id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequencelengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
sequencelengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
---|---|---|---|---|---|---|---|---|---|---|---|
161,000 | keybase/client | go/kbfs/libfuse/fs.go | ReadDirAll | func (r *Root) ReadDirAll(ctx context.Context) (res []fuse.Dirent, err error) {
r.log().CDebugf(ctx, "FS ReadDirAll")
defer func() { err = r.private.fs.processError(ctx, libkbfs.ReadMode, err) }()
res = []fuse.Dirent{
{
Type: fuse.DT_Dir,
Name: PrivateName,
},
{
Type: fuse.DT_Dir,
Name: PublicName,
},
fuse.Dirent{
Type: fuse.DT_Dir,
Name: TeamName,
},
}
if r.private.fs.platformParams.shouldAppendPlatformRootDirs() {
res = append(res, platformRootDirs...)
}
if name := r.private.fs.remoteStatus.ExtraFileName(); name != "" {
res = append(res, fuse.Dirent{Type: fuse.DT_File, Name: name})
}
return res, nil
} | go | func (r *Root) ReadDirAll(ctx context.Context) (res []fuse.Dirent, err error) {
r.log().CDebugf(ctx, "FS ReadDirAll")
defer func() { err = r.private.fs.processError(ctx, libkbfs.ReadMode, err) }()
res = []fuse.Dirent{
{
Type: fuse.DT_Dir,
Name: PrivateName,
},
{
Type: fuse.DT_Dir,
Name: PublicName,
},
fuse.Dirent{
Type: fuse.DT_Dir,
Name: TeamName,
},
}
if r.private.fs.platformParams.shouldAppendPlatformRootDirs() {
res = append(res, platformRootDirs...)
}
if name := r.private.fs.remoteStatus.ExtraFileName(); name != "" {
res = append(res, fuse.Dirent{Type: fuse.DT_File, Name: name})
}
return res, nil
} | [
"func",
"(",
"r",
"*",
"Root",
")",
"ReadDirAll",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"[",
"]",
"fuse",
".",
"Dirent",
",",
"err",
"error",
")",
"{",
"r",
".",
"log",
"(",
")",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"err",
"=",
"r",
".",
"private",
".",
"fs",
".",
"processError",
"(",
"ctx",
",",
"libkbfs",
".",
"ReadMode",
",",
"err",
")",
"}",
"(",
")",
"\n",
"res",
"=",
"[",
"]",
"fuse",
".",
"Dirent",
"{",
"{",
"Type",
":",
"fuse",
".",
"DT_Dir",
",",
"Name",
":",
"PrivateName",
",",
"}",
",",
"{",
"Type",
":",
"fuse",
".",
"DT_Dir",
",",
"Name",
":",
"PublicName",
",",
"}",
",",
"fuse",
".",
"Dirent",
"{",
"Type",
":",
"fuse",
".",
"DT_Dir",
",",
"Name",
":",
"TeamName",
",",
"}",
",",
"}",
"\n",
"if",
"r",
".",
"private",
".",
"fs",
".",
"platformParams",
".",
"shouldAppendPlatformRootDirs",
"(",
")",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"platformRootDirs",
"...",
")",
"\n",
"}",
"\n\n",
"if",
"name",
":=",
"r",
".",
"private",
".",
"fs",
".",
"remoteStatus",
".",
"ExtraFileName",
"(",
")",
";",
"name",
"!=",
"\"",
"\"",
"{",
"res",
"=",
"append",
"(",
"res",
",",
"fuse",
".",
"Dirent",
"{",
"Type",
":",
"fuse",
".",
"DT_File",
",",
"Name",
":",
"name",
"}",
")",
"\n",
"}",
"\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] | // ReadDirAll implements the ReadDirAll interface for Root. | [
"ReadDirAll",
"implements",
"the",
"ReadDirAll",
"interface",
"for",
"Root",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/fs.go#L535-L560 |
161,001 | keybase/client | go/kbfs/libkbfs/disk_quota_cache.go | getQuotaLocked | func (cache *DiskQuotaCacheLocal) getQuotaLocked(
id keybase1.UserOrTeamID, metered bool) (
info kbfsblock.QuotaInfo, err error) {
var hitMeter, missMeter *CountMeter
if metered {
hitMeter = cache.hitMeter
missMeter = cache.missMeter
}
quotaBytes, err := cache.db.GetWithMeter(
[]byte(id.String()), hitMeter, missMeter)
if err != nil {
return kbfsblock.QuotaInfo{}, err
}
err = cache.config.Codec().Decode(quotaBytes, &info)
if err != nil {
return kbfsblock.QuotaInfo{}, err
}
return info, nil
} | go | func (cache *DiskQuotaCacheLocal) getQuotaLocked(
id keybase1.UserOrTeamID, metered bool) (
info kbfsblock.QuotaInfo, err error) {
var hitMeter, missMeter *CountMeter
if metered {
hitMeter = cache.hitMeter
missMeter = cache.missMeter
}
quotaBytes, err := cache.db.GetWithMeter(
[]byte(id.String()), hitMeter, missMeter)
if err != nil {
return kbfsblock.QuotaInfo{}, err
}
err = cache.config.Codec().Decode(quotaBytes, &info)
if err != nil {
return kbfsblock.QuotaInfo{}, err
}
return info, nil
} | [
"func",
"(",
"cache",
"*",
"DiskQuotaCacheLocal",
")",
"getQuotaLocked",
"(",
"id",
"keybase1",
".",
"UserOrTeamID",
",",
"metered",
"bool",
")",
"(",
"info",
"kbfsblock",
".",
"QuotaInfo",
",",
"err",
"error",
")",
"{",
"var",
"hitMeter",
",",
"missMeter",
"*",
"CountMeter",
"\n",
"if",
"metered",
"{",
"hitMeter",
"=",
"cache",
".",
"hitMeter",
"\n",
"missMeter",
"=",
"cache",
".",
"missMeter",
"\n",
"}",
"\n\n",
"quotaBytes",
",",
"err",
":=",
"cache",
".",
"db",
".",
"GetWithMeter",
"(",
"[",
"]",
"byte",
"(",
"id",
".",
"String",
"(",
")",
")",
",",
"hitMeter",
",",
"missMeter",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbfsblock",
".",
"QuotaInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"err",
"=",
"cache",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Decode",
"(",
"quotaBytes",
",",
"&",
"info",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbfsblock",
".",
"QuotaInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"return",
"info",
",",
"nil",
"\n",
"}"
] | // getQuotaLocked retrieves the quota info for a block in the cache,
// or returns leveldb.ErrNotFound and a zero-valued metadata
// otherwise. | [
"getQuotaLocked",
"retrieves",
"the",
"quota",
"info",
"for",
"a",
"block",
"in",
"the",
"cache",
"or",
"returns",
"leveldb",
".",
"ErrNotFound",
"and",
"a",
"zero",
"-",
"valued",
"metadata",
"otherwise",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_quota_cache.go#L230-L249 |
161,002 | keybase/client | go/kbfs/libkbfs/disk_quota_cache.go | Get | func (cache *DiskQuotaCacheLocal) Get(
ctx context.Context, id keybase1.UserOrTeamID) (
info kbfsblock.QuotaInfo, err error) {
cache.lock.RLock()
defer cache.lock.RUnlock()
err = cache.checkCacheLocked(ctx, "Quota(Get)")
if err != nil {
return kbfsblock.QuotaInfo{}, err
}
return cache.getQuotaLocked(id, metered)
} | go | func (cache *DiskQuotaCacheLocal) Get(
ctx context.Context, id keybase1.UserOrTeamID) (
info kbfsblock.QuotaInfo, err error) {
cache.lock.RLock()
defer cache.lock.RUnlock()
err = cache.checkCacheLocked(ctx, "Quota(Get)")
if err != nil {
return kbfsblock.QuotaInfo{}, err
}
return cache.getQuotaLocked(id, metered)
} | [
"func",
"(",
"cache",
"*",
"DiskQuotaCacheLocal",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"keybase1",
".",
"UserOrTeamID",
")",
"(",
"info",
"kbfsblock",
".",
"QuotaInfo",
",",
"err",
"error",
")",
"{",
"cache",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"cache",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"err",
"=",
"cache",
".",
"checkCacheLocked",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"kbfsblock",
".",
"QuotaInfo",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"cache",
".",
"getQuotaLocked",
"(",
"id",
",",
"metered",
")",
"\n",
"}"
] | // Get implements the DiskQuotaCache interface for DiskQuotaCacheLocal. | [
"Get",
"implements",
"the",
"DiskQuotaCache",
"interface",
"for",
"DiskQuotaCacheLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_quota_cache.go#L285-L296 |
161,003 | keybase/client | go/kbfs/libkbfs/disk_quota_cache.go | Put | func (cache *DiskQuotaCacheLocal) Put(
ctx context.Context, id keybase1.UserOrTeamID,
info kbfsblock.QuotaInfo) (err error) {
cache.lock.Lock()
defer cache.lock.Unlock()
err = cache.checkCacheLocked(ctx, "Quota(Put)")
if err != nil {
return err
}
encodedInfo, err := cache.config.Codec().Encode(&info)
if err != nil {
return err
}
err = cache.db.PutWithMeter(
[]byte(id.String()), encodedInfo, cache.putMeter)
if err != nil {
return err
}
cache.quotasCached[id] = true
return nil
} | go | func (cache *DiskQuotaCacheLocal) Put(
ctx context.Context, id keybase1.UserOrTeamID,
info kbfsblock.QuotaInfo) (err error) {
cache.lock.Lock()
defer cache.lock.Unlock()
err = cache.checkCacheLocked(ctx, "Quota(Put)")
if err != nil {
return err
}
encodedInfo, err := cache.config.Codec().Encode(&info)
if err != nil {
return err
}
err = cache.db.PutWithMeter(
[]byte(id.String()), encodedInfo, cache.putMeter)
if err != nil {
return err
}
cache.quotasCached[id] = true
return nil
} | [
"func",
"(",
"cache",
"*",
"DiskQuotaCacheLocal",
")",
"Put",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"keybase1",
".",
"UserOrTeamID",
",",
"info",
"kbfsblock",
".",
"QuotaInfo",
")",
"(",
"err",
"error",
")",
"{",
"cache",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"cache",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"err",
"=",
"cache",
".",
"checkCacheLocked",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"encodedInfo",
",",
"err",
":=",
"cache",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Encode",
"(",
"&",
"info",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"err",
"=",
"cache",
".",
"db",
".",
"PutWithMeter",
"(",
"[",
"]",
"byte",
"(",
"id",
".",
"String",
"(",
")",
")",
",",
"encodedInfo",
",",
"cache",
".",
"putMeter",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"cache",
".",
"quotasCached",
"[",
"id",
"]",
"=",
"true",
"\n",
"return",
"nil",
"\n",
"}"
] | // Put implements the DiskQuotaCache interface for DiskQuotaCacheLocal. | [
"Put",
"implements",
"the",
"DiskQuotaCache",
"interface",
"for",
"DiskQuotaCacheLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_quota_cache.go#L299-L322 |
161,004 | keybase/client | go/kbfs/libkbfs/disk_quota_cache.go | Status | func (cache *DiskQuotaCacheLocal) Status(_ context.Context) DiskQuotaCacheStatus {
select {
case <-cache.startedCh:
case <-cache.startErrCh:
return DiskQuotaCacheStatus{StartState: DiskQuotaCacheStartStateFailed}
default:
return DiskQuotaCacheStatus{StartState: DiskQuotaCacheStartStateStarting}
}
cache.lock.RLock()
defer cache.lock.RUnlock()
return DiskQuotaCacheStatus{
StartState: DiskQuotaCacheStartStateStarted,
NumQuotas: uint64(len(cache.quotasCached)),
Hits: rateMeterToStatus(cache.hitMeter),
Misses: rateMeterToStatus(cache.missMeter),
Puts: rateMeterToStatus(cache.putMeter),
}
} | go | func (cache *DiskQuotaCacheLocal) Status(_ context.Context) DiskQuotaCacheStatus {
select {
case <-cache.startedCh:
case <-cache.startErrCh:
return DiskQuotaCacheStatus{StartState: DiskQuotaCacheStartStateFailed}
default:
return DiskQuotaCacheStatus{StartState: DiskQuotaCacheStartStateStarting}
}
cache.lock.RLock()
defer cache.lock.RUnlock()
return DiskQuotaCacheStatus{
StartState: DiskQuotaCacheStartStateStarted,
NumQuotas: uint64(len(cache.quotasCached)),
Hits: rateMeterToStatus(cache.hitMeter),
Misses: rateMeterToStatus(cache.missMeter),
Puts: rateMeterToStatus(cache.putMeter),
}
} | [
"func",
"(",
"cache",
"*",
"DiskQuotaCacheLocal",
")",
"Status",
"(",
"_",
"context",
".",
"Context",
")",
"DiskQuotaCacheStatus",
"{",
"select",
"{",
"case",
"<-",
"cache",
".",
"startedCh",
":",
"case",
"<-",
"cache",
".",
"startErrCh",
":",
"return",
"DiskQuotaCacheStatus",
"{",
"StartState",
":",
"DiskQuotaCacheStartStateFailed",
"}",
"\n",
"default",
":",
"return",
"DiskQuotaCacheStatus",
"{",
"StartState",
":",
"DiskQuotaCacheStartStateStarting",
"}",
"\n",
"}",
"\n\n",
"cache",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"cache",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n\n",
"return",
"DiskQuotaCacheStatus",
"{",
"StartState",
":",
"DiskQuotaCacheStartStateStarted",
",",
"NumQuotas",
":",
"uint64",
"(",
"len",
"(",
"cache",
".",
"quotasCached",
")",
")",
",",
"Hits",
":",
"rateMeterToStatus",
"(",
"cache",
".",
"hitMeter",
")",
",",
"Misses",
":",
"rateMeterToStatus",
"(",
"cache",
".",
"missMeter",
")",
",",
"Puts",
":",
"rateMeterToStatus",
"(",
"cache",
".",
"putMeter",
")",
",",
"}",
"\n",
"}"
] | // Status implements the DiskQuotaCache interface for DiskQuotaCacheLocal. | [
"Status",
"implements",
"the",
"DiskQuotaCache",
"interface",
"for",
"DiskQuotaCacheLocal",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/disk_quota_cache.go#L325-L344 |
161,005 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | NewBlockServerMeasured | func NewBlockServerMeasured(delegate BlockServer, r metrics.Registry) BlockServerMeasured {
getTimer := metrics.GetOrRegisterTimer("BlockServer.Get", r)
getEncodedSizeTimer := metrics.GetOrRegisterTimer(
"BlockServer.GetEncodedSize", r)
putTimer := metrics.GetOrRegisterTimer("BlockServer.Put", r)
addBlockReferenceTimer := metrics.GetOrRegisterTimer("BlockServer.AddBlockReference", r)
removeBlockReferencesTimer := metrics.GetOrRegisterTimer("BlockServer.RemoveBlockReferences", r)
archiveBlockReferencesTimer := metrics.GetOrRegisterTimer("BlockServer.ArchiveBlockReferences", r)
getLiveBlockReferencesTimer := metrics.GetOrRegisterTimer("BlockServer.GetLiveBlockReferences", r)
isUnflushedTimer := metrics.GetOrRegisterTimer("BlockServer.IsUnflushed", r)
return BlockServerMeasured{
delegate: delegate,
getTimer: getTimer,
getEncodedSizeTimer: getEncodedSizeTimer,
putTimer: putTimer,
addBlockReferenceTimer: addBlockReferenceTimer,
removeBlockReferencesTimer: removeBlockReferencesTimer,
archiveBlockReferencesTimer: archiveBlockReferencesTimer,
getLiveBlockReferencesTimer: getLiveBlockReferencesTimer,
isUnflushedTimer: isUnflushedTimer,
}
} | go | func NewBlockServerMeasured(delegate BlockServer, r metrics.Registry) BlockServerMeasured {
getTimer := metrics.GetOrRegisterTimer("BlockServer.Get", r)
getEncodedSizeTimer := metrics.GetOrRegisterTimer(
"BlockServer.GetEncodedSize", r)
putTimer := metrics.GetOrRegisterTimer("BlockServer.Put", r)
addBlockReferenceTimer := metrics.GetOrRegisterTimer("BlockServer.AddBlockReference", r)
removeBlockReferencesTimer := metrics.GetOrRegisterTimer("BlockServer.RemoveBlockReferences", r)
archiveBlockReferencesTimer := metrics.GetOrRegisterTimer("BlockServer.ArchiveBlockReferences", r)
getLiveBlockReferencesTimer := metrics.GetOrRegisterTimer("BlockServer.GetLiveBlockReferences", r)
isUnflushedTimer := metrics.GetOrRegisterTimer("BlockServer.IsUnflushed", r)
return BlockServerMeasured{
delegate: delegate,
getTimer: getTimer,
getEncodedSizeTimer: getEncodedSizeTimer,
putTimer: putTimer,
addBlockReferenceTimer: addBlockReferenceTimer,
removeBlockReferencesTimer: removeBlockReferencesTimer,
archiveBlockReferencesTimer: archiveBlockReferencesTimer,
getLiveBlockReferencesTimer: getLiveBlockReferencesTimer,
isUnflushedTimer: isUnflushedTimer,
}
} | [
"func",
"NewBlockServerMeasured",
"(",
"delegate",
"BlockServer",
",",
"r",
"metrics",
".",
"Registry",
")",
"BlockServerMeasured",
"{",
"getTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"getEncodedSizeTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"putTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"addBlockReferenceTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"removeBlockReferencesTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"archiveBlockReferencesTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"getLiveBlockReferencesTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"isUnflushedTimer",
":=",
"metrics",
".",
"GetOrRegisterTimer",
"(",
"\"",
"\"",
",",
"r",
")",
"\n",
"return",
"BlockServerMeasured",
"{",
"delegate",
":",
"delegate",
",",
"getTimer",
":",
"getTimer",
",",
"getEncodedSizeTimer",
":",
"getEncodedSizeTimer",
",",
"putTimer",
":",
"putTimer",
",",
"addBlockReferenceTimer",
":",
"addBlockReferenceTimer",
",",
"removeBlockReferencesTimer",
":",
"removeBlockReferencesTimer",
",",
"archiveBlockReferencesTimer",
":",
"archiveBlockReferencesTimer",
",",
"getLiveBlockReferencesTimer",
":",
"getLiveBlockReferencesTimer",
",",
"isUnflushedTimer",
":",
"isUnflushedTimer",
",",
"}",
"\n",
"}"
] | // NewBlockServerMeasured creates and returns a new
// BlockServerMeasured instance with the given delegate and registry. | [
"NewBlockServerMeasured",
"creates",
"and",
"returns",
"a",
"new",
"BlockServerMeasured",
"instance",
"with",
"the",
"given",
"delegate",
"and",
"registry",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L35-L56 |
161,006 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | Get | func (b BlockServerMeasured) Get(
ctx context.Context, tlfID tlf.ID, id kbfsblock.ID,
context kbfsblock.Context, cacheType DiskBlockCacheType) (
buf []byte, serverHalf kbfscrypto.BlockCryptKeyServerHalf, err error) {
b.getTimer.Time(func() {
buf, serverHalf, err = b.delegate.Get(
ctx, tlfID, id, context, cacheType)
})
return buf, serverHalf, err
} | go | func (b BlockServerMeasured) Get(
ctx context.Context, tlfID tlf.ID, id kbfsblock.ID,
context kbfsblock.Context, cacheType DiskBlockCacheType) (
buf []byte, serverHalf kbfscrypto.BlockCryptKeyServerHalf, err error) {
b.getTimer.Time(func() {
buf, serverHalf, err = b.delegate.Get(
ctx, tlfID, id, context, cacheType)
})
return buf, serverHalf, err
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"id",
"kbfsblock",
".",
"ID",
",",
"context",
"kbfsblock",
".",
"Context",
",",
"cacheType",
"DiskBlockCacheType",
")",
"(",
"buf",
"[",
"]",
"byte",
",",
"serverHalf",
"kbfscrypto",
".",
"BlockCryptKeyServerHalf",
",",
"err",
"error",
")",
"{",
"b",
".",
"getTimer",
".",
"Time",
"(",
"func",
"(",
")",
"{",
"buf",
",",
"serverHalf",
",",
"err",
"=",
"b",
".",
"delegate",
".",
"Get",
"(",
"ctx",
",",
"tlfID",
",",
"id",
",",
"context",
",",
"cacheType",
")",
"\n",
"}",
")",
"\n",
"return",
"buf",
",",
"serverHalf",
",",
"err",
"\n",
"}"
] | // Get implements the BlockServer interface for BlockServerMeasured. | [
"Get",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L59-L68 |
161,007 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | GetEncodedSize | func (b BlockServerMeasured) GetEncodedSize(
ctx context.Context, tlfID tlf.ID, id kbfsblock.ID,
context kbfsblock.Context) (
size uint32, status keybase1.BlockStatus, err error) {
b.getEncodedSizeTimer.Time(func() {
size, status, err = b.delegate.GetEncodedSize(ctx, tlfID, id, context)
})
return size, status, err
} | go | func (b BlockServerMeasured) GetEncodedSize(
ctx context.Context, tlfID tlf.ID, id kbfsblock.ID,
context kbfsblock.Context) (
size uint32, status keybase1.BlockStatus, err error) {
b.getEncodedSizeTimer.Time(func() {
size, status, err = b.delegate.GetEncodedSize(ctx, tlfID, id, context)
})
return size, status, err
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"GetEncodedSize",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"id",
"kbfsblock",
".",
"ID",
",",
"context",
"kbfsblock",
".",
"Context",
")",
"(",
"size",
"uint32",
",",
"status",
"keybase1",
".",
"BlockStatus",
",",
"err",
"error",
")",
"{",
"b",
".",
"getEncodedSizeTimer",
".",
"Time",
"(",
"func",
"(",
")",
"{",
"size",
",",
"status",
",",
"err",
"=",
"b",
".",
"delegate",
".",
"GetEncodedSize",
"(",
"ctx",
",",
"tlfID",
",",
"id",
",",
"context",
")",
"\n",
"}",
")",
"\n",
"return",
"size",
",",
"status",
",",
"err",
"\n",
"}"
] | // GetEncodedSize implements the BlockServer interface for BlockServerMeasured. | [
"GetEncodedSize",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L71-L79 |
161,008 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | AddBlockReference | func (b BlockServerMeasured) AddBlockReference(ctx context.Context, tlfID tlf.ID,
id kbfsblock.ID, context kbfsblock.Context) (err error) {
b.addBlockReferenceTimer.Time(func() {
err = b.delegate.AddBlockReference(ctx, tlfID, id, context)
})
return err
} | go | func (b BlockServerMeasured) AddBlockReference(ctx context.Context, tlfID tlf.ID,
id kbfsblock.ID, context kbfsblock.Context) (err error) {
b.addBlockReferenceTimer.Time(func() {
err = b.delegate.AddBlockReference(ctx, tlfID, id, context)
})
return err
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"AddBlockReference",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"id",
"kbfsblock",
".",
"ID",
",",
"context",
"kbfsblock",
".",
"Context",
")",
"(",
"err",
"error",
")",
"{",
"b",
".",
"addBlockReferenceTimer",
".",
"Time",
"(",
"func",
"(",
")",
"{",
"err",
"=",
"b",
".",
"delegate",
".",
"AddBlockReference",
"(",
"ctx",
",",
"tlfID",
",",
"id",
",",
"context",
")",
"\n",
"}",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // AddBlockReference implements the BlockServer interface for
// BlockServerMeasured. | [
"AddBlockReference",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L109-L115 |
161,009 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | RemoveBlockReferences | func (b BlockServerMeasured) RemoveBlockReferences(ctx context.Context,
tlfID tlf.ID, contexts kbfsblock.ContextMap) (
liveCounts map[kbfsblock.ID]int, err error) {
b.removeBlockReferencesTimer.Time(func() {
liveCounts, err = b.delegate.RemoveBlockReferences(
ctx, tlfID, contexts)
})
return liveCounts, err
} | go | func (b BlockServerMeasured) RemoveBlockReferences(ctx context.Context,
tlfID tlf.ID, contexts kbfsblock.ContextMap) (
liveCounts map[kbfsblock.ID]int, err error) {
b.removeBlockReferencesTimer.Time(func() {
liveCounts, err = b.delegate.RemoveBlockReferences(
ctx, tlfID, contexts)
})
return liveCounts, err
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"RemoveBlockReferences",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"contexts",
"kbfsblock",
".",
"ContextMap",
")",
"(",
"liveCounts",
"map",
"[",
"kbfsblock",
".",
"ID",
"]",
"int",
",",
"err",
"error",
")",
"{",
"b",
".",
"removeBlockReferencesTimer",
".",
"Time",
"(",
"func",
"(",
")",
"{",
"liveCounts",
",",
"err",
"=",
"b",
".",
"delegate",
".",
"RemoveBlockReferences",
"(",
"ctx",
",",
"tlfID",
",",
"contexts",
")",
"\n",
"}",
")",
"\n",
"return",
"liveCounts",
",",
"err",
"\n",
"}"
] | // RemoveBlockReferences implements the BlockServer interface for
// BlockServerMeasured. | [
"RemoveBlockReferences",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L119-L127 |
161,010 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | ArchiveBlockReferences | func (b BlockServerMeasured) ArchiveBlockReferences(ctx context.Context,
tlfID tlf.ID, contexts kbfsblock.ContextMap) (err error) {
b.archiveBlockReferencesTimer.Time(func() {
err = b.delegate.ArchiveBlockReferences(ctx, tlfID, contexts)
})
return err
} | go | func (b BlockServerMeasured) ArchiveBlockReferences(ctx context.Context,
tlfID tlf.ID, contexts kbfsblock.ContextMap) (err error) {
b.archiveBlockReferencesTimer.Time(func() {
err = b.delegate.ArchiveBlockReferences(ctx, tlfID, contexts)
})
return err
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"ArchiveBlockReferences",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"contexts",
"kbfsblock",
".",
"ContextMap",
")",
"(",
"err",
"error",
")",
"{",
"b",
".",
"archiveBlockReferencesTimer",
".",
"Time",
"(",
"func",
"(",
")",
"{",
"err",
"=",
"b",
".",
"delegate",
".",
"ArchiveBlockReferences",
"(",
"ctx",
",",
"tlfID",
",",
"contexts",
")",
"\n",
"}",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // ArchiveBlockReferences implements the BlockServer interface for
// BlockServerMeasured. | [
"ArchiveBlockReferences",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L131-L137 |
161,011 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | IsUnflushed | func (b BlockServerMeasured) IsUnflushed(ctx context.Context, tlfID tlf.ID,
id kbfsblock.ID) (isUnflushed bool, err error) {
b.isUnflushedTimer.Time(func() {
isUnflushed, err = b.delegate.IsUnflushed(ctx, tlfID, id)
})
return isUnflushed, err
} | go | func (b BlockServerMeasured) IsUnflushed(ctx context.Context, tlfID tlf.ID,
id kbfsblock.ID) (isUnflushed bool, err error) {
b.isUnflushedTimer.Time(func() {
isUnflushed, err = b.delegate.IsUnflushed(ctx, tlfID, id)
})
return isUnflushed, err
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"IsUnflushed",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"id",
"kbfsblock",
".",
"ID",
")",
"(",
"isUnflushed",
"bool",
",",
"err",
"error",
")",
"{",
"b",
".",
"isUnflushedTimer",
".",
"Time",
"(",
"func",
"(",
")",
"{",
"isUnflushed",
",",
"err",
"=",
"b",
".",
"delegate",
".",
"IsUnflushed",
"(",
"ctx",
",",
"tlfID",
",",
"id",
")",
"\n",
"}",
")",
"\n",
"return",
"isUnflushed",
",",
"err",
"\n\n",
"}"
] | // IsUnflushed implements the BlockServer interface for BlockServerMeasured. | [
"IsUnflushed",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L152-L159 |
161,012 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | Shutdown | func (b BlockServerMeasured) Shutdown(ctx context.Context) {
b.delegate.Shutdown(ctx)
} | go | func (b BlockServerMeasured) Shutdown(ctx context.Context) {
b.delegate.Shutdown(ctx)
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"Shutdown",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"b",
".",
"delegate",
".",
"Shutdown",
"(",
"ctx",
")",
"\n",
"}"
] | // Shutdown implements the BlockServer interface for
// BlockServerMeasured. | [
"Shutdown",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L163-L165 |
161,013 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | RefreshAuthToken | func (b BlockServerMeasured) RefreshAuthToken(ctx context.Context) {
b.delegate.RefreshAuthToken(ctx)
} | go | func (b BlockServerMeasured) RefreshAuthToken(ctx context.Context) {
b.delegate.RefreshAuthToken(ctx)
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"RefreshAuthToken",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"b",
".",
"delegate",
".",
"RefreshAuthToken",
"(",
"ctx",
")",
"\n",
"}"
] | // RefreshAuthToken implements the BlockServer interface for
// BlockServerMeasured. | [
"RefreshAuthToken",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L169-L171 |
161,014 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | GetUserQuotaInfo | func (b BlockServerMeasured) GetUserQuotaInfo(ctx context.Context) (info *kbfsblock.QuotaInfo, err error) {
return b.delegate.GetUserQuotaInfo(ctx)
} | go | func (b BlockServerMeasured) GetUserQuotaInfo(ctx context.Context) (info *kbfsblock.QuotaInfo, err error) {
return b.delegate.GetUserQuotaInfo(ctx)
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"GetUserQuotaInfo",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"info",
"*",
"kbfsblock",
".",
"QuotaInfo",
",",
"err",
"error",
")",
"{",
"return",
"b",
".",
"delegate",
".",
"GetUserQuotaInfo",
"(",
"ctx",
")",
"\n",
"}"
] | // GetUserQuotaInfo implements the BlockServer interface for BlockServerMeasured | [
"GetUserQuotaInfo",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L174-L176 |
161,015 | keybase/client | go/kbfs/libkbfs/bserver_measured.go | GetTeamQuotaInfo | func (b BlockServerMeasured) GetTeamQuotaInfo(
ctx context.Context, tid keybase1.TeamID) (
info *kbfsblock.QuotaInfo, err error) {
return b.delegate.GetTeamQuotaInfo(ctx, tid)
} | go | func (b BlockServerMeasured) GetTeamQuotaInfo(
ctx context.Context, tid keybase1.TeamID) (
info *kbfsblock.QuotaInfo, err error) {
return b.delegate.GetTeamQuotaInfo(ctx, tid)
} | [
"func",
"(",
"b",
"BlockServerMeasured",
")",
"GetTeamQuotaInfo",
"(",
"ctx",
"context",
".",
"Context",
",",
"tid",
"keybase1",
".",
"TeamID",
")",
"(",
"info",
"*",
"kbfsblock",
".",
"QuotaInfo",
",",
"err",
"error",
")",
"{",
"return",
"b",
".",
"delegate",
".",
"GetTeamQuotaInfo",
"(",
"ctx",
",",
"tid",
")",
"\n",
"}"
] | // GetTeamQuotaInfo implements the BlockServer interface for BlockServerMeasured | [
"GetTeamQuotaInfo",
"implements",
"the",
"BlockServer",
"interface",
"for",
"BlockServerMeasured"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/bserver_measured.go#L179-L183 |
161,016 | keybase/client | go/teams/implicit.go | attemptLoadImpteamAndConflict | func attemptLoadImpteamAndConflict(ctx context.Context, g *libkb.GlobalContext, impTeamName keybase1.ImplicitTeamDisplayName,
nameWithoutConflict string, preResolveDisplayName string, skipCache bool) (conflicts []keybase1.ImplicitTeamConflictInfo, teamID keybase1.TeamID, hitCache bool, err error) {
defer g.CTraceTimed(ctx,
fmt.Sprintf("attemptLoadImpteamAndConflict(impName=%q,woConflict=%q,preResolve=%q,skipCache=%t)", impTeamName, nameWithoutConflict, preResolveDisplayName, skipCache),
func() error { return err })()
imp, hitCache, err := loadImpteam(ctx, g, nameWithoutConflict, impTeamName.IsPublic, skipCache)
if err != nil {
return conflicts, teamID, hitCache, err
}
if len(imp.Conflicts) > 0 {
g.Log.CDebugf(ctx, "LookupImplicitTeam found %v conflicts", len(imp.Conflicts))
}
// We will use this team. Changed later if we selected a conflict.
var foundSelectedConflict bool
teamID = imp.TeamID
// We still need to iterate over Conflicts because we are returning parsed
// conflict list. So even if caller is not requesting a conflict team, go
// through this loop.
for i, conflict := range imp.Conflicts {
g.Log.CDebugf(ctx, "| checking conflict: %+v (iter %d)", conflict, i)
conflictInfo, err := conflict.parse()
if err != nil {
// warn, don't fail
g.Log.CDebugf(ctx, "LookupImplicitTeam got conflict suffix: %v", err)
err = nil
continue
}
conflicts = append(conflicts, *conflictInfo)
if conflictInfo == nil {
g.Log.CDebugf(ctx, "| got unexpected nil conflictInfo (iter %d)", i)
continue
}
g.Log.CDebugf(ctx, "| parsed conflict into conflictInfo: %+v", *conflictInfo)
if impTeamName.ConflictInfo != nil {
match := libkb.FormatImplicitTeamDisplayNameSuffix(*impTeamName.ConflictInfo) == libkb.FormatImplicitTeamDisplayNameSuffix(*conflictInfo)
if match {
teamID = conflict.TeamID
foundSelectedConflict = true
g.Log.CDebugf(ctx, "| found conflict suffix match: %v", teamID)
} else {
g.Log.CDebugf(ctx, "| conflict suffix didn't match (teamID %v)", conflict.TeamID)
}
}
}
if impTeamName.ConflictInfo != nil && !foundSelectedConflict {
// We got the team but didn't find the specific conflict requested.
