id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
160,900 | keybase/client | go/kbfs/libfs/root_fs.go | Join | func (rfs *RootFS) Join(elem ...string) string {
return path.Clean(path.Join(elem...))
} | go | func (rfs *RootFS) Join(elem ...string) string {
return path.Clean(path.Join(elem...))
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Join",
"(",
"elem",
"...",
"string",
")",
"string",
"{",
"return",
"path",
".",
"Clean",
"(",
"path",
".",
"Join",
"(",
"elem",
"...",
")",
")",
"\n",
"}"
] | // Join implements the billy.Filesystem interface for RootFS. | [
"Join",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L106-L108 |
160,901 | keybase/client | go/kbfs/libfs/root_fs.go | ReadDir | func (rfs *RootFS) ReadDir(p string) (fis []os.FileInfo, err error) {
if p == "" {
p = "."
}
if p != "." {
return nil, os.ErrNotExist
}
now := rfs.config.Clock().Now()
return []os.FileInfo{
&wrappedReadFileInfo{"private", 0, now, true},
&wrappedReadFileInfo{"public", 0, now, true},
&wrappedReadFileInfo{"team", 0, now, true},
}, nil
} | go | func (rfs *RootFS) ReadDir(p string) (fis []os.FileInfo, err error) {
if p == "" {
p = "."
}
if p != "." {
return nil, os.ErrNotExist
}
now := rfs.config.Clock().Now()
return []os.FileInfo{
&wrappedReadFileInfo{"private", 0, now, true},
&wrappedReadFileInfo{"public", 0, now, true},
&wrappedReadFileInfo{"team", 0, now, true},
}, nil
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"ReadDir",
"(",
"p",
"string",
")",
"(",
"fis",
"[",
"]",
"os",
".",
"FileInfo",
",",
"err",
"error",
")",
"{",
"if",
"p",
"==",
"\"",
"\"",
"{",
"p",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"if",
"p",
"!=",
"\"",
"\"",
"{",
"return",
"nil",
",",
"os",
".",
"ErrNotExist",
"\n",
"}",
"\n\n",
"now",
":=",
"rfs",
".",
"config",
".",
"Clock",
"(",
")",
".",
"Now",
"(",
")",
"\n",
"return",
"[",
"]",
"os",
".",
"FileInfo",
"{",
"&",
"wrappedReadFileInfo",
"{",
"\"",
"\"",
",",
"0",
",",
"now",
",",
"true",
"}",
",",
"&",
"wrappedReadFileInfo",
"{",
"\"",
"\"",
",",
"0",
",",
"now",
",",
"true",
"}",
",",
"&",
"wrappedReadFileInfo",
"{",
"\"",
"\"",
",",
"0",
",",
"now",
",",
"true",
"}",
",",
"}",
",",
"nil",
"\n",
"}"
] | // ReadDir implements the billy.Filesystem interface for RootFS. | [
"ReadDir",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L111-L126 |
160,902 | keybase/client | go/kbfs/libfs/root_fs.go | Readlink | func (rfs *RootFS) Readlink(_ string) (target string, err error) {
return "", errors.New("RootFS cannot read links")
} | go | func (rfs *RootFS) Readlink(_ string) (target string, err error) {
return "", errors.New("RootFS cannot read links")
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Readlink",
"(",
"_",
"string",
")",
"(",
"target",
"string",
",",
"err",
"error",
")",
"{",
"return",
"\"",
"\"",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // Readlink implements the billy.Filesystem interface for RootFS. | [
"Readlink",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L129-L131 |
160,903 | keybase/client | go/kbfs/libfs/root_fs.go | Chroot | func (rfs *RootFS) Chroot(_ string) (newFS billy.Filesystem, err error) {
// Don't allow chroot'ing anywhere outside of the root FS since we
// haven't yet implemented folderlist browsing.
return nil, errors.New("RootFS cannot chroot")
} | go | func (rfs *RootFS) Chroot(_ string) (newFS billy.Filesystem, err error) {
// Don't allow chroot'ing anywhere outside of the root FS since we
// haven't yet implemented folderlist browsing.
return nil, errors.New("RootFS cannot chroot")
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Chroot",
"(",
"_",
"string",
")",
"(",
"newFS",
"billy",
".",
"Filesystem",
",",
"err",
"error",
")",
"{",
"// Don't allow chroot'ing anywhere outside of the root FS since we",
"// haven't yet implemented folderlist browsing.",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // Chroot implements the billy.Filesystem interface for RootFS. | [
"Chroot",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L134-L138 |
160,904 | keybase/client | go/kbfs/libfs/root_fs.go | Rename | func (rfs *RootFS) Rename(_, _ string) (err error) {
return errors.New("RootFS cannot rename files")
} | go | func (rfs *RootFS) Rename(_, _ string) (err error) {
return errors.New("RootFS cannot rename files")
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"Rename",
"(",
"_",
",",
"_",
"string",
")",
"(",
"err",
"error",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // Rename implements the billy.Filesystem interface for RootFS. | [
"Rename",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L153-L155 |
160,905 | keybase/client | go/kbfs/libfs/root_fs.go | MkdirAll | func (rfs *RootFS) MkdirAll(_ string, _ os.FileMode) (err error) {
return errors.New("RootFS cannot mkdir")
} | go | func (rfs *RootFS) MkdirAll(_ string, _ os.FileMode) (err error) {
return errors.New("RootFS cannot mkdir")
} | [
"func",
"(",
"rfs",
"*",
"RootFS",
")",
"MkdirAll",
"(",
"_",
"string",
",",
"_",
"os",
".",
"FileMode",
")",
"(",
"err",
"error",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // MkdirAll implements the billy.Filesystem interface for RootFS. | [
"MkdirAll",
"implements",
"the",
"billy",
".",
"Filesystem",
"interface",
"for",
"RootFS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/root_fs.go#L168-L170 |
160,906 | keybase/client | go/ephemeral/lib.go | GetTeamEK | func (e *EKLib) GetTeamEK(mctx libkb.MetaContext, teamID keybase1.TeamID, generation keybase1.EkGeneration,
contentCtime *gregor1.Time) (teamEK keybase1.TeamEk, err error) {
defer mctx.TraceTimed("GetTeamEK", func() error { return err })()
teamEKBoxStorage := mctx.G().GetTeamEKBoxStorage()
teamEK, err = teamEKBoxStorage.Get(mctx, teamID, generation, contentCtime)
if err != nil {
switch err.(type) {
case EphemeralKeyError:
mctx.Debug(err.Error())
// If we are unable to get the current max generation, try to kick
// off creation of a new key.
go func(mctx libkb.MetaContext) {
maxGeneration, err := teamEKBoxStorage.MaxGeneration(mctx, teamID, true)
if err != nil {
mctx.Debug("Unable to get MaxGeneration: %v", err)
return
}
if generation == maxGeneration {
_, created, cerr := e.GetOrCreateLatestTeamEK(mctx, teamID)
if cerr != nil {
mctx.Debug("Unable to GetOrCreateLatestTeamEK: %v", cerr)
}
if e.backgroundCreationTestCh != nil {
e.backgroundCreationTestCh <- created
}
}
}(libkb.NewMetaContextBackground(mctx.G()))
}
}
return teamEK, err
} | go | func (e *EKLib) GetTeamEK(mctx libkb.MetaContext, teamID keybase1.TeamID, generation keybase1.EkGeneration,
contentCtime *gregor1.Time) (teamEK keybase1.TeamEk, err error) {
defer mctx.TraceTimed("GetTeamEK", func() error { return err })()
teamEKBoxStorage := mctx.G().GetTeamEKBoxStorage()
teamEK, err = teamEKBoxStorage.Get(mctx, teamID, generation, contentCtime)
if err != nil {
switch err.(type) {
case EphemeralKeyError:
mctx.Debug(err.Error())
// If we are unable to get the current max generation, try to kick
// off creation of a new key.
go func(mctx libkb.MetaContext) {
maxGeneration, err := teamEKBoxStorage.MaxGeneration(mctx, teamID, true)
if err != nil {
mctx.Debug("Unable to get MaxGeneration: %v", err)
return
}
if generation == maxGeneration {
_, created, cerr := e.GetOrCreateLatestTeamEK(mctx, teamID)
if cerr != nil {
mctx.Debug("Unable to GetOrCreateLatestTeamEK: %v", cerr)
}
if e.backgroundCreationTestCh != nil {
e.backgroundCreationTestCh <- created
}
}
}(libkb.NewMetaContextBackground(mctx.G()))
}
}
return teamEK, err
} | [
"func",
"(",
"e",
"*",
"EKLib",
")",
"GetTeamEK",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"generation",
"keybase1",
".",
"EkGeneration",
",",
"contentCtime",
"*",
"gregor1",
".",
"Time",
")",
"(",
"teamEK",
"keybase1",
".",
"TeamEk",
",",
"err",
"error",
")",
"{",
"defer",
"mctx",
".",
"TraceTimed",
"(",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"teamEKBoxStorage",
":=",
"mctx",
".",
"G",
"(",
")",
".",
"GetTeamEKBoxStorage",
"(",
")",
"\n",
"teamEK",
",",
"err",
"=",
"teamEKBoxStorage",
".",
"Get",
"(",
"mctx",
",",
"teamID",
",",
"generation",
",",
"contentCtime",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"switch",
"err",
".",
"(",
"type",
")",
"{",
"case",
"EphemeralKeyError",
":",
"mctx",
".",
"Debug",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"// If we are unable to get the current max generation, try to kick",
"// off creation of a new key.",
"go",
"func",
"(",
"mctx",
"libkb",
".",
"MetaContext",
")",
"{",
"maxGeneration",
",",
"err",
":=",
"teamEKBoxStorage",
".",
"MaxGeneration",
"(",
"mctx",
",",
"teamID",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"\n",
"}",
"\n",
"if",
"generation",
"==",
"maxGeneration",
"{",
"_",
",",
"created",
",",
"cerr",
":=",
"e",
".",
"GetOrCreateLatestTeamEK",
"(",
"mctx",
",",
"teamID",
")",
"\n",
"if",
"cerr",
"!=",
"nil",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"cerr",
")",
"\n",
"}",
"\n",
"if",
"e",
".",
"backgroundCreationTestCh",
"!=",
"nil",
"{",
"e",
".",
"backgroundCreationTestCh",
"<-",
"created",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
"libkb",
".",
"NewMetaContextBackground",
"(",
"mctx",
".",
"G",
"(",
")",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"teamEK",
",",
"err",
"\n",
"}"
] | // Try to get the TeamEK for the given `generation`. If this fails and the
// `generation` is also the current maxGeneration, create a new teamEK. | [
"Try",
"to",
"get",
"the",
"TeamEK",
"for",
"the",
"given",
"generation",
".",
"If",
"this",
"fails",
"and",
"the",
"generation",
"is",
"also",
"the",
"current",
"maxGeneration",
"create",
"a",
"new",
"teamEK",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/ephemeral/lib.go#L536-L567 |
160,907 | keybase/client | go/install/install_windows.go | AutoInstall | func AutoInstall(context Context, binPath string, force bool, timeout time.Duration, log Log) (bool, error) {
return false, nil
} | go | func AutoInstall(context Context, binPath string, force bool, timeout time.Duration, log Log) (bool, error) {
return false, nil
} | [
"func",
"AutoInstall",
"(",
"context",
"Context",
",",
"binPath",
"string",
",",
"force",
"bool",
",",
"timeout",
"time",
".",
"Duration",
",",
"log",
"Log",
")",
"(",
"bool",
",",
"error",
")",
"{",
"return",
"false",
",",
"nil",
"\n",
"}"
] | // AutoInstall is not supported on Windows | [
"AutoInstall",
"is",
"not",
"supported",
"on",
"Windows"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/install/install_windows.go#L45-L47 |
160,908 | keybase/client | go/install/install_windows.go | InstallLogPath | func InstallLogPath() (string, error) {
// Get the 3 newest keybase logs - sorting by name works because timestamp
keybaseLogFiles, err := filepath.Glob(os.ExpandEnv(filepath.Join("${TEMP}", "Keybase*.log")))
sort.Sort(sort.Reverse(sort.StringSlice(keybaseLogFiles)))
if len(keybaseLogFiles) > 6 {
keybaseLogFiles = keybaseLogFiles[:6]
}
// Get the latest msi log - this is the clean install .msi log
msiLogFiles, err := filepath.Glob(os.ExpandEnv(filepath.Join("${TEMP}", "MSI*.LOG")))
sort.Sort(sort.Reverse(sort.StringSlice(msiLogFiles)))
if len(msiLogFiles) >= 1 {
keybaseLogFiles = append(keybaseLogFiles, msiLogFiles[0])
}
// Get the 2 newest dokan logs - sorting by name works because timestamp
dokanLogFiles, err := filepath.Glob(os.ExpandEnv(filepath.Join("${TEMP}", "Dokan*.log")))
sort.Sort(sort.Reverse(sort.StringSlice(dokanLogFiles)))
if len(dokanLogFiles) > 2 {
dokanLogFiles = dokanLogFiles[:2]
}
keybaseLogFiles = append(keybaseLogFiles, dokanLogFiles...)
logName, logFile, err := libkb.OpenTempFile("KeybaseInstallUpload", ".log", 0)
defer logFile.Close()
if err != nil {
return "", err
}
getVersionAndDrivers(logFile)
if len(keybaseLogFiles) == 0 {
fmt.Fprintf(logFile, " --- NO INSTALL LOGS FOUND!?! ---\n")
}
for _, path := range keybaseLogFiles {
fmt.Fprintf(logFile, " --- %s ---\n", path)
// We have to parse the contents and write them because some files need to
// be decoded from utf16
s, err := newScannerUTF16or8(path)
if err != nil {
fmt.Fprintf(logFile, " --- NewScannerUTF16(%s) returns %v---\n", path, err)
} else {
scanner := bufio.NewScanner(s)
for scanner.Scan() {
fmt.Fprintln(logFile, scanner.Text()) // Println will add back the final '\n'
}
if err := scanner.Err(); err != nil {
fmt.Fprintf(logFile, " --- error reading (%s): %v---\n", path, err)
}
}
fmt.Fprint(logFile, "\n\n")
}
return logName, err
} | go | func InstallLogPath() (string, error) {
// Get the 3 newest keybase logs - sorting by name works because timestamp
keybaseLogFiles, err := filepath.Glob(os.ExpandEnv(filepath.Join("${TEMP}", "Keybase*.log")))
sort.Sort(sort.Reverse(sort.StringSlice(keybaseLogFiles)))
if len(keybaseLogFiles) > 6 {
keybaseLogFiles = keybaseLogFiles[:6]
}
// Get the latest msi log - this is the clean install .msi log
msiLogFiles, err := filepath.Glob(os.ExpandEnv(filepath.Join("${TEMP}", "MSI*.LOG")))
sort.Sort(sort.Reverse(sort.StringSlice(msiLogFiles)))
if len(msiLogFiles) >= 1 {
keybaseLogFiles = append(keybaseLogFiles, msiLogFiles[0])
}
// Get the 2 newest dokan logs - sorting by name works because timestamp
dokanLogFiles, err := filepath.Glob(os.ExpandEnv(filepath.Join("${TEMP}", "Dokan*.log")))
sort.Sort(sort.Reverse(sort.StringSlice(dokanLogFiles)))
if len(dokanLogFiles) > 2 {
dokanLogFiles = dokanLogFiles[:2]
}
keybaseLogFiles = append(keybaseLogFiles, dokanLogFiles...)
logName, logFile, err := libkb.OpenTempFile("KeybaseInstallUpload", ".log", 0)
defer logFile.Close()
if err != nil {
return "", err
}
getVersionAndDrivers(logFile)
if len(keybaseLogFiles) == 0 {
fmt.Fprintf(logFile, " --- NO INSTALL LOGS FOUND!?! ---\n")
}
for _, path := range keybaseLogFiles {
fmt.Fprintf(logFile, " --- %s ---\n", path)
// We have to parse the contents and write them because some files need to
// be decoded from utf16
s, err := newScannerUTF16or8(path)
if err != nil {
fmt.Fprintf(logFile, " --- NewScannerUTF16(%s) returns %v---\n", path, err)
} else {
scanner := bufio.NewScanner(s)
for scanner.Scan() {
fmt.Fprintln(logFile, scanner.Text()) // Println will add back the final '\n'
}
if err := scanner.Err(); err != nil {
fmt.Fprintf(logFile, " --- error reading (%s): %v---\n", path, err)
}
}
fmt.Fprint(logFile, "\n\n")
}
return logName, err
} | [
"func",
"InstallLogPath",
"(",
")",
"(",
"string",
",",
"error",
")",
"{",
"// Get the 3 newest keybase logs - sorting by name works because timestamp",
"keybaseLogFiles",
",",
"err",
":=",
"filepath",
".",
"Glob",
"(",
"os",
".",
"ExpandEnv",
"(",
"filepath",
".",
"Join",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"sort",
".",
"Reverse",
"(",
"sort",
".",
"StringSlice",
"(",
"keybaseLogFiles",
")",
")",
")",
"\n",
"if",
"len",
"(",
"keybaseLogFiles",
")",
">",
"6",
"{",
"keybaseLogFiles",
"=",
"keybaseLogFiles",
"[",
":",
"6",
"]",
"\n",
"}",
"\n\n",
"// Get the latest msi log - this is the clean install .msi log",
"msiLogFiles",
",",
"err",
":=",
"filepath",
".",
"Glob",
"(",
"os",
".",
"ExpandEnv",
"(",
"filepath",
".",
"Join",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"sort",
".",
"Reverse",
"(",
"sort",
".",
"StringSlice",
"(",
"msiLogFiles",
")",
")",
")",
"\n",
"if",
"len",
"(",
"msiLogFiles",
")",
">=",
"1",
"{",
"keybaseLogFiles",
"=",
"append",
"(",
"keybaseLogFiles",
",",
"msiLogFiles",
"[",
"0",
"]",
")",
"\n",
"}",
"\n\n",
"// Get the 2 newest dokan logs - sorting by name works because timestamp",
"dokanLogFiles",
",",
"err",
":=",
"filepath",
".",
"Glob",
"(",
"os",
".",
"ExpandEnv",
"(",
"filepath",
".",
"Join",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"sort",
".",
"Reverse",
"(",
"sort",
".",
"StringSlice",
"(",
"dokanLogFiles",
")",
")",
")",
"\n",
"if",
"len",
"(",
"dokanLogFiles",
")",
">",
"2",
"{",
"dokanLogFiles",
"=",
"dokanLogFiles",
"[",
":",
"2",
"]",
"\n",
"}",
"\n",
"keybaseLogFiles",
"=",
"append",
"(",
"keybaseLogFiles",
",",
"dokanLogFiles",
"...",
")",
"\n\n",
"logName",
",",
"logFile",
",",
"err",
":=",
"libkb",
".",
"OpenTempFile",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"0",
")",
"\n",
"defer",
"logFile",
".",
"Close",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"getVersionAndDrivers",
"(",
"logFile",
")",
"\n\n",
"if",
"len",
"(",
"keybaseLogFiles",
")",
"==",
"0",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"path",
":=",
"range",
"keybaseLogFiles",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
",",
"path",
")",
"\n\n",
"// We have to parse the contents and write them because some files need to",
"// be decoded from utf16",
"s",
",",
"err",
":=",
"newScannerUTF16or8",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
",",
"path",
",",
"err",
")",
"\n",
"}",
"else",
"{",
"scanner",
":=",
"bufio",
".",
"NewScanner",
"(",
"s",
")",
"\n",
"for",
"scanner",
".",
"Scan",
"(",
")",
"{",
"fmt",
".",
"Fprintln",
"(",
"logFile",
",",
"scanner",
".",
"Text",
"(",
")",
")",
"// Println will add back the final '\\n'",
"\n",
"}",
"\n",
"if",
"err",
":=",
"scanner",
".",
"Err",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
",",
"path",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"fmt",
".",
"Fprint",
"(",
"logFile",
",",
"\"",
"\\n",
"\\n",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"logName",
",",
"err",
"\n",
"}"
] | // InstallLogPath combines a handful of install logs in to one for
// server upload.
// Unfortunately, Dokan can generate UTF16 logs, so we test each file
// and translate if necessary. | [
"InstallLogPath",
"combines",
"a",
"handful",
"of",
"install",
"logs",
"in",
"to",
"one",
"for",
"server",
"upload",
".",
"Unfortunately",
"Dokan",
"can",
"generate",
"UTF16",
"logs",
"so",
"we",
"test",
"each",
"file",
"and",
"translate",
"if",
"necessary",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/install/install_windows.go#L122-L177 |
160,909 | keybase/client | go/install/install_windows.go | WatchdogLogPath | func WatchdogLogPath(logGlobPath string) (string, error) {
// Get the 5 newest watchdog logs - sorting by name works because timestamp
watchdogLogFiles, err := filepath.Glob(logGlobPath)
sort.Sort(sort.Reverse(sort.StringSlice(watchdogLogFiles)))
if len(watchdogLogFiles) > 5 {
watchdogLogFiles = watchdogLogFiles[:5]
}
logName, logFile, err := libkb.OpenTempFile("KeybaseWatchdogUpload", ".log", 0)
defer logFile.Close()
if err != nil {
return "", err
}
if len(watchdogLogFiles) == 0 {
fmt.Fprintf(logFile, " --- NO WATCHDOG LOGS FOUND!?! ---\n")
}
for _, path := range watchdogLogFiles {
fmt.Fprintf(logFile, " --- %s ---\n", path)
// append the files
func() {
fd, err := os.Open(path)
defer fd.Close()
if err != nil {
fmt.Fprintf(logFile, "open error: %s\n", err.Error())
return
}
_, err = io.Copy(logFile, fd)
if err != nil {
fmt.Fprintf(logFile, "copy error: %s\n", err.Error())
}
}()
}
return logName, err
} | go | func WatchdogLogPath(logGlobPath string) (string, error) {
// Get the 5 newest watchdog logs - sorting by name works because timestamp
watchdogLogFiles, err := filepath.Glob(logGlobPath)
sort.Sort(sort.Reverse(sort.StringSlice(watchdogLogFiles)))
if len(watchdogLogFiles) > 5 {
watchdogLogFiles = watchdogLogFiles[:5]
}
logName, logFile, err := libkb.OpenTempFile("KeybaseWatchdogUpload", ".log", 0)
defer logFile.Close()
if err != nil {
return "", err
}
if len(watchdogLogFiles) == 0 {
fmt.Fprintf(logFile, " --- NO WATCHDOG LOGS FOUND!?! ---\n")
}
for _, path := range watchdogLogFiles {
fmt.Fprintf(logFile, " --- %s ---\n", path)
// append the files
func() {
fd, err := os.Open(path)
defer fd.Close()
if err != nil {
fmt.Fprintf(logFile, "open error: %s\n", err.Error())
return
}
_, err = io.Copy(logFile, fd)
if err != nil {
fmt.Fprintf(logFile, "copy error: %s\n", err.Error())
}
}()
}
return logName, err
} | [
"func",
"WatchdogLogPath",
"(",
"logGlobPath",
"string",
")",
"(",
"string",
",",
"error",
")",
"{",
"// Get the 5 newest watchdog logs - sorting by name works because timestamp",
"watchdogLogFiles",
",",
"err",
":=",
"filepath",
".",
"Glob",
"(",
"logGlobPath",
")",
"\n",
"sort",
".",
"Sort",
"(",
"sort",
".",
"Reverse",
"(",
"sort",
".",
"StringSlice",
"(",
"watchdogLogFiles",
")",
")",
")",
"\n",
"if",
"len",
"(",
"watchdogLogFiles",
")",
">",
"5",
"{",
"watchdogLogFiles",
"=",
"watchdogLogFiles",
"[",
":",
"5",
"]",
"\n",
"}",
"\n\n",
"logName",
",",
"logFile",
",",
"err",
":=",
"libkb",
".",
"OpenTempFile",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"0",
")",
"\n",
"defer",
"logFile",
".",
"Close",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"watchdogLogFiles",
")",
"==",
"0",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"path",
":=",
"range",
"watchdogLogFiles",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
",",
"path",
")",
"\n\n",
"// append the files",
"func",
"(",
")",
"{",
"fd",
",",
"err",
":=",
"os",
".",
"Open",
"(",
"path",
")",
"\n",
"defer",
"fd",
".",
"Close",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"return",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"io",
".",
"Copy",
"(",
"logFile",
",",
"fd",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fmt",
".",
"Fprintf",
"(",
"logFile",
",",
"\"",
"\\n",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"logName",
",",
"err",
"\n",
"}"
] | // WatchdogLogPath combines a handful of watchdog logs in to one for
// server upload. | [
"WatchdogLogPath",
"combines",
"a",
"handful",
"of",
"watchdog",
"logs",
"in",
"to",
"one",
"for",
"server",
"upload",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/install/install_windows.go#L181-L217 |
160,910 | keybase/client | go/kbfs/libkbfs/unflushed_path_cache.go | addUnflushedPaths | func addUnflushedPaths(ctx context.Context,
uid keybase1.UID, key kbfscrypto.VerifyingKey, codec kbfscodec.Codec,
log logger.Logger, osg idutil.OfflineStatusGetter, mdInfos []unflushedPathMDInfo,
cpp chainsPathPopulator, unflushedPaths unflushedPathsMap) error {
// Make chains over the entire range to get the unflushed files.
chains := newCRChainsEmpty()
processedOne := false
for _, mdInfo := range mdInfos {
offline := keybase1.OfflineAvailability_NONE
if osg != nil {
offline = osg.OfflineAvailabilityForID(mdInfo.kmd.TlfID())
}
winfo := newWriterInfo(uid, key, mdInfo.revision, offline)
if _, ok := unflushedPaths[mdInfo.revision]; ok {
if processedOne {
return fmt.Errorf("Couldn't skip revision %d after "+
"already processing one", mdInfo.revision)
}
log.CDebugf(ctx, "Skipping unflushed paths for revision %d "+
"since it's already in the cache", mdInfo.revision)
continue
}
unflushedPaths[mdInfo.revision] = make(map[string]bool)
processedOne = true
err := chains.addOps(codec, mdInfo.pmd, winfo, mdInfo.localTimestamp)
if err != nil {
return err
}
}
if !processedOne {
return nil
}
mostRecentMDInfo := mdInfos[len(mdInfos)-1]
chains.mostRecentChainMDInfo = mostRecentMDInfo.kmd
// Does the last op already have a valid path in each chain? If
// so, we don't need to bother populating the paths, which can
// take a fair amount of CPU since the node cache isn't already
// up-to-date with the current set of pointers (because the MDs
// haven't been committed yet).
populatePaths := false
for _, chain := range chains.byOriginal {
if len(chain.ops) > 0 &&
!chain.ops[len(chain.ops)-1].getFinalPath().IsValid() {
populatePaths = true
break
}
}
if populatePaths {
err := cpp.populateChainPaths(ctx, log, chains, true)
if err != nil {
return err
}
}
for _, chain := range chains.byOriginal {
if len(chain.ops) > 0 {
// Use the same final path from the chain for all ops.
finalPath := chain.ops[len(chain.ops)-1].getFinalPath().
CanonicalPathString()
for _, op := range chain.ops {
revPaths, ok := unflushedPaths[op.getWriterInfo().revision]
if !ok {
panic(fmt.Sprintf("No rev map for revision %d",
op.getWriterInfo().revision))
}
revPaths[finalPath] = true
}
}
}
return nil
} | go | func addUnflushedPaths(ctx context.Context,
uid keybase1.UID, key kbfscrypto.VerifyingKey, codec kbfscodec.Codec,
log logger.Logger, osg idutil.OfflineStatusGetter, mdInfos []unflushedPathMDInfo,
cpp chainsPathPopulator, unflushedPaths unflushedPathsMap) error {
// Make chains over the entire range to get the unflushed files.
chains := newCRChainsEmpty()
processedOne := false
for _, mdInfo := range mdInfos {
offline := keybase1.OfflineAvailability_NONE
if osg != nil {
offline = osg.OfflineAvailabilityForID(mdInfo.kmd.TlfID())
}
winfo := newWriterInfo(uid, key, mdInfo.revision, offline)
if _, ok := unflushedPaths[mdInfo.revision]; ok {
if processedOne {
return fmt.Errorf("Couldn't skip revision %d after "+
"already processing one", mdInfo.revision)
}
log.CDebugf(ctx, "Skipping unflushed paths for revision %d "+
"since it's already in the cache", mdInfo.revision)
continue
}
unflushedPaths[mdInfo.revision] = make(map[string]bool)
processedOne = true
err := chains.addOps(codec, mdInfo.pmd, winfo, mdInfo.localTimestamp)
if err != nil {
return err
}
}
if !processedOne {
return nil
}
mostRecentMDInfo := mdInfos[len(mdInfos)-1]
chains.mostRecentChainMDInfo = mostRecentMDInfo.kmd
// Does the last op already have a valid path in each chain? If
// so, we don't need to bother populating the paths, which can
// take a fair amount of CPU since the node cache isn't already
// up-to-date with the current set of pointers (because the MDs
// haven't been committed yet).
populatePaths := false
for _, chain := range chains.byOriginal {
if len(chain.ops) > 0 &&
!chain.ops[len(chain.ops)-1].getFinalPath().IsValid() {
populatePaths = true
break
}
}
if populatePaths {
err := cpp.populateChainPaths(ctx, log, chains, true)
if err != nil {
return err
}
}
for _, chain := range chains.byOriginal {
if len(chain.ops) > 0 {
// Use the same final path from the chain for all ops.
finalPath := chain.ops[len(chain.ops)-1].getFinalPath().
CanonicalPathString()
for _, op := range chain.ops {
revPaths, ok := unflushedPaths[op.getWriterInfo().revision]
if !ok {
panic(fmt.Sprintf("No rev map for revision %d",
op.getWriterInfo().revision))
}
revPaths[finalPath] = true
}
}
}
return nil
} | [
"func",
"addUnflushedPaths",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"VerifyingKey",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"log",
"logger",
".",
"Logger",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"mdInfos",
"[",
"]",
"unflushedPathMDInfo",
",",
"cpp",
"chainsPathPopulator",
",",
"unflushedPaths",
"unflushedPathsMap",
")",
"error",
"{",
"// Make chains over the entire range to get the unflushed files.",
"chains",
":=",
"newCRChainsEmpty",
"(",
")",
"\n",
"processedOne",
":=",
"false",
"\n",
"for",
"_",
",",
"mdInfo",
":=",
"range",
"mdInfos",
"{",
"offline",
":=",
"keybase1",
".",
"OfflineAvailability_NONE",
"\n",
"if",
"osg",
"!=",
"nil",
"{",
"offline",
"=",
"osg",
".",
"OfflineAvailabilityForID",
"(",
"mdInfo",
".",
"kmd",
".",
"TlfID",
"(",
")",
")",
"\n",
"}",
"\n",
"winfo",
":=",
"newWriterInfo",
"(",
"uid",
",",
"key",
",",
"mdInfo",
".",
"revision",
",",
"offline",
")",
"\n",
"if",
"_",
",",
"ok",
":=",
"unflushedPaths",
"[",
"mdInfo",
".",
"revision",
"]",
";",
"ok",
"{",
"if",
"processedOne",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"mdInfo",
".",
"revision",
")",
"\n",
"}",
"\n\n",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"mdInfo",
".",
"revision",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"unflushedPaths",
"[",
"mdInfo",
".",
"revision",
"]",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"bool",
")",
"\n\n",
"processedOne",
"=",
"true",
"\n",
"err",
":=",
"chains",
".",
"addOps",
"(",
"codec",
",",
"mdInfo",
".",
"pmd",
",",
"winfo",
",",
"mdInfo",
".",
"localTimestamp",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"!",
"processedOne",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"mostRecentMDInfo",
":=",
"mdInfos",
"[",
"len",
"(",
"mdInfos",
")",
"-",
"1",
"]",
"\n",
"chains",
".",
"mostRecentChainMDInfo",
"=",
"mostRecentMDInfo",
".",
"kmd",
"\n\n",
"// Does the last op already have a valid path in each chain? If",
"// so, we don't need to bother populating the paths, which can",
"// take a fair amount of CPU since the node cache isn't already",
"// up-to-date with the current set of pointers (because the MDs",
"// haven't been committed yet).",
"populatePaths",
":=",
"false",
"\n",
"for",
"_",
",",
"chain",
":=",
"range",
"chains",
".",
"byOriginal",
"{",
"if",
"len",
"(",
"chain",
".",
"ops",
")",
">",
"0",
"&&",
"!",
"chain",
".",
"ops",
"[",
"len",
"(",
"chain",
".",
"ops",
")",
"-",
"1",
"]",
".",
"getFinalPath",
"(",
")",
".",
"IsValid",
"(",
")",
"{",
"populatePaths",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"populatePaths",
"{",
"err",
":=",
"cpp",
".",
"populateChainPaths",
"(",
"ctx",
",",
"log",
",",
"chains",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"chain",
":=",
"range",
"chains",
".",
"byOriginal",
"{",
"if",
"len",
"(",
"chain",
".",
"ops",
")",
">",
"0",
"{",
"// Use the same final path from the chain for all ops.",
"finalPath",
":=",
"chain",
".",
"ops",
"[",
"len",
"(",
"chain",
".",
"ops",
")",
"-",
"1",
"]",
".",
"getFinalPath",
"(",
")",
".",
"CanonicalPathString",
"(",
")",
"\n",
"for",
"_",
",",
"op",
":=",
"range",
"chain",
".",
"ops",
"{",
"revPaths",
",",
"ok",
":=",
"unflushedPaths",
"[",
"op",
".",
"getWriterInfo",
"(",
")",
".",
"revision",
"]",
"\n",
"if",
"!",
"ok",
"{",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"op",
".",
"getWriterInfo",
"(",
")",
".",
"revision",
")",
")",
"\n",
"}",
"\n",
"revPaths",
"[",
"finalPath",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // addUnflushedPaths populates the given unflushed paths object. The
// caller should NOT be holding any locks, as it's possible that
// blocks will need to be fetched. | [
"addUnflushedPaths",
"populates",
"the",
"given",
"unflushed",
"paths",
"object",
".",
"The",
"caller",
"should",
"NOT",
"be",
"holding",
"any",
"locks",
"as",
"it",
"s",
"possible",
"that",
"blocks",
"will",
"need",
"to",
"be",
"fetched",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/unflushed_path_cache.go#L158-L233 |
160,911 | keybase/client | go/kbfs/libkbfs/unflushed_path_cache.go | prepUnflushedPaths | func (upc *unflushedPathCache) prepUnflushedPaths(ctx context.Context,
uid keybase1.UID, key kbfscrypto.VerifyingKey, codec kbfscodec.Codec,
log logger.Logger, osg idutil.OfflineStatusGetter, mdInfo unflushedPathMDInfo) (
unflushedPathsPerRevMap, error) {
cpp := func() chainsPathPopulator {
upc.lock.Lock()
defer upc.lock.Unlock()
return upc.chainsPopulator
}()
// The unflushed paths haven't been initialized yet.
