
",",
"checker",
"kbfsmd",
".",
"TeamMembershipChecker",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"uid",
"keybase1",
".",
"UID",
",",
"verifyingKey",
"kbfscrypto",
".",
"VerifyingKey",
")",
"(",
"bool",
",",
"error",
")",
"{",
"h",
":=",
"md",
".",
"GetTlfHandle",
"(",
")",
"\n",
"return",
"IsWriterFromHandle",
"(",
"ctx",
",",
"h",
",",
"checker",
",",
"osg",
",",
"uid",
",",
"verifyingKey",
")",
"\n",
"}"
] | // IsWriter checks that the given user is a valid writer of the TLF
// right now. Implements the KeyMetadata interface for RootMetadata. | [
"IsWriter",
"checks",
"that",
"the",
"given",
"user",
"is",
"a",
"valid",
"writer",
"of",
"the",
"TLF",
"right",
"now",
".",
"Implements",
"the",
"KeyMetadata",
"interface",
"for",
"RootMetadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L917-L923 |
159,914 | keybase/client | go/kbfs/libkbfs/root_metadata.go | IsReader | func (md *RootMetadata) IsReader(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID) (bool, error) {
h := md.GetTlfHandle()
return isReaderFromHandle(ctx, h, checker, osg, uid)
} | go | func (md *RootMetadata) IsReader(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID) (bool, error) {
h := md.GetTlfHandle()
return isReaderFromHandle(ctx, h, checker, osg, uid)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"IsReader",
"(",
"ctx",
"context",
".",
"Context",
",",
"checker",
"kbfsmd",
".",
"TeamMembershipChecker",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"bool",
",",
"error",
")",
"{",
"h",
":=",
"md",
".",
"GetTlfHandle",
"(",
")",
"\n",
"return",
"isReaderFromHandle",
"(",
"ctx",
",",
"h",
",",
"checker",
",",
"osg",
",",
"uid",
")",
"\n",
"}"
] | // IsReader checks that the given user is a valid reader of the TLF
// right now. | [
"IsReader",
"checks",
"that",
"the",
"given",
"user",
"is",
"a",
"valid",
"reader",
"of",
"the",
"TLF",
"right",
"now",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L927-L932 |
159,915 | keybase/client | go/kbfs/libkbfs/root_metadata.go | CheckValidSuccessor | func (md ReadOnlyRootMetadata) CheckValidSuccessor(
currID kbfsmd.ID, nextMd ReadOnlyRootMetadata) error {
return md.bareMd.CheckValidSuccessor(currID, nextMd.bareMd)
} | go | func (md ReadOnlyRootMetadata) CheckValidSuccessor(
currID kbfsmd.ID, nextMd ReadOnlyRootMetadata) error {
return md.bareMd.CheckValidSuccessor(currID, nextMd.bareMd)
} | [
"func",
"(",
"md",
"ReadOnlyRootMetadata",
")",
"CheckValidSuccessor",
"(",
"currID",
"kbfsmd",
".",
"ID",
",",
"nextMd",
"ReadOnlyRootMetadata",
")",
"error",
"{",
"return",
"md",
".",
"bareMd",
".",
"CheckValidSuccessor",
"(",
"currID",
",",
"nextMd",
".",
"bareMd",
")",
"\n",
"}"
] | // CheckValidSuccessor makes sure the given ReadOnlyRootMetadata is a
// valid successor to the current one, and returns an error otherwise. | [
"CheckValidSuccessor",
"makes",
"sure",
"the",
"given",
"ReadOnlyRootMetadata",
"is",
"a",
"valid",
"successor",
"to",
"the",
"current",
"one",
"and",
"returns",
"an",
"error",
"otherwise",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L951-L954 |
159,916 | keybase/client | go/kbfs/libkbfs/root_metadata.go | MakeImmutableRootMetadata | func MakeImmutableRootMetadata(
rmd *RootMetadata, writerVerifyingKey kbfscrypto.VerifyingKey,
mdID kbfsmd.ID, localTimestamp time.Time,
putToServer bool) ImmutableRootMetadata {
if writerVerifyingKey == (kbfscrypto.VerifyingKey{}) {
panic("zero writerVerifyingKey passed to MakeImmutableRootMetadata")
}
if mdID == (kbfsmd.ID{}) {
panic("zero mdID passed to MakeImmutableRootMetadata")
}
if localTimestamp.IsZero() {
panic("zero localTimestamp passed to MakeImmutableRootMetadata")
}
if bareMDV2, ok := rmd.bareMd.(*kbfsmd.RootMetadataV2); ok {
writerSig := bareMDV2.WriterMetadataSigInfo
if writerSig.IsNil() {
panic("MDV2 with nil writer signature")
}
if writerSig.VerifyingKey != writerVerifyingKey {
panic(fmt.Sprintf("key mismatch: sig has %s, expected %s",
writerSig.VerifyingKey, writerVerifyingKey))
}
}
return ImmutableRootMetadata{
rmd.ReadOnly(), mdID, writerVerifyingKey, localTimestamp, putToServer}
} | go | func MakeImmutableRootMetadata(
rmd *RootMetadata, writerVerifyingKey kbfscrypto.VerifyingKey,
mdID kbfsmd.ID, localTimestamp time.Time,
putToServer bool) ImmutableRootMetadata {
if writerVerifyingKey == (kbfscrypto.VerifyingKey{}) {
panic("zero writerVerifyingKey passed to MakeImmutableRootMetadata")
}
if mdID == (kbfsmd.ID{}) {
panic("zero mdID passed to MakeImmutableRootMetadata")
}
if localTimestamp.IsZero() {
panic("zero localTimestamp passed to MakeImmutableRootMetadata")
}
if bareMDV2, ok := rmd.bareMd.(*kbfsmd.RootMetadataV2); ok {
writerSig := bareMDV2.WriterMetadataSigInfo
if writerSig.IsNil() {
panic("MDV2 with nil writer signature")
}
if writerSig.VerifyingKey != writerVerifyingKey {
panic(fmt.Sprintf("key mismatch: sig has %s, expected %s",
writerSig.VerifyingKey, writerVerifyingKey))
}
}
return ImmutableRootMetadata{
rmd.ReadOnly(), mdID, writerVerifyingKey, localTimestamp, putToServer}
} | [
"func",
"MakeImmutableRootMetadata",
"(",
"rmd",
"*",
"RootMetadata",
",",
"writerVerifyingKey",
"kbfscrypto",
".",
"VerifyingKey",
",",
"mdID",
"kbfsmd",
".",
"ID",
",",
"localTimestamp",
"time",
".",
"Time",
",",
"putToServer",
"bool",
")",
"ImmutableRootMetadata",
"{",
"if",
"writerVerifyingKey",
"==",
"(",
"kbfscrypto",
".",
"VerifyingKey",
"{",
"}",
")",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"mdID",
"==",
"(",
"kbfsmd",
".",
"ID",
"{",
"}",
")",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"localTimestamp",
".",
"IsZero",
"(",
")",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"bareMDV2",
",",
"ok",
":=",
"rmd",
".",
"bareMd",
".",
"(",
"*",
"kbfsmd",
".",
"RootMetadataV2",
")",
";",
"ok",
"{",
"writerSig",
":=",
"bareMDV2",
".",
"WriterMetadataSigInfo",
"\n",
"if",
"writerSig",
".",
"IsNil",
"(",
")",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"writerSig",
".",
"VerifyingKey",
"!=",
"writerVerifyingKey",
"{",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"writerSig",
".",
"VerifyingKey",
",",
"writerVerifyingKey",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ImmutableRootMetadata",
"{",
"rmd",
".",
"ReadOnly",
"(",
")",
",",
"mdID",
",",
"writerVerifyingKey",
",",
"localTimestamp",
",",
"putToServer",
"}",
"\n",
"}"
] | // MakeImmutableRootMetadata makes a new ImmutableRootMetadata from
// the given RMD and its corresponding MdID. | [
"MakeImmutableRootMetadata",
"makes",
"a",
"new",
"ImmutableRootMetadata",
"from",
"the",
"given",
"RMD",
"and",
"its",
"corresponding",
"MdID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L989-L1014 |
159,917 | keybase/client | go/kbfs/libdokan/reclaim_quota_file.go | WriteFile | func (f *ReclaimQuotaFile) WriteFile(ctx context.Context, fi *dokan.FileInfo, bs []byte, offset int64) (n int, err error) {
f.folder.fs.logEnter(ctx, "ReclaimQuotaFile Write")
defer func() { f.folder.reportErr(ctx, libkbfs.WriteMode, err) }()
if len(bs) == 0 {
return 0, nil
}
err = libkbfs.ForceQuotaReclamationForTesting(
f.folder.fs.config, f.folder.getFolderBranch())
return len(bs), err
} | go | func (f *ReclaimQuotaFile) WriteFile(ctx context.Context, fi *dokan.FileInfo, bs []byte, offset int64) (n int, err error) {
f.folder.fs.logEnter(ctx, "ReclaimQuotaFile Write")
defer func() { f.folder.reportErr(ctx, libkbfs.WriteMode, err) }()
if len(bs) == 0 {
return 0, nil
}
err = libkbfs.ForceQuotaReclamationForTesting(
f.folder.fs.config, f.folder.getFolderBranch())
return len(bs), err
} | [
"func",
"(",
"f",
"*",
"ReclaimQuotaFile",
")",
"WriteFile",
"(",
"ctx",
"context",
".",
"Context",
",",
"fi",
"*",
"dokan",
".",
"FileInfo",
",",
"bs",
"[",
"]",
"byte",
",",
"offset",
"int64",
")",
"(",
"n",
"int",
",",
"err",
"error",
")",
"{",
"f",
".",
"folder",
".",
"fs",
".",
"logEnter",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"f",
".",
"folder",
".",
"reportErr",
"(",
"ctx",
",",
"libkbfs",
".",
"WriteMode",
",",
"err",
")",
"}",
"(",
")",
"\n",
"if",
"len",
"(",
"bs",
")",
"==",
"0",
"{",
"return",
"0",
",",
"nil",
"\n",
"}",
"\n",
"err",
"=",
"libkbfs",
".",
"ForceQuotaReclamationForTesting",
"(",
"f",
".",
"folder",
".",
"fs",
".",
"config",
",",
"f",
".",
"folder",
".",
"getFolderBranch",
"(",
")",
")",
"\n",
"return",
"len",
"(",
"bs",
")",
",",
"err",
"\n",
"}"
] | // WriteFile implements writes for dokan. Note a write triggers quota
// reclamation, but does not wait for it to finish. If you want to
// wait, write to SyncFromServerFileName. | [
"WriteFile",
"implements",
"writes",
"for",
"dokan",
".",
"Note",
"a",
"write",
"triggers",
"quota",
"reclamation",
"but",
"does",
"not",
"wait",
"for",
"it",
"to",
"finish",
".",
"If",
"you",
"want",
"to",
"wait",
"write",
"to",
"SyncFromServerFileName",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/reclaim_quota_file.go#L23-L32 |
159,918 | keybase/client | go/teams/transactions.go | findPayload | func (tx *AddMemberTx) findPayload(tag txPayloadTag, forUID keybase1.UID) interface{} {
minSeqno := 0
hasUID := !forUID.IsNil()
if hasUID {
minSeqno = tx.lastChangeForUID[forUID]
}
for i, v := range tx.payloads {
if i >= minSeqno && v.Tag == tag {
if hasUID && i > minSeqno {
tx.lastChangeForUID[forUID] = i
}
return v.Val
}
}
if hasUID {
tx.lastChangeForUID[forUID] = len(tx.payloads)
}
ret := txPayload{
Tag: tag,
}
switch tag {
case txPayloadTagCryptomembers:
ret.Val = &keybase1.TeamChangeReq{}
case txPayloadTagInviteKeybase, txPayloadTagInviteSocial:
ret.Val = &SCTeamInvites{}
default:
panic(fmt.Sprintf("Unexpected tag %q", tag))
}
tx.payloads = append(tx.payloads, ret)
return ret.Val
} | go | func (tx *AddMemberTx) findPayload(tag txPayloadTag, forUID keybase1.UID) interface{} {
minSeqno := 0
hasUID := !forUID.IsNil()
if hasUID {
minSeqno = tx.lastChangeForUID[forUID]
}
for i, v := range tx.payloads {
if i >= minSeqno && v.Tag == tag {
if hasUID && i > minSeqno {
tx.lastChangeForUID[forUID] = i
}
return v.Val
}
}
if hasUID {
tx.lastChangeForUID[forUID] = len(tx.payloads)
}
ret := txPayload{
Tag: tag,
}
switch tag {
case txPayloadTagCryptomembers:
ret.Val = &keybase1.TeamChangeReq{}
case txPayloadTagInviteKeybase, txPayloadTagInviteSocial:
ret.Val = &SCTeamInvites{}
default:
panic(fmt.Sprintf("Unexpected tag %q", tag))
}
tx.payloads = append(tx.payloads, ret)
return ret.Val
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"findPayload",
"(",
"tag",
"txPayloadTag",
",",
"forUID",
"keybase1",
".",
"UID",
")",
"interface",
"{",
"}",
"{",
"minSeqno",
":=",
"0",
"\n",
"hasUID",
":=",
"!",
"forUID",
".",
"IsNil",
"(",
")",
"\n",
"if",
"hasUID",
"{",
"minSeqno",
"=",
"tx",
".",
"lastChangeForUID",
"[",
"forUID",
"]",
"\n",
"}",
"\n\n",
"for",
"i",
",",
"v",
":=",
"range",
"tx",
".",
"payloads",
"{",
"if",
"i",
">=",
"minSeqno",
"&&",
"v",
".",
"Tag",
"==",
"tag",
"{",
"if",
"hasUID",
"&&",
"i",
">",
"minSeqno",
"{",
"tx",
".",
"lastChangeForUID",
"[",
"forUID",
"]",
"=",
"i",
"\n",
"}",
"\n",
"return",
"v",
".",
"Val",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"hasUID",
"{",
"tx",
".",
"lastChangeForUID",
"[",
"forUID",
"]",
"=",
"len",
"(",
"tx",
".",
"payloads",
")",
"\n",
"}",
"\n",
"ret",
":=",
"txPayload",
"{",
"Tag",
":",
"tag",
",",
"}",
"\n",
"switch",
"tag",
"{",
"case",
"txPayloadTagCryptomembers",
":",
"ret",
".",
"Val",
"=",
"&",
"keybase1",
".",
"TeamChangeReq",
"{",
"}",
"\n",
"case",
"txPayloadTagInviteKeybase",
",",
"txPayloadTagInviteSocial",
":",
"ret",
".",
"Val",
"=",
"&",
"SCTeamInvites",
"{",
"}",
"\n",
"default",
":",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"tag",
")",
")",
"\n",
"}",
"\n",
"tx",
".",
"payloads",
"=",
"append",
"(",
"tx",
".",
"payloads",
",",
"ret",
")",
"\n",
"return",
"ret",
".",
"Val",
"\n",
"}"
] | // Internal AddMemberTx methods. They should not be used by consumers
// of AddMemberTx API. Users of this API should avoid lowercase
// methods and fields at all cost, even from same package. | [
"Internal",
"AddMemberTx",
"methods",
".",
"They",
"should",
"not",
"be",
"used",
"by",
"consumers",
"of",
"AddMemberTx",
"API",
".",
"Users",
"of",
"this",
"API",
"should",
"avoid",
"lowercase",
"methods",
"and",
"fields",
"at",
"all",
"cost",
"even",
"from",
"same",
"package",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L75-L107 |
159,919 | keybase/client | go/teams/transactions.go | removeMember | func (tx *AddMemberTx) removeMember(uv keybase1.UserVersion) {
// Precondition: UV is a cryptomember.
payload := tx.changeMembershipPayload(uv.Uid)
payload.None = append(payload.None, uv)
} | go | func (tx *AddMemberTx) removeMember(uv keybase1.UserVersion) {
// Precondition: UV is a cryptomember.
payload := tx.changeMembershipPayload(uv.Uid)
payload.None = append(payload.None, uv)
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"removeMember",
"(",
"uv",
"keybase1",
".",
"UserVersion",
")",
"{",
"// Precondition: UV is a cryptomember.",
"payload",
":=",
"tx",
".",
"changeMembershipPayload",
"(",
"uv",
".",
"Uid",
")",
"\n",
"payload",
".",
"None",
"=",
"append",
"(",
"payload",
".",
"None",
",",
"uv",
")",
"\n",
"}"
] | // Methods modifying payloads are supposed to always succeed given the
// preconditions are satisfied. If not, the usual result is either a
// no-op or an invalid transaction that is rejected by team player
// pre-check or by the server. Public methods should make sure that
// internal methods are always called with these preconditions
// satisfied. | [
"Methods",
"modifying",
"payloads",
"are",
"supposed",
"to",
"always",
"succeed",
"given",
"the",
"preconditions",
"are",
"satisfied",
".",
"If",
"not",
"the",
"usual",
"result",
"is",
"either",
"a",
"no",
"-",
"op",
"or",
"an",
"invalid",
"transaction",
"that",
"is",
"rejected",
"by",
"team",
"player",
"pre",
"-",
"check",
"or",
"by",
"the",
"server",
".",
"Public",
"methods",
"should",
"make",
"sure",
"that",
"internal",
"methods",
"are",
"always",
"called",
"with",
"these",
"preconditions",
"satisfied",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L128-L132 |
159,920 | keybase/client | go/teams/transactions.go | createKeybaseInvite | func (tx *AddMemberTx) createKeybaseInvite(uv keybase1.UserVersion, role keybase1.TeamRole) {
// Preconditions: UV is a PUKless user, and not already in the
// team, role is valid enum value and not NONE or OWNER.
tx.createInvite("keybase", uv.TeamInviteName(), role, uv.Uid)
} | go | func (tx *AddMemberTx) createKeybaseInvite(uv keybase1.UserVersion, role keybase1.TeamRole) {
// Preconditions: UV is a PUKless user, and not already in the
// team, role is valid enum value and not NONE or OWNER.
tx.createInvite("keybase", uv.TeamInviteName(), role, uv.Uid)
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"createKeybaseInvite",
"(",
"uv",
"keybase1",
".",
"UserVersion",
",",
"role",
"keybase1",
".",
"TeamRole",
")",
"{",
"// Preconditions: UV is a PUKless user, and not already in the",
"// team, role is valid enum value and not NONE or OWNER.",
"tx",
".",
"createInvite",
"(",
"\"",
"\"",
",",
"uv",
".",
"TeamInviteName",
"(",
")",
",",
"role",
",",
"uv",
".",
"Uid",
")",
"\n",
"}"
] | // createKeybaseInvite queues Keybase-type invite for given UV and role. | [
"createKeybaseInvite",
"queues",
"Keybase",
"-",
"type",
"invite",
"for",
"given",
"UV",
"and",
"role",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L160-L164 |
159,921 | keybase/client | go/teams/transactions.go | createInvite | func (tx *AddMemberTx) createInvite(typ string, name keybase1.TeamInviteName, role keybase1.TeamRole, uid keybase1.UID) {
var payload *SCTeamInvites
if typ == "keybase" {
payload = tx.inviteKeybasePayload(uid)
} else {
payload = tx.inviteSocialPayload(uid)
}
invite := SCTeamInvite{
Type: typ,
Name: name,
ID: NewInviteID(),
}
switch role {
case keybase1.TeamRole_READER:
payload.Readers = appendToInviteList(invite, payload.Readers)
case keybase1.TeamRole_WRITER:
payload.Writers = appendToInviteList(invite, payload.Writers)
case keybase1.TeamRole_ADMIN:
payload.Admins = appendToInviteList(invite, payload.Admins)
case keybase1.TeamRole_OWNER:
payload.Owners = appendToInviteList(invite, payload.Owners)
}
} | go | func (tx *AddMemberTx) createInvite(typ string, name keybase1.TeamInviteName, role keybase1.TeamRole, uid keybase1.UID) {
var payload *SCTeamInvites
if typ == "keybase" {
payload = tx.inviteKeybasePayload(uid)
} else {
payload = tx.inviteSocialPayload(uid)
}
invite := SCTeamInvite{
Type: typ,
Name: name,
ID: NewInviteID(),
}
switch role {
case keybase1.TeamRole_READER:
payload.Readers = appendToInviteList(invite, payload.Readers)
case keybase1.TeamRole_WRITER:
payload.Writers = appendToInviteList(invite, payload.Writers)
case keybase1.TeamRole_ADMIN:
payload.Admins = appendToInviteList(invite, payload.Admins)
case keybase1.TeamRole_OWNER:
payload.Owners = appendToInviteList(invite, payload.Owners)
}
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"createInvite",
"(",
"typ",
"string",
",",
"name",
"keybase1",
".",
"TeamInviteName",
",",
"role",
"keybase1",
".",
"TeamRole",
",",
"uid",
"keybase1",
".",
"UID",
")",
"{",
"var",
"payload",
"*",
"SCTeamInvites",
"\n",
"if",
"typ",
"==",
"\"",
"\"",
"{",
"payload",
"=",
"tx",
".",
"inviteKeybasePayload",
"(",
"uid",
")",
"\n",
"}",
"else",
"{",
"payload",
"=",
"tx",
".",
"inviteSocialPayload",
"(",
"uid",
")",
"\n",
"}",
"\n\n",
"invite",
":=",
"SCTeamInvite",
"{",
"Type",
":",
"typ",
",",
"Name",
":",
"name",
",",
"ID",
":",
"NewInviteID",
"(",
")",
",",
"}",
"\n\n",
"switch",
"role",
"{",
"case",
"keybase1",
".",
"TeamRole_READER",
":",
"payload",
".",
"Readers",
"=",
"appendToInviteList",
"(",
"invite",
",",
"payload",
".",
"Readers",
")",
"\n",
"case",
"keybase1",
".",
"TeamRole_WRITER",
":",
"payload",
".",
"Writers",
"=",
"appendToInviteList",
"(",
"invite",
",",
"payload",
".",
"Writers",
")",
"\n",
"case",
"keybase1",
".",
"TeamRole_ADMIN",
":",
"payload",
".",
"Admins",
"=",
"appendToInviteList",
"(",
"invite",
",",
"payload",
".",
"Admins",
")",
"\n",
"case",
"keybase1",
".",
"TeamRole_OWNER",
":",
"payload",
".",
"Owners",
"=",
"appendToInviteList",
"(",
"invite",
",",
"payload",
".",
"Owners",
")",
"\n",
"}",
"\n",
"}"
] | // createInvite queues an invite for invite name with role. | [
"createInvite",
"queues",
"an",
"invite",
"for",
"invite",
"name",
"with",
"role",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L167-L191 |
159,922 | keybase/client | go/teams/transactions.go | sweepCryptoMembers | func (tx *AddMemberTx) sweepCryptoMembers(ctx context.Context, uid keybase1.UID,
exceptAdminsRemovingOwners bool) {
team := tx.team
var myRole keybase1.TeamRole
if exceptAdminsRemovingOwners {
var err error
myRole, err = tx.team.myRole(ctx)
if err != nil {
myRole = keybase1.TeamRole_NONE
}
}
for chainUv := range team.chain().inner.UserLog {
chainRole := team.chain().getUserRole(chainUv)
if chainUv.Uid.Equal(uid) && chainRole != keybase1.TeamRole_NONE {
if exceptAdminsRemovingOwners && myRole == keybase1.TeamRole_ADMIN && chainRole == keybase1.TeamRole_OWNER {
// Skip if we're an admin and they're an owner.
continue
}
tx.removeMember(chainUv)
}
}
} | go | func (tx *AddMemberTx) sweepCryptoMembers(ctx context.Context, uid keybase1.UID,
exceptAdminsRemovingOwners bool) {
team := tx.team
var myRole keybase1.TeamRole
if exceptAdminsRemovingOwners {
var err error
myRole, err = tx.team.myRole(ctx)
if err != nil {
myRole = keybase1.TeamRole_NONE
}
}
for chainUv := range team.chain().inner.UserLog {
chainRole := team.chain().getUserRole(chainUv)
if chainUv.Uid.Equal(uid) && chainRole != keybase1.TeamRole_NONE {
if exceptAdminsRemovingOwners && myRole == keybase1.TeamRole_ADMIN && chainRole == keybase1.TeamRole_OWNER {
// Skip if we're an admin and they're an owner.
continue
}
tx.removeMember(chainUv)
}
}
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"sweepCryptoMembers",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"exceptAdminsRemovingOwners",
"bool",
")",
"{",
"team",
":=",
"tx",
".",
"team",
"\n",
"var",
"myRole",
"keybase1",
".",
"TeamRole",
"\n",
"if",
"exceptAdminsRemovingOwners",
"{",
"var",
"err",
"error",
"\n",
"myRole",
",",
"err",
"=",
"tx",
".",
"team",
".",
"myRole",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"myRole",
"=",
"keybase1",
".",
"TeamRole_NONE",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"chainUv",
":=",
"range",
"team",
".",
"chain",
"(",
")",
".",
"inner",
".",
"UserLog",
"{",
"chainRole",
":=",
"team",
".",
"chain",
"(",
")",
".",
"getUserRole",
"(",
"chainUv",
")",
"\n",
"if",
"chainUv",
".",
"Uid",
".",
"Equal",
"(",
"uid",
")",
"&&",
"chainRole",
"!=",
"keybase1",
".",
"TeamRole_NONE",
"{",
"if",
"exceptAdminsRemovingOwners",
"&&",
"myRole",
"==",
"keybase1",
".",
"TeamRole_ADMIN",
"&&",
"chainRole",
"==",
"keybase1",
".",
"TeamRole_OWNER",
"{",
"// Skip if we're an admin and they're an owner.",
"continue",
"\n",
"}",
"\n",
"tx",
".",
"removeMember",
"(",
"chainUv",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // sweepCryptoMembers will queue "removes" for all cryptomembers with given UID.
