id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequencelengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
sequencelengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
160,600
keybase/client
go/protocol/keybase1/crypto.go
SignToString
func (c CryptoClient) SignToString(ctx context.Context, __arg SignToStringArg) (res string, err error) { err = c.Cli.Call(ctx, "keybase.1.crypto.signToString", []interface{}{__arg}, &res) return }
go
func (c CryptoClient) SignToString(ctx context.Context, __arg SignToStringArg) (res string, err error) { err = c.Cli.Call(ctx, "keybase.1.crypto.signToString", []interface{}{__arg}, &res) return }
[ "func", "(", "c", "CryptoClient", ")", "SignToString", "(", "ctx", "context", ".", "Context", ",", "__arg", "SignToStringArg", ")", "(", "res", "string", ",", "err", "error", ")", "{", "err", "=", "c", ".", "Cli", ".", "Call", "(", "ctx", ",", "\"", "\"", ",", "[", "]", "interface", "{", "}", "{", "__arg", "}", ",", "&", "res", ")", "\n", "return", "\n", "}" ]
// Same as the above except the full marshaled and encoded NaclSigInfo.
[ "Same", "as", "the", "above", "except", "the", "full", "marshaled", "and", "encoded", "NaclSigInfo", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/crypto.go#L249-L252
160,601
keybase/client
go/libkb/skb.go
DebugDumpKey
func DebugDumpKey(g *GlobalContext, name string, b []byte) { tmp, err := ioutil.TempFile(os.TempDir(), "dump-"+name) if err != nil { g.Log.Warning("Failed to dumpKey %s: %s", name, err) return } g.Log.Notice("DUMPKEY %s -> %s", name, tmp.Name()) buf := bytes.NewBuffer(b) io.Copy(tmp, buf) tmp.Close() }
go
func DebugDumpKey(g *GlobalContext, name string, b []byte) { tmp, err := ioutil.TempFile(os.TempDir(), "dump-"+name) if err != nil { g.Log.Warning("Failed to dumpKey %s: %s", name, err) return } g.Log.Notice("DUMPKEY %s -> %s", name, tmp.Name()) buf := bytes.NewBuffer(b) io.Copy(tmp, buf) tmp.Close() }
[ "func", "DebugDumpKey", "(", "g", "*", "GlobalContext", ",", "name", "string", ",", "b", "[", "]", "byte", ")", "{", "tmp", ",", "err", ":=", "ioutil", ".", "TempFile", "(", "os", ".", "TempDir", "(", ")", ",", "\"", "\"", "+", "name", ")", "\n", "if", "err", "!=", "nil", "{", "g", ".", "Log", ".", "Warning", "(", "\"", "\"", ",", "name", ",", "err", ")", "\n", "return", "\n", "}", "\n", "g", ".", "Log", ".", "Notice", "(", "\"", "\"", ",", "name", ",", "tmp", ".", "Name", "(", ")", ")", "\n", "buf", ":=", "bytes", ".", "NewBuffer", "(", "b", ")", "\n", "io", ".", "Copy", "(", "tmp", ",", "buf", ")", "\n", "tmp", ".", "Close", "(", ")", "\n", "}" ]
// DebugDumpKey is used only in debugging. For now it's not in // use but we might need it in the future.
[ "DebugDumpKey", "is", "used", "only", "in", "debugging", ".", "For", "now", "it", "s", "not", "in", "use", "but", "we", "might", "need", "it", "in", "the", "future", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/skb.go#L30-L40
160,602
keybase/client
go/stellar/global.go
KickAutoClaimRunner
func (s *Stellar) KickAutoClaimRunner(mctx libkb.MetaContext, trigger gregor.MsgID) { // Create the ACR if one does not exist. mctx.Debug("KickAutoClaimRunner(trigger:%v)", trigger) s.autoClaimRunnerLock.Lock() defer s.autoClaimRunnerLock.Unlock() if s.autoClaimRunner == nil { s.autoClaimRunner = NewAutoClaimRunner(s.walletState) } s.autoClaimRunner.Kick(mctx, trigger) }
go
func (s *Stellar) KickAutoClaimRunner(mctx libkb.MetaContext, trigger gregor.MsgID) { // Create the ACR if one does not exist. mctx.Debug("KickAutoClaimRunner(trigger:%v)", trigger) s.autoClaimRunnerLock.Lock() defer s.autoClaimRunnerLock.Unlock() if s.autoClaimRunner == nil { s.autoClaimRunner = NewAutoClaimRunner(s.walletState) } s.autoClaimRunner.Kick(mctx, trigger) }
[ "func", "(", "s", "*", "Stellar", ")", "KickAutoClaimRunner", "(", "mctx", "libkb", ".", "MetaContext", ",", "trigger", "gregor", ".", "MsgID", ")", "{", "// Create the ACR if one does not exist.", "mctx", ".", "Debug", "(", "\"", "\"", ",", "trigger", ")", "\n", "s", ".", "autoClaimRunnerLock", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "autoClaimRunnerLock", ".", "Unlock", "(", ")", "\n", "if", "s", ".", "autoClaimRunner", "==", "nil", "{", "s", ".", "autoClaimRunner", "=", "NewAutoClaimRunner", "(", "s", ".", "walletState", ")", "\n", "}", "\n", "s", ".", "autoClaimRunner", ".", "Kick", "(", "mctx", ",", "trigger", ")", "\n", "}" ]
// `trigger` is optional, and is of the gregor message that caused the kick.
[ "trigger", "is", "optional", "and", "is", "of", "the", "gregor", "message", "that", "caused", "the", "kick", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L175-L184
160,603
keybase/client
go/stellar/global.go
UpdateUnreadCount
func (s *Stellar) UpdateUnreadCount(ctx context.Context, accountID stellar1.AccountID, unread int) error { if s.badger == nil { s.G().Log.CDebugf(ctx, "Stellar Global has no badger") return nil } s.badger.SetWalletAccountUnreadCount(ctx, accountID, unread) return nil }
go
func (s *Stellar) UpdateUnreadCount(ctx context.Context, accountID stellar1.AccountID, unread int) error { if s.badger == nil { s.G().Log.CDebugf(ctx, "Stellar Global has no badger") return nil } s.badger.SetWalletAccountUnreadCount(ctx, accountID, unread) return nil }
[ "func", "(", "s", "*", "Stellar", ")", "UpdateUnreadCount", "(", "ctx", "context", ".", "Context", ",", "accountID", "stellar1", ".", "AccountID", ",", "unread", "int", ")", "error", "{", "if", "s", ".", "badger", "==", "nil", "{", "s", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ")", "\n", "return", "nil", "\n", "}", "\n\n", "s", ".", "badger", ".", "SetWalletAccountUnreadCount", "(", "ctx", ",", "accountID", ",", "unread", ")", "\n", "return", "nil", "\n", "}" ]
// UpdateUnreadCount will take the unread count for an account id and // update the badger.
[ "UpdateUnreadCount", "will", "take", "the", "unread", "count", "for", "an", "account", "id", "and", "update", "the", "badger", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L225-L233
160,604
keybase/client
go/stellar/global.go
SpecMiniChatPayments
func (s *Stellar) SpecMiniChatPayments(mctx libkb.MetaContext, payments []libkb.MiniChatPayment) (*libkb.MiniChatPaymentSummary, error) { return SpecMiniChatPayments(mctx, s.walletState, payments) }
go
func (s *Stellar) SpecMiniChatPayments(mctx libkb.MetaContext, payments []libkb.MiniChatPayment) (*libkb.MiniChatPaymentSummary, error) { return SpecMiniChatPayments(mctx, s.walletState, payments) }
[ "func", "(", "s", "*", "Stellar", ")", "SpecMiniChatPayments", "(", "mctx", "libkb", ".", "MetaContext", ",", "payments", "[", "]", "libkb", ".", "MiniChatPayment", ")", "(", "*", "libkb", ".", "MiniChatPaymentSummary", ",", "error", ")", "{", "return", "SpecMiniChatPayments", "(", "mctx", ",", "s", ".", "walletState", ",", "payments", ")", "\n", "}" ]
// SpecMiniChatPayments creates a summary of the amounts that a list of MiniChatPayments will // result in.
[ "SpecMiniChatPayments", "creates", "a", "summary", "of", "the", "amounts", "that", "a", "list", "of", "MiniChatPayments", "will", "result", "in", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L244-L246
160,605
keybase/client
go/stellar/global.go
HandleOobm
func (s *Stellar) HandleOobm(ctx context.Context, obm gregor.OutOfBandMessage) (bool, error) { if obm.System() == nil { return false, errors.New("nil system in out of band message") } // make a new background context for the handlers mctx := libkb.NewMetaContextBackground(s.G()).WithLogTag("WAOOBM") // all of these handlers should be in goroutines so they don't block the // oobm handler thread. switch obm.System().String() { case "internal.reconnect": go s.handleReconnect(mctx) // returning false, nil here so that others can handle this one too return false, nil case stellar1.PushPaymentStatus: go s.handlePaymentStatus(mctx, obm) return true, nil case stellar1.PushPaymentNotification: go s.handlePaymentNotification(mctx, obm) return true, nil case stellar1.PushRequestStatus: go s.handleRequestStatus(mctx, obm) return true, nil } return false, nil }
go
func (s *Stellar) HandleOobm(ctx context.Context, obm gregor.OutOfBandMessage) (bool, error) { if obm.System() == nil { return false, errors.New("nil system in out of band message") } // make a new background context for the handlers mctx := libkb.NewMetaContextBackground(s.G()).WithLogTag("WAOOBM") // all of these handlers should be in goroutines so they don't block the // oobm handler thread. switch obm.System().String() { case "internal.reconnect": go s.handleReconnect(mctx) // returning false, nil here so that others can handle this one too return false, nil case stellar1.PushPaymentStatus: go s.handlePaymentStatus(mctx, obm) return true, nil case stellar1.PushPaymentNotification: go s.handlePaymentNotification(mctx, obm) return true, nil case stellar1.PushRequestStatus: go s.handleRequestStatus(mctx, obm) return true, nil } return false, nil }
[ "func", "(", "s", "*", "Stellar", ")", "HandleOobm", "(", "ctx", "context", ".", "Context", ",", "obm", "gregor", ".", "OutOfBandMessage", ")", "(", "bool", ",", "error", ")", "{", "if", "obm", ".", "System", "(", ")", "==", "nil", "{", "return", "false", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// make a new background context for the handlers", "mctx", ":=", "libkb", ".", "NewMetaContextBackground", "(", "s", ".", "G", "(", ")", ")", ".", "WithLogTag", "(", "\"", "\"", ")", "\n\n", "// all of these handlers should be in goroutines so they don't block the", "// oobm handler thread.", "switch", "obm", ".", "System", "(", ")", ".", "String", "(", ")", "{", "case", "\"", "\"", ":", "go", "s", ".", "handleReconnect", "(", "mctx", ")", "\n", "// returning false, nil here so that others can handle this one too", "return", "false", ",", "nil", "\n", "case", "stellar1", ".", "PushPaymentStatus", ":", "go", "s", ".", "handlePaymentStatus", "(", "mctx", ",", "obm", ")", "\n", "return", "true", ",", "nil", "\n", "case", "stellar1", ".", "PushPaymentNotification", ":", "go", "s", ".", "handlePaymentNotification", "(", "mctx", ",", "obm", ")", "\n", "return", "true", ",", "nil", "\n", "case", "stellar1", ".", "PushRequestStatus", ":", "go", "s", ".", "handleRequestStatus", "(", "mctx", ",", "obm", ")", "\n", "return", "true", ",", "nil", "\n", "}", "\n\n", "return", "false", ",", "nil", "\n", "}" ]
// HandleOobm will handle any out of band gregor messages for stellar.
[ "HandleOobm", "will", "handle", "any", "out", "of", "band", "gregor", "messages", "for", "stellar", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L249-L277
160,606
keybase/client
go/stellar/global.go
hasAcceptedDisclaimer
func (s *Stellar) hasAcceptedDisclaimer(ctx context.Context) (bool, error) { log := func(format string, args ...interface{}) { s.G().Log.CDebugf(ctx, "Stellar.hasAcceptedDisclaimer "+format, args...) } uv, err := s.G().GetMeUV(ctx) if err != nil { return false, err } s.disclaimerLock.Lock() defer s.disclaimerLock.Unlock() // Check memory memAccepted := s.disclaimerAccepted != nil && s.disclaimerAccepted.Eq(uv) log("mem -> %v", memAccepted) if memAccepted { return true, nil } // Check disk dbKey := libkb.DbKey{ Typ: libkb.DBStellarDisclaimer, Key: uv.String(), } var dbEntry hasAcceptedDisclaimerDBEntry found, err := s.G().LocalDb.GetInto(&dbEntry, dbKey) log("disk -> [found:%v err:(%v) v:%v accepted:%v]", found, err, dbEntry.Version, dbEntry.Accepted) if err == nil && found && dbEntry.Version == 1 && dbEntry.Accepted { err = s.informAcceptedDisclaimerLocked(ctx) if err != nil { log("store -> err:(%v)", err) } return true, nil } // Check remote accepted, err := remote.GetAcceptedDisclaimer(ctx, s.G()) log("remote -> [err:(%v) accepted:%v]", err, accepted) if err != nil { return false, err } if accepted { err = s.informAcceptedDisclaimerLocked(ctx) if err != nil { log("store -> err:(%v)", err) } } return accepted, nil }
go
func (s *Stellar) hasAcceptedDisclaimer(ctx context.Context) (bool, error) { log := func(format string, args ...interface{}) { s.G().Log.CDebugf(ctx, "Stellar.hasAcceptedDisclaimer "+format, args...) } uv, err := s.G().GetMeUV(ctx) if err != nil { return false, err } s.disclaimerLock.Lock() defer s.disclaimerLock.Unlock() // Check memory memAccepted := s.disclaimerAccepted != nil && s.disclaimerAccepted.Eq(uv) log("mem -> %v", memAccepted) if memAccepted { return true, nil } // Check disk dbKey := libkb.DbKey{ Typ: libkb.DBStellarDisclaimer, Key: uv.String(), } var dbEntry hasAcceptedDisclaimerDBEntry found, err := s.G().LocalDb.GetInto(&dbEntry, dbKey) log("disk -> [found:%v err:(%v) v:%v accepted:%v]", found, err, dbEntry.Version, dbEntry.Accepted) if err == nil && found && dbEntry.Version == 1 && dbEntry.Accepted { err = s.informAcceptedDisclaimerLocked(ctx) if err != nil { log("store -> err:(%v)", err) } return true, nil } // Check remote accepted, err := remote.GetAcceptedDisclaimer(ctx, s.G()) log("remote -> [err:(%v) accepted:%v]", err, accepted) if err != nil { return false, err } if accepted { err = s.informAcceptedDisclaimerLocked(ctx) if err != nil { log("store -> err:(%v)", err) } } return accepted, nil }
[ "func", "(", "s", "*", "Stellar", ")", "hasAcceptedDisclaimer", "(", "ctx", "context", ".", "Context", ")", "(", "bool", ",", "error", ")", "{", "log", ":=", "func", "(", "format", "string", ",", "args", "...", "interface", "{", "}", ")", "{", "s", ".", "G", "(", ")", ".", "Log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", "+", "format", ",", "args", "...", ")", "\n", "}", "\n", "uv", ",", "err", ":=", "s", ".", "G", "(", ")", ".", "GetMeUV", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "s", ".", "disclaimerLock", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "disclaimerLock", ".", "Unlock", "(", ")", "\n", "// Check memory", "memAccepted", ":=", "s", ".", "disclaimerAccepted", "!=", "nil", "&&", "s", ".", "disclaimerAccepted", ".", "Eq", "(", "uv", ")", "\n", "log", "(", "\"", "\"", ",", "memAccepted", ")", "\n", "if", "memAccepted", "{", "return", "true", ",", "nil", "\n", "}", "\n", "// Check disk", "dbKey", ":=", "libkb", ".", "DbKey", "{", "Typ", ":", "libkb", ".", "DBStellarDisclaimer", ",", "Key", ":", "uv", ".", "String", "(", ")", ",", "}", "\n", "var", "dbEntry", "hasAcceptedDisclaimerDBEntry", "\n", "found", ",", "err", ":=", "s", ".", "G", "(", ")", ".", "LocalDb", ".", "GetInto", "(", "&", "dbEntry", ",", "dbKey", ")", "\n", "log", "(", "\"", "\"", ",", "found", ",", "err", ",", "dbEntry", ".", "Version", ",", "dbEntry", ".", "Accepted", ")", "\n", "if", "err", "==", "nil", "&&", "found", "&&", "dbEntry", ".", "Version", "==", "1", "&&", "dbEntry", ".", "Accepted", "{", "err", "=", "s", ".", "informAcceptedDisclaimerLocked", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "log", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "return", "true", ",", "nil", "\n", "}", "\n", "// Check remote", "accepted", ",", "err", ":=", "remote", ".", "GetAcceptedDisclaimer", "(", "ctx", ",", "s", ".", "G", "(", ")", ")", "\n", "log", "(", "\"", "\"", ",", "err", ",", "accepted", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "if", "accepted", "{", "err", "=", "s", ".", "informAcceptedDisclaimerLocked", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "log", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "return", "accepted", ",", "nil", "\n", "}" ]
// For a UV, accepted starts out false and transitions to true. It never becomes false again. // A cached true is returned, but a false always hits the server.
[ "For", "a", "UV", "accepted", "starts", "out", "false", "and", "transitions", "to", "true", ".", "It", "never", "becomes", "false", "again", ".", "A", "cached", "true", "is", "returned", "but", "a", "false", "always", "hits", "the", "server", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L356-L400
160,607
keybase/client
go/stellar/global.go
stopBuildPayment
func (s *Stellar) stopBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) { mctx.Debug("Stellar.stopBuildPayment(%v)", bid) if bid.IsNil() { s.buildPaymentSlot.Stop() return } s.bidLock.Lock() defer s.bidLock.Unlock() for _, entry := range s.bids { if entry.Bid.Eq(bid) { if entry.Stopped { mctx.Debug("payment already stopped") return } entry.Slot.Shutdown() entry.Stopped = true mctx.Debug("payment shutdown") return } } mctx.Debug("payment not found to stop") }
go
func (s *Stellar) stopBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) { mctx.Debug("Stellar.stopBuildPayment(%v)", bid) if bid.IsNil() { s.buildPaymentSlot.Stop() return } s.bidLock.Lock() defer s.bidLock.Unlock() for _, entry := range s.bids { if entry.Bid.Eq(bid) { if entry.Stopped { mctx.Debug("payment already stopped") return } entry.Slot.Shutdown() entry.Stopped = true mctx.Debug("payment shutdown") return } } mctx.Debug("payment not found to stop") }
[ "func", "(", "s", "*", "Stellar", ")", "stopBuildPayment", "(", "mctx", "libkb", ".", "MetaContext", ",", "bid", "stellar1", ".", "BuildPaymentID", ")", "{", "mctx", ".", "Debug", "(", "\"", "\"", ",", "bid", ")", "\n", "if", "bid", ".", "IsNil", "(", ")", "{", "s", ".", "buildPaymentSlot", ".", "Stop", "(", ")", "\n", "return", "\n", "}", "\n", "s", ".", "bidLock", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "bidLock", ".", "Unlock", "(", ")", "\n", "for", "_", ",", "entry", ":=", "range", "s", ".", "bids", "{", "if", "entry", ".", "Bid", ".", "Eq", "(", "bid", ")", "{", "if", "entry", ".", "Stopped", "{", "mctx", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "\n", "}", "\n", "entry", ".", "Slot", ".", "Shutdown", "(", ")", "\n", "entry", ".", "Stopped", "=", "true", "\n", "mctx", ".", "Debug", "(", "\"", "\"", ")", "\n", "return", "\n", "}", "\n", "}", "\n", "mctx", ".", "Debug", "(", "\"", "\"", ")", "\n", "}" ]
// stopBuildPayment stops a bid forever.
[ "stopBuildPayment", "stops", "a", "bid", "forever", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L454-L475
160,608
keybase/client
go/stellar/global.go
acquireBuildPayment
func (s *Stellar) acquireBuildPayment(mctx1 libkb.MetaContext, bid stellar1.BuildPaymentID, sessionID int) ( mctx libkb.MetaContext, data *buildPaymentData, release func(), err error) { mctx = mctx1 mctx.Debug("Stellar.acquireBuildPayment(%v)", bid) release = func() {} s.bidLock.Lock() defer s.bidLock.Unlock() for _, entry := range s.bids { entry := entry if !entry.Bid.Eq(bid) { continue } if entry.Stopped { return mctx, nil, release, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.") } mctx = mctx.WithCtx(entry.Slot.Use(mctx.Ctx(), sessionID)) if err = mctx.Ctx().Err(); err != nil { return mctx, nil, release, err } err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second) if err != nil { mctx.Debug("error while attempting to acquire data lock: %v", err) return mctx, nil, release, err } release = libkb.Once(func() { entry.DataLock.Unlock() }) return mctx, &entry.Data, release, nil } return mctx, nil, release, fmt.Errorf("payment build not found") }
go
func (s *Stellar) acquireBuildPayment(mctx1 libkb.MetaContext, bid stellar1.BuildPaymentID, sessionID int) ( mctx libkb.MetaContext, data *buildPaymentData, release func(), err error) { mctx = mctx1 mctx.Debug("Stellar.acquireBuildPayment(%v)", bid) release = func() {} s.bidLock.Lock() defer s.bidLock.Unlock() for _, entry := range s.bids { entry := entry if !entry.Bid.Eq(bid) { continue } if entry.Stopped { return mctx, nil, release, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.") } mctx = mctx.WithCtx(entry.Slot.Use(mctx.Ctx(), sessionID)) if err = mctx.Ctx().Err(); err != nil { return mctx, nil, release, err } err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second) if err != nil { mctx.Debug("error while attempting to acquire data lock: %v", err) return mctx, nil, release, err } release = libkb.Once(func() { entry.DataLock.Unlock() }) return mctx, &entry.Data, release, nil } return mctx, nil, release, fmt.Errorf("payment build not found") }
[ "func", "(", "s", "*", "Stellar", ")", "acquireBuildPayment", "(", "mctx1", "libkb", ".", "MetaContext", ",", "bid", "stellar1", ".", "BuildPaymentID", ",", "sessionID", "int", ")", "(", "mctx", "libkb", ".", "MetaContext", ",", "data", "*", "buildPaymentData", ",", "release", "func", "(", ")", ",", "err", "error", ")", "{", "mctx", "=", "mctx1", "\n", "mctx", ".", "Debug", "(", "\"", "\"", ",", "bid", ")", "\n", "release", "=", "func", "(", ")", "{", "}", "\n", "s", ".", "bidLock", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "bidLock", ".", "Unlock", "(", ")", "\n", "for", "_", ",", "entry", ":=", "range", "s", ".", "bids", "{", "entry", ":=", "entry", "\n", "if", "!", "entry", ".", "Bid", ".", "Eq", "(", "bid", ")", "{", "continue", "\n", "}", "\n", "if", "entry", ".", "Stopped", "{", "return", "mctx", ",", "nil", ",", "release", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "mctx", "=", "mctx", ".", "WithCtx", "(", "entry", ".", "Slot", ".", "Use", "(", "mctx", ".", "Ctx", "(", ")", ",", "sessionID", ")", ")", "\n", "if", "err", "=", "mctx", ".", "Ctx", "(", ")", ".", "Err", "(", ")", ";", "err", "!=", "nil", "{", "return", "mctx", ",", "nil", ",", "release", ",", "err", "\n", "}", "\n", "err", "=", "libkb", ".", "AcquireWithContextAndTimeout", "(", "mctx", ".", "Ctx", "(", ")", ",", "&", "entry", ".", "DataLock", ",", "5", "*", "time", ".", "Second", ")", "\n", "if", "err", "!=", "nil", "{", "mctx", ".", "Debug", "(", "\"", "\"", ",", "err", ")", "\n", "return", "mctx", ",", "nil", ",", "release", ",", "err", "\n", "}", "\n", "release", "=", "libkb", ".", "Once", "(", "func", "(", ")", "{", "entry", ".", "DataLock", ".", "Unlock", "(", ")", "\n", "}", ")", "\n", "return", "mctx", ",", "&", "entry", ".", "Data", ",", "release", ",", "nil", "\n", "}", "\n", "return", "mctx", ",", "nil", ",", "release", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}" ]
// acquireBuildPayment takes ownership of a payment build. // Returns a new `mctx` that the caller should switch to. Because it runs within the slot. // When err=nil the caller owns `data` and must release it with `release` when finished. // When err!=nil data is nil. // `release` can be called even when err!=nil. // `mctx` can also be used if err!=nil. // Callers should `release` soon after their context is canceled.
