id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
160,800 | keybase/client | go/chat/boxer.go | boxV1 | func (b *Boxer) boxV1(messagePlaintext chat1.MessagePlaintext, key types.CryptKey,
signingKeyPair libkb.NaclSigningKeyPair) (res chat1.MessageBoxed, err error) {
body := chat1.BodyPlaintextV1{
MessageBody: messagePlaintext.MessageBody,
}
plaintextBody := chat1.NewBodyPlaintextWithV1(body)
encryptedBody, err := b.seal(plaintextBody, libkb.NaclSecretBoxKey(key.Material()))
if err != nil {
return res, err
}
// create the v1 header, adding hash
bodyHash := b.hashV1(encryptedBody.E)
if messagePlaintext.ClientHeader.MerkleRoot != nil {
return res, fmt.Errorf("cannot box v1 message with merkle root")
}
header := chat1.HeaderPlaintextV1{
Conv: messagePlaintext.ClientHeader.Conv,
TlfName: messagePlaintext.ClientHeader.TlfName,
TlfPublic: messagePlaintext.ClientHeader.TlfPublic,
MessageType: messagePlaintext.ClientHeader.MessageType,
Prev: messagePlaintext.ClientHeader.Prev,
Sender: messagePlaintext.ClientHeader.Sender,
SenderDevice: messagePlaintext.ClientHeader.SenderDevice,
MerkleRoot: nil, // MerkleRoot cannot be sent in MBv1 messages
BodyHash: bodyHash[:],
OutboxInfo: messagePlaintext.ClientHeader.OutboxInfo,
OutboxID: messagePlaintext.ClientHeader.OutboxID,
KbfsCryptKeysUsed: messagePlaintext.ClientHeader.KbfsCryptKeysUsed,
}
// sign the header and insert the signature
sig, err := b.signMarshal(header, signingKeyPair, kbcrypto.SignaturePrefixChatMBv1)
if err != nil {
return res, err
}
header.HeaderSignature = &sig
// create a plaintext header
plaintextHeader := chat1.NewHeaderPlaintextWithV1(header)
encryptedHeader, err := b.seal(plaintextHeader, libkb.NaclSecretBoxKey(key.Material()))
if err != nil {
return res, err
}
return chat1.MessageBoxed{
Version: chat1.MessageBoxedVersion_V1,
ClientHeader: messagePlaintext.ClientHeader,
BodyCiphertext: *encryptedBody,
HeaderCiphertext: encryptedHeader.AsSealed(),
KeyGeneration: key.Generation(),
}, nil
} | go | func (b *Boxer) boxV1(messagePlaintext chat1.MessagePlaintext, key types.CryptKey,
signingKeyPair libkb.NaclSigningKeyPair) (res chat1.MessageBoxed, err error) {
body := chat1.BodyPlaintextV1{
MessageBody: messagePlaintext.MessageBody,
}
plaintextBody := chat1.NewBodyPlaintextWithV1(body)
encryptedBody, err := b.seal(plaintextBody, libkb.NaclSecretBoxKey(key.Material()))
if err != nil {
return res, err
}
// create the v1 header, adding hash
bodyHash := b.hashV1(encryptedBody.E)
if messagePlaintext.ClientHeader.MerkleRoot != nil {
return res, fmt.Errorf("cannot box v1 message with merkle root")
}
header := chat1.HeaderPlaintextV1{
Conv: messagePlaintext.ClientHeader.Conv,
TlfName: messagePlaintext.ClientHeader.TlfName,
TlfPublic: messagePlaintext.ClientHeader.TlfPublic,
MessageType: messagePlaintext.ClientHeader.MessageType,
Prev: messagePlaintext.ClientHeader.Prev,
Sender: messagePlaintext.ClientHeader.Sender,
SenderDevice: messagePlaintext.ClientHeader.SenderDevice,
MerkleRoot: nil, // MerkleRoot cannot be sent in MBv1 messages
BodyHash: bodyHash[:],
OutboxInfo: messagePlaintext.ClientHeader.OutboxInfo,
OutboxID: messagePlaintext.ClientHeader.OutboxID,
KbfsCryptKeysUsed: messagePlaintext.ClientHeader.KbfsCryptKeysUsed,
}
// sign the header and insert the signature
sig, err := b.signMarshal(header, signingKeyPair, kbcrypto.SignaturePrefixChatMBv1)
if err != nil {
return res, err
}
header.HeaderSignature = &sig
// create a plaintext header
plaintextHeader := chat1.NewHeaderPlaintextWithV1(header)
encryptedHeader, err := b.seal(plaintextHeader, libkb.NaclSecretBoxKey(key.Material()))
if err != nil {
return res, err
}
return chat1.MessageBoxed{
Version: chat1.MessageBoxedVersion_V1,
ClientHeader: messagePlaintext.ClientHeader,
BodyCiphertext: *encryptedBody,
HeaderCiphertext: encryptedHeader.AsSealed(),
KeyGeneration: key.Generation(),
}, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"boxV1",
"(",
"messagePlaintext",
"chat1",
".",
"MessagePlaintext",
",",
"key",
"types",
".",
"CryptKey",
",",
"signingKeyPair",
"libkb",
".",
"NaclSigningKeyPair",
")",
"(",
"res",
"chat1",
".",
"MessageBoxed",
",",
"err",
"error",
")",
"{",
"body",
":=",
"chat1",
".",
"BodyPlaintextV1",
"{",
"MessageBody",
":",
"messagePlaintext",
".",
"MessageBody",
",",
"}",
"\n",
"plaintextBody",
":=",
"chat1",
".",
"NewBodyPlaintextWithV1",
"(",
"body",
")",
"\n",
"encryptedBody",
",",
"err",
":=",
"b",
".",
"seal",
"(",
"plaintextBody",
",",
"libkb",
".",
"NaclSecretBoxKey",
"(",
"key",
".",
"Material",
"(",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"// create the v1 header, adding hash",
"bodyHash",
":=",
"b",
".",
"hashV1",
"(",
"encryptedBody",
".",
"E",
")",
"\n",
"if",
"messagePlaintext",
".",
"ClientHeader",
".",
"MerkleRoot",
"!=",
"nil",
"{",
"return",
"res",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"header",
":=",
"chat1",
".",
"HeaderPlaintextV1",
"{",
"Conv",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"Conv",
",",
"TlfName",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"TlfName",
",",
"TlfPublic",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"TlfPublic",
",",
"MessageType",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"MessageType",
",",
"Prev",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"Prev",
",",
"Sender",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"Sender",
",",
"SenderDevice",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"SenderDevice",
",",
"MerkleRoot",
":",
"nil",
",",
"// MerkleRoot cannot be sent in MBv1 messages",
"BodyHash",
":",
"bodyHash",
"[",
":",
"]",
",",
"OutboxInfo",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"OutboxInfo",
",",
"OutboxID",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"OutboxID",
",",
"KbfsCryptKeysUsed",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"KbfsCryptKeysUsed",
",",
"}",
"\n\n",
"// sign the header and insert the signature",
"sig",
",",
"err",
":=",
"b",
".",
"signMarshal",
"(",
"header",
",",
"signingKeyPair",
",",
"kbcrypto",
".",
"SignaturePrefixChatMBv1",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"header",
".",
"HeaderSignature",
"=",
"&",
"sig",
"\n\n",
"// create a plaintext header",
"plaintextHeader",
":=",
"chat1",
".",
"NewHeaderPlaintextWithV1",
"(",
"header",
")",
"\n",
"encryptedHeader",
",",
"err",
":=",
"b",
".",
"seal",
"(",
"plaintextHeader",
",",
"libkb",
".",
"NaclSecretBoxKey",
"(",
"key",
".",
"Material",
"(",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"return",
"chat1",
".",
"MessageBoxed",
"{",
"Version",
":",
"chat1",
".",
"MessageBoxedVersion_V1",
",",
"ClientHeader",
":",
"messagePlaintext",
".",
"ClientHeader",
",",
"BodyCiphertext",
":",
"*",
"encryptedBody",
",",
"HeaderCiphertext",
":",
"encryptedHeader",
".",
"AsSealed",
"(",
")",
",",
"KeyGeneration",
":",
"key",
".",
"Generation",
"(",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] | // boxMessageWithKeys encrypts and signs a keybase1.MessagePlaintext into a
// chat1.MessageBoxed given a keybase1.CryptKey. | [
"boxMessageWithKeys",
"encrypts",
"and",
"signs",
"a",
"keybase1",
".",
"MessagePlaintext",
"into",
"a",
"chat1",
".",
"MessageBoxed",
"given",
"a",
"keybase1",
".",
"CryptKey",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1509-L1561 |
160,801 | keybase/client | go/chat/boxer.go | boxV2orV3orV4 | func (b *Boxer) boxV2orV3orV4(ctx context.Context, messagePlaintext chat1.MessagePlaintext,
baseEncryptionKey types.CryptKey, ephemeralSeed *keybase1.TeamEk, signingKeyPair libkb.NaclSigningKeyPair,
version chat1.MessageBoxedVersion, pairwiseMACRecipients []keybase1.KID) (res chat1.MessageBoxed, err error) {
if messagePlaintext.ClientHeader.MerkleRoot == nil {
return res, NewBoxingError("cannot send message without merkle root", false)
}
headerEncryptionKey, err := libkb.DeriveSymmetricKey(
libkb.NaclSecretBoxKey(baseEncryptionKey.Material()), libkb.EncryptionReasonChatMessage)
if err != nil {
return res, err
}
// Regular messages use the same encryption key for the header and for the
// body. Exploding messages use a derived ephemeral key for the body.
bodyEncryptionKey := headerEncryptionKey
if messagePlaintext.IsEphemeral() {
bodyEncryptionKey, err = libkb.DeriveFromSecret(ephemeralSeed.Seed, libkb.DeriveReasonTeamEKExplodingChat)
if err != nil {
return res, err
}
// The MessagePlaintext supplied by the caller has a Lifetime, but we
// expect the Generation is left uninitialized, and we set it here.
messagePlaintext.ClientHeader.EphemeralMetadata.Generation = ephemeralSeed.Metadata.Generation
}
bodyVersioned := chat1.NewBodyPlaintextWithV1(chat1.BodyPlaintextV1{
MessageBody: messagePlaintext.MessageBody,
})
bodyEncrypted, err := b.seal(bodyVersioned, bodyEncryptionKey)
if err != nil {
return res, err
}
bodyHash, err := b.makeBodyHash(*bodyEncrypted)
if err != nil {
return res, err
}
// create the v1 header, adding hash
headerVersioned := chat1.NewHeaderPlaintextWithV1(chat1.HeaderPlaintextV1{
Conv: messagePlaintext.ClientHeader.Conv,
TlfName: messagePlaintext.ClientHeader.TlfName,
TlfPublic: messagePlaintext.ClientHeader.TlfPublic,
MessageType: messagePlaintext.ClientHeader.MessageType,
Prev: messagePlaintext.ClientHeader.Prev,
Sender: messagePlaintext.ClientHeader.Sender,
SenderDevice: messagePlaintext.ClientHeader.SenderDevice,
BodyHash: bodyHash,
MerkleRoot: messagePlaintext.ClientHeader.MerkleRoot,
OutboxInfo: messagePlaintext.ClientHeader.OutboxInfo,
OutboxID: messagePlaintext.ClientHeader.OutboxID,
KbfsCryptKeysUsed: messagePlaintext.ClientHeader.KbfsCryptKeysUsed,
EphemeralMetadata: messagePlaintext.ClientHeader.EphemeralMetadata,
// In MessageBoxed.V2 HeaderSignature is nil.
HeaderSignature: nil,
})
// signencrypt the header
headerSealed, err := b.signEncryptMarshal(headerVersioned, headerEncryptionKey,
signingKeyPair, kbcrypto.SignaturePrefixChatMBv2)
if err != nil {
return res, err
}
// Make pairwise MACs if there are any pairwise recipients supplied. Note
// that we still sign+encrypt with a signing key above. If we want
// repudiability, it's the caller's responsibility to provide a zero
// signing key or similar. Signing with a real key and also MAC'ing is
// redundant, but it will let us test the MAC code in prod in a backwards
// compatible way.
if len(pairwiseMACRecipients) > 0 {
pairwiseMACs, err := b.makeAllPairwiseMACs(ctx, headerSealed, pairwiseMACRecipients)
if err != nil {
return res, err
}
messagePlaintext.ClientHeader.PairwiseMacs = pairwiseMACs
}
// verify
verifyKey := signingKeyPair.GetBinaryKID()
return chat1.MessageBoxed{
Version: version,
ServerHeader: nil,
ClientHeader: messagePlaintext.ClientHeader,
HeaderCiphertext: headerSealed.AsSealed(),
BodyCiphertext: *bodyEncrypted,
VerifyKey: verifyKey,
KeyGeneration: baseEncryptionKey.Generation(),
}, nil
} | go | func (b *Boxer) boxV2orV3orV4(ctx context.Context, messagePlaintext chat1.MessagePlaintext,
baseEncryptionKey types.CryptKey, ephemeralSeed *keybase1.TeamEk, signingKeyPair libkb.NaclSigningKeyPair,
version chat1.MessageBoxedVersion, pairwiseMACRecipients []keybase1.KID) (res chat1.MessageBoxed, err error) {
if messagePlaintext.ClientHeader.MerkleRoot == nil {
return res, NewBoxingError("cannot send message without merkle root", false)
}
headerEncryptionKey, err := libkb.DeriveSymmetricKey(
libkb.NaclSecretBoxKey(baseEncryptionKey.Material()), libkb.EncryptionReasonChatMessage)
if err != nil {
return res, err
}
// Regular messages use the same encryption key for the header and for the
// body. Exploding messages use a derived ephemeral key for the body.
bodyEncryptionKey := headerEncryptionKey
if messagePlaintext.IsEphemeral() {
bodyEncryptionKey, err = libkb.DeriveFromSecret(ephemeralSeed.Seed, libkb.DeriveReasonTeamEKExplodingChat)
if err != nil {
return res, err
}
// The MessagePlaintext supplied by the caller has a Lifetime, but we
// expect the Generation is left uninitialized, and we set it here.
messagePlaintext.ClientHeader.EphemeralMetadata.Generation = ephemeralSeed.Metadata.Generation
}
bodyVersioned := chat1.NewBodyPlaintextWithV1(chat1.BodyPlaintextV1{
MessageBody: messagePlaintext.MessageBody,
})
bodyEncrypted, err := b.seal(bodyVersioned, bodyEncryptionKey)
if err != nil {
return res, err
}
bodyHash, err := b.makeBodyHash(*bodyEncrypted)
if err != nil {
return res, err
}
// create the v1 header, adding hash
headerVersioned := chat1.NewHeaderPlaintextWithV1(chat1.HeaderPlaintextV1{
Conv: messagePlaintext.ClientHeader.Conv,
TlfName: messagePlaintext.ClientHeader.TlfName,
TlfPublic: messagePlaintext.ClientHeader.TlfPublic,
MessageType: messagePlaintext.ClientHeader.MessageType,
Prev: messagePlaintext.ClientHeader.Prev,
Sender: messagePlaintext.ClientHeader.Sender,
SenderDevice: messagePlaintext.ClientHeader.SenderDevice,
BodyHash: bodyHash,
MerkleRoot: messagePlaintext.ClientHeader.MerkleRoot,
OutboxInfo: messagePlaintext.ClientHeader.OutboxInfo,
OutboxID: messagePlaintext.ClientHeader.OutboxID,
KbfsCryptKeysUsed: messagePlaintext.ClientHeader.KbfsCryptKeysUsed,
EphemeralMetadata: messagePlaintext.ClientHeader.EphemeralMetadata,
// In MessageBoxed.V2 HeaderSignature is nil.
HeaderSignature: nil,
})
// signencrypt the header
headerSealed, err := b.signEncryptMarshal(headerVersioned, headerEncryptionKey,
signingKeyPair, kbcrypto.SignaturePrefixChatMBv2)
if err != nil {
return res, err
}
// Make pairwise MACs if there are any pairwise recipients supplied. Note
// that we still sign+encrypt with a signing key above. If we want
// repudiability, it's the caller's responsibility to provide a zero
// signing key or similar. Signing with a real key and also MAC'ing is
// redundant, but it will let us test the MAC code in prod in a backwards
// compatible way.
if len(pairwiseMACRecipients) > 0 {
pairwiseMACs, err := b.makeAllPairwiseMACs(ctx, headerSealed, pairwiseMACRecipients)
if err != nil {
return res, err
}
messagePlaintext.ClientHeader.PairwiseMacs = pairwiseMACs
}
// verify
verifyKey := signingKeyPair.GetBinaryKID()
return chat1.MessageBoxed{
Version: version,
ServerHeader: nil,
ClientHeader: messagePlaintext.ClientHeader,
HeaderCiphertext: headerSealed.AsSealed(),
BodyCiphertext: *bodyEncrypted,
VerifyKey: verifyKey,
KeyGeneration: baseEncryptionKey.Generation(),
}, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"boxV2orV3orV4",
"(",
"ctx",
"context",
".",
"Context",
",",
"messagePlaintext",
"chat1",
".",
"MessagePlaintext",
",",
"baseEncryptionKey",
"types",
".",
"CryptKey",
",",
"ephemeralSeed",
"*",
"keybase1",
".",
"TeamEk",
",",
"signingKeyPair",
"libkb",
".",
"NaclSigningKeyPair",
",",
"version",
"chat1",
".",
"MessageBoxedVersion",
",",
"pairwiseMACRecipients",
"[",
"]",
"keybase1",
".",
"KID",
")",
"(",
"res",
"chat1",
".",
"MessageBoxed",
",",
"err",
"error",
")",
"{",
"if",
"messagePlaintext",
".",
"ClientHeader",
".",
"MerkleRoot",
"==",
"nil",
"{",
"return",
"res",
",",
"NewBoxingError",
"(",
"\"",
"\"",
",",
"false",
")",
"\n",
"}",
"\n",
"headerEncryptionKey",
",",
"err",
":=",
"libkb",
".",
"DeriveSymmetricKey",
"(",
"libkb",
".",
"NaclSecretBoxKey",
"(",
"baseEncryptionKey",
".",
"Material",
"(",
")",
")",
",",
"libkb",
".",
"EncryptionReasonChatMessage",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"// Regular messages use the same encryption key for the header and for the",
"// body. Exploding messages use a derived ephemeral key for the body.",
"bodyEncryptionKey",
":=",
"headerEncryptionKey",
"\n",
"if",
"messagePlaintext",
".",
"IsEphemeral",
"(",
")",
"{",
"bodyEncryptionKey",
",",
"err",
"=",
"libkb",
".",
"DeriveFromSecret",
"(",
"ephemeralSeed",
".",
"Seed",
",",
"libkb",
".",
"DeriveReasonTeamEKExplodingChat",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"// The MessagePlaintext supplied by the caller has a Lifetime, but we",
"// expect the Generation is left uninitialized, and we set it here.",
"messagePlaintext",
".",
"ClientHeader",
".",
"EphemeralMetadata",
".",
"Generation",
"=",
"ephemeralSeed",
".",
"Metadata",
".",
"Generation",
"\n",
"}",
"\n\n",
"bodyVersioned",
":=",
"chat1",
".",
"NewBodyPlaintextWithV1",
"(",
"chat1",
".",
"BodyPlaintextV1",
"{",
"MessageBody",
":",
"messagePlaintext",
".",
"MessageBody",
",",
"}",
")",
"\n",
"bodyEncrypted",
",",
"err",
":=",
"b",
".",
"seal",
"(",
"bodyVersioned",
",",
"bodyEncryptionKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"bodyHash",
",",
"err",
":=",
"b",
".",
"makeBodyHash",
"(",
"*",
"bodyEncrypted",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"// create the v1 header, adding hash",
"headerVersioned",
":=",
"chat1",
".",
"NewHeaderPlaintextWithV1",
"(",
"chat1",
".",
"HeaderPlaintextV1",
"{",
"Conv",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"Conv",
",",
"TlfName",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"TlfName",
",",
"TlfPublic",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"TlfPublic",
",",
"MessageType",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"MessageType",
",",
"Prev",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"Prev",
",",
"Sender",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"Sender",
",",
"SenderDevice",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"SenderDevice",
",",
"BodyHash",
":",
"bodyHash",
",",
"MerkleRoot",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"MerkleRoot",
",",
"OutboxInfo",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"OutboxInfo",
",",
"OutboxID",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"OutboxID",
",",
"KbfsCryptKeysUsed",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"KbfsCryptKeysUsed",
",",
"EphemeralMetadata",
":",
"messagePlaintext",
".",
"ClientHeader",
".",
"EphemeralMetadata",
",",
"// In MessageBoxed.V2 HeaderSignature is nil.",
"HeaderSignature",
":",
"nil",
",",
"}",
")",
"\n\n",
"// signencrypt the header",
"headerSealed",
",",
"err",
":=",
"b",
".",
"signEncryptMarshal",
"(",
"headerVersioned",
",",
"headerEncryptionKey",
",",
"signingKeyPair",
",",
"kbcrypto",
".",
"SignaturePrefixChatMBv2",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n\n",
"// Make pairwise MACs if there are any pairwise recipients supplied. Note",
"// that we still sign+encrypt with a signing key above. If we want",
"// repudiability, it's the caller's responsibility to provide a zero",
"// signing key or similar. Signing with a real key and also MAC'ing is",
"// redundant, but it will let us test the MAC code in prod in a backwards",
"// compatible way.",
"if",
"len",
"(",
"pairwiseMACRecipients",
")",
">",
"0",
"{",
"pairwiseMACs",
",",
"err",
":=",
"b",
".",
"makeAllPairwiseMACs",
"(",
"ctx",
",",
"headerSealed",
",",
"pairwiseMACRecipients",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"err",
"\n",
"}",
"\n",
"messagePlaintext",
".",
"ClientHeader",
".",
"PairwiseMacs",
"=",
"pairwiseMACs",
"\n",
"}",
"\n\n",
"// verify",
"verifyKey",
":=",
"signingKeyPair",
".",
"GetBinaryKID",
"(",
")",
"\n\n",
"return",
"chat1",
".",
"MessageBoxed",
"{",
"Version",
":",
"version",
",",
"ServerHeader",
":",
"nil",
",",
"ClientHeader",
":",
"messagePlaintext",
".",
"ClientHeader",
",",
"HeaderCiphertext",
":",
"headerSealed",
".",
"AsSealed",
"(",
")",
",",
"BodyCiphertext",
":",
"*",
"bodyEncrypted",
",",
"VerifyKey",
":",
"verifyKey",
",",
"KeyGeneration",
":",
"baseEncryptionKey",
".",
"Generation",
"(",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] | // V3 is just V2 but with exploding messages support. V4 is just V3, but it
// signs with the zero key when pairwise MACs are included. | [
"V3",
"is",
"just",
"V2",
"but",
"with",
"exploding",
"messages",
"support",
".",
"V4",
"is",
"just",
"V3",
"but",
"it",
"signs",
"with",
"the",
"zero",
"key",
"when",
"pairwise",
"MACs",
"are",
"included",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1601-L1692 |
160,802 | keybase/client | go/chat/boxer.go | seal | func (b *Boxer) seal(data interface{}, key libkb.NaclSecretBoxKey) (*chat1.EncryptedData, error) {
s, err := b.marshal(data)
if err != nil {
return nil, err
}
var nonce [libkb.NaclDHNonceSize]byte
if _, err := rand.Read(nonce[:]); err != nil {
return nil, err
}
var encKey [libkb.NaclSecretBoxKeySize]byte = key
sealed := secretbox.Seal(nil, []byte(s), &nonce, &encKey)
enc := &chat1.EncryptedData{
V: 1,
E: sealed,
N: nonce[:],
}
return enc, nil
} | go | func (b *Boxer) seal(data interface{}, key libkb.NaclSecretBoxKey) (*chat1.EncryptedData, error) {
s, err := b.marshal(data)
if err != nil {
return nil, err
}
var nonce [libkb.NaclDHNonceSize]byte
if _, err := rand.Read(nonce[:]); err != nil {
return nil, err
}
var encKey [libkb.NaclSecretBoxKeySize]byte = key
sealed := secretbox.Seal(nil, []byte(s), &nonce, &encKey)
enc := &chat1.EncryptedData{
V: 1,
E: sealed,
N: nonce[:],
}
return enc, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"seal",
"(",
"data",
"interface",
"{",
"}",
",",
"key",
"libkb",
".",
"NaclSecretBoxKey",
")",
"(",
"*",
"chat1",
".",
"EncryptedData",
",",
"error",
")",
"{",
"s",
",",
"err",
":=",
"b",
".",
"marshal",
"(",
"data",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"nonce",
"[",
"libkb",
".",
"NaclDHNonceSize",
"]",
"byte",
"\n",
"if",
"_",
",",
"err",
":=",
"rand",
".",
"Read",
"(",
"nonce",
"[",
":",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"encKey",
"[",
"libkb",
".",
"NaclSecretBoxKeySize",
"]",
"byte",
"=",
"key",
"\n\n",
"sealed",
":=",
"secretbox",
".",
"Seal",
"(",
"nil",
",",
"[",
"]",
"byte",
"(",
"s",
")",
",",
"&",
"nonce",
",",
"&",
"encKey",
")",
"\n",
"enc",
":=",
"&",
"chat1",
".",
"EncryptedData",
"{",
"V",
":",
"1",
",",
"E",
":",
"sealed",
",",
"N",
":",
"nonce",
"[",
":",
"]",
",",
"}",
"\n\n",
"return",
"enc",
",",
"nil",
"\n",
"}"
] | // seal encrypts data into chat1.EncryptedData. | [
"seal",
"encrypts",
"data",
"into",
"chat1",
".",
"EncryptedData",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1695-L1716 |
160,803 | keybase/client | go/chat/boxer.go | open | func (b *Boxer) open(data chat1.EncryptedData, key libkb.NaclSecretBoxKey) ([]byte, error) {
if len(data.N) != libkb.NaclDHNonceSize {
return nil, libkb.DecryptBadNonceError{}
}
var nonce [libkb.NaclDHNonceSize]byte
copy(nonce[:], data.N)
plain, ok := secretbox.Open(nil, data.E, &nonce, (*[32]byte)(&key))
if !ok {
return nil, libkb.DecryptOpenError{}
}
return plain, nil
} | go | func (b *Boxer) open(data chat1.EncryptedData, key libkb.NaclSecretBoxKey) ([]byte, error) {
if len(data.N) != libkb.NaclDHNonceSize {
return nil, libkb.DecryptBadNonceError{}
}
var nonce [libkb.NaclDHNonceSize]byte
copy(nonce[:], data.N)
plain, ok := secretbox.Open(nil, data.E, &nonce, (*[32]byte)(&key))
if !ok {
return nil, libkb.DecryptOpenError{}
}
return plain, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"open",
"(",
"data",
"chat1",
".",
"EncryptedData",
",",
"key",
"libkb",
".",
"NaclSecretBoxKey",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"if",
"len",
"(",
"data",
".",
"N",
")",
"!=",
"libkb",
".",
"NaclDHNonceSize",
"{",
"return",
"nil",
",",
"libkb",
".",
"DecryptBadNonceError",
"{",
"}",
"\n",
"}",
"\n",
"var",
"nonce",
"[",
"libkb",
".",
"NaclDHNonceSize",
"]",
"byte",
"\n",
"copy",
"(",
"nonce",
"[",
":",
"]",
",",
"data",
".",
"N",
")",
"\n\n",
"plain",
",",
"ok",
":=",
"secretbox",
".",
"Open",
"(",
"nil",
",",
"data",
".",
"E",
",",
"&",
"nonce",
",",
"(",
"*",
"[",
"32",
"]",
"byte",
")",
"(",
"&",
"key",
")",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"libkb",
".",
"DecryptOpenError",
"{",
"}",
"\n",
"}",
"\n",
"return",
"plain",
",",
"nil",
"\n",
"}"
] | // open decrypts chat1.EncryptedData. | [
"open",
"decrypts",
"chat1",
".",
"EncryptedData",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1719-L1731 |
160,804 | keybase/client | go/chat/boxer.go | signMarshal | func (b *Boxer) signMarshal(data interface{}, kp libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignatureInfo, error) {
encoded, err := b.marshal(data)
if err != nil {
return chat1.SignatureInfo{}, err
}
return b.sign(encoded, kp, prefix)
} | go | func (b *Boxer) signMarshal(data interface{}, kp libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignatureInfo, error) {
encoded, err := b.marshal(data)
if err != nil {
return chat1.SignatureInfo{}, err
}
return b.sign(encoded, kp, prefix)
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"signMarshal",
"(",
"data",
"interface",
"{",
"}",
",",
"kp",
"libkb",
".",
"NaclSigningKeyPair",
",",
"prefix",
"kbcrypto",
".",
"SignaturePrefix",
")",
"(",
"chat1",
".",
"SignatureInfo",
",",
"error",
")",
"{",
"encoded",
",",
"err",
":=",
"b",
".",
"marshal",
"(",
"data",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"chat1",
".",
"SignatureInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"b",
".",
"sign",
"(",
"encoded",
",",
"kp",
",",
"prefix",
")",
"\n",
"}"
] | // signMarshal signs data with a NaclSigningKeyPair, returning a chat1.SignatureInfo.
// It marshals data before signing. | [
"signMarshal",
"signs",
"data",
"with",
"a",
"NaclSigningKeyPair",
"returning",
"a",
"chat1",
".",
"SignatureInfo",
".",
"It",
"marshals",
"data",
"before",
"signing",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1735-L1742 |
160,805 | keybase/client | go/chat/boxer.go | signEncryptMarshal | func (b *Boxer) signEncryptMarshal(data interface{}, encryptionKey libkb.NaclSecretBoxKey,
signingKeyPair libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignEncryptedData, error) {
encoded, err := b.marshal(data)
if err != nil {
return chat1.SignEncryptedData{}, err
}
return b.signEncrypt(encoded, encryptionKey, signingKeyPair, prefix)
} | go | func (b *Boxer) signEncryptMarshal(data interface{}, encryptionKey libkb.NaclSecretBoxKey,
signingKeyPair libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignEncryptedData, error) {
encoded, err := b.marshal(data)
if err != nil {
return chat1.SignEncryptedData{}, err
}
return b.signEncrypt(encoded, encryptionKey, signingKeyPair, prefix)
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"signEncryptMarshal",
"(",
"data",
"interface",
"{",
"}",
",",
"encryptionKey",
"libkb",
".",
"NaclSecretBoxKey",
",",
"signingKeyPair",
"libkb",
".",
"NaclSigningKeyPair",
",",
"prefix",
"kbcrypto",
".",
"SignaturePrefix",
")",
"(",
"chat1",
".",
"SignEncryptedData",
",",
"error",
")",
"{",
"encoded",
",",
"err",
":=",
"b",
".",
"marshal",
"(",
"data",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"chat1",
".",
"SignEncryptedData",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"b",
".",
"signEncrypt",
"(",
"encoded",
",",
"encryptionKey",
",",
"signingKeyPair",
",",
"prefix",
")",
"\n",
"}"
] | // signEncryptMarshal signencrypts data given an encryption and signing key, returning a chat1.SignEncryptedData.