// exceptAdminsRemovingOwners - But don't try to remove owners if we are admin. | [
"sweepCryptoMembers",
"will",
"queue",
"removes",
"for",
"all",
"cryptomembers",
"with",
"given",
"UID",
".",
"exceptAdminsRemovingOwners",
"-",
"But",
"don",
"t",
"try",
"to",
"remove",
"owners",
"if",
"we",
"are",
"admin",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L195-L216 |
159,923 | keybase/client | go/teams/transactions.go | sweepCryptoMembersOlderThan | func (tx *AddMemberTx) sweepCryptoMembersOlderThan(uv keybase1.UserVersion) {
team := tx.team
for chainUv := range team.chain().inner.UserLog {
if chainUv.Uid.Equal(uv.Uid) &&
chainUv.EldestSeqno < uv.EldestSeqno &&
team.chain().getUserRole(chainUv) != keybase1.TeamRole_NONE {
tx.removeMember(chainUv)
}
}
} | go | func (tx *AddMemberTx) sweepCryptoMembersOlderThan(uv keybase1.UserVersion) {
team := tx.team
for chainUv := range team.chain().inner.UserLog {
if chainUv.Uid.Equal(uv.Uid) &&
chainUv.EldestSeqno < uv.EldestSeqno &&
team.chain().getUserRole(chainUv) != keybase1.TeamRole_NONE {
tx.removeMember(chainUv)
}
}
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"sweepCryptoMembersOlderThan",
"(",
"uv",
"keybase1",
".",
"UserVersion",
")",
"{",
"team",
":=",
"tx",
".",
"team",
"\n",
"for",
"chainUv",
":=",
"range",
"team",
".",
"chain",
"(",
")",
".",
"inner",
".",
"UserLog",
"{",
"if",
"chainUv",
".",
"Uid",
".",
"Equal",
"(",
"uv",
".",
"Uid",
")",
"&&",
"chainUv",
".",
"EldestSeqno",
"<",
"uv",
".",
"EldestSeqno",
"&&",
"team",
".",
"chain",
"(",
")",
".",
"getUserRole",
"(",
"chainUv",
")",
"!=",
"keybase1",
".",
"TeamRole_NONE",
"{",
"tx",
".",
"removeMember",
"(",
"chainUv",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // sweepCryptoMembersOlderThan will queue "removes" for all cryptomembers
// with same UID as given and EldestSeqno lower than in given UV. | [
"sweepCryptoMembersOlderThan",
"will",
"queue",
"removes",
"for",
"all",
"cryptomembers",
"with",
"same",
"UID",
"as",
"given",
"and",
"EldestSeqno",
"lower",
"than",
"in",
"given",
"UV",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L220-L229 |
159,924 | keybase/client | go/teams/transactions.go | AddMemberByUsername | func (tx *AddMemberTx) AddMemberByUsername(ctx context.Context, username string, role keybase1.TeamRole) (err error) {
team := tx.team
g := team.G()
m := libkb.NewMetaContext(ctx, g)
defer m.Trace(fmt.Sprintf("AddMemberTx.AddMemberByUsername(%s,%v) to team %q", username, role, team.Name()), func() error { return err })()
upak, err := engine.ResolveAndCheck(m, username, true /* useTracking */)
if err != nil {
return err
}
_, err = tx.addMemberByUPKV2(ctx, upak, role)
return err
} | go | func (tx *AddMemberTx) AddMemberByUsername(ctx context.Context, username string, role keybase1.TeamRole) (err error) {
team := tx.team
g := team.G()
m := libkb.NewMetaContext(ctx, g)
defer m.Trace(fmt.Sprintf("AddMemberTx.AddMemberByUsername(%s,%v) to team %q", username, role, team.Name()), func() error { return err })()
upak, err := engine.ResolveAndCheck(m, username, true /* useTracking */)
if err != nil {
return err
}
_, err = tx.addMemberByUPKV2(ctx, upak, role)
return err
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"AddMemberByUsername",
"(",
"ctx",
"context",
".",
"Context",
",",
"username",
"string",
",",
"role",
"keybase1",
".",
"TeamRole",
")",
"(",
"err",
"error",
")",
"{",
"team",
":=",
"tx",
".",
"team",
"\n",
"g",
":=",
"team",
".",
"G",
"(",
")",
"\n",
"m",
":=",
"libkb",
".",
"NewMetaContext",
"(",
"ctx",
",",
"g",
")",
"\n\n",
"defer",
"m",
".",
"Trace",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"username",
",",
"role",
",",
"team",
".",
"Name",
"(",
")",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"upak",
",",
"err",
":=",
"engine",
".",
"ResolveAndCheck",
"(",
"m",
",",
"username",
",",
"true",
"/* useTracking */",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"tx",
".",
"addMemberByUPKV2",
"(",
"ctx",
",",
"upak",
",",
"role",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // AddMemberByUsername will add member by username and role. It
// checks if given username can become crypto member or a PUKless
// member. It will also clean up old invites and memberships if
// necessary. | [
"AddMemberByUsername",
"will",
"add",
"member",
"by",
"username",
"and",
"role",
".",
"It",
"checks",
"if",
"given",
"username",
"can",
"become",
"crypto",
"member",
"or",
"a",
"PUKless",
"member",
".",
"It",
"will",
"also",
"clean",
"up",
"old",
"invites",
"and",
"memberships",
"if",
"necessary",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L405-L418 |
159,925 | keybase/client | go/teams/nonce.go | newNonce24 | func newNonce24() (*nonce24, error) {
prefix, err := libkb.RandBytes(20)
if err != nil {
return nil, err
}
return &nonce24{prefix: prefix}, nil
} | go | func newNonce24() (*nonce24, error) {
prefix, err := libkb.RandBytes(20)
if err != nil {
return nil, err
}
return &nonce24{prefix: prefix}, nil
} | [
"func",
"newNonce24",
"(",
")",
"(",
"*",
"nonce24",
",",
"error",
")",
"{",
"prefix",
",",
"err",
":=",
"libkb",
".",
"RandBytes",
"(",
"20",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"nonce24",
"{",
"prefix",
":",
"prefix",
"}",
",",
"nil",
"\n",
"}"
] | // newNonce24 creates a nonce with a random 20 byte prefix and
// a counter starting at 0. | [
"newNonce24",
"creates",
"a",
"nonce",
"with",
"a",
"random",
"20",
"byte",
"prefix",
"and",
"a",
"counter",
"starting",
"at",
"0",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L21-L27 |
159,926 | keybase/client | go/teams/nonce.go | newNonce24SkipZero | func newNonce24SkipZero() (*nonce24, error) {
n, err := newNonce24()
if err != nil {
return nil, err
}
n.counter = 1
return n, nil
} | go | func newNonce24SkipZero() (*nonce24, error) {
n, err := newNonce24()
if err != nil {
return nil, err
}
n.counter = 1
return n, nil
} | [
"func",
"newNonce24SkipZero",
"(",
")",
"(",
"*",
"nonce24",
",",
"error",
")",
"{",
"n",
",",
"err",
":=",
"newNonce24",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"n",
".",
"counter",
"=",
"1",
"\n",
"return",
"n",
",",
"nil",
"\n",
"}"
] | // newNonce24 creates a nonce with a random 20 byte prefix and
// a counter starting at 1. | [
"newNonce24",
"creates",
"a",
"nonce",
"with",
"a",
"random",
"20",
"byte",
"prefix",
"and",
"a",
"counter",
"starting",
"at",
"1",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L31-L38 |
159,927 | keybase/client | go/teams/nonce.go | Nonce | func (n *nonce24) Nonce() ([24]byte, uint32) {
var nonce [24]byte
copy(nonce[:20], n.prefix)
copy(nonce[20:24], n.counterBytes())
counter := n.counter
n.counter++
return nonce, counter
} | go | func (n *nonce24) Nonce() ([24]byte, uint32) {
var nonce [24]byte
copy(nonce[:20], n.prefix)
copy(nonce[20:24], n.counterBytes())
counter := n.counter
n.counter++
return nonce, counter
} | [
"func",
"(",
"n",
"*",
"nonce24",
")",
"Nonce",
"(",
")",
"(",
"[",
"24",
"]",
"byte",
",",
"uint32",
")",
"{",
"var",
"nonce",
"[",
"24",
"]",
"byte",
"\n",
"copy",
"(",
"nonce",
"[",
":",
"20",
"]",
",",
"n",
".",
"prefix",
")",
"\n",
"copy",
"(",
"nonce",
"[",
"20",
":",
"24",
"]",
",",
"n",
".",
"counterBytes",
"(",
")",
")",
"\n",
"counter",
":=",
"n",
".",
"counter",
"\n",
"n",
".",
"counter",
"++",
"\n",
"return",
"nonce",
",",
"counter",
"\n",
"}"
] | // Nonce gets the 24 byte nonce prefix + counter and increments
// the counter so that the nonce isn't reused. | [
"Nonce",
"gets",
"the",
"24",
"byte",
"nonce",
"prefix",
"+",
"counter",
"and",
"increments",
"the",
"counter",
"so",
"that",
"the",
"nonce",
"isn",
"t",
"reused",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L42-L49 |
159,928 | keybase/client | go/kbfs/libdokan/file_info_file.go | NewFileInfoFile | func NewFileInfoFile(
fs *FS, dir libkbfs.Node, name string) *SpecialReadFile {
return &SpecialReadFile{
read: func(ctx context.Context) ([]byte, time.Time, error) {
return libfs.GetFileInfo(ctx, fs.config, dir, name)
},
fs: fs,
}
} | go | func NewFileInfoFile(
fs *FS, dir libkbfs.Node, name string) *SpecialReadFile {
return &SpecialReadFile{
read: func(ctx context.Context) ([]byte, time.Time, error) {
return libfs.GetFileInfo(ctx, fs.config, dir, name)
},
fs: fs,
}
} | [
"func",
"NewFileInfoFile",
"(",
"fs",
"*",
"FS",
",",
"dir",
"libkbfs",
".",
"Node",
",",
"name",
"string",
")",
"*",
"SpecialReadFile",
"{",
"return",
"&",
"SpecialReadFile",
"{",
"read",
":",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"byte",
",",
"time",
".",
"Time",
",",
"error",
")",
"{",
"return",
"libfs",
".",
"GetFileInfo",
"(",
"ctx",
",",
"fs",
".",
"config",
",",
"dir",
",",
"name",
")",
"\n",
"}",
",",
"fs",
":",
"fs",
",",
"}",
"\n",
"}"
] | // NewFileInfoFile returns a special file that contains a text
// representation of a file's KBFS metadata. | [
"NewFileInfoFile",
"returns",
"a",
"special",
"file",
"that",
"contains",
"a",
"text",
"representation",
"of",
"a",
"file",
"s",
"KBFS",
"metadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/file_info_file.go#L17-L25 |
159,929 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NewKeybaseServiceBase | func NewKeybaseServiceBase(config Config, kbCtx Context, log logger.Logger) *KeybaseServiceBase {
k := KeybaseServiceBase{
config: config,
context: kbCtx,
log: log,
userCache: make(map[keybase1.UID]idutil.UserInfo),
userCacheUnverifiedKeys: make(map[keybase1.UID][]keybase1.PublicKey),
teamCache: make(map[keybase1.TeamID]idutil.TeamInfo),
}
if config != nil {
k.merkleRoot = NewEventuallyConsistentMerkleRoot(
config, &keybaseServiceMerkleGetter{&k})
}
return &k
} | go | func NewKeybaseServiceBase(config Config, kbCtx Context, log logger.Logger) *KeybaseServiceBase {
k := KeybaseServiceBase{
config: config,
context: kbCtx,
log: log,
userCache: make(map[keybase1.UID]idutil.UserInfo),
userCacheUnverifiedKeys: make(map[keybase1.UID][]keybase1.PublicKey),
teamCache: make(map[keybase1.TeamID]idutil.TeamInfo),
}
if config != nil {
k.merkleRoot = NewEventuallyConsistentMerkleRoot(
config, &keybaseServiceMerkleGetter{&k})
}
return &k
} | [
"func",
"NewKeybaseServiceBase",
"(",
"config",
"Config",
",",
"kbCtx",
"Context",
",",
"log",
"logger",
".",
"Logger",
")",
"*",
"KeybaseServiceBase",
"{",
"k",
":=",
"KeybaseServiceBase",
"{",
"config",
":",
"config",
",",
"context",
":",
"kbCtx",
",",
"log",
":",
"log",
",",
"userCache",
":",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"idutil",
".",
"UserInfo",
")",
",",
"userCacheUnverifiedKeys",
":",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"[",
"]",
"keybase1",
".",
"PublicKey",
")",
",",
"teamCache",
":",
"make",
"(",
"map",
"[",
"keybase1",
".",
"TeamID",
"]",
"idutil",
".",
"TeamInfo",
")",
",",
"}",
"\n",
"if",
"config",
"!=",
"nil",
"{",
"k",
".",
"merkleRoot",
"=",
"NewEventuallyConsistentMerkleRoot",
"(",
"config",
",",
"&",
"keybaseServiceMerkleGetter",
"{",
"&",
"k",
"}",
")",
"\n",
"}",
"\n",
"return",
"&",
"k",
"\n",
"}"
] | // NewKeybaseServiceBase makes a new KeybaseService. | [
"NewKeybaseServiceBase",
"makes",
"a",
"new",
"KeybaseService",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L85-L99 |
159,930 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FillClients | func (k *KeybaseServiceBase) FillClients(
identifyClient keybase1.IdentifyInterface,
userClient keybase1.UserInterface, teamsClient keybase1.TeamsInterface,
merkleClient keybase1.MerkleInterface,
sessionClient keybase1.SessionInterface,
favoriteClient keybase1.FavoriteInterface,
kbfsClient keybase1.KbfsInterface,
kbfsMountClient keybase1.KbfsMountInterface,
gitClient keybase1.GitInterface) {
k.identifyClient = identifyClient
k.userClient = userClient
k.teamsClient = teamsClient
k.merkleClient = merkleClient
k.sessionClient = sessionClient
k.favoriteClient = favoriteClient
k.kbfsClient = kbfsClient
k.kbfsMountClient = kbfsMountClient
k.gitClient = gitClient
} | go | func (k *KeybaseServiceBase) FillClients(
identifyClient keybase1.IdentifyInterface,
userClient keybase1.UserInterface, teamsClient keybase1.TeamsInterface,
merkleClient keybase1.MerkleInterface,
sessionClient keybase1.SessionInterface,
favoriteClient keybase1.FavoriteInterface,
kbfsClient keybase1.KbfsInterface,
kbfsMountClient keybase1.KbfsMountInterface,
gitClient keybase1.GitInterface) {
k.identifyClient = identifyClient
k.userClient = userClient
k.teamsClient = teamsClient
k.merkleClient = merkleClient
k.sessionClient = sessionClient
k.favoriteClient = favoriteClient
k.kbfsClient = kbfsClient
k.kbfsMountClient = kbfsMountClient
k.gitClient = gitClient
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FillClients",
"(",
"identifyClient",
"keybase1",
".",
"IdentifyInterface",
",",
"userClient",
"keybase1",
".",
"UserInterface",
",",
"teamsClient",
"keybase1",
".",
"TeamsInterface",
",",
"merkleClient",
"keybase1",
".",
"MerkleInterface",
",",
"sessionClient",
"keybase1",
".",
"SessionInterface",
",",
"favoriteClient",
"keybase1",
".",
"FavoriteInterface",
",",
"kbfsClient",
"keybase1",
".",
"KbfsInterface",
",",
"kbfsMountClient",
"keybase1",
".",
"KbfsMountInterface",
",",
"gitClient",
"keybase1",
".",
"GitInterface",
")",
"{",
"k",
".",
"identifyClient",
"=",
"identifyClient",
"\n",
"k",
".",
"userClient",
"=",
"userClient",
"\n",
"k",
".",
"teamsClient",
"=",
"teamsClient",
"\n",
"k",
".",
"merkleClient",
"=",
"merkleClient",
"\n",
"k",
".",
"sessionClient",
"=",
"sessionClient",
"\n",
"k",
".",
"favoriteClient",
"=",
"favoriteClient",
"\n",
"k",
".",
"kbfsClient",
"=",
"kbfsClient",
"\n",
"k",
".",
"kbfsMountClient",
"=",
"kbfsMountClient",
"\n",
"k",
".",
"gitClient",
"=",
"gitClient",
"\n",
"}"
] | // FillClients sets the client protocol implementations needed for a KeybaseService. | [
"FillClients",
"sets",
"the",
"client",
"protocol",
"implementations",
"needed",
"for",
"a",
"KeybaseService",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L102-L120 |
159,931 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | updateKIDNamesFromParents | func updateKIDNamesFromParents(kidNames map[keybase1.KID]string,
parents map[keybase1.KID]keybase1.KID) {
for kid, parent := range parents {
if _, ok := kidNames[kid]; ok {
continue
}
if parentName, ok := kidNames[parent]; ok {
kidNames[kid] = parentName
}
}
} | go | func updateKIDNamesFromParents(kidNames map[keybase1.KID]string,
parents map[keybase1.KID]keybase1.KID) {
for kid, parent := range parents {
if _, ok := kidNames[kid]; ok {
continue
}
if parentName, ok := kidNames[parent]; ok {
kidNames[kid] = parentName
}
}
} | [
"func",
"updateKIDNamesFromParents",
"(",
"kidNames",
"map",
"[",
"keybase1",
".",
"KID",
"]",
"string",
",",
"parents",
"map",
"[",
"keybase1",
".",
"KID",
"]",
"keybase1",
".",
"KID",
")",
"{",
"for",
"kid",
",",
"parent",
":=",
"range",
"parents",
"{",
"if",
"_",
",",
"ok",
":=",
"kidNames",
"[",
"kid",
"]",
";",
"ok",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"parentName",
",",
"ok",
":=",
"kidNames",
"[",
"parent",
"]",
";",
"ok",
"{",
"kidNames",
"[",
"kid",
"]",
"=",
"parentName",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // updateKIDNamesFromParents sets the name of each KID without a name
// that has a a parent with a name, to that parent's name. | [
"updateKIDNamesFromParents",
"sets",
"the",
"name",
"of",
"each",
"KID",
"without",
"a",
"name",
"that",
"has",
"a",
"a",
"parent",
"with",
"a",
"name",
"to",
"that",
"parent",
"s",
"name",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L155-L165 |
159,932 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ClearCaches | func (k *KeybaseServiceBase) ClearCaches(ctx context.Context) {
k.log.CDebugf(ctx, "Clearing KBFS-side user and team caches")
k.setCachedCurrentSession(idutil.SessionInfo{})
func() {
k.userCacheLock.Lock()
defer k.userCacheLock.Unlock()
k.userCache = make(map[keybase1.UID]idutil.UserInfo)
k.userCacheUnverifiedKeys = make(map[keybase1.UID][]keybase1.PublicKey)
}()
k.teamCacheLock.Lock()
defer k.teamCacheLock.Unlock()
k.teamCache = make(map[keybase1.TeamID]idutil.TeamInfo)
} | go | func (k *KeybaseServiceBase) ClearCaches(ctx context.Context) {
k.log.CDebugf(ctx, "Clearing KBFS-side user and team caches")
k.setCachedCurrentSession(idutil.SessionInfo{})
func() {
k.userCacheLock.Lock()
defer k.userCacheLock.Unlock()
k.userCache = make(map[keybase1.UID]idutil.UserInfo)
k.userCacheUnverifiedKeys = make(map[keybase1.UID][]keybase1.PublicKey)
}()
k.teamCacheLock.Lock()
defer k.teamCacheLock.Unlock()
k.teamCache = make(map[keybase1.TeamID]idutil.TeamInfo)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ClearCaches",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n\n",
"k",
".",
"setCachedCurrentSession",
"(",
"idutil",
".",
"SessionInfo",
"{",
"}",
")",
"\n",
"func",
"(",
")",
"{",
"k",
".",
"userCacheLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"k",
".",
"userCacheLock",
".",
"Unlock",
"(",
")",
"\n",
"k",
".",
"userCache",
"=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"idutil",
".",
"UserInfo",
")",
"\n",
"k",
".",
"userCacheUnverifiedKeys",
"=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"[",
"]",
"keybase1",
".",
"PublicKey",
")",
"\n",
"}",
"(",
")",
"\n",
"k",
".",
"teamCacheLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"k",
".",
"teamCacheLock",
".",
"Unlock",
"(",
")",
"\n",
"k",
".",
"teamCache",
"=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"TeamID",
"]",
"idutil",
".",
"TeamInfo",
")",
"\n",
"}"
] | // ClearCaches implements the KeybaseService interface for
// KeybaseServiceBase. | [
"ClearCaches",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L321-L334 |
159,933 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | LoggedIn | func (k *KeybaseServiceBase) LoggedIn(ctx context.Context, name string) error {
k.log.CDebugf(ctx, "Current session logged in: %s", name)
// Since we don't have the whole session, just clear the cache and
// repopulate it. The `CurrentSession` call executes the "logged
// in" flow.
k.setCachedCurrentSession(idutil.SessionInfo{})
const sessionID = 0
_, err := k.CurrentSession(ctx, sessionID)
if err != nil {
k.log.CDebugf(ctx, "Getting current session failed when %s is logged "+
"in, so pretending user has logged out: %v",
name, err)
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
}
return nil
} | go | func (k *KeybaseServiceBase) LoggedIn(ctx context.Context, name string) error {
k.log.CDebugf(ctx, "Current session logged in: %s", name)
// Since we don't have the whole session, just clear the cache and
// repopulate it. The `CurrentSession` call executes the "logged
// in" flow.