if cpp == nil {
return nil, nil
}
newUnflushedPaths := make(unflushedPathsMap)
mdInfos := []unflushedPathMDInfo{mdInfo}
err := addUnflushedPaths(
ctx, uid, key, codec, log, osg, mdInfos, cpp, newUnflushedPaths)
if err != nil {
return nil, err
}
if len(newUnflushedPaths) > 1 {
return nil, fmt.Errorf("%d unflushed revisions on a single put",
len(newUnflushedPaths))
}
perRevMap, ok := newUnflushedPaths[mdInfo.revision]
if !ok {
panic(fmt.Errorf("Cannot find per-revision map for revision %d",
mdInfo.revision))
}
return perRevMap, nil
} | go | func (upc *unflushedPathCache) prepUnflushedPaths(ctx context.Context,
uid keybase1.UID, key kbfscrypto.VerifyingKey, codec kbfscodec.Codec,
log logger.Logger, osg idutil.OfflineStatusGetter, mdInfo unflushedPathMDInfo) (
unflushedPathsPerRevMap, error) {
cpp := func() chainsPathPopulator {
upc.lock.Lock()
defer upc.lock.Unlock()
return upc.chainsPopulator
}()
// The unflushed paths haven't been initialized yet.
if cpp == nil {
return nil, nil
}
newUnflushedPaths := make(unflushedPathsMap)
mdInfos := []unflushedPathMDInfo{mdInfo}
err := addUnflushedPaths(
ctx, uid, key, codec, log, osg, mdInfos, cpp, newUnflushedPaths)
if err != nil {
return nil, err
}
if len(newUnflushedPaths) > 1 {
return nil, fmt.Errorf("%d unflushed revisions on a single put",
len(newUnflushedPaths))
}
perRevMap, ok := newUnflushedPaths[mdInfo.revision]
if !ok {
panic(fmt.Errorf("Cannot find per-revision map for revision %d",
mdInfo.revision))
}
return perRevMap, nil
} | [
"func",
"(",
"upc",
"*",
"unflushedPathCache",
")",
"prepUnflushedPaths",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"VerifyingKey",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"log",
"logger",
".",
"Logger",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"mdInfo",
"unflushedPathMDInfo",
")",
"(",
"unflushedPathsPerRevMap",
",",
"error",
")",
"{",
"cpp",
":=",
"func",
"(",
")",
"chainsPathPopulator",
"{",
"upc",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"upc",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"return",
"upc",
".",
"chainsPopulator",
"\n",
"}",
"(",
")",
"\n\n",
"// The unflushed paths haven't been initialized yet.",
"if",
"cpp",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"newUnflushedPaths",
":=",
"make",
"(",
"unflushedPathsMap",
")",
"\n",
"mdInfos",
":=",
"[",
"]",
"unflushedPathMDInfo",
"{",
"mdInfo",
"}",
"\n\n",
"err",
":=",
"addUnflushedPaths",
"(",
"ctx",
",",
"uid",
",",
"key",
",",
"codec",
",",
"log",
",",
"osg",
",",
"mdInfos",
",",
"cpp",
",",
"newUnflushedPaths",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"newUnflushedPaths",
")",
">",
"1",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"newUnflushedPaths",
")",
")",
"\n",
"}",
"\n\n",
"perRevMap",
",",
"ok",
":=",
"newUnflushedPaths",
"[",
"mdInfo",
".",
"revision",
"]",
"\n",
"if",
"!",
"ok",
"{",
"panic",
"(",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"mdInfo",
".",
"revision",
")",
")",
"\n",
"}",
"\n\n",
"return",
"perRevMap",
",",
"nil",
"\n",
"}"
] | // prepUnflushedPaths returns a set of paths that were updated in the
// given revision. | [
"prepUnflushedPaths",
"returns",
"a",
"set",
"of",
"paths",
"that",
"were",
"updated",
"in",
"the",
"given",
"revision",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/unflushed_path_cache.go#L237-L272 |
160,912 | keybase/client | go/kbfs/libkbfs/unflushed_path_cache.go | appendToCache | func (upc *unflushedPathCache) appendToCache(mdInfo unflushedPathMDInfo,
perRevMap unflushedPathsPerRevMap) bool {
upc.lock.Lock()
defer upc.lock.Unlock()
switch upc.state {
case upcUninitialized:
// Nothing to do.
case upcInitializing:
// Append to queue for processing at the end of initialization.
upc.queue = append(upc.queue, upcQueuedOp{
op: upcOpAppend,
info: mdInfo,
rev: mdInfo.revision,
})
case upcInitialized:
if perRevMap == nil {
// This was prepared before `upc.chainsPopulator` was set,
// and needs to be done again.
return false
}
// Update the cache with the prepared paths.
upc.unflushedPaths[mdInfo.revision] = perRevMap
default:
panic(fmt.Sprintf("Unknown unflushedPathsCache state: %v", upc.state))
}
return true
} | go | func (upc *unflushedPathCache) appendToCache(mdInfo unflushedPathMDInfo,
perRevMap unflushedPathsPerRevMap) bool {
upc.lock.Lock()
defer upc.lock.Unlock()
switch upc.state {
case upcUninitialized:
// Nothing to do.
case upcInitializing:
// Append to queue for processing at the end of initialization.
upc.queue = append(upc.queue, upcQueuedOp{
op: upcOpAppend,
info: mdInfo,
rev: mdInfo.revision,
})
case upcInitialized:
if perRevMap == nil {
// This was prepared before `upc.chainsPopulator` was set,
// and needs to be done again.
return false
}
// Update the cache with the prepared paths.
upc.unflushedPaths[mdInfo.revision] = perRevMap
default:
panic(fmt.Sprintf("Unknown unflushedPathsCache state: %v", upc.state))
}
return true
} | [
"func",
"(",
"upc",
"*",
"unflushedPathCache",
")",
"appendToCache",
"(",
"mdInfo",
"unflushedPathMDInfo",
",",
"perRevMap",
"unflushedPathsPerRevMap",
")",
"bool",
"{",
"upc",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"upc",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"switch",
"upc",
".",
"state",
"{",
"case",
"upcUninitialized",
":",
"// Nothing to do.",
"case",
"upcInitializing",
":",
"// Append to queue for processing at the end of initialization.",
"upc",
".",
"queue",
"=",
"append",
"(",
"upc",
".",
"queue",
",",
"upcQueuedOp",
"{",
"op",
":",
"upcOpAppend",
",",
"info",
":",
"mdInfo",
",",
"rev",
":",
"mdInfo",
".",
"revision",
",",
"}",
")",
"\n",
"case",
"upcInitialized",
":",
"if",
"perRevMap",
"==",
"nil",
"{",
"// This was prepared before `upc.chainsPopulator` was set,",
"// and needs to be done again.",
"return",
"false",
"\n",
"}",
"\n",
"// Update the cache with the prepared paths.",
"upc",
".",
"unflushedPaths",
"[",
"mdInfo",
".",
"revision",
"]",
"=",
"perRevMap",
"\n",
"default",
":",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"upc",
".",
"state",
")",
")",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}"
] | // appendToCache returns true when successful, and false if it needs
// to be retried after the per-revision map is recomputed. | [
"appendToCache",
"returns",
"true",
"when",
"successful",
"and",
"false",
"if",
"it",
"needs",
"to",
"be",
"retried",
"after",
"the",
"per",
"-",
"revision",
"map",
"is",
"recomputed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/unflushed_path_cache.go#L276-L302 |
160,913 | keybase/client | go/kbfs/libkbfs/unflushed_path_cache.go | reinitializeWithResolution | func (upc *unflushedPathCache) reinitializeWithResolution(
mdInfo unflushedPathMDInfo, perRevMap unflushedPathsPerRevMap,
isLocalSquash bool) bool {
upc.lock.Lock()
defer upc.lock.Unlock()
if perRevMap == nil {
switch upc.state {
case upcInitialized:
// Initialization started since the perRevMap was created,
// so try again.
return false
case upcInitializing:
// Save this reinit for later.
upc.queue = append(upc.queue, upcQueuedOp{
op: upcOpReinit,
info: mdInfo,
rev: mdInfo.revision,
isLocalSquash: isLocalSquash,
})
return true
default:
// We can't initialize with a nil revision map.
return true
}
}
if upc.unflushedPaths != nil {
reinitUpcCache(
mdInfo.revision, upc.unflushedPaths, perRevMap, isLocalSquash)
} else {
upc.unflushedPaths = unflushedPathsMap{mdInfo.revision: perRevMap}
}
upc.queue = nil
if upc.ready != nil {
close(upc.ready)
upc.ready = nil
}
upc.state = upcInitialized
return true
} | go | func (upc *unflushedPathCache) reinitializeWithResolution(
mdInfo unflushedPathMDInfo, perRevMap unflushedPathsPerRevMap,
isLocalSquash bool) bool {
upc.lock.Lock()
defer upc.lock.Unlock()
if perRevMap == nil {
switch upc.state {
case upcInitialized:
// Initialization started since the perRevMap was created,
// so try again.
return false
case upcInitializing:
// Save this reinit for later.
upc.queue = append(upc.queue, upcQueuedOp{
op: upcOpReinit,
info: mdInfo,
rev: mdInfo.revision,
isLocalSquash: isLocalSquash,
})
return true
default:
// We can't initialize with a nil revision map.
return true
}
}
if upc.unflushedPaths != nil {
reinitUpcCache(
mdInfo.revision, upc.unflushedPaths, perRevMap, isLocalSquash)
} else {
upc.unflushedPaths = unflushedPathsMap{mdInfo.revision: perRevMap}
}
upc.queue = nil
if upc.ready != nil {
close(upc.ready)
upc.ready = nil
}
upc.state = upcInitialized
return true
} | [
"func",
"(",
"upc",
"*",
"unflushedPathCache",
")",
"reinitializeWithResolution",
"(",
"mdInfo",
"unflushedPathMDInfo",
",",
"perRevMap",
"unflushedPathsPerRevMap",
",",
"isLocalSquash",
"bool",
")",
"bool",
"{",
"upc",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"upc",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"perRevMap",
"==",
"nil",
"{",
"switch",
"upc",
".",
"state",
"{",
"case",
"upcInitialized",
":",
"// Initialization started since the perRevMap was created,",
"// so try again.",
"return",
"false",
"\n",
"case",
"upcInitializing",
":",
"// Save this reinit for later.",
"upc",
".",
"queue",
"=",
"append",
"(",
"upc",
".",
"queue",
",",
"upcQueuedOp",
"{",
"op",
":",
"upcOpReinit",
",",
"info",
":",
"mdInfo",
",",
"rev",
":",
"mdInfo",
".",
"revision",
",",
"isLocalSquash",
":",
"isLocalSquash",
",",
"}",
")",
"\n",
"return",
"true",
"\n",
"default",
":",
"// We can't initialize with a nil revision map.",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"upc",
".",
"unflushedPaths",
"!=",
"nil",
"{",
"reinitUpcCache",
"(",
"mdInfo",
".",
"revision",
",",
"upc",
".",
"unflushedPaths",
",",
"perRevMap",
",",
"isLocalSquash",
")",
"\n",
"}",
"else",
"{",
"upc",
".",
"unflushedPaths",
"=",
"unflushedPathsMap",
"{",
"mdInfo",
".",
"revision",
":",
"perRevMap",
"}",
"\n",
"}",
"\n",
"upc",
".",
"queue",
"=",
"nil",
"\n",
"if",
"upc",
".",
"ready",
"!=",
"nil",
"{",
"close",
"(",
"upc",
".",
"ready",
")",
"\n",
"upc",
".",
"ready",
"=",
"nil",
"\n",
"}",
"\n",
"upc",
".",
"state",
"=",
"upcInitialized",
"\n",
"return",
"true",
"\n",
"}"
] | // reinitializeWithResolution returns true when successful, and false
// if it needs to be retried after the per-revision map is recomputed. | [
"reinitializeWithResolution",
"returns",
"true",
"when",
"successful",
"and",
"false",
"if",
"it",
"needs",
"to",
"be",
"retried",
"after",
"the",
"per",
"-",
"revision",
"map",
"is",
"recomputed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/unflushed_path_cache.go#L457-L497 |
160,914 | keybase/client | go/chat/attachments/store.go | NewS3Store | func NewS3Store(logger logger.Logger, env *libkb.Env, runtimeDir string) *S3Store {
return &S3Store{
DebugLabeler: utils.NewDebugLabeler(logger, "Attachments.Store", false),
s3c: &s3.AWS{},
stash: NewFileStash(runtimeDir),
env: env,
}
} | go | func NewS3Store(logger logger.Logger, env *libkb.Env, runtimeDir string) *S3Store {
return &S3Store{
DebugLabeler: utils.NewDebugLabeler(logger, "Attachments.Store", false),
s3c: &s3.AWS{},
stash: NewFileStash(runtimeDir),
env: env,
}
} | [
"func",
"NewS3Store",
"(",
"logger",
"logger",
".",
"Logger",
",",
"env",
"*",
"libkb",
".",
"Env",
",",
"runtimeDir",
"string",
")",
"*",
"S3Store",
"{",
"return",
"&",
"S3Store",
"{",
"DebugLabeler",
":",
"utils",
".",
"NewDebugLabeler",
"(",
"logger",
",",
"\"",
"\"",
",",
"false",
")",
",",
"s3c",
":",
"&",
"s3",
".",
"AWS",
"{",
"}",
",",
"stash",
":",
"NewFileStash",
"(",
"runtimeDir",
")",
",",
"env",
":",
"env",
",",
"}",
"\n",
"}"
] | // NewS3Store creates a standard Store that uses a real
// S3 connection. | [
"NewS3Store",
"creates",
"a",
"standard",
"Store",
"that",
"uses",
"a",
"real",
"S3",
"connection",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/store.go#L107-L114 |
160,915 | keybase/client | go/chat/attachments/store.go | DownloadAsset | func (a *S3Store) DownloadAsset(ctx context.Context, params chat1.S3Params, asset chat1.Asset,
w io.Writer, signer s3.Signer, progress types.ProgressReporter) error {
if asset.Key == nil || asset.VerifyKey == nil || asset.EncHash == nil {
return fmt.Errorf("unencrypted attachments not supported: asset: %#v", asset)
}
body, err := a.GetAssetReader(ctx, params, asset, signer)
defer func() {
if body != nil {
body.Close()
}
}()
if err != nil {
return err
}
a.Debug(ctx, "DownloadAsset: downloading %s from s3", asset.Path)
return a.DecryptAsset(ctx, w, body, asset, progress)
} | go | func (a *S3Store) DownloadAsset(ctx context.Context, params chat1.S3Params, asset chat1.Asset,
w io.Writer, signer s3.Signer, progress types.ProgressReporter) error {
if asset.Key == nil || asset.VerifyKey == nil || asset.EncHash == nil {
return fmt.Errorf("unencrypted attachments not supported: asset: %#v", asset)
}
body, err := a.GetAssetReader(ctx, params, asset, signer)
defer func() {
if body != nil {
body.Close()
}
}()
if err != nil {
return err
}
a.Debug(ctx, "DownloadAsset: downloading %s from s3", asset.Path)
return a.DecryptAsset(ctx, w, body, asset, progress)
} | [
"func",
"(",
"a",
"*",
"S3Store",
")",
"DownloadAsset",
"(",
"ctx",
"context",
".",
"Context",
",",
"params",
"chat1",
".",
"S3Params",
",",
"asset",
"chat1",
".",
"Asset",
",",
"w",
"io",
".",
"Writer",
",",
"signer",
"s3",
".",
"Signer",
",",
"progress",
"types",
".",
"ProgressReporter",
")",
"error",
"{",
"if",
"asset",
".",
"Key",
"==",
"nil",
"||",
"asset",
".",
"VerifyKey",
"==",
"nil",
"||",
"asset",
".",
"EncHash",
"==",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"asset",
")",
"\n",
"}",
"\n",
"body",
",",
"err",
":=",
"a",
".",
"GetAssetReader",
"(",
"ctx",
",",
"params",
",",
"asset",
",",
"signer",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"if",
"body",
"!=",
"nil",
"{",
"body",
".",
"Close",
"(",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"a",
".",
"Debug",
"(",
"ctx",
",",
"\"",
"\"",
",",
"asset",
".",
"Path",
")",
"\n",
"return",
"a",
".",
"DecryptAsset",
"(",
"ctx",
",",
"w",
",",
"body",
",",
"asset",
",",
"progress",
")",
"\n",
"}"
] | // DownloadAsset gets an object from S3 as described in asset. | [
"DownloadAsset",
"gets",
"an",
"object",
"from",
"S3",
"as",
"described",
"in",
"asset",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/store.go#L284-L300 |
160,916 | keybase/client | go/client/cmd_rekey_devel.go | NewCmdRekey | func NewCmdRekey(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "rekey",
Usage: "Rekey status and actions",
ArgumentHelp: "[status, paper, trigger]",
Subcommands: []cli.Command{
NewCmdRekeyStatus(cl, g),
NewCmdRekeyPaper(cl, g),
NewCmdRekeyTrigger(cl, g),
},
}
} | go | func NewCmdRekey(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "rekey",
Usage: "Rekey status and actions",
ArgumentHelp: "[status, paper, trigger]",
Subcommands: []cli.Command{
NewCmdRekeyStatus(cl, g),
NewCmdRekeyPaper(cl, g),
NewCmdRekeyTrigger(cl, g),
},
}
} | [
"func",
"NewCmdRekey",
"(",
"cl",
"*",
"libcmdline",
".",
"CommandLine",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"cli",
".",
"Command",
"{",
"return",
"cli",
".",
"Command",
"{",
"Name",
":",
"\"",
"\"",
",",
"Usage",
":",
"\"",
"\"",
",",
"ArgumentHelp",
":",
"\"",
"\"",
",",
"Subcommands",
":",
"[",
"]",
"cli",
".",
"Command",
"{",
"NewCmdRekeyStatus",
"(",
"cl",
",",
"g",
")",
",",
"NewCmdRekeyPaper",
"(",
"cl",
",",
"g",
")",
",",
"NewCmdRekeyTrigger",
"(",
"cl",
",",
"g",
")",
",",
"}",
",",
"}",
"\n",
"}"
] | // These are the devel rekey commands | [
"These",
"are",
"the",
"devel",
"rekey",
"commands"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_rekey_devel.go#L15-L26 |
160,917 | keybase/client | go/engine/track_token.go | NewTrackToken | func NewTrackToken(g *libkb.GlobalContext, arg *TrackTokenArg) *TrackToken {
if arg.Options.SigVersion == nil || libkb.SigVersion(*arg.Options.SigVersion) == libkb.KeybaseNullSigVersion {
tmp := keybase1.SigVersion(libkb.GetDefaultSigVersion(g))
arg.Options.SigVersion = &tmp
}
return &TrackToken{
arg: arg,
Contextified: libkb.NewContextified(g),
}
} | go | func NewTrackToken(g *libkb.GlobalContext, arg *TrackTokenArg) *TrackToken {
if arg.Options.SigVersion == nil || libkb.SigVersion(*arg.Options.SigVersion) == libkb.KeybaseNullSigVersion {
tmp := keybase1.SigVersion(libkb.GetDefaultSigVersion(g))
arg.Options.SigVersion = &tmp
}
return &TrackToken{
arg: arg,
Contextified: libkb.NewContextified(g),
}
} | [
"func",
"NewTrackToken",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"arg",
"*",
"TrackTokenArg",
")",
"*",
"TrackToken",
"{",
"if",
"arg",
".",
"Options",
".",
"SigVersion",
"==",
"nil",
"||",
"libkb",
".",
"SigVersion",
"(",
"*",
"arg",
".",
"Options",
".",
"SigVersion",
")",
"==",
"libkb",
".",
"KeybaseNullSigVersion",
"{",
"tmp",
":=",
"keybase1",
".",
"SigVersion",
"(",
"libkb",
".",
"GetDefaultSigVersion",
"(",
"g",
")",
")",
"\n",
"arg",
".",
"Options",
".",
"SigVersion",
"=",
"&",
"tmp",
"\n",
"}",
"\n\n",
"return",
"&",
"TrackToken",
"{",
"arg",
":",
"arg",
",",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
",",
"}",
"\n",
"}"
] | // NewTrackToken creates a TrackToken engine. | [
"NewTrackToken",
"creates",
"a",
"TrackToken",
"engine",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/track_token.go#L31-L41 |
160,918 | keybase/client | go/libkb/upak_loader.go | NewCachedUPAKLoader | func NewCachedUPAKLoader(g *GlobalContext, f time.Duration) *CachedUPAKLoader {
c, err := lru.New(g.Env.GetUPAKCacheSize())
if err != nil {
panic(fmt.Sprintf("could not create lru cache (size = %d)", g.Env.GetUPAKCacheSize()))
}
return &CachedUPAKLoader{
Contextified: NewContextified(g),
Freshness: f,
cache: c,
noCache: false,
}
} | go | func NewCachedUPAKLoader(g *GlobalContext, f time.Duration) *CachedUPAKLoader {
c, err := lru.New(g.Env.GetUPAKCacheSize())
if err != nil {
panic(fmt.Sprintf("could not create lru cache (size = %d)", g.Env.GetUPAKCacheSize()))
}
return &CachedUPAKLoader{
Contextified: NewContextified(g),
Freshness: f,
cache: c,
noCache: false,
}
} | [
"func",
"NewCachedUPAKLoader",
"(",
"g",
"*",
"GlobalContext",
",",
"f",
"time",
".",
"Duration",
")",
"*",
"CachedUPAKLoader",
"{",
"c",
",",
"err",
":=",
"lru",
".",
"New",
"(",
"g",
".",
"Env",
".",
"GetUPAKCacheSize",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"g",
".",
"Env",
".",
"GetUPAKCacheSize",
"(",
")",
")",
")",
"\n",
"}",
"\n",
"return",
"&",
"CachedUPAKLoader",
"{",
"Contextified",
":",
"NewContextified",
"(",
"g",
")",
",",
"Freshness",
":",
"f",
",",
"cache",
":",
"c",
",",
"noCache",
":",
"false",
",",
"}",
"\n",
"}"
] | // NewCachedUPAKLoader constructs a new CachedUPAKLoader | [
"NewCachedUPAKLoader",
"constructs",
"a",
"new",
"CachedUPAKLoader"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L56-L67 |
160,919 | keybase/client | go/libkb/upak_loader.go | NewUncachedUPAKLoader | func NewUncachedUPAKLoader(g *GlobalContext) UPAKLoader {
return &CachedUPAKLoader{
Contextified: NewContextified(g),
Freshness: time.Duration(0),
noCache: true,
}
} | go | func NewUncachedUPAKLoader(g *GlobalContext) UPAKLoader {
return &CachedUPAKLoader{
Contextified: NewContextified(g),
Freshness: time.Duration(0),
noCache: true,
}
} | [
"func",
"NewUncachedUPAKLoader",
"(",
"g",
"*",
"GlobalContext",
")",
"UPAKLoader",
"{",
"return",
"&",
"CachedUPAKLoader",
"{",
"Contextified",
":",
"NewContextified",
"(",
"g",
")",
",",
"Freshness",
":",
"time",
".",
"Duration",
"(",
"0",
")",
",",
"noCache",
":",
"true",
",",
"}",
"\n",
"}"
] | // NewUncachedUPAKLoader creates a UPAK loader that doesn't do any caching.
// It uses the implementation of CachedUPAKLoader but disables all caching. | [
"NewUncachedUPAKLoader",
"creates",
"a",
"UPAK",
"loader",
"that",
"doesn",
"t",
"do",
"any",
"caching",
".",
"It",
"uses",
"the",
"implementation",
"of",
"CachedUPAKLoader",
"but",
"disables",
"all",
"caching",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L88-L94 |
160,920 | keybase/client | go/libkb/upak_loader.go | Load | func (u *CachedUPAKLoader) Load(arg LoadUserArg) (*keybase1.UserPlusAllKeys, *User, error) {
ret, user, err := u.loadWithInfo(arg, nil, nil, true)
// NOTE -- it's OK to return an error and a user, since certain code paths
// want both (see note in loadWithInfo).
var converted *keybase1.UserPlusAllKeys
if ret != nil {
tmp := keybase1.UPAKFromUPKV2AI(*ret)
converted = &tmp
}
return converted, user, err
} | go | func (u *CachedUPAKLoader) Load(arg LoadUserArg) (*keybase1.UserPlusAllKeys, *User, error) {
ret, user, err := u.loadWithInfo(arg, nil, nil, true)
// NOTE -- it's OK to return an error and a user, since certain code paths
// want both (see note in loadWithInfo).
var converted *keybase1.UserPlusAllKeys
if ret != nil {
tmp := keybase1.UPAKFromUPKV2AI(*ret)
converted = &tmp
}
return converted, user, err
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"Load",
"(",
"arg",
"LoadUserArg",
")",
"(",
"*",
"keybase1",
".",
"UserPlusAllKeys",
",",
"*",
"User",
",",
"error",
")",
"{",
"ret",
",",
"user",
",",
"err",
":=",
"u",
".",
"loadWithInfo",
"(",
"arg",
",",
"nil",
",",
"nil",
",",
"true",
")",
"\n\n",
"// NOTE -- it's OK to return an error and a user, since certain code paths",
"// want both (see note in loadWithInfo).",
"var",
"converted",
"*",
"keybase1",
".",
"UserPlusAllKeys",
"\n",
"if",
"ret",
"!=",
"nil",
"{",
"tmp",
":=",
"keybase1",
".",
"UPAKFromUPKV2AI",
"(",
"*",
"ret",
")",
"\n",
"converted",
"=",
"&",
"tmp",
"\n",
"}",
"\n\n",
"return",
"converted",
",",
"user",
",",
"err",
"\n",
"}"
] | // Load a UserPlusKeysV2AllIncarnations from the local cache, falls back to
// LoadUser, and cache the user. Can only perform lookups by UID. Will return a
// non-nil UserPlusKeysV2AllIncarnations, or a non-nil error, but never both
// non-nil, nor never both nil. If we had to do a full LoadUser as part of the
// request, it's returned too. Convert to UserPlusAllKeys on the way out, for
// backwards compatibility. | [
"Load",
"a",
"UserPlusKeysV2AllIncarnations",
"from",
"the",
"local",
"cache",
"falls",
"back",
"to",
"LoadUser",
"and",
"cache",
"the",
"user",
".",
"Can",
"only",
"perform",
"lookups",
"by",
"UID",
".",
"Will",
"return",
"a",
"non",
"-",
"nil",
"UserPlusKeysV2AllIncarnations",
"or",
"a",
"non",
"-",
"nil",
"error",
"but",
"never",
"both",
"non",
"-",
"nil",
"nor",
"never",
"both",
"nil",
".",
"If",
"we",
"had",
"to",
"do",
"a",
"full",
"LoadUser",
"as",
"part",
"of",
"the",
"request",
"it",
"s",
"returned",
"too",
".",
"Convert",
"to",
"UserPlusAllKeys",
"on",
"the",
"way",
"out",
"for",
"backwards",
"compatibility",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L509-L521 |
160,921 | keybase/client | go/libkb/upak_loader.go | LoadV2 | func (u *CachedUPAKLoader) LoadV2(arg LoadUserArg) (*keybase1.UserPlusKeysV2AllIncarnations, *User, error) {
m, tbs := arg.m.WithTimeBuckets()
arg.m = m
defer tbs.Record("CachedUPAKLoader.LoadV2")()
return u.loadWithInfo(arg, nil, nil, true)
} | go | func (u *CachedUPAKLoader) LoadV2(arg LoadUserArg) (*keybase1.UserPlusKeysV2AllIncarnations, *User, error) {
m, tbs := arg.m.WithTimeBuckets()
arg.m = m
defer tbs.Record("CachedUPAKLoader.LoadV2")()
return u.loadWithInfo(arg, nil, nil, true)
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LoadV2",
"(",
"arg",
"LoadUserArg",
")",
"(",
"*",
"keybase1",
".",
"UserPlusKeysV2AllIncarnations",
",",
"*",
"User",
",",
"error",
")",
"{",
"m",
",",
"tbs",
":=",
"arg",
".",
"m",
".",
"WithTimeBuckets",
"(",
")",
"\n",
"arg",
".",
"m",
"=",
"m",
"\n",
"defer",
"tbs",
".",
"Record",
"(",
"\"",
"\"",
")",
"(",
")",
"\n",
"return",
"u",
".",
"loadWithInfo",
"(",
"arg",
",",
"nil",
",",
"nil",
",",
"true",
")",
"\n",
"}"
] | // Load a UserPlusKeysV2AllIncarnations from the local cache, falls back to
// LoadUser, and cache the user. Can only perform lookups by UID. Will return a
// non-nil UserPlusKeysV2AllIncarnations, or a non-nil error, but never both
// non-nil, nor never both nil. If we had to do a full LoadUser as part of the
// request, it's returned too. | [
"Load",
"a",
"UserPlusKeysV2AllIncarnations",
"from",
"the",
"local",
"cache",
"falls",
"back",
"to",
"LoadUser",
"and",
"cache",
"the",
"user",
".",
"Can",
"only",
"perform",
"lookups",
"by",
"UID",
".",
"Will",
"return",
"a",
"non",
"-",
"nil",
"UserPlusKeysV2AllIncarnations",
"or",
"a",
"non",
"-",
"nil",
"error",
"but",
"never",
"both",
"non",
"-",
"nil",
"nor",
"never",
"both",
"nil",
".",
"If",
"we",
"had",
"to",
"do",
"a",
"full",
"LoadUser",
"as",
"part",
"of",
"the",
"request",
"it",
"s",
"returned",
"too",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L528-L533 |
160,922 | keybase/client | go/libkb/upak_loader.go | LoadKeyV2 | func (u *CachedUPAKLoader) LoadKeyV2(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (ret *keybase1.UserPlusKeysV2,
upak *keybase1.UserPlusKeysV2AllIncarnations, key *keybase1.PublicKeyV2NaCl, err error) {
ctx = WithLogTag(ctx, "LK") // Load key
defer u.G().CVTraceTimed(ctx, VLog0, fmt.Sprintf("LoadKeyV2 uid:%s,kid:%s", uid, kid), func() error { return err })()
ctx, tbs := u.G().CTimeBuckets(ctx)
defer tbs.Record("CachedUPAKLoader.LoadKeyV2")()
if uid.IsNil() {
return nil, nil, nil, NoUIDError{}
}
argBase := NewLoadUserArg(u.G()).WithUID(uid).WithPublicKeyOptional().WithNetContext(ctx)
// Make the retry mechanism increasingly aggressive. See CORE-8851.
// It should be that a ForcePoll is good enough, but in some rare cases,
// people have cached values for previous pre-reset user incarnations that
// were incorrect. So clobber over that if it comes to it.
attempts := []LoadUserArg{
argBase,
argBase.WithForcePoll(true),
argBase.WithForceReload(),
}
for i, arg := range attempts {
if i > 0 {
u.G().VDL.CLogf(ctx, VLog0, "| reloading with arg: %s", arg.String())
}
upak, _, err := u.LoadV2(arg)
if err != nil {
return nil, nil, nil, err
}
if upak == nil {
return nil, nil, nil, fmt.Errorf("Nil user, nil error from LoadUser")
}
ret, key := upak.FindKID(kid)
if key != nil {
u.G().VDL.CLogf(ctx, VLog1, "- found kid in UPAK: %v", ret.Uid)
return ret, upak, key, nil
}
}
return nil, nil, nil, NotFoundError{Msg: "Not found: Key for user"}
} | go | func (u *CachedUPAKLoader) LoadKeyV2(ctx context.Context, uid keybase1.UID, kid keybase1.KID) (ret *keybase1.UserPlusKeysV2,
upak *keybase1.UserPlusKeysV2AllIncarnations, key *keybase1.PublicKeyV2NaCl, err error) {
ctx = WithLogTag(ctx, "LK") // Load key
defer u.G().CVTraceTimed(ctx, VLog0, fmt.Sprintf("LoadKeyV2 uid:%s,kid:%s", uid, kid), func() error { return err })()
ctx, tbs := u.G().CTimeBuckets(ctx)
defer tbs.Record("CachedUPAKLoader.LoadKeyV2")()
if uid.IsNil() {
return nil, nil, nil, NoUIDError{}
}
argBase := NewLoadUserArg(u.G()).WithUID(uid).WithPublicKeyOptional().WithNetContext(ctx)
// Make the retry mechanism increasingly aggressive. See CORE-8851.