return conflicts, teamID, hitCache, NewTeamDoesNotExistError(
impTeamName.IsPublic, "could not find team with suffix: %v", preResolveDisplayName)
}
return conflicts, teamID, hitCache, nil
} | go | func attemptLoadImpteamAndConflict(ctx context.Context, g *libkb.GlobalContext, impTeamName keybase1.ImplicitTeamDisplayName,
nameWithoutConflict string, preResolveDisplayName string, skipCache bool) (conflicts []keybase1.ImplicitTeamConflictInfo, teamID keybase1.TeamID, hitCache bool, err error) {
defer g.CTraceTimed(ctx,
fmt.Sprintf("attemptLoadImpteamAndConflict(impName=%q,woConflict=%q,preResolve=%q,skipCache=%t)", impTeamName, nameWithoutConflict, preResolveDisplayName, skipCache),
func() error { return err })()
imp, hitCache, err := loadImpteam(ctx, g, nameWithoutConflict, impTeamName.IsPublic, skipCache)
if err != nil {
return conflicts, teamID, hitCache, err
}
if len(imp.Conflicts) > 0 {
g.Log.CDebugf(ctx, "LookupImplicitTeam found %v conflicts", len(imp.Conflicts))
}
// We will use this team. Changed later if we selected a conflict.
var foundSelectedConflict bool
teamID = imp.TeamID
// We still need to iterate over Conflicts because we are returning parsed
// conflict list. So even if caller is not requesting a conflict team, go
// through this loop.
for i, conflict := range imp.Conflicts {
g.Log.CDebugf(ctx, "| checking conflict: %+v (iter %d)", conflict, i)
conflictInfo, err := conflict.parse()
if err != nil {
// warn, don't fail
g.Log.CDebugf(ctx, "LookupImplicitTeam got conflict suffix: %v", err)
err = nil
continue
}
conflicts = append(conflicts, *conflictInfo)
if conflictInfo == nil {
g.Log.CDebugf(ctx, "| got unexpected nil conflictInfo (iter %d)", i)
continue
}
g.Log.CDebugf(ctx, "| parsed conflict into conflictInfo: %+v", *conflictInfo)
if impTeamName.ConflictInfo != nil {
match := libkb.FormatImplicitTeamDisplayNameSuffix(*impTeamName.ConflictInfo) == libkb.FormatImplicitTeamDisplayNameSuffix(*conflictInfo)
if match {
teamID = conflict.TeamID
foundSelectedConflict = true
g.Log.CDebugf(ctx, "| found conflict suffix match: %v", teamID)
} else {
g.Log.CDebugf(ctx, "| conflict suffix didn't match (teamID %v)", conflict.TeamID)
}
}
}
if impTeamName.ConflictInfo != nil && !foundSelectedConflict {
// We got the team but didn't find the specific conflict requested.
return conflicts, teamID, hitCache, NewTeamDoesNotExistError(
impTeamName.IsPublic, "could not find team with suffix: %v", preResolveDisplayName)
}
return conflicts, teamID, hitCache, nil
} | [
"func",
"attemptLoadImpteamAndConflict",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"impTeamName",
"keybase1",
".",
"ImplicitTeamDisplayName",
",",
"nameWithoutConflict",
"string",
",",
"preResolveDisplayName",
"string",
",",
"skipCache",
"bool",
")",
"(",
"conflicts",
"[",
"]",
"keybase1",
".",
"ImplicitTeamConflictInfo",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"hitCache",
"bool",
",",
"err",
"error",
")",
"{",
"defer",
"g",
".",
"CTraceTimed",
"(",
"ctx",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"impTeamName",
",",
"nameWithoutConflict",
",",
"preResolveDisplayName",
",",
"skipCache",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n",
"imp",
",",
"hitCache",
",",
"err",
":=",
"loadImpteam",
"(",
"ctx",
",",
"g",
",",
"nameWithoutConflict",
",",
"impTeamName",
".",
"IsPublic",
",",
"skipCache",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"conflicts",
",",
"teamID",
",",
"hitCache",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"imp",
".",
"Conflicts",
")",
">",
"0",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"len",
"(",
"imp",
".",
"Conflicts",
")",
")",
"\n",
"}",
"\n",
"// We will use this team. Changed later if we selected a conflict.",
"var",
"foundSelectedConflict",
"bool",
"\n",
"teamID",
"=",
"imp",
".",
"TeamID",
"\n",
"// We still need to iterate over Conflicts because we are returning parsed",
"// conflict list. So even if caller is not requesting a conflict team, go",
"// through this loop.",
"for",
"i",
",",
"conflict",
":=",
"range",
"imp",
".",
"Conflicts",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"conflict",
",",
"i",
")",
"\n",
"conflictInfo",
",",
"err",
":=",
"conflict",
".",
"parse",
"(",
")",
"\n\n",
"if",
"err",
"!=",
"nil",
"{",
"// warn, don't fail",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"err",
"=",
"nil",
"\n",
"continue",
"\n",
"}",
"\n",
"conflicts",
"=",
"append",
"(",
"conflicts",
",",
"*",
"conflictInfo",
")",
"\n\n",
"if",
"conflictInfo",
"==",
"nil",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"i",
")",
"\n",
"continue",
"\n",
"}",
"\n\n",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"*",
"conflictInfo",
")",
"\n\n",
"if",
"impTeamName",
".",
"ConflictInfo",
"!=",
"nil",
"{",
"match",
":=",
"libkb",
".",
"FormatImplicitTeamDisplayNameSuffix",
"(",
"*",
"impTeamName",
".",
"ConflictInfo",
")",
"==",
"libkb",
".",
"FormatImplicitTeamDisplayNameSuffix",
"(",
"*",
"conflictInfo",
")",
"\n",
"if",
"match",
"{",
"teamID",
"=",
"conflict",
".",
"TeamID",
"\n",
"foundSelectedConflict",
"=",
"true",
"\n",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"teamID",
")",
"\n",
"}",
"else",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"conflict",
".",
"TeamID",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"impTeamName",
".",
"ConflictInfo",
"!=",
"nil",
"&&",
"!",
"foundSelectedConflict",
"{",
"// We got the team but didn't find the specific conflict requested.",
"return",
"conflicts",
",",
"teamID",
",",
"hitCache",
",",
"NewTeamDoesNotExistError",
"(",
"impTeamName",
".",
"IsPublic",
",",
"\"",
"\"",
",",
"preResolveDisplayName",
")",
"\n",
"}",
"\n",
"return",
"conflicts",
",",
"teamID",
",",
"hitCache",
",",
"nil",
"\n",
"}"
] | // attemptLoadImpteamAndConflits attempts to lead the implicit team with
// conflict, but it might find the team but not the specific conflict if the
// conflict was not in cache. This can be detected with `hitCache` return
// value, and mitigated by passing skipCache=false argument. | [
"attemptLoadImpteamAndConflits",
"attempts",
"to",
"lead",
"the",
"implicit",
"team",
"with",
"conflict",
"but",
"it",
"might",
"find",
"the",
"team",
"but",
"not",
"the",
"specific",
"conflict",
"if",
"the",
"conflict",
"was",
"not",
"in",
"cache",
".",
"This",
"can",
"be",
"detected",
"with",
"hitCache",
"return",
"value",
"and",
"mitigated",
"by",
"passing",
"skipCache",
"=",
"false",
"argument",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/implicit.go#L121-L176 |
161,017 | keybase/client | go/teams/implicit.go | LookupOrCreateImplicitTeam | func LookupOrCreateImplicitTeam(ctx context.Context, g *libkb.GlobalContext, displayName string, public bool) (res *Team, teamName keybase1.TeamName, impTeamName keybase1.ImplicitTeamDisplayName, err error) {
defer g.CTraceTimed(ctx, fmt.Sprintf("LookupOrCreateImplicitTeam(%v)", displayName),
func() error { return err })()
lookupName, err := ResolveImplicitTeamDisplayName(ctx, g, displayName, public)
if err != nil {
return res, teamName, impTeamName, err
}
res, teamName, impTeamName, _, err = lookupImplicitTeamAndConflicts(ctx, g, displayName, lookupName, ImplicitTeamOptions{})
if err != nil {
if _, ok := err.(TeamDoesNotExistError); ok {
if lookupName.ConflictInfo != nil {
// Don't create it if a conflict is specified.
// Unlikely a caller would know the conflict info if it didn't exist.
return res, teamName, impTeamName, err
}
// If the team does not exist, then let's create it
impTeamName = lookupName
var teamID keybase1.TeamID
teamID, teamName, err = CreateImplicitTeam(ctx, g, impTeamName)
if err != nil {
if isDupImplicitTeamError(ctx, err) {
g.Log.CDebugf(ctx, "LookupOrCreateImplicitTeam: duplicate team, trying to lookup again: err: %s", err)
res, teamName, impTeamName, _, err = lookupImplicitTeamAndConflicts(ctx, g, displayName,
lookupName, ImplicitTeamOptions{})
}
return res, teamName, impTeamName, err
}
res, err = Load(ctx, g, keybase1.LoadTeamArg{
ID: teamID,
Public: impTeamName.IsPublic,
ForceRepoll: true,
})
return res, teamName, impTeamName, err
}
return res, teamName, impTeamName, err
}
return res, teamName, impTeamName, nil
} | go | func LookupOrCreateImplicitTeam(ctx context.Context, g *libkb.GlobalContext, displayName string, public bool) (res *Team, teamName keybase1.TeamName, impTeamName keybase1.ImplicitTeamDisplayName, err error) {
defer g.CTraceTimed(ctx, fmt.Sprintf("LookupOrCreateImplicitTeam(%v)", displayName),
func() error { return err })()
lookupName, err := ResolveImplicitTeamDisplayName(ctx, g, displayName, public)
if err != nil {
return res, teamName, impTeamName, err
}
res, teamName, impTeamName, _, err = lookupImplicitTeamAndConflicts(ctx, g, displayName, lookupName, ImplicitTeamOptions{})
if err != nil {
if _, ok := err.(TeamDoesNotExistError); ok {
if lookupName.ConflictInfo != nil {
// Don't create it if a conflict is specified.
// Unlikely a caller would know the conflict info if it didn't exist.
return res, teamName, impTeamName, err
}
// If the team does not exist, then let's create it
impTeamName = lookupName
var teamID keybase1.TeamID
teamID, teamName, err = CreateImplicitTeam(ctx, g, impTeamName)
if err != nil {
if isDupImplicitTeamError(ctx, err) {
g.Log.CDebugf(ctx, "LookupOrCreateImplicitTeam: duplicate team, trying to lookup again: err: %s", err)
res, teamName, impTeamName, _, err = lookupImplicitTeamAndConflicts(ctx, g, displayName,
lookupName, ImplicitTeamOptions{})
}
return res, teamName, impTeamName, err
}
res, err = Load(ctx, g, keybase1.LoadTeamArg{
ID: teamID,
Public: impTeamName.IsPublic,
ForceRepoll: true,
})
return res, teamName, impTeamName, err
}
return res, teamName, impTeamName, err
}
return res, teamName, impTeamName, nil
} | [
"func",
"LookupOrCreateImplicitTeam",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"displayName",
"string",
",",
"public",
"bool",
")",
"(",
"res",
"*",
"Team",
",",
"teamName",
"keybase1",
".",
"TeamName",
",",
"impTeamName",
"keybase1",
".",
"ImplicitTeamDisplayName",
",",
"err",
"error",
")",
"{",
"defer",
"g",
".",
"CTraceTimed",
"(",
"ctx",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"displayName",
")",
",",
"func",
"(",
")",
"error",
"{",
"return",
"err",
"}",
")",
"(",
")",
"\n",
"lookupName",
",",
"err",
":=",
"ResolveImplicitTeamDisplayName",
"(",
"ctx",
",",
"g",
",",
"displayName",
",",
"public",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"err",
"\n",
"}",
"\n\n",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"_",
",",
"err",
"=",
"lookupImplicitTeamAndConflicts",
"(",
"ctx",
",",
"g",
",",
"displayName",
",",
"lookupName",
",",
"ImplicitTeamOptions",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"TeamDoesNotExistError",
")",
";",
"ok",
"{",
"if",
"lookupName",
".",
"ConflictInfo",
"!=",
"nil",
"{",
"// Don't create it if a conflict is specified.",
"// Unlikely a caller would know the conflict info if it didn't exist.",
"return",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"err",
"\n",
"}",
"\n",
"// If the team does not exist, then let's create it",
"impTeamName",
"=",
"lookupName",
"\n",
"var",
"teamID",
"keybase1",
".",
"TeamID",
"\n",
"teamID",
",",
"teamName",
",",
"err",
"=",
"CreateImplicitTeam",
"(",
"ctx",
",",
"g",
",",
"impTeamName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"isDupImplicitTeamError",
"(",
"ctx",
",",
"err",
")",
"{",
"g",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"_",
",",
"err",
"=",
"lookupImplicitTeamAndConflicts",
"(",
"ctx",
",",
"g",
",",
"displayName",
",",
"lookupName",
",",
"ImplicitTeamOptions",
"{",
"}",
")",
"\n",
"}",
"\n",
"return",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"err",
"\n",
"}",
"\n",
"res",
",",
"err",
"=",
"Load",
"(",
"ctx",
",",
"g",
",",
"keybase1",
".",
"LoadTeamArg",
"{",
"ID",
":",
"teamID",
",",
"Public",
":",
"impTeamName",
".",
"IsPublic",
",",
"ForceRepoll",
":",
"true",
",",
"}",
")",
"\n",
"return",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"err",
"\n",
"}",
"\n",
"return",
"res",
",",
"teamName",
",",
"impTeamName",
",",
"nil",
"\n",
"}"
] | // LookupOrCreateImplicitTeam by name like "alice,bob+bob@twitter (conflicted copy 2017-03-04 #1)"
// Resolves social assertions. | [
"LookupOrCreateImplicitTeam",
"by",
"name",
"like",
"alice",
"bob",
"+",
"bob"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/implicit.go#L257-L295 |
161,018 | keybase/client | go/teams/implicit.go | FormatImplicitTeamDisplayNameWithUserFront | func FormatImplicitTeamDisplayNameWithUserFront(ctx context.Context, g *libkb.GlobalContext, impTeamName keybase1.ImplicitTeamDisplayName, frontName libkb.NormalizedUsername) (string, error) {
return formatImplicitTeamDisplayNameCommon(ctx, g, impTeamName, &frontName)
} | go | func FormatImplicitTeamDisplayNameWithUserFront(ctx context.Context, g *libkb.GlobalContext, impTeamName keybase1.ImplicitTeamDisplayName, frontName libkb.NormalizedUsername) (string, error) {
return formatImplicitTeamDisplayNameCommon(ctx, g, impTeamName, &frontName)
} | [
"func",
"FormatImplicitTeamDisplayNameWithUserFront",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"impTeamName",
"keybase1",
".",
"ImplicitTeamDisplayName",
",",
"frontName",
"libkb",
".",
"NormalizedUsername",
")",
"(",
"string",
",",
"error",
")",
"{",
"return",
"formatImplicitTeamDisplayNameCommon",
"(",
"ctx",
",",
"g",
",",
"impTeamName",
",",
"&",
"frontName",
")",
"\n",
"}"
] | // Format an implicit display name, but order the specified username first in each of the writer and reader lists if it appears. | [
"Format",
"an",
"implicit",
"display",
"name",
"but",
"order",
"the",
"specified",
"username",
"first",
"in",
"each",
"of",
"the",
"writer",
"and",
"reader",
"lists",
"if",
"it",
"appears",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/implicit.go#L302-L304 |
161,019 | keybase/client | go/teams/implicit.go | sortStringsFront | func sortStringsFront(ss []string, front string) {
sort.Slice(ss, func(i, j int) bool {
a := ss[i]
b := ss[j]
if a == front {
return true
}
if b == front {
return false
}
return a < b
})
} | go | func sortStringsFront(ss []string, front string) {
sort.Slice(ss, func(i, j int) bool {
a := ss[i]
b := ss[j]
if a == front {
return true
}
if b == front {
return false
}
return a < b
})
} | [
"func",
"sortStringsFront",
"(",
"ss",
"[",
"]",
"string",
",",
"front",
"string",
")",
"{",
"sort",
".",
"Slice",
"(",
"ss",
",",
"func",
"(",
"i",
",",
"j",
"int",
")",
"bool",
"{",
"a",
":=",
"ss",
"[",
"i",
"]",
"\n",
"b",
":=",
"ss",
"[",
"j",
"]",
"\n",
"if",
"a",
"==",
"front",
"{",
"return",
"true",
"\n",
"}",
"\n",
"if",
"b",
"==",
"front",
"{",
"return",
"false",
"\n",
"}",
"\n",
"return",
"a",
"<",
"b",
"\n",
"}",
")",
"\n",
"}"
] | // Sort a list of strings but order `front` in front IF it appears. | [
"Sort",
"a",
"list",
"of",
"strings",
"but",
"order",
"front",
"in",
"front",
"IF",
"it",
"appears",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/implicit.go#L346-L358 |
161,020 | keybase/client | go/protocol/keybase1/kbfs.go | FSEditList | func (c KbfsClient) FSEditList(ctx context.Context, __arg FSEditListArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSEditList", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) FSEditList(ctx context.Context, __arg FSEditListArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSEditList", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"FSEditList",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"FSEditListArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // kbfs calls this as a response to receiving an FSEditListRequest with a
// given requestID. | [
"kbfs",
"calls",
"this",
"as",
"a",
"response",
"to",
"receiving",
"an",
"FSEditListRequest",
"with",
"a",
"given",
"requestID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L330-L333 |
161,021 | keybase/client | go/protocol/keybase1/kbfs.go | FSSyncStatus | func (c KbfsClient) FSSyncStatus(ctx context.Context, __arg FSSyncStatusArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSSyncStatus", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) FSSyncStatus(ctx context.Context, __arg FSSyncStatusArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSSyncStatus", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"FSSyncStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"FSSyncStatusArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // FSSyncStatus is called by KBFS as a response to receiving an
// FSSyncStatusRequest with a given requestID. | [
"FSSyncStatus",
"is",
"called",
"by",
"KBFS",
"as",
"a",
"response",
"to",
"receiving",
"an",
"FSSyncStatusRequest",
"with",
"a",
"given",
"requestID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L337-L340 |
161,022 | keybase/client | go/protocol/keybase1/kbfs.go | FSSyncEvent | func (c KbfsClient) FSSyncEvent(ctx context.Context, event FSPathSyncStatus) (err error) {
__arg := FSSyncEventArg{Event: event}
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSSyncEvent", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) FSSyncEvent(ctx context.Context, event FSPathSyncStatus) (err error) {
__arg := FSSyncEventArg{Event: event}
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSSyncEvent", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"FSSyncEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"event",
"FSPathSyncStatus",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"FSSyncEventArg",
"{",
"Event",
":",
"event",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // FSSyncEvent is called by KBFS when the sync status of an individual path
// changes. | [
"FSSyncEvent",
"is",
"called",
"by",
"KBFS",
"when",
"the",
"sync",
"status",
"of",
"an",
"individual",
"path",
"changes",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L344-L348 |
161,023 | keybase/client | go/protocol/keybase1/kbfs.go | FSOverallSyncEvent | func (c KbfsClient) FSOverallSyncEvent(ctx context.Context, status FolderSyncStatus) (err error) {
__arg := FSOverallSyncEventArg{Status: status}
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSOverallSyncEvent", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) FSOverallSyncEvent(ctx context.Context, status FolderSyncStatus) (err error) {
__arg := FSOverallSyncEventArg{Status: status}
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSOverallSyncEvent", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"FSOverallSyncEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"status",
"FolderSyncStatus",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"FSOverallSyncEventArg",
"{",
"Status",
":",
"status",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // FSOverallSyncEvent is called by KBFS when the overall sync status
// changes. | [
"FSOverallSyncEvent",
"is",
"called",
"by",
"KBFS",
"when",
"the",
"overall",
"sync",
"status",
"changes",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L352-L356 |
161,024 | keybase/client | go/protocol/keybase1/kbfs.go | FSOnlineStatusChangedEvent | func (c KbfsClient) FSOnlineStatusChangedEvent(ctx context.Context, online bool) (err error) {
__arg := FSOnlineStatusChangedEventArg{Online: online}
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSOnlineStatusChangedEvent", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) FSOnlineStatusChangedEvent(ctx context.Context, online bool) (err error) {
__arg := FSOnlineStatusChangedEventArg{Online: online}
err = c.Cli.Call(ctx, "keybase.1.kbfs.FSOnlineStatusChangedEvent", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"FSOnlineStatusChangedEvent",
"(",
"ctx",
"context",
".",
"Context",
",",
"online",
"bool",
")",
"(",
"err",
"error",
")",
"{",
"__arg",
":=",
"FSOnlineStatusChangedEventArg",
"{",
"Online",
":",
"online",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // FSOnlineStatusChangedEvent is called by KBFS when the online status changes. | [
"FSOnlineStatusChangedEvent",
"is",
"called",
"by",
"KBFS",
"when",
"the",
"online",
"status",
"changes",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L359-L363 |
161,025 | keybase/client | go/protocol/keybase1/kbfs.go | CreateTLF | func (c KbfsClient) CreateTLF(ctx context.Context, __arg CreateTLFArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.createTLF", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) CreateTLF(ctx context.Context, __arg CreateTLFArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.createTLF", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"CreateTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"CreateTLFArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // createTLF is called by KBFS to associate the tlfID with the given teamID,
// using the v2 Team-based system. | [
"createTLF",
"is",
"called",
"by",
"KBFS",
"to",
"associate",
"the",
"tlfID",
"with",
"the",
"given",
"teamID",
"using",
"the",
"v2",
"Team",
"-",
"based",
"system",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L367-L370 |
161,026 | keybase/client | go/protocol/keybase1/kbfs.go | GetKBFSTeamSettings | func (c KbfsClient) GetKBFSTeamSettings(ctx context.Context, __arg GetKBFSTeamSettingsArg) (res KBFSTeamSettings, err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.getKBFSTeamSettings", []interface{}{__arg}, &res)
return
} | go | func (c KbfsClient) GetKBFSTeamSettings(ctx context.Context, __arg GetKBFSTeamSettingsArg) (res KBFSTeamSettings, err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.getKBFSTeamSettings", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"GetKBFSTeamSettings",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"GetKBFSTeamSettingsArg",
")",
"(",
"res",
"KBFSTeamSettings",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // getKBFSTeamSettings gets the settings written for the team in the team's sigchain. | [
"getKBFSTeamSettings",
"gets",
"the",
"settings",
"written",
"for",
"the",
"team",
"in",
"the",
"team",
"s",
"sigchain",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L373-L376 |
161,027 | keybase/client | go/protocol/keybase1/kbfs.go | UpgradeTLF | func (c KbfsClient) UpgradeTLF(ctx context.Context, __arg UpgradeTLFArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.upgradeTLF", []interface{}{__arg}, nil)
return
} | go | func (c KbfsClient) UpgradeTLF(ctx context.Context, __arg UpgradeTLFArg) (err error) {
err = c.Cli.Call(ctx, "keybase.1.kbfs.upgradeTLF", []interface{}{__arg}, nil)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"UpgradeTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"UpgradeTLFArg",
")",
"(",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"nil",
")",
"\n",
"return",
"\n",
"}"
] | // upgradeTLF upgrades a TLF to use implicit team keys | [
"upgradeTLF",
"upgrades",
"a",
"TLF",
"to",
"use",
"implicit",
"team",
"keys"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L379-L382 |
161,028 | keybase/client | go/protocol/keybase1/kbfs.go | EncryptFavorites | func (c KbfsClient) EncryptFavorites(ctx context.Context, dataToEncrypt []byte) (res []byte, err error) {
__arg := EncryptFavoritesArg{DataToEncrypt: dataToEncrypt}
err = c.Cli.Call(ctx, "keybase.1.kbfs.encryptFavorites", []interface{}{__arg}, &res)
return
} | go | func (c KbfsClient) EncryptFavorites(ctx context.Context, dataToEncrypt []byte) (res []byte, err error) {
__arg := EncryptFavoritesArg{DataToEncrypt: dataToEncrypt}
err = c.Cli.Call(ctx, "keybase.1.kbfs.encryptFavorites", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"EncryptFavorites",
"(",
"ctx",
"context",
".",
"Context",
",",
"dataToEncrypt",
"[",
"]",
"byte",
")",
"(",
"res",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"EncryptFavoritesArg",
"{",
"DataToEncrypt",
":",
"dataToEncrypt",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Encrypt cached favorites to store on disk. | [
"Encrypt",
"cached",
"favorites",
"to",
"store",
"on",
"disk",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L385-L389 |
161,029 | keybase/client | go/protocol/keybase1/kbfs.go | DecryptFavorites | func (c KbfsClient) DecryptFavorites(ctx context.Context, dataToEncrypt []byte) (res []byte, err error) {
__arg := DecryptFavoritesArg{DataToEncrypt: dataToEncrypt}
err = c.Cli.Call(ctx, "keybase.1.kbfs.decryptFavorites", []interface{}{__arg}, &res)
return
} | go | func (c KbfsClient) DecryptFavorites(ctx context.Context, dataToEncrypt []byte) (res []byte, err error) {
__arg := DecryptFavoritesArg{DataToEncrypt: dataToEncrypt}
err = c.Cli.Call(ctx, "keybase.1.kbfs.decryptFavorites", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"KbfsClient",
")",
"DecryptFavorites",
"(",
"ctx",
"context",
".",
"Context",
",",
"dataToEncrypt",
"[",
"]",
"byte",
")",
"(",
"res",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"__arg",
":=",
"DecryptFavoritesArg",
"{",
"DataToEncrypt",
":",
"dataToEncrypt",
"}",
"\n",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
"\"",
",",
"[",
"]",
"interface",
"{",
"}",
"{",
"__arg",
"}",
",",
"&",
"res",
")",
"\n",
"return",
"\n",
"}"
] | // Decrypt cached favorites stored on disk. | [
"Decrypt",
"cached",
"favorites",
"stored",
"on",
"disk",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/kbfs.go#L392-L396 |
161,030 | keybase/client | go/qrcode/qrcode.go | Encode | func Encode(data []byte) (*Encodings, error) {
code, err := qr.Encode(string(data), qr.L)
if err != nil {
return nil, err
}
var result Encodings
result.PNG = code.PNG()
result.Terminal = terminal(code)
result.ASCII = ascii(code)
return &result, nil
} | go | func Encode(data []byte) (*Encodings, error) {
code, err := qr.Encode(string(data), qr.L)
if err != nil {
return nil, err
}
var result Encodings
result.PNG = code.PNG()
result.Terminal = terminal(code)
result.ASCII = ascii(code)
return &result, nil
} | [
"func",
"Encode",
"(",
"data",
"[",
"]",
"byte",
")",
"(",
"*",
"Encodings",
",",
"error",
")",
"{",
"code",
",",
"err",
":=",
"qr",
".",
"Encode",
"(",
"string",
"(",
"data",
")",
",",
"qr",
".",
"L",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"result",
"Encodings",
"\n",
"result",
".",
"PNG",
"=",
"code",
".",
"PNG",
"(",
")",
"\n",
"result",
".",
"Terminal",
"=",
"terminal",
"(",
"code",
")",
"\n",
"result",
".",
"ASCII",
"=",
"ascii",
"(",
"code",
")",
"\n\n",
"return",
"&",
"result",
",",
"nil",
"\n",
"}"
] | // Encode makes a QR code out of data and encodes it into three
// different representations. | [
"Encode",
"makes",
"a",
"QR",
"code",
"out",
"of",
"data",
"and",
"encodes",
"it",
"into",
"three",
"different",
"representations",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/qrcode/qrcode.go#L24-L36 |
161,031 | keybase/client | go/kbfs/libkbfs/block_retrieval_worker.go | run | func (brw *blockRetrievalWorker) run() {
defer close(brw.doneCh)
for {
err := brw.HandleRequest()
// Only io.EOF is relevant to the loop; other errors are handled in
// FinalizeRequest
if err == io.EOF {
return
}
}
} | go | func (brw *blockRetrievalWorker) run() {
defer close(brw.doneCh)
for {
err := brw.HandleRequest()
// Only io.EOF is relevant to the loop; other errors are handled in
// FinalizeRequest
if err == io.EOF {
return
}
}
} | [
"func",
"(",
"brw",
"*",
"blockRetrievalWorker",
")",
"run",
"(",
")",
"{",
"defer",
"close",
"(",
"brw",
".",
"doneCh",
")",
"\n",
"for",
"{",
"err",
":=",
"brw",
".",
"HandleRequest",
"(",
")",
"\n",
"// Only io.EOF is relevant to the loop; other errors are handled in",
"// FinalizeRequest",
"if",
"err",
"==",
"io",
".",
"EOF",
"{",
"return",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // run runs the worker loop until Shutdown is called | [
"run",
"runs",
"the",
"worker",
"loop",
"until",
"Shutdown",
"is",
"called"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/block_retrieval_worker.go#L24-L34 |
161,032 | keybase/client | go/kbfs/libkbfs/block_retrieval_worker.go | newBlockRetrievalWorker | func newBlockRetrievalWorker(bg blockGetter, q *blockRetrievalQueue,
workCh channels.Channel) *blockRetrievalWorker {
brw := &blockRetrievalWorker{
blockGetter: bg,
stopCh: make(chan struct{}),
doneCh: make(chan struct{}),
queue: q,
workCh: workCh,
}
go brw.run()
return brw
} | go | func newBlockRetrievalWorker(bg blockGetter, q *blockRetrievalQueue,
workCh channels.Channel) *blockRetrievalWorker {
brw := &blockRetrievalWorker{
blockGetter: bg,
stopCh: make(chan struct{}),
doneCh: make(chan struct{}),
queue: q,
workCh: workCh,
}
go brw.run()
return brw
} | [
"func",
"newBlockRetrievalWorker",
"(",
"bg",
"blockGetter",
",",
"q",
"*",
"blockRetrievalQueue",
",",
"workCh",
"channels",
".",
"Channel",
")",
"*",
"blockRetrievalWorker",
"{",
"brw",
":=",
"&",
"blockRetrievalWorker",
"{",
"blockGetter",
":",
"bg",
",",
"stopCh",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
",",
"doneCh",
":",
"make",
"(",
"chan",
"struct",
"{",
"}",
")",
",",
"queue",
":",
"q",
",",
"workCh",
":",
"workCh",
",",
"}",
"\n",
"go",
"brw",
".",
"run",
"(",
")",
"\n",
"return",
"brw",
"\n",
"}"
] | // newBlockRetrievalWorker returns a blockRetrievalWorker for a given
// blockRetrievalQueue, using the passed in blockGetter to obtain blocks for
// requests. | [
"newBlockRetrievalWorker",
"returns",
"a",
"blockRetrievalWorker",
"for",
"a",
"given",
"blockRetrievalQueue",
"using",
"the",
"passed",
"in",
"blockGetter",
"to",
"obtain",
"blocks",
"for",
"requests",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/block_retrieval_worker.go#L39-L50 |
161,033 | keybase/client | go/kbfs/libkbfs/block_retrieval_worker.go | HandleRequest | func (brw *blockRetrievalWorker) HandleRequest() (err error) {
var retrieval *blockRetrieval
select {
case <-brw.workCh.Out():
retrieval = brw.queue.popIfNotEmpty()
if retrieval == nil {
return nil
}
case <-brw.stopCh:
return io.EOF
}
var block data.Block
var cacheType DiskBlockCacheType
defer func() {
brw.queue.FinalizeRequest(retrieval, block, cacheType, err)
}()
// Handle canceled contexts.
select {
case <-retrieval.ctx.Done():
return retrieval.ctx.Err()
default:
}
var action BlockRequestAction
func() {
retrieval.reqMtx.RLock()
defer retrieval.reqMtx.RUnlock()
block = retrieval.requests[0].block.NewEmpty()
action = retrieval.action
}()
// If we running with a "stop-if-full" action, before we fetch the
// block, make sure the disk cache has room for it.
if action.StopIfFull() {
dbc := brw.queue.config.DiskBlockCache()
if dbc != nil {
hasRoom, err := dbc.DoesCacheHaveSpace(
retrieval.ctx, action.CacheType())
if err != nil {
return err
}
if !hasRoom {
return DiskCacheTooFullForBlockError{retrieval.blockPtr, action}
}
}
}
cacheType = action.CacheType()
if action.DelayCacheCheck() {
_, err := brw.queue.checkCaches(
retrieval.ctx, retrieval.kmd, retrieval.blockPtr, block,
action.WithoutDelayedCacheCheckAction())
if err == nil {
return nil
}
}
return brw.getBlock(
retrieval.ctx, retrieval.kmd, retrieval.blockPtr, block, cacheType)
} | go | func (brw *blockRetrievalWorker) HandleRequest() (err error) {
var retrieval *blockRetrieval
select {
case <-brw.workCh.Out():
retrieval = brw.queue.popIfNotEmpty()
if retrieval == nil {
return nil
}
case <-brw.stopCh:
return io.EOF
}
var block data.Block
var cacheType DiskBlockCacheType
defer func() {
brw.queue.FinalizeRequest(retrieval, block, cacheType, err)
}()
// Handle canceled contexts.