[ "acquireBuildPayment", "takes", "ownership", "of", "a", "payment", "build", ".", "Returns", "a", "new", "mctx", "that", "the", "caller", "should", "switch", "to", ".", "Because", "it", "runs", "within", "the", "slot", ".", "When", "err", "=", "nil", "the", "caller", "owns", "data", "and", "must", "release", "it", "with", "release", "when", "finished", ".", "When", "err!", "=", "nil", "data", "is", "nil", ".", "release", "can", "be", "called", "even", "when", "err!", "=", "nil", ".", "mctx", "can", "also", "be", "used", "if", "err!", "=", "nil", ".", "Callers", "should", "release", "soon", "after", "their", "context", "is", "canceled", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L484-L514
160,609
keybase/client
go/stellar/global.go
finalizeBuildPayment
func (s *Stellar) finalizeBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) (res *buildPaymentData, err error) { mctx.Debug("Stellar.finalizeBuildPayment(%v)", bid) s.bidLock.Lock() defer s.bidLock.Unlock() for _, entry := range s.bids { entry := entry if !entry.Bid.Eq(bid) { continue } if entry.Stopped { return nil, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.") } entry.Slot.Shutdown() entry.Stopped = true err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second) if err != nil { // This likely means something in the Slot is not yielding to its context or forgot to release the lock. mctx.Debug("error while attempting to acquire data lock: %v", err) return nil, err } res = &entry.Data entry.DataLock.Unlock() return res, nil } return nil, fmt.Errorf("payment build not found") }
go
func (s *Stellar) finalizeBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) (res *buildPaymentData, err error) { mctx.Debug("Stellar.finalizeBuildPayment(%v)", bid) s.bidLock.Lock() defer s.bidLock.Unlock() for _, entry := range s.bids { entry := entry if !entry.Bid.Eq(bid) { continue } if entry.Stopped { return nil, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.") } entry.Slot.Shutdown() entry.Stopped = true err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second) if err != nil { // This likely means something in the Slot is not yielding to its context or forgot to release the lock. mctx.Debug("error while attempting to acquire data lock: %v", err) return nil, err } res = &entry.Data entry.DataLock.Unlock() return res, nil } return nil, fmt.Errorf("payment build not found") }
[ "func", "(", "s", "*", "Stellar", ")", "finalizeBuildPayment", "(", "mctx", "libkb", ".", "MetaContext", ",", "bid", "stellar1", ".", "BuildPaymentID", ")", "(", "res", "*", "buildPaymentData", ",", "err", "error", ")", "{", "mctx", ".", "Debug", "(", "\"", "\"", ",", "bid", ")", "\n", "s", ".", "bidLock", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "bidLock", ".", "Unlock", "(", ")", "\n", "for", "_", ",", "entry", ":=", "range", "s", ".", "bids", "{", "entry", ":=", "entry", "\n", "if", "!", "entry", ".", "Bid", ".", "Eq", "(", "bid", ")", "{", "continue", "\n", "}", "\n", "if", "entry", ".", "Stopped", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "entry", ".", "Slot", ".", "Shutdown", "(", ")", "\n", "entry", ".", "Stopped", "=", "true", "\n", "err", "=", "libkb", ".", "AcquireWithContextAndTimeout", "(", "mctx", ".", "Ctx", "(", ")", ",", "&", "entry", ".", "DataLock", ",", "5", "*", "time", ".", "Second", ")", "\n", "if", "err", "!=", "nil", "{", "// This likely means something in the Slot is not yielding to its context or forgot to release the lock.", "mctx", ".", "Debug", "(", "\"", "\"", ",", "err", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "res", "=", "&", "entry", ".", "Data", "\n", "entry", ".", "DataLock", ".", "Unlock", "(", ")", "\n", "return", "res", ",", "nil", "\n", "}", "\n", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}" ]
// finalizeBuildPayment stops a bid forever and returns its data.
[ "finalizeBuildPayment", "stops", "a", "bid", "forever", "and", "returns", "its", "data", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L517-L542
160,610
keybase/client
go/stellar/global.go
BaseFee
func (s *Stellar) BaseFee(mctx libkb.MetaContext) uint64 { return s.walletState.BaseFee(mctx) }
go
func (s *Stellar) BaseFee(mctx libkb.MetaContext) uint64 { return s.walletState.BaseFee(mctx) }
[ "func", "(", "s", "*", "Stellar", ")", "BaseFee", "(", "mctx", "libkb", ".", "MetaContext", ")", "uint64", "{", "return", "s", ".", "walletState", ".", "BaseFee", "(", "mctx", ")", "\n", "}" ]
// BaseFee returns the server-suggested base fee per operation.
[ "BaseFee", "returns", "the", "server", "-", "suggested", "base", "fee", "per", "operation", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L549-L551
160,611
keybase/client
go/stellar/global.go
getFederationClient
func getFederationClient(g *libkb.GlobalContext) federation.ClientInterface { if g.Env.GetRunMode() != libkb.ProductionRunMode { return federation.DefaultTestNetClient } return federation.DefaultPublicNetClient }
go
func getFederationClient(g *libkb.GlobalContext) federation.ClientInterface { if g.Env.GetRunMode() != libkb.ProductionRunMode { return federation.DefaultTestNetClient } return federation.DefaultPublicNetClient }
[ "func", "getFederationClient", "(", "g", "*", "libkb", ".", "GlobalContext", ")", "federation", ".", "ClientInterface", "{", "if", "g", ".", "Env", ".", "GetRunMode", "(", ")", "!=", "libkb", ".", "ProductionRunMode", "{", "return", "federation", ".", "DefaultTestNetClient", "\n", "}", "\n", "return", "federation", ".", "DefaultPublicNetClient", "\n", "}" ]
// getFederationClient is a helper function used during // initialization.
[ "getFederationClient", "is", "a", "helper", "function", "used", "during", "initialization", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L555-L560
160,612
keybase/client
go/client/cmd_simplefs_write.go
NewCmdSimpleFSWrite
func NewCmdSimpleFSWrite(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command { return cli.Command{ Name: "write", ArgumentHelp: "<path>", Usage: "write input to file", Action: func(c *cli.Context) { cl.ChooseCommand(&CmdSimpleFSWrite{Contextified: libkb.NewContextified(g)}, "write", c) cl.SetNoStandalone() }, Flags: []cli.Flag{ cli.BoolFlag{ Name: "a, append", Usage: "add to existing file", }, cli.IntFlag{ Name: "b, buffersize", Value: writeBufSizeDefault, Usage: "write buffer size", }, }, } }
go
func NewCmdSimpleFSWrite(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command { return cli.Command{ Name: "write", ArgumentHelp: "<path>", Usage: "write input to file", Action: func(c *cli.Context) { cl.ChooseCommand(&CmdSimpleFSWrite{Contextified: libkb.NewContextified(g)}, "write", c) cl.SetNoStandalone() }, Flags: []cli.Flag{ cli.BoolFlag{ Name: "a, append", Usage: "add to existing file", }, cli.IntFlag{ Name: "b, buffersize", Value: writeBufSizeDefault, Usage: "write buffer size", }, }, } }
[ "func", "NewCmdSimpleFSWrite", "(", "cl", "*", "libcmdline", ".", "CommandLine", ",", "g", "*", "libkb", ".", "GlobalContext", ")", "cli", ".", "Command", "{", "return", "cli", ".", "Command", "{", "Name", ":", "\"", "\"", ",", "ArgumentHelp", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "Action", ":", "func", "(", "c", "*", "cli", ".", "Context", ")", "{", "cl", ".", "ChooseCommand", "(", "&", "CmdSimpleFSWrite", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", "}", ",", "\"", "\"", ",", "c", ")", "\n", "cl", ".", "SetNoStandalone", "(", ")", "\n", "}", ",", "Flags", ":", "[", "]", "cli", ".", "Flag", "{", "cli", ".", "BoolFlag", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "cli", ".", "IntFlag", "{", "Name", ":", "\"", "\"", ",", "Value", ":", "writeBufSizeDefault", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "}", ",", "}", "\n", "}" ]
// NewCmdSimpleFSWrite creates a new cli.Command.
[ "NewCmdSimpleFSWrite", "creates", "a", "new", "cli", ".", "Command", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs_write.go#L32-L53
160,613
keybase/client
go/client/cmd_simplefs_write.go
ParseArgv
func (c *CmdSimpleFSWrite) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) var err error c.bufSize = ctx.Int("buffersize") if ctx.Bool("append") { c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_APPEND | keybase1.OpenFlags_EXISTING } else { c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_REPLACE } if nargs != 1 { return fmt.Errorf("write requires a path argument") } p, err := makeSimpleFSPath(ctx.Args()[0]) if err != nil { return err } c.path = p return err }
go
func (c *CmdSimpleFSWrite) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) var err error c.bufSize = ctx.Int("buffersize") if ctx.Bool("append") { c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_APPEND | keybase1.OpenFlags_EXISTING } else { c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_REPLACE } if nargs != 1 { return fmt.Errorf("write requires a path argument") } p, err := makeSimpleFSPath(ctx.Args()[0]) if err != nil { return err } c.path = p return err }
[ "func", "(", "c", "*", "CmdSimpleFSWrite", ")", "ParseArgv", "(", "ctx", "*", "cli", ".", "Context", ")", "error", "{", "nargs", ":=", "len", "(", "ctx", ".", "Args", "(", ")", ")", "\n", "var", "err", "error", "\n\n", "c", ".", "bufSize", "=", "ctx", ".", "Int", "(", "\"", "\"", ")", "\n\n", "if", "ctx", ".", "Bool", "(", "\"", "\"", ")", "{", "c", ".", "flags", "=", "keybase1", ".", "OpenFlags_WRITE", "|", "keybase1", ".", "OpenFlags_APPEND", "|", "keybase1", ".", "OpenFlags_EXISTING", "\n", "}", "else", "{", "c", ".", "flags", "=", "keybase1", ".", "OpenFlags_WRITE", "|", "keybase1", ".", "OpenFlags_REPLACE", "\n", "}", "\n\n", "if", "nargs", "!=", "1", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "p", ",", "err", ":=", "makeSimpleFSPath", "(", "ctx", ".", "Args", "(", ")", "[", "0", "]", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "c", ".", "path", "=", "p", "\n", "return", "err", "\n", "}" ]
// ParseArgv gets the arguments for this command.
[ "ParseArgv", "gets", "the", "arguments", "for", "this", "command", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs_write.go#L127-L150
160,614
keybase/client
go/libkb/sync_trackers.go
compact
func (t Trackers) compact() (ret Trackers) { index := make(map[keybase1.UID]int) ret.Version = t.Version for _, el := range t.Trackers { if _, found := index[el.GetUID()]; !found { index[el.GetUID()] = el.Status if el.Status == TrackStatusTracking { ret.Trackers = append(ret.Trackers, el) } } } return ret }
go
func (t Trackers) compact() (ret Trackers) { index := make(map[keybase1.UID]int) ret.Version = t.Version for _, el := range t.Trackers { if _, found := index[el.GetUID()]; !found { index[el.GetUID()] = el.Status if el.Status == TrackStatusTracking { ret.Trackers = append(ret.Trackers, el) } } } return ret }
[ "func", "(", "t", "Trackers", ")", "compact", "(", ")", "(", "ret", "Trackers", ")", "{", "index", ":=", "make", "(", "map", "[", "keybase1", ".", "UID", "]", "int", ")", "\n\n", "ret", ".", "Version", "=", "t", ".", "Version", "\n\n", "for", "_", ",", "el", ":=", "range", "t", ".", "Trackers", "{", "if", "_", ",", "found", ":=", "index", "[", "el", ".", "GetUID", "(", ")", "]", ";", "!", "found", "{", "index", "[", "el", ".", "GetUID", "(", ")", "]", "=", "el", ".", "Status", "\n", "if", "el", ".", "Status", "==", "TrackStatusTracking", "{", "ret", ".", "Trackers", "=", "append", "(", "ret", ".", "Trackers", ",", "el", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "ret", "\n", "}" ]
// Remove duplicates and "untrack" statements in the list
[ "Remove", "duplicates", "and", "untrack", "statements", "in", "the", "list" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sync_trackers.go#L42-L56
160,615
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
NewExtraMetadataV3
func NewExtraMetadataV3( wkb TLFWriterKeyBundleV3, rkb TLFReaderKeyBundleV3, wkbNew, rkbNew bool) *ExtraMetadataV3 { return &ExtraMetadataV3{wkb, rkb, wkbNew, rkbNew} }
go
func NewExtraMetadataV3( wkb TLFWriterKeyBundleV3, rkb TLFReaderKeyBundleV3, wkbNew, rkbNew bool) *ExtraMetadataV3 { return &ExtraMetadataV3{wkb, rkb, wkbNew, rkbNew} }
[ "func", "NewExtraMetadataV3", "(", "wkb", "TLFWriterKeyBundleV3", ",", "rkb", "TLFReaderKeyBundleV3", ",", "wkbNew", ",", "rkbNew", "bool", ")", "*", "ExtraMetadataV3", "{", "return", "&", "ExtraMetadataV3", "{", "wkb", ",", "rkb", ",", "wkbNew", ",", "rkbNew", "}", "\n", "}" ]
// NewExtraMetadataV3 creates a new ExtraMetadataV3 given a pair of key bundles
[ "NewExtraMetadataV3", "creates", "a", "new", "ExtraMetadataV3", "given", "a", "pair", "of", "key", "bundles" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L142-L146
160,616
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
DeepCopy
func (extra ExtraMetadataV3) DeepCopy(codec kbfscodec.Codec) ( ExtraMetadata, error) { wkb, err := extra.wkb.DeepCopy(codec) if err != nil { return nil, err } rkb, err := extra.rkb.DeepCopy(codec) if err != nil { return nil, err } return NewExtraMetadataV3(wkb, rkb, extra.wkbNew, extra.rkbNew), nil }
go
func (extra ExtraMetadataV3) DeepCopy(codec kbfscodec.Codec) ( ExtraMetadata, error) { wkb, err := extra.wkb.DeepCopy(codec) if err != nil { return nil, err } rkb, err := extra.rkb.DeepCopy(codec) if err != nil { return nil, err } return NewExtraMetadataV3(wkb, rkb, extra.wkbNew, extra.rkbNew), nil }
[ "func", "(", "extra", "ExtraMetadataV3", ")", "DeepCopy", "(", "codec", "kbfscodec", ".", "Codec", ")", "(", "ExtraMetadata", ",", "error", ")", "{", "wkb", ",", "err", ":=", "extra", ".", "wkb", ".", "DeepCopy", "(", "codec", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "rkb", ",", "err", ":=", "extra", ".", "rkb", ".", "DeepCopy", "(", "codec", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "NewExtraMetadataV3", "(", "wkb", ",", "rkb", ",", "extra", ".", "wkbNew", ",", "extra", ".", "rkbNew", ")", ",", "nil", "\n", "}" ]
// DeepCopy implements the ExtraMetadata interface for ExtraMetadataV3.
[ "DeepCopy", "implements", "the", "ExtraMetadata", "interface", "for", "ExtraMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L159-L170
160,617
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
MakeSuccessorCopy
func (extra ExtraMetadataV3) MakeSuccessorCopy(codec kbfscodec.Codec) ( ExtraMetadata, error) { wkb, err := extra.wkb.DeepCopy(codec) if err != nil { return nil, err } rkb, err := extra.rkb.DeepCopy(codec) if err != nil { return nil, err } return NewExtraMetadataV3(wkb, rkb, false, false), nil }
go
func (extra ExtraMetadataV3) MakeSuccessorCopy(codec kbfscodec.Codec) ( ExtraMetadata, error) { wkb, err := extra.wkb.DeepCopy(codec) if err != nil { return nil, err } rkb, err := extra.rkb.DeepCopy(codec) if err != nil { return nil, err } return NewExtraMetadataV3(wkb, rkb, false, false), nil }
[ "func", "(", "extra", "ExtraMetadataV3", ")", "MakeSuccessorCopy", "(", "codec", "kbfscodec", ".", "Codec", ")", "(", "ExtraMetadata", ",", "error", ")", "{", "wkb", ",", "err", ":=", "extra", ".", "wkb", ".", "DeepCopy", "(", "codec", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "rkb", ",", "err", ":=", "extra", ".", "rkb", ".", "DeepCopy", "(", "codec", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "NewExtraMetadataV3", "(", "wkb", ",", "rkb", ",", "false", ",", "false", ")", ",", "nil", "\n", "}" ]
// MakeSuccessorCopy implements the ExtraMetadata interface for ExtraMetadataV3.
[ "MakeSuccessorCopy", "implements", "the", "ExtraMetadata", "interface", "for", "ExtraMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L173-L184
160,618
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
KeyGenerationsToUpdate
func (md *RootMetadataV3) KeyGenerationsToUpdate() (KeyGen, KeyGen) { latest := md.LatestKeyGeneration() if latest < FirstValidKeyGen { return 0, 0 } // We only keep track of the latest key generation in extra. return latest, latest + 1 }
go
func (md *RootMetadataV3) KeyGenerationsToUpdate() (KeyGen, KeyGen) { latest := md.LatestKeyGeneration() if latest < FirstValidKeyGen { return 0, 0 } // We only keep track of the latest key generation in extra. return latest, latest + 1 }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "KeyGenerationsToUpdate", "(", ")", "(", "KeyGen", ",", "KeyGen", ")", "{", "latest", ":=", "md", ".", "LatestKeyGeneration", "(", ")", "\n", "if", "latest", "<", "FirstValidKeyGen", "{", "return", "0", ",", "0", "\n", "}", "\n", "// We only keep track of the latest key generation in extra.", "return", "latest", ",", "latest", "+", "1", "\n", "}" ]
// KeyGenerationsToUpdate implements the RootMetadata interface // for RootMetadataV3.
[ "KeyGenerationsToUpdate", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L265-L272
160,619
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
IsValidRekeyRequest
func (md *RootMetadataV3) IsValidRekeyRequest( codec kbfscodec.Codec, prevBareMd RootMetadata, user keybase1.UID, prevExtra, extra ExtraMetadata) ( bool, error) { if !md.IsWriterMetadataCopiedSet() { // Not a copy. return false, nil } prevMd, ok := prevBareMd.(*RootMetadataV3) if !ok { // Not the same type so not a copy. return false, nil } prevExtraV3, ok := prevExtra.(*ExtraMetadataV3) if !ok { return false, errors.New("Invalid previous extra metadata") } extraV3, ok := extra.(*ExtraMetadataV3) if !ok { return false, errors.New("Invalid extra metadata") } writerEqual, err := kbfscodec.Equal( codec, md.WriterMetadata, prevMd.WriterMetadata) if err != nil { return false, err } if !writerEqual { // Copy mismatch. return false, nil } onlyUserRKeysChanged, err := md.haveOnlyUserRKeysChanged( codec, prevMd, user, prevExtraV3.rkb, extraV3.rkb) if err != nil { return false, err } if !onlyUserRKeysChanged { // Keys outside of this user's reader key set have changed. return false, nil } return true, nil }
go
func (md *RootMetadataV3) IsValidRekeyRequest( codec kbfscodec.Codec, prevBareMd RootMetadata, user keybase1.UID, prevExtra, extra ExtraMetadata) ( bool, error) { if !md.IsWriterMetadataCopiedSet() { // Not a copy. return false, nil } prevMd, ok := prevBareMd.(*RootMetadataV3) if !ok { // Not the same type so not a copy. return false, nil } prevExtraV3, ok := prevExtra.(*ExtraMetadataV3) if !ok { return false, errors.New("Invalid previous extra metadata") } extraV3, ok := extra.(*ExtraMetadataV3) if !ok { return false, errors.New("Invalid extra metadata") } writerEqual, err := kbfscodec.Equal( codec, md.WriterMetadata, prevMd.WriterMetadata) if err != nil { return false, err } if !writerEqual { // Copy mismatch. return false, nil } onlyUserRKeysChanged, err := md.haveOnlyUserRKeysChanged( codec, prevMd, user, prevExtraV3.rkb, extraV3.rkb) if err != nil { return false, err } if !onlyUserRKeysChanged { // Keys outside of this user's reader key set have changed. return false, nil } return true, nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "IsValidRekeyRequest", "(", "codec", "kbfscodec", ".", "Codec", ",", "prevBareMd", "RootMetadata", ",", "user", "keybase1", ".", "UID", ",", "prevExtra", ",", "extra", "ExtraMetadata", ")", "(", "bool", ",", "error", ")", "{", "if", "!", "md", ".", "IsWriterMetadataCopiedSet", "(", ")", "{", "// Not a copy.", "return", "false", ",", "nil", "\n", "}", "\n", "prevMd", ",", "ok", ":=", "prevBareMd", ".", "(", "*", "RootMetadataV3", ")", "\n", "if", "!", "ok", "{", "// Not the same type so not a copy.", "return", "false", ",", "nil", "\n", "}", "\n", "prevExtraV3", ",", "ok", ":=", "prevExtra", ".", "(", "*", "ExtraMetadataV3", ")", "\n", "if", "!", "ok", "{", "return", "false", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "extraV3", ",", "ok", ":=", "extra", ".", "(", "*", "ExtraMetadataV3", ")", "\n", "if", "!", "ok", "{", "return", "false", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "writerEqual", ",", "err", ":=", "kbfscodec", ".", "Equal", "(", "codec", ",", "md", ".", "WriterMetadata", ",", "prevMd", ".", "WriterMetadata", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "if", "!", "writerEqual", "{", "// Copy mismatch.", "return", "false", ",", "nil", "\n", "}", "\n", "onlyUserRKeysChanged", ",", "err", ":=", "md", ".", "haveOnlyUserRKeysChanged", "(", "codec", ",", "prevMd", ",", "user", ",", "prevExtraV3", ".", "rkb", ",", "extraV3", ".", "rkb", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "if", "!", "onlyUserRKeysChanged", "{", "// Keys outside of this user's reader key set have changed.", "return", "false", ",", "nil", "\n", "}", "\n", "return", "true", ",", "nil", "\n", "}" ]
// IsValidRekeyRequest implements the RootMetadata interface for RootMetadataV3.
[ "IsValidRekeyRequest", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L305-L345
160,620
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
MergedStatus
func (md *RootMetadataV3) MergedStatus() MergeStatus { if md.WriterMetadata.WFlags&MetadataFlagUnmerged != 0 { return Unmerged } return Merged }
go
func (md *RootMetadataV3) MergedStatus() MergeStatus { if md.WriterMetadata.WFlags&MetadataFlagUnmerged != 0 { return Unmerged } return Merged }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "MergedStatus", "(", ")", "MergeStatus", "{", "if", "md", ".", "WriterMetadata", ".", "WFlags", "&", "MetadataFlagUnmerged", "!=", "0", "{", "return", "Unmerged", "\n", "}", "\n", "return", "Merged", "\n", "}" ]
// MergedStatus implements the RootMetadata interface for RootMetadataV3.
[ "MergedStatus", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L348-L353
160,621
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
IsWriter
func (md *RootMetadataV3) IsWriter( ctx context.Context, user keybase1.UID, cryptKey kbfscrypto.CryptPublicKey, verifyingKey kbfscrypto.VerifyingKey, teamMemChecker TeamMembershipChecker, extra ExtraMetadata, offline keybase1.OfflineAvailability) (bool, error) { switch md.TypeForKeying() { case tlf.TeamKeying: err := md.checkNonPrivateExtra(extra) if err != nil { return false, err } tid, err := md.WriterMetadata.Writers[0].AsTeam() if err != nil { return false, err } // TODO: Eventually this will have to use a Merkle sequence // number to check historic versions. isWriter, err := teamMemChecker.IsTeamWriter( ctx, tid, user, verifyingKey, offline) if err != nil { return false, err } return isWriter, nil default: return md.isNonTeamWriter(ctx, user, cryptKey, extra) } }
go
func (md *RootMetadataV3) IsWriter( ctx context.Context, user keybase1.UID, cryptKey kbfscrypto.CryptPublicKey, verifyingKey kbfscrypto.VerifyingKey, teamMemChecker TeamMembershipChecker, extra ExtraMetadata, offline keybase1.OfflineAvailability) (bool, error) { switch md.TypeForKeying() { case tlf.TeamKeying: err := md.checkNonPrivateExtra(extra) if err != nil { return false, err } tid, err := md.WriterMetadata.Writers[0].AsTeam() if err != nil { return false, err } // TODO: Eventually this will have to use a Merkle sequence // number to check historic versions. isWriter, err := teamMemChecker.IsTeamWriter( ctx, tid, user, verifyingKey, offline) if err != nil { return false, err } return isWriter, nil default: return md.isNonTeamWriter(ctx, user, cryptKey, extra) } }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "IsWriter", "(", "ctx", "context", ".", "Context", ",", "user", "keybase1", ".", "UID", ",", "cryptKey", "kbfscrypto", ".", "CryptPublicKey", ",", "verifyingKey", "kbfscrypto", ".", "VerifyingKey", ",", "teamMemChecker", "TeamMembershipChecker", ",", "extra", "ExtraMetadata", ",", "offline", "keybase1", ".", "OfflineAvailability", ")", "(", "bool", ",", "error", ")", "{", "switch", "md", ".", "TypeForKeying", "(", ")", "{", "case", "tlf", ".", "TeamKeying", ":", "err", ":=", "md", ".", "checkNonPrivateExtra", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n\n", "tid", ",", "err", ":=", "md", ".", "WriterMetadata", ".", "Writers", "[", "0", "]", ".", "AsTeam", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n\n", "// TODO: Eventually this will have to use a Merkle sequence", "// number to check historic versions.", "isWriter", ",", "err", ":=", "teamMemChecker", ".", "IsTeamWriter", "(", "ctx", ",", "tid", ",", "user", ",", "verifyingKey", ",", "offline", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "return", "isWriter", ",", "nil", "\n", "default", ":", "return", "md", ".", "isNonTeamWriter", "(", "ctx", ",", "user", ",", "cryptKey", ",", "extra", ")", "\n", "}", "\n", "}" ]
// IsWriter implements the RootMetadata interface for RootMetadataV3.