// It should be that a ForcePoll is good enough, but in some rare cases,
// people have cached values for previous pre-reset user incarnations that
// were incorrect. So clobber over that if it comes to it.
attempts := []LoadUserArg{
argBase,
argBase.WithForcePoll(true),
argBase.WithForceReload(),
}
for i, arg := range attempts {
if i > 0 {
u.G().VDL.CLogf(ctx, VLog0, "| reloading with arg: %s", arg.String())
}
upak, _, err := u.LoadV2(arg)
if err != nil {
return nil, nil, nil, err
}
if upak == nil {
return nil, nil, nil, fmt.Errorf("Nil user, nil error from LoadUser")
}
ret, key := upak.FindKID(kid)
if key != nil {
u.G().VDL.CLogf(ctx, VLog1, "- found kid in UPAK: %v", ret.Uid)
return ret, upak, key, nil
}
}
return nil, nil, nil, NotFoundError{Msg: "Not found: Key for user"}
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LoadKeyV2",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"kid",
"keybase1",
".",
"KID",
")",
"(",
"ret",
"*",
"keybase1",
".",
"UserPlusKeysV2",
",",
"upak",
"*",
"keybase1",
".",
"UserPlusKeysV2AllIncarnations",
",",
"key",
"*",
"keybase1",
".",
"PublicKeyV2NaCl",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"WithLogTag",
"(",
"ctx",
",",
"\"",
"\"",
")",
"// Load key",
"\n",
"defer",
"u",
".",
"G",
"(",
")",
".",
"CVTraceTimed",
"(",
"ctx",
",",
"VLog0",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"uid",
",",
"kid",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n",
"ctx",
",",
"tbs",
":=",
"u",
".",
"G",
"(",
")",
".",
"CTimeBuckets",
"(",
"ctx",
")",
"\n",
"defer",
"tbs",
".",
"Record",
"(",
"\"",
"\"",
")",
"(",
")",
"\n",
"if",
"uid",
".",
"IsNil",
"(",
")",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"NoUIDError",
"{",
"}",
"\n",
"}",
"\n\n",
"argBase",
":=",
"NewLoadUserArg",
"(",
"u",
".",
"G",
"(",
")",
")",
".",
"WithUID",
"(",
"uid",
")",
".",
"WithPublicKeyOptional",
"(",
")",
".",
"WithNetContext",
"(",
"ctx",
")",
"\n\n",
"// Make the retry mechanism increasingly aggressive. See CORE-8851.",
"// It should be that a ForcePoll is good enough, but in some rare cases,",
"// people have cached values for previous pre-reset user incarnations that",
"// were incorrect. So clobber over that if it comes to it.",
"attempts",
":=",
"[",
"]",
"LoadUserArg",
"{",
"argBase",
",",
"argBase",
".",
"WithForcePoll",
"(",
"true",
")",
",",
"argBase",
".",
"WithForceReload",
"(",
")",
",",
"}",
"\n\n",
"for",
"i",
",",
"arg",
":=",
"range",
"attempts",
"{",
"if",
"i",
">",
"0",
"{",
"u",
".",
"G",
"(",
")",
".",
"VDL",
".",
"CLogf",
"(",
"ctx",
",",
"VLog0",
",",
"\"",
"\"",
",",
"arg",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n\n",
"upak",
",",
"_",
",",
"err",
":=",
"u",
".",
"LoadV2",
"(",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"upak",
"==",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"ret",
",",
"key",
":=",
"upak",
".",
"FindKID",
"(",
"kid",
")",
"\n",
"if",
"key",
"!=",
"nil",
"{",
"u",
".",
"G",
"(",
")",
".",
"VDL",
".",
"CLogf",
"(",
"ctx",
",",
"VLog1",
",",
"\"",
"\"",
",",
"ret",
".",
"Uid",
")",
"\n",
"return",
"ret",
",",
"upak",
",",
"key",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"NotFoundError",
"{",
"Msg",
":",
"\"",
"\"",
"}",
"\n",
"}"
] | // LoadKeyV2 looks through all incarnations for the user and returns the incarnation with the given
// KID, as well as the Key data associated with that KID. It picks the latest such
// incarnation if there are multiple. | [
"LoadKeyV2",
"looks",
"through",
"all",
"incarnations",
"for",
"the",
"user",
"and",
"returns",
"the",
"incarnation",
"with",
"the",
"given",
"KID",
"as",
"well",
"as",
"the",
"Key",
"data",
"associated",
"with",
"that",
"KID",
".",
"It",
"picks",
"the",
"latest",
"such",
"incarnation",
"if",
"there",
"are",
"multiple",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L589-L633 |
160,923 | keybase/client | go/libkb/upak_loader.go | LoadDeviceKey | func (u *CachedUPAKLoader) LoadDeviceKey(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (upakv1 *keybase1.UserPlusAllKeys, deviceKey *keybase1.PublicKey, revoked *keybase1.RevokedKey, err error) {
var info CachedUserLoadInfo
larg := NewLoadUserByUIDArg(ctx, u.G(), uid)
upakV2, _, err := u.loadWithInfo(larg, &info, nil, false)
if err != nil {
return nil, nil, nil, err
}
upakV1 := keybase1.UPAKFromUPKV2AI(*upakV2)
deviceKey, revoked, err = u.extractDeviceKey(upakV1, deviceID)
if err == nil {
// Early success, return
return &upakV1, deviceKey, revoked, err
}
// Try again with a forced load in case the device is very new.
larg = larg.WithForcePoll(true)
upakV2, _, err = u.loadWithInfo(larg, nil, nil, false)
if err != nil {
return nil, nil, nil, err
}
upakV1 = keybase1.UPAKFromUPKV2AI(*upakV2)
deviceKey, revoked, err = u.extractDeviceKey(upakV1, deviceID)
return &upakV1, deviceKey, revoked, err
} | go | func (u *CachedUPAKLoader) LoadDeviceKey(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (upakv1 *keybase1.UserPlusAllKeys, deviceKey *keybase1.PublicKey, revoked *keybase1.RevokedKey, err error) {
var info CachedUserLoadInfo
larg := NewLoadUserByUIDArg(ctx, u.G(), uid)
upakV2, _, err := u.loadWithInfo(larg, &info, nil, false)
if err != nil {
return nil, nil, nil, err
}
upakV1 := keybase1.UPAKFromUPKV2AI(*upakV2)
deviceKey, revoked, err = u.extractDeviceKey(upakV1, deviceID)
if err == nil {
// Early success, return
return &upakV1, deviceKey, revoked, err
}
// Try again with a forced load in case the device is very new.
larg = larg.WithForcePoll(true)
upakV2, _, err = u.loadWithInfo(larg, nil, nil, false)
if err != nil {
return nil, nil, nil, err
}
upakV1 = keybase1.UPAKFromUPKV2AI(*upakV2)
deviceKey, revoked, err = u.extractDeviceKey(upakV1, deviceID)
return &upakV1, deviceKey, revoked, err
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LoadDeviceKey",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"deviceID",
"keybase1",
".",
"DeviceID",
")",
"(",
"upakv1",
"*",
"keybase1",
".",
"UserPlusAllKeys",
",",
"deviceKey",
"*",
"keybase1",
".",
"PublicKey",
",",
"revoked",
"*",
"keybase1",
".",
"RevokedKey",
",",
"err",
"error",
")",
"{",
"var",
"info",
"CachedUserLoadInfo",
"\n",
"larg",
":=",
"NewLoadUserByUIDArg",
"(",
"ctx",
",",
"u",
".",
"G",
"(",
")",
",",
"uid",
")",
"\n",
"upakV2",
",",
"_",
",",
"err",
":=",
"u",
".",
"loadWithInfo",
"(",
"larg",
",",
"&",
"info",
",",
"nil",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"upakV1",
":=",
"keybase1",
".",
"UPAKFromUPKV2AI",
"(",
"*",
"upakV2",
")",
"\n\n",
"deviceKey",
",",
"revoked",
",",
"err",
"=",
"u",
".",
"extractDeviceKey",
"(",
"upakV1",
",",
"deviceID",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"// Early success, return",
"return",
"&",
"upakV1",
",",
"deviceKey",
",",
"revoked",
",",
"err",
"\n",
"}",
"\n\n",
"// Try again with a forced load in case the device is very new.",
"larg",
"=",
"larg",
".",
"WithForcePoll",
"(",
"true",
")",
"\n",
"upakV2",
",",
"_",
",",
"err",
"=",
"u",
".",
"loadWithInfo",
"(",
"larg",
",",
"nil",
",",
"nil",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"upakV1",
"=",
"keybase1",
".",
"UPAKFromUPKV2AI",
"(",
"*",
"upakV2",
")",
"\n\n",
"deviceKey",
",",
"revoked",
",",
"err",
"=",
"u",
".",
"extractDeviceKey",
"(",
"upakV1",
",",
"deviceID",
")",
"\n",
"return",
"&",
"upakV1",
",",
"deviceKey",
",",
"revoked",
",",
"err",
"\n",
"}"
] | // Load the PublicKey for a user's device from the local cache, falling back to LoadUser, and cache the user.
// If the user exists but the device doesn't, will force a load in case the device is very new. | [
"Load",
"the",
"PublicKey",
"for",
"a",
"user",
"s",
"device",
"from",
"the",
"local",
"cache",
"falling",
"back",
"to",
"LoadUser",
"and",
"cache",
"the",
"user",
".",
"If",
"the",
"user",
"exists",
"but",
"the",
"device",
"doesn",
"t",
"will",
"force",
"a",
"load",
"in",
"case",
"the",
"device",
"is",
"very",
"new",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L660-L685 |
160,924 | keybase/client | go/libkb/upak_loader.go | LoadUPAKWithDeviceID | func (u *CachedUPAKLoader) LoadUPAKWithDeviceID(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (*keybase1.UserPlusKeysV2AllIncarnations, error) {
var info CachedUserLoadInfo
larg := NewLoadUserByUIDArg(ctx, u.G(), uid).WithPublicKeyOptional()
upakV2, _, err := u.loadWithInfo(larg, &info, nil, false)
if err != nil {
return nil, err
}
for _, device := range upakV2.Current.DeviceKeys {
if device.DeviceID.Eq(deviceID) {
// Early success, return
return upakV2, nil
}
}
// Try again with a forced load in case the device is very new.
larg = larg.WithForcePoll(true)
upakV2, _, err = u.loadWithInfo(larg, nil, nil, false)
if err != nil {
return nil, err
}
return upakV2, nil
} | go | func (u *CachedUPAKLoader) LoadUPAKWithDeviceID(ctx context.Context, uid keybase1.UID, deviceID keybase1.DeviceID) (*keybase1.UserPlusKeysV2AllIncarnations, error) {
var info CachedUserLoadInfo
larg := NewLoadUserByUIDArg(ctx, u.G(), uid).WithPublicKeyOptional()
upakV2, _, err := u.loadWithInfo(larg, &info, nil, false)
if err != nil {
return nil, err
}
for _, device := range upakV2.Current.DeviceKeys {
if device.DeviceID.Eq(deviceID) {
// Early success, return
return upakV2, nil
}
}
// Try again with a forced load in case the device is very new.
larg = larg.WithForcePoll(true)
upakV2, _, err = u.loadWithInfo(larg, nil, nil, false)
if err != nil {
return nil, err
}
return upakV2, nil
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LoadUPAKWithDeviceID",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"deviceID",
"keybase1",
".",
"DeviceID",
")",
"(",
"*",
"keybase1",
".",
"UserPlusKeysV2AllIncarnations",
",",
"error",
")",
"{",
"var",
"info",
"CachedUserLoadInfo",
"\n",
"larg",
":=",
"NewLoadUserByUIDArg",
"(",
"ctx",
",",
"u",
".",
"G",
"(",
")",
",",
"uid",
")",
".",
"WithPublicKeyOptional",
"(",
")",
"\n",
"upakV2",
",",
"_",
",",
"err",
":=",
"u",
".",
"loadWithInfo",
"(",
"larg",
",",
"&",
"info",
",",
"nil",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"device",
":=",
"range",
"upakV2",
".",
"Current",
".",
"DeviceKeys",
"{",
"if",
"device",
".",
"DeviceID",
".",
"Eq",
"(",
"deviceID",
")",
"{",
"// Early success, return",
"return",
"upakV2",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Try again with a forced load in case the device is very new.",
"larg",
"=",
"larg",
".",
"WithForcePoll",
"(",
"true",
")",
"\n",
"upakV2",
",",
"_",
",",
"err",
"=",
"u",
".",
"loadWithInfo",
"(",
"larg",
",",
"nil",
",",
"nil",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"upakV2",
",",
"nil",
"\n",
"}"
] | // If the user exists but the device doesn't, will force a load in case the device is very new. | [
"If",
"the",
"user",
"exists",
"but",
"the",
"device",
"doesn",
"t",
"will",
"force",
"a",
"load",
"in",
"case",
"the",
"device",
"is",
"very",
"new",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L688-L710 |
160,925 | keybase/client | go/libkb/upak_loader.go | LookupUsername | func (u *CachedUPAKLoader) LookupUsername(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error) {
var empty NormalizedUsername
uids := []keybase1.UID{uid}
namePkgs, err := u.G().UIDMapper.MapUIDsToUsernamePackages(ctx, u.G(), uids, 0, 0, false)
if err != nil {
return empty, err
}
if len(namePkgs) == 0 {
return empty, UserNotFoundError{UID: uid, Msg: "in CachedUPAKLoader"}
}
if u.TestDeadlocker != nil {
u.TestDeadlocker()
}
return namePkgs[0].NormalizedUsername, nil
} | go | func (u *CachedUPAKLoader) LookupUsername(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error) {
var empty NormalizedUsername
uids := []keybase1.UID{uid}
namePkgs, err := u.G().UIDMapper.MapUIDsToUsernamePackages(ctx, u.G(), uids, 0, 0, false)
if err != nil {
return empty, err
}
if len(namePkgs) == 0 {
return empty, UserNotFoundError{UID: uid, Msg: "in CachedUPAKLoader"}
}
if u.TestDeadlocker != nil {
u.TestDeadlocker()
}
return namePkgs[0].NormalizedUsername, nil
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LookupUsername",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"NormalizedUsername",
",",
"error",
")",
"{",
"var",
"empty",
"NormalizedUsername",
"\n",
"uids",
":=",
"[",
"]",
"keybase1",
".",
"UID",
"{",
"uid",
"}",
"\n",
"namePkgs",
",",
"err",
":=",
"u",
".",
"G",
"(",
")",
".",
"UIDMapper",
".",
"MapUIDsToUsernamePackages",
"(",
"ctx",
",",
"u",
".",
"G",
"(",
")",
",",
"uids",
",",
"0",
",",
"0",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"empty",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"namePkgs",
")",
"==",
"0",
"{",
"return",
"empty",
",",
"UserNotFoundError",
"{",
"UID",
":",
"uid",
",",
"Msg",
":",
"\"",
"\"",
"}",
"\n",
"}",
"\n\n",
"if",
"u",
".",
"TestDeadlocker",
"!=",
"nil",
"{",
"u",
".",
"TestDeadlocker",
"(",
")",
"\n",
"}",
"\n\n",
"return",
"namePkgs",
"[",
"0",
"]",
".",
"NormalizedUsername",
",",
"nil",
"\n",
"}"
] | // LookupUsername uses the UIDMapper to find a username for uid. | [
"LookupUsername",
"uses",
"the",
"UIDMapper",
"to",
"find",
"a",
"username",
"for",
"uid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L713-L729 |
160,926 | keybase/client | go/libkb/upak_loader.go | LookupUsernameUPAK | func (u *CachedUPAKLoader) LookupUsernameUPAK(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error) {
var info CachedUserLoadInfo
arg := NewLoadUserByUIDArg(ctx, u.G(), uid).WithStaleOK(true).WithPublicKeyOptional()
var ret NormalizedUsername
_, _, err := u.loadWithInfo(arg, &info, func(upak *keybase1.UserPlusKeysV2AllIncarnations) error {
if upak == nil {
return UserNotFoundError{UID: uid, Msg: "in CachedUPAKLoader"}
}
ret = NewNormalizedUsername(upak.Current.Username)
return nil
}, false)
return ret, err
} | go | func (u *CachedUPAKLoader) LookupUsernameUPAK(ctx context.Context, uid keybase1.UID) (NormalizedUsername, error) {
var info CachedUserLoadInfo
arg := NewLoadUserByUIDArg(ctx, u.G(), uid).WithStaleOK(true).WithPublicKeyOptional()
var ret NormalizedUsername
_, _, err := u.loadWithInfo(arg, &info, func(upak *keybase1.UserPlusKeysV2AllIncarnations) error {
if upak == nil {
return UserNotFoundError{UID: uid, Msg: "in CachedUPAKLoader"}
}
ret = NewNormalizedUsername(upak.Current.Username)
return nil
}, false)
return ret, err
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LookupUsernameUPAK",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"NormalizedUsername",
",",
"error",
")",
"{",
"var",
"info",
"CachedUserLoadInfo",
"\n",
"arg",
":=",
"NewLoadUserByUIDArg",
"(",
"ctx",
",",
"u",
".",
"G",
"(",
")",
",",
"uid",
")",
".",
"WithStaleOK",
"(",
"true",
")",
".",
"WithPublicKeyOptional",
"(",
")",
"\n",
"var",
"ret",
"NormalizedUsername",
"\n",
"_",
",",
"_",
",",
"err",
":=",
"u",
".",
"loadWithInfo",
"(",
"arg",
",",
"&",
"info",
",",
"func",
"(",
"upak",
"*",
"keybase1",
".",
"UserPlusKeysV2AllIncarnations",
")",
"error",
"{",
"if",
"upak",
"==",
"nil",
"{",
"return",
"UserNotFoundError",
"{",
"UID",
":",
"uid",
",",
"Msg",
":",
"\"",
"\"",
"}",
"\n",
"}",
"\n",
"ret",
"=",
"NewNormalizedUsername",
"(",
"upak",
".",
"Current",
".",
"Username",
")",
"\n",
"return",
"nil",
"\n",
"}",
",",
"false",
")",
"\n",
"return",
"ret",
",",
"err",
"\n",
"}"
] | // LookupUsernameUPAK uses the upak loader to find a username for uid. | [
"LookupUsernameUPAK",
"uses",
"the",
"upak",
"loader",
"to",
"find",
"a",
"username",
"for",
"uid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L732-L744 |
160,927 | keybase/client | go/libkb/upak_loader.go | LookupUID | func (u *CachedUPAKLoader) LookupUID(ctx context.Context, un NormalizedUsername) (keybase1.UID, error) {
m := NewMetaContext(ctx, u.G())
rres := u.G().Resolver.Resolve(m, un.String())
if err := rres.GetError(); err != nil {
return keybase1.UID(""), err
}
un2, err := u.LookupUsername(ctx, rres.GetUID())
if err != nil {
return keybase1.UID(""), err
}
if !un.Eq(un2) {
m.Warning("Unexpected mismatched usernames (uid=%s): %s != %s", rres.GetUID(), un.String(), un2.String())
return keybase1.UID(""), NewBadUsernameError(un.String())
}
return rres.GetUID(), nil
} | go | func (u *CachedUPAKLoader) LookupUID(ctx context.Context, un NormalizedUsername) (keybase1.UID, error) {
m := NewMetaContext(ctx, u.G())
rres := u.G().Resolver.Resolve(m, un.String())
if err := rres.GetError(); err != nil {
return keybase1.UID(""), err
}
un2, err := u.LookupUsername(ctx, rres.GetUID())
if err != nil {
return keybase1.UID(""), err
}
if !un.Eq(un2) {
m.Warning("Unexpected mismatched usernames (uid=%s): %s != %s", rres.GetUID(), un.String(), un2.String())
return keybase1.UID(""), NewBadUsernameError(un.String())
}
return rres.GetUID(), nil
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"LookupUID",
"(",
"ctx",
"context",
".",
"Context",
",",
"un",
"NormalizedUsername",
")",
"(",
"keybase1",
".",
"UID",
",",
"error",
")",
"{",
"m",
":=",
"NewMetaContext",
"(",
"ctx",
",",
"u",
".",
"G",
"(",
")",
")",
"\n",
"rres",
":=",
"u",
".",
"G",
"(",
")",
".",
"Resolver",
".",
"Resolve",
"(",
"m",
",",
"un",
".",
"String",
"(",
")",
")",
"\n",
"if",
"err",
":=",
"rres",
".",
"GetError",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"UID",
"(",
"\"",
"\"",
")",
",",
"err",
"\n",
"}",
"\n",
"un2",
",",
"err",
":=",
"u",
".",
"LookupUsername",
"(",
"ctx",
",",
"rres",
".",
"GetUID",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"UID",
"(",
"\"",
"\"",
")",
",",
"err",
"\n",
"}",
"\n",
"if",
"!",
"un",
".",
"Eq",
"(",
"un2",
")",
"{",
"m",
".",
"Warning",
"(",
"\"",
"\"",
",",
"rres",
".",
"GetUID",
"(",
")",
",",
"un",
".",
"String",
"(",
")",
",",
"un2",
".",
"String",
"(",
")",
")",
"\n",
"return",
"keybase1",
".",
"UID",
"(",
"\"",
"\"",
")",
",",
"NewBadUsernameError",
"(",
"un",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"rres",
".",
"GetUID",
"(",
")",
",",
"nil",
"\n",
"}"
] | // LookupUID is a verified map of username -> UID. IT calls into the resolver, which gives un untrusted
// UID, but verifies with the UPAK loader that the mapping UID -> username is correct. | [
"LookupUID",
"is",
"a",
"verified",
"map",
"of",
"username",
"-",
">",
"UID",
".",
"IT",
"calls",
"into",
"the",
"resolver",
"which",
"gives",
"un",
"untrusted",
"UID",
"but",
"verifies",
"with",
"the",
"UPAK",
"loader",
"that",
"the",
"mapping",
"UID",
"-",
">",
"username",
"is",
"correct",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L748-L763 |
160,928 | keybase/client | go/libkb/upak_loader.go | deleteV1UPAK | func (u *CachedUPAKLoader) deleteV1UPAK(uid keybase1.UID) {
err := u.G().LocalDb.Delete(culDBKeyV1(uid))
if err != nil {
u.G().Log.Warning("Failed to remove %s v1 object from disk cache: %s", uid, err)
}
} | go | func (u *CachedUPAKLoader) deleteV1UPAK(uid keybase1.UID) {
err := u.G().LocalDb.Delete(culDBKeyV1(uid))
if err != nil {
u.G().Log.Warning("Failed to remove %s v1 object from disk cache: %s", uid, err)
}
} | [
"func",
"(",
"u",
"*",
"CachedUPAKLoader",
")",
"deleteV1UPAK",
"(",
"uid",
"keybase1",
".",
"UID",
")",
"{",
"err",
":=",
"u",
".",
"G",
"(",
")",
".",
"LocalDb",
".",
"Delete",
"(",
"culDBKeyV1",
"(",
"uid",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"u",
".",
"G",
"(",
")",
".",
"Log",
".",
"Warning",
"(",
"\"",
"\"",
",",
"uid",
",",
"err",
")",
"\n",
"}",
"\n",
"}"
] | // v1 UPAKs are all legacy and need to be gradually cleaned from cache. | [
"v1",
"UPAKs",
"are",
"all",
"legacy",
"and",
"need",
"to",
"be",
"gradually",
"cleaned",
"from",
"cache",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/upak_loader.go#L881-L886 |
160,929 | keybase/client | go/protocol/keybase1/user.go | LoadUser | func (c UserClient) LoadUser(ctx context.Context, __arg LoadUserArg) (res User, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.loadUser", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) LoadUser(ctx context.Context, __arg LoadUserArg) (res User, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.loadUser", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"LoadUser",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"LoadUserArg",
")",
"(",
"res",
"User",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Load a user from the server. | [
"Load",
"a",
"user",
"from",
"the",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L949-L952 |
160,930 | keybase/client | go/protocol/keybase1/user.go | LoadUserPlusKeys | func (c UserClient) LoadUserPlusKeys(ctx context.Context, __arg LoadUserPlusKeysArg) (res UserPlusKeys, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.loadUserPlusKeys", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) LoadUserPlusKeys(ctx context.Context, __arg LoadUserPlusKeysArg) (res UserPlusKeys, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.loadUserPlusKeys", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"LoadUserPlusKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"LoadUserPlusKeysArg",
")",
"(",
"res",
"UserPlusKeys",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Load a user + device keys from the server. | [
"Load",
"a",
"user",
"+",
"device",
"keys",
"from",
"the",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L960-L963 |
160,931 | keybase/client | go/protocol/keybase1/user.go | LoadPublicKeys | func (c UserClient) LoadPublicKeys(ctx context.Context, __arg LoadPublicKeysArg) (res []PublicKey, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.loadPublicKeys", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) LoadPublicKeys(ctx context.Context, __arg LoadPublicKeysArg) (res []PublicKey, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.loadPublicKeys", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"LoadPublicKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"LoadPublicKeysArg",
")",
"(",
"res",
"[",
"]",
"PublicKey",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Load public keys for a user. | [
"Load",
"public",
"keys",
"for",
"a",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L971-L974 |
160,932 | keybase/client | go/protocol/keybase1/user.go | ListTracking | func (c UserClient) ListTracking(ctx context.Context, __arg ListTrackingArg) (res []UserSummary, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.listTracking", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) ListTracking(ctx context.Context, __arg ListTrackingArg) (res []UserSummary, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.listTracking", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"ListTracking",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"ListTrackingArg",
")",
"(",
"res",
"[",
"]",
"UserSummary",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // The list-tracking functions get verified data from the tracking statements
// in the user's sigchain.
//
// If assertion is empty, it will use the current logged in user. | [
"The",
"list",
"-",
"tracking",
"functions",
"get",
"verified",
"data",
"from",
"the",
"tracking",
"statements",
"in",
"the",
"user",
"s",
"sigchain",
".",
"If",
"assertion",
"is",
"empty",
"it",
"will",
"use",
"the",
"current",
"logged",
"in",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L994-L997 |
160,933 | keybase/client | go/protocol/keybase1/user.go | GetUPAK | func (c UserClient) GetUPAK(ctx context.Context, uid UID) (res UPAKVersioned, err error) {
__arg := GetUPAKArg{Uid: uid}
err = c.Cli.Call(ctx, "keybase.1.user.getUPAK", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) GetUPAK(ctx context.Context, uid UID) (res UPAKVersioned, err error) {
__arg := GetUPAKArg{Uid: uid}
err = c.Cli.Call(ctx, "keybase.1.user.getUPAK", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"GetUPAK",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"UID",
")",
"(",
"res",
"UPAKVersioned",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"GetUPAKArg",
"{",
"Uid",
":",
"uid",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // getUPAK returns a UPAK. Used mainly for debugging. | [
"getUPAK",
"returns",
"a",
"UPAK",
".",
"Used",
"mainly",
"for",
"debugging",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L1033-L1037 |
160,934 | keybase/client | go/protocol/keybase1/user.go | GetUPAKLite | func (c UserClient) GetUPAKLite(ctx context.Context, uid UID) (res UPKLiteV1AllIncarnations, err error) {
__arg := GetUPAKLiteArg{Uid: uid}
err = c.Cli.Call(ctx, "keybase.1.user.getUPAKLite", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) GetUPAKLite(ctx context.Context, uid UID) (res UPKLiteV1AllIncarnations, err error) {
__arg := GetUPAKLiteArg{Uid: uid}
err = c.Cli.Call(ctx, "keybase.1.user.getUPAKLite", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"GetUPAKLite",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"UID",
")",
"(",
"res",
"UPKLiteV1AllIncarnations",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"GetUPAKLiteArg",
"{",
"Uid",
":",
"uid",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // getUPAKLite returns a UPKLiteV1AllIncarnations. Used mainly for debugging. | [
"getUPAKLite",
"returns",
"a",
"UPKLiteV1AllIncarnations",
".",
"Used",
"mainly",
"for",
"debugging",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L1040-L1044 |
160,935 | keybase/client | go/protocol/keybase1/user.go | FindNextMerkleRootAfterReset | func (c UserClient) FindNextMerkleRootAfterReset(ctx context.Context, __arg FindNextMerkleRootAfterResetArg) (res NextMerkleRootRes, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.findNextMerkleRootAfterReset", []interface{}{__arg}, &res)
return
} | go | func (c UserClient) FindNextMerkleRootAfterReset(ctx context.Context, __arg FindNextMerkleRootAfterResetArg) (res NextMerkleRootRes, err error) {
err = c.Cli.Call(ctx, "keybase.1.user.findNextMerkleRootAfterReset", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"UserClient",
")",
"FindNextMerkleRootAfterReset",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"FindNextMerkleRootAfterResetArg",
")",
"(",
"res",
"NextMerkleRootRes",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // FindNextMerkleRootAfterReset finds the first Merkle root that contains the UID reset
// at resetSeqno. You should pass it prev, which was the last known Merkle root at the time of
// the reset. Usually, we'll just turn up the next Merkle root, but not always. | [
"FindNextMerkleRootAfterReset",
"finds",
"the",
"first",
"Merkle",
"root",
"that",
"contains",
"the",
"UID",
"reset",
"at",
"resetSeqno",
".",
"You",
"should",
"pass",
"it",
"prev",
"which",
"was",
"the",
"last",
"known",
"Merkle",
"root",
"at",
"the",
"time",
"of",
"the",
"reset",
".",
"Usually",
"we",
"ll",
"just",
"turn",
"up",
"the",
"next",
"Merkle",
"root",
"but",
"not",
"always",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/user.go#L1068-L1071 |
160,936 | keybase/client | go/stellar/autoclaim.go | Kick | func (r *AutoClaimRunner) Kick(mctx libkb.MetaContext, trigger gregor.MsgID) {
mctx.Debug("AutoClaimRunner.Kick(trigger:%v)", trigger)
var onced bool
r.startOnce.Do(func() {
onced = true
go r.loop(libkb.NewMetaContextBackground(mctx.G()), trigger)
})
if !onced {
select {
case r.kickCh <- trigger:
default:
}
}
} | go | func (r *AutoClaimRunner) Kick(mctx libkb.MetaContext, trigger gregor.MsgID) {
mctx.Debug("AutoClaimRunner.Kick(trigger:%v)", trigger)
var onced bool
r.startOnce.Do(func() {
onced = true
go r.loop(libkb.NewMetaContextBackground(mctx.G()), trigger)
})
if !onced {
select {
case r.kickCh <- trigger:
default:
}
}
} | [
"func",
"(",
"r",
"*",
"AutoClaimRunner",
")",
"Kick",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"trigger",
"gregor",
".",
"MsgID",
")",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"trigger",
")",
"\n",
"var",
"onced",
"bool",
"\n",
"r",
".",
"startOnce",
".",
"Do",
"(",
"func",
"(",
")",
"{",
"onced",
"=",
"true",
"\n",
"go",
"r",
".",
"loop",
"(",
"libkb",
".",
"NewMetaContextBackground",
"(",
"mctx",
".",
"G",
"(",
")",
")",
",",
"trigger",
")",
"\n",
"}",
")",
"\n",
"if",
"!",
"onced",
"{",
"select",
"{",
"case",
"r",
".",
"kickCh",
"<-",
"trigger",
":",
"default",
":",
"}",
"\n",
"}",
"\n",
"}"
] | // Kick the processor into gear.
// It will run until all relays in the queue are claimed.
// And then dismiss the gregor message.
// `trigger` is optional, and is of the gregor message that caused the kick. | [
"Kick",
"the",
"processor",
"into",
"gear",
".",
"It",
"will",
"run",
"until",
"all",
"relays",
"in",
"the",
"queue",
"are",
"claimed",
".",
"And",
"then",
"dismiss",
"the",
"gregor",
"message",
".",
"trigger",
"is",
"optional",
"and",
"is",
"of",
"the",
"gregor",
"message",
"that",
"caused",
"the",
"kick",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/autoclaim.go#L34-L47 |
160,937 | keybase/client | go/engine/account_reset.go | NewAccountReset | func NewAccountReset(g *libkb.GlobalContext, usernameOrEmail string) *AccountReset {
return &AccountReset{
Contextified: libkb.NewContextified(g),
usernameOrEmail: usernameOrEmail,
}
} | go | func NewAccountReset(g *libkb.GlobalContext, usernameOrEmail string) *AccountReset {
return &AccountReset{
Contextified: libkb.NewContextified(g),
usernameOrEmail: usernameOrEmail,
}
} | [
"func",
"NewAccountReset",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"usernameOrEmail",
"string",
")",
"*",
"AccountReset",
"{",
"return",
"&",
"AccountReset",
"{",
"Contextified",
":",
"libkb",
".",
"NewContextified",
"(",
"g",
")",
",",
"usernameOrEmail",
":",
"usernameOrEmail",
",",
"}",
"\n",
"}"
] | // NewAccountReset creates a AccountReset engine. | [
"NewAccountReset",
"creates",
"a",
"AccountReset",
"engine",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/account_reset.go#L25-L30 |
160,938 | keybase/client | go/client/files.go | Close | func (b *StdinSource) Close() error {
var err error
if b.open {
err = drain(os.Stdin)
}
b.open = false
return err
} | go | func (b *StdinSource) Close() error {
var err error
if b.open {
err = drain(os.Stdin)
}
b.open = false
return err
} | [
"func",
"(",
"b",
"*",
"StdinSource",
")",
"Close",
"(",
")",
"error",
"{",
"var",
"err",
"error",
"\n",
"if",
"b",
".",
"open",
"{",
"err",
"=",
"drain",
"(",
"os",
".",
"Stdin",
")",
"\n",
"}",
"\n",
"b",
".",
"open",
"=",
"false",
"\n",
"return",
"err",
"\n",
"}"
] | // Close a source, but consume all leftover input before so doing. | [
"Close",
"a",
"source",
"but",
"consume",
"all",
"leftover",
"input",
"before",
"so",
"doing",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/files.go#L84-L91 |
160,939 | keybase/client | go/client/files.go | isValidFile | func isValidFile(file *os.File) error {
finfo, err := file.Stat()
if err != nil {
return err
}
if mode := finfo.Mode(); mode.IsDir() {
return fmt.Errorf("A directory is not a valid file")
}
return nil
} | go | func isValidFile(file *os.File) error {
finfo, err := file.Stat()
if err != nil {
return err
}
if mode := finfo.Mode(); mode.IsDir() {
return fmt.Errorf("A directory is not a valid file")
}
return nil
} | [
"func",
"isValidFile",
"(",
"file",
"*",
"os",
".",
"File",
")",
"error",
"{",
"finfo",
",",
"err",
":=",
"file",
".",
"Stat",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"mode",
":=",
"finfo",
".",
"Mode",
"(",
")",
";",
"mode",
".",
"IsDir",
"(",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // isValidFile verifies the file in question is not actually a directory. | [
"isValidFile",
"verifies",
"the",
"file",
"in",
"question",
"is",
"not",
"actually",
"a",
"directory",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/files.go#L117-L126 |
160,940 | keybase/client | go/libkb/secret_store_external.go | SetGlobalExternalKeyStore | func SetGlobalExternalKeyStore(s UnsafeExternalKeyStore) {
externalKeyStoreMu.Lock()
defer externalKeyStoreMu.Unlock()
externalKeyStore = TypeSafeExternalKeyStoreProxy{s}
externalKeyStoreInitialized = false
} | go | func SetGlobalExternalKeyStore(s UnsafeExternalKeyStore) {
externalKeyStoreMu.Lock()
defer externalKeyStoreMu.Unlock()
externalKeyStore = TypeSafeExternalKeyStoreProxy{s}
externalKeyStoreInitialized = false
} | [
"func",
"SetGlobalExternalKeyStore",
"(",
"s",
"UnsafeExternalKeyStore",
")",
"{",
"externalKeyStoreMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"externalKeyStoreMu",
".",
"Unlock",
"(",
")",
"\n",
"externalKeyStore",
"=",
"TypeSafeExternalKeyStoreProxy",
"{",
"s",
"}",
"\n",
"externalKeyStoreInitialized",
"=",
"false",
"\n",
"}"
] | // SetGlobalExternalKeyStore is called by Android to register Android's KeyStore with Go | [
"SetGlobalExternalKeyStore",
"is",
"called",
"by",
"Android",
"to",
"register",
"Android",
"s",
"KeyStore",
"with",
"Go"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/secret_store_external.go#L72-L77 |
160,941 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | ToWriterMetadataV3 | func (wmdV2 *WriterMetadataV2) ToWriterMetadataV3() WriterMetadataV3 {
var wmdV3 WriterMetadataV3
wmdV3.Writers = make([]keybase1.UserOrTeamID, len(wmdV2.Writers))
copy(wmdV3.Writers, wmdV2.Writers)
wmdV3.UnresolvedWriters = make([]keybase1.SocialAssertion, len(wmdV2.Extra.UnresolvedWriters))
copy(wmdV3.UnresolvedWriters, wmdV2.Extra.UnresolvedWriters)
wmdV3.ID = wmdV2.ID
wmdV3.BID = wmdV2.BID
wmdV3.WFlags = wmdV2.WFlags
wmdV3.DiskUsage = wmdV2.DiskUsage
wmdV3.MDDiskUsage = wmdV2.MDDiskUsage
wmdV3.RefBytes = wmdV2.RefBytes
wmdV3.UnrefBytes = wmdV2.UnrefBytes
wmdV3.MDRefBytes = wmdV2.MDRefBytes
if wmdV2.ID.Type() == tlf.Public {
wmdV3.LatestKeyGen = PublicKeyGen
} else {
wmdV3.LatestKeyGen = wmdV2.WKeys.LatestKeyGeneration()
}
return wmdV3
} | go | func (wmdV2 *WriterMetadataV2) ToWriterMetadataV3() WriterMetadataV3 {
var wmdV3 WriterMetadataV3
wmdV3.Writers = make([]keybase1.UserOrTeamID, len(wmdV2.Writers))
copy(wmdV3.Writers, wmdV2.Writers)
wmdV3.UnresolvedWriters = make([]keybase1.SocialAssertion, len(wmdV2.Extra.UnresolvedWriters))
copy(wmdV3.UnresolvedWriters, wmdV2.Extra.UnresolvedWriters)
wmdV3.ID = wmdV2.ID
wmdV3.BID = wmdV2.BID
wmdV3.WFlags = wmdV2.WFlags
wmdV3.DiskUsage = wmdV2.DiskUsage
wmdV3.MDDiskUsage = wmdV2.MDDiskUsage
wmdV3.RefBytes = wmdV2.RefBytes
wmdV3.UnrefBytes = wmdV2.UnrefBytes
wmdV3.MDRefBytes = wmdV2.MDRefBytes
if wmdV2.ID.Type() == tlf.Public {
wmdV3.LatestKeyGen = PublicKeyGen
} else {
wmdV3.LatestKeyGen = wmdV2.WKeys.LatestKeyGeneration()
}
return wmdV3
} | [
"func",
"(",
"wmdV2",
"*",
"WriterMetadataV2",
")",
"ToWriterMetadataV3",
"(",
")",
"WriterMetadataV3",
"{",
"var",
"wmdV3",
"WriterMetadataV3",
"\n",
"wmdV3",
".",
"Writers",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"len",
"(",
"wmdV2",
".",
"Writers",
")",
")",
"\n",
"copy",
"(",
"wmdV3",
".",
"Writers",
",",
"wmdV2",
".",
"Writers",
")",
"\n\n",
"wmdV3",
".",
"UnresolvedWriters",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
",",
"len",
"(",
"wmdV2",
".",
"Extra",
".",
"UnresolvedWriters",
")",
")",
"\n",
"copy",
"(",
"wmdV3",
".",
"UnresolvedWriters",
",",
"wmdV2",
".",
"Extra",
".",
"UnresolvedWriters",
")",
"\n\n",
"wmdV3",
".",
"ID",
"=",
"wmdV2",
".",
"ID",
"\n",
"wmdV3",
".",
"BID",
"=",
"wmdV2",
".",
"BID",
"\n",
"wmdV3",
".",
"WFlags",
"=",
"wmdV2",
".",
"WFlags",
"\n",
"wmdV3",
".",
"DiskUsage",
"=",
"wmdV2",
".",
"DiskUsage",
"\n",
"wmdV3",
".",
"MDDiskUsage",
"=",
"wmdV2",
".",
"MDDiskUsage",
"\n",
"wmdV3",
".",
"RefBytes",
"=",
"wmdV2",
".",
"RefBytes",
"\n",
"wmdV3",
".",
"UnrefBytes",
"=",
"wmdV2",
".",
"UnrefBytes",
"\n",
"wmdV3",
".",
"MDRefBytes",
"=",
"wmdV2",
".",
"MDRefBytes",
"\n\n",
"if",
"wmdV2",
".",
"ID",
".",
"Type",
"(",
")",
"==",
"tlf",
".",
"Public",
"{",
"wmdV3",
".",
"LatestKeyGen",
"=",
"PublicKeyGen",
"\n",
"}",
"else",
"{",
"wmdV3",
".",
"LatestKeyGen",
"=",
"wmdV2",
".",
"WKeys",
".",
"LatestKeyGeneration",
"(",
")",
"\n",
"}",
"\n",
"return",
"wmdV3",
"\n",
"}"
] | // ToWriterMetadataV3 converts the WriterMetadataV2 to a
// WriterMetadataV3. | [
"ToWriterMetadataV3",
"converts",
"the",
"WriterMetadataV2",
"to",
"a",
"WriterMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L66-L89 |
160,942 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | KeyGenerationsToUpdate | func (md *RootMetadataV2) KeyGenerationsToUpdate() (KeyGen, KeyGen) {
latest := md.LatestKeyGeneration()
if latest < FirstValidKeyGen {
return 0, 0
}
// We keep track of all known key generations.