select {
case <-retrieval.ctx.Done():
return retrieval.ctx.Err()
default:
}
var action BlockRequestAction
func() {
retrieval.reqMtx.RLock()
defer retrieval.reqMtx.RUnlock()
block = retrieval.requests[0].block.NewEmpty()
action = retrieval.action
}()
// If we running with a "stop-if-full" action, before we fetch the
// block, make sure the disk cache has room for it.
if action.StopIfFull() {
dbc := brw.queue.config.DiskBlockCache()
if dbc != nil {
hasRoom, err := dbc.DoesCacheHaveSpace(
retrieval.ctx, action.CacheType())
if err != nil {
return err
}
if !hasRoom {
return DiskCacheTooFullForBlockError{retrieval.blockPtr, action}
}
}
}
cacheType = action.CacheType()
if action.DelayCacheCheck() {
_, err := brw.queue.checkCaches(
retrieval.ctx, retrieval.kmd, retrieval.blockPtr, block,
action.WithoutDelayedCacheCheckAction())
if err == nil {
return nil
}
}
return brw.getBlock(
retrieval.ctx, retrieval.kmd, retrieval.blockPtr, block, cacheType)
} | [
"func",
"(",
"brw",
"*",
"blockRetrievalWorker",
")",
"HandleRequest",
"(",
")",
"(",
"err",
"error",
")",
"{",
"var",
"retrieval",
"*",
"blockRetrieval",
"\n",
"select",
"{",
"case",
"<-",
"brw",
".",
"workCh",
".",
"Out",
"(",
")",
":",
"retrieval",
"=",
"brw",
".",
"queue",
".",
"popIfNotEmpty",
"(",
")",
"\n",
"if",
"retrieval",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"case",
"<-",
"brw",
".",
"stopCh",
":",
"return",
"io",
".",
"EOF",
"\n",
"}",
"\n\n",
"var",
"block",
"data",
".",
"Block",
"\n",
"var",
"cacheType",
"DiskBlockCacheType",
"\n",
"defer",
"func",
"(",
")",
"{",
"brw",
".",
"queue",
".",
"FinalizeRequest",
"(",
"retrieval",
",",
"block",
",",
"cacheType",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"// Handle canceled contexts.",
"select",
"{",
"case",
"<-",
"retrieval",
".",
"ctx",
".",
"Done",
"(",
")",
":",
"return",
"retrieval",
".",
"ctx",
".",
"Err",
"(",
")",
"\n",
"default",
":",
"}",
"\n\n",
"var",
"action",
"BlockRequestAction",
"\n",
"func",
"(",
")",
"{",
"retrieval",
".",
"reqMtx",
".",
"RLock",
"(",
")",
"\n",
"defer",
"retrieval",
".",
"reqMtx",
".",
"RUnlock",
"(",
")",
"\n",
"block",
"=",
"retrieval",
".",
"requests",
"[",
"0",
"]",
".",
"block",
".",
"NewEmpty",
"(",
")",
"\n",
"action",
"=",
"retrieval",
".",
"action",
"\n",
"}",
"(",
")",
"\n\n",
"// If we running with a \"stop-if-full\" action, before we fetch the",
"// block, make sure the disk cache has room for it.",
"if",
"action",
".",
"StopIfFull",
"(",
")",
"{",
"dbc",
":=",
"brw",
".",
"queue",
".",
"config",
".",
"DiskBlockCache",
"(",
")",
"\n",
"if",
"dbc",
"!=",
"nil",
"{",
"hasRoom",
",",
"err",
":=",
"dbc",
".",
"DoesCacheHaveSpace",
"(",
"retrieval",
".",
"ctx",
",",
"action",
".",
"CacheType",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"!",
"hasRoom",
"{",
"return",
"DiskCacheTooFullForBlockError",
"{",
"retrieval",
".",
"blockPtr",
",",
"action",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"cacheType",
"=",
"action",
".",
"CacheType",
"(",
")",
"\n",
"if",
"action",
".",
"DelayCacheCheck",
"(",
")",
"{",
"_",
",",
"err",
":=",
"brw",
".",
"queue",
".",
"checkCaches",
"(",
"retrieval",
".",
"ctx",
",",
"retrieval",
".",
"kmd",
",",
"retrieval",
".",
"blockPtr",
",",
"block",
",",
"action",
".",
"WithoutDelayedCacheCheckAction",
"(",
")",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"brw",
".",
"getBlock",
"(",
"retrieval",
".",
"ctx",
",",
"retrieval",
".",
"kmd",
",",
"retrieval",
".",
"blockPtr",
",",
"block",
",",
"cacheType",
")",
"\n",
"}"
] | // HandleRequest is the main work method for the worker. It obtains a
// blockRetrieval from the queue, retrieves the block using
// blockGetter.getBlock, and responds to the subscribed requestors with the
// results. | [
"HandleRequest",
"is",
"the",
"main",
"work",
"method",
"for",
"the",
"worker",
".",
"It",
"obtains",
"a",
"blockRetrieval",
"from",
"the",
"queue",
"retrieves",
"the",
"block",
"using",
"blockGetter",
".",
"getBlock",
"and",
"responds",
"to",
"the",
"subscribed",
"requestors",
"with",
"the",
"results",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/block_retrieval_worker.go#L56-L117 |
161,034 | keybase/client | go/kbfs/libkbfs/block_retrieval_worker.go | Shutdown | func (brw *blockRetrievalWorker) Shutdown() <-chan struct{} {
select {
case <-brw.stopCh:
default:
close(brw.stopCh)
}
return brw.doneCh
} | go | func (brw *blockRetrievalWorker) Shutdown() <-chan struct{} {
select {
case <-brw.stopCh:
default:
close(brw.stopCh)
}
return brw.doneCh
} | [
"func",
"(",
"brw",
"*",
"blockRetrievalWorker",
")",
"Shutdown",
"(",
")",
"<-",
"chan",
"struct",
"{",
"}",
"{",
"select",
"{",
"case",
"<-",
"brw",
".",
"stopCh",
":",
"default",
":",
"close",
"(",
"brw",
".",
"stopCh",
")",
"\n",
"}",
"\n",
"return",
"brw",
".",
"doneCh",
"\n",
"}"
] | // Shutdown shuts down the blockRetrievalWorker once its current work is done. | [
"Shutdown",
"shuts",
"down",
"the",
"blockRetrievalWorker",
"once",
"its",
"current",
"work",
"is",
"done",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/block_retrieval_worker.go#L120-L127 |
161,035 | keybase/client | go/kbfs/libpages/stathat.go | NewStathatReporter | func NewStathatReporter(logger *zap.Logger, prefix string, ezKey string,
enableActivityBasedStats *ActivityStatsEnabler) StatsReporter {
if len(ezKey) == 0 {
return &stathatReporter{}
}
enabler := enableActivityBasedStats
if enabler == nil {
enabler = &ActivityStatsEnabler{
Storer: nullActivityStatsStorer{},
Durations: nil,
}
}
prefix = strings.TrimSpace(prefix) + " "
reporter := &stathatReporter{
logger: logger,
ezKey: ezKey,
reporter: stathat.NewBatchReporter(
stathat.DefaultReporter, stathatReportInterval),
statNameRequests: prefix + "requests",
statNameAuthenticated: prefix + "authenticated",
statNameCloningShown: prefix + "cloningShown",
statNameInvalidConfig: prefix + "invalidConfig",
statPrefixProto: prefix + "proto:",
statPrefixStatus: prefix + "status:",
statPrefixTlfType: prefix + "tlfType:",
statPrefixRootType: prefix + "rootType:",
activityStats: *enabler,
statPrefixActiveHosts: prefix + "activeHosts:",
statPrefixActiveTlfs: prefix + "activeTlfs:",
}
go reporter.activityStatsReportLoop()
return reporter
} | go | func NewStathatReporter(logger *zap.Logger, prefix string, ezKey string,
enableActivityBasedStats *ActivityStatsEnabler) StatsReporter {
if len(ezKey) == 0 {
return &stathatReporter{}
}
enabler := enableActivityBasedStats
if enabler == nil {
enabler = &ActivityStatsEnabler{
Storer: nullActivityStatsStorer{},
Durations: nil,
}
}
prefix = strings.TrimSpace(prefix) + " "
reporter := &stathatReporter{
logger: logger,
ezKey: ezKey,
reporter: stathat.NewBatchReporter(
stathat.DefaultReporter, stathatReportInterval),
statNameRequests: prefix + "requests",
statNameAuthenticated: prefix + "authenticated",
statNameCloningShown: prefix + "cloningShown",
statNameInvalidConfig: prefix + "invalidConfig",
statPrefixProto: prefix + "proto:",
statPrefixStatus: prefix + "status:",
statPrefixTlfType: prefix + "tlfType:",
statPrefixRootType: prefix + "rootType:",
activityStats: *enabler,
statPrefixActiveHosts: prefix + "activeHosts:",
statPrefixActiveTlfs: prefix + "activeTlfs:",
}
go reporter.activityStatsReportLoop()
return reporter
} | [
"func",
"NewStathatReporter",
"(",
"logger",
"*",
"zap",
".",
"Logger",
",",
"prefix",
"string",
",",
"ezKey",
"string",
",",
"enableActivityBasedStats",
"*",
"ActivityStatsEnabler",
")",
"StatsReporter",
"{",
"if",
"len",
"(",
"ezKey",
")",
"==",
"0",
"{",
"return",
"&",
"stathatReporter",
"{",
"}",
"\n",
"}",
"\n\n",
"enabler",
":=",
"enableActivityBasedStats",
"\n",
"if",
"enabler",
"==",
"nil",
"{",
"enabler",
"=",
"&",
"ActivityStatsEnabler",
"{",
"Storer",
":",
"nullActivityStatsStorer",
"{",
"}",
",",
"Durations",
":",
"nil",
",",
"}",
"\n",
"}",
"\n\n",
"prefix",
"=",
"strings",
".",
"TrimSpace",
"(",
"prefix",
")",
"+",
"\"",
"\"",
"\n",
"reporter",
":=",
"&",
"stathatReporter",
"{",
"logger",
":",
"logger",
",",
"ezKey",
":",
"ezKey",
",",
"reporter",
":",
"stathat",
".",
"NewBatchReporter",
"(",
"stathat",
".",
"DefaultReporter",
",",
"stathatReportInterval",
")",
",",
"statNameRequests",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statNameAuthenticated",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statNameCloningShown",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statNameInvalidConfig",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statPrefixProto",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statPrefixStatus",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statPrefixTlfType",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statPrefixRootType",
":",
"prefix",
"+",
"\"",
"\"",
",",
"activityStats",
":",
"*",
"enabler",
",",
"statPrefixActiveHosts",
":",
"prefix",
"+",
"\"",
"\"",
",",
"statPrefixActiveTlfs",
":",
"prefix",
"+",
"\"",
"\"",
",",
"}",
"\n",
"go",
"reporter",
".",
"activityStatsReportLoop",
"(",
")",
"\n",
"return",
"reporter",
"\n",
"}"
] | // NewStathatReporter create a new StatsReporter that reports stats to stathat.
// If enableActivityBasedStats, if set to non-nil, causes the reporter to
// generate activity-based stats. Caller should not modify
// enableActivityBasedStats passed into this function. | [
"NewStathatReporter",
"create",
"a",
"new",
"StatsReporter",
"that",
"reports",
"stats",
"to",
"stathat",
".",
"If",
"enableActivityBasedStats",
"if",
"set",
"to",
"non",
"-",
"nil",
"causes",
"the",
"reporter",
"to",
"generate",
"activity",
"-",
"based",
"stats",
".",
"Caller",
"should",
"not",
"modify",
"enableActivityBasedStats",
"passed",
"into",
"this",
"function",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/stathat.go#L81-L117 |
161,036 | keybase/client | go/kbfs/libpages/stathat.go | ReportServedRequest | func (s *stathatReporter) ReportServedRequest(sri *ServedRequestInfo) {
s.postCountOneOrLog(s.statNameRequests)
s.postCountOneOrLog(s.statPrefixProto + sri.Proto)
s.postCountOneOrLog(s.statPrefixStatus + strconv.Itoa(sri.HTTPStatus))
if sri.Authenticated {
s.postCountOneOrLog(s.statNameAuthenticated)
}
if sri.CloningShown {
s.postCountOneOrLog(s.statNameCloningShown)
}
if sri.InvalidConfig {
s.postCountOneOrLog(s.statNameInvalidConfig)
}
s.postCountOneOrLog(s.statPrefixTlfType + sri.TlfType.String())
s.postCountOneOrLog(s.statPrefixRootType + sri.RootType.String())
s.activityStats.Storer.RecordActives(sri.TlfID, sri.Host)
} | go | func (s *stathatReporter) ReportServedRequest(sri *ServedRequestInfo) {
s.postCountOneOrLog(s.statNameRequests)
s.postCountOneOrLog(s.statPrefixProto + sri.Proto)
s.postCountOneOrLog(s.statPrefixStatus + strconv.Itoa(sri.HTTPStatus))
if sri.Authenticated {
s.postCountOneOrLog(s.statNameAuthenticated)
}
if sri.CloningShown {
s.postCountOneOrLog(s.statNameCloningShown)
}
if sri.InvalidConfig {
s.postCountOneOrLog(s.statNameInvalidConfig)
}
s.postCountOneOrLog(s.statPrefixTlfType + sri.TlfType.String())
s.postCountOneOrLog(s.statPrefixRootType + sri.RootType.String())
s.activityStats.Storer.RecordActives(sri.TlfID, sri.Host)
} | [
"func",
"(",
"s",
"*",
"stathatReporter",
")",
"ReportServedRequest",
"(",
"sri",
"*",
"ServedRequestInfo",
")",
"{",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statNameRequests",
")",
"\n",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statPrefixProto",
"+",
"sri",
".",
"Proto",
")",
"\n",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statPrefixStatus",
"+",
"strconv",
".",
"Itoa",
"(",
"sri",
".",
"HTTPStatus",
")",
")",
"\n",
"if",
"sri",
".",
"Authenticated",
"{",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statNameAuthenticated",
")",
"\n",
"}",
"\n",
"if",
"sri",
".",
"CloningShown",
"{",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statNameCloningShown",
")",
"\n",
"}",
"\n",
"if",
"sri",
".",
"InvalidConfig",
"{",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statNameInvalidConfig",
")",
"\n",
"}",
"\n",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statPrefixTlfType",
"+",
"sri",
".",
"TlfType",
".",
"String",
"(",
")",
")",
"\n",
"s",
".",
"postCountOneOrLog",
"(",
"s",
".",
"statPrefixRootType",
"+",
"sri",
".",
"RootType",
".",
"String",
"(",
")",
")",
"\n\n",
"s",
".",
"activityStats",
".",
"Storer",
".",
"RecordActives",
"(",
"sri",
".",
"TlfID",
",",
"sri",
".",
"Host",
")",
"\n",
"}"
] | // ReportServedRequest implementes the StatsReporter interface. | [
"ReportServedRequest",
"implementes",
"the",
"StatsReporter",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libpages/stathat.go#L126-L143 |
161,037 | keybase/client | go/kbfs/cache/size_utils.go | StaticSizeOfMapWithSize | func StaticSizeOfMapWithSize(
keyStaticSize, valueStaticSize int, count int) (bytes int) {
keySize := mapKeyOrValueSizeWithIndirectPointerOverhead(keyStaticSize)
valueSize := mapKeyOrValueSizeWithIndirectPointerOverhead(valueStaticSize)
// See the comment of `B` field of `hmap` struct above.
B := math.Ceil(math.Log2(float64(count) / mapLoadFactor))
numBuckets := int(math.Exp2(B))
return hmapStructSize +
bucketSizeWithoutIndirectPointerOverhead*numBuckets +
(keySize+valueSize)*count
} | go | func StaticSizeOfMapWithSize(
keyStaticSize, valueStaticSize int, count int) (bytes int) {
keySize := mapKeyOrValueSizeWithIndirectPointerOverhead(keyStaticSize)
valueSize := mapKeyOrValueSizeWithIndirectPointerOverhead(valueStaticSize)
// See the comment of `B` field of `hmap` struct above.
B := math.Ceil(math.Log2(float64(count) / mapLoadFactor))
numBuckets := int(math.Exp2(B))
return hmapStructSize +
bucketSizeWithoutIndirectPointerOverhead*numBuckets +
(keySize+valueSize)*count
} | [
"func",
"StaticSizeOfMapWithSize",
"(",
"keyStaticSize",
",",
"valueStaticSize",
"int",
",",
"count",
"int",
")",
"(",
"bytes",
"int",
")",
"{",
"keySize",
":=",
"mapKeyOrValueSizeWithIndirectPointerOverhead",
"(",
"keyStaticSize",
")",
"\n",
"valueSize",
":=",
"mapKeyOrValueSizeWithIndirectPointerOverhead",
"(",
"valueStaticSize",
")",
"\n\n",
"// See the comment of `B` field of `hmap` struct above.",
"B",
":=",
"math",
".",
"Ceil",
"(",
"math",
".",
"Log2",
"(",
"float64",
"(",
"count",
")",
"/",
"mapLoadFactor",
")",
")",
"\n",
"numBuckets",
":=",
"int",
"(",
"math",
".",
"Exp2",
"(",
"B",
")",
")",
"\n\n",
"return",
"hmapStructSize",
"+",
"bucketSizeWithoutIndirectPointerOverhead",
"*",
"numBuckets",
"+",
"(",
"keySize",
"+",
"valueSize",
")",
"*",
"count",
"\n",
"}"
] | // StaticSizeOfMapWithSize is a slightly more efficient version of
// StaticSizeOfMap for when the caller knows the static size of key and value
// without having to use `reflect`. | [
"StaticSizeOfMapWithSize",
"is",
"a",
"slightly",
"more",
"efficient",
"version",
"of",
"StaticSizeOfMap",
"for",
"when",
"the",
"caller",
"knows",
"the",
"static",
"size",
"of",
"key",
"and",
"value",
"without",
"having",
"to",
"use",
"reflect",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/cache/size_utils.go#L109-L121 |
161,038 | keybase/client | go/kbfs/dokan/winacl/ace.go | AddAllowAccess | func (acl *ACL) AddAllowAccess(accessMask uint32, sid *SID) {
acl.initIfEmpty()
ssize := sidSize(sid)
var bs [8]byte
// ACLs are little endian...
binary.LittleEndian.PutUint16(bs[2:], uint16(8+align4up(uint32(sidSize(sid)))))
binary.LittleEndian.PutUint32(bs[4:], accessMask)
acl.raw = append(acl.raw, bs[:]...)
acl.raw = append(acl.raw, bufToSlice(unsafe.Pointer(sid), ssize)...)
for len(acl.raw)&3 != 0 {
acl.raw = append(acl.raw, 0)
}
acl.aceCount++
} | go | func (acl *ACL) AddAllowAccess(accessMask uint32, sid *SID) {
acl.initIfEmpty()
ssize := sidSize(sid)
var bs [8]byte
// ACLs are little endian...
binary.LittleEndian.PutUint16(bs[2:], uint16(8+align4up(uint32(sidSize(sid)))))
binary.LittleEndian.PutUint32(bs[4:], accessMask)
acl.raw = append(acl.raw, bs[:]...)
acl.raw = append(acl.raw, bufToSlice(unsafe.Pointer(sid), ssize)...)
for len(acl.raw)&3 != 0 {
acl.raw = append(acl.raw, 0)
}
acl.aceCount++
} | [
"func",
"(",
"acl",
"*",
"ACL",
")",
"AddAllowAccess",
"(",
"accessMask",
"uint32",
",",
"sid",
"*",
"SID",
")",
"{",
"acl",
".",
"initIfEmpty",
"(",
")",
"\n",
"ssize",
":=",
"sidSize",
"(",
"sid",
")",
"\n",
"var",
"bs",
"[",
"8",
"]",
"byte",
"\n",
"// ACLs are little endian...",
"binary",
".",
"LittleEndian",
".",
"PutUint16",
"(",
"bs",
"[",
"2",
":",
"]",
",",
"uint16",
"(",
"8",
"+",
"align4up",
"(",
"uint32",
"(",
"sidSize",
"(",
"sid",
")",
")",
")",
")",
")",
"\n",
"binary",
".",
"LittleEndian",
".",
"PutUint32",
"(",
"bs",
"[",
"4",
":",
"]",
",",
"accessMask",
")",
"\n",
"acl",
".",
"raw",
"=",
"append",
"(",
"acl",
".",
"raw",
",",
"bs",
"[",
":",
"]",
"...",
")",
"\n",
"acl",
".",
"raw",
"=",
"append",
"(",
"acl",
".",
"raw",
",",
"bufToSlice",
"(",
"unsafe",
".",
"Pointer",
"(",
"sid",
")",
",",
"ssize",
")",
"...",
")",
"\n",
"for",
"len",
"(",
"acl",
".",
"raw",
")",
"&",
"3",
"!=",
"0",
"{",
"acl",
".",
"raw",
"=",
"append",
"(",
"acl",
".",
"raw",
",",
"0",
")",
"\n",
"}",
"\n",
"acl",
".",
"aceCount",
"++",
"\n",
"}"
] | // AddAllowAccess add a new ALLOW_ACCESS ACE to the ACL. | [
"AddAllowAccess",
"add",
"a",
"new",
"ALLOW_ACCESS",
"ACE",
"to",
"the",
"ACL",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/dokan/winacl/ace.go#L40-L53 |
161,039 | keybase/client | go/externals/init.go | NewParamProofStoreAndInstall | func NewParamProofStoreAndInstall(g *libkb.GlobalContext) libkb.MerkleStore {
supportedVersion := keybase1.MerkleStoreSupportedVersion(SupportedVersion)
tag := "paramproofs"
endpoint := "merkle/proof_params"
getHash := func(root libkb.MerkleRoot) string {
return root.ProofServicesHash()
}
kitFilename := g.Env.GetParamProofKitFilename()
s := merklestore.NewMerkleStore(g, tag, endpoint, kitFilename, supportedVersion, getHash)
g.SetParamProofStore(s)
return s
} | go | func NewParamProofStoreAndInstall(g *libkb.GlobalContext) libkb.MerkleStore {
supportedVersion := keybase1.MerkleStoreSupportedVersion(SupportedVersion)
tag := "paramproofs"
endpoint := "merkle/proof_params"
getHash := func(root libkb.MerkleRoot) string {
return root.ProofServicesHash()
}
kitFilename := g.Env.GetParamProofKitFilename()
s := merklestore.NewMerkleStore(g, tag, endpoint, kitFilename, supportedVersion, getHash)
g.SetParamProofStore(s)
return s
} | [
"func",
"NewParamProofStoreAndInstall",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"libkb",
".",
"MerkleStore",
"{",
"supportedVersion",
":=",
"keybase1",
".",
"MerkleStoreSupportedVersion",
"(",
"SupportedVersion",
")",
"\n",
"tag",
":=",
"\"",
"\"",
"\n",
"endpoint",
":=",
"\"",
"\"",
"\n",
"getHash",
":=",
"func",
"(",
"root",
"libkb",
".",
"MerkleRoot",
")",
"string",
"{",
"return",
"root",
".",
"ProofServicesHash",
"(",
")",
"\n",
"}",
"\n",
"kitFilename",
":=",
"g",
".",
"Env",
".",
"GetParamProofKitFilename",
"(",
")",
"\n",
"s",
":=",
"merklestore",
".",
"NewMerkleStore",
"(",
"g",
",",
"tag",
",",
"endpoint",
",",
"kitFilename",
",",
"supportedVersion",
",",
"getHash",
")",
"\n",
"g",
".",
"SetParamProofStore",
"(",
"s",
")",
"\n",
"return",
"s",
"\n",
"}"
] | // NewParamProofStore creates a new source and installs it into G. | [
"NewParamProofStore",
"creates",
"a",
"new",
"source",
"and",
"installs",
"it",
"into",
"G",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/externals/init.go#L11-L22 |
161,040 | keybase/client | go/badges/badger.go | Send | func (b *Badger) Send(ctx context.Context) error {
state, err := b.badgeState.Export()
if err != nil {
return err
}
b.log(ctx, state)
b.notifyCh <- state
return nil
} | go | func (b *Badger) Send(ctx context.Context) error {
state, err := b.badgeState.Export()
if err != nil {
return err
}
b.log(ctx, state)
b.notifyCh <- state
return nil
} | [
"func",
"(",
"b",
"*",
"Badger",
")",
"Send",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"state",
",",
"err",
":=",
"b",
".",
"badgeState",
".",
"Export",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"b",
".",
"log",
"(",
"ctx",
",",
"state",
")",
"\n",
"b",
".",
"notifyCh",
"<-",
"state",
"\n",
"return",
"nil",
"\n",
"}"
] | // Send the badgestate to electron | [
"Send",
"the",
"badgestate",
"to",
"electron"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/badges/badger.go#L132-L140 |
161,041 | keybase/client | go/badges/badger.go | log | func (b *Badger) log(ctx context.Context, state1 keybase1.BadgeState) {
var state2 keybase1.BadgeState
state2 = state1
state2.Conversations = nil
for _, c1 := range state1.Conversations {
if c1.UnreadMessages == 0 {
continue
}
c2id := c1.ConvID
if len(c1.ConvID) >= chat1.DbShortFormLen {
// This is the db short form for logging brevity only.
// Don't let this leave this method.
c2id = chat1.ConversationID([]byte(c1.ConvID)).DbShortForm()
}
c2 := keybase1.BadgeConversationInfo{
ConvID: c2id,
UnreadMessages: c1.UnreadMessages,
BadgeCounts: c1.BadgeCounts,
}
state2.Conversations = append(state2.Conversations, c2)
}
b.G().Log.CDebugf(ctx, "Badger send: %+v", state2)
} | go | func (b *Badger) log(ctx context.Context, state1 keybase1.BadgeState) {
var state2 keybase1.BadgeState
state2 = state1
state2.Conversations = nil
for _, c1 := range state1.Conversations {
if c1.UnreadMessages == 0 {
continue
}
c2id := c1.ConvID
if len(c1.ConvID) >= chat1.DbShortFormLen {
// This is the db short form for logging brevity only.
// Don't let this leave this method.
c2id = chat1.ConversationID([]byte(c1.ConvID)).DbShortForm()
}
c2 := keybase1.BadgeConversationInfo{
ConvID: c2id,
UnreadMessages: c1.UnreadMessages,
BadgeCounts: c1.BadgeCounts,
}
state2.Conversations = append(state2.Conversations, c2)
}
b.G().Log.CDebugf(ctx, "Badger send: %+v", state2)
} | [
"func",
"(",
"b",
"*",
"Badger",
")",
"log",
"(",
"ctx",
"context",
".",
"Context",
",",
"state1",
"keybase1",
".",
"BadgeState",
")",
"{",
"var",
"state2",
"keybase1",
".",
"BadgeState",
"\n",
"state2",
"=",
"state1",
"\n",
"state2",
".",
"Conversations",
"=",
"nil",
"\n",
"for",
"_",
",",
"c1",
":=",
"range",
"state1",
".",
"Conversations",
"{",
"if",
"c1",
".",
"UnreadMessages",
"==",
"0",
"{",
"continue",
"\n",
"}",
"\n",
"c2id",
":=",
"c1",
".",
"ConvID",
"\n",
"if",
"len",
"(",
"c1",
".",
"ConvID",
")",
">=",
"chat1",
".",
"DbShortFormLen",
"{",
"// This is the db short form for logging brevity only.",
"// Don't let this leave this method.",
"c2id",
"=",
"chat1",
".",
"ConversationID",
"(",
"[",
"]",
"byte",
"(",
"c1",
".",
"ConvID",
")",
")",
".",
"DbShortForm",
"(",
")",
"\n",
"}",
"\n\n",
"c2",
":=",
"keybase1",
".",
"BadgeConversationInfo",
"{",
"ConvID",
":",
"c2id",
",",
"UnreadMessages",
":",
"c1",
".",
"UnreadMessages",
",",
"BadgeCounts",
":",
"c1",
".",
"BadgeCounts",
",",
"}",
"\n",
"state2",
".",
"Conversations",
"=",
"append",
"(",
"state2",
".",
"Conversations",
",",
"c2",
")",
"\n",
"}",
"\n",
"b",
".",
"G",
"(",
")",
".",
"Log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"state2",
")",
"\n",
"}"
] | // Log a copy of the badgestate with some zeros stripped off for brevity. | [
"Log",
"a",
"copy",
"of",
"the",
"badgestate",
"with",
"some",
"zeros",
"stripped",
"off",
"for",
"brevity",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/badges/badger.go#L147-L170 |
161,042 | keybase/client | go/pinentry/pinentry_windows.go | canExec | func canExec(s string) error {
if strings.IndexAny(s, `:\/`) == -1 {
s += string(filepath.Separator)
}
_, err := exec.LookPath(s)
return err
} | go | func canExec(s string) error {
if strings.IndexAny(s, `:\/`) == -1 {
s += string(filepath.Separator)
}
_, err := exec.LookPath(s)
return err
} | [
"func",
"canExec",
"(",
"s",
"string",
")",
"error",
"{",
"if",
"strings",
".",
"IndexAny",
"(",
"s",
",",
"`:\\/`",
")",
"==",
"-",
"1",
"{",
"s",
"+=",
"string",
"(",
"filepath",
".",
"Separator",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"exec",
".",
"LookPath",
"(",
"s",
")",
"\n",
"return",
"err",
"\n",
"}"
] | // LookPath searches for an executable binary named file
// in the directories named by the PATH environment variable.