[ "IsWriter", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L438-L466
160,622
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
IsReader
func (md *RootMetadataV3) IsReader( ctx context.Context, user keybase1.UID, cryptKey kbfscrypto.CryptPublicKey, teamMemChecker TeamMembershipChecker, extra ExtraMetadata, offline keybase1.OfflineAvailability) (bool, error) { switch md.TypeForKeying() { case tlf.PublicKeying: err := md.checkNonPrivateExtra(extra) if err != nil { return false, err } return true, nil case tlf.PrivateKeying: // Writers are also readers. isWriter, err := md.isNonTeamWriter(ctx, user, cryptKey, extra) if err != nil { return false, err } if isWriter { return true, nil } _, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return false, err } return rkb.IsReader(user, cryptKey), nil case tlf.TeamKeying: err := md.checkNonPrivateExtra(extra) if err != nil { return false, err } tid, err := md.WriterMetadata.Writers[0].AsTeam() if err != nil { return false, err } if tid.IsPublic() { return true, nil } // TODO: Eventually this will have to use a Merkle sequence // number to check historic versions. isReader, err := teamMemChecker.IsTeamReader(ctx, tid, user, offline) if err != nil { return false, err } return isReader, nil default: panic(fmt.Sprintf("Unknown TLF keying type: %s", md.TypeForKeying())) } }
go
func (md *RootMetadataV3) IsReader( ctx context.Context, user keybase1.UID, cryptKey kbfscrypto.CryptPublicKey, teamMemChecker TeamMembershipChecker, extra ExtraMetadata, offline keybase1.OfflineAvailability) (bool, error) { switch md.TypeForKeying() { case tlf.PublicKeying: err := md.checkNonPrivateExtra(extra) if err != nil { return false, err } return true, nil case tlf.PrivateKeying: // Writers are also readers. isWriter, err := md.isNonTeamWriter(ctx, user, cryptKey, extra) if err != nil { return false, err } if isWriter { return true, nil } _, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return false, err } return rkb.IsReader(user, cryptKey), nil case tlf.TeamKeying: err := md.checkNonPrivateExtra(extra) if err != nil { return false, err } tid, err := md.WriterMetadata.Writers[0].AsTeam() if err != nil { return false, err } if tid.IsPublic() { return true, nil } // TODO: Eventually this will have to use a Merkle sequence // number to check historic versions. isReader, err := teamMemChecker.IsTeamReader(ctx, tid, user, offline) if err != nil { return false, err } return isReader, nil default: panic(fmt.Sprintf("Unknown TLF keying type: %s", md.TypeForKeying())) } }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "IsReader", "(", "ctx", "context", ".", "Context", ",", "user", "keybase1", ".", "UID", ",", "cryptKey", "kbfscrypto", ".", "CryptPublicKey", ",", "teamMemChecker", "TeamMembershipChecker", ",", "extra", "ExtraMetadata", ",", "offline", "keybase1", ".", "OfflineAvailability", ")", "(", "bool", ",", "error", ")", "{", "switch", "md", ".", "TypeForKeying", "(", ")", "{", "case", "tlf", ".", "PublicKeying", ":", "err", ":=", "md", ".", "checkNonPrivateExtra", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "return", "true", ",", "nil", "\n", "case", "tlf", ".", "PrivateKeying", ":", "// Writers are also readers.", "isWriter", ",", "err", ":=", "md", ".", "isNonTeamWriter", "(", "ctx", ",", "user", ",", "cryptKey", ",", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "if", "isWriter", "{", "return", "true", ",", "nil", "\n", "}", "\n\n", "_", ",", "rkb", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "return", "rkb", ".", "IsReader", "(", "user", ",", "cryptKey", ")", ",", "nil", "\n", "case", "tlf", ".", "TeamKeying", ":", "err", ":=", "md", ".", "checkNonPrivateExtra", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n\n", "tid", ",", "err", ":=", "md", ".", "WriterMetadata", ".", "Writers", "[", "0", "]", ".", "AsTeam", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n\n", "if", "tid", ".", "IsPublic", "(", ")", "{", "return", "true", ",", "nil", "\n", "}", "\n\n", "// TODO: Eventually this will have to use a Merkle sequence", "// number to check historic versions.", "isReader", ",", "err", ":=", "teamMemChecker", ".", "IsTeamReader", "(", "ctx", ",", "tid", ",", "user", ",", "offline", ")", "\n", "if", "err", "!=", "nil", "{", "return", "false", ",", "err", "\n", "}", "\n", "return", "isReader", ",", "nil", "\n", "default", ":", "panic", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "md", ".", "TypeForKeying", "(", ")", ")", ")", "\n", "}", "\n", "}" ]
// IsReader implements the RootMetadata interface for RootMetadataV3.
[ "IsReader", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L469-L520
160,623
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
DeepCopy
func (md *RootMetadataV3) DeepCopy( codec kbfscodec.Codec) (MutableRootMetadata, error) { var newMd RootMetadataV3 if err := kbfscodec.Update(codec, &newMd, md); err != nil { return nil, err } return &newMd, nil }
go
func (md *RootMetadataV3) DeepCopy( codec kbfscodec.Codec) (MutableRootMetadata, error) { var newMd RootMetadataV3 if err := kbfscodec.Update(codec, &newMd, md); err != nil { return nil, err } return &newMd, nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "DeepCopy", "(", "codec", "kbfscodec", ".", "Codec", ")", "(", "MutableRootMetadata", ",", "error", ")", "{", "var", "newMd", "RootMetadataV3", "\n", "if", "err", ":=", "kbfscodec", ".", "Update", "(", "codec", ",", "&", "newMd", ",", "md", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "newMd", ",", "nil", "\n", "}" ]
// DeepCopy implements the RootMetadata interface for RootMetadataV3.
[ "DeepCopy", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L523-L530
160,624
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
MakeSuccessorCopy
func (md *RootMetadataV3) MakeSuccessorCopy( codec kbfscodec.Codec, extra ExtraMetadata, _ MetadataVer, _ func() ([]kbfscrypto.TLFCryptKey, error), isReadableAndWriter bool) ( MutableRootMetadata, ExtraMetadata, error) { var extraCopy ExtraMetadata if extra != nil { var err error extraCopy, err = extra.MakeSuccessorCopy(codec) if err != nil { return nil, nil, err } } mdCopy, err := md.DeepCopy(codec) if err != nil { return nil, nil, err } // TODO: If there is ever a RootMetadataV4 this will need to perform the conversion. return mdCopy, extraCopy, nil }
go
func (md *RootMetadataV3) MakeSuccessorCopy( codec kbfscodec.Codec, extra ExtraMetadata, _ MetadataVer, _ func() ([]kbfscrypto.TLFCryptKey, error), isReadableAndWriter bool) ( MutableRootMetadata, ExtraMetadata, error) { var extraCopy ExtraMetadata if extra != nil { var err error extraCopy, err = extra.MakeSuccessorCopy(codec) if err != nil { return nil, nil, err } } mdCopy, err := md.DeepCopy(codec) if err != nil { return nil, nil, err } // TODO: If there is ever a RootMetadataV4 this will need to perform the conversion. return mdCopy, extraCopy, nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "MakeSuccessorCopy", "(", "codec", "kbfscodec", ".", "Codec", ",", "extra", "ExtraMetadata", ",", "_", "MetadataVer", ",", "_", "func", "(", ")", "(", "[", "]", "kbfscrypto", ".", "TLFCryptKey", ",", "error", ")", ",", "isReadableAndWriter", "bool", ")", "(", "MutableRootMetadata", ",", "ExtraMetadata", ",", "error", ")", "{", "var", "extraCopy", "ExtraMetadata", "\n", "if", "extra", "!=", "nil", "{", "var", "err", "error", "\n", "extraCopy", ",", "err", "=", "extra", ".", "MakeSuccessorCopy", "(", "codec", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n", "}", "\n", "mdCopy", ",", "err", ":=", "md", ".", "DeepCopy", "(", "codec", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n", "// TODO: If there is ever a RootMetadataV4 this will need to perform the conversion.", "return", "mdCopy", ",", "extraCopy", ",", "nil", "\n", "}" ]
// MakeSuccessorCopy implements the ImmutableRootMetadata interface for RootMetadataV3.
[ "MakeSuccessorCopy", "implements", "the", "ImmutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L533-L551
160,625
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
CheckValidSuccessor
func (md *RootMetadataV3) CheckValidSuccessor( currID ID, nextMd RootMetadata) error { // (1) Verify current metadata is non-final. if md.IsFinal() { return MetadataIsFinalError{} } // (2) Check TLF ID. if nextMd.TlfID() != md.TlfID() { return MDTlfIDMismatch{ CurrID: md.TlfID(), NextID: nextMd.TlfID(), } } // (3) Check revision. if nextMd.RevisionNumber() != md.RevisionNumber()+1 { return MDRevisionMismatch{ Rev: nextMd.RevisionNumber(), Curr: md.RevisionNumber(), } } // (4) Check PrevRoot pointer. expectedPrevRoot := currID if nextMd.IsFinal() { expectedPrevRoot = md.GetPrevRoot() } if nextMd.GetPrevRoot() != expectedPrevRoot { return MDPrevRootMismatch{ prevRoot: nextMd.GetPrevRoot(), expectedPrevRoot: expectedPrevRoot, } } // (5) Check branch ID. if md.MergedStatus() == nextMd.MergedStatus() && md.BID() != nextMd.BID() { return errors.Errorf("Unexpected branch ID on successor: %s vs. %s", md.BID(), nextMd.BID()) } else if md.MergedStatus() == Unmerged && nextMd.MergedStatus() == Merged { return errors.New("merged MD can't follow unmerged MD") } // (6) Check disk usage. expectedUsage := md.DiskUsage() if !nextMd.IsWriterMetadataCopiedSet() { expectedUsage += nextMd.RefBytes() - nextMd.UnrefBytes() } if nextMd.DiskUsage() != expectedUsage { return MDDiskUsageMismatch{ expectedDiskUsage: expectedUsage, actualDiskUsage: nextMd.DiskUsage(), } } expectedMDUsage := md.MDDiskUsage() if !nextMd.IsWriterMetadataCopiedSet() { expectedMDUsage += nextMd.MDRefBytes() } // Add an exception for the case where MDRefBytes is equal, since // it probably indicates an older client just copied the previous // MDRefBytes value as an unknown field. if nextMd.MDDiskUsage() != expectedMDUsage && md.MDRefBytes() != nextMd.MDRefBytes() { return MDDiskUsageMismatch{ expectedDiskUsage: expectedMDUsage, actualDiskUsage: nextMd.MDDiskUsage(), } } // TODO: Check that the successor (bare) TLF handle is the // same or more resolved. return nil }
go
func (md *RootMetadataV3) CheckValidSuccessor( currID ID, nextMd RootMetadata) error { // (1) Verify current metadata is non-final. if md.IsFinal() { return MetadataIsFinalError{} } // (2) Check TLF ID. if nextMd.TlfID() != md.TlfID() { return MDTlfIDMismatch{ CurrID: md.TlfID(), NextID: nextMd.TlfID(), } } // (3) Check revision. if nextMd.RevisionNumber() != md.RevisionNumber()+1 { return MDRevisionMismatch{ Rev: nextMd.RevisionNumber(), Curr: md.RevisionNumber(), } } // (4) Check PrevRoot pointer. expectedPrevRoot := currID if nextMd.IsFinal() { expectedPrevRoot = md.GetPrevRoot() } if nextMd.GetPrevRoot() != expectedPrevRoot { return MDPrevRootMismatch{ prevRoot: nextMd.GetPrevRoot(), expectedPrevRoot: expectedPrevRoot, } } // (5) Check branch ID. if md.MergedStatus() == nextMd.MergedStatus() && md.BID() != nextMd.BID() { return errors.Errorf("Unexpected branch ID on successor: %s vs. %s", md.BID(), nextMd.BID()) } else if md.MergedStatus() == Unmerged && nextMd.MergedStatus() == Merged { return errors.New("merged MD can't follow unmerged MD") } // (6) Check disk usage. expectedUsage := md.DiskUsage() if !nextMd.IsWriterMetadataCopiedSet() { expectedUsage += nextMd.RefBytes() - nextMd.UnrefBytes() } if nextMd.DiskUsage() != expectedUsage { return MDDiskUsageMismatch{ expectedDiskUsage: expectedUsage, actualDiskUsage: nextMd.DiskUsage(), } } expectedMDUsage := md.MDDiskUsage() if !nextMd.IsWriterMetadataCopiedSet() { expectedMDUsage += nextMd.MDRefBytes() } // Add an exception for the case where MDRefBytes is equal, since // it probably indicates an older client just copied the previous // MDRefBytes value as an unknown field. if nextMd.MDDiskUsage() != expectedMDUsage && md.MDRefBytes() != nextMd.MDRefBytes() { return MDDiskUsageMismatch{ expectedDiskUsage: expectedMDUsage, actualDiskUsage: nextMd.MDDiskUsage(), } } // TODO: Check that the successor (bare) TLF handle is the // same or more resolved. return nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "CheckValidSuccessor", "(", "currID", "ID", ",", "nextMd", "RootMetadata", ")", "error", "{", "// (1) Verify current metadata is non-final.", "if", "md", ".", "IsFinal", "(", ")", "{", "return", "MetadataIsFinalError", "{", "}", "\n", "}", "\n\n", "// (2) Check TLF ID.", "if", "nextMd", ".", "TlfID", "(", ")", "!=", "md", ".", "TlfID", "(", ")", "{", "return", "MDTlfIDMismatch", "{", "CurrID", ":", "md", ".", "TlfID", "(", ")", ",", "NextID", ":", "nextMd", ".", "TlfID", "(", ")", ",", "}", "\n", "}", "\n\n", "// (3) Check revision.", "if", "nextMd", ".", "RevisionNumber", "(", ")", "!=", "md", ".", "RevisionNumber", "(", ")", "+", "1", "{", "return", "MDRevisionMismatch", "{", "Rev", ":", "nextMd", ".", "RevisionNumber", "(", ")", ",", "Curr", ":", "md", ".", "RevisionNumber", "(", ")", ",", "}", "\n", "}", "\n\n", "// (4) Check PrevRoot pointer.", "expectedPrevRoot", ":=", "currID", "\n", "if", "nextMd", ".", "IsFinal", "(", ")", "{", "expectedPrevRoot", "=", "md", ".", "GetPrevRoot", "(", ")", "\n", "}", "\n", "if", "nextMd", ".", "GetPrevRoot", "(", ")", "!=", "expectedPrevRoot", "{", "return", "MDPrevRootMismatch", "{", "prevRoot", ":", "nextMd", ".", "GetPrevRoot", "(", ")", ",", "expectedPrevRoot", ":", "expectedPrevRoot", ",", "}", "\n", "}", "\n\n", "// (5) Check branch ID.", "if", "md", ".", "MergedStatus", "(", ")", "==", "nextMd", ".", "MergedStatus", "(", ")", "&&", "md", ".", "BID", "(", ")", "!=", "nextMd", ".", "BID", "(", ")", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "md", ".", "BID", "(", ")", ",", "nextMd", ".", "BID", "(", ")", ")", "\n", "}", "else", "if", "md", ".", "MergedStatus", "(", ")", "==", "Unmerged", "&&", "nextMd", ".", "MergedStatus", "(", ")", "==", "Merged", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// (6) Check disk usage.", "expectedUsage", ":=", "md", ".", "DiskUsage", "(", ")", "\n", "if", "!", "nextMd", ".", "IsWriterMetadataCopiedSet", "(", ")", "{", "expectedUsage", "+=", "nextMd", ".", "RefBytes", "(", ")", "-", "nextMd", ".", "UnrefBytes", "(", ")", "\n", "}", "\n", "if", "nextMd", ".", "DiskUsage", "(", ")", "!=", "expectedUsage", "{", "return", "MDDiskUsageMismatch", "{", "expectedDiskUsage", ":", "expectedUsage", ",", "actualDiskUsage", ":", "nextMd", ".", "DiskUsage", "(", ")", ",", "}", "\n", "}", "\n", "expectedMDUsage", ":=", "md", ".", "MDDiskUsage", "(", ")", "\n", "if", "!", "nextMd", ".", "IsWriterMetadataCopiedSet", "(", ")", "{", "expectedMDUsage", "+=", "nextMd", ".", "MDRefBytes", "(", ")", "\n", "}", "\n", "// Add an exception for the case where MDRefBytes is equal, since", "// it probably indicates an older client just copied the previous", "// MDRefBytes value as an unknown field.", "if", "nextMd", ".", "MDDiskUsage", "(", ")", "!=", "expectedMDUsage", "&&", "md", ".", "MDRefBytes", "(", ")", "!=", "nextMd", ".", "MDRefBytes", "(", ")", "{", "return", "MDDiskUsageMismatch", "{", "expectedDiskUsage", ":", "expectedMDUsage", ",", "actualDiskUsage", ":", "nextMd", ".", "MDDiskUsage", "(", ")", ",", "}", "\n", "}", "\n\n", "// TODO: Check that the successor (bare) TLF handle is the", "// same or more resolved.", "return", "nil", "\n", "}" ]
// CheckValidSuccessor implements the RootMetadata interface for RootMetadataV3.
[ "CheckValidSuccessor", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L554-L627
160,626
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
CheckValidSuccessorForServer
func (md *RootMetadataV3) CheckValidSuccessorForServer( currID ID, nextMd RootMetadata) error { err := md.CheckValidSuccessor(currID, nextMd) switch err := err.(type) { case nil: break case MDRevisionMismatch: return ServerErrorConflictRevision{ Expected: err.Curr + 1, Actual: err.Rev, } case MDPrevRootMismatch: return ServerErrorConflictPrevRoot{ Expected: err.expectedPrevRoot, Actual: err.prevRoot, } case MDDiskUsageMismatch: return ServerErrorConflictDiskUsage{ Expected: err.expectedDiskUsage, Actual: err.actualDiskUsage, } default: return ServerError{Err: err} } return nil }
go
func (md *RootMetadataV3) CheckValidSuccessorForServer( currID ID, nextMd RootMetadata) error { err := md.CheckValidSuccessor(currID, nextMd) switch err := err.(type) { case nil: break case MDRevisionMismatch: return ServerErrorConflictRevision{ Expected: err.Curr + 1, Actual: err.Rev, } case MDPrevRootMismatch: return ServerErrorConflictPrevRoot{ Expected: err.expectedPrevRoot, Actual: err.prevRoot, } case MDDiskUsageMismatch: return ServerErrorConflictDiskUsage{ Expected: err.expectedDiskUsage, Actual: err.actualDiskUsage, } default: return ServerError{Err: err} } return nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "CheckValidSuccessorForServer", "(", "currID", "ID", ",", "nextMd", "RootMetadata", ")", "error", "{", "err", ":=", "md", ".", "CheckValidSuccessor", "(", "currID", ",", "nextMd", ")", "\n", "switch", "err", ":=", "err", ".", "(", "type", ")", "{", "case", "nil", ":", "break", "\n\n", "case", "MDRevisionMismatch", ":", "return", "ServerErrorConflictRevision", "{", "Expected", ":", "err", ".", "Curr", "+", "1", ",", "Actual", ":", "err", ".", "Rev", ",", "}", "\n\n", "case", "MDPrevRootMismatch", ":", "return", "ServerErrorConflictPrevRoot", "{", "Expected", ":", "err", ".", "expectedPrevRoot", ",", "Actual", ":", "err", ".", "prevRoot", ",", "}", "\n\n", "case", "MDDiskUsageMismatch", ":", "return", "ServerErrorConflictDiskUsage", "{", "Expected", ":", "err", ".", "expectedDiskUsage", ",", "Actual", ":", "err", ".", "actualDiskUsage", ",", "}", "\n\n", "default", ":", "return", "ServerError", "{", "Err", ":", "err", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckValidSuccessorForServer implements the RootMetadata interface for RootMetadataV3.
[ "CheckValidSuccessorForServer", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L630-L660
160,627
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
TypeForKeying
func (md *RootMetadataV3) TypeForKeying() tlf.KeyingType { if md.isBackedByTeam() { return tlf.TeamKeying } return md.TlfID().Type().ToKeyingType() }
go
func (md *RootMetadataV3) TypeForKeying() tlf.KeyingType { if md.isBackedByTeam() { return tlf.TeamKeying } return md.TlfID().Type().ToKeyingType() }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "TypeForKeying", "(", ")", "tlf", ".", "KeyingType", "{", "if", "md", ".", "isBackedByTeam", "(", ")", "{", "return", "tlf", ".", "TeamKeying", "\n", "}", "\n", "return", "md", ".", "TlfID", "(", ")", ".", "Type", "(", ")", ".", "ToKeyingType", "(", ")", "\n", "}" ]
// TypeForKeying implements the RootMetadata interface for RootMetadataV3.
[ "TypeForKeying", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L678-L683
160,628
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
MakeBareTlfHandle
func (md *RootMetadataV3) MakeBareTlfHandle(extra ExtraMetadata) ( tlf.Handle, error) { var writers, readers []keybase1.UserOrTeamID if md.TypeForKeying() == tlf.PrivateKeying { wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return tlf.Handle{}, err } writers = make([]keybase1.UserOrTeamID, 0, len(wkb.Keys)) readers = make([]keybase1.UserOrTeamID, 0, len(rkb.Keys)) for w := range wkb.Keys { writers = append(writers, w.AsUserOrTeam()) } for r := range rkb.Keys { // TODO: Return an error instead if r is // PublicUID. Maybe return an error if r is in // WKeys also. Or do all this in // MakeBareTlfHandle. if _, ok := wkb.Keys[r]; !ok && r != keybase1.PublicUID { readers = append(readers, r.AsUserOrTeam()) } } } else { err := md.checkNonPrivateExtra(extra) if err != nil { return tlf.Handle{}, err } writers = md.WriterMetadata.Writers if md.TypeForKeying() == tlf.PublicKeying { readers = []keybase1.UserOrTeamID{keybase1.PublicUID.AsUserOrTeam()} } } return tlf.MakeHandle( writers, readers, md.WriterMetadata.UnresolvedWriters, md.UnresolvedReaders, md.TlfHandleExtensions()) }
go
func (md *RootMetadataV3) MakeBareTlfHandle(extra ExtraMetadata) ( tlf.Handle, error) { var writers, readers []keybase1.UserOrTeamID if md.TypeForKeying() == tlf.PrivateKeying { wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return tlf.Handle{}, err } writers = make([]keybase1.UserOrTeamID, 0, len(wkb.Keys)) readers = make([]keybase1.UserOrTeamID, 0, len(rkb.Keys)) for w := range wkb.Keys { writers = append(writers, w.AsUserOrTeam()) } for r := range rkb.Keys { // TODO: Return an error instead if r is // PublicUID. Maybe return an error if r is in // WKeys also. Or do all this in // MakeBareTlfHandle. if _, ok := wkb.Keys[r]; !ok && r != keybase1.PublicUID { readers = append(readers, r.AsUserOrTeam()) } } } else { err := md.checkNonPrivateExtra(extra) if err != nil { return tlf.Handle{}, err } writers = md.WriterMetadata.Writers if md.TypeForKeying() == tlf.PublicKeying { readers = []keybase1.UserOrTeamID{keybase1.PublicUID.AsUserOrTeam()} } } return tlf.MakeHandle( writers, readers, md.WriterMetadata.UnresolvedWriters, md.UnresolvedReaders, md.TlfHandleExtensions()) }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "MakeBareTlfHandle", "(", "extra", "ExtraMetadata", ")", "(", "tlf", ".", "Handle", ",", "error", ")", "{", "var", "writers", ",", "readers", "[", "]", "keybase1", ".", "UserOrTeamID", "\n", "if", "md", ".", "TypeForKeying", "(", ")", "==", "tlf", ".", "PrivateKeying", "{", "wkb", ",", "rkb", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "tlf", ".", "Handle", "{", "}", ",", "err", "\n", "}", "\n", "writers", "=", "make", "(", "[", "]", "keybase1", ".", "UserOrTeamID", ",", "0", ",", "len", "(", "wkb", ".", "Keys", ")", ")", "\n", "readers", "=", "make", "(", "[", "]", "keybase1", ".", "UserOrTeamID", ",", "0", ",", "len", "(", "rkb", ".", "Keys", ")", ")", "\n", "for", "w", ":=", "range", "wkb", ".", "Keys", "{", "writers", "=", "append", "(", "writers", ",", "w", ".", "AsUserOrTeam", "(", ")", ")", "\n", "}", "\n", "for", "r", ":=", "range", "rkb", ".", "Keys", "{", "// TODO: Return an error instead if r is", "// PublicUID. Maybe return an error if r is in", "// WKeys also. Or do all this in", "// MakeBareTlfHandle.", "if", "_", ",", "ok", ":=", "wkb", ".", "Keys", "[", "r", "]", ";", "!", "ok", "&&", "r", "!=", "keybase1", ".", "PublicUID", "{", "readers", "=", "append", "(", "readers", ",", "r", ".", "AsUserOrTeam", "(", ")", ")", "\n", "}", "\n", "}", "\n", "}", "else", "{", "err", ":=", "md", ".", "checkNonPrivateExtra", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "tlf", ".", "Handle", "{", "}", ",", "err", "\n", "}", "\n\n", "writers", "=", "md", ".", "WriterMetadata", ".", "Writers", "\n", "if", "md", ".", "TypeForKeying", "(", ")", "==", "tlf", ".", "PublicKeying", "{", "readers", "=", "[", "]", "keybase1", ".", "UserOrTeamID", "{", "keybase1", ".", "PublicUID", ".", "AsUserOrTeam", "(", ")", "}", "\n", "}", "\n", "}", "\n\n", "return", "tlf", ".", "MakeHandle", "(", "writers", ",", "readers", ",", "md", ".", "WriterMetadata", ".", "UnresolvedWriters", ",", "md", ".", "UnresolvedReaders", ",", "md", ".", "TlfHandleExtensions", "(", ")", ")", "\n", "}" ]
// MakeBareTlfHandle implements the RootMetadata interface for RootMetadataV3.