return FirstValidKeyGen, latest + 1
} | go | func (md *RootMetadataV2) KeyGenerationsToUpdate() (KeyGen, KeyGen) {
latest := md.LatestKeyGeneration()
if latest < FirstValidKeyGen {
return 0, 0
}
// We keep track of all known key generations.
return FirstValidKeyGen, latest + 1
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"KeyGenerationsToUpdate",
"(",
")",
"(",
"KeyGen",
",",
"KeyGen",
")",
"{",
"latest",
":=",
"md",
".",
"LatestKeyGeneration",
"(",
")",
"\n",
"if",
"latest",
"<",
"FirstValidKeyGen",
"{",
"return",
"0",
",",
"0",
"\n",
"}",
"\n",
"// We keep track of all known key generations.",
"return",
"FirstValidKeyGen",
",",
"latest",
"+",
"1",
"\n",
"}"
] | // KeyGenerationsToUpdate implements the RootMetadata interface
// for RootMetadataV2. | [
"KeyGenerationsToUpdate",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L206-L213 |
160,943 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | IsValidRekeyRequest | func (md *RootMetadataV2) IsValidRekeyRequest(
codec kbfscodec.Codec, prevBareMd RootMetadata,
user keybase1.UID, _, _ ExtraMetadata) (bool, error) {
if !md.IsWriterMetadataCopiedSet() {
// Not a copy.
return false, nil
}
prevMd, ok := prevBareMd.(*RootMetadataV2)
if !ok {
// Not the same type so not a copy.
return false, nil
}
writerEqual, err := kbfscodec.Equal(
codec, md.WriterMetadataV2, prevMd.WriterMetadataV2)
if err != nil {
return false, err
}
if !writerEqual {
// Copy mismatch.
return false, nil
}
writerSigInfoEqual, err := kbfscodec.Equal(codec,
md.WriterMetadataSigInfo, prevMd.WriterMetadataSigInfo)
if err != nil {
return false, err
}
if !writerSigInfoEqual {
// Signature/public key mismatch.
return false, nil
}
onlyUserRKeysChanged, err := md.haveOnlyUserRKeysChanged(
codec, prevMd, user)
if err != nil {
return false, err
}
if !onlyUserRKeysChanged {
// Keys outside of this user's reader key set have changed.
return false, nil
}
return true, nil
} | go | func (md *RootMetadataV2) IsValidRekeyRequest(
codec kbfscodec.Codec, prevBareMd RootMetadata,
user keybase1.UID, _, _ ExtraMetadata) (bool, error) {
if !md.IsWriterMetadataCopiedSet() {
// Not a copy.
return false, nil
}
prevMd, ok := prevBareMd.(*RootMetadataV2)
if !ok {
// Not the same type so not a copy.
return false, nil
}
writerEqual, err := kbfscodec.Equal(
codec, md.WriterMetadataV2, prevMd.WriterMetadataV2)
if err != nil {
return false, err
}
if !writerEqual {
// Copy mismatch.
return false, nil
}
writerSigInfoEqual, err := kbfscodec.Equal(codec,
md.WriterMetadataSigInfo, prevMd.WriterMetadataSigInfo)
if err != nil {
return false, err
}
if !writerSigInfoEqual {
// Signature/public key mismatch.
return false, nil
}
onlyUserRKeysChanged, err := md.haveOnlyUserRKeysChanged(
codec, prevMd, user)
if err != nil {
return false, err
}
if !onlyUserRKeysChanged {
// Keys outside of this user's reader key set have changed.
return false, nil
}
return true, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"IsValidRekeyRequest",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"prevBareMd",
"RootMetadata",
",",
"user",
"keybase1",
".",
"UID",
",",
"_",
",",
"_",
"ExtraMetadata",
")",
"(",
"bool",
",",
"error",
")",
"{",
"if",
"!",
"md",
".",
"IsWriterMetadataCopiedSet",
"(",
")",
"{",
"// Not a copy.",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"prevMd",
",",
"ok",
":=",
"prevBareMd",
".",
"(",
"*",
"RootMetadataV2",
")",
"\n",
"if",
"!",
"ok",
"{",
"// Not the same type so not a copy.",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"writerEqual",
",",
"err",
":=",
"kbfscodec",
".",
"Equal",
"(",
"codec",
",",
"md",
".",
"WriterMetadataV2",
",",
"prevMd",
".",
"WriterMetadataV2",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"if",
"!",
"writerEqual",
"{",
"// Copy mismatch.",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"writerSigInfoEqual",
",",
"err",
":=",
"kbfscodec",
".",
"Equal",
"(",
"codec",
",",
"md",
".",
"WriterMetadataSigInfo",
",",
"prevMd",
".",
"WriterMetadataSigInfo",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"if",
"!",
"writerSigInfoEqual",
"{",
"// Signature/public key mismatch.",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"onlyUserRKeysChanged",
",",
"err",
":=",
"md",
".",
"haveOnlyUserRKeysChanged",
"(",
"codec",
",",
"prevMd",
",",
"user",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"if",
"!",
"onlyUserRKeysChanged",
"{",
"// Keys outside of this user's reader key set have changed.",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}"
] | // IsValidRekeyRequest implements the RootMetadata interface for RootMetadataV2. | [
"IsValidRekeyRequest",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L254-L294 |
160,944 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | IsWriter | func (md *RootMetadataV2) IsWriter(
_ context.Context, user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey,
_ kbfscrypto.VerifyingKey, _ TeamMembershipChecker, _ ExtraMetadata,
_ keybase1.OfflineAvailability) (bool, error) {
if md.ID.Type() != tlf.Private {
for _, w := range md.Writers {
if w == user.AsUserOrTeam() {
return true, nil
}
}
return false, nil
}
return md.WKeys.IsWriter(user, deviceKey), nil
} | go | func (md *RootMetadataV2) IsWriter(
_ context.Context, user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey,
_ kbfscrypto.VerifyingKey, _ TeamMembershipChecker, _ ExtraMetadata,
_ keybase1.OfflineAvailability) (bool, error) {
if md.ID.Type() != tlf.Private {
for _, w := range md.Writers {
if w == user.AsUserOrTeam() {
return true, nil
}
}
return false, nil
}
return md.WKeys.IsWriter(user, deviceKey), nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"IsWriter",
"(",
"_",
"context",
".",
"Context",
",",
"user",
"keybase1",
".",
"UID",
",",
"deviceKey",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"_",
"kbfscrypto",
".",
"VerifyingKey",
",",
"_",
"TeamMembershipChecker",
",",
"_",
"ExtraMetadata",
",",
"_",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"bool",
",",
"error",
")",
"{",
"if",
"md",
".",
"ID",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"for",
"_",
",",
"w",
":=",
"range",
"md",
".",
"Writers",
"{",
"if",
"w",
"==",
"user",
".",
"AsUserOrTeam",
"(",
")",
"{",
"return",
"true",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"return",
"md",
".",
"WKeys",
".",
"IsWriter",
"(",
"user",
",",
"deviceKey",
")",
",",
"nil",
"\n",
"}"
] | // IsWriter implements the RootMetadata interface for RootMetadataV2. | [
"IsWriter",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L320-L333 |
160,945 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | IsReader | func (md *RootMetadataV2) IsReader(
_ context.Context, user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey,
_ TeamMembershipChecker, _ ExtraMetadata,
_ keybase1.OfflineAvailability) (bool, error) {
switch md.ID.Type() {
case tlf.Public:
return true, nil
case tlf.Private:
return md.RKeys.IsReader(user, deviceKey), nil
case tlf.SingleTeam:
// There are no read-only users of single-team TLFs.
return false, nil
default:
panic(fmt.Sprintf("Unexpected TLF type: %s", md.ID.Type()))
}
} | go | func (md *RootMetadataV2) IsReader(
_ context.Context, user keybase1.UID, deviceKey kbfscrypto.CryptPublicKey,
_ TeamMembershipChecker, _ ExtraMetadata,
_ keybase1.OfflineAvailability) (bool, error) {
switch md.ID.Type() {
case tlf.Public:
return true, nil
case tlf.Private:
return md.RKeys.IsReader(user, deviceKey), nil
case tlf.SingleTeam:
// There are no read-only users of single-team TLFs.
return false, nil
default:
panic(fmt.Sprintf("Unexpected TLF type: %s", md.ID.Type()))
}
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"IsReader",
"(",
"_",
"context",
".",
"Context",
",",
"user",
"keybase1",
".",
"UID",
",",
"deviceKey",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"_",
"TeamMembershipChecker",
",",
"_",
"ExtraMetadata",
",",
"_",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"bool",
",",
"error",
")",
"{",
"switch",
"md",
".",
"ID",
".",
"Type",
"(",
")",
"{",
"case",
"tlf",
".",
"Public",
":",
"return",
"true",
",",
"nil",
"\n",
"case",
"tlf",
".",
"Private",
":",
"return",
"md",
".",
"RKeys",
".",
"IsReader",
"(",
"user",
",",
"deviceKey",
")",
",",
"nil",
"\n",
"case",
"tlf",
".",
"SingleTeam",
":",
"// There are no read-only users of single-team TLFs.",
"return",
"false",
",",
"nil",
"\n",
"default",
":",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"md",
".",
"ID",
".",
"Type",
"(",
")",
")",
")",
"\n",
"}",
"\n",
"}"
] | // IsReader implements the RootMetadata interface for RootMetadataV2. | [
"IsReader",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L336-L351 |
160,946 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | DeepCopy | func (md *RootMetadataV2) DeepCopy(
codec kbfscodec.Codec) (MutableRootMetadata, error) {
return md.deepCopy(codec)
} | go | func (md *RootMetadataV2) DeepCopy(
codec kbfscodec.Codec) (MutableRootMetadata, error) {
return md.deepCopy(codec)
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"DeepCopy",
"(",
"codec",
"kbfscodec",
".",
"Codec",
")",
"(",
"MutableRootMetadata",
",",
"error",
")",
"{",
"return",
"md",
".",
"deepCopy",
"(",
"codec",
")",
"\n",
"}"
] | // DeepCopy implements the RootMetadata interface for RootMetadataV2. | [
"DeepCopy",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L363-L366 |
160,947 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | MakeSuccessorCopy | func (md *RootMetadataV2) MakeSuccessorCopy(
codec kbfscodec.Codec, extra ExtraMetadata, latestMDVer MetadataVer,
tlfCryptKeyGetter func() ([]kbfscrypto.TLFCryptKey, error),
isReadableAndWriter bool) (
MutableRootMetadata, ExtraMetadata, error) {
if !isReadableAndWriter || (latestMDVer < SegregatedKeyBundlesVer) {
// Continue with the current version. If we're just a reader,
// or can't decrypt the MD, we have to continue with v2
// because we can't just copy a v2 signature into a v3 MD
// blindly.
mdCopy, err := md.makeSuccessorCopyV2(
codec, isReadableAndWriter)
if err != nil {
return nil, nil, err
}
return mdCopy, nil, nil
}
// Upconvert to the new version.
return md.makeSuccessorCopyV3(codec, tlfCryptKeyGetter)
} | go | func (md *RootMetadataV2) MakeSuccessorCopy(
codec kbfscodec.Codec, extra ExtraMetadata, latestMDVer MetadataVer,
tlfCryptKeyGetter func() ([]kbfscrypto.TLFCryptKey, error),
isReadableAndWriter bool) (
MutableRootMetadata, ExtraMetadata, error) {
if !isReadableAndWriter || (latestMDVer < SegregatedKeyBundlesVer) {
// Continue with the current version. If we're just a reader,
// or can't decrypt the MD, we have to continue with v2
// because we can't just copy a v2 signature into a v3 MD
// blindly.
mdCopy, err := md.makeSuccessorCopyV2(
codec, isReadableAndWriter)
if err != nil {
return nil, nil, err
}
return mdCopy, nil, nil
}
// Upconvert to the new version.
return md.makeSuccessorCopyV3(codec, tlfCryptKeyGetter)
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"MakeSuccessorCopy",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"extra",
"ExtraMetadata",
",",
"latestMDVer",
"MetadataVer",
",",
"tlfCryptKeyGetter",
"func",
"(",
")",
"(",
"[",
"]",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"error",
")",
",",
"isReadableAndWriter",
"bool",
")",
"(",
"MutableRootMetadata",
",",
"ExtraMetadata",
",",
"error",
")",
"{",
"if",
"!",
"isReadableAndWriter",
"||",
"(",
"latestMDVer",
"<",
"SegregatedKeyBundlesVer",
")",
"{",
"// Continue with the current version. If we're just a reader,",
"// or can't decrypt the MD, we have to continue with v2",
"// because we can't just copy a v2 signature into a v3 MD",
"// blindly.",
"mdCopy",
",",
"err",
":=",
"md",
".",
"makeSuccessorCopyV2",
"(",
"codec",
",",
"isReadableAndWriter",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"mdCopy",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"// Upconvert to the new version.",
"return",
"md",
".",
"makeSuccessorCopyV3",
"(",
"codec",
",",
"tlfCryptKeyGetter",
")",
"\n",
"}"
] | // MakeSuccessorCopy implements the ImmutableRootMetadata interface for RootMetadataV2. | [
"MakeSuccessorCopy",
"implements",
"the",
"ImmutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L369-L390 |
160,948 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | MakeBareTlfHandle | func (md *RootMetadataV2) MakeBareTlfHandle(_ ExtraMetadata) (
tlf.Handle, error) {
var writers, readers []keybase1.UserOrTeamID
if md.ID.Type() == tlf.Private {
if len(md.WKeys) == 0 {
return tlf.Handle{}, errors.New("No writer key generations; need rekey?")
}
if len(md.RKeys) == 0 {
return tlf.Handle{}, errors.New("No reader key generations; need rekey?")
}
wkb := md.WKeys[len(md.WKeys)-1]
rkb := md.RKeys[len(md.RKeys)-1]
writers = make([]keybase1.UserOrTeamID, 0, len(wkb.WKeys))
readers = make([]keybase1.UserOrTeamID, 0, len(rkb.RKeys))
for w := range wkb.WKeys {
writers = append(writers, w.AsUserOrTeam())
}
for r := range rkb.RKeys {
// TODO: Return an error instead if r is
// PublicUID. Maybe return an error if r is in
// WKeys also. Or do all this in
// MakeBareTlfHandle.
if _, ok := wkb.WKeys[r]; !ok &&
r != keybase1.PublicUID {
readers = append(readers, r.AsUserOrTeam())
}
}
} else {
writers = md.Writers
if md.ID.Type() == tlf.Public {
readers = []keybase1.UserOrTeamID{keybase1.PublicUID.AsUserOrTeam()}
}
}
return tlf.MakeHandle(
writers, readers,
md.Extra.UnresolvedWriters, md.UnresolvedReaders,
md.TlfHandleExtensions())
} | go | func (md *RootMetadataV2) MakeBareTlfHandle(_ ExtraMetadata) (
tlf.Handle, error) {
var writers, readers []keybase1.UserOrTeamID
if md.ID.Type() == tlf.Private {
if len(md.WKeys) == 0 {
return tlf.Handle{}, errors.New("No writer key generations; need rekey?")
}
if len(md.RKeys) == 0 {
return tlf.Handle{}, errors.New("No reader key generations; need rekey?")
}
wkb := md.WKeys[len(md.WKeys)-1]
rkb := md.RKeys[len(md.RKeys)-1]
writers = make([]keybase1.UserOrTeamID, 0, len(wkb.WKeys))
readers = make([]keybase1.UserOrTeamID, 0, len(rkb.RKeys))
for w := range wkb.WKeys {
writers = append(writers, w.AsUserOrTeam())
}
for r := range rkb.RKeys {
// TODO: Return an error instead if r is
// PublicUID. Maybe return an error if r is in
// WKeys also. Or do all this in
// MakeBareTlfHandle.
if _, ok := wkb.WKeys[r]; !ok &&
r != keybase1.PublicUID {
readers = append(readers, r.AsUserOrTeam())
}
}
} else {
writers = md.Writers
if md.ID.Type() == tlf.Public {
readers = []keybase1.UserOrTeamID{keybase1.PublicUID.AsUserOrTeam()}
}
}
return tlf.MakeHandle(
writers, readers,
md.Extra.UnresolvedWriters, md.UnresolvedReaders,
md.TlfHandleExtensions())
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"MakeBareTlfHandle",
"(",
"_",
"ExtraMetadata",
")",
"(",
"tlf",
".",
"Handle",
",",
"error",
")",
"{",
"var",
"writers",
",",
"readers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
"\n",
"if",
"md",
".",
"ID",
".",
"Type",
"(",
")",
"==",
"tlf",
".",
"Private",
"{",
"if",
"len",
"(",
"md",
".",
"WKeys",
")",
"==",
"0",
"{",
"return",
"tlf",
".",
"Handle",
"{",
"}",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"md",
".",
"RKeys",
")",
"==",
"0",
"{",
"return",
"tlf",
".",
"Handle",
"{",
"}",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"wkb",
":=",
"md",
".",
"WKeys",
"[",
"len",
"(",
"md",
".",
"WKeys",
")",
"-",
"1",
"]",
"\n",
"rkb",
":=",
"md",
".",
"RKeys",
"[",
"len",
"(",
"md",
".",
"RKeys",
")",
"-",
"1",
"]",
"\n",
"writers",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"0",
",",
"len",
"(",
"wkb",
".",
"WKeys",
")",
")",
"\n",
"readers",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"0",
",",
"len",
"(",
"rkb",
".",
"RKeys",
")",
")",
"\n",
"for",
"w",
":=",
"range",
"wkb",
".",
"WKeys",
"{",
"writers",
"=",
"append",
"(",
"writers",
",",
"w",
".",
"AsUserOrTeam",
"(",
")",
")",
"\n",
"}",
"\n",
"for",
"r",
":=",
"range",
"rkb",
".",
"RKeys",
"{",
"// TODO: Return an error instead if r is",
"// PublicUID. Maybe return an error if r is in",
"// WKeys also. Or do all this in",
"// MakeBareTlfHandle.",
"if",
"_",
",",
"ok",
":=",
"wkb",
".",
"WKeys",
"[",
"r",
"]",
";",
"!",
"ok",
"&&",
"r",
"!=",
"keybase1",
".",
"PublicUID",
"{",
"readers",
"=",
"append",
"(",
"readers",
",",
"r",
".",
"AsUserOrTeam",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"else",
"{",
"writers",
"=",
"md",
".",
"Writers",
"\n",
"if",
"md",
".",
"ID",
".",
"Type",
"(",
")",
"==",
"tlf",
".",
"Public",
"{",
"readers",
"=",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
"{",
"keybase1",
".",
"PublicUID",
".",
"AsUserOrTeam",
"(",
")",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"tlf",
".",
"MakeHandle",
"(",
"writers",
",",
"readers",
",",
"md",
".",
"Extra",
".",
"UnresolvedWriters",
",",
"md",
".",
"UnresolvedReaders",
",",
"md",
".",
"TlfHandleExtensions",
"(",
")",
")",
"\n",
"}"
] | // MakeBareTlfHandle implements the RootMetadata interface for RootMetadataV2. | [
"MakeBareTlfHandle",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L574-L614 |
160,949 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | TlfHandleExtensions | func (md *RootMetadataV2) TlfHandleExtensions() (
extensions []tlf.HandleExtension) {
if md.ConflictInfo != nil {
extensions = append(extensions, *md.ConflictInfo)
}
if md.FinalizedInfo != nil {
extensions = append(extensions, *md.FinalizedInfo)
}
return extensions
} | go | func (md *RootMetadataV2) TlfHandleExtensions() (
extensions []tlf.HandleExtension) {
if md.ConflictInfo != nil {
extensions = append(extensions, *md.ConflictInfo)
}
if md.FinalizedInfo != nil {
extensions = append(extensions, *md.FinalizedInfo)
}
return extensions
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"TlfHandleExtensions",
"(",
")",
"(",
"extensions",
"[",
"]",
"tlf",
".",
"HandleExtension",
")",
"{",
"if",
"md",
".",
"ConflictInfo",
"!=",
"nil",
"{",
"extensions",
"=",
"append",
"(",
"extensions",
",",
"*",
"md",
".",
"ConflictInfo",
")",
"\n",
"}",
"\n",
"if",
"md",
".",
"FinalizedInfo",
"!=",
"nil",
"{",
"extensions",
"=",
"append",
"(",
"extensions",
",",
"*",
"md",
".",
"FinalizedInfo",
")",
"\n",
"}",
"\n",
"return",
"extensions",
"\n",
"}"
] | // TlfHandleExtensions implements the RootMetadata interface for RootMetadataV2. | [
"TlfHandleExtensions",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L617-L626 |
160,950 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | PromoteReaders | func (md *RootMetadataV2) PromoteReaders(
readersToPromote map[keybase1.UID]bool,
_ ExtraMetadata) error {
if md.TlfID().Type() != tlf.Private {
return InvalidNonPrivateTLFOperation{md.TlfID(), "PromoteReaders", md.Version()}
}
for i, rkb := range md.RKeys {
for reader := range readersToPromote {
dkim, ok := rkb.RKeys[reader]
if !ok {
return fmt.Errorf("Could not find %s in key gen %d",
reader, FirstValidKeyGen+KeyGen(i))
}
// TODO: This may be incorrect, since dkim may
// contain negative EPubKey indices, and the
// upconversion code assumes that writers will
// only contain non-negative EPubKey indices.
//
// See KBFS-1719.
md.WKeys[i].WKeys[reader] = dkim
delete(rkb.RKeys, reader)
}
}
return nil
} | go | func (md *RootMetadataV2) PromoteReaders(
readersToPromote map[keybase1.UID]bool,
_ ExtraMetadata) error {
if md.TlfID().Type() != tlf.Private {
return InvalidNonPrivateTLFOperation{md.TlfID(), "PromoteReaders", md.Version()}
}
for i, rkb := range md.RKeys {
for reader := range readersToPromote {
dkim, ok := rkb.RKeys[reader]
if !ok {
return fmt.Errorf("Could not find %s in key gen %d",
reader, FirstValidKeyGen+KeyGen(i))
}
// TODO: This may be incorrect, since dkim may
// contain negative EPubKey indices, and the
// upconversion code assumes that writers will
// only contain non-negative EPubKey indices.
//
// See KBFS-1719.
md.WKeys[i].WKeys[reader] = dkim
delete(rkb.RKeys, reader)
}
}
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"PromoteReaders",
"(",
"readersToPromote",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"bool",
",",
"_",
"ExtraMetadata",
")",
"error",
"{",
"if",
"md",
".",
"TlfID",
"(",
")",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"return",
"InvalidNonPrivateTLFOperation",
"{",
"md",
".",
"TlfID",
"(",
")",
",",
"\"",
"\"",
",",
"md",
".",
"Version",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"for",
"i",
",",
"rkb",
":=",
"range",
"md",
".",
"RKeys",
"{",
"for",
"reader",
":=",
"range",
"readersToPromote",
"{",
"dkim",
",",
"ok",
":=",
"rkb",
".",
"RKeys",
"[",
"reader",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"reader",
",",
"FirstValidKeyGen",
"+",
"KeyGen",
"(",
"i",
")",
")",
"\n",
"}",
"\n",
"// TODO: This may be incorrect, since dkim may",
"// contain negative EPubKey indices, and the",
"// upconversion code assumes that writers will",
"// only contain non-negative EPubKey indices.",
"//",
"// See KBFS-1719.",
"md",
".",
"WKeys",
"[",
"i",
"]",
".",
"WKeys",
"[",
"reader",
"]",
"=",
"dkim",
"\n",
"delete",
"(",
"rkb",
".",
"RKeys",
",",
"reader",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // PromoteReaders implements the RootMetadata interface for
// RootMetadataV2. | [
"PromoteReaders",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L630-L656 |
160,951 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | RevokeRemovedDevices | func (md *RootMetadataV2) RevokeRemovedDevices(
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
_ ExtraMetadata) (ServerHalfRemovalInfo, error) {
if md.TlfID().Type() != tlf.Private {
return nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "RevokeRemovedDevices", md.Version()}
}
var wRemovalInfo ServerHalfRemovalInfo
for _, wkb := range md.WKeys {
removalInfo := wkb.WKeys.RemoveDevicesNotIn(updatedWriterKeys)
if wRemovalInfo == nil {
wRemovalInfo = removalInfo
} else {
err := wRemovalInfo.AddGeneration(removalInfo)
if err != nil {
return nil, err
}
}
}
var rRemovalInfo ServerHalfRemovalInfo
for _, rkb := range md.RKeys {
removalInfo := rkb.RKeys.RemoveDevicesNotIn(updatedReaderKeys)
if rRemovalInfo == nil {
rRemovalInfo = removalInfo
} else {
err := rRemovalInfo.AddGeneration(removalInfo)
if err != nil {
return nil, err
}
}
}
return wRemovalInfo.MergeUsers(rRemovalInfo)
} | go | func (md *RootMetadataV2) RevokeRemovedDevices(
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
_ ExtraMetadata) (ServerHalfRemovalInfo, error) {
if md.TlfID().Type() != tlf.Private {
return nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "RevokeRemovedDevices", md.Version()}
}
var wRemovalInfo ServerHalfRemovalInfo
for _, wkb := range md.WKeys {
removalInfo := wkb.WKeys.RemoveDevicesNotIn(updatedWriterKeys)
if wRemovalInfo == nil {
wRemovalInfo = removalInfo
} else {
err := wRemovalInfo.AddGeneration(removalInfo)
if err != nil {
return nil, err
}
}
}
var rRemovalInfo ServerHalfRemovalInfo
for _, rkb := range md.RKeys {
removalInfo := rkb.RKeys.RemoveDevicesNotIn(updatedReaderKeys)
if rRemovalInfo == nil {
rRemovalInfo = removalInfo
} else {
err := rRemovalInfo.AddGeneration(removalInfo)
if err != nil {
return nil, err
}
}
}
return wRemovalInfo.MergeUsers(rRemovalInfo)
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"RevokeRemovedDevices",
"(",
"updatedWriterKeys",
",",
"updatedReaderKeys",
"UserDevicePublicKeys",
",",
"_",
"ExtraMetadata",
")",
"(",
"ServerHalfRemovalInfo",
",",
"error",
")",
"{",
"if",
"md",
".",
"TlfID",
"(",
")",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"return",
"nil",
",",
"InvalidNonPrivateTLFOperation",
"{",
"md",
".",
"TlfID",
"(",
")",
",",
"\"",
"\"",
",",
"md",
".",
"Version",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"var",
"wRemovalInfo",
"ServerHalfRemovalInfo",
"\n",
"for",
"_",
",",
"wkb",
":=",
"range",
"md",
".",
"WKeys",
"{",
"removalInfo",
":=",
"wkb",
".",
"WKeys",
".",
"RemoveDevicesNotIn",
"(",
"updatedWriterKeys",
")",
"\n",
"if",
"wRemovalInfo",
"==",
"nil",
"{",
"wRemovalInfo",
"=",
"removalInfo",
"\n",
"}",
"else",
"{",
"err",
":=",
"wRemovalInfo",
".",
"AddGeneration",
"(",
"removalInfo",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"var",
"rRemovalInfo",
"ServerHalfRemovalInfo",
"\n",
"for",
"_",
",",
"rkb",
":=",
"range",
"md",
".",
"RKeys",
"{",
"removalInfo",
":=",
"rkb",
".",
"RKeys",
".",
"RemoveDevicesNotIn",
"(",
"updatedReaderKeys",
")",
"\n",
"if",
"rRemovalInfo",
"==",
"nil",
"{",
"rRemovalInfo",
"=",
"removalInfo",
"\n",
"}",
"else",
"{",
"err",
":=",
"rRemovalInfo",
".",
"AddGeneration",
"(",
"removalInfo",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"wRemovalInfo",
".",
"MergeUsers",
"(",
"rRemovalInfo",
")",
"\n",
"}"
] | // RevokeRemovedDevices implements the RootMetadata interface for
// RootMetadataV2. | [
"RevokeRemovedDevices",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L660-L695 |
160,952 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | getTLFKeyBundles | func (md *RootMetadataV2) getTLFKeyBundles(keyGen KeyGen) (
*TLFWriterKeyBundleV2, *TLFReaderKeyBundleV2, error) {
if md.ID.Type() != tlf.Private {
return nil, nil, InvalidNonPrivateTLFOperation{md.ID, "getTLFKeyBundles", md.Version()}
}
if keyGen < FirstValidKeyGen {
return nil, nil, InvalidKeyGenerationError{md.ID, keyGen}
}
i := int(keyGen - FirstValidKeyGen)
if i >= len(md.WKeys) || i >= len(md.RKeys) {
return nil, nil, NewKeyGenerationError{md.ID, keyGen}
}
return &md.WKeys[i], &md.RKeys[i], nil
} | go | func (md *RootMetadataV2) getTLFKeyBundles(keyGen KeyGen) (
*TLFWriterKeyBundleV2, *TLFReaderKeyBundleV2, error) {
if md.ID.Type() != tlf.Private {
return nil, nil, InvalidNonPrivateTLFOperation{md.ID, "getTLFKeyBundles", md.Version()}
}
if keyGen < FirstValidKeyGen {
return nil, nil, InvalidKeyGenerationError{md.ID, keyGen}
}
i := int(keyGen - FirstValidKeyGen)
if i >= len(md.WKeys) || i >= len(md.RKeys) {
return nil, nil, NewKeyGenerationError{md.ID, keyGen}
}
return &md.WKeys[i], &md.RKeys[i], nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"getTLFKeyBundles",
"(",
"keyGen",
"KeyGen",
")",
"(",
"*",
"TLFWriterKeyBundleV2",
",",
"*",
"TLFReaderKeyBundleV2",
",",
"error",
")",
"{",
"if",
"md",
".",
"ID",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"return",
"nil",
",",
"nil",
",",
"InvalidNonPrivateTLFOperation",
"{",
"md",
".",
"ID",
",",
"\"",
"\"",
",",
"md",
".",
"Version",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"if",
"keyGen",
"<",
"FirstValidKeyGen",
"{",
"return",
"nil",
",",
"nil",
",",
"InvalidKeyGenerationError",
"{",
"md",
".",
"ID",
",",
"keyGen",
"}",
"\n",
"}",
"\n",
"i",
":=",
"int",
"(",
"keyGen",
"-",
"FirstValidKeyGen",
")",
"\n",
"if",
"i",
">=",
"len",
"(",
"md",
".",
"WKeys",
")",
"||",
"i",
">=",
"len",
"(",
"md",
".",
"RKeys",
")",
"{",
"return",
"nil",
",",
"nil",
",",
"NewKeyGenerationError",
"{",
"md",
".",
"ID",
",",
"keyGen",
"}",
"\n",
"}",
"\n",
"return",
"&",
"md",
".",
"WKeys",
"[",
"i",
"]",
",",
"&",
"md",
".",
"RKeys",
"[",
"i",
"]",
",",
"nil",
"\n",
"}"
] | // getTLFKeyBundles returns the bundles for a given key generation.