k.setCachedCurrentSession(idutil.SessionInfo{})
const sessionID = 0
_, err := k.CurrentSession(ctx, sessionID)
if err != nil {
k.log.CDebugf(ctx, "Getting current session failed when %s is logged "+
"in, so pretending user has logged out: %v",
name, err)
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"LoggedIn",
"(",
"ctx",
"context",
".",
"Context",
",",
"name",
"string",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"name",
")",
"\n",
"// Since we don't have the whole session, just clear the cache and",
"// repopulate it. The `CurrentSession` call executes the \"logged",
"// in\" flow.",
"k",
".",
"setCachedCurrentSession",
"(",
"idutil",
".",
"SessionInfo",
"{",
"}",
")",
"\n",
"const",
"sessionID",
"=",
"0",
"\n",
"_",
",",
"err",
":=",
"k",
".",
"CurrentSession",
"(",
"ctx",
",",
"sessionID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"name",
",",
"err",
")",
"\n",
"if",
"k",
".",
"config",
"!=",
"nil",
"{",
"serviceLoggedOut",
"(",
"ctx",
",",
"k",
".",
"config",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // LoggedIn implements keybase1.NotifySessionInterface. | [
"LoggedIn",
"implements",
"keybase1",
".",
"NotifySessionInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L337-L356 |
159,934 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | LoggedOut | func (k *KeybaseServiceBase) LoggedOut(ctx context.Context) error {
k.log.CDebugf(ctx, "Current session logged out")
k.setCachedCurrentSession(idutil.SessionInfo{})
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
} | go | func (k *KeybaseServiceBase) LoggedOut(ctx context.Context) error {
k.log.CDebugf(ctx, "Current session logged out")
k.setCachedCurrentSession(idutil.SessionInfo{})
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"LoggedOut",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"k",
".",
"setCachedCurrentSession",
"(",
"idutil",
".",
"SessionInfo",
"{",
"}",
")",
"\n",
"if",
"k",
".",
"config",
"!=",
"nil",
"{",
"serviceLoggedOut",
"(",
"ctx",
",",
"k",
".",
"config",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // LoggedOut implements keybase1.NotifySessionInterface. | [
"LoggedOut",
"implements",
"keybase1",
".",
"NotifySessionInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L359-L366 |
159,935 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | KeyfamilyChanged | func (k *KeybaseServiceBase) KeyfamilyChanged(ctx context.Context,
uid keybase1.UID) error {
k.log.CDebugf(ctx, "Key family for user %s changed", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
k.clearCachedUnverifiedKeys(uid)
if k.getCachedCurrentSession().UID == uid {
mdServer := k.config.MDServer()
if mdServer != nil {
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | go | func (k *KeybaseServiceBase) KeyfamilyChanged(ctx context.Context,
uid keybase1.UID) error {
k.log.CDebugf(ctx, "Key family for user %s changed", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
k.clearCachedUnverifiedKeys(uid)
if k.getCachedCurrentSession().UID == uid {
mdServer := k.config.MDServer()
if mdServer != nil {
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"KeyfamilyChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"uid",
")",
"\n",
"k",
".",
"setCachedUserInfo",
"(",
"uid",
",",
"idutil",
".",
"UserInfo",
"{",
"}",
")",
"\n",
"k",
".",
"clearCachedUnverifiedKeys",
"(",
"uid",
")",
"\n\n",
"if",
"k",
".",
"getCachedCurrentSession",
"(",
")",
".",
"UID",
"==",
"uid",
"{",
"mdServer",
":=",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
"\n",
"if",
"mdServer",
"!=",
"nil",
"{",
"// Ignore any errors for now, we don't want to block this",
"// notification and it's not worth spawning a goroutine for.",
"mdServer",
".",
"CheckForRekeys",
"(",
"context",
".",
"Background",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // KeyfamilyChanged implements keybase1.NotifyKeyfamilyInterface. | [
"KeyfamilyChanged",
"implements",
"keybase1",
".",
"NotifyKeyfamilyInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L369-L385 |
159,936 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ReachabilityChanged | func (k *KeybaseServiceBase) ReachabilityChanged(ctx context.Context,
reachability keybase1.Reachability) error {
k.log.CDebugf(ctx, "CheckReachability invoked: %v", reachability)
if reachability.Reachable == keybase1.Reachable_YES {
k.config.KBFSOps().PushConnectionStatusChange(GregorServiceName, nil)
} else {
k.config.KBFSOps().PushConnectionStatusChange(
GregorServiceName, errDisconnected{})
}
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckReachability(ctx)
}
return nil
} | go | func (k *KeybaseServiceBase) ReachabilityChanged(ctx context.Context,
reachability keybase1.Reachability) error {
k.log.CDebugf(ctx, "CheckReachability invoked: %v", reachability)
if reachability.Reachable == keybase1.Reachable_YES {
k.config.KBFSOps().PushConnectionStatusChange(GregorServiceName, nil)
} else {
k.config.KBFSOps().PushConnectionStatusChange(
GregorServiceName, errDisconnected{})
}
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckReachability(ctx)
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ReachabilityChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"reachability",
"keybase1",
".",
"Reachability",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"reachability",
")",
"\n",
"if",
"reachability",
".",
"Reachable",
"==",
"keybase1",
".",
"Reachable_YES",
"{",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"PushConnectionStatusChange",
"(",
"GregorServiceName",
",",
"nil",
")",
"\n",
"}",
"else",
"{",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"PushConnectionStatusChange",
"(",
"GregorServiceName",
",",
"errDisconnected",
"{",
"}",
")",
"\n",
"}",
"\n",
"mdServer",
":=",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
"\n",
"if",
"mdServer",
"!=",
"nil",
"{",
"mdServer",
".",
"CheckReachability",
"(",
"ctx",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // ReachabilityChanged implements keybase1.ReachabiltyInterface. | [
"ReachabilityChanged",
"implements",
"keybase1",
".",
"ReachabiltyInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L388-L402 |
159,937 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | StartReachability | func (k *KeybaseServiceBase) StartReachability(ctx context.Context) (res keybase1.Reachability, err error) {
return k.CheckReachability(ctx)
} | go | func (k *KeybaseServiceBase) StartReachability(ctx context.Context) (res keybase1.Reachability, err error) {
return k.CheckReachability(ctx)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"StartReachability",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"keybase1",
".",
"Reachability",
",",
"err",
"error",
")",
"{",
"return",
"k",
".",
"CheckReachability",
"(",
"ctx",
")",
"\n",
"}"
] | // StartReachability implements keybase1.ReachabilityInterface. | [
"StartReachability",
"implements",
"keybase1",
".",
"ReachabilityInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L405-L407 |
159,938 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | CheckReachability | func (k *KeybaseServiceBase) CheckReachability(ctx context.Context) (res keybase1.Reachability, err error) {
res.Reachable = keybase1.Reachable_NO
mdServer := k.config.MDServer()
if mdServer != nil && mdServer.IsConnected() {
res.Reachable = keybase1.Reachable_YES
}
return res, nil
} | go | func (k *KeybaseServiceBase) CheckReachability(ctx context.Context) (res keybase1.Reachability, err error) {
res.Reachable = keybase1.Reachable_NO
mdServer := k.config.MDServer()
if mdServer != nil && mdServer.IsConnected() {
res.Reachable = keybase1.Reachable_YES
}
return res, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"CheckReachability",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"keybase1",
".",
"Reachability",
",",
"err",
"error",
")",
"{",
"res",
".",
"Reachable",
"=",
"keybase1",
".",
"Reachable_NO",
"\n",
"mdServer",
":=",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
"\n",
"if",
"mdServer",
"!=",
"nil",
"&&",
"mdServer",
".",
"IsConnected",
"(",
")",
"{",
"res",
".",
"Reachable",
"=",
"keybase1",
".",
"Reachable_YES",
"\n",
"}",
"\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // CheckReachability implements keybase1.ReachabilityInterface. | [
"CheckReachability",
"implements",
"keybase1",
".",
"ReachabilityInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L410-L417 |
159,939 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | PaperKeyCached | func (k *KeybaseServiceBase) PaperKeyCached(ctx context.Context,
arg keybase1.PaperKeyCachedArg) error {
k.log.CDebugf(ctx, "Paper key for %s cached", arg.Uid)
if k.getCachedCurrentSession().UID == arg.Uid {
err := k.config.KBFSOps().KickoffAllOutstandingRekeys()
if err != nil {
// Ignore and log errors here. For now the only way it could error
// is when the method is called on a folderBranchOps which is a
// developer mistake and not recoverable from code.
k.log.CDebugf(ctx,
"Calling KickoffAllOutstandingRekeys error: %s", err)
}
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | go | func (k *KeybaseServiceBase) PaperKeyCached(ctx context.Context,
arg keybase1.PaperKeyCachedArg) error {
k.log.CDebugf(ctx, "Paper key for %s cached", arg.Uid)
if k.getCachedCurrentSession().UID == arg.Uid {
err := k.config.KBFSOps().KickoffAllOutstandingRekeys()
if err != nil {
// Ignore and log errors here. For now the only way it could error
// is when the method is called on a folderBranchOps which is a
// developer mistake and not recoverable from code.
k.log.CDebugf(ctx,
"Calling KickoffAllOutstandingRekeys error: %s", err)
}
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"PaperKeyCached",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"PaperKeyCachedArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
".",
"Uid",
")",
"\n\n",
"if",
"k",
".",
"getCachedCurrentSession",
"(",
")",
".",
"UID",
"==",
"arg",
".",
"Uid",
"{",
"err",
":=",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"KickoffAllOutstandingRekeys",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// Ignore and log errors here. For now the only way it could error",
"// is when the method is called on a folderBranchOps which is a",
"// developer mistake and not recoverable from code.",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"// Ignore any errors for now, we don't want to block this",
"// notification and it's not worth spawning a goroutine for.",
"mdServer",
":=",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
"\n",
"if",
"mdServer",
"!=",
"nil",
"{",
"mdServer",
".",
"CheckForRekeys",
"(",
"context",
".",
"Background",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // PaperKeyCached implements keybase1.NotifyPaperKeyInterface. | [
"PaperKeyCached",
"implements",
"keybase1",
".",
"NotifyPaperKeyInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L420-L442 |
159,940 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ClientOutOfDate | func (k *KeybaseServiceBase) ClientOutOfDate(ctx context.Context,
arg keybase1.ClientOutOfDateArg) error {
k.log.CDebugf(ctx, "Client out of date: %v", arg)
return nil
} | go | func (k *KeybaseServiceBase) ClientOutOfDate(ctx context.Context,
arg keybase1.ClientOutOfDateArg) error {
k.log.CDebugf(ctx, "Client out of date: %v", arg)
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ClientOutOfDate",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"ClientOutOfDateArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // ClientOutOfDate implements keybase1.NotifySessionInterface. | [
"ClientOutOfDate",
"implements",
"keybase1",
".",
"NotifySessionInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L445-L449 |
159,941 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | RootAuditError | func (k *KeybaseServiceBase) RootAuditError(ctx context.Context,
arg keybase1.RootAuditErrorArg) error {
k.log.CDebugf(ctx, "Merkle tree audit error: %v", arg.Message)
return nil
} | go | func (k *KeybaseServiceBase) RootAuditError(ctx context.Context,
arg keybase1.RootAuditErrorArg) error {
k.log.CDebugf(ctx, "Merkle tree audit error: %v", arg.Message)
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"RootAuditError",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"RootAuditErrorArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
".",
"Message",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // RootAuditError implements keybase1.NotifyAuditInterface. | [
"RootAuditError",
"implements",
"keybase1",
".",
"NotifyAuditInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L452-L456 |
159,942 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ConvertIdentifyError | func ConvertIdentifyError(assertion string, err error) error {
switch err.(type) {
case libkb.NotFoundError:
return idutil.NoSuchUserError{Input: assertion}
case libkb.ResolutionError:
return idutil.NoSuchUserError{Input: assertion}
}
return err
} | go | func ConvertIdentifyError(assertion string, err error) error {
switch err.(type) {
case libkb.NotFoundError:
return idutil.NoSuchUserError{Input: assertion}
case libkb.ResolutionError:
return idutil.NoSuchUserError{Input: assertion}
}
return err
} | [
"func",
"ConvertIdentifyError",
"(",
"assertion",
"string",
",",
"err",
"error",
")",
"error",
"{",
"switch",
"err",
".",
"(",
"type",
")",
"{",
"case",
"libkb",
".",
"NotFoundError",
":",
"return",
"idutil",
".",
"NoSuchUserError",
"{",
"Input",
":",
"assertion",
"}",
"\n",
"case",
"libkb",
".",
"ResolutionError",
":",
"return",
"idutil",
".",
"NoSuchUserError",
"{",
"Input",
":",
"assertion",
"}",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}"
] | // ConvertIdentifyError converts a errors during identify into KBFS errors | [
"ConvertIdentifyError",
"converts",
"a",
"errors",
"during",
"identify",
"into",
"KBFS",
"errors"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L459-L467 |
159,943 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | Resolve | func (k *KeybaseServiceBase) Resolve(
ctx context.Context, assertion string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
res, err := k.identifyClient.Resolve3(
ctx, keybase1.Resolve3Arg{
Assertion: assertion,
Oa: offline,
})
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
return kbname.NewNormalizedUsername(res.Name), res.Id, nil
} | go | func (k *KeybaseServiceBase) Resolve(
ctx context.Context, assertion string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
res, err := k.identifyClient.Resolve3(
ctx, keybase1.Resolve3Arg{
Assertion: assertion,
Oa: offline,
})
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
return kbname.NewNormalizedUsername(res.Name), res.Id, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"Resolve",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertion",
"string",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"kbname",
".",
"NormalizedUsername",
",",
"keybase1",
".",
"UserOrTeamID",
",",
"error",
")",
"{",
"res",
",",
"err",
":=",
"k",
".",
"identifyClient",
".",
"Resolve3",
"(",
"ctx",
",",
"keybase1",
".",
"Resolve3Arg",
"{",
"Assertion",
":",
"assertion",
",",
"Oa",
":",
"offline",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbname",
".",
"NormalizedUsername",
"(",
"\"",
"\"",
")",
",",
"keybase1",
".",
"UserOrTeamID",
"(",
"\"",
"\"",
")",
",",
"ConvertIdentifyError",
"(",
"assertion",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"kbname",
".",
"NewNormalizedUsername",
"(",
"res",
".",
"Name",
")",
",",
"res",
".",
"Id",
",",
"nil",
"\n",
"}"
] | // Resolve implements the KeybaseService interface for KeybaseServiceBase. | [
"Resolve",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L470-L484 |
159,944 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | Identify | func (k *KeybaseServiceBase) Identify(
ctx context.Context, assertion, reason string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
// setting UseDelegateUI to true here will cause daemon to use
// registered identify ui providers instead of terminal if any
// are available. If not, then it will use the terminal UI.
arg := keybase1.IdentifyLiteArg{
Assertion: assertion,
UseDelegateUI: true,
Reason: keybase1.IdentifyReason{Reason: reason},
// No need to go back and forth with the UI until the service
// knows for sure there's a need for a dialogue.
CanSuppressUI: true,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.IdentifyLite(ctx, arg)
// IdentifyLite still returns keybase1.UserPlusKeys data (sans
// keys), even if it gives a NoSigChainError or a UserDeletedError,
// and in KBFS it's fine if the user doesn't have a full sigchain
// (e.g., it's just like the sharing before signup case, except
// the user already has a UID). Both types of users are based
// entirely on server trust anyway.
switch err.(type) {
case nil:
case libkb.NoSigChainError, libkb.UserDeletedError:
k.log.CDebugf(ctx,
"Ignoring error (%s) for user %s with no sigchain; "+
"error type=%T", err, res.Ul.Name, err)
ei.OnError(ctx)
default:
// If the caller is waiting for breaks, let them know we got an error.
ei.OnError(ctx)
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
// This is required for every identify call. The userBreak
// function will take care of checking if res.TrackBreaks is nil
// or not.
name := kbname.NormalizedUsername(res.Ul.Name)
if res.Ul.Id.IsUser() {
asUser, err := res.Ul.Id.AsUser()
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), err
}
ei.UserBreak(ctx, name, asUser, res.TrackBreaks)
} else if !res.Ul.Id.IsNil() {
ei.TeamBreak(ctx, res.Ul.Id.AsTeamOrBust(), res.TrackBreaks)
}
return name, res.Ul.Id, nil
} | go | func (k *KeybaseServiceBase) Identify(
ctx context.Context, assertion, reason string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
// setting UseDelegateUI to true here will cause daemon to use
// registered identify ui providers instead of terminal if any
// are available. If not, then it will use the terminal UI.
arg := keybase1.IdentifyLiteArg{
Assertion: assertion,
UseDelegateUI: true,
Reason: keybase1.IdentifyReason{Reason: reason},
// No need to go back and forth with the UI until the service
// knows for sure there's a need for a dialogue.
CanSuppressUI: true,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.IdentifyLite(ctx, arg)
// IdentifyLite still returns keybase1.UserPlusKeys data (sans
// keys), even if it gives a NoSigChainError or a UserDeletedError,
// and in KBFS it's fine if the user doesn't have a full sigchain
// (e.g., it's just like the sharing before signup case, except
// the user already has a UID). Both types of users are based
// entirely on server trust anyway.
switch err.(type) {
case nil:
case libkb.NoSigChainError, libkb.UserDeletedError:
k.log.CDebugf(ctx,
"Ignoring error (%s) for user %s with no sigchain; "+
"error type=%T", err, res.Ul.Name, err)
ei.OnError(ctx)
default:
// If the caller is waiting for breaks, let them know we got an error.
ei.OnError(ctx)
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
// This is required for every identify call. The userBreak
// function will take care of checking if res.TrackBreaks is nil
// or not.
name := kbname.NormalizedUsername(res.Ul.Name)
if res.Ul.Id.IsUser() {
asUser, err := res.Ul.Id.AsUser()
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), err
}
ei.UserBreak(ctx, name, asUser, res.TrackBreaks)
} else if !res.Ul.Id.IsNil() {
ei.TeamBreak(ctx, res.Ul.Id.AsTeamOrBust(), res.TrackBreaks)
}
return name, res.Ul.Id, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"Identify",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertion",
",",
"reason",
"string",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"kbname",
".",
"NormalizedUsername",
",",
"keybase1",
".",
"UserOrTeamID",
",",
"error",
")",
"{",
"// setting UseDelegateUI to true here will cause daemon to use",
"// registered identify ui providers instead of terminal if any",
"// are available. If not, then it will use the terminal UI.",
"arg",
":=",
"keybase1",
".",
"IdentifyLiteArg",
"{",
"Assertion",
":",
"assertion",
",",
"UseDelegateUI",
":",
"true",
",",
"Reason",
":",
"keybase1",
".",
"IdentifyReason",
"{",
"Reason",
":",
"reason",
"}",
",",
"// No need to go back and forth with the UI until the service",
"// knows for sure there's a need for a dialogue.",
"CanSuppressUI",
":",
"true",
",",
"Oa",
":",
"offline",
",",
"}",
"\n\n",
"ei",
":=",
"tlfhandle",
".",
"GetExtendedIdentify",
"(",
"ctx",
")",
"\n",
"arg",
".",
"IdentifyBehavior",
"=",
"ei",
".",
"Behavior",
"\n\n",
"res",
",",
"err",
":=",
"k",
".",
"identifyClient",
".",
"IdentifyLite",
"(",
"ctx",
",",
"arg",
")",
"\n",
"// IdentifyLite still returns keybase1.UserPlusKeys data (sans",
"// keys), even if it gives a NoSigChainError or a UserDeletedError,",
"// and in KBFS it's fine if the user doesn't have a full sigchain",
"// (e.g., it's just like the sharing before signup case, except",
"// the user already has a UID). Both types of users are based",
"// entirely on server trust anyway.",
"switch",
"err",
".",
"(",
"type",
")",
"{",
"case",
"nil",
":",
"case",
"libkb",
".",
"NoSigChainError",
",",
"libkb",
".",
"UserDeletedError",
":",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"err",
",",
"res",
".",
"Ul",
".",
"Name",
",",
"err",
")",
"\n",
"ei",
".",
"OnError",
"(",
"ctx",
")",
"\n",
"default",
":",
"// If the caller is waiting for breaks, let them know we got an error.",
"ei",
".",
"OnError",
"(",
"ctx",
")",
"\n",
"return",
"kbname",
".",
"NormalizedUsername",
"(",
"\"",
"\"",
")",
",",
"keybase1",
".",
"UserOrTeamID",
"(",
"\"",
"\"",
")",
",",
"ConvertIdentifyError",
"(",
"assertion",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// This is required for every identify call. The userBreak",
"// function will take care of checking if res.TrackBreaks is nil",
"// or not.",
"name",
":=",
"kbname",
".",
"NormalizedUsername",
"(",
"res",
".",
"Ul",
".",
"Name",
")",
"\n",
"if",
"res",
".",
"Ul",
".",
"Id",
".",
"IsUser",
"(",
")",
"{",
"asUser",
",",
"err",
":=",
"res",
".",
"Ul",
".",
"Id",
".",
"AsUser",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbname",
".",
"NormalizedUsername",
"(",
"\"",
"\"",
")",
",",
"keybase1",
".",
"UserOrTeamID",
"(",
"\"",
"\"",
")",
",",
"err",
"\n",
"}",
"\n",
"ei",
".",
"UserBreak",
"(",
"ctx",
",",
"name",
",",
"asUser",
",",
"res",
".",
"TrackBreaks",
")",
"\n",
"}",
"else",
"if",
"!",
"res",
".",
"Ul",
".",
"Id",
".",
"IsNil",
"(",
")",
"{",
"ei",
".",
"TeamBreak",
"(",
"ctx",
",",
"res",
".",
"Ul",
".",
"Id",
".",
"AsTeamOrBust",
"(",
")",
",",
"res",
".",
"TrackBreaks",
")",
"\n",
"}",
"\n\n",
"return",
"name",
",",
"res",
".",
"Ul",
".",
"Id",
",",
"nil",
"\n",
"}"
] | // Identify implements the KeybaseService interface for KeybaseServiceBase. | [
"Identify",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L487-L543 |
159,945 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NormalizeSocialAssertion | func (k *KeybaseServiceBase) NormalizeSocialAssertion(
ctx context.Context, assertion string) (keybase1.SocialAssertion, error) {
return k.identifyClient.NormalizeSocialAssertion(ctx, assertion)
} | go | func (k *KeybaseServiceBase) NormalizeSocialAssertion(
ctx context.Context, assertion string) (keybase1.SocialAssertion, error) {
return k.identifyClient.NormalizeSocialAssertion(ctx, assertion)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NormalizeSocialAssertion",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertion",
"string",
")",
"(",
"keybase1",
".",
"SocialAssertion",
",",
"error",
")",
"{",
"return",
"k",
".",
"identifyClient",
".",
"NormalizeSocialAssertion",
"(",
"ctx",
",",
"assertion",
")",
"\n",
"}"
] | // NormalizeSocialAssertion implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NormalizeSocialAssertion",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L547-L550 |
159,946 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ResolveIdentifyImplicitTeam | func (k *KeybaseServiceBase) ResolveIdentifyImplicitTeam(
ctx context.Context, assertions, suffix string, tlfType tlf.Type,
doIdentifies bool, reason string,
offline keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) {
if tlfType != tlf.Private && tlfType != tlf.Public {
return idutil.ImplicitTeamInfo{}, fmt.Errorf(
"Invalid implicit team TLF type: %s", tlfType)
}
arg := keybase1.ResolveIdentifyImplicitTeamArg{
Assertions: assertions,
Suffix: suffix,
DoIdentifies: doIdentifies,
Reason: keybase1.IdentifyReason{Reason: reason},
Create: true,
IsPublic: tlfType == tlf.Public,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.ResolveIdentifyImplicitTeam(ctx, arg)
if err != nil {
return idutil.ImplicitTeamInfo{}, ConvertIdentifyError(assertions, err)
}
name := kbname.NormalizedUsername(res.DisplayName)
// Exactly one break callback is required for every identify call.
if doIdentifies {
if len(res.TrackBreaks) > 0 {
// Iterate the map to get one entry, then break.
for userVer, breaks := range res.TrackBreaks {
// TODO: resolve the UID into a username so we don't have to
// pass in the full display name here?
ei.UserBreak(ctx, name, userVer.Uid, &breaks)
break
}
} else {
ei.TeamBreak(ctx, keybase1.TeamID(""), nil)
}
}
iteamInfo := idutil.ImplicitTeamInfo{
Name: name,
TID: res.TeamID,
}
if res.FolderID != "" {
iteamInfo.TlfID, err = tlf.ParseID(res.FolderID.String())
if err != nil {
return idutil.ImplicitTeamInfo{}, err
}
}
return iteamInfo, nil
} | go | func (k *KeybaseServiceBase) ResolveIdentifyImplicitTeam(
ctx context.Context, assertions, suffix string, tlfType tlf.Type,
doIdentifies bool, reason string,
offline keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) {
if tlfType != tlf.Private && tlfType != tlf.Public {
return idutil.ImplicitTeamInfo{}, fmt.Errorf(
"Invalid implicit team TLF type: %s", tlfType)
}
arg := keybase1.ResolveIdentifyImplicitTeamArg{
Assertions: assertions,
Suffix: suffix,
DoIdentifies: doIdentifies,
Reason: keybase1.IdentifyReason{Reason: reason},
Create: true,
IsPublic: tlfType == tlf.Public,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.ResolveIdentifyImplicitTeam(ctx, arg)
if err != nil {
return idutil.ImplicitTeamInfo{}, ConvertIdentifyError(assertions, err)
}
name := kbname.NormalizedUsername(res.DisplayName)
// Exactly one break callback is required for every identify call.
if doIdentifies {
if len(res.TrackBreaks) > 0 {
// Iterate the map to get one entry, then break.
for userVer, breaks := range res.TrackBreaks {
// TODO: resolve the UID into a username so we don't have to
// pass in the full display name here?
ei.UserBreak(ctx, name, userVer.Uid, &breaks)
break
}
} else {
ei.TeamBreak(ctx, keybase1.TeamID(""), nil)
}
}
iteamInfo := idutil.ImplicitTeamInfo{
Name: name,
TID: res.TeamID,
}
if res.FolderID != "" {
iteamInfo.TlfID, err = tlf.ParseID(res.FolderID.String())
if err != nil {
return idutil.ImplicitTeamInfo{}, err
}
}
return iteamInfo, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ResolveIdentifyImplicitTeam",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertions",
",",
"suffix",
"string",
",",
"tlfType",
"tlf",
".",
"Type",
",",
"doIdentifies",
"bool",
",",
"reason",
"string",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"idutil",
".",
"ImplicitTeamInfo",
",",
"error",
")",
"{",
"if",
"tlfType",
"!=",
"tlf",
".",
"Private",
"&&",
"tlfType",
"!=",
"tlf",
".",
"Public",
"{",
"return",
"idutil",
".",
"ImplicitTeamInfo",
"{",
"}",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tlfType",
")",
"\n",
"}",
"\n\n",
"arg",
":=",
"keybase1",
".",
"ResolveIdentifyImplicitTeamArg",
"{",
"Assertions",
":",
"assertions",
",",
"Suffix",
":",
"suffix",
",",
"DoIdentifies",
":",
"doIdentifies",
",",
"Reason",
":",
"keybase1",
".",
"IdentifyReason",
"{",
"Reason",
":",
"reason",
"}",
",",
"Create",
":",
"true",
",",
"IsPublic",
":",
"tlfType",
"==",
"tlf",
".",
"Public",
",",
"Oa",
":",
"offline",
",",
"}",
"\n\n",
"ei",
":=",
"tlfhandle",
".",
"GetExtendedIdentify",
"(",
"ctx",
")",
"\n",
"arg",
".",
"IdentifyBehavior",
"=",
"ei",
".",
"Behavior",
"\n\n",
"res",
",",
"err",
":=",
"k",
".",
"identifyClient",
".",
"ResolveIdentifyImplicitTeam",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"ImplicitTeamInfo",
"{",
"}",
",",
"ConvertIdentifyError",
"(",
"assertions",
",",
"err",
")",
"\n",
"}",
"\n",
"name",
":=",
"kbname",
".",
"NormalizedUsername",
"(",
"res",
".",
"DisplayName",
")",
"\n\n",
"// Exactly one break callback is required for every identify call.",
"if",
"doIdentifies",
"{",
"if",
"len",
"(",
"res",
".",
"TrackBreaks",
")",
">",
"0",
"{",
"// Iterate the map to get one entry, then break.",
"for",
"userVer",
",",
"breaks",
":=",
"range",
"res",
".",
"TrackBreaks",
"{",
"// TODO: resolve the UID into a username so we don't have to",
"// pass in the full display name here?",
"ei",
".",
"UserBreak",
"(",
"ctx",
",",
"name",
",",
"userVer",
".",
"Uid",
",",
"&",
"breaks",
")",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"else",
"{",
"ei",
".",
"TeamBreak",
"(",
"ctx",
",",
"keybase1",
".",
"TeamID",
"(",
"\"",
"\"",
")",
",",
"nil",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"iteamInfo",
":=",
"idutil",
".",
"ImplicitTeamInfo",
"{",
"Name",
":",
"name",
",",
"TID",
":",
"res",
".",
"TeamID",
",",
"}",
"\n",
"if",
"res",
".",
"FolderID",
"!=",
"\"",
"\"",
"{",
"iteamInfo",
".",
"TlfID",
",",
"err",
"=",
"tlf",
".",
"ParseID",
"(",
"res",
".",
"FolderID",
".",
"String",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"ImplicitTeamInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"iteamInfo",
",",
"nil",
"\n",
"}"
] | // ResolveIdentifyImplicitTeam implements the KeybaseService interface
// for KeybaseServiceBase. | [
"ResolveIdentifyImplicitTeam",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L554-L609 |
159,947 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ResolveImplicitTeamByID | func (k *KeybaseServiceBase) ResolveImplicitTeamByID(
ctx context.Context, teamID keybase1.TeamID) (name string, err error) {
arg := keybase1.ResolveImplicitTeamArg{
Id: teamID,
}
res, err := k.identifyClient.ResolveImplicitTeam(ctx, arg)
if err != nil {
return "", err
}
return res.Name, nil
} | go | func (k *KeybaseServiceBase) ResolveImplicitTeamByID(
ctx context.Context, teamID keybase1.TeamID) (name string, err error) {
arg := keybase1.ResolveImplicitTeamArg{
Id: teamID,
}
res, err := k.identifyClient.ResolveImplicitTeam(ctx, arg)
if err != nil {
return "", err
}
return res.Name, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ResolveImplicitTeamByID",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"(",
"name",
"string",
",",
"err",
"error",
")",
"{",
"arg",
":=",
"keybase1",
".",
"ResolveImplicitTeamArg",
"{",
"Id",
":",
"teamID",
",",
"}",
"\n\n",
"res",
",",
"err",
":=",
"k",
".",
"identifyClient",
".",
"ResolveImplicitTeam",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
".",
"Name",
",",
"nil",
"\n",
"}"
] | // ResolveImplicitTeamByID implements the KeybaseService interface for
// KeybaseServiceBase. | [
"ResolveImplicitTeamByID",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L613-L624 |
159,948 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | LoadUserPlusKeys | func (k *KeybaseServiceBase) LoadUserPlusKeys(
ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID,
offline keybase1.OfflineAvailability) (idutil.UserInfo, error) {
cachedUserInfo := k.getCachedUserInfo(uid)
if cachedUserInfo.Name != kbname.NormalizedUsername("") {
if pollForKID == keybase1.KID("") {
return cachedUserInfo, nil
}
// Skip the cache if pollForKID isn't present in
// `VerifyingKeys` or one of the revoked verifying keys.
