id int32 0 167k | repo stringlengths 5 54 | path stringlengths 4 155 | func_name stringlengths 1 118 | original_string stringlengths 52 85.5k | language stringclasses 1
value | code stringlengths 52 85.5k | code_tokens listlengths 21 1.41k | docstring stringlengths 6 2.61k | docstring_tokens listlengths 3 215 | sha stringlengths 40 40 | url stringlengths 85 252 |
|---|---|---|---|---|---|---|---|---|---|---|---|
159,900 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetRevision | func (md *RootMetadata) SetRevision(revision kbfsmd.Revision) {
md.bareMd.SetRevision(revision)
} | go | func (md *RootMetadata) SetRevision(revision kbfsmd.Revision) {
md.bareMd.SetRevision(revision)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetRevision",
"(",
"revision",
"kbfsmd",
".",
"Revision",
")",
"{",
"md",
".",
"bareMd",
".",
"SetRevision",
"(",
"revision",
")",
"\n",
"}"
] | // SetRevision wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetRevision",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L769-L771 |
159,901 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetWriters | func (md *RootMetadata) SetWriters(writers []keybase1.UserOrTeamID) {
md.bareMd.SetWriters(writers)
} | go | func (md *RootMetadata) SetWriters(writers []keybase1.UserOrTeamID) {
md.bareMd.SetWriters(writers)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetWriters",
"(",
"writers",
")",
"\n",
"}"
] | // SetWriters wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetWriters",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L774-L776 |
159,902 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetUnresolvedReaders | func (md *RootMetadata) SetUnresolvedReaders(readers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedReaders(readers)
} | go | func (md *RootMetadata) SetUnresolvedReaders(readers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedReaders(readers)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetUnresolvedReaders",
"(",
"readers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
")",
"{",
"md",
".",
"bareMd",
".",
"SetUnresolvedReaders",
"(",
"readers",
")",
"\n",
"}"
] | // SetUnresolvedReaders wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetUnresolvedReaders",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L779-L781 |
159,903 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetUnresolvedWriters | func (md *RootMetadata) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedWriters(writers)
} | go | func (md *RootMetadata) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.bareMd.SetUnresolvedWriters(writers)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetUnresolvedWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
")",
"{",
"md",
".",
"bareMd",
".",
"SetUnresolvedWriters",
"(",
"writers",
")",
"\n",
"}"
] | // SetUnresolvedWriters wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetUnresolvedWriters",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L784-L786 |
159,904 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetConflictInfo | func (md *RootMetadata) SetConflictInfo(ci *tlf.HandleExtension) {
md.bareMd.SetConflictInfo(ci)
} | go | func (md *RootMetadata) SetConflictInfo(ci *tlf.HandleExtension) {
md.bareMd.SetConflictInfo(ci)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetConflictInfo",
"(",
"ci",
"*",
"tlf",
".",
"HandleExtension",
")",
"{",
"md",
".",
"bareMd",
".",
"SetConflictInfo",
"(",
"ci",
")",
"\n",
"}"
] | // SetConflictInfo wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetConflictInfo",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L789-L791 |
159,905 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetFinalizedInfo | func (md *RootMetadata) SetFinalizedInfo(fi *tlf.HandleExtension) {
md.bareMd.SetFinalizedInfo(fi)
} | go | func (md *RootMetadata) SetFinalizedInfo(fi *tlf.HandleExtension) {
md.bareMd.SetFinalizedInfo(fi)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetFinalizedInfo",