// If file contains a slash, it is tried directly and the PATH is not consulted. | [
"LookPath",
"searches",
"for",
"an",
"executable",
"binary",
"named",
"file",
"in",
"the",
"directories",
"named",
"by",
"the",
"PATH",
"environment",
"variable",
".",
"If",
"file",
"contains",
"a",
"slash",
"it",
"is",
"tried",
"directly",
"and",
"the",
"PATH",
"is",
"not",
"consulted",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/pinentry/pinentry_windows.go#L28-L34 |
161,043 | keybase/client | go/kbfs/libfs/user_edit_history.go | GetEncodedUserEditHistory | func GetEncodedUserEditHistory(ctx context.Context, config libkbfs.Config) (
data []byte, t time.Time, err error) {
session, err := idutil.GetCurrentSessionIfPossible(
ctx, config.KBPKI(), true)
if err != nil {
return nil, time.Time{}, err
}
edits := config.UserHistory().Get(string(session.Name))
data, err = PrettyJSON(edits)
return data, time.Time{}, err
} | go | func GetEncodedUserEditHistory(ctx context.Context, config libkbfs.Config) (
data []byte, t time.Time, err error) {
session, err := idutil.GetCurrentSessionIfPossible(
ctx, config.KBPKI(), true)
if err != nil {
return nil, time.Time{}, err
}
edits := config.UserHistory().Get(string(session.Name))
data, err = PrettyJSON(edits)
return data, time.Time{}, err
} | [
"func",
"GetEncodedUserEditHistory",
"(",
"ctx",
"context",
".",
"Context",
",",
"config",
"libkbfs",
".",
"Config",
")",
"(",
"data",
"[",
"]",
"byte",
",",
"t",
"time",
".",
"Time",
",",
"err",
"error",
")",
"{",
"session",
",",
"err",
":=",
"idutil",
".",
"GetCurrentSessionIfPossible",
"(",
"ctx",
",",
"config",
".",
"KBPKI",
"(",
")",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}",
"\n\n",
"edits",
":=",
"config",
".",
"UserHistory",
"(",
")",
".",
"Get",
"(",
"string",
"(",
"session",
".",
"Name",
")",
")",
"\n",
"data",
",",
"err",
"=",
"PrettyJSON",
"(",
"edits",
")",
"\n",
"return",
"data",
",",
"time",
".",
"Time",
"{",
"}",
",",
"err",
"\n",
"}"
] | // GetEncodedUserEditHistory returns serialized JSON containing the
// file edit history for the user. | [
"GetEncodedUserEditHistory",
"returns",
"serialized",
"JSON",
"containing",
"the",
"file",
"edit",
"history",
"for",
"the",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfs/user_edit_history.go#L17-L28 |
161,044 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | NewMDServerRemote | func NewMDServerRemote(config Config, srvRemote rpc.Remote,
rpcLogFactory rpc.LogFactory) *MDServerRemote {
log := config.MakeLogger("")
deferLog := log.CloneWithAddedDepth(1)
mdServer := &MDServerRemote{
config: config,
observers: make(map[tlf.ID]chan<- error),
log: traceLogger{log},
deferLog: traceLogger{deferLog},
mdSrvRemote: srvRemote,
rpcLogFactory: rpcLogFactory,
rekeyTimer: time.NewTimer(nextRekeyTime()),
}
mdServer.pinger = pinger{
name: "MDServerRemote",
doPing: mdServer.pingOnce,
timeout: MdServerPingTimeout,
log: mdServer.log,
}
mdServer.authToken = kbfscrypto.NewAuthToken(config.Crypto(),
kbfsmd.ServerTokenServer, kbfsmd.ServerTokenExpireIn,
"libkbfs_mdserver_remote", VersionString(), mdServer)
constBackoff := backoff.NewConstantBackOff(RPCReconnectInterval)
mdServer.connOpts = rpc.ConnectionOpts{
WrapErrorFunc: libkb.WrapError,
TagsFunc: libkb.LogTagsFromContext,
ReconnectBackoff: func() backoff.BackOff { return constBackoff },
DialerTimeout: dialerTimeout,
InitialReconnectBackoffWindow: func() time.Duration { return mdserverReconnectBackoffWindow },
}
mdServer.initNewConnection()
// Check for rekey opportunities periodically.
rekeyCtx, rekeyCancel := context.WithCancel(context.Background())
mdServer.rekeyCancel = rekeyCancel
if config.Mode().RekeyWorkers() > 0 {
go mdServer.backgroundRekeyChecker(rekeyCtx)
}
return mdServer
} | go | func NewMDServerRemote(config Config, srvRemote rpc.Remote,
rpcLogFactory rpc.LogFactory) *MDServerRemote {
log := config.MakeLogger("")
deferLog := log.CloneWithAddedDepth(1)
mdServer := &MDServerRemote{
config: config,
observers: make(map[tlf.ID]chan<- error),
log: traceLogger{log},
deferLog: traceLogger{deferLog},
mdSrvRemote: srvRemote,
rpcLogFactory: rpcLogFactory,
rekeyTimer: time.NewTimer(nextRekeyTime()),
}
mdServer.pinger = pinger{
name: "MDServerRemote",
doPing: mdServer.pingOnce,
timeout: MdServerPingTimeout,
log: mdServer.log,
}
mdServer.authToken = kbfscrypto.NewAuthToken(config.Crypto(),
kbfsmd.ServerTokenServer, kbfsmd.ServerTokenExpireIn,
"libkbfs_mdserver_remote", VersionString(), mdServer)
constBackoff := backoff.NewConstantBackOff(RPCReconnectInterval)
mdServer.connOpts = rpc.ConnectionOpts{
WrapErrorFunc: libkb.WrapError,
TagsFunc: libkb.LogTagsFromContext,
ReconnectBackoff: func() backoff.BackOff { return constBackoff },
DialerTimeout: dialerTimeout,
InitialReconnectBackoffWindow: func() time.Duration { return mdserverReconnectBackoffWindow },
}
mdServer.initNewConnection()
// Check for rekey opportunities periodically.
rekeyCtx, rekeyCancel := context.WithCancel(context.Background())
mdServer.rekeyCancel = rekeyCancel
if config.Mode().RekeyWorkers() > 0 {
go mdServer.backgroundRekeyChecker(rekeyCtx)
}
return mdServer
} | [
"func",
"NewMDServerRemote",
"(",
"config",
"Config",
",",
"srvRemote",
"rpc",
".",
"Remote",
",",
"rpcLogFactory",
"rpc",
".",
"LogFactory",
")",
"*",
"MDServerRemote",
"{",
"log",
":=",
"config",
".",
"MakeLogger",
"(",
"\"",
"\"",
")",
"\n",
"deferLog",
":=",
"log",
".",
"CloneWithAddedDepth",
"(",
"1",
")",
"\n",
"mdServer",
":=",
"&",
"MDServerRemote",
"{",
"config",
":",
"config",
",",
"observers",
":",
"make",
"(",
"map",
"[",
"tlf",
".",
"ID",
"]",
"chan",
"<-",
"error",
")",
",",
"log",
":",
"traceLogger",
"{",
"log",
"}",
",",
"deferLog",
":",
"traceLogger",
"{",
"deferLog",
"}",
",",
"mdSrvRemote",
":",
"srvRemote",
",",
"rpcLogFactory",
":",
"rpcLogFactory",
",",
"rekeyTimer",
":",
"time",
".",
"NewTimer",
"(",
"nextRekeyTime",
"(",
")",
")",
",",
"}",
"\n\n",
"mdServer",
".",
"pinger",
"=",
"pinger",
"{",
"name",
":",
"\"",
"\"",
",",
"doPing",
":",
"mdServer",
".",
"pingOnce",
",",
"timeout",
":",
"MdServerPingTimeout",
",",
"log",
":",
"mdServer",
".",
"log",
",",
"}",
"\n\n",
"mdServer",
".",
"authToken",
"=",
"kbfscrypto",
".",
"NewAuthToken",
"(",
"config",
".",
"Crypto",
"(",
")",
",",
"kbfsmd",
".",
"ServerTokenServer",
",",
"kbfsmd",
".",
"ServerTokenExpireIn",
",",
"\"",
"\"",
",",
"VersionString",
"(",
")",
",",
"mdServer",
")",
"\n",
"constBackoff",
":=",
"backoff",
".",
"NewConstantBackOff",
"(",
"RPCReconnectInterval",
")",
"\n",
"mdServer",
".",
"connOpts",
"=",
"rpc",
".",
"ConnectionOpts",
"{",
"WrapErrorFunc",
":",
"libkb",
".",
"WrapError",
",",
"TagsFunc",
":",
"libkb",
".",
"LogTagsFromContext",
",",
"ReconnectBackoff",
":",
"func",
"(",
")",
"backoff",
".",
"BackOff",
"{",
"return",
"constBackoff",
"}",
",",
"DialerTimeout",
":",
"dialerTimeout",
",",
"InitialReconnectBackoffWindow",
":",
"func",
"(",
")",
"time",
".",
"Duration",
"{",
"return",
"mdserverReconnectBackoffWindow",
"}",
",",
"}",
"\n",
"mdServer",
".",
"initNewConnection",
"(",
")",
"\n\n",
"// Check for rekey opportunities periodically.",
"rekeyCtx",
",",
"rekeyCancel",
":=",
"context",
".",
"WithCancel",
"(",
"context",
".",
"Background",
"(",
")",
")",
"\n",
"mdServer",
".",
"rekeyCancel",
"=",
"rekeyCancel",
"\n",
"if",
"config",
".",
"Mode",
"(",
")",
".",
"RekeyWorkers",
"(",
")",
">",
"0",
"{",
"go",
"mdServer",
".",
"backgroundRekeyChecker",
"(",
"rekeyCtx",
")",
"\n",
"}",
"\n\n",
"return",
"mdServer",
"\n",
"}"
] | // NewMDServerRemote returns a new instance of MDServerRemote. | [
"NewMDServerRemote",
"returns",
"a",
"new",
"instance",
"of",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L97-L139 |
161,045 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | resetAuth | func (md *MDServerRemote) resetAuth(
ctx context.Context, c keybase1.MetadataClient) (int, error) {
ctx = context.WithValue(ctx, ctxMDServerResetKey, "1")
isAuthenticated := false
defer func() {
md.setIsAuthenticated(isAuthenticated)
}()
session, err := md.config.KBPKI().GetCurrentSession(ctx)
if err != nil {
md.log.CInfof(ctx,
"Error getting current session (%+v), skipping resetAuth", err)
return MdServerDefaultPingIntervalSeconds, err
}
challenge, err := c.GetChallenge(ctx)
if err != nil {
md.log.CWarningf(ctx, "challenge request error: %v", err)
return 0, err
}
md.log.CDebugf(ctx, "received challenge")
// get a new signature
signature, err := md.authToken.Sign(ctx, session.Name, session.UID,
session.VerifyingKey, challenge)
if err != nil {
md.log.CWarningf(ctx, "error signing authentication token: %v", err)
return 0, err
}
md.log.CDebugf(ctx, "authentication token signed")
// authenticate
pingIntervalSeconds, err := c.Authenticate(ctx, signature)
if err != nil {
md.log.CWarningf(ctx, "authentication error: %v", err)
return 0, err
}
md.log.CInfof(ctx, "authentication successful; ping interval: %ds",
pingIntervalSeconds)
isAuthenticated = true
md.authenticatedMtx.Lock()
if !md.isAuthenticated && md.config.Mode().RekeyWorkers() > 0 {
defer func() {
// request a list of folders needing rekey action
if err := md.getFoldersForRekey(ctx, c); err != nil {
md.log.CWarningf(ctx, "getFoldersForRekey failed with %v", err)
}
md.deferLog.CDebugf(ctx,
"requested list of folders for rekey")
}()
}
// Need to ensure that any conflicting thread gets the updated value
md.isAuthenticated = true
md.authenticatedMtx.Unlock()
return pingIntervalSeconds, nil
} | go | func (md *MDServerRemote) resetAuth(
ctx context.Context, c keybase1.MetadataClient) (int, error) {
ctx = context.WithValue(ctx, ctxMDServerResetKey, "1")
isAuthenticated := false
defer func() {
md.setIsAuthenticated(isAuthenticated)
}()
session, err := md.config.KBPKI().GetCurrentSession(ctx)
if err != nil {
md.log.CInfof(ctx,
"Error getting current session (%+v), skipping resetAuth", err)
return MdServerDefaultPingIntervalSeconds, err
}
challenge, err := c.GetChallenge(ctx)
if err != nil {
md.log.CWarningf(ctx, "challenge request error: %v", err)
return 0, err
}
md.log.CDebugf(ctx, "received challenge")
// get a new signature
signature, err := md.authToken.Sign(ctx, session.Name, session.UID,
session.VerifyingKey, challenge)
if err != nil {
md.log.CWarningf(ctx, "error signing authentication token: %v", err)
return 0, err
}
md.log.CDebugf(ctx, "authentication token signed")
// authenticate
pingIntervalSeconds, err := c.Authenticate(ctx, signature)
if err != nil {
md.log.CWarningf(ctx, "authentication error: %v", err)
return 0, err
}
md.log.CInfof(ctx, "authentication successful; ping interval: %ds",
pingIntervalSeconds)
isAuthenticated = true
md.authenticatedMtx.Lock()
if !md.isAuthenticated && md.config.Mode().RekeyWorkers() > 0 {
defer func() {
// request a list of folders needing rekey action
if err := md.getFoldersForRekey(ctx, c); err != nil {
md.log.CWarningf(ctx, "getFoldersForRekey failed with %v", err)
}
md.deferLog.CDebugf(ctx,
"requested list of folders for rekey")
}()
}
// Need to ensure that any conflicting thread gets the updated value
md.isAuthenticated = true
md.authenticatedMtx.Unlock()
return pingIntervalSeconds, nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"resetAuth",
"(",
"ctx",
"context",
".",
"Context",
",",
"c",
"keybase1",
".",
"MetadataClient",
")",
"(",
"int",
",",
"error",
")",
"{",
"ctx",
"=",
"context",
".",
"WithValue",
"(",
"ctx",
",",
"ctxMDServerResetKey",
",",
"\"",
"\"",
")",
"\n\n",
"isAuthenticated",
":=",
"false",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"setIsAuthenticated",
"(",
"isAuthenticated",
")",
"\n",
"}",
"(",
")",
"\n\n",
"session",
",",
"err",
":=",
"md",
".",
"config",
".",
"KBPKI",
"(",
")",
".",
"GetCurrentSession",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"MdServerDefaultPingIntervalSeconds",
",",
"err",
"\n",
"}",
"\n\n",
"challenge",
",",
"err",
":=",
"c",
".",
"GetChallenge",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"0",
",",
"err",
"\n",
"}",
"\n",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n\n",
"// get a new signature",
"signature",
",",
"err",
":=",
"md",
".",
"authToken",
".",
"Sign",
"(",
"ctx",
",",
"session",
".",
"Name",
",",
"session",
".",
"UID",
",",
"session",
".",
"VerifyingKey",
",",
"challenge",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"0",
",",
"err",
"\n",
"}",
"\n",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n\n",
"// authenticate",
"pingIntervalSeconds",
",",
"err",
":=",
"c",
".",
"Authenticate",
"(",
"ctx",
",",
"signature",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"0",
",",
"err",
"\n",
"}",
"\n",
"md",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"pingIntervalSeconds",
")",
"\n\n",
"isAuthenticated",
"=",
"true",
"\n\n",
"md",
".",
"authenticatedMtx",
".",
"Lock",
"(",
")",
"\n",
"if",
"!",
"md",
".",
"isAuthenticated",
"&&",
"md",
".",
"config",
".",
"Mode",
"(",
")",
".",
"RekeyWorkers",
"(",
")",
">",
"0",
"{",
"defer",
"func",
"(",
")",
"{",
"// request a list of folders needing rekey action",
"if",
"err",
":=",
"md",
".",
"getFoldersForRekey",
"(",
"ctx",
",",
"c",
")",
";",
"err",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"md",
".",
"deferLog",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n",
"// Need to ensure that any conflicting thread gets the updated value",
"md",
".",
"isAuthenticated",
"=",
"true",
"\n",
"md",
".",
"authenticatedMtx",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"pingIntervalSeconds",
",",
"nil",
"\n",
"}"
] | // resetAuth is called to reset the authorization on an MDServer
// connection. If this function returns
// idutil.NoCurrentSessionError, the caller should treat this as a
// logged-out user. | [
"resetAuth",
"is",
"called",
"to",
"reset",
"the",
"authorization",
"on",
"an",
"MDServer",
"connection",
".",
"If",
"this",
"function",
"returns",
"idutil",
".",
"NoCurrentSessionError",
"the",
"caller",
"should",
"treat",
"this",
"as",
"a",
"logged",
"-",
"out",
"user",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L251-L310 |
161,046 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | CheckReachability | func (md *MDServerRemote) CheckReachability(ctx context.Context) {
conn, err := net.DialTimeout("tcp",
// The peeked address is the top choice in most cases.
md.mdSrvRemote.Peek(), MdServerPingTimeout)
if err != nil {
if md.getIsAuthenticated() {
md.log.CInfof(ctx, "MDServerRemote: CheckReachability(): "+
"failed to connect, reconnecting: %s", err.Error())
if err = md.reconnect(); err != nil {
md.log.CInfof(ctx, "reconnect error: %v", err)
}
} else {
md.log.CInfof(ctx, "MDServerRemote: CheckReachability(): "+
"failed to connect (%s), but not reconnecting", err.Error())
}
}
if conn != nil {
conn.Close()
}
} | go | func (md *MDServerRemote) CheckReachability(ctx context.Context) {
conn, err := net.DialTimeout("tcp",
// The peeked address is the top choice in most cases.
md.mdSrvRemote.Peek(), MdServerPingTimeout)
if err != nil {
if md.getIsAuthenticated() {
md.log.CInfof(ctx, "MDServerRemote: CheckReachability(): "+
"failed to connect, reconnecting: %s", err.Error())
if err = md.reconnect(); err != nil {
md.log.CInfof(ctx, "reconnect error: %v", err)
}
} else {
md.log.CInfof(ctx, "MDServerRemote: CheckReachability(): "+
"failed to connect (%s), but not reconnecting", err.Error())
}
}
if conn != nil {
conn.Close()
}
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"CheckReachability",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"conn",
",",
"err",
":=",
"net",
".",
"DialTimeout",
"(",
"\"",
"\"",
",",
"// The peeked address is the top choice in most cases.",
"md",
".",
"mdSrvRemote",
".",
"Peek",
"(",
")",
",",
"MdServerPingTimeout",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"md",
".",
"getIsAuthenticated",
"(",
")",
"{",
"md",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"if",
"err",
"=",
"md",
".",
"reconnect",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"md",
".",
"log",
".",
"CInfof",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"conn",
"!=",
"nil",
"{",
"conn",
".",
"Close",
"(",
")",
"\n",
"}",
"\n",
"}"
] | // CheckReachability implements the MDServer interface. | [
"CheckReachability",
"implements",
"the",
"MDServer",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L462-L481 |
161,047 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | cancelObservers | func (md *MDServerRemote) cancelObservers() {
md.observerMu.Lock()
defer md.observerMu.Unlock()
// fire errors for any registered observers
for id, observerChan := range md.observers {
md.signalObserverLocked(observerChan, id, MDServerDisconnected{})
}
} | go | func (md *MDServerRemote) cancelObservers() {
md.observerMu.Lock()
defer md.observerMu.Unlock()
// fire errors for any registered observers
for id, observerChan := range md.observers {
md.signalObserverLocked(observerChan, id, MDServerDisconnected{})
}
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"cancelObservers",
"(",
")",
"{",
"md",
".",
"observerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"md",
".",
"observerMu",
".",
"Unlock",
"(",
")",
"\n",
"// fire errors for any registered observers",
"for",
"id",
",",
"observerChan",
":=",
"range",
"md",
".",
"observers",
"{",
"md",
".",
"signalObserverLocked",
"(",
"observerChan",
",",
"id",
",",
"MDServerDisconnected",
"{",
"}",
")",
"\n",
"}",
"\n",
"}"
] | // Signal errors and clear any registered observers. | [
"Signal",
"errors",
"and",
"clear",
"any",
"registered",
"observers",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L484-L491 |
161,048 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | CancelRegistration | func (md *MDServerRemote) CancelRegistration(ctx context.Context, id tlf.ID) {
md.observerMu.Lock()
defer md.observerMu.Unlock()
observerChan, ok := md.observers[id]
if !ok {
// not registered
return
}
// signal that we've seen the update
md.signalObserverLocked(
observerChan, id, errors.New("Registration canceled"))
// Setting nil here indicates that the remote MD server thinks
// we're still registered, though locally no one is listening.
md.observers[id] = nil
} | go | func (md *MDServerRemote) CancelRegistration(ctx context.Context, id tlf.ID) {
md.observerMu.Lock()
defer md.observerMu.Unlock()
observerChan, ok := md.observers[id]
if !ok {
// not registered
return
}
// signal that we've seen the update
md.signalObserverLocked(
observerChan, id, errors.New("Registration canceled"))
// Setting nil here indicates that the remote MD server thinks
// we're still registered, though locally no one is listening.
md.observers[id] = nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"CancelRegistration",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
")",
"{",
"md",
".",
"observerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"md",
".",
"observerMu",
".",
"Unlock",
"(",
")",
"\n",
"observerChan",
",",
"ok",
":=",
"md",
".",
"observers",
"[",
"id",
"]",
"\n",
"if",
"!",
"ok",
"{",
"// not registered",
"return",
"\n",
"}",
"\n\n",
"// signal that we've seen the update",
"md",
".",
"signalObserverLocked",
"(",
"observerChan",
",",
"id",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
")",
"\n",
"// Setting nil here indicates that the remote MD server thinks",
"// we're still registered, though locally no one is listening.",
"md",
".",
"observers",
"[",
"id",
"]",
"=",
"nil",
"\n",
"}"
] | // CancelRegistration implements the MDServer interface for MDServerRemote. | [
"CancelRegistration",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L494-L509 |
161,049 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | signalObserverLocked | func (md *MDServerRemote) signalObserverLocked(observerChan chan<- error, id tlf.ID, err error) {
if observerChan != nil {
observerChan <- err
close(observerChan)
}
delete(md.observers, id)
} | go | func (md *MDServerRemote) signalObserverLocked(observerChan chan<- error, id tlf.ID, err error) {
if observerChan != nil {
observerChan <- err
close(observerChan)
}
delete(md.observers, id)
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"signalObserverLocked",
"(",
"observerChan",
"chan",
"<-",
"error",
",",
"id",
"tlf",
".",
"ID",
",",
"err",
"error",
")",
"{",
"if",
"observerChan",
"!=",
"nil",
"{",
"observerChan",
"<-",
"err",
"\n",
"close",
"(",
"observerChan",
")",
"\n",
"}",
"\n",
"delete",
"(",
"md",
".",
"observers",
",",
"id",
")",
"\n",
"}"
] | // Signal an observer. The observer lock must be held. | [
"Signal",
"an",
"observer",
".",
"The",
"observer",
"lock",
"must",
"be",
"held",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L512-L518 |
161,050 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | get | func (md *MDServerRemote) get(ctx context.Context, arg keybase1.GetMetadataArg) (
tlfID tlf.ID, rmdses []*RootMetadataSigned, err error) {
// request
response, err := md.getClient().GetMetadata(ctx, arg)
if err != nil {
return tlf.ID{}, nil, err
}
// response
tlfID, err = tlf.ParseID(response.FolderID)
if err != nil {
return tlf.ID{}, nil, err
}
// deserialize blocks
rmdses = make([]*RootMetadataSigned, len(response.MdBlocks))
diskMDCache := md.config.DiskMDCache()
for i, block := range response.MdBlocks {
ver, max := kbfsmd.MetadataVer(block.Version), md.config.MetadataVersion()
timestamp := keybase1.FromTime(block.Timestamp)
rmds, err := DecodeRootMetadataSigned(
md.config.Codec(), tlfID, ver, max, block.Block,
keybase1.FromTime(block.Timestamp))
if err != nil {
return tlf.ID{}, nil, err
}
rmdses[i] = rmds
if diskMDCache != nil && rmds.MD.MergedStatus() == kbfsmd.Merged {
err = diskMDCache.Stage(
ctx, tlfID, rmds.MD.RevisionNumber(), block.Block, ver,
timestamp)
if err != nil {
return tlf.ID{}, nil, err
}
}
}
return tlfID, rmdses, nil
} | go | func (md *MDServerRemote) get(ctx context.Context, arg keybase1.GetMetadataArg) (
tlfID tlf.ID, rmdses []*RootMetadataSigned, err error) {
// request
response, err := md.getClient().GetMetadata(ctx, arg)
if err != nil {
return tlf.ID{}, nil, err
}
// response
tlfID, err = tlf.ParseID(response.FolderID)
if err != nil {
return tlf.ID{}, nil, err
}
// deserialize blocks
rmdses = make([]*RootMetadataSigned, len(response.MdBlocks))
diskMDCache := md.config.DiskMDCache()
for i, block := range response.MdBlocks {
ver, max := kbfsmd.MetadataVer(block.Version), md.config.MetadataVersion()
timestamp := keybase1.FromTime(block.Timestamp)
rmds, err := DecodeRootMetadataSigned(
md.config.Codec(), tlfID, ver, max, block.Block,
keybase1.FromTime(block.Timestamp))
if err != nil {
return tlf.ID{}, nil, err
}
rmdses[i] = rmds
if diskMDCache != nil && rmds.MD.MergedStatus() == kbfsmd.Merged {
err = diskMDCache.Stage(
ctx, tlfID, rmds.MD.RevisionNumber(), block.Block, ver,
timestamp)
if err != nil {
return tlf.ID{}, nil, err
}
}
}
return tlfID, rmdses, nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"get",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"GetMetadataArg",
")",
"(",
"tlfID",
"tlf",
".",
"ID",
",",
"rmdses",
"[",
"]",
"*",
"RootMetadataSigned",
",",
"err",
"error",
")",
"{",
"// request",
"response",
",",
"err",
":=",
"md",
".",
"getClient",
"(",
")",
".",
"GetMetadata",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tlf",
".",
"ID",
"{",
"}",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// response",
"tlfID",
",",
"err",
"=",
"tlf",
".",
"ParseID",
"(",
"response",
".",
"FolderID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tlf",
".",
"ID",
"{",
"}",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// deserialize blocks",
"rmdses",
"=",
"make",
"(",
"[",
"]",
"*",
"RootMetadataSigned",
",",
"len",
"(",
"response",
".",
"MdBlocks",
")",
")",
"\n",
"diskMDCache",
":=",
"md",
".",
"config",
".",
"DiskMDCache",
"(",
")",
"\n",
"for",
"i",
",",
"block",
":=",
"range",
"response",
".",
"MdBlocks",
"{",
"ver",
",",
"max",
":=",
"kbfsmd",
".",
"MetadataVer",
"(",
"block",
".",
"Version",
")",
",",
"md",
".",
"config",
".",
"MetadataVersion",
"(",
")",
"\n",
"timestamp",
":=",
"keybase1",
".",
"FromTime",
"(",
"block",
".",
"Timestamp",
")",
"\n",
"rmds",
",",
"err",
":=",
"DecodeRootMetadataSigned",
"(",
"md",
".",
"config",
".",
"Codec",
"(",
")",
",",
"tlfID",
",",
"ver",
",",
"max",
",",
"block",
".",
"Block",
",",
"keybase1",
".",
"FromTime",
"(",
"block",
".",
"Timestamp",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tlf",
".",
"ID",
"{",
"}",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"rmdses",
"[",
"i",
"]",
"=",
"rmds",
"\n",
"if",
"diskMDCache",
"!=",
"nil",
"&&",
"rmds",
".",
"MD",
".",
"MergedStatus",
"(",
")",
"==",
"kbfsmd",
".",
"Merged",
"{",
"err",
"=",
"diskMDCache",
".",
"Stage",
"(",
"ctx",
",",
"tlfID",
",",
"rmds",
".",
"MD",
".",
"RevisionNumber",
"(",
")",
",",
"block",
".",
"Block",
",",
"ver",
",",
"timestamp",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tlf",
".",
"ID",
"{",
"}",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"tlfID",
",",
"rmdses",
",",
"nil",
"\n",
"}"
] | // Helper used to retrieve metadata blocks from the MD server. | [
"Helper",
"used",
"to",
"retrieve",
"metadata",
"blocks",
"from",
"the",
"MD",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L536-L573 |
161,051 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | GetForHandle | func (md *MDServerRemote) GetForHandle(ctx context.Context,
handle tlf.Handle, mStatus kbfsmd.MergeStatus, lockBeforeGet *keybase1.LockID) (
tlfID tlf.ID, rmds *RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
// TODO: Ideally, *tlf.Handle would have a nicer String() function.
md.log.LazyTrace(ctx, "MDServer: GetForHandle %+v %s", handle, mStatus)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: GetForHandle %+v %s done (err=%v)", handle, mStatus, err)
}()
encodedHandle, err := md.config.Codec().Encode(handle)
if err != nil {
return tlf.ID{}, nil, err
}
// kbfsmd.BranchID needs to be present when Unmerged is true;
// kbfsmd.NullBranchID signals that the folder's current branch ID
// should be looked up.
arg := keybase1.GetMetadataArg{
FolderHandle: encodedHandle,
BranchID: kbfsmd.NullBranchID.String(),
Unmerged: mStatus == kbfsmd.Unmerged,
LockBeforeGet: lockBeforeGet,
}
id, rmdses, err := md.get(ctx, arg)
if err != nil {
return tlf.ID{}, nil, err
}
if len(rmdses) == 0 {
return id, nil, nil
}
// TODO: Error if server returns more than one rmds.
return id, rmdses[0], nil
} | go | func (md *MDServerRemote) GetForHandle(ctx context.Context,
handle tlf.Handle, mStatus kbfsmd.MergeStatus, lockBeforeGet *keybase1.LockID) (
tlfID tlf.ID, rmds *RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
// TODO: Ideally, *tlf.Handle would have a nicer String() function.
md.log.LazyTrace(ctx, "MDServer: GetForHandle %+v %s", handle, mStatus)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: GetForHandle %+v %s done (err=%v)", handle, mStatus, err)
}()
encodedHandle, err := md.config.Codec().Encode(handle)
if err != nil {
return tlf.ID{}, nil, err
}
// kbfsmd.BranchID needs to be present when Unmerged is true;
// kbfsmd.NullBranchID signals that the folder's current branch ID
// should be looked up.
arg := keybase1.GetMetadataArg{
FolderHandle: encodedHandle,
BranchID: kbfsmd.NullBranchID.String(),
Unmerged: mStatus == kbfsmd.Unmerged,
LockBeforeGet: lockBeforeGet,
}
id, rmdses, err := md.get(ctx, arg)
if err != nil {
return tlf.ID{}, nil, err
}
if len(rmdses) == 0 {
return id, nil, nil
}
// TODO: Error if server returns more than one rmds.
return id, rmdses[0], nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"GetForHandle",
"(",
"ctx",
"context",
".",
"Context",
",",
"handle",
"tlf",
".",
"Handle",
",",
"mStatus",
"kbfsmd",
".",
"MergeStatus",
",",
"lockBeforeGet",
"*",
"keybase1",
".",
"LockID",
")",
"(",
"tlfID",
"tlf",
".",
"ID",
",",
"rmds",
"*",
"RootMetadataSigned",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"// TODO: Ideally, *tlf.Handle would have a nicer String() function.",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"handle",
",",
"mStatus",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"handle",
",",
"mStatus",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"encodedHandle",
",",
"err",
":=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Encode",
"(",
"handle",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tlf",
".",
"ID",
"{",
"}",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"// kbfsmd.BranchID needs to be present when Unmerged is true;",
"// kbfsmd.NullBranchID signals that the folder's current branch ID",
"// should be looked up.",
"arg",
":=",
"keybase1",
".",
"GetMetadataArg",
"{",
"FolderHandle",
":",
"encodedHandle",
",",
"BranchID",
":",
"kbfsmd",
".",
"NullBranchID",
".",
"String",
"(",
")",
",",
"Unmerged",
":",
"mStatus",
"==",
"kbfsmd",
".",
"Unmerged",
",",
"LockBeforeGet",
":",
"lockBeforeGet",
",",
"}",
"\n\n",
"id",
",",
"rmdses",
",",
"err",
":=",
"md",
".",
"get",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tlf",
".",
"ID",
"{",
"}",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"len",
"(",
"rmdses",
")",
"==",
"0",
"{",
"return",
"id",
",",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"// TODO: Error if server returns more than one rmds.",
"return",
"id",
",",
"rmdses",
"[",
"0",
"]",
",",
"nil",
"\n",
"}"
] | // GetForHandle implements the MDServer interface for MDServerRemote. | [
"GetForHandle",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L576-L609 |
161,052 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | GetForTLF | func (md *MDServerRemote) GetForTLF(ctx context.Context, id tlf.ID,
bid kbfsmd.BranchID, mStatus kbfsmd.MergeStatus, lockBeforeGet *keybase1.LockID) (rmds *RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: GetForTLF %s %s %s", id, bid, mStatus)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: GetForTLF %s %s %s done (err=%v)", id, bid, mStatus, err)
}()
var cachedRmds *RootMetadataSigned
getCtx := ctx
if mStatus == kbfsmd.Merged && lockBeforeGet == nil {
cachedRmds, err = md.getLatestFromCache(ctx, id)
if err == nil && cachedRmds != nil {
md.log.CDebugf(ctx,
"Read revision %d for TLF %s from the disk cache",
cachedRmds.MD.RevisionNumber(), id)
var cancel context.CancelFunc
getCtx, cancel = context.WithTimeout(
ctx, mdServerTimeoutWhenMDCached)
defer cancel()
}
}
arg := keybase1.GetMetadataArg{
FolderID: id.String(),
BranchID: bid.String(),
Unmerged: mStatus == kbfsmd.Unmerged,
LockBeforeGet: lockBeforeGet,
}
_, rmdses, err := md.get(getCtx, arg)
switch errors.Cause(err) {
case nil:
case context.DeadlineExceeded:
if cachedRmds != nil {
md.log.CDebugf(ctx, "Can't contact server; using cached MD")
return cachedRmds, nil
}
return nil, err
default:
return nil, err
}
if len(rmdses) == 0 {
return nil, nil
}
if cachedRmds != nil {
md.log.CDebugf(ctx, "Read revision %d for TLF %s from the server",
rmdses[0].MD.RevisionNumber(), id)
}
// TODO: Error if server returns more than one rmds.
return rmdses[0], nil
} | go | func (md *MDServerRemote) GetForTLF(ctx context.Context, id tlf.ID,
bid kbfsmd.BranchID, mStatus kbfsmd.MergeStatus, lockBeforeGet *keybase1.LockID) (rmds *RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: GetForTLF %s %s %s", id, bid, mStatus)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: GetForTLF %s %s %s done (err=%v)", id, bid, mStatus, err)
}()
var cachedRmds *RootMetadataSigned
getCtx := ctx
if mStatus == kbfsmd.Merged && lockBeforeGet == nil {
cachedRmds, err = md.getLatestFromCache(ctx, id)
if err == nil && cachedRmds != nil {
md.log.CDebugf(ctx,
"Read revision %d for TLF %s from the disk cache",
cachedRmds.MD.RevisionNumber(), id)
var cancel context.CancelFunc
getCtx, cancel = context.WithTimeout(
ctx, mdServerTimeoutWhenMDCached)
defer cancel()
}
}
arg := keybase1.GetMetadataArg{
FolderID: id.String(),
BranchID: bid.String(),
Unmerged: mStatus == kbfsmd.Unmerged,
LockBeforeGet: lockBeforeGet,
}
_, rmdses, err := md.get(getCtx, arg)
switch errors.Cause(err) {
case nil:
case context.DeadlineExceeded:
if cachedRmds != nil {
md.log.CDebugf(ctx, "Can't contact server; using cached MD")
return cachedRmds, nil
}
return nil, err
default:
return nil, err
}
if len(rmdses) == 0 {
return nil, nil
}
if cachedRmds != nil {
md.log.CDebugf(ctx, "Read revision %d for TLF %s from the server",
rmdses[0].MD.RevisionNumber(), id)
}
// TODO: Error if server returns more than one rmds.