for _, key := range cachedUserInfo.VerifyingKeys {
if key.KID().Equal(pollForKID) {
return cachedUserInfo, nil
}
}
// Check if the key is revoked, and fill in the merkle info in
// that case.
cachedUserInfo, exists, err := k.checkForRevokedVerifyingKey(
ctx, cachedUserInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
if exists {
return cachedUserInfo, nil
}
}
arg := keybase1.LoadUserPlusKeysV2Arg{
Uid: uid,
PollForKID: pollForKID,
Oa: offline,
}
res, err := k.userClient.LoadUserPlusKeysV2(ctx, arg)
if err != nil {
return idutil.UserInfo{}, err
}
userInfo, err := k.processUserPlusKeys(ctx, res)
if err != nil {
return idutil.UserInfo{}, err
}
if pollForKID != keybase1.KID("") {
// Fill in merkle info if we were explicitly trying to load a
// revoked key.
userInfo, _, err = k.checkForRevokedVerifyingKey(
ctx, userInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
}
return userInfo, nil
} | go | func (k *KeybaseServiceBase) LoadUserPlusKeys(
ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID,
offline keybase1.OfflineAvailability) (idutil.UserInfo, error) {
cachedUserInfo := k.getCachedUserInfo(uid)
if cachedUserInfo.Name != kbname.NormalizedUsername("") {
if pollForKID == keybase1.KID("") {
return cachedUserInfo, nil
}
// Skip the cache if pollForKID isn't present in
// `VerifyingKeys` or one of the revoked verifying keys.
for _, key := range cachedUserInfo.VerifyingKeys {
if key.KID().Equal(pollForKID) {
return cachedUserInfo, nil
}
}
// Check if the key is revoked, and fill in the merkle info in
// that case.
cachedUserInfo, exists, err := k.checkForRevokedVerifyingKey(
ctx, cachedUserInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
if exists {
return cachedUserInfo, nil
}
}
arg := keybase1.LoadUserPlusKeysV2Arg{
Uid: uid,
PollForKID: pollForKID,
Oa: offline,
}
res, err := k.userClient.LoadUserPlusKeysV2(ctx, arg)
if err != nil {
return idutil.UserInfo{}, err
}
userInfo, err := k.processUserPlusKeys(ctx, res)
if err != nil {
return idutil.UserInfo{}, err
}
if pollForKID != keybase1.KID("") {
// Fill in merkle info if we were explicitly trying to load a
// revoked key.
userInfo, _, err = k.checkForRevokedVerifyingKey(
ctx, userInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
}
return userInfo, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"LoadUserPlusKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"pollForKID",
"keybase1",
".",
"KID",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"idutil",
".",
"UserInfo",
",",
"error",
")",
"{",
"cachedUserInfo",
":=",
"k",
".",
"getCachedUserInfo",
"(",
"uid",
")",
"\n",
"if",
"cachedUserInfo",
".",
"Name",
"!=",
"kbname",
".",
"NormalizedUsername",
"(",
"\"",
"\"",
")",
"{",
"if",
"pollForKID",
"==",
"keybase1",
".",
"KID",
"(",
"\"",
"\"",
")",
"{",
"return",
"cachedUserInfo",
",",
"nil",
"\n",
"}",
"\n",
"// Skip the cache if pollForKID isn't present in",
"// `VerifyingKeys` or one of the revoked verifying keys.",
"for",
"_",
",",
"key",
":=",
"range",
"cachedUserInfo",
".",
"VerifyingKeys",
"{",
"if",
"key",
".",
"KID",
"(",
")",
".",
"Equal",
"(",
"pollForKID",
")",
"{",
"return",
"cachedUserInfo",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Check if the key is revoked, and fill in the merkle info in",
"// that case.",
"cachedUserInfo",
",",
"exists",
",",
"err",
":=",
"k",
".",
"checkForRevokedVerifyingKey",
"(",
"ctx",
",",
"cachedUserInfo",
",",
"pollForKID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"UserInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"if",
"exists",
"{",
"return",
"cachedUserInfo",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"arg",
":=",
"keybase1",
".",
"LoadUserPlusKeysV2Arg",
"{",
"Uid",
":",
"uid",
",",
"PollForKID",
":",
"pollForKID",
",",
"Oa",
":",
"offline",
",",
"}",
"\n",
"res",
",",
"err",
":=",
"k",
".",
"userClient",
".",
"LoadUserPlusKeysV2",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"UserInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"userInfo",
",",
"err",
":=",
"k",
".",
"processUserPlusKeys",
"(",
"ctx",
",",
"res",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"UserInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"pollForKID",
"!=",
"keybase1",
".",
"KID",
"(",
"\"",
"\"",
")",
"{",
"// Fill in merkle info if we were explicitly trying to load a",
"// revoked key.",
"userInfo",
",",
"_",
",",
"err",
"=",
"k",
".",
"checkForRevokedVerifyingKey",
"(",
"ctx",
",",
"userInfo",
",",
"pollForKID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"UserInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"userInfo",
",",
"nil",
"\n",
"}"
] | // LoadUserPlusKeys implements the KeybaseService interface for
// KeybaseServiceBase. | [
"LoadUserPlusKeys",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L691-L744 |
159,949 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | CreateTeamTLF | func (k *KeybaseServiceBase) CreateTeamTLF(
ctx context.Context, teamID keybase1.TeamID, tlfID tlf.ID) (err error) {
return k.kbfsClient.CreateTLF(ctx, keybase1.CreateTLFArg{
TeamID: teamID,
TlfID: keybase1.TLFID(tlfID.String()),
})
} | go | func (k *KeybaseServiceBase) CreateTeamTLF(
ctx context.Context, teamID keybase1.TeamID, tlfID tlf.ID) (err error) {
return k.kbfsClient.CreateTLF(ctx, keybase1.CreateTLFArg{
TeamID: teamID,
TlfID: keybase1.TLFID(tlfID.String()),
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"CreateTeamTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"(",
"err",
"error",
")",
"{",
"return",
"k",
".",
"kbfsClient",
".",
"CreateTLF",
"(",
"ctx",
",",
"keybase1",
".",
"CreateTLFArg",
"{",
"TeamID",
":",
"teamID",
",",
"TlfID",
":",
"keybase1",
".",
"TLFID",
"(",
"tlfID",
".",
"String",
"(",
")",
")",
",",
"}",
")",
"\n",
"}"
] | // CreateTeamTLF implements the KeybaseService interface for
// KeybaseServiceBase. | [
"CreateTeamTLF",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L920-L926 |
159,950 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetTeamSettings | func (k *KeybaseServiceBase) GetTeamSettings(
ctx context.Context, teamID keybase1.TeamID,
offline keybase1.OfflineAvailability) (
keybase1.KBFSTeamSettings, error) {
// TODO: get invalidations from the server and cache the settings?
return k.kbfsClient.GetKBFSTeamSettings(
ctx, keybase1.GetKBFSTeamSettingsArg{
TeamID: teamID,
Oa: offline,
})
} | go | func (k *KeybaseServiceBase) GetTeamSettings(
ctx context.Context, teamID keybase1.TeamID,
offline keybase1.OfflineAvailability) (
keybase1.KBFSTeamSettings, error) {
// TODO: get invalidations from the server and cache the settings?
return k.kbfsClient.GetKBFSTeamSettings(
ctx, keybase1.GetKBFSTeamSettingsArg{
TeamID: teamID,
Oa: offline,
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetTeamSettings",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"keybase1",
".",
"KBFSTeamSettings",
",",
"error",
")",
"{",
"// TODO: get invalidations from the server and cache the settings?",
"return",
"k",
".",
"kbfsClient",
".",
"GetKBFSTeamSettings",
"(",
"ctx",
",",
"keybase1",
".",
"GetKBFSTeamSettingsArg",
"{",
"TeamID",
":",
"teamID",
",",
"Oa",
":",
"offline",
",",
"}",
")",
"\n",
"}"
] | // GetTeamSettings implements the KeybaseService interface for
// KeybaseServiceBase. | [
"GetTeamSettings",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L930-L940 |
159,951 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetCurrentMerkleRoot | func (k *KeybaseServiceBase) GetCurrentMerkleRoot(ctx context.Context) (
keybase1.MerkleRootV2, time.Time, error) {
// Refresh the cached value in the background if the cached value
// is older than 30s; if our cached value is more than 60s old,
// block.
_, root, rootTime, err := k.merkleRoot.Get(
ctx, 30*time.Second, 60*time.Second)
return root, rootTime, err
} | go | func (k *KeybaseServiceBase) GetCurrentMerkleRoot(ctx context.Context) (
keybase1.MerkleRootV2, time.Time, error) {
// Refresh the cached value in the background if the cached value
// is older than 30s; if our cached value is more than 60s old,
// block.
_, root, rootTime, err := k.merkleRoot.Get(
ctx, 30*time.Second, 60*time.Second)
return root, rootTime, err
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetCurrentMerkleRoot",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"keybase1",
".",
"MerkleRootV2",
",",
"time",
".",
"Time",
",",
"error",
")",
"{",
"// Refresh the cached value in the background if the cached value",
"// is older than 30s; if our cached value is more than 60s old,",
"// block.",
"_",
",",
"root",
",",
"rootTime",
",",
"err",
":=",
"k",
".",
"merkleRoot",
".",
"Get",
"(",
"ctx",
",",
"30",
"*",
"time",
".",
"Second",
",",
"60",
"*",
"time",
".",
"Second",
")",
"\n",
"return",
"root",
",",
"rootTime",
",",
"err",
"\n",
"}"
] | // GetCurrentMerkleRoot implements the KeybaseService interface for
// KeybaseServiceBase. | [
"GetCurrentMerkleRoot",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L955-L963 |
159,952 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | VerifyMerkleRoot | func (k *KeybaseServiceBase) VerifyMerkleRoot(
ctx context.Context, root keybase1.MerkleRootV2,
kbfsRoot keybase1.KBFSRoot) error {
return k.merkleClient.VerifyMerkleRootAndKBFS(ctx,
keybase1.VerifyMerkleRootAndKBFSArg{
Root: root,
ExpectedKBFSRoot: kbfsRoot,
})
} | go | func (k *KeybaseServiceBase) VerifyMerkleRoot(
ctx context.Context, root keybase1.MerkleRootV2,
kbfsRoot keybase1.KBFSRoot) error {
return k.merkleClient.VerifyMerkleRootAndKBFS(ctx,
keybase1.VerifyMerkleRootAndKBFSArg{
Root: root,
ExpectedKBFSRoot: kbfsRoot,
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"VerifyMerkleRoot",
"(",
"ctx",
"context",
".",
"Context",
",",
"root",
"keybase1",
".",
"MerkleRootV2",
",",
"kbfsRoot",
"keybase1",
".",
"KBFSRoot",
")",
"error",
"{",
"return",
"k",
".",
"merkleClient",
".",
"VerifyMerkleRootAndKBFS",
"(",
"ctx",
",",
"keybase1",
".",
"VerifyMerkleRootAndKBFSArg",
"{",
"Root",
":",
"root",
",",
"ExpectedKBFSRoot",
":",
"kbfsRoot",
",",
"}",
")",
"\n",
"}"
] | // VerifyMerkleRoot implements the KBPKI interface for KeybaseServiceBase. | [
"VerifyMerkleRoot",
"implements",
"the",
"KBPKI",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L966-L974 |
159,953 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | CurrentSession | func (k *KeybaseServiceBase) CurrentSession(
ctx context.Context, sessionID int) (
idutil.SessionInfo, error) {
ctx = CtxWithRandomIDReplayable(
ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log)
s, newSession, err := k.getCurrentSession(ctx, sessionID)
if err != nil {
return idutil.SessionInfo{}, err
}
if newSession && k.config != nil {
// Don't hold the lock while calling `serviceLoggedIn`.
_ = serviceLoggedIn(ctx, k.config, s, TLFJournalBackgroundWorkEnabled)
}
return s, nil
} | go | func (k *KeybaseServiceBase) CurrentSession(
ctx context.Context, sessionID int) (
idutil.SessionInfo, error) {
ctx = CtxWithRandomIDReplayable(
ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log)
s, newSession, err := k.getCurrentSession(ctx, sessionID)
if err != nil {
return idutil.SessionInfo{}, err
}
if newSession && k.config != nil {
// Don't hold the lock while calling `serviceLoggedIn`.
_ = serviceLoggedIn(ctx, k.config, s, TLFJournalBackgroundWorkEnabled)
}
return s, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"CurrentSession",
"(",
"ctx",
"context",
".",
"Context",
",",
"sessionID",
"int",
")",
"(",
"idutil",
".",
"SessionInfo",
",",
"error",
")",
"{",
"ctx",
"=",
"CtxWithRandomIDReplayable",
"(",
"ctx",
",",
"CtxKeybaseServiceIDKey",
",",
"CtxKeybaseServiceOpID",
",",
"k",
".",
"log",
")",
"\n\n",
"s",
",",
"newSession",
",",
"err",
":=",
"k",
".",
"getCurrentSession",
"(",
"ctx",
",",
"sessionID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"idutil",
".",
"SessionInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"newSession",
"&&",
"k",
".",
"config",
"!=",
"nil",
"{",
"// Don't hold the lock while calling `serviceLoggedIn`.",
"_",
"=",
"serviceLoggedIn",
"(",
"ctx",
",",
"k",
".",
"config",
",",
"s",
",",
"TLFJournalBackgroundWorkEnabled",
")",
"\n",
"}",
"\n\n",
"return",
"s",
",",
"nil",
"\n",
"}"
] | // CurrentSession implements the KeybaseService interface for KeybaseServiceBase. | [
"CurrentSession",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1112-L1129 |
159,954 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FavoriteAdd | func (k *KeybaseServiceBase) FavoriteAdd(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteAdd(ctx, keybase1.FavoriteAddArg{Folder: folder})
} | go | func (k *KeybaseServiceBase) FavoriteAdd(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteAdd(ctx, keybase1.FavoriteAddArg{Folder: folder})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FavoriteAdd",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"error",
"{",
"return",
"k",
".",
"favoriteClient",
".",
"FavoriteAdd",
"(",
"ctx",
",",
"keybase1",
".",
"FavoriteAddArg",
"{",
"Folder",
":",
"folder",
"}",
")",
"\n",
"}"
] | // FavoriteAdd implements the KeybaseService interface for KeybaseServiceBase. | [
"FavoriteAdd",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1132-L1134 |
159,955 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FavoriteDelete | func (k *KeybaseServiceBase) FavoriteDelete(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteIgnore(ctx,
keybase1.FavoriteIgnoreArg{Folder: folder})
} | go | func (k *KeybaseServiceBase) FavoriteDelete(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteIgnore(ctx,
keybase1.FavoriteIgnoreArg{Folder: folder})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FavoriteDelete",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"error",
"{",
"return",
"k",
".",
"favoriteClient",
".",
"FavoriteIgnore",
"(",
"ctx",
",",
"keybase1",
".",
"FavoriteIgnoreArg",
"{",
"Folder",
":",
"folder",
"}",
")",
"\n",
"}"
] | // FavoriteDelete implements the KeybaseService interface for KeybaseServiceBase. | [
"FavoriteDelete",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1137-L1140 |
159,956 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FavoriteList | func (k *KeybaseServiceBase) FavoriteList(ctx context.Context,
sessionID int) (keybase1.FavoritesResult, error) {
return k.favoriteClient.GetFavorites(ctx, sessionID)
} | go | func (k *KeybaseServiceBase) FavoriteList(ctx context.Context,
sessionID int) (keybase1.FavoritesResult, error) {
return k.favoriteClient.GetFavorites(ctx, sessionID)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FavoriteList",
"(",
"ctx",
"context",
".",
"Context",
",",
"sessionID",
"int",
")",
"(",
"keybase1",
".",
"FavoritesResult",
",",
"error",
")",
"{",
"return",
"k",
".",
"favoriteClient",
".",
"GetFavorites",
"(",
"ctx",
",",
"sessionID",
")",
"\n",
"}"
] | // FavoriteList implements the KeybaseService interface for KeybaseServiceBase. | [
"FavoriteList",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1143-L1146 |
159,957 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifyOnlineStatusChanged | func (k *KeybaseServiceBase) NotifyOnlineStatusChanged(ctx context.Context,
online bool) error {
k.log.CDebugf(ctx, "Sending notification for onlineStatus: online=%v", online)
return k.kbfsClient.FSOnlineStatusChangedEvent(ctx, online)
} | go | func (k *KeybaseServiceBase) NotifyOnlineStatusChanged(ctx context.Context,
online bool) error {
k.log.CDebugf(ctx, "Sending notification for onlineStatus: online=%v", online)
return k.kbfsClient.FSOnlineStatusChangedEvent(ctx, online)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifyOnlineStatusChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"online",
"bool",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"online",
")",
"\n",
"return",
"k",
".",
"kbfsClient",
".",
"FSOnlineStatusChangedEvent",
"(",
"ctx",
",",
"online",
")",
"\n",
"}"
] | // NotifyOnlineStatusChanged implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifyOnlineStatusChanged",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1160-L1164 |
159,958 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | Notify | func (k *KeybaseServiceBase) Notify(ctx context.Context, notification *keybase1.FSNotification) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if notification.Filename != k.lastNotificationFilename {
k.lastNotificationFilename = notification.Filename
k.log.CDebugf(ctx, "Sending notification for %s", notification.Filename)
}
}()
return k.kbfsClient.FSEvent(ctx, *notification)
} | go | func (k *KeybaseServiceBase) Notify(ctx context.Context, notification *keybase1.FSNotification) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if notification.Filename != k.lastNotificationFilename {
k.lastNotificationFilename = notification.Filename
k.log.CDebugf(ctx, "Sending notification for %s", notification.Filename)
}
}()
return k.kbfsClient.FSEvent(ctx, *notification)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"Notify",
"(",
"ctx",
"context",
".",
"Context",
",",
"notification",
"*",
"keybase1",
".",
"FSNotification",
")",
"error",
"{",
"// Reduce log spam by not repeating log lines for",
"// notifications with the same filename.",
"//",
"// TODO: Only do this in debug mode.",
"func",
"(",
")",
"{",
"k",
".",
"lastNotificationFilenameLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"k",
".",
"lastNotificationFilenameLock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"notification",
".",
"Filename",
"!=",
"k",
".",
"lastNotificationFilename",
"{",
"k",
".",
"lastNotificationFilename",
"=",
"notification",
".",
"Filename",
"\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"notification",
".",
"Filename",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"return",
"k",
".",
"kbfsClient",
".",
"FSEvent",
"(",
"ctx",
",",
"*",
"notification",
")",
"\n",
"}"
] | // Notify implements the KeybaseService interface for KeybaseServiceBase. | [
"Notify",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1167-L1181 |
159,959 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifyPathUpdated | func (k *KeybaseServiceBase) NotifyPathUpdated(
ctx context.Context, path string) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if path != k.lastPathUpdated {
k.lastPathUpdated = path
k.log.CDebugf(ctx, "Sending path updated notification for %s", path)
}
}()
return k.kbfsClient.FSPathUpdate(ctx, path)
} | go | func (k *KeybaseServiceBase) NotifyPathUpdated(
ctx context.Context, path string) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if path != k.lastPathUpdated {
k.lastPathUpdated = path
k.log.CDebugf(ctx, "Sending path updated notification for %s", path)
}
}()
return k.kbfsClient.FSPathUpdate(ctx, path)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifyPathUpdated",
"(",
"ctx",
"context",
".",
"Context",
",",
"path",
"string",
")",
"error",
"{",
"// Reduce log spam by not repeating log lines for",
"// notifications with the same filename.",
"//",
"// TODO: Only do this in debug mode.",
"func",
"(",
")",
"{",
"k",
".",
"lastNotificationFilenameLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"k",
".",
"lastNotificationFilenameLock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"path",
"!=",
"k",
".",
"lastPathUpdated",
"{",
"k",
".",
"lastPathUpdated",
"=",
"path",
"\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"path",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"return",
"k",
".",
"kbfsClient",
".",
"FSPathUpdate",
"(",
"ctx",
",",
"path",
")",
"\n",
"}"
] | // NotifyPathUpdated implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifyPathUpdated",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1185-L1200 |
159,960 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifySyncStatus | func (k *KeybaseServiceBase) NotifySyncStatus(ctx context.Context,
status *keybase1.FSPathSyncStatus) error {
// Reduce log spam by not repeating log lines for
// notifications with the same pathname.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if status.Path != k.lastSyncNotificationPath {
k.lastSyncNotificationPath = status.Path
k.log.CDebugf(ctx, "Sending notification for %s", status.Path)
}
}()
return k.kbfsClient.FSSyncEvent(ctx, *status)
} | go | func (k *KeybaseServiceBase) NotifySyncStatus(ctx context.Context,
status *keybase1.FSPathSyncStatus) error {
// Reduce log spam by not repeating log lines for
// notifications with the same pathname.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if status.Path != k.lastSyncNotificationPath {
k.lastSyncNotificationPath = status.Path
k.log.CDebugf(ctx, "Sending notification for %s", status.Path)
}
}()
return k.kbfsClient.FSSyncEvent(ctx, *status)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifySyncStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"status",
"*",
"keybase1",
".",
"FSPathSyncStatus",
")",
"error",
"{",
"// Reduce log spam by not repeating log lines for",
"// notifications with the same pathname.",
"//",
"// TODO: Only do this in debug mode.",
"func",
"(",
")",
"{",
"k",
".",
"lastNotificationFilenameLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"k",
".",
"lastNotificationFilenameLock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"status",
".",
"Path",
"!=",
"k",
".",
"lastSyncNotificationPath",
"{",
"k",
".",
"lastSyncNotificationPath",
"=",
"status",
".",
"Path",
"\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"status",
".",
"Path",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"return",
"k",
".",
"kbfsClient",
".",
"FSSyncEvent",
"(",
"ctx",
",",
"*",
"status",
")",
"\n",
"}"
] | // NotifySyncStatus implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifySyncStatus",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1204-L1219 |
159,961 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifyOverallSyncStatus | func (k *KeybaseServiceBase) NotifyOverallSyncStatus(
ctx context.Context, status keybase1.FolderSyncStatus) error {
return k.kbfsClient.FSOverallSyncEvent(ctx, status)
} | go | func (k *KeybaseServiceBase) NotifyOverallSyncStatus(
ctx context.Context, status keybase1.FolderSyncStatus) error {
return k.kbfsClient.FSOverallSyncEvent(ctx, status)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifyOverallSyncStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"status",
"keybase1",
".",
"FolderSyncStatus",
")",
"error",
"{",
"return",
"k",
".",
"kbfsClient",
".",
"FSOverallSyncEvent",
"(",
"ctx",
",",
"status",
")",
"\n",
"}"
] | // NotifyOverallSyncStatus implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifyOverallSyncStatus",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1223-L1226 |
159,962 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FlushUserFromLocalCache | func (k *KeybaseServiceBase) FlushUserFromLocalCache(ctx context.Context,
uid keybase1.UID) {
k.log.CDebugf(ctx, "Flushing cache for user %s", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
} | go | func (k *KeybaseServiceBase) FlushUserFromLocalCache(ctx context.Context,
uid keybase1.UID) {
k.log.CDebugf(ctx, "Flushing cache for user %s", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FlushUserFromLocalCache",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
")",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"uid",
")",
"\n",
"k",
".",
"setCachedUserInfo",
"(",
"uid",
",",
"idutil",
".",
"UserInfo",
"{",
"}",
")",
"\n",
"}"
] | // FlushUserFromLocalCache implements the KeybaseService interface for
// KeybaseServiceBase. | [
"FlushUserFromLocalCache",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1230-L1234 |
159,963 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FSEditListRequest | func (k *KeybaseServiceBase) FSEditListRequest(ctx context.Context,
req keybase1.FSEditListRequest) (err error) {
ctx = CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID,
k.log)
k.log.CDebugf(ctx, "Edit list request for %s (public: %t)",
req.Folder.Name, !req.Folder.Private)
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, req.Folder.Name,
!req.Folder.Private)
if err != nil {
return err
}
rootNode, _, err := k.config.KBFSOps().