// Note that it is legal a writer or a reader to have no keys in their
// bundle, if they only have a Keybase username with no device keys
// yet. | [
"getTLFKeyBundles",
"returns",
"the",
"bundles",
"for",
"a",
"given",
"key",
"generation",
".",
"Note",
"that",
"it",
"is",
"legal",
"a",
"writer",
"or",
"a",
"reader",
"to",
"have",
"no",
"keys",
"in",
"their",
"bundle",
"if",
"they",
"only",
"have",
"a",
"Keybase",
"username",
"with",
"no",
"device",
"keys",
"yet",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L701-L715 |
160,953 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | GetUserDevicePublicKeys | func (md *RootMetadataV2) GetUserDevicePublicKeys(_ ExtraMetadata) (
writerDeviceKeys, readerDeviceKeys UserDevicePublicKeys, err error) {
if md.TlfID().Type() != tlf.Private {
return nil, nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "GetUserDevicePublicKeys", md.Version()}
}
if len(md.WKeys) == 0 || len(md.RKeys) == 0 {
return nil, nil, errors.New(
"GetUserDevicePublicKeys called with no key generations (V2)")
}
wUDKIM := md.WKeys[len(md.WKeys)-1]
rUDKIM := md.RKeys[len(md.RKeys)-1]
return wUDKIM.WKeys.ToPublicKeys(), rUDKIM.RKeys.ToPublicKeys(), nil
} | go | func (md *RootMetadataV2) GetUserDevicePublicKeys(_ ExtraMetadata) (
writerDeviceKeys, readerDeviceKeys UserDevicePublicKeys, err error) {
if md.TlfID().Type() != tlf.Private {
return nil, nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "GetUserDevicePublicKeys", md.Version()}
}
if len(md.WKeys) == 0 || len(md.RKeys) == 0 {
return nil, nil, errors.New(
"GetUserDevicePublicKeys called with no key generations (V2)")
}
wUDKIM := md.WKeys[len(md.WKeys)-1]
rUDKIM := md.RKeys[len(md.RKeys)-1]
return wUDKIM.WKeys.ToPublicKeys(), rUDKIM.RKeys.ToPublicKeys(), nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"GetUserDevicePublicKeys",
"(",
"_",
"ExtraMetadata",
")",
"(",
"writerDeviceKeys",
",",
"readerDeviceKeys",
"UserDevicePublicKeys",
",",
"err",
"error",
")",
"{",
"if",
"md",
".",
"TlfID",
"(",
")",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"return",
"nil",
",",
"nil",
",",
"InvalidNonPrivateTLFOperation",
"{",
"md",
".",
"TlfID",
"(",
")",
",",
"\"",
"\"",
",",
"md",
".",
"Version",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"md",
".",
"WKeys",
")",
"==",
"0",
"||",
"len",
"(",
"md",
".",
"RKeys",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"wUDKIM",
":=",
"md",
".",
"WKeys",
"[",
"len",
"(",
"md",
".",
"WKeys",
")",
"-",
"1",
"]",
"\n",
"rUDKIM",
":=",
"md",
".",
"RKeys",
"[",
"len",
"(",
"md",
".",
"RKeys",
")",
"-",
"1",
"]",
"\n\n",
"return",
"wUDKIM",
".",
"WKeys",
".",
"ToPublicKeys",
"(",
")",
",",
"rUDKIM",
".",
"RKeys",
".",
"ToPublicKeys",
"(",
")",
",",
"nil",
"\n",
"}"
] | // GetUserDevicePublicKeys implements the RootMetadata interface
// for RootMetadataV2. | [
"GetUserDevicePublicKeys",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L719-L735 |
160,954 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | GetTLFCryptKeyParams | func (md *RootMetadataV2) GetTLFCryptKeyParams(
keyGen KeyGen, user keybase1.UID, key kbfscrypto.CryptPublicKey,
_ ExtraMetadata) (
kbfscrypto.TLFEphemeralPublicKey, kbfscrypto.EncryptedTLFCryptKeyClientHalf,
kbfscrypto.TLFCryptKeyServerHalfID, bool, error) {
wkb, rkb, err := md.getTLFKeyBundles(keyGen)
if err != nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, err
}
dkim := wkb.WKeys[user]
if dkim == nil {
dkim = rkb.RKeys[user]
if dkim == nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
}
info, ok := dkim[key.KID()]
if !ok {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
_, _, ePubKey, err := GetEphemeralPublicKeyInfoV2(info, *wkb, *rkb)
if err != nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, err
}
return ePubKey, info.ClientHalf, info.ServerHalfID, true, nil
} | go | func (md *RootMetadataV2) GetTLFCryptKeyParams(
keyGen KeyGen, user keybase1.UID, key kbfscrypto.CryptPublicKey,
_ ExtraMetadata) (
kbfscrypto.TLFEphemeralPublicKey, kbfscrypto.EncryptedTLFCryptKeyClientHalf,
kbfscrypto.TLFCryptKeyServerHalfID, bool, error) {
wkb, rkb, err := md.getTLFKeyBundles(keyGen)
if err != nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, err
}
dkim := wkb.WKeys[user]
if dkim == nil {
dkim = rkb.RKeys[user]
if dkim == nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
}
info, ok := dkim[key.KID()]
if !ok {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
_, _, ePubKey, err := GetEphemeralPublicKeyInfoV2(info, *wkb, *rkb)
if err != nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, err
}
return ePubKey, info.ClientHalf, info.ServerHalfID, true, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"GetTLFCryptKeyParams",
"(",
"keyGen",
"KeyGen",
",",
"user",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"_",
"ExtraMetadata",
")",
"(",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"kbfscrypto",
".",
"EncryptedTLFCryptKeyClientHalf",
",",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
",",
"bool",
",",
"error",
")",
"{",
"wkb",
",",
"rkb",
",",
"err",
":=",
"md",
".",
"getTLFKeyBundles",
"(",
"keyGen",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
"{",
"}",
",",
"kbfscrypto",
".",
"EncryptedTLFCryptKeyClientHalf",
"{",
"}",
",",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
"{",
"}",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"dkim",
":=",
"wkb",
".",
"WKeys",
"[",
"user",
"]",
"\n",
"if",
"dkim",
"==",
"nil",
"{",
"dkim",
"=",
"rkb",
".",
"RKeys",
"[",
"user",
"]",
"\n",
"if",
"dkim",
"==",
"nil",
"{",
"return",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
"{",
"}",
",",
"kbfscrypto",
".",
"EncryptedTLFCryptKeyClientHalf",
"{",
"}",
",",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
"{",
"}",
",",
"false",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"info",
",",
"ok",
":=",
"dkim",
"[",
"key",
".",
"KID",
"(",
")",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
"{",
"}",
",",
"kbfscrypto",
".",
"EncryptedTLFCryptKeyClientHalf",
"{",
"}",
",",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
"{",
"}",
",",
"false",
",",
"nil",
"\n",
"}",
"\n\n",
"_",
",",
"_",
",",
"ePubKey",
",",
"err",
":=",
"GetEphemeralPublicKeyInfoV2",
"(",
"info",
",",
"*",
"wkb",
",",
"*",
"rkb",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
"{",
"}",
",",
"kbfscrypto",
".",
"EncryptedTLFCryptKeyClientHalf",
"{",
"}",
",",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
"{",
"}",
",",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"ePubKey",
",",
"info",
".",
"ClientHalf",
",",
"info",
".",
"ServerHalfID",
",",
"true",
",",
"nil",
"\n",
"}"
] | // GetTLFCryptKeyParams implements the RootMetadata interface for RootMetadataV2. | [
"GetTLFCryptKeyParams",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L738-L774 |
160,955 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | IsValidAndSigned | func (md *RootMetadataV2) IsValidAndSigned(
_ context.Context, codec kbfscodec.Codec,
_ TeamMembershipChecker, extra ExtraMetadata,
_ kbfscrypto.VerifyingKey, _ keybase1.OfflineAvailability) error {
// Optimization -- if the WriterMetadata signature is nil, it
// will fail verification.
if md.WriterMetadataSigInfo.IsNil() {
return errors.New("Missing WriterMetadata signature")
}
if md.IsFinal() {
if md.Revision < RevisionInitial+1 {
return fmt.Errorf("Invalid final revision %d", md.Revision)
}
if md.Revision == (RevisionInitial + 1) {
if md.PrevRoot != (ID{}) {
return fmt.Errorf("Invalid PrevRoot %s for initial final revision", md.PrevRoot)
}
} else {
if md.PrevRoot == (ID{}) {
return errors.New("No PrevRoot for non-initial final revision")
}
}
} else {
if md.Revision < RevisionInitial {
return fmt.Errorf("Invalid revision %d", md.Revision)
}
if md.Revision == RevisionInitial {
if md.PrevRoot != (ID{}) {
return fmt.Errorf("Invalid PrevRoot %s for initial revision", md.PrevRoot)
}
} else {
if md.PrevRoot == (ID{}) {
return errors.New("No PrevRoot for non-initial revision")
}
}
}
if len(md.SerializedPrivateMetadata) == 0 {
return errors.New("No private metadata")
}
if (md.MergedStatus() == Merged) != (md.BID() == NullBranchID) {
return fmt.Errorf("Branch ID %s doesn't match merged status %s",
md.BID(), md.MergedStatus())
}
handle, err := md.MakeBareTlfHandle(extra)
if err != nil {
return err
}
// Make sure the last writer is valid. TODO(KBFS-2185): for a
// team TLF, check that the writer is part of the team.
writer := md.LastModifyingWriter()
if !handle.IsWriter(writer.AsUserOrTeam()) {
return fmt.Errorf("Invalid modifying writer %s", writer)
}
// Make sure the last modifier is valid.
user := md.LastModifyingUser
if !handle.IsReader(user.AsUserOrTeam()) {
return fmt.Errorf("Invalid modifying user %s", user)
}
// Verify signature. We have to re-marshal the WriterMetadata,
// since it's embedded.
buf, err := codec.Encode(md.WriterMetadataV2)
if err != nil {
return err
}
err = kbfscrypto.Verify(buf, md.WriterMetadataSigInfo)
if err != nil {
return fmt.Errorf("Could not verify writer metadata: %v", err)
}
return nil
} | go | func (md *RootMetadataV2) IsValidAndSigned(
_ context.Context, codec kbfscodec.Codec,
_ TeamMembershipChecker, extra ExtraMetadata,
_ kbfscrypto.VerifyingKey, _ keybase1.OfflineAvailability) error {
// Optimization -- if the WriterMetadata signature is nil, it
// will fail verification.
if md.WriterMetadataSigInfo.IsNil() {
return errors.New("Missing WriterMetadata signature")
}
if md.IsFinal() {
if md.Revision < RevisionInitial+1 {
return fmt.Errorf("Invalid final revision %d", md.Revision)
}
if md.Revision == (RevisionInitial + 1) {
if md.PrevRoot != (ID{}) {
return fmt.Errorf("Invalid PrevRoot %s for initial final revision", md.PrevRoot)
}
} else {
if md.PrevRoot == (ID{}) {
return errors.New("No PrevRoot for non-initial final revision")
}
}
} else {
if md.Revision < RevisionInitial {
return fmt.Errorf("Invalid revision %d", md.Revision)
}
if md.Revision == RevisionInitial {
if md.PrevRoot != (ID{}) {
return fmt.Errorf("Invalid PrevRoot %s for initial revision", md.PrevRoot)
}
} else {
if md.PrevRoot == (ID{}) {
return errors.New("No PrevRoot for non-initial revision")
}
}
}
if len(md.SerializedPrivateMetadata) == 0 {
return errors.New("No private metadata")
}
if (md.MergedStatus() == Merged) != (md.BID() == NullBranchID) {
return fmt.Errorf("Branch ID %s doesn't match merged status %s",
md.BID(), md.MergedStatus())
}
handle, err := md.MakeBareTlfHandle(extra)
if err != nil {
return err
}
// Make sure the last writer is valid. TODO(KBFS-2185): for a
// team TLF, check that the writer is part of the team.
writer := md.LastModifyingWriter()
if !handle.IsWriter(writer.AsUserOrTeam()) {
return fmt.Errorf("Invalid modifying writer %s", writer)
}
// Make sure the last modifier is valid.
user := md.LastModifyingUser
if !handle.IsReader(user.AsUserOrTeam()) {
return fmt.Errorf("Invalid modifying user %s", user)
}
// Verify signature. We have to re-marshal the WriterMetadata,
// since it's embedded.
buf, err := codec.Encode(md.WriterMetadataV2)
if err != nil {
return err
}
err = kbfscrypto.Verify(buf, md.WriterMetadataSigInfo)
if err != nil {
return fmt.Errorf("Could not verify writer metadata: %v", err)
}
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"IsValidAndSigned",
"(",
"_",
"context",
".",
"Context",
",",
"codec",
"kbfscodec",
".",
"Codec",
",",
"_",
"TeamMembershipChecker",
",",
"extra",
"ExtraMetadata",
",",
"_",
"kbfscrypto",
".",
"VerifyingKey",
",",
"_",
"keybase1",
".",
"OfflineAvailability",
")",
"error",
"{",
"// Optimization -- if the WriterMetadata signature is nil, it",
"// will fail verification.",
"if",
"md",
".",
"WriterMetadataSigInfo",
".",
"IsNil",
"(",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"md",
".",
"IsFinal",
"(",
")",
"{",
"if",
"md",
".",
"Revision",
"<",
"RevisionInitial",
"+",
"1",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"md",
".",
"Revision",
")",
"\n",
"}",
"\n\n",
"if",
"md",
".",
"Revision",
"==",
"(",
"RevisionInitial",
"+",
"1",
")",
"{",
"if",
"md",
".",
"PrevRoot",
"!=",
"(",
"ID",
"{",
"}",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"md",
".",
"PrevRoot",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"md",
".",
"PrevRoot",
"==",
"(",
"ID",
"{",
"}",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"md",
".",
"Revision",
"<",
"RevisionInitial",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"md",
".",
"Revision",
")",
"\n",
"}",
"\n\n",
"if",
"md",
".",
"Revision",
"==",
"RevisionInitial",
"{",
"if",
"md",
".",
"PrevRoot",
"!=",
"(",
"ID",
"{",
"}",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"md",
".",
"PrevRoot",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"md",
".",
"PrevRoot",
"==",
"(",
"ID",
"{",
"}",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"md",
".",
"SerializedPrivateMetadata",
")",
"==",
"0",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"(",
"md",
".",
"MergedStatus",
"(",
")",
"==",
"Merged",
")",
"!=",
"(",
"md",
".",
"BID",
"(",
")",
"==",
"NullBranchID",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"md",
".",
"BID",
"(",
")",
",",
"md",
".",
"MergedStatus",
"(",
")",
")",
"\n",
"}",
"\n\n",
"handle",
",",
"err",
":=",
"md",
".",
"MakeBareTlfHandle",
"(",
"extra",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// Make sure the last writer is valid. TODO(KBFS-2185): for a",
"// team TLF, check that the writer is part of the team.",
"writer",
":=",
"md",
".",
"LastModifyingWriter",
"(",
")",
"\n",
"if",
"!",
"handle",
".",
"IsWriter",
"(",
"writer",
".",
"AsUserOrTeam",
"(",
")",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"writer",
")",
"\n",
"}",
"\n\n",
"// Make sure the last modifier is valid.",
"user",
":=",
"md",
".",
"LastModifyingUser",
"\n",
"if",
"!",
"handle",
".",
"IsReader",
"(",
"user",
".",
"AsUserOrTeam",
"(",
")",
")",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"user",
")",
"\n",
"}",
"\n\n",
"// Verify signature. We have to re-marshal the WriterMetadata,",
"// since it's embedded.",
"buf",
",",
"err",
":=",
"codec",
".",
"Encode",
"(",
"md",
".",
"WriterMetadataV2",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"kbfscrypto",
".",
"Verify",
"(",
"buf",
",",
"md",
".",
"WriterMetadataSigInfo",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // IsValidAndSigned implements the RootMetadata interface for RootMetadataV2. | [
"IsValidAndSigned",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L777-L857 |
160,956 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | IsLastModifiedBy | func (md *RootMetadataV2) IsLastModifiedBy(
uid keybase1.UID, key kbfscrypto.VerifyingKey) error {
// Verify the user and device are the writer.
writer := md.LastModifyingWriter()
if !md.IsWriterMetadataCopiedSet() {
if writer != uid {
return fmt.Errorf("Last writer %s != %s", writer, uid)
}
if md.WriterMetadataSigInfo.VerifyingKey != key {
return fmt.Errorf(
"Last writer verifying key %v != %v",
md.WriterMetadataSigInfo.VerifyingKey, key)
}
}
// Verify the user and device are the last modifier.
user := md.GetLastModifyingUser()
if user != uid {
return fmt.Errorf("Last modifier %s != %s", user, uid)
}
return nil
} | go | func (md *RootMetadataV2) IsLastModifiedBy(
uid keybase1.UID, key kbfscrypto.VerifyingKey) error {
// Verify the user and device are the writer.
writer := md.LastModifyingWriter()
if !md.IsWriterMetadataCopiedSet() {
if writer != uid {
return fmt.Errorf("Last writer %s != %s", writer, uid)
}
if md.WriterMetadataSigInfo.VerifyingKey != key {
return fmt.Errorf(
"Last writer verifying key %v != %v",
md.WriterMetadataSigInfo.VerifyingKey, key)
}
}
// Verify the user and device are the last modifier.
user := md.GetLastModifyingUser()
if user != uid {
return fmt.Errorf("Last modifier %s != %s", user, uid)
}
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"IsLastModifiedBy",
"(",
"uid",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"VerifyingKey",
")",
"error",
"{",
"// Verify the user and device are the writer.",
"writer",
":=",
"md",
".",
"LastModifyingWriter",
"(",
")",
"\n",
"if",
"!",
"md",
".",
"IsWriterMetadataCopiedSet",
"(",
")",
"{",
"if",
"writer",
"!=",
"uid",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"writer",
",",
"uid",
")",
"\n",
"}",
"\n",
"if",
"md",
".",
"WriterMetadataSigInfo",
".",
"VerifyingKey",
"!=",
"key",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"md",
".",
"WriterMetadataSigInfo",
".",
"VerifyingKey",
",",
"key",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Verify the user and device are the last modifier.",
"user",
":=",
"md",
".",
"GetLastModifyingUser",
"(",
")",
"\n",
"if",
"user",
"!=",
"uid",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"user",
",",
"uid",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // IsLastModifiedBy implements the RootMetadata interface for
// RootMetadataV2. | [
"IsLastModifiedBy",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L861-L883 |
160,957 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | GetSerializedWriterMetadata | func (md *RootMetadataV2) GetSerializedWriterMetadata(
codec kbfscodec.Codec) ([]byte, error) {
return codec.Encode(md.WriterMetadataV2)
} | go | func (md *RootMetadataV2) GetSerializedWriterMetadata(
codec kbfscodec.Codec) ([]byte, error) {
return codec.Encode(md.WriterMetadataV2)
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"GetSerializedWriterMetadata",
"(",
"codec",
"kbfscodec",
".",
"Codec",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"return",
"codec",
".",
"Encode",
"(",
"md",
".",
"WriterMetadataV2",
")",
"\n",
"}"
] | // GetSerializedWriterMetadata implements the RootMetadata interface for RootMetadataV2. | [
"GetSerializedWriterMetadata",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1026-L1029 |
160,958 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | SetLastModifyingWriter | func (md *RootMetadataV2) SetLastModifyingWriter(user keybase1.UID) {
md.WriterMetadataV2.LastModifyingWriter = user
} | go | func (md *RootMetadataV2) SetLastModifyingWriter(user keybase1.UID) {
md.WriterMetadataV2.LastModifyingWriter = user
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"SetLastModifyingWriter",
"(",
"user",
"keybase1",
".",
"UID",
")",
"{",
"md",
".",
"WriterMetadataV2",
".",
"LastModifyingWriter",
"=",
"user",
"\n",
"}"
] | // SetLastModifyingWriter implements the MutableRootMetadata interface for RootMetadataV2. | [
"SetLastModifyingWriter",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1049-L1051 |
160,959 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | SetUnresolvedWriters | func (md *RootMetadataV2) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.Extra.UnresolvedWriters = writers
} | go | func (md *RootMetadataV2) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.Extra.UnresolvedWriters = writers
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"SetUnresolvedWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
")",
"{",
"md",
".",
"Extra",
".",
"UnresolvedWriters",
"=",
"writers",
"\n",
"}"
] | // SetUnresolvedWriters implements the MutableRootMetadata interface for RootMetadataV2. | [
"SetUnresolvedWriters",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1084-L1086 |
160,960 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | ClearForV4Migration | func (md *RootMetadataV2) ClearForV4Migration() {
md.WKeys = nil
md.RKeys = nil
md.Extra.UnresolvedWriters = nil
md.UnresolvedReaders = nil
} | go | func (md *RootMetadataV2) ClearForV4Migration() {
md.WKeys = nil
md.RKeys = nil
md.Extra.UnresolvedWriters = nil
md.UnresolvedReaders = nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"ClearForV4Migration",
"(",
")",
"{",
"md",
".",
"WKeys",
"=",
"nil",
"\n",
"md",
".",
"RKeys",
"=",
"nil",
"\n",
"md",
".",
"Extra",
".",
"UnresolvedWriters",
"=",
"nil",
"\n",
"md",
".",
"UnresolvedReaders",
"=",
"nil",
"\n",
"}"
] | // ClearForV4Migration implements the MutableRootMetadata interface
// for RootMetadataV2. | [
"ClearForV4Migration",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1105-L1110 |
160,961 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | Version | func (md *RootMetadataV2) Version() MetadataVer {
// Only folders with unresolved assertions or conflict info get the
// new version.
if len(md.Extra.UnresolvedWriters) > 0 || len(md.UnresolvedReaders) > 0 ||
md.ConflictInfo != nil ||
md.FinalizedInfo != nil {
return InitialExtraMetadataVer
}
// Let other types of MD objects use the older version since they
// are still compatible with older clients.
return PreExtraMetadataVer
} | go | func (md *RootMetadataV2) Version() MetadataVer {
// Only folders with unresolved assertions or conflict info get the
// new version.
if len(md.Extra.UnresolvedWriters) > 0 || len(md.UnresolvedReaders) > 0 ||
md.ConflictInfo != nil ||
md.FinalizedInfo != nil {
return InitialExtraMetadataVer
}
// Let other types of MD objects use the older version since they
// are still compatible with older clients.
return PreExtraMetadataVer
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"Version",
"(",
")",
"MetadataVer",
"{",
"// Only folders with unresolved assertions or conflict info get the",
"// new version.",
"if",
"len",
"(",
"md",
".",
"Extra",
".",
"UnresolvedWriters",
")",
">",
"0",
"||",
"len",
"(",
"md",
".",
"UnresolvedReaders",
")",
">",
"0",
"||",
"md",
".",
"ConflictInfo",
"!=",
"nil",
"||",
"md",
".",
"FinalizedInfo",
"!=",
"nil",
"{",
"return",
"InitialExtraMetadataVer",
"\n",
"}",
"\n",
"// Let other types of MD objects use the older version since they",
"// are still compatible with older clients.",
"return",
"PreExtraMetadataVer",
"\n",
"}"
] | // Version implements the MutableRootMetadata interface for RootMetadataV2. | [
"Version",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1123-L1134 |
160,962 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | GetCurrentTLFPublicKey | func (md *RootMetadataV2) GetCurrentTLFPublicKey(
_ ExtraMetadata) (kbfscrypto.TLFPublicKey, error) {
if len(md.WKeys) == 0 {
return kbfscrypto.TLFPublicKey{}, errors.New(
"No key generations in GetCurrentTLFPublicKey")
}
return md.WKeys[len(md.WKeys)-1].TLFPublicKey, nil
} | go | func (md *RootMetadataV2) GetCurrentTLFPublicKey(
_ ExtraMetadata) (kbfscrypto.TLFPublicKey, error) {
if len(md.WKeys) == 0 {
return kbfscrypto.TLFPublicKey{}, errors.New(
"No key generations in GetCurrentTLFPublicKey")
}
return md.WKeys[len(md.WKeys)-1].TLFPublicKey, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"GetCurrentTLFPublicKey",
"(",
"_",
"ExtraMetadata",
")",
"(",
"kbfscrypto",
".",
"TLFPublicKey",
",",
"error",
")",
"{",
"if",
"len",
"(",
"md",
".",
"WKeys",
")",
"==",
"0",
"{",
"return",
"kbfscrypto",
".",
"TLFPublicKey",
"{",
"}",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"md",
".",
"WKeys",
"[",
"len",
"(",
"md",
".",
"WKeys",
")",
"-",
"1",
"]",
".",
"TLFPublicKey",
",",
"nil",
"\n",
"}"
] | // GetCurrentTLFPublicKey implements the RootMetadata interface
// for RootMetadataV2. | [
"GetCurrentTLFPublicKey",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1138-L1145 |
160,963 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | GetUnresolvedParticipants | func (md *RootMetadataV2) GetUnresolvedParticipants() []keybase1.SocialAssertion {
writers := md.WriterMetadataV2.Extra.UnresolvedWriters
readers := md.UnresolvedReaders
users := make([]keybase1.SocialAssertion, 0, len(writers)+len(readers))
users = append(users, writers...)
users = append(users, readers...)
return users
} | go | func (md *RootMetadataV2) GetUnresolvedParticipants() []keybase1.SocialAssertion {
writers := md.WriterMetadataV2.Extra.UnresolvedWriters
readers := md.UnresolvedReaders
users := make([]keybase1.SocialAssertion, 0, len(writers)+len(readers))
users = append(users, writers...)
users = append(users, readers...)
return users
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"GetUnresolvedParticipants",
"(",
")",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
"{",
"writers",
":=",
"md",
".",
"WriterMetadataV2",
".",
"Extra",
".",
"UnresolvedWriters",
"\n",
"readers",
":=",
"md",
".",
"UnresolvedReaders",
"\n",
"users",
":=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
",",
"0",
",",
"len",
"(",
"writers",
")",
"+",
"len",
"(",
"readers",
")",
")",
"\n",
"users",
"=",
"append",
"(",
"users",
",",
"writers",
"...",
")",
"\n",
"users",
"=",
"append",
"(",
"users",
",",
"readers",
"...",
")",
"\n",
"return",
"users",
"\n",
"}"
] | // GetUnresolvedParticipants implements the RootMetadata interface
// for RootMetadataV2. | [
"GetUnresolvedParticipants",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1149-L1156 |
160,964 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | AddKeyGeneration | func (md *RootMetadataV2) AddKeyGeneration(
codec kbfscodec.Codec, extra ExtraMetadata,
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
pubKey kbfscrypto.TLFPublicKey,
currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) (
nextExtra ExtraMetadata,
serverHalves UserDeviceKeyServerHalves, err error) {
if md.TlfID().Type() != tlf.Private {
return nil, nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "AddKeyGeneration", md.Version()}
}
if len(updatedWriterKeys) == 0 {
return nil, nil, errors.New(
"updatedWriterKeys unexpectedly non-empty")
}
if currCryptKey != (kbfscrypto.TLFCryptKey{}) {
return nil, nil, errors.New("currCryptKey unexpectedly non-zero")
}
if len(md.WKeys) != len(md.RKeys) {
return nil, nil, fmt.Errorf(
"Have %d writer key gens, but %d reader key gens",
len(md.WKeys), len(md.RKeys))
}
if len(md.WKeys) > 0 {
existingWriterKeys :=
md.WKeys[len(md.WKeys)-1].WKeys.ToPublicKeys()
if !existingWriterKeys.Equals(updatedWriterKeys) {
return nil, nil, fmt.Errorf(
"existingWriterKeys=%+v != updatedWriterKeys=%+v",
existingWriterKeys, updatedWriterKeys)
}
existingReaderKeys :=
md.RKeys[len(md.RKeys)-1].RKeys.ToPublicKeys()
if !existingReaderKeys.Equals(updatedReaderKeys) {
return nil, nil, fmt.Errorf(
"existingReaderKeys=%+v != updatedReaderKeys=%+v",
existingReaderKeys, updatedReaderKeys)
}
}
newWriterKeys := TLFWriterKeyBundleV2{
WKeys: make(UserDeviceKeyInfoMapV2),
TLFPublicKey: pubKey,
}
md.WKeys = append(md.WKeys, newWriterKeys)
newReaderKeys := TLFReaderKeyBundleV2{
RKeys: make(UserDeviceKeyInfoMapV2),
}
md.RKeys = append(md.RKeys, newReaderKeys)
serverHalves, err = md.updateKeyGeneration(
md.LatestKeyGeneration(), updatedWriterKeys,
updatedReaderKeys, ePubKey, ePrivKey, nextCryptKey)
if err != nil {
return nil, nil, err
}
return nil, serverHalves, nil
} | go | func (md *RootMetadataV2) AddKeyGeneration(
codec kbfscodec.Codec, extra ExtraMetadata,
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
pubKey kbfscrypto.TLFPublicKey,
currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) (
nextExtra ExtraMetadata,
serverHalves UserDeviceKeyServerHalves, err error) {
if md.TlfID().Type() != tlf.Private {
return nil, nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "AddKeyGeneration", md.Version()}
}
if len(updatedWriterKeys) == 0 {
return nil, nil, errors.New(
"updatedWriterKeys unexpectedly non-empty")
}
if currCryptKey != (kbfscrypto.TLFCryptKey{}) {
return nil, nil, errors.New("currCryptKey unexpectedly non-zero")
}
if len(md.WKeys) != len(md.RKeys) {
return nil, nil, fmt.Errorf(
"Have %d writer key gens, but %d reader key gens",
len(md.WKeys), len(md.RKeys))
}
if len(md.WKeys) > 0 {
existingWriterKeys :=
md.WKeys[len(md.WKeys)-1].WKeys.ToPublicKeys()
if !existingWriterKeys.Equals(updatedWriterKeys) {
return nil, nil, fmt.Errorf(
"existingWriterKeys=%+v != updatedWriterKeys=%+v",
existingWriterKeys, updatedWriterKeys)
}
existingReaderKeys :=
md.RKeys[len(md.RKeys)-1].RKeys.ToPublicKeys()
if !existingReaderKeys.Equals(updatedReaderKeys) {
return nil, nil, fmt.Errorf(
"existingReaderKeys=%+v != updatedReaderKeys=%+v",
existingReaderKeys, updatedReaderKeys)
}
}
newWriterKeys := TLFWriterKeyBundleV2{
WKeys: make(UserDeviceKeyInfoMapV2),
TLFPublicKey: pubKey,
}
md.WKeys = append(md.WKeys, newWriterKeys)
newReaderKeys := TLFReaderKeyBundleV2{
RKeys: make(UserDeviceKeyInfoMapV2),
}
md.RKeys = append(md.RKeys, newReaderKeys)
serverHalves, err = md.updateKeyGeneration(
md.LatestKeyGeneration(), updatedWriterKeys,
updatedReaderKeys, ePubKey, ePrivKey, nextCryptKey)
if err != nil {
return nil, nil, err
}
return nil, serverHalves, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"AddKeyGeneration",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"extra",
"ExtraMetadata",
",",
"updatedWriterKeys",
",",
"updatedReaderKeys",
"UserDevicePublicKeys",
",",
"ePubKey",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"ePrivKey",
"kbfscrypto",
".",
"TLFEphemeralPrivateKey",
",",
"pubKey",
"kbfscrypto",
".",
"TLFPublicKey",
",",
"currCryptKey",
",",
"nextCryptKey",
"kbfscrypto",
".",
"TLFCryptKey",
")",
"(",
"nextExtra",
"ExtraMetadata",
",",
"serverHalves",
"UserDeviceKeyServerHalves",
",",
"err",
"error",
")",
"{",
"if",
"md",
".",
"TlfID",
"(",
")",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"return",
"nil",
",",
"nil",
",",
"InvalidNonPrivateTLFOperation",
"{",
"md",
".",
"TlfID",
"(",
")",
",",
"\"",
"\"",
",",
"md",
".",
"Version",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"updatedWriterKeys",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"currCryptKey",
"!=",
"(",
"kbfscrypto",
".",
"TLFCryptKey",
"{",
"}",
")",
"{",
"return",
"nil",
",",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"md",
".",
"WKeys",
")",
"!=",
"len",
"(",
"md",
".",
"RKeys",
")",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"len",
"(",
"md",
".",
"WKeys",
")",
",",
"len",
"(",
"md",
".",
"RKeys",
")",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"md",
".",
"WKeys",
")",
">",
"0",
"{",
"existingWriterKeys",
":=",
"md",
".",
"WKeys",
"[",
"len",
"(",
"md",
".",
"WKeys",
")",
"-",
"1",
"]",
".",
"WKeys",
".",
"ToPublicKeys",
"(",
")",
"\n",
"if",
"!",
"existingWriterKeys",
".",
"Equals",
"(",
"updatedWriterKeys",
")",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"existingWriterKeys",
",",
"updatedWriterKeys",
")",
"\n",
"}",
"\n\n",
"existingReaderKeys",
":=",
"md",
".",
"RKeys",
"[",
"len",
"(",
"md",
".",
"RKeys",
")",
"-",
"1",
"]",
".",
"RKeys",
".",
"ToPublicKeys",
"(",
")",
"\n",
"if",
"!",
"existingReaderKeys",
".",
"Equals",
"(",
"updatedReaderKeys",
")",
"{",
"return",
"nil",
",",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"existingReaderKeys",
",",
"updatedReaderKeys",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"newWriterKeys",
":=",
"TLFWriterKeyBundleV2",
"{",
"WKeys",
":",
"make",
"(",
"UserDeviceKeyInfoMapV2",
")",
",",
"TLFPublicKey",
":",
"pubKey",
",",
"}",
"\n",
"md",
".",
"WKeys",
"=",
"append",
"(",
"md",
".",
"WKeys",
",",
"newWriterKeys",
")",
"\n\n",
"newReaderKeys",
":=",
"TLFReaderKeyBundleV2",
"{",
"RKeys",
":",
"make",
"(",
"UserDeviceKeyInfoMapV2",
")",
",",
"}",
"\n",
"md",
".",
"RKeys",
"=",
"append",
"(",
"md",
".",
"RKeys",
",",
"newReaderKeys",
")",
"\n\n",
"serverHalves",
",",
"err",
"=",
"md",
".",
"updateKeyGeneration",
"(",
"md",
".",
"LatestKeyGeneration",
"(",
")",
",",
"updatedWriterKeys",
",",
"updatedReaderKeys",
",",
"ePubKey",
",",
"ePrivKey",
",",
"nextCryptKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"serverHalves",
",",
"nil",
"\n",
"}"
] | // AddKeyGeneration implements the MutableRootMetadata interface
// for RootMetadataV2. | [
"AddKeyGeneration",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1242-L1308 |
160,965 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | UpdateKeyBundles | func (md *RootMetadataV2) UpdateKeyBundles(codec kbfscodec.Codec,
_ ExtraMetadata,
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
tlfCryptKeys []kbfscrypto.TLFCryptKey) (
[]UserDeviceKeyServerHalves, error) {
if md.TlfID().Type() != tlf.Private {
return nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "UpdateKeyBundles", md.Version()}
}
expectedTLFCryptKeyCount := int(
md.LatestKeyGeneration() - FirstValidKeyGen + 1)
if len(tlfCryptKeys) != expectedTLFCryptKeyCount {
return nil, fmt.Errorf(
"(MDv2) Expected %d TLF crypt keys, got %d",
expectedTLFCryptKeyCount, len(tlfCryptKeys))
}
serverHalves := make([]UserDeviceKeyServerHalves, len(tlfCryptKeys))
if len(updatedWriterKeys) == 0 {
// Reader rekey case.