[ "MakeBareTlfHandle", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L686-L725
160,629
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
PromoteReaders
func (md *RootMetadataV3) PromoteReaders( readersToPromote map[keybase1.UID]bool, extra ExtraMetadata) error { if md.TypeForKeying() != tlf.PrivateKeying { return InvalidNonPrivateTLFOperation{md.TlfID(), "PromoteReaders", md.Version()} } if len(readersToPromote) == 0 { return nil } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return err } for reader := range readersToPromote { dkim, ok := rkb.Keys[reader] if !ok { return errors.Errorf("Could not find %s in rkb", reader) } // TODO: This is incorrect, since dkim contains offsets info // rkb.TLFEphemeralPublicKeys, which don't directly translate // to offsets into wkb.TLFEphemeralPublicKeys. // // Also, doing this may leave some entries in // rkb.TLFEphemeralPublicKeys unreferenced, so they should be // removed. // // See KBFS-1719. wkb.Keys[reader] = dkim delete(rkb.Keys, reader) } return nil }
go
func (md *RootMetadataV3) PromoteReaders( readersToPromote map[keybase1.UID]bool, extra ExtraMetadata) error { if md.TypeForKeying() != tlf.PrivateKeying { return InvalidNonPrivateTLFOperation{md.TlfID(), "PromoteReaders", md.Version()} } if len(readersToPromote) == 0 { return nil } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return err } for reader := range readersToPromote { dkim, ok := rkb.Keys[reader] if !ok { return errors.Errorf("Could not find %s in rkb", reader) } // TODO: This is incorrect, since dkim contains offsets info // rkb.TLFEphemeralPublicKeys, which don't directly translate // to offsets into wkb.TLFEphemeralPublicKeys. // // Also, doing this may leave some entries in // rkb.TLFEphemeralPublicKeys unreferenced, so they should be // removed. // // See KBFS-1719. wkb.Keys[reader] = dkim delete(rkb.Keys, reader) } return nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "PromoteReaders", "(", "readersToPromote", "map", "[", "keybase1", ".", "UID", "]", "bool", ",", "extra", "ExtraMetadata", ")", "error", "{", "if", "md", ".", "TypeForKeying", "(", ")", "!=", "tlf", ".", "PrivateKeying", "{", "return", "InvalidNonPrivateTLFOperation", "{", "md", ".", "TlfID", "(", ")", ",", "\"", "\"", ",", "md", ".", "Version", "(", ")", "}", "\n", "}", "\n\n", "if", "len", "(", "readersToPromote", ")", "==", "0", "{", "return", "nil", "\n", "}", "\n\n", "wkb", ",", "rkb", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "for", "reader", ":=", "range", "readersToPromote", "{", "dkim", ",", "ok", ":=", "rkb", ".", "Keys", "[", "reader", "]", "\n", "if", "!", "ok", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "reader", ")", "\n", "}", "\n", "// TODO: This is incorrect, since dkim contains offsets info", "// rkb.TLFEphemeralPublicKeys, which don't directly translate", "// to offsets into wkb.TLFEphemeralPublicKeys.", "//", "// Also, doing this may leave some entries in", "// rkb.TLFEphemeralPublicKeys unreferenced, so they should be", "// removed.", "//", "// See KBFS-1719.", "wkb", ".", "Keys", "[", "reader", "]", "=", "dkim", "\n", "delete", "(", "rkb", ".", "Keys", ",", "reader", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// PromoteReaders implements the RootMetadata interface for // RootMetadataV3.
[ "PromoteReaders", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L741-L774
160,630
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
RevokeRemovedDevices
func (md *RootMetadataV3) RevokeRemovedDevices( updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys, extra ExtraMetadata) (ServerHalfRemovalInfo, error) { if md.TypeForKeying() != tlf.PrivateKeying { return nil, InvalidNonPrivateTLFOperation{ md.TlfID(), "RevokeRemovedDevices", md.Version()} } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return nil, err } wRemovalInfo := wkb.Keys.RemoveDevicesNotIn(updatedWriterKeys) rRemovalInfo := rkb.Keys.RemoveDevicesNotIn(updatedReaderKeys) return wRemovalInfo.MergeUsers(rRemovalInfo) }
go
func (md *RootMetadataV3) RevokeRemovedDevices( updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys, extra ExtraMetadata) (ServerHalfRemovalInfo, error) { if md.TypeForKeying() != tlf.PrivateKeying { return nil, InvalidNonPrivateTLFOperation{ md.TlfID(), "RevokeRemovedDevices", md.Version()} } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return nil, err } wRemovalInfo := wkb.Keys.RemoveDevicesNotIn(updatedWriterKeys) rRemovalInfo := rkb.Keys.RemoveDevicesNotIn(updatedReaderKeys) return wRemovalInfo.MergeUsers(rRemovalInfo) }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "RevokeRemovedDevices", "(", "updatedWriterKeys", ",", "updatedReaderKeys", "UserDevicePublicKeys", ",", "extra", "ExtraMetadata", ")", "(", "ServerHalfRemovalInfo", ",", "error", ")", "{", "if", "md", ".", "TypeForKeying", "(", ")", "!=", "tlf", ".", "PrivateKeying", "{", "return", "nil", ",", "InvalidNonPrivateTLFOperation", "{", "md", ".", "TlfID", "(", ")", ",", "\"", "\"", ",", "md", ".", "Version", "(", ")", "}", "\n", "}", "\n\n", "wkb", ",", "rkb", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "wRemovalInfo", ":=", "wkb", ".", "Keys", ".", "RemoveDevicesNotIn", "(", "updatedWriterKeys", ")", "\n", "rRemovalInfo", ":=", "rkb", ".", "Keys", ".", "RemoveDevicesNotIn", "(", "updatedReaderKeys", ")", "\n", "return", "wRemovalInfo", ".", "MergeUsers", "(", "rRemovalInfo", ")", "\n", "}" ]
// RevokeRemovedDevices implements the RootMetadata interface for // RootMetadataV3.
[ "RevokeRemovedDevices", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L778-L794
160,631
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
GetUserDevicePublicKeys
func (md *RootMetadataV3) GetUserDevicePublicKeys(extra ExtraMetadata) ( writerDeviceKeys, readerDeviceKeys UserDevicePublicKeys, err error) { if md.TypeForKeying() != tlf.PrivateKeying { return nil, nil, InvalidNonPrivateTLFOperation{ md.TlfID(), "GetUserDevicePublicKeys", md.Version()} } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return nil, nil, err } return wkb.Keys.ToPublicKeys(), rkb.Keys.ToPublicKeys(), nil }
go
func (md *RootMetadataV3) GetUserDevicePublicKeys(extra ExtraMetadata) ( writerDeviceKeys, readerDeviceKeys UserDevicePublicKeys, err error) { if md.TypeForKeying() != tlf.PrivateKeying { return nil, nil, InvalidNonPrivateTLFOperation{ md.TlfID(), "GetUserDevicePublicKeys", md.Version()} } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return nil, nil, err } return wkb.Keys.ToPublicKeys(), rkb.Keys.ToPublicKeys(), nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "GetUserDevicePublicKeys", "(", "extra", "ExtraMetadata", ")", "(", "writerDeviceKeys", ",", "readerDeviceKeys", "UserDevicePublicKeys", ",", "err", "error", ")", "{", "if", "md", ".", "TypeForKeying", "(", ")", "!=", "tlf", ".", "PrivateKeying", "{", "return", "nil", ",", "nil", ",", "InvalidNonPrivateTLFOperation", "{", "md", ".", "TlfID", "(", ")", ",", "\"", "\"", ",", "md", ".", "Version", "(", ")", "}", "\n", "}", "\n\n", "wkb", ",", "rkb", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "wkb", ".", "Keys", ".", "ToPublicKeys", "(", ")", ",", "rkb", ".", "Keys", ".", "ToPublicKeys", "(", ")", ",", "nil", "\n", "}" ]
// GetUserDevicePublicKeys implements the RootMetadata interface // for RootMetadataV3.
[ "GetUserDevicePublicKeys", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L798-L811
160,632
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
GetTLFCryptKeyParams
func (md *RootMetadataV3) GetTLFCryptKeyParams( keyGen KeyGen, user keybase1.UID, key kbfscrypto.CryptPublicKey, extra ExtraMetadata) ( kbfscrypto.TLFEphemeralPublicKey, kbfscrypto.EncryptedTLFCryptKeyClientHalf, kbfscrypto.TLFCryptKeyServerHalfID, bool, error) { if keyGen != md.LatestKeyGeneration() { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, TLFCryptKeyNotPerDeviceEncrypted{md.TlfID(), keyGen} } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, err } isWriter := true dkim := wkb.Keys[user] if dkim == nil { dkim = rkb.Keys[user] if dkim == nil { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil } isWriter = false } info, ok := dkim[key] if !ok { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil } var publicKeys kbfscrypto.TLFEphemeralPublicKeys var keyType string if isWriter { publicKeys = wkb.TLFEphemeralPublicKeys keyType = "writer" } else { publicKeys = rkb.TLFEphemeralPublicKeys keyType = "reader" } keyCount := len(publicKeys) index := info.EPubKeyIndex if index >= keyCount { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, errors.Errorf("Invalid %s key index %d >= %d", keyType, index, keyCount) } return publicKeys[index], info.ClientHalf, info.ServerHalfID, true, nil }
go
func (md *RootMetadataV3) GetTLFCryptKeyParams( keyGen KeyGen, user keybase1.UID, key kbfscrypto.CryptPublicKey, extra ExtraMetadata) ( kbfscrypto.TLFEphemeralPublicKey, kbfscrypto.EncryptedTLFCryptKeyClientHalf, kbfscrypto.TLFCryptKeyServerHalfID, bool, error) { if keyGen != md.LatestKeyGeneration() { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, TLFCryptKeyNotPerDeviceEncrypted{md.TlfID(), keyGen} } wkb, rkb, err := md.getTLFKeyBundles(extra) if err != nil { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, err } isWriter := true dkim := wkb.Keys[user] if dkim == nil { dkim = rkb.Keys[user] if dkim == nil { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil } isWriter = false } info, ok := dkim[key] if !ok { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil } var publicKeys kbfscrypto.TLFEphemeralPublicKeys var keyType string if isWriter { publicKeys = wkb.TLFEphemeralPublicKeys keyType = "writer" } else { publicKeys = rkb.TLFEphemeralPublicKeys keyType = "reader" } keyCount := len(publicKeys) index := info.EPubKeyIndex if index >= keyCount { return kbfscrypto.TLFEphemeralPublicKey{}, kbfscrypto.EncryptedTLFCryptKeyClientHalf{}, kbfscrypto.TLFCryptKeyServerHalfID{}, false, errors.Errorf("Invalid %s key index %d >= %d", keyType, index, keyCount) } return publicKeys[index], info.ClientHalf, info.ServerHalfID, true, nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "GetTLFCryptKeyParams", "(", "keyGen", "KeyGen", ",", "user", "keybase1", ".", "UID", ",", "key", "kbfscrypto", ".", "CryptPublicKey", ",", "extra", "ExtraMetadata", ")", "(", "kbfscrypto", ".", "TLFEphemeralPublicKey", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", ",", "bool", ",", "error", ")", "{", "if", "keyGen", "!=", "md", ".", "LatestKeyGeneration", "(", ")", "{", "return", "kbfscrypto", ".", "TLFEphemeralPublicKey", "{", "}", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", "{", "}", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", "{", "}", ",", "false", ",", "TLFCryptKeyNotPerDeviceEncrypted", "{", "md", ".", "TlfID", "(", ")", ",", "keyGen", "}", "\n", "}", "\n", "wkb", ",", "rkb", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "kbfscrypto", ".", "TLFEphemeralPublicKey", "{", "}", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", "{", "}", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", "{", "}", ",", "false", ",", "err", "\n", "}", "\n", "isWriter", ":=", "true", "\n", "dkim", ":=", "wkb", ".", "Keys", "[", "user", "]", "\n", "if", "dkim", "==", "nil", "{", "dkim", "=", "rkb", ".", "Keys", "[", "user", "]", "\n", "if", "dkim", "==", "nil", "{", "return", "kbfscrypto", ".", "TLFEphemeralPublicKey", "{", "}", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", "{", "}", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", "{", "}", ",", "false", ",", "nil", "\n", "}", "\n", "isWriter", "=", "false", "\n", "}", "\n", "info", ",", "ok", ":=", "dkim", "[", "key", "]", "\n", "if", "!", "ok", "{", "return", "kbfscrypto", ".", "TLFEphemeralPublicKey", "{", "}", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", "{", "}", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", "{", "}", ",", "false", ",", "nil", "\n", "}", "\n\n", "var", "publicKeys", "kbfscrypto", ".", "TLFEphemeralPublicKeys", "\n", "var", "keyType", "string", "\n", "if", "isWriter", "{", "publicKeys", "=", "wkb", ".", "TLFEphemeralPublicKeys", "\n", "keyType", "=", "\"", "\"", "\n", "}", "else", "{", "publicKeys", "=", "rkb", ".", "TLFEphemeralPublicKeys", "\n", "keyType", "=", "\"", "\"", "\n", "}", "\n", "keyCount", ":=", "len", "(", "publicKeys", ")", "\n", "index", ":=", "info", ".", "EPubKeyIndex", "\n", "if", "index", ">=", "keyCount", "{", "return", "kbfscrypto", ".", "TLFEphemeralPublicKey", "{", "}", ",", "kbfscrypto", ".", "EncryptedTLFCryptKeyClientHalf", "{", "}", ",", "kbfscrypto", ".", "TLFCryptKeyServerHalfID", "{", "}", ",", "false", ",", "errors", ".", "Errorf", "(", "\"", "\"", ",", "keyType", ",", "index", ",", "keyCount", ")", "\n", "}", "\n", "return", "publicKeys", "[", "index", "]", ",", "info", ".", "ClientHalf", ",", "info", ".", "ServerHalfID", ",", "true", ",", "nil", "\n", "}" ]
// GetTLFCryptKeyParams implements the RootMetadata interface for RootMetadataV3.
[ "GetTLFCryptKeyParams", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L814-L869
160,633
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
CheckWKBID
func CheckWKBID(codec kbfscodec.Codec, wkbID TLFWriterKeyBundleID, wkb TLFWriterKeyBundleV3) error { computedWKBID, err := MakeTLFWriterKeyBundleID(codec, wkb) if err != nil { return err } if wkbID != computedWKBID { return errors.Errorf("Expected WKB ID %s, got %s", wkbID, computedWKBID) } return nil }
go
func CheckWKBID(codec kbfscodec.Codec, wkbID TLFWriterKeyBundleID, wkb TLFWriterKeyBundleV3) error { computedWKBID, err := MakeTLFWriterKeyBundleID(codec, wkb) if err != nil { return err } if wkbID != computedWKBID { return errors.Errorf("Expected WKB ID %s, got %s", wkbID, computedWKBID) } return nil }
[ "func", "CheckWKBID", "(", "codec", "kbfscodec", ".", "Codec", ",", "wkbID", "TLFWriterKeyBundleID", ",", "wkb", "TLFWriterKeyBundleV3", ")", "error", "{", "computedWKBID", ",", "err", ":=", "MakeTLFWriterKeyBundleID", "(", "codec", ",", "wkb", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "wkbID", "!=", "computedWKBID", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "wkbID", ",", "computedWKBID", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckWKBID returns an error if the ID of the given writer key // bundle doesn't match the given one.
[ "CheckWKBID", "returns", "an", "error", "if", "the", "ID", "of", "the", "given", "writer", "key", "bundle", "doesn", "t", "match", "the", "given", "one", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L873-L886
160,634
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
CheckRKBID
func CheckRKBID(codec kbfscodec.Codec, rkbID TLFReaderKeyBundleID, rkb TLFReaderKeyBundleV3) error { computedRKBID, err := MakeTLFReaderKeyBundleID(codec, rkb) if err != nil { return err } if rkbID != computedRKBID { return errors.Errorf("Expected RKB ID %s, got %s", rkbID, computedRKBID) } return nil }
go
func CheckRKBID(codec kbfscodec.Codec, rkbID TLFReaderKeyBundleID, rkb TLFReaderKeyBundleV3) error { computedRKBID, err := MakeTLFReaderKeyBundleID(codec, rkb) if err != nil { return err } if rkbID != computedRKBID { return errors.Errorf("Expected RKB ID %s, got %s", rkbID, computedRKBID) } return nil }
[ "func", "CheckRKBID", "(", "codec", "kbfscodec", ".", "Codec", ",", "rkbID", "TLFReaderKeyBundleID", ",", "rkb", "TLFReaderKeyBundleV3", ")", "error", "{", "computedRKBID", ",", "err", ":=", "MakeTLFReaderKeyBundleID", "(", "codec", ",", "rkb", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "rkbID", "!=", "computedRKBID", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "rkbID", ",", "computedRKBID", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckRKBID returns an error if the ID of the given reader key // bundle doesn't match the given one.
[ "CheckRKBID", "returns", "an", "error", "if", "the", "ID", "of", "the", "given", "reader", "key", "bundle", "doesn", "t", "match", "the", "given", "one", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L890-L903
160,635
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
IsLastModifiedBy
func (md *RootMetadataV3) IsLastModifiedBy( uid keybase1.UID, key kbfscrypto.VerifyingKey) error { // Verify the user and device are the writer. writer := md.LastModifyingWriter() if !md.IsWriterMetadataCopiedSet() { if writer != uid { return errors.Errorf("Last writer %s != %s", writer, uid) } } // Verify the user and device are the last modifier. user := md.GetLastModifyingUser() if user != uid { return errors.Errorf("Last modifier %s != %s", user, uid) } return nil }
go
func (md *RootMetadataV3) IsLastModifiedBy( uid keybase1.UID, key kbfscrypto.VerifyingKey) error { // Verify the user and device are the writer. writer := md.LastModifyingWriter() if !md.IsWriterMetadataCopiedSet() { if writer != uid { return errors.Errorf("Last writer %s != %s", writer, uid) } } // Verify the user and device are the last modifier. user := md.GetLastModifyingUser() if user != uid { return errors.Errorf("Last modifier %s != %s", user, uid) } return nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "IsLastModifiedBy", "(", "uid", "keybase1", ".", "UID", ",", "key", "kbfscrypto", ".", "VerifyingKey", ")", "error", "{", "// Verify the user and device are the writer.", "writer", ":=", "md", ".", "LastModifyingWriter", "(", ")", "\n", "if", "!", "md", ".", "IsWriterMetadataCopiedSet", "(", ")", "{", "if", "writer", "!=", "uid", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "writer", ",", "uid", ")", "\n", "}", "\n", "}", "\n\n", "// Verify the user and device are the last modifier.", "user", ":=", "md", ".", "GetLastModifyingUser", "(", ")", "\n", "if", "user", "!=", "uid", "{", "return", "errors", ".", "Errorf", "(", "\"", "\"", ",", "user", ",", "uid", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// IsLastModifiedBy implements the RootMetadata interface for // RootMetadataV3.
[ "IsLastModifiedBy", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1016-L1033
160,636
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
GetSerializedWriterMetadata
func (md *RootMetadataV3) GetSerializedWriterMetadata( codec kbfscodec.Codec) ([]byte, error) { return codec.Encode(md.WriterMetadata) }
go
func (md *RootMetadataV3) GetSerializedWriterMetadata( codec kbfscodec.Codec) ([]byte, error) { return codec.Encode(md.WriterMetadata) }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "GetSerializedWriterMetadata", "(", "codec", "kbfscodec", ".", "Codec", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "return", "codec", ".", "Encode", "(", "md", ".", "WriterMetadata", ")", "\n", "}" ]
// GetSerializedWriterMetadata implements the RootMetadata interface for RootMetadataV3.
[ "GetSerializedWriterMetadata", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1176-L1179
160,637
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
SetLastModifyingWriter
func (md *RootMetadataV3) SetLastModifyingWriter(user keybase1.UID) { md.WriterMetadata.LastModifyingWriter = user }
go
func (md *RootMetadataV3) SetLastModifyingWriter(user keybase1.UID) { md.WriterMetadata.LastModifyingWriter = user }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "SetLastModifyingWriter", "(", "user", "keybase1", ".", "UID", ")", "{", "md", ".", "WriterMetadata", ".", "LastModifyingWriter", "=", "user", "\n", "}" ]
// SetLastModifyingWriter implements the MutableRootMetadata interface for RootMetadataV3.
[ "SetLastModifyingWriter", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1193-L1195
160,638
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
SetUnresolvedWriters
func (md *RootMetadataV3) SetUnresolvedWriters(writers []keybase1.SocialAssertion) { md.WriterMetadata.UnresolvedWriters = writers }
go
func (md *RootMetadataV3) SetUnresolvedWriters(writers []keybase1.SocialAssertion) { md.WriterMetadata.UnresolvedWriters = writers }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "SetUnresolvedWriters", "(", "writers", "[", "]", "keybase1", ".", "SocialAssertion", ")", "{", "md", ".", "WriterMetadata", ".", "UnresolvedWriters", "=", "writers", "\n", "}" ]
// SetUnresolvedWriters implements the MutableRootMetadata interface for RootMetadataV3.
[ "SetUnresolvedWriters", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1401-L1403
160,639
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
SetWriters
func (md *RootMetadataV3) SetWriters(writers []keybase1.UserOrTeamID) { md.WriterMetadata.Writers = writers }
go
func (md *RootMetadataV3) SetWriters(writers []keybase1.UserOrTeamID) { md.WriterMetadata.Writers = writers }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "SetWriters", "(", "writers", "[", "]", "keybase1", ".", "UserOrTeamID", ")", "{", "md", ".", "WriterMetadata", ".", "Writers", "=", "writers", "\n", "}" ]
// SetWriters implements the MutableRootMetadata interface for RootMetadataV3.
[ "SetWriters", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1416-L1418
160,640
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
ClearForV4Migration
func (md *RootMetadataV3) ClearForV4Migration() { md.WriterMetadata.WKeyBundleID = TLFWriterKeyBundleID{} md.RKeyBundleID = TLFReaderKeyBundleID{} }
go
func (md *RootMetadataV3) ClearForV4Migration() { md.WriterMetadata.WKeyBundleID = TLFWriterKeyBundleID{} md.RKeyBundleID = TLFReaderKeyBundleID{} }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "ClearForV4Migration", "(", ")", "{", "md", ".", "WriterMetadata", ".", "WKeyBundleID", "=", "TLFWriterKeyBundleID", "{", "}", "\n", "md", ".", "RKeyBundleID", "=", "TLFReaderKeyBundleID", "{", "}", "\n", "}" ]
// ClearForV4Migration implements the MutableRootMetadata interface // for RootMetadataV3.
[ "ClearForV4Migration", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1422-L1425
160,641
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
SetTlfID
func (md *RootMetadataV3) SetTlfID(tlf tlf.ID) { md.WriterMetadata.ID = tlf }
go
func (md *RootMetadataV3) SetTlfID(tlf tlf.ID) { md.WriterMetadata.ID = tlf }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "SetTlfID", "(", "tlf", "tlf", ".", "ID", ")", "{", "md", ".", "WriterMetadata", ".", "ID", "=", "tlf", "\n", "}" ]
// SetTlfID implements the MutableRootMetadata interface for RootMetadataV3.
[ "SetTlfID", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1428-L1430
160,642
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
Version
func (md *RootMetadataV3) Version() MetadataVer { if md.TlfID().Type() != tlf.SingleTeam && md.TypeForKeying() == tlf.TeamKeying { return ImplicitTeamsVer } return SegregatedKeyBundlesVer }
go
func (md *RootMetadataV3) Version() MetadataVer { if md.TlfID().Type() != tlf.SingleTeam && md.TypeForKeying() == tlf.TeamKeying { return ImplicitTeamsVer } return SegregatedKeyBundlesVer }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "Version", "(", ")", "MetadataVer", "{", "if", "md", ".", "TlfID", "(", ")", ".", "Type", "(", ")", "!=", "tlf", ".", "SingleTeam", "&&", "md", ".", "TypeForKeying", "(", ")", "==", "tlf", ".", "TeamKeying", "{", "return", "ImplicitTeamsVer", "\n", "}", "\n", "return", "SegregatedKeyBundlesVer", "\n", "}" ]
// Version implements the MutableRootMetadata interface for RootMetadataV3.
[ "Version", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1438-L1444
160,643
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
GetCurrentTLFPublicKey
func (md *RootMetadataV3) GetCurrentTLFPublicKey( extra ExtraMetadata) (kbfscrypto.TLFPublicKey, error) { wkb, _, err := md.getTLFKeyBundles(extra) if err != nil { return kbfscrypto.TLFPublicKey{}, err } return wkb.TLFPublicKey, nil }
go
func (md *RootMetadataV3) GetCurrentTLFPublicKey( extra ExtraMetadata) (kbfscrypto.TLFPublicKey, error) { wkb, _, err := md.getTLFKeyBundles(extra) if err != nil { return kbfscrypto.TLFPublicKey{}, err } return wkb.TLFPublicKey, nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "GetCurrentTLFPublicKey", "(", "extra", "ExtraMetadata", ")", "(", "kbfscrypto", ".", "TLFPublicKey", ",", "error", ")", "{", "wkb", ",", "_", ",", "err", ":=", "md", ".", "getTLFKeyBundles", "(", "extra", ")", "\n", "if", "err", "!=", "nil", "{", "return", "kbfscrypto", ".", "TLFPublicKey", "{", "}", ",", "err", "\n", "}", "\n", "return", "wkb", ".", "TLFPublicKey", ",", "nil", "\n", "}" ]
// GetCurrentTLFPublicKey implements the RootMetadata interface // for RootMetadataV3.