"(",
"fi",
"*",
"tlf",
".",
"HandleExtension",
")",
"{",
"md",
".",
"bareMd",
".",
"SetFinalizedInfo",
"(",
"fi",
")",
"\n",
"}"
] | // SetFinalizedInfo wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetFinalizedInfo",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L794-L796 |
159,906 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetLastModifyingWriter | func (md *RootMetadata) SetLastModifyingWriter(user keybase1.UID) {
md.bareMd.SetLastModifyingWriter(user)
} | go | func (md *RootMetadata) SetLastModifyingWriter(user keybase1.UID) {
md.bareMd.SetLastModifyingWriter(user)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetLastModifyingWriter",
"(",
"user",
"keybase1",
".",
"UID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetLastModifyingWriter",
"(",
"user",
")",
"\n",
"}"
] | // SetLastModifyingWriter wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetLastModifyingWriter",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L799-L801 |
159,907 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetLastModifyingUser | func (md *RootMetadata) SetLastModifyingUser(user keybase1.UID) {
md.bareMd.SetLastModifyingUser(user)
} | go | func (md *RootMetadata) SetLastModifyingUser(user keybase1.UID) {
md.bareMd.SetLastModifyingUser(user)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetLastModifyingUser",
"(",
"user",
"keybase1",
".",
"UID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetLastModifyingUser",
"(",
"user",
")",
"\n",
"}"
] | // SetLastModifyingUser wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetLastModifyingUser",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L804-L806 |
159,908 | keybase/client | go/kbfs/libkbfs/root_metadata.go | SetTlfID | func (md *RootMetadata) SetTlfID(tlf tlf.ID) {
md.bareMd.SetTlfID(tlf)
} | go | func (md *RootMetadata) SetTlfID(tlf tlf.ID) {
md.bareMd.SetTlfID(tlf)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"SetTlfID",
"(",
"tlf",
"tlf",
".",
"ID",
")",
"{",
"md",
".",
"bareMd",
".",
"SetTlfID",
"(",
"tlf",
")",
"\n",
"}"
] | // SetTlfID wraps the respective method of the underlying BareRootMetadata for convenience. | [
"SetTlfID",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L809-L811 |
159,909 | keybase/client | go/kbfs/libkbfs/root_metadata.go | HasKeyForUser | func (md *RootMetadata) HasKeyForUser(user keybase1.UID) (
bool, error) {
writers, readers, err := md.bareMd.GetUserDevicePublicKeys(md.extra)
if err != nil {
return false, err
}
return len(writers[user]) > 0 || len(readers[user]) > 0, nil
} | go | func (md *RootMetadata) HasKeyForUser(user keybase1.UID) (
bool, error) {
writers, readers, err := md.bareMd.GetUserDevicePublicKeys(md.extra)
if err != nil {
return false, err
}
return len(writers[user]) > 0 || len(readers[user]) > 0, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"HasKeyForUser",
"(",
"user",
"keybase1",
".",
"UID",
")",
"(",
"bool",
",",
"error",
")",
"{",
"writers",
",",
"readers",
",",
"err",
":=",
"md",
".",
"bareMd",
".",
"GetUserDevicePublicKeys",
"(",
"md",
".... | // HasKeyForUser wraps the respective method of the underlying BareRootMetadata for convenience. | [
"HasKeyForUser",
"wraps",
"the",
"respective",
"method",
"of",
"the",
"underlying",
"BareRootMetadata",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L814-L821 |
159,910 | keybase/client | go/kbfs/libkbfs/root_metadata.go | fakeInitialRekey | func (md *RootMetadata) fakeInitialRekey() {
bh, err := md.tlfHandle.ToBareHandle()
if err != nil {
panic(err)
}
md.extra = kbfsmd.FakeInitialRekey(md.bareMd, bh, kbfscrypto.TLFPublicKey{})
} | go | func (md *RootMetadata) fakeInitialRekey() {
bh, err := md.tlfHandle.ToBareHandle()
if err != nil {
panic(err)
}
md.extra = kbfsmd.FakeInitialRekey(md.bareMd, bh, kbfscrypto.TLFPublicKey{})
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"fakeInitialRekey",
"(",
")",
"{",
"bh",
",",
"err",
":=",
"md",
".",
"tlfHandle",