// It marshals data before signing. | [
"signEncryptMarshal",
"signencrypts",
"data",
"given",
"an",
"encryption",
"and",
"signing",
"key",
"returning",
"a",
"chat1",
".",
"SignEncryptedData",
".",
"It",
"marshals",
"data",
"before",
"signing",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1746-L1754 |
160,806 | keybase/client | go/chat/boxer.go | sign | func (b *Boxer) sign(msg []byte, kp libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignatureInfo, error) {
sig, err := kp.SignV2(msg, prefix)
if err != nil {
return chat1.SignatureInfo{}, err
}
sigInfo := chat1.SignatureInfo{
V: sig.Version,
S: sig.Sig[:],
K: sig.Kid,
}
if b.testingSignatureMangle != nil {
b.assertInTest()
sigInfo.S = b.testingSignatureMangle(sigInfo.S)
}
return sigInfo, nil
} | go | func (b *Boxer) sign(msg []byte, kp libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignatureInfo, error) {
sig, err := kp.SignV2(msg, prefix)
if err != nil {
return chat1.SignatureInfo{}, err
}
sigInfo := chat1.SignatureInfo{
V: sig.Version,
S: sig.Sig[:],
K: sig.Kid,
}
if b.testingSignatureMangle != nil {
b.assertInTest()
sigInfo.S = b.testingSignatureMangle(sigInfo.S)
}
return sigInfo, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"sign",
"(",
"msg",
"[",
"]",
"byte",
",",
"kp",
"libkb",
".",
"NaclSigningKeyPair",
",",
"prefix",
"kbcrypto",
".",
"SignaturePrefix",
")",
"(",
"chat1",
".",
"SignatureInfo",
",",
"error",
")",
"{",
"sig",
",",
"err",
":=",
"kp",
".",
"SignV2",
"(",
"msg",
",",
"prefix",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"chat1",
".",
"SignatureInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"sigInfo",
":=",
"chat1",
".",
"SignatureInfo",
"{",
"V",
":",
"sig",
".",
"Version",
",",
"S",
":",
"sig",
".",
"Sig",
"[",
":",
"]",
",",
"K",
":",
"sig",
".",
"Kid",
",",
"}",
"\n\n",
"if",
"b",
".",
"testingSignatureMangle",
"!=",
"nil",
"{",
"b",
".",
"assertInTest",
"(",
")",
"\n",
"sigInfo",
".",
"S",
"=",
"b",
".",
"testingSignatureMangle",
"(",
"sigInfo",
".",
"S",
")",
"\n",
"}",
"\n\n",
"return",
"sigInfo",
",",
"nil",
"\n",
"}"
] | // sign signs msg with a NaclSigningKeyPair, returning a chat1.SignatureInfo. | [
"sign",
"signs",
"msg",
"with",
"a",
"NaclSigningKeyPair",
"returning",
"a",
"chat1",
".",
"SignatureInfo",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1757-L1774 |
160,807 | keybase/client | go/chat/boxer.go | signEncrypt | func (b *Boxer) signEncrypt(msg []byte, encryptionKey libkb.NaclSecretBoxKey,
signingKeyPair libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignEncryptedData, error) {
if signingKeyPair.Private == nil {
return chat1.SignEncryptedData{}, libkb.NoSecretKeyError{}
}
var nonce [signencrypt.NonceSize]byte
if _, err := rand.Read(nonce[:]); err != nil {
return chat1.SignEncryptedData{}, err
}
var encKey [signencrypt.SecretboxKeySize]byte = encryptionKey
var signKey [ed25519.PrivateKeySize]byte = *signingKeyPair.Private
signEncryptedBytes := signencrypt.SealWhole(
msg, &encKey, &signKey, prefix, &nonce)
signEncryptedInfo := chat1.SignEncryptedData{
V: 1,
E: signEncryptedBytes,
N: nonce[:],
}
if b.testingSignatureMangle != nil {
b.assertInTest()
signEncryptedInfo.E = b.testingSignatureMangle(signEncryptedInfo.E)
}
return signEncryptedInfo, nil
} | go | func (b *Boxer) signEncrypt(msg []byte, encryptionKey libkb.NaclSecretBoxKey,
signingKeyPair libkb.NaclSigningKeyPair, prefix kbcrypto.SignaturePrefix) (chat1.SignEncryptedData, error) {
if signingKeyPair.Private == nil {
return chat1.SignEncryptedData{}, libkb.NoSecretKeyError{}
}
var nonce [signencrypt.NonceSize]byte
if _, err := rand.Read(nonce[:]); err != nil {
return chat1.SignEncryptedData{}, err
}
var encKey [signencrypt.SecretboxKeySize]byte = encryptionKey
var signKey [ed25519.PrivateKeySize]byte = *signingKeyPair.Private
signEncryptedBytes := signencrypt.SealWhole(
msg, &encKey, &signKey, prefix, &nonce)
signEncryptedInfo := chat1.SignEncryptedData{
V: 1,
E: signEncryptedBytes,
N: nonce[:],
}
if b.testingSignatureMangle != nil {
b.assertInTest()
signEncryptedInfo.E = b.testingSignatureMangle(signEncryptedInfo.E)
}
return signEncryptedInfo, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"signEncrypt",
"(",
"msg",
"[",
"]",
"byte",
",",
"encryptionKey",
"libkb",
".",
"NaclSecretBoxKey",
",",
"signingKeyPair",
"libkb",
".",
"NaclSigningKeyPair",
",",
"prefix",
"kbcrypto",
".",
"SignaturePrefix",
")",
"(",
"chat1",
".",
"SignEncryptedData",
",",
"error",
")",
"{",
"if",
"signingKeyPair",
".",
"Private",
"==",
"nil",
"{",
"return",
"chat1",
".",
"SignEncryptedData",
"{",
"}",
",",
"libkb",
".",
"NoSecretKeyError",
"{",
"}",
"\n",
"}",
"\n\n",
"var",
"nonce",
"[",
"signencrypt",
".",
"NonceSize",
"]",
"byte",
"\n",
"if",
"_",
",",
"err",
":=",
"rand",
".",
"Read",
"(",
"nonce",
"[",
":",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"chat1",
".",
"SignEncryptedData",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"encKey",
"[",
"signencrypt",
".",
"SecretboxKeySize",
"]",
"byte",
"=",
"encryptionKey",
"\n",
"var",
"signKey",
"[",
"ed25519",
".",
"PrivateKeySize",
"]",
"byte",
"=",
"*",
"signingKeyPair",
".",
"Private",
"\n\n",
"signEncryptedBytes",
":=",
"signencrypt",
".",
"SealWhole",
"(",
"msg",
",",
"&",
"encKey",
",",
"&",
"signKey",
",",
"prefix",
",",
"&",
"nonce",
")",
"\n",
"signEncryptedInfo",
":=",
"chat1",
".",
"SignEncryptedData",
"{",
"V",
":",
"1",
",",
"E",
":",
"signEncryptedBytes",
",",
"N",
":",
"nonce",
"[",
":",
"]",
",",
"}",
"\n\n",
"if",
"b",
".",
"testingSignatureMangle",
"!=",
"nil",
"{",
"b",
".",
"assertInTest",
"(",
")",
"\n",
"signEncryptedInfo",
".",
"E",
"=",
"b",
".",
"testingSignatureMangle",
"(",
"signEncryptedInfo",
".",
"E",
")",
"\n",
"}",
"\n\n",
"return",
"signEncryptedInfo",
",",
"nil",
"\n",
"}"
] | // signEncrypt signencrypts msg. | [
"signEncrypt",
"signencrypts",
"msg",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1777-L1805 |
160,808 | keybase/client | go/chat/boxer.go | signEncryptOpen | func (b *Boxer) signEncryptOpen(data chat1.SignEncryptedData, encryptionKey libkb.NaclSecretBoxKey,
verifyKID []byte, prefix kbcrypto.SignaturePrefix) ([]byte, error) {
var encKey [signencrypt.SecretboxKeySize]byte = encryptionKey
verifyKey := kbcrypto.KIDToNaclSigningKeyPublic(verifyKID)
if verifyKey == nil {
return nil, kbcrypto.BadKeyError{}
}
var verKey [ed25519.PublicKeySize]byte = *verifyKey
var nonce [signencrypt.NonceSize]byte
if copy(nonce[:], data.N) != signencrypt.NonceSize {
return nil, libkb.DecryptBadNonceError{}
}
plain, err := signencrypt.OpenWhole(data.E, &encKey, &verKey, prefix, &nonce)
if err != nil {
return nil, err
}
return plain, nil
} | go | func (b *Boxer) signEncryptOpen(data chat1.SignEncryptedData, encryptionKey libkb.NaclSecretBoxKey,
verifyKID []byte, prefix kbcrypto.SignaturePrefix) ([]byte, error) {
var encKey [signencrypt.SecretboxKeySize]byte = encryptionKey
verifyKey := kbcrypto.KIDToNaclSigningKeyPublic(verifyKID)
if verifyKey == nil {
return nil, kbcrypto.BadKeyError{}
}
var verKey [ed25519.PublicKeySize]byte = *verifyKey
var nonce [signencrypt.NonceSize]byte
if copy(nonce[:], data.N) != signencrypt.NonceSize {
return nil, libkb.DecryptBadNonceError{}
}
plain, err := signencrypt.OpenWhole(data.E, &encKey, &verKey, prefix, &nonce)
if err != nil {
return nil, err
}
return plain, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"signEncryptOpen",
"(",
"data",
"chat1",
".",
"SignEncryptedData",
",",
"encryptionKey",
"libkb",
".",
"NaclSecretBoxKey",
",",
"verifyKID",
"[",
"]",
"byte",
",",
"prefix",
"kbcrypto",
".",
"SignaturePrefix",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"var",
"encKey",
"[",
"signencrypt",
".",
"SecretboxKeySize",
"]",
"byte",
"=",
"encryptionKey",
"\n\n",
"verifyKey",
":=",
"kbcrypto",
".",
"KIDToNaclSigningKeyPublic",
"(",
"verifyKID",
")",
"\n",
"if",
"verifyKey",
"==",
"nil",
"{",
"return",
"nil",
",",
"kbcrypto",
".",
"BadKeyError",
"{",
"}",
"\n",
"}",
"\n",
"var",
"verKey",
"[",
"ed25519",
".",
"PublicKeySize",
"]",
"byte",
"=",
"*",
"verifyKey",
"\n\n",
"var",
"nonce",
"[",
"signencrypt",
".",
"NonceSize",
"]",
"byte",
"\n",
"if",
"copy",
"(",
"nonce",
"[",
":",
"]",
",",
"data",
".",
"N",
")",
"!=",
"signencrypt",
".",
"NonceSize",
"{",
"return",
"nil",
",",
"libkb",
".",
"DecryptBadNonceError",
"{",
"}",
"\n",
"}",
"\n\n",
"plain",
",",
"err",
":=",
"signencrypt",
".",
"OpenWhole",
"(",
"data",
".",
"E",
",",
"&",
"encKey",
",",
"&",
"verKey",
",",
"prefix",
",",
"&",
"nonce",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"plain",
",",
"nil",
"\n",
"}"
] | // signEncryptOpen opens and verifies chat1.SignEncryptedData. | [
"signEncryptOpen",
"opens",
"and",
"verifies",
"chat1",
".",
"SignEncryptedData",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1808-L1828 |
160,809 | keybase/client | go/chat/boxer.go | verifyMessageV1 | func (b *Boxer) verifyMessageV1(ctx context.Context, header chat1.HeaderPlaintext, msg chat1.MessageBoxed, skipBodyVerification bool) (verifyMessageRes, types.UnboxingError) {
headerVersion, err := header.Version()
if err != nil {
return verifyMessageRes{}, NewPermanentUnboxingError(err)
}
switch headerVersion {
case chat1.HeaderPlaintextVersion_V1:
return b.verifyMessageHeaderV1(ctx, header.V1(), msg, skipBodyVerification)
// NOTE: When adding new versions here, you must also update
// chat1/extras.go so MessageUnboxedError.ParseableVersion understands the
// new max version
default:
return verifyMessageRes{},
NewPermanentUnboxingError(NewHeaderVersionError(headerVersion,
b.headerUnsupported(ctx, headerVersion, header)))
}
} | go | func (b *Boxer) verifyMessageV1(ctx context.Context, header chat1.HeaderPlaintext, msg chat1.MessageBoxed, skipBodyVerification bool) (verifyMessageRes, types.UnboxingError) {
headerVersion, err := header.Version()
if err != nil {
return verifyMessageRes{}, NewPermanentUnboxingError(err)
}
switch headerVersion {
case chat1.HeaderPlaintextVersion_V1:
return b.verifyMessageHeaderV1(ctx, header.V1(), msg, skipBodyVerification)
// NOTE: When adding new versions here, you must also update
// chat1/extras.go so MessageUnboxedError.ParseableVersion understands the
// new max version
default:
return verifyMessageRes{},
NewPermanentUnboxingError(NewHeaderVersionError(headerVersion,
b.headerUnsupported(ctx, headerVersion, header)))
}
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"verifyMessageV1",
"(",
"ctx",
"context",
".",
"Context",
",",
"header",
"chat1",
".",
"HeaderPlaintext",
",",
"msg",
"chat1",
".",
"MessageBoxed",
",",
"skipBodyVerification",
"bool",
")",
"(",
"verifyMessageRes",
",",
"types",
".",
"UnboxingError",
")",
"{",
"headerVersion",
",",
"err",
":=",
"header",
".",
"Version",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"switch",
"headerVersion",
"{",
"case",
"chat1",
".",
"HeaderPlaintextVersion_V1",
":",
"return",
"b",
".",
"verifyMessageHeaderV1",
"(",
"ctx",
",",
"header",
".",
"V1",
"(",
")",
",",
"msg",
",",
"skipBodyVerification",
")",
"\n",
"// NOTE: When adding new versions here, you must also update",
"// chat1/extras.go so MessageUnboxedError.ParseableVersion understands the",
"// new max version",
"default",
":",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"NewHeaderVersionError",
"(",
"headerVersion",
",",
"b",
".",
"headerUnsupported",
"(",
"ctx",
",",
"headerVersion",
",",
"header",
")",
")",
")",
"\n",
"}",
"\n",
"}"
] | // verifyMessage checks that a message is valid.
// Only works on MessageBoxedVersion_V1 | [
"verifyMessage",
"checks",
"that",
"a",
"message",
"is",
"valid",
".",
"Only",
"works",
"on",
"MessageBoxedVersion_V1"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1836-L1853 |
160,810 | keybase/client | go/chat/boxer.go | verifyMessageHeaderV1 | func (b *Boxer) verifyMessageHeaderV1(ctx context.Context, header chat1.HeaderPlaintextV1, msg chat1.MessageBoxed, skipBodyVerification bool) (verifyMessageRes, types.UnboxingError) {
if !skipBodyVerification {
// check body hash
bh := b.hashV1(msg.BodyCiphertext.E)
if !libkb.SecureByteArrayEq(bh[:], header.BodyHash) {
return verifyMessageRes{}, NewPermanentUnboxingError(BodyHashInvalid{})
}
}
// check key validity
// ValidSenderKey uses the server-given ctime, but emits senderDeviceRevokedAt as a workaround.
// See ValidSenderKey for details.
found, validAtCtime, revoked, ierr := b.ValidSenderKey(ctx, header.Sender, header.HeaderSignature.K, msg.ServerHeader.Ctime)
if ierr != nil {
return verifyMessageRes{}, ierr
}
if !found {
return verifyMessageRes{}, NewPermanentUnboxingError(libkb.NoKeyError{Msg: "sender key not found"})
}
if !validAtCtime {
return verifyMessageRes{}, NewPermanentUnboxingError(libkb.NoKeyError{Msg: "key invalid for sender at message ctime"})
}
// check signature
hcopy := header
hcopy.HeaderSignature = nil
hpack, err := b.marshal(hcopy)
if err != nil {
return verifyMessageRes{}, NewPermanentUnboxingError(err)
}
if !b.verify(hpack, *header.HeaderSignature, kbcrypto.SignaturePrefixChatMBv1) {
return verifyMessageRes{}, NewPermanentUnboxingError(libkb.BadSigError{E: "header signature invalid"})
}
return verifyMessageRes{
senderDeviceRevokedAt: revoked,
}, nil
} | go | func (b *Boxer) verifyMessageHeaderV1(ctx context.Context, header chat1.HeaderPlaintextV1, msg chat1.MessageBoxed, skipBodyVerification bool) (verifyMessageRes, types.UnboxingError) {
if !skipBodyVerification {
// check body hash
bh := b.hashV1(msg.BodyCiphertext.E)
if !libkb.SecureByteArrayEq(bh[:], header.BodyHash) {
return verifyMessageRes{}, NewPermanentUnboxingError(BodyHashInvalid{})
}
}
// check key validity
// ValidSenderKey uses the server-given ctime, but emits senderDeviceRevokedAt as a workaround.
// See ValidSenderKey for details.
found, validAtCtime, revoked, ierr := b.ValidSenderKey(ctx, header.Sender, header.HeaderSignature.K, msg.ServerHeader.Ctime)
if ierr != nil {
return verifyMessageRes{}, ierr
}
if !found {
return verifyMessageRes{}, NewPermanentUnboxingError(libkb.NoKeyError{Msg: "sender key not found"})
}
if !validAtCtime {
return verifyMessageRes{}, NewPermanentUnboxingError(libkb.NoKeyError{Msg: "key invalid for sender at message ctime"})
}
// check signature
hcopy := header
hcopy.HeaderSignature = nil
hpack, err := b.marshal(hcopy)
if err != nil {
return verifyMessageRes{}, NewPermanentUnboxingError(err)
}
if !b.verify(hpack, *header.HeaderSignature, kbcrypto.SignaturePrefixChatMBv1) {
return verifyMessageRes{}, NewPermanentUnboxingError(libkb.BadSigError{E: "header signature invalid"})
}
return verifyMessageRes{
senderDeviceRevokedAt: revoked,
}, nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"verifyMessageHeaderV1",
"(",
"ctx",
"context",
".",
"Context",
",",
"header",
"chat1",
".",
"HeaderPlaintextV1",
",",
"msg",
"chat1",
".",
"MessageBoxed",
",",
"skipBodyVerification",
"bool",
")",
"(",
"verifyMessageRes",
",",
"types",
".",
"UnboxingError",
")",
"{",
"if",
"!",
"skipBodyVerification",
"{",
"// check body hash",
"bh",
":=",
"b",
".",
"hashV1",
"(",
"msg",
".",
"BodyCiphertext",
".",
"E",
")",
"\n",
"if",
"!",
"libkb",
".",
"SecureByteArrayEq",
"(",
"bh",
"[",
":",
"]",
",",
"header",
".",
"BodyHash",
")",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"BodyHashInvalid",
"{",
"}",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// check key validity",
"// ValidSenderKey uses the server-given ctime, but emits senderDeviceRevokedAt as a workaround.",
"// See ValidSenderKey for details.",
"found",
",",
"validAtCtime",
",",
"revoked",
",",
"ierr",
":=",
"b",
".",
"ValidSenderKey",
"(",
"ctx",
",",
"header",
".",
"Sender",
",",
"header",
".",
"HeaderSignature",
".",
"K",
",",
"msg",
".",
"ServerHeader",
".",
"Ctime",
")",
"\n",
"if",
"ierr",
"!=",
"nil",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"ierr",
"\n",
"}",
"\n",
"if",
"!",
"found",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"libkb",
".",
"NoKeyError",
"{",
"Msg",
":",
"\"",
"\"",
"}",
")",
"\n",
"}",
"\n",
"if",
"!",
"validAtCtime",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"libkb",
".",
"NoKeyError",
"{",
"Msg",
":",
"\"",
"\"",
"}",
")",
"\n",
"}",
"\n\n",
"// check signature",
"hcopy",
":=",
"header",
"\n",
"hcopy",
".",
"HeaderSignature",
"=",
"nil",
"\n",
"hpack",
",",
"err",
":=",
"b",
".",
"marshal",
"(",
"hcopy",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"!",
"b",
".",
"verify",
"(",
"hpack",
",",
"*",
"header",
".",
"HeaderSignature",
",",
"kbcrypto",
".",
"SignaturePrefixChatMBv1",
")",
"{",
"return",
"verifyMessageRes",
"{",
"}",
",",
"NewPermanentUnboxingError",
"(",
"libkb",
".",
"BadSigError",
"{",
"E",
":",
"\"",
"\"",
"}",
")",
"\n",
"}",
"\n\n",
"return",
"verifyMessageRes",
"{",
"senderDeviceRevokedAt",
":",
"revoked",
",",
"}",
",",
"nil",
"\n",
"}"
] | // verifyMessageHeaderV1 checks the body hash, header signature, and signing key validity. | [
"verifyMessageHeaderV1",
"checks",
"the",
"body",
"hash",
"header",
"signature",
"and",
"signing",
"key",
"validity",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1856-L1893 |
160,811 | keybase/client | go/chat/boxer.go | verify | func (b *Boxer) verify(data []byte, si chat1.SignatureInfo, prefix kbcrypto.SignaturePrefix) bool {
sigInfo := kbcrypto.NaclSigInfo{
Version: si.V,
Prefix: prefix,
Kid: si.K,
Payload: data,
}
copy(sigInfo.Sig[:], si.S)
_, err := sigInfo.Verify()
return (err == nil)
} | go | func (b *Boxer) verify(data []byte, si chat1.SignatureInfo, prefix kbcrypto.SignaturePrefix) bool {
sigInfo := kbcrypto.NaclSigInfo{
Version: si.V,
Prefix: prefix,
Kid: si.K,
Payload: data,
}
copy(sigInfo.Sig[:], si.S)
_, err := sigInfo.Verify()
return (err == nil)
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"verify",
"(",
"data",
"[",
"]",
"byte",
",",
"si",
"chat1",
".",
"SignatureInfo",
",",
"prefix",
"kbcrypto",
".",
"SignaturePrefix",
")",
"bool",
"{",
"sigInfo",
":=",
"kbcrypto",
".",
"NaclSigInfo",
"{",
"Version",
":",
"si",
".",
"V",
",",
"Prefix",
":",
"prefix",
",",
"Kid",
":",
"si",
".",
"K",
",",
"Payload",
":",
"data",
",",
"}",
"\n",
"copy",
"(",
"sigInfo",
".",
"Sig",
"[",
":",
"]",
",",
"si",
".",
"S",
")",
"\n",
"_",
",",
"err",
":=",
"sigInfo",
".",
"Verify",
"(",
")",
"\n",
"return",
"(",
"err",
"==",
"nil",
")",
"\n",
"}"
] | // verify verifies the signature of data using SignatureInfo. | [
"verify",
"verifies",
"the",
"signature",
"of",
"data",
"using",
"SignatureInfo",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1896-L1906 |
160,812 | keybase/client | go/chat/boxer.go | compareHeadersMBV1 | func (b *Boxer) compareHeadersMBV1(ctx context.Context, hServer chat1.MessageClientHeader, hSigned chat1.MessageClientHeaderVerified) types.UnboxingError {
// Conv
if !hServer.Conv.Eq(hSigned.Conv) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Conv"))
}
// TlfName
if hServer.TlfName != hSigned.TlfName {
return NewPermanentUnboxingError(NewHeaderMismatchError("TlfName"))
}
// TlfPublic
if hServer.TlfPublic != hSigned.TlfPublic {
return NewPermanentUnboxingError(NewHeaderMismatchError("TlfPublic"))
}
// MessageType
if hServer.MessageType != hSigned.MessageType {
return NewPermanentUnboxingError(NewHeaderMismatchError("MessageType"))
}
// Note: Supersedes, Deletes, and some other fields are not checked because they are not
// part of MessageClientHeaderVerified.
// Prev
if len(hServer.Prev) != len(hSigned.Prev) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Prev"))
}
for i, a := range hServer.Prev {
b := hSigned.Prev[i]
if !a.Eq(b) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Prev"))
}
}
// Sender
// This prevents someone from re-using a header for another sender
if !hServer.Sender.Eq(hSigned.Sender) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Sender"))
}
// SenderDevice
if !bytes.Equal(hServer.SenderDevice.Bytes(), hSigned.SenderDevice.Bytes()) {
return NewPermanentUnboxingError(NewHeaderMismatchError("SenderDevice"))
}
// _Don't_ check that the MerkleRoot's match.
// The signed MerkleRoot should be nil as it was not part of the protocol
// when clients were writing MBV1. But we just allow anything here.
// There are V1 messages in the wild with hServer.MerkleRoot set but nothing signed.
// OutboxID, OutboxInfo: Left unchecked as I'm not sure whether these hold in V1 messages.
return nil
} | go | func (b *Boxer) compareHeadersMBV1(ctx context.Context, hServer chat1.MessageClientHeader, hSigned chat1.MessageClientHeaderVerified) types.UnboxingError {
// Conv
if !hServer.Conv.Eq(hSigned.Conv) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Conv"))
}
// TlfName
if hServer.TlfName != hSigned.TlfName {
return NewPermanentUnboxingError(NewHeaderMismatchError("TlfName"))
}
// TlfPublic
if hServer.TlfPublic != hSigned.TlfPublic {
return NewPermanentUnboxingError(NewHeaderMismatchError("TlfPublic"))
}
// MessageType
if hServer.MessageType != hSigned.MessageType {
return NewPermanentUnboxingError(NewHeaderMismatchError("MessageType"))
}
// Note: Supersedes, Deletes, and some other fields are not checked because they are not
// part of MessageClientHeaderVerified.
// Prev
if len(hServer.Prev) != len(hSigned.Prev) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Prev"))
}
for i, a := range hServer.Prev {
b := hSigned.Prev[i]
if !a.Eq(b) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Prev"))
}
}
// Sender
// This prevents someone from re-using a header for another sender
if !hServer.Sender.Eq(hSigned.Sender) {
return NewPermanentUnboxingError(NewHeaderMismatchError("Sender"))
}
// SenderDevice
if !bytes.Equal(hServer.SenderDevice.Bytes(), hSigned.SenderDevice.Bytes()) {
return NewPermanentUnboxingError(NewHeaderMismatchError("SenderDevice"))
}
// _Don't_ check that the MerkleRoot's match.
// The signed MerkleRoot should be nil as it was not part of the protocol
// when clients were writing MBV1. But we just allow anything here.
// There are V1 messages in the wild with hServer.MerkleRoot set but nothing signed.
// OutboxID, OutboxInfo: Left unchecked as I'm not sure whether these hold in V1 messages.
return nil
} | [
"func",
"(",
"b",
"*",
"Boxer",
")",
"compareHeadersMBV1",
"(",
"ctx",
"context",
".",
"Context",
",",
"hServer",
"chat1",
".",
"MessageClientHeader",
",",
"hSigned",
"chat1",
".",
"MessageClientHeaderVerified",
")",
"types",
".",
"UnboxingError",
"{",
"// Conv",
"if",
"!",
"hServer",
".",
"Conv",
".",
"Eq",
"(",
"hSigned",
".",
"Conv",
")",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"// TlfName",
"if",
"hServer",
".",
"TlfName",
"!=",
"hSigned",
".",
"TlfName",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"// TlfPublic",
"if",
"hServer",
".",
"TlfPublic",
"!=",
"hSigned",
".",
"TlfPublic",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"// MessageType",
"if",
"hServer",
".",
"MessageType",
"!=",
"hSigned",
".",
"MessageType",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"// Note: Supersedes, Deletes, and some other fields are not checked because they are not",
"// part of MessageClientHeaderVerified.",
"// Prev",
"if",
"len",
"(",
"hServer",
".",
"Prev",
")",
"!=",
"len",
"(",
"hSigned",
".",
"Prev",
")",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n",
"for",
"i",
",",
"a",
":=",
"range",
"hServer",
".",
"Prev",
"{",
"b",
":=",
"hSigned",
".",
"Prev",
"[",
"i",
"]",
"\n",
"if",
"!",
"a",
".",
"Eq",
"(",
"b",
")",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Sender",
"// This prevents someone from re-using a header for another sender",
"if",
"!",
"hServer",
".",
"Sender",
".",
"Eq",
"(",
"hSigned",
".",
"Sender",
")",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"// SenderDevice",
"if",
"!",
"bytes",
".",
"Equal",
"(",
"hServer",
".",
"SenderDevice",
".",
"Bytes",
"(",
")",
",",
"hSigned",
".",
"SenderDevice",
".",
"Bytes",
"(",
")",
")",
"{",
"return",
"NewPermanentUnboxingError",
"(",
"NewHeaderMismatchError",
"(",
"\"",
"\"",
")",
")",
"\n",
"}",
"\n\n",
"// _Don't_ check that the MerkleRoot's match.",
"// The signed MerkleRoot should be nil as it was not part of the protocol",
"// when clients were writing MBV1. But we just allow anything here.",
"// There are V1 messages in the wild with hServer.MerkleRoot set but nothing signed.",
"// OutboxID, OutboxInfo: Left unchecked as I'm not sure whether these hold in V1 messages.",
"return",
"nil",
"\n",
"}"
] | // See note on compareHeadersMBV2orV3. | [
"See",
"note",
"on",
"compareHeadersMBV2orV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/boxer.go#L1996-L2050 |
160,813 | keybase/client | go/libkb/saltpack_enc.go | SaltpackEncrypt | func SaltpackEncrypt(m MetaContext, arg *SaltpackEncryptArg) error {
var receiverBoxKeys []saltpack.BoxPublicKey
for _, k := range arg.Receivers {
// Since signcryption became the default, we never use visible
// recipients in encryption mode, except in tests.
if arg.VisibleRecipientsForTesting {
receiverBoxKeys = append(receiverBoxKeys, naclBoxPublicKey(k))
} else {
receiverBoxKeys = append(receiverBoxKeys, hiddenNaclBoxPublicKey(k))
}
}
var bsk saltpack.BoxSecretKey
if !arg.Sender.IsNil() {
bsk = naclBoxSecretKey(arg.Sender)
}
// If the version is unspecified, default to the current version.
saltpackVersion := arg.SaltpackVersion
if saltpackVersion == (saltpack.Version{}) {
saltpackVersion = saltpack.CurrentVersion()
}
var plainsink io.WriteCloser
var err error
if !arg.EncryptionOnlyMode {
if arg.SaltpackVersion.Major == 1 {
return errors.New("specifying saltpack version 1 requires repudiable authentication")
}
var signer saltpack.SigningSecretKey
if !arg.SenderSigning.IsNil() {
signer = saltSigner{arg.SenderSigning}
}
if arg.Binary {
plainsink, err = saltpack.NewSigncryptSealStream(arg.Sink, emptyKeyring{}, signer, receiverBoxKeys, arg.SymmetricReceivers)
} else {
plainsink, err = saltpack.NewSigncryptArmor62SealStream(arg.Sink, emptyKeyring{}, signer, receiverBoxKeys, arg.SymmetricReceivers, KeybaseSaltpackBrand)
}
} else {
if arg.Binary {
plainsink, err = saltpack.NewEncryptStream(saltpackVersion, arg.Sink, bsk, receiverBoxKeys)
} else {
plainsink, err = saltpack.NewEncryptArmor62Stream(saltpackVersion, arg.Sink, bsk, receiverBoxKeys, KeybaseSaltpackBrand)
}
}
if err != nil {
return err
}
n, err := io.Copy(plainsink, arg.Source)
if err != nil {
return err
}
m.Debug("Encrypt: wrote %d bytes", n)
if err := plainsink.Close(); err != nil {
return err
}
return arg.Sink.Close()
} | go | func SaltpackEncrypt(m MetaContext, arg *SaltpackEncryptArg) error {
var receiverBoxKeys []saltpack.BoxPublicKey
for _, k := range arg.Receivers {
// Since signcryption became the default, we never use visible
// recipients in encryption mode, except in tests.
if arg.VisibleRecipientsForTesting {
receiverBoxKeys = append(receiverBoxKeys, naclBoxPublicKey(k))
} else {
receiverBoxKeys = append(receiverBoxKeys, hiddenNaclBoxPublicKey(k))
}
}
var bsk saltpack.BoxSecretKey
if !arg.Sender.IsNil() {
bsk = naclBoxSecretKey(arg.Sender)
}
// If the version is unspecified, default to the current version.
saltpackVersion := arg.SaltpackVersion
if saltpackVersion == (saltpack.Version{}) {
saltpackVersion = saltpack.CurrentVersion()
}
var plainsink io.WriteCloser
var err error
if !arg.EncryptionOnlyMode {
if arg.SaltpackVersion.Major == 1 {
return errors.New("specifying saltpack version 1 requires repudiable authentication")
}
var signer saltpack.SigningSecretKey
if !arg.SenderSigning.IsNil() {
signer = saltSigner{arg.SenderSigning}
}
if arg.Binary {
plainsink, err = saltpack.NewSigncryptSealStream(arg.Sink, emptyKeyring{}, signer, receiverBoxKeys, arg.SymmetricReceivers)
} else {
plainsink, err = saltpack.NewSigncryptArmor62SealStream(arg.Sink, emptyKeyring{}, signer, receiverBoxKeys, arg.SymmetricReceivers, KeybaseSaltpackBrand)
}
} else {
if arg.Binary {
plainsink, err = saltpack.NewEncryptStream(saltpackVersion, arg.Sink, bsk, receiverBoxKeys)
} else {
plainsink, err = saltpack.NewEncryptArmor62Stream(saltpackVersion, arg.Sink, bsk, receiverBoxKeys, KeybaseSaltpackBrand)
}
}
if err != nil {
return err
}
n, err := io.Copy(plainsink, arg.Source)
if err != nil {
return err
}
m.Debug("Encrypt: wrote %d bytes", n)
if err := plainsink.Close(); err != nil {
return err
}
return arg.Sink.Close()
} | [
"func",
"SaltpackEncrypt",
"(",
"m",
"MetaContext",
",",
"arg",
"*",
"SaltpackEncryptArg",
")",
"error",
"{",
"var",
"receiverBoxKeys",
"[",
"]",
"saltpack",
".",
"BoxPublicKey",
"\n",
"for",
"_",
",",
"k",
":=",
"range",
"arg",
".",
"Receivers",
"{",
"// Since signcryption became the default, we never use visible",
"// recipients in encryption mode, except in tests.",
"if",
"arg",
".",
"VisibleRecipientsForTesting",
"{",
"receiverBoxKeys",
"=",
"append",
"(",
"receiverBoxKeys",
",",
"naclBoxPublicKey",
"(",
"k",
")",
")",
"\n",
"}",
"else",
"{",
"receiverBoxKeys",
"=",
"append",
"(",
"receiverBoxKeys",
",",
"hiddenNaclBoxPublicKey",
"(",
"k",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"var",
"bsk",
"saltpack",
".",
"BoxSecretKey",
"\n",
"if",
"!",
"arg",
".",
"Sender",
".",
"IsNil",
"(",
")",
"{",
"bsk",
"=",
"naclBoxSecretKey",
"(",
"arg",
".",
"Sender",
")",
"\n",
"}",
"\n\n",
"// If the version is unspecified, default to the current version.",
"saltpackVersion",
":=",
"arg",
".",
"SaltpackVersion",
"\n",
"if",
"saltpackVersion",
"==",
"(",
"saltpack",
".",
"Version",
"{",
"}",
")",
"{",
"saltpackVersion",
"=",
"saltpack",
".",
"CurrentVersion",
"(",
")",
"\n",
"}",
"\n\n",
"var",
"plainsink",
"io",
".",
"WriteCloser",
"\n",
"var",
"err",
"error",
"\n",
"if",
"!",
"arg",
".",
"EncryptionOnlyMode",
"{",
"if",
"arg",
".",
"SaltpackVersion",
".",
"Major",
"==",
"1",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"var",
"signer",
"saltpack",
".",
"SigningSecretKey",
"\n",
"if",
"!",
"arg",
".",
"SenderSigning",
".",
"IsNil",
"(",
")",
"{",
"signer",
"=",
"saltSigner",
"{",
"arg",
".",
"SenderSigning",
"}",
"\n",
"}",
"\n",
"if",
"arg",
".",
"Binary",
"{",
"plainsink",
",",
"err",
"=",
"saltpack",
".",
"NewSigncryptSealStream",
"(",
"arg",
".",
"Sink",
",",
"emptyKeyring",
"{",
"}",
",",
"signer",
",",
"receiverBoxKeys",
",",
"arg",
".",
"SymmetricReceivers",
")",
"\n",
"}",
"else",
"{",
"plainsink",
",",
"err",
"=",
"saltpack",
".",
"NewSigncryptArmor62SealStream",
"(",
"arg",
".",
"Sink",
",",
"emptyKeyring",
"{",
"}",
",",
"signer",
",",
"receiverBoxKeys",
",",
"arg",
".",
"SymmetricReceivers",
",",
"KeybaseSaltpackBrand",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"arg",
".",
"Binary",
"{",
"plainsink",
",",
"err",
"=",
"saltpack",
".",
"NewEncryptStream",
"(",
"saltpackVersion",
",",
"arg",
".",
"Sink",
",",
"bsk",
",",
"receiverBoxKeys",
")",
"\n",
"}",
"else",
"{",
"plainsink",
",",
"err",
"=",
"saltpack",
".",
"NewEncryptArmor62Stream",
"(",
"saltpackVersion",
",",
"arg",
".",
"Sink",
",",
"bsk",
",",
"receiverBoxKeys",
",",
"KeybaseSaltpackBrand",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"n",
",",
"err",
":=",
"io",
".",
"Copy",
"(",
"plainsink",
",",
"arg",
".",
"Source",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"m",
".",
"Debug",
"(",
"\"",
"\"",
",",
"n",
")",
"\n\n",
"if",
"err",
":=",
"plainsink",
".",
"Close",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"arg",
".",
"Sink",
".",
"Close",
"(",
")",
"\n",
"}"
] | // SaltpackEncrypt reads from the given source, encrypts it for the given
// receivers from the given sender, and writes it to sink. If
// Binary is false, the data written to sink will be armored. | [
"SaltpackEncrypt",
"reads",
"from",
"the",
"given",
"source",
"encrypts",
"it",
"for",
"the",
"given",
"receivers",
"from",
"the",
"given",
"sender",
"and",
"writes",
"it",
"to",
"sink",
".",
"If",
"Binary",
"is",
"false",
"the",
"data",
"written",
"to",
"sink",
"will",
"be",
"armored",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/saltpack_enc.go#L30-L90 |
160,814 | keybase/client | go/libkb/merkle_client.go | FetchRootFromServer | func (mc *MerkleClient) FetchRootFromServer(m MetaContext, freshness time.Duration) (mr *MerkleRoot, err error) {
defer m.VTrace(VLog0, "MerkleClient#FetchRootFromServer", func() error { return err })()
// on startup, many threads might try to mash this call at once (via the Auditor or
// other pathways). So protect this with a lock.
mc.freshLock.Lock()
defer mc.freshLock.Unlock()
root := mc.LastRoot()
now := m.G().Clock().Now()
if root != nil && freshness > 0 && now.Sub(root.fetched) < freshness {
m.VLogf(VLog0, "freshness=%d, and was current enough, so returning non-nil previously fetched root", freshness)
return root, nil
}
return mc.fetchRootFromServer(m, root)
} | go | func (mc *MerkleClient) FetchRootFromServer(m MetaContext, freshness time.Duration) (mr *MerkleRoot, err error) {
defer m.VTrace(VLog0, "MerkleClient#FetchRootFromServer", func() error { return err })()
// on startup, many threads might try to mash this call at once (via the Auditor or
// other pathways). So protect this with a lock.
mc.freshLock.Lock()
defer mc.freshLock.Unlock()
root := mc.LastRoot()
now := m.G().Clock().Now()
if root != nil && freshness > 0 && now.Sub(root.fetched) < freshness {
m.VLogf(VLog0, "freshness=%d, and was current enough, so returning non-nil previously fetched root", freshness)
return root, nil
}
return mc.fetchRootFromServer(m, root)
} | [
"func",
"(",
"mc",
"*",
"MerkleClient",
")",
"FetchRootFromServer",
"(",
"m",
"MetaContext",
",",
"freshness",
"time",
".",
"Duration",
")",
"(",
"mr",
"*",
"MerkleRoot",
",",
"err",
"error",
")",
"{",
"defer",
"m",
".",
"VTrace",
"(",
"VLog0",
",",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"// on startup, many threads might try to mash this call at once (via the Auditor or",
"// other pathways). So protect this with a lock.",
"mc",
".",
"freshLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"mc",
".",
"freshLock",
".",
"Unlock",
"(",
")",
"\n\n",
"root",
":=",
"mc",
".",
"LastRoot",
"(",
")",
"\n",
"now",
":=",
"m",
".",
"G",
"(",
")",
".",
"Clock",
"(",
")",
".",
"Now",
"(",
")",
"\n",
"if",
"root",
"!=",
"nil",
"&&",
"freshness",
">",
"0",
"&&",
"now",
".",
"Sub",
"(",
"root",
".",
"fetched",
")",
"<",
"freshness",
"{",
"m",
".",
"VLogf",
"(",
"VLog0",
",",
"\"",
"\"",
",",
"freshness",
")",
"\n",
"return",
"root",
",",
"nil",
"\n",
"}",
"\n",
"return",
"mc",
".",
"fetchRootFromServer",
"(",
"m",
",",
"root",
")",
"\n",
"}"
] | // FetchRootFromServer fetches a root from the server. If the last-fetched root was fetched within
// freshness ago, then OK to return the last-fetched root. Otherwise refetch. Similarly, if the freshness
// passed is 0, then always refresh. | [
"FetchRootFromServer",
"fetches",
"a",
"root",
"from",
"the",
"server",
".",
"If",
"the",
"last",
"-",
"fetched",
"root",
"was",
"fetched",
"within",
"freshness",
"ago",
"then",
"OK",
"to",
"return",
"the",
"last",
"-",
"fetched",
"root",
".",
"Otherwise",
"refetch",
".",
"Similarly",
"if",
"the",
"freshness",
"passed",
"is",
"0",
"then",
"always",
"refresh",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/merkle_client.go#L601-L616 |
160,815 | keybase/client | go/libkb/merkle_client.go | lookupPathAndSkipSequenceHelper | func (mc *MerkleClient) lookupPathAndSkipSequenceHelper(m MetaContext, q HTTPArgs, sigHints *SigHints, lastRoot *MerkleRoot, isUser bool) (apiRes *APIRes, err error) {
defer m.VTrace(VLog1, "MerkleClient#lookupPathAndSkipSequence", func() error { return err })()
// Poll for 10s and ask for a race-free state.
w := 10 * int(CITimeMultiplier(mc.G()))
q.Add("poll", I{w})
q.Add("c", B{true})
if isUser {
q.Add("load_deleted", B{true})
q.Add("load_reset_chain", B{true})
}
// Add the local db sigHints version
if sigHints != nil {
q.Add("sig_hints_low", I{sigHints.version})
}
// Get back a series of skips from the last merkle root we had to the new
// one we're getting back, and hold the server to it.
lastSeqno := lastRoot.Seqno()
if lastSeqno != nil {
q.Add("last", I{int(*lastSeqno)})
}
apiRes, err = m.G().API.Get(m, APIArg{
Endpoint: "merkle/path",
SessionType: APISessionTypeNONE,
Args: q,
AppStatusCodes: []int{SCOk, SCNotFound, SCDeleted},
RetryCount: 3,
InitialTimeout: 4 * time.Second,
RetryMultiplier: 1.1,
})
if err != nil {
return nil, err
}
switch apiRes.AppStatus.Code {
case SCNotFound:
err = NotFoundError{}
return nil, err
case SCDeleted:
err = UserDeletedError{}
return nil, err
}
return apiRes, err
} | go | func (mc *MerkleClient) lookupPathAndSkipSequenceHelper(m MetaContext, q HTTPArgs, sigHints *SigHints, lastRoot *MerkleRoot, isUser bool) (apiRes *APIRes, err error) {
defer m.VTrace(VLog1, "MerkleClient#lookupPathAndSkipSequence", func() error { return err })()
// Poll for 10s and ask for a race-free state.
w := 10 * int(CITimeMultiplier(mc.G()))
q.Add("poll", I{w})
q.Add("c", B{true})
if isUser {
q.Add("load_deleted", B{true})
q.Add("load_reset_chain", B{true})
}
// Add the local db sigHints version
if sigHints != nil {
q.Add("sig_hints_low", I{sigHints.version})
}
// Get back a series of skips from the last merkle root we had to the new
// one we're getting back, and hold the server to it.