return rmdses[0], nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"GetForTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
",",
"bid",
"kbfsmd",
".",
"BranchID",
",",
"mStatus",
"kbfsmd",
".",
"MergeStatus",
",",
"lockBeforeGet",
"*",
"keybase1",
".",
"LockID",
")",
"(",
"rmds",
"*",
"RootMetadataSigned",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"bid",
",",
"mStatus",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"bid",
",",
"mStatus",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"var",
"cachedRmds",
"*",
"RootMetadataSigned",
"\n",
"getCtx",
":=",
"ctx",
"\n",
"if",
"mStatus",
"==",
"kbfsmd",
".",
"Merged",
"&&",
"lockBeforeGet",
"==",
"nil",
"{",
"cachedRmds",
",",
"err",
"=",
"md",
".",
"getLatestFromCache",
"(",
"ctx",
",",
"id",
")",
"\n",
"if",
"err",
"==",
"nil",
"&&",
"cachedRmds",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"cachedRmds",
".",
"MD",
".",
"RevisionNumber",
"(",
")",
",",
"id",
")",
"\n",
"var",
"cancel",
"context",
".",
"CancelFunc",
"\n",
"getCtx",
",",
"cancel",
"=",
"context",
".",
"WithTimeout",
"(",
"ctx",
",",
"mdServerTimeoutWhenMDCached",
")",
"\n",
"defer",
"cancel",
"(",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"arg",
":=",
"keybase1",
".",
"GetMetadataArg",
"{",
"FolderID",
":",
"id",
".",
"String",
"(",
")",
",",
"BranchID",
":",
"bid",
".",
"String",
"(",
")",
",",
"Unmerged",
":",
"mStatus",
"==",
"kbfsmd",
".",
"Unmerged",
",",
"LockBeforeGet",
":",
"lockBeforeGet",
",",
"}",
"\n\n",
"_",
",",
"rmdses",
",",
"err",
":=",
"md",
".",
"get",
"(",
"getCtx",
",",
"arg",
")",
"\n",
"switch",
"errors",
".",
"Cause",
"(",
"err",
")",
"{",
"case",
"nil",
":",
"case",
"context",
".",
"DeadlineExceeded",
":",
"if",
"cachedRmds",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"return",
"cachedRmds",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"err",
"\n",
"default",
":",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"rmdses",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"cachedRmds",
"!=",
"nil",
"{",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"rmdses",
"[",
"0",
"]",
".",
"MD",
".",
"RevisionNumber",
"(",
")",
",",
"id",
")",
"\n",
"}",
"\n\n",
"// TODO: Error if server returns more than one rmds.",
"return",
"rmdses",
"[",
"0",
"]",
",",
"nil",
"\n",
"}"
] | // GetForTLF implements the MDServer interface for MDServerRemote. | [
"GetForTLF",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L612-L666 |
161,053 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | GetForTLFByTime | func (md *MDServerRemote) GetForTLFByTime(
ctx context.Context, id tlf.ID, serverTime time.Time) (
rmds *RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: GetForTLFByTime %s %s", id, serverTime)
defer func() {
md.deferLog.LazyTrace(
ctx, "MDServer: GetForTLFByTime %s %s done (err=%v)",
id, serverTime, err)
}()
arg := keybase1.GetMetadataByTimestampArg{
FolderID: id.String(),
ServerTime: keybase1.ToTime(serverTime),
}
block, err := md.getClient().GetMetadataByTimestamp(ctx, arg)
if err != nil {
return nil, err
} else if len(block.Block) == 0 {
return nil, errors.Errorf("No revision available at %s", serverTime)
}
ver, max := kbfsmd.MetadataVer(block.Version), md.config.MetadataVersion()
rmds, err = DecodeRootMetadataSigned(
md.config.Codec(), id, ver, max, block.Block,
keybase1.FromTime(block.Timestamp))
if err != nil {
return nil, err
}
return rmds, nil
} | go | func (md *MDServerRemote) GetForTLFByTime(
ctx context.Context, id tlf.ID, serverTime time.Time) (
rmds *RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: GetForTLFByTime %s %s", id, serverTime)
defer func() {
md.deferLog.LazyTrace(
ctx, "MDServer: GetForTLFByTime %s %s done (err=%v)",
id, serverTime, err)
}()
arg := keybase1.GetMetadataByTimestampArg{
FolderID: id.String(),
ServerTime: keybase1.ToTime(serverTime),
}
block, err := md.getClient().GetMetadataByTimestamp(ctx, arg)
if err != nil {
return nil, err
} else if len(block.Block) == 0 {
return nil, errors.Errorf("No revision available at %s", serverTime)
}
ver, max := kbfsmd.MetadataVer(block.Version), md.config.MetadataVersion()
rmds, err = DecodeRootMetadataSigned(
md.config.Codec(), id, ver, max, block.Block,
keybase1.FromTime(block.Timestamp))
if err != nil {
return nil, err
}
return rmds, nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"GetForTLFByTime",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
",",
"serverTime",
"time",
".",
"Time",
")",
"(",
"rmds",
"*",
"RootMetadataSigned",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"serverTime",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"serverTime",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"arg",
":=",
"keybase1",
".",
"GetMetadataByTimestampArg",
"{",
"FolderID",
":",
"id",
".",
"String",
"(",
")",
",",
"ServerTime",
":",
"keybase1",
".",
"ToTime",
"(",
"serverTime",
")",
",",
"}",
"\n\n",
"block",
",",
"err",
":=",
"md",
".",
"getClient",
"(",
")",
".",
"GetMetadataByTimestamp",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"else",
"if",
"len",
"(",
"block",
".",
"Block",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"serverTime",
")",
"\n",
"}",
"\n\n",
"ver",
",",
"max",
":=",
"kbfsmd",
".",
"MetadataVer",
"(",
"block",
".",
"Version",
")",
",",
"md",
".",
"config",
".",
"MetadataVersion",
"(",
")",
"\n",
"rmds",
",",
"err",
"=",
"DecodeRootMetadataSigned",
"(",
"md",
".",
"config",
".",
"Codec",
"(",
")",
",",
"id",
",",
"ver",
",",
"max",
",",
"block",
".",
"Block",
",",
"keybase1",
".",
"FromTime",
"(",
"block",
".",
"Timestamp",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"rmds",
",",
"nil",
"\n",
"}"
] | // GetForTLFByTime implements the MDServer interface for MDServerRemote. | [
"GetForTLFByTime",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L669-L700 |
161,054 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | GetRange | func (md *MDServerRemote) GetRange(ctx context.Context, id tlf.ID,
bid kbfsmd.BranchID, mStatus kbfsmd.MergeStatus,
start, stop kbfsmd.Revision, lockBeforeGet *keybase1.LockID) (
rmdses []*RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: GetRange %s %s %s %d-%d", id, bid, mStatus, start, stop)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: GetRange %s %s %s %d-%d done (err=%v)", id, bid, mStatus, start, stop, err)
}()
arg := keybase1.GetMetadataArg{
FolderID: id.String(),
BranchID: bid.String(),
Unmerged: mStatus == kbfsmd.Unmerged,
StartRevision: start.Number(),
StopRevision: stop.Number(),
LockBeforeGet: lockBeforeGet,
}
_, rmds, err := md.get(ctx, arg)
return rmds, err
} | go | func (md *MDServerRemote) GetRange(ctx context.Context, id tlf.ID,
bid kbfsmd.BranchID, mStatus kbfsmd.MergeStatus,
start, stop kbfsmd.Revision, lockBeforeGet *keybase1.LockID) (
rmdses []*RootMetadataSigned, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: GetRange %s %s %s %d-%d", id, bid, mStatus, start, stop)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: GetRange %s %s %s %d-%d done (err=%v)", id, bid, mStatus, start, stop, err)
}()
arg := keybase1.GetMetadataArg{
FolderID: id.String(),
BranchID: bid.String(),
Unmerged: mStatus == kbfsmd.Unmerged,
StartRevision: start.Number(),
StopRevision: stop.Number(),
LockBeforeGet: lockBeforeGet,
}
_, rmds, err := md.get(ctx, arg)
return rmds, err
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"GetRange",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
",",
"bid",
"kbfsmd",
".",
"BranchID",
",",
"mStatus",
"kbfsmd",
".",
"MergeStatus",
",",
"start",
",",
"stop",
"kbfsmd",
".",
"Revision",
",",
"lockBeforeGet",
"*",
"keybase1",
".",
"LockID",
")",
"(",
"rmdses",
"[",
"]",
"*",
"RootMetadataSigned",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"bid",
",",
"mStatus",
",",
"start",
",",
"stop",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"bid",
",",
"mStatus",
",",
"start",
",",
"stop",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"arg",
":=",
"keybase1",
".",
"GetMetadataArg",
"{",
"FolderID",
":",
"id",
".",
"String",
"(",
")",
",",
"BranchID",
":",
"bid",
".",
"String",
"(",
")",
",",
"Unmerged",
":",
"mStatus",
"==",
"kbfsmd",
".",
"Unmerged",
",",
"StartRevision",
":",
"start",
".",
"Number",
"(",
")",
",",
"StopRevision",
":",
"stop",
".",
"Number",
"(",
")",
",",
"LockBeforeGet",
":",
"lockBeforeGet",
",",
"}",
"\n\n",
"_",
",",
"rmds",
",",
"err",
":=",
"md",
".",
"get",
"(",
"ctx",
",",
"arg",
")",
"\n",
"return",
"rmds",
",",
"err",
"\n",
"}"
] | // GetRange implements the MDServer interface for MDServerRemote. | [
"GetRange",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L703-L724 |
161,055 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | Lock | func (md *MDServerRemote) Lock(ctx context.Context,
tlfID tlf.ID, lockID keybase1.LockID) error {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: Lock %s %s", tlfID, lockID)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: Lock %s %s", tlfID, lockID)
}()
return md.getClient().Lock(ctx, keybase1.LockArg{
FolderID: tlfID.String(),
LockID: lockID,
})
} | go | func (md *MDServerRemote) Lock(ctx context.Context,
tlfID tlf.ID, lockID keybase1.LockID) error {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: Lock %s %s", tlfID, lockID)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: Lock %s %s", tlfID, lockID)
}()
return md.getClient().Lock(ctx, keybase1.LockArg{
FolderID: tlfID.String(),
LockID: lockID,
})
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"Lock",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"lockID",
"keybase1",
".",
"LockID",
")",
"error",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"lockID",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"lockID",
")",
"\n",
"}",
"(",
")",
"\n",
"return",
"md",
".",
"getClient",
"(",
")",
".",
"Lock",
"(",
"ctx",
",",
"keybase1",
".",
"LockArg",
"{",
"FolderID",
":",
"tlfID",
".",
"String",
"(",
")",
",",
"LockID",
":",
"lockID",
",",
"}",
")",
"\n",
"}"
] | // Lock implements the MDServer interface for MDServerRemote. | [
"Lock",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L818-L829 |
161,056 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | PruneBranch | func (md *MDServerRemote) PruneBranch(
ctx context.Context, id tlf.ID, bid kbfsmd.BranchID) (err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: PruneBranch %s %s", id, bid)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: PruneBranch %s %s (err=%v)", id, bid, err)
}()
arg := keybase1.PruneBranchArg{
FolderID: id.String(),
BranchID: bid.String(),
LogTags: nil,
}
return md.getClient().PruneBranch(ctx, arg)
} | go | func (md *MDServerRemote) PruneBranch(
ctx context.Context, id tlf.ID, bid kbfsmd.BranchID) (err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "MDServer: PruneBranch %s %s", id, bid)
defer func() {
md.deferLog.LazyTrace(ctx, "MDServer: PruneBranch %s %s (err=%v)", id, bid, err)
}()
arg := keybase1.PruneBranchArg{
FolderID: id.String(),
BranchID: bid.String(),
LogTags: nil,
}
return md.getClient().PruneBranch(ctx, arg)
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"PruneBranch",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
",",
"bid",
"kbfsmd",
".",
"BranchID",
")",
"(",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"bid",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
",",
"bid",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"arg",
":=",
"keybase1",
".",
"PruneBranchArg",
"{",
"FolderID",
":",
"id",
".",
"String",
"(",
")",
",",
"BranchID",
":",
"bid",
".",
"String",
"(",
")",
",",
"LogTags",
":",
"nil",
",",
"}",
"\n",
"return",
"md",
".",
"getClient",
"(",
")",
".",
"PruneBranch",
"(",
"ctx",
",",
"arg",
")",
"\n",
"}"
] | // PruneBranch implements the MDServer interface for MDServerRemote. | [
"PruneBranch",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L860-L874 |
161,057 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | MetadataUpdate | func (md *MDServerRemote) MetadataUpdate(_ context.Context, arg keybase1.MetadataUpdateArg) error {
id, err := tlf.ParseID(arg.FolderID)
if err != nil {
return err
}
md.observerMu.Lock()
defer md.observerMu.Unlock()
observerChan, ok := md.observers[id]
if !ok {
// not registered
return nil
}
// signal that we've seen the update
md.signalObserverLocked(observerChan, id, nil)
return nil
} | go | func (md *MDServerRemote) MetadataUpdate(_ context.Context, arg keybase1.MetadataUpdateArg) error {
id, err := tlf.ParseID(arg.FolderID)
if err != nil {
return err
}
md.observerMu.Lock()
defer md.observerMu.Unlock()
observerChan, ok := md.observers[id]
if !ok {
// not registered
return nil
}
// signal that we've seen the update
md.signalObserverLocked(observerChan, id, nil)
return nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"MetadataUpdate",
"(",
"_",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"MetadataUpdateArg",
")",
"error",
"{",
"id",
",",
"err",
":=",
"tlf",
".",
"ParseID",
"(",
"arg",
".",
"FolderID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"md",
".",
"observerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"md",
".",
"observerMu",
".",
"Unlock",
"(",
")",
"\n",
"observerChan",
",",
"ok",
":=",
"md",
".",
"observers",
"[",
"id",
"]",
"\n",
"if",
"!",
"ok",
"{",
"// not registered",
"return",
"nil",
"\n",
"}",
"\n\n",
"// signal that we've seen the update",
"md",
".",
"signalObserverLocked",
"(",
"observerChan",
",",
"id",
",",
"nil",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // MetadataUpdate implements the MetadataUpdateProtocol interface. | [
"MetadataUpdate",
"implements",
"the",
"MetadataUpdateProtocol",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L877-L894 |
161,058 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | FoldersNeedRekey | func (md *MDServerRemote) FoldersNeedRekey(ctx context.Context,
requests []keybase1.RekeyRequest) error {
if md.squelchRekey {
md.log.CDebugf(ctx, "MDServerRemote: rekey updates squelched for testing")
return nil
}
for _, req := range requests {
id, err := tlf.ParseID(req.FolderID)
if err != nil {
return err
}
md.log.CDebugf(ctx, "MDServerRemote: folder needs rekey: %s", id.String())
// queue the folder for rekeying
md.config.RekeyQueue().Enqueue(id)
}
// Reset the timer in case there are a lot of rekey folders
// dribbling in from the server still.
md.resetRekeyTimer()
return nil
} | go | func (md *MDServerRemote) FoldersNeedRekey(ctx context.Context,
requests []keybase1.RekeyRequest) error {
if md.squelchRekey {
md.log.CDebugf(ctx, "MDServerRemote: rekey updates squelched for testing")
return nil
}
for _, req := range requests {
id, err := tlf.ParseID(req.FolderID)
if err != nil {
return err
}
md.log.CDebugf(ctx, "MDServerRemote: folder needs rekey: %s", id.String())
// queue the folder for rekeying
md.config.RekeyQueue().Enqueue(id)
}
// Reset the timer in case there are a lot of rekey folders
// dribbling in from the server still.
md.resetRekeyTimer()
return nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"FoldersNeedRekey",
"(",
"ctx",
"context",
".",
"Context",
",",
"requests",
"[",
"]",
"keybase1",
".",
"RekeyRequest",
")",
"error",
"{",
"if",
"md",
".",
"squelchRekey",
"{",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"for",
"_",
",",
"req",
":=",
"range",
"requests",
"{",
"id",
",",
"err",
":=",
"tlf",
".",
"ParseID",
"(",
"req",
".",
"FolderID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
".",
"String",
"(",
")",
")",
"\n",
"// queue the folder for rekeying",
"md",
".",
"config",
".",
"RekeyQueue",
"(",
")",
".",
"Enqueue",
"(",
"id",
")",
"\n",
"}",
"\n",
"// Reset the timer in case there are a lot of rekey folders",
"// dribbling in from the server still.",
"md",
".",
"resetRekeyTimer",
"(",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // FoldersNeedRekey implements the MetadataUpdateProtocol interface. | [
"FoldersNeedRekey",
"implements",
"the",
"MetadataUpdateProtocol",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L897-L916 |
161,059 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | FolderNeedsRekey | func (md *MDServerRemote) FolderNeedsRekey(ctx context.Context,
arg keybase1.FolderNeedsRekeyArg) error {
id, err := tlf.ParseID(arg.FolderID)
if err != nil {
return err
}
md.log.CDebugf(ctx, "MDServerRemote: folder needs rekey: %s", id.String())
if md.squelchRekey {
md.log.CDebugf(ctx, "MDServerRemote: rekey updates squelched for testing")
return nil
}
// queue the folder for rekeying
md.config.RekeyQueue().Enqueue(id)
// Reset the timer in case there are a lot of rekey folders
// dribbling in from the server still.
md.resetRekeyTimer()
return nil
} | go | func (md *MDServerRemote) FolderNeedsRekey(ctx context.Context,
arg keybase1.FolderNeedsRekeyArg) error {
id, err := tlf.ParseID(arg.FolderID)
if err != nil {
return err
}
md.log.CDebugf(ctx, "MDServerRemote: folder needs rekey: %s", id.String())
if md.squelchRekey {
md.log.CDebugf(ctx, "MDServerRemote: rekey updates squelched for testing")
return nil
}
// queue the folder for rekeying
md.config.RekeyQueue().Enqueue(id)
// Reset the timer in case there are a lot of rekey folders
// dribbling in from the server still.
md.resetRekeyTimer()
return nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"FolderNeedsRekey",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"FolderNeedsRekeyArg",
")",
"error",
"{",
"id",
",",
"err",
":=",
"tlf",
".",
"ParseID",
"(",
"arg",
".",
"FolderID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"id",
".",
"String",
"(",
")",
")",
"\n",
"if",
"md",
".",
"squelchRekey",
"{",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"// queue the folder for rekeying",
"md",
".",
"config",
".",
"RekeyQueue",
"(",
")",
".",
"Enqueue",
"(",
"id",
")",
"\n",
"// Reset the timer in case there are a lot of rekey folders",
"// dribbling in from the server still.",
"md",
".",
"resetRekeyTimer",
"(",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // FolderNeedsRekey implements the MetadataUpdateProtocol interface. | [
"FolderNeedsRekey",
"implements",
"the",
"MetadataUpdateProtocol",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L919-L936 |
161,060 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | RegisterForUpdate | func (md *MDServerRemote) RegisterForUpdate(ctx context.Context, id tlf.ID,
currHead kbfsmd.Revision) (<-chan error, error) {
arg := keybase1.RegisterForUpdatesArg{
FolderID: id.String(),
CurrRevision: currHead.Number(),
LogTags: nil,
}
// register
var c chan error
conn := md.getConn()
err := conn.DoCommand(ctx, "register", func(rawClient rpc.GenericClient) error {
// set up the server to receive updates, since we may
// get disconnected between retries.
server := conn.GetServer()
err := server.Register(keybase1.MetadataUpdateProtocol(md))
if err != nil {
if _, ok := err.(rpc.AlreadyRegisteredError); !ok {
return err
}
}
// TODO: Do something with server.Err() when server is
// done?
server.Run()
// keep re-adding the observer on retries, since
// disconnects or connection errors clear observers.
alreadyRegistered := func() bool {
md.observerMu.Lock()
defer md.observerMu.Unlock()
// It's possible for a nil channel to be in
// `md.observers`, if we are still registered with the
// server after a previous cancellation.
existingCh, alreadyRegistered := md.observers[id]
if existingCh != nil {
panic(fmt.Sprintf(
"Attempted double-registration for folder: %s", id))
}
c = make(chan error, 1)
md.observers[id] = c
return alreadyRegistered
}()
if alreadyRegistered {
return nil
}
// Use this instead of md.client since we're already
// inside a DoCommand().
c := keybase1.MetadataClient{Cli: rawClient}
err = c.RegisterForUpdates(ctx, arg)
if err != nil {
func() {
md.observerMu.Lock()
defer md.observerMu.Unlock()
// we could've been canceled by a shutdown so look this up
// again before closing and deleting.
if updateChan, ok := md.observers[id]; ok {
close(updateChan)
delete(md.observers, id)
}
}()
}
return err
})
if err != nil {
c = nil
}
return c, err
} | go | func (md *MDServerRemote) RegisterForUpdate(ctx context.Context, id tlf.ID,
currHead kbfsmd.Revision) (<-chan error, error) {
arg := keybase1.RegisterForUpdatesArg{
FolderID: id.String(),
CurrRevision: currHead.Number(),
LogTags: nil,
}
// register
var c chan error
conn := md.getConn()
err := conn.DoCommand(ctx, "register", func(rawClient rpc.GenericClient) error {
// set up the server to receive updates, since we may
// get disconnected between retries.
server := conn.GetServer()
err := server.Register(keybase1.MetadataUpdateProtocol(md))
if err != nil {
if _, ok := err.(rpc.AlreadyRegisteredError); !ok {
return err
}
}
// TODO: Do something with server.Err() when server is
// done?
server.Run()
// keep re-adding the observer on retries, since
// disconnects or connection errors clear observers.
alreadyRegistered := func() bool {
md.observerMu.Lock()
defer md.observerMu.Unlock()
// It's possible for a nil channel to be in
// `md.observers`, if we are still registered with the
// server after a previous cancellation.
existingCh, alreadyRegistered := md.observers[id]
if existingCh != nil {
panic(fmt.Sprintf(
"Attempted double-registration for folder: %s", id))
}
c = make(chan error, 1)
md.observers[id] = c
return alreadyRegistered
}()
if alreadyRegistered {
return nil
}
// Use this instead of md.client since we're already
// inside a DoCommand().
c := keybase1.MetadataClient{Cli: rawClient}
err = c.RegisterForUpdates(ctx, arg)
if err != nil {
func() {
md.observerMu.Lock()
defer md.observerMu.Unlock()
// we could've been canceled by a shutdown so look this up
// again before closing and deleting.
if updateChan, ok := md.observers[id]; ok {
close(updateChan)
delete(md.observers, id)
}
}()
}
return err
})
if err != nil {
c = nil
}
return c, err
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"RegisterForUpdate",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
",",
"currHead",
"kbfsmd",
".",
"Revision",
")",
"(",
"<-",
"chan",
"error",
",",
"error",
")",
"{",
"arg",
":=",
"keybase1",
".",
"RegisterForUpdatesArg",
"{",
"FolderID",
":",
"id",
".",
"String",
"(",
")",
",",
"CurrRevision",
":",
"currHead",
".",
"Number",
"(",
")",
",",
"LogTags",
":",
"nil",
",",
"}",
"\n\n",
"// register",
"var",
"c",
"chan",
"error",
"\n",
"conn",
":=",
"md",
".",
"getConn",
"(",
")",
"\n",
"err",
":=",
"conn",
".",
"DoCommand",
"(",
"ctx",
",",
"\"",
"\"",
",",
"func",
"(",
"rawClient",
"rpc",
".",
"GenericClient",
")",
"error",
"{",
"// set up the server to receive updates, since we may",
"// get disconnected between retries.",
"server",
":=",
"conn",
".",
"GetServer",
"(",
")",
"\n",
"err",
":=",
"server",
".",
"Register",
"(",
"keybase1",
".",
"MetadataUpdateProtocol",
"(",
"md",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"_",
",",
"ok",
":=",
"err",
".",
"(",
"rpc",
".",
"AlreadyRegisteredError",
")",
";",
"!",
"ok",
"{",
"return",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"// TODO: Do something with server.Err() when server is",
"// done?",
"server",
".",
"Run",
"(",
")",
"\n\n",
"// keep re-adding the observer on retries, since",
"// disconnects or connection errors clear observers.",
"alreadyRegistered",
":=",
"func",
"(",
")",
"bool",
"{",
"md",
".",
"observerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"md",
".",
"observerMu",
".",
"Unlock",
"(",
")",
"\n",
"// It's possible for a nil channel to be in",
"// `md.observers`, if we are still registered with the",
"// server after a previous cancellation.",
"existingCh",
",",
"alreadyRegistered",
":=",
"md",
".",
"observers",
"[",
"id",
"]",
"\n",
"if",
"existingCh",
"!=",
"nil",
"{",
"panic",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"id",
")",
")",
"\n",
"}",
"\n",
"c",
"=",
"make",
"(",
"chan",
"error",
",",
"1",
")",
"\n",
"md",
".",
"observers",
"[",
"id",
"]",
"=",
"c",
"\n",
"return",
"alreadyRegistered",
"\n",
"}",
"(",
")",
"\n",
"if",
"alreadyRegistered",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"// Use this instead of md.client since we're already",
"// inside a DoCommand().",
"c",
":=",
"keybase1",
".",
"MetadataClient",
"{",
"Cli",
":",
"rawClient",
"}",
"\n",
"err",
"=",
"c",
".",
"RegisterForUpdates",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"func",
"(",
")",
"{",
"md",
".",
"observerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"md",
".",
"observerMu",
".",
"Unlock",
"(",
")",
"\n",
"// we could've been canceled by a shutdown so look this up",
"// again before closing and deleting.",
"if",
"updateChan",
",",
"ok",
":=",
"md",
".",
"observers",
"[",
"id",
"]",
";",
"ok",
"{",
"close",
"(",
"updateChan",
")",
"\n",
"delete",
"(",
"md",
".",
"observers",
",",
"id",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"c",
"=",
"nil",
"\n",
"}",
"\n\n",
"return",
"c",
",",
"err",
"\n",
"}"
] | // RegisterForUpdate implements the MDServer interface for MDServerRemote. | [
"RegisterForUpdate",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L945-L1013 |
161,061 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | OffsetFromServerTime | func (md *MDServerRemote) OffsetFromServerTime() (time.Duration, bool) {
md.serverOffsetMu.RLock()
defer md.serverOffsetMu.RUnlock()
return md.serverOffset, md.serverOffsetKnown
} | go | func (md *MDServerRemote) OffsetFromServerTime() (time.Duration, bool) {
md.serverOffsetMu.RLock()
defer md.serverOffsetMu.RUnlock()
return md.serverOffset, md.serverOffsetKnown
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"OffsetFromServerTime",
"(",
")",
"(",
"time",
".",
"Duration",
",",
"bool",
")",
"{",
"md",
".",
"serverOffsetMu",
".",
"RLock",
"(",
")",
"\n",
"defer",
"md",
".",
"serverOffsetMu",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"md",
".",
"serverOffset",
",",
"md",
".",
"serverOffsetKnown",
"\n",
"}"
] | // OffsetFromServerTime implements the MDServer interface for
// MDServerRemote. | [
"OffsetFromServerTime",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1102-L1106 |
161,062 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | getFoldersForRekey | func (md *MDServerRemote) getFoldersForRekey(ctx context.Context,
client keybase1.MetadataClient) error {
// get this device's crypt public key
session, err := md.config.KBPKI().GetCurrentSession(ctx)
if err != nil {
return err
}
return client.GetFoldersForRekey(ctx, session.CryptPublicKey.KID())
} | go | func (md *MDServerRemote) getFoldersForRekey(ctx context.Context,
client keybase1.MetadataClient) error {
// get this device's crypt public key
session, err := md.config.KBPKI().GetCurrentSession(ctx)
if err != nil {
return err
}
return client.GetFoldersForRekey(ctx, session.CryptPublicKey.KID())
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"getFoldersForRekey",
"(",
"ctx",
"context",
".",
"Context",
",",
"client",
"keybase1",
".",
"MetadataClient",
")",
"error",
"{",
"// get this device's crypt public key",
"session",
",",
"err",
":=",
"md",
".",
"config",
".",
"KBPKI",
"(",
")",
".",
"GetCurrentSession",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"return",
"client",
".",
"GetFoldersForRekey",
"(",
"ctx",
",",
"session",
".",
"CryptPublicKey",
".",
"KID",
"(",
")",
")",
"\n",
"}"
] | // getFoldersForRekey registers to receive updates about folders needing rekey actions. | [
"getFoldersForRekey",
"registers",
"to",
"receive",
"updates",
"about",
"folders",
"needing",
"rekey",
"actions",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1146-L1154 |
161,063 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | Shutdown | func (md *MDServerRemote) Shutdown() {
md.connMu.Lock()
defer md.connMu.Unlock()
// close the connection
md.conn.Shutdown()
// cancel pending observers
md.cancelObservers()
// cancel the ping ticker
md.pinger.cancelTicker()
// cancel the auth token ticker
if md.authToken != nil {
md.authToken.Shutdown()
}
if md.rekeyCancel != nil {
md.rekeyCancel()
}
} | go | func (md *MDServerRemote) Shutdown() {
md.connMu.Lock()
defer md.connMu.Unlock()
// close the connection
md.conn.Shutdown()
// cancel pending observers
md.cancelObservers()
// cancel the ping ticker
md.pinger.cancelTicker()
// cancel the auth token ticker
if md.authToken != nil {
md.authToken.Shutdown()
}
if md.rekeyCancel != nil {
md.rekeyCancel()
}
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"Shutdown",
"(",
")",
"{",
"md",
".",
"connMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"md",
".",
"connMu",
".",
"Unlock",
"(",
")",
"\n\n",
"// close the connection",
"md",
".",
"conn",
".",
"Shutdown",
"(",
")",
"\n",
"// cancel pending observers",
"md",
".",
"cancelObservers",
"(",
")",
"\n",
"// cancel the ping ticker",
"md",
".",
"pinger",
".",
"cancelTicker",
"(",
")",
"\n",
"// cancel the auth token ticker",
"if",
"md",
".",
"authToken",
"!=",
"nil",
"{",
"md",
".",
"authToken",
".",
"Shutdown",
"(",
")",
"\n",
"}",
"\n",
"if",
"md",
".",
"rekeyCancel",
"!=",
"nil",
"{",
"md",
".",
"rekeyCancel",
"(",
")",
"\n",
"}",
"\n",
"}"
] | // Shutdown implements the MDServer interface for MDServerRemote. | [
"Shutdown",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1157-L1174 |
161,064 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | IsConnected | func (md *MDServerRemote) IsConnected() bool {
conn := md.getConn()
return conn != nil && conn.IsConnected()
} | go | func (md *MDServerRemote) IsConnected() bool {
conn := md.getConn()
return conn != nil && conn.IsConnected()
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"IsConnected",
"(",
")",
"bool",
"{",
"conn",
":=",
"md",
".",
"getConn",
"(",
")",
"\n",
"return",
"conn",
"!=",
"nil",
"&&",
"conn",
".",
"IsConnected",
"(",
")",
"\n",
"}"
] | // IsConnected implements the MDServer interface for MDServerLocal | [
"IsConnected",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerLocal"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1177-L1180 |
161,065 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | GetTLFCryptKeyServerHalf | func (md *MDServerRemote) GetTLFCryptKeyServerHalf(ctx context.Context,
serverHalfID kbfscrypto.TLFCryptKeyServerHalfID,
cryptKey kbfscrypto.CryptPublicKey) (
serverHalf kbfscrypto.TLFCryptKeyServerHalf, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: GetTLFCryptKeyServerHalf %s", serverHalfID)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: GetTLFCryptKeyServerHalf %s (err=%v)", serverHalfID, err)
}()
// encode the ID
idBytes, err := md.config.Codec().Encode(serverHalfID)
if err != nil {
return
}
// get the key
arg := keybase1.GetKeyArg{
KeyHalfID: idBytes,
DeviceKID: cryptKey.KID().String(),
LogTags: nil,
}
keyBytes, err := md.getClient().GetKey(ctx, arg)
if err != nil {
return
}
// decode the key
err = md.config.Codec().Decode(keyBytes, &serverHalf)
if err != nil {
return
}
return
} | go | func (md *MDServerRemote) GetTLFCryptKeyServerHalf(ctx context.Context,
serverHalfID kbfscrypto.TLFCryptKeyServerHalfID,
cryptKey kbfscrypto.CryptPublicKey) (
serverHalf kbfscrypto.TLFCryptKeyServerHalf, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: GetTLFCryptKeyServerHalf %s", serverHalfID)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: GetTLFCryptKeyServerHalf %s (err=%v)", serverHalfID, err)
}()
// encode the ID
idBytes, err := md.config.Codec().Encode(serverHalfID)
if err != nil {
return
}
// get the key
arg := keybase1.GetKeyArg{
KeyHalfID: idBytes,
DeviceKID: cryptKey.KID().String(),
LogTags: nil,
}
keyBytes, err := md.getClient().GetKey(ctx, arg)
if err != nil {
return
}
// decode the key
err = md.config.Codec().Decode(keyBytes, &serverHalf)
if err != nil {
return
}
return
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"GetTLFCryptKeyServerHalf",
"(",
"ctx",
"context",
".",
"Context",
",",
"serverHalfID",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
",",
"cryptKey",
"kbfscrypto",
".",
"CryptPublicKey",
")",
"(",
"serverHalf",
"kbfscrypto",
".",
"TLFCryptKeyServerHalf",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"serverHalfID",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"serverHalfID",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"// encode the ID",
"idBytes",
",",
"err",
":=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Encode",
"(",
"serverHalfID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"// get the key",
"arg",
":=",
"keybase1",
".",
"GetKeyArg",
"{",
"KeyHalfID",
":",
"idBytes",
",",
"DeviceKID",
":",
"cryptKey",
".",
"KID",
"(",
")",
".",
"String",
"(",
")",
",",
"LogTags",
":",
"nil",
",",
"}",
"\n",
"keyBytes",
",",
"err",
":=",
"md",
".",
"getClient",
"(",
")",
".",
"GetKey",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"// decode the key",
"err",
"=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Decode",
"(",
"keyBytes",
",",
"&",
"serverHalf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\n",
"}",
"\n\n",
"return",
"\n",
"}"
] | //
// The below methods support the MD server acting as the key server.