[ "GetCurrentTLFPublicKey", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1448-L1455
160,644
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
GetUnresolvedParticipants
func (md *RootMetadataV3) GetUnresolvedParticipants() []keybase1.SocialAssertion { writers := md.WriterMetadata.UnresolvedWriters readers := md.UnresolvedReaders users := make([]keybase1.SocialAssertion, 0, len(writers)+len(readers)) users = append(users, writers...) users = append(users, readers...) return users }
go
func (md *RootMetadataV3) GetUnresolvedParticipants() []keybase1.SocialAssertion { writers := md.WriterMetadata.UnresolvedWriters readers := md.UnresolvedReaders users := make([]keybase1.SocialAssertion, 0, len(writers)+len(readers)) users = append(users, writers...) users = append(users, readers...) return users }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "GetUnresolvedParticipants", "(", ")", "[", "]", "keybase1", ".", "SocialAssertion", "{", "writers", ":=", "md", ".", "WriterMetadata", ".", "UnresolvedWriters", "\n", "readers", ":=", "md", ".", "UnresolvedReaders", "\n", "users", ":=", "make", "(", "[", "]", "keybase1", ".", "SocialAssertion", ",", "0", ",", "len", "(", "writers", ")", "+", "len", "(", "readers", ")", ")", "\n", "users", "=", "append", "(", "users", ",", "writers", "...", ")", "\n", "users", "=", "append", "(", "users", ",", "readers", "...", ")", "\n", "return", "users", "\n", "}" ]
// GetUnresolvedParticipants implements the RootMetadata interface for RootMetadataV3.
[ "GetUnresolvedParticipants", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1458-L1465
160,645
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
UpdateKeyBundles
func (md *RootMetadataV3) UpdateKeyBundles(codec kbfscodec.Codec, extra ExtraMetadata, updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys, ePubKey kbfscrypto.TLFEphemeralPublicKey, ePrivKey kbfscrypto.TLFEphemeralPrivateKey, tlfCryptKeys []kbfscrypto.TLFCryptKey) ( []UserDeviceKeyServerHalves, error) { if len(tlfCryptKeys) != 1 { return nil, fmt.Errorf( "(MDv3) Expected 1 TLF crypt key, got %d", len(tlfCryptKeys)) } serverHalves, err := md.updateKeyBundles(codec, extra, updatedWriterKeys, updatedReaderKeys, ePubKey, ePrivKey, tlfCryptKeys[0]) if err != nil { return nil, err } return []UserDeviceKeyServerHalves{serverHalves}, nil }
go
func (md *RootMetadataV3) UpdateKeyBundles(codec kbfscodec.Codec, extra ExtraMetadata, updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys, ePubKey kbfscrypto.TLFEphemeralPublicKey, ePrivKey kbfscrypto.TLFEphemeralPrivateKey, tlfCryptKeys []kbfscrypto.TLFCryptKey) ( []UserDeviceKeyServerHalves, error) { if len(tlfCryptKeys) != 1 { return nil, fmt.Errorf( "(MDv3) Expected 1 TLF crypt key, got %d", len(tlfCryptKeys)) } serverHalves, err := md.updateKeyBundles(codec, extra, updatedWriterKeys, updatedReaderKeys, ePubKey, ePrivKey, tlfCryptKeys[0]) if err != nil { return nil, err } return []UserDeviceKeyServerHalves{serverHalves}, nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "UpdateKeyBundles", "(", "codec", "kbfscodec", ".", "Codec", ",", "extra", "ExtraMetadata", ",", "updatedWriterKeys", ",", "updatedReaderKeys", "UserDevicePublicKeys", ",", "ePubKey", "kbfscrypto", ".", "TLFEphemeralPublicKey", ",", "ePrivKey", "kbfscrypto", ".", "TLFEphemeralPrivateKey", ",", "tlfCryptKeys", "[", "]", "kbfscrypto", ".", "TLFCryptKey", ")", "(", "[", "]", "UserDeviceKeyServerHalves", ",", "error", ")", "{", "if", "len", "(", "tlfCryptKeys", ")", "!=", "1", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "len", "(", "tlfCryptKeys", ")", ")", "\n", "}", "\n\n", "serverHalves", ",", "err", ":=", "md", ".", "updateKeyBundles", "(", "codec", ",", "extra", ",", "updatedWriterKeys", ",", "updatedReaderKeys", ",", "ePubKey", ",", "ePrivKey", ",", "tlfCryptKeys", "[", "0", "]", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "[", "]", "UserDeviceKeyServerHalves", "{", "serverHalves", "}", ",", "nil", "\n", "}" ]
// UpdateKeyBundles implements the MutableRootMetadata interface // for RootMetadataV3.
[ "UpdateKeyBundles", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1469-L1490
160,646
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
FinalizeRekey
func (md *RootMetadataV3) FinalizeRekey( codec kbfscodec.Codec, extra ExtraMetadata) error { extraV3, ok := extra.(*ExtraMetadataV3) if !ok { return errors.New("Invalid extra metadata") } oldWKBID := md.WriterMetadata.WKeyBundleID oldRKBID := md.RKeyBundleID newWKBID, err := MakeTLFWriterKeyBundleID(codec, extraV3.wkb) if err != nil { return err } newRKBID, err := MakeTLFReaderKeyBundleID(codec, extraV3.rkb) if err != nil { return err } md.WriterMetadata.WKeyBundleID = newWKBID md.RKeyBundleID = newRKBID extraV3.updateNew(newWKBID != oldWKBID, newRKBID != oldRKBID) return nil }
go
func (md *RootMetadataV3) FinalizeRekey( codec kbfscodec.Codec, extra ExtraMetadata) error { extraV3, ok := extra.(*ExtraMetadataV3) if !ok { return errors.New("Invalid extra metadata") } oldWKBID := md.WriterMetadata.WKeyBundleID oldRKBID := md.RKeyBundleID newWKBID, err := MakeTLFWriterKeyBundleID(codec, extraV3.wkb) if err != nil { return err } newRKBID, err := MakeTLFReaderKeyBundleID(codec, extraV3.rkb) if err != nil { return err } md.WriterMetadata.WKeyBundleID = newWKBID md.RKeyBundleID = newRKBID extraV3.updateNew(newWKBID != oldWKBID, newRKBID != oldRKBID) return nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "FinalizeRekey", "(", "codec", "kbfscodec", ".", "Codec", ",", "extra", "ExtraMetadata", ")", "error", "{", "extraV3", ",", "ok", ":=", "extra", ".", "(", "*", "ExtraMetadataV3", ")", "\n", "if", "!", "ok", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "oldWKBID", ":=", "md", ".", "WriterMetadata", ".", "WKeyBundleID", "\n", "oldRKBID", ":=", "md", ".", "RKeyBundleID", "\n\n", "newWKBID", ",", "err", ":=", "MakeTLFWriterKeyBundleID", "(", "codec", ",", "extraV3", ".", "wkb", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "newRKBID", ",", "err", ":=", "MakeTLFReaderKeyBundleID", "(", "codec", ",", "extraV3", ".", "rkb", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "md", ".", "WriterMetadata", ".", "WKeyBundleID", "=", "newWKBID", "\n", "md", ".", "RKeyBundleID", "=", "newRKBID", "\n\n", "extraV3", ".", "updateNew", "(", "newWKBID", "!=", "oldWKBID", ",", "newRKBID", "!=", "oldRKBID", ")", "\n\n", "return", "nil", "\n", "}" ]
// FinalizeRekey implements the MutableRootMetadata interface for RootMetadataV3.
[ "FinalizeRekey", "implements", "the", "MutableRootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1503-L1527
160,647
keybase/client
go/kbfs/kbfsmd/root_metadata_v3.go
GetHistoricTLFCryptKey
func (md *RootMetadataV3) GetHistoricTLFCryptKey(codec kbfscodec.Codec, keyGen KeyGen, currentKey kbfscrypto.TLFCryptKey, extra ExtraMetadata) ( kbfscrypto.TLFCryptKey, error) { extraV3, ok := extra.(*ExtraMetadataV3) if !ok { return kbfscrypto.TLFCryptKey{}, errors.New( "Invalid extra metadata") } if keyGen < FirstValidKeyGen || keyGen >= md.LatestKeyGeneration() { return kbfscrypto.TLFCryptKey{}, errors.Errorf( "Invalid key generation %d", keyGen) } oldKeys, err := kbfscrypto.DecryptTLFCryptKeys( codec, extraV3.wkb.EncryptedHistoricTLFCryptKeys, currentKey) if err != nil { return kbfscrypto.TLFCryptKey{}, err } index := int(keyGen - FirstValidKeyGen) if index >= len(oldKeys) || index < 0 { return kbfscrypto.TLFCryptKey{}, errors.Errorf( "Index %d out of range (max: %d)", index, len(oldKeys)) } return oldKeys[index], nil }
go
func (md *RootMetadataV3) GetHistoricTLFCryptKey(codec kbfscodec.Codec, keyGen KeyGen, currentKey kbfscrypto.TLFCryptKey, extra ExtraMetadata) ( kbfscrypto.TLFCryptKey, error) { extraV3, ok := extra.(*ExtraMetadataV3) if !ok { return kbfscrypto.TLFCryptKey{}, errors.New( "Invalid extra metadata") } if keyGen < FirstValidKeyGen || keyGen >= md.LatestKeyGeneration() { return kbfscrypto.TLFCryptKey{}, errors.Errorf( "Invalid key generation %d", keyGen) } oldKeys, err := kbfscrypto.DecryptTLFCryptKeys( codec, extraV3.wkb.EncryptedHistoricTLFCryptKeys, currentKey) if err != nil { return kbfscrypto.TLFCryptKey{}, err } index := int(keyGen - FirstValidKeyGen) if index >= len(oldKeys) || index < 0 { return kbfscrypto.TLFCryptKey{}, errors.Errorf( "Index %d out of range (max: %d)", index, len(oldKeys)) } return oldKeys[index], nil }
[ "func", "(", "md", "*", "RootMetadataV3", ")", "GetHistoricTLFCryptKey", "(", "codec", "kbfscodec", ".", "Codec", ",", "keyGen", "KeyGen", ",", "currentKey", "kbfscrypto", ".", "TLFCryptKey", ",", "extra", "ExtraMetadata", ")", "(", "kbfscrypto", ".", "TLFCryptKey", ",", "error", ")", "{", "extraV3", ",", "ok", ":=", "extra", ".", "(", "*", "ExtraMetadataV3", ")", "\n", "if", "!", "ok", "{", "return", "kbfscrypto", ".", "TLFCryptKey", "{", "}", ",", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "keyGen", "<", "FirstValidKeyGen", "||", "keyGen", ">=", "md", ".", "LatestKeyGeneration", "(", ")", "{", "return", "kbfscrypto", ".", "TLFCryptKey", "{", "}", ",", "errors", ".", "Errorf", "(", "\"", "\"", ",", "keyGen", ")", "\n", "}", "\n", "oldKeys", ",", "err", ":=", "kbfscrypto", ".", "DecryptTLFCryptKeys", "(", "codec", ",", "extraV3", ".", "wkb", ".", "EncryptedHistoricTLFCryptKeys", ",", "currentKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "kbfscrypto", ".", "TLFCryptKey", "{", "}", ",", "err", "\n", "}", "\n", "index", ":=", "int", "(", "keyGen", "-", "FirstValidKeyGen", ")", "\n", "if", "index", ">=", "len", "(", "oldKeys", ")", "||", "index", "<", "0", "{", "return", "kbfscrypto", ".", "TLFCryptKey", "{", "}", ",", "errors", ".", "Errorf", "(", "\"", "\"", ",", "index", ",", "len", "(", "oldKeys", ")", ")", "\n", "}", "\n", "return", "oldKeys", "[", "index", "]", ",", "nil", "\n", "}" ]
// GetHistoricTLFCryptKey implements the RootMetadata interface for RootMetadataV3.
[ "GetHistoricTLFCryptKey", "implements", "the", "RootMetadata", "interface", "for", "RootMetadataV3", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1535-L1558
160,648
keybase/client
go/service/log.go
NewLogHandler
func NewLogHandler(xp rpc.Transporter, logReg *logRegister, g *libkb.GlobalContext) *LogHandler { return &LogHandler{ BaseHandler: NewBaseHandler(g, xp), logReg: logReg, Contextified: libkb.NewContextified(g), } }
go
func NewLogHandler(xp rpc.Transporter, logReg *logRegister, g *libkb.GlobalContext) *LogHandler { return &LogHandler{ BaseHandler: NewBaseHandler(g, xp), logReg: logReg, Contextified: libkb.NewContextified(g), } }
[ "func", "NewLogHandler", "(", "xp", "rpc", ".", "Transporter", ",", "logReg", "*", "logRegister", ",", "g", "*", "libkb", ".", "GlobalContext", ")", "*", "LogHandler", "{", "return", "&", "LogHandler", "{", "BaseHandler", ":", "NewBaseHandler", "(", "g", ",", "xp", ")", ",", "logReg", ":", "logReg", ",", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "}", "\n", "}" ]
// NewLogHandler creates a LogHandler for the xp transport.
[ "NewLogHandler", "creates", "a", "LogHandler", "for", "the", "xp", "transport", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/log.go#L22-L28
160,649
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
NewKBFSOpsStandard
func NewKBFSOpsStandard(appStateUpdater env.AppStateUpdater, config Config) *KBFSOpsStandard { log := config.MakeLogger("") quLog := config.MakeLogger(QuotaUsageLogModule("KBFSOps")) kops := &KBFSOpsStandard{ appStateUpdater: appStateUpdater, config: config, log: log, deferLog: log.CloneWithAddedDepth(1), ops: make(map[data.FolderBranch]*folderBranchOps), opsByFav: make(map[favorites.Folder]*folderBranchOps), reIdentifyControlChan: make(chan chan<- struct{}), favs: NewFavorites(config), quotaUsage: NewEventuallyConsistentQuotaUsage( config, quLog, config.MakeVLogger(quLog)), longOperationDebugDumper: NewImpatientDebugDumper( config, longOperationDebugDumpDuration), currentStatus: &kbfsCurrentStatus{}, } kops.currentStatus.Init() go kops.markForReIdentifyIfNeededLoop() return kops }
go
func NewKBFSOpsStandard(appStateUpdater env.AppStateUpdater, config Config) *KBFSOpsStandard { log := config.MakeLogger("") quLog := config.MakeLogger(QuotaUsageLogModule("KBFSOps")) kops := &KBFSOpsStandard{ appStateUpdater: appStateUpdater, config: config, log: log, deferLog: log.CloneWithAddedDepth(1), ops: make(map[data.FolderBranch]*folderBranchOps), opsByFav: make(map[favorites.Folder]*folderBranchOps), reIdentifyControlChan: make(chan chan<- struct{}), favs: NewFavorites(config), quotaUsage: NewEventuallyConsistentQuotaUsage( config, quLog, config.MakeVLogger(quLog)), longOperationDebugDumper: NewImpatientDebugDumper( config, longOperationDebugDumpDuration), currentStatus: &kbfsCurrentStatus{}, } kops.currentStatus.Init() go kops.markForReIdentifyIfNeededLoop() return kops }
[ "func", "NewKBFSOpsStandard", "(", "appStateUpdater", "env", ".", "AppStateUpdater", ",", "config", "Config", ")", "*", "KBFSOpsStandard", "{", "log", ":=", "config", ".", "MakeLogger", "(", "\"", "\"", ")", "\n", "quLog", ":=", "config", ".", "MakeLogger", "(", "QuotaUsageLogModule", "(", "\"", "\"", ")", ")", "\n", "kops", ":=", "&", "KBFSOpsStandard", "{", "appStateUpdater", ":", "appStateUpdater", ",", "config", ":", "config", ",", "log", ":", "log", ",", "deferLog", ":", "log", ".", "CloneWithAddedDepth", "(", "1", ")", ",", "ops", ":", "make", "(", "map", "[", "data", ".", "FolderBranch", "]", "*", "folderBranchOps", ")", ",", "opsByFav", ":", "make", "(", "map", "[", "favorites", ".", "Folder", "]", "*", "folderBranchOps", ")", ",", "reIdentifyControlChan", ":", "make", "(", "chan", "chan", "<-", "struct", "{", "}", ")", ",", "favs", ":", "NewFavorites", "(", "config", ")", ",", "quotaUsage", ":", "NewEventuallyConsistentQuotaUsage", "(", "config", ",", "quLog", ",", "config", ".", "MakeVLogger", "(", "quLog", ")", ")", ",", "longOperationDebugDumper", ":", "NewImpatientDebugDumper", "(", "config", ",", "longOperationDebugDumpDuration", ")", ",", "currentStatus", ":", "&", "kbfsCurrentStatus", "{", "}", ",", "}", "\n", "kops", ".", "currentStatus", ".", "Init", "(", ")", "\n", "go", "kops", ".", "markForReIdentifyIfNeededLoop", "(", ")", "\n", "return", "kops", "\n", "}" ]
// NewKBFSOpsStandard constructs a new KBFSOpsStandard object.
[ "NewKBFSOpsStandard", "constructs", "a", "new", "KBFSOpsStandard", "object", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L66-L87
160,650
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Shutdown
func (fs *KBFSOpsStandard) Shutdown(ctx context.Context) error { defer fs.longOperationDebugDumper.Shutdown() // shut it down last timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() err := fs.shutdownEdits(ctx) if err != nil { return err } close(fs.reIdentifyControlChan) var errors []error if err := fs.favs.Shutdown(); err != nil { errors = append(errors, err) } for _, ops := range fs.ops { if err := ops.Shutdown(ctx); err != nil { errors = append(errors, err) // Continue on and try to shut down the other FBOs. } } if len(errors) == 1 { return errors[0] } else if len(errors) > 1 { // Aggregate errors return fmt.Errorf("Multiple errors on shutdown: %v", errors) } return nil }
go
func (fs *KBFSOpsStandard) Shutdown(ctx context.Context) error { defer fs.longOperationDebugDumper.Shutdown() // shut it down last timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() err := fs.shutdownEdits(ctx) if err != nil { return err } close(fs.reIdentifyControlChan) var errors []error if err := fs.favs.Shutdown(); err != nil { errors = append(errors, err) } for _, ops := range fs.ops { if err := ops.Shutdown(ctx); err != nil { errors = append(errors, err) // Continue on and try to shut down the other FBOs. } } if len(errors) == 1 { return errors[0] } else if len(errors) > 1 { // Aggregate errors return fmt.Errorf("Multiple errors on shutdown: %v", errors) } return nil }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Shutdown", "(", "ctx", "context", ".", "Context", ")", "error", "{", "defer", "fs", ".", "longOperationDebugDumper", ".", "Shutdown", "(", ")", "// shut it down last", "\n", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "err", ":=", "fs", ".", "shutdownEdits", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "close", "(", "fs", ".", "reIdentifyControlChan", ")", "\n", "var", "errors", "[", "]", "error", "\n", "if", "err", ":=", "fs", ".", "favs", ".", "Shutdown", "(", ")", ";", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "}", "\n", "for", "_", ",", "ops", ":=", "range", "fs", ".", "ops", "{", "if", "err", ":=", "ops", ".", "Shutdown", "(", "ctx", ")", ";", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "// Continue on and try to shut down the other FBOs.", "}", "\n", "}", "\n", "if", "len", "(", "errors", ")", "==", "1", "{", "return", "errors", "[", "0", "]", "\n", "}", "else", "if", "len", "(", "errors", ")", ">", "1", "{", "// Aggregate errors", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "errors", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Shutdown safely shuts down any background goroutines that may have // been launched by KBFSOpsStandard.
[ "Shutdown", "safely", "shuts", "down", "any", "background", "goroutines", "that", "may", "have", "been", "launched", "by", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L145-L173
160,651
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
ClearPrivateFolderMD
func (fs *KBFSOpsStandard) ClearPrivateFolderMD(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.opsLock.Lock() defer fs.opsLock.Unlock() // Block until all private folders have been reset. TODO: // parallelize these, as they can block for a while waiting for // the lock. for _, fbo := range fs.ops { // This call is a no-op for public folders. fbo.ClearPrivateFolderMD(ctx) } }
go
func (fs *KBFSOpsStandard) ClearPrivateFolderMD(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.opsLock.Lock() defer fs.opsLock.Unlock() // Block until all private folders have been reset. TODO: // parallelize these, as they can block for a while waiting for // the lock. for _, fbo := range fs.ops { // This call is a no-op for public folders. fbo.ClearPrivateFolderMD(ctx) } }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "ClearPrivateFolderMD", "(", "ctx", "context", ".", "Context", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "opsLock", ".", "Lock", "(", ")", "\n", "defer", "fs", ".", "opsLock", ".", "Unlock", "(", ")", "\n\n", "// Block until all private folders have been reset. TODO:", "// parallelize these, as they can block for a while waiting for", "// the lock.", "for", "_", ",", "fbo", ":=", "range", "fs", ".", "ops", "{", "// This call is a no-op for public folders.", "fbo", ".", "ClearPrivateFolderMD", "(", "ctx", ")", "\n", "}", "\n", "}" ]
// ClearPrivateFolderMD implements the KBFSOps interface for // KBFSOpsStandard.
[ "ClearPrivateFolderMD", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L215-L229
160,652
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
ForceFastForward
func (fs *KBFSOpsStandard) ForceFastForward(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.opsLock.Lock() defer fs.opsLock.Unlock() fs.log.CDebugf(ctx, "Forcing fast-forwards for %d folders", len(fs.ops)) for _, fbo := range fs.ops { fbo.ForceFastForward(ctx) } }
go
func (fs *KBFSOpsStandard) ForceFastForward(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.opsLock.Lock() defer fs.opsLock.Unlock() fs.log.CDebugf(ctx, "Forcing fast-forwards for %d folders", len(fs.ops)) for _, fbo := range fs.ops { fbo.ForceFastForward(ctx) } }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "ForceFastForward", "(", "ctx", "context", ".", "Context", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "opsLock", ".", "Lock", "(", ")", "\n", "defer", "fs", ".", "opsLock", ".", "Unlock", "(", ")", "\n\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "len", "(", "fs", ".", "ops", ")", ")", "\n", "for", "_", ",", "fbo", ":=", "range", "fs", ".", "ops", "{", "fbo", ".", "ForceFastForward", "(", "ctx", ")", "\n", "}", "\n", "}" ]
// ForceFastForward implements the KBFSOps interface for // KBFSOpsStandard.
[ "ForceFastForward", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L233-L244
160,653
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
InvalidateNodeAndChildren
func (fs *KBFSOpsStandard) InvalidateNodeAndChildren( ctx context.Context, node Node) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, node) return ops.InvalidateNodeAndChildren(ctx, node) }
go
func (fs *KBFSOpsStandard) InvalidateNodeAndChildren( ctx context.Context, node Node) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, node) return ops.InvalidateNodeAndChildren(ctx, node) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "InvalidateNodeAndChildren", "(", "ctx", "context", ".", "Context", ",", "node", "Node", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "node", ")", "\n", "return", "ops", ".", "InvalidateNodeAndChildren", "(", "ctx", ",", "node", ")", "\n", "}" ]
// InvalidateNodeAndChildren implements the KBFSOps interface for // KBFSOpsStandard.
[ "InvalidateNodeAndChildren", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L248-L255
160,654
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetFavorites
func (fs *KBFSOpsStandard) GetFavorites(ctx context.Context) ( []favorites.Folder, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() return fs.favs.Get(ctx) }
go
func (fs *KBFSOpsStandard) GetFavorites(ctx context.Context) ( []favorites.Folder, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() return fs.favs.Get(ctx) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetFavorites", "(", "ctx", "context", ".", "Context", ")", "(", "[", "]", "favorites", ".", "Folder", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "return", "fs", ".", "favs", ".", "Get", "(", "ctx", ")", "\n", "}" ]
// GetFavorites implements the KBFSOps interface for // KBFSOpsStandard.
[ "GetFavorites", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L259-L265
160,655
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetFavoritesAll
func (fs *KBFSOpsStandard) GetFavoritesAll(ctx context.Context) (keybase1. FavoritesResult, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() return fs.favs.GetAll(ctx) }
go
func (fs *KBFSOpsStandard) GetFavoritesAll(ctx context.Context) (keybase1. FavoritesResult, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() return fs.favs.GetAll(ctx) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetFavoritesAll", "(", "ctx", "context", ".", "Context", ")", "(", "keybase1", ".", "FavoritesResult", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "return", "fs", ".", "favs", ".", "GetAll", "(", "ctx", ")", "\n", "}" ]
// GetFavoritesAll implements the KBFSOps interface for // KBFSOpsStandard.
[ "GetFavoritesAll", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L269-L275
160,656
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
RefreshCachedFavorites
func (fs *KBFSOpsStandard) RefreshCachedFavorites(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.favs.RefreshCache(ctx) }
go
func (fs *KBFSOpsStandard) RefreshCachedFavorites(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.favs.RefreshCache(ctx) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "RefreshCachedFavorites", "(", "ctx", "context", ".", "Context", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "favs", ".", "RefreshCache", "(", "ctx", ")", "\n", "}" ]
// RefreshCachedFavorites implements the KBFSOps interface for // KBFSOpsStandard.