lastSeqno := lastRoot.Seqno()
if lastSeqno != nil {
q.Add("last", I{int(*lastSeqno)})
}
apiRes, err = m.G().API.Get(m, APIArg{
Endpoint: "merkle/path",
SessionType: APISessionTypeNONE,
Args: q,
AppStatusCodes: []int{SCOk, SCNotFound, SCDeleted},
RetryCount: 3,
InitialTimeout: 4 * time.Second,
RetryMultiplier: 1.1,
})
if err != nil {
return nil, err
}
switch apiRes.AppStatus.Code {
case SCNotFound:
err = NotFoundError{}
return nil, err
case SCDeleted:
err = UserDeletedError{}
return nil, err
}
return apiRes, err
} | [
"func",
"(",
"mc",
"*",
"MerkleClient",
")",
"lookupPathAndSkipSequenceHelper",
"(",
"m",
"MetaContext",
",",
"q",
"HTTPArgs",
",",
"sigHints",
"*",
"SigHints",
",",
"lastRoot",
"*",
"MerkleRoot",
",",
"isUser",
"bool",
")",
"(",
"apiRes",
"*",
"APIRes",
",",
"err",
"error",
")",
"{",
"defer",
"m",
".",
"VTrace",
"(",
"VLog1",
",",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"// Poll for 10s and ask for a race-free state.",
"w",
":=",
"10",
"*",
"int",
"(",
"CITimeMultiplier",
"(",
"mc",
".",
"G",
"(",
")",
")",
")",
"\n\n",
"q",
".",
"Add",
"(",
"\"",
"\"",
",",
"I",
"{",
"w",
"}",
")",
"\n",
"q",
".",
"Add",
"(",
"\"",
"\"",
",",
"B",
"{",
"true",
"}",
")",
"\n",
"if",
"isUser",
"{",
"q",
".",
"Add",
"(",
"\"",
"\"",
",",
"B",
"{",
"true",
"}",
")",
"\n",
"q",
".",
"Add",
"(",
"\"",
"\"",
",",
"B",
"{",
"true",
"}",
")",
"\n",
"}",
"\n\n",
"// Add the local db sigHints version",
"if",
"sigHints",
"!=",
"nil",
"{",
"q",
".",
"Add",
"(",
"\"",
"\"",
",",
"I",
"{",
"sigHints",
".",
"version",
"}",
")",
"\n",
"}",
"\n\n",
"// Get back a series of skips from the last merkle root we had to the new",
"// one we're getting back, and hold the server to it.",
"lastSeqno",
":=",
"lastRoot",
".",
"Seqno",
"(",
")",
"\n",
"if",
"lastSeqno",
"!=",
"nil",
"{",
"q",
".",
"Add",
"(",
"\"",
"\"",
",",
"I",
"{",
"int",
"(",
"*",
"lastSeqno",
")",
"}",
")",
"\n",
"}",
"\n\n",
"apiRes",
",",
"err",
"=",
"m",
".",
"G",
"(",
")",
".",
"API",
".",
"Get",
"(",
"m",
",",
"APIArg",
"{",
"Endpoint",
":",
"\"",
"\"",
",",
"SessionType",
":",
"APISessionTypeNONE",
",",
"Args",
":",
"q",
",",
"AppStatusCodes",
":",
"[",
"]",
"int",
"{",
"SCOk",
",",
"SCNotFound",
",",
"SCDeleted",
"}",
",",
"RetryCount",
":",
"3",
",",
"InitialTimeout",
":",
"4",
"*",
"time",
".",
"Second",
",",
"RetryMultiplier",
":",
"1.1",
",",
"}",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"switch",
"apiRes",
".",
"AppStatus",
".",
"Code",
"{",
"case",
"SCNotFound",
":",
"err",
"=",
"NotFoundError",
"{",
"}",
"\n",
"return",
"nil",
",",
"err",
"\n",
"case",
"SCDeleted",
":",
"err",
"=",
"UserDeletedError",
"{",
"}",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"apiRes",
",",
"err",
"\n",
"}"
] | // `isUser` is true for loading a user and false for loading a team. | [
"isUser",
"is",
"true",
"for",
"loading",
"a",
"user",
"and",
"false",
"for",
"loading",
"a",
"team",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/merkle_client.go#L715-L763 |
160,816 | keybase/client | go/libkb/merkle_client.go | readSkipSequenceFromAPIRes | func (mc *MerkleClient) readSkipSequenceFromAPIRes(m MetaContext, res *APIRes, thisRoot *MerkleRoot, lastRoot *MerkleRoot) (ret SkipSequence, err error) {
defer m.VTrace(VLog1, "MerkleClient#readSkipSequenceFromAPIRes", func() error { return err })()
if lastRoot == nil {
m.VLogf(VLog0, "| lastRoot==nil")
return nil, nil
}
if !thisRoot.HasSkips() {
m.VLogf(VLog0, "| thisRoot has no skips")
return nil, nil
}
skips := res.Body.AtKey("skips")
if skips.IsNil() {
m.VLogf(VLog1, "| skip list from API server is nil")
return nil, nil
}
var v []string
if err = skips.UnmarshalAgain(&v); err != nil {
m.VLogf(VLog0, "| failed to unmarshal skip list as a list of strings")
return nil, err
}
ret, err = readSkipSequenceFromStringList(v)
if err != nil {
return nil, err
}
// Create the skip sequence by bookending the list the server replies with
// with: (1) the most recent root, sent back in this reply; and (2) our last
// root, which we read out of cache (in memory or on disk). HOWEVER, in the
// case of lookup up historical roots, the ordering might be reversed. So
// we swap in that case.
left, right := thisRoot.payload, lastRoot.payload
if left.seqno() < right.seqno() {
left, right = right, left
}
ret = append(SkipSequence{left}, ret...)
ret = append(ret, right)
return ret, nil
} | go | func (mc *MerkleClient) readSkipSequenceFromAPIRes(m MetaContext, res *APIRes, thisRoot *MerkleRoot, lastRoot *MerkleRoot) (ret SkipSequence, err error) {
defer m.VTrace(VLog1, "MerkleClient#readSkipSequenceFromAPIRes", func() error { return err })()
if lastRoot == nil {
m.VLogf(VLog0, "| lastRoot==nil")
return nil, nil
}
if !thisRoot.HasSkips() {
m.VLogf(VLog0, "| thisRoot has no skips")
return nil, nil
}
skips := res.Body.AtKey("skips")
if skips.IsNil() {
m.VLogf(VLog1, "| skip list from API server is nil")
return nil, nil
}
var v []string
if err = skips.UnmarshalAgain(&v); err != nil {
m.VLogf(VLog0, "| failed to unmarshal skip list as a list of strings")
return nil, err
}
ret, err = readSkipSequenceFromStringList(v)
if err != nil {
return nil, err
}
// Create the skip sequence by bookending the list the server replies with
// with: (1) the most recent root, sent back in this reply; and (2) our last
// root, which we read out of cache (in memory or on disk). HOWEVER, in the
// case of lookup up historical roots, the ordering might be reversed. So
// we swap in that case.
left, right := thisRoot.payload, lastRoot.payload
if left.seqno() < right.seqno() {
left, right = right, left
}
ret = append(SkipSequence{left}, ret...)
ret = append(ret, right)
return ret, nil
} | [
"func",
"(",
"mc",
"*",
"MerkleClient",
")",
"readSkipSequenceFromAPIRes",
"(",
"m",
"MetaContext",
",",
"res",
"*",
"APIRes",
",",
"thisRoot",
"*",
"MerkleRoot",
",",
"lastRoot",
"*",
"MerkleRoot",
")",
"(",
"ret",
"SkipSequence",
",",
"err",
"error",
")",
"{",
"defer",
"m",
".",
"VTrace",
"(",
"VLog1",
",",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n",
"if",
"lastRoot",
"==",
"nil",
"{",
"m",
".",
"VLogf",
"(",
"VLog0",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"if",
"!",
"thisRoot",
".",
"HasSkips",
"(",
")",
"{",
"m",
".",
"VLogf",
"(",
"VLog0",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"skips",
":=",
"res",
".",
"Body",
".",
"AtKey",
"(",
"\"",
"\"",
")",
"\n\n",
"if",
"skips",
".",
"IsNil",
"(",
")",
"{",
"m",
".",
"VLogf",
"(",
"VLog1",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"var",
"v",
"[",
"]",
"string",
"\n",
"if",
"err",
"=",
"skips",
".",
"UnmarshalAgain",
"(",
"&",
"v",
")",
";",
"err",
"!=",
"nil",
"{",
"m",
".",
"VLogf",
"(",
"VLog0",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"ret",
",",
"err",
"=",
"readSkipSequenceFromStringList",
"(",
"v",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// Create the skip sequence by bookending the list the server replies with",
"// with: (1) the most recent root, sent back in this reply; and (2) our last",
"// root, which we read out of cache (in memory or on disk). HOWEVER, in the",
"// case of lookup up historical roots, the ordering might be reversed. So",
"// we swap in that case.",
"left",
",",
"right",
":=",
"thisRoot",
".",
"payload",
",",
"lastRoot",
".",
"payload",
"\n",
"if",
"left",
".",
"seqno",
"(",
")",
"<",
"right",
".",
"seqno",
"(",
")",
"{",
"left",
",",
"right",
"=",
"right",
",",
"left",
"\n",
"}",
"\n\n",
"ret",
"=",
"append",
"(",
"SkipSequence",
"{",
"left",
"}",
",",
"ret",
"...",
")",
"\n",
"ret",
"=",
"append",
"(",
"ret",
",",
"right",
")",
"\n\n",
"return",
"ret",
",",
"nil",
"\n",
"}"
] | // readSkipSequenceFromAPIRes returns a SkipSequence. We construct the sequence by starting with the
// most recent merkle root, adding the "skip" pointers returned by the server, and finally bookending
// with the merkle root we last fetched from the DB. In verifySkipSequence, we walk over this Sequence
// to make sure that it obeys proper construction. | [
"readSkipSequenceFromAPIRes",
"returns",
"a",
"SkipSequence",
".",
"We",
"construct",
"the",
"sequence",
"by",
"starting",
"with",
"the",
"most",
"recent",
"merkle",
"root",
"adding",
"the",
"skip",
"pointers",
"returned",
"by",
"the",
"server",
"and",
"finally",
"bookending",
"with",
"the",
"merkle",
"root",
"we",
"last",
"fetched",
"from",
"the",
"DB",
".",
"In",
"verifySkipSequence",
"we",
"walk",
"over",
"this",
"Sequence",
"to",
"make",
"sure",
"that",
"it",
"obeys",
"proper",
"construction",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/merkle_client.go#L789-L832 |
160,817 | keybase/client | go/libkb/merkle_client.go | storeRoot | func (mc *MerkleClient) storeRoot(m MetaContext, root *MerkleRoot) {
m.VLogf(VLog0, "storing merkle root: %d", *root.Seqno())
err := mc.G().LocalDb.Put(merkleHeadKey(), nil, root.ToJSON())
if err != nil {
m.Error("Cannot commit Merkle root to local DB: %s", err)
} else {
mc.lastRoot = root
}
} | go | func (mc *MerkleClient) storeRoot(m MetaContext, root *MerkleRoot) {
m.VLogf(VLog0, "storing merkle root: %d", *root.Seqno())
err := mc.G().LocalDb.Put(merkleHeadKey(), nil, root.ToJSON())
if err != nil {
m.Error("Cannot commit Merkle root to local DB: %s", err)
} else {
mc.lastRoot = root
}
} | [
"func",
"(",
"mc",
"*",
"MerkleClient",
")",
"storeRoot",
"(",
"m",
"MetaContext",
",",
"root",
"*",
"MerkleRoot",
")",
"{",
"m",
".",
"VLogf",
"(",
"VLog0",
",",
"\"",
"\"",
",",
"*",
"root",
".",
"Seqno",
"(",
")",
")",
"\n",
"err",
":=",
"mc",
".",
"G",
"(",
")",
".",
"LocalDb",
".",
"Put",
"(",
"merkleHeadKey",
"(",
")",
",",
"nil",
",",
"root",
".",
"ToJSON",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"m",
".",
"Error",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"else",
"{",
"mc",
".",
"lastRoot",
"=",
"root",
"\n",
"}",
"\n",
"}"
] | // storeRoot stores the root in the db and mem.
// Must be called from under a lock. | [
"storeRoot",
"stores",
"the",
"root",
"in",
"the",
"db",
"and",
"mem",
".",
"Must",
"be",
"called",
"from",
"under",
"a",
"lock",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/merkle_client.go#L936-L944 |
160,818 | keybase/client | go/service/chat_local.go | newChatLocalHandler | func newChatLocalHandler(xp rpc.Transporter, g *globals.Context, gh *gregorHandler) *chatLocalHandler {
h := &chatLocalHandler{
BaseHandler: NewBaseHandler(g.ExternalG(), xp),
}
h.Server = chat.NewServer(g, gh, h)
return h
} | go | func newChatLocalHandler(xp rpc.Transporter, g *globals.Context, gh *gregorHandler) *chatLocalHandler {
h := &chatLocalHandler{
BaseHandler: NewBaseHandler(g.ExternalG(), xp),
}
h.Server = chat.NewServer(g, gh, h)
return h
} | [
"func",
"newChatLocalHandler",
"(",
"xp",
"rpc",
".",
"Transporter",
",",
"g",
"*",
"globals",
".",
"Context",
",",
"gh",
"*",
"gregorHandler",
")",
"*",
"chatLocalHandler",
"{",
"h",
":=",
"&",
"chatLocalHandler",
"{",
"BaseHandler",
":",
"NewBaseHandler",
"(",
"g",
".",
"ExternalG",
"(",
")",
",",
"xp",
")",
",",
"}",
"\n",
"h",
".",
"Server",
"=",
"chat",
".",
"NewServer",
"(",
"g",
",",
"gh",
",",
"h",
")",
"\n",
"return",
"h",
"\n",
"}"
] | // newChatLocalHandler creates a chatLocalHandler. | [
"newChatLocalHandler",
"creates",
"a",
"chatLocalHandler",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/chat_local.go#L21-L27 |
160,819 | keybase/client | go/kbfs/libfuse/status_file.go | NewNonTLFStatusFile | func NewNonTLFStatusFile(fs *FS, entryValid *time.Duration) *SpecialReadFile {
*entryValid = 0
return &SpecialReadFile{
read: func(ctx context.Context) ([]byte, time.Time, error) {
return libfs.GetEncodedStatus(ctx, fs.config)
},
}
} | go | func NewNonTLFStatusFile(fs *FS, entryValid *time.Duration) *SpecialReadFile {
*entryValid = 0
return &SpecialReadFile{
read: func(ctx context.Context) ([]byte, time.Time, error) {
return libfs.GetEncodedStatus(ctx, fs.config)
},
}
} | [
"func",
"NewNonTLFStatusFile",
"(",
"fs",
"*",
"FS",
",",
"entryValid",
"*",
"time",
".",
"Duration",
")",
"*",
"SpecialReadFile",
"{",
"*",
"entryValid",
"=",
"0",
"\n",
"return",
"&",
"SpecialReadFile",
"{",
"read",
":",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"byte",
",",
"time",
".",
"Time",
",",
"error",
")",
"{",
"return",
"libfs",
".",
"GetEncodedStatus",
"(",
"ctx",
",",
"fs",
".",
"config",
")",
"\n",
"}",
",",
"}",
"\n",
"}"
] | // NewNonTLFStatusFile returns a special read file that contains a
// text representation of the global KBFS status. | [
"NewNonTLFStatusFile",
"returns",
"a",
"special",
"read",
"file",
"that",
"contains",
"a",
"text",
"representation",
"of",
"the",
"global",
"KBFS",
"status",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/status_file.go#L19-L26 |
160,820 | keybase/client | go/libkb/social_assertion.go | IsSocialAssertion | func IsSocialAssertion(ctx AssertionContext, s string) bool {
_, ok := NormalizeSocialAssertion(ctx, s)
return ok
} | go | func IsSocialAssertion(ctx AssertionContext, s string) bool {
_, ok := NormalizeSocialAssertion(ctx, s)
return ok
} | [
"func",
"IsSocialAssertion",
"(",
"ctx",
"AssertionContext",
",",
"s",
"string",
")",
"bool",
"{",
"_",
",",
"ok",
":=",
"NormalizeSocialAssertion",
"(",
"ctx",
",",
"s",
")",
"\n",
"return",
"ok",
"\n",
"}"
] | // IsSocialAssertion returns true for strings that are valid
// social assertions. They do not need to be normalized, so
// user@twitter and twitter:user will work, as will
// USER@Twitter. | [
"IsSocialAssertion",
"returns",
"true",
"for",
"strings",
"that",
"are",
"valid",
"social",
"assertions",
".",
"They",
"do",
"not",
"need",
"to",
"be",
"normalized",
"so",
"user"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/social_assertion.go#L14-L17 |
160,821 | keybase/client | go/ephemeral/team_ek.go | teamEKRetryWrapper | func teamEKRetryWrapper(mctx libkb.MetaContext, retryFn func() error) (err error) {
knownRaceConditions := []keybase1.StatusCode{
keybase1.StatusCode_SCSigWrongKey,
keybase1.StatusCode_SCSigOldSeqno,
keybase1.StatusCode_SCEphemeralKeyBadGeneration,
keybase1.StatusCode_SCEphemeralKeyUnexpectedBox,
keybase1.StatusCode_SCEphemeralKeyMissingBox,
keybase1.StatusCode_SCEphemeralKeyWrongNumberOfKeys,
}
for tries := 0; tries < maxRetries; tries++ {
if err = retryFn(); err == nil {
return nil
}
retryableError := false
for _, code := range knownRaceConditions {
if libkb.IsAppStatusCode(err, code) {
mctx.Debug("teamEKRetryWrapper found a retryable error on try %d: %s", tries, err)
retryableError = true
break
}
}
if !retryableError {
return err
}
}
return nil
} | go | func teamEKRetryWrapper(mctx libkb.MetaContext, retryFn func() error) (err error) {
knownRaceConditions := []keybase1.StatusCode{
keybase1.StatusCode_SCSigWrongKey,
keybase1.StatusCode_SCSigOldSeqno,
keybase1.StatusCode_SCEphemeralKeyBadGeneration,
keybase1.StatusCode_SCEphemeralKeyUnexpectedBox,
keybase1.StatusCode_SCEphemeralKeyMissingBox,
keybase1.StatusCode_SCEphemeralKeyWrongNumberOfKeys,
}
for tries := 0; tries < maxRetries; tries++ {
if err = retryFn(); err == nil {
return nil
}
retryableError := false
for _, code := range knownRaceConditions {
if libkb.IsAppStatusCode(err, code) {
mctx.Debug("teamEKRetryWrapper found a retryable error on try %d: %s", tries, err)
retryableError = true
break
}
}
if !retryableError {
return err
}
}
return nil
} | [
"func",
"teamEKRetryWrapper",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"retryFn",
"func",
"(",
")",
"error",
")",
"(",
"err",
"error",
")",
"{",
"knownRaceConditions",
":=",
"[",
"]",
"keybase1",
".",
"StatusCode",
"{",
"keybase1",
".",
"StatusCode_SCSigWrongKey",
",",
"keybase1",
".",
"StatusCode_SCSigOldSeqno",
",",
"keybase1",
".",
"StatusCode_SCEphemeralKeyBadGeneration",
",",
"keybase1",
".",
"StatusCode_SCEphemeralKeyUnexpectedBox",
",",
"keybase1",
".",
"StatusCode_SCEphemeralKeyMissingBox",
",",
"keybase1",
".",
"StatusCode_SCEphemeralKeyWrongNumberOfKeys",
",",
"}",
"\n",
"for",
"tries",
":=",
"0",
";",
"tries",
"<",
"maxRetries",
";",
"tries",
"++",
"{",
"if",
"err",
"=",
"retryFn",
"(",
")",
";",
"err",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"retryableError",
":=",
"false",
"\n",
"for",
"_",
",",
"code",
":=",
"range",
"knownRaceConditions",
"{",
"if",
"libkb",
".",
"IsAppStatusCode",
"(",
"err",
",",
"code",
")",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"tries",
",",
"err",
")",
"\n",
"retryableError",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"retryableError",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // There are plenty of race conditions where the PTK or teamEK or
// membership list can change out from under us while we're in the middle
// of posting a new key, causing the post to fail. Detect these conditions
// and retry. | [
"There",
"are",
"plenty",
"of",
"race",
"conditions",
"where",
"the",
"PTK",
"or",
"teamEK",
"or",
"membership",
"list",
"can",
"change",
"out",
"from",
"under",
"us",
"while",
"we",
"re",
"in",
"the",
"middle",
"of",
"posting",
"a",
"new",
"key",
"causing",
"the",
"post",
"to",
"fail",
".",
"Detect",
"these",
"conditions",
"and",
"retry",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/team_ek.go#L168-L194 |
160,822 | keybase/client | go/ephemeral/team_ek.go | fetchTeamEKStatement | func fetchTeamEKStatement(mctx libkb.MetaContext, teamID keybase1.TeamID) (
statement *keybase1.TeamEkStatement, latestGeneration keybase1.EkGeneration, wrongKID bool, err error) {
defer mctx.TraceTimed("fetchTeamEKStatement", func() error { return err })()
apiArg := libkb.APIArg{
Endpoint: "team/team_ek",
SessionType: libkb.APISessionTypeREQUIRED,
Args: libkb.HTTPArgs{
"team_id": libkb.S{Val: string(teamID)},
},
}
res, err := mctx.G().GetAPI().Get(mctx, apiArg)
if err != nil {
return nil, latestGeneration, false, err
}
parsedResponse := teamEKStatementResponse{}
err = res.Body.UnmarshalAgain(&parsedResponse)
if err != nil {
return nil, latestGeneration, false, err
}
// If the result field in the response is null, the server is saying that
// the team has never published a teamEKStatement, stale or otherwise.
if parsedResponse.Sig == nil {
mctx.Debug("team has no teamEKStatement at all")
return nil, latestGeneration, false, nil
}
statement, latestGeneration, wrongKID, err = verifySigWithLatestPTK(mctx, teamID, *parsedResponse.Sig)
// Check the wrongKID condition before checking the error, since an error
// is still returned in this case. TODO: Turn this warning into an error
// after EK support is sufficiently widespread.
if wrongKID {
mctx.Debug("It looks like someone rolled the PTK without generating new ephemeral keys. They might be on an old version.")
return nil, latestGeneration, true, nil
} else if err != nil {
return nil, latestGeneration, false, err
}
return statement, latestGeneration, false, nil
} | go | func fetchTeamEKStatement(mctx libkb.MetaContext, teamID keybase1.TeamID) (
statement *keybase1.TeamEkStatement, latestGeneration keybase1.EkGeneration, wrongKID bool, err error) {
defer mctx.TraceTimed("fetchTeamEKStatement", func() error { return err })()
apiArg := libkb.APIArg{
Endpoint: "team/team_ek",
SessionType: libkb.APISessionTypeREQUIRED,
Args: libkb.HTTPArgs{
"team_id": libkb.S{Val: string(teamID)},
},
}
res, err := mctx.G().GetAPI().Get(mctx, apiArg)
if err != nil {
return nil, latestGeneration, false, err
}
parsedResponse := teamEKStatementResponse{}
err = res.Body.UnmarshalAgain(&parsedResponse)
if err != nil {
return nil, latestGeneration, false, err
}
// If the result field in the response is null, the server is saying that
// the team has never published a teamEKStatement, stale or otherwise.
if parsedResponse.Sig == nil {
mctx.Debug("team has no teamEKStatement at all")
return nil, latestGeneration, false, nil
}
statement, latestGeneration, wrongKID, err = verifySigWithLatestPTK(mctx, teamID, *parsedResponse.Sig)
// Check the wrongKID condition before checking the error, since an error
// is still returned in this case. TODO: Turn this warning into an error
// after EK support is sufficiently widespread.
if wrongKID {
mctx.Debug("It looks like someone rolled the PTK without generating new ephemeral keys. They might be on an old version.")
return nil, latestGeneration, true, nil
} else if err != nil {
return nil, latestGeneration, false, err
}
return statement, latestGeneration, false, nil
} | [
"func",
"fetchTeamEKStatement",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"(",
"statement",
"*",
"keybase1",
".",
"TeamEkStatement",
",",
"latestGeneration",
"keybase1",
".",
"EkGeneration",
",",
"wrongKID",
"bool",
",",
"err",
"error",
")",
"{",
"defer",
"mctx",
".",
"TraceTimed",
"(",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"apiArg",
":=",
"libkb",
".",
"APIArg",
"{",
"Endpoint",
":",
"\"",
"\"",
",",
"SessionType",
":",
"libkb",
".",
"APISessionTypeREQUIRED",
",",
"Args",
":",
"libkb",
".",
"HTTPArgs",
"{",
"\"",
"\"",
":",
"libkb",
".",
"S",
"{",
"Val",
":",
"string",
"(",
"teamID",
")",
"}",
",",
"}",
",",
"}",
"\n",
"res",
",",
"err",
":=",
"mctx",
".",
"G",
"(",
")",
".",
"GetAPI",
"(",
")",
".",
"Get",
"(",
"mctx",
",",
"apiArg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"latestGeneration",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"parsedResponse",
":=",
"teamEKStatementResponse",
"{",
"}",
"\n",
"err",
"=",
"res",
".",
"Body",
".",
"UnmarshalAgain",
"(",
"&",
"parsedResponse",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"latestGeneration",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"// If the result field in the response is null, the server is saying that",
"// the team has never published a teamEKStatement, stale or otherwise.",
"if",
"parsedResponse",
".",
"Sig",
"==",
"nil",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"latestGeneration",
",",
"false",
",",
"nil",
"\n",
"}",
"\n\n",
"statement",
",",
"latestGeneration",
",",
"wrongKID",
",",
"err",
"=",
"verifySigWithLatestPTK",
"(",
"mctx",
",",
"teamID",
",",
"*",
"parsedResponse",
".",
"Sig",
")",
"\n",
"// Check the wrongKID condition before checking the error, since an error",
"// is still returned in this case. TODO: Turn this warning into an error",
"// after EK support is sufficiently widespread.",
"if",
"wrongKID",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"latestGeneration",
",",
"true",
",",
"nil",
"\n",
"}",
"else",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"latestGeneration",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"statement",
",",
"latestGeneration",
",",
"false",
",",
"nil",
"\n",
"}"
] | // Returns nil if the team has never published a teamEK. If the team has
// published a teamEK, but has since rolled their PTK without publishing a new
// one, this function will also return nil and log a warning. This is a
// transitional thing, and eventually when all "reasonably up to date" clients
// in the wild have EK support, we will make that case an error. | [
"Returns",
"nil",
"if",
"the",
"team",
"has",
"never",
"published",
"a",
"teamEK",
".",
"If",
"the",
"team",
"has",
"published",
"a",
"teamEK",
"but",
"has",
"since",
"rolled",
"their",
"PTK",
"without",
"publishing",
"a",
"new",
"one",
"this",
"function",
"will",
"also",
"return",
"nil",
"and",
"log",
"a",
"warning",
".",
"This",
"is",
"a",
"transitional",
"thing",
"and",
"eventually",
"when",
"all",
"reasonably",
"up",
"to",
"date",
"clients",
"in",
"the",
"wild",
"have",
"EK",
"support",
"we",
"will",
"make",
"that",
"case",
"an",
"error",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/team_ek.go#L249-L290 |
160,823 | keybase/client | go/ephemeral/team_ek.go | fetchTeamMemberStatements | func fetchTeamMemberStatements(mctx libkb.MetaContext,
teamID keybase1.TeamID) (statementMap map[keybase1.UID]*keybase1.UserEkStatement, err error) {
defer mctx.TraceTimed("fetchTeamMemberStatements", func() error { return err })()
apiArg := libkb.APIArg{
Endpoint: "team/member_eks",
SessionType: libkb.APISessionTypeREQUIRED,
Args: libkb.HTTPArgs{
"team_id": libkb.S{Val: string(teamID)},
},
}
res, err := mctx.G().GetAPI().Get(mctx, apiArg)
if err != nil {
return nil, err
}
parsedResponse := teamMemberEKStatementResponse{}
err = res.Body.UnmarshalAgain(&parsedResponse)
if err != nil {
return nil, err
}
team, err := teams.Load(mctx.Ctx(), mctx.G(), keybase1.LoadTeamArg{
ID: teamID,
ForceRepoll: true,
})
if err != nil {
return nil, err
}
statementMap = make(map[keybase1.UID]*keybase1.UserEkStatement)
for uid, sig := range parsedResponse.Sigs {
// Verify the server only returns actual members of our team.
upak, _, err := mctx.G().GetUPAKLoader().LoadV2(
libkb.NewLoadUserArgWithMetaContext(mctx).WithUID(uid))
if err != nil {
return nil, err
}
uv := upak.Current.ToUserVersion()
isMember := team.IsMember(mctx.Ctx(), uv)
if !isMember {
return nil, fmt.Errorf("Server lied about team membership! %v is not a member of team %v", uv, teamID)
}
memberStatement, _, wrongKID, err := verifySigWithLatestPUK(mctx, uid, sig)
// Check the wrongKID condition before checking the error, since an error
// is still returned in this case. TODO: Turn this warning into an error
// after EK support is sufficiently widespread.
if wrongKID {
mctx.Debug("Member %v revoked a device without generating new ephemeral keys. They might be running an old version?", uid)
// Don't box for this member since they have no valid userEK
continue
} else if err != nil {
return nil, err
}
statementMap[uid] = memberStatement
}
return statementMap, nil
} | go | func fetchTeamMemberStatements(mctx libkb.MetaContext,
teamID keybase1.TeamID) (statementMap map[keybase1.UID]*keybase1.UserEkStatement, err error) {
defer mctx.TraceTimed("fetchTeamMemberStatements", func() error { return err })()
apiArg := libkb.APIArg{
Endpoint: "team/member_eks",
SessionType: libkb.APISessionTypeREQUIRED,
Args: libkb.HTTPArgs{
"team_id": libkb.S{Val: string(teamID)},
},
}
res, err := mctx.G().GetAPI().Get(mctx, apiArg)
if err != nil {
return nil, err
}
parsedResponse := teamMemberEKStatementResponse{}
err = res.Body.UnmarshalAgain(&parsedResponse)
if err != nil {
return nil, err
}
team, err := teams.Load(mctx.Ctx(), mctx.G(), keybase1.LoadTeamArg{
ID: teamID,
ForceRepoll: true,
})
if err != nil {
return nil, err
}
statementMap = make(map[keybase1.UID]*keybase1.UserEkStatement)
for uid, sig := range parsedResponse.Sigs {
// Verify the server only returns actual members of our team.
upak, _, err := mctx.G().GetUPAKLoader().LoadV2(
libkb.NewLoadUserArgWithMetaContext(mctx).WithUID(uid))
if err != nil {
return nil, err
}
uv := upak.Current.ToUserVersion()
isMember := team.IsMember(mctx.Ctx(), uv)
if !isMember {
return nil, fmt.Errorf("Server lied about team membership! %v is not a member of team %v", uv, teamID)
}
memberStatement, _, wrongKID, err := verifySigWithLatestPUK(mctx, uid, sig)
// Check the wrongKID condition before checking the error, since an error
// is still returned in this case. TODO: Turn this warning into an error
// after EK support is sufficiently widespread.
if wrongKID {
mctx.Debug("Member %v revoked a device without generating new ephemeral keys. They might be running an old version?", uid)
// Don't box for this member since they have no valid userEK
continue
} else if err != nil {
return nil, err
}
statementMap[uid] = memberStatement
}
return statementMap, nil
} | [
"func",
"fetchTeamMemberStatements",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"(",
"statementMap",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"*",
"keybase1",
".",
"UserEkStatement",
",",
"err",
"error",
")",
"{",
"defer",
"mctx",
".",
"TraceTimed",
"(",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"apiArg",
":=",
"libkb",
".",
"APIArg",
"{",
"Endpoint",
":",
"\"",
"\"",
",",
"SessionType",
":",
"libkb",
".",
"APISessionTypeREQUIRED",
",",
"Args",
":",
"libkb",
".",
"HTTPArgs",
"{",
"\"",
"\"",
":",
"libkb",
".",
"S",
"{",
"Val",
":",
"string",
"(",
"teamID",
")",
"}",
",",
"}",
",",
"}",
"\n",
"res",
",",
"err",
":=",
"mctx",
".",
"G",
"(",
")",
".",
"GetAPI",
"(",
")",
".",
"Get",
"(",
"mctx",
",",
"apiArg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"parsedResponse",
":=",
"teamMemberEKStatementResponse",
"{",
"}",
"\n",
"err",
"=",
"res",
".",
"Body",
".",
"UnmarshalAgain",
"(",
"&",
"parsedResponse",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"team",
",",
"err",
":=",
"teams",
".",
"Load",
"(",
"mctx",
".",
"Ctx",
"(",
")",
",",
"mctx",
".",
"G",
"(",
")",
",",
"keybase1",
".",
"LoadTeamArg",
"{",
"ID",
":",
"teamID",
",",
"ForceRepoll",
":",
"true",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"statementMap",
"=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"*",
"keybase1",
".",
"UserEkStatement",
")",
"\n",
"for",
"uid",
",",
"sig",
":=",
"range",
"parsedResponse",
".",
"Sigs",
"{",
"// Verify the server only returns actual members of our team.",
"upak",
",",
"_",
",",
"err",
":=",
"mctx",
".",
"G",
"(",
")",
".",
"GetUPAKLoader",
"(",
")",
".",
"LoadV2",
"(",
"libkb",
".",
"NewLoadUserArgWithMetaContext",
"(",
"mctx",
")",
".",
"WithUID",
"(",
"uid",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"uv",
":=",
"upak",
".",
"Current",
".",
"ToUserVersion",
"(",
")",
"\n",
"isMember",
":=",
"team",
".",
"IsMember",
"(",
"mctx",
".",
"Ctx",
"(",
")",
",",
"uv",
")",
"\n",
"if",
"!",
"isMember",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"uv",
",",
"teamID",
")",
"\n",
"}",
"\n",
"memberStatement",
",",
"_",
",",
"wrongKID",
",",
"err",
":=",
"verifySigWithLatestPUK",
"(",
"mctx",
",",
"uid",
",",
"sig",
")",
"\n",
"// Check the wrongKID condition before checking the error, since an error",
"// is still returned in this case. TODO: Turn this warning into an error",
"// after EK support is sufficiently widespread.",
"if",
"wrongKID",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"uid",
")",
"\n",
"// Don't box for this member since they have no valid userEK",
"continue",
"\n",
"}",
"else",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"statementMap",
"[",
"uid",
"]",
"=",
"memberStatement",
"\n",
"}",
"\n",
"return",
"statementMap",
",",
"nil",
"\n",
"}"
] | // Returns nil if all team members have never published a teamEK. Verifies that
// the map of users the server returns are indeed valid team members of the
// team and all signatures verify correctly for the users. | [
"Returns",
"nil",
"if",
"all",
"team",
"members",
"have",
"never",
"published",
"a",
"teamEK",
".",
"Verifies",
"that",
"the",
"map",
"of",
"users",
"the",
"server",
"returns",
"are",
"indeed",
"valid",
"team",
"members",
"of",
"the",
"team",
"and",
"all",
"signatures",
"verify",
"correctly",
"for",
"the",
"users",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/team_ek.go#L369-L425 |
160,824 | keybase/client | go/kbfs/libdokan/folderlist.go | userChanged | func (fl *FolderList) userChanged(ctx context.Context, _, newUser kbname.NormalizedUsername) {
var fs []*Folder
func() {
fl.mu.Lock()
defer fl.mu.Unlock()
for _, tlf := range fl.folders {
if tlf, ok := tlf.(*TLF); ok {
fs = append(fs, tlf.folder)
}
}
}()
for _, f := range fs {
f.TlfHandleChange(ctx, nil)
}
if newUser != kbname.NormalizedUsername("") {
fl.fs.config.KBFSOps().ForceFastForward(ctx)
}
} | go | func (fl *FolderList) userChanged(ctx context.Context, _, newUser kbname.NormalizedUsername) {
var fs []*Folder
func() {
fl.mu.Lock()
defer fl.mu.Unlock()
for _, tlf := range fl.folders {
if tlf, ok := tlf.(*TLF); ok {
fs = append(fs, tlf.folder)
}
}
}()
for _, f := range fs {
f.TlfHandleChange(ctx, nil)
}
if newUser != kbname.NormalizedUsername("") {
fl.fs.config.KBFSOps().ForceFastForward(ctx)
}
} | [
"func",
"(",
"fl",
"*",
"FolderList",
")",
"userChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"_",
",",
"newUser",
"kbname",
".",
"NormalizedUsername",
")",
"{",
"var",
"fs",
"[",
"]",
"*",
"Folder",
"\n",
"func",
"(",
")",
"{",
"fl",
".",
"mu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"fl",
".",
"mu",
".",
"Unlock",
"(",
")",
"\n",
"for",
"_",
",",
"tlf",
":=",
"range",
"fl",
".",
"folders",
"{",
"if",
"tlf",
",",
"ok",
":=",
"tlf",
".",
"(",
"*",
"TLF",
")",
";",
"ok",
"{",
"fs",
"=",
"append",
"(",
"fs",
",",
"tlf",
".",
"folder",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"for",
"_",
",",
"f",
":=",
"range",
"fs",
"{",
"f",
".",
"TlfHandleChange",
"(",
"ctx",
",",
"nil",
")",
"\n",
"}",
"\n",
"if",
"newUser",
"!=",
"kbname",
".",
"NormalizedUsername",
"(",
"\"",
"\"",
")",
"{",
"fl",
".",
"fs",
".",
"config",
".",
"KBFSOps",
"(",
")",
".",
"ForceFastForward",
"(",
"ctx",
")",
"\n",
"}",
"\n",
"}"
] | // update things after user changed. | [
"update",
"things",
"after",
"user",
"changed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/folderlist.go#L284-L301 |
160,825 | keybase/client | go/teams/loader_ctx.go | getNewLinksFromServer | func (l *LoaderContextG) getNewLinksFromServer(ctx context.Context,
teamID keybase1.TeamID, lows getLinksLows,
readSubteamID *keybase1.TeamID) (*rawTeam, error) {
return l.getLinksFromServerCommon(ctx, teamID, &lows, nil, readSubteamID)
} | go | func (l *LoaderContextG) getNewLinksFromServer(ctx context.Context,
teamID keybase1.TeamID, lows getLinksLows,
readSubteamID *keybase1.TeamID) (*rawTeam, error) {
return l.getLinksFromServerCommon(ctx, teamID, &lows, nil, readSubteamID)
} | [
"func",
"(",
"l",
"*",
"LoaderContextG",
")",
"getNewLinksFromServer",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"lows",
"getLinksLows",
",",
"readSubteamID",
"*",
"keybase1",
".",
"TeamID",
")",
"(",
"*",
"rawTeam",
",",
"error",
")",
"{",
"return",
"l",
".",
"getLinksFromServerCommon",
"(",
"ctx",
",",
"teamID",
",",
"&",
"lows",
",",
"nil",
",",
"readSubteamID",
")",
"\n",
"}"
] | // Get new links from the server. | [
"Get",
"new",
"links",
"from",
"the",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader_ctx.go#L105-L109 |
160,826 | keybase/client | go/teams/loader_ctx.go | getLinksFromServer | func (l *LoaderContextG) getLinksFromServer(ctx context.Context,
teamID keybase1.TeamID, requestSeqnos []keybase1.Seqno, readSubteamID *keybase1.TeamID) (*rawTeam, error) {
return l.getLinksFromServerCommon(ctx, teamID, nil, requestSeqnos, readSubteamID)
} | go | func (l *LoaderContextG) getLinksFromServer(ctx context.Context,
teamID keybase1.TeamID, requestSeqnos []keybase1.Seqno, readSubteamID *keybase1.TeamID) (*rawTeam, error) {
return l.getLinksFromServerCommon(ctx, teamID, nil, requestSeqnos, readSubteamID)
} | [
"func",
"(",
"l",
"*",
"LoaderContextG",
")",
"getLinksFromServer",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"requestSeqnos",
"[",
"]",
"keybase1",
".",
"Seqno",
",",
"readSubteamID",
"*",
"keybase1",
".",
"TeamID",
")",
"(",
"*",
"rawTeam",
",",
"error",
")",
"{",
"return",
"l",
".",
"getLinksFromServerCommon",
"(",
"ctx",
",",
"teamID",
",",
"nil",
",",
"requestSeqnos",
",",
"readSubteamID",
")",
"\n",
"}"
] | // Get full links from the server.