// This will be the case for v1 of KBFS but we may move to our own
// separate key server at some point.
//
// GetTLFCryptKeyServerHalf is an implementation of the KeyServer interface. | [
"The",
"below",
"methods",
"support",
"the",
"MD",
"server",
"acting",
"as",
"the",
"key",
"server",
".",
"This",
"will",
"be",
"the",
"case",
"for",
"v1",
"of",
"KBFS",
"but",
"we",
"may",
"move",
"to",
"our",
"own",
"separate",
"key",
"server",
"at",
"some",
"point",
".",
"GetTLFCryptKeyServerHalf",
"is",
"an",
"implementation",
"of",
"the",
"KeyServer",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1189-L1223 |
161,066 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | PutTLFCryptKeyServerHalves | func (md *MDServerRemote) PutTLFCryptKeyServerHalves(ctx context.Context,
keyServerHalves kbfsmd.UserDeviceKeyServerHalves) (err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: PutTLFCryptKeyServerHalves %v", keyServerHalves)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: PutTLFCryptKeyServerHalves %v (err=%v)", keyServerHalves, err)
}()
// flatten out the map into an array
var keyHalves []keybase1.KeyHalf
for user, deviceMap := range keyServerHalves {
for devicePubKey, serverHalf := range deviceMap {
keyHalf, err := md.config.Codec().Encode(serverHalf)
if err != nil {
return err
}
keyHalves = append(keyHalves,
keybase1.KeyHalf{
User: user,
DeviceKID: devicePubKey.KID(),
Key: keyHalf,
})
}
}
// put the keys
arg := keybase1.PutKeysArg{
KeyHalves: keyHalves,
LogTags: nil,
}
return md.getClient().PutKeys(ctx, arg)
} | go | func (md *MDServerRemote) PutTLFCryptKeyServerHalves(ctx context.Context,
keyServerHalves kbfsmd.UserDeviceKeyServerHalves) (err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: PutTLFCryptKeyServerHalves %v", keyServerHalves)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: PutTLFCryptKeyServerHalves %v (err=%v)", keyServerHalves, err)
}()
// flatten out the map into an array
var keyHalves []keybase1.KeyHalf
for user, deviceMap := range keyServerHalves {
for devicePubKey, serverHalf := range deviceMap {
keyHalf, err := md.config.Codec().Encode(serverHalf)
if err != nil {
return err
}
keyHalves = append(keyHalves,
keybase1.KeyHalf{
User: user,
DeviceKID: devicePubKey.KID(),
Key: keyHalf,
})
}
}
// put the keys
arg := keybase1.PutKeysArg{
KeyHalves: keyHalves,
LogTags: nil,
}
return md.getClient().PutKeys(ctx, arg)
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"PutTLFCryptKeyServerHalves",
"(",
"ctx",
"context",
".",
"Context",
",",
"keyServerHalves",
"kbfsmd",
".",
"UserDeviceKeyServerHalves",
")",
"(",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"keyServerHalves",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"keyServerHalves",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"// flatten out the map into an array",
"var",
"keyHalves",
"[",
"]",
"keybase1",
".",
"KeyHalf",
"\n",
"for",
"user",
",",
"deviceMap",
":=",
"range",
"keyServerHalves",
"{",
"for",
"devicePubKey",
",",
"serverHalf",
":=",
"range",
"deviceMap",
"{",
"keyHalf",
",",
"err",
":=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Encode",
"(",
"serverHalf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"keyHalves",
"=",
"append",
"(",
"keyHalves",
",",
"keybase1",
".",
"KeyHalf",
"{",
"User",
":",
"user",
",",
"DeviceKID",
":",
"devicePubKey",
".",
"KID",
"(",
")",
",",
"Key",
":",
"keyHalf",
",",
"}",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// put the keys",
"arg",
":=",
"keybase1",
".",
"PutKeysArg",
"{",
"KeyHalves",
":",
"keyHalves",
",",
"LogTags",
":",
"nil",
",",
"}",
"\n",
"return",
"md",
".",
"getClient",
"(",
")",
".",
"PutKeys",
"(",
"ctx",
",",
"arg",
")",
"\n",
"}"
] | // PutTLFCryptKeyServerHalves is an implementation of the KeyServer interface. | [
"PutTLFCryptKeyServerHalves",
"is",
"an",
"implementation",
"of",
"the",
"KeyServer",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1226-L1256 |
161,067 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | DeleteTLFCryptKeyServerHalf | func (md *MDServerRemote) DeleteTLFCryptKeyServerHalf(ctx context.Context,
uid keybase1.UID, key kbfscrypto.CryptPublicKey,
serverHalfID kbfscrypto.TLFCryptKeyServerHalfID) (err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: DeleteTLFCryptKeyServerHalf %s %s", uid, serverHalfID)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: DeleteTLFCryptKeyServerHalf %s %s done (err=%v)", uid, serverHalfID, err)
}()
// encode the ID
idBytes, err := md.config.Codec().Encode(serverHalfID)
if err != nil {
return err
}
// get the key
arg := keybase1.DeleteKeyArg{
Uid: uid,
DeviceKID: key.KID(),
KeyHalfID: idBytes,
LogTags: nil,
}
err = md.getClient().DeleteKey(ctx, arg)
if err != nil {
return err
}
return nil
} | go | func (md *MDServerRemote) DeleteTLFCryptKeyServerHalf(ctx context.Context,
uid keybase1.UID, key kbfscrypto.CryptPublicKey,
serverHalfID kbfscrypto.TLFCryptKeyServerHalfID) (err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: DeleteTLFCryptKeyServerHalf %s %s", uid, serverHalfID)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: DeleteTLFCryptKeyServerHalf %s %s done (err=%v)", uid, serverHalfID, err)
}()
// encode the ID
idBytes, err := md.config.Codec().Encode(serverHalfID)
if err != nil {
return err
}
// get the key
arg := keybase1.DeleteKeyArg{
Uid: uid,
DeviceKID: key.KID(),
KeyHalfID: idBytes,
LogTags: nil,
}
err = md.getClient().DeleteKey(ctx, arg)
if err != nil {
return err
}
return nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"DeleteTLFCryptKeyServerHalf",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"serverHalfID",
"kbfscrypto",
".",
"TLFCryptKeyServerHalfID",
")",
"(",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"uid",
",",
"serverHalfID",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"uid",
",",
"serverHalfID",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"// encode the ID",
"idBytes",
",",
"err",
":=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Encode",
"(",
"serverHalfID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// get the key",
"arg",
":=",
"keybase1",
".",
"DeleteKeyArg",
"{",
"Uid",
":",
"uid",
",",
"DeviceKID",
":",
"key",
".",
"KID",
"(",
")",
",",
"KeyHalfID",
":",
"idBytes",
",",
"LogTags",
":",
"nil",
",",
"}",
"\n",
"err",
"=",
"md",
".",
"getClient",
"(",
")",
".",
"DeleteKey",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteTLFCryptKeyServerHalf is an implementation of the KeyServer interface. | [
"DeleteTLFCryptKeyServerHalf",
"is",
"an",
"implementation",
"of",
"the",
"KeyServer",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1259-L1287 |
161,068 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | GetKeyBundles | func (md *MDServerRemote) GetKeyBundles(ctx context.Context,
tlf tlf.ID, wkbID kbfsmd.TLFWriterKeyBundleID, rkbID kbfsmd.TLFReaderKeyBundleID) (
wkb *kbfsmd.TLFWriterKeyBundleV3, rkb *kbfsmd.TLFReaderKeyBundleV3, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: GetKeyBundles %s %s %s", tlf, wkbID, rkbID)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: GetKeyBundles %s %s %s done (err=%v)", tlf, wkbID, rkbID, err)
}()
arg := keybase1.GetKeyBundlesArg{
FolderID: tlf.String(),
WriterBundleID: wkbID.String(),
ReaderBundleID: rkbID.String(),
}
response, err := md.getClient().GetKeyBundles(ctx, arg)
if err != nil {
return nil, nil, err
}
if response.WriterBundle.Bundle != nil {
if response.WriterBundle.Version != int(kbfsmd.SegregatedKeyBundlesVer) {
err = fmt.Errorf("Unsupported writer bundle version: %d",
response.WriterBundle.Version)
return nil, nil, err
}
wkb = new(kbfsmd.TLFWriterKeyBundleV3)
err = md.config.Codec().Decode(response.WriterBundle.Bundle, wkb)
if err != nil {
return nil, nil, err
}
// Verify it's what we expect.
bundleID, err := kbfsmd.MakeTLFWriterKeyBundleID(md.config.Codec(), *wkb)
if err != nil {
return nil, nil, err
}
if bundleID != wkbID {
err = fmt.Errorf("Expected writer bundle ID %s, got: %s",
wkbID, bundleID)
return nil, nil, err
}
}
if response.ReaderBundle.Bundle != nil {
if response.ReaderBundle.Version != int(kbfsmd.SegregatedKeyBundlesVer) {
err = fmt.Errorf("Unsupported reader bundle version: %d",
response.ReaderBundle.Version)
return nil, nil, err
}
rkb = new(kbfsmd.TLFReaderKeyBundleV3)
err = md.config.Codec().Decode(response.ReaderBundle.Bundle, rkb)
if err != nil {
return nil, nil, err
}
// Verify it's what we expect.
bundleID, err := kbfsmd.MakeTLFReaderKeyBundleID(md.config.Codec(), *rkb)
if err != nil {
return nil, nil, err
}
if bundleID != rkbID {
err = fmt.Errorf("Expected reader bundle ID %s, got: %s",
rkbID, bundleID)
return nil, nil, err
}
}
return wkb, rkb, nil
} | go | func (md *MDServerRemote) GetKeyBundles(ctx context.Context,
tlf tlf.ID, wkbID kbfsmd.TLFWriterKeyBundleID, rkbID kbfsmd.TLFReaderKeyBundleID) (
wkb *kbfsmd.TLFWriterKeyBundleV3, rkb *kbfsmd.TLFReaderKeyBundleV3, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: GetKeyBundles %s %s %s", tlf, wkbID, rkbID)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: GetKeyBundles %s %s %s done (err=%v)", tlf, wkbID, rkbID, err)
}()
arg := keybase1.GetKeyBundlesArg{
FolderID: tlf.String(),
WriterBundleID: wkbID.String(),
ReaderBundleID: rkbID.String(),
}
response, err := md.getClient().GetKeyBundles(ctx, arg)
if err != nil {
return nil, nil, err
}
if response.WriterBundle.Bundle != nil {
if response.WriterBundle.Version != int(kbfsmd.SegregatedKeyBundlesVer) {
err = fmt.Errorf("Unsupported writer bundle version: %d",
response.WriterBundle.Version)
return nil, nil, err
}
wkb = new(kbfsmd.TLFWriterKeyBundleV3)
err = md.config.Codec().Decode(response.WriterBundle.Bundle, wkb)
if err != nil {
return nil, nil, err
}
// Verify it's what we expect.
bundleID, err := kbfsmd.MakeTLFWriterKeyBundleID(md.config.Codec(), *wkb)
if err != nil {
return nil, nil, err
}
if bundleID != wkbID {
err = fmt.Errorf("Expected writer bundle ID %s, got: %s",
wkbID, bundleID)
return nil, nil, err
}
}
if response.ReaderBundle.Bundle != nil {
if response.ReaderBundle.Version != int(kbfsmd.SegregatedKeyBundlesVer) {
err = fmt.Errorf("Unsupported reader bundle version: %d",
response.ReaderBundle.Version)
return nil, nil, err
}
rkb = new(kbfsmd.TLFReaderKeyBundleV3)
err = md.config.Codec().Decode(response.ReaderBundle.Bundle, rkb)
if err != nil {
return nil, nil, err
}
// Verify it's what we expect.
bundleID, err := kbfsmd.MakeTLFReaderKeyBundleID(md.config.Codec(), *rkb)
if err != nil {
return nil, nil, err
}
if bundleID != rkbID {
err = fmt.Errorf("Expected reader bundle ID %s, got: %s",
rkbID, bundleID)
return nil, nil, err
}
}
return wkb, rkb, nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"GetKeyBundles",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlf",
"tlf",
".",
"ID",
",",
"wkbID",
"kbfsmd",
".",
"TLFWriterKeyBundleID",
",",
"rkbID",
"kbfsmd",
".",
"TLFReaderKeyBundleID",
")",
"(",
"wkb",
"*",
"kbfsmd",
".",
"TLFWriterKeyBundleV3",
",",
"rkb",
"*",
"kbfsmd",
".",
"TLFReaderKeyBundleV3",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlf",
",",
"wkbID",
",",
"rkbID",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlf",
",",
"wkbID",
",",
"rkbID",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"arg",
":=",
"keybase1",
".",
"GetKeyBundlesArg",
"{",
"FolderID",
":",
"tlf",
".",
"String",
"(",
")",
",",
"WriterBundleID",
":",
"wkbID",
".",
"String",
"(",
")",
",",
"ReaderBundleID",
":",
"rkbID",
".",
"String",
"(",
")",
",",
"}",
"\n\n",
"response",
",",
"err",
":=",
"md",
".",
"getClient",
"(",
")",
".",
"GetKeyBundles",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"response",
".",
"WriterBundle",
".",
"Bundle",
"!=",
"nil",
"{",
"if",
"response",
".",
"WriterBundle",
".",
"Version",
"!=",
"int",
"(",
"kbfsmd",
".",
"SegregatedKeyBundlesVer",
")",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"response",
".",
"WriterBundle",
".",
"Version",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"wkb",
"=",
"new",
"(",
"kbfsmd",
".",
"TLFWriterKeyBundleV3",
")",
"\n",
"err",
"=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Decode",
"(",
"response",
".",
"WriterBundle",
".",
"Bundle",
",",
"wkb",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"// Verify it's what we expect.",
"bundleID",
",",
"err",
":=",
"kbfsmd",
".",
"MakeTLFWriterKeyBundleID",
"(",
"md",
".",
"config",
".",
"Codec",
"(",
")",
",",
"*",
"wkb",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"bundleID",
"!=",
"wkbID",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"wkbID",
",",
"bundleID",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"response",
".",
"ReaderBundle",
".",
"Bundle",
"!=",
"nil",
"{",
"if",
"response",
".",
"ReaderBundle",
".",
"Version",
"!=",
"int",
"(",
"kbfsmd",
".",
"SegregatedKeyBundlesVer",
")",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"response",
".",
"ReaderBundle",
".",
"Version",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"rkb",
"=",
"new",
"(",
"kbfsmd",
".",
"TLFReaderKeyBundleV3",
")",
"\n",
"err",
"=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Decode",
"(",
"response",
".",
"ReaderBundle",
".",
"Bundle",
",",
"rkb",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"// Verify it's what we expect.",
"bundleID",
",",
"err",
":=",
"kbfsmd",
".",
"MakeTLFReaderKeyBundleID",
"(",
"md",
".",
"config",
".",
"Codec",
"(",
")",
",",
"*",
"rkb",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"if",
"bundleID",
"!=",
"rkbID",
"{",
"err",
"=",
"fmt",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"rkbID",
",",
"bundleID",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"wkb",
",",
"rkb",
",",
"nil",
"\n",
"}"
] | // GetKeyBundles implements the MDServer interface for MDServerRemote. | [
"GetKeyBundles",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1334-L1401 |
161,069 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | FastForwardBackoff | func (md *MDServerRemote) FastForwardBackoff() {
md.connMu.RLock()
defer md.connMu.RUnlock()
md.conn.FastForwardInitialBackoffTimer()
} | go | func (md *MDServerRemote) FastForwardBackoff() {
md.connMu.RLock()
defer md.connMu.RUnlock()
md.conn.FastForwardInitialBackoffTimer()
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"FastForwardBackoff",
"(",
")",
"{",
"md",
".",
"connMu",
".",
"RLock",
"(",
")",
"\n",
"defer",
"md",
".",
"connMu",
".",
"RUnlock",
"(",
")",
"\n",
"md",
".",
"conn",
".",
"FastForwardInitialBackoffTimer",
"(",
")",
"\n",
"}"
] | // FastForwardBackoff implements the MDServer interface for MDServerRemote. | [
"FastForwardBackoff",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1404-L1408 |
161,070 | keybase/client | go/kbfs/libkbfs/mdserver_remote.go | FindNextMD | func (md *MDServerRemote) FindNextMD(
ctx context.Context, tlfID tlf.ID, rootSeqno keybase1.Seqno) (
nextKbfsRoot *kbfsmd.MerkleRoot, nextMerkleNodes [][]byte,
nextRootSeqno keybase1.Seqno, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: FindNextMD %s %d", tlfID, rootSeqno)
md.log.CDebugf(ctx, "KeyServer: FindNextMD %s %d", tlfID, rootSeqno)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: FindNextMD %s %d done (err=%v)",
tlfID, rootSeqno, err)
md.deferLog.CDebugf(ctx, "KeyServer: FindNextMD %s %d done (err=%v)",
tlfID, rootSeqno, err)
}()
arg := keybase1.FindNextMDArg{
FolderID: tlfID.String(),
Seqno: rootSeqno,
}
response, err := md.getClient().FindNextMD(ctx, arg)
if err != nil {
return nil, nil, 0, err
}
if len(response.MerkleNodes) == 0 {
md.log.CDebugf(ctx, "No merkle data found for %s, seqno=%d",
tlfID, rootSeqno)
return nil, nil, 0, nil
}
if response.KbfsRoot.Version != 1 {
return nil, nil, 0,
kbfsmd.NewMerkleVersionError{Version: response.KbfsRoot.Version}
}
// Verify this is a valid merkle root and KBFS root before we
// decode the bytes.
md.log.CDebugf(ctx, "Verifying merkle root %d", response.RootSeqno)
root := keybase1.MerkleRootV2{
Seqno: response.RootSeqno,
HashMeta: response.RootHash,
}
expectedKbfsRoot := keybase1.KBFSRoot{
TreeID: tlfToMerkleTreeID(tlfID),
Root: response.KbfsRoot.Root,
}
err = md.config.KBPKI().VerifyMerkleRoot(ctx, root, expectedKbfsRoot)
if err != nil {
return nil, nil, 0, err
}
var kbfsRoot kbfsmd.MerkleRoot
err = md.config.Codec().Decode(response.KbfsRoot.Root, &kbfsRoot)
if err != nil {
return nil, nil, 0, err
}
// Validate the hashes of the nodes all the way down to the leaf.
err = verifyMerkleNodes(ctx, &kbfsRoot, response.MerkleNodes, tlfID)
if err != nil {
return nil, nil, 0, err
}
return &kbfsRoot, response.MerkleNodes, response.RootSeqno, nil
} | go | func (md *MDServerRemote) FindNextMD(
ctx context.Context, tlfID tlf.ID, rootSeqno keybase1.Seqno) (
nextKbfsRoot *kbfsmd.MerkleRoot, nextMerkleNodes [][]byte,
nextRootSeqno keybase1.Seqno, err error) {
ctx = rpc.WithFireNow(ctx)
md.log.LazyTrace(ctx, "KeyServer: FindNextMD %s %d", tlfID, rootSeqno)
md.log.CDebugf(ctx, "KeyServer: FindNextMD %s %d", tlfID, rootSeqno)
defer func() {
md.deferLog.LazyTrace(ctx, "KeyServer: FindNextMD %s %d done (err=%v)",
tlfID, rootSeqno, err)
md.deferLog.CDebugf(ctx, "KeyServer: FindNextMD %s %d done (err=%v)",
tlfID, rootSeqno, err)
}()
arg := keybase1.FindNextMDArg{
FolderID: tlfID.String(),
Seqno: rootSeqno,
}
response, err := md.getClient().FindNextMD(ctx, arg)
if err != nil {
return nil, nil, 0, err
}
if len(response.MerkleNodes) == 0 {
md.log.CDebugf(ctx, "No merkle data found for %s, seqno=%d",
tlfID, rootSeqno)
return nil, nil, 0, nil
}
if response.KbfsRoot.Version != 1 {
return nil, nil, 0,
kbfsmd.NewMerkleVersionError{Version: response.KbfsRoot.Version}
}
// Verify this is a valid merkle root and KBFS root before we
// decode the bytes.
md.log.CDebugf(ctx, "Verifying merkle root %d", response.RootSeqno)
root := keybase1.MerkleRootV2{
Seqno: response.RootSeqno,
HashMeta: response.RootHash,
}
expectedKbfsRoot := keybase1.KBFSRoot{
TreeID: tlfToMerkleTreeID(tlfID),
Root: response.KbfsRoot.Root,
}
err = md.config.KBPKI().VerifyMerkleRoot(ctx, root, expectedKbfsRoot)
if err != nil {
return nil, nil, 0, err
}
var kbfsRoot kbfsmd.MerkleRoot
err = md.config.Codec().Decode(response.KbfsRoot.Root, &kbfsRoot)
if err != nil {
return nil, nil, 0, err
}
// Validate the hashes of the nodes all the way down to the leaf.
err = verifyMerkleNodes(ctx, &kbfsRoot, response.MerkleNodes, tlfID)
if err != nil {
return nil, nil, 0, err
}
return &kbfsRoot, response.MerkleNodes, response.RootSeqno, nil
} | [
"func",
"(",
"md",
"*",
"MDServerRemote",
")",
"FindNextMD",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"rootSeqno",
"keybase1",
".",
"Seqno",
")",
"(",
"nextKbfsRoot",
"*",
"kbfsmd",
".",
"MerkleRoot",
",",
"nextMerkleNodes",
"[",
"]",
"[",
"]",
"byte",
",",
"nextRootSeqno",
"keybase1",
".",
"Seqno",
",",
"err",
"error",
")",
"{",
"ctx",
"=",
"rpc",
".",
"WithFireNow",
"(",
"ctx",
")",
"\n",
"md",
".",
"log",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"rootSeqno",
")",
"\n",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"rootSeqno",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"md",
".",
"deferLog",
".",
"LazyTrace",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"rootSeqno",
",",
"err",
")",
"\n",
"md",
".",
"deferLog",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"rootSeqno",
",",
"err",
")",
"\n",
"}",
"(",
")",
"\n\n",
"arg",
":=",
"keybase1",
".",
"FindNextMDArg",
"{",
"FolderID",
":",
"tlfID",
".",
"String",
"(",
")",
",",
"Seqno",
":",
"rootSeqno",
",",
"}",
"\n\n",
"response",
",",
"err",
":=",
"md",
".",
"getClient",
"(",
")",
".",
"FindNextMD",
"(",
"ctx",
",",
"arg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"response",
".",
"MerkleNodes",
")",
"==",
"0",
"{",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"rootSeqno",
")",
"\n",
"return",
"nil",
",",
"nil",
",",
"0",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"response",
".",
"KbfsRoot",
".",
"Version",
"!=",
"1",
"{",
"return",
"nil",
",",
"nil",
",",
"0",
",",
"kbfsmd",
".",
"NewMerkleVersionError",
"{",
"Version",
":",
"response",
".",
"KbfsRoot",
".",
"Version",
"}",
"\n",
"}",
"\n\n",
"// Verify this is a valid merkle root and KBFS root before we",
"// decode the bytes.",
"md",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"response",
".",
"RootSeqno",
")",
"\n",
"root",
":=",
"keybase1",
".",
"MerkleRootV2",
"{",
"Seqno",
":",
"response",
".",
"RootSeqno",
",",
"HashMeta",
":",
"response",
".",
"RootHash",
",",
"}",
"\n",
"expectedKbfsRoot",
":=",
"keybase1",
".",
"KBFSRoot",
"{",
"TreeID",
":",
"tlfToMerkleTreeID",
"(",
"tlfID",
")",
",",
"Root",
":",
"response",
".",
"KbfsRoot",
".",
"Root",
",",
"}",
"\n",
"err",
"=",
"md",
".",
"config",
".",
"KBPKI",
"(",
")",
".",
"VerifyMerkleRoot",
"(",
"ctx",
",",
"root",
",",
"expectedKbfsRoot",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"kbfsRoot",
"kbfsmd",
".",
"MerkleRoot",
"\n",
"err",
"=",
"md",
".",
"config",
".",
"Codec",
"(",
")",
".",
"Decode",
"(",
"response",
".",
"KbfsRoot",
".",
"Root",
",",
"&",
"kbfsRoot",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n\n",
"// Validate the hashes of the nodes all the way down to the leaf.",
"err",
"=",
"verifyMerkleNodes",
"(",
"ctx",
",",
"&",
"kbfsRoot",
",",
"response",
".",
"MerkleNodes",
",",
"tlfID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"0",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"kbfsRoot",
",",
"response",
".",
"MerkleNodes",
",",
"response",
".",
"RootSeqno",
",",
"nil",
"\n",
"}"
] | // FindNextMD implements the MDServer interface for MDServerRemote. | [
"FindNextMD",
"implements",
"the",
"MDServer",
"interface",
"for",
"MDServerRemote",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/mdserver_remote.go#L1411-L1475 |
161,071 | keybase/client | go/kbfs/idutil/tlf_names.go | normalizeNames | func normalizeNames(names []string, t tlf.Type) (changesMade bool, err error) {
for i, name := range names {
x, err := normalizeAssertionOrName(name, t)
if err != nil {
return false, err
}
if x != name {
names[i] = x
changesMade = true
}
}
return changesMade, nil
} | go | func normalizeNames(names []string, t tlf.Type) (changesMade bool, err error) {
for i, name := range names {
x, err := normalizeAssertionOrName(name, t)
if err != nil {
return false, err
}
if x != name {
names[i] = x
changesMade = true
}
}
return changesMade, nil
} | [
"func",
"normalizeNames",
"(",
"names",
"[",
"]",
"string",
",",
"t",
"tlf",
".",
"Type",
")",
"(",
"changesMade",
"bool",
",",
"err",
"error",
")",
"{",
"for",
"i",
",",
"name",
":=",
"range",
"names",
"{",
"x",
",",
"err",
":=",
"normalizeAssertionOrName",
"(",
"name",
",",
"t",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n",
"if",
"x",
"!=",
"name",
"{",
"names",
"[",
"i",
"]",
"=",
"x",
"\n",
"changesMade",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"changesMade",
",",
"nil",
"\n",
"}"
] | // normalizeNames normalizes a slice of names and returns
// whether any of them changed. | [
"normalizeNames",
"normalizes",
"a",
"slice",
"of",
"names",
"and",
"returns",
"whether",
"any",
"of",
"them",
"changed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/tlf_names.go#L62-L74 |
161,072 | keybase/client | go/kbfs/idutil/tlf_names.go | NormalizeNamesInTLF | func NormalizeNamesInTLF(writerNames, readerNames []string,
t tlf.Type, extensionSuffix string) (normalizedName string,
changesMade bool, err error) {
changesMade, err = normalizeNames(writerNames, t)
if err != nil {
return "", false, err
}
sort.Strings(writerNames)
normalizedName = strings.Join(writerNames, ",")
if len(readerNames) > 0 {
rchanges, err := normalizeNames(readerNames, t)
if err != nil {
return "", false, err
}
changesMade = changesMade || rchanges
sort.Strings(readerNames)
normalizedName += tlf.ReaderSep + strings.Join(readerNames, ",")
}
if len(extensionSuffix) != 0 {
// This *should* be normalized already but make sure. I can see not
// doing so might surprise a caller.
nExt := strings.ToLower(extensionSuffix)
normalizedName += tlf.HandleExtensionSep + nExt
changesMade = changesMade || nExt != extensionSuffix
}
return normalizedName, changesMade, nil
} | go | func NormalizeNamesInTLF(writerNames, readerNames []string,
t tlf.Type, extensionSuffix string) (normalizedName string,
changesMade bool, err error) {
changesMade, err = normalizeNames(writerNames, t)
if err != nil {
return "", false, err
}
sort.Strings(writerNames)
normalizedName = strings.Join(writerNames, ",")
if len(readerNames) > 0 {
rchanges, err := normalizeNames(readerNames, t)
if err != nil {
return "", false, err
}
changesMade = changesMade || rchanges
sort.Strings(readerNames)
normalizedName += tlf.ReaderSep + strings.Join(readerNames, ",")
}
if len(extensionSuffix) != 0 {
// This *should* be normalized already but make sure. I can see not
// doing so might surprise a caller.
nExt := strings.ToLower(extensionSuffix)
normalizedName += tlf.HandleExtensionSep + nExt
changesMade = changesMade || nExt != extensionSuffix
}
return normalizedName, changesMade, nil
} | [
"func",
"NormalizeNamesInTLF",
"(",
"writerNames",
",",
"readerNames",
"[",
"]",
"string",
",",
"t",
"tlf",
".",
"Type",
",",
"extensionSuffix",
"string",
")",
"(",
"normalizedName",
"string",
",",
"changesMade",
"bool",
",",
"err",
"error",
")",
"{",
"changesMade",
",",
"err",
"=",
"normalizeNames",
"(",
"writerNames",
",",
"t",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"false",
",",
"err",
"\n",
"}",
"\n",
"sort",
".",
"Strings",
"(",
"writerNames",
")",
"\n",
"normalizedName",
"=",
"strings",
".",
"Join",
"(",
"writerNames",
",",
"\"",
"\"",
")",
"\n",
"if",
"len",
"(",
"readerNames",
")",
">",
"0",
"{",
"rchanges",
",",
"err",
":=",
"normalizeNames",
"(",
"readerNames",
",",
"t",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"false",
",",
"err",
"\n",
"}",
"\n",
"changesMade",
"=",
"changesMade",
"||",
"rchanges",
"\n",
"sort",
".",
"Strings",
"(",
"readerNames",
")",
"\n",
"normalizedName",
"+=",
"tlf",
".",
"ReaderSep",
"+",
"strings",
".",
"Join",
"(",
"readerNames",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"extensionSuffix",
")",
"!=",
"0",
"{",
"// This *should* be normalized already but make sure. I can see not",
"// doing so might surprise a caller.",
"nExt",
":=",
"strings",
".",
"ToLower",
"(",
"extensionSuffix",
")",
"\n",
"normalizedName",
"+=",
"tlf",
".",
"HandleExtensionSep",
"+",
"nExt",
"\n",
"changesMade",
"=",
"changesMade",
"||",
"nExt",
"!=",
"extensionSuffix",
"\n",
"}",
"\n\n",
"return",
"normalizedName",
",",
"changesMade",
",",
"nil",
"\n",
"}"
] | // NormalizeNamesInTLF takes a split TLF name and, without doing any
// resolutions or identify calls, normalizes all elements of the
// name. It then returns the normalized name and a boolean flag
// whether any names were modified.