for keyGen := FirstValidKeyGen; keyGen <= md.LatestKeyGeneration(); keyGen++ {
serverHalvesGen, err :=
md.updateKeyGenerationForReaderRekey(codec,
keyGen, updatedReaderKeys,
ePubKey, ePrivKey,
tlfCryptKeys[keyGen-FirstValidKeyGen])
if err != nil {
return nil, err
}
serverHalves[keyGen-FirstValidKeyGen] = serverHalvesGen
}
return serverHalves, nil
}
// Usual rekey case.
for keyGen := FirstValidKeyGen; keyGen <= md.LatestKeyGeneration(); keyGen++ {
serverHalvesGen, err := md.updateKeyGeneration(
keyGen, updatedWriterKeys, updatedReaderKeys,
ePubKey, ePrivKey,
tlfCryptKeys[keyGen-FirstValidKeyGen])
if err != nil {
return nil, err
}
serverHalves[keyGen-FirstValidKeyGen] = serverHalvesGen
}
return serverHalves, nil
} | go | func (md *RootMetadataV2) UpdateKeyBundles(codec kbfscodec.Codec,
_ ExtraMetadata,
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
tlfCryptKeys []kbfscrypto.TLFCryptKey) (
[]UserDeviceKeyServerHalves, error) {
if md.TlfID().Type() != tlf.Private {
return nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "UpdateKeyBundles", md.Version()}
}
expectedTLFCryptKeyCount := int(
md.LatestKeyGeneration() - FirstValidKeyGen + 1)
if len(tlfCryptKeys) != expectedTLFCryptKeyCount {
return nil, fmt.Errorf(
"(MDv2) Expected %d TLF crypt keys, got %d",
expectedTLFCryptKeyCount, len(tlfCryptKeys))
}
serverHalves := make([]UserDeviceKeyServerHalves, len(tlfCryptKeys))
if len(updatedWriterKeys) == 0 {
// Reader rekey case.
for keyGen := FirstValidKeyGen; keyGen <= md.LatestKeyGeneration(); keyGen++ {
serverHalvesGen, err :=
md.updateKeyGenerationForReaderRekey(codec,
keyGen, updatedReaderKeys,
ePubKey, ePrivKey,
tlfCryptKeys[keyGen-FirstValidKeyGen])
if err != nil {
return nil, err
}
serverHalves[keyGen-FirstValidKeyGen] = serverHalvesGen
}
return serverHalves, nil
}
// Usual rekey case.
for keyGen := FirstValidKeyGen; keyGen <= md.LatestKeyGeneration(); keyGen++ {
serverHalvesGen, err := md.updateKeyGeneration(
keyGen, updatedWriterKeys, updatedReaderKeys,
ePubKey, ePrivKey,
tlfCryptKeys[keyGen-FirstValidKeyGen])
if err != nil {
return nil, err
}
serverHalves[keyGen-FirstValidKeyGen] = serverHalvesGen
}
return serverHalves, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"UpdateKeyBundles",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"_",
"ExtraMetadata",
",",
"updatedWriterKeys",
",",
"updatedReaderKeys",
"UserDevicePublicKeys",
",",
"ePubKey",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"ePrivKey",
"kbfscrypto",
".",
"TLFEphemeralPrivateKey",
",",
"tlfCryptKeys",
"[",
"]",
"kbfscrypto",
".",
"TLFCryptKey",
")",
"(",
"[",
"]",
"UserDeviceKeyServerHalves",
",",
"error",
")",
"{",
"if",
"md",
".",
"TlfID",
"(",
")",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"Private",
"{",
"return",
"nil",
",",
"InvalidNonPrivateTLFOperation",
"{",
"md",
".",
"TlfID",
"(",
")",
",",
"\"",
"\"",
",",
"md",
".",
"Version",
"(",
")",
"}",
"\n",
"}",
"\n\n",
"expectedTLFCryptKeyCount",
":=",
"int",
"(",
"md",
".",
"LatestKeyGeneration",
"(",
")",
"-",
"FirstValidKeyGen",
"+",
"1",
")",
"\n",
"if",
"len",
"(",
"tlfCryptKeys",
")",
"!=",
"expectedTLFCryptKeyCount",
"{",
"return",
"nil",
",",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"expectedTLFCryptKeyCount",
",",
"len",
"(",
"tlfCryptKeys",
")",
")",
"\n",
"}",
"\n\n",
"serverHalves",
":=",
"make",
"(",
"[",
"]",
"UserDeviceKeyServerHalves",
",",
"len",
"(",
"tlfCryptKeys",
")",
")",
"\n",
"if",
"len",
"(",
"updatedWriterKeys",
")",
"==",
"0",
"{",
"// Reader rekey case.",
"for",
"keyGen",
":=",
"FirstValidKeyGen",
";",
"keyGen",
"<=",
"md",
".",
"LatestKeyGeneration",
"(",
")",
";",
"keyGen",
"++",
"{",
"serverHalvesGen",
",",
"err",
":=",
"md",
".",
"updateKeyGenerationForReaderRekey",
"(",
"codec",
",",
"keyGen",
",",
"updatedReaderKeys",
",",
"ePubKey",
",",
"ePrivKey",
",",
"tlfCryptKeys",
"[",
"keyGen",
"-",
"FirstValidKeyGen",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"serverHalves",
"[",
"keyGen",
"-",
"FirstValidKeyGen",
"]",
"=",
"serverHalvesGen",
"\n",
"}",
"\n\n",
"return",
"serverHalves",
",",
"nil",
"\n",
"}",
"\n\n",
"// Usual rekey case.",
"for",
"keyGen",
":=",
"FirstValidKeyGen",
";",
"keyGen",
"<=",
"md",
".",
"LatestKeyGeneration",
"(",
")",
";",
"keyGen",
"++",
"{",
"serverHalvesGen",
",",
"err",
":=",
"md",
".",
"updateKeyGeneration",
"(",
"keyGen",
",",
"updatedWriterKeys",
",",
"updatedReaderKeys",
",",
"ePubKey",
",",
"ePrivKey",
",",
"tlfCryptKeys",
"[",
"keyGen",
"-",
"FirstValidKeyGen",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"serverHalves",
"[",
"keyGen",
"-",
"FirstValidKeyGen",
"]",
"=",
"serverHalvesGen",
"\n",
"}",
"\n",
"return",
"serverHalves",
",",
"nil",
"\n\n",
"}"
] | // UpdateKeyBundles implements the MutableRootMetadata interface
// for RootMetadataV2. | [
"UpdateKeyBundles",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1318-L1373 |
160,966 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | FinalizeRekey | func (md *RootMetadataV2) FinalizeRekey(
_ kbfscodec.Codec, _ ExtraMetadata) error {
// Nothing to do.
return nil
} | go | func (md *RootMetadataV2) FinalizeRekey(
_ kbfscodec.Codec, _ ExtraMetadata) error {
// Nothing to do.
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"FinalizeRekey",
"(",
"_",
"kbfscodec",
".",
"Codec",
",",
"_",
"ExtraMetadata",
")",
"error",
"{",
"// Nothing to do.",
"return",
"nil",
"\n",
"}"
] | // FinalizeRekey implements the MutableRootMetadata interface for RootMetadataV2. | [
"FinalizeRekey",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1388-L1392 |
160,967 | keybase/client | go/kbfs/kbfsmd/root_metadata_v2.go | GetHistoricTLFCryptKey | func (md *RootMetadataV2) GetHistoricTLFCryptKey(
_ kbfscodec.Codec, _ KeyGen, _ kbfscrypto.TLFCryptKey, _ ExtraMetadata) (
kbfscrypto.TLFCryptKey, error) {
return kbfscrypto.TLFCryptKey{}, errors.New(
"TLF crypt key not symmetrically encrypted")
} | go | func (md *RootMetadataV2) GetHistoricTLFCryptKey(
_ kbfscodec.Codec, _ KeyGen, _ kbfscrypto.TLFCryptKey, _ ExtraMetadata) (
kbfscrypto.TLFCryptKey, error) {
return kbfscrypto.TLFCryptKey{}, errors.New(
"TLF crypt key not symmetrically encrypted")
} | [
"func",
"(",
"md",
"*",
"RootMetadataV2",
")",
"GetHistoricTLFCryptKey",
"(",
"_",
"kbfscodec",
".",
"Codec",
",",
"_",
"KeyGen",
",",
"_",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"_",
"ExtraMetadata",
")",
"(",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"error",
")",
"{",
"return",
"kbfscrypto",
".",
"TLFCryptKey",
"{",
"}",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // GetHistoricTLFCryptKey implements the RootMetadata interface for RootMetadataV2. | [
"GetHistoricTLFCryptKey",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV2",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v2.go#L1401-L1406 |
160,968 | keybase/client | go/libkb/sig_chain.go | GetExpectedNextHighSkip | func (sc SigChain) GetExpectedNextHighSkip(mctx MetaContext, uid keybase1.UID) (HighSkip, error) {
if sc.localChainNextHighSkipOverride != nil {
return *sc.localChainNextHighSkipOverride, nil
}
if len(sc.chainLinks) == 0 {
return NewInitialHighSkip(), nil
}
return sc.GetLastLink().ExpectedNextHighSkip(mctx, uid)
} | go | func (sc SigChain) GetExpectedNextHighSkip(mctx MetaContext, uid keybase1.UID) (HighSkip, error) {
if sc.localChainNextHighSkipOverride != nil {
return *sc.localChainNextHighSkipOverride, nil
}
if len(sc.chainLinks) == 0 {
return NewInitialHighSkip(), nil
}
return sc.GetLastLink().ExpectedNextHighSkip(mctx, uid)
} | [
"func",
"(",
"sc",
"SigChain",
")",
"GetExpectedNextHighSkip",
"(",
"mctx",
"MetaContext",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"HighSkip",
",",
"error",
")",
"{",
"if",
"sc",
".",
"localChainNextHighSkipOverride",
"!=",
"nil",
"{",
"return",
"*",
"sc",
".",
"localChainNextHighSkipOverride",
",",
"nil",
"\n",
"}",
"\n",
"if",
"len",
"(",
"sc",
".",
"chainLinks",
")",
"==",
"0",
"{",
"return",
"NewInitialHighSkip",
"(",
")",
",",
"nil",
"\n",
"}",
"\n",
"return",
"sc",
".",
"GetLastLink",
"(",
")",
".",
"ExpectedNextHighSkip",
"(",
"mctx",
",",
"uid",
")",
"\n",
"}"
] | // GetExpectedNextHighSkip returns the HighSkip expected for a new link to be
// added to the chain. It can only be called after VerifyChain is completed. | [
"GetExpectedNextHighSkip",
"returns",
"the",
"HighSkip",
"expected",
"for",
"a",
"new",
"link",
"to",
"be",
"added",
"to",
"the",
"chain",
".",
"It",
"can",
"only",
"be",
"called",
"after",
"VerifyChain",
"is",
"completed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sig_chain.go#L468-L476 |
160,969 | keybase/client | go/libkb/sig_chain.go | GetCurrentSubchain | func (sc *SigChain) GetCurrentSubchain(m MetaContext, eldest keybase1.KID) (ChainLinks, error) {
return cropToRightmostSubchain(m, sc.chainLinks, eldest, sc.uid)
} | go | func (sc *SigChain) GetCurrentSubchain(m MetaContext, eldest keybase1.KID) (ChainLinks, error) {
return cropToRightmostSubchain(m, sc.chainLinks, eldest, sc.uid)
} | [
"func",
"(",
"sc",
"*",
"SigChain",
")",
"GetCurrentSubchain",
"(",
"m",
"MetaContext",
",",
"eldest",
"keybase1",
".",
"KID",
")",
"(",
"ChainLinks",
",",
"error",
")",
"{",
"return",
"cropToRightmostSubchain",
"(",
"m",
",",
"sc",
".",
"chainLinks",
",",
"eldest",
",",
"sc",
".",
"uid",
")",
"\n",
"}"
] | // GetCurrentSubchain takes the given sigchain and walks backward until it
// finds the start of the current subchain, returning all the links in the
// subchain. See isSubchainStart for the details of the logic here. | [
"GetCurrentSubchain",
"takes",
"the",
"given",
"sigchain",
"and",
"walks",
"backward",
"until",
"it",
"finds",
"the",
"start",
"of",
"the",
"current",
"subchain",
"returning",
"all",
"the",
"links",
"in",
"the",
"subchain",
".",
"See",
"isSubchainStart",
"for",
"the",
"details",
"of",
"the",
"logic",
"here",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sig_chain.go#L568-L570 |
160,970 | keybase/client | go/libkb/sig_chain.go | cropToRightmostSubchain | func cropToRightmostSubchain(m MetaContext, links []*ChainLink, eldest keybase1.KID, uid keybase1.UID) (ChainLinks, error) {
// Check for a totally empty chain (that is, a totally new account).
if len(links) == 0 {
return nil, nil
}
// Confirm that the last link is not stubbed. This would prevent us from
// reading the eldest_kid, so the server should never do it.
lastLink := links[len(links)-1]
if lastLink.IsStubbed() {
return nil, errors.New("the last chain link is unexpectedly stubbed in GetCurrentSunchain")
}
// Check whether the eldest KID doesn't match the latest link. That means
// the account has just been reset, and so as with a new account, there is
// no current subchain.
if !lastLink.ToEldestKID().Equal(eldest) {
return nil, nil
}
// The usual case: The eldest kid we're looking for matches the latest
// link, and we need to loop backwards through every pair of links we have.
// If we find a subchain start, return that subslice of links.
for i := len(links) - 1; i > 0; i-- {
curr := links[i]
prev := links[i-1]
isStart, err := isSubchainStart(m, curr, prev, uid)
if err != nil {
return nil, err
}
if isStart {
return links[i:], nil
}
}
// If we didn't find a start anywhere in the middle of the chain, then this
// user has no resets, and we'll return the whole chain. Sanity check that
// we actually loaded everything back to seqno 1. (Anything else would be
// some kind of bug in chain loading.)
if links[0].GetSeqno() != 1 {
return nil, errors.New("chain ended unexpectedly before seqno 1 in GetCurrentSubchain")
}
// In this last case, we're returning the whole chain.
return links, nil
} | go | func cropToRightmostSubchain(m MetaContext, links []*ChainLink, eldest keybase1.KID, uid keybase1.UID) (ChainLinks, error) {
// Check for a totally empty chain (that is, a totally new account).
if len(links) == 0 {
return nil, nil
}
// Confirm that the last link is not stubbed. This would prevent us from
// reading the eldest_kid, so the server should never do it.
lastLink := links[len(links)-1]
if lastLink.IsStubbed() {
return nil, errors.New("the last chain link is unexpectedly stubbed in GetCurrentSunchain")
}
// Check whether the eldest KID doesn't match the latest link. That means
// the account has just been reset, and so as with a new account, there is
// no current subchain.
if !lastLink.ToEldestKID().Equal(eldest) {
return nil, nil
}
// The usual case: The eldest kid we're looking for matches the latest
// link, and we need to loop backwards through every pair of links we have.
// If we find a subchain start, return that subslice of links.
for i := len(links) - 1; i > 0; i-- {
curr := links[i]
prev := links[i-1]
isStart, err := isSubchainStart(m, curr, prev, uid)
if err != nil {
return nil, err
}
if isStart {
return links[i:], nil
}
}
// If we didn't find a start anywhere in the middle of the chain, then this
// user has no resets, and we'll return the whole chain. Sanity check that
// we actually loaded everything back to seqno 1. (Anything else would be
// some kind of bug in chain loading.)
if links[0].GetSeqno() != 1 {
return nil, errors.New("chain ended unexpectedly before seqno 1 in GetCurrentSubchain")
}
// In this last case, we're returning the whole chain.
return links, nil
} | [
"func",
"cropToRightmostSubchain",
"(",
"m",
"MetaContext",
",",
"links",
"[",
"]",
"*",
"ChainLink",
",",
"eldest",
"keybase1",
".",
"KID",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"ChainLinks",
",",
"error",
")",
"{",
"// Check for a totally empty chain (that is, a totally new account).",
"if",
"len",
"(",
"links",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"// Confirm that the last link is not stubbed. This would prevent us from",
"// reading the eldest_kid, so the server should never do it.",
"lastLink",
":=",
"links",
"[",
"len",
"(",
"links",
")",
"-",
"1",
"]",
"\n",
"if",
"lastLink",
".",
"IsStubbed",
"(",
")",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"// Check whether the eldest KID doesn't match the latest link. That means",
"// the account has just been reset, and so as with a new account, there is",
"// no current subchain.",
"if",
"!",
"lastLink",
".",
"ToEldestKID",
"(",
")",
".",
"Equal",
"(",
"eldest",
")",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"// The usual case: The eldest kid we're looking for matches the latest",
"// link, and we need to loop backwards through every pair of links we have.",
"// If we find a subchain start, return that subslice of links.",
"for",
"i",
":=",
"len",
"(",
"links",
")",
"-",
"1",
";",
"i",
">",
"0",
";",
"i",
"--",
"{",
"curr",
":=",
"links",
"[",
"i",
"]",
"\n",
"prev",
":=",
"links",
"[",
"i",
"-",
"1",
"]",
"\n",
"isStart",
",",
"err",
":=",
"isSubchainStart",
"(",
"m",
",",
"curr",
",",
"prev",
",",
"uid",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"isStart",
"{",
"return",
"links",
"[",
"i",
":",
"]",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"// If we didn't find a start anywhere in the middle of the chain, then this",
"// user has no resets, and we'll return the whole chain. Sanity check that",
"// we actually loaded everything back to seqno 1. (Anything else would be",
"// some kind of bug in chain loading.)",
"if",
"links",
"[",
"0",
"]",
".",
"GetSeqno",
"(",
")",
"!=",
"1",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// In this last case, we're returning the whole chain.",
"return",
"links",
",",
"nil",
"\n",
"}"
] | // cropToRightmostSubchain takes the given set of chain links, and then limits the tail
// of the chain to just those that correspond to the eldest key given by `eldest`. | [
"cropToRightmostSubchain",
"takes",
"the",
"given",
"set",
"of",
"chain",
"links",
"and",
"then",
"limits",
"the",
"tail",
"of",
"the",
"chain",
"to",
"just",
"those",
"that",
"correspond",
"to",
"the",
"eldest",
"key",
"given",
"by",
"eldest",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sig_chain.go#L574-L615 |
160,971 | keybase/client | go/libkb/sig_chain.go | Dump | func (sc *SigChain) Dump(w io.Writer) {
fmt.Fprintf(w, "sigchain dump\n")
for i, l := range sc.chainLinks {
fmt.Fprintf(w, "link %d: %+v\n", i, l)
}
fmt.Fprintf(w, "last known seqno: %d\n", sc.GetLastKnownSeqno())
fmt.Fprintf(w, "last known id: %s\n", sc.GetLastKnownID())
} | go | func (sc *SigChain) Dump(w io.Writer) {
fmt.Fprintf(w, "sigchain dump\n")
for i, l := range sc.chainLinks {
fmt.Fprintf(w, "link %d: %+v\n", i, l)
}
fmt.Fprintf(w, "last known seqno: %d\n", sc.GetLastKnownSeqno())
fmt.Fprintf(w, "last known id: %s\n", sc.GetLastKnownID())
} | [
"func",
"(",
"sc",
"*",
"SigChain",
")",
"Dump",
"(",
"w",
"io",
".",
"Writer",
")",
"{",
"fmt",
".",
"Fprintf",
"(",
"w",
",",
"\"",
"\\n",
"\"",
")",
"\n",
"for",
"i",
",",
"l",
":=",
"range",
"sc",
".",
"chainLinks",
"{",
"fmt",
".",
"Fprintf",
"(",
"w",
",",
"\"",
"\\n",
"\"",
",",
"i",
",",
"l",
")",
"\n",
"}",
"\n",
"fmt",
".",
"Fprintf",
"(",
"w",
",",
"\"",
"\\n",
"\"",
",",
"sc",
".",
"GetLastKnownSeqno",
"(",
")",
")",
"\n",
"fmt",
".",
"Fprintf",
"(",
"w",
",",
"\"",
"\\n",
"\"",
",",
"sc",
".",
"GetLastKnownID",
"(",
")",
")",
"\n",
"}"
] | // Dump prints the sigchain to the writer arg. | [
"Dump",
"prints",
"the",
"sigchain",
"to",
"the",
"writer",
"arg",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sig_chain.go#L670-L677 |
160,972 | keybase/client | go/libkb/sig_chain.go | GetLinkFromSigIDQuery | func (sc *SigChain) GetLinkFromSigIDQuery(query string) *ChainLink {
for _, link := range sc.chainLinks {
if link.GetSigID().Match(query, false) {
return link
}
}
return nil
} | go | func (sc *SigChain) GetLinkFromSigIDQuery(query string) *ChainLink {
for _, link := range sc.chainLinks {
if link.GetSigID().Match(query, false) {
return link
}
}
return nil
} | [
"func",
"(",
"sc",
"*",
"SigChain",
")",
"GetLinkFromSigIDQuery",
"(",
"query",
"string",
")",
"*",
"ChainLink",
"{",
"for",
"_",
",",
"link",
":=",
"range",
"sc",
".",
"chainLinks",
"{",
"if",
"link",
".",
"GetSigID",
"(",
")",
".",
"Match",
"(",
"query",
",",
"false",
")",
"{",
"return",
"link",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // GetLinkFromSigIDQuery will return true if it finds a ChainLink
// with a SigID that starts with query. | [
"GetLinkFromSigIDQuery",
"will",
"return",
"true",
"if",
"it",
"finds",
"a",
"ChainLink",
"with",
"a",
"SigID",
"that",
"starts",
"with",
"query",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sig_chain.go#L1003-L1010 |
160,973 | keybase/client | go/libkb/sig_chain.go | Store | func (l *SigChainLoader) Store() (err error) {
err = l.StoreTail()
if err == nil {
err = l.chain.Store(l.M())
}
return
} | go | func (l *SigChainLoader) Store() (err error) {
err = l.StoreTail()
if err == nil {
err = l.chain.Store(l.M())
}
return
} | [
"func",
"(",
"l",
"*",
"SigChainLoader",
")",
"Store",
"(",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"l",
".",
"StoreTail",
"(",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"err",
"=",
"l",
".",
"chain",
".",
"Store",
"(",
"l",
".",
"M",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"\n",
"}"
] | // Store a SigChain to local storage as a result of having loaded it.
// We eagerly write loaded chain links to storage if they verify properly. | [
"Store",
"a",
"SigChain",
"to",
"local",
"storage",
"as",
"a",
"result",
"of",
"having",
"loaded",
"it",
".",
"We",
"eagerly",
"write",
"loaded",
"chain",
"links",
"to",
"storage",
"if",
"they",
"verify",
"properly",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sig_chain.go#L1383-L1389 |
160,974 | keybase/client | go/kbfs/tlf/handle.go | MakeHandle | func MakeHandle(
writers, readers []keybase1.UserOrTeamID,
unresolvedWriters, unresolvedReaders []keybase1.SocialAssertion,
extensions []HandleExtension) (Handle, error) {
if len(writers) == 0 {
return Handle{}, errNoWriters
}
if writers[0].IsTeamOrSubteam() {
// Right now we only support single-team private TLFs.
if len(writers) > 1 || len(unresolvedWriters) != 0 {
return Handle{}, errInvalidWriter
} else if len(readers) != 0 || len(unresolvedReaders) != 0 {
return Handle{}, errInvalidReader
}
}
for i, w := range writers {
if w == keybase1.PUBLIC_UID {
return Handle{}, errInvalidWriter
} else if i > 0 && w.IsTeamOrSubteam() {
return Handle{}, errInvalidWriter
}
}
// If we have more than one reader, none of them should be the
// public UID. And no readers should be a team.
checkPublic := (len(readers) + len(unresolvedReaders)) > 1
for _, r := range readers {
if checkPublic && r == keybase1.PUBLIC_UID {
return Handle{}, errInvalidReader
} else if r.IsTeamOrSubteam() {
return Handle{}, errInvalidReader
}
}
// TODO: Check for overlap between readers and writers, and
// for duplicates.
writersCopy := make([]keybase1.UserOrTeamID, len(writers))
copy(writersCopy, writers)
sort.Sort(UIDList(writersCopy))
var readersCopy []keybase1.UserOrTeamID
if len(readers) > 0 {
readersCopy = make([]keybase1.UserOrTeamID, len(readers))
copy(readersCopy, readers)
sort.Sort(UIDList(readersCopy))
}
var unresolvedWritersCopy []keybase1.SocialAssertion
if len(unresolvedWriters) > 0 {
unresolvedWritersCopy = make([]keybase1.SocialAssertion, len(unresolvedWriters))
copy(unresolvedWritersCopy, unresolvedWriters)
sort.Sort(SocialAssertionList(unresolvedWritersCopy))
}
var unresolvedReadersCopy []keybase1.SocialAssertion
if len(unresolvedReaders) > 0 {
unresolvedReadersCopy = make([]keybase1.SocialAssertion, len(unresolvedReaders))
copy(unresolvedReadersCopy, unresolvedReaders)
sort.Sort(SocialAssertionList(unresolvedReadersCopy))
}
conflictInfo, finalizedInfo := HandleExtensionList(extensions).Splat()
return Handle{
Writers: writersCopy,
Readers: readersCopy,
UnresolvedWriters: unresolvedWritersCopy,
UnresolvedReaders: unresolvedReadersCopy,
ConflictInfo: conflictInfo,
FinalizedInfo: finalizedInfo,
sorted: true,
}, nil
} | go | func MakeHandle(
writers, readers []keybase1.UserOrTeamID,
unresolvedWriters, unresolvedReaders []keybase1.SocialAssertion,
extensions []HandleExtension) (Handle, error) {
if len(writers) == 0 {
return Handle{}, errNoWriters
}
if writers[0].IsTeamOrSubteam() {
// Right now we only support single-team private TLFs.
if len(writers) > 1 || len(unresolvedWriters) != 0 {
return Handle{}, errInvalidWriter
} else if len(readers) != 0 || len(unresolvedReaders) != 0 {
return Handle{}, errInvalidReader
}
}
for i, w := range writers {
if w == keybase1.PUBLIC_UID {
return Handle{}, errInvalidWriter
} else if i > 0 && w.IsTeamOrSubteam() {
return Handle{}, errInvalidWriter
}
}
// If we have more than one reader, none of them should be the
// public UID. And no readers should be a team.
checkPublic := (len(readers) + len(unresolvedReaders)) > 1
for _, r := range readers {
if checkPublic && r == keybase1.PUBLIC_UID {
return Handle{}, errInvalidReader
} else if r.IsTeamOrSubteam() {
return Handle{}, errInvalidReader
}
}
// TODO: Check for overlap between readers and writers, and
// for duplicates.
writersCopy := make([]keybase1.UserOrTeamID, len(writers))
copy(writersCopy, writers)
sort.Sort(UIDList(writersCopy))
var readersCopy []keybase1.UserOrTeamID
if len(readers) > 0 {
readersCopy = make([]keybase1.UserOrTeamID, len(readers))
copy(readersCopy, readers)
sort.Sort(UIDList(readersCopy))
}
var unresolvedWritersCopy []keybase1.SocialAssertion
if len(unresolvedWriters) > 0 {
unresolvedWritersCopy = make([]keybase1.SocialAssertion, len(unresolvedWriters))
copy(unresolvedWritersCopy, unresolvedWriters)
sort.Sort(SocialAssertionList(unresolvedWritersCopy))
}
var unresolvedReadersCopy []keybase1.SocialAssertion
if len(unresolvedReaders) > 0 {
unresolvedReadersCopy = make([]keybase1.SocialAssertion, len(unresolvedReaders))
copy(unresolvedReadersCopy, unresolvedReaders)
sort.Sort(SocialAssertionList(unresolvedReadersCopy))
}
conflictInfo, finalizedInfo := HandleExtensionList(extensions).Splat()
return Handle{
Writers: writersCopy,
Readers: readersCopy,
UnresolvedWriters: unresolvedWritersCopy,
UnresolvedReaders: unresolvedReadersCopy,
ConflictInfo: conflictInfo,
FinalizedInfo: finalizedInfo,
sorted: true,
}, nil
} | [
"func",
"MakeHandle",
"(",
"writers",
",",
"readers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"unresolvedWriters",
",",
"unresolvedReaders",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
",",
"extensions",
"[",
"]",
"HandleExtension",
")",
"(",
"Handle",
",",
"error",
")",
"{",
"if",
"len",
"(",
"writers",
")",
"==",
"0",
"{",
"return",
"Handle",
"{",
"}",
",",
"errNoWriters",
"\n",
"}",
"\n\n",
"if",
"writers",
"[",
"0",
"]",
".",
"IsTeamOrSubteam",
"(",
")",
"{",
"// Right now we only support single-team private TLFs.",
"if",
"len",
"(",
"writers",
")",
">",
"1",
"||",
"len",
"(",
"unresolvedWriters",
")",
"!=",
"0",
"{",
"return",
"Handle",
"{",
"}",
",",
"errInvalidWriter",
"\n",
"}",
"else",
"if",
"len",
"(",
"readers",
")",
"!=",
"0",
"||",
"len",
"(",
"unresolvedReaders",
")",
"!=",
"0",
"{",
"return",
"Handle",
"{",
"}",
",",
"errInvalidReader",
"\n",
"}",
"\n",
"}",
"\n\n",
"for",
"i",
",",
"w",
":=",
"range",
"writers",
"{",
"if",
"w",
"==",
"keybase1",
".",
"PUBLIC_UID",
"{",
"return",
"Handle",
"{",
"}",
",",
"errInvalidWriter",
"\n",
"}",
"else",
"if",
"i",
">",
"0",
"&&",
"w",
".",
"IsTeamOrSubteam",
"(",
")",
"{",
"return",
"Handle",
"{",
"}",
",",
"errInvalidWriter",
"\n",
"}",
"\n",
"}",
"\n\n",
"// If we have more than one reader, none of them should be the",
"// public UID. And no readers should be a team.",
"checkPublic",
":=",
"(",
"len",
"(",
"readers",
")",
"+",
"len",
"(",
"unresolvedReaders",
")",
")",
">",
"1",
"\n",
"for",
"_",
",",
"r",
":=",
"range",
"readers",
"{",
"if",
"checkPublic",
"&&",
"r",
"==",
"keybase1",
".",
"PUBLIC_UID",
"{",
"return",
"Handle",
"{",
"}",
",",
"errInvalidReader",
"\n",
"}",
"else",
"if",
"r",
".",
"IsTeamOrSubteam",
"(",
")",
"{",
"return",
"Handle",
"{",
"}",
",",
"errInvalidReader",
"\n",
"}",
"\n",
"}",
"\n\n",
"// TODO: Check for overlap between readers and writers, and",
"// for duplicates.",
"writersCopy",
":=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"len",
"(",
"writers",
")",
")",
"\n",
"copy",
"(",
"writersCopy",
",",
"writers",
")",
"\n",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"writersCopy",
")",
")",
"\n\n",
"var",
"readersCopy",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
"\n",
"if",
"len",
"(",
"readers",
")",
">",
"0",
"{",
"readersCopy",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"len",
"(",
"readers",
")",
")",
"\n",
"copy",
"(",
"readersCopy",
",",
"readers",
")",
"\n",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"readersCopy",
")",
")",
"\n",
"}",
"\n\n",
"var",
"unresolvedWritersCopy",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
"\n",
"if",
"len",
"(",
"unresolvedWriters",
")",
">",
"0",
"{",
"unresolvedWritersCopy",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
",",
"len",
"(",
"unresolvedWriters",
")",
")",
"\n",
"copy",
"(",
"unresolvedWritersCopy",
",",
"unresolvedWriters",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"unresolvedWritersCopy",
")",
")",
"\n",
"}",
"\n\n",
"var",
"unresolvedReadersCopy",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
"\n",
"if",
"len",
"(",
"unresolvedReaders",
")",
">",
"0",
"{",
"unresolvedReadersCopy",
"=",
"make",
"(",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
",",
"len",
"(",
"unresolvedReaders",
")",
")",
"\n",
"copy",
"(",
"unresolvedReadersCopy",
",",
"unresolvedReaders",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"unresolvedReadersCopy",
")",
")",
"\n",
"}",
"\n\n",
"conflictInfo",
",",
"finalizedInfo",
":=",
"HandleExtensionList",
"(",
"extensions",
")",
".",
"Splat",
"(",
")",
"\n\n",
"return",
"Handle",
"{",
"Writers",
":",
"writersCopy",
",",
"Readers",
":",
"readersCopy",
",",
"UnresolvedWriters",
":",
"unresolvedWritersCopy",
",",
"UnresolvedReaders",
":",
"unresolvedReadersCopy",
",",
"ConflictInfo",
":",
"conflictInfo",
",",
"FinalizedInfo",
":",
"finalizedInfo",
",",
"sorted",
":",
"true",
",",
"}",
",",
"nil",
"\n",
"}"
] | // MakeHandle creates a Handle from the given list of
// readers and writers. If the given reader list contains just
// keybase1.PUBLIC_UID, then the returned handle will be for a public
// folder. Otherwise, it will be private. PUBLIC_UID shouldn't be in
// any list in any other case. | [
"MakeHandle",
"creates",
"a",
"Handle",
"from",
"the",
"given",
"list",
"of",
"readers",
"and",
"writers",
".",
"If",
"the",
"given",
"reader",
"list",
"contains",
"just",
"keybase1",
".",
"PUBLIC_UID",
"then",
"the",
"returned",
"handle",
"will",
"be",
"for",
"a",
"public",
"folder",
".",
"Otherwise",
"it",
"will",
"be",
"private",
".",
"PUBLIC_UID",
"shouldn",
"t",
"be",
"in",
"any",
"list",
"in",
"any",
"other",
"case",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L93-L168 |
160,975 | keybase/client | go/kbfs/tlf/handle.go | Type | func (h Handle) Type() Type {
if len(h.Readers) == 1 &&
h.Readers[0].Equal(keybase1.PublicUID.AsUserOrTeam()) {
return Public
} else if len(h.Writers) == 1 && h.Writers[0].IsTeamOrSubteam() {
return SingleTeam
}
return Private
} | go | func (h Handle) Type() Type {
if len(h.Readers) == 1 &&
h.Readers[0].Equal(keybase1.PublicUID.AsUserOrTeam()) {
return Public
} else if len(h.Writers) == 1 && h.Writers[0].IsTeamOrSubteam() {
return SingleTeam
}
return Private
} | [
"func",
"(",
"h",
"Handle",
")",
"Type",
"(",
")",
"Type",
"{",
"if",
"len",
"(",
"h",
".",
"Readers",
")",
"==",
"1",
"&&",
"h",
".",
"Readers",
"[",
"0",
"]",
".",
"Equal",
"(",
"keybase1",
".",
"PublicUID",
".",
"AsUserOrTeam",
"(",
")",
")",
"{",
"return",
"Public",
"\n",
"}",
"else",
"if",
"len",
"(",
"h",
".",
"Writers",
")",
"==",
"1",
"&&",
"h",
".",
"Writers",
"[",
"0",
"]",
".",
"IsTeamOrSubteam",
"(",
")",
"{",
"return",
"SingleTeam",
"\n",
"}",
"\n",
"return",
"Private",
"\n",
"}"
] | // Type returns the type of TLF this Handle represents. | [
"Type",
"returns",
"the",
"type",
"of",
"TLF",
"this",
"Handle",
"represents",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L184-L192 |
160,976 | keybase/client | go/kbfs/tlf/handle.go | TypeForKeying | func (h Handle) TypeForKeying() KeyingType {
if h.IsBackedByTeam() {
return TeamKeying
}
return h.Type().ToKeyingType()
} | go | func (h Handle) TypeForKeying() KeyingType {
if h.IsBackedByTeam() {
return TeamKeying
}
return h.Type().ToKeyingType()
} | [
"func",
"(",
"h",
"Handle",
")",
"TypeForKeying",
"(",
")",
"KeyingType",
"{",
"if",
"h",
".",
"IsBackedByTeam",
"(",
")",
"{",
"return",
"TeamKeying",
"\n",
"}",
"\n",
"return",
"h",
".",
"Type",
"(",
")",
".",
"ToKeyingType",
"(",
")",
"\n",
"}"
] | // TypeForKeying returns the keying type for the handle h. | [
"TypeForKeying",
"returns",
"the",
"keying",
"type",
"for",
"the",
"handle",
"h",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L195-L200 |
160,977 | keybase/client | go/kbfs/tlf/handle.go | IsWriter | func (h Handle) IsWriter(user keybase1.UserOrTeamID) bool {
if h.TypeForKeying() == TeamKeying {
panic("Can't call Handle.IsWriter() for a single team TLF")
}
return h.findUserInList(user, h.Writers)
} | go | func (h Handle) IsWriter(user keybase1.UserOrTeamID) bool {
if h.TypeForKeying() == TeamKeying {
panic("Can't call Handle.IsWriter() for a single team TLF")
}
return h.findUserInList(user, h.Writers)
} | [
"func",
"(",
"h",
"Handle",
")",
"IsWriter",
"(",
"user",
"keybase1",
".",
"UserOrTeamID",
")",
"bool",
"{",
"if",
"h",
".",
"TypeForKeying",
"(",
")",
"==",
"TeamKeying",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"h",
".",
"findUserInList",
"(",
"user",
",",
"h",
".",
"Writers",
")",
"\n",
"}"
] | // IsWriter returns whether or not the given user is a writer for the
// top-level folder represented by this Handle. | [
"IsWriter",
"returns",
"whether",
"or",
"not",
"the",
"given",
"user",
"is",
"a",
"writer",
"for",
"the",
"top",
"-",
"level",
"folder",
"represented",
"by",
"this",
"Handle",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L214-L219 |
160,978 | keybase/client | go/kbfs/tlf/handle.go | IsReader | func (h Handle) IsReader(user keybase1.UserOrTeamID) bool {
if h.TypeForKeying() == TeamKeying {
panic("Can't call Handle.IsReader() for a single team TLF")
}
return h.TypeForKeying() == PublicKeying ||
h.findUserInList(user, h.Readers) ||
h.IsWriter(user)
} | go | func (h Handle) IsReader(user keybase1.UserOrTeamID) bool {
if h.TypeForKeying() == TeamKeying {
panic("Can't call Handle.IsReader() for a single team TLF")
}
return h.TypeForKeying() == PublicKeying ||
h.findUserInList(user, h.Readers) ||
h.IsWriter(user)
} | [
"func",
"(",
"h",
"Handle",
")",
"IsReader",
"(",
"user",
"keybase1",
".",
"UserOrTeamID",
")",
"bool",
"{",
"if",
"h",
".",
"TypeForKeying",
"(",
")",
"==",
"TeamKeying",
"{",
"panic",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"h",
".",
"TypeForKeying",
"(",
")",
"==",
"PublicKeying",
"||",
"h",
".",
"findUserInList",
"(",
"user",
",",
"h",
".",
"Readers",
")",
"||",
"h",
".",
"IsWriter",
"(",
"user",
")",
"\n",
"}"
] | // IsReader returns whether or not the given user is a reader for the
// top-level folder represented by this Handle. | [
"IsReader",
"returns",
"whether",
"or",
"not",
"the",
"given",
"user",
"is",
"a",
"reader",
"for",
"the",
"top",
"-",
"level",
"folder",
"represented",
"by",
"this",
"Handle",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L223-L230 |
160,979 | keybase/client | go/kbfs/tlf/handle.go | ResolvedUsers | func (h Handle) ResolvedUsers() []keybase1.UserOrTeamID {
var resolvedUsers []keybase1.UserOrTeamID
resolvedUsers = append(resolvedUsers, h.Writers...)