// Does not guarantee that the server returned the correct links, nor that they are unstubbed. | [
"Get",
"full",
"links",
"from",
"the",
"server",
".",
"Does",
"not",
"guarantee",
"that",
"the",
"server",
"returned",
"the",
"correct",
"links",
"nor",
"that",
"they",
"are",
"unstubbed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/loader_ctx.go#L113-L116 |
160,827 | keybase/client | go/kbfs/libkbfs/coalescing_context.go | NewCoalescingContext | func NewCoalescingContext(parent context.Context) (*CoalescingContext, context.CancelFunc) {
ctx := &CoalescingContext{
// Make the parent's `Value()` method available to consumers of this
// context. For example, this maintains the parent's log debug tags.
// TODO: Make _all_ parents' values available.
Context: parent,
doneCh: make(chan struct{}),
mutateCh: make(chan context.Context),
}
closeCh := make(chan struct{})
ctx.selects = []reflect.SelectCase{
{
Dir: reflect.SelectRecv,
Chan: reflect.ValueOf(ctx.mutateCh),
},
{
Dir: reflect.SelectRecv,
Chan: reflect.ValueOf(closeCh),
},
}
ctx.appendContext(parent)
go ctx.loop()
cancelFunc := func() {
select {
case <-closeCh:
default:
close(closeCh)
}
}
return ctx, cancelFunc
} | go | func NewCoalescingContext(parent context.Context) (*CoalescingContext, context.CancelFunc) {
ctx := &CoalescingContext{
// Make the parent's `Value()` method available to consumers of this
// context. For example, this maintains the parent's log debug tags.
// TODO: Make _all_ parents' values available.
Context: parent,
doneCh: make(chan struct{}),
mutateCh: make(chan context.Context),
}
closeCh := make(chan struct{})
ctx.selects = []reflect.SelectCase{
{
Dir: reflect.SelectRecv,
Chan: reflect.ValueOf(ctx.mutateCh),
},
{
Dir: reflect.SelectRecv,
Chan: reflect.ValueOf(closeCh),
},
}
ctx.appendContext(parent)
go ctx.loop()
cancelFunc := func() {
select {
case <-closeCh:
default:
close(closeCh)
}
}
return ctx, cancelFunc
} | [
"func",
"NewCoalescingContext",
"(",
"parent",
"context",
".",
"Context",
")",
"(",
"*",
"CoalescingContext",
",",
"context",
".",
"CancelFunc",
")",
"{",
"ctx",
":=",
"&",
"CoalescingContext",
"{",
"// Make the parent's `Value()` method available to consumers of this",
"// context. For example, this maintains the parent's log debug tags.",
"// TODO: Make _all_ parents' values available.",
"Context",
":",
"parent",
",",
"doneCh",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
",",
"mutateCh",
":",
"make",
"(",
"chan",
"context",
".",
"Context",
")",
",",
"}",
"\n",
"closeCh",
":=",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
"\n",
"ctx",
".",
"selects",
"=",
"[",
"]",
"reflect",
".",
"SelectCase",
"{",
"{",
"Dir",
":",
"reflect",
".",
"SelectRecv",
",",
"Chan",
":",
"reflect",
".",
"ValueOf",
"(",
"ctx",
".",
"mutateCh",
")",
",",
"}",
",",
"{",
"Dir",
":",
"reflect",
".",
"SelectRecv",
",",
"Chan",
":",
"reflect",
".",
"ValueOf",
"(",
"closeCh",
")",
",",
"}",
",",
"}",
"\n",
"ctx",
".",
"appendContext",
"(",
"parent",
")",
"\n",
"go",
"ctx",
".",
"loop",
"(",
")",
"\n",
"cancelFunc",
":=",
"func",
"(",
")",
"{",
"select",
"{",
"case",
"<-",
"closeCh",
":",
"default",
":",
"close",
"(",
"closeCh",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ctx",
",",
"cancelFunc",
"\n",
"}"
] | // NewCoalescingContext creates a new CoalescingContext. The context _must_ be
// canceled to avoid a goroutine leak. | [
"NewCoalescingContext",
"creates",
"a",
"new",
"CoalescingContext",
".",
"The",
"context",
"_must_",
"be",
"canceled",
"to",
"avoid",
"a",
"goroutine",
"leak",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/coalescing_context.go#L63-L93 |
160,828 | keybase/client | go/kbfs/libkbfs/coalescing_context.go | AddContext | func (ctx *CoalescingContext) AddContext(other context.Context) error {
select {
case ctx.mutateCh <- other:
return nil
case <-ctx.doneCh:
return context.Canceled
}
} | go | func (ctx *CoalescingContext) AddContext(other context.Context) error {
select {
case ctx.mutateCh <- other:
return nil
case <-ctx.doneCh:
return context.Canceled
}
} | [
"func",
"(",
"ctx",
"*",
"CoalescingContext",
")",
"AddContext",
"(",
"other",
"context",
".",
"Context",
")",
"error",
"{",
"select",
"{",
"case",
"ctx",
".",
"mutateCh",
"<-",
"other",
":",
"return",
"nil",
"\n",
"case",
"<-",
"ctx",
".",
"doneCh",
":",
"return",
"context",
".",
"Canceled",
"\n",
"}",
"\n",
"}"
] | // AddContext adds a context to the set of contexts that we're waiting on. | [
"AddContext",
"adds",
"a",
"context",
"to",
"the",
"set",
"of",
"contexts",
"that",
"we",
"re",
"waiting",
"on",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/coalescing_context.go#L118-L125 |
160,829 | keybase/client | go/libkb/kex2_router.go | Post | func (k *KexRouter) Post(sessID kex2.SessionID, sender kex2.DeviceID, seqno kex2.Seqno, msg []byte) (err error) {
mctx := k.M().WithLogTag("KEXR")
mctx.Debug("+ KexRouter.Post(%x, %x, %d, ...)", sessID, sender, seqno)
defer func() {
mctx.Debug("- KexRouter.Post(%x, %x, %d) -> %s", sessID, sender, seqno, ErrToOk(err))
}()
arg := APIArg{
Endpoint: "kex2/send",
Args: HTTPArgs{
"I": HexArg(sessID[:]),
"sender": HexArg(sender[:]),
"seqno": I{Val: int(seqno)},
"msg": B64Arg(msg),
},
}
mctx = mctx.BackgroundWithLogTags()
kexAPITimeout(&arg, time.Second*5)
_, err = mctx.G().API.Post(mctx, arg)
return err
} | go | func (k *KexRouter) Post(sessID kex2.SessionID, sender kex2.DeviceID, seqno kex2.Seqno, msg []byte) (err error) {
mctx := k.M().WithLogTag("KEXR")
mctx.Debug("+ KexRouter.Post(%x, %x, %d, ...)", sessID, sender, seqno)
defer func() {
mctx.Debug("- KexRouter.Post(%x, %x, %d) -> %s", sessID, sender, seqno, ErrToOk(err))
}()
arg := APIArg{
Endpoint: "kex2/send",
Args: HTTPArgs{
"I": HexArg(sessID[:]),
"sender": HexArg(sender[:]),
"seqno": I{Val: int(seqno)},
"msg": B64Arg(msg),
},
}
mctx = mctx.BackgroundWithLogTags()
kexAPITimeout(&arg, time.Second*5)
_, err = mctx.G().API.Post(mctx, arg)
return err
} | [
"func",
"(",
"k",
"*",
"KexRouter",
")",
"Post",
"(",
"sessID",
"kex2",
".",
"SessionID",
",",
"sender",
"kex2",
".",
"DeviceID",
",",
"seqno",
"kex2",
".",
"Seqno",
",",
"msg",
"[",
"]",
"byte",
")",
"(",
"err",
"error",
")",
"{",
"mctx",
":=",
"k",
".",
"M",
"(",
")",
".",
"WithLogTag",
"(",
"\"",
"\"",
")",
"\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"sessID",
",",
"sender",
",",
"seqno",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"sessID",
",",
"sender",
",",
"seqno",
",",
"ErrToOk",
"(",
"err",
")",
")",
"\n",
"}",
"(",
")",
"\n\n",
"arg",
":=",
"APIArg",
"{",
"Endpoint",
":",
"\"",
"\"",
",",
"Args",
":",
"HTTPArgs",
"{",
"\"",
"\"",
":",
"HexArg",
"(",
"sessID",
"[",
":",
"]",
")",
",",
"\"",
"\"",
":",
"HexArg",
"(",
"sender",
"[",
":",
"]",
")",
",",
"\"",
"\"",
":",
"I",
"{",
"Val",
":",
"int",
"(",
"seqno",
")",
"}",
",",
"\"",
"\"",
":",
"B64Arg",
"(",
"msg",
")",
",",
"}",
",",
"}",
"\n",
"mctx",
"=",
"mctx",
".",
"BackgroundWithLogTags",
"(",
")",
"\n",
"kexAPITimeout",
"(",
"&",
"arg",
",",
"time",
".",
"Second",
"*",
"5",
")",
"\n",
"_",
",",
"err",
"=",
"mctx",
".",
"G",
"(",
")",
".",
"API",
".",
"Post",
"(",
"mctx",
",",
"arg",
")",
"\n\n",
"return",
"err",
"\n",
"}"
] | // Post implements Post in the kex2.MessageRouter interface. | [
"Post",
"implements",
"Post",
"in",
"the",
"kex2",
".",
"MessageRouter",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/kex2_router.go#L26-L47 |
160,830 | keybase/client | go/libkb/kex2_router.go | Get | func (k *KexRouter) Get(sessID kex2.SessionID, receiver kex2.DeviceID, low kex2.Seqno, poll time.Duration) (msgs [][]byte, err error) {
mctx := k.M().WithLogTag("KEXR")
mctx.Debug("+ KexRouter.Get(%x, %x, %d, %s)", sessID, receiver, low, poll)
defer func() {
mctx.Debug("- KexRouter.Get(%x, %x, %d, %s) -> %s (messages: %d)", sessID, receiver, low, poll, ErrToOk(err), len(msgs))
}()
if poll > HTTPPollMaximum {
poll = HTTPPollMaximum
}
arg := APIArg{
Endpoint: "kex2/receive",
Args: HTTPArgs{
"I": HexArg(sessID[:]),
"receiver": HexArg(receiver[:]),
"low": I{Val: int(low)},
"poll": I{Val: int(poll / time.Millisecond)},
},
}
kexAPITimeout(&arg, 2*poll)
var j kexResp
if err = mctx.G().API.GetDecode(mctx.BackgroundWithLogTags(), arg, &j); err != nil {
return nil, err
}
if j.Status.Code != SCOk {
return nil, AppStatusError{Code: j.Status.Code, Name: j.Status.Name, Desc: j.Status.Desc}
}
for _, m := range j.Msgs {
dec, err := base64.StdEncoding.DecodeString(m.Msg)
if err != nil {
return nil, err
}
msgs = append(msgs, dec)
}
return msgs, nil
} | go | func (k *KexRouter) Get(sessID kex2.SessionID, receiver kex2.DeviceID, low kex2.Seqno, poll time.Duration) (msgs [][]byte, err error) {
mctx := k.M().WithLogTag("KEXR")
mctx.Debug("+ KexRouter.Get(%x, %x, %d, %s)", sessID, receiver, low, poll)
defer func() {
mctx.Debug("- KexRouter.Get(%x, %x, %d, %s) -> %s (messages: %d)", sessID, receiver, low, poll, ErrToOk(err), len(msgs))
}()
if poll > HTTPPollMaximum {
poll = HTTPPollMaximum
}
arg := APIArg{
Endpoint: "kex2/receive",
Args: HTTPArgs{
"I": HexArg(sessID[:]),
"receiver": HexArg(receiver[:]),
"low": I{Val: int(low)},
"poll": I{Val: int(poll / time.Millisecond)},
},
}
kexAPITimeout(&arg, 2*poll)
var j kexResp
if err = mctx.G().API.GetDecode(mctx.BackgroundWithLogTags(), arg, &j); err != nil {
return nil, err
}
if j.Status.Code != SCOk {
return nil, AppStatusError{Code: j.Status.Code, Name: j.Status.Name, Desc: j.Status.Desc}
}
for _, m := range j.Msgs {
dec, err := base64.StdEncoding.DecodeString(m.Msg)
if err != nil {
return nil, err
}
msgs = append(msgs, dec)
}
return msgs, nil
} | [
"func",
"(",
"k",
"*",
"KexRouter",
")",
"Get",
"(",
"sessID",
"kex2",
".",
"SessionID",
",",
"receiver",
"kex2",
".",
"DeviceID",
",",
"low",
"kex2",
".",
"Seqno",
",",
"poll",
"time",
".",
"Duration",
")",
"(",
"msgs",
"[",
"]",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"mctx",
":=",
"k",
".",
"M",
"(",
")",
".",
"WithLogTag",
"(",
"\"",
"\"",
")",
"\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"sessID",
",",
"receiver",
",",
"low",
",",
"poll",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"sessID",
",",
"receiver",
",",
"low",
",",
"poll",
",",
"ErrToOk",
"(",
"err",
")",
",",
"len",
"(",
"msgs",
")",
")",
"\n",
"}",
"(",
")",
"\n\n",
"if",
"poll",
">",
"HTTPPollMaximum",
"{",
"poll",
"=",
"HTTPPollMaximum",
"\n",
"}",
"\n\n",
"arg",
":=",
"APIArg",
"{",
"Endpoint",
":",
"\"",
"\"",
",",
"Args",
":",
"HTTPArgs",
"{",
"\"",
"\"",
":",
"HexArg",
"(",
"sessID",
"[",
":",
"]",
")",
",",
"\"",
"\"",
":",
"HexArg",
"(",
"receiver",
"[",
":",
"]",
")",
",",
"\"",
"\"",
":",
"I",
"{",
"Val",
":",
"int",
"(",
"low",
")",
"}",
",",
"\"",
"\"",
":",
"I",
"{",
"Val",
":",
"int",
"(",
"poll",
"/",
"time",
".",
"Millisecond",
")",
"}",
",",
"}",
",",
"}",
"\n",
"kexAPITimeout",
"(",
"&",
"arg",
",",
"2",
"*",
"poll",
")",
"\n",
"var",
"j",
"kexResp",
"\n\n",
"if",
"err",
"=",
"mctx",
".",
"G",
"(",
")",
".",
"API",
".",
"GetDecode",
"(",
"mctx",
".",
"BackgroundWithLogTags",
"(",
")",
",",
"arg",
",",
"&",
"j",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"j",
".",
"Status",
".",
"Code",
"!=",
"SCOk",
"{",
"return",
"nil",
",",
"AppStatusError",
"{",
"Code",
":",
"j",
".",
"Status",
".",
"Code",
",",
"Name",
":",
"j",
".",
"Status",
".",
"Name",
",",
"Desc",
":",
"j",
".",
"Status",
".",
"Desc",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"m",
":=",
"range",
"j",
".",
"Msgs",
"{",
"dec",
",",
"err",
":=",
"base64",
".",
"StdEncoding",
".",
"DecodeString",
"(",
"m",
".",
"Msg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"msgs",
"=",
"append",
"(",
"msgs",
",",
"dec",
")",
"\n",
"}",
"\n\n",
"return",
"msgs",
",",
"nil",
"\n",
"}"
] | // Get implements Get in the kex2.MessageRouter interface. | [
"Get",
"implements",
"Get",
"in",
"the",
"kex2",
".",
"MessageRouter",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/kex2_router.go#L71-L110 |
160,831 | keybase/client | go/client/cmd_simplefs_read.go | NewCmdSimpleFSRead | func NewCmdSimpleFSRead(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "read",
ArgumentHelp: "<path>",
Usage: "output file contents to standard output",
Action: func(c *cli.Context) {
cl.ChooseCommand(&CmdSimpleFSRead{Contextified: libkb.NewContextified(g)}, "read", c)
cl.SetNoStandalone()
},
Flags: []cli.Flag{
cli.IntFlag{
Name: "b, buffersize",
Value: readBufSizeDefault,
Usage: "read buffer size",
},
cli.IntFlag{
Name: "rev",
Usage: "a revision number for the KBFS folder",
},
cli.StringFlag{
Name: "time",
Usage: "a time for the KBFS folder (eg \"2018-07-27 22:05\")",
},
cli.StringFlag{
Name: "reltime, relative-time",
Usage: "a relative time for the KBFS folder (eg \"5m\")",
},
},
}
} | go | func NewCmdSimpleFSRead(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "read",
ArgumentHelp: "<path>",
Usage: "output file contents to standard output",
Action: func(c *cli.Context) {
cl.ChooseCommand(&CmdSimpleFSRead{Contextified: libkb.NewContextified(g)}, "read", c)
cl.SetNoStandalone()
},
Flags: []cli.Flag{
cli.IntFlag{
Name: "b, buffersize",
Value: readBufSizeDefault,
Usage: "read buffer size",
},
cli.IntFlag{
Name: "rev",
Usage: "a revision number for the KBFS folder",
},
cli.StringFlag{
Name: "time",
Usage: "a time for the KBFS folder (eg \"2018-07-27 22:05\")",
},
cli.StringFlag{
Name: "reltime, relative-time",
Usage: "a relative time for the KBFS folder (eg \"5m\")",
},
},
}
} | [
"func",
"NewCmdSimpleFSRead",
"(",
"cl",
"*",
"libcmdline",
".",
"CommandLine",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"cli",
".",
"Command",
"{",
"return",
"cli",
".",
"Command",
"{",
"Name",
":",
"\"",
"\"",
",",
"ArgumentHelp",
":",
"\"",
"\"",
",",
"Usage",
":",
"\"",
"\"",
",",
"Action",
":",
"func",
"(",
"c",
"*",
"cli",
".",
"Context",
")",
"{",
"cl",
".",
"ChooseCommand",
"(",
"&",
"CmdSimpleFSRead",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
"}",
",",
"\"",
"\"",
",",
"c",
")",
"\n",
"cl",
".",
"SetNoStandalone",
"(",
")",
"\n",
"}",
",",
"Flags",
":",
"[",
"]",
"cli",
".",
"Flag",
"{",
"cli",
".",
"IntFlag",
"{",
"Name",
":",
"\"",
"\"",
",",
"Value",
":",
"readBufSizeDefault",
",",
"Usage",
":",
"\"",
"\"",
",",
"}",
",",
"cli",
".",
"IntFlag",
"{",
"Name",
":",
"\"",
"\"",
",",
"Usage",
":",
"\"",
"\"",
",",
"}",
",",
"cli",
".",
"StringFlag",
"{",
"Name",
":",
"\"",
"\"",
",",
"Usage",
":",
"\"",
"\\\"",
"\\\"",
"\"",
",",
"}",
",",
"cli",
".",
"StringFlag",
"{",
"Name",
":",
"\"",
"\"",
",",
"Usage",
":",
"\"",
"\\\"",
"\\\"",
"\"",
",",
"}",
",",
"}",
",",
"}",
"\n",
"}"
] | // NewCmdSimpleFSRead creates a new cli.Command. | [
"NewCmdSimpleFSRead",
"creates",
"a",
"new",
"cli",
".",
"Command",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs_read.go#L27-L56 |
160,832 | keybase/client | go/logger/buffer.go | NewAutoFlushingBufferedWriter | func NewAutoFlushingBufferedWriter(baseWriter io.Writer,
flushFrequency time.Duration) (w io.Writer, shutdown chan struct{}, done chan struct{}) {
result := &autoFlushingBufferedWriter{
bufferedWriter: bufio.NewWriter(baseWriter),
backupWriter: bufio.NewWriter(baseWriter),
frequency: flushFrequency,
timer: newTriggerableTimer(flushFrequency),
shutdown: make(chan struct{}),
doneShutdown: make(chan struct{}),
}
go result.backgroundFlush()
return result, result.shutdown, result.doneShutdown
} | go | func NewAutoFlushingBufferedWriter(baseWriter io.Writer,
flushFrequency time.Duration) (w io.Writer, shutdown chan struct{}, done chan struct{}) {
result := &autoFlushingBufferedWriter{
bufferedWriter: bufio.NewWriter(baseWriter),
backupWriter: bufio.NewWriter(baseWriter),
frequency: flushFrequency,
timer: newTriggerableTimer(flushFrequency),
shutdown: make(chan struct{}),
doneShutdown: make(chan struct{}),
}
go result.backgroundFlush()
return result, result.shutdown, result.doneShutdown
} | [
"func",
"NewAutoFlushingBufferedWriter",
"(",
"baseWriter",
"io",
".",
"Writer",
",",
"flushFrequency",
"time",
".",
"Duration",
")",
"(",
"w",
"io",
".",
"Writer",
",",
"shutdown",
"chan",
"struct",
"{",
"}",
",",
"done",
"chan",
"struct",
"{",
"}",
")",
"{",
"result",
":=",
"&",
"autoFlushingBufferedWriter",
"{",
"bufferedWriter",
":",
"bufio",
".",
"NewWriter",
"(",
"baseWriter",
")",
",",
"backupWriter",
":",
"bufio",
".",
"NewWriter",
"(",
"baseWriter",
")",
",",
"frequency",
":",
"flushFrequency",
",",
"timer",
":",
"newTriggerableTimer",
"(",
"flushFrequency",
")",
",",
"shutdown",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
",",
"doneShutdown",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
",",
"}",
"\n",
"go",
"result",
".",
"backgroundFlush",
"(",
")",
"\n",
"return",
"result",
",",
"result",
".",
"shutdown",
",",
"result",
".",
"doneShutdown",
"\n",
"}"
] | // NewAutoFlushingBufferedWriter returns an io.Writer that buffers its output
// and flushes automatically after `flushFrequency`. | [
"NewAutoFlushingBufferedWriter",
"returns",
"an",
"io",
".",
"Writer",
"that",
"buffers",
"its",
"output",
"and",
"flushes",
"automatically",
"after",
"flushFrequency",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/logger/buffer.go#L99-L111 |
160,833 | keybase/client | go/logger/buffer.go | EnableBufferedLogging | func EnableBufferedLogging() {
writer, shutdown, done := NewAutoFlushingBufferedWriter(ErrorWriter(), loggingFrequency)
stdErrLoggingShutdown = shutdown
stdErrLoggingShutdownDone = done
logBackend := logging.NewLogBackend(writer, "", 0)
logging.SetBackend(logBackend)
} | go | func EnableBufferedLogging() {
writer, shutdown, done := NewAutoFlushingBufferedWriter(ErrorWriter(), loggingFrequency)
stdErrLoggingShutdown = shutdown
stdErrLoggingShutdownDone = done
logBackend := logging.NewLogBackend(writer, "", 0)
logging.SetBackend(logBackend)
} | [
"func",
"EnableBufferedLogging",
"(",
")",
"{",
"writer",
",",
"shutdown",
",",
"done",
":=",
"NewAutoFlushingBufferedWriter",
"(",
"ErrorWriter",
"(",
")",
",",
"loggingFrequency",
")",
"\n",
"stdErrLoggingShutdown",
"=",
"shutdown",
"\n",
"stdErrLoggingShutdownDone",
"=",
"done",
"\n",
"logBackend",
":=",
"logging",
".",
"NewLogBackend",
"(",
"writer",
",",
"\"",
"\"",
",",
"0",
")",
"\n",
"logging",
".",
"SetBackend",
"(",
"logBackend",
")",
"\n",
"}"
] | // EnableBufferedLogging turns on buffered logging - this is a performance
// boost at the expense of not getting all the logs in a crash. | [
"EnableBufferedLogging",
"turns",
"on",
"buffered",
"logging",
"-",
"this",
"is",
"a",
"performance",
"boost",
"at",
"the",
"expense",
"of",
"not",
"getting",
"all",
"the",
"logs",
"in",
"a",
"crash",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/logger/buffer.go#L130-L136 |
160,834 | keybase/client | go/kbfs/dokan/loaddll.go | loadLibrary | func loadLibrary(epc *errorPrinter, path string) (windows.Handle, error) {
hdl, err := windows.LoadLibrary(path)
epc.Printf("LoadLibrary(%q) -> %v,%v\n", path, hdl, err)
return hdl, err
} | go | func loadLibrary(epc *errorPrinter, path string) (windows.Handle, error) {
hdl, err := windows.LoadLibrary(path)
epc.Printf("LoadLibrary(%q) -> %v,%v\n", path, hdl, err)
return hdl, err
} | [
"func",
"loadLibrary",
"(",
"epc",
"*",
"errorPrinter",
",",
"path",
"string",
")",
"(",
"windows",
".",
"Handle",
",",
"error",
")",
"{",
"hdl",
",",
"err",
":=",
"windows",
".",
"LoadLibrary",
"(",
"path",
")",
"\n",
"epc",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"path",
",",
"hdl",
",",
"err",
")",
"\n",
"return",
"hdl",
",",
"err",
"\n",
"}"
] | // loadLibrary calls win32 LoadLibrary and logs the result. | [
"loadLibrary",
"calls",
"win32",
"LoadLibrary",
"and",
"logs",
"the",
"result",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/dokan/loaddll.go#L38-L42 |
160,835 | keybase/client | go/kbfs/dokan/loaddll.go | doLoadDLL | func doLoadDLL(epc *errorPrinter, path string) (windows.Handle, error) {
var guessPath bool
epc.Printf("loadDokanDLL %q\n", path)
if path == "" {
path = shortPath
guessPath = true
} else {
path = filepath.FromSlash(path)
}
const loadLibrarySearchSystem32 = 0x800
const flags = loadLibrarySearchSystem32
hdl, err := windows.LoadLibraryEx(path, 0, flags)
epc.Printf("loadDokanDLL LoadLibraryEx(%q,0,%x) -> %v,%v\n", path, flags, hdl, err)
if err == nil || !guessPath {
return hdl, err
}
// User probably has not installed KB2533623 which is a security update
// from 2011. Without this Windows security update loading libraries
// is unsafe on Windows.
// Continue to try to load the DLL regardless.
if runtime.GOARCH == `386` {
hdl, err = loadLibrary(epc, syswow64+shortPath)
if err == nil {
return hdl, nil
}
}
hdl, err = loadLibrary(epc, system32+shortPath)
if err == nil {
return hdl, nil
}
hdl, err = loadLibrary(epc, shortPath)
if err == nil {
return hdl, nil
}
err = fmt.Errorf("loadDokanDLL: cannot load Dokan DLL: %v", err)
epc.Printf("ERROR: %v\n", err)
return 0, err
} | go | func doLoadDLL(epc *errorPrinter, path string) (windows.Handle, error) {
var guessPath bool
epc.Printf("loadDokanDLL %q\n", path)
if path == "" {
path = shortPath
guessPath = true
} else {
path = filepath.FromSlash(path)
}
const loadLibrarySearchSystem32 = 0x800
const flags = loadLibrarySearchSystem32
hdl, err := windows.LoadLibraryEx(path, 0, flags)
epc.Printf("loadDokanDLL LoadLibraryEx(%q,0,%x) -> %v,%v\n", path, flags, hdl, err)
if err == nil || !guessPath {
return hdl, err
}
// User probably has not installed KB2533623 which is a security update
// from 2011. Without this Windows security update loading libraries
// is unsafe on Windows.
// Continue to try to load the DLL regardless.