// This modifies the slices passed as arguments. | [
"NormalizeNamesInTLF",
"takes",
"a",
"split",
"TLF",
"name",
"and",
"without",
"doing",
"any",
"resolutions",
"or",
"identify",
"calls",
"normalizes",
"all",
"elements",
"of",
"the",
"name",
".",
"It",
"then",
"returns",
"the",
"normalized",
"name",
"and",
"a",
"boolean",
"flag",
"whether",
"any",
"names",
"were",
"modified",
".",
"This",
"modifies",
"the",
"slices",
"passed",
"as",
"arguments",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/tlf_names.go#L81-L108 |
161,073 | keybase/client | go/kbfs/idutil/tlf_names.go | SplitAndNormalizeTLFName | func SplitAndNormalizeTLFName(name string, t tlf.Type) (
writerNames, readerNames []string,
extensionSuffix string, err error) {
writerNames, readerNames, extensionSuffix, err = tlf.SplitName(name)
if err != nil {
return nil, nil, "", err
}
if t == tlf.SingleTeam && len(writerNames) != 1 {
// No team folder can have more than one writer.
return nil, nil, "", NoSuchNameError{Name: name}
}
hasReaders := len(readerNames) != 0
if t != tlf.Private && hasReaders {
// No public/team folder can have readers.
return nil, nil, "", NoSuchNameError{Name: name}
}
normalizedName, changes, err := NormalizeNamesInTLF(
writerNames, readerNames, t, extensionSuffix)
if err != nil {
return nil, nil, "", err
}
// Check for changes - not just ordering differences here.
if changes {
return nil, nil, "", errors.WithStack(TlfNameNotCanonical{name, normalizedName})
}
return writerNames, readerNames, strings.ToLower(extensionSuffix), nil
} | go | func SplitAndNormalizeTLFName(name string, t tlf.Type) (
writerNames, readerNames []string,
extensionSuffix string, err error) {
writerNames, readerNames, extensionSuffix, err = tlf.SplitName(name)
if err != nil {
return nil, nil, "", err
}
if t == tlf.SingleTeam && len(writerNames) != 1 {
// No team folder can have more than one writer.
return nil, nil, "", NoSuchNameError{Name: name}
}
hasReaders := len(readerNames) != 0
if t != tlf.Private && hasReaders {
// No public/team folder can have readers.
return nil, nil, "", NoSuchNameError{Name: name}
}
normalizedName, changes, err := NormalizeNamesInTLF(
writerNames, readerNames, t, extensionSuffix)
if err != nil {
return nil, nil, "", err
}
// Check for changes - not just ordering differences here.
if changes {
return nil, nil, "", errors.WithStack(TlfNameNotCanonical{name, normalizedName})
}
return writerNames, readerNames, strings.ToLower(extensionSuffix), nil
} | [
"func",
"SplitAndNormalizeTLFName",
"(",
"name",
"string",
",",
"t",
"tlf",
".",
"Type",
")",
"(",
"writerNames",
",",
"readerNames",
"[",
"]",
"string",
",",
"extensionSuffix",
"string",
",",
"err",
"error",
")",
"{",
"writerNames",
",",
"readerNames",
",",
"extensionSuffix",
",",
"err",
"=",
"tlf",
".",
"SplitName",
"(",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"if",
"t",
"==",
"tlf",
".",
"SingleTeam",
"&&",
"len",
"(",
"writerNames",
")",
"!=",
"1",
"{",
"// No team folder can have more than one writer.",
"return",
"nil",
",",
"nil",
",",
"\"",
"\"",
",",
"NoSuchNameError",
"{",
"Name",
":",
"name",
"}",
"\n",
"}",
"\n\n",
"hasReaders",
":=",
"len",
"(",
"readerNames",
")",
"!=",
"0",
"\n",
"if",
"t",
"!=",
"tlf",
".",
"Private",
"&&",
"hasReaders",
"{",
"// No public/team folder can have readers.",
"return",
"nil",
",",
"nil",
",",
"\"",
"\"",
",",
"NoSuchNameError",
"{",
"Name",
":",
"name",
"}",
"\n",
"}",
"\n\n",
"normalizedName",
",",
"changes",
",",
"err",
":=",
"NormalizeNamesInTLF",
"(",
"writerNames",
",",
"readerNames",
",",
"t",
",",
"extensionSuffix",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"\"",
"\"",
",",
"err",
"\n",
"}",
"\n",
"// Check for changes - not just ordering differences here.",
"if",
"changes",
"{",
"return",
"nil",
",",
"nil",
",",
"\"",
"\"",
",",
"errors",
".",
"WithStack",
"(",
"TlfNameNotCanonical",
"{",
"name",
",",
"normalizedName",
"}",
")",
"\n",
"}",
"\n\n",
"return",
"writerNames",
",",
"readerNames",
",",
"strings",
".",
"ToLower",
"(",
"extensionSuffix",
")",
",",
"nil",
"\n",
"}"
] | // SplitAndNormalizeTLFName takes a tlf name as a string
// and tries to normalize it offline. In addition to other
// checks it returns TlfNameNotCanonical if it does not
// look canonical.
// Note that ordering differences do not result in TlfNameNotCanonical
// being returned. | [
"SplitAndNormalizeTLFName",
"takes",
"a",
"tlf",
"name",
"as",
"a",
"string",
"and",
"tries",
"to",
"normalize",
"it",
"offline",
".",
"In",
"addition",
"to",
"other",
"checks",
"it",
"returns",
"TlfNameNotCanonical",
"if",
"it",
"does",
"not",
"look",
"canonical",
".",
"Note",
"that",
"ordering",
"differences",
"do",
"not",
"result",
"in",
"TlfNameNotCanonical",
"being",
"returned",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/idutil/tlf_names.go#L116-L145 |
161,074 | keybase/client | go/kbfs/libkbfs/journal_manager.go | MakeFBOsForExistingJournals | func (j *JournalManager) MakeFBOsForExistingJournals(
ctx context.Context) *sync.WaitGroup {
var wg sync.WaitGroup
j.lock.Lock()
defer j.lock.Unlock()
for tlfID, tj := range j.tlfJournals {
wg.Add(1)
tlfID := tlfID
tj := tj
go func() {
ctx := CtxWithRandomIDReplayable(
context.Background(), CtxFBOIDKey, CtxFBOOpID, j.log)
// Turn off tracker popups.
ctx, err := tlfhandle.MakeExtendedIdentify(
ctx, keybase1.TLFIdentifyBehavior_KBFS_INIT)
if err != nil {
j.log.CWarningf(ctx, "Error making extended identify: %+v", err)
}
defer wg.Done()
j.log.CDebugf(ctx,
"Initializing FBO for non-empty journal: %s", tlfID)
err = j.makeFBOForJournal(ctx, tj, tlfID)
if err != nil {
j.log.CWarningf(ctx,
"Error when making FBO for existing journal for %s: "+
"%+v", tlfID, err)
}
// The popups and errors were suppressed, but any errors would
// have been logged. So just close out the extended identify. If
// the user accesses the TLF directly, another proper identify
// should happen that shows errors.
_ = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose()
}()
}
return &wg
} | go | func (j *JournalManager) MakeFBOsForExistingJournals(
ctx context.Context) *sync.WaitGroup {
var wg sync.WaitGroup
j.lock.Lock()
defer j.lock.Unlock()
for tlfID, tj := range j.tlfJournals {
wg.Add(1)
tlfID := tlfID
tj := tj
go func() {
ctx := CtxWithRandomIDReplayable(
context.Background(), CtxFBOIDKey, CtxFBOOpID, j.log)
// Turn off tracker popups.
ctx, err := tlfhandle.MakeExtendedIdentify(
ctx, keybase1.TLFIdentifyBehavior_KBFS_INIT)
if err != nil {
j.log.CWarningf(ctx, "Error making extended identify: %+v", err)
}
defer wg.Done()
j.log.CDebugf(ctx,
"Initializing FBO for non-empty journal: %s", tlfID)
err = j.makeFBOForJournal(ctx, tj, tlfID)
if err != nil {
j.log.CWarningf(ctx,
"Error when making FBO for existing journal for %s: "+
"%+v", tlfID, err)
}
// The popups and errors were suppressed, but any errors would
// have been logged. So just close out the extended identify. If
// the user accesses the TLF directly, another proper identify
// should happen that shows errors.
_ = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose()
}()
}
return &wg
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"MakeFBOsForExistingJournals",
"(",
"ctx",
"context",
".",
"Context",
")",
"*",
"sync",
".",
"WaitGroup",
"{",
"var",
"wg",
"sync",
".",
"WaitGroup",
"\n\n",
"j",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"for",
"tlfID",
",",
"tj",
":=",
"range",
"j",
".",
"tlfJournals",
"{",
"wg",
".",
"Add",
"(",
"1",
")",
"\n",
"tlfID",
":=",
"tlfID",
"\n",
"tj",
":=",
"tj",
"\n",
"go",
"func",
"(",
")",
"{",
"ctx",
":=",
"CtxWithRandomIDReplayable",
"(",
"context",
".",
"Background",
"(",
")",
",",
"CtxFBOIDKey",
",",
"CtxFBOOpID",
",",
"j",
".",
"log",
")",
"\n\n",
"// Turn off tracker popups.",
"ctx",
",",
"err",
":=",
"tlfhandle",
".",
"MakeExtendedIdentify",
"(",
"ctx",
",",
"keybase1",
".",
"TLFIdentifyBehavior_KBFS_INIT",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"j",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"defer",
"wg",
".",
"Done",
"(",
")",
"\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n\n",
"err",
"=",
"j",
".",
"makeFBOForJournal",
"(",
"ctx",
",",
"tj",
",",
"tlfID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"j",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"tlfID",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// The popups and errors were suppressed, but any errors would",
"// have been logged. So just close out the extended identify. If",
"// the user accesses the TLF directly, another proper identify",
"// should happen that shows errors.",
"_",
"=",
"tlfhandle",
".",
"GetExtendedIdentify",
"(",
"ctx",
")",
".",
"GetTlfBreakAndClose",
"(",
")",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n",
"return",
"&",
"wg",
"\n",
"}"
] | // MakeFBOsForExistingJournals creates folderBranchOps objects for all
// existing, non-empty journals. This is useful to initialize the
// unflushed edit history, for example. It returns a wait group that
// the caller can use to determine when all the FBOs have been
// initialized. If the caller is not going to wait on the group, it
// should provoide a context that won't be canceled before the wait
// group is finished. | [
"MakeFBOsForExistingJournals",
"creates",
"folderBranchOps",
"objects",
"for",
"all",
"existing",
"non",
"-",
"empty",
"journals",
".",
"This",
"is",
"useful",
"to",
"initialize",
"the",
"unflushed",
"edit",
"history",
"for",
"example",
".",
"It",
"returns",
"a",
"wait",
"group",
"that",
"the",
"caller",
"can",
"use",
"to",
"determine",
"when",
"all",
"the",
"FBOs",
"have",
"been",
"initialized",
".",
"If",
"the",
"caller",
"is",
"not",
"going",
"to",
"wait",
"on",
"the",
"group",
"it",
"should",
"provoide",
"a",
"context",
"that",
"won",
"t",
"be",
"canceled",
"before",
"the",
"wait",
"group",
"is",
"finished",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L323-L363 |
161,075 | keybase/client | go/kbfs/libkbfs/journal_manager.go | enableLocked | func (j *JournalManager) enableLocked(
ctx context.Context, tlfID tlf.ID, chargedTo keybase1.UserOrTeamID,
bws TLFJournalBackgroundWorkStatus, allowEnableIfDirty bool) (
tj *tlfJournal, err error) {
j.log.CDebugf(ctx, "Enabling journal for %s (%s)", tlfID, bws)
defer func() {
if err != nil {
j.deferLog.CDebugf(ctx,
"Error when enabling journal for %s: %+v",
tlfID, err)
}
}()
if j.currentUID == keybase1.UID("") {
return nil, errors.New("Current UID is empty")
}
if j.currentVerifyingKey == (kbfscrypto.VerifyingKey{}) {
return nil, errors.New("Current verifying key is empty")
}
if tj, ok := j.tlfJournals[tlfID]; ok {
err = tj.enable()
if err != nil {
return nil, err
}
return tj, nil
}
err = func() error {
if j.dirtyOps[tlfID] > 0 {
return errors.Errorf("Can't enable journal for %s while there "+
"are outstanding dirty ops", tlfID)
}
if j.delegateDirtyBlockCache.IsAnyDirty(tlfID) {
return errors.Errorf("Can't enable journal for %s while there "+
"are any dirty blocks outstanding", tlfID)
}
return nil
}()
if err != nil {
if !allowEnableIfDirty {
return nil, err
}
j.log.CWarningf(ctx,
"Got ignorable error on journal enable, and proceeding anyway: %+v",
err)
}
tlfDir := j.tlfJournalPathLocked(tlfID)
tj, err = makeTLFJournal(
ctx, j.currentUID, j.currentVerifyingKey, tlfDir,
tlfID, chargedTo, tlfJournalConfigAdapter{j.config},
j.delegateBlockServer,
bws, nil, j.onBranchChange, j.onMDFlush, j.config.DiskLimiter())
if err != nil {
return nil, err
}
return tj, nil
} | go | func (j *JournalManager) enableLocked(
ctx context.Context, tlfID tlf.ID, chargedTo keybase1.UserOrTeamID,
bws TLFJournalBackgroundWorkStatus, allowEnableIfDirty bool) (
tj *tlfJournal, err error) {
j.log.CDebugf(ctx, "Enabling journal for %s (%s)", tlfID, bws)
defer func() {
if err != nil {
j.deferLog.CDebugf(ctx,
"Error when enabling journal for %s: %+v",
tlfID, err)
}
}()
if j.currentUID == keybase1.UID("") {
return nil, errors.New("Current UID is empty")
}
if j.currentVerifyingKey == (kbfscrypto.VerifyingKey{}) {
return nil, errors.New("Current verifying key is empty")
}
if tj, ok := j.tlfJournals[tlfID]; ok {
err = tj.enable()
if err != nil {
return nil, err
}
return tj, nil
}
err = func() error {
if j.dirtyOps[tlfID] > 0 {
return errors.Errorf("Can't enable journal for %s while there "+
"are outstanding dirty ops", tlfID)
}
if j.delegateDirtyBlockCache.IsAnyDirty(tlfID) {
return errors.Errorf("Can't enable journal for %s while there "+
"are any dirty blocks outstanding", tlfID)
}
return nil
}()
if err != nil {
if !allowEnableIfDirty {
return nil, err
}
j.log.CWarningf(ctx,
"Got ignorable error on journal enable, and proceeding anyway: %+v",
err)
}
tlfDir := j.tlfJournalPathLocked(tlfID)
tj, err = makeTLFJournal(
ctx, j.currentUID, j.currentVerifyingKey, tlfDir,
tlfID, chargedTo, tlfJournalConfigAdapter{j.config},
j.delegateBlockServer,
bws, nil, j.onBranchChange, j.onMDFlush, j.config.DiskLimiter())
if err != nil {
return nil, err
}
return tj, nil
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"enableLocked",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"chargedTo",
"keybase1",
".",
"UserOrTeamID",
",",
"bws",
"TLFJournalBackgroundWorkStatus",
",",
"allowEnableIfDirty",
"bool",
")",
"(",
"tj",
"*",
"tlfJournal",
",",
"err",
"error",
")",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"bws",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"j",
".",
"deferLog",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"if",
"j",
".",
"currentUID",
"==",
"keybase1",
".",
"UID",
"(",
"\"",
"\"",
")",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"j",
".",
"currentVerifyingKey",
"==",
"(",
"kbfscrypto",
".",
"VerifyingKey",
"{",
"}",
")",
"{",
"return",
"nil",
",",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"tj",
",",
"ok",
":=",
"j",
".",
"tlfJournals",
"[",
"tlfID",
"]",
";",
"ok",
"{",
"err",
"=",
"tj",
".",
"enable",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"tj",
",",
"nil",
"\n",
"}",
"\n\n",
"err",
"=",
"func",
"(",
")",
"error",
"{",
"if",
"j",
".",
"dirtyOps",
"[",
"tlfID",
"]",
">",
"0",
"{",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n",
"if",
"j",
".",
"delegateDirtyBlockCache",
".",
"IsAnyDirty",
"(",
"tlfID",
")",
"{",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"!",
"allowEnableIfDirty",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"tlfDir",
":=",
"j",
".",
"tlfJournalPathLocked",
"(",
"tlfID",
")",
"\n",
"tj",
",",
"err",
"=",
"makeTLFJournal",
"(",
"ctx",
",",
"j",
".",
"currentUID",
",",
"j",
".",
"currentVerifyingKey",
",",
"tlfDir",
",",
"tlfID",
",",
"chargedTo",
",",
"tlfJournalConfigAdapter",
"{",
"j",
".",
"config",
"}",
",",
"j",
".",
"delegateBlockServer",
",",
"bws",
",",
"nil",
",",
"j",
".",
"onBranchChange",
",",
"j",
".",
"onMDFlush",
",",
"j",
".",
"config",
".",
"DiskLimiter",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"tj",
",",
"nil",
"\n",
"}"
] | // enabledLocked returns an enabled journal; it is the caller's
// responsibility to add it to `j.tlfJournals`. This allows this
// method to be called in parallel during initialization, if desired. | [
"enabledLocked",
"returns",
"an",
"enabled",
"journal",
";",
"it",
"is",
"the",
"caller",
"s",
"responsibility",
"to",
"add",
"it",
"to",
"j",
".",
"tlfJournals",
".",
"This",
"allows",
"this",
"method",
"to",
"be",
"called",
"in",
"parallel",
"during",
"initialization",
"if",
"desired",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L564-L624 |
161,076 | keybase/client | go/kbfs/libkbfs/journal_manager.go | Enable | func (j *JournalManager) Enable(ctx context.Context, tlfID tlf.ID,
h *tlfhandle.Handle, bws TLFJournalBackgroundWorkStatus) (err error) {
j.lock.Lock()
defer j.lock.Unlock()
chargedTo := j.currentUID.AsUserOrTeam()
if tlfID.Type() == tlf.SingleTeam {
if h == nil {
// Any path that creates a single-team TLF journal should
// also provide a handle. If not, we'd have to fetch it
// from the server, which isn't a trusted path.
return errors.Errorf(
"No handle provided for single-team TLF %s", tlfID)
}
chargedTo = h.FirstResolvedWriter()
if tid := chargedTo.AsTeamOrBust(); tid.IsSubTeam() {
// We can't charge to subteams; find the root team.
rootID, err := j.config.KBPKI().GetTeamRootID(
ctx, tid, j.config.OfflineAvailabilityForID(tlfID))
if err != nil {
return err
}
chargedTo = rootID.AsUserOrTeam()
}
}
tj, err := j.enableLocked(ctx, tlfID, chargedTo, bws, false)
if err != nil {
return err
}
j.tlfJournals[tlfID] = tj
return nil
} | go | func (j *JournalManager) Enable(ctx context.Context, tlfID tlf.ID,
h *tlfhandle.Handle, bws TLFJournalBackgroundWorkStatus) (err error) {
j.lock.Lock()
defer j.lock.Unlock()
chargedTo := j.currentUID.AsUserOrTeam()
if tlfID.Type() == tlf.SingleTeam {
if h == nil {
// Any path that creates a single-team TLF journal should
// also provide a handle. If not, we'd have to fetch it
// from the server, which isn't a trusted path.
return errors.Errorf(
"No handle provided for single-team TLF %s", tlfID)
}
chargedTo = h.FirstResolvedWriter()
if tid := chargedTo.AsTeamOrBust(); tid.IsSubTeam() {
// We can't charge to subteams; find the root team.
rootID, err := j.config.KBPKI().GetTeamRootID(
ctx, tid, j.config.OfflineAvailabilityForID(tlfID))
if err != nil {
return err
}
chargedTo = rootID.AsUserOrTeam()
}
}
tj, err := j.enableLocked(ctx, tlfID, chargedTo, bws, false)
if err != nil {
return err
}
j.tlfJournals[tlfID] = tj
return nil
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"Enable",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"h",
"*",
"tlfhandle",
".",
"Handle",
",",
"bws",
"TLFJournalBackgroundWorkStatus",
")",
"(",
"err",
"error",
")",
"{",
"j",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"chargedTo",
":=",
"j",
".",
"currentUID",
".",
"AsUserOrTeam",
"(",
")",
"\n",
"if",
"tlfID",
".",
"Type",
"(",
")",
"==",
"tlf",
".",
"SingleTeam",
"{",
"if",
"h",
"==",
"nil",
"{",
"// Any path that creates a single-team TLF journal should",
"// also provide a handle. If not, we'd have to fetch it",
"// from the server, which isn't a trusted path.",
"return",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n\n",
"chargedTo",
"=",
"h",
".",
"FirstResolvedWriter",
"(",
")",
"\n",
"if",
"tid",
":=",
"chargedTo",
".",
"AsTeamOrBust",
"(",
")",
";",
"tid",
".",
"IsSubTeam",
"(",
")",
"{",
"// We can't charge to subteams; find the root team.",
"rootID",
",",
"err",
":=",
"j",
".",
"config",
".",
"KBPKI",
"(",
")",
".",
"GetTeamRootID",
"(",
"ctx",
",",
"tid",
",",
"j",
".",
"config",
".",
"OfflineAvailabilityForID",
"(",
"tlfID",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"chargedTo",
"=",
"rootID",
".",
"AsUserOrTeam",
"(",
")",
"\n",
"}",
"\n",
"}",
"\n",
"tj",
",",
"err",
":=",
"j",
".",
"enableLocked",
"(",
"ctx",
",",
"tlfID",
",",
"chargedTo",
",",
"bws",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"j",
".",
"tlfJournals",
"[",
"tlfID",
"]",
"=",
"tj",
"\n",
"return",
"nil",
"\n",
"}"
] | // Enable turns on the write journal for the given TLF. If h is nil,
// it will be attempted to be fetched from the remote MD server. | [
"Enable",
"turns",
"on",
"the",
"write",
"journal",
"for",
"the",
"given",
"TLF",
".",
"If",
"h",
"is",
"nil",
"it",
"will",
"be",
"attempted",
"to",
"be",
"fetched",
"from",
"the",
"remote",
"MD",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L628-L659 |
161,077 | keybase/client | go/kbfs/libkbfs/journal_manager.go | EnableAuto | func (j *JournalManager) EnableAuto(ctx context.Context) error {
j.lock.Lock()
defer j.lock.Unlock()
if j.serverConfig.EnableAuto {
// Nothing to do.
return nil
}
j.log.CDebugf(ctx, "Enabling auto-journaling")
j.serverConfig.EnableAuto = true
j.serverConfig.EnableAutoSetByUser = true
return j.writeConfig()
} | go | func (j *JournalManager) EnableAuto(ctx context.Context) error {
j.lock.Lock()
defer j.lock.Unlock()
if j.serverConfig.EnableAuto {
// Nothing to do.
return nil
}
j.log.CDebugf(ctx, "Enabling auto-journaling")
j.serverConfig.EnableAuto = true
j.serverConfig.EnableAutoSetByUser = true
return j.writeConfig()
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"EnableAuto",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"j",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"j",
".",
"serverConfig",
".",
"EnableAuto",
"{",
"// Nothing to do.",
"return",
"nil",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"j",
".",
"serverConfig",
".",
"EnableAuto",
"=",
"true",
"\n",
"j",
".",
"serverConfig",
".",
"EnableAutoSetByUser",
"=",
"true",
"\n",
"return",
"j",
".",
"writeConfig",
"(",
")",
"\n",
"}"
] | // EnableAuto turns on the write journal for all TLFs, even new ones,
// persistently. | [
"EnableAuto",
"turns",
"on",
"the",
"write",
"journal",
"for",
"all",
"TLFs",
"even",
"new",
"ones",
"persistently",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L663-L675 |
161,078 | keybase/client | go/kbfs/libkbfs/journal_manager.go | DisableAuto | func (j *JournalManager) DisableAuto(ctx context.Context) error {
j.lock.Lock()
defer j.lock.Unlock()
if enabled, _ := j.getEnableAutoLocked(); !enabled {
// Nothing to do.
return nil
}
j.log.CDebugf(ctx, "Disabling auto-journaling")
j.serverConfig.EnableAuto = false
j.serverConfig.EnableAutoSetByUser = true
return j.writeConfig()
} | go | func (j *JournalManager) DisableAuto(ctx context.Context) error {
j.lock.Lock()
defer j.lock.Unlock()
if enabled, _ := j.getEnableAutoLocked(); !enabled {
// Nothing to do.
return nil
}
j.log.CDebugf(ctx, "Disabling auto-journaling")
j.serverConfig.EnableAuto = false
j.serverConfig.EnableAutoSetByUser = true
return j.writeConfig()
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"DisableAuto",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"j",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"if",
"enabled",
",",
"_",
":=",
"j",
".",
"getEnableAutoLocked",
"(",
")",
";",
"!",
"enabled",
"{",
"// Nothing to do.",
"return",
"nil",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"j",
".",
"serverConfig",
".",
"EnableAuto",
"=",
"false",
"\n",
"j",
".",
"serverConfig",
".",
"EnableAutoSetByUser",
"=",
"true",
"\n",
"return",
"j",
".",
"writeConfig",
"(",
")",
"\n",
"}"
] | // DisableAuto turns off automatic write journal for any
// newly-accessed TLFs. Existing journaled TLFs need to be disabled
// manually. | [
"DisableAuto",
"turns",
"off",
"automatic",
"write",
"journal",
"for",
"any",
"newly",
"-",
"accessed",
"TLFs",
".",
"Existing",
"journaled",
"TLFs",
"need",
"to",
"be",
"disabled",
"manually",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L680-L692 |
161,079 | keybase/client | go/kbfs/libkbfs/journal_manager.go | PauseBackgroundWork | func (j *JournalManager) PauseBackgroundWork(ctx context.Context, tlfID tlf.ID) {
j.log.CDebugf(ctx, "Signaling pause for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
tlfJournal.pauseBackgroundWork()
return
}
j.log.CDebugf(ctx,
"Could not find journal for %s; dropping pause signal",
tlfID)
} | go | func (j *JournalManager) PauseBackgroundWork(ctx context.Context, tlfID tlf.ID) {
j.log.CDebugf(ctx, "Signaling pause for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
tlfJournal.pauseBackgroundWork()
return
}
j.log.CDebugf(ctx,
"Could not find journal for %s; dropping pause signal",
tlfID)
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"PauseBackgroundWork",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"if",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"getTLFJournal",
"(",
"tlfID",
",",
"nil",
")",
";",
"ok",
"{",
"tlfJournal",
".",
"pauseBackgroundWork",
"(",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}"
] | // PauseBackgroundWork pauses the background work goroutine, if it's
// not already paused. | [
"PauseBackgroundWork",
"pauses",
"the",
"background",
"work",
"goroutine",
"if",
"it",
"s",
"not",
"already",
"paused",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L717-L727 |
161,080 | keybase/client | go/kbfs/libkbfs/journal_manager.go | ResumeBackgroundWork | func (j *JournalManager) ResumeBackgroundWork(ctx context.Context, tlfID tlf.ID) {
j.log.CDebugf(ctx, "Signaling resume for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
tlfJournal.resumeBackgroundWork()
return
}
j.log.CDebugf(ctx,
"Could not find journal for %s; dropping resume signal",
tlfID)
} | go | func (j *JournalManager) ResumeBackgroundWork(ctx context.Context, tlfID tlf.ID) {
j.log.CDebugf(ctx, "Signaling resume for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
tlfJournal.resumeBackgroundWork()
return
}
j.log.CDebugf(ctx,
"Could not find journal for %s; dropping resume signal",
tlfID)
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"ResumeBackgroundWork",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"if",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"getTLFJournal",
"(",
"tlfID",
",",
"nil",
")",
";",
"ok",
"{",
"tlfJournal",
".",
"resumeBackgroundWork",
"(",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}"
] | // ResumeBackgroundWork resumes the background work goroutine, if it's
// not already resumed. | [
"ResumeBackgroundWork",
"resumes",
"the",
"background",
"work",
"goroutine",
"if",
"it",
"s",
"not",
"already",
"resumed",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L731-L741 |
161,081 | keybase/client | go/kbfs/libkbfs/journal_manager.go | Flush | func (j *JournalManager) Flush(ctx context.Context, tlfID tlf.ID) (err error) {
j.log.CDebugf(ctx, "Flushing journal for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
// TODO: do we want to plumb lc through here as well?
return tlfJournal.flush(ctx)
}
j.log.CDebugf(ctx, "Journal not enabled for %s", tlfID)
return nil
} | go | func (j *JournalManager) Flush(ctx context.Context, tlfID tlf.ID) (err error) {
j.log.CDebugf(ctx, "Flushing journal for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
// TODO: do we want to plumb lc through here as well?
return tlfJournal.flush(ctx)
}
j.log.CDebugf(ctx, "Journal not enabled for %s", tlfID)
return nil
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"Flush",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"(",
"err",
"error",
")",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"if",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"getTLFJournal",
"(",
"tlfID",
",",
"nil",
")",
";",
"ok",
"{",
"// TODO: do we want to plumb lc through here as well?",
"return",
"tlfJournal",
".",
"flush",
"(",
"ctx",
")",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // Flush flushes the write journal for the given TLF. | [
"Flush",
"flushes",
"the",
"write",
"journal",
"for",
"the",
"given",
"TLF",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L744-L753 |
161,082 | keybase/client | go/kbfs/libkbfs/journal_manager.go | FinishSingleOp | func (j *JournalManager) FinishSingleOp(ctx context.Context, tlfID tlf.ID,
lc *keybase1.LockContext, priority keybase1.MDPriority) (err error) {
j.log.CDebugf(ctx, "Finishing single op for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
return tlfJournal.finishSingleOp(ctx, lc, priority)
}
j.log.CDebugf(ctx, "Journal not enabled for %s", tlfID)
return nil
} | go | func (j *JournalManager) FinishSingleOp(ctx context.Context, tlfID tlf.ID,
lc *keybase1.LockContext, priority keybase1.MDPriority) (err error) {
j.log.CDebugf(ctx, "Finishing single op for %s", tlfID)
if tlfJournal, ok := j.getTLFJournal(tlfID, nil); ok {
return tlfJournal.finishSingleOp(ctx, lc, priority)
}
j.log.CDebugf(ctx, "Journal not enabled for %s", tlfID)
return nil
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"FinishSingleOp",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"lc",
"*",
"keybase1",
".",
"LockContext",
",",
"priority",
"keybase1",
".",
"MDPriority",
")",
"(",
"err",
"error",
")",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"if",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"getTLFJournal",
"(",
"tlfID",
",",
"nil",
")",
";",
"ok",
"{",
"return",
"tlfJournal",
".",
"finishSingleOp",
"(",
"ctx",
",",
"lc",
",",
"priority",
")",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // FinishSingleOp lets the write journal know that the application has
// finished a single op, and then blocks until the write journal has
// finished flushing everything. | [
"FinishSingleOp",
"lets",
"the",
"write",
"journal",
"know",
"that",
"the",
"application",
"has",
"finished",
"a",
"single",
"op",
"and",
"then",
"blocks",
"until",
"the",
"write",
"journal",
"has",
"finished",
"flushing",
"everything",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L788-L797 |
161,083 | keybase/client | go/kbfs/libkbfs/journal_manager.go | Disable | func (j *JournalManager) Disable(ctx context.Context, tlfID tlf.ID) (
wasEnabled bool, err error) {
j.log.CDebugf(ctx, "Disabling journal for %s", tlfID)
defer func() {
if err != nil {
j.deferLog.CDebugf(ctx,
"Error when disabling journal for %s: %+v",
tlfID, err)
}
}()
j.lock.Lock()
defer j.lock.Unlock()
tlfJournal, ok := j.tlfJournals[tlfID]
if !ok {
j.log.CDebugf(ctx, "Journal doesn't exist for %s", tlfID)
return false, nil
}
if j.dirtyOps[tlfID] > 0 {
return false, errors.Errorf("Can't disable journal for %s while there "+
"are outstanding dirty ops", tlfID)
}
if j.delegateDirtyBlockCache.IsAnyDirty(tlfID) {
return false, errors.Errorf("Can't disable journal for %s while there "+
"are any dirty blocks outstanding", tlfID)
}
// Disable the journal. Note that we don't bother deleting the
// journal from j.tlfJournals, to avoid cases where something
// keeps it around doing background work or re-enables it, at the
// same time JournalManager creates a new journal for the same TLF.
wasEnabled, err = tlfJournal.disable()
if err != nil {
return false, err
}
if wasEnabled {
j.log.CDebugf(ctx, "Disabled journal for %s", tlfID)
}
return wasEnabled, nil
} | go | func (j *JournalManager) Disable(ctx context.Context, tlfID tlf.ID) (
wasEnabled bool, err error) {
j.log.CDebugf(ctx, "Disabling journal for %s", tlfID)
defer func() {
if err != nil {
j.deferLog.CDebugf(ctx,
"Error when disabling journal for %s: %+v",
tlfID, err)
}
}()
j.lock.Lock()
defer j.lock.Unlock()
tlfJournal, ok := j.tlfJournals[tlfID]
if !ok {
j.log.CDebugf(ctx, "Journal doesn't exist for %s", tlfID)
return false, nil
}
if j.dirtyOps[tlfID] > 0 {
return false, errors.Errorf("Can't disable journal for %s while there "+
"are outstanding dirty ops", tlfID)
}
if j.delegateDirtyBlockCache.IsAnyDirty(tlfID) {
return false, errors.Errorf("Can't disable journal for %s while there "+
"are any dirty blocks outstanding", tlfID)
}
// Disable the journal. Note that we don't bother deleting the
// journal from j.tlfJournals, to avoid cases where something
// keeps it around doing background work or re-enables it, at the
// same time JournalManager creates a new journal for the same TLF.