[ "RefreshCachedFavorites", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L279-L284
160,657
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
ClearCachedFavorites
func (fs *KBFSOpsStandard) ClearCachedFavorites(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.favs.ClearCache(ctx) }
go
func (fs *KBFSOpsStandard) ClearCachedFavorites(ctx context.Context) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.favs.ClearCache(ctx) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "ClearCachedFavorites", "(", "ctx", "context", ".", "Context", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "favs", ".", "ClearCache", "(", "ctx", ")", "\n", "}" ]
// ClearCachedFavorites implements the KBFSOps interface for // KBFSOpsStandard.
[ "ClearCachedFavorites", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L288-L293
160,658
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
AddFavorite
func (fs *KBFSOpsStandard) AddFavorite(ctx context.Context, fav favorites.Folder, data favorites.Data) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() kbpki := fs.config.KBPKI() _, err := kbpki.GetCurrentSession(ctx) isLoggedIn := err == nil if isLoggedIn { err := fs.favs.Add(ctx, favorites.ToAdd{ Folder: fav, Data: data, Created: false, }) if err != nil { return err } } return nil }
go
func (fs *KBFSOpsStandard) AddFavorite(ctx context.Context, fav favorites.Folder, data favorites.Data) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() kbpki := fs.config.KBPKI() _, err := kbpki.GetCurrentSession(ctx) isLoggedIn := err == nil if isLoggedIn { err := fs.favs.Add(ctx, favorites.ToAdd{ Folder: fav, Data: data, Created: false, }) if err != nil { return err } } return nil }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "AddFavorite", "(", "ctx", "context", ".", "Context", ",", "fav", "favorites", ".", "Folder", ",", "data", "favorites", ".", "Data", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "kbpki", ":=", "fs", ".", "config", ".", "KBPKI", "(", ")", "\n", "_", ",", "err", ":=", "kbpki", ".", "GetCurrentSession", "(", "ctx", ")", "\n", "isLoggedIn", ":=", "err", "==", "nil", "\n\n", "if", "isLoggedIn", "{", "err", ":=", "fs", ".", "favs", ".", "Add", "(", "ctx", ",", "favorites", ".", "ToAdd", "{", "Folder", ":", "fav", ",", "Data", ":", "data", ",", "Created", ":", "false", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// AddFavorite implements the KBFSOps interface for KBFSOpsStandard.
[ "AddFavorite", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L296-L317
160,659
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
SetFavoritesHomeTLFInfo
func (fs *KBFSOpsStandard) SetFavoritesHomeTLFInfo(ctx context.Context, info homeTLFInfo) { fs.favs.setHomeTLFInfo(ctx, info) }
go
func (fs *KBFSOpsStandard) SetFavoritesHomeTLFInfo(ctx context.Context, info homeTLFInfo) { fs.favs.setHomeTLFInfo(ctx, info) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "SetFavoritesHomeTLFInfo", "(", "ctx", "context", ".", "Context", ",", "info", "homeTLFInfo", ")", "{", "fs", ".", "favs", ".", "setHomeTLFInfo", "(", "ctx", ",", "info", ")", "\n", "}" ]
// SetFavoritesHomeTLFInfo implements the KBFSOps interface for KBFSOpsStandard.
[ "SetFavoritesHomeTLFInfo", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L320-L323
160,660
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
RefreshEditHistory
func (fs *KBFSOpsStandard) RefreshEditHistory(fav favorites.Folder) { fbo := fs.getOpsByFav(fav) if fbo != nil { fbo.refreshEditHistory() } }
go
func (fs *KBFSOpsStandard) RefreshEditHistory(fav favorites.Folder) { fbo := fs.getOpsByFav(fav) if fbo != nil { fbo.refreshEditHistory() } }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "RefreshEditHistory", "(", "fav", "favorites", ".", "Folder", ")", "{", "fbo", ":=", "fs", ".", "getOpsByFav", "(", "fav", ")", "\n", "if", "fbo", "!=", "nil", "{", "fbo", ".", "refreshEditHistory", "(", ")", "\n", "}", "\n", "}" ]
// RefreshEditHistory implements the KBFSOps interface for KBFSOpsStandard
[ "RefreshEditHistory", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L332-L337
160,661
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
DeleteFavorite
func (fs *KBFSOpsStandard) DeleteFavorite(ctx context.Context, fav favorites.Folder) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() kbpki := fs.config.KBPKI() _, err := kbpki.GetCurrentSession(ctx) isLoggedIn := err == nil // Let this ops remove itself, if we have one available. ops := fs.getOpsByFav(fav) if ops != nil { err := ops.doFavoritesOp(ctx, fs.favs, FavoritesOpRemove, nil) if _, ok := err.(OpsCantHandleFavorite); !ok { return err } // If the ops couldn't handle the delete, fall through to // going directly via Favorites. } if isLoggedIn { err := fs.favs.Delete(ctx, fav) if err != nil { return err } } // TODO: Shut down the running folderBranchOps, if one exists? // What about open file handles? return nil }
go
func (fs *KBFSOpsStandard) DeleteFavorite(ctx context.Context, fav favorites.Folder) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() kbpki := fs.config.KBPKI() _, err := kbpki.GetCurrentSession(ctx) isLoggedIn := err == nil // Let this ops remove itself, if we have one available. ops := fs.getOpsByFav(fav) if ops != nil { err := ops.doFavoritesOp(ctx, fs.favs, FavoritesOpRemove, nil) if _, ok := err.(OpsCantHandleFavorite); !ok { return err } // If the ops couldn't handle the delete, fall through to // going directly via Favorites. } if isLoggedIn { err := fs.favs.Delete(ctx, fav) if err != nil { return err } } // TODO: Shut down the running folderBranchOps, if one exists? // What about open file handles? return nil }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "DeleteFavorite", "(", "ctx", "context", ".", "Context", ",", "fav", "favorites", ".", "Folder", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "kbpki", ":=", "fs", ".", "config", ".", "KBPKI", "(", ")", "\n", "_", ",", "err", ":=", "kbpki", ".", "GetCurrentSession", "(", "ctx", ")", "\n", "isLoggedIn", ":=", "err", "==", "nil", "\n\n", "// Let this ops remove itself, if we have one available.", "ops", ":=", "fs", ".", "getOpsByFav", "(", "fav", ")", "\n", "if", "ops", "!=", "nil", "{", "err", ":=", "ops", ".", "doFavoritesOp", "(", "ctx", ",", "fs", ".", "favs", ",", "FavoritesOpRemove", ",", "nil", ")", "\n", "if", "_", ",", "ok", ":=", "err", ".", "(", "OpsCantHandleFavorite", ")", ";", "!", "ok", "{", "return", "err", "\n", "}", "\n", "// If the ops couldn't handle the delete, fall through to", "// going directly via Favorites.", "}", "\n\n", "if", "isLoggedIn", "{", "err", ":=", "fs", ".", "favs", ".", "Delete", "(", "ctx", ",", "fav", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n\n", "// TODO: Shut down the running folderBranchOps, if one exists?", "// What about open file handles?", "return", "nil", "\n", "}" ]
// DeleteFavorite implements the KBFSOps interface for // KBFSOpsStandard.
[ "DeleteFavorite", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L341-L372
160,662
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
createAndStoreTlfIDIfNeeded
func (fs *KBFSOpsStandard) createAndStoreTlfIDIfNeeded( ctx context.Context, h *tlfhandle.Handle) error { if h.TlfID() != tlf.NullID { return nil } return fs.resetTlfID(ctx, h) }
go
func (fs *KBFSOpsStandard) createAndStoreTlfIDIfNeeded( ctx context.Context, h *tlfhandle.Handle) error { if h.TlfID() != tlf.NullID { return nil } return fs.resetTlfID(ctx, h) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "createAndStoreTlfIDIfNeeded", "(", "ctx", "context", ".", "Context", ",", "h", "*", "tlfhandle", ".", "Handle", ")", "error", "{", "if", "h", ".", "TlfID", "(", ")", "!=", "tlf", ".", "NullID", "{", "return", "nil", "\n", "}", "\n\n", "return", "fs", ".", "resetTlfID", "(", "ctx", ",", "h", ")", "\n", "}" ]
// createAndStoreTlfIDIfNeeded creates a TLF ID for a team-backed // handle that doesn't have one yet, and associates it in the service // with the team. If it returns a `nil` error, it may have modified // `h` to include the new TLF ID.
[ "createAndStoreTlfIDIfNeeded", "creates", "a", "TLF", "ID", "for", "a", "team", "-", "backed", "handle", "that", "doesn", "t", "have", "one", "yet", "and", "associates", "it", "in", "the", "service", "with", "the", "team", ".", "If", "it", "returns", "a", "nil", "error", "it", "may", "have", "modified", "h", "to", "include", "the", "new", "TLF", "ID", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L512-L519
160,663
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetTLFCryptKeys
func (fs *KBFSOpsStandard) GetTLFCryptKeys( ctx context.Context, tlfHandle *tlfhandle.Handle) ( keys []kbfscrypto.TLFCryptKey, id tlf.ID, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.log.CDebugf(ctx, "GetTLFCryptKeys(%s)", tlfHandle.GetCanonicalPath()) defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }() rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange) if err != nil { return nil, tlf.ID{}, err } keys, err = fs.config.KeyManager().GetTLFCryptKeyOfAllGenerations(ctx, rmd) return keys, rmd.TlfID(), err }
go
func (fs *KBFSOpsStandard) GetTLFCryptKeys( ctx context.Context, tlfHandle *tlfhandle.Handle) ( keys []kbfscrypto.TLFCryptKey, id tlf.ID, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.log.CDebugf(ctx, "GetTLFCryptKeys(%s)", tlfHandle.GetCanonicalPath()) defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }() rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange) if err != nil { return nil, tlf.ID{}, err } keys, err = fs.config.KeyManager().GetTLFCryptKeyOfAllGenerations(ctx, rmd) return keys, rmd.TlfID(), err }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetTLFCryptKeys", "(", "ctx", "context", ".", "Context", ",", "tlfHandle", "*", "tlfhandle", ".", "Handle", ")", "(", "keys", "[", "]", "kbfscrypto", ".", "TLFCryptKey", ",", "id", "tlf", ".", "ID", ",", "err", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "tlfHandle", ".", "GetCanonicalPath", "(", ")", ")", "\n", "defer", "func", "(", ")", "{", "fs", ".", "deferLog", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "err", ")", "}", "(", ")", "\n\n", "rmd", ",", "err", ":=", "fs", ".", "getMDByHandle", "(", "ctx", ",", "tlfHandle", ",", "FavoritesOpNoChange", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "tlf", ".", "ID", "{", "}", ",", "err", "\n", "}", "\n", "keys", ",", "err", "=", "fs", ".", "config", ".", "KeyManager", "(", ")", ".", "GetTLFCryptKeyOfAllGenerations", "(", "ctx", ",", "rmd", ")", "\n", "return", "keys", ",", "rmd", ".", "TlfID", "(", ")", ",", "err", "\n", "}" ]
// GetTLFCryptKeys implements the KBFSOps interface for // KBFSOpsStandard
[ "GetTLFCryptKeys", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L680-L695
160,664
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetTLFID
func (fs *KBFSOpsStandard) GetTLFID(ctx context.Context, tlfHandle *tlfhandle.Handle) (id tlf.ID, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.log.CDebugf(ctx, "GetTLFID(%s)", tlfHandle.GetCanonicalPath()) defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }() rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange) if err != nil { return tlf.ID{}, err } return rmd.TlfID(), err }
go
func (fs *KBFSOpsStandard) GetTLFID(ctx context.Context, tlfHandle *tlfhandle.Handle) (id tlf.ID, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.log.CDebugf(ctx, "GetTLFID(%s)", tlfHandle.GetCanonicalPath()) defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }() rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange) if err != nil { return tlf.ID{}, err } return rmd.TlfID(), err }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetTLFID", "(", "ctx", "context", ".", "Context", ",", "tlfHandle", "*", "tlfhandle", ".", "Handle", ")", "(", "id", "tlf", ".", "ID", ",", "err", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "tlfHandle", ".", "GetCanonicalPath", "(", ")", ")", "\n", "defer", "func", "(", ")", "{", "fs", ".", "deferLog", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "err", ")", "}", "(", ")", "\n\n", "rmd", ",", "err", ":=", "fs", ".", "getMDByHandle", "(", "ctx", ",", "tlfHandle", ",", "FavoritesOpNoChange", ")", "\n", "if", "err", "!=", "nil", "{", "return", "tlf", ".", "ID", "{", "}", ",", "err", "\n", "}", "\n", "return", "rmd", ".", "TlfID", "(", ")", ",", "err", "\n", "}" ]
// GetTLFID implements the KBFSOps interface for KBFSOpsStandard.
[ "GetTLFID", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L698-L711
160,665
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetTLFHandle
func (fs *KBFSOpsStandard) GetTLFHandle(ctx context.Context, node Node) ( *tlfhandle.Handle, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, node) return ops.GetTLFHandle(ctx, node) }
go
func (fs *KBFSOpsStandard) GetTLFHandle(ctx context.Context, node Node) ( *tlfhandle.Handle, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, node) return ops.GetTLFHandle(ctx, node) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetTLFHandle", "(", "ctx", "context", ".", "Context", ",", "node", "Node", ")", "(", "*", "tlfhandle", ".", "Handle", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "node", ")", "\n", "return", "ops", ".", "GetTLFHandle", "(", "ctx", ",", "node", ")", "\n", "}" ]
// GetTLFHandle implements the KBFSOps interface for KBFSOpsStandard.
[ "GetTLFHandle", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L714-L721
160,666
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetOrCreateRootNode
func (fs *KBFSOpsStandard) GetOrCreateRootNode( ctx context.Context, h *tlfhandle.Handle, branch data.BranchName) ( node Node, ei data.EntryInfo, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() return fs.getMaybeCreateRootNode(ctx, h, branch, true) }
go
func (fs *KBFSOpsStandard) GetOrCreateRootNode( ctx context.Context, h *tlfhandle.Handle, branch data.BranchName) ( node Node, ei data.EntryInfo, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() return fs.getMaybeCreateRootNode(ctx, h, branch, true) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetOrCreateRootNode", "(", "ctx", "context", ".", "Context", ",", "h", "*", "tlfhandle", ".", "Handle", ",", "branch", "data", ".", "BranchName", ")", "(", "node", "Node", ",", "ei", "data", ".", "EntryInfo", ",", "err", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "return", "fs", ".", "getMaybeCreateRootNode", "(", "ctx", ",", "h", ",", "branch", ",", "true", ")", "\n", "}" ]
// GetOrCreateRootNode implements the KBFSOps interface for // KBFSOpsStandard
[ "GetOrCreateRootNode", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L852-L859
160,667
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetDirChildren
func (fs *KBFSOpsStandard) GetDirChildren(ctx context.Context, dir Node) ( map[string]data.EntryInfo, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, dir) return ops.GetDirChildren(ctx, dir) }
go
func (fs *KBFSOpsStandard) GetDirChildren(ctx context.Context, dir Node) ( map[string]data.EntryInfo, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, dir) return ops.GetDirChildren(ctx, dir) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetDirChildren", "(", "ctx", "context", ".", "Context", ",", "dir", "Node", ")", "(", "map", "[", "string", "]", "data", ".", "EntryInfo", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "dir", ")", "\n", "return", "ops", ".", "GetDirChildren", "(", "ctx", ",", "dir", ")", "\n", "}" ]
// GetDirChildren implements the KBFSOps interface for KBFSOpsStandard
[ "GetDirChildren", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L874-L881
160,668
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Stat
func (fs *KBFSOpsStandard) Stat(ctx context.Context, node Node) ( data.EntryInfo, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, node) return ops.Stat(ctx, node) }
go
func (fs *KBFSOpsStandard) Stat(ctx context.Context, node Node) ( data.EntryInfo, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, node) return ops.Stat(ctx, node) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Stat", "(", "ctx", "context", ".", "Context", ",", "node", "Node", ")", "(", "data", ".", "EntryInfo", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "node", ")", "\n", "return", "ops", ".", "Stat", "(", "ctx", ",", "node", ")", "\n", "}" ]
// Stat implements the KBFSOps interface for KBFSOpsStandard
[ "Stat", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L894-L901
160,669
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
CreateFile
func (fs *KBFSOpsStandard) CreateFile( ctx context.Context, dir Node, name string, isExec bool, excl Excl) ( Node, data.EntryInfo, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, dir) return ops.CreateFile(ctx, dir, name, isExec, excl) }
go
func (fs *KBFSOpsStandard) CreateFile( ctx context.Context, dir Node, name string, isExec bool, excl Excl) ( Node, data.EntryInfo, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, dir) return ops.CreateFile(ctx, dir, name, isExec, excl) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "CreateFile", "(", "ctx", "context", ".", "Context", ",", "dir", "Node", ",", "name", "string", ",", "isExec", "bool", ",", "excl", "Excl", ")", "(", "Node", ",", "data", ".", "EntryInfo", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "dir", ")", "\n", "return", "ops", ".", "CreateFile", "(", "ctx", ",", "dir", ",", "name", ",", "isExec", ",", "excl", ")", "\n", "}" ]
// CreateFile implements the KBFSOps interface for KBFSOpsStandard
[ "CreateFile", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L914-L922
160,670
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
RemoveDir
func (fs *KBFSOpsStandard) RemoveDir( ctx context.Context, dir Node, name string) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, dir) return ops.RemoveDir(ctx, dir, name) }
go
func (fs *KBFSOpsStandard) RemoveDir( ctx context.Context, dir Node, name string) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, dir) return ops.RemoveDir(ctx, dir, name) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "RemoveDir", "(", "ctx", "context", ".", "Context", ",", "dir", "Node", ",", "name", "string", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "dir", ")", "\n", "return", "ops", ".", "RemoveDir", "(", "ctx", ",", "dir", ",", "name", ")", "\n", "}" ]
// RemoveDir implements the KBFSOps interface for KBFSOpsStandard
[ "RemoveDir", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L936-L943
160,671
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Rename
func (fs *KBFSOpsStandard) Rename( ctx context.Context, oldParent Node, oldName string, newParent Node, newName string) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() oldFB := oldParent.GetFolderBranch() newFB := newParent.GetFolderBranch() // only works for nodes within the same topdir if oldFB != newFB { return RenameAcrossDirsError{} } ops := fs.getOpsByNode(ctx, oldParent) return ops.Rename(ctx, oldParent, oldName, newParent, newName) }
go
func (fs *KBFSOpsStandard) Rename( ctx context.Context, oldParent Node, oldName string, newParent Node, newName string) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() oldFB := oldParent.GetFolderBranch() newFB := newParent.GetFolderBranch() // only works for nodes within the same topdir if oldFB != newFB { return RenameAcrossDirsError{} } ops := fs.getOpsByNode(ctx, oldParent) return ops.Rename(ctx, oldParent, oldName, newParent, newName) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Rename", "(", "ctx", "context", ".", "Context", ",", "oldParent", "Node", ",", "oldName", "string", ",", "newParent", "Node", ",", "newName", "string", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "oldFB", ":=", "oldParent", ".", "GetFolderBranch", "(", ")", "\n", "newFB", ":=", "newParent", ".", "GetFolderBranch", "(", ")", "\n\n", "// only works for nodes within the same topdir", "if", "oldFB", "!=", "newFB", "{", "return", "RenameAcrossDirsError", "{", "}", "\n", "}", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "oldParent", ")", "\n", "return", "ops", ".", "Rename", "(", "ctx", ",", "oldParent", ",", "oldName", ",", "newParent", ",", "newName", ")", "\n", "}" ]
// Rename implements the KBFSOps interface for KBFSOpsStandard
[ "Rename", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L956-L972
160,672
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Read
func (fs *KBFSOpsStandard) Read( ctx context.Context, file Node, dest []byte, off int64) ( numRead int64, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.Read(ctx, file, dest, off) }
go
func (fs *KBFSOpsStandard) Read( ctx context.Context, file Node, dest []byte, off int64) ( numRead int64, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.Read(ctx, file, dest, off) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Read", "(", "ctx", "context", ".", "Context", ",", "file", "Node", ",", "dest", "[", "]", "byte", ",", "off", "int64", ")", "(", "numRead", "int64", ",", "err", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "file", ")", "\n", "return", "ops", ".", "Read", "(", "ctx", ",", "file", ",", "dest", ",", "off", ")", "\n", "}" ]
// Read implements the KBFSOps interface for KBFSOpsStandard
[ "Read", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L975-L983
160,673
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Write
func (fs *KBFSOpsStandard) Write( ctx context.Context, file Node, data []byte, off int64) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.Write(ctx, file, data, off) }
go
func (fs *KBFSOpsStandard) Write( ctx context.Context, file Node, data []byte, off int64) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.Write(ctx, file, data, off) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Write", "(", "ctx", "context", ".", "Context", ",", "file", "Node", ",", "data", "[", "]", "byte", ",", "off", "int64", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "file", ")", "\n", "return", "ops", ".", "Write", "(", "ctx", ",", "file", ",", "data", ",", "off", ")", "\n", "}" ]
// Write implements the KBFSOps interface for KBFSOpsStandard
[ "Write", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L986-L993
160,674
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Truncate
func (fs *KBFSOpsStandard) Truncate( ctx context.Context, file Node, size uint64) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.Truncate(ctx, file, size) }
go
func (fs *KBFSOpsStandard) Truncate( ctx context.Context, file Node, size uint64) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.Truncate(ctx, file, size) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Truncate", "(", "ctx", "context", ".", "Context", ",", "file", "Node", ",", "size", "uint64", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "file", ")", "\n", "return", "ops", ".", "Truncate", "(", "ctx", ",", "file", ",", "size", ")", "\n", "}" ]
// Truncate implements the KBFSOps interface for KBFSOpsStandard
[ "Truncate", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L996-L1003
160,675
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
SetEx
func (fs *KBFSOpsStandard) SetEx( ctx context.Context, file Node, ex bool) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.SetEx(ctx, file, ex) }
go
func (fs *KBFSOpsStandard) SetEx( ctx context.Context, file Node, ex bool) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.SetEx(ctx, file, ex) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "SetEx", "(", "ctx", "context", ".", "Context", ",", "file", "Node", ",", "ex", "bool", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "file", ")", "\n", "return", "ops", ".", "SetEx", "(", "ctx", ",", "file", ",", "ex", ")", "\n", "}" ]
// SetEx implements the KBFSOps interface for KBFSOpsStandard
[ "SetEx", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1006-L1013
160,676
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
SetMtime
func (fs *KBFSOpsStandard) SetMtime( ctx context.Context, file Node, mtime *time.Time) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.SetMtime(ctx, file, mtime) }
go
func (fs *KBFSOpsStandard) SetMtime( ctx context.Context, file Node, mtime *time.Time) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOpsByNode(ctx, file) return ops.SetMtime(ctx, file, mtime) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "SetMtime", "(", "ctx", "context", ".", "Context", ",", "file", "Node", ",", "mtime", "*", "time", ".", "Time", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOpsByNode", "(", "ctx", ",", "file", ")", "\n", "return", "ops", ".", "SetMtime", "(", "ctx", ",", "file", ",", "mtime", ")", "\n", "}" ]
// SetMtime implements the KBFSOps interface for KBFSOpsStandard
[ "SetMtime", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1016-L1023
160,677
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
FolderStatus
func (fs *KBFSOpsStandard) FolderStatus( ctx context.Context, folderBranch data.FolderBranch) ( FolderBranchStatus, <-chan StatusUpdate, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange) return ops.FolderStatus(ctx, folderBranch) }
go
func (fs *KBFSOpsStandard) FolderStatus( ctx context.Context, folderBranch data.FolderBranch) ( FolderBranchStatus, <-chan StatusUpdate, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange) return ops.FolderStatus(ctx, folderBranch) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "FolderStatus", "(", "ctx", "context", ".", "Context", ",", "folderBranch", "data", ".", "FolderBranch", ")", "(", "FolderBranchStatus", ",", "<-", "chan", "StatusUpdate", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "folderBranch", ",", "FavoritesOpNoChange", ")", "\n", "return", "ops", ".", "FolderStatus", "(", "ctx", ",", "folderBranch", ")", "\n", "}" ]
// FolderStatus implements the KBFSOps interface for KBFSOpsStandard
[ "FolderStatus", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1036-L1044
160,678
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Status