if runtime.GOARCH == `386` {
hdl, err = loadLibrary(epc, syswow64+shortPath)
if err == nil {
return hdl, nil
}
}
hdl, err = loadLibrary(epc, system32+shortPath)
if err == nil {
return hdl, nil
}
hdl, err = loadLibrary(epc, shortPath)
if err == nil {
return hdl, nil
}
err = fmt.Errorf("loadDokanDLL: cannot load Dokan DLL: %v", err)
epc.Printf("ERROR: %v\n", err)
return 0, err
} | [
"func",
"doLoadDLL",
"(",
"epc",
"*",
"errorPrinter",
",",
"path",
"string",
")",
"(",
"windows",
".",
"Handle",
",",
"error",
")",
"{",
"var",
"guessPath",
"bool",
"\n",
"epc",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"path",
")",
"\n",
"if",
"path",
"==",
"\"",
"\"",
"{",
"path",
"=",
"shortPath",
"\n",
"guessPath",
"=",
"true",
"\n",
"}",
"else",
"{",
"path",
"=",
"filepath",
".",
"FromSlash",
"(",
"path",
")",
"\n",
"}",
"\n",
"const",
"loadLibrarySearchSystem32",
"=",
"0x800",
"\n",
"const",
"flags",
"=",
"loadLibrarySearchSystem32",
"\n",
"hdl",
",",
"err",
":=",
"windows",
".",
"LoadLibraryEx",
"(",
"path",
",",
"0",
",",
"flags",
")",
"\n",
"epc",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"path",
",",
"flags",
",",
"hdl",
",",
"err",
")",
"\n",
"if",
"err",
"==",
"nil",
"||",
"!",
"guessPath",
"{",
"return",
"hdl",
",",
"err",
"\n",
"}",
"\n",
"// User probably has not installed KB2533623 which is a security update",
"// from 2011. Without this Windows security update loading libraries",
"// is unsafe on Windows.",
"// Continue to try to load the DLL regardless.",
"if",
"runtime",
".",
"GOARCH",
"==",
"`386`",
"{",
"hdl",
",",
"err",
"=",
"loadLibrary",
"(",
"epc",
",",
"syswow64",
"+",
"shortPath",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"hdl",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"hdl",
",",
"err",
"=",
"loadLibrary",
"(",
"epc",
",",
"system32",
"+",
"shortPath",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"hdl",
",",
"nil",
"\n",
"}",
"\n",
"hdl",
",",
"err",
"=",
"loadLibrary",
"(",
"epc",
",",
"shortPath",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"hdl",
",",
"nil",
"\n",
"}",
"\n",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"epc",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"err",
")",
"\n",
"return",
"0",
",",
"err",
"\n",
"}"
] | // doLoadDLL tries to load the dokan DLL from various locations. | [
"doLoadDLL",
"tries",
"to",
"load",
"the",
"dokan",
"DLL",
"from",
"various",
"locations",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/dokan/loaddll.go#L45-L83 |
160,836 | keybase/client | go/kbfs/dokan/loaddll.go | loadDokanDLL | func loadDokanDLL(cfg *Config) error {
var epc errorPrinter
err := doLoadDokanAndGetSymbols(&epc, cfg.DllPath)
cfg.FileSystem.Printf("%s", epc.buf.Bytes())
return err
} | go | func loadDokanDLL(cfg *Config) error {
var epc errorPrinter
err := doLoadDokanAndGetSymbols(&epc, cfg.DllPath)
cfg.FileSystem.Printf("%s", epc.buf.Bytes())
return err
} | [
"func",
"loadDokanDLL",
"(",
"cfg",
"*",
"Config",
")",
"error",
"{",
"var",
"epc",
"errorPrinter",
"\n",
"err",
":=",
"doLoadDokanAndGetSymbols",
"(",
"&",
"epc",
",",
"cfg",
".",
"DllPath",
")",
"\n",
"cfg",
".",
"FileSystem",
".",
"Printf",
"(",
"\"",
"\"",
",",
"epc",
".",
"buf",
".",
"Bytes",
"(",
")",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // loadDokanDLL tries to load the dokan DLL from
// the given path. Empty path is allowed and will
// result in the location being guessed. | [
"loadDokanDLL",
"tries",
"to",
"load",
"the",
"dokan",
"DLL",
"from",
"the",
"given",
"path",
".",
"Empty",
"path",
"is",
"allowed",
"and",
"will",
"result",
"in",
"the",
"location",
"being",
"guessed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/dokan/loaddll.go#L121-L126 |
160,837 | keybase/client | go/stellar/transform.go | transformPaymentStellar | func transformPaymentStellar(mctx libkb.MetaContext, acctID stellar1.AccountID, p stellar1.PaymentSummaryStellar, oc OwnAccountLookupCache) (*stellar1.PaymentLocal, error) {
loc, err := newPaymentLocal(mctx, p.TxID, p.Ctime, p.Amount, p.Asset)
if err != nil {
return nil, err
}
isSender := p.From.Eq(acctID)
isRecipient := p.To.Eq(acctID)
switch {
case isSender && isRecipient:
loc.Delta = stellar1.BalanceDelta_NONE
case isSender:
loc.Delta = stellar1.BalanceDelta_DECREASE
case isRecipient:
loc.Delta = stellar1.BalanceDelta_INCREASE
}
loc.FromAccountID = p.From
loc.FromType = stellar1.ParticipantType_STELLAR
loc.ToAccountID = &p.To
loc.ToType = stellar1.ParticipantType_STELLAR
fillOwnAccounts(mctx, loc, oc)
loc.StatusSimplified = stellar1.PaymentStatus_COMPLETED
loc.StatusDescription = strings.ToLower(loc.StatusSimplified.String())
loc.Unread = p.Unread
loc.IsInflation = p.IsInflation
loc.InflationSource = p.InflationSource
return loc, nil
} | go | func transformPaymentStellar(mctx libkb.MetaContext, acctID stellar1.AccountID, p stellar1.PaymentSummaryStellar, oc OwnAccountLookupCache) (*stellar1.PaymentLocal, error) {
loc, err := newPaymentLocal(mctx, p.TxID, p.Ctime, p.Amount, p.Asset)
if err != nil {
return nil, err
}
isSender := p.From.Eq(acctID)
isRecipient := p.To.Eq(acctID)
switch {
case isSender && isRecipient:
loc.Delta = stellar1.BalanceDelta_NONE
case isSender:
loc.Delta = stellar1.BalanceDelta_DECREASE
case isRecipient:
loc.Delta = stellar1.BalanceDelta_INCREASE
}
loc.FromAccountID = p.From
loc.FromType = stellar1.ParticipantType_STELLAR
loc.ToAccountID = &p.To
loc.ToType = stellar1.ParticipantType_STELLAR
fillOwnAccounts(mctx, loc, oc)
loc.StatusSimplified = stellar1.PaymentStatus_COMPLETED
loc.StatusDescription = strings.ToLower(loc.StatusSimplified.String())
loc.Unread = p.Unread
loc.IsInflation = p.IsInflation
loc.InflationSource = p.InflationSource
return loc, nil
} | [
"func",
"transformPaymentStellar",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"acctID",
"stellar1",
".",
"AccountID",
",",
"p",
"stellar1",
".",
"PaymentSummaryStellar",
",",
"oc",
"OwnAccountLookupCache",
")",
"(",
"*",
"stellar1",
".",
"PaymentLocal",
",",
"error",
")",
"{",
"loc",
",",
"err",
":=",
"newPaymentLocal",
"(",
"mctx",
",",
"p",
".",
"TxID",
",",
"p",
".",
"Ctime",
",",
"p",
".",
"Amount",
",",
"p",
".",
"Asset",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"isSender",
":=",
"p",
".",
"From",
".",
"Eq",
"(",
"acctID",
")",
"\n",
"isRecipient",
":=",
"p",
".",
"To",
".",
"Eq",
"(",
"acctID",
")",
"\n",
"switch",
"{",
"case",
"isSender",
"&&",
"isRecipient",
":",
"loc",
".",
"Delta",
"=",
"stellar1",
".",
"BalanceDelta_NONE",
"\n",
"case",
"isSender",
":",
"loc",
".",
"Delta",
"=",
"stellar1",
".",
"BalanceDelta_DECREASE",
"\n",
"case",
"isRecipient",
":",
"loc",
".",
"Delta",
"=",
"stellar1",
".",
"BalanceDelta_INCREASE",
"\n",
"}",
"\n\n",
"loc",
".",
"FromAccountID",
"=",
"p",
".",
"From",
"\n",
"loc",
".",
"FromType",
"=",
"stellar1",
".",
"ParticipantType_STELLAR",
"\n",
"loc",
".",
"ToAccountID",
"=",
"&",
"p",
".",
"To",
"\n",
"loc",
".",
"ToType",
"=",
"stellar1",
".",
"ParticipantType_STELLAR",
"\n",
"fillOwnAccounts",
"(",
"mctx",
",",
"loc",
",",
"oc",
")",
"\n\n",
"loc",
".",
"StatusSimplified",
"=",
"stellar1",
".",
"PaymentStatus_COMPLETED",
"\n",
"loc",
".",
"StatusDescription",
"=",
"strings",
".",
"ToLower",
"(",
"loc",
".",
"StatusSimplified",
".",
"String",
"(",
")",
")",
"\n",
"loc",
".",
"Unread",
"=",
"p",
".",
"Unread",
"\n",
"loc",
".",
"IsInflation",
"=",
"p",
".",
"IsInflation",
"\n",
"loc",
".",
"InflationSource",
"=",
"p",
".",
"InflationSource",
"\n\n",
"return",
"loc",
",",
"nil",
"\n",
"}"
] | // transformPaymentStellar converts a stellar1.PaymentSummaryStellar into a stellar1.PaymentLocal. | [
"transformPaymentStellar",
"converts",
"a",
"stellar1",
".",
"PaymentSummaryStellar",
"into",
"a",
"stellar1",
".",
"PaymentLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/transform.go#L108-L138 |
160,838 | keybase/client | go/stellar/transform.go | transformPaymentDirect | func transformPaymentDirect(mctx libkb.MetaContext, acctID stellar1.AccountID, p stellar1.PaymentSummaryDirect, oc OwnAccountLookupCache) (*stellar1.PaymentLocal, error) {
loc, err := newPaymentLocal(mctx, p.TxID, p.Ctime, p.Amount, p.Asset)
if err != nil {
return nil, err
}
isSender := p.FromStellar.Eq(acctID)
isRecipient := p.ToStellar.Eq(acctID)
switch {
case isSender && isRecipient:
loc.Delta = stellar1.BalanceDelta_NONE
case isSender:
loc.Delta = stellar1.BalanceDelta_DECREASE
case isRecipient:
loc.Delta = stellar1.BalanceDelta_INCREASE
}
loc.Worth, _, err = formatWorth(mctx, p.DisplayAmount, p.DisplayCurrency)
if err != nil {
return nil, err
}
loc.FromAccountID = p.FromStellar
loc.FromType = stellar1.ParticipantType_STELLAR
if username, err := lookupUsername(mctx, p.From.Uid); err == nil {
loc.FromUsername = username
loc.FromType = stellar1.ParticipantType_KEYBASE
}
loc.ToAccountID = &p.ToStellar
loc.ToType = stellar1.ParticipantType_STELLAR
if p.To != nil {
if username, err := lookupUsername(mctx, p.To.Uid); err == nil {
loc.ToUsername = username
loc.ToType = stellar1.ParticipantType_KEYBASE
}
}
fillOwnAccounts(mctx, loc, oc)
switch {
case loc.FromAccountName != "":
// we are sender
loc.WorthAtSendTime, _, err = formatWorthAtSendTime(mctx, p, true)
case loc.ToAccountName != "":
// we are recipient
loc.WorthAtSendTime, _, err = formatWorthAtSendTime(mctx, p, false)
}
if err != nil {
return nil, err
}
loc.StatusSimplified = p.TxStatus.ToPaymentStatus()
loc.StatusDescription = strings.ToLower(loc.StatusSimplified.String())
loc.StatusDetail = p.TxErrMsg
loc.Note, loc.NoteErr = decryptNote(mctx, p.TxID, p.NoteB64)
loc.SourceAmountMax = p.SourceAmountMax
loc.SourceAmountActual = p.SourceAmountActual
loc.SourceAsset = p.SourceAsset
return loc, nil
} | go | func transformPaymentDirect(mctx libkb.MetaContext, acctID stellar1.AccountID, p stellar1.PaymentSummaryDirect, oc OwnAccountLookupCache) (*stellar1.PaymentLocal, error) {
loc, err := newPaymentLocal(mctx, p.TxID, p.Ctime, p.Amount, p.Asset)
if err != nil {
return nil, err
}
isSender := p.FromStellar.Eq(acctID)
isRecipient := p.ToStellar.Eq(acctID)
switch {
case isSender && isRecipient:
loc.Delta = stellar1.BalanceDelta_NONE
case isSender:
loc.Delta = stellar1.BalanceDelta_DECREASE
case isRecipient:
loc.Delta = stellar1.BalanceDelta_INCREASE
}
loc.Worth, _, err = formatWorth(mctx, p.DisplayAmount, p.DisplayCurrency)
if err != nil {
return nil, err
}
loc.FromAccountID = p.FromStellar
loc.FromType = stellar1.ParticipantType_STELLAR
if username, err := lookupUsername(mctx, p.From.Uid); err == nil {
loc.FromUsername = username
loc.FromType = stellar1.ParticipantType_KEYBASE
}
loc.ToAccountID = &p.ToStellar
loc.ToType = stellar1.ParticipantType_STELLAR
if p.To != nil {
if username, err := lookupUsername(mctx, p.To.Uid); err == nil {
loc.ToUsername = username
loc.ToType = stellar1.ParticipantType_KEYBASE
}
}
fillOwnAccounts(mctx, loc, oc)
switch {
case loc.FromAccountName != "":
// we are sender
loc.WorthAtSendTime, _, err = formatWorthAtSendTime(mctx, p, true)
case loc.ToAccountName != "":
// we are recipient
loc.WorthAtSendTime, _, err = formatWorthAtSendTime(mctx, p, false)
}
if err != nil {
return nil, err
}
loc.StatusSimplified = p.TxStatus.ToPaymentStatus()
loc.StatusDescription = strings.ToLower(loc.StatusSimplified.String())
loc.StatusDetail = p.TxErrMsg
loc.Note, loc.NoteErr = decryptNote(mctx, p.TxID, p.NoteB64)
loc.SourceAmountMax = p.SourceAmountMax
loc.SourceAmountActual = p.SourceAmountActual
loc.SourceAsset = p.SourceAsset
return loc, nil
} | [
"func",
"transformPaymentDirect",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"acctID",
"stellar1",
".",
"AccountID",
",",
"p",
"stellar1",
".",
"PaymentSummaryDirect",
",",
"oc",
"OwnAccountLookupCache",
")",
"(",
"*",
"stellar1",
".",
"PaymentLocal",
",",
"error",
")",
"{",
"loc",
",",
"err",
":=",
"newPaymentLocal",
"(",
"mctx",
",",
"p",
".",
"TxID",
",",
"p",
".",
"Ctime",
",",
"p",
".",
"Amount",
",",
"p",
".",
"Asset",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"isSender",
":=",
"p",
".",
"FromStellar",
".",
"Eq",
"(",
"acctID",
")",
"\n",
"isRecipient",
":=",
"p",
".",
"ToStellar",
".",
"Eq",
"(",
"acctID",
")",
"\n",
"switch",
"{",
"case",
"isSender",
"&&",
"isRecipient",
":",
"loc",
".",
"Delta",
"=",
"stellar1",
".",
"BalanceDelta_NONE",
"\n",
"case",
"isSender",
":",
"loc",
".",
"Delta",
"=",
"stellar1",
".",
"BalanceDelta_DECREASE",
"\n",
"case",
"isRecipient",
":",
"loc",
".",
"Delta",
"=",
"stellar1",
".",
"BalanceDelta_INCREASE",
"\n",
"}",
"\n\n",
"loc",
".",
"Worth",
",",
"_",
",",
"err",
"=",
"formatWorth",
"(",
"mctx",
",",
"p",
".",
"DisplayAmount",
",",
"p",
".",
"DisplayCurrency",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"loc",
".",
"FromAccountID",
"=",
"p",
".",
"FromStellar",
"\n",
"loc",
".",
"FromType",
"=",
"stellar1",
".",
"ParticipantType_STELLAR",
"\n",
"if",
"username",
",",
"err",
":=",
"lookupUsername",
"(",
"mctx",
",",
"p",
".",
"From",
".",
"Uid",
")",
";",
"err",
"==",
"nil",
"{",
"loc",
".",
"FromUsername",
"=",
"username",
"\n",
"loc",
".",
"FromType",
"=",
"stellar1",
".",
"ParticipantType_KEYBASE",
"\n",
"}",
"\n\n",
"loc",
".",
"ToAccountID",
"=",
"&",
"p",
".",
"ToStellar",
"\n",
"loc",
".",
"ToType",
"=",
"stellar1",
".",
"ParticipantType_STELLAR",
"\n",
"if",
"p",
".",
"To",
"!=",
"nil",
"{",
"if",
"username",
",",
"err",
":=",
"lookupUsername",
"(",
"mctx",
",",
"p",
".",
"To",
".",
"Uid",
")",
";",
"err",
"==",
"nil",
"{",
"loc",
".",
"ToUsername",
"=",
"username",
"\n",
"loc",
".",
"ToType",
"=",
"stellar1",
".",
"ParticipantType_KEYBASE",
"\n",
"}",
"\n",
"}",
"\n\n",
"fillOwnAccounts",
"(",
"mctx",
",",
"loc",
",",
"oc",
")",
"\n",
"switch",
"{",
"case",
"loc",
".",
"FromAccountName",
"!=",
"\"",
"\"",
":",
"// we are sender",
"loc",
".",
"WorthAtSendTime",
",",
"_",
",",
"err",
"=",
"formatWorthAtSendTime",
"(",
"mctx",
",",
"p",
",",
"true",
")",
"\n",
"case",
"loc",
".",
"ToAccountName",
"!=",
"\"",
"\"",
":",
"// we are recipient",
"loc",
".",
"WorthAtSendTime",
",",
"_",
",",
"err",
"=",
"formatWorthAtSendTime",
"(",
"mctx",
",",
"p",
",",
"false",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"loc",
".",
"StatusSimplified",
"=",
"p",
".",
"TxStatus",
".",
"ToPaymentStatus",
"(",
")",
"\n",
"loc",
".",
"StatusDescription",
"=",
"strings",
".",
"ToLower",
"(",
"loc",
".",
"StatusSimplified",
".",
"String",
"(",
")",
")",
"\n",
"loc",
".",
"StatusDetail",
"=",
"p",
".",
"TxErrMsg",
"\n\n",
"loc",
".",
"Note",
",",
"loc",
".",
"NoteErr",
"=",
"decryptNote",
"(",
"mctx",
",",
"p",
".",
"TxID",
",",
"p",
".",
"NoteB64",
")",
"\n\n",
"loc",
".",
"SourceAmountMax",
"=",
"p",
".",
"SourceAmountMax",
"\n",
"loc",
".",
"SourceAmountActual",
"=",
"p",
".",
"SourceAmountActual",
"\n",
"loc",
".",
"SourceAsset",
"=",
"p",
".",
"SourceAsset",
"\n\n",
"return",
"loc",
",",
"nil",
"\n",
"}"
] | // transformPaymentDirect converts a stellar1.PaymentSummaryDirect into a stellar1.PaymentLocal. | [
"transformPaymentDirect",
"converts",
"a",
"stellar1",
".",
"PaymentSummaryDirect",
"into",
"a",
"stellar1",
".",
"PaymentLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/transform.go#L152-L214 |
160,839 | keybase/client | go/stellar/transform.go | TransformToAirdropStatus | func TransformToAirdropStatus(status remote.AirdropStatusAPI) stellar1.AirdropStatus {
var out stellar1.AirdropStatus
switch {
case status.AlreadyRegistered:
out.State = stellar1.AirdropAccepted
case status.Qualifications.QualifiesOverall:
out.State = stellar1.AirdropQualified
default:
out.State = stellar1.AirdropUnqualified
}
dq := stellar1.AirdropQualification{
Title: status.AirdropConfig.MinActiveDevicesTitle,
Valid: status.Qualifications.HasEnoughDevices,
}
out.Rows = append(out.Rows, dq)
aq := stellar1.AirdropQualification{
Title: status.AirdropConfig.AccountCreationTitle,
}
var used []string
for k, q := range status.Qualifications.ServiceChecks {
if q.Qualifies {
aq.Valid = true
break
}
if q.Username == "" {
continue
}
if !q.IsOldEnough {
continue
}
if q.IsUsedAlready {
used = append(used, fmt.Sprintf("%s@%s", q.Username, k))
}
}
if !aq.Valid {
aq.Subtitle = status.AirdropConfig.AccountCreationSubtitle
if len(used) > 0 {
usedDisplay := strings.Join(used, ", ")
aq.Subtitle += " " + fmt.Sprintf(status.AirdropConfig.AccountUsed, usedDisplay)
}
}
out.Rows = append(out.Rows, aq)
return out
} | go | func TransformToAirdropStatus(status remote.AirdropStatusAPI) stellar1.AirdropStatus {
var out stellar1.AirdropStatus
switch {
case status.AlreadyRegistered:
out.State = stellar1.AirdropAccepted
case status.Qualifications.QualifiesOverall:
out.State = stellar1.AirdropQualified
default:
out.State = stellar1.AirdropUnqualified
}
dq := stellar1.AirdropQualification{
Title: status.AirdropConfig.MinActiveDevicesTitle,
Valid: status.Qualifications.HasEnoughDevices,
}
out.Rows = append(out.Rows, dq)
aq := stellar1.AirdropQualification{
Title: status.AirdropConfig.AccountCreationTitle,
}
var used []string
for k, q := range status.Qualifications.ServiceChecks {
if q.Qualifies {
aq.Valid = true
break
}
if q.Username == "" {
continue
}
if !q.IsOldEnough {
continue
}
if q.IsUsedAlready {
used = append(used, fmt.Sprintf("%s@%s", q.Username, k))
}
}
if !aq.Valid {
aq.Subtitle = status.AirdropConfig.AccountCreationSubtitle
if len(used) > 0 {
usedDisplay := strings.Join(used, ", ")
aq.Subtitle += " " + fmt.Sprintf(status.AirdropConfig.AccountUsed, usedDisplay)
}
}
out.Rows = append(out.Rows, aq)
return out
} | [
"func",
"TransformToAirdropStatus",
"(",
"status",
"remote",
".",
"AirdropStatusAPI",
")",
"stellar1",
".",
"AirdropStatus",
"{",
"var",
"out",
"stellar1",
".",
"AirdropStatus",
"\n",
"switch",
"{",
"case",
"status",
".",
"AlreadyRegistered",
":",
"out",
".",
"State",
"=",
"stellar1",
".",
"AirdropAccepted",
"\n",
"case",
"status",
".",
"Qualifications",
".",
"QualifiesOverall",
":",
"out",
".",
"State",
"=",
"stellar1",
".",
"AirdropQualified",
"\n",
"default",
":",
"out",
".",
"State",
"=",
"stellar1",
".",
"AirdropUnqualified",
"\n",
"}",
"\n\n",
"dq",
":=",
"stellar1",
".",
"AirdropQualification",
"{",
"Title",
":",
"status",
".",
"AirdropConfig",
".",
"MinActiveDevicesTitle",
",",
"Valid",
":",
"status",
".",
"Qualifications",
".",
"HasEnoughDevices",
",",
"}",
"\n",
"out",
".",
"Rows",
"=",
"append",
"(",
"out",
".",
"Rows",
",",
"dq",
")",
"\n\n",
"aq",
":=",
"stellar1",
".",
"AirdropQualification",
"{",
"Title",
":",
"status",
".",
"AirdropConfig",
".",
"AccountCreationTitle",
",",
"}",
"\n\n",
"var",
"used",
"[",
"]",
"string",
"\n",
"for",
"k",
",",
"q",
":=",
"range",
"status",
".",
"Qualifications",
".",
"ServiceChecks",
"{",
"if",
"q",
".",
"Qualifies",
"{",
"aq",
".",
"Valid",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n",
"if",
"q",
".",
"Username",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"!",
"q",
".",
"IsOldEnough",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"q",
".",
"IsUsedAlready",
"{",
"used",
"=",
"append",
"(",
"used",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"q",
".",
"Username",
",",
"k",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"aq",
".",
"Valid",
"{",
"aq",
".",
"Subtitle",
"=",
"status",
".",
"AirdropConfig",
".",
"AccountCreationSubtitle",
"\n",
"if",
"len",
"(",
"used",
")",
">",
"0",
"{",
"usedDisplay",
":=",
"strings",
".",
"Join",
"(",
"used",
",",
"\"",
"\"",
")",
"\n",
"aq",
".",
"Subtitle",
"+=",
"\"",
"\"",
"+",
"fmt",
".",
"Sprintf",
"(",
"status",
".",
"AirdropConfig",
".",
"AccountUsed",
",",
"usedDisplay",
")",
"\n",
"}",
"\n",
"}",
"\n",
"out",
".",
"Rows",
"=",
"append",
"(",
"out",
".",
"Rows",
",",
"aq",
")",
"\n\n",
"return",
"out",
"\n",
"}"
] | // TransformToAirdropStatus takes the result from api server status_check
// and transforms it into stellar1.AirdropStatus. | [
"TransformToAirdropStatus",
"takes",
"the",
"result",
"from",
"api",
"server",
"status_check",
"and",
"transforms",
"it",
"into",
"stellar1",
".",
"AirdropStatus",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/transform.go#L537-L584 |
160,840 | keybase/client | go/chat/utils/locktab.go | deadlockDetect | func (c *ConversationLockTab) deadlockDetect(ctx context.Context, trace string, waiters map[string]bool) bool {
// See if this trace is waiting on any other trace
waitingOnTrace, ok := c.waits[trace]
if !ok {
// If not, no deadlock
return false
}
// If we are waiting on a trace we have already encountered, then we have hit a deadlock
if waiters[waitingOnTrace] {
c.Debug(ctx, "deadlockDetect: deadlock detected: trace: %s waitingOnTrace: %s waiters: %v",
trace, waitingOnTrace, waiters)
return true
}
// Set the current trace as waiting, and then continue down the chain
waiters[trace] = true
return c.deadlockDetect(ctx, waitingOnTrace, waiters)
} | go | func (c *ConversationLockTab) deadlockDetect(ctx context.Context, trace string, waiters map[string]bool) bool {
// See if this trace is waiting on any other trace
waitingOnTrace, ok := c.waits[trace]
if !ok {
// If not, no deadlock
return false
}
// If we are waiting on a trace we have already encountered, then we have hit a deadlock
if waiters[waitingOnTrace] {
c.Debug(ctx, "deadlockDetect: deadlock detected: trace: %s waitingOnTrace: %s waiters: %v",
trace, waitingOnTrace, waiters)
return true
}
// Set the current trace as waiting, and then continue down the chain
waiters[trace] = true
return c.deadlockDetect(ctx, waitingOnTrace, waiters)
} | [
"func",
"(",
"c",
"*",
"ConversationLockTab",
")",
"deadlockDetect",
"(",
"ctx",
"context",
".",
"Context",
",",
"trace",
"string",
",",
"waiters",
"map",
"[",
"string",
"]",
"bool",
")",
"bool",
"{",
"// See if this trace is waiting on any other trace",
"waitingOnTrace",
",",
"ok",
":=",
"c",
".",
"waits",
"[",
"trace",
"]",
"\n",
"if",
"!",
"ok",
"{",
"// If not, no deadlock",
"return",
"false",
"\n",
"}",
"\n",
"// If we are waiting on a trace we have already encountered, then we have hit a deadlock",
"if",
"waiters",
"[",
"waitingOnTrace",
"]",
"{",
"c",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
",",
"trace",
",",
"waitingOnTrace",
",",
"waiters",
")",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"// Set the current trace as waiting, and then continue down the chain",
"waiters",
"[",
"trace",
"]",
"=",
"true",
"\n",
"return",
"c",
".",
"deadlockDetect",
"(",
"ctx",
",",
"waitingOnTrace",
",",
"waiters",
")",
"\n",
"}"
] | // deadlockDetect tries to find a deadlock condition in the current set of waiting acquirers. | [
"deadlockDetect",
"tries",
"to",
"find",
"a",
"deadlock",
"condition",
"in",
"the",
"current",
"set",
"of",
"waiting",
"acquirers",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/utils/locktab.go#L67-L83 |
160,841 | keybase/client | go/chat/utils/locktab.go | Acquire | func (c *ConversationLockTab) Acquire(ctx context.Context, uid gregor1.UID, convID chat1.ConversationID) (blocked bool, err error) {
sleep := 200 * time.Millisecond
for i := 0; i < c.maxAcquireRetries; i++ {
blocked, err = c.doAcquire(ctx, uid, convID)
if err != nil {
if err != ErrConvLockTabDeadlock {
return true, err
}
c.Debug(ctx, "Acquire: deadlock condition detected, sleeping and trying again: attempt: %d", i)
time.Sleep(sleep)
continue
}
return blocked, nil
}
c.Debug(ctx, "Acquire: giving up, max attempts reached")
return true, ErrConvLockTabDeadlock
} | go | func (c *ConversationLockTab) Acquire(ctx context.Context, uid gregor1.UID, convID chat1.ConversationID) (blocked bool, err error) {
sleep := 200 * time.Millisecond
for i := 0; i < c.maxAcquireRetries; i++ {
blocked, err = c.doAcquire(ctx, uid, convID)
if err != nil {
if err != ErrConvLockTabDeadlock {
return true, err
}
c.Debug(ctx, "Acquire: deadlock condition detected, sleeping and trying again: attempt: %d", i)
time.Sleep(sleep)
continue
}
return blocked, nil
}
c.Debug(ctx, "Acquire: giving up, max attempts reached")
return true, ErrConvLockTabDeadlock
} | [
"func",
"(",
"c",
"*",
"ConversationLockTab",
")",
"Acquire",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"gregor1",
".",
"UID",
",",
"convID",
"chat1",
".",
"ConversationID",
")",
"(",
"blocked",
"bool",
",",
"err",
"error",
")",
"{",
"sleep",
":=",
"200",
"*",
"time",
".",
"Millisecond",
"\n",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"c",
".",
"maxAcquireRetries",
";",
"i",
"++",
"{",
"blocked",
",",
"err",
"=",
"c",
".",
"doAcquire",
"(",
"ctx",
",",
"uid",
",",
"convID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"err",
"!=",
"ErrConvLockTabDeadlock",
"{",
"return",
"true",
",",
"err",
"\n",
"}",
"\n",
"c",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
",",
"i",
")",
"\n",
"time",
".",
"Sleep",
"(",
"sleep",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"return",
"blocked",
",",
"nil",
"\n",
"}",
"\n",
"c",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"return",
"true",
",",
"ErrConvLockTabDeadlock",
"\n",
"}"
] | // Acquire obtains a per user per conversation lock on a per trace basis. That is, the lock is a
// shared lock for the current chat trace, and serves to synchronize large chat operations. If there is
// no chat trace, this is a no-op. | [
"Acquire",
"obtains",
"a",
"per",
"user",
"per",
"conversation",
"lock",
"on",
"a",
"per",
"trace",
"basis",
".",
"That",
"is",
"the",
"lock",
"is",
"a",
"shared",
"lock",
"for",
"the",
"current",
"chat",
"trace",
"and",
"serves",
"to",
"synchronize",
"large",
"chat",
"operations",
".",
"If",
"there",
"is",
"no",
"chat",
"trace",
"this",
"is",
"a",
"no",
"-",
"op",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/utils/locktab.go#L138-L154 |
160,842 | keybase/client | go/chat/storage/storage_ephemeral_purge.go | EphemeralPurge | func (s *Storage) EphemeralPurge(ctx context.Context, convID chat1.ConversationID, uid gregor1.UID, purgeInfo *chat1.EphemeralPurgeInfo) (newPurgeInfo *chat1.EphemeralPurgeInfo, explodedMsgs []chat1.MessageUnboxed, err Error) {
defer s.Trace(ctx, func() error { return err }, "EphemeralPurge")()
lock := locks.StorageLockTab.AcquireOnName(ctx, s.G(), convID.String())
defer lock.Release(ctx)
if purgeInfo == nil {
return nil, nil, nil
}
// Fetch secret key
key, ierr := GetSecretBoxKey(ctx, s.G().ExternalG(), DefaultSecretUI)
if ierr != nil {
return nil, nil, MiscError{Msg: "unable to get secret key: " + ierr.Error()}
}
ctx, err = s.engine.Init(ctx, key, convID, uid)
if err != nil {
return nil, nil, err
}
maxMsgID, err := s.idtracker.getMaxMessageID(ctx, convID, uid)
if err != nil {
return nil, nil, err
}
// We don't care about holes.
maxHoles := int(maxMsgID-purgeInfo.MinUnexplodedID) + 1
var target int
if purgeInfo.MinUnexplodedID == 0 {
target = 0 // we need to traverse the whole conversation
} else {
target = maxHoles
}
rc := NewHoleyResultCollector(maxHoles, NewSimpleResultCollector(target))
err = s.engine.ReadMessages(ctx, rc, convID, uid, maxMsgID, 0)
switch err.(type) {
case nil:
// ok
if len(rc.Result()) == 0 {
err := s.ephemeralTracker.inactivatePurgeInfo(ctx, convID, uid)
return nil, nil, err
}
case MissError:
s.Debug(ctx, "record-only ephemeralTracker: no local messages")
// We don't have these messages in cache, so don't retry this
// conversation until further notice.
err := s.ephemeralTracker.inactivatePurgeInfo(ctx, convID, uid)
return nil, nil, err
default:
return nil, nil, err
}
newPurgeInfo, explodedMsgs, err = s.ephemeralPurgeHelper(ctx, convID, uid, rc.Result())
if err != nil {
return nil, nil, err
}
err = s.ephemeralTracker.setPurgeInfo(ctx, convID, uid, newPurgeInfo)
return newPurgeInfo, explodedMsgs, err
} | go | func (s *Storage) EphemeralPurge(ctx context.Context, convID chat1.ConversationID, uid gregor1.UID, purgeInfo *chat1.EphemeralPurgeInfo) (newPurgeInfo *chat1.EphemeralPurgeInfo, explodedMsgs []chat1.MessageUnboxed, err Error) {
defer s.Trace(ctx, func() error { return err }, "EphemeralPurge")()
lock := locks.StorageLockTab.AcquireOnName(ctx, s.G(), convID.String())
defer lock.Release(ctx)
if purgeInfo == nil {
return nil, nil, nil
}
// Fetch secret key
key, ierr := GetSecretBoxKey(ctx, s.G().ExternalG(), DefaultSecretUI)
if ierr != nil {
return nil, nil, MiscError{Msg: "unable to get secret key: " + ierr.Error()}
}
ctx, err = s.engine.Init(ctx, key, convID, uid)
if err != nil {
return nil, nil, err
}
maxMsgID, err := s.idtracker.getMaxMessageID(ctx, convID, uid)
if err != nil {
return nil, nil, err
}
// We don't care about holes.
maxHoles := int(maxMsgID-purgeInfo.MinUnexplodedID) + 1
var target int
if purgeInfo.MinUnexplodedID == 0 {
target = 0 // we need to traverse the whole conversation
} else {
target = maxHoles
}
rc := NewHoleyResultCollector(maxHoles, NewSimpleResultCollector(target))
err = s.engine.ReadMessages(ctx, rc, convID, uid, maxMsgID, 0)
switch err.(type) {
case nil:
// ok
if len(rc.Result()) == 0 {
err := s.ephemeralTracker.inactivatePurgeInfo(ctx, convID, uid)
return nil, nil, err
}
case MissError:
s.Debug(ctx, "record-only ephemeralTracker: no local messages")
// We don't have these messages in cache, so don't retry this
// conversation until further notice.
err := s.ephemeralTracker.inactivatePurgeInfo(ctx, convID, uid)
return nil, nil, err
default:
return nil, nil, err
}
newPurgeInfo, explodedMsgs, err = s.ephemeralPurgeHelper(ctx, convID, uid, rc.Result())
if err != nil {
return nil, nil, err
}
err = s.ephemeralTracker.setPurgeInfo(ctx, convID, uid, newPurgeInfo)
return newPurgeInfo, explodedMsgs, err
} | [
"func",
"(",
"s",
"*",
"Storage",
")",
"EphemeralPurge",
"(",
"ctx",
"context",
".",
"Context",
",",
"convID",
"chat1",
".",
"ConversationID",
",",
"uid",
"gregor1",
".",
"UID",
",",
"purgeInfo",
"*",
"chat1",
".",
"EphemeralPurgeInfo",
")",
"(",
"newPurgeInfo",
"*",
"chat1",
".",
"EphemeralPurgeInfo",
",",
"explodedMsgs",
"[",
"]",
"chat1",
".",
"MessageUnboxed",
",",
"err",
"Error",
")",
"{",
"defer",
"s",
".",
"Trace",
"(",
"ctx",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
",",
"\"",
"\"",
")",
"(",
")",
"\n",
"lock",
":=",
"locks",
".",
"StorageLockTab",
".",
"AcquireOnName",
"(",
"ctx",
",",
"s",
".",
"G",
"(",
")",
",",
"convID",
".",
"String",
"(",
")",
")",
"\n",
"defer",
"lock",
".",
"Release",
"(",
"ctx",
")",
"\n\n",
"if",
"purgeInfo",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"// Fetch secret key",
"key",
",",
"ierr",
":=",
"GetSecretBoxKey",
"(",
"ctx",
",",
"s",
".",
"G",
"(",
")",
".",
"ExternalG",
"(",
")",
",",
"DefaultSecretUI",
")",
"\n",
"if",
"ierr",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"MiscError",
"{",
"Msg",
":",
"\"",
"\"",
"+",
"ierr",
".",
"Error",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"ctx",
",",
"err",
"=",
"s",
".",
"engine",
".",
"Init",
"(",
"ctx",
",",
"key",
",",
"convID",
",",
"uid",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"maxMsgID",
",",
"err",
":=",
"s",
".",
"idtracker",
".",
"getMaxMessageID",
"(",
"ctx",
",",
"convID",
",",
"uid",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// We don't care about holes.",
"maxHoles",
":=",
"int",
"(",
"maxMsgID",
"-",
"purgeInfo",
".",
"MinUnexplodedID",
")",
"+",
"1",
"\n",
"var",
"target",
"int",
"\n",
"if",
"purgeInfo",
".",
"MinUnexplodedID",
"==",
"0",
"{",
"target",
"=",
"0",
"// we need to traverse the whole conversation",
"\n",
"}",
"else",
"{",
"target",
"=",
"maxHoles",
"\n",
"}",
"\n",
"rc",
":=",
"NewHoleyResultCollector",
"(",
"maxHoles",
",",
"NewSimpleResultCollector",
"(",
"target",
")",
")",
"\n",
"err",
"=",
"s",
".",
"engine",
".",
"ReadMessages",
"(",
"ctx",
",",
"rc",
",",
"convID",
",",
"uid",
",",
"maxMsgID",
",",
"0",
")",
"\n",
"switch",
"err",
".",
"(",
"type",
")",
"{",
"case",
"nil",
":",
"// ok",
"if",
"len",
"(",
"rc",
".",
"Result",
"(",
")",
")",
"==",
"0",
"{",
"err",
":=",
"s",
".",
"ephemeralTracker",
".",
"inactivatePurgeInfo",
"(",
"ctx",
",",
"convID",
",",
"uid",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"case",
"MissError",
":",
"s",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"// We don't have these messages in cache, so don't retry this",
"// conversation until further notice.",
"err",
":=",
"s",
".",
"ephemeralTracker",
".",
"inactivatePurgeInfo",
"(",
"ctx",
",",
"convID",
",",
"uid",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"default",
":",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"newPurgeInfo",
",",
"explodedMsgs",
",",
"err",
"=",
"s",
".",
"ephemeralPurgeHelper",
"(",
"ctx",
",",
"convID",
",",
"uid",
",",
"rc",
".",
"Result",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"err",
"=",
"s",
".",
"ephemeralTracker",
".",
"setPurgeInfo",
"(",
"ctx",
",",
"convID",
",",
"uid",
",",
"newPurgeInfo",
")",
"\n",
"return",
"newPurgeInfo",
",",
"explodedMsgs",
",",
"err",
"\n",
"}"
] | // For a given conversation, purge all ephemeral messages from
// purgeInfo.MinUnexplodedID to the present, updating bookkeeping for the next
// time we need to purge this conv. | [
"For",
"a",
"given",
"conversation",
"purge",
"all",
"ephemeral",
"messages",
"from",
"purgeInfo",
".",
"MinUnexplodedID",
"to",
"the",
"present",
"updating",
"bookkeeping",
"for",
"the",
"next",
"time",
"we",
"need",
"to",
"purge",
"this",
"conv",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/storage/storage_ephemeral_purge.go#L19-L76 |
160,843 | keybase/client | go/protocol/gregor1/extras.go | UIDListMerge | func UIDListMerge(list1 []UID, list2 []UID) []UID {
m := make(map[string]UID)
for _, uid := range list1 {
m[uid.String()] = uid
}
for _, uid := range list2 {
m[uid.String()] = uid
}
res := make([]UID, 0)
for _, uid := range m {
res = append(res, uid)
}
return res
} | go | func UIDListMerge(list1 []UID, list2 []UID) []UID {
m := make(map[string]UID)
for _, uid := range list1 {
m[uid.String()] = uid
}
for _, uid := range list2 {
m[uid.String()] = uid
}
res := make([]UID, 0)
for _, uid := range m {
res = append(res, uid)
}
return res
} | [
"func",
"UIDListMerge",
"(",
"list1",
"[",
"]",
"UID",
",",
"list2",
"[",
"]",
"UID",
")",
"[",
"]",
"UID",
"{",
"m",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"UID",
")",
"\n",
"for",
"_",
",",
"uid",
":=",
"range",
"list1",
"{",
"m",
"[",
"uid",
".",
"String",
"(",
")",
"]",
"=",
"uid",
"\n",
"}",
"\n",
"for",
"_",
",",
"uid",
":=",
"range",
"list2",
"{",
"m",
"[",
"uid",
".",
"String",
"(",
")",
"]",
"=",
"uid",
"\n",
"}",
"\n",
"res",
":=",
"make",
"(",
"[",
"]",
"UID",
",",
"0",
")",
"\n",
"for",
"_",
",",
"uid",
":=",
"range",
"m",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"uid",
")",
"\n",
"}",
"\n",
"return",
"res",
"\n",
"}"
] | // Merge two lists of UIDs. Duplicates will be dropped. Not stably ordered. | [
"Merge",
"two",
"lists",
"of",
"UIDs",
".",
"Duplicates",
"will",
"be",
"dropped",
".",
"Not",
"stably",
"ordered",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/gregor1/extras.go#L492-L505 |
160,844 | keybase/client | go/kbfs/tlfhandle/resolve.go | ResolveAgain | func (h *Handle) ResolveAgain(
ctx context.Context, resolver idutil.Resolver, idGetter IDGetter,
osg idutil.OfflineStatusGetter) (*Handle, error) {
if h.IsFinal() {
// Don't attempt to further resolve final handles.
return h, nil
}
return h.ResolveAgainForUser(
ctx, resolver, idGetter, osg, keybase1.UID(""))
} | go | func (h *Handle) ResolveAgain(
ctx context.Context, resolver idutil.Resolver, idGetter IDGetter,
osg idutil.OfflineStatusGetter) (*Handle, error) {
if h.IsFinal() {
// Don't attempt to further resolve final handles.
return h, nil
}
return h.ResolveAgainForUser(
ctx, resolver, idGetter, osg, keybase1.UID(""))
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"ResolveAgain",
"(",
"ctx",
"context",
".",
"Context",
",",
"resolver",
"idutil",
".",
"Resolver",
",",
"idGetter",
"IDGetter",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
")",
"(",
"*",
"Handle",
",",
"error",
")",
"{",
"if",
"h",
".",
"IsFinal",
"(",
")",
"{",
"// Don't attempt to further resolve final handles.",
"return",
"h",
",",
"nil",
"\n",
"}",
"\n",
"return",
"h",
".",
"ResolveAgainForUser",
"(",
"ctx",
",",
"resolver",
",",
"idGetter",
",",
"osg",
",",
"keybase1",
".",
"UID",
"(",
"\"",
"\"",
")",
")",
"\n",
"}"
] | // ResolveAgain tries to resolve any unresolved assertions in the
// given handle and returns a new handle with the results. As an
// optimization, if h contains no unresolved assertions, it just
// returns itself. | [
"ResolveAgain",
"tries",
"to",
"resolve",
"any",
"unresolved",
"assertions",
"in",
"the",
"given",
"handle",
"and",
"returns",
"a",
"new",
"handle",
"with",
"the",
"results",
".",
"As",
"an",
"optimization",
"if",
"h",
"contains",
"no",
"unresolved",
"assertions",
"it",
"just",
"returns",
"itself",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/resolve.go#L433-L442 |
160,845 | keybase/client | go/kbfs/tlfhandle/resolve.go | ResolvesTo | func (h Handle) ResolvesTo(
ctx context.Context, codec kbfscodec.Codec, resolver idutil.Resolver,
idGetter IDGetter, osg idutil.OfflineStatusGetter, other Handle) (
resolvesTo bool, partialResolvedH *Handle, err error) {
// Check the conflict extension.