GetOrCreateRootNode(ctx, tlfHandle, data.MasterBranch)
if err != nil {
return err
}
history, err := k.config.KBFSOps().GetEditHistory(ctx,
rootNode.GetFolderBranch())
if err != nil {
return err
}
// TODO(KBFS-2996) Convert the edits to an RPC response.
resp := keybase1.FSEditListArg{
RequestID: req.RequestID,
Edits: history,
}
k.log.CDebugf(ctx, "Sending edit history response with %d writer clusters",
len(resp.Edits.History))
return k.kbfsClient.FSEditList(ctx, resp)
} | go | func (k *KeybaseServiceBase) FSEditListRequest(ctx context.Context,
req keybase1.FSEditListRequest) (err error) {
ctx = CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID,
k.log)
k.log.CDebugf(ctx, "Edit list request for %s (public: %t)",
req.Folder.Name, !req.Folder.Private)
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, req.Folder.Name,
!req.Folder.Private)
if err != nil {
return err
}
rootNode, _, err := k.config.KBFSOps().
GetOrCreateRootNode(ctx, tlfHandle, data.MasterBranch)
if err != nil {
return err
}
history, err := k.config.KBFSOps().GetEditHistory(ctx,
rootNode.GetFolderBranch())
if err != nil {
return err
}
// TODO(KBFS-2996) Convert the edits to an RPC response.
resp := keybase1.FSEditListArg{
RequestID: req.RequestID,
Edits: history,
}
k.log.CDebugf(ctx, "Sending edit history response with %d writer clusters",
len(resp.Edits.History))
return k.kbfsClient.FSEditList(ctx, resp)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FSEditListRequest",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"keybase1",
".",
"FSEditListRequest",
")",
"(",
"err",
"error",
")",
"{",
"ctx",
"=",
"CtxWithRandomIDReplayable",
"(",
"ctx",
",",
"CtxKeybaseServiceIDKey",
",",
"CtxKeybaseServiceOpID",
",",
"k",
".",
"log",
")",
"\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"req",
".",
"Folder",
".",
"Name",
",",
"!",
"req",
".",
"Folder",
".",
"Private",
")",
"\n",
"tlfHandle",
",",
"err",
":=",
"getHandleFromFolderName",
"(",
"ctx",
",",
"k",
".",
"config",
".",
"KBPKI",
"(",
")",
",",
"k",
".",
"config",
".",
"MDOps",
"(",
")",
",",
"k",
".",
"config",
",",
"req",
".",
"Folder",
".",
"Name",
",",
"!",
"req",
".",
"Folder",
".",
"Private",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"rootNode",
",",
"_",
",",
"err",
":=",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"GetOrCreateRootNode",
"(",
"ctx",
",",
"tlfHandle",
",",
"data",
".",
"MasterBranch",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"history",
",",
"err",
":=",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"GetEditHistory",
"(",
"ctx",
",",
"rootNode",
".",
"GetFolderBranch",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// TODO(KBFS-2996) Convert the edits to an RPC response.",
"resp",
":=",
"keybase1",
".",
"FSEditListArg",
"{",
"RequestID",
":",
"req",
".",
"RequestID",
",",
"Edits",
":",
"history",
",",
"}",
"\n\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"len",
"(",
"resp",
".",
"Edits",
".",
"History",
")",
")",
"\n",
"return",
"k",
".",
"kbfsClient",
".",
"FSEditList",
"(",
"ctx",
",",
"resp",
")",
"\n",
"}"
] | // FSEditListRequest implements keybase1.NotifyFSRequestInterface for
// KeybaseServiceBase. | [
"FSEditListRequest",
"implements",
"keybase1",
".",
"NotifyFSRequestInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1252-L1285 |
159,964 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FSSyncStatusRequest | func (k *KeybaseServiceBase) FSSyncStatusRequest(ctx context.Context,
req keybase1.FSSyncStatusRequest) (err error) {
k.log.CDebugf(ctx, "Got sync status request: %v", req)
resp := keybase1.FSSyncStatusArg{RequestID: req.RequestID}
// For now, just return the number of syncing bytes.
jManager, err := GetJournalManager(k.config)
if err == nil {
status, _ := jManager.Status(ctx)
resp.Status.TotalSyncingBytes = status.UnflushedBytes
k.log.CDebugf(ctx, "Sending sync status response with %d syncing bytes",
status.UnflushedBytes)
} else {
k.log.CDebugf(ctx, "No journal server, sending empty response")
}
return k.kbfsClient.FSSyncStatus(ctx, resp)
} | go | func (k *KeybaseServiceBase) FSSyncStatusRequest(ctx context.Context,
req keybase1.FSSyncStatusRequest) (err error) {
k.log.CDebugf(ctx, "Got sync status request: %v", req)
resp := keybase1.FSSyncStatusArg{RequestID: req.RequestID}
// For now, just return the number of syncing bytes.
jManager, err := GetJournalManager(k.config)
if err == nil {
status, _ := jManager.Status(ctx)
resp.Status.TotalSyncingBytes = status.UnflushedBytes
k.log.CDebugf(ctx, "Sending sync status response with %d syncing bytes",
status.UnflushedBytes)
} else {
k.log.CDebugf(ctx, "No journal server, sending empty response")
}
return k.kbfsClient.FSSyncStatus(ctx, resp)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FSSyncStatusRequest",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"keybase1",
".",
"FSSyncStatusRequest",
")",
"(",
"err",
"error",
")",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"req",
")",
"\n\n",
"resp",
":=",
"keybase1",
".",
"FSSyncStatusArg",
"{",
"RequestID",
":",
"req",
".",
"RequestID",
"}",
"\n\n",
"// For now, just return the number of syncing bytes.",
"jManager",
",",
"err",
":=",
"GetJournalManager",
"(",
"k",
".",
"config",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"status",
",",
"_",
":=",
"jManager",
".",
"Status",
"(",
"ctx",
")",
"\n",
"resp",
".",
"Status",
".",
"TotalSyncingBytes",
"=",
"status",
".",
"UnflushedBytes",
"\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"status",
".",
"UnflushedBytes",
")",
"\n",
"}",
"else",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"k",
".",
"kbfsClient",
".",
"FSSyncStatus",
"(",
"ctx",
",",
"resp",
")",
"\n",
"}"
] | // FSSyncStatusRequest implements keybase1.NotifyFSRequestInterface for
// KeybaseServiceBase. | [
"FSSyncStatusRequest",
"implements",
"keybase1",
".",
"NotifyFSRequestInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1289-L1307 |
159,965 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamChangedByID | func (k *KeybaseServiceBase) TeamChangedByID(ctx context.Context,
arg keybase1.TeamChangedByIDArg) error {
k.log.CDebugf(ctx, "Flushing cache for team %s "+
"(membershipChange=%t, keyRotated=%t, renamed=%t)",
arg.TeamID, arg.Changes.MembershipChanged,
arg.Changes.KeyRotated, arg.Changes.Renamed)
k.setCachedTeamInfo(arg.TeamID, idutil.TeamInfo{})
if arg.Changes.Renamed {
k.config.KBFSOps().TeamNameChanged(ctx, arg.TeamID)
}
return nil
} | go | func (k *KeybaseServiceBase) TeamChangedByID(ctx context.Context,
arg keybase1.TeamChangedByIDArg) error {
k.log.CDebugf(ctx, "Flushing cache for team %s "+
"(membershipChange=%t, keyRotated=%t, renamed=%t)",
arg.TeamID, arg.Changes.MembershipChanged,
arg.Changes.KeyRotated, arg.Changes.Renamed)
k.setCachedTeamInfo(arg.TeamID, idutil.TeamInfo{})
if arg.Changes.Renamed {
k.config.KBFSOps().TeamNameChanged(ctx, arg.TeamID)
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"TeamChangedByID",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"TeamChangedByIDArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"arg",
".",
"TeamID",
",",
"arg",
".",
"Changes",
".",
"MembershipChanged",
",",
"arg",
".",
"Changes",
".",
"KeyRotated",
",",
"arg",
".",
"Changes",
".",
"Renamed",
")",
"\n",
"k",
".",
"setCachedTeamInfo",
"(",
"arg",
".",
"TeamID",
",",
"idutil",
".",
"TeamInfo",
"{",
"}",
")",
"\n\n",
"if",
"arg",
".",
"Changes",
".",
"Renamed",
"{",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"TeamNameChanged",
"(",
"ctx",
",",
"arg",
".",
"TeamID",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // TeamChangedByID implements keybase1.NotifyTeamInterface for
// KeybaseServiceBase. | [
"TeamChangedByID",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1311-L1323 |
159,966 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamChangedByName | func (k *KeybaseServiceBase) TeamChangedByName(ctx context.Context,
arg keybase1.TeamChangedByNameArg) error {
// ignore
return nil
} | go | func (k *KeybaseServiceBase) TeamChangedByName(ctx context.Context,
arg keybase1.TeamChangedByNameArg) error {
// ignore
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"TeamChangedByName",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"TeamChangedByNameArg",
")",
"error",
"{",
"// ignore",
"return",
"nil",
"\n",
"}"
] | // TeamChangedByName implements keybase1.NotifyTeamInterface for
// KeybaseServiceBase. | [
"TeamChangedByName",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1327-L1331 |
159,967 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamDeleted | func (k *KeybaseServiceBase) TeamDeleted(ctx context.Context,
teamID keybase1.TeamID) error {
return nil
} | go | func (k *KeybaseServiceBase) TeamDeleted(ctx context.Context,
teamID keybase1.TeamID) error {
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"TeamDeleted",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"error",
"{",
"return",
"nil",
"\n",
"}"
] | // TeamDeleted implements keybase1.NotifyTeamInterface for
// KeybaseServiceBase. | [
"TeamDeleted",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1335-L1338 |
159,968 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamAbandoned | func (k *KeybaseDaemonRPC) TeamAbandoned(
ctx context.Context, tid keybase1.TeamID) error {
k.log.CDebugf(ctx, "Implicit team %s abandoned", tid)
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
k.config.KBFSOps().TeamAbandoned(ctx, tid)
return nil
} | go | func (k *KeybaseDaemonRPC) TeamAbandoned(
ctx context.Context, tid keybase1.TeamID) error {
k.log.CDebugf(ctx, "Implicit team %s abandoned", tid)
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
k.config.KBFSOps().TeamAbandoned(ctx, tid)
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseDaemonRPC",
")",
"TeamAbandoned",
"(",
"ctx",
"context",
".",
"Context",
",",
"tid",
"keybase1",
".",
"TeamID",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tid",
")",
"\n",
"k",
".",
"setCachedTeamInfo",
"(",
"tid",
",",
"idutil",
".",
"TeamInfo",
"{",
"}",
")",
"\n",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"TeamAbandoned",
"(",
"ctx",
",",
"tid",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // TeamAbandoned implements keybase1.NotifyTeamInterface for KeybaseServiceBase. | [
"TeamAbandoned",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1352-L1358 |
159,969 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | AvatarUpdated | func (k *KeybaseDaemonRPC) AvatarUpdated(ctx context.Context,
arg keybase1.AvatarUpdatedArg) error {
return nil
} | go | func (k *KeybaseDaemonRPC) AvatarUpdated(ctx context.Context,
arg keybase1.AvatarUpdatedArg) error {
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseDaemonRPC",
")",
"AvatarUpdated",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"AvatarUpdatedArg",
")",
"error",
"{",
"return",
"nil",
"\n",
"}"
] | // AvatarUpdated implements keybase1.NotifyTeamInterface for KeybaseServiceBase. | [
"AvatarUpdated",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1361-L1364 |
159,970 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | StartMigration | func (k *KeybaseServiceBase) StartMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
mdServer := k.config.MDServer()
if mdServer == nil {
return errors.New("no mdserver")
}
// Making a favorite here to reuse the code that converts from
// `keybase1.FolderType` into `tlf.Type`.
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
return k.config.MDServer().StartImplicitTeamMigration(ctx, handle.TlfID())
} | go | func (k *KeybaseServiceBase) StartMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
mdServer := k.config.MDServer()
if mdServer == nil {
return errors.New("no mdserver")
}
// Making a favorite here to reuse the code that converts from
// `keybase1.FolderType` into `tlf.Type`.
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
return k.config.MDServer().StartImplicitTeamMigration(ctx, handle.TlfID())
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"StartMigration",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"(",
"err",
"error",
")",
"{",
"mdServer",
":=",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
"\n",
"if",
"mdServer",
"==",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"// Making a favorite here to reuse the code that converts from",
"// `keybase1.FolderType` into `tlf.Type`.",
"fav",
":=",
"favorites",
".",
"NewFolderFromProtocol",
"(",
"folder",
")",
"\n",
"handle",
",",
"err",
":=",
"GetHandleFromFolderNameAndType",
"(",
"ctx",
",",
"k",
".",
"config",
".",
"KBPKI",
"(",
")",
",",
"k",
".",
"config",
".",
"MDOps",
"(",
")",
",",
"k",
".",
"config",
",",
"fav",
".",
"Name",
",",
"fav",
".",
"Type",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
".",
"StartImplicitTeamMigration",
"(",
"ctx",
",",
"handle",
".",
"TlfID",
"(",
")",
")",
"\n",
"}"
] | // StartMigration implements keybase1.ImplicitTeamMigrationInterface for
// KeybaseServiceBase. | [
"StartMigration",
"implements",
"keybase1",
".",
"ImplicitTeamMigrationInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1368-L1383 |
159,971 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FinalizeMigration | func (k *KeybaseServiceBase) FinalizeMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
if handle.TypeForKeying() == tlf.TeamKeying {
// Clear the cache for this implicit team, to ensure we get
// all the latest key generations for the team info during the
// migration.
id := handle.FirstResolvedWriter()
if id.IsTeamOrSubteam() {
tid, err := id.AsTeam()
if err != nil {
return err
}
k.log.CDebugf(ctx, "Clearing team info for tid=%s, handle=%s",
tid, handle.GetCanonicalPath())
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
}
}
return k.config.KBFSOps().MigrateToImplicitTeam(ctx, handle.TlfID())
} | go | func (k *KeybaseServiceBase) FinalizeMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
if handle.TypeForKeying() == tlf.TeamKeying {
// Clear the cache for this implicit team, to ensure we get
// all the latest key generations for the team info during the
// migration.
id := handle.FirstResolvedWriter()
if id.IsTeamOrSubteam() {
tid, err := id.AsTeam()
if err != nil {
return err
}
k.log.CDebugf(ctx, "Clearing team info for tid=%s, handle=%s",
tid, handle.GetCanonicalPath())
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
}
}
return k.config.KBFSOps().MigrateToImplicitTeam(ctx, handle.TlfID())
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FinalizeMigration",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"(",
"err",
"error",
")",
"{",
"fav",
":=",
"favorites",
".",
"NewFolderFromProtocol",
"(",
"folder",
")",
"\n",
"handle",
",",
"err",
":=",
"GetHandleFromFolderNameAndType",
"(",
"ctx",
",",
"k",
".",
"config",
".",
"KBPKI",
"(",
")",
",",
"k",
".",
"config",
".",
"MDOps",
"(",
")",
",",
"k",
".",
"config",
",",
"fav",
".",
"Name",
",",
"fav",
".",
"Type",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"handle",
".",
"TypeForKeying",
"(",
")",
"==",
"tlf",
".",
"TeamKeying",
"{",
"// Clear the cache for this implicit team, to ensure we get",
"// all the latest key generations for the team info during the",
"// migration.",
"id",
":=",
"handle",
".",
"FirstResolvedWriter",
"(",
")",
"\n",
"if",
"id",
".",
"IsTeamOrSubteam",
"(",
")",
"{",
"tid",
",",
"err",
":=",
"id",
".",
"AsTeam",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tid",
",",
"handle",
".",
"GetCanonicalPath",
"(",
")",
")",
"\n",
"k",
".",
"setCachedTeamInfo",
"(",
"tid",
",",
"idutil",
".",
"TeamInfo",
"{",
"}",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"MigrateToImplicitTeam",
"(",
"ctx",
",",
"handle",
".",
"TlfID",
"(",
")",
")",
"\n",
"}"
] | // FinalizeMigration implements keybase1.ImplicitTeamMigrationInterface for
// KeybaseServiceBase. | [
"FinalizeMigration",
"implements",
"keybase1",
".",
"ImplicitTeamMigrationInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1387-L1411 |
159,972 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetTLFCryptKeys | func (k *KeybaseServiceBase) GetTLFCryptKeys(ctx context.Context,
query keybase1.TLFQuery) (res keybase1.GetTLFCryptKeysRes, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.GetTLFCryptKeysRes{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, false)
if err != nil {
return res, err
}
res.NameIDBreaks.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
keys, id, err := k.config.KBFSOps().GetTLFCryptKeys(ctx, tlfHandle)
if err != nil {
return res, err
}
res.NameIDBreaks.TlfID = keybase1.TLFID(id.String())
for i, key := range keys {
res.CryptKeys = append(res.CryptKeys, keybase1.CryptKey{
KeyGeneration: int(kbfsmd.FirstValidKeyGen) + i,
Key: keybase1.Bytes32(key.Data()),
})
}
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.NameIDBreaks.Breaks = tlfhandle.GetExtendedIdentify(ctx).
GetTlfBreakAndClose()
}
return res, nil
} | go | func (k *KeybaseServiceBase) GetTLFCryptKeys(ctx context.Context,
query keybase1.TLFQuery) (res keybase1.GetTLFCryptKeysRes, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.GetTLFCryptKeysRes{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, false)
if err != nil {
return res, err
}
res.NameIDBreaks.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
keys, id, err := k.config.KBFSOps().GetTLFCryptKeys(ctx, tlfHandle)
if err != nil {
return res, err
}
res.NameIDBreaks.TlfID = keybase1.TLFID(id.String())
for i, key := range keys {
res.CryptKeys = append(res.CryptKeys, keybase1.CryptKey{
KeyGeneration: int(kbfsmd.FirstValidKeyGen) + i,
Key: keybase1.Bytes32(key.Data()),
})
}
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.NameIDBreaks.Breaks = tlfhandle.GetExtendedIdentify(ctx).