func (fs *KBFSOpsStandard) Status(ctx context.Context) ( KBFSStatus, <-chan StatusUpdate, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() session, err := fs.config.KBPKI().GetCurrentSession(ctx) var usageBytes, archiveBytes, limitBytes int64 = -1, -1, -1 var gitUsageBytes, gitArchiveBytes, gitLimitBytes int64 = -1, -1, -1 // Don't request the quota info until we're sure we've // authenticated with our password. TODO: fix this in the // service/GUI by handling multiple simultaneous passphrase // requests at once. if err == nil && fs.config.MDServer().IsConnected() { var quErr error _, usageBytes, archiveBytes, limitBytes, gitUsageBytes, gitArchiveBytes, gitLimitBytes, quErr = fs.quotaUsage.GetAllTypes( ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance) if quErr != nil { // The error is ignored here so that other fields can still be populated // even if this fails. fs.log.CDebugf(ctx, "Getting quota usage error: %v", quErr) } } failures, ch := fs.currentStatus.CurrentStatus() var jManagerStatus *JournalManagerStatus jManager, jErr := GetJournalManager(fs.config) if jErr == nil { status, tlfIDs := jManager.Status(ctx) jManagerStatus = &status err := FillInJournalStatusUnflushedPaths( ctx, fs.config, jManagerStatus, tlfIDs) if err != nil { // The caller might depend on the channel (e.g., in // libfs/remote_status.go), even in the case where err != // nil. return KBFSStatus{}, ch, err } if usageBytes >= 0 { usageBytes += status.UnflushedBytes } } dbc := fs.config.DiskBlockCache() var dbcStatus map[string]DiskBlockCacheStatus if dbc != nil { dbcStatus = dbc.Status(ctx) } dmc := fs.config.DiskMDCache() var dmcStatus DiskMDCacheStatus if dmc != nil { dmcStatus = dmc.Status(ctx) } dqc := fs.config.DiskQuotaCache() var dqcStatus DiskQuotaCacheStatus if dqc != nil { dqcStatus = dqc.Status(ctx) } return KBFSStatus{ CurrentUser: session.Name.String(), IsConnected: fs.config.MDServer().IsConnected(), UsageBytes: usageBytes, ArchiveBytes: archiveBytes, LimitBytes: limitBytes, GitUsageBytes: gitUsageBytes, GitArchiveBytes: gitArchiveBytes, GitLimitBytes: gitLimitBytes, FailingServices: failures, JournalManager: jManagerStatus, DiskBlockCacheStatus: dbcStatus, DiskMDCacheStatus: dmcStatus, DiskQuotaCacheStatus: dqcStatus, }, ch, err }
go
func (fs *KBFSOpsStandard) Status(ctx context.Context) ( KBFSStatus, <-chan StatusUpdate, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() session, err := fs.config.KBPKI().GetCurrentSession(ctx) var usageBytes, archiveBytes, limitBytes int64 = -1, -1, -1 var gitUsageBytes, gitArchiveBytes, gitLimitBytes int64 = -1, -1, -1 // Don't request the quota info until we're sure we've // authenticated with our password. TODO: fix this in the // service/GUI by handling multiple simultaneous passphrase // requests at once. if err == nil && fs.config.MDServer().IsConnected() { var quErr error _, usageBytes, archiveBytes, limitBytes, gitUsageBytes, gitArchiveBytes, gitLimitBytes, quErr = fs.quotaUsage.GetAllTypes( ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance) if quErr != nil { // The error is ignored here so that other fields can still be populated // even if this fails. fs.log.CDebugf(ctx, "Getting quota usage error: %v", quErr) } } failures, ch := fs.currentStatus.CurrentStatus() var jManagerStatus *JournalManagerStatus jManager, jErr := GetJournalManager(fs.config) if jErr == nil { status, tlfIDs := jManager.Status(ctx) jManagerStatus = &status err := FillInJournalStatusUnflushedPaths( ctx, fs.config, jManagerStatus, tlfIDs) if err != nil { // The caller might depend on the channel (e.g., in // libfs/remote_status.go), even in the case where err != // nil. return KBFSStatus{}, ch, err } if usageBytes >= 0 { usageBytes += status.UnflushedBytes } } dbc := fs.config.DiskBlockCache() var dbcStatus map[string]DiskBlockCacheStatus if dbc != nil { dbcStatus = dbc.Status(ctx) } dmc := fs.config.DiskMDCache() var dmcStatus DiskMDCacheStatus if dmc != nil { dmcStatus = dmc.Status(ctx) } dqc := fs.config.DiskQuotaCache() var dqcStatus DiskQuotaCacheStatus if dqc != nil { dqcStatus = dqc.Status(ctx) } return KBFSStatus{ CurrentUser: session.Name.String(), IsConnected: fs.config.MDServer().IsConnected(), UsageBytes: usageBytes, ArchiveBytes: archiveBytes, LimitBytes: limitBytes, GitUsageBytes: gitUsageBytes, GitArchiveBytes: gitArchiveBytes, GitLimitBytes: gitLimitBytes, FailingServices: failures, JournalManager: jManagerStatus, DiskBlockCacheStatus: dbcStatus, DiskMDCacheStatus: dmcStatus, DiskQuotaCacheStatus: dqcStatus, }, ch, err }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Status", "(", "ctx", "context", ".", "Context", ")", "(", "KBFSStatus", ",", "<-", "chan", "StatusUpdate", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "session", ",", "err", ":=", "fs", ".", "config", ".", "KBPKI", "(", ")", ".", "GetCurrentSession", "(", "ctx", ")", "\n", "var", "usageBytes", ",", "archiveBytes", ",", "limitBytes", "int64", "=", "-", "1", ",", "-", "1", ",", "-", "1", "\n", "var", "gitUsageBytes", ",", "gitArchiveBytes", ",", "gitLimitBytes", "int64", "=", "-", "1", ",", "-", "1", ",", "-", "1", "\n", "// Don't request the quota info until we're sure we've", "// authenticated with our password. TODO: fix this in the", "// service/GUI by handling multiple simultaneous passphrase", "// requests at once.", "if", "err", "==", "nil", "&&", "fs", ".", "config", ".", "MDServer", "(", ")", ".", "IsConnected", "(", ")", "{", "var", "quErr", "error", "\n", "_", ",", "usageBytes", ",", "archiveBytes", ",", "limitBytes", ",", "gitUsageBytes", ",", "gitArchiveBytes", ",", "gitLimitBytes", ",", "quErr", "=", "fs", ".", "quotaUsage", ".", "GetAllTypes", "(", "ctx", ",", "quotaUsageStaleTolerance", "/", "2", ",", "quotaUsageStaleTolerance", ")", "\n", "if", "quErr", "!=", "nil", "{", "// The error is ignored here so that other fields can still be populated", "// even if this fails.", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "quErr", ")", "\n", "}", "\n", "}", "\n", "failures", ",", "ch", ":=", "fs", ".", "currentStatus", ".", "CurrentStatus", "(", ")", "\n", "var", "jManagerStatus", "*", "JournalManagerStatus", "\n", "jManager", ",", "jErr", ":=", "GetJournalManager", "(", "fs", ".", "config", ")", "\n", "if", "jErr", "==", "nil", "{", "status", ",", "tlfIDs", ":=", "jManager", ".", "Status", "(", "ctx", ")", "\n", "jManagerStatus", "=", "&", "status", "\n", "err", ":=", "FillInJournalStatusUnflushedPaths", "(", "ctx", ",", "fs", ".", "config", ",", "jManagerStatus", ",", "tlfIDs", ")", "\n", "if", "err", "!=", "nil", "{", "// The caller might depend on the channel (e.g., in", "// libfs/remote_status.go), even in the case where err !=", "// nil.", "return", "KBFSStatus", "{", "}", ",", "ch", ",", "err", "\n", "}", "\n", "if", "usageBytes", ">=", "0", "{", "usageBytes", "+=", "status", ".", "UnflushedBytes", "\n", "}", "\n", "}", "\n\n", "dbc", ":=", "fs", ".", "config", ".", "DiskBlockCache", "(", ")", "\n", "var", "dbcStatus", "map", "[", "string", "]", "DiskBlockCacheStatus", "\n", "if", "dbc", "!=", "nil", "{", "dbcStatus", "=", "dbc", ".", "Status", "(", "ctx", ")", "\n", "}", "\n\n", "dmc", ":=", "fs", ".", "config", ".", "DiskMDCache", "(", ")", "\n", "var", "dmcStatus", "DiskMDCacheStatus", "\n", "if", "dmc", "!=", "nil", "{", "dmcStatus", "=", "dmc", ".", "Status", "(", "ctx", ")", "\n", "}", "\n", "dqc", ":=", "fs", ".", "config", ".", "DiskQuotaCache", "(", ")", "\n", "var", "dqcStatus", "DiskQuotaCacheStatus", "\n", "if", "dqc", "!=", "nil", "{", "dqcStatus", "=", "dqc", ".", "Status", "(", "ctx", ")", "\n", "}", "\n\n", "return", "KBFSStatus", "{", "CurrentUser", ":", "session", ".", "Name", ".", "String", "(", ")", ",", "IsConnected", ":", "fs", ".", "config", ".", "MDServer", "(", ")", ".", "IsConnected", "(", ")", ",", "UsageBytes", ":", "usageBytes", ",", "ArchiveBytes", ":", "archiveBytes", ",", "LimitBytes", ":", "limitBytes", ",", "GitUsageBytes", ":", "gitUsageBytes", ",", "GitArchiveBytes", ":", "gitArchiveBytes", ",", "GitLimitBytes", ":", "gitLimitBytes", ",", "FailingServices", ":", "failures", ",", "JournalManager", ":", "jManagerStatus", ",", "DiskBlockCacheStatus", ":", "dbcStatus", ",", "DiskMDCacheStatus", ":", "dmcStatus", ",", "DiskQuotaCacheStatus", ":", "dqcStatus", ",", "}", ",", "ch", ",", "err", "\n", "}" ]
// Status implements the KBFSOps interface for KBFSOpsStandard
[ "Status", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1047-L1122
160,679
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
RequestRekey
func (fs *KBFSOpsStandard) RequestRekey(ctx context.Context, id tlf.ID) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() // We currently only support rekeys of master branches. ops := fs.getOps(ctx, data.FolderBranch{Tlf: id, Branch: data.MasterBranch}, FavoritesOpNoChange) ops.RequestRekey(ctx, id) }
go
func (fs *KBFSOpsStandard) RequestRekey(ctx context.Context, id tlf.ID) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() // We currently only support rekeys of master branches. ops := fs.getOps(ctx, data.FolderBranch{Tlf: id, Branch: data.MasterBranch}, FavoritesOpNoChange) ops.RequestRekey(ctx, id) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "RequestRekey", "(", "ctx", "context", ".", "Context", ",", "id", "tlf", ".", "ID", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "// We currently only support rekeys of master branches.", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "data", ".", "FolderBranch", "{", "Tlf", ":", "id", ",", "Branch", ":", "data", ".", "MasterBranch", "}", ",", "FavoritesOpNoChange", ")", "\n", "ops", ".", "RequestRekey", "(", "ctx", ",", "id", ")", "\n", "}" ]
// RequestRekey implements the KBFSOps interface for KBFSOpsStandard
[ "RequestRekey", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1136-L1144
160,680
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
SyncFromServer
func (fs *KBFSOpsStandard) SyncFromServer(ctx context.Context, folderBranch data.FolderBranch, lockBeforeGet *keybase1.LockID) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd) return ops.SyncFromServer(ctx, folderBranch, lockBeforeGet) }
go
func (fs *KBFSOpsStandard) SyncFromServer(ctx context.Context, folderBranch data.FolderBranch, lockBeforeGet *keybase1.LockID) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd) return ops.SyncFromServer(ctx, folderBranch, lockBeforeGet) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "SyncFromServer", "(", "ctx", "context", ".", "Context", ",", "folderBranch", "data", ".", "FolderBranch", ",", "lockBeforeGet", "*", "keybase1", ".", "LockID", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "folderBranch", ",", "FavoritesOpAdd", ")", "\n", "return", "ops", ".", "SyncFromServer", "(", "ctx", ",", "folderBranch", ",", "lockBeforeGet", ")", "\n", "}" ]
// SyncFromServer implements the KBFSOps interface for KBFSOpsStandard
[ "SyncFromServer", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1147-L1154
160,681
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetUpdateHistory
func (fs *KBFSOpsStandard) GetUpdateHistory(ctx context.Context, folderBranch data.FolderBranch) (history TLFUpdateHistory, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd) return ops.GetUpdateHistory(ctx, folderBranch) }
go
func (fs *KBFSOpsStandard) GetUpdateHistory(ctx context.Context, folderBranch data.FolderBranch) (history TLFUpdateHistory, err error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd) return ops.GetUpdateHistory(ctx, folderBranch) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetUpdateHistory", "(", "ctx", "context", ".", "Context", ",", "folderBranch", "data", ".", "FolderBranch", ")", "(", "history", "TLFUpdateHistory", ",", "err", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "folderBranch", ",", "FavoritesOpAdd", ")", "\n", "return", "ops", ".", "GetUpdateHistory", "(", "ctx", ",", "folderBranch", ")", "\n", "}" ]
// GetUpdateHistory implements the KBFSOps interface for KBFSOpsStandard
[ "GetUpdateHistory", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1157-L1164
160,682
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetEditHistory
func (fs *KBFSOpsStandard) GetEditHistory( ctx context.Context, folderBranch data.FolderBranch) ( tlfHistory keybase1.FSFolderEditHistory, err error) { ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd) return ops.GetEditHistory(ctx, folderBranch) }
go
func (fs *KBFSOpsStandard) GetEditHistory( ctx context.Context, folderBranch data.FolderBranch) ( tlfHistory keybase1.FSFolderEditHistory, err error) { ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd) return ops.GetEditHistory(ctx, folderBranch) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetEditHistory", "(", "ctx", "context", ".", "Context", ",", "folderBranch", "data", ".", "FolderBranch", ")", "(", "tlfHistory", "keybase1", ".", "FSFolderEditHistory", ",", "err", "error", ")", "{", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "folderBranch", ",", "FavoritesOpAdd", ")", "\n", "return", "ops", ".", "GetEditHistory", "(", "ctx", ",", "folderBranch", ")", "\n", "}" ]
// GetEditHistory implements the KBFSOps interface for KBFSOpsStandard
[ "GetEditHistory", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1167-L1172
160,683
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetRootNodeMetadata
func (fs *KBFSOpsStandard) GetRootNodeMetadata( ctx context.Context, folderBranch data.FolderBranch) ( NodeMetadata, *tlfhandle.Handle, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange) rootNode, _, _, err := ops.getRootNode(ctx) if err != nil { return NodeMetadata{}, nil, err } md, err := ops.GetNodeMetadata(ctx, rootNode) if err != nil { return NodeMetadata{}, nil, err } h, err := ops.GetTLFHandle(ctx, rootNode) if err != nil { return NodeMetadata{}, nil, err } return md, h, nil }
go
func (fs *KBFSOpsStandard) GetRootNodeMetadata( ctx context.Context, folderBranch data.FolderBranch) ( NodeMetadata, *tlfhandle.Handle, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange) rootNode, _, _, err := ops.getRootNode(ctx) if err != nil { return NodeMetadata{}, nil, err } md, err := ops.GetNodeMetadata(ctx, rootNode) if err != nil { return NodeMetadata{}, nil, err } h, err := ops.GetTLFHandle(ctx, rootNode) if err != nil { return NodeMetadata{}, nil, err } return md, h, nil }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetRootNodeMetadata", "(", "ctx", "context", ".", "Context", ",", "folderBranch", "data", ".", "FolderBranch", ")", "(", "NodeMetadata", ",", "*", "tlfhandle", ".", "Handle", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "folderBranch", ",", "FavoritesOpNoChange", ")", "\n", "rootNode", ",", "_", ",", "_", ",", "err", ":=", "ops", ".", "getRootNode", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "NodeMetadata", "{", "}", ",", "nil", ",", "err", "\n", "}", "\n", "md", ",", "err", ":=", "ops", ".", "GetNodeMetadata", "(", "ctx", ",", "rootNode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "NodeMetadata", "{", "}", ",", "nil", ",", "err", "\n", "}", "\n\n", "h", ",", "err", ":=", "ops", ".", "GetTLFHandle", "(", "ctx", ",", "rootNode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "NodeMetadata", "{", "}", ",", "nil", ",", "err", "\n", "}", "\n", "return", "md", ",", "h", ",", "nil", "\n", "}" ]
// GetRootNodeMetadata implements the KBFSOps interface for KBFSOpsStandard
[ "GetRootNodeMetadata", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1185-L1206
160,684
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
TeamNameChanged
func (fs *KBFSOpsStandard) TeamNameChanged( ctx context.Context, tid keybase1.TeamID) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.log.CDebugf(ctx, "Got TeamNameChanged for %s", tid) fbo := fs.findTeamByID(ctx, tid) if fbo != nil { go fbo.TeamNameChanged(ctx, tid) } }
go
func (fs *KBFSOpsStandard) TeamNameChanged( ctx context.Context, tid keybase1.TeamID) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() fs.log.CDebugf(ctx, "Got TeamNameChanged for %s", tid) fbo := fs.findTeamByID(ctx, tid) if fbo != nil { go fbo.TeamNameChanged(ctx, tid) } }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "TeamNameChanged", "(", "ctx", "context", ".", "Context", ",", "tid", "keybase1", ".", "TeamID", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "tid", ")", "\n", "fbo", ":=", "fs", ".", "findTeamByID", "(", "ctx", ",", "tid", ")", "\n", "if", "fbo", "!=", "nil", "{", "go", "fbo", ".", "TeamNameChanged", "(", "ctx", ",", "tid", ")", "\n", "}", "\n", "}" ]
// TeamNameChanged implements the KBFSOps interface for KBFSOpsStandard
[ "TeamNameChanged", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1244-L1254
160,685
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
KickoffAllOutstandingRekeys
func (fs *KBFSOpsStandard) KickoffAllOutstandingRekeys() error { for _, op := range fs.ops { op.rekeyFSM.Event(newRekeyKickoffEvent()) } return nil }
go
func (fs *KBFSOpsStandard) KickoffAllOutstandingRekeys() error { for _, op := range fs.ops { op.rekeyFSM.Event(newRekeyKickoffEvent()) } return nil }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "KickoffAllOutstandingRekeys", "(", ")", "error", "{", "for", "_", ",", "op", ":=", "range", "fs", ".", "ops", "{", "op", ".", "rekeyFSM", ".", "Event", "(", "newRekeyKickoffEvent", "(", ")", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// KickoffAllOutstandingRekeys implements the KBFSOps interface for // KBFSOpsStandard.
[ "KickoffAllOutstandingRekeys", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1283-L1288
160,686
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
NewNotificationChannel
func (fs *KBFSOpsStandard) NewNotificationChannel( ctx context.Context, handle *tlfhandle.Handle, convID chat1.ConversationID, channelName string) { if !fs.config.Mode().TLFEditHistoryEnabled() { return } fs.log.CDebugf(ctx, "New notification channel for %s", handle.GetCanonicalPath()) // If the FBO already exists, notify it. If the FBO doesn't exist // yet, we need to create it, so that it shows up in the edit // history. fs.opsLock.Lock() defer fs.opsLock.Unlock() fav := handle.ToFavorite() if ops, ok := fs.opsByFav[fav]; ok { ops.NewNotificationChannel(ctx, handle, convID, channelName) } else if handle.TlfID() != tlf.NullID { fs.editActivity.Add(1) go func() { defer fs.editActivity.Done() fs.log.CDebugf(ctx, "Initializing TLF %s for the edit history", handle.GetCanonicalPath()) ctx := CtxWithRandomIDReplayable( context.Background(), CtxFBOIDKey, CtxFBOOpID, fs.log) // Fully initialize the TLF in order to kick off any // necessary prefetches. err := fs.initTLFWithoutIdentifyPopups(ctx, handle) if err != nil { fs.log.CDebugf(ctx, "Couldn't initialize TLF: %+v", err) } }() } else { fs.log.CWarningf(ctx, "Handle %s for existing folder unexpectedly has no TLF ID", handle.GetCanonicalName()) } }
go
func (fs *KBFSOpsStandard) NewNotificationChannel( ctx context.Context, handle *tlfhandle.Handle, convID chat1.ConversationID, channelName string) { if !fs.config.Mode().TLFEditHistoryEnabled() { return } fs.log.CDebugf(ctx, "New notification channel for %s", handle.GetCanonicalPath()) // If the FBO already exists, notify it. If the FBO doesn't exist // yet, we need to create it, so that it shows up in the edit // history. fs.opsLock.Lock() defer fs.opsLock.Unlock() fav := handle.ToFavorite() if ops, ok := fs.opsByFav[fav]; ok { ops.NewNotificationChannel(ctx, handle, convID, channelName) } else if handle.TlfID() != tlf.NullID { fs.editActivity.Add(1) go func() { defer fs.editActivity.Done() fs.log.CDebugf(ctx, "Initializing TLF %s for the edit history", handle.GetCanonicalPath()) ctx := CtxWithRandomIDReplayable( context.Background(), CtxFBOIDKey, CtxFBOOpID, fs.log) // Fully initialize the TLF in order to kick off any // necessary prefetches. err := fs.initTLFWithoutIdentifyPopups(ctx, handle) if err != nil { fs.log.CDebugf(ctx, "Couldn't initialize TLF: %+v", err) } }() } else { fs.log.CWarningf(ctx, "Handle %s for existing folder unexpectedly has no TLF ID", handle.GetCanonicalName()) } }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "NewNotificationChannel", "(", "ctx", "context", ".", "Context", ",", "handle", "*", "tlfhandle", ".", "Handle", ",", "convID", "chat1", ".", "ConversationID", ",", "channelName", "string", ")", "{", "if", "!", "fs", ".", "config", ".", "Mode", "(", ")", ".", "TLFEditHistoryEnabled", "(", ")", "{", "return", "\n", "}", "\n\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "handle", ".", "GetCanonicalPath", "(", ")", ")", "\n\n", "// If the FBO already exists, notify it. If the FBO doesn't exist", "// yet, we need to create it, so that it shows up in the edit", "// history.", "fs", ".", "opsLock", ".", "Lock", "(", ")", "\n", "defer", "fs", ".", "opsLock", ".", "Unlock", "(", ")", "\n", "fav", ":=", "handle", ".", "ToFavorite", "(", ")", "\n", "if", "ops", ",", "ok", ":=", "fs", ".", "opsByFav", "[", "fav", "]", ";", "ok", "{", "ops", ".", "NewNotificationChannel", "(", "ctx", ",", "handle", ",", "convID", ",", "channelName", ")", "\n", "}", "else", "if", "handle", ".", "TlfID", "(", ")", "!=", "tlf", ".", "NullID", "{", "fs", ".", "editActivity", ".", "Add", "(", "1", ")", "\n", "go", "func", "(", ")", "{", "defer", "fs", ".", "editActivity", ".", "Done", "(", ")", "\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "handle", ".", "GetCanonicalPath", "(", ")", ")", "\n", "ctx", ":=", "CtxWithRandomIDReplayable", "(", "context", ".", "Background", "(", ")", ",", "CtxFBOIDKey", ",", "CtxFBOOpID", ",", "fs", ".", "log", ")", "\n", "// Fully initialize the TLF in order to kick off any", "// necessary prefetches.", "err", ":=", "fs", ".", "initTLFWithoutIdentifyPopups", "(", "ctx", ",", "handle", ")", "\n", "if", "err", "!=", "nil", "{", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "(", ")", "\n", "}", "else", "{", "fs", ".", "log", ".", "CWarningf", "(", "ctx", ",", "\"", "\"", ",", "handle", ".", "GetCanonicalName", "(", ")", ")", "\n", "}", "\n", "}" ]
// NewNotificationChannel implements the KBFSOps interface for // KBFSOpsStandard.
[ "NewNotificationChannel", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1313-L1351
160,687
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
Reset
func (fs *KBFSOpsStandard) Reset( ctx context.Context, handle *tlfhandle.Handle) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() // First, make sure the folder has been reset according to the // mdserver. bareHandle, err := handle.ToBareHandle() if err != nil { return err } id, _, err := fs.config.MDServer().GetForHandle( ctx, bareHandle, kbfsmd.Merged, nil) if err == nil { fs.log.CDebugf(ctx, "Folder %s can't be reset; still has ID %s", handle.GetCanonicalPath(), id) return errors.WithStack(FolderNotResetOnServer{handle}) } else if _, ok := errors.Cause(err).(kbfsmd.ServerErrorClassicTLFDoesNotExist); !ok { // Return errors if they don't indicate the folder is new. return err } fs.opsLock.Lock() defer fs.opsLock.Unlock() fs.log.CDebugf(ctx, "Reset %s", handle.GetCanonicalPath()) fb := data.FolderBranch{Tlf: handle.TlfID(), Branch: data.MasterBranch} ops, ok := fs.ops[fb] if ok { err := ops.Reset(ctx, handle) if err != nil { return err } delete(fs.ops, fb) fav := handle.ToFavorite() delete(fs.opsByFav, fav) err = ops.Shutdown(ctx) if err != nil { return err } } // Reset the TLF by overwriting the TLF ID in the sigchain. This // assumes that the server is in implicit team mode for new TLFs, // which at this point it should always be. return fs.resetTlfID(ctx, handle) }
go
func (fs *KBFSOpsStandard) Reset( ctx context.Context, handle *tlfhandle.Handle) error { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() // First, make sure the folder has been reset according to the // mdserver. bareHandle, err := handle.ToBareHandle() if err != nil { return err } id, _, err := fs.config.MDServer().GetForHandle( ctx, bareHandle, kbfsmd.Merged, nil) if err == nil { fs.log.CDebugf(ctx, "Folder %s can't be reset; still has ID %s", handle.GetCanonicalPath(), id) return errors.WithStack(FolderNotResetOnServer{handle}) } else if _, ok := errors.Cause(err).(kbfsmd.ServerErrorClassicTLFDoesNotExist); !ok { // Return errors if they don't indicate the folder is new. return err } fs.opsLock.Lock() defer fs.opsLock.Unlock() fs.log.CDebugf(ctx, "Reset %s", handle.GetCanonicalPath()) fb := data.FolderBranch{Tlf: handle.TlfID(), Branch: data.MasterBranch} ops, ok := fs.ops[fb] if ok { err := ops.Reset(ctx, handle) if err != nil { return err } delete(fs.ops, fb) fav := handle.ToFavorite() delete(fs.opsByFav, fav) err = ops.Shutdown(ctx) if err != nil { return err } } // Reset the TLF by overwriting the TLF ID in the sigchain. This // assumes that the server is in implicit team mode for new TLFs, // which at this point it should always be. return fs.resetTlfID(ctx, handle) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "Reset", "(", "ctx", "context", ".", "Context", ",", "handle", "*", "tlfhandle", ".", "Handle", ")", "error", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "// First, make sure the folder has been reset according to the", "// mdserver.", "bareHandle", ",", "err", ":=", "handle", ".", "ToBareHandle", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "id", ",", "_", ",", "err", ":=", "fs", ".", "config", ".", "MDServer", "(", ")", ".", "GetForHandle", "(", "ctx", ",", "bareHandle", ",", "kbfsmd", ".", "Merged", ",", "nil", ")", "\n", "if", "err", "==", "nil", "{", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "handle", ".", "GetCanonicalPath", "(", ")", ",", "id", ")", "\n", "return", "errors", ".", "WithStack", "(", "FolderNotResetOnServer", "{", "handle", "}", ")", "\n", "}", "else", "if", "_", ",", "ok", ":=", "errors", ".", "Cause", "(", "err", ")", ".", "(", "kbfsmd", ".", "ServerErrorClassicTLFDoesNotExist", ")", ";", "!", "ok", "{", "// Return errors if they don't indicate the folder is new.", "return", "err", "\n", "}", "\n\n", "fs", ".", "opsLock", ".", "Lock", "(", ")", "\n", "defer", "fs", ".", "opsLock", ".", "Unlock", "(", ")", "\n", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "handle", ".", "GetCanonicalPath", "(", ")", ")", "\n", "fb", ":=", "data", ".", "FolderBranch", "{", "Tlf", ":", "handle", ".", "TlfID", "(", ")", ",", "Branch", ":", "data", ".", "MasterBranch", "}", "\n", "ops", ",", "ok", ":=", "fs", ".", "ops", "[", "fb", "]", "\n", "if", "ok", "{", "err", ":=", "ops", ".", "Reset", "(", "ctx", ",", "handle", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "delete", "(", "fs", ".", "ops", ",", "fb", ")", "\n", "fav", ":=", "handle", ".", "ToFavorite", "(", ")", "\n", "delete", "(", "fs", ".", "opsByFav", ",", "fav", ")", "\n", "err", "=", "ops", ".", "Shutdown", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n\n", "// Reset the TLF by overwriting the TLF ID in the sigchain. This", "// assumes that the server is in implicit team mode for new TLFs,", "// which at this point it should always be.", "return", "fs", ".", "resetTlfID", "(", "ctx", ",", "handle", ")", "\n", "}" ]
// Reset implements the KBFSOps interface for KBFSOpsStandard.