var conflictAdded, finalizedAdded bool
if !h.IsConflict() && other.IsConflict() {
conflictAdded = true
// Ignore the added extension for resolution comparison purposes.
other.conflictInfo = nil
}
// Check the finalized extension.
if h.IsFinal() {
if conflictAdded {
// Can't add conflict info to a finalized handle.
return false, nil, HandleFinalizedError{}
}
} else if other.IsFinal() {
finalizedAdded = true
// Ignore the added extension for resolution comparison purposes.
other.finalizedInfo = nil
}
if h.TypeForKeying() == tlf.TeamKeying {
// Nothing to resolve for team-based TLFs, just use `other` by
// itself.
partialResolvedH = other.DeepCopy()
} else {
unresolvedAssertions := make(map[string]bool)
for _, uw := range other.unresolvedWriters {
unresolvedAssertions[uw.String()] = true
}
for _, ur := range other.unresolvedReaders {
unresolvedAssertions[ur.String()] = true
}
// TODO: Once we keep track of the original assertions in
// Handle, restrict the resolver to use other's assertions
// only, so that we don't hit the network at all.
partialResolvedH, err = h.ResolveAgain(
ctx, partialResolver{resolver, unresolvedAssertions}, idGetter,
osg)
if err != nil {
return false, nil, err
}
// If we're migrating, use the partially-resolved handle's
// list of writers, readers, and conflict info, rather than
// explicitly checking team membership. This is assuming that
// we've already validated the migrating folder's name against
// the user list in the current MD head (done via
// `MDOps.GetIDForHandle()`).
if other.TypeForKeying() == tlf.TeamKeying {
if h.IsFinal() {
return false, nil,
errors.New("Can't migrate a finalized folder")
}
other.resolvedWriters = partialResolvedH.resolvedWriters
other.resolvedReaders = partialResolvedH.resolvedReaders
other.unresolvedWriters = partialResolvedH.unresolvedWriters
other.unresolvedReaders = partialResolvedH.unresolvedReaders
other.conflictInfo = partialResolvedH.conflictInfo
}
}
if conflictAdded || finalizedAdded {
resolvesTo, err = partialResolvedH.EqualsIgnoreName(codec, other)
} else {
resolvesTo, err = partialResolvedH.Equals(codec, other)
}
if err != nil {
return false, nil, err
}
return resolvesTo, partialResolvedH, nil
} | go | func (h Handle) ResolvesTo(
ctx context.Context, codec kbfscodec.Codec, resolver idutil.Resolver,
idGetter IDGetter, osg idutil.OfflineStatusGetter, other Handle) (
resolvesTo bool, partialResolvedH *Handle, err error) {
// Check the conflict extension.
var conflictAdded, finalizedAdded bool
if !h.IsConflict() && other.IsConflict() {
conflictAdded = true
// Ignore the added extension for resolution comparison purposes.
other.conflictInfo = nil
}
// Check the finalized extension.
if h.IsFinal() {
if conflictAdded {
// Can't add conflict info to a finalized handle.
return false, nil, HandleFinalizedError{}
}
} else if other.IsFinal() {
finalizedAdded = true
// Ignore the added extension for resolution comparison purposes.
other.finalizedInfo = nil
}
if h.TypeForKeying() == tlf.TeamKeying {
// Nothing to resolve for team-based TLFs, just use `other` by
// itself.
partialResolvedH = other.DeepCopy()
} else {
unresolvedAssertions := make(map[string]bool)
for _, uw := range other.unresolvedWriters {
unresolvedAssertions[uw.String()] = true
}
for _, ur := range other.unresolvedReaders {
unresolvedAssertions[ur.String()] = true
}
// TODO: Once we keep track of the original assertions in
// Handle, restrict the resolver to use other's assertions
// only, so that we don't hit the network at all.
partialResolvedH, err = h.ResolveAgain(
ctx, partialResolver{resolver, unresolvedAssertions}, idGetter,
osg)
if err != nil {
return false, nil, err
}
// If we're migrating, use the partially-resolved handle's
// list of writers, readers, and conflict info, rather than
// explicitly checking team membership. This is assuming that
// we've already validated the migrating folder's name against
// the user list in the current MD head (done via
// `MDOps.GetIDForHandle()`).
if other.TypeForKeying() == tlf.TeamKeying {
if h.IsFinal() {
return false, nil,
errors.New("Can't migrate a finalized folder")
}
other.resolvedWriters = partialResolvedH.resolvedWriters
other.resolvedReaders = partialResolvedH.resolvedReaders
other.unresolvedWriters = partialResolvedH.unresolvedWriters
other.unresolvedReaders = partialResolvedH.unresolvedReaders
other.conflictInfo = partialResolvedH.conflictInfo
}
}
if conflictAdded || finalizedAdded {
resolvesTo, err = partialResolvedH.EqualsIgnoreName(codec, other)
} else {
resolvesTo, err = partialResolvedH.Equals(codec, other)
}
if err != nil {
return false, nil, err
}
return resolvesTo, partialResolvedH, nil
} | [
"func",
"(",
"h",
"Handle",
")",
"ResolvesTo",
"(",
"ctx",
"context",
".",
"Context",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"resolver",
"idutil",
".",
"Resolver",
",",
"idGetter",
"IDGetter",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"other",
"Handle",
")",
"(",
"resolvesTo",
"bool",
",",
"partialResolvedH",
"*",
"Handle",
",",
"err",
"error",
")",
"{",
"// Check the conflict extension.",
"var",
"conflictAdded",
",",
"finalizedAdded",
"bool",
"\n",
"if",
"!",
"h",
".",
"IsConflict",
"(",
")",
"&&",
"other",
".",
"IsConflict",
"(",
")",
"{",
"conflictAdded",
"=",
"true",
"\n",
"// Ignore the added extension for resolution comparison purposes.",
"other",
".",
"conflictInfo",
"=",
"nil",
"\n",
"}",
"\n\n",
"// Check the finalized extension.",
"if",
"h",
".",
"IsFinal",
"(",
")",
"{",
"if",
"conflictAdded",
"{",
"// Can't add conflict info to a finalized handle.",
"return",
"false",
",",
"nil",
",",
"HandleFinalizedError",
"{",
"}",
"\n",
"}",
"\n",
"}",
"else",
"if",
"other",
".",
"IsFinal",
"(",
")",
"{",
"finalizedAdded",
"=",
"true",
"\n",
"// Ignore the added extension for resolution comparison purposes.",
"other",
".",
"finalizedInfo",
"=",
"nil",
"\n",
"}",
"\n\n",
"if",
"h",
".",
"TypeForKeying",
"(",
")",
"==",
"tlf",
".",
"TeamKeying",
"{",
"// Nothing to resolve for team-based TLFs, just use `other` by",
"// itself.",
"partialResolvedH",
"=",
"other",
".",
"DeepCopy",
"(",
")",
"\n",
"}",
"else",
"{",
"unresolvedAssertions",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"bool",
")",
"\n",
"for",
"_",
",",
"uw",
":=",
"range",
"other",
".",
"unresolvedWriters",
"{",
"unresolvedAssertions",
"[",
"uw",
".",
"String",
"(",
")",
"]",
"=",
"true",
"\n",
"}",
"\n",
"for",
"_",
",",
"ur",
":=",
"range",
"other",
".",
"unresolvedReaders",
"{",
"unresolvedAssertions",
"[",
"ur",
".",
"String",
"(",
")",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"// TODO: Once we keep track of the original assertions in",
"// Handle, restrict the resolver to use other's assertions",
"// only, so that we don't hit the network at all.",
"partialResolvedH",
",",
"err",
"=",
"h",
".",
"ResolveAgain",
"(",
"ctx",
",",
"partialResolver",
"{",
"resolver",
",",
"unresolvedAssertions",
"}",
",",
"idGetter",
",",
"osg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// If we're migrating, use the partially-resolved handle's",
"// list of writers, readers, and conflict info, rather than",
"// explicitly checking team membership. This is assuming that",
"// we've already validated the migrating folder's name against",
"// the user list in the current MD head (done via",
"// `MDOps.GetIDForHandle()`).",
"if",
"other",
".",
"TypeForKeying",
"(",
")",
"==",
"tlf",
".",
"TeamKeying",
"{",
"if",
"h",
".",
"IsFinal",
"(",
")",
"{",
"return",
"false",
",",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"other",
".",
"resolvedWriters",
"=",
"partialResolvedH",
".",
"resolvedWriters",
"\n",
"other",
".",
"resolvedReaders",
"=",
"partialResolvedH",
".",
"resolvedReaders",
"\n",
"other",
".",
"unresolvedWriters",
"=",
"partialResolvedH",
".",
"unresolvedWriters",
"\n",
"other",
".",
"unresolvedReaders",
"=",
"partialResolvedH",
".",
"unresolvedReaders",
"\n",
"other",
".",
"conflictInfo",
"=",
"partialResolvedH",
".",
"conflictInfo",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"conflictAdded",
"||",
"finalizedAdded",
"{",
"resolvesTo",
",",
"err",
"=",
"partialResolvedH",
".",
"EqualsIgnoreName",
"(",
"codec",
",",
"other",
")",
"\n",
"}",
"else",
"{",
"resolvesTo",
",",
"err",
"=",
"partialResolvedH",
".",
"Equals",
"(",
"codec",
",",
"other",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"resolvesTo",
",",
"partialResolvedH",
",",
"nil",
"\n",
"}"
] | // ResolvesTo returns whether this handle resolves to the given one.
// It also returns the partially-resolved version of h, i.e. h
// resolved except for unresolved assertions in other; this should
// equal other if and only if true is returned. | [
"ResolvesTo",
"returns",
"whether",
"this",
"handle",
"resolves",
"to",
"the",
"given",
"one",
".",
"It",
"also",
"returns",
"the",
"partially",
"-",
"resolved",
"version",
"of",
"h",
"i",
".",
"e",
".",
"h",
"resolved",
"except",
"for",
"unresolved",
"assertions",
"in",
"other",
";",
"this",
"should",
"equal",
"other",
"if",
"and",
"only",
"if",
"true",
"is",
"returned",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/resolve.go#L465-L542 |
160,846 | keybase/client | go/kbfs/tlfhandle/resolve.go | MutuallyResolvesTo | func (h Handle) MutuallyResolvesTo(
ctx context.Context, codec kbfscodec.Codec,
resolver idutil.Resolver, idGetter IDGetter,
osg idutil.OfflineStatusGetter, other Handle, rev kbfsmd.Revision,
tlfID tlf.ID, log logger.Logger) error {
handleResolvesToOther, partialResolvedHandle, err :=
h.ResolvesTo(ctx, codec, resolver, idGetter, osg, other)
if err != nil {
return err
}
// TODO: If h has conflict info, other should, too.
otherResolvesToHandle, partialResolvedOther, err :=
other.ResolvesTo(ctx, codec, resolver, idGetter, osg, h)
if err != nil {
return err
}
handlePath := h.GetCanonicalPath()
otherPath := other.GetCanonicalPath()
if !handleResolvesToOther && !otherResolvesToHandle {
return HandleMismatchError{
rev, h.GetCanonicalPath(), tlfID,
fmt.Errorf(
"MD contained unexpected handle path %s (%s -> %s) (%s -> %s)",
otherPath,
h.GetCanonicalPath(),
partialResolvedHandle.GetCanonicalPath(),
other.GetCanonicalPath(),
partialResolvedOther.GetCanonicalPath()),
}
}
if handlePath != otherPath {
log.CDebugf(ctx, "handle for %s resolved to %s",
handlePath, otherPath)
}
return nil
} | go | func (h Handle) MutuallyResolvesTo(
ctx context.Context, codec kbfscodec.Codec,
resolver idutil.Resolver, idGetter IDGetter,
osg idutil.OfflineStatusGetter, other Handle, rev kbfsmd.Revision,
tlfID tlf.ID, log logger.Logger) error {
handleResolvesToOther, partialResolvedHandle, err :=
h.ResolvesTo(ctx, codec, resolver, idGetter, osg, other)
if err != nil {
return err
}
// TODO: If h has conflict info, other should, too.
otherResolvesToHandle, partialResolvedOther, err :=
other.ResolvesTo(ctx, codec, resolver, idGetter, osg, h)
if err != nil {
return err
}
handlePath := h.GetCanonicalPath()
otherPath := other.GetCanonicalPath()
if !handleResolvesToOther && !otherResolvesToHandle {
return HandleMismatchError{
rev, h.GetCanonicalPath(), tlfID,
fmt.Errorf(
"MD contained unexpected handle path %s (%s -> %s) (%s -> %s)",
otherPath,
h.GetCanonicalPath(),
partialResolvedHandle.GetCanonicalPath(),
other.GetCanonicalPath(),
partialResolvedOther.GetCanonicalPath()),
}
}
if handlePath != otherPath {
log.CDebugf(ctx, "handle for %s resolved to %s",
handlePath, otherPath)
}
return nil
} | [
"func",
"(",
"h",
"Handle",
")",
"MutuallyResolvesTo",
"(",
"ctx",
"context",
".",
"Context",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"resolver",
"idutil",
".",
"Resolver",
",",
"idGetter",
"IDGetter",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"other",
"Handle",
",",
"rev",
"kbfsmd",
".",
"Revision",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"log",
"logger",
".",
"Logger",
")",
"error",
"{",
"handleResolvesToOther",
",",
"partialResolvedHandle",
",",
"err",
":=",
"h",
".",
"ResolvesTo",
"(",
"ctx",
",",
"codec",
",",
"resolver",
",",
"idGetter",
",",
"osg",
",",
"other",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// TODO: If h has conflict info, other should, too.",
"otherResolvesToHandle",
",",
"partialResolvedOther",
",",
"err",
":=",
"other",
".",
"ResolvesTo",
"(",
"ctx",
",",
"codec",
",",
"resolver",
",",
"idGetter",
",",
"osg",
",",
"h",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"handlePath",
":=",
"h",
".",
"GetCanonicalPath",
"(",
")",
"\n",
"otherPath",
":=",
"other",
".",
"GetCanonicalPath",
"(",
")",
"\n",
"if",
"!",
"handleResolvesToOther",
"&&",
"!",
"otherResolvesToHandle",
"{",
"return",
"HandleMismatchError",
"{",
"rev",
",",
"h",
".",
"GetCanonicalPath",
"(",
")",
",",
"tlfID",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"otherPath",
",",
"h",
".",
"GetCanonicalPath",
"(",
")",
",",
"partialResolvedHandle",
".",
"GetCanonicalPath",
"(",
")",
",",
"other",
".",
"GetCanonicalPath",
"(",
")",
",",
"partialResolvedOther",
".",
"GetCanonicalPath",
"(",
")",
")",
",",
"}",
"\n",
"}",
"\n\n",
"if",
"handlePath",
"!=",
"otherPath",
"{",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"handlePath",
",",
"otherPath",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // MutuallyResolvesTo checks that the target handle, and the provided
// `other` handle, resolve to each other. | [
"MutuallyResolvesTo",
"checks",
"that",
"the",
"target",
"handle",
"and",
"the",
"provided",
"other",
"handle",
"resolve",
"to",
"each",
"other",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/resolve.go#L546-L584 |
160,847 | keybase/client | go/kbfs/tlfhandle/resolve.go | ResolveImplicitTeam | func (nitk noImplicitTeamKBPKI) ResolveImplicitTeam(
_ context.Context, _, _ string, _ tlf.Type,
_ keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) {
return idutil.ImplicitTeamInfo{},
errors.New("Skipping implicit team lookup for quick handle parsing")
} | go | func (nitk noImplicitTeamKBPKI) ResolveImplicitTeam(
_ context.Context, _, _ string, _ tlf.Type,
_ keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) {
return idutil.ImplicitTeamInfo{},
errors.New("Skipping implicit team lookup for quick handle parsing")
} | [
"func",
"(",
"nitk",
"noImplicitTeamKBPKI",
")",
"ResolveImplicitTeam",
"(",
"_",
"context",
".",
"Context",
",",
"_",
",",
"_",
"string",
",",
"_",
"tlf",
".",
"Type",
",",
"_",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"idutil",
".",
"ImplicitTeamInfo",
",",
"error",
")",
"{",
"return",
"idutil",
".",
"ImplicitTeamInfo",
"{",
"}",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // ResolveImplicitTeam implements the KBPKI interface for noImplicitTeamKBPKI. | [
"ResolveImplicitTeam",
"implements",
"the",
"KBPKI",
"interface",
"for",
"noImplicitTeamKBPKI",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/resolve.go#L987-L992 |
160,848 | keybase/client | go/kbfs/tlfhandle/resolve.go | ParseHandlePreferredQuick | func ParseHandlePreferredQuick(
ctx context.Context, kbpki idutil.KBPKI, osg idutil.OfflineStatusGetter,
name string, ty tlf.Type) (handle *Handle, err error) {
// Override the KBPKI with one that doesn't try to resolve
// implicit teams.
kbpki = noImplicitTeamKBPKI{kbpki}
return ParseHandlePreferred(ctx, kbpki, nil, osg, name, ty)
} | go | func ParseHandlePreferredQuick(
ctx context.Context, kbpki idutil.KBPKI, osg idutil.OfflineStatusGetter,
name string, ty tlf.Type) (handle *Handle, err error) {
// Override the KBPKI with one that doesn't try to resolve
// implicit teams.
kbpki = noImplicitTeamKBPKI{kbpki}
return ParseHandlePreferred(ctx, kbpki, nil, osg, name, ty)
} | [
"func",
"ParseHandlePreferredQuick",
"(",
"ctx",
"context",
".",
"Context",
",",
"kbpki",
"idutil",
".",
"KBPKI",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"name",
"string",
",",
"ty",
"tlf",
".",
"Type",
")",
"(",
"handle",
"*",
"Handle",
",",
"err",
"error",
")",
"{",
"// Override the KBPKI with one that doesn't try to resolve",
"// implicit teams.",
"kbpki",
"=",
"noImplicitTeamKBPKI",
"{",
"kbpki",
"}",
"\n",
"return",
"ParseHandlePreferred",
"(",
"ctx",
",",
"kbpki",
",",
"nil",
",",
"osg",
",",
"name",
",",
"ty",
")",
"\n",
"}"
] | // ParseHandlePreferredQuick parses a handle from a name, without
// doing this time consuming checks needed for implicit-team checking
// or TLF-ID-fetching. | [
"ParseHandlePreferredQuick",
"parses",
"a",
"handle",
"from",
"a",
"name",
"without",
"doing",
"this",
"time",
"consuming",
"checks",
"needed",
"for",
"implicit",
"-",
"team",
"checking",
"or",
"TLF",
"-",
"ID",
"-",
"fetching",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlfhandle/resolve.go#L997-L1004 |
160,849 | keybase/client | go/engine/login_load_user.go | newLoginLoadUser | func newLoginLoadUser(g *libkb.GlobalContext, username string) *loginLoadUser {
return &loginLoadUser{
Contextified: libkb.NewContextified(g),
username: strings.TrimSpace(username),
}
} | go | func newLoginLoadUser(g *libkb.GlobalContext, username string) *loginLoadUser {
return &loginLoadUser{
Contextified: libkb.NewContextified(g),
username: strings.TrimSpace(username),
}
} | [
"func",
"newLoginLoadUser",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"username",
"string",
")",
"*",
"loginLoadUser",
"{",
"return",
"&",
"loginLoadUser",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
",",
"username",
":",
"strings",
".",
"TrimSpace",
"(",
"username",
")",
",",
"}",
"\n",
"}"
] | // newLoginLoadUser creates a loginLoadUser engine. `username` argument is
// optional. | [
"newLoginLoadUser",
"creates",
"a",
"loginLoadUser",
"engine",
".",
"username",
"argument",
"is",
"optional",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/login_load_user.go#L27-L32 |
160,850 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSListRecursive | func (c SimpleFSClient) SimpleFSListRecursive(ctx context.Context, __arg SimpleFSListRecursiveArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSListRecursive", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSListRecursive(ctx context.Context, __arg SimpleFSListRecursiveArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSListRecursive", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSListRecursive",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSListRecursiveArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Begin recursive list of items in directory at path.
// If `refreshSubscription` is true and the path is a KBFS path, simpleFS
// will begin sending `FSPathUpdated` notifications for the for the
// corresponding TLF, until another call refreshes the subscription on a
// different TLF. | [
"Begin",
"recursive",
"list",
"of",
"items",
"in",
"directory",
"at",
"path",
".",
"If",
"refreshSubscription",
"is",
"true",
"and",
"the",
"path",
"is",
"a",
"KBFS",
"path",
"simpleFS",
"will",
"begin",
"sending",
"FSPathUpdated",
"notifications",
"for",
"the",
"for",
"the",
"corresponding",
"TLF",
"until",
"another",
"call",
"refreshes",
"the",
"subscription",
"on",
"a",
"different",
"TLF",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2068-L2071 |
160,851 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSListRecursiveToDepth | func (c SimpleFSClient) SimpleFSListRecursiveToDepth(ctx context.Context, __arg SimpleFSListRecursiveToDepthArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSListRecursiveToDepth", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSListRecursiveToDepth(ctx context.Context, __arg SimpleFSListRecursiveToDepthArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSListRecursiveToDepth", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSListRecursiveToDepth",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSListRecursiveToDepthArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Begin recursive list of items in directory at path up to a given depth | [
"Begin",
"recursive",
"list",
"of",
"items",
"in",
"directory",
"at",
"path",
"up",
"to",
"a",
"given",
"depth"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2074-L2077 |
160,852 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSReadList | func (c SimpleFSClient) SimpleFSReadList(ctx context.Context, opID OpID) (res SimpleFSListResult, err error) {
__arg := SimpleFSReadListArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSReadList", []interface{}{__arg}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSReadList(ctx context.Context, opID OpID) (res SimpleFSListResult, err error) {
__arg := SimpleFSReadListArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSReadList", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSReadList",
"(",
"ctx",
"context",
".",
"Context",
",",
"opID",
"OpID",
")",
"(",
"res",
"SimpleFSListResult",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSReadListArg",
"{",
"OpID",
":",
"opID",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Get list of Paths in progress. Can indicate status of pending
// to get more entries. | [
"Get",
"list",
"of",
"Paths",
"in",
"progress",
".",
"Can",
"indicate",
"status",
"of",
"pending",
"to",
"get",
"more",
"entries",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2081-L2085 |
160,853 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSCopy | func (c SimpleFSClient) SimpleFSCopy(ctx context.Context, __arg SimpleFSCopyArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCopy", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSCopy(ctx context.Context, __arg SimpleFSCopyArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCopy", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSCopy",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSCopyArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Begin copy of file or directory | [
"Begin",
"copy",
"of",
"file",
"or",
"directory"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2088-L2091 |
160,854 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSSymlink | func (c SimpleFSClient) SimpleFSSymlink(ctx context.Context, __arg SimpleFSSymlinkArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSSymlink", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSSymlink(ctx context.Context, __arg SimpleFSSymlinkArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSSymlink", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSSymlink",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSSymlinkArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Make a symlink of file or directory | [
"Make",
"a",
"symlink",
"of",
"file",
"or",
"directory"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2094-L2097 |
160,855 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSCopyRecursive | func (c SimpleFSClient) SimpleFSCopyRecursive(ctx context.Context, __arg SimpleFSCopyRecursiveArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCopyRecursive", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSCopyRecursive(ctx context.Context, __arg SimpleFSCopyRecursiveArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCopyRecursive", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSCopyRecursive",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSCopyRecursiveArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Begin recursive copy of directory | [
"Begin",
"recursive",
"copy",
"of",
"directory"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2100-L2103 |
160,856 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSRename | func (c SimpleFSClient) SimpleFSRename(ctx context.Context, __arg SimpleFSRenameArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSRename", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSRename(ctx context.Context, __arg SimpleFSRenameArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSRename", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSRename",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSRenameArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Rename file or directory, KBFS side only | [
"Rename",
"file",
"or",
"directory",
"KBFS",
"side",
"only"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2112-L2115 |
160,857 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSWrite | func (c SimpleFSClient) SimpleFSWrite(ctx context.Context, __arg SimpleFSWriteArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSWrite", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSWrite(ctx context.Context, __arg SimpleFSWriteArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSWrite", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSWrite",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSWriteArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Append content to opened file.
// May be repeated until OpID is closed. | [
"Append",
"content",
"to",
"opened",
"file",
".",
"May",
"be",
"repeated",
"until",
"OpID",
"is",
"closed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2142-L2145 |
160,858 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSRemove | func (c SimpleFSClient) SimpleFSRemove(ctx context.Context, __arg SimpleFSRemoveArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSRemove", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSRemove(ctx context.Context, __arg SimpleFSRemoveArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSRemove", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSRemove",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSRemoveArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Remove file or directory from filesystem | [
"Remove",
"file",
"or",
"directory",
"from",
"filesystem"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2148-L2151 |
160,859 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSStat | func (c SimpleFSClient) SimpleFSStat(ctx context.Context, __arg SimpleFSStatArg) (res Dirent, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSStat", []interface{}{__arg}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSStat(ctx context.Context, __arg SimpleFSStatArg) (res Dirent, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSStat", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSStat",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSStatArg",
")",
"(",
"res",
"Dirent",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Get info about file | [
"Get",
"info",
"about",
"file"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2154-L2157 |
160,860 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSGetRevisions | func (c SimpleFSClient) SimpleFSGetRevisions(ctx context.Context, __arg SimpleFSGetRevisionsArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetRevisions", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSGetRevisions(ctx context.Context, __arg SimpleFSGetRevisionsArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetRevisions", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSGetRevisions",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SimpleFSGetRevisionsArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Get revision info for a directory entry | [
"Get",
"revision",
"info",
"for",
"a",
"directory",
"entry"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2160-L2163 |
160,861 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSReadRevisions | func (c SimpleFSClient) SimpleFSReadRevisions(ctx context.Context, opID OpID) (res GetRevisionsResult, err error) {
__arg := SimpleFSReadRevisionsArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSReadRevisions", []interface{}{__arg}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSReadRevisions(ctx context.Context, opID OpID) (res GetRevisionsResult, err error) {
__arg := SimpleFSReadRevisionsArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSReadRevisions", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSReadRevisions",
"(",
"ctx",
"context",
".",
"Context",
",",
"opID",
"OpID",
")",
"(",
"res",
"GetRevisionsResult",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSReadRevisionsArg",
"{",
"OpID",
":",
"opID",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Get list of revisions in progress. Can indicate status of pending
// to get more revisions. | [
"Get",
"list",
"of",
"revisions",
"in",
"progress",
".",
"Can",
"indicate",
"status",
"of",
"pending",
"to",
"get",
"more",
"revisions",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2167-L2171 |
160,862 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSMakeOpid | func (c SimpleFSClient) SimpleFSMakeOpid(ctx context.Context) (res OpID, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSMakeOpid", []interface{}{SimpleFSMakeOpidArg{}}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSMakeOpid(ctx context.Context) (res OpID, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSMakeOpid", []interface{}{SimpleFSMakeOpidArg{}}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSMakeOpid",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"OpID",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"SimpleFSMakeOpidArg",
"{",
"}",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Convenience helper for generating new random value | [
"Convenience",
"helper",
"for",
"generating",
"new",
"random",
"value"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2174-L2177 |
160,863 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSCancel | func (c SimpleFSClient) SimpleFSCancel(ctx context.Context, opID OpID) (err error) {
__arg := SimpleFSCancelArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCancel", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSCancel(ctx context.Context, opID OpID) (err error) {
__arg := SimpleFSCancelArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCancel", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSCancel",
"(",
"ctx",
"context",
".",
"Context",
",",
"opID",
"OpID",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSCancelArg",
"{",
"OpID",
":",
"opID",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Cancels a running operation, like copy. | [
"Cancels",
"a",
"running",
"operation",
"like",
"copy",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2188-L2192 |
160,864 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSCheck | func (c SimpleFSClient) SimpleFSCheck(ctx context.Context, opID OpID) (res OpProgress, err error) {
__arg := SimpleFSCheckArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCheck", []interface{}{__arg}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSCheck(ctx context.Context, opID OpID) (res OpProgress, err error) {
__arg := SimpleFSCheckArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSCheck", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSCheck",
"(",
"ctx",
"context",
".",
"Context",
",",
"opID",
"OpID",
")",
"(",
"res",
"OpProgress",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSCheckArg",
"{",
"OpID",
":",
"opID",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Check progress of pending operation | [
"Check",
"progress",
"of",
"pending",
"operation"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2195-L2199 |
160,865 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSGetOps | func (c SimpleFSClient) SimpleFSGetOps(ctx context.Context) (res []OpDescription, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetOps", []interface{}{SimpleFSGetOpsArg{}}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSGetOps(ctx context.Context) (res []OpDescription, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetOps", []interface{}{SimpleFSGetOpsArg{}}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSGetOps",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"[",
"]",
"OpDescription",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"SimpleFSGetOpsArg",
"{",
"}",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Get all the outstanding operations | [
"Get",
"all",
"the",
"outstanding",
"operations"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2202-L2205 |
160,866 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSWait | func (c SimpleFSClient) SimpleFSWait(ctx context.Context, opID OpID) (err error) {
__arg := SimpleFSWaitArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSWait", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSWait(ctx context.Context, opID OpID) (err error) {
__arg := SimpleFSWaitArg{OpID: opID}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSWait", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSWait",
"(",
"ctx",
"context",
".",
"Context",
",",
"opID",
"OpID",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSWaitArg",
"{",
"OpID",
":",
"opID",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Blocking wait for the pending operation to finish | [
"Blocking",
"wait",
"for",
"the",
"pending",
"operation",
"to",
"finish"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2208-L2212 |
160,867 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSDumpDebuggingInfo | func (c SimpleFSClient) SimpleFSDumpDebuggingInfo(ctx context.Context) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSDumpDebuggingInfo", []interface{}{SimpleFSDumpDebuggingInfoArg{}}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSDumpDebuggingInfo(ctx context.Context) (err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSDumpDebuggingInfo", []interface{}{SimpleFSDumpDebuggingInfoArg{}}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSDumpDebuggingInfo",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"SimpleFSDumpDebuggingInfoArg",
"{",
"}",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Instructs KBFS to dump debugging info into its logs. | [
"Instructs",
"KBFS",
"to",
"dump",
"debugging",
"info",
"into",
"its",
"logs",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2215-L2218 |
160,868 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSClearConflictState | func (c SimpleFSClient) SimpleFSClearConflictState(ctx context.Context, path Path) (err error) {
__arg := SimpleFSClearConflictStateArg{Path: path}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSClearConflictState", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSClearConflictState(ctx context.Context, path Path) (err error) {
__arg := SimpleFSClearConflictStateArg{Path: path}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSClearConflictState", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSClearConflictState",
"(",
"ctx",
"context",
".",
"Context",
",",
"path",
"Path",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSClearConflictStateArg",
"{",
"Path",
":",
"path",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // Clear the conflict state of a TLF. | [
"Clear",
"the",
"conflict",
"state",
"of",
"a",
"TLF",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2221-L2225 |
160,869 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSSyncStatus | func (c SimpleFSClient) SimpleFSSyncStatus(ctx context.Context, filter ListFilter) (res FSSyncStatus, err error) {
__arg := SimpleFSSyncStatusArg{Filter: filter}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSSyncStatus", []interface{}{__arg}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSSyncStatus(ctx context.Context, filter ListFilter) (res FSSyncStatus, err error) {
__arg := SimpleFSSyncStatusArg{Filter: filter}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSSyncStatus", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSSyncStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"filter",
"ListFilter",
")",
"(",
"res",
"FSSyncStatus",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSSyncStatusArg",
"{",
"Filter",
":",
"filter",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Get sync status. | [
"Get",
"sync",
"status",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2228-L2232 |
160,870 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSListFavorites | func (c SimpleFSClient) SimpleFSListFavorites(ctx context.Context) (res FavoritesResult, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSListFavorites", []interface{}{SimpleFSListFavoritesArg{}}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSListFavorites(ctx context.Context) (res FavoritesResult, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSListFavorites", []interface{}{SimpleFSListFavoritesArg{}}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSListFavorites",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"FavoritesResult",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"SimpleFSListFavoritesArg",
"{",
"}",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // simpleFSListFavorites gets the current favorites, ignored folders, and new
// folders from the KBFS cache. | [
"simpleFSListFavorites",
"gets",
"the",
"current",
"favorites",
"ignored",
"folders",
"and",
"new",
"folders",
"from",
"the",
"KBFS",
"cache",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2270-L2273 |
160,871 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSGetUserQuotaUsage | func (c SimpleFSClient) SimpleFSGetUserQuotaUsage(ctx context.Context) (res SimpleFSQuotaUsage, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetUserQuotaUsage", []interface{}{SimpleFSGetUserQuotaUsageArg{}}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSGetUserQuotaUsage(ctx context.Context) (res SimpleFSQuotaUsage, err error) {
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetUserQuotaUsage", []interface{}{SimpleFSGetUserQuotaUsageArg{}}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSGetUserQuotaUsage",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"SimpleFSQuotaUsage",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"SimpleFSGetUserQuotaUsageArg",
"{",
"}",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // simpleFSGetUserQuotaUsage returns the quota usage for the logged-in
// user. Any usage includes local journal usage as well. | [
"simpleFSGetUserQuotaUsage",
"returns",
"the",
"quota",
"usage",
"for",
"the",
"logged",
"-",
"in",
"user",
".",
"Any",
"usage",
"includes",
"local",
"journal",
"usage",
"as",
"well",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2277-L2280 |
160,872 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSGetTeamQuotaUsage | func (c SimpleFSClient) SimpleFSGetTeamQuotaUsage(ctx context.Context, teamName TeamName) (res SimpleFSQuotaUsage, err error) {
__arg := SimpleFSGetTeamQuotaUsageArg{TeamName: teamName}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetTeamQuotaUsage", []interface{}{__arg}, &res)
return
} | go | func (c SimpleFSClient) SimpleFSGetTeamQuotaUsage(ctx context.Context, teamName TeamName) (res SimpleFSQuotaUsage, err error) {
__arg := SimpleFSGetTeamQuotaUsageArg{TeamName: teamName}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSGetTeamQuotaUsage", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSGetTeamQuotaUsage",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamName",
"TeamName",
")",
"(",
"res",
"SimpleFSQuotaUsage",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSGetTeamQuotaUsageArg",
"{",
"TeamName",
":",
"teamName",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // simpleFSGetTeamQuotaUsage returns the quota usage for the given team, if
// the logged-in user has access to that team. Any usage includes
// local journal usage as well. | [
"simpleFSGetTeamQuotaUsage",
"returns",
"the",
"quota",
"usage",
"for",
"the",
"given",
"team",
"if",
"the",
"logged",
"-",
"in",
"user",
"has",
"access",
"to",
"that",
"team",
".",
"Any",
"usage",
"includes",
"local",
"journal",
"usage",
"as",
"well",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2285-L2289 |
160,873 | keybase/client | go/protocol/keybase1/simple_fs.go | SimpleFSReset | func (c SimpleFSClient) SimpleFSReset(ctx context.Context, path Path) (err error) {
__arg := SimpleFSResetArg{Path: path}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSReset", []interface{}{__arg}, nil)
return
} | go | func (c SimpleFSClient) SimpleFSReset(ctx context.Context, path Path) (err error) {
__arg := SimpleFSResetArg{Path: path}
err = c.Cli.Call(ctx, "keybase.1.SimpleFS.simpleFSReset", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"SimpleFSClient",
")",
"SimpleFSReset",
"(",
"ctx",
"context",
".",
"Context",
",",
"path",
"Path",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"SimpleFSResetArg",
"{",
"Path",
":",
"path",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // simpleFSReset completely resets the KBFS folder referenced in `path`.