GetTlfBreakAndClose()
}
return res, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetTLFCryptKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"query",
"keybase1",
".",
"TLFQuery",
")",
"(",
"res",
"keybase1",
".",
"GetTLFCryptKeysRes",
",",
"err",
"error",
")",
"{",
"if",
"ctx",
",",
"err",
"=",
"tlfhandle",
".",
"MakeExtendedIdentify",
"(",
"CtxWithRandomIDReplayable",
"(",
"ctx",
",",
"CtxKeybaseServiceIDKey",
",",
"CtxKeybaseServiceOpID",
",",
"k",
".",
"log",
")",
",",
"query",
".",
"IdentifyBehavior",
",",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"GetTLFCryptKeysRes",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"tlfHandle",
",",
"err",
":=",
"getHandleFromFolderName",
"(",
"ctx",
",",
"k",
".",
"config",
".",
"KBPKI",
"(",
")",
",",
"k",
".",
"config",
".",
"MDOps",
"(",
")",
",",
"k",
".",
"config",
",",
"query",
".",
"TlfName",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"res",
".",
"NameIDBreaks",
".",
"CanonicalName",
"=",
"keybase1",
".",
"CanonicalTlfName",
"(",
"tlfHandle",
".",
"GetCanonicalName",
"(",
")",
")",
"\n\n",
"keys",
",",
"id",
",",
"err",
":=",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"GetTLFCryptKeys",
"(",
"ctx",
",",
"tlfHandle",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"res",
".",
"NameIDBreaks",
".",
"TlfID",
"=",
"keybase1",
".",
"TLFID",
"(",
"id",
".",
"String",
"(",
")",
")",
"\n\n",
"for",
"i",
",",
"key",
":=",
"range",
"keys",
"{",
"res",
".",
"CryptKeys",
"=",
"append",
"(",
"res",
".",
"CryptKeys",
",",
"keybase1",
".",
"CryptKey",
"{",
"KeyGeneration",
":",
"int",
"(",
"kbfsmd",
".",
"FirstValidKeyGen",
")",
"+",
"i",
",",
"Key",
":",
"keybase1",
".",
"Bytes32",
"(",
"key",
".",
"Data",
"(",
")",
")",
",",
"}",
")",
"\n",
"}",
"\n\n",
"if",
"query",
".",
"IdentifyBehavior",
".",
"WarningInsteadOfErrorOnBrokenTracks",
"(",
")",
"{",
"res",
".",
"NameIDBreaks",
".",
"Breaks",
"=",
"tlfhandle",
".",
"GetExtendedIdentify",
"(",
"ctx",
")",
".",
"GetTlfBreakAndClose",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // GetTLFCryptKeys implements the TlfKeysInterface interface for
// KeybaseServiceBase. | [
"GetTLFCryptKeys",
"implements",
"the",
"TlfKeysInterface",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1415-L1453 |
159,973 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetPublicCanonicalTLFNameAndID | func (k *KeybaseServiceBase) GetPublicCanonicalTLFNameAndID(
ctx context.Context, query keybase1.TLFQuery) (
res keybase1.CanonicalTLFNameAndIDWithBreaks, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.CanonicalTLFNameAndIDWithBreaks{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName,
true /* public */)
if err != nil {
return res, err
}
res.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
id, err := k.config.KBFSOps().GetTLFID(ctx, tlfHandle)
if err != nil {
return res, err
}
res.TlfID = keybase1.TLFID(id.String())
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.Breaks = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose()
}
return res, nil
} | go | func (k *KeybaseServiceBase) GetPublicCanonicalTLFNameAndID(
ctx context.Context, query keybase1.TLFQuery) (
res keybase1.CanonicalTLFNameAndIDWithBreaks, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.CanonicalTLFNameAndIDWithBreaks{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName,
true /* public */)
if err != nil {
return res, err
}
res.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
id, err := k.config.KBFSOps().GetTLFID(ctx, tlfHandle)
if err != nil {
return res, err
}
res.TlfID = keybase1.TLFID(id.String())
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.Breaks = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose()
}
return res, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetPublicCanonicalTLFNameAndID",
"(",
"ctx",
"context",
".",
"Context",
",",
"query",
"keybase1",
".",
"TLFQuery",
")",
"(",
"res",
"keybase1",
".",
"CanonicalTLFNameAndIDWithBreaks",
",",
"err",
"error",
")",
"{",
"if",
"ctx",
",",
"err",
"=",
"tlfhandle",
".",
"MakeExtendedIdentify",
"(",
"CtxWithRandomIDReplayable",
"(",
"ctx",
",",
"CtxKeybaseServiceIDKey",
",",
"CtxKeybaseServiceOpID",
",",
"k",
".",
"log",
")",
",",
"query",
".",
"IdentifyBehavior",
",",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"CanonicalTLFNameAndIDWithBreaks",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"tlfHandle",
",",
"err",
":=",
"getHandleFromFolderName",
"(",
"ctx",
",",
"k",
".",
"config",
".",
"KBPKI",
"(",
")",
",",
"k",
".",
"config",
".",
"MDOps",
"(",
")",
",",
"k",
".",
"config",
",",
"query",
".",
"TlfName",
",",
"true",
"/* public */",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"res",
".",
"CanonicalName",
"=",
"keybase1",
".",
"CanonicalTlfName",
"(",
"tlfHandle",
".",
"GetCanonicalName",
"(",
")",
")",
"\n\n",
"id",
",",
"err",
":=",
"k",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"GetTLFID",
"(",
"ctx",
",",
"tlfHandle",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"res",
".",
"TlfID",
"=",
"keybase1",
".",
"TLFID",
"(",
"id",
".",
"String",
"(",
")",
")",
"\n\n",
"if",
"query",
".",
"IdentifyBehavior",
".",
"WarningInsteadOfErrorOnBrokenTracks",
"(",
")",
"{",
"res",
".",
"Breaks",
"=",
"tlfhandle",
".",
"GetExtendedIdentify",
"(",
"ctx",
")",
".",
"GetTlfBreakAndClose",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // GetPublicCanonicalTLFNameAndID implements the TlfKeysInterface interface for
// KeybaseServiceBase. | [
"GetPublicCanonicalTLFNameAndID",
"implements",
"the",
"TlfKeysInterface",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1457-L1489 |
159,974 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | EstablishMountDir | func (k *KeybaseServiceBase) EstablishMountDir(ctx context.Context) (
string, error) {
dir, err := k.kbfsMountClient.GetCurrentMountDir(ctx)
if err != nil {
k.log.CInfof(ctx, "GetCurrentMountDir fails - ", err)
return "", err
}
if dir == "" {
dirs, err := k.kbfsMountClient.GetAllAvailableMountDirs(ctx)
if err != nil {
k.log.CInfof(ctx, "GetAllAvailableMountDirs fails - ", err)
return "", err
}
dir, err = chooseDefaultMount(ctx, dirs, k.log)
if err != nil {
k.log.CInfof(ctx, "chooseDefaultMount fails - ", err)
return "", err
}
err2 := k.kbfsMountClient.SetCurrentMountDir(ctx, dir)
if err2 != nil {
k.log.CInfof(ctx, "SetCurrentMountDir fails - ", err2)
}
// Continue mounting even if we can't save the mount
k.log.CDebugf(ctx, "Choosing mountdir %s from %v", dir, dirs)
}
return dir, err
} | go | func (k *KeybaseServiceBase) EstablishMountDir(ctx context.Context) (
string, error) {
dir, err := k.kbfsMountClient.GetCurrentMountDir(ctx)
if err != nil {
k.log.CInfof(ctx, "GetCurrentMountDir fails - ", err)
return "", err
}
if dir == "" {
dirs, err := k.kbfsMountClient.GetAllAvailableMountDirs(ctx)
if err != nil {
k.log.CInfof(ctx, "GetAllAvailableMountDirs fails - ", err)
return "", err
}
dir, err = chooseDefaultMount(ctx, dirs, k.log)
if err != nil {
k.log.CInfof(ctx, "chooseDefaultMount fails - ", err)
return "", err
}
err2 := k.kbfsMountClient.SetCurrentMountDir(ctx, dir)
if err2 != nil {
k.log.CInfof(ctx, "SetCurrentMountDir fails - ", err2)
}
// Continue mounting even if we can't save the mount
k.log.CDebugf(ctx, "Choosing mountdir %s from %v", dir, dirs)
}
return dir, err
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"EstablishMountDir",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"string",
",",
"error",
")",
"{",
"dir",
",",
"err",
":=",
"k",
".",
"kbfsMountClient",
".",
"GetCurrentMountDir",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"k",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"if",
"dir",
"==",
"\"",
"\"",
"{",
"dirs",
",",
"err",
":=",
"k",
".",
"kbfsMountClient",
".",
"GetAllAvailableMountDirs",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"k",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"dir",
",",
"err",
"=",
"chooseDefaultMount",
"(",
"ctx",
",",
"dirs",
",",
"k",
".",
"log",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"k",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"err2",
":=",
"k",
".",
"kbfsMountClient",
".",
"SetCurrentMountDir",
"(",
"ctx",
",",
"dir",
")",
"\n",
"if",
"err2",
"!=",
"nil",
"{",
"k",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err2",
")",
"\n",
"}",
"\n",
"// Continue mounting even if we can't save the mount",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"dir",
",",
"dirs",
")",
"\n",
"}",
"\n",
"return",
"dir",
",",
"err",
"\n",
"}"
] | // EstablishMountDir asks the service for the current mount path | [
"EstablishMountDir",
"asks",
"the",
"service",
"for",
"the",
"current",
"mount",
"path"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1492-L1518 |
159,975 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | PutGitMetadata | func (k *KeybaseServiceBase) PutGitMetadata(
ctx context.Context, folder keybase1.Folder, repoID keybase1.RepoID,
metadata keybase1.GitLocalMetadata) error {
return k.gitClient.PutGitMetadata(ctx, keybase1.PutGitMetadataArg{
Folder: folder,
RepoID: repoID,
Metadata: metadata,
})
} | go | func (k *KeybaseServiceBase) PutGitMetadata(
ctx context.Context, folder keybase1.Folder, repoID keybase1.RepoID,
metadata keybase1.GitLocalMetadata) error {
return k.gitClient.PutGitMetadata(ctx, keybase1.PutGitMetadataArg{
Folder: folder,
RepoID: repoID,
Metadata: metadata,
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"PutGitMetadata",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
",",
"repoID",
"keybase1",
".",
"RepoID",
",",
"metadata",
"keybase1",
".",
"GitLocalMetadata",
")",
"error",
"{",
"return",
"k",
".",
"gitClient",
".",
"PutGitMetadata",
"(",
"ctx",
",",
"keybase1",
".",
"PutGitMetadataArg",
"{",
"Folder",
":",
"folder",
",",
"RepoID",
":",
"repoID",
",",
"Metadata",
":",
"metadata",
",",
"}",
")",
"\n",
"}"
] | // PutGitMetadata implements the KeybaseService interface for
// KeybaseServiceBase. | [
"PutGitMetadata",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1522-L1530 |
159,976 | keybase/client | go/kbfs/libkbfs/merkle_root.go | NewEventuallyConsistentMerkleRoot | func NewEventuallyConsistentMerkleRoot(
config Config, getter idutil.MerkleRootGetter) *EventuallyConsistentMerkleRoot {
ecmr := &EventuallyConsistentMerkleRoot{
config: config,
log: config.MakeLogger(ECMRID),
getter: getter,
}
ecmr.fetcher = newFetchDecider(
ecmr.log, config.MakeVLogger(ecmr.log), ecmr.getAndCache,
ECMRCtxTagKey{}, ECMRID, ecmr.config)
return ecmr
} | go | func NewEventuallyConsistentMerkleRoot(
config Config, getter idutil.MerkleRootGetter) *EventuallyConsistentMerkleRoot {
ecmr := &EventuallyConsistentMerkleRoot{
config: config,
log: config.MakeLogger(ECMRID),
getter: getter,
}
ecmr.fetcher = newFetchDecider(
ecmr.log, config.MakeVLogger(ecmr.log), ecmr.getAndCache,
ECMRCtxTagKey{}, ECMRID, ecmr.config)
return ecmr
} | [
"func",
"NewEventuallyConsistentMerkleRoot",
"(",
"config",
"Config",
",",
"getter",
"idutil",
".",
"MerkleRootGetter",
")",
"*",
"EventuallyConsistentMerkleRoot",
"{",
"ecmr",
":=",
"&",
"EventuallyConsistentMerkleRoot",
"{",
"config",
":",
"config",
",",
"log",
":",
"config",
".",
"MakeLogger",
"(",
"ECMRID",
")",
",",
"getter",
":",
"getter",
",",
"}",
"\n",
"ecmr",
".",
"fetcher",
"=",
"newFetchDecider",
"(",
"ecmr",
".",
"log",
",",
"config",
".",
"MakeVLogger",
"(",
"ecmr",
".",
"log",
")",
",",
"ecmr",
".",
"getAndCache",
",",
"ECMRCtxTagKey",
"{",
"}",
",",
"ECMRID",
",",
"ecmr",
".",
"config",
")",
"\n",
"return",
"ecmr",
"\n",
"}"
] | // NewEventuallyConsistentMerkleRoot creates a new
// EventuallyConsistentMerkleRoot object. | [
"NewEventuallyConsistentMerkleRoot",
"creates",
"a",
"new",
"EventuallyConsistentMerkleRoot",
"object",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/merkle_root.go#L48-L59 |
159,977 | keybase/client | go/kbfs/libkbfs/merkle_root.go | Get | func (ecmr *EventuallyConsistentMerkleRoot) Get(
ctx context.Context, bgTolerance, blockTolerance time.Duration) (
timestamp time.Time, root keybase1.MerkleRootV2,
rootTime time.Time, err error) {
c := ecmr.getCached()
err = ecmr.fetcher.Do(ctx, bgTolerance, blockTolerance, c.timestamp)
if err != nil {
return time.Time{}, keybase1.MerkleRootV2{}, time.Time{}, err
}
c = ecmr.getCached()
return c.timestamp, c.root, c.rootTime, nil
} | go | func (ecmr *EventuallyConsistentMerkleRoot) Get(
ctx context.Context, bgTolerance, blockTolerance time.Duration) (
timestamp time.Time, root keybase1.MerkleRootV2,
rootTime time.Time, err error) {
c := ecmr.getCached()
err = ecmr.fetcher.Do(ctx, bgTolerance, blockTolerance, c.timestamp)
if err != nil {
return time.Time{}, keybase1.MerkleRootV2{}, time.Time{}, err
}
c = ecmr.getCached()
return c.timestamp, c.root, c.rootTime, nil
} | [
"func",
"(",
"ecmr",
"*",
"EventuallyConsistentMerkleRoot",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"bgTolerance",
",",
"blockTolerance",
"time",
".",
"Duration",
")",
"(",
"timestamp",
"time",
".",
"Time",
",",
"root",
"keybase1",
".",
"MerkleRootV2",
",",
"rootTime",
"time",
".",
"Time",
",",
"err",
"error",
")",
"{",
"c",
":=",
"ecmr",
".",
"getCached",
"(",
")",
"\n",
"err",
"=",
"ecmr",
".",
"fetcher",
".",
"Do",
"(",
"ctx",
",",
"bgTolerance",
",",
"blockTolerance",
",",
"c",
".",
"timestamp",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"time",
".",
"Time",
"{",
"}",
",",
"keybase1",
".",
"MerkleRootV2",
"{",
"}",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"c",
"=",
"ecmr",
".",
"getCached",
"(",
")",
"\n",
"return",
"c",
".",
"timestamp",
",",
"c",
".",
"root",
",",
"c",
".",
"rootTime",
",",
"nil",
"\n",
"}"
] | // Get returns the current merkle root, and the server timestamp of
// that root. To help avoid having too frequent calls into the API
// server, caller can provide a positive tolerance, to accept stale
// LimitBytes and UsageBytes data. If tolerance is 0 or negative, this
// always makes a blocking RPC to bserver and return latest quota
// usage.
//
// 1) If the age of cached data is more than blockTolerance, a blocking RPC is
// issued and the function only returns after RPC finishes, with the newest
// data from RPC. The RPC causes cached data to be refreshed as well.
// 2) Otherwise, if the age of cached data is more than bgTolerance,
// a background RPC is spawned to refresh cached data, and the stale
// data is returned immediately.
// 3) Otherwise, the cached stale data is returned immediately. | [
"Get",
"returns",
"the",
"current",
"merkle",
"root",
"and",
"the",
"server",
"timestamp",
"of",
"that",
"root",
".",
"To",
"help",
"avoid",
"having",
"too",
"frequent",
"calls",
"into",
"the",
"API",
"server",
"caller",
"can",
"provide",
"a",
"positive",
"tolerance",
"to",
"accept",
"stale",
"LimitBytes",
"and",
"UsageBytes",
"data",
".",
"If",
"tolerance",
"is",
"0",
"or",
"negative",
"this",
"always",
"makes",
"a",
"blocking",
"RPC",
"to",
"bserver",
"and",
"return",
"latest",
"quota",
"usage",
".",
"1",
")",
"If",
"the",
"age",
"of",
"cached",
"data",
"is",
"more",
"than",
"blockTolerance",
"a",
"blocking",
"RPC",
"is",
"issued",
"and",
"the",
"function",
"only",
"returns",
"after",
"RPC",
"finishes",
"with",
"the",
"newest",
"data",
"from",
"RPC",
".",
"The",
"RPC",
"causes",
"cached",
"data",
"to",
"be",
"refreshed",
"as",
"well",
".",
"2",
")",
"Otherwise",
"if",
"the",
"age",
"of",
"cached",
"data",
"is",
"more",
"than",
"bgTolerance",
"a",
"background",
"RPC",
"is",
"spawned",
"to",
"refresh",
"cached",
"data",
"and",
"the",
"stale",
"data",
"is",
"returned",
"immediately",
".",
"3",
")",
"Otherwise",
"the",
"cached",
"stale",
"data",
"is",
"returned",
"immediately",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/merkle_root.go#L100-L111 |
159,978 | keybase/client | go/libkb/chain_link.go | checkSpecialLinksTable | func (c ChainLink) checkSpecialLinksTable(tab map[keybase1.LinkID]SpecialChainLink, uid keybase1.UID, why string) (found bool, reason string, err error) {
var scl SpecialChainLink
// The combination of hashVerified and chainVerified should ensure that this link
// is only considered here after all prevs have been successfully checked.
if !c.canTrustID() {
return false, "", ChainLinkError{fmt.Sprintf("cannot check if a link is %q without a verified link ID (linkID=%s, uid=%s, hash=%v, chain=%v, diskVersion=%d)", why, c.id, uid, c.hashVerified, c.chainVerified, c.diskVersion)}
}
scl, found = tab[c.LinkID().Export()]
if !found {
return false, "", nil
}
if !c.GetSeqno().Eq(scl.Seqno) {
return false, "", NewChainLinkWrongSeqnoError(fmt.Sprintf("malicious bad link in from server has wrong seqno in %q check: %d != %d", why, c.GetSeqno(), scl.Seqno))
}
if !scl.UID.Equal(uid) {
return false, "", NewUIDMismatchError(fmt.Sprintf("malicious bad link from server in %q check; UID %s != %s", why, scl.UID, uid))
}
return true, scl.Reason, nil
} | go | func (c ChainLink) checkSpecialLinksTable(tab map[keybase1.LinkID]SpecialChainLink, uid keybase1.UID, why string) (found bool, reason string, err error) {
var scl SpecialChainLink
// The combination of hashVerified and chainVerified should ensure that this link
// is only considered here after all prevs have been successfully checked.
if !c.canTrustID() {
return false, "", ChainLinkError{fmt.Sprintf("cannot check if a link is %q without a verified link ID (linkID=%s, uid=%s, hash=%v, chain=%v, diskVersion=%d)", why, c.id, uid, c.hashVerified, c.chainVerified, c.diskVersion)}
}
scl, found = tab[c.LinkID().Export()]
if !found {
return false, "", nil
}
if !c.GetSeqno().Eq(scl.Seqno) {
return false, "", NewChainLinkWrongSeqnoError(fmt.Sprintf("malicious bad link in from server has wrong seqno in %q check: %d != %d", why, c.GetSeqno(), scl.Seqno))
}
if !scl.UID.Equal(uid) {
return false, "", NewUIDMismatchError(fmt.Sprintf("malicious bad link from server in %q check; UID %s != %s", why, scl.UID, uid))
}
return true, scl.Reason, nil
} | [
"func",
"(",
"c",
"ChainLink",
")",
"checkSpecialLinksTable",
"(",
"tab",
"map",
"[",
"keybase1",
".",
"LinkID",
"]",
"SpecialChainLink",
",",
"uid",
"keybase1",
".",
"UID",
",",
"why",
"string",
")",
"(",
"found",
"bool",
",",
"reason",
"string",
",",
"err",
"error",
")",
"{",
"var",
"scl",
"SpecialChainLink",
"\n\n",
"// The combination of hashVerified and chainVerified should ensure that this link",
"// is only considered here after all prevs have been successfully checked.",
"if",
"!",
"c",
".",
"canTrustID",
"(",
")",
"{",
"return",
"false",
",",
"\"",
"\"",
",",
"ChainLinkError",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"why",
",",
"c",
".",
"id",
",",
"uid",
",",
"c",
".",
"hashVerified",
",",
"c",
".",
"chainVerified",
",",
"c",
".",
"diskVersion",
")",
"}",
"\n",
"}",
"\n\n",
"scl",
",",
"found",
"=",
"tab",
"[",
"c",
".",
"LinkID",
"(",
")",
".",
"Export",
"(",
")",
"]",
"\n",
"if",
"!",
"found",
"{",
"return",
"false",
",",
"\"",
"\"",
",",
"nil",
"\n",
"}",
"\n",
"if",
"!",
"c",
".",
"GetSeqno",
"(",
")",
".",
"Eq",
"(",
"scl",
".",
"Seqno",
")",
"{",
"return",
"false",
",",
"\"",
"\"",
",",
"NewChainLinkWrongSeqnoError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"why",
",",
"c",
".",
"GetSeqno",
"(",
")",
",",
"scl",
".",
"Seqno",
")",
")",
"\n",
"}",
"\n",
"if",
"!",
"scl",
".",
"UID",
".",
"Equal",
"(",
"uid",
")",
"{",
"return",
"false",
",",
"\"",
"\"",
",",
"NewUIDMismatchError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"why",
",",
"scl",
".",
"UID",
",",
"uid",
")",
")",
"\n",
"}",
"\n",
"return",
"true",
",",
"scl",
".",
"Reason",
",",
"nil",
"\n",
"}"
] | // See NCC-KB2018-006 | [
"See",
"NCC",
"-",
"KB2018",
"-",
"006"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L245-L265 |
159,979 | keybase/client | go/libkb/chain_link.go | ToMerkleTriple | func (c ChainLink) ToMerkleTriple() *MerkleTriple {
if c.IsStubbed() {
return nil
}
return &MerkleTriple{
Seqno: c.GetSeqno(),
LinkID: c.id,
SigID: c.GetSigID(),
}
} | go | func (c ChainLink) ToMerkleTriple() *MerkleTriple {
if c.IsStubbed() {
return nil
}
return &MerkleTriple{
Seqno: c.GetSeqno(),
LinkID: c.id,
SigID: c.GetSigID(),
}
} | [
"func",
"(",
"c",
"ChainLink",
")",
"ToMerkleTriple",
"(",
")",
"*",
"MerkleTriple",
"{",
"if",
"c",
".",
"IsStubbed",
"(",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"return",
"&",
"MerkleTriple",
"{",
"Seqno",
":",
"c",
".",
"GetSeqno",
"(",
")",
",",
"LinkID",
":",
"c",
".",
"id",
",",
"SigID",
":",
"c",
".",
"GetSigID",
"(",
")",
",",
"}",
"\n",
"}"
] | // ToLinkSummary converts a ChainLink into a MerkleTriple object. | [
"ToLinkSummary",
"converts",
"a",
"ChainLink",
"into",
"a",
"MerkleTriple",
"object",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L1482-L1491 |
159,980 | keybase/client | go/libkb/chain_link.go | IsHighUserLink | func (c ChainLink) IsHighUserLink(mctx MetaContext, uid keybase1.UID) (bool, error) {
v2Type, err := c.GetSigchainV2Type()
if err != nil {
return false, err
}
hardcodedEldest := false
if c.GetSeqno() > 1 {
prevLink := c.parent.GetLinkFromSeqno(c.GetSeqno() - 1)
if prevLink == nil {
return false, ChainLinkWrongSeqnoError{}
}
hardcodedEldest, err = isSubchainStart(mctx, &c, prevLink, uid)
if err != nil {
return false, err
}
}
isFirstLink := v2Type == SigchainV2TypeEldest || c.GetSeqno() == 1 || hardcodedEldest
isNewHighLink := isFirstLink ||
v2Type == SigchainV2TypeRevoke ||
v2Type == SigchainV2TypeWebServiceBindingWithRevoke ||
v2Type == SigchainV2TypeCryptocurrencyWithRevoke ||
v2Type == SigchainV2TypeSibkey ||
v2Type == SigchainV2TypePGPUpdate
return isNewHighLink, nil
} | go | func (c ChainLink) IsHighUserLink(mctx MetaContext, uid keybase1.UID) (bool, error) {
v2Type, err := c.GetSigchainV2Type()
if err != nil {
return false, err
}
hardcodedEldest := false
if c.GetSeqno() > 1 {
prevLink := c.parent.GetLinkFromSeqno(c.GetSeqno() - 1)
if prevLink == nil {
return false, ChainLinkWrongSeqnoError{}
}
hardcodedEldest, err = isSubchainStart(mctx, &c, prevLink, uid)
if err != nil {
return false, err
}
}
isFirstLink := v2Type == SigchainV2TypeEldest || c.GetSeqno() == 1 || hardcodedEldest
isNewHighLink := isFirstLink ||
v2Type == SigchainV2TypeRevoke ||
v2Type == SigchainV2TypeWebServiceBindingWithRevoke ||
v2Type == SigchainV2TypeCryptocurrencyWithRevoke ||
v2Type == SigchainV2TypeSibkey ||
v2Type == SigchainV2TypePGPUpdate
return isNewHighLink, nil
} | [
"func",
"(",
"c",
"ChainLink",
")",
"IsHighUserLink",
"(",
"mctx",
"MetaContext",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"bool",
",",
"error",
")",
"{",
"v2Type",
",",
"err",
":=",
"c",
".",
"GetSigchainV2Type",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"hardcodedEldest",
":=",
"false",
"\n",
"if",
"c",
".",
"GetSeqno",
"(",
")",
">",
"1",
"{",
"prevLink",
":=",
"c",
".",
"parent",
".",
"GetLinkFromSeqno",
"(",
"c",
".",
"GetSeqno",
"(",
")",
"-",
"1",
")",
"\n",
"if",
"prevLink",
"==",
"nil",
"{",
"return",
"false",
",",
"ChainLinkWrongSeqnoError",
"{",
"}",
"\n",
"}",
"\n",
"hardcodedEldest",
",",
"err",
"=",
"isSubchainStart",
"(",
"mctx",
",",
"&",
"c",
",",
"prevLink",
",",
"uid",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"isFirstLink",
":=",
"v2Type",
"==",
"SigchainV2TypeEldest",
"||",
"c",
".",
"GetSeqno",
"(",
")",
"==",
"1",
"||",
"hardcodedEldest",
"\n",
"isNewHighLink",
":=",
"isFirstLink",
"||",
"v2Type",
"==",
"SigchainV2TypeRevoke",
"||",
"v2Type",
"==",
"SigchainV2TypeWebServiceBindingWithRevoke",
"||",
"v2Type",
"==",
"SigchainV2TypeCryptocurrencyWithRevoke",
"||",
"v2Type",
"==",
"SigchainV2TypeSibkey",
"||",
"v2Type",
"==",
"SigchainV2TypePGPUpdate",
"\n",
"return",
"isNewHighLink",
",",
"nil",
"\n",
"}"
] | // IsHighUserLink determines whether a chainlink counts as "high" in a user's chain,
// which is defined as an Eldest link, a link with seqno=1, a link that is Sibkey,
// PGPUpdate, Revoke, or any link that is revoking. | [
"IsHighUserLink",
"determines",
"whether",
"a",
"chainlink",
"counts",
"as",
"high",
"in",
"a",
"user",
"s",
"chain",
"which",
"is",
"defined",
"as",
"an",
"Eldest",
"link",
"a",
"link",
"with",
"seqno",
"=",
"1",
"a",
"link",
"that",
"is",
"Sibkey",
"PGPUpdate",
"Revoke",
"or",
"any",
"link",
"that",
"is",
"revoking",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L1545-L1571 |
159,981 | keybase/client | go/teams/teams.go | ApplicationKey | func (t *Team) ApplicationKey(ctx context.Context, application keybase1.TeamApplication) (keybase1.TeamApplicationKey, error) {
latestGen := t.chain().GetLatestGeneration()
return t.ApplicationKeyAtGeneration(ctx, application, latestGen)
} | go | func (t *Team) ApplicationKey(ctx context.Context, application keybase1.TeamApplication) (keybase1.TeamApplicationKey, error) {
latestGen := t.chain().GetLatestGeneration()
return t.ApplicationKeyAtGeneration(ctx, application, latestGen)
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"ApplicationKey",
"(",
"ctx",
"context",
".",
"Context",
",",
"application",
"keybase1",
".",
"TeamApplication",
")",
"(",
"keybase1",
".",
"TeamApplicationKey",
",",
"error",
")",
"{",
"latestGen",
":=",
"t",
".",
"chain",
"(",
")",
".",
"GetLatestGeneration",
"(",
")",
"\n",
"return",
"t",
".",
"ApplicationKeyAtGeneration",
"(",
"ctx",
",",
"application",
",",
"latestGen",
")",
"\n",
"}"
] | // ApplicationKey returns the most recent key for an application. | [
"ApplicationKey",
"returns",
"the",
"most",
"recent",
"key",
"for",
"an",
"application",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L429-L432 |
159,982 | keybase/client | go/teams/teams.go | InviteMember | func (t *Team) InviteMember(ctx context.Context, username string, role keybase1.TeamRole, resolvedUsername libkb.NormalizedUsername, uv keybase1.UserVersion) (keybase1.TeamAddMemberResult, error) {
// if a user version was previously loaded, then there is a keybase user for username, but
// without a PUK or without any keys.
if uv.Uid.Exists() {
return t.inviteKeybaseMember(ctx, uv, role, resolvedUsername)
}
// If a social, or email, or other type of invite, assert it's not an owner.
if role.IsOrAbove(keybase1.TeamRole_OWNER) {
return keybase1.TeamAddMemberResult{}, errors.New("You cannot invite an owner to a team.")
}
return t.inviteSBSMember(ctx, username, role)
} | go | func (t *Team) InviteMember(ctx context.Context, username string, role keybase1.TeamRole, resolvedUsername libkb.NormalizedUsername, uv keybase1.UserVersion) (keybase1.TeamAddMemberResult, error) {
// if a user version was previously loaded, then there is a keybase user for username, but
// without a PUK or without any keys.
if uv.Uid.Exists() {
return t.inviteKeybaseMember(ctx, uv, role, resolvedUsername)
}
// If a social, or email, or other type of invite, assert it's not an owner.
if role.IsOrAbove(keybase1.TeamRole_OWNER) {
return keybase1.TeamAddMemberResult{}, errors.New("You cannot invite an owner to a team.")
}
return t.inviteSBSMember(ctx, username, role)
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"InviteMember",
"(",
"ctx",
"context",
".",
"Context",
",",
"username",
"string",
",",
"role",
"keybase1",
".",
"TeamRole",
",",
"resolvedUsername",
"libkb",
".",
"NormalizedUsername",
",",
"uv",
"keybase1",
".",
"UserVersion",
")",
"(",
"keybase1",
".",
"TeamAddMemberResult",
",",
"error",
")",
"{",
"// if a user version was previously loaded, then there is a keybase user for username, but",
"// without a PUK or without any keys.",
"if",
"uv",
".",
"Uid",
".",
"Exists",
"(",
")",
"{",
"return",
"t",
".",
"inviteKeybaseMember",
"(",
"ctx",
",",
"uv",
",",
"role",
",",
"resolvedUsername",
")",
"\n",
"}",
"\n\n",
"// If a social, or email, or other type of invite, assert it's not an owner.",
"if",
"role",
".",
"IsOrAbove",
"(",
"keybase1",
".",
"TeamRole_OWNER",
")",
"{",
"return",
"keybase1",
".",
"TeamAddMemberResult",
"{",
"}",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"t",
".",
"inviteSBSMember",
"(",
"ctx",
",",
"username",
",",
"role",
")",
"\n",
"}"
] | // If uv.Uid is set, then username is ignored.