if h.TypeForKeying() == PrivateKeying {
resolvedUsers = append(resolvedUsers, h.Readers...)
}
return resolvedUsers
} | go | func (h Handle) ResolvedUsers() []keybase1.UserOrTeamID {
var resolvedUsers []keybase1.UserOrTeamID
resolvedUsers = append(resolvedUsers, h.Writers...)
if h.TypeForKeying() == PrivateKeying {
resolvedUsers = append(resolvedUsers, h.Readers...)
}
return resolvedUsers
} | [
"func",
"(",
"h",
"Handle",
")",
"ResolvedUsers",
"(",
")",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
"{",
"var",
"resolvedUsers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
"\n",
"resolvedUsers",
"=",
"append",
"(",
"resolvedUsers",
",",
"h",
".",
"Writers",
"...",
")",
"\n",
"if",
"h",
".",
"TypeForKeying",
"(",
")",
"==",
"PrivateKeying",
"{",
"resolvedUsers",
"=",
"append",
"(",
"resolvedUsers",
",",
"h",
".",
"Readers",
"...",
")",
"\n",
"}",
"\n",
"return",
"resolvedUsers",
"\n",
"}"
] | // ResolvedUsers returns the concatenation of h.Writers and h.Readers,
// except if the handle is public, the returned list won't contain
// PUBLIC_UID. | [
"ResolvedUsers",
"returns",
"the",
"concatenation",
"of",
"h",
".",
"Writers",
"and",
"h",
".",
"Readers",
"except",
"if",
"the",
"handle",
"is",
"public",
"the",
"returned",
"list",
"won",
"t",
"contain",
"PUBLIC_UID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L235-L242 |
160,980 | keybase/client | go/kbfs/tlf/handle.go | HasUnresolvedUsers | func (h Handle) HasUnresolvedUsers() bool {
return len(h.UnresolvedWriters) > 0 || len(h.UnresolvedReaders) > 0
} | go | func (h Handle) HasUnresolvedUsers() bool {
return len(h.UnresolvedWriters) > 0 || len(h.UnresolvedReaders) > 0
} | [
"func",
"(",
"h",
"Handle",
")",
"HasUnresolvedUsers",
"(",
")",
"bool",
"{",
"return",
"len",
"(",
"h",
".",
"UnresolvedWriters",
")",
">",
"0",
"||",
"len",
"(",
"h",
".",
"UnresolvedReaders",
")",
">",
"0",
"\n",
"}"
] | // HasUnresolvedUsers returns true if this handle has any unresolved
// writers or readers. | [
"HasUnresolvedUsers",
"returns",
"true",
"if",
"this",
"handle",
"has",
"any",
"unresolved",
"writers",
"or",
"readers",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L246-L248 |
160,981 | keybase/client | go/kbfs/tlf/handle.go | UnresolvedUsers | func (h Handle) UnresolvedUsers() []keybase1.SocialAssertion {
var unresolvedUsers []keybase1.SocialAssertion
unresolvedUsers = append(unresolvedUsers, h.UnresolvedWriters...)
unresolvedUsers = append(unresolvedUsers, h.UnresolvedReaders...)
return unresolvedUsers
} | go | func (h Handle) UnresolvedUsers() []keybase1.SocialAssertion {
var unresolvedUsers []keybase1.SocialAssertion
unresolvedUsers = append(unresolvedUsers, h.UnresolvedWriters...)
unresolvedUsers = append(unresolvedUsers, h.UnresolvedReaders...)
return unresolvedUsers
} | [
"func",
"(",
"h",
"Handle",
")",
"UnresolvedUsers",
"(",
")",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
"{",
"var",
"unresolvedUsers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
"\n",
"unresolvedUsers",
"=",
"append",
"(",
"unresolvedUsers",
",",
"h",
".",
"UnresolvedWriters",
"...",
")",
"\n",
"unresolvedUsers",
"=",
"append",
"(",
"unresolvedUsers",
",",
"h",
".",
"UnresolvedReaders",
"...",
")",
"\n",
"return",
"unresolvedUsers",
"\n",
"}"
] | // UnresolvedUsers returns the concatenation of h.UnresolvedWriters
// and h.UnresolvedReaders. | [
"UnresolvedUsers",
"returns",
"the",
"concatenation",
"of",
"h",
".",
"UnresolvedWriters",
"and",
"h",
".",
"UnresolvedReaders",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L252-L257 |
160,982 | keybase/client | go/kbfs/tlf/handle.go | ResolveAssertions | func (h Handle) ResolveAssertions(
assertions map[keybase1.SocialAssertion]keybase1.UID) Handle {
if len(assertions) == 0 || (len(h.UnresolvedWriters) == 0 && len(h.UnresolvedReaders) == 0) || h.IsFinal() {
return h
}
var resolvedWriters, resolvedReaders map[keybase1.UserOrTeamID]bool
resolvedWriters, h.UnresolvedWriters = resolveAssertions(assertions, h.UnresolvedWriters, h.Writers)
resolvedReaders, h.UnresolvedReaders = resolveAssertions(assertions, h.UnresolvedReaders, h.Readers)
h.Writers = uidSetToSlice(resolvedWriters)
for _, u := range h.Writers {
delete(resolvedReaders, u)
}
h.Readers = uidSetToSlice(resolvedReaders)
sort.Sort(UIDList(h.Writers))
sort.Sort(UIDList(h.Readers))
sort.Sort(SocialAssertionList(h.UnresolvedWriters))
sort.Sort(SocialAssertionList(h.UnresolvedReaders))
h.sorted = true
return h
} | go | func (h Handle) ResolveAssertions(
assertions map[keybase1.SocialAssertion]keybase1.UID) Handle {
if len(assertions) == 0 || (len(h.UnresolvedWriters) == 0 && len(h.UnresolvedReaders) == 0) || h.IsFinal() {
return h
}
var resolvedWriters, resolvedReaders map[keybase1.UserOrTeamID]bool
resolvedWriters, h.UnresolvedWriters = resolveAssertions(assertions, h.UnresolvedWriters, h.Writers)
resolvedReaders, h.UnresolvedReaders = resolveAssertions(assertions, h.UnresolvedReaders, h.Readers)
h.Writers = uidSetToSlice(resolvedWriters)
for _, u := range h.Writers {
delete(resolvedReaders, u)
}
h.Readers = uidSetToSlice(resolvedReaders)
sort.Sort(UIDList(h.Writers))
sort.Sort(UIDList(h.Readers))
sort.Sort(SocialAssertionList(h.UnresolvedWriters))
sort.Sort(SocialAssertionList(h.UnresolvedReaders))
h.sorted = true
return h
} | [
"func",
"(",
"h",
"Handle",
")",
"ResolveAssertions",
"(",
"assertions",
"map",
"[",
"keybase1",
".",
"SocialAssertion",
"]",
"keybase1",
".",
"UID",
")",
"Handle",
"{",
"if",
"len",
"(",
"assertions",
")",
"==",
"0",
"||",
"(",
"len",
"(",
"h",
".",
"UnresolvedWriters",
")",
"==",
"0",
"&&",
"len",
"(",
"h",
".",
"UnresolvedReaders",
")",
"==",
"0",
")",
"||",
"h",
".",
"IsFinal",
"(",
")",
"{",
"return",
"h",
"\n",
"}",
"\n",
"var",
"resolvedWriters",
",",
"resolvedReaders",
"map",
"[",
"keybase1",
".",
"UserOrTeamID",
"]",
"bool",
"\n",
"resolvedWriters",
",",
"h",
".",
"UnresolvedWriters",
"=",
"resolveAssertions",
"(",
"assertions",
",",
"h",
".",
"UnresolvedWriters",
",",
"h",
".",
"Writers",
")",
"\n",
"resolvedReaders",
",",
"h",
".",
"UnresolvedReaders",
"=",
"resolveAssertions",
"(",
"assertions",
",",
"h",
".",
"UnresolvedReaders",
",",
"h",
".",
"Readers",
")",
"\n",
"h",
".",
"Writers",
"=",
"uidSetToSlice",
"(",
"resolvedWriters",
")",
"\n",
"for",
"_",
",",
"u",
":=",
"range",
"h",
".",
"Writers",
"{",
"delete",
"(",
"resolvedReaders",
",",
"u",
")",
"\n",
"}",
"\n",
"h",
".",
"Readers",
"=",
"uidSetToSlice",
"(",
"resolvedReaders",
")",
"\n",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"h",
".",
"Writers",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"h",
".",
"Readers",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"h",
".",
"UnresolvedWriters",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"h",
".",
"UnresolvedReaders",
")",
")",
"\n",
"h",
".",
"sorted",
"=",
"true",
"\n",
"return",
"h",
"\n",
"}"
] | // ResolveAssertions creates a new Handle given an existing one with
// while resolving the passed assertions. | [
"ResolveAssertions",
"creates",
"a",
"new",
"Handle",
"given",
"an",
"existing",
"one",
"with",
"while",
"resolving",
"the",
"passed",
"assertions",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L307-L326 |
160,983 | keybase/client | go/kbfs/tlf/handle.go | Extensions | func (h Handle) Extensions() (extensions []HandleExtension) {
if h.ConflictInfo != nil {
extensions = append(extensions, *h.ConflictInfo)
}
if h.FinalizedInfo != nil {
extensions = append(extensions, *h.FinalizedInfo)
}
return extensions
} | go | func (h Handle) Extensions() (extensions []HandleExtension) {
if h.ConflictInfo != nil {
extensions = append(extensions, *h.ConflictInfo)
}
if h.FinalizedInfo != nil {
extensions = append(extensions, *h.FinalizedInfo)
}
return extensions
} | [
"func",
"(",
"h",
"Handle",
")",
"Extensions",
"(",
")",
"(",
"extensions",
"[",
"]",
"HandleExtension",
")",
"{",
"if",
"h",
".",
"ConflictInfo",
"!=",
"nil",
"{",
"extensions",
"=",
"append",
"(",
"extensions",
",",
"*",
"h",
".",
"ConflictInfo",
")",
"\n",
"}",
"\n",
"if",
"h",
".",
"FinalizedInfo",
"!=",
"nil",
"{",
"extensions",
"=",
"append",
"(",
"extensions",
",",
"*",
"h",
".",
"FinalizedInfo",
")",
"\n",
"}",
"\n",
"return",
"extensions",
"\n",
"}"
] | // Extensions returns a list of extensions for the given handle. | [
"Extensions",
"returns",
"a",
"list",
"of",
"extensions",
"for",
"the",
"given",
"handle",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L329-L337 |
160,984 | keybase/client | go/kbfs/tlf/handle.go | DeepEqual | func (h *Handle) DeepEqual(other Handle) bool {
if len(h.Writers) != len(other.Writers) {
return false
}
if len(h.UnresolvedWriters) != len(other.UnresolvedWriters) {
return false
}
if len(h.Readers) != len(other.Readers) {
return false
}
if len(h.UnresolvedReaders) != len(other.UnresolvedReaders) {
return false
}
if !h.sorted {
sort.Sort(UIDList(h.Writers))
sort.Sort(UIDList(h.Readers))
sort.Sort(SocialAssertionList(h.UnresolvedWriters))
sort.Sort(SocialAssertionList(h.UnresolvedReaders))
h.sorted = true
}
if !other.sorted {
sort.Sort(UIDList(other.Writers))
sort.Sort(UIDList(other.Readers))
sort.Sort(SocialAssertionList(other.UnresolvedWriters))
sort.Sort(SocialAssertionList(other.UnresolvedReaders))
}
for i, v := range h.Writers {
if other.Writers[i] != v {
return false
}
}
for i, v := range h.UnresolvedWriters {
if other.UnresolvedWriters[i] != v {
return false
}
}
for i, v := range h.Readers {
if other.Readers[i] != v {
return false
}
}
for i, v := range h.UnresolvedReaders {
if other.UnresolvedReaders[i] != v {
return false
}
}
if h.IsConflict() != other.IsConflict() {
return false
}
if h.IsFinal() != other.IsFinal() {
return false
}
if h.ConflictInfo != nil &&
h.ConflictInfo.String() != other.ConflictInfo.String() {
return false
}
if h.FinalizedInfo != nil &&
h.FinalizedInfo.String() != other.FinalizedInfo.String() {
return false
}
return true
} | go | func (h *Handle) DeepEqual(other Handle) bool {
if len(h.Writers) != len(other.Writers) {
return false
}
if len(h.UnresolvedWriters) != len(other.UnresolvedWriters) {
return false
}
if len(h.Readers) != len(other.Readers) {
return false
}
if len(h.UnresolvedReaders) != len(other.UnresolvedReaders) {
return false
}
if !h.sorted {
sort.Sort(UIDList(h.Writers))
sort.Sort(UIDList(h.Readers))
sort.Sort(SocialAssertionList(h.UnresolvedWriters))
sort.Sort(SocialAssertionList(h.UnresolvedReaders))
h.sorted = true
}
if !other.sorted {
sort.Sort(UIDList(other.Writers))
sort.Sort(UIDList(other.Readers))
sort.Sort(SocialAssertionList(other.UnresolvedWriters))
sort.Sort(SocialAssertionList(other.UnresolvedReaders))
}
for i, v := range h.Writers {
if other.Writers[i] != v {
return false
}
}
for i, v := range h.UnresolvedWriters {
if other.UnresolvedWriters[i] != v {
return false
}
}
for i, v := range h.Readers {
if other.Readers[i] != v {
return false
}
}
for i, v := range h.UnresolvedReaders {
if other.UnresolvedReaders[i] != v {
return false
}
}
if h.IsConflict() != other.IsConflict() {
return false
}
if h.IsFinal() != other.IsFinal() {
return false
}
if h.ConflictInfo != nil &&
h.ConflictInfo.String() != other.ConflictInfo.String() {
return false
}
if h.FinalizedInfo != nil &&
h.FinalizedInfo.String() != other.FinalizedInfo.String() {
return false
}
return true
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"DeepEqual",
"(",
"other",
"Handle",
")",
"bool",
"{",
"if",
"len",
"(",
"h",
".",
"Writers",
")",
"!=",
"len",
"(",
"other",
".",
"Writers",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"len",
"(",
"h",
".",
"UnresolvedWriters",
")",
"!=",
"len",
"(",
"other",
".",
"UnresolvedWriters",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"len",
"(",
"h",
".",
"Readers",
")",
"!=",
"len",
"(",
"other",
".",
"Readers",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"len",
"(",
"h",
".",
"UnresolvedReaders",
")",
"!=",
"len",
"(",
"other",
".",
"UnresolvedReaders",
")",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"if",
"!",
"h",
".",
"sorted",
"{",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"h",
".",
"Writers",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"h",
".",
"Readers",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"h",
".",
"UnresolvedWriters",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"h",
".",
"UnresolvedReaders",
")",
")",
"\n",
"h",
".",
"sorted",
"=",
"true",
"\n",
"}",
"\n",
"if",
"!",
"other",
".",
"sorted",
"{",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"other",
".",
"Writers",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"UIDList",
"(",
"other",
".",
"Readers",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"other",
".",
"UnresolvedWriters",
")",
")",
"\n",
"sort",
".",
"Sort",
"(",
"SocialAssertionList",
"(",
"other",
".",
"UnresolvedReaders",
")",
")",
"\n",
"}",
"\n\n",
"for",
"i",
",",
"v",
":=",
"range",
"h",
".",
"Writers",
"{",
"if",
"other",
".",
"Writers",
"[",
"i",
"]",
"!=",
"v",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"i",
",",
"v",
":=",
"range",
"h",
".",
"UnresolvedWriters",
"{",
"if",
"other",
".",
"UnresolvedWriters",
"[",
"i",
"]",
"!=",
"v",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"i",
",",
"v",
":=",
"range",
"h",
".",
"Readers",
"{",
"if",
"other",
".",
"Readers",
"[",
"i",
"]",
"!=",
"v",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"for",
"i",
",",
"v",
":=",
"range",
"h",
".",
"UnresolvedReaders",
"{",
"if",
"other",
".",
"UnresolvedReaders",
"[",
"i",
"]",
"!=",
"v",
"{",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"h",
".",
"IsConflict",
"(",
")",
"!=",
"other",
".",
"IsConflict",
"(",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"h",
".",
"IsFinal",
"(",
")",
"!=",
"other",
".",
"IsFinal",
"(",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"h",
".",
"ConflictInfo",
"!=",
"nil",
"&&",
"h",
".",
"ConflictInfo",
".",
"String",
"(",
")",
"!=",
"other",
".",
"ConflictInfo",
".",
"String",
"(",
")",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"h",
".",
"FinalizedInfo",
"!=",
"nil",
"&&",
"h",
".",
"FinalizedInfo",
".",
"String",
"(",
")",
"!=",
"other",
".",
"FinalizedInfo",
".",
"String",
"(",
")",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"return",
"true",
"\n",
"}"
] | // DeepEqual returns true if the handle is equal to another handle.
// This can mutate the Handle in that it might sort its Writers,
// Readers, UnresolvedWriters, and UnresolvedReaders. | [
"DeepEqual",
"returns",
"true",
"if",
"the",
"handle",
"is",
"equal",
"to",
"another",
"handle",
".",
"This",
"can",
"mutate",
"the",
"Handle",
"in",
"that",
"it",
"might",
"sort",
"its",
"Writers",
"Readers",
"UnresolvedWriters",
"and",
"UnresolvedReaders",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L352-L416 |
160,985 | keybase/client | go/kbfs/tlf/handle.go | checkUIDEquality | func checkUIDEquality(a, b []keybase1.UserOrTeamID) bool {
aMap := make(map[keybase1.UserOrTeamID]bool)
for _, u := range a {
aMap[u] = true
}
for _, u := range b {
if !aMap[u] {
return false
}
delete(aMap, u)
}
return len(aMap) == 0
} | go | func checkUIDEquality(a, b []keybase1.UserOrTeamID) bool {
aMap := make(map[keybase1.UserOrTeamID]bool)
for _, u := range a {
aMap[u] = true
}
for _, u := range b {
if !aMap[u] {
return false
}
delete(aMap, u)
}
return len(aMap) == 0
} | [
"func",
"checkUIDEquality",
"(",
"a",
",",
"b",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
")",
"bool",
"{",
"aMap",
":=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UserOrTeamID",
"]",
"bool",
")",
"\n",
"for",
"_",
",",
"u",
":=",
"range",
"a",
"{",
"aMap",
"[",
"u",
"]",
"=",
"true",
"\n",
"}",
"\n",
"for",
"_",
",",
"u",
":=",
"range",
"b",
"{",
"if",
"!",
"aMap",
"[",
"u",
"]",
"{",
"return",
"false",
"\n",
"}",
"\n",
"delete",
"(",
"aMap",
",",
"u",
")",
"\n",
"}",
"\n",
"return",
"len",
"(",
"aMap",
")",
"==",
"0",
"\n",
"}"
] | // checkUIDEquality returns true if `a` and `b` contain the same IDs,
// regardless of order. However, if `a` contains duplicates, this
// function may return an incorrect value. | [
"checkUIDEquality",
"returns",
"true",
"if",
"a",
"and",
"b",
"contain",
"the",
"same",
"IDs",
"regardless",
"of",
"order",
".",
"However",
"if",
"a",
"contains",
"duplicates",
"this",
"function",
"may",
"return",
"an",
"incorrect",
"value",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L421-L433 |
160,986 | keybase/client | go/kbfs/tlf/handle.go | ResolvedUsersEqual | func (h *Handle) ResolvedUsersEqual(
writers []keybase1.UserOrTeamID, readers []keybase1.UserOrTeamID) bool {
return checkUIDEquality(h.Writers, writers) &&
checkUIDEquality(h.Readers, readers)
} | go | func (h *Handle) ResolvedUsersEqual(
writers []keybase1.UserOrTeamID, readers []keybase1.UserOrTeamID) bool {
return checkUIDEquality(h.Writers, writers) &&
checkUIDEquality(h.Readers, readers)
} | [
"func",
"(",
"h",
"*",
"Handle",
")",
"ResolvedUsersEqual",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
",",
"readers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
")",
"bool",
"{",
"return",
"checkUIDEquality",
"(",
"h",
".",
"Writers",
",",
"writers",
")",
"&&",
"checkUIDEquality",
"(",
"h",
".",
"Readers",
",",
"readers",
")",
"\n",
"}"
] | // ResolvedUsersEqual checks whether the resolved users of this TLF
// matches the provided lists of writers and readers. | [
"ResolvedUsersEqual",
"checks",
"whether",
"the",
"resolved",
"users",
"of",
"this",
"TLF",
"matches",
"the",
"provided",
"lists",
"of",
"writers",
"and",
"readers",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/tlf/handle.go#L437-L441 |
160,987 | keybase/client | go/kbfs/libgit/util.go | commonTime | func commonTime(
ctx context.Context, mdserver libkbfs.MDServer, clock libkbfs.Clock,
log logger.Logger) time.Time {
offset, haveOffset := mdserver.OffsetFromServerTime()
if !haveOffset {
log.CDebugf(ctx, "No offset, cannot use common time; "+
"falling back to local time")
return clock.Now()
}
return clock.Now().Add(-offset)
} | go | func commonTime(
ctx context.Context, mdserver libkbfs.MDServer, clock libkbfs.Clock,
log logger.Logger) time.Time {
offset, haveOffset := mdserver.OffsetFromServerTime()
if !haveOffset {
log.CDebugf(ctx, "No offset, cannot use common time; "+
"falling back to local time")
return clock.Now()
}
return clock.Now().Add(-offset)
} | [
"func",
"commonTime",
"(",
"ctx",
"context",
".",
"Context",
",",
"mdserver",
"libkbfs",
".",
"MDServer",
",",
"clock",
"libkbfs",
".",
"Clock",
",",
"log",
"logger",
".",
"Logger",
")",
"time",
".",
"Time",
"{",
"offset",
",",
"haveOffset",
":=",
"mdserver",
".",
"OffsetFromServerTime",
"(",
")",
"\n",
"if",
"!",
"haveOffset",
"{",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
")",
"\n",
"return",
"clock",
".",
"Now",
"(",
")",
"\n",
"}",
"\n",
"return",
"clock",
".",
"Now",
"(",
")",
".",
"Add",
"(",
"-",
"offset",
")",
"\n",
"}"
] | // commonTime computes the current time according to our estimate of
// the mdserver's time. It's a very crude way of normalizing the
// local clock. | [
"commonTime",
"computes",
"the",
"current",
"time",
"according",
"to",
"our",
"estimate",
"of",
"the",
"mdserver",
"s",
"time",
".",
"It",
"s",
"a",
"very",
"crude",
"way",
"of",
"normalizing",
"the",
"local",
"clock",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libgit/util.go#L24-L34 |
160,988 | keybase/client | go/kbfs/libgit/util.go | canDoWork | func canDoWork(
ctx context.Context, mdserver libkbfs.MDServer, clock libkbfs.Clock,
fs *libfs.FS, workingFileName string, workLimit time.Duration,
log logger.Logger) (bool, error) {
fi, err := fs.Stat(workingFileName)
currCommonTime := commonTime(ctx, mdserver, clock, log)
switch {
case os.IsNotExist(err):
log.CDebugf(ctx, "Creating new working file %s", workingFileName)
f, err := fs.Create(workingFileName)
if err != nil {
return false, err
}
err = f.Close()
if err != nil {
return false, err
}
case err != nil:
return false, err
default: // err == nil
modCommonTime := fi.ModTime()
if modCommonTime.Add(workTimeLimit).After(currCommonTime) {
log.CDebugf(ctx, "Other worker is still working; "+
"modCommonTime=%s, currCommonTime=%s, workTimeLimit=%s",
modCommonTime, currCommonTime, workTimeLimit)
// The other GC is still running within the time
// limit.
return false, nil
}
log.CDebugf(ctx, "Other GC expired; "+
"modCommonTime=%s, currCommonTime=%s, workTimeLimit=%s",
modCommonTime, currCommonTime, workTimeLimit)
}
log.CDebugf(ctx, "Setting work common time to %s", currCommonTime)
err = fs.Chtimes(workingFileName, time.Time{}, currCommonTime)
if err != nil {
return false, err
}
return true, nil
} | go | func canDoWork(
ctx context.Context, mdserver libkbfs.MDServer, clock libkbfs.Clock,
fs *libfs.FS, workingFileName string, workLimit time.Duration,
log logger.Logger) (bool, error) {
fi, err := fs.Stat(workingFileName)
currCommonTime := commonTime(ctx, mdserver, clock, log)
switch {
case os.IsNotExist(err):
log.CDebugf(ctx, "Creating new working file %s", workingFileName)
f, err := fs.Create(workingFileName)
if err != nil {
return false, err
}
err = f.Close()
if err != nil {
return false, err
}
case err != nil:
return false, err
default: // err == nil
modCommonTime := fi.ModTime()
if modCommonTime.Add(workTimeLimit).After(currCommonTime) {
log.CDebugf(ctx, "Other worker is still working; "+
"modCommonTime=%s, currCommonTime=%s, workTimeLimit=%s",
modCommonTime, currCommonTime, workTimeLimit)
// The other GC is still running within the time
// limit.
return false, nil
}
log.CDebugf(ctx, "Other GC expired; "+
"modCommonTime=%s, currCommonTime=%s, workTimeLimit=%s",
modCommonTime, currCommonTime, workTimeLimit)
}
log.CDebugf(ctx, "Setting work common time to %s", currCommonTime)
err = fs.Chtimes(workingFileName, time.Time{}, currCommonTime)
if err != nil {
return false, err
}
return true, nil
} | [
"func",
"canDoWork",
"(",
"ctx",
"context",
".",
"Context",
",",
"mdserver",
"libkbfs",
".",
"MDServer",
",",
"clock",
"libkbfs",
".",
"Clock",
",",
"fs",
"*",
"libfs",
".",
"FS",
",",
"workingFileName",
"string",
",",
"workLimit",
"time",
".",
"Duration",
",",
"log",
"logger",
".",
"Logger",
")",
"(",
"bool",
",",
"error",
")",
"{",
"fi",
",",
"err",
":=",
"fs",
".",
"Stat",
"(",
"workingFileName",
")",
"\n",
"currCommonTime",
":=",
"commonTime",
"(",
"ctx",
",",
"mdserver",
",",
"clock",
",",
"log",
")",
"\n",
"switch",
"{",
"case",
"os",
".",
"IsNotExist",
"(",
"err",
")",
":",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"workingFileName",
")",
"\n",
"f",
",",
"err",
":=",
"fs",
".",
"Create",
"(",
"workingFileName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"err",
"=",
"f",
".",
"Close",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"case",
"err",
"!=",
"nil",
":",
"return",
"false",
",",
"err",
"\n",
"default",
":",
"// err == nil",
"modCommonTime",
":=",
"fi",
".",
"ModTime",
"(",
")",
"\n",
"if",
"modCommonTime",
".",
"Add",
"(",
"workTimeLimit",
")",
".",
"After",
"(",
"currCommonTime",
")",
"{",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"modCommonTime",
",",
"currCommonTime",
",",
"workTimeLimit",
")",
"\n",
"// The other GC is still running within the time",
"// limit.",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"modCommonTime",
",",
"currCommonTime",
",",
"workTimeLimit",
")",
"\n",
"}",
"\n\n",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"currCommonTime",
")",
"\n",
"err",
"=",
"fs",
".",
"Chtimes",
"(",
"workingFileName",
",",
"time",
".",
"Time",
"{",
"}",
",",
"currCommonTime",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"return",
"true",
",",
"nil",
"\n",
"}"
] | // canDoWork creates a file that marks the start of some long-term
// work by this node. It should be called while a lock is taken on
// the server. It returns true if the caller should start doing the
// work. | [
"canDoWork",
"creates",
"a",
"file",
"that",
"marks",
"the",
"start",
"of",
"some",
"long",
"-",
"term",
"work",
"by",
"this",
"node",
".",
"It",
"should",
"be",
"called",
"while",
"a",
"lock",
"is",
"taken",
"on",
"the",
"server",
".",
"It",
"returns",
"true",
"if",
"the",
"caller",
"should",
"start",
"doing",
"the",
"work",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libgit/util.go#L40-L80 |
160,989 | keybase/client | go/kbfs/fsrpc/fs.go | NewFS | func NewFS(config libkbfs.Config, log logger.Logger) keybase1.FsInterface {
return &fs{config: config, log: log}
} | go | func NewFS(config libkbfs.Config, log logger.Logger) keybase1.FsInterface {
return &fs{config: config, log: log}
} | [
"func",
"NewFS",
"(",
"config",
"libkbfs",
".",
"Config",
",",
"log",
"logger",
".",
"Logger",
")",
"keybase1",
".",
"FsInterface",
"{",
"return",
"&",
"fs",
"{",
"config",
":",
"config",
",",
"log",
":",
"log",
"}",
"\n",
"}"
] | // NewFS returns a new FS protocol implementation | [
"NewFS",
"returns",
"a",
"new",
"FS",
"protocol",
"implementation"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/fsrpc/fs.go#L23-L25 |
160,990 | keybase/client | go/kbfs/fsrpc/fs.go | List | func (f *fs) List(ctx context.Context, arg keybase1.ListArg) (keybase1.ListResult, error) {
f.log.CDebugf(ctx, "Listing %q", arg.Path)
kbfsPath, err := NewPath(arg.Path)
if err != nil {
return keybase1.ListResult{}, err
}
var result keybase1.ListResult
switch kbfsPath.PathType {
case RootPathType:
result, err = f.root(ctx)
case KeybasePathType:
result, err = f.keybase(ctx)
case KeybaseChildPathType:
result, err = f.favorites(ctx, kbfsPath)
default:
result, err = f.tlf(ctx, kbfsPath)
}
if err != nil {
f.log.CErrorf(ctx, "Error listing path %q: %s", arg.Path, err)
}
return result, err
} | go | func (f *fs) List(ctx context.Context, arg keybase1.ListArg) (keybase1.ListResult, error) {
f.log.CDebugf(ctx, "Listing %q", arg.Path)
kbfsPath, err := NewPath(arg.Path)
if err != nil {
return keybase1.ListResult{}, err
}
var result keybase1.ListResult
switch kbfsPath.PathType {
case RootPathType:
result, err = f.root(ctx)
case KeybasePathType:
result, err = f.keybase(ctx)
case KeybaseChildPathType:
result, err = f.favorites(ctx, kbfsPath)
default:
result, err = f.tlf(ctx, kbfsPath)
}
if err != nil {
f.log.CErrorf(ctx, "Error listing path %q: %s", arg.Path, err)
}
return result, err
} | [
"func",
"(",
"f",
"*",
"fs",
")",
"List",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"ListArg",
")",
"(",
"keybase1",
".",
"ListResult",
",",
"error",
")",
"{",
"f",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
".",
"Path",
")",
"\n\n",
"kbfsPath",
",",
"err",
":=",
"NewPath",
"(",
"arg",
".",
"Path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"keybase1",
".",
"ListResult",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"result",
"keybase1",
".",
"ListResult",
"\n",
"switch",
"kbfsPath",
".",
"PathType",
"{",
"case",
"RootPathType",
":",
"result",
",",
"err",
"=",
"f",
".",
"root",
"(",
"ctx",
")",
"\n",
"case",
"KeybasePathType",
":",
"result",
",",
"err",
"=",
"f",
".",
"keybase",
"(",
"ctx",
")",
"\n",
"case",
"KeybaseChildPathType",
":",
"result",
",",
"err",
"=",
"f",
".",
"favorites",
"(",
"ctx",
",",
"kbfsPath",
")",
"\n",
"default",
":",
"result",
",",
"err",
"=",
"f",
".",
"tlf",
"(",
"ctx",
",",
"kbfsPath",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"f",
".",
"log",
".",
"CErrorf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
".",
"Path",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"result",
",",
"err",
"\n",
"}"
] | // List implements keybase1.FsInterface | [
"List",
"implements",
"keybase1",
".",
"FsInterface"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/fsrpc/fs.go#L103-L126 |
160,991 | keybase/client | go/libkb/secret_store.go | PrimeSecretStore | func PrimeSecretStore(mctx MetaContext, ss SecretStoreAll) (err error) {
defer mctx.TraceTimed("PrimeSecretStore", func() error { return err })()
// Generate test username and test secret
testUsername, err := RandString("test_ss_", 5)
// RandString returns base32 encoded random bytes, make it look like a
// Keybase username. This is not required, though.
testUsername = strings.ToLower(strings.Replace(testUsername, "=", "", -1))
if err != nil {
return err
}
randBytes, err := RandBytes(LKSecLen)
if err != nil {
return err
}
mctx.Debug("PrimeSecretStore: priming secret store with username %q and secret %v", testUsername, randBytes)
testNormUsername := NormalizedUsername(testUsername)
var secretF [LKSecLen]byte
copy(secretF[:], randBytes[:])
testSecret := LKSecFullSecret{f: &secretF}
defer func() {
err2 := ss.ClearSecret(mctx, testNormUsername)
mctx.Debug("PrimeSecretStore: clearing test secret store entry")
if err2 != nil {
mctx.Debug("PrimeSecretStore: clearing secret store entry returned an error: %s", err2)
if err == nil {
err = err2
} else {
mctx.Debug("suppressing store clearing error because something else has errored prior")
}
}
}()
// Try to fetch first, we should get an error back.