// It should only be called after explicit user confirmation. | [
"simpleFSReset",
"completely",
"resets",
"the",
"KBFS",
"folder",
"referenced",
"in",
"path",
".",
"It",
"should",
"only",
"be",
"called",
"after",
"explicit",
"user",
"confirmation",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/simple_fs.go#L2293-L2297 |
160,874 | keybase/client | go/kbfs/libkbfs/mdserver_local_shared.go | isWriterOrValidRekey | func isWriterOrValidRekey(ctx context.Context,
teamMemChecker kbfsmd.TeamMembershipChecker, codec kbfscodec.Codec,
currentUID keybase1.UID, verifyingKey kbfscrypto.VerifyingKey,
mergedMasterHead, newMd kbfsmd.RootMetadata, prevExtra, extra kbfsmd.ExtraMetadata) (
bool, error) {
h, err := mergedMasterHead.MakeBareTlfHandle(prevExtra)
if err != nil {
return false, err
}
if h.Type() == tlf.SingleTeam {
isWriter, err := teamMemChecker.IsTeamWriter(
ctx, h.Writers[0].AsTeamOrBust(), currentUID, verifyingKey,
keybase1.OfflineAvailability_NONE)
if err != nil {
return false, kbfsmd.ServerError{Err: err}
}
// Team TLFs can't be rekeyed, so readers aren't ever valid.
return isWriter, nil
}
if h.IsWriter(currentUID.AsUserOrTeam()) {
return true, nil
}
if h.IsReader(currentUID.AsUserOrTeam()) {
// if this is a reader, are they acting within their
// restrictions?
return newMd.IsValidRekeyRequest(
codec, mergedMasterHead, currentUID, prevExtra, extra)
}
return false, nil
} | go | func isWriterOrValidRekey(ctx context.Context,
teamMemChecker kbfsmd.TeamMembershipChecker, codec kbfscodec.Codec,
currentUID keybase1.UID, verifyingKey kbfscrypto.VerifyingKey,
mergedMasterHead, newMd kbfsmd.RootMetadata, prevExtra, extra kbfsmd.ExtraMetadata) (
bool, error) {
h, err := mergedMasterHead.MakeBareTlfHandle(prevExtra)
if err != nil {
return false, err
}
if h.Type() == tlf.SingleTeam {
isWriter, err := teamMemChecker.IsTeamWriter(
ctx, h.Writers[0].AsTeamOrBust(), currentUID, verifyingKey,
keybase1.OfflineAvailability_NONE)
if err != nil {
return false, kbfsmd.ServerError{Err: err}
}
// Team TLFs can't be rekeyed, so readers aren't ever valid.
return isWriter, nil
}
if h.IsWriter(currentUID.AsUserOrTeam()) {
return true, nil
}
if h.IsReader(currentUID.AsUserOrTeam()) {
// if this is a reader, are they acting within their
// restrictions?
return newMd.IsValidRekeyRequest(
codec, mergedMasterHead, currentUID, prevExtra, extra)
}
return false, nil
} | [
"func",
"isWriterOrValidRekey",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamMemChecker",
"kbfsmd",
".",
"TeamMembershipChecker",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"currentUID",
"keybase1",
".",
"UID",
",",
"verifyingKey",
"kbfscrypto",
".",
"VerifyingKey",
",",
"mergedMasterHead",
",",
"newMd",
"kbfsmd",
".",
"RootMetadata",
",",
"prevExtra",
",",
"extra",
"kbfsmd",
".",
"ExtraMetadata",
")",
"(",
"bool",
",",
"error",
")",
"{",
"h",
",",
"err",
":=",
"mergedMasterHead",
".",
"MakeBareTlfHandle",
"(",
"prevExtra",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"h",
".",
"Type",
"(",
")",
"==",
"tlf",
".",
"SingleTeam",
"{",
"isWriter",
",",
"err",
":=",
"teamMemChecker",
".",
"IsTeamWriter",
"(",
"ctx",
",",
"h",
".",
"Writers",
"[",
"0",
"]",
".",
"AsTeamOrBust",
"(",
")",
",",
"currentUID",
",",
"verifyingKey",
",",
"keybase1",
".",
"OfflineAvailability_NONE",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"kbfsmd",
".",
"ServerError",
"{",
"Err",
":",
"err",
"}",
"\n",
"}",
"\n",
"// Team TLFs can't be rekeyed, so readers aren't ever valid.",
"return",
"isWriter",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"h",
".",
"IsWriter",
"(",
"currentUID",
".",
"AsUserOrTeam",
"(",
")",
")",
"{",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"h",
".",
"IsReader",
"(",
"currentUID",
".",
"AsUserOrTeam",
"(",
")",
")",
"{",
"// if this is a reader, are they acting within their",
"// restrictions?",
"return",
"newMd",
".",
"IsValidRekeyRequest",
"(",
"codec",
",",
"mergedMasterHead",
",",
"currentUID",
",",
"prevExtra",
",",
"extra",
")",
"\n",
"}",
"\n\n",
"return",
"false",
",",
"nil",
"\n",
"}"
] | // Helper to aid in enforcement that only specified public keys can
// access TLF metadata. mergedMasterHead can be nil, in which case
// true is returned. | [
"Helper",
"to",
"aid",
"in",
"enforcement",
"that",
"only",
"specified",
"public",
"keys",
"can",
"access",
"TLF",
"metadata",
".",
"mergedMasterHead",
"can",
"be",
"nil",
"in",
"which",
"case",
"true",
"is",
"returned",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_local_shared.go#L48-L81 |
160,875 | keybase/client | go/bind/keybase.go | Init | func Init(homeDir, mobileSharedHome, logFile, runModeStr string,
accessGroupOverride bool, externalDNSNSFetcher ExternalDNSNSFetcher, nvh NativeVideoHelper) (err error) {
defer func() {
err = flattenError(err)
if err == nil {
setInited()
}
}()
fmt.Printf("Go: Initializing: home: %s mobileSharedHome: %s\n", homeDir, mobileSharedHome)
var ekLogFile string
if logFile != "" {
fmt.Printf("Go: Using log: %s\n", logFile)
ekLogFile = logFile + ".ek"
fmt.Printf("Go: Using eklog: %s\n", ekLogFile)
}
// Reduce OS threads on mobile so we don't have too much contention with JS thread
oldProcs := runtime.GOMAXPROCS(0)
newProcs := oldProcs / 2
runtime.GOMAXPROCS(newProcs)
fmt.Printf("Go: setting GOMAXPROCS to: %d previous: %d\n", newProcs, oldProcs)
startTrace(logFile)
dnsNSFetcher := newDNSNSFetcher(externalDNSNSFetcher)
dnsServers := dnsNSFetcher.GetServers()
for _, srv := range dnsServers {
fmt.Printf("Go: DNS Server: %s\n", srv)
}
kbCtx = libkb.NewGlobalContext()
kbCtx.Init()
kbCtx.SetProofServices(externals.NewProofServices(kbCtx))
// 10k uid -> FullName cache entries allowed
kbCtx.SetUIDMapper(uidmap.NewUIDMap(10000))
usage := libkb.Usage{
Config: true,
API: true,
KbKeyring: true,
}
runMode, err := libkb.StringToRunMode(runModeStr)
if err != nil {
return err
}
config := libkb.AppConfig{
HomeDir: homeDir,
MobileSharedHomeDir: mobileSharedHome,
LogFile: logFile,
EKLogFile: ekLogFile,
RunMode: runMode,
Debug: true,
LocalRPCDebug: "",
VDebugSetting: "mobile", // use empty string for same logging as desktop default
SecurityAccessGroupOverride: accessGroupOverride,
ChatInboxSourceLocalizeThreads: 5,
LinkCacheSize: 1000,
}
err = kbCtx.Configure(config, usage)
if err != nil {
return err
}
svc := service.NewService(kbCtx, false)
err = svc.StartLoopbackServer()
if err != nil {
return err
}
kbCtx.SetService()
uir := service.NewUIRouter(kbCtx)
kbCtx.SetUIRouter(uir)
kbCtx.SetDNSNameServerFetcher(dnsNSFetcher)
svc.SetupCriticalSubServices()
svc.SetupChatModules(nil)
svc.RunBackgroundOperations(uir)
kbChatCtx = svc.ChatContextified.ChatG()
kbChatCtx.NativeVideoHelper = newVideoHelper(nvh)
logs := libkb.Logs{
Service: config.GetLogFile(),
EK: config.GetEKLogFile(),
}
fmt.Printf("Go: Using config: %+v\n", kbCtx.Env.GetLogFileConfig(config.GetLogFile()))
logSendContext = libkb.LogSendContext{
Contextified: libkb.NewContextified(kbCtx),
Logs: logs,
}
// open the connection
if err = Reset(); err != nil {
return err
}
go func() {
kbfsCtx := env.NewContextFromGlobalContext(kbCtx)
kbfsParams := libkbfs.DefaultInitParams(kbfsCtx)
// Setting this flag will enable KBFS debug logging to always
// be true in a mobile setting. Change these back to the
// commented-out values if we need to make a mobile release
// before KBFS-on-mobile is ready.
kbfsParams.Debug = true // false
kbfsParams.Mode = libkbfs.InitConstrainedString // libkbfs.InitMinimalString
kbfsConfig, _ = libkbfs.Init(
context.Background(), kbfsCtx, kbfsParams, serviceCn{}, func() error { return nil },
kbCtx.Log)
}()
return nil
} | go | func Init(homeDir, mobileSharedHome, logFile, runModeStr string,
accessGroupOverride bool, externalDNSNSFetcher ExternalDNSNSFetcher, nvh NativeVideoHelper) (err error) {
defer func() {
err = flattenError(err)
if err == nil {
setInited()
}
}()
fmt.Printf("Go: Initializing: home: %s mobileSharedHome: %s\n", homeDir, mobileSharedHome)
var ekLogFile string
if logFile != "" {
fmt.Printf("Go: Using log: %s\n", logFile)
ekLogFile = logFile + ".ek"
fmt.Printf("Go: Using eklog: %s\n", ekLogFile)
}
// Reduce OS threads on mobile so we don't have too much contention with JS thread
oldProcs := runtime.GOMAXPROCS(0)
newProcs := oldProcs / 2
runtime.GOMAXPROCS(newProcs)
fmt.Printf("Go: setting GOMAXPROCS to: %d previous: %d\n", newProcs, oldProcs)
startTrace(logFile)
dnsNSFetcher := newDNSNSFetcher(externalDNSNSFetcher)
dnsServers := dnsNSFetcher.GetServers()
for _, srv := range dnsServers {
fmt.Printf("Go: DNS Server: %s\n", srv)
}
kbCtx = libkb.NewGlobalContext()
kbCtx.Init()
kbCtx.SetProofServices(externals.NewProofServices(kbCtx))
// 10k uid -> FullName cache entries allowed
kbCtx.SetUIDMapper(uidmap.NewUIDMap(10000))
usage := libkb.Usage{
Config: true,
API: true,
KbKeyring: true,
}
runMode, err := libkb.StringToRunMode(runModeStr)
if err != nil {
return err
}
config := libkb.AppConfig{
HomeDir: homeDir,
MobileSharedHomeDir: mobileSharedHome,
LogFile: logFile,
EKLogFile: ekLogFile,
RunMode: runMode,
Debug: true,
LocalRPCDebug: "",
VDebugSetting: "mobile", // use empty string for same logging as desktop default
SecurityAccessGroupOverride: accessGroupOverride,
ChatInboxSourceLocalizeThreads: 5,
LinkCacheSize: 1000,
}
err = kbCtx.Configure(config, usage)
if err != nil {
return err
}
svc := service.NewService(kbCtx, false)
err = svc.StartLoopbackServer()
if err != nil {
return err
}
kbCtx.SetService()
uir := service.NewUIRouter(kbCtx)
kbCtx.SetUIRouter(uir)
kbCtx.SetDNSNameServerFetcher(dnsNSFetcher)
svc.SetupCriticalSubServices()
svc.SetupChatModules(nil)
svc.RunBackgroundOperations(uir)
kbChatCtx = svc.ChatContextified.ChatG()
kbChatCtx.NativeVideoHelper = newVideoHelper(nvh)
logs := libkb.Logs{
Service: config.GetLogFile(),
EK: config.GetEKLogFile(),
}
fmt.Printf("Go: Using config: %+v\n", kbCtx.Env.GetLogFileConfig(config.GetLogFile()))
logSendContext = libkb.LogSendContext{
Contextified: libkb.NewContextified(kbCtx),
Logs: logs,
}
// open the connection
if err = Reset(); err != nil {
return err
}
go func() {
kbfsCtx := env.NewContextFromGlobalContext(kbCtx)
kbfsParams := libkbfs.DefaultInitParams(kbfsCtx)
// Setting this flag will enable KBFS debug logging to always
// be true in a mobile setting. Change these back to the
// commented-out values if we need to make a mobile release
// before KBFS-on-mobile is ready.
kbfsParams.Debug = true // false
kbfsParams.Mode = libkbfs.InitConstrainedString // libkbfs.InitMinimalString
kbfsConfig, _ = libkbfs.Init(
context.Background(), kbfsCtx, kbfsParams, serviceCn{}, func() error { return nil },
kbCtx.Log)
}()
return nil
} | [
"func",
"Init",
"(",
"homeDir",
",",
"mobileSharedHome",
",",
"logFile",
",",
"runModeStr",
"string",
",",
"accessGroupOverride",
"bool",
",",
"externalDNSNSFetcher",
"ExternalDNSNSFetcher",
",",
"nvh",
"NativeVideoHelper",
")",
"(",
"err",
"error",
")",
"{",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"flattenError",
"(",
"err",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"setInited",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"homeDir",
",",
"mobileSharedHome",
")",
"\n",
"var",
"ekLogFile",
"string",
"\n",
"if",
"logFile",
"!=",
"\"",
"\"",
"{",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"logFile",
")",
"\n",
"ekLogFile",
"=",
"logFile",
"+",
"\"",
"\"",
"\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"ekLogFile",
")",
"\n",
"}",
"\n\n",
"// Reduce OS threads on mobile so we don't have too much contention with JS thread",
"oldProcs",
":=",
"runtime",
".",
"GOMAXPROCS",
"(",
"0",
")",
"\n",
"newProcs",
":=",
"oldProcs",
"/",
"2",
"\n",
"runtime",
".",
"GOMAXPROCS",
"(",
"newProcs",
")",
"\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"newProcs",
",",
"oldProcs",
")",
"\n\n",
"startTrace",
"(",
"logFile",
")",
"\n\n",
"dnsNSFetcher",
":=",
"newDNSNSFetcher",
"(",
"externalDNSNSFetcher",
")",
"\n",
"dnsServers",
":=",
"dnsNSFetcher",
".",
"GetServers",
"(",
")",
"\n",
"for",
"_",
",",
"srv",
":=",
"range",
"dnsServers",
"{",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"srv",
")",
"\n",
"}",
"\n\n",
"kbCtx",
"=",
"libkb",
".",
"NewGlobalContext",
"(",
")",
"\n",
"kbCtx",
".",
"Init",
"(",
")",
"\n",
"kbCtx",
".",
"SetProofServices",
"(",
"externals",
".",
"NewProofServices",
"(",
"kbCtx",
")",
")",
"\n\n",
"// 10k uid -> FullName cache entries allowed",
"kbCtx",
".",
"SetUIDMapper",
"(",
"uidmap",
".",
"NewUIDMap",
"(",
"10000",
")",
")",
"\n",
"usage",
":=",
"libkb",
".",
"Usage",
"{",
"Config",
":",
"true",
",",
"API",
":",
"true",
",",
"KbKeyring",
":",
"true",
",",
"}",
"\n",
"runMode",
",",
"err",
":=",
"libkb",
".",
"StringToRunMode",
"(",
"runModeStr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"config",
":=",
"libkb",
".",
"AppConfig",
"{",
"HomeDir",
":",
"homeDir",
",",
"MobileSharedHomeDir",
":",
"mobileSharedHome",
",",
"LogFile",
":",
"logFile",
",",
"EKLogFile",
":",
"ekLogFile",
",",
"RunMode",
":",
"runMode",
",",
"Debug",
":",
"true",
",",
"LocalRPCDebug",
":",
"\"",
"\"",
",",
"VDebugSetting",
":",
"\"",
"\"",
",",
"// use empty string for same logging as desktop default",
"SecurityAccessGroupOverride",
":",
"accessGroupOverride",
",",
"ChatInboxSourceLocalizeThreads",
":",
"5",
",",
"LinkCacheSize",
":",
"1000",
",",
"}",
"\n",
"err",
"=",
"kbCtx",
".",
"Configure",
"(",
"config",
",",
"usage",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"svc",
":=",
"service",
".",
"NewService",
"(",
"kbCtx",
",",
"false",
")",
"\n",
"err",
"=",
"svc",
".",
"StartLoopbackServer",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"kbCtx",
".",
"SetService",
"(",
")",
"\n",
"uir",
":=",
"service",
".",
"NewUIRouter",
"(",
"kbCtx",
")",
"\n",
"kbCtx",
".",
"SetUIRouter",
"(",
"uir",
")",
"\n",
"kbCtx",
".",
"SetDNSNameServerFetcher",
"(",
"dnsNSFetcher",
")",
"\n",
"svc",
".",
"SetupCriticalSubServices",
"(",
")",
"\n",
"svc",
".",
"SetupChatModules",
"(",
"nil",
")",
"\n",
"svc",
".",
"RunBackgroundOperations",
"(",
"uir",
")",
"\n",
"kbChatCtx",
"=",
"svc",
".",
"ChatContextified",
".",
"ChatG",
"(",
")",
"\n",
"kbChatCtx",
".",
"NativeVideoHelper",
"=",
"newVideoHelper",
"(",
"nvh",
")",
"\n\n",
"logs",
":=",
"libkb",
".",
"Logs",
"{",
"Service",
":",
"config",
".",
"GetLogFile",
"(",
")",
",",
"EK",
":",
"config",
".",
"GetEKLogFile",
"(",
")",
",",
"}",
"\n\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
",",
"kbCtx",
".",
"Env",
".",
"GetLogFileConfig",
"(",
"config",
".",
"GetLogFile",
"(",
")",
")",
")",
"\n\n",
"logSendContext",
"=",
"libkb",
".",
"LogSendContext",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"kbCtx",
")",
",",
"Logs",
":",
"logs",
",",
"}",
"\n\n",
"// open the connection",
"if",
"err",
"=",
"Reset",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"go",
"func",
"(",
")",
"{",
"kbfsCtx",
":=",
"env",
".",
"NewContextFromGlobalContext",
"(",
"kbCtx",
")",
"\n",
"kbfsParams",
":=",
"libkbfs",
".",
"DefaultInitParams",
"(",
"kbfsCtx",
")",
"\n",
"// Setting this flag will enable KBFS debug logging to always",
"// be true in a mobile setting. Change these back to the",
"// commented-out values if we need to make a mobile release",
"// before KBFS-on-mobile is ready.",
"kbfsParams",
".",
"Debug",
"=",
"true",
"// false",
"\n",
"kbfsParams",
".",
"Mode",
"=",
"libkbfs",
".",
"InitConstrainedString",
"// libkbfs.InitMinimalString",
"\n",
"kbfsConfig",
",",
"_",
"=",
"libkbfs",
".",
"Init",
"(",
"context",
".",
"Background",
"(",
")",
",",
"kbfsCtx",
",",
"kbfsParams",
",",
"serviceCn",
"{",
"}",
",",
"func",
"(",
")",
"error",
"{",
"return",
"nil",
"}",
",",
"kbCtx",
".",
"Log",
")",
"\n",
"}",
"(",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Init runs the Keybase services | [
"Init",
"runs",
"the",
"Keybase",
"services"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L133-L244 |
160,876 | keybase/client | go/bind/keybase.go | LogSend | func LogSend(status string, feedback string, sendLogs bool, uiLogPath, traceDir, cpuProfileDir string) (res string, err error) {
defer func() { err = flattenError(err) }()
logSendContext.Logs.Desktop = uiLogPath
logSendContext.Logs.Trace = traceDir
logSendContext.Logs.CPUProfile = cpuProfileDir
env := kbCtx.Env
sendLogMaxSizeBytes := 10 * 1024 * 1024 // NOTE: If you increase this, check go/libkb/env.go:Env.GetLogFileConfig to make sure we store at least that much.
return logSendContext.LogSend(status, feedback, sendLogs, sendLogMaxSizeBytes, env.GetUID(), env.GetInstallID(), true /* mergeExtendedStatus */)
} | go | func LogSend(status string, feedback string, sendLogs bool, uiLogPath, traceDir, cpuProfileDir string) (res string, err error) {
defer func() { err = flattenError(err) }()
logSendContext.Logs.Desktop = uiLogPath
logSendContext.Logs.Trace = traceDir
logSendContext.Logs.CPUProfile = cpuProfileDir
env := kbCtx.Env
sendLogMaxSizeBytes := 10 * 1024 * 1024 // NOTE: If you increase this, check go/libkb/env.go:Env.GetLogFileConfig to make sure we store at least that much.
return logSendContext.LogSend(status, feedback, sendLogs, sendLogMaxSizeBytes, env.GetUID(), env.GetInstallID(), true /* mergeExtendedStatus */)
} | [
"func",
"LogSend",
"(",
"status",
"string",
",",
"feedback",
"string",
",",
"sendLogs",
"bool",
",",
"uiLogPath",
",",
"traceDir",
",",
"cpuProfileDir",
"string",
")",
"(",
"res",
"string",
",",
"err",
"error",
")",
"{",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"flattenError",
"(",
"err",
")",
"}",
"(",
")",
"\n",
"logSendContext",
".",
"Logs",
".",
"Desktop",
"=",
"uiLogPath",
"\n",
"logSendContext",
".",
"Logs",
".",
"Trace",
"=",
"traceDir",
"\n",
"logSendContext",
".",
"Logs",
".",
"CPUProfile",
"=",
"cpuProfileDir",
"\n",
"env",
":=",
"kbCtx",
".",
"Env",
"\n",
"sendLogMaxSizeBytes",
":=",
"10",
"*",
"1024",
"*",
"1024",
"// NOTE: If you increase this, check go/libkb/env.go:Env.GetLogFileConfig to make sure we store at least that much.",
"\n",
"return",
"logSendContext",
".",
"LogSend",
"(",
"status",
",",
"feedback",
",",
"sendLogs",
",",
"sendLogMaxSizeBytes",
",",
"env",
".",
"GetUID",
"(",
")",
",",
"env",
".",
"GetInstallID",
"(",
")",
",",
"true",
"/* mergeExtendedStatus */",
")",
"\n",
"}"
] | // LogSend sends a log to Keybase | [
"LogSend",
"sends",
"a",
"log",
"to",
"Keybase"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L274-L282 |
160,877 | keybase/client | go/bind/keybase.go | WriteB64 | func WriteB64(str string) (err error) {
defer func() { err = flattenError(err) }()
if conn == nil {
return errors.New("connection not initialized")
}
data, err := base64.StdEncoding.DecodeString(str)
if err != nil {
return fmt.Errorf("Base64 decode error: %s; %s", err, str)
}
n, err := conn.Write(data)
if err != nil {
return fmt.Errorf("Write error: %s", err)
}
if n != len(data) {
return errors.New("Did not write all the data")
}
return nil
} | go | func WriteB64(str string) (err error) {
defer func() { err = flattenError(err) }()
if conn == nil {
return errors.New("connection not initialized")
}
data, err := base64.StdEncoding.DecodeString(str)
if err != nil {
return fmt.Errorf("Base64 decode error: %s; %s", err, str)
}
n, err := conn.Write(data)
if err != nil {
return fmt.Errorf("Write error: %s", err)
}
if n != len(data) {
return errors.New("Did not write all the data")
}
return nil
} | [
"func",
"WriteB64",
"(",
"str",
"string",
")",
"(",
"err",
"error",
")",
"{",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"flattenError",
"(",
"err",
")",
"}",
"(",
")",
"\n",
"if",
"conn",
"==",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"data",
",",
"err",
":=",
"base64",
".",
"StdEncoding",
".",
"DecodeString",
"(",
"str",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
",",
"str",
")",
"\n",
"}",
"\n",
"n",
",",
"err",
":=",
"conn",
".",
"Write",
"(",
"data",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"n",
"!=",
"len",
"(",
"data",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // WriteB64 sends a base64 encoded msgpack rpc payload | [
"WriteB64",
"sends",
"a",
"base64",
"encoded",
"msgpack",
"rpc",
"payload"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L285-L302 |
160,878 | keybase/client | go/bind/keybase.go | ReadB64 | func ReadB64() (res string, err error) {
defer func() { err = flattenError(err) }()
if conn == nil {
return "", errors.New("connection not initialized")
}
n, err := conn.Read(buffer)
if n > 0 && err == nil {
str := base64.StdEncoding.EncodeToString(buffer[0:n])
return str, nil
}
if err != nil {
// Attempt to fix the connection
Reset()
return "", fmt.Errorf("Read error: %s", err)
}
return "", nil
} | go | func ReadB64() (res string, err error) {
defer func() { err = flattenError(err) }()
if conn == nil {
return "", errors.New("connection not initialized")
}
n, err := conn.Read(buffer)
if n > 0 && err == nil {
str := base64.StdEncoding.EncodeToString(buffer[0:n])
return str, nil
}
if err != nil {
// Attempt to fix the connection
Reset()
return "", fmt.Errorf("Read error: %s", err)
}
return "", nil
} | [
"func",
"ReadB64",
"(",
")",
"(",
"res",
"string",
",",
"err",
"error",
")",
"{",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"flattenError",
"(",
"err",
")",
"}",
"(",
")",
"\n",
"if",
"conn",
"==",
"nil",
"{",
"return",
"\"",
"\"",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"n",
",",
"err",
":=",
"conn",
".",
"Read",
"(",
"buffer",
")",
"\n",
"if",
"n",
">",
"0",
"&&",
"err",
"==",
"nil",
"{",
"str",
":=",
"base64",
".",
"StdEncoding",
".",
"EncodeToString",
"(",
"buffer",
"[",
"0",
":",
"n",
"]",
")",
"\n",
"return",
"str",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"// Attempt to fix the connection",
"Reset",
"(",
")",
"\n",
"return",
"\"",
"\"",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"\"",
"\"",
",",
"nil",
"\n",
"}"
] | // ReadB64 is a blocking read for base64 encoded msgpack rpc data.
// It is called serially by the mobile run loops. | [
"ReadB64",
"is",
"a",
"blocking",
"read",
"for",
"base64",
"encoded",
"msgpack",
"rpc",
"data",
".",
"It",
"is",
"called",
"serially",
"by",
"the",
"mobile",
"run",
"loops",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L316-L334 |
160,879 | keybase/client | go/bind/keybase.go | Reset | func Reset() error {
if conn != nil {
conn.Close()
}
var err error
conn, err = kbCtx.LoopbackListener.Dial()
if err != nil {
return fmt.Errorf("Socket error: %s", err)
}
return nil
} | go | func Reset() error {
if conn != nil {
conn.Close()
}
var err error
conn, err = kbCtx.LoopbackListener.Dial()
if err != nil {
return fmt.Errorf("Socket error: %s", err)
}
return nil
} | [
"func",
"Reset",
"(",
")",
"error",
"{",
"if",
"conn",
"!=",
"nil",
"{",
"conn",
".",
"Close",
"(",
")",
"\n",
"}",
"\n\n",
"var",
"err",
"error",
"\n",
"conn",
",",
"err",
"=",
"kbCtx",
".",
"LoopbackListener",
".",
"Dial",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Reset resets the socket connection | [
"Reset",
"resets",
"the",
"socket",
"connection"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L337-L348 |
160,880 | keybase/client | go/bind/keybase.go | ForceGC | func ForceGC() {
fmt.Printf("Flushing global caches\n")
kbCtx.FlushCaches()
fmt.Printf("Done flushing global caches\n")
fmt.Printf("Starting force gc\n")
debug.FreeOSMemory()
fmt.Printf("Done force gc\n")
} | go | func ForceGC() {
fmt.Printf("Flushing global caches\n")
kbCtx.FlushCaches()
fmt.Printf("Done flushing global caches\n")
fmt.Printf("Starting force gc\n")
debug.FreeOSMemory()
fmt.Printf("Done force gc\n")
} | [
"func",
"ForceGC",
"(",
")",
"{",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
")",
"\n",
"kbCtx",
".",
"FlushCaches",
"(",
")",
"\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
")",
"\n\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
")",
"\n",
"debug",
".",
"FreeOSMemory",
"(",
")",
"\n",
"fmt",
".",
"Printf",
"(",
"\"",
"\\n",
"\"",
")",
"\n",
"}"
] | // ForceGC Forces a gc | [
"ForceGC",
"Forces",
"a",
"gc"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L351-L359 |
160,881 | keybase/client | go/bind/keybase.go | pushPendingMessageFailure | func pushPendingMessageFailure(obrs []chat1.OutboxRecord, pusher PushNotifier) {
for _, obr := range obrs {
if !obr.IsUnfurl() {
kbCtx.Log.Debug("pushPendingMessageFailure: pushing convID: %s", obr.ConvID)
pusher.LocalNotification("failedpending",
"Heads up! One or more pending messages failed to send. Tap here to retry them.",
-1, "default", obr.ConvID.String(), "chat.failedpending")
return
}
}
kbCtx.Log.Debug("pushPendingMessageFailure: skipped notification for: %d items", len(obrs))
} | go | func pushPendingMessageFailure(obrs []chat1.OutboxRecord, pusher PushNotifier) {
for _, obr := range obrs {
if !obr.IsUnfurl() {
kbCtx.Log.Debug("pushPendingMessageFailure: pushing convID: %s", obr.ConvID)
pusher.LocalNotification("failedpending",
"Heads up! One or more pending messages failed to send. Tap here to retry them.",
-1, "default", obr.ConvID.String(), "chat.failedpending")
return
}
}
kbCtx.Log.Debug("pushPendingMessageFailure: skipped notification for: %d items", len(obrs))
} | [
"func",
"pushPendingMessageFailure",
"(",
"obrs",
"[",
"]",
"chat1",
".",
"OutboxRecord",
",",
"pusher",
"PushNotifier",
")",
"{",
"for",
"_",
",",
"obr",
":=",
"range",
"obrs",
"{",
"if",
"!",
"obr",
".",
"IsUnfurl",
"(",
")",
"{",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"obr",
".",
"ConvID",
")",
"\n",
"pusher",
".",
"LocalNotification",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"-",
"1",
",",
"\"",
"\"",
",",
"obr",
".",
"ConvID",
".",
"String",
"(",
")",
",",
"\"",
"\"",
")",
"\n",
"return",
"\n",
"}",
"\n",
"}",
"\n",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"len",
"(",
"obrs",
")",
")",
"\n",
"}"
] | // pushPendingMessageFailure sends at most one notification that a message
// failed to send. We don't notify the user about background failures like
// unfurling. | [
"pushPendingMessageFailure",
"sends",
"at",
"most",
"one",
"notification",
"that",
"a",
"message",
"failed",
"to",
"send",
".",
"We",
"don",
"t",
"notify",
"the",
"user",
"about",
"background",
"failures",
"like",
"unfurling",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L500-L511 |
160,882 | keybase/client | go/bind/keybase.go | AppWillExit | func AppWillExit(pusher PushNotifier) {
if !isInited() {
return
}
defer kbCtx.Trace("AppWillExit", func() error { return nil })()
ctx := context.Background()
obrs, err := kbChatCtx.MessageDeliverer.ActiveDeliveries(ctx)
if err == nil {
// We are about to get killed with messages still to send, let the user
// know they will get stuck
pushPendingMessageFailure(obrs, pusher)
}
kbCtx.MobileAppState.Update(keybase1.MobileAppState_BACKGROUND)
} | go | func AppWillExit(pusher PushNotifier) {
if !isInited() {
return
}
defer kbCtx.Trace("AppWillExit", func() error { return nil })()
ctx := context.Background()
obrs, err := kbChatCtx.MessageDeliverer.ActiveDeliveries(ctx)
if err == nil {
// We are about to get killed with messages still to send, let the user
// know they will get stuck
pushPendingMessageFailure(obrs, pusher)
}
kbCtx.MobileAppState.Update(keybase1.MobileAppState_BACKGROUND)
} | [
"func",
"AppWillExit",
"(",
"pusher",
"PushNotifier",
")",
"{",
"if",
"!",
"isInited",
"(",
")",
"{",
"return",
"\n",
"}",
"\n",
"defer",
"kbCtx",
".",
"Trace",
"(",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"nil",
"}",
")",
"(",
")",
"\n",
"ctx",
":=",
"context",
".",
"Background",
"(",
")",
"\n",
"obrs",
",",
"err",
":=",
"kbChatCtx",
".",
"MessageDeliverer",
".",
"ActiveDeliveries",
"(",
"ctx",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"// We are about to get killed with messages still to send, let the user",
"// know they will get stuck",
"pushPendingMessageFailure",
"(",
"obrs",
",",
"pusher",
")",
"\n",
"}",
"\n",
"kbCtx",
".",
"MobileAppState",
".",
"Update",
"(",
"keybase1",
".",
"MobileAppState_BACKGROUND",
")",
"\n",
"}"
] | // AppWillExit is called reliably on iOS when the app is about to terminate
// not as reliably on android | [
"AppWillExit",
"is",
"called",
"reliably",
"on",
"iOS",
"when",
"the",
"app",
"is",
"about",
"to",
"terminate",
"not",
"as",
"reliably",
"on",
"android"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L515-L528 |
160,883 | keybase/client | go/bind/keybase.go | AppBeginBackgroundTask | func AppBeginBackgroundTask(pusher PushNotifier) {
if !isInited() {
return
}
defer kbCtx.Trace("AppBeginBackgroundTask", func() error { return nil })()
ctx := context.Background()
// Poll active deliveries in case we can shutdown early
beginTime := libkb.ForceWallClock(time.Now())
ticker := time.NewTicker(5 * time.Second)
appState := kbCtx.MobileAppState.State()
if appState != keybase1.MobileAppState_BACKGROUNDACTIVE {
kbCtx.Log.Debug("AppBeginBackgroundTask: not in background mode, early out")
return
}
var g *errgroup.Group
g, ctx = errgroup.WithContext(ctx)
g.Go(func() error {
select {
case appState = <-kbCtx.MobileAppState.NextUpdate(&appState):
kbCtx.Log.Debug(
"AppBeginBackgroundTask: app state change, aborting with no task shutdown: %v", appState)
return errors.New("app state change")
case <-ctx.Done():
return ctx.Err()
}
})
g.Go(func() error {
ch, cancel := kbChatCtx.MessageDeliverer.NextFailure()
defer cancel()
select {
case obrs := <-ch:
kbCtx.Log.Debug(
"AppBeginBackgroundTask: failure received, alerting the user: %d marked", len(obrs))
pushPendingMessageFailure(obrs, pusher)
return errors.New("failure received")
case <-ctx.Done():
return ctx.Err()
}
})
g.Go(func() error {
successCount := 0
for {
select {
case <-ticker.C:
obrs, err := kbChatCtx.MessageDeliverer.ActiveDeliveries(ctx)
if err != nil {
kbCtx.Log.Debug("AppBeginBackgroundTask: failed to query active deliveries: %s", err)
continue
}
if len(obrs) == 0 {
kbCtx.Log.Debug("AppBeginBackgroundTask: delivered everything: successCount: %d",
successCount)
// We can race the failure case here, so lets go a couple passes of no pending
// convs before we abort due to ths condition.
if successCount > 1 {
return errors.New("delivered everything")
}
successCount++
}
curTime := libkb.ForceWallClock(time.Now())
if curTime.Sub(beginTime) >= 10*time.Minute {
kbCtx.Log.Debug("AppBeginBackgroundTask: failed to deliver and time is up, aborting")
pushPendingMessageFailure(obrs, pusher)
return errors.New("time expired")
}
case <-ctx.Done():
return ctx.Err()
}
}
})
if err := g.Wait(); err != nil {
kbCtx.Log.Debug("AppBeginBackgroundTask: dropped out of wait because: %s", err)
}
} | go | func AppBeginBackgroundTask(pusher PushNotifier) {
if !isInited() {
return
}
defer kbCtx.Trace("AppBeginBackgroundTask", func() error { return nil })()
ctx := context.Background()
// Poll active deliveries in case we can shutdown early
beginTime := libkb.ForceWallClock(time.Now())
ticker := time.NewTicker(5 * time.Second)
appState := kbCtx.MobileAppState.State()
if appState != keybase1.MobileAppState_BACKGROUNDACTIVE {
kbCtx.Log.Debug("AppBeginBackgroundTask: not in background mode, early out")
return
}
var g *errgroup.Group
g, ctx = errgroup.WithContext(ctx)
g.Go(func() error {
select {
case appState = <-kbCtx.MobileAppState.NextUpdate(&appState):
kbCtx.Log.Debug(
"AppBeginBackgroundTask: app state change, aborting with no task shutdown: %v", appState)
return errors.New("app state change")
case <-ctx.Done():
return ctx.Err()
}
})
g.Go(func() error {
ch, cancel := kbChatCtx.MessageDeliverer.NextFailure()
defer cancel()
select {
case obrs := <-ch:
kbCtx.Log.Debug(
"AppBeginBackgroundTask: failure received, alerting the user: %d marked", len(obrs))
pushPendingMessageFailure(obrs, pusher)
return errors.New("failure received")
case <-ctx.Done():
return ctx.Err()
}
})
g.Go(func() error {
successCount := 0
for {
select {
case <-ticker.C:
obrs, err := kbChatCtx.MessageDeliverer.ActiveDeliveries(ctx)
if err != nil {
kbCtx.Log.Debug("AppBeginBackgroundTask: failed to query active deliveries: %s", err)
continue
}
if len(obrs) == 0 {
kbCtx.Log.Debug("AppBeginBackgroundTask: delivered everything: successCount: %d",
successCount)
// We can race the failure case here, so lets go a couple passes of no pending
// convs before we abort due to ths condition.