// Otherwise resolvedUsername and uv are ignored. | [
"If",
"uv",
".",
"Uid",
"is",
"set",
"then",
"username",
"is",
"ignored",
".",
"Otherwise",
"resolvedUsername",
"and",
"uv",
"are",
"ignored",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L908-L921 |
159,983 | keybase/client | go/teams/teams.go | ForceMerkleRootUpdate | func (t *Team) ForceMerkleRootUpdate(ctx context.Context) error {
return ForceMerkleRootUpdateByTeamID(t.MetaContext(ctx), t.ID)
} | go | func (t *Team) ForceMerkleRootUpdate(ctx context.Context) error {
return ForceMerkleRootUpdateByTeamID(t.MetaContext(ctx), t.ID)
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"ForceMerkleRootUpdate",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"return",
"ForceMerkleRootUpdateByTeamID",
"(",
"t",
".",
"MetaContext",
"(",
"ctx",
")",
",",
"t",
".",
"ID",
")",
"\n",
"}"
] | // ForceMerkleRootUpdate will call LookupTeam on MerkleClient to
// update cached merkle root to include latest team sigs. Needed if
// client wants to create a signature that refers to an adminship,
// signature's merkle_root has to be more fresh than adminship's. | [
"ForceMerkleRootUpdate",
"will",
"call",
"LookupTeam",
"on",
"MerkleClient",
"to",
"update",
"cached",
"merkle",
"root",
"to",
"include",
"latest",
"team",
"sigs",
".",
"Needed",
"if",
"client",
"wants",
"to",
"create",
"a",
"signature",
"that",
"refers",
"to",
"an",
"adminship",
"signature",
"s",
"merkle_root",
"has",
"to",
"be",
"more",
"fresh",
"than",
"adminship",
"s",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L1668-L1670 |
159,984 | keybase/client | go/teams/teams.go | AllAdmins | func (t *Team) AllAdmins(ctx context.Context) ([]keybase1.UserVersion, error) {
set := make(map[keybase1.UserVersion]bool)
owners, err := t.UsersWithRole(keybase1.TeamRole_OWNER)
if err != nil {
return nil, err
}
for _, m := range owners {
set[m] = true
}
admins, err := t.UsersWithRole(keybase1.TeamRole_ADMIN)
if err != nil {
return nil, err
}
for _, m := range admins {
set[m] = true
}
if t.IsSubteam() {
imp, err := t.G().GetTeamLoader().ImplicitAdmins(ctx, t.ID)
if err != nil {
return nil, err
}
for _, m := range imp {
set[m] = true
}
}
var all []keybase1.UserVersion
for uv := range set {
all = append(all, uv)
}
return all, nil
} | go | func (t *Team) AllAdmins(ctx context.Context) ([]keybase1.UserVersion, error) {
set := make(map[keybase1.UserVersion]bool)
owners, err := t.UsersWithRole(keybase1.TeamRole_OWNER)
if err != nil {
return nil, err
}
for _, m := range owners {
set[m] = true
}
admins, err := t.UsersWithRole(keybase1.TeamRole_ADMIN)
if err != nil {
return nil, err
}
for _, m := range admins {
set[m] = true
}
if t.IsSubteam() {
imp, err := t.G().GetTeamLoader().ImplicitAdmins(ctx, t.ID)
if err != nil {
return nil, err
}
for _, m := range imp {
set[m] = true
}
}
var all []keybase1.UserVersion
for uv := range set {
all = append(all, uv)
}
return all, nil
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"AllAdmins",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"keybase1",
".",
"UserVersion",
",",
"error",
")",
"{",
"set",
":=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UserVersion",
"]",
"bool",
")",
"\n\n",
"owners",
",",
"err",
":=",
"t",
".",
"UsersWithRole",
"(",
"keybase1",
".",
"TeamRole_OWNER",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"for",
"_",
",",
"m",
":=",
"range",
"owners",
"{",
"set",
"[",
"m",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"admins",
",",
"err",
":=",
"t",
".",
"UsersWithRole",
"(",
"keybase1",
".",
"TeamRole_ADMIN",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"for",
"_",
",",
"m",
":=",
"range",
"admins",
"{",
"set",
"[",
"m",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"if",
"t",
".",
"IsSubteam",
"(",
")",
"{",
"imp",
",",
"err",
":=",
"t",
".",
"G",
"(",
")",
".",
"GetTeamLoader",
"(",
")",
".",
"ImplicitAdmins",
"(",
"ctx",
",",
"t",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"for",
"_",
",",
"m",
":=",
"range",
"imp",
"{",
"set",
"[",
"m",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"var",
"all",
"[",
"]",
"keybase1",
".",
"UserVersion",
"\n",
"for",
"uv",
":=",
"range",
"set",
"{",
"all",
"=",
"append",
"(",
"all",
",",
"uv",
")",
"\n",
"}",
"\n",
"return",
"all",
",",
"nil",
"\n",
"}"
] | // All admins, owners, and implicit admins of this team. | [
"All",
"admins",
"owners",
"and",
"implicit",
"admins",
"of",
"this",
"team",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L1678-L1712 |
159,985 | keybase/client | go/teams/teams.go | notify | func (t *Team) notify(ctx context.Context, changes keybase1.TeamChangeSet, latestSeqno keybase1.Seqno) error {
changes.KeyRotated = changes.KeyRotated || t.rotated
m := libkb.NewMetaContext(ctx, t.G())
var err error
if latestSeqno > 0 {
err = HintLatestSeqno(m, t.ID, latestSeqno)
}
t.G().NotifyRouter.HandleTeamChangedByBothKeys(ctx, t.ID, t.Name().String(), t.NextSeqno(), t.IsImplicit(), changes)
return err
} | go | func (t *Team) notify(ctx context.Context, changes keybase1.TeamChangeSet, latestSeqno keybase1.Seqno) error {
changes.KeyRotated = changes.KeyRotated || t.rotated
m := libkb.NewMetaContext(ctx, t.G())
var err error
if latestSeqno > 0 {
err = HintLatestSeqno(m, t.ID, latestSeqno)
}
t.G().NotifyRouter.HandleTeamChangedByBothKeys(ctx, t.ID, t.Name().String(), t.NextSeqno(), t.IsImplicit(), changes)
return err
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"notify",
"(",
"ctx",
"context",
".",
"Context",
",",
"changes",
"keybase1",
".",
"TeamChangeSet",
",",
"latestSeqno",
"keybase1",
".",
"Seqno",
")",
"error",
"{",
"changes",
".",
"KeyRotated",
"=",
"changes",
".",
"KeyRotated",
"||",
"t",
".",
"rotated",
"\n",
"m",
":=",
"libkb",
".",
"NewMetaContext",
"(",
"ctx",
",",
"t",
".",
"G",
"(",
")",
")",
"\n",
"var",
"err",
"error",
"\n",
"if",
"latestSeqno",
">",
"0",
"{",
"err",
"=",
"HintLatestSeqno",
"(",
"m",
",",
"t",
".",
"ID",
",",
"latestSeqno",
")",
"\n",
"}",
"\n",
"t",
".",
"G",
"(",
")",
".",
"NotifyRouter",
".",
"HandleTeamChangedByBothKeys",
"(",
"ctx",
",",
"t",
".",
"ID",
",",
"t",
".",
"Name",
"(",
")",
".",
"String",
"(",
")",
",",
"t",
".",
"NextSeqno",
"(",
")",
",",
"t",
".",
"IsImplicit",
"(",
")",
",",
"changes",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // Send notifyrouter messages.
// Modifies `changes`
// Update to the latest seqno that we're passing though, don't make any assumptions about number of sigs.
// Note that we're probably going to be getting this same notification a second time, since it will
// bounce off a gregor and back to us. But they are idempotent, so it should be fine to be double-notified. | [
"Send",
"notifyrouter",
"messages",
".",
"Modifies",
"changes",
"Update",
"to",
"the",
"latest",
"seqno",
"that",
"we",
"re",
"passing",
"though",
"don",
"t",
"make",
"any",
"assumptions",
"about",
"number",
"of",
"sigs",
".",
"Note",
"that",
"we",
"re",
"probably",
"going",
"to",
"be",
"getting",
"this",
"same",
"notification",
"a",
"second",
"time",
"since",
"it",
"will",
"bounce",
"off",
"a",
"gregor",
"and",
"back",
"to",
"us",
".",
"But",
"they",
"are",
"idempotent",
"so",
"it",
"should",
"be",
"fine",
"to",
"be",
"double",
"-",
"notified",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L2015-L2024 |
159,986 | keybase/client | go/teams/ftl.go | NewFastTeamLoader | func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader {
ret := &FastTeamChainLoader{
world: NewLoaderContextFromG(g),
featureFlagGate: libkb.NewFeatureFlagGate(libkb.FeatureFTL, 2*time.Minute),
storage: NewFTLStorage(g),
}
return ret
} | go | func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader {
ret := &FastTeamChainLoader{
world: NewLoaderContextFromG(g),
featureFlagGate: libkb.NewFeatureFlagGate(libkb.FeatureFTL, 2*time.Minute),
storage: NewFTLStorage(g),
}
return ret
} | [
"func",
"NewFastTeamLoader",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"FastTeamChainLoader",
"{",
"ret",
":=",
"&",
"FastTeamChainLoader",
"{",
"world",
":",
"NewLoaderContextFromG",
"(",
"g",
")",
",",
"featureFlagGate",
":",
"libkb",
".",
"NewFeatureFlagGate",
"(",
"libkb",
".",
"FeatureFTL",
",",
"2",
"*",
"time",
".",
"Minute",
")",
",",
"storage",
":",
"NewFTLStorage",
"(",
"g",
")",
",",
"}",
"\n",
"return",
"ret",
"\n",
"}"
] | // NewFastLoader makes a new fast loader and initializes it. | [
"NewFastLoader",
"makes",
"a",
"new",
"fast",
"loader",
"and",
"initializes",
"it",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L54-L61 |
159,987 | keybase/client | go/teams/ftl.go | NewFastTeamLoaderAndInstall | func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader {
l := NewFastTeamLoader(g)
g.SetFastTeamLoader(l)
g.AddLogoutHook(l, "fastTeamLoader")
g.AddDbNukeHook(l, "fastTeamLoader")
return l
} | go | func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader {
l := NewFastTeamLoader(g)
g.SetFastTeamLoader(l)
g.AddLogoutHook(l, "fastTeamLoader")
g.AddDbNukeHook(l, "fastTeamLoader")
return l
} | [
"func",
"NewFastTeamLoaderAndInstall",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"FastTeamChainLoader",
"{",
"l",
":=",
"NewFastTeamLoader",
"(",
"g",
")",
"\n",
"g",
".",
"SetFastTeamLoader",
"(",
"l",
")",
"\n",
"g",
".",
"AddLogoutHook",
"(",
"l",
",",
"\"",
"\"",
")",
"\n",
"g",
".",
"AddDbNukeHook",
"(",
"l",
",",
"\"",
"\"",
")",
"\n",
"return",
"l",
"\n",
"}"
] | // NewFastTeamLoaderAndInstall creates a new loader and installs it into G. | [
"NewFastTeamLoaderAndInstall",
"creates",
"a",
"new",
"loader",
"and",
"installs",
"it",
"into",
"G",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L64-L70 |
159,988 | keybase/client | go/teams/ftl.go | Load | func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) {
m = ftlLogTag(m)
defer m.TraceTimed(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), func() error { return err })()
originalArg := arg.DeepCopy()
err = f.featureFlagGate.ErrorIfFlagged(m)
if err != nil {
return res, err
}
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) {
m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String())
arg.ForceRefresh = true
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if !arg.AssertTeamName.Eq(res.Name) {
return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String()))
}
}
if ShouldRunBoxAudit(m) {
newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public))
if shouldReload {
return f.Load(newM, originalArg)
}
} else {
m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...")
}
return res, nil
} | go | func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) {
m = ftlLogTag(m)
defer m.TraceTimed(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), func() error { return err })()
originalArg := arg.DeepCopy()
err = f.featureFlagGate.ErrorIfFlagged(m)
if err != nil {
return res, err
}
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) {
m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String())
arg.ForceRefresh = true
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if !arg.AssertTeamName.Eq(res.Name) {
return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String()))
}
}
if ShouldRunBoxAudit(m) {
newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public))
if shouldReload {
return f.Load(newM, originalArg)
}
} else {
m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...")
}
return res, nil
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"Load",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"keybase1",
".",
"FastTeamLoadArg",
")",
"(",
"res",
"keybase1",
".",
"FastTeamLoadRes",
",",
"err",
"error",
")",
"{",
"m",
"=",
"ftlLogTag",
"(",
"m",
")",
"\n",
"defer",
"m",
".",
"TraceTimed",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"arg",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n",
"originalArg",
":=",
"arg",
".",
"DeepCopy",
"(",
")",
"\n\n",
"err",
"=",
"f",
".",
"featureFlagGate",
".",
"ErrorIfFlagged",
"(",
"m",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"res",
",",
"err",
"=",
"f",
".",
"loadOneAttempt",
"(",
"m",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"arg",
".",
"AssertTeamName",
"!=",
"nil",
"&&",
"!",
"arg",
".",
"AssertTeamName",
".",
"Eq",
"(",
"res",
".",
"Name",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"arg",
".",
"AssertTeamName",
".",
"String",
"(",
")",
",",
"res",
".",
"Name",
".",
"String",
"(",
")",
")",
"\n",
"arg",
".",
"ForceRefresh",
"=",
"true",
"\n",
"res",
",",
"err",
"=",
"f",
".",
"loadOneAttempt",
"(",
"m",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"if",
"!",
"arg",
".",
"AssertTeamName",
".",
"Eq",
"(",
"res",
".",
"Name",
")",
"{",
"return",
"res",
",",
"NewBadNameError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"arg",
".",
"AssertTeamName",
".",
"String",
"(",
")",
",",
"res",
".",
"Name",
".",
"String",
"(",
")",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"ShouldRunBoxAudit",
"(",
"m",
")",
"{",
"newM",
",",
"shouldReload",
":=",
"VerifyBoxAudit",
"(",
"m",
",",
"res",
".",
"Name",
".",
"ToTeamID",
"(",
"arg",
".",
"Public",
")",
")",
"\n",
"if",
"shouldReload",
"{",
"return",
"f",
".",
"Load",
"(",
"newM",
",",
"originalArg",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // Load fast-loads the given team. Provide some hints as to how to load it. You can specify an application
// and key generations needed, if you are entering chat. Those links will be returned unstubbed
// from the server, and then the keys can be output in the result. | [
"Load",
"fast",
"-",
"loads",
"the",
"given",
"team",
".",
"Provide",
"some",
"hints",
"as",
"to",
"how",
"to",
"load",
"it",
".",
"You",
"can",
"specify",
"an",
"application",
"and",
"key",
"generations",
"needed",
"if",
"you",
"are",
"entering",
"chat",
".",
"Those",
"links",
"will",
"be",
"returned",
"unstubbed",
"from",
"the",
"server",
"and",
"then",
"the",
"keys",
"can",
"be",
"output",
"in",
"the",
"result",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L85-L122 |
159,989 | keybase/client | go/teams/ftl.go | verifyTeamNameViaParentLoad | func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#verifyTeamNameViaParentLoad(%s,%s)", id, unverifiedName), func() error { return err })()
if parent == nil {
if !unverifiedName.IsRootTeam() {
return res, NewBadNameError("expected a root team")
}
if !unverifiedName.ToTeamID(isPublic).Eq(id) {
return res, NewBadNameError("root team v. team ID mismatch")
}
return unverifiedName, nil
}
if parent.ParentID.IsPublic() != isPublic {
return res, NewBadPublicError(parent.ParentID, isPublic)
}
parentRes, err := f.load(m, fastLoadArg{
FastTeamLoadArg: keybase1.FastTeamLoadArg{
ID: parent.ParentID,
Public: isPublic,
ForceRefresh: forceRefresh,
},
downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno},
needLatestName: true,
readSubteamID: bottomSubteam,
})
if err != nil {
return res, err
}
downPointer, ok := parentRes.downPointers[parent.ParentSeqno]
if !ok {
return res, NewBadNameError("down pointer not found in parent")
}
suffix := downPointer.NameComponent
parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh)
if err != nil {
return res, err
}
return parentName.Append(suffix)
} | go | func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#verifyTeamNameViaParentLoad(%s,%s)", id, unverifiedName), func() error { return err })()
if parent == nil {
if !unverifiedName.IsRootTeam() {
return res, NewBadNameError("expected a root team")
}
if !unverifiedName.ToTeamID(isPublic).Eq(id) {
return res, NewBadNameError("root team v. team ID mismatch")
}
return unverifiedName, nil
}
if parent.ParentID.IsPublic() != isPublic {
return res, NewBadPublicError(parent.ParentID, isPublic)
}
parentRes, err := f.load(m, fastLoadArg{
FastTeamLoadArg: keybase1.FastTeamLoadArg{
ID: parent.ParentID,
Public: isPublic,
ForceRefresh: forceRefresh,
},
downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno},
needLatestName: true,
readSubteamID: bottomSubteam,
})
if err != nil {
return res, err
}
downPointer, ok := parentRes.downPointers[parent.ParentSeqno]
if !ok {
return res, NewBadNameError("down pointer not found in parent")
}
suffix := downPointer.NameComponent
parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh)
if err != nil {
return res, err
}
return parentName.Append(suffix)
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"verifyTeamNameViaParentLoad",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"id",
"keybase1",
".",
"TeamID",
",",
"isPublic",
"bool",
",",
"unverifiedName",
"keybase1",
".",
"TeamName",
",",
"parent",
"*",
"keybase1",
".",
"UpPointer",
",",
"bottomSubteam",
"keybase1",
".",
"TeamID",
",",
"forceRefresh",
"bool",
")",
"(",
"res",
"keybase1",
".",
"TeamName",
",",
"err",
"error",
")",
"{",
"defer",
"m",
".",
"Trace",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"id",
",",
"unverifiedName",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"if",
"parent",
"==",
"nil",
"{",
"if",
"!",
"unverifiedName",
".",
"IsRootTeam",
"(",
")",
"{",
"return",
"res",
",",
"NewBadNameError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"!",
"unverifiedName",
".",
"ToTeamID",
"(",
"isPublic",
")",
".",
"Eq",
"(",
"id",
")",
"{",
"return",
"res",
",",
"NewBadNameError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"unverifiedName",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"parent",
".",
"ParentID",
".",
"IsPublic",
"(",
")",
"!=",
"isPublic",
"{",
"return",
"res",
",",
"NewBadPublicError",
"(",
"parent",
".",
"ParentID",
",",
"isPublic",
")",
"\n",
"}",
"\n\n",
"parentRes",
",",
"err",
":=",
"f",
".",
"load",
"(",
"m",
",",
"fastLoadArg",
"{",
"FastTeamLoadArg",
":",
"keybase1",
".",
"FastTeamLoadArg",
"{",
"ID",
":",
"parent",
".",
"ParentID",
",",
"Public",
":",
"isPublic",
",",
"ForceRefresh",
":",
"forceRefresh",
",",
"}",
",",
"downPointersNeeded",
":",
"[",
"]",
"keybase1",
".",
"Seqno",
"{",
"parent",
".",
"ParentSeqno",
"}",
",",
"needLatestName",
":",
"true",
",",
"readSubteamID",
":",
"bottomSubteam",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"downPointer",
",",
"ok",
":=",
"parentRes",
".",
"downPointers",
"[",
"parent",
".",
"ParentSeqno",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"res",
",",
"NewBadNameError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"suffix",
":=",
"downPointer",
".",
"NameComponent",
"\n\n",
"parentName",
",",
"err",
":=",
"f",
".",
"verifyTeamNameViaParentLoad",
"(",
"m",
",",
"parent",
".",
"ParentID",
",",
"isPublic",
",",
"parentRes",
".",
"unverifiedName",
",",
"parentRes",
".",
"upPointer",
",",
"bottomSubteam",
",",
"forceRefresh",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"parentName",
".",
"Append",
"(",
"suffix",
")",
"\n",
"}"
] | // verifyTeamNameViaParentLoad takes a team ID, and a pointer to a parent team's sigchain, and computes
// the full resolved team name. If the pointer is null, we'll assume this is a root team and do the
// verification via hash-comparison. | [
"verifyTeamNameViaParentLoad",
"takes",
"a",
"team",
"ID",
"and",
"a",
"pointer",
"to",
"a",
"parent",
"team",
"s",
"sigchain",
"and",
"computes",
"the",
"full",
"resolved",
"team",
"name",
".",
"If",
"the",
"pointer",
"is",
"null",
"we",
"ll",
"assume",
"this",
"is",
"a",
"root",
"team",
"and",
"do",
"the",
"verification",
"via",
"hash",
"-",
"comparison",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L161-L204 |
159,990 | keybase/client | go/teams/ftl.go | load | func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), func() error { return err })()
// Single-flight lock by team ID.
lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String())
defer lock.Release(m.Ctx())
return f.loadLockedWithRetries(m, arg)
} | go | func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), func() error { return err })()
// Single-flight lock by team ID.
lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String())
defer lock.Release(m.Ctx())
return f.loadLockedWithRetries(m, arg)
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"load",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"fastLoadArg",
")",
"(",
"res",
"*",
"fastLoadRes",
",",
"err",
"error",
")",
"{",
"defer",
"m",
".",
"Trace",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"arg",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"// Single-flight lock by team ID.",
"lock",
":=",
"f",
".",
"locktab",
".",
"AcquireOnName",
"(",
"m",
".",
"Ctx",
"(",
")",
",",
"m",
".",
"G",
"(",
")",
",",
"arg",
".",
"ID",
".",
"String",
"(",
")",
")",
"\n",
"defer",
"lock",
".",
"Release",
"(",
"m",
".",
"Ctx",
"(",
")",
")",
"\n\n",
"return",
"f",
".",
"loadLockedWithRetries",
"(",
"m",
",",
"arg",
")",
"\n",
"}"
] | // load acquires a lock by team ID, and the runs loadLockedWithRetries. | [
"load",
"acquires",
"a",
"lock",
"by",
"team",
"ID",
"and",
"the",
"runs",
"loadLockedWithRetries",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L232-L241 |
159,991 | keybase/client | go/teams/ftl.go | loadLockedWithRetries | func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
for i := 0; i < 2; i++ {
res, err = f.loadLocked(m, arg)
if err == nil {
return res, err
}
if _, ok := err.(FTLMissingSeedError); !ok {
return nil, err
}
m.Debug("Got retriable error %s; will force reset", err)
arg.forceReset = true
}
return res, err
} | go | func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
for i := 0; i < 2; i++ {
res, err = f.loadLocked(m, arg)
if err == nil {
return res, err
}
if _, ok := err.(FTLMissingSeedError); !ok {
return nil, err
}
m.Debug("Got retriable error %s; will force reset", err)
arg.forceReset = true
}
return res, err
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"loadLockedWithRetries",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"fastLoadArg",
")",
"(",
"res",
"*",
"fastLoadRes",
",",
"err",
"error",
")",
"{",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"2",
";",
"i",
"++",
"{",
"res",
",",
"err",
"=",
"f",
".",
"loadLocked",
"(",
"m",
",",
"arg",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"FTLMissingSeedError",
")",
";",
"!",
"ok",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"arg",
".",
"forceReset",
"=",
"true",
"\n",
"}",
"\n",
"return",
"res",
",",
"err",
"\n",
"}"
] | // loadLockedWithRetries attempts two loads of the team. If the first iteration returns an FTLMissingSeedError,
// we'll blast through the cache and attempt a full reload a second time. Then that's for all the marbles. | [
"loadLockedWithRetries",
"attempts",
"two",
"loads",
"of",
"the",
"team",
".",
"If",
"the",
"first",
"iteration",
"returns",
"an",
"FTLMissingSeedError",
"we",
"ll",
"blast",
"through",
"the",
"cache",
"and",
"attempt",
"a",
"full",
"reload",
"a",
"second",
"time",
".",
"Then",
"that",
"s",
"for",
"all",
"the",
"marbles",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L245-L259 |
159,992 | keybase/client | go/teams/ftl.go | deriveSeedAtGeneration | func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (seed keybase1.PerTeamKeySeed, err error) {
seed, ok := state.Chain.PerTeamKeySeedsVerified[gen]
if ok {
return seed, nil
}
var tmp keybase1.PerTeamKeySeed
tmp, ok = state.PerTeamKeySeedsUnverified[gen]
if !ok {
// See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam
// name before we were members of the team, and then later get added to the team, and then try to
// reload the team. We didn't have boxes from the first time around, so just force a full reload.
// It's inefficient but it's a very rare case.
return seed, NewFTLMissingSeedError(gen)
}
ptkChain, ok := state.Chain.PerTeamKeys[gen]
if !ok {
return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen))
}
km, err := NewTeamKeyManagerWithSecret(tmp, gen)
if err != nil {
return seed, err
}
sigKey, err := km.SigningKey()
if err != nil {
return seed, err
}
if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) {
m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen))
}
encKey, err := km.EncryptionKey()
if err != nil {
return seed, err
}
if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) {
m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen))
}
// write back to cache
seed = tmp
state.Chain.PerTeamKeySeedsVerified[gen] = seed
return seed, err
} | go | func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (seed keybase1.PerTeamKeySeed, err error) {
seed, ok := state.Chain.PerTeamKeySeedsVerified[gen]
if ok {
return seed, nil
}
var tmp keybase1.PerTeamKeySeed
tmp, ok = state.PerTeamKeySeedsUnverified[gen]
if !ok {
// See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam
// name before we were members of the team, and then later get added to the team, and then try to
// reload the team. We didn't have boxes from the first time around, so just force a full reload.