wasEnabled, err = tlfJournal.disable()
if err != nil {
return false, err
}
if wasEnabled {
j.log.CDebugf(ctx, "Disabled journal for %s", tlfID)
}
return wasEnabled, nil
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"Disable",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"(",
"wasEnabled",
"bool",
",",
"err",
"error",
")",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"defer",
"func",
"(",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"j",
".",
"deferLog",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"j",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"tlfJournals",
"[",
"tlfID",
"]",
"\n",
"if",
"!",
"ok",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"j",
".",
"dirtyOps",
"[",
"tlfID",
"]",
">",
"0",
"{",
"return",
"false",
",",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n",
"if",
"j",
".",
"delegateDirtyBlockCache",
".",
"IsAnyDirty",
"(",
"tlfID",
")",
"{",
"return",
"false",
",",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n\n",
"// Disable the journal. Note that we don't bother deleting the",
"// journal from j.tlfJournals, to avoid cases where something",
"// keeps it around doing background work or re-enables it, at the",
"// same time JournalManager creates a new journal for the same TLF.",
"wasEnabled",
",",
"err",
"=",
"tlfJournal",
".",
"disable",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"err",
"\n",
"}",
"\n\n",
"if",
"wasEnabled",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n",
"return",
"wasEnabled",
",",
"nil",
"\n",
"}"
] | // Disable turns off the write journal for the given TLF. | [
"Disable",
"turns",
"off",
"the",
"write",
"journal",
"for",
"the",
"given",
"TLF",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L800-L841 |
161,084 | keybase/client | go/kbfs/libkbfs/journal_manager.go | Status | func (j *JournalManager) Status(
ctx context.Context) (JournalManagerStatus, []tlf.ID) {
j.lock.RLock()
defer j.lock.RUnlock()
var totalStoredBytes, totalStoredFiles, totalUnflushedBytes int64
tlfIDs := make([]tlf.ID, 0, len(j.tlfJournals))
for _, tlfJournal := range j.tlfJournals {
storedBytes, storedFiles, unflushedBytes, err :=
tlfJournal.getByteCounts()
if err != nil {
j.log.CWarningf(ctx,
"Couldn't calculate stored bytes/stored files/unflushed bytes for %s: %+v",
tlfJournal.tlfID, err)
}
totalStoredBytes += storedBytes
totalStoredFiles += storedFiles
totalUnflushedBytes += unflushedBytes
tlfIDs = append(tlfIDs, tlfJournal.tlfID)
}
enableAuto, enableAutoSetByUser := j.getEnableAutoLocked()
return JournalManagerStatus{
RootDir: j.rootPath(),
Version: 1,
CurrentUID: j.currentUID,
CurrentVerifyingKey: j.currentVerifyingKey,
EnableAuto: enableAuto,
EnableAutoSetByUser: enableAutoSetByUser,
JournalCount: len(tlfIDs),
StoredBytes: totalStoredBytes,
StoredFiles: totalStoredFiles,
UnflushedBytes: totalUnflushedBytes,
DiskLimiterStatus: j.config.DiskLimiter().getStatus(
ctx, j.currentUID.AsUserOrTeam()),
}, tlfIDs
} | go | func (j *JournalManager) Status(
ctx context.Context) (JournalManagerStatus, []tlf.ID) {
j.lock.RLock()
defer j.lock.RUnlock()
var totalStoredBytes, totalStoredFiles, totalUnflushedBytes int64
tlfIDs := make([]tlf.ID, 0, len(j.tlfJournals))
for _, tlfJournal := range j.tlfJournals {
storedBytes, storedFiles, unflushedBytes, err :=
tlfJournal.getByteCounts()
if err != nil {
j.log.CWarningf(ctx,
"Couldn't calculate stored bytes/stored files/unflushed bytes for %s: %+v",
tlfJournal.tlfID, err)
}
totalStoredBytes += storedBytes
totalStoredFiles += storedFiles
totalUnflushedBytes += unflushedBytes
tlfIDs = append(tlfIDs, tlfJournal.tlfID)
}
enableAuto, enableAutoSetByUser := j.getEnableAutoLocked()
return JournalManagerStatus{
RootDir: j.rootPath(),
Version: 1,
CurrentUID: j.currentUID,
CurrentVerifyingKey: j.currentVerifyingKey,
EnableAuto: enableAuto,
EnableAutoSetByUser: enableAutoSetByUser,
JournalCount: len(tlfIDs),
StoredBytes: totalStoredBytes,
StoredFiles: totalStoredFiles,
UnflushedBytes: totalUnflushedBytes,
DiskLimiterStatus: j.config.DiskLimiter().getStatus(
ctx, j.currentUID.AsUserOrTeam()),
}, tlfIDs
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"Status",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"JournalManagerStatus",
",",
"[",
"]",
"tlf",
".",
"ID",
")",
"{",
"j",
".",
"lock",
".",
"RLock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"RUnlock",
"(",
")",
"\n",
"var",
"totalStoredBytes",
",",
"totalStoredFiles",
",",
"totalUnflushedBytes",
"int64",
"\n",
"tlfIDs",
":=",
"make",
"(",
"[",
"]",
"tlf",
".",
"ID",
",",
"0",
",",
"len",
"(",
"j",
".",
"tlfJournals",
")",
")",
"\n",
"for",
"_",
",",
"tlfJournal",
":=",
"range",
"j",
".",
"tlfJournals",
"{",
"storedBytes",
",",
"storedFiles",
",",
"unflushedBytes",
",",
"err",
":=",
"tlfJournal",
".",
"getByteCounts",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"j",
".",
"log",
".",
"CWarningf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tlfJournal",
".",
"tlfID",
",",
"err",
")",
"\n",
"}",
"\n",
"totalStoredBytes",
"+=",
"storedBytes",
"\n",
"totalStoredFiles",
"+=",
"storedFiles",
"\n",
"totalUnflushedBytes",
"+=",
"unflushedBytes",
"\n",
"tlfIDs",
"=",
"append",
"(",
"tlfIDs",
",",
"tlfJournal",
".",
"tlfID",
")",
"\n",
"}",
"\n",
"enableAuto",
",",
"enableAutoSetByUser",
":=",
"j",
".",
"getEnableAutoLocked",
"(",
")",
"\n",
"return",
"JournalManagerStatus",
"{",
"RootDir",
":",
"j",
".",
"rootPath",
"(",
")",
",",
"Version",
":",
"1",
",",
"CurrentUID",
":",
"j",
".",
"currentUID",
",",
"CurrentVerifyingKey",
":",
"j",
".",
"currentVerifyingKey",
",",
"EnableAuto",
":",
"enableAuto",
",",
"EnableAutoSetByUser",
":",
"enableAutoSetByUser",
",",
"JournalCount",
":",
"len",
"(",
"tlfIDs",
")",
",",
"StoredBytes",
":",
"totalStoredBytes",
",",
"StoredFiles",
":",
"totalStoredFiles",
",",
"UnflushedBytes",
":",
"totalUnflushedBytes",
",",
"DiskLimiterStatus",
":",
"j",
".",
"config",
".",
"DiskLimiter",
"(",
")",
".",
"getStatus",
"(",
"ctx",
",",
"j",
".",
"currentUID",
".",
"AsUserOrTeam",
"(",
")",
")",
",",
"}",
",",
"tlfIDs",
"\n",
"}"
] | // Status returns a JournalManagerStatus object suitable for
// diagnostics. It also returns a list of TLF IDs which have journals
// enabled. | [
"Status",
"returns",
"a",
"JournalManagerStatus",
"object",
"suitable",
"for",
"diagnostics",
".",
"It",
"also",
"returns",
"a",
"list",
"of",
"TLF",
"IDs",
"which",
"have",
"journals",
"enabled",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L908-L942 |
161,085 | keybase/client | go/kbfs/libkbfs/journal_manager.go | JournalStatus | func (j *JournalManager) JournalStatus(tlfID tlf.ID) (
TLFJournalStatus, error) {
tlfJournal, ok := j.getTLFJournal(tlfID, nil)
if !ok {
return TLFJournalStatus{},
errors.Errorf("Journal not enabled for %s", tlfID)
}
return tlfJournal.getJournalStatus()
} | go | func (j *JournalManager) JournalStatus(tlfID tlf.ID) (
TLFJournalStatus, error) {
tlfJournal, ok := j.getTLFJournal(tlfID, nil)
if !ok {
return TLFJournalStatus{},
errors.Errorf("Journal not enabled for %s", tlfID)
}
return tlfJournal.getJournalStatus()
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"JournalStatus",
"(",
"tlfID",
"tlf",
".",
"ID",
")",
"(",
"TLFJournalStatus",
",",
"error",
")",
"{",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"getTLFJournal",
"(",
"tlfID",
",",
"nil",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"TLFJournalStatus",
"{",
"}",
",",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n\n",
"return",
"tlfJournal",
".",
"getJournalStatus",
"(",
")",
"\n",
"}"
] | // JournalStatus returns a TLFServerStatus object for the given TLF
// suitable for diagnostics. | [
"JournalStatus",
"returns",
"a",
"TLFServerStatus",
"object",
"for",
"the",
"given",
"TLF",
"suitable",
"for",
"diagnostics",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L946-L955 |
161,086 | keybase/client | go/kbfs/libkbfs/journal_manager.go | JournalStatusWithPaths | func (j *JournalManager) JournalStatusWithPaths(ctx context.Context,
tlfID tlf.ID, cpp chainsPathPopulator) (TLFJournalStatus, error) {
tlfJournal, ok := j.getTLFJournal(tlfID, nil)
if !ok {
return TLFJournalStatus{},
errors.Errorf("Journal not enabled for %s", tlfID)
}
return tlfJournal.getJournalStatusWithPaths(ctx, cpp)
} | go | func (j *JournalManager) JournalStatusWithPaths(ctx context.Context,
tlfID tlf.ID, cpp chainsPathPopulator) (TLFJournalStatus, error) {
tlfJournal, ok := j.getTLFJournal(tlfID, nil)
if !ok {
return TLFJournalStatus{},
errors.Errorf("Journal not enabled for %s", tlfID)
}
return tlfJournal.getJournalStatusWithPaths(ctx, cpp)
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"JournalStatusWithPaths",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
",",
"cpp",
"chainsPathPopulator",
")",
"(",
"TLFJournalStatus",
",",
"error",
")",
"{",
"tlfJournal",
",",
"ok",
":=",
"j",
".",
"getTLFJournal",
"(",
"tlfID",
",",
"nil",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"TLFJournalStatus",
"{",
"}",
",",
"errors",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"tlfID",
")",
"\n",
"}",
"\n\n",
"return",
"tlfJournal",
".",
"getJournalStatusWithPaths",
"(",
"ctx",
",",
"cpp",
")",
"\n",
"}"
] | // JournalStatusWithPaths returns a TLFServerStatus object for the
// given TLF suitable for diagnostics, including paths for all the
// unflushed entries. | [
"JournalStatusWithPaths",
"returns",
"a",
"TLFServerStatus",
"object",
"for",
"the",
"given",
"TLF",
"suitable",
"for",
"diagnostics",
"including",
"paths",
"for",
"all",
"the",
"unflushed",
"entries",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L960-L969 |
161,087 | keybase/client | go/kbfs/libkbfs/journal_manager.go | shutdownExistingJournalsLocked | func (j *JournalManager) shutdownExistingJournalsLocked(ctx context.Context) {
for len(j.dirtyOps) > 0 {
j.log.CDebugf(ctx,
"Waiting for %d TLFS with dirty ops before shutting down "+
"existing journals...", len(j.dirtyOps))
j.dirtyOpsDone.Wait()
}
j.log.CDebugf(ctx, "Shutting down existing journals")
for _, tlfJournal := range j.tlfJournals {
tlfJournal.shutdown(ctx)
}
j.tlfJournals = make(map[tlf.ID]*tlfJournal)
j.currentUID = keybase1.UID("")
j.currentVerifyingKey = kbfscrypto.VerifyingKey{}
} | go | func (j *JournalManager) shutdownExistingJournalsLocked(ctx context.Context) {
for len(j.dirtyOps) > 0 {
j.log.CDebugf(ctx,
"Waiting for %d TLFS with dirty ops before shutting down "+
"existing journals...", len(j.dirtyOps))
j.dirtyOpsDone.Wait()
}
j.log.CDebugf(ctx, "Shutting down existing journals")
for _, tlfJournal := range j.tlfJournals {
tlfJournal.shutdown(ctx)
}
j.tlfJournals = make(map[tlf.ID]*tlfJournal)
j.currentUID = keybase1.UID("")
j.currentVerifyingKey = kbfscrypto.VerifyingKey{}
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"shutdownExistingJournalsLocked",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"for",
"len",
"(",
"j",
".",
"dirtyOps",
")",
">",
"0",
"{",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"\"",
",",
"len",
"(",
"j",
".",
"dirtyOps",
")",
")",
"\n",
"j",
".",
"dirtyOpsDone",
".",
"Wait",
"(",
")",
"\n",
"}",
"\n\n",
"j",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n\n",
"for",
"_",
",",
"tlfJournal",
":=",
"range",
"j",
".",
"tlfJournals",
"{",
"tlfJournal",
".",
"shutdown",
"(",
"ctx",
")",
"\n",
"}",
"\n\n",
"j",
".",
"tlfJournals",
"=",
"make",
"(",
"map",
"[",
"tlf",
".",
"ID",
"]",
"*",
"tlfJournal",
")",
"\n",
"j",
".",
"currentUID",
"=",
"keybase1",
".",
"UID",
"(",
"\"",
"\"",
")",
"\n",
"j",
".",
"currentVerifyingKey",
"=",
"kbfscrypto",
".",
"VerifyingKey",
"{",
"}",
"\n",
"}"
] | // shutdownExistingJournalsLocked shuts down all write journals, sets
// the current UID and verifying key to zero, and returns once all
// shutdowns are complete. It is safe to call multiple times in a row,
// and once this is called, EnableExistingJournals may be called
// again. | [
"shutdownExistingJournalsLocked",
"shuts",
"down",
"all",
"write",
"journals",
"sets",
"the",
"current",
"UID",
"and",
"verifying",
"key",
"to",
"zero",
"and",
"returns",
"once",
"all",
"shutdowns",
"are",
"complete",
".",
"It",
"is",
"safe",
"to",
"call",
"multiple",
"times",
"in",
"a",
"row",
"and",
"once",
"this",
"is",
"called",
"EnableExistingJournals",
"may",
"be",
"called",
"again",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L976-L993 |
161,088 | keybase/client | go/kbfs/libkbfs/journal_manager.go | shutdownExistingJournals | func (j *JournalManager) shutdownExistingJournals(ctx context.Context) {
j.lock.Lock()
defer j.lock.Unlock()
j.shutdownExistingJournalsLocked(ctx)
} | go | func (j *JournalManager) shutdownExistingJournals(ctx context.Context) {
j.lock.Lock()
defer j.lock.Unlock()
j.shutdownExistingJournalsLocked(ctx)
} | [
"func",
"(",
"j",
"*",
"JournalManager",
")",
"shutdownExistingJournals",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"j",
".",
"lock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"j",
".",
"lock",
".",
"Unlock",
"(",
")",
"\n",
"j",
".",
"shutdownExistingJournalsLocked",
"(",
"ctx",
")",
"\n",
"}"
] | // shutdownExistingJournals shuts down all write journals, sets the
// current UID and verifying key to zero, and returns once all
// shutdowns are complete. It is safe to call multiple times in a row,
// and once this is called, EnableExistingJournals may be called
// again. | [
"shutdownExistingJournals",
"shuts",
"down",
"all",
"write",
"journals",
"sets",
"the",
"current",
"UID",
"and",
"verifying",
"key",
"to",
"zero",
"and",
"returns",
"once",
"all",
"shutdowns",
"are",
"complete",
".",
"It",
"is",
"safe",
"to",
"call",
"multiple",
"times",
"in",
"a",
"row",
"and",
"once",
"this",
"is",
"called",
"EnableExistingJournals",
"may",
"be",
"called",
"again",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/journal_manager.go#L1000-L1004 |
161,089 | keybase/client | go/chat/s3/mem.go | NumPutParts | func (m *MemMulti) NumPutParts() int {
m.Lock()
defer m.Unlock()
return m.numPutParts
} | go | func (m *MemMulti) NumPutParts() int {
m.Lock()
defer m.Unlock()
return m.numPutParts
} | [
"func",
"(",
"m",
"*",
"MemMulti",
")",
"NumPutParts",
"(",
")",
"int",
"{",
"m",
".",
"Lock",
"(",
")",
"\n",
"defer",
"m",
".",
"Unlock",
"(",
")",
"\n\n",
"return",
"m",
".",
"numPutParts",
"\n",
"}"
] | // NumPutParts returns the number of times PutPart was called. | [
"NumPutParts",
"returns",
"the",
"number",
"of",
"times",
"PutPart",
"was",
"called",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/s3/mem.go#L223-L228 |
161,090 | keybase/client | go/kbfs/kbfsblock/context.go | MakeRefNonce | func MakeRefNonce() (RefNonce, error) {
var nonce RefNonce
for nonce == ZeroRefNonce {
err := kbfscrypto.RandRead(nonce[:])
if err != nil {
return ZeroRefNonce, err
}
}
return nonce, nil
} | go | func MakeRefNonce() (RefNonce, error) {
var nonce RefNonce
for nonce == ZeroRefNonce {
err := kbfscrypto.RandRead(nonce[:])
if err != nil {
return ZeroRefNonce, err
}
}
return nonce, nil
} | [
"func",
"MakeRefNonce",
"(",
")",
"(",
"RefNonce",
",",
"error",
")",
"{",
"var",
"nonce",
"RefNonce",
"\n",
"for",
"nonce",
"==",
"ZeroRefNonce",
"{",
"err",
":=",
"kbfscrypto",
".",
"RandRead",
"(",
"nonce",
"[",
":",
"]",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"ZeroRefNonce",
",",
"err",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nonce",
",",
"nil",
"\n",
"}"
] | // MakeRefNonce generates a non-zero block reference nonce using a
// CSPRNG. This is used for distinguishing different references to the
// same ID. | [
"MakeRefNonce",
"generates",
"a",
"non",
"-",
"zero",
"block",
"reference",
"nonce",
"using",
"a",
"CSPRNG",
".",
"This",
"is",
"used",
"for",
"distinguishing",
"different",
"references",
"to",
"the",
"same",
"ID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/context.go#L31-L40 |
161,091 | keybase/client | go/kbfs/kbfsblock/context.go | MakeFirstContext | func MakeFirstContext(
creator keybase1.UserOrTeamID, bType keybase1.BlockType) Context {
return Context{Creator: creator, BlockType: bType}
} | go | func MakeFirstContext(
creator keybase1.UserOrTeamID, bType keybase1.BlockType) Context {
return Context{Creator: creator, BlockType: bType}
} | [
"func",
"MakeFirstContext",
"(",
"creator",
"keybase1",
".",
"UserOrTeamID",
",",
"bType",
"keybase1",
".",
"BlockType",
")",
"Context",
"{",
"return",
"Context",
"{",
"Creator",
":",
"creator",
",",
"BlockType",
":",
"bType",
"}",
"\n",
"}"
] | // MakeFirstContext makes the initial context for a block with the
// given creator. | [
"MakeFirstContext",
"makes",
"the",
"initial",
"context",
"for",
"a",
"block",
"with",
"the",
"given",
"creator",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/context.go#L73-L76 |
161,092 | keybase/client | go/kbfs/kbfsblock/context.go | MakeContext | func MakeContext(
creator keybase1.UserOrTeamID, writer keybase1.UserOrTeamID, nonce RefNonce,
bType keybase1.BlockType) Context {
return Context{
Creator: creator,
Writer: writer,
RefNonce: nonce,
BlockType: bType,
}
} | go | func MakeContext(
creator keybase1.UserOrTeamID, writer keybase1.UserOrTeamID, nonce RefNonce,
bType keybase1.BlockType) Context {
return Context{
Creator: creator,
Writer: writer,
RefNonce: nonce,
BlockType: bType,
}
} | [
"func",
"MakeContext",
"(",
"creator",
"keybase1",
".",
"UserOrTeamID",
",",
"writer",
"keybase1",
".",
"UserOrTeamID",
",",
"nonce",
"RefNonce",
",",
"bType",
"keybase1",
".",
"BlockType",
")",
"Context",
"{",
"return",
"Context",
"{",
"Creator",
":",
"creator",
",",
"Writer",
":",
"writer",
",",
"RefNonce",
":",
"nonce",
",",
"BlockType",
":",
"bType",
",",
"}",
"\n",
"}"
] | // MakeContext makes a context with the given creator, writer, and
// nonce, where the writer is not necessarily equal to the creator,
// and the nonce is usually non-zero. | [
"MakeContext",
"makes",
"a",
"context",
"with",
"the",
"given",
"creator",
"writer",
"and",
"nonce",
"where",
"the",
"writer",
"is",
"not",
"necessarily",
"equal",
"to",
"the",
"creator",
"and",
"the",
"nonce",
"is",
"usually",
"non",
"-",
"zero",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/context.go#L81-L90 |
161,093 | keybase/client | go/kbfs/kbfsblock/context.go | GetWriter | func (c Context) GetWriter() keybase1.UserOrTeamID {
if !c.Writer.IsNil() {
return c.Writer
}
return c.Creator
} | go | func (c Context) GetWriter() keybase1.UserOrTeamID {
if !c.Writer.IsNil() {
return c.Writer
}
return c.Creator
} | [
"func",
"(",
"c",
"Context",
")",
"GetWriter",
"(",
")",
"keybase1",
".",
"UserOrTeamID",
"{",
"if",
"!",
"c",
".",
"Writer",
".",
"IsNil",
"(",
")",
"{",
"return",
"c",
".",
"Writer",
"\n",
"}",
"\n",
"return",
"c",
".",
"Creator",
"\n",
"}"
] | // GetWriter returns the writer of the associated block. | [
"GetWriter",
"returns",
"the",
"writer",
"of",
"the",
"associated",
"block",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/context.go#L98-L103 |
161,094 | keybase/client | go/kbfs/kbfsblock/context.go | SetWriter | func (c *Context) SetWriter(newWriter keybase1.UserOrTeamID) {
if c.Creator != newWriter {
c.Writer = newWriter
} else {
// save some bytes by not populating the separate Writer
// field if it matches the creator.
c.Writer = ""
}
} | go | func (c *Context) SetWriter(newWriter keybase1.UserOrTeamID) {
if c.Creator != newWriter {
c.Writer = newWriter
} else {
// save some bytes by not populating the separate Writer
// field if it matches the creator.
c.Writer = ""
}
} | [
"func",
"(",
"c",
"*",
"Context",
")",
"SetWriter",
"(",
"newWriter",
"keybase1",
".",
"UserOrTeamID",
")",
"{",
"if",
"c",
".",
"Creator",
"!=",
"newWriter",
"{",
"c",
".",
"Writer",
"=",
"newWriter",
"\n",
"}",
"else",
"{",
"// save some bytes by not populating the separate Writer",
"// field if it matches the creator.",
"c",
".",
"Writer",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"}"
] | // SetWriter sets the Writer field, if necessary. | [
"SetWriter",
"sets",
"the",
"Writer",
"field",
"if",
"necessary",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsblock/context.go#L106-L114 |
161,095 | keybase/client | go/kbfs/kbfsmd/merkle_hash.go | MakeMerkleHash | func MakeMerkleHash(codec kbfscodec.Codec, md *RootMetadataSigned) (MerkleHash, error) {
buf, err := codec.Encode(md)
if err != nil {
return MerkleHash{}, err
}
h, err := kbfshash.DefaultHash(buf)
if err != nil {
return MerkleHash{}, err
}
return MerkleHash{h}, nil
} | go | func MakeMerkleHash(codec kbfscodec.Codec, md *RootMetadataSigned) (MerkleHash, error) {
buf, err := codec.Encode(md)
if err != nil {
return MerkleHash{}, err
}
h, err := kbfshash.DefaultHash(buf)
if err != nil {
return MerkleHash{}, err
}
return MerkleHash{h}, nil
} | [
"func",
"MakeMerkleHash",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"md",
"*",
"RootMetadataSigned",
")",
"(",
"MerkleHash",
",",
"error",
")",
"{",
"buf",
",",
"err",
":=",
"codec",
".",
"Encode",
"(",
"md",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"MerkleHash",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"h",
",",
"err",
":=",
"kbfshash",
".",
"DefaultHash",
"(",
"buf",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"MerkleHash",
"{",
"}",
",",
"err",
"\n",
"}",
"\n",
"return",
"MerkleHash",
"{",
"h",
"}",
",",
"nil",
"\n",
"}"
] | // MakeMerkleHash hashes the given signed RootMetadata object. | [
"MakeMerkleHash",
"hashes",
"the",
"given",
"signed",
"RootMetadata",
"object",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/merkle_hash.go#L20-L30 |
161,096 | keybase/client | go/kbfs/kbfsmd/merkle_hash.go | MarshalBinary | func (h MerkleHash) MarshalBinary() (data []byte, err error) {
return h.h.MarshalBinary()
} | go | func (h MerkleHash) MarshalBinary() (data []byte, err error) {
return h.h.MarshalBinary()
} | [
"func",
"(",
"h",
"MerkleHash",
")",
"MarshalBinary",
"(",
")",
"(",
"data",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"return",
"h",
".",
"h",
".",
"MarshalBinary",
"(",
")",
"\n",
"}"
] | // MarshalBinary implements the encoding.BinaryMarshaler interface for
// MerkleHash. Returns an error if the MerkleHash is invalid and not the
// zero MerkleHash. | [
"MarshalBinary",
"implements",
"the",
"encoding",
".",
"BinaryMarshaler",
"interface",
"for",
"MerkleHash",
".",
"Returns",
"an",
"error",
"if",
"the",
"MerkleHash",
"is",
"invalid",
"and",
"not",
"the",
"zero",
"MerkleHash",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/merkle_hash.go#L48-L50 |
161,097 | keybase/client | go/kbfs/kbfsmd/merkle_hash.go | UnmarshalBinary | func (h *MerkleHash) UnmarshalBinary(data []byte) error {
return h.h.UnmarshalBinary(data)
} | go | func (h *MerkleHash) UnmarshalBinary(data []byte) error {
return h.h.UnmarshalBinary(data)
} | [
"func",
"(",
"h",
"*",
"MerkleHash",
")",
"UnmarshalBinary",
"(",
"data",
"[",
"]",
"byte",
")",
"error",
"{",
"return",
"h",
".",
"h",
".",
"UnmarshalBinary",
"(",
"data",
")",
"\n",
"}"
] | // UnmarshalBinary implements the encoding.BinaryUnmarshaler interface
// for MerkleHash. Returns an error if the given byte array is non-empty and
// the MerkleHash is invalid. | [
"UnmarshalBinary",
"implements",
"the",
"encoding",
".",
"BinaryUnmarshaler",
"interface",
"for",
"MerkleHash",
".",
"Returns",
"an",
"error",
"if",
"the",
"given",
"byte",
"array",
"is",
"non",
"-",
"empty",
"and",
"the",
"MerkleHash",
"is",
"invalid",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/merkle_hash.go#L55-L57 |
161,098 | keybase/client | go/libkb/keymerge.go | MergeKey | func (to *PGPKeyBundle) MergeKey(from *PGPKeyBundle) {
// First, merge identities, adding any signatures found in matching identities
for name, fromIdentity := range from.Identities {
if toIdentity, ok := to.Identities[name]; ok {
to.Identities[name].Signatures = combineSignatures(toIdentity.Signatures, fromIdentity.Signatures)
// There's a primary self-signature that we use. Always take the later
// of the two.
ssTo := to.Identities[name].SelfSignature
ssFrom := fromIdentity.SelfSignature
if ssFrom.CreationTime.After(ssTo.CreationTime) {
to.Identities[name].SelfSignature = ssFrom
}
} else {
to.Identities[fromIdentity.Name] = fromIdentity
}
}
// Then, merge revocations
to.Revocations = combineSignatures(to.Revocations, from.Revocations)
// Finally, merge subkeys
existingSubkeys := make(map[[20]byte]int)
for i, subkey := range to.Subkeys {
existingSubkeys[subkey.PublicKey.Fingerprint] = i
}
for _, subkey := range from.Subkeys {
if i, ok := existingSubkeys[subkey.PublicKey.Fingerprint]; ok {
if subkey.Sig.CreationTime.After(to.Subkeys[i].Sig.CreationTime) {
to.Subkeys[i].Sig = subkey.Sig
if subkey.Revocation != nil {
to.Subkeys[i].Revocation = subkey.Revocation
}
}
} else {
to.Subkeys = append(to.Subkeys, subkey)
}
}
} | go | func (to *PGPKeyBundle) MergeKey(from *PGPKeyBundle) {
// First, merge identities, adding any signatures found in matching identities
for name, fromIdentity := range from.Identities {
if toIdentity, ok := to.Identities[name]; ok {
to.Identities[name].Signatures = combineSignatures(toIdentity.Signatures, fromIdentity.Signatures)
// There's a primary self-signature that we use. Always take the later
// of the two.
ssTo := to.Identities[name].SelfSignature
ssFrom := fromIdentity.SelfSignature
if ssFrom.CreationTime.After(ssTo.CreationTime) {
to.Identities[name].SelfSignature = ssFrom
}
} else {
to.Identities[fromIdentity.Name] = fromIdentity
}
}
// Then, merge revocations
to.Revocations = combineSignatures(to.Revocations, from.Revocations)
// Finally, merge subkeys
existingSubkeys := make(map[[20]byte]int)
for i, subkey := range to.Subkeys {
existingSubkeys[subkey.PublicKey.Fingerprint] = i
}
for _, subkey := range from.Subkeys {
if i, ok := existingSubkeys[subkey.PublicKey.Fingerprint]; ok {
if subkey.Sig.CreationTime.After(to.Subkeys[i].Sig.CreationTime) {
to.Subkeys[i].Sig = subkey.Sig
if subkey.Revocation != nil {
to.Subkeys[i].Revocation = subkey.Revocation
}
}
} else {
to.Subkeys = append(to.Subkeys, subkey)
}
}
} | [
"func",
"(",
"to",
"*",
"PGPKeyBundle",
")",
"MergeKey",
"(",
"from",
"*",
"PGPKeyBundle",
")",
"{",
"// First, merge identities, adding any signatures found in matching identities",
"for",
"name",
",",
"fromIdentity",
":=",
"range",
"from",
".",
"Identities",
"{",
"if",
"toIdentity",
",",
"ok",
":=",
"to",
".",
"Identities",
"[",
"name",
"]",
";",
"ok",
"{",
"to",
".",
"Identities",
"[",
"name",
"]",
".",
"Signatures",
"=",
"combineSignatures",
"(",
"toIdentity",
".",
"Signatures",
",",
"fromIdentity",
".",
"Signatures",
")",
"\n\n",
"// There's a primary self-signature that we use. Always take the later",
"// of the two.",
"ssTo",
":=",
"to",
".",
"Identities",
"[",
"name",
"]",
".",
"SelfSignature",
"\n",
"ssFrom",
":=",
"fromIdentity",
".",
"SelfSignature",
"\n",
"if",
"ssFrom",
".",
"CreationTime",
".",
"After",
"(",
"ssTo",
".",
"CreationTime",
")",
"{",
"to",
".",
"Identities",
"[",
"name",
"]",
".",
"SelfSignature",
"=",
"ssFrom",
"\n",
"}",
"\n\n",
"}",
"else",
"{",
"to",
".",
"Identities",
"[",
"fromIdentity",
".",
"Name",
"]",
"=",
"fromIdentity",
"\n",
"}",
"\n",
"}",
"\n\n",
"// Then, merge revocations",
"to",
".",
"Revocations",
"=",
"combineSignatures",
"(",
"to",
".",
"Revocations",
",",
"from",
".",
"Revocations",
")",
"\n\n",
"// Finally, merge subkeys",
"existingSubkeys",
":=",
"make",
"(",
"map",
"[",
"[",
"20",
"]",
"byte",
"]",
"int",
")",
"\n",
"for",
"i",
",",
"subkey",
":=",
"range",
"to",
".",
"Subkeys",
"{",
"existingSubkeys",
"[",
"subkey",
".",
"PublicKey",
".",
"Fingerprint",
"]",
"=",
"i",
"\n",
"}",
"\n",
"for",
"_",
",",
"subkey",
":=",
"range",
"from",
".",
"Subkeys",
"{",
"if",
"i",
",",
"ok",
":=",
"existingSubkeys",
"[",
"subkey",
".",
"PublicKey",
".",
"Fingerprint",
"]",
";",
"ok",
"{",
"if",
"subkey",
".",
"Sig",
".",
"CreationTime",
".",
"After",
"(",
"to",
".",
"Subkeys",
"[",
"i",
"]",
".",
"Sig",
".",
"CreationTime",
")",
"{",
"to",
".",
"Subkeys",
"[",
"i",
"]",
".",
"Sig",
"=",
"subkey",
".",
"Sig",
"\n",
"if",
"subkey",
".",
"Revocation",
"!=",
"nil",
"{",
"to",
".",
"Subkeys",
"[",
"i",
"]",
".",
"Revocation",
"=",
"subkey",
".",
"Revocation",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"else",
"{",
"to",
".",
"Subkeys",
"=",
"append",
"(",
"to",
".",
"Subkeys",
",",
"subkey",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // MergeKey adds the identities, revocations, and subkeys of another PGPKeyBundle to this key | [
"MergeKey",
"adds",
"the",
"identities",
"revocations",
"and",
"subkeys",
"of",
"another",
"PGPKeyBundle",
"to",
"this",
"key"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/keymerge.go#L28-L68 |
161,099 | keybase/client | go/kex2/provisioner.go | RunProvisioner | func RunProvisioner(arg ProvisionerArg) error {
p := newProvisioner(arg)
err := p.run()
p.close() // ignore any errors in closing the channel
return err
} | go | func RunProvisioner(arg ProvisionerArg) error {
p := newProvisioner(arg)
err := p.run()
p.close() // ignore any errors in closing the channel
return err
} | [
"func",
"RunProvisioner",
"(",
"arg",
"ProvisionerArg",
")",
"error",
"{",
"p",
":=",
"newProvisioner",
"(",
"arg",
")",
"\n",
"err",
":=",
"p",
".",
"run",
"(",
")",
"\n",
"p",
".",
"close",
"(",
")",
"// ignore any errors in closing the channel",
"\n",
"return",
"err",
"\n",
"}"
] | // RunProvisioner runs a provisioner given the necessary arguments. | [
"RunProvisioner",
"runs",
"a",
"provisioner",
"given",
"the",
"necessary",
"arguments",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kex2/provisioner.go#L61-L66 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.