if successCount > 1 {
return errors.New("delivered everything")
}
successCount++
}
curTime := libkb.ForceWallClock(time.Now())
if curTime.Sub(beginTime) >= 10*time.Minute {
kbCtx.Log.Debug("AppBeginBackgroundTask: failed to deliver and time is up, aborting")
pushPendingMessageFailure(obrs, pusher)
return errors.New("time expired")
}
case <-ctx.Done():
return ctx.Err()
}
}
})
if err := g.Wait(); err != nil {
kbCtx.Log.Debug("AppBeginBackgroundTask: dropped out of wait because: %s", err)
}
} | [
"func",
"AppBeginBackgroundTask",
"(",
"pusher",
"PushNotifier",
")",
"{",
"if",
"!",
"isInited",
"(",
")",
"{",
"return",
"\n",
"}",
"\n",
"defer",
"kbCtx",
".",
"Trace",
"(",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"nil",
"}",
")",
"(",
")",
"\n",
"ctx",
":=",
"context",
".",
"Background",
"(",
")",
"\n",
"// Poll active deliveries in case we can shutdown early",
"beginTime",
":=",
"libkb",
".",
"ForceWallClock",
"(",
"time",
".",
"Now",
"(",
")",
")",
"\n",
"ticker",
":=",
"time",
".",
"NewTicker",
"(",
"5",
"*",
"time",
".",
"Second",
")",
"\n",
"appState",
":=",
"kbCtx",
".",
"MobileAppState",
".",
"State",
"(",
")",
"\n",
"if",
"appState",
"!=",
"keybase1",
".",
"MobileAppState_BACKGROUNDACTIVE",
"{",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"\n",
"}",
"\n",
"var",
"g",
"*",
"errgroup",
".",
"Group",
"\n",
"g",
",",
"ctx",
"=",
"errgroup",
".",
"WithContext",
"(",
"ctx",
")",
"\n",
"g",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"select",
"{",
"case",
"appState",
"=",
"<-",
"kbCtx",
".",
"MobileAppState",
".",
"NextUpdate",
"(",
"&",
"appState",
")",
":",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"appState",
")",
"\n",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"ctx",
".",
"Err",
"(",
")",
"\n",
"}",
"\n",
"}",
")",
"\n",
"g",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"ch",
",",
"cancel",
":=",
"kbChatCtx",
".",
"MessageDeliverer",
".",
"NextFailure",
"(",
")",
"\n",
"defer",
"cancel",
"(",
")",
"\n",
"select",
"{",
"case",
"obrs",
":=",
"<-",
"ch",
":",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"len",
"(",
"obrs",
")",
")",
"\n",
"pushPendingMessageFailure",
"(",
"obrs",
",",
"pusher",
")",
"\n",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"ctx",
".",
"Err",
"(",
")",
"\n",
"}",
"\n",
"}",
")",
"\n",
"g",
".",
"Go",
"(",
"func",
"(",
")",
"error",
"{",
"successCount",
":=",
"0",
"\n",
"for",
"{",
"select",
"{",
"case",
"<-",
"ticker",
".",
"C",
":",
"obrs",
",",
"err",
":=",
"kbChatCtx",
".",
"MessageDeliverer",
".",
"ActiveDeliveries",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"if",
"len",
"(",
"obrs",
")",
"==",
"0",
"{",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"successCount",
")",
"\n",
"// We can race the failure case here, so lets go a couple passes of no pending",
"// convs before we abort due to ths condition.",
"if",
"successCount",
">",
"1",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"successCount",
"++",
"\n",
"}",
"\n",
"curTime",
":=",
"libkb",
".",
"ForceWallClock",
"(",
"time",
".",
"Now",
"(",
")",
")",
"\n",
"if",
"curTime",
".",
"Sub",
"(",
"beginTime",
")",
">=",
"10",
"*",
"time",
".",
"Minute",
"{",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"pushPendingMessageFailure",
"(",
"obrs",
",",
"pusher",
")",
"\n",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"ctx",
".",
"Err",
"(",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
")",
"\n",
"if",
"err",
":=",
"g",
".",
"Wait",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"kbCtx",
".",
"Log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}"
] | // AppBeginBackgroundTask notifies us that an app background task has been started on our behalf. This
// function will return once we no longer need any time in the background. | [
"AppBeginBackgroundTask",
"notifies",
"us",
"that",
"an",
"app",
"background",
"task",
"has",
"been",
"started",
"on",
"our",
"behalf",
".",
"This",
"function",
"will",
"return",
"once",
"we",
"no",
"longer",
"need",
"any",
"time",
"in",
"the",
"background",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/bind/keybase.go#L571-L644 |
160,884 | keybase/client | go/kbfs/libkbfs/crypto_local.go | NewCryptoLocal | func NewCryptoLocal(codec kbfscodec.Codec,
signingKey kbfscrypto.SigningKey,
cryptPrivateKey kbfscrypto.CryptPrivateKey,
blockCryptVersioner blockCryptVersioner) *CryptoLocal {
return &CryptoLocal{
MakeCryptoCommon(codec, blockCryptVersioner),
kbfscrypto.SigningKeySigner{Key: signingKey},
cryptPrivateKey,
make(map[keybase1.TeamID]perTeamKeyPairs),
}
} | go | func NewCryptoLocal(codec kbfscodec.Codec,
signingKey kbfscrypto.SigningKey,
cryptPrivateKey kbfscrypto.CryptPrivateKey,
blockCryptVersioner blockCryptVersioner) *CryptoLocal {
return &CryptoLocal{
MakeCryptoCommon(codec, blockCryptVersioner),
kbfscrypto.SigningKeySigner{Key: signingKey},
cryptPrivateKey,
make(map[keybase1.TeamID]perTeamKeyPairs),
}
} | [
"func",
"NewCryptoLocal",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"signingKey",
"kbfscrypto",
".",
"SigningKey",
",",
"cryptPrivateKey",
"kbfscrypto",
".",
"CryptPrivateKey",
",",
"blockCryptVersioner",
"blockCryptVersioner",
")",
"*",
"CryptoLocal",
"{",
"return",
"&",
"CryptoLocal",
"{",
"MakeCryptoCommon",
"(",
"codec",
",",
"blockCryptVersioner",
")",
",",
"kbfscrypto",
".",
"SigningKeySigner",
"{",
"Key",
":",
"signingKey",
"}",
",",
"cryptPrivateKey",
",",
"make",
"(",
"map",
"[",
"keybase1",
".",
"TeamID",
"]",
"perTeamKeyPairs",
")",
",",
"}",
"\n",
"}"
] | // NewCryptoLocal constructs a new CryptoLocal instance with the given
// signing key. | [
"NewCryptoLocal",
"constructs",
"a",
"new",
"CryptoLocal",
"instance",
"with",
"the",
"given",
"signing",
"key",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/crypto_local.go#L36-L46 |
160,885 | keybase/client | go/kbfs/libkbfs/crypto_local.go | DecryptTLFCryptKeyClientHalf | func (c *CryptoLocal) DecryptTLFCryptKeyClientHalf(ctx context.Context,
publicKey kbfscrypto.TLFEphemeralPublicKey,
encryptedClientHalf kbfscrypto.EncryptedTLFCryptKeyClientHalf) (
kbfscrypto.TLFCryptKeyClientHalf, error) {
return kbfscrypto.DecryptTLFCryptKeyClientHalf(
c.cryptPrivateKey, publicKey, encryptedClientHalf)
} | go | func (c *CryptoLocal) DecryptTLFCryptKeyClientHalf(ctx context.Context,
publicKey kbfscrypto.TLFEphemeralPublicKey,
encryptedClientHalf kbfscrypto.EncryptedTLFCryptKeyClientHalf) (
kbfscrypto.TLFCryptKeyClientHalf, error) {
return kbfscrypto.DecryptTLFCryptKeyClientHalf(
c.cryptPrivateKey, publicKey, encryptedClientHalf)
} | [
"func",
"(",
"c",
"*",
"CryptoLocal",
")",
"DecryptTLFCryptKeyClientHalf",
"(",
"ctx",
"context",
".",
"Context",
",",
"publicKey",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"encryptedClientHalf",
"kbfscrypto",
".",
"EncryptedTLFCryptKeyClientHalf",
")",
"(",
"kbfscrypto",
".",
"TLFCryptKeyClientHalf",
",",
"error",
")",
"{",
"return",
"kbfscrypto",
".",
"DecryptTLFCryptKeyClientHalf",
"(",
"c",
".",
"cryptPrivateKey",
",",
"publicKey",
",",
"encryptedClientHalf",
")",
"\n",
"}"
] | // DecryptTLFCryptKeyClientHalf implements the Crypto interface for
// CryptoLocal. | [
"DecryptTLFCryptKeyClientHalf",
"implements",
"the",
"Crypto",
"interface",
"for",
"CryptoLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/crypto_local.go#L50-L56 |
160,886 | keybase/client | go/kbfs/libkbfs/crypto_local.go | DecryptTLFCryptKeyClientHalfAny | func (c *CryptoLocal) DecryptTLFCryptKeyClientHalfAny(ctx context.Context,
keys []EncryptedTLFCryptKeyClientAndEphemeral, _ bool) (
clientHalf kbfscrypto.TLFCryptKeyClientHalf, index int, err error) {
if len(keys) == 0 {
return kbfscrypto.TLFCryptKeyClientHalf{}, -1,
errors.WithStack(NoKeysError{})
}
var firstNonDecryptionErr error
for i, k := range keys {
clientHalf, err := c.DecryptTLFCryptKeyClientHalf(
ctx, k.EPubKey, k.ClientHalf)
if err != nil {
_, isDecryptionError :=
errors.Cause(err).(libkb.DecryptionError)
if firstNonDecryptionErr == nil && !isDecryptionError {
firstNonDecryptionErr = err
}
continue
}
return clientHalf, i, nil
}
// This is to mimic the behavior in
// CryptoClient.DecryptTLFCryptKeyClientHalfAny, which is to,
// if all calls to prepareTLFCryptKeyClientHalf failed, return
// the first prep error, and otherwise to return the error
// from the service, which is usually libkb.DecryptionError.
if firstNonDecryptionErr != nil {
return kbfscrypto.TLFCryptKeyClientHalf{}, -1,
firstNonDecryptionErr
}
return kbfscrypto.TLFCryptKeyClientHalf{}, -1,
errors.WithStack(libkb.DecryptionError{})
} | go | func (c *CryptoLocal) DecryptTLFCryptKeyClientHalfAny(ctx context.Context,
keys []EncryptedTLFCryptKeyClientAndEphemeral, _ bool) (
clientHalf kbfscrypto.TLFCryptKeyClientHalf, index int, err error) {
if len(keys) == 0 {
return kbfscrypto.TLFCryptKeyClientHalf{}, -1,
errors.WithStack(NoKeysError{})
}
var firstNonDecryptionErr error
for i, k := range keys {
clientHalf, err := c.DecryptTLFCryptKeyClientHalf(
ctx, k.EPubKey, k.ClientHalf)
if err != nil {
_, isDecryptionError :=
errors.Cause(err).(libkb.DecryptionError)
if firstNonDecryptionErr == nil && !isDecryptionError {
firstNonDecryptionErr = err
}
continue
}
return clientHalf, i, nil
}
// This is to mimic the behavior in
// CryptoClient.DecryptTLFCryptKeyClientHalfAny, which is to,
// if all calls to prepareTLFCryptKeyClientHalf failed, return
// the first prep error, and otherwise to return the error
// from the service, which is usually libkb.DecryptionError.
if firstNonDecryptionErr != nil {
return kbfscrypto.TLFCryptKeyClientHalf{}, -1,
firstNonDecryptionErr
}
return kbfscrypto.TLFCryptKeyClientHalf{}, -1,
errors.WithStack(libkb.DecryptionError{})
} | [
"func",
"(",
"c",
"*",
"CryptoLocal",
")",
"DecryptTLFCryptKeyClientHalfAny",
"(",
"ctx",
"context",
".",
"Context",
",",
"keys",
"[",
"]",
"EncryptedTLFCryptKeyClientAndEphemeral",
",",
"_",
"bool",
")",
"(",
"clientHalf",
"kbfscrypto",
".",
"TLFCryptKeyClientHalf",
",",
"index",
"int",
",",
"err",
"error",
")",
"{",
"if",
"len",
"(",
"keys",
")",
"==",
"0",
"{",
"return",
"kbfscrypto",
".",
"TLFCryptKeyClientHalf",
"{",
"}",
",",
"-",
"1",
",",
"errors",
".",
"WithStack",
"(",
"NoKeysError",
"{",
"}",
")",
"\n",
"}",
"\n",
"var",
"firstNonDecryptionErr",
"error",
"\n",
"for",
"i",
",",
"k",
":=",
"range",
"keys",
"{",
"clientHalf",
",",
"err",
":=",
"c",
".",
"DecryptTLFCryptKeyClientHalf",
"(",
"ctx",
",",
"k",
".",
"EPubKey",
",",
"k",
".",
"ClientHalf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"_",
",",
"isDecryptionError",
":=",
"errors",
".",
"Cause",
"(",
"err",
")",
".",
"(",
"libkb",
".",
"DecryptionError",
")",
"\n",
"if",
"firstNonDecryptionErr",
"==",
"nil",
"&&",
"!",
"isDecryptionError",
"{",
"firstNonDecryptionErr",
"=",
"err",
"\n",
"}",
"\n",
"continue",
"\n",
"}",
"\n",
"return",
"clientHalf",
",",
"i",
",",
"nil",
"\n",
"}",
"\n",
"// This is to mimic the behavior in",
"// CryptoClient.DecryptTLFCryptKeyClientHalfAny, which is to,",
"// if all calls to prepareTLFCryptKeyClientHalf failed, return",
"// the first prep error, and otherwise to return the error",
"// from the service, which is usually libkb.DecryptionError.",
"if",
"firstNonDecryptionErr",
"!=",
"nil",
"{",
"return",
"kbfscrypto",
".",
"TLFCryptKeyClientHalf",
"{",
"}",
",",
"-",
"1",
",",
"firstNonDecryptionErr",
"\n",
"}",
"\n",
"return",
"kbfscrypto",
".",
"TLFCryptKeyClientHalf",
"{",
"}",
",",
"-",
"1",
",",
"errors",
".",
"WithStack",
"(",
"libkb",
".",
"DecryptionError",
"{",
"}",
")",
"\n",
"}"
] | // DecryptTLFCryptKeyClientHalfAny implements the Crypto interface for
// CryptoLocal. | [
"DecryptTLFCryptKeyClientHalfAny",
"implements",
"the",
"Crypto",
"interface",
"for",
"CryptoLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/crypto_local.go#L60-L92 |
160,887 | keybase/client | go/kbfs/libkbfs/crypto_local.go | DecryptTeamMerkleLeaf | func (c *CryptoLocal) DecryptTeamMerkleLeaf(
ctx context.Context, teamID keybase1.TeamID,
publicKey kbfscrypto.TLFEphemeralPublicKey,
encryptedMerkleLeaf kbfscrypto.EncryptedMerkleLeaf,
minKeyGen keybase1.PerTeamKeyGeneration) (decryptedData []byte, err error) {
perTeamKeys := c.teamPrivateKeys[teamID]
maxKeyGen := keybase1.PerTeamKeyGeneration(len(perTeamKeys))
for i := minKeyGen; i <= maxKeyGen; i++ {
decryptedData, err := kbfscrypto.DecryptMerkleLeaf(
perTeamKeys[i].privKey, publicKey, encryptedMerkleLeaf)
if err == nil {
return decryptedData, nil
}
}
return nil, errors.WithStack(libkb.DecryptionError{})
} | go | func (c *CryptoLocal) DecryptTeamMerkleLeaf(
ctx context.Context, teamID keybase1.TeamID,
publicKey kbfscrypto.TLFEphemeralPublicKey,
encryptedMerkleLeaf kbfscrypto.EncryptedMerkleLeaf,
minKeyGen keybase1.PerTeamKeyGeneration) (decryptedData []byte, err error) {
perTeamKeys := c.teamPrivateKeys[teamID]
maxKeyGen := keybase1.PerTeamKeyGeneration(len(perTeamKeys))
for i := minKeyGen; i <= maxKeyGen; i++ {
decryptedData, err := kbfscrypto.DecryptMerkleLeaf(
perTeamKeys[i].privKey, publicKey, encryptedMerkleLeaf)
if err == nil {
return decryptedData, nil
}
}
return nil, errors.WithStack(libkb.DecryptionError{})
} | [
"func",
"(",
"c",
"*",
"CryptoLocal",
")",
"DecryptTeamMerkleLeaf",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"publicKey",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"encryptedMerkleLeaf",
"kbfscrypto",
".",
"EncryptedMerkleLeaf",
",",
"minKeyGen",
"keybase1",
".",
"PerTeamKeyGeneration",
")",
"(",
"decryptedData",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"perTeamKeys",
":=",
"c",
".",
"teamPrivateKeys",
"[",
"teamID",
"]",
"\n",
"maxKeyGen",
":=",
"keybase1",
".",
"PerTeamKeyGeneration",
"(",
"len",
"(",
"perTeamKeys",
")",
")",
"\n",
"for",
"i",
":=",
"minKeyGen",
";",
"i",
"<=",
"maxKeyGen",
";",
"i",
"++",
"{",
"decryptedData",
",",
"err",
":=",
"kbfscrypto",
".",
"DecryptMerkleLeaf",
"(",
"perTeamKeys",
"[",
"i",
"]",
".",
"privKey",
",",
"publicKey",
",",
"encryptedMerkleLeaf",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"decryptedData",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"errors",
".",
"WithStack",
"(",
"libkb",
".",
"DecryptionError",
"{",
"}",
")",
"\n",
"}"
] | // DecryptTeamMerkleLeaf implements the Crypto interface for
// CryptoLocal. | [
"DecryptTeamMerkleLeaf",
"implements",
"the",
"Crypto",
"interface",
"for",
"CryptoLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/crypto_local.go#L119-L135 |
160,888 | keybase/client | go/kbfs/libfs/update_history.go | GetEncodedUpdateHistory | func GetEncodedUpdateHistory(
ctx context.Context, config libkbfs.Config,
folderBranch data.FolderBranch) (
data []byte, t time.Time, err error) {
history, err := config.KBFSOps().GetUpdateHistory(ctx, folderBranch)
if err != nil {
return nil, time.Time{}, err
}
data, err = json.Marshal(history)
if err != nil {
return nil, time.Time{}, err
}
data = append(data, '\n')
return data, time.Time{}, nil
} | go | func GetEncodedUpdateHistory(
ctx context.Context, config libkbfs.Config,
folderBranch data.FolderBranch) (
data []byte, t time.Time, err error) {
history, err := config.KBFSOps().GetUpdateHistory(ctx, folderBranch)
if err != nil {
return nil, time.Time{}, err
}
data, err = json.Marshal(history)
if err != nil {
return nil, time.Time{}, err
}
data = append(data, '\n')
return data, time.Time{}, nil
} | [
"func",
"GetEncodedUpdateHistory",
"(",
"ctx",
"context",
".",
"Context",
",",
"config",
"libkbfs",
".",
"Config",
",",
"folderBranch",
"data",
".",
"FolderBranch",
")",
"(",
"data",
"[",
"]",
"byte",
",",
"t",
"time",
".",
"Time",
",",
"err",
"error",
")",
"{",
"history",
",",
"err",
":=",
"config",
".",
"KBFSOps",
"(",
")",
".",
"GetUpdateHistory",
"(",
"ctx",
",",
"folderBranch",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"data",
",",
"err",
"=",
"json",
".",
"Marshal",
"(",
"history",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"data",
"=",
"append",
"(",
"data",
",",
"'\\n'",
")",
"\n",
"return",
"data",
",",
"time",
".",
"Time",
"{",
"}",
",",
"nil",
"\n",
"}"
] | // GetEncodedUpdateHistory returns a JSON-encoded version of a TLF's
// complete update history. | [
"GetEncodedUpdateHistory",
"returns",
"a",
"JSON",
"-",
"encoded",
"version",
"of",
"a",
"TLF",
"s",
"complete",
"update",
"history",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/update_history.go#L18-L34 |
160,889 | keybase/client | go/kbfs/libkbfs/keycache.go | NewKeyCacheStandard | func NewKeyCacheStandard(capacity int) *KeyCacheStandard {
head, err := lru.New(capacity)
if err != nil {
panic(err.Error())
}
return &KeyCacheStandard{head}
} | go | func NewKeyCacheStandard(capacity int) *KeyCacheStandard {
head, err := lru.New(capacity)
if err != nil {
panic(err.Error())
}
return &KeyCacheStandard{head}
} | [
"func",
"NewKeyCacheStandard",
"(",
"capacity",
"int",
")",
"*",
"KeyCacheStandard",
"{",
"head",
",",
"err",
":=",
"lru",
".",
"New",
"(",
"capacity",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"&",
"KeyCacheStandard",
"{",
"head",
"}",
"\n",
"}"
] | // NewKeyCacheStandard constructs a new KeyCacheStandard with the given
// cache capacity. | [
"NewKeyCacheStandard",
"constructs",
"a",
"new",
"KeyCacheStandard",
"with",
"the",
"given",
"cache",
"capacity",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keycache.go#L28-L34 |
160,890 | keybase/client | go/kbfs/libkbfs/keycache.go | GetTLFCryptKey | func (k *KeyCacheStandard) GetTLFCryptKey(tlf tlf.ID, keyGen kbfsmd.KeyGen) (
kbfscrypto.TLFCryptKey, error) {
cacheKey := keyCacheKey{tlf, keyGen}
if entry, ok := k.lru.Get(cacheKey); ok {
if key, ok := entry.(kbfscrypto.TLFCryptKey); ok {
return key, nil
}
// shouldn't really be possible
return kbfscrypto.TLFCryptKey{}, KeyCacheHitError{tlf, keyGen}
}
return kbfscrypto.TLFCryptKey{}, KeyCacheMissError{tlf, keyGen}
} | go | func (k *KeyCacheStandard) GetTLFCryptKey(tlf tlf.ID, keyGen kbfsmd.KeyGen) (
kbfscrypto.TLFCryptKey, error) {
cacheKey := keyCacheKey{tlf, keyGen}
if entry, ok := k.lru.Get(cacheKey); ok {
if key, ok := entry.(kbfscrypto.TLFCryptKey); ok {
return key, nil
}
// shouldn't really be possible
return kbfscrypto.TLFCryptKey{}, KeyCacheHitError{tlf, keyGen}
}
return kbfscrypto.TLFCryptKey{}, KeyCacheMissError{tlf, keyGen}
} | [
"func",
"(",
"k",
"*",
"KeyCacheStandard",
")",
"GetTLFCryptKey",
"(",
"tlf",
"tlf",
".",
"ID",
",",
"keyGen",
"kbfsmd",
".",
"KeyGen",
")",
"(",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"error",
")",
"{",
"cacheKey",
":=",
"keyCacheKey",
"{",
"tlf",
",",
"keyGen",
"}",
"\n",
"if",
"entry",
",",
"ok",
":=",
"k",
".",
"lru",
".",
"Get",
"(",
"cacheKey",
")",
";",
"ok",
"{",
"if",
"key",
",",
"ok",
":=",
"entry",
".",
"(",
"kbfscrypto",
".",
"TLFCryptKey",
")",
";",
"ok",
"{",
"return",
"key",
",",
"nil",
"\n",
"}",
"\n",
"// shouldn't really be possible",
"return",
"kbfscrypto",
".",
"TLFCryptKey",
"{",
"}",
",",
"KeyCacheHitError",
"{",
"tlf",
",",
"keyGen",
"}",
"\n",
"}",
"\n",
"return",
"kbfscrypto",
".",
"TLFCryptKey",
"{",
"}",
",",
"KeyCacheMissError",
"{",
"tlf",
",",
"keyGen",
"}",
"\n",
"}"
] | // GetTLFCryptKey implements the KeyCache interface for KeyCacheStandard. | [
"GetTLFCryptKey",
"implements",
"the",
"KeyCache",
"interface",
"for",
"KeyCacheStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keycache.go#L37-L48 |
160,891 | keybase/client | go/kbfs/libkbfs/keycache.go | PutTLFCryptKey | func (k *KeyCacheStandard) PutTLFCryptKey(
tlf tlf.ID, keyGen kbfsmd.KeyGen, key kbfscrypto.TLFCryptKey) error {
cacheKey := keyCacheKey{tlf, keyGen}
k.lru.Add(cacheKey, key)
return nil
} | go | func (k *KeyCacheStandard) PutTLFCryptKey(
tlf tlf.ID, keyGen kbfsmd.KeyGen, key kbfscrypto.TLFCryptKey) error {
cacheKey := keyCacheKey{tlf, keyGen}
k.lru.Add(cacheKey, key)
return nil
} | [
"func",
"(",
"k",
"*",
"KeyCacheStandard",
")",
"PutTLFCryptKey",
"(",
"tlf",
"tlf",
".",
"ID",
",",
"keyGen",
"kbfsmd",
".",
"KeyGen",
",",
"key",
"kbfscrypto",
".",
"TLFCryptKey",
")",
"error",
"{",
"cacheKey",
":=",
"keyCacheKey",
"{",
"tlf",
",",
"keyGen",
"}",
"\n",
"k",
".",
"lru",
".",
"Add",
"(",
"cacheKey",
",",
"key",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // PutTLFCryptKey implements the KeyCache interface for KeyCacheStandard. | [
"PutTLFCryptKey",
"implements",
"the",
"KeyCache",
"interface",
"for",
"KeyCacheStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keycache.go#L51-L56 |
160,892 | keybase/client | go/kbfs/libfs/json.go | PrettyJSON | func PrettyJSON(value interface{}) ([]byte, error) {
data, err := json.MarshalIndent(value, "", " ")
if err != nil {
return nil, err
}
data = append(data, '\n')
return data, nil
} | go | func PrettyJSON(value interface{}) ([]byte, error) {
data, err := json.MarshalIndent(value, "", " ")
if err != nil {
return nil, err
}
data = append(data, '\n')
return data, nil
} | [
"func",
"PrettyJSON",
"(",
"value",
"interface",
"{",
"}",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"data",
",",
"err",
":=",
"json",
".",
"MarshalIndent",
"(",
"value",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"data",
"=",
"append",
"(",
"data",
",",
"'\\n'",
")",
"\n",
"return",
"data",
",",
"nil",
"\n",
"}"
] | // PrettyJSON marshals a value to human-readable JSON. | [
"PrettyJSON",
"marshals",
"a",
"value",
"to",
"human",
"-",
"readable",
"JSON",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/json.go#L12-L19 |
160,893 | keybase/client | go/kbfs/kbfssync/semaphore.go | Count | func (s *Semaphore) Count() int64 {
s.lock.RLock()
defer s.lock.RUnlock()
return s.count
} | go | func (s *Semaphore) Count() int64 {
s.lock.RLock()
defer s.lock.RUnlock()
return s.count
} | [
"func",
"(",
"s",
"*",
"Semaphore",
")",
"Count",
"(",
")",
"int64",
"{",
"s",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"s",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"s",
".",
"count",
"\n",
"}"
] | // Count returns the current resource count. | [
"Count",
"returns",
"the",
"current",
"resource",
"count",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfssync/semaphore.go#L34-L38 |
160,894 | keybase/client | go/kbfs/kbfssync/semaphore.go | tryAcquire | func (s *Semaphore) tryAcquire(n int64) (<-chan struct{}, int64) {
s.lock.Lock()
defer s.lock.Unlock()
if n <= s.count {
s.count -= n
return nil, s.count
}
return s.onRelease, s.count
} | go | func (s *Semaphore) tryAcquire(n int64) (<-chan struct{}, int64) {
s.lock.Lock()
defer s.lock.Unlock()
if n <= s.count {
s.count -= n
return nil, s.count
}
return s.onRelease, s.count
} | [
"func",
"(",
"s",
"*",
"Semaphore",
")",
"tryAcquire",
"(",
"n",
"int64",
")",
"(",
"<-",
"chan",
"struct",
"{",
"}",
",",
"int64",
")",
"{",
"s",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"s",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"n",
"<=",
"s",
".",
"count",
"{",
"s",
".",
"count",
"-=",
"n",
"\n",
"return",
"nil",
",",
"s",
".",
"count",
"\n",
"}",
"\n\n",
"return",
"s",
".",
"onRelease",
",",
"s",
".",
"count",
"\n",
"}"
] | // tryAcquire tries to acquire n resources. If successful, nil is
// returned. Otherwise, a channel which will be closed when new
// resources are available is returned. In either case, the
// possibly-updated resource count is returned. | [
"tryAcquire",
"tries",
"to",
"acquire",
"n",
"resources",
".",
"If",
"successful",
"nil",
"is",
"returned",
".",
"Otherwise",
"a",
"channel",
"which",
"will",
"be",
"closed",
"when",
"new",
"resources",
"are",
"available",
"is",
"returned",
".",
"In",
"either",
"case",
"the",
"possibly",
"-",
"updated",
"resource",
"count",
"is",
"returned",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfssync/semaphore.go#L44-L53 |
160,895 | keybase/client | go/install/install_nix.go | LsofMount | func LsofMount(mountDir string, log Log) ([]CommonLsofResult, error) {
log.Debug("Mount dir to lsof: %s", mountDir)
if mountDir == "" {
return nil, nil
}
if _, serr := os.Stat(mountDir); os.IsNotExist(serr) {
log.Debug("%s, mount dir lsof target, doesn't exist", mountDir)
return nil, nil
}
log.Debug("Checking mount (lsof)")
processes, err := lsof.MountPoint(mountDir)
if err != nil {
// If there is an error in lsof it's ok to continue
// An exit status of 1 means that the mount is not in use, and is
// not really an error.
log.Debug("Continuing despite error in lsof: %s", err)
return nil, nil
}
var ret []CommonLsofResult
for _, process := range processes {
ret = append(ret, CommonLsofResult{process.PID, process.Command})
}
return ret, nil
} | go | func LsofMount(mountDir string, log Log) ([]CommonLsofResult, error) {
log.Debug("Mount dir to lsof: %s", mountDir)
if mountDir == "" {
return nil, nil
}
if _, serr := os.Stat(mountDir); os.IsNotExist(serr) {
log.Debug("%s, mount dir lsof target, doesn't exist", mountDir)
return nil, nil
}
log.Debug("Checking mount (lsof)")
processes, err := lsof.MountPoint(mountDir)
if err != nil {
// If there is an error in lsof it's ok to continue
// An exit status of 1 means that the mount is not in use, and is
// not really an error.
log.Debug("Continuing despite error in lsof: %s", err)
return nil, nil
}
var ret []CommonLsofResult
for _, process := range processes {
ret = append(ret, CommonLsofResult{process.PID, process.Command})
}
return ret, nil
} | [
"func",
"LsofMount",
"(",
"mountDir",
"string",
",",
"log",
"Log",
")",
"(",
"[",
"]",
"CommonLsofResult",
",",
"error",
")",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"mountDir",
")",
"\n",
"if",
"mountDir",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"if",
"_",
",",
"serr",
":=",
"os",
".",
"Stat",
"(",
"mountDir",
")",
";",
"os",
".",
"IsNotExist",
"(",
"serr",
")",
"{",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"mountDir",
")",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"log",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"processes",
",",
"err",
":=",
"lsof",
".",
"MountPoint",
"(",
"mountDir",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// If there is an error in lsof it's ok to continue",
"// An exit status of 1 means that the mount is not in use, and is",
"// not really an error.",
"log",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"var",
"ret",
"[",
"]",
"CommonLsofResult",
"\n",
"for",
"_",
",",
"process",
":=",
"range",
"processes",
"{",
"ret",
"=",
"append",
"(",
"ret",
",",
"CommonLsofResult",
"{",
"process",
".",
"PID",
",",
"process",
".",
"Command",
"}",
")",
"\n",
"}",
"\n",
"return",
"ret",
",",
"nil",
"\n",
"}"
] | // LsofMount does not return an error if it was unable to lsof
// the mountpoint or the mountpoint does not exist. | [
"LsofMount",
"does",
"not",
"return",
"an",
"error",
"if",
"it",
"was",
"unable",
"to",
"lsof",
"the",
"mountpoint",
"or",
"the",
"mountpoint",
"does",
"not",
"exist",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/install/install_nix.go#L24-L48 |
160,896 | keybase/client | go/kbfs/libfs/root_fs.go | Open | func (rfs *RootFS) Open(filename string) (f billy.File, err error) {
if !rootWrappedNodeNames[filename] {
// In particular, this FS doesn't let you open the folderlist
// directories or anything in them.
return nil, os.ErrNotExist
}
switch filename {
case StatusFileName:
return &wrappedReadFile{
name: StatusFileName,
reader: func(ctx context.Context) ([]byte, time.Time, error) {
return GetEncodedStatus(ctx, rfs.config)
},
log: rfs.log,
}, nil
default:
panic(fmt.Sprintf("Name %s was in map, but not in switch", filename))
}
} | go | func (rfs *RootFS) Open(filename string) (f billy.File, err error) {
if !rootWrappedNodeNames[filename] {
// In particular, this FS doesn't let you open the folderlist
// directories or anything in them.
return nil, os.ErrNotExist
}
switch filename {
case StatusFileName:
return &wrappedReadFile{
name: StatusFileName,
reader: func(ctx context.Context) ([]byte, time.Time, error) {
return GetEncodedStatus(ctx, rfs.config)
},
log: rfs.log,
}, nil
default:
panic(fmt.Sprintf("Name %s was in map, but not in switch", filename))
}
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Open",
"(",
"filename",
"string",
")",
"(",
"f",
"billy",
".",
"File",
",",
"err",
"error",
")",
"{",
"if",
"!",
"rootWrappedNodeNames",
"[",
"filename",
"]",
"{",
"// In particular, this FS doesn't let you open the folderlist",
"// directories or anything in them.",
"return",
"nil",
",",
"os",
".",
"ErrNotExist",
"\n",
"}",
"\n\n",
"switch",
"filename",
"{",
"case",
"StatusFileName",
":",
"return",
"&",
"wrappedReadFile",
"{",
"name",
":",
"StatusFileName",
",",
"reader",
":",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"byte",
",",
"time",
".",
"Time",
",",
"error",
")",
"{",
"return",
"GetEncodedStatus",
"(",
"ctx",
",",
"rfs",
".",
"config",
")",
"\n",
"}",
",",
"log",
":",
"rfs",
".",
"log",
",",
"}",
",",
"nil",
"\n",
"default",
":",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"filename",
")",
")",
"\n",
"}",
"\n",
"}"
] | // Open implements the billy.Filesystem interface for RootFS. | [
"Open",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L41-L60 |
160,897 | keybase/client | go/kbfs/libfs/root_fs.go | OpenFile | func (rfs *RootFS) OpenFile(filename string, flag int, _ os.FileMode) (
f billy.File, err error) {
if flag&os.O_CREATE != 0 {
return nil, errors.New("RootFS can't create files")
}
return rfs.Open(filename)
} | go | func (rfs *RootFS) OpenFile(filename string, flag int, _ os.FileMode) (
f billy.File, err error) {
if flag&os.O_CREATE != 0 {
return nil, errors.New("RootFS can't create files")
}
return rfs.Open(filename)
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"OpenFile",
"(",
"filename",
"string",
",",
"flag",
"int",
",",
"_",
"os",
".",
"FileMode",
")",
"(",
"f",
"billy",
".",
"File",
",",
"err",
"error",
")",
"{",
"if",
"flag",
"&",
"os",
".",
"O_CREATE",
"!=",
"0",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"rfs",
".",
"Open",
"(",
"filename",
")",
"\n",
"}"
] | // OpenFile implements the billy.Filesystem interface for RootFS. | [
"OpenFile",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L63-L70 |
160,898 | keybase/client | go/kbfs/libfs/root_fs.go | Lstat | func (rfs *RootFS) Lstat(filename string) (fi os.FileInfo, err error) {
if filename == "" {
filename = "."
}
if filename == "." {
return &wrappedReadFileInfo{
"keybase", 0, rfs.config.Clock().Now(), true}, nil
}
if !rootWrappedNodeNames[filename] {
return nil, os.ErrNotExist
}
switch filename {
case StatusFileName:
wrf := &wrappedReadFile{
name: StatusFileName,
reader: func(ctx context.Context) ([]byte, time.Time, error) {
return GetEncodedStatus(ctx, rfs.config)
},
log: rfs.log,
}
return wrf.GetInfo(), nil
default:
panic(fmt.Sprintf("Name %s was in map, but not in switch", filename))
}
} | go | func (rfs *RootFS) Lstat(filename string) (fi os.FileInfo, err error) {
if filename == "" {
filename = "."
}
if filename == "." {
return &wrappedReadFileInfo{
"keybase", 0, rfs.config.Clock().Now(), true}, nil
}
if !rootWrappedNodeNames[filename] {
return nil, os.ErrNotExist
}
switch filename {
case StatusFileName:
wrf := &wrappedReadFile{
name: StatusFileName,
reader: func(ctx context.Context) ([]byte, time.Time, error) {
return GetEncodedStatus(ctx, rfs.config)
},
log: rfs.log,
}
return wrf.GetInfo(), nil
default:
panic(fmt.Sprintf("Name %s was in map, but not in switch", filename))
}
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Lstat",
"(",
"filename",
"string",
")",
"(",
"fi",
"os",
".",
"FileInfo",
",",
"err",
"error",
")",
"{",
"if",
"filename",
"==",
"\"",
"\"",
"{",
"filename",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"if",
"filename",
"==",
"\"",
"\"",
"{",
"return",
"&",
"wrappedReadFileInfo",
"{",
"\"",
"\"",
",",
"0",
",",
"rfs",
".",
"config",
".",
"Clock",
"(",
")",
".",
"Now",
"(",
")",
",",
"true",
"}",
",",
"nil",
"\n",
"}",
"\n",
"if",
"!",
"rootWrappedNodeNames",
"[",
"filename",
"]",
"{",
"return",
"nil",
",",
"os",
".",
"ErrNotExist",
"\n",
"}",
"\n\n",
"switch",
"filename",
"{",
"case",
"StatusFileName",
":",
"wrf",
":=",
"&",
"wrappedReadFile",
"{",
"name",
":",
"StatusFileName",
",",
"reader",
":",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"byte",
",",
"time",
".",
"Time",
",",
"error",
")",
"{",
"return",
"GetEncodedStatus",
"(",
"ctx",
",",
"rfs",
".",
"config",
")",
"\n",
"}",
",",
"log",
":",
"rfs",
".",
"log",
",",
"}",
"\n",
"return",
"wrf",
".",
"GetInfo",
"(",
")",
",",
"nil",
"\n",
"default",
":",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"filename",
")",
")",
"\n",
"}",
"\n",
"}"
] | // Lstat implements the billy.Filesystem interface for RootFS. | [
"Lstat",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L73-L98 |
160,899 | keybase/client | go/kbfs/libfs/root_fs.go | Stat | func (rfs *RootFS) Stat(filename string) (fi os.FileInfo, err error) {
return rfs.Lstat(filename)
} | go | func (rfs *RootFS) Stat(filename string) (fi os.FileInfo, err error) {
return rfs.Lstat(filename)
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Stat",
"(",
"filename",
"string",
")",
"(",
"fi",
"os",
".",
"FileInfo",
",",
"err",
"error",
")",
"{",
"return",
"rfs",
".",
"Lstat",
"(",
"filename",
")",
"\n",
"}"
] | // Stat implements the billy.Filesystem interface for RootFS. | [
"Stat",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L101-L103 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.