// It's inefficient but it's a very rare case.
return seed, NewFTLMissingSeedError(gen)
}
ptkChain, ok := state.Chain.PerTeamKeys[gen]
if !ok {
return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen))
}
km, err := NewTeamKeyManagerWithSecret(tmp, gen)
if err != nil {
return seed, err
}
sigKey, err := km.SigningKey()
if err != nil {
return seed, err
}
if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) {
m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen))
}
encKey, err := km.EncryptionKey()
if err != nil {
return seed, err
}
if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) {
m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen))
}
// write back to cache
seed = tmp
state.Chain.PerTeamKeySeedsVerified[gen] = seed
return seed, err
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"deriveSeedAtGeneration",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"gen",
"keybase1",
".",
"PerTeamKeyGeneration",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"seed",
"keybase1",
".",
"PerTeamKeySeed",
",",
"err",
"error",
")",
"{",
"seed",
",",
"ok",
":=",
"state",
".",
"Chain",
".",
"PerTeamKeySeedsVerified",
"[",
"gen",
"]",
"\n",
"if",
"ok",
"{",
"return",
"seed",
",",
"nil",
"\n",
"}",
"\n",
"var",
"tmp",
"keybase1",
".",
"PerTeamKeySeed",
"\n",
"tmp",
",",
"ok",
"=",
"state",
".",
"PerTeamKeySeedsUnverified",
"[",
"gen",
"]",
"\n",
"if",
"!",
"ok",
"{",
"// See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam",
"// name before we were members of the team, and then later get added to the team, and then try to",
"// reload the team. We didn't have boxes from the first time around, so just force a full reload.",
"// It's inefficient but it's a very rare case.",
"return",
"seed",
",",
"NewFTLMissingSeedError",
"(",
"gen",
")",
"\n",
"}",
"\n\n",
"ptkChain",
",",
"ok",
":=",
"state",
".",
"Chain",
".",
"PerTeamKeys",
"[",
"gen",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"seed",
",",
"NewFastLoadError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"gen",
")",
")",
"\n",
"}",
"\n\n",
"km",
",",
"err",
":=",
"NewTeamKeyManagerWithSecret",
"(",
"tmp",
",",
"gen",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"seed",
",",
"err",
"\n",
"}",
"\n\n",
"sigKey",
",",
"err",
":=",
"km",
".",
"SigningKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"seed",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"!",
"ptkChain",
".",
"SigKID",
".",
"SecureEqual",
"(",
"sigKey",
".",
"GetKID",
"(",
")",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"gen",
",",
"sigKey",
".",
"GetKID",
"(",
")",
",",
"ptkChain",
".",
"SigKID",
")",
"\n",
"return",
"seed",
",",
"NewFastLoadError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"gen",
")",
")",
"\n",
"}",
"\n\n",
"encKey",
",",
"err",
":=",
"km",
".",
"EncryptionKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"seed",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"!",
"ptkChain",
".",
"EncKID",
".",
"SecureEqual",
"(",
"encKey",
".",
"GetKID",
"(",
")",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"gen",
",",
"encKey",
".",
"GetKID",
"(",
")",
",",
"ptkChain",
".",
"EncKID",
")",
"\n",
"return",
"seed",
",",
"NewFastLoadError",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"gen",
")",
")",
"\n",
"}",
"\n\n",
"// write back to cache",
"seed",
"=",
"tmp",
"\n",
"state",
".",
"Chain",
".",
"PerTeamKeySeedsVerified",
"[",
"gen",
"]",
"=",
"seed",
"\n",
"return",
"seed",
",",
"err",
"\n",
"}"
] | // dervieSeedAtGeneration either goes to cache or rederives the PTK private seed
// for the given generation gen. | [
"dervieSeedAtGeneration",
"either",
"goes",
"to",
"cache",
"or",
"rederives",
"the",
"PTK",
"private",
"seed",
"for",
"the",
"given",
"generation",
"gen",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L263-L313 |
159,993 | keybase/client | go/teams/ftl.go | deriveKeyForApplicationAtGeneration | func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (key keybase1.TeamApplicationKey, err error) {
seed, err := f.deriveSeedAtGeneration(m, gen, state)
if err != nil {
return key, err
}
var mask *keybase1.MaskB64
if m := state.ReaderKeyMasks[app]; m != nil {
tmp, ok := m[gen]
if ok {
mask = &tmp
}
}
if mask == nil {
m.Debug("Could not get reader key mask for <%s,%d>", app, gen)
if state.ID().IsSubTeam() {
m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam")
return key, NewNotExplicitMemberOfSubteamError()
}
return key, NewFastLoadError("Could not load application keys")
}
rkm := keybase1.ReaderKeyMask{
Application: app,
Generation: gen,
Mask: *mask,
}
return applicationKeyForMask(rkm, seed)
} | go | func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (key keybase1.TeamApplicationKey, err error) {
seed, err := f.deriveSeedAtGeneration(m, gen, state)
if err != nil {
return key, err
}
var mask *keybase1.MaskB64
if m := state.ReaderKeyMasks[app]; m != nil {
tmp, ok := m[gen]
if ok {
mask = &tmp
}
}
if mask == nil {
m.Debug("Could not get reader key mask for <%s,%d>", app, gen)
if state.ID().IsSubTeam() {
m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam")
return key, NewNotExplicitMemberOfSubteamError()
}
return key, NewFastLoadError("Could not load application keys")
}
rkm := keybase1.ReaderKeyMask{
Application: app,
Generation: gen,
Mask: *mask,
}
return applicationKeyForMask(rkm, seed)
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"deriveKeyForApplicationAtGeneration",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"app",
"keybase1",
".",
"TeamApplication",
",",
"gen",
"keybase1",
".",
"PerTeamKeyGeneration",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"key",
"keybase1",
".",
"TeamApplicationKey",
",",
"err",
"error",
")",
"{",
"seed",
",",
"err",
":=",
"f",
".",
"deriveSeedAtGeneration",
"(",
"m",
",",
"gen",
",",
"state",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"key",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"mask",
"*",
"keybase1",
".",
"MaskB64",
"\n",
"if",
"m",
":=",
"state",
".",
"ReaderKeyMasks",
"[",
"app",
"]",
";",
"m",
"!=",
"nil",
"{",
"tmp",
",",
"ok",
":=",
"m",
"[",
"gen",
"]",
"\n",
"if",
"ok",
"{",
"mask",
"=",
"&",
"tmp",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"mask",
"==",
"nil",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"app",
",",
"gen",
")",
"\n",
"if",
"state",
".",
"ID",
"(",
")",
".",
"IsSubTeam",
"(",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"key",
",",
"NewNotExplicitMemberOfSubteamError",
"(",
")",
"\n",
"}",
"\n",
"return",
"key",
",",
"NewFastLoadError",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"rkm",
":=",
"keybase1",
".",
"ReaderKeyMask",
"{",
"Application",
":",
"app",
",",
"Generation",
":",
"gen",
",",
"Mask",
":",
"*",
"mask",
",",
"}",
"\n",
"return",
"applicationKeyForMask",
"(",
"rkm",
",",
"seed",
")",
"\n",
"}"
] | // deriveKeyForApplicationAtGeneration pulls from cache or generates the PTK for the
// given application at the given generation. | [
"deriveKeyForApplicationAtGeneration",
"pulls",
"from",
"cache",
"or",
"generates",
"the",
"PTK",
"for",
"the",
"given",
"application",
"at",
"the",
"given",
"generation",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L317-L346 |
159,994 | keybase/client | go/teams/ftl.go | deriveKeysForApplication | func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, state *keybase1.FastTeamData) (keys []keybase1.TeamApplicationKey, err error) {
var didLatest bool
doKey := func(gen keybase1.PerTeamKeyGeneration) error {
var key keybase1.TeamApplicationKey
key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, state)
if err != nil {
return err
}
keys = append(keys, key)
if gen == state.LatestKeyGeneration {
didLatest = true
}
return nil
}
if arg.NeedLatestKey {
// This debug is useful to have since it will spell out which version is the latest in the log
// if the caller asked for latest.
m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", state.LatestKeyGeneration)
}
for _, gen := range arg.KeyGenerationsNeeded {
if err = doKey(gen); err != nil {
return nil, err
}
}
if !didLatest && arg.NeedLatestKey {
if err = doKey(state.LatestKeyGeneration); err != nil {
return nil, err
}
}
return keys, nil
} | go | func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, state *keybase1.FastTeamData) (keys []keybase1.TeamApplicationKey, err error) {
var didLatest bool
doKey := func(gen keybase1.PerTeamKeyGeneration) error {
var key keybase1.TeamApplicationKey
key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, state)
if err != nil {
return err
}
keys = append(keys, key)
if gen == state.LatestKeyGeneration {
didLatest = true
}
return nil
}
if arg.NeedLatestKey {
// This debug is useful to have since it will spell out which version is the latest in the log
// if the caller asked for latest.
m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", state.LatestKeyGeneration)
}
for _, gen := range arg.KeyGenerationsNeeded {
if err = doKey(gen); err != nil {
return nil, err
}
}
if !didLatest && arg.NeedLatestKey {
if err = doKey(state.LatestKeyGeneration); err != nil {
return nil, err
}
}
return keys, nil
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"deriveKeysForApplication",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"app",
"keybase1",
".",
"TeamApplication",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"keys",
"[",
"]",
"keybase1",
".",
"TeamApplicationKey",
",",
"err",
"error",
")",
"{",
"var",
"didLatest",
"bool",
"\n",
"doKey",
":=",
"func",
"(",
"gen",
"keybase1",
".",
"PerTeamKeyGeneration",
")",
"error",
"{",
"var",
"key",
"keybase1",
".",
"TeamApplicationKey",
"\n",
"key",
",",
"err",
"=",
"f",
".",
"deriveKeyForApplicationAtGeneration",
"(",
"m",
",",
"app",
",",
"gen",
",",
"state",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"keys",
"=",
"append",
"(",
"keys",
",",
"key",
")",
"\n",
"if",
"gen",
"==",
"state",
".",
"LatestKeyGeneration",
"{",
"didLatest",
"=",
"true",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"arg",
".",
"NeedLatestKey",
"{",
"// This debug is useful to have since it will spell out which version is the latest in the log",
"// if the caller asked for latest.",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"state",
".",
"LatestKeyGeneration",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"gen",
":=",
"range",
"arg",
".",
"KeyGenerationsNeeded",
"{",
"if",
"err",
"=",
"doKey",
"(",
"gen",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"didLatest",
"&&",
"arg",
".",
"NeedLatestKey",
"{",
"if",
"err",
"=",
"doKey",
"(",
"state",
".",
"LatestKeyGeneration",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"keys",
",",
"nil",
"\n",
"}"
] | // deriveKeysForApplication pulls from cache or generates several geneartions of PTKs
// for the given application. | [
"deriveKeysForApplication",
"pulls",
"from",
"cache",
"or",
"generates",
"several",
"geneartions",
"of",
"PTKs",
"for",
"the",
"given",
"application",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L350-L383 |
159,995 | keybase/client | go/teams/ftl.go | toResult | func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (res *fastLoadRes, err error) {
res = &fastLoadRes{
unverifiedName: state.Name,
downPointers: state.Chain.DownPointers,
upPointer: state.Chain.LastUpPointer,
}
res.applicationKeys, err = f.deriveKeys(m, arg, state)
if err != nil {
return nil, err
}
return res, nil
} | go | func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (res *fastLoadRes, err error) {
res = &fastLoadRes{
unverifiedName: state.Name,
downPointers: state.Chain.DownPointers,
upPointer: state.Chain.LastUpPointer,
}
res.applicationKeys, err = f.deriveKeys(m, arg, state)
if err != nil {
return nil, err
}
return res, nil
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"toResult",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"res",
"*",
"fastLoadRes",
",",
"err",
"error",
")",
"{",
"res",
"=",
"&",
"fastLoadRes",
"{",
"unverifiedName",
":",
"state",
".",
"Name",
",",
"downPointers",
":",
"state",
".",
"Chain",
".",
"DownPointers",
",",
"upPointer",
":",
"state",
".",
"Chain",
".",
"LastUpPointer",
",",
"}",
"\n",
"res",
".",
"applicationKeys",
",",
"err",
"=",
"f",
".",
"deriveKeys",
"(",
"m",
",",
"arg",
",",
"state",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // toResult turns the current fast state into a fastLoadRes. | [
"toResult",
"turns",
"the",
"current",
"fast",
"state",
"into",
"a",
"fastLoadRes",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L400-L411 |
159,996 | keybase/client | go/teams/ftl.go | findStateInCache | func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) *keybase1.FastTeamData {
tmp := f.storage.Get(m, id, id.IsPublic())
if tmp == nil {
return nil
}
return tmp
} | go | func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) *keybase1.FastTeamData {
tmp := f.storage.Get(m, id, id.IsPublic())
if tmp == nil {
return nil
}
return tmp
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"findStateInCache",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"id",
"keybase1",
".",
"TeamID",
")",
"*",
"keybase1",
".",
"FastTeamData",
"{",
"tmp",
":=",
"f",
".",
"storage",
".",
"Get",
"(",
"m",
",",
"id",
",",
"id",
".",
"IsPublic",
"(",
")",
")",
"\n",
"if",
"tmp",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"return",
"tmp",
"\n",
"}"
] | // findState in cache finds the team ID's state in an in-memory cache. | [
"findState",
"in",
"cache",
"finds",
"the",
"team",
"ID",
"s",
"state",
"in",
"an",
"in",
"-",
"memory",
"cache",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L414-L420 |
159,997 | keybase/client | go/teams/ftl.go | stateHasKeys | func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (fresh bool) {
gens := make(map[keybase1.PerTeamKeyGeneration]struct{})
fresh = true
if arg.NeedLatestKey && !state.LoadedLatest {
m.Debug("latest was never loaded, we need to load it")
shoppingList.needMerkleRefresh = true
shoppingList.needLatestKey = true
fresh = false
}
// The key generations needed are the ones passed in, and also, potentially, our cached
// LatestKeyGeneration from the state. It could be that when we go to the server, this is no
// longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should
// pull down the mask, since it's a bug to not have it if it turns out the server refresh
// didn't budge the latest key generation.
kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...)
if arg.NeedLatestKey && state.LoadedLatest && state.LatestKeyGeneration > 0 {
kgn = append(kgn, state.LatestKeyGeneration)
}
for _, app := range arg.Applications {
for _, gen := range kgn {
add := false
if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil {
m.Debug("state doesn't have mask for <%d,%d>", app, gen)
add = true
}
if !stateHasKeySeed(m, gen, state) {
m.Debug("state doesn't have key seed for gen=%d", gen)
add = true
}
if add {
gens[gen] = struct{}{}
fresh = false
}
}
}
shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...)
if !fresh {
for gen := range gens {
shoppingList.generations = append(shoppingList.generations, gen)
}
}
return fresh
} | go | func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (fresh bool) {
gens := make(map[keybase1.PerTeamKeyGeneration]struct{})
fresh = true
if arg.NeedLatestKey && !state.LoadedLatest {
m.Debug("latest was never loaded, we need to load it")
shoppingList.needMerkleRefresh = true
shoppingList.needLatestKey = true
fresh = false
}
// The key generations needed are the ones passed in, and also, potentially, our cached
// LatestKeyGeneration from the state. It could be that when we go to the server, this is no
// longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should
// pull down the mask, since it's a bug to not have it if it turns out the server refresh
// didn't budge the latest key generation.
kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...)
if arg.NeedLatestKey && state.LoadedLatest && state.LatestKeyGeneration > 0 {
kgn = append(kgn, state.LatestKeyGeneration)
}
for _, app := range arg.Applications {
for _, gen := range kgn {
add := false
if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil {
m.Debug("state doesn't have mask for <%d,%d>", app, gen)
add = true
}
if !stateHasKeySeed(m, gen, state) {
m.Debug("state doesn't have key seed for gen=%d", gen)
add = true
}
if add {
gens[gen] = struct{}{}
fresh = false
}
}
}
shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...)
if !fresh {
for gen := range gens {
shoppingList.generations = append(shoppingList.generations, gen)
}
}
return fresh
} | [
"func",
"stateHasKeys",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"shoppingList",
"*",
"shoppingList",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"fresh",
"bool",
")",
"{",
"gens",
":=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"PerTeamKeyGeneration",
"]",
"struct",
"{",
"}",
")",
"\n\n",
"fresh",
"=",
"true",
"\n\n",
"if",
"arg",
".",
"NeedLatestKey",
"&&",
"!",
"state",
".",
"LoadedLatest",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"shoppingList",
".",
"needMerkleRefresh",
"=",
"true",
"\n",
"shoppingList",
".",
"needLatestKey",
"=",
"true",
"\n",
"fresh",
"=",
"false",
"\n",
"}",
"\n\n",
"// The key generations needed are the ones passed in, and also, potentially, our cached",
"// LatestKeyGeneration from the state. It could be that when we go to the server, this is no",
"// longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should",
"// pull down the mask, since it's a bug to not have it if it turns out the server refresh",
"// didn't budge the latest key generation.",
"kgn",
":=",
"append",
"(",
"[",
"]",
"keybase1",
".",
"PerTeamKeyGeneration",
"{",
"}",
",",
"arg",
".",
"KeyGenerationsNeeded",
"...",
")",
"\n",
"if",
"arg",
".",
"NeedLatestKey",
"&&",
"state",
".",
"LoadedLatest",
"&&",
"state",
".",
"LatestKeyGeneration",
">",
"0",
"{",
"kgn",
"=",
"append",
"(",
"kgn",
",",
"state",
".",
"LatestKeyGeneration",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"app",
":=",
"range",
"arg",
".",
"Applications",
"{",
"for",
"_",
",",
"gen",
":=",
"range",
"kgn",
"{",
"add",
":=",
"false",
"\n",
"if",
"state",
".",
"ReaderKeyMasks",
"[",
"app",
"]",
"==",
"nil",
"||",
"state",
".",
"ReaderKeyMasks",
"[",
"app",
"]",
"[",
"gen",
"]",
"==",
"nil",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"app",
",",
"gen",
")",
"\n",
"add",
"=",
"true",
"\n",
"}",
"\n",
"if",
"!",
"stateHasKeySeed",
"(",
"m",
",",
"gen",
",",
"state",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"gen",
")",
"\n",
"add",
"=",
"true",
"\n",
"}",
"\n",
"if",
"add",
"{",
"gens",
"[",
"gen",
"]",
"=",
"struct",
"{",
"}",
"{",
"}",
"\n",
"fresh",
"=",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"shoppingList",
".",
"applications",
"=",
"append",
"(",
"[",
"]",
"keybase1",
".",
"TeamApplication",
"{",
"}",
",",
"arg",
".",
"Applications",
"...",
")",
"\n\n",
"if",
"!",
"fresh",
"{",
"for",
"gen",
":=",
"range",
"gens",
"{",
"shoppingList",
".",
"generations",
"=",
"append",
"(",
"shoppingList",
".",
"generations",
",",
"gen",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"fresh",
"\n",
"}"
] | // stateHasKeys checks to see if the given state has the keys specified in the shopping list. If not, it will
// modify the shopping list and return false. If yes, it will leave the shopping list unchanged and return
// true. | [
"stateHasKeys",
"checks",
"to",
"see",
"if",
"the",
"given",
"state",
"has",
"the",
"keys",
"specified",
"in",
"the",
"shopping",
"list",
".",
"If",
"not",
"it",
"will",
"modify",
"the",
"shopping",
"list",
"and",
"return",
"false",
".",
"If",
"yes",
"it",
"will",
"leave",
"the",
"shopping",
"list",
"unchanged",
"and",
"return",
"true",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L444-L492 |
159,998 | keybase/client | go/teams/ftl.go | stateHasDownPointers | func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) {
ret = true
for _, seqno := range arg.downPointersNeeded {
if _, ok := state.Chain.DownPointers[seqno]; !ok {
m.Debug("Down pointer at seqno=%d wasn't found", seqno)
shoppingList.addDownPointer(seqno)
ret = false
}
}
return ret
} | go | func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) {
ret = true
for _, seqno := range arg.downPointersNeeded {
if _, ok := state.Chain.DownPointers[seqno]; !ok {
m.Debug("Down pointer at seqno=%d wasn't found", seqno)
shoppingList.addDownPointer(seqno)
ret = false
}
}
return ret
} | [
"func",
"stateHasDownPointers",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"shoppingList",
"*",
"shoppingList",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"ret",
"bool",
")",
"{",
"ret",
"=",
"true",
"\n\n",
"for",
"_",
",",
"seqno",
":=",
"range",
"arg",
".",
"downPointersNeeded",
"{",
"if",
"_",
",",
"ok",
":=",
"state",
".",
"Chain",
".",
"DownPointers",
"[",
"seqno",
"]",
";",
"!",
"ok",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"seqno",
")",
"\n",
"shoppingList",
".",
"addDownPointer",
"(",
"seqno",
")",
"\n",
"ret",
"=",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ret",
"\n",
"}"
] | // stateHasDownPointers checks to see if the given state has the down pointers specified in the shopping list.
// If not, it will change the shopping list to have the down pointers and return false. If yes, it will
// leave the shopping list unchanged and return true. | [
"stateHasDownPointers",
"checks",
"to",
"see",
"if",
"the",
"given",
"state",
"has",
"the",
"down",
"pointers",
"specified",
"in",
"the",
"shopping",
"list",
".",
"If",
"not",
"it",
"will",
"change",
"the",
"shopping",
"list",
"to",
"have",
"the",
"down",
"pointers",
"and",
"return",
"false",
".",
"If",
"yes",
"it",
"will",
"leave",
"the",
"shopping",
"list",
"unchanged",
"and",
"return",
"true",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L497-L508 |
159,999 | keybase/client | go/teams/ftl.go | computeWithPreviousState | func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) {
cachedAt := state.CachedAt.Time()
s.linksSince = state.Chain.Last.Seqno
if arg.forceReset {
s.linksSince = keybase1.Seqno(0)
m.Debug("forceReset specified, so reloading from low=0")
}
if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour {
m.Debug("cached value is more than an hour old (cached at %s)", cachedAt)
s.needMerkleRefresh = true
}
if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno {
m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno)
s.needMerkleRefresh = true
}
if arg.ForceRefresh {
m.Debug("refresh forced via flag")
s.needMerkleRefresh = true
}
if !s.needMerkleRefresh && f.InForceRepollMode(m) {
m.Debug("must repoll since in force mode")
s.needMerkleRefresh = true
}
if !stateHasKeys(m, s, arg, state) {
m.Debug("state was missing needed encryption keys, or we need the freshest")
}
if !stateHasDownPointers(m, s, arg, state) {
m.Debug("state was missing unstubbed links")
}
} | go | func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) {
cachedAt := state.CachedAt.Time()
s.linksSince = state.Chain.Last.Seqno
if arg.forceReset {
s.linksSince = keybase1.Seqno(0)
m.Debug("forceReset specified, so reloading from low=0")
}
if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour {
m.Debug("cached value is more than an hour old (cached at %s)", cachedAt)
s.needMerkleRefresh = true
}
if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno {
m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno)
s.needMerkleRefresh = true
}
if arg.ForceRefresh {
m.Debug("refresh forced via flag")
s.needMerkleRefresh = true
}
if !s.needMerkleRefresh && f.InForceRepollMode(m) {
m.Debug("must repoll since in force mode")
s.needMerkleRefresh = true
}
if !stateHasKeys(m, s, arg, state) {
m.Debug("state was missing needed encryption keys, or we need the freshest")
}
if !stateHasDownPointers(m, s, arg, state) {
m.Debug("state was missing unstubbed links")
}
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"computeWithPreviousState",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"s",
"*",
"shoppingList",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"{",
"cachedAt",
":=",
"state",
".",
"CachedAt",
".",
"Time",
"(",
")",
"\n",
"s",
".",
"linksSince",
"=",
"state",
".",
"Chain",
".",
"Last",
".",
"Seqno",
"\n\n",
"if",
"arg",
".",
"forceReset",
"{",
"s",
".",
"linksSince",
"=",
"keybase1",
".",
"Seqno",
"(",
"0",
")",
"\n",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"arg",
".",
"needChainTail",
"(",
")",
"&&",
"m",
".",
"G",
"(",
")",
".",
"Clock",
"(",
")",
".",
"Now",
"(",
")",
".",
"Sub",
"(",
"cachedAt",
")",
">",
"time",
".",
"Hour",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"cachedAt",
")",
"\n",
"s",
".",
"needMerkleRefresh",
"=",
"true",
"\n",
"}",
"\n",
"if",
"arg",
".",
"needChainTail",
"(",
")",
"&&",
"state",
".",
"LatestSeqnoHint",
">",
"state",
".",
"Chain",
".",
"Last",
".",
"Seqno",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"state",
".",
"LatestSeqnoHint",
",",
"state",
".",
"Chain",
".",
"Last",
".",
"Seqno",
")",
"\n",
"s",
".",
"needMerkleRefresh",
"=",
"true",
"\n",
"}",
"\n",
"if",
"arg",
".",
"ForceRefresh",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"s",
".",
"needMerkleRefresh",
"=",
"true",
"\n",
"}",
"\n",
"if",
"!",
"s",
".",
"needMerkleRefresh",
"&&",
"f",
".",
"InForceRepollMode",
"(",
"m",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"s",
".",
"needMerkleRefresh",
"=",
"true",
"\n",
"}",
"\n",
"if",
"!",
"stateHasKeys",
"(",
"m",
",",
"s",
",",
"arg",
",",
"state",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"!",
"stateHasDownPointers",
"(",
"m",
",",
"s",
",",
"arg",
",",
"state",
")",
"{",
"m",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}"
] | // computeWithPreviousState looks into the given load arg, and also our current cached state, to figure
// what to get from the server. The results are compiled into a "shopping list" that we'll later
// use when we concoct our server request. | [
"computeWithPreviousState",
"looks",
"into",
"the",
"given",
"load",
"arg",
"and",
"also",
"our",
"current",
"cached",
"state",
"to",
"figure",
"what",
"to",
"get",
"from",
"the",
"server",
".",
"The",
"results",
"are",
"compiled",
"into",
"a",
"shopping",
"list",
"that",
"we",
"ll",
"later",
"use",
"when",
"we",
"concoct",
"our",
"server",
"request",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L560-L591 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.