".",
"ToBareHandle",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"err",
")",
"\n",
"}",
"\n",
"md",
"... | // fakeInitialRekey wraps the FakeInitialRekey test function for
// convenience. | [
"fakeInitialRekey",
"wraps",
"the",
"FakeInitialRekey",
"test",
"function",
"for",
"convenience",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L825-L831 |
159,911 | keybase/client | go/kbfs/libkbfs/root_metadata.go | AddKeyGeneration | func (md *RootMetadata) AddKeyGeneration(codec kbfscodec.Codec,
wKeys, rKeys kbfsmd.UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
pubKey kbfscrypto.TLFPublicKey,
privKey kbfscrypto.TLFPrivateKey,
currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) (
serverHalves kbfsmd.UserDeviceKeyServerHalves, err error) {
nextExtra, serverHalves, err := md.bareMd.AddKeyGeneration(
codec, md.extra, wKeys, rKeys, ePubKey, ePrivKey,
pubKey, currCryptKey, nextCryptKey)
if err != nil {
return nil, err
}
md.extra = nextExtra
md.data.TLFPrivateKey = privKey
return serverHalves, nil
} | go | func (md *RootMetadata) AddKeyGeneration(codec kbfscodec.Codec,
wKeys, rKeys kbfsmd.UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
pubKey kbfscrypto.TLFPublicKey,
privKey kbfscrypto.TLFPrivateKey,
currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) (
serverHalves kbfsmd.UserDeviceKeyServerHalves, err error) {
nextExtra, serverHalves, err := md.bareMd.AddKeyGeneration(
codec, md.extra, wKeys, rKeys, ePubKey, ePrivKey,
pubKey, currCryptKey, nextCryptKey)
if err != nil {
return nil, err
}
md.extra = nextExtra
md.data.TLFPrivateKey = privKey
return serverHalves, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"AddKeyGeneration",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"wKeys",
",",
"rKeys",
"kbfsmd",
".",
"UserDevicePublicKeys",
",",
"ePubKey",
"kbfscrypto",
".",
"TLFEphemeralPublicKey",
",",
"ePrivKey",
"kbfscrypto",
... | // AddKeyGeneration adds a new key generation to this revision of metadata. | [
"AddKeyGeneration",
"adds",
"a",
"new",
"key",
"generation",
"to",
"this",
"revision",
"of",
"metadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L839-L856 |
159,912 | keybase/client | go/kbfs/libkbfs/root_metadata.go | GetHistoricTLFCryptKey | func (md *RootMetadata) GetHistoricTLFCryptKey(
codec kbfscodec.Codec, keyGen kbfsmd.KeyGen,
currentKey kbfscrypto.TLFCryptKey) (kbfscrypto.TLFCryptKey, error) {
return md.bareMd.GetHistoricTLFCryptKey(
codec, keyGen, currentKey, md.extra)
} | go | func (md *RootMetadata) GetHistoricTLFCryptKey(
codec kbfscodec.Codec, keyGen kbfsmd.KeyGen,
currentKey kbfscrypto.TLFCryptKey) (kbfscrypto.TLFCryptKey, error) {
return md.bareMd.GetHistoricTLFCryptKey(
codec, keyGen, currentKey, md.extra)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"GetHistoricTLFCryptKey",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"keyGen",
"kbfsmd",
".",
"KeyGen",
",",
"currentKey",
"kbfscrypto",
".",
"TLFCryptKey",
")",
"(",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"error... | // GetHistoricTLFCryptKey implements the KeyMetadata interface for RootMetadata. | [
"GetHistoricTLFCryptKey",
"implements",
"the",
"KeyMetadata",
"interface",
"for",
"RootMetadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L908-L913 |
159,913 | keybase/client | go/kbfs/libkbfs/root_metadata.go | IsWriter | func (md *RootMetadata) IsWriter(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID,
verifyingKey kbfscrypto.VerifyingKey) (bool, error) {
h := md.GetTlfHandle()
return IsWriterFromHandle(ctx, h, checker, osg, uid, verifyingKey)
} | go | func (md *RootMetadata) IsWriter(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID,
verifyingKey kbfscrypto.VerifyingKey) (bool, error) {
h := md.GetTlfHandle()
return IsWriterFromHandle(ctx, h, checker, osg, uid, verifyingKey)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"IsWriter",
"(",
"ctx",
"context",
".",
"Context",
",",
"checker",
"kbfsmd",
".",