_, err = ss.RetrieveSecret(mctx, testNormUsername)
if err == nil {
return errors.New("managed to retrieve secret before storing it")
} else if err != nil {
mctx.Debug("PrimeSecretStore: error when retrieving secret that wasn't stored yet: %q, as expected", err)
}
// Put secret in secret store through `SecretStore` interface.
err = ss.StoreSecret(mctx, testNormUsername, testSecret)
if err != nil {
return fmt.Errorf("error while storing secret: %s", err)
}
// Recreate test store with same username, try to retrieve secret.
retrSecret, err := ss.RetrieveSecret(mctx, testNormUsername)
if err != nil {
return fmt.Errorf("error while retrieving secret: %s", err)
}
mctx.Debug("PrimeSecretStore: retrieved secret: %v", retrSecret.f)
if !retrSecret.Equal(testSecret) {
return errors.New("managed to retrieve test secret but it didn't match the stored one")
}
mctx.Debug("PrimeSecretStore: retrieved secret matched!")
return nil
} | go | func PrimeSecretStore(mctx MetaContext, ss SecretStoreAll) (err error) {
defer mctx.TraceTimed("PrimeSecretStore", func() error { return err })()
// Generate test username and test secret
testUsername, err := RandString("test_ss_", 5)
// RandString returns base32 encoded random bytes, make it look like a
// Keybase username. This is not required, though.
testUsername = strings.ToLower(strings.Replace(testUsername, "=", "", -1))
if err != nil {
return err
}
randBytes, err := RandBytes(LKSecLen)
if err != nil {
return err
}
mctx.Debug("PrimeSecretStore: priming secret store with username %q and secret %v", testUsername, randBytes)
testNormUsername := NormalizedUsername(testUsername)
var secretF [LKSecLen]byte
copy(secretF[:], randBytes[:])
testSecret := LKSecFullSecret{f: &secretF}
defer func() {
err2 := ss.ClearSecret(mctx, testNormUsername)
mctx.Debug("PrimeSecretStore: clearing test secret store entry")
if err2 != nil {
mctx.Debug("PrimeSecretStore: clearing secret store entry returned an error: %s", err2)
if err == nil {
err = err2
} else {
mctx.Debug("suppressing store clearing error because something else has errored prior")
}
}
}()
// Try to fetch first, we should get an error back.
_, err = ss.RetrieveSecret(mctx, testNormUsername)
if err == nil {
return errors.New("managed to retrieve secret before storing it")
} else if err != nil {
mctx.Debug("PrimeSecretStore: error when retrieving secret that wasn't stored yet: %q, as expected", err)
}
// Put secret in secret store through `SecretStore` interface.
err = ss.StoreSecret(mctx, testNormUsername, testSecret)
if err != nil {
return fmt.Errorf("error while storing secret: %s", err)
}
// Recreate test store with same username, try to retrieve secret.
retrSecret, err := ss.RetrieveSecret(mctx, testNormUsername)
if err != nil {
return fmt.Errorf("error while retrieving secret: %s", err)
}
mctx.Debug("PrimeSecretStore: retrieved secret: %v", retrSecret.f)
if !retrSecret.Equal(testSecret) {
return errors.New("managed to retrieve test secret but it didn't match the stored one")
}
mctx.Debug("PrimeSecretStore: retrieved secret matched!")
return nil
} | [
"func",
"PrimeSecretStore",
"(",
"mctx",
"MetaContext",
",",
"ss",
"SecretStoreAll",
")",
"(",
"err",
"error",
")",
"{",
"defer",
"mctx",
".",
"TraceTimed",
"(",
"\"",
"\"",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n\n",
"// Generate test username and test secret",
"testUsername",
",",
"err",
":=",
"RandString",
"(",
"\"",
"\"",
",",
"5",
")",
"\n",
"// RandString returns base32 encoded random bytes, make it look like a",
"// Keybase username. This is not required, though.",
"testUsername",
"=",
"strings",
".",
"ToLower",
"(",
"strings",
".",
"Replace",
"(",
"testUsername",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"-",
"1",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"randBytes",
",",
"err",
":=",
"RandBytes",
"(",
"LKSecLen",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"testUsername",
",",
"randBytes",
")",
"\n",
"testNormUsername",
":=",
"NormalizedUsername",
"(",
"testUsername",
")",
"\n",
"var",
"secretF",
"[",
"LKSecLen",
"]",
"byte",
"\n",
"copy",
"(",
"secretF",
"[",
":",
"]",
",",
"randBytes",
"[",
":",
"]",
")",
"\n",
"testSecret",
":=",
"LKSecFullSecret",
"{",
"f",
":",
"&",
"secretF",
"}",
"\n\n",
"defer",
"func",
"(",
")",
"{",
"err2",
":=",
"ss",
".",
"ClearSecret",
"(",
"mctx",
",",
"testNormUsername",
")",
"\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"if",
"err2",
"!=",
"nil",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err2",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"err",
"=",
"err2",
"\n",
"}",
"else",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"// Try to fetch first, we should get an error back.",
"_",
",",
"err",
"=",
"ss",
".",
"RetrieveSecret",
"(",
"mctx",
",",
"testNormUsername",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"else",
"if",
"err",
"!=",
"nil",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Put secret in secret store through `SecretStore` interface.",
"err",
"=",
"ss",
".",
"StoreSecret",
"(",
"mctx",
",",
"testNormUsername",
",",
"testSecret",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// Recreate test store with same username, try to retrieve secret.",
"retrSecret",
",",
"err",
":=",
"ss",
".",
"RetrieveSecret",
"(",
"mctx",
",",
"testNormUsername",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"retrSecret",
".",
"f",
")",
"\n",
"if",
"!",
"retrSecret",
".",
"Equal",
"(",
"testSecret",
")",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // PrimeSecretStore runs a test with current platform's secret store, trying to
// store, retrieve, and then delete a secret with an arbitrary name. This should
// be done before provisioning or logging in | [
"PrimeSecretStore",
"runs",
"a",
"test",
"with",
"current",
"platform",
"s",
"secret",
"store",
"trying",
"to",
"store",
"retrieve",
"and",
"then",
"delete",
"a",
"secret",
"with",
"an",
"arbitrary",
"name",
".",
"This",
"should",
"be",
"done",
"before",
"provisioning",
"or",
"logging",
"in"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/secret_store.go#L314-L374 |
160,992 | keybase/client | go/kbfs/libfuse/fs.go | SetFuseConn | func (f *FS) SetFuseConn(fuse *fs.Server, conn *fuse.Conn) {
f.fuse = fuse
f.conn = conn
} | go | func (f *FS) SetFuseConn(fuse *fs.Server, conn *fuse.Conn) {
f.fuse = fuse
f.conn = conn
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"SetFuseConn",
"(",
"fuse",
"*",
"fs",
".",
"Server",
",",
"conn",
"*",
"fuse",
".",
"Conn",
")",
"{",
"f",
".",
"fuse",
"=",
"fuse",
"\n",
"f",
".",
"conn",
"=",
"conn",
"\n",
"}"
] | // SetFuseConn sets fuse connection for this FS. | [
"SetFuseConn",
"sets",
"fuse",
"connection",
"for",
"this",
"FS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L261-L264 |
160,993 | keybase/client | go/kbfs/libfuse/fs.go | LaunchNotificationProcessor | func (f *FS) LaunchNotificationProcessor(ctx context.Context) {
f.notifications.LaunchProcessor(ctx)
} | go | func (f *FS) LaunchNotificationProcessor(ctx context.Context) {
f.notifications.LaunchProcessor(ctx)
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"LaunchNotificationProcessor",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"f",
".",
"notifications",
".",
"LaunchProcessor",
"(",
"ctx",
")",
"\n",
"}"
] | // LaunchNotificationProcessor launches the notification processor. | [
"LaunchNotificationProcessor",
"launches",
"the",
"notification",
"processor",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L276-L278 |
160,994 | keybase/client | go/kbfs/libfuse/fs.go | WithContext | func (f *FS) WithContext(ctx context.Context) context.Context {
id, errRandomReqID := libkbfs.MakeRandomRequestID()
if errRandomReqID != nil {
f.log.Errorf("Couldn't make request ID: %v", errRandomReqID)
}
// context.WithDeadline uses clock from `time` package, so we are not using
// f.config.Clock() here
start := time.Now()
ctx, err := libcontext.NewContextWithCancellationDelayer(
libcontext.NewContextReplayable(ctx, func(ctx context.Context) context.Context {
ctx = context.WithValue(ctx, libfs.CtxAppIDKey, f)
logTags := make(logger.CtxLogTags)
logTags[CtxIDKey] = CtxOpID
ctx = logger.NewContextWithLogTags(ctx, logTags)
if errRandomReqID == nil {
// Add a unique ID to this context, identifying a particular
// request.
ctx = context.WithValue(ctx, CtxIDKey, id)
}
if runtime.GOOS == "darwin" {
// Timeout operations before they hit the osxfuse time limit,
// so we don't hose the entire mount (Fixed in OSXFUSE 3.2.0).
// The timeout is 60 seconds, but it looks like sometimes it
// tries multiple attempts within that 60 seconds, so let's go
// a little under 60/3 to be safe.
//
// It should be safe to ignore the CancelFunc here because our
// parent context will be canceled by the FUSE serve loop.
ctx, _ = context.WithDeadline(ctx, start.Add(19*time.Second))
}
return ctx
}))
if err != nil {
panic(err) // this should never happen
}
return ctx
} | go | func (f *FS) WithContext(ctx context.Context) context.Context {
id, errRandomReqID := libkbfs.MakeRandomRequestID()
if errRandomReqID != nil {
f.log.Errorf("Couldn't make request ID: %v", errRandomReqID)
}
// context.WithDeadline uses clock from `time` package, so we are not using
// f.config.Clock() here
start := time.Now()
ctx, err := libcontext.NewContextWithCancellationDelayer(
libcontext.NewContextReplayable(ctx, func(ctx context.Context) context.Context {
ctx = context.WithValue(ctx, libfs.CtxAppIDKey, f)
logTags := make(logger.CtxLogTags)
logTags[CtxIDKey] = CtxOpID
ctx = logger.NewContextWithLogTags(ctx, logTags)
if errRandomReqID == nil {
// Add a unique ID to this context, identifying a particular
// request.
ctx = context.WithValue(ctx, CtxIDKey, id)
}
if runtime.GOOS == "darwin" {
// Timeout operations before they hit the osxfuse time limit,
// so we don't hose the entire mount (Fixed in OSXFUSE 3.2.0).
// The timeout is 60 seconds, but it looks like sometimes it
// tries multiple attempts within that 60 seconds, so let's go
// a little under 60/3 to be safe.
//
// It should be safe to ignore the CancelFunc here because our
// parent context will be canceled by the FUSE serve loop.
ctx, _ = context.WithDeadline(ctx, start.Add(19*time.Second))
}
return ctx
}))
if err != nil {
panic(err) // this should never happen
}
return ctx
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"WithContext",
"(",
"ctx",
"context",
".",
"Context",
")",
"context",
".",
"Context",
"{",
"id",
",",
"errRandomReqID",
":=",
"libkbfs",
".",
"MakeRandomRequestID",
"(",
")",
"\n",
"if",
"errRandomReqID",
"!=",
"nil",
"{",
"f",
".",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"errRandomReqID",
")",
"\n",
"}",
"\n\n",
"// context.WithDeadline uses clock from `time` package, so we are not using",
"// f.config.Clock() here",
"start",
":=",
"time",
".",
"Now",
"(",
")",
"\n",
"ctx",
",",
"err",
":=",
"libcontext",
".",
"NewContextWithCancellationDelayer",
"(",
"libcontext",
".",
"NewContextReplayable",
"(",
"ctx",
",",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"context",
".",
"Context",
"{",
"ctx",
"=",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"libfs",
".",
"CtxAppIDKey",
",",
"f",
")",
"\n",
"logTags",
":=",
"make",
"(",
"logger",
".",
"CtxLogTags",
")",
"\n",
"logTags",
"[",
"CtxIDKey",
"]",
"=",
"CtxOpID",
"\n",
"ctx",
"=",
"logger",
".",
"NewContextWithLogTags",
"(",
"ctx",
",",
"logTags",
")",
"\n\n",
"if",
"errRandomReqID",
"==",
"nil",
"{",
"// Add a unique ID to this context, identifying a particular",
"// request.",
"ctx",
"=",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"CtxIDKey",
",",
"id",
")",
"\n",
"}",
"\n\n",
"if",
"runtime",
".",
"GOOS",
"==",
"\"",
"\"",
"{",
"// Timeout operations before they hit the osxfuse time limit,",
"// so we don't hose the entire mount (Fixed in OSXFUSE 3.2.0).",
"// The timeout is 60 seconds, but it looks like sometimes it",
"// tries multiple attempts within that 60 seconds, so let's go",
"// a little under 60/3 to be safe.",
"//",
"// It should be safe to ignore the CancelFunc here because our",
"// parent context will be canceled by the FUSE serve loop.",
"ctx",
",",
"_",
"=",
"context",
".",
"WithDeadline",
"(",
"ctx",
",",
"start",
".",
"Add",
"(",
"19",
"*",
"time",
".",
"Second",
")",
")",
"\n",
"}",
"\n\n",
"return",
"ctx",
"\n\n",
"}",
")",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"err",
")",
"// this should never happen",
"\n",
"}",
"\n\n",
"return",
"ctx",
"\n",
"}"
] | // WithContext adds app- and request-specific values to the context.
// libkbfs.NewContextWithCancellationDelayer is called before returning the
// context to ensure the cancellation is controllable.
//
// It is called by FUSE for normal runs, but may be called explicitly in other
// settings, such as tests. | [
"WithContext",
"adds",
"app",
"-",
"and",
"request",
"-",
"specific",
"values",
"to",
"the",
"context",
".",
"libkbfs",
".",
"NewContextWithCancellationDelayer",
"is",
"called",
"before",
"returning",
"the",
"context",
"to",
"ensure",
"the",
"cancellation",
"is",
"controllable",
".",
"It",
"is",
"called",
"by",
"FUSE",
"for",
"normal",
"runs",
"but",
"may",
"be",
"called",
"explicitly",
"in",
"other",
"settings",
"such",
"as",
"tests",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L286-L329 |
160,995 | keybase/client | go/kbfs/libfuse/fs.go | Serve | func (f *FS) Serve(ctx context.Context) error {
srv := fs.New(f.conn, &fs.Config{
WithContext: func(ctx context.Context, _ fuse.Request) context.Context {
return f.WithContext(ctx)
},
})
f.fuse = srv
f.notifications.LaunchProcessor(ctx)
f.remoteStatus.Init(ctx, f.log, f.config, f)
// Blocks forever, unless an interrupt signal is received
// (handled by libkbfs.Init).
return srv.Serve(f)
} | go | func (f *FS) Serve(ctx context.Context) error {
srv := fs.New(f.conn, &fs.Config{
WithContext: func(ctx context.Context, _ fuse.Request) context.Context {
return f.WithContext(ctx)
},
})
f.fuse = srv
f.notifications.LaunchProcessor(ctx)
f.remoteStatus.Init(ctx, f.log, f.config, f)
// Blocks forever, unless an interrupt signal is received
// (handled by libkbfs.Init).
return srv.Serve(f)
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"Serve",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"srv",
":=",
"fs",
".",
"New",
"(",
"f",
".",
"conn",
",",
"&",
"fs",
".",
"Config",
"{",
"WithContext",
":",
"func",
"(",
"ctx",
"context",
".",
"Context",
",",
"_",
"fuse",
".",
"Request",
")",
"context",
".",
"Context",
"{",
"return",
"f",
".",
"WithContext",
"(",
"ctx",
")",
"\n",
"}",
",",
"}",
")",
"\n",
"f",
".",
"fuse",
"=",
"srv",
"\n\n",
"f",
".",
"notifications",
".",
"LaunchProcessor",
"(",
"ctx",
")",
"\n",
"f",
".",
"remoteStatus",
".",
"Init",
"(",
"ctx",
",",
"f",
".",
"log",
",",
"f",
".",
"config",
",",
"f",
")",
"\n",
"// Blocks forever, unless an interrupt signal is received",
"// (handled by libkbfs.Init).",
"return",
"srv",
".",
"Serve",
"(",
"f",
")",
"\n",
"}"
] | // Serve FS. Will block. | [
"Serve",
"FS",
".",
"Will",
"block",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L332-L345 |
160,996 | keybase/client | go/kbfs/libfuse/fs.go | Statfs | func (f *FS) Statfs(ctx context.Context, req *fuse.StatfsRequest, resp *fuse.StatfsResponse) error {
*resp = fuse.StatfsResponse{
Bsize: fuseBlockSize,
Namelen: ^uint32(0),
Frsize: fuseBlockSize,
}
if f.remoteStatus.ExtraFileName() != "" {
f.vlog.CLogf(
ctx, libkb.VLog1,
"Skipping quota usage check while errors are present")
return nil
}
if session, err := idutil.GetCurrentSessionIfPossible(
ctx, f.config.KBPKI(), true); err != nil {
return err
} else if session == (idutil.SessionInfo{}) {
// If user is not logged in, don't bother getting quota info. Otherwise
// reading a public TLF while logged out can fail on macOS.
return nil
}
_, usageBytes, _, limitBytes, err := f.quotaUsage.Get(
ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance)
if err != nil {
f.vlog.CLogf(ctx, libkb.VLog1, "Getting quota usage error: %v", err)
return err
}
total := getNumBlocksFromSize(uint64(limitBytes))
used := getNumBlocksFromSize(uint64(usageBytes))
resp.Blocks = total
resp.Bavail = total - used
resp.Bfree = total - used
return nil
} | go | func (f *FS) Statfs(ctx context.Context, req *fuse.StatfsRequest, resp *fuse.StatfsResponse) error {
*resp = fuse.StatfsResponse{
Bsize: fuseBlockSize,
Namelen: ^uint32(0),
Frsize: fuseBlockSize,
}
if f.remoteStatus.ExtraFileName() != "" {
f.vlog.CLogf(
ctx, libkb.VLog1,
"Skipping quota usage check while errors are present")
return nil
}
if session, err := idutil.GetCurrentSessionIfPossible(
ctx, f.config.KBPKI(), true); err != nil {
return err
} else if session == (idutil.SessionInfo{}) {
// If user is not logged in, don't bother getting quota info. Otherwise
// reading a public TLF while logged out can fail on macOS.
return nil
}
_, usageBytes, _, limitBytes, err := f.quotaUsage.Get(
ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance)
if err != nil {
f.vlog.CLogf(ctx, libkb.VLog1, "Getting quota usage error: %v", err)
return err
}
total := getNumBlocksFromSize(uint64(limitBytes))
used := getNumBlocksFromSize(uint64(usageBytes))
resp.Blocks = total
resp.Bavail = total - used
resp.Bfree = total - used
return nil
} | [
"func",
"(",
"f",
"*",
"FS",
")",
"Statfs",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"*",
"fuse",
".",
"StatfsRequest",
",",
"resp",
"*",
"fuse",
".",
"StatfsResponse",
")",
"error",
"{",
"*",
"resp",
"=",
"fuse",
".",
"StatfsResponse",
"{",
"Bsize",
":",
"fuseBlockSize",
",",
"Namelen",
":",
"^",
"uint32",
"(",
"0",
")",
",",
"Frsize",
":",
"fuseBlockSize",
",",
"}",
"\n\n",
"if",
"f",
".",
"remoteStatus",
".",
"ExtraFileName",
"(",
")",
"!=",
"\"",
"\"",
"{",
"f",
".",
"vlog",
".",
"CLogf",
"(",
"ctx",
",",
"libkb",
".",
"VLog1",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n\n",
"if",
"session",
",",
"err",
":=",
"idutil",
".",
"GetCurrentSessionIfPossible",
"(",
"ctx",
",",
"f",
".",
"config",
".",
"KBPKI",
"(",
")",
",",
"true",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"else",
"if",
"session",
"==",
"(",
"idutil",
".",
"SessionInfo",
"{",
"}",
")",
"{",
"// If user is not logged in, don't bother getting quota info. Otherwise",
"// reading a public TLF while logged out can fail on macOS.",
"return",
"nil",
"\n",
"}",
"\n",
"_",
",",
"usageBytes",
",",
"_",
",",
"limitBytes",
",",
"err",
":=",
"f",
".",
"quotaUsage",
".",
"Get",
"(",
"ctx",
",",
"quotaUsageStaleTolerance",
"/",
"2",
",",
"quotaUsageStaleTolerance",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"f",
".",
"vlog",
".",
"CLogf",
"(",
"ctx",
",",
"libkb",
".",
"VLog1",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"err",
"\n",
"}",
"\n\n",
"total",
":=",
"getNumBlocksFromSize",
"(",
"uint64",
"(",
"limitBytes",
")",
")",
"\n",
"used",
":=",
"getNumBlocksFromSize",
"(",
"uint64",
"(",
"usageBytes",
")",
")",
"\n",
"resp",
".",
"Blocks",
"=",
"total",
"\n",
"resp",
".",
"Bavail",
"=",
"total",
"-",
"used",
"\n",
"resp",
".",
"Bfree",
"=",
"total",
"-",
"used",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // Statfs implements the fs.FSStatfser interface for FS. | [
"Statfs",
"implements",
"the",
"fs",
".",
"FSStatfser",
"interface",
"for",
"FS",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L388-L424 |
160,997 | keybase/client | go/kbfs/libfuse/fs.go | Lookup | func (r *Root) Lookup(ctx context.Context, req *fuse.LookupRequest, resp *fuse.LookupResponse) (_ fs.Node, err error) {
r.log().CDebugf(ctx, "FS Lookup %s", req.Name)
defer func() { err = r.private.fs.processError(ctx, libkbfs.ReadMode, err) }()
specialNode := handleNonTLFSpecialFile(
req.Name, r.private.fs, &resp.EntryValid)
if specialNode != nil {
return specialNode, nil
}
platformNode, err := r.platformLookup(ctx, req, resp)
if platformNode != nil || err != nil {
return platformNode, err
}
switch req.Name {
case PrivateName:
return r.private, nil
case PublicName:
return r.public, nil
}
if req.Name == TeamName {
return r.team, nil
}
// Don't want to pop up errors on special OS files.
if strings.HasPrefix(req.Name, ".") {
return nil, fuse.ENOENT
}
return nil, libkbfs.NoSuchFolderListError{
Name: req.Name,
PrivName: PrivateName,
PubName: PublicName,
}
} | go | func (r *Root) Lookup(ctx context.Context, req *fuse.LookupRequest, resp *fuse.LookupResponse) (_ fs.Node, err error) {
r.log().CDebugf(ctx, "FS Lookup %s", req.Name)
defer func() { err = r.private.fs.processError(ctx, libkbfs.ReadMode, err) }()
specialNode := handleNonTLFSpecialFile(
req.Name, r.private.fs, &resp.EntryValid)
if specialNode != nil {
return specialNode, nil
}
platformNode, err := r.platformLookup(ctx, req, resp)
if platformNode != nil || err != nil {
return platformNode, err
}
switch req.Name {
case PrivateName:
return r.private, nil
case PublicName:
return r.public, nil
}
if req.Name == TeamName {
return r.team, nil
}
// Don't want to pop up errors on special OS files.
if strings.HasPrefix(req.Name, ".") {
return nil, fuse.ENOENT
}
return nil, libkbfs.NoSuchFolderListError{
Name: req.Name,
PrivName: PrivateName,
PubName: PublicName,
}
} | [
"func",
"(",
"r",
"*",
"Root",
")",
"Lookup",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"*",
"fuse",
".",
"LookupRequest",
",",
"resp",
"*",
"fuse",
".",
"LookupResponse",
")",
"(",
"_",
"fs",
".",
"Node",
",",
"err",
"error",
")",
"{",
"r",
".",
"log",
"(",
")",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"req",
".",
"Name",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"r",
".",
"private",
".",
"fs",
".",
"processError",
"(",
"ctx",
",",
"libkbfs",
".",
"ReadMode",
",",
"err",
")",
"}",
"(",
")",
"\n\n",
"specialNode",
":=",
"handleNonTLFSpecialFile",
"(",
"req",
".",
"Name",
",",
"r",
".",
"private",
".",
"fs",
",",
"&",
"resp",
".",
"EntryValid",
")",
"\n",
"if",
"specialNode",
"!=",
"nil",
"{",
"return",
"specialNode",
",",
"nil",
"\n",
"}",
"\n\n",
"platformNode",
",",
"err",
":=",
"r",
".",
"platformLookup",
"(",
"ctx",
",",
"req",
",",
"resp",
")",
"\n",
"if",
"platformNode",
"!=",
"nil",
"||",
"err",
"!=",
"nil",
"{",
"return",
"platformNode",
",",
"err",
"\n",
"}",
"\n\n",
"switch",
"req",
".",
"Name",
"{",
"case",
"PrivateName",
":",
"return",
"r",
".",
"private",
",",
"nil",
"\n",
"case",
"PublicName",
":",
"return",
"r",
".",
"public",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"req",
".",
"Name",
"==",
"TeamName",
"{",
"return",
"r",
".",
"team",
",",
"nil",
"\n",
"}",
"\n\n",
"// Don't want to pop up errors on special OS files.",
"if",
"strings",
".",
"HasPrefix",
"(",
"req",
".",
"Name",
",",
"\"",
"\"",
")",
"{",
"return",
"nil",
",",
"fuse",
".",
"ENOENT",
"\n",
"}",
"\n\n",
"return",
"nil",
",",
"libkbfs",
".",
"NoSuchFolderListError",
"{",
"Name",
":",
"req",
".",
"Name",
",",
"PrivName",
":",
"PrivateName",
",",
"PubName",
":",
"PublicName",
",",
"}",
"\n",
"}"
] | // Lookup implements the fs.NodeRequestLookuper interface for Root. | [
"Lookup",
"implements",
"the",
"fs",
".",
"NodeRequestLookuper",
"interface",
"for",
"Root",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L466-L502 |
160,998 | keybase/client | go/kbfs/libfuse/fs.go | Create | func (r *Root) Create(ctx context.Context, req *fuse.CreateRequest, resp *fuse.CreateResponse) (_ fs.Node, _ fs.Handle, err error) {
r.log().CDebugf(ctx, "FS Create")
defer func() { err = r.private.fs.processError(ctx, libkbfs.WriteMode, err) }()
if strings.HasPrefix(req.Name, "._") {
// Quietly ignore writes to special macOS files, without
// triggering a notification.
return nil, nil, syscall.ENOENT
}
return nil, nil, libkbfs.NewWriteUnsupportedError(tlfhandle.BuildCanonicalPath(r.PathType(), req.Name))
} | go | func (r *Root) Create(ctx context.Context, req *fuse.CreateRequest, resp *fuse.CreateResponse) (_ fs.Node, _ fs.Handle, err error) {
r.log().CDebugf(ctx, "FS Create")
defer func() { err = r.private.fs.processError(ctx, libkbfs.WriteMode, err) }()
if strings.HasPrefix(req.Name, "._") {
// Quietly ignore writes to special macOS files, without
// triggering a notification.
return nil, nil, syscall.ENOENT
}
return nil, nil, libkbfs.NewWriteUnsupportedError(tlfhandle.BuildCanonicalPath(r.PathType(), req.Name))
} | [
"func",
"(",
"r",
"*",
"Root",
")",
"Create",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"*",
"fuse",
".",
"CreateRequest",
",",
"resp",
"*",
"fuse",
".",
"CreateResponse",
")",
"(",
"_",
"fs",
".",
"Node",
",",
"_",
"fs",
".",
"Handle",
",",
"err",
"error",
")",
"{",
"r",
".",
"log",
"(",
")",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"r",
".",
"private",
".",
"fs",
".",
"processError",
"(",
"ctx",
",",
"libkbfs",
".",
"WriteMode",
",",
"err",
")",
"}",
"(",
")",
"\n",
"if",
"strings",
".",
"HasPrefix",
"(",
"req",
".",
"Name",
",",
"\"",
"\"",
")",
"{",
"// Quietly ignore writes to special macOS files, without",
"// triggering a notification.",
"return",
"nil",
",",
"nil",
",",
"syscall",
".",
"ENOENT",
"\n",
"}",
"\n",
"return",
"nil",
",",
"nil",
",",
"libkbfs",
".",
"NewWriteUnsupportedError",
"(",
"tlfhandle",
".",
"BuildCanonicalPath",
"(",
"r",
".",
"PathType",
"(",
")",
",",
"req",
".",
"Name",
")",
")",
"\n",
"}"
] | // Create implements the fs.NodeCreater interface for Root. | [
"Create",
"implements",
"the",
"fs",
".",
"NodeCreater",
"interface",
"for",
"Root",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L512-L521 |
160,999 | keybase/client | go/kbfs/libfuse/fs.go | Mkdir | func (r *Root) Mkdir(ctx context.Context, req *fuse.MkdirRequest) (_ fs.Node, err error) {
r.log().CDebugf(ctx, "FS Mkdir")
defer func() { err = r.private.fs.processError(ctx, libkbfs.WriteMode, err) }()
return nil, libkbfs.NewWriteUnsupportedError(tlfhandle.BuildCanonicalPath(r.PathType(), req.Name))
} | go | func (r *Root) Mkdir(ctx context.Context, req *fuse.MkdirRequest) (_ fs.Node, err error) {
r.log().CDebugf(ctx, "FS Mkdir")
defer func() { err = r.private.fs.processError(ctx, libkbfs.WriteMode, err) }()
return nil, libkbfs.NewWriteUnsupportedError(tlfhandle.BuildCanonicalPath(r.PathType(), req.Name))
} | [
"func",
"(",
"r",
"*",
"Root",
")",
"Mkdir",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"*",
"fuse",
".",
"MkdirRequest",
")",
"(",
"_",
"fs",
".",
"Node",
",",
"err",
"error",
")",
"{",
"r",
".",
"log",
"(",
")",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"r",
".",
"private",
".",
"fs",
".",
"processError",
"(",
"ctx",
",",
"libkbfs",
".",
"WriteMode",
",",
"err",
")",
"}",
"(",
")",
"\n",
"return",
"nil",
",",
"libkbfs",
".",
"NewWriteUnsupportedError",
"(",
"tlfhandle",
".",
"BuildCanonicalPath",
"(",
"r",
".",
"PathType",
"(",
")",
",",
"req",
".",
"Name",
")",
")",
"\n",
"}"
] | // Mkdir implements the fs.NodeMkdirer interface for Root. | [
"Mkdir",
"implements",
"the",
"fs",
".",
"NodeMkdirer",
"interface",
"for",
"Root",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L524-L528 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.