[ "Reset", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1354-L1399
160,688
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
ClearConflictView
func (fs *KBFSOpsStandard) ClearConflictView(ctx context.Context, tlfID tlf.ID) error { fbo := fs.getOpsNoAdd(ctx, data.FolderBranch{ Tlf: tlfID, Branch: data.MasterBranch, }) return fbo.clearConflictView(ctx) }
go
func (fs *KBFSOpsStandard) ClearConflictView(ctx context.Context, tlfID tlf.ID) error { fbo := fs.getOpsNoAdd(ctx, data.FolderBranch{ Tlf: tlfID, Branch: data.MasterBranch, }) return fbo.clearConflictView(ctx) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "ClearConflictView", "(", "ctx", "context", ".", "Context", ",", "tlfID", "tlf", ".", "ID", ")", "error", "{", "fbo", ":=", "fs", ".", "getOpsNoAdd", "(", "ctx", ",", "data", ".", "FolderBranch", "{", "Tlf", ":", "tlfID", ",", "Branch", ":", "data", ".", "MasterBranch", ",", "}", ")", "\n", "return", "fbo", ".", "clearConflictView", "(", "ctx", ")", "\n", "}" ]
// ClearConflictView resets a TLF's jounral and conflict DB to a non // -conflicting state.
[ "ClearConflictView", "resets", "a", "TLF", "s", "jounral", "and", "conflict", "DB", "to", "a", "non", "-", "conflicting", "state", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1403-L1410
160,689
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
GetSyncConfig
func (fs *KBFSOpsStandard) GetSyncConfig( ctx context.Context, tlfID tlf.ID) (keybase1.FolderSyncConfig, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, data.FolderBranch{Tlf: tlfID, Branch: data.MasterBranch}, FavoritesOpNoChange) return ops.GetSyncConfig(ctx, tlfID) }
go
func (fs *KBFSOpsStandard) GetSyncConfig( ctx context.Context, tlfID tlf.ID) (keybase1.FolderSyncConfig, error) { timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx) defer timeTrackerDone() ops := fs.getOps(ctx, data.FolderBranch{Tlf: tlfID, Branch: data.MasterBranch}, FavoritesOpNoChange) return ops.GetSyncConfig(ctx, tlfID) }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "GetSyncConfig", "(", "ctx", "context", ".", "Context", ",", "tlfID", "tlf", ".", "ID", ")", "(", "keybase1", ".", "FolderSyncConfig", ",", "error", ")", "{", "timeTrackerDone", ":=", "fs", ".", "longOperationDebugDumper", ".", "Begin", "(", "ctx", ")", "\n", "defer", "timeTrackerDone", "(", ")", "\n\n", "ops", ":=", "fs", ".", "getOps", "(", "ctx", ",", "data", ".", "FolderBranch", "{", "Tlf", ":", "tlfID", ",", "Branch", ":", "data", ".", "MasterBranch", "}", ",", "FavoritesOpNoChange", ")", "\n", "return", "ops", ".", "GetSyncConfig", "(", "ctx", ",", "tlfID", ")", "\n", "}" ]
// GetSyncConfig implements the KBFSOps interface for KBFSOpsStandard.
[ "GetSyncConfig", "implements", "the", "KBFSOps", "interface", "for", "KBFSOpsStandard", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1413-L1421
160,690
keybase/client
go/kbfs/libkbfs/kbfs_ops.go
RegisterForChanges
func (fs *KBFSOpsStandard) RegisterForChanges( folderBranches []data.FolderBranch, obs Observer) error { for _, fb := range folderBranches { // TODO: add branch parameter to notifier interface ops := fs.getOps(context.Background(), fb, FavoritesOpNoChange) return ops.RegisterForChanges(obs) } return nil }
go
func (fs *KBFSOpsStandard) RegisterForChanges( folderBranches []data.FolderBranch, obs Observer) error { for _, fb := range folderBranches { // TODO: add branch parameter to notifier interface ops := fs.getOps(context.Background(), fb, FavoritesOpNoChange) return ops.RegisterForChanges(obs) } return nil }
[ "func", "(", "fs", "*", "KBFSOpsStandard", ")", "RegisterForChanges", "(", "folderBranches", "[", "]", "data", ".", "FolderBranch", ",", "obs", "Observer", ")", "error", "{", "for", "_", ",", "fb", ":=", "range", "folderBranches", "{", "// TODO: add branch parameter to notifier interface", "ops", ":=", "fs", ".", "getOps", "(", "context", ".", "Background", "(", ")", ",", "fb", ",", "FavoritesOpNoChange", ")", "\n", "return", "ops", ".", "RegisterForChanges", "(", "obs", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// RegisterForChanges implements the Notifer interface for KBFSOpsStandard
[ "RegisterForChanges", "implements", "the", "Notifer", "interface", "for", "KBFSOpsStandard" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1453-L1461
160,691
keybase/client
go/chat/attachments/utils.go
NewFileReadCloseResetter
func NewFileReadCloseResetter(name string) (ReadCloseResetter, error) { f := &FileReadCloseResetter{filename: name} if err := f.open(); err != nil { return nil, err } return f, nil }
go
func NewFileReadCloseResetter(name string) (ReadCloseResetter, error) { f := &FileReadCloseResetter{filename: name} if err := f.open(); err != nil { return nil, err } return f, nil }
[ "func", "NewFileReadCloseResetter", "(", "name", "string", ")", "(", "ReadCloseResetter", ",", "error", ")", "{", "f", ":=", "&", "FileReadCloseResetter", "{", "filename", ":", "name", "}", "\n", "if", "err", ":=", "f", ".", "open", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "f", ",", "nil", "\n", "}" ]
// NewFileReadCloseResetter creates a ReadCloseResetter that uses an on-disk file as // source of data.
[ "NewFileReadCloseResetter", "creates", "a", "ReadCloseResetter", "that", "uses", "an", "on", "-", "disk", "file", "as", "source", "of", "data", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L98-L104
160,692
keybase/client
go/chat/attachments/utils.go
Read
func (f *KbfsReadCloseResetter) Read(p []byte) (int, error) { content, err := f.client.SimpleFSRead(f.ctx, keybase1.SimpleFSReadArg{ OpID: f.opid, Offset: atomic.LoadInt64(&f.offset), Size: len(p), }) if err != nil { return 0, err } if len(content.Data) == 0 { // Unfortunately SimpleFSRead doesn't return EOF error. return 0, io.EOF } atomic.AddInt64(&f.offset, int64(len(content.Data))) copy(p, content.Data) return len(content.Data), nil }
go
func (f *KbfsReadCloseResetter) Read(p []byte) (int, error) { content, err := f.client.SimpleFSRead(f.ctx, keybase1.SimpleFSReadArg{ OpID: f.opid, Offset: atomic.LoadInt64(&f.offset), Size: len(p), }) if err != nil { return 0, err } if len(content.Data) == 0 { // Unfortunately SimpleFSRead doesn't return EOF error. return 0, io.EOF } atomic.AddInt64(&f.offset, int64(len(content.Data))) copy(p, content.Data) return len(content.Data), nil }
[ "func", "(", "f", "*", "KbfsReadCloseResetter", ")", "Read", "(", "p", "[", "]", "byte", ")", "(", "int", ",", "error", ")", "{", "content", ",", "err", ":=", "f", ".", "client", ".", "SimpleFSRead", "(", "f", ".", "ctx", ",", "keybase1", ".", "SimpleFSReadArg", "{", "OpID", ":", "f", ".", "opid", ",", "Offset", ":", "atomic", ".", "LoadInt64", "(", "&", "f", ".", "offset", ")", ",", "Size", ":", "len", "(", "p", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "err", "\n", "}", "\n", "if", "len", "(", "content", ".", "Data", ")", "==", "0", "{", "// Unfortunately SimpleFSRead doesn't return EOF error.", "return", "0", ",", "io", ".", "EOF", "\n", "}", "\n", "atomic", ".", "AddInt64", "(", "&", "f", ".", "offset", ",", "int64", "(", "len", "(", "content", ".", "Data", ")", ")", ")", "\n", "copy", "(", "p", ",", "content", ".", "Data", ")", "\n", "return", "len", "(", "content", ".", "Data", ")", ",", "nil", "\n", "}" ]
// Read implements the ReadCloseResetter interface.
[ "Read", "implements", "the", "ReadCloseResetter", "interface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L204-L220
160,693
keybase/client
go/chat/attachments/utils.go
Close
func (f *KbfsReadCloseResetter) Close() error { return f.client.SimpleFSClose(f.ctx, f.opid) }
go
func (f *KbfsReadCloseResetter) Close() error { return f.client.SimpleFSClose(f.ctx, f.opid) }
[ "func", "(", "f", "*", "KbfsReadCloseResetter", ")", "Close", "(", ")", "error", "{", "return", "f", ".", "client", ".", "SimpleFSClose", "(", "f", ".", "ctx", ",", "f", ".", "opid", ")", "\n", "}" ]
// Close implements the ReadCloseResetter interface.
[ "Close", "implements", "the", "ReadCloseResetter", "interface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L229-L231
160,694
keybase/client
go/chat/attachments/utils.go
NewReadCloseResetter
func NewReadCloseResetter(ctx context.Context, g *libkb.GlobalContext, p string) (ReadCloseResetter, error) { if isKbfsPath(p) { return NewKbfsReadCloseResetter(ctx, g, p) } return NewFileReadCloseResetter(p) }
go
func NewReadCloseResetter(ctx context.Context, g *libkb.GlobalContext, p string) (ReadCloseResetter, error) { if isKbfsPath(p) { return NewKbfsReadCloseResetter(ctx, g, p) } return NewFileReadCloseResetter(p) }
[ "func", "NewReadCloseResetter", "(", "ctx", "context", ".", "Context", ",", "g", "*", "libkb", ".", "GlobalContext", ",", "p", "string", ")", "(", "ReadCloseResetter", ",", "error", ")", "{", "if", "isKbfsPath", "(", "p", ")", "{", "return", "NewKbfsReadCloseResetter", "(", "ctx", ",", "g", ",", "p", ")", "\n", "}", "\n", "return", "NewFileReadCloseResetter", "(", "p", ")", "\n", "}" ]
// NewReadCloseResetter creates a ReadCloseResetter using either on-disk file // or SimpleFS depending on if p is a KBFS path.
[ "NewReadCloseResetter", "creates", "a", "ReadCloseResetter", "using", "either", "on", "-", "disk", "file", "or", "SimpleFS", "depending", "on", "if", "p", "is", "a", "KBFS", "path", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L235-L241
160,695
keybase/client
go/chat/attachments/utils.go
StatOSOrKbfsFile
func StatOSOrKbfsFile(ctx context.Context, g *libkb.GlobalContext, p string) ( fi os.FileInfo, err error) { if !isKbfsPath(p) { return os.Stat(p) } client, err := makeSimpleFSClientFromGlobalContext(g) if err != nil { return nil, err } dirent, err := client.SimpleFSStat(ctx, keybase1.SimpleFSStatArg{ Path: keybase1.NewPathWithKbfs(p[len(kbfsPrefix):]), }) if err != nil { return nil, err } return kbfsFileInfo{dirent: &dirent}, nil }
go
func StatOSOrKbfsFile(ctx context.Context, g *libkb.GlobalContext, p string) ( fi os.FileInfo, err error) { if !isKbfsPath(p) { return os.Stat(p) } client, err := makeSimpleFSClientFromGlobalContext(g) if err != nil { return nil, err } dirent, err := client.SimpleFSStat(ctx, keybase1.SimpleFSStatArg{ Path: keybase1.NewPathWithKbfs(p[len(kbfsPrefix):]), }) if err != nil { return nil, err } return kbfsFileInfo{dirent: &dirent}, nil }
[ "func", "StatOSOrKbfsFile", "(", "ctx", "context", ".", "Context", ",", "g", "*", "libkb", ".", "GlobalContext", ",", "p", "string", ")", "(", "fi", "os", ".", "FileInfo", ",", "err", "error", ")", "{", "if", "!", "isKbfsPath", "(", "p", ")", "{", "return", "os", ".", "Stat", "(", "p", ")", "\n", "}", "\n\n", "client", ",", "err", ":=", "makeSimpleFSClientFromGlobalContext", "(", "g", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "dirent", ",", "err", ":=", "client", ".", "SimpleFSStat", "(", "ctx", ",", "keybase1", ".", "SimpleFSStatArg", "{", "Path", ":", "keybase1", ".", "NewPathWithKbfs", "(", "p", "[", "len", "(", "kbfsPrefix", ")", ":", "]", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "kbfsFileInfo", "{", "dirent", ":", "&", "dirent", "}", ",", "nil", "\n", "}" ]
// StatOSOrKbfsFile stats the file located at p, using SimpleFSStat if it's a // KBFS path, or os.Stat if not.
[ "StatOSOrKbfsFile", "stats", "the", "file", "located", "at", "p", "using", "SimpleFSStat", "if", "it", "s", "a", "KBFS", "path", "or", "os", ".", "Stat", "if", "not", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L274-L293
160,696
keybase/client
go/engine/puk_upkeep_background.go
NewPerUserKeyUpkeepBackground
func NewPerUserKeyUpkeepBackground(g *libkb.GlobalContext, args *PerUserKeyUpkeepBackgroundArgs) *PerUserKeyUpkeepBackground { task := NewBackgroundTask(g, &BackgroundTaskArgs{ Name: "PerUserKeyUpkeepBackground", F: PerUserKeyUpkeepBackgroundRound, Settings: PerUserKeyUpkeepBackgroundSettings, testingMetaCh: args.testingMetaCh, testingRoundResCh: args.testingRoundResCh, }) return &PerUserKeyUpkeepBackground{ Contextified: libkb.NewContextified(g), args: args, // Install the task early so that Shutdown can be called before RunEngine. task: task, } }
go
func NewPerUserKeyUpkeepBackground(g *libkb.GlobalContext, args *PerUserKeyUpkeepBackgroundArgs) *PerUserKeyUpkeepBackground { task := NewBackgroundTask(g, &BackgroundTaskArgs{ Name: "PerUserKeyUpkeepBackground", F: PerUserKeyUpkeepBackgroundRound, Settings: PerUserKeyUpkeepBackgroundSettings, testingMetaCh: args.testingMetaCh, testingRoundResCh: args.testingRoundResCh, }) return &PerUserKeyUpkeepBackground{ Contextified: libkb.NewContextified(g), args: args, // Install the task early so that Shutdown can be called before RunEngine. task: task, } }
[ "func", "NewPerUserKeyUpkeepBackground", "(", "g", "*", "libkb", ".", "GlobalContext", ",", "args", "*", "PerUserKeyUpkeepBackgroundArgs", ")", "*", "PerUserKeyUpkeepBackground", "{", "task", ":=", "NewBackgroundTask", "(", "g", ",", "&", "BackgroundTaskArgs", "{", "Name", ":", "\"", "\"", ",", "F", ":", "PerUserKeyUpkeepBackgroundRound", ",", "Settings", ":", "PerUserKeyUpkeepBackgroundSettings", ",", "testingMetaCh", ":", "args", ".", "testingMetaCh", ",", "testingRoundResCh", ":", "args", ".", "testingRoundResCh", ",", "}", ")", "\n", "return", "&", "PerUserKeyUpkeepBackground", "{", "Contextified", ":", "libkb", ".", "NewContextified", "(", "g", ")", ",", "args", ":", "args", ",", "// Install the task early so that Shutdown can be called before RunEngine.", "task", ":", "task", ",", "}", "\n", "}" ]
// NewPerUserKeyUpkeepBackground creates a PerUserKeyUpkeepBackground engine.
[ "NewPerUserKeyUpkeepBackground", "creates", "a", "PerUserKeyUpkeepBackground", "engine", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/puk_upkeep_background.go#L41-L56
160,697
keybase/client
go/kbfs/libfuse/debug_server_file.go
Write
func (f *DebugServerFile) Write(ctx context.Context, req *fuse.WriteRequest, resp *fuse.WriteResponse) (err error) { f.fs.log.CDebugf(ctx, "DebugServerFile (enable: %t) Write", f.enable) defer func() { err = f.fs.processError(ctx, libkbfs.WriteMode, err) }() if len(req.Data) == 0 { return nil } if f.enable { portStr := strings.TrimSpace(string(req.Data)) port, err := strconv.ParseUint(portStr, 10, 16) if err != nil { return err } err = f.fs.enableDebugServer(ctx, uint16(port)) if err != nil { return err } } else { err := f.fs.disableDebugServer(ctx) if err != nil { return err } } resp.Size = len(req.Data) return nil }
go
func (f *DebugServerFile) Write(ctx context.Context, req *fuse.WriteRequest, resp *fuse.WriteResponse) (err error) { f.fs.log.CDebugf(ctx, "DebugServerFile (enable: %t) Write", f.enable) defer func() { err = f.fs.processError(ctx, libkbfs.WriteMode, err) }() if len(req.Data) == 0 { return nil } if f.enable { portStr := strings.TrimSpace(string(req.Data)) port, err := strconv.ParseUint(portStr, 10, 16) if err != nil { return err } err = f.fs.enableDebugServer(ctx, uint16(port)) if err != nil { return err } } else { err := f.fs.disableDebugServer(ctx) if err != nil { return err } } resp.Size = len(req.Data) return nil }
[ "func", "(", "f", "*", "DebugServerFile", ")", "Write", "(", "ctx", "context", ".", "Context", ",", "req", "*", "fuse", ".", "WriteRequest", ",", "resp", "*", "fuse", ".", "WriteResponse", ")", "(", "err", "error", ")", "{", "f", ".", "fs", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "f", ".", "enable", ")", "\n", "defer", "func", "(", ")", "{", "err", "=", "f", ".", "fs", ".", "processError", "(", "ctx", ",", "libkbfs", ".", "WriteMode", ",", "err", ")", "}", "(", ")", "\n", "if", "len", "(", "req", ".", "Data", ")", "==", "0", "{", "return", "nil", "\n", "}", "\n\n", "if", "f", ".", "enable", "{", "portStr", ":=", "strings", ".", "TrimSpace", "(", "string", "(", "req", ".", "Data", ")", ")", "\n", "port", ",", "err", ":=", "strconv", ".", "ParseUint", "(", "portStr", ",", "10", ",", "16", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "err", "=", "f", ".", "fs", ".", "enableDebugServer", "(", "ctx", ",", "uint16", "(", "port", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "else", "{", "err", ":=", "f", ".", "fs", ".", "disableDebugServer", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n\n", "resp", ".", "Size", "=", "len", "(", "req", ".", "Data", ")", "\n", "return", "nil", "\n", "}" ]
// Write implements the fs.HandleWriter interface for DebugServerFile.
[ "Write", "implements", "the", "fs", ".", "HandleWriter", "interface", "for", "DebugServerFile", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/debug_server_file.go#L46-L74
160,698
keybase/client
go/chat/ephemeral_purger.go
Push
func (pq *priorityQueue) Push(x interface{}) { pq.Lock() defer pq.Unlock() item := x.(*queueItem) item.index = len(pq.queue) pq.queue = append(pq.queue, item) pq.itemMap[item.purgeInfo.ConvID.String()] = item }
go
func (pq *priorityQueue) Push(x interface{}) { pq.Lock() defer pq.Unlock() item := x.(*queueItem) item.index = len(pq.queue) pq.queue = append(pq.queue, item) pq.itemMap[item.purgeInfo.ConvID.String()] = item }
[ "func", "(", "pq", "*", "priorityQueue", ")", "Push", "(", "x", "interface", "{", "}", ")", "{", "pq", ".", "Lock", "(", ")", "\n", "defer", "pq", ".", "Unlock", "(", ")", "\n\n", "item", ":=", "x", ".", "(", "*", "queueItem", ")", "\n", "item", ".", "index", "=", "len", "(", "pq", ".", "queue", ")", "\n", "pq", ".", "queue", "=", "append", "(", "pq", ".", "queue", ",", "item", ")", "\n", "pq", ".", "itemMap", "[", "item", ".", "purgeInfo", ".", "ConvID", ".", "String", "(", ")", "]", "=", "item", "\n", "}" ]
// Note this method should not be used directly since we only want each // conversation to appear once in the heap. Use // `BackgroundEphemeralPurger.update` instead since it handles this as // intended.
[ "Note", "this", "method", "should", "not", "be", "used", "directly", "since", "we", "only", "want", "each", "conversation", "to", "appear", "once", "in", "the", "heap", ".", "Use", "BackgroundEphemeralPurger", ".", "update", "instead", "since", "it", "handles", "this", "as", "intended", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/ephemeral_purger.go#L78-L86
160,699
keybase/client
go/chat/ephemeral_purger.go
initQueue
func (b *BackgroundEphemeralPurger) initQueue(ctx context.Context) { b.queueLock.Lock() defer b.queueLock.Unlock() // Create a new queue b.pq = newPriorityQueue() heap.Init(b.pq) allPurgeInfo, err := b.storage.GetAllPurgeInfo(ctx, b.uid) if err != nil { b.Debug(ctx, "unable to get purgeInfo: %v", allPurgeInfo) } for _, purgeInfo := range allPurgeInfo { if purgeInfo.IsActive { b.updateQueue(purgeInfo) } } }
go
func (b *BackgroundEphemeralPurger) initQueue(ctx context.Context) { b.queueLock.Lock() defer b.queueLock.Unlock() // Create a new queue b.pq = newPriorityQueue() heap.Init(b.pq) allPurgeInfo, err := b.storage.GetAllPurgeInfo(ctx, b.uid) if err != nil { b.Debug(ctx, "unable to get purgeInfo: %v", allPurgeInfo) } for _, purgeInfo := range allPurgeInfo { if purgeInfo.IsActive { b.updateQueue(purgeInfo) } } }
[ "func", "(", "b", "*", "BackgroundEphemeralPurger", ")", "initQueue", "(", "ctx", "context", ".", "Context", ")", "{", "b", ".", "queueLock", ".", "Lock", "(", ")", "\n", "defer", "b", ".", "queueLock", ".", "Unlock", "(", ")", "\n\n", "// Create a new queue", "b", ".", "pq", "=", "newPriorityQueue", "(", ")", "\n", "heap", ".", "Init", "(", "b", ".", "pq", ")", "\n\n", "allPurgeInfo", ",", "err", ":=", "b", ".", "storage", ".", "GetAllPurgeInfo", "(", "ctx", ",", "b", ".", "uid", ")", "\n", "if", "err", "!=", "nil", "{", "b", ".", "Debug", "(", "ctx", ",", "\"", "\"", ",", "allPurgeInfo", ")", "\n", "}", "\n", "for", "_", ",", "purgeInfo", ":=", "range", "allPurgeInfo", "{", "if", "purgeInfo", ".", "IsActive", "{", "b", ".", "updateQueue", "(", "purgeInfo", ")", "\n", "}", "\n", "}", "\n", "}" ]
// Read all purgeInfo from disk and startup our queue.
[ "Read", "all", "purgeInfo", "from", "disk", "and", "startup", "our", "queue", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/ephemeral_purger.go#L226-L243