"TeamMembershipChecker",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"uid",
"keybase1",
".",
"UID",
",",
"verifyingKey",
... | // IsWriter checks that the given user is a valid writer of the TLF
// right now. Implements the KeyMetadata interface for RootMetadata. | [
"IsWriter",
"checks",
"that",
"the",
"given",
"user",
"is",
"a",
"valid",
"writer",
"of",
"the",
"TLF",
"right",
"now",
".",
"Implements",
"the",
"KeyMetadata",
"interface",
"for",
"RootMetadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L917-L923 |
159,914 | keybase/client | go/kbfs/libkbfs/root_metadata.go | IsReader | func (md *RootMetadata) IsReader(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID) (bool, error) {
h := md.GetTlfHandle()
return isReaderFromHandle(ctx, h, checker, osg, uid)
} | go | func (md *RootMetadata) IsReader(
ctx context.Context, checker kbfsmd.TeamMembershipChecker,
osg idutil.OfflineStatusGetter, uid keybase1.UID) (bool, error) {
h := md.GetTlfHandle()
return isReaderFromHandle(ctx, h, checker, osg, uid)
} | [
"func",
"(",
"md",
"*",
"RootMetadata",
")",
"IsReader",
"(",
"ctx",
"context",
".",
"Context",
",",
"checker",
"kbfsmd",
".",
"TeamMembershipChecker",
",",
"osg",
"idutil",
".",
"OfflineStatusGetter",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"bool",
... | // IsReader checks that the given user is a valid reader of the TLF
// right now. | [
"IsReader",
"checks",
"that",
"the",
"given",
"user",
"is",
"a",
"valid",
"reader",
"of",
"the",
"TLF",
"right",
"now",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L927-L932 |
159,915 | keybase/client | go/kbfs/libkbfs/root_metadata.go | CheckValidSuccessor | func (md ReadOnlyRootMetadata) CheckValidSuccessor(
currID kbfsmd.ID, nextMd ReadOnlyRootMetadata) error {
return md.bareMd.CheckValidSuccessor(currID, nextMd.bareMd)
} | go | func (md ReadOnlyRootMetadata) CheckValidSuccessor(
currID kbfsmd.ID, nextMd ReadOnlyRootMetadata) error {
return md.bareMd.CheckValidSuccessor(currID, nextMd.bareMd)
} | [
"func",
"(",
"md",
"ReadOnlyRootMetadata",
")",
"CheckValidSuccessor",
"(",
"currID",
"kbfsmd",
".",
"ID",
",",
"nextMd",
"ReadOnlyRootMetadata",
")",
"error",
"{",
"return",
"md",
".",
"bareMd",
".",
"CheckValidSuccessor",
"(",
"currID",
",",
"nextMd",
".",
"... | // CheckValidSuccessor makes sure the given ReadOnlyRootMetadata is a
// valid successor to the current one, and returns an error otherwise. | [
"CheckValidSuccessor",
"makes",
"sure",
"the",
"given",
"ReadOnlyRootMetadata",
"is",
"a",
"valid",
"successor",
"to",
"the",
"current",
"one",
"and",
"returns",
"an",
"error",
"otherwise",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L951-L954 |
159,916 | keybase/client | go/kbfs/libkbfs/root_metadata.go | MakeImmutableRootMetadata | func MakeImmutableRootMetadata(
rmd *RootMetadata, writerVerifyingKey kbfscrypto.VerifyingKey,
mdID kbfsmd.ID, localTimestamp time.Time,
putToServer bool) ImmutableRootMetadata {
if writerVerifyingKey == (kbfscrypto.VerifyingKey{}) {
panic("zero writerVerifyingKey passed to MakeImmutableRootMetadata")
}
if mdID == (kbfsmd.ID{}) {
panic("zero mdID passed to MakeImmutableRootMetadata")
}
if localTimestamp.IsZero() {
panic("zero localTimestamp passed to MakeImmutableRootMetadata")
}
if bareMDV2, ok := rmd.bareMd.(*kbfsmd.RootMetadataV2); ok {
writerSig := bareMDV2.WriterMetadataSigInfo
if writerSig.IsNil() {
panic("MDV2 with nil writer signature")
}
if writerSig.VerifyingKey != writerVerifyingKey {
panic(fmt.Sprintf("key mismatch: sig has %s, expected %s",
writerSig.VerifyingKey, writerVerifyingKey))
}
}
return ImmutableRootMetadata{
rmd.ReadOnly(), mdID, writerVerifyingKey, localTimestamp, putToServer}
} | go | func MakeImmutableRootMetadata(
rmd *RootMetadata, writerVerifyingKey kbfscrypto.VerifyingKey,
mdID kbfsmd.ID, localTimestamp time.Time,
putToServer bool) ImmutableRootMetadata {
if writerVerifyingKey == (kbfscrypto.VerifyingKey{}) {
panic("zero writerVerifyingKey passed to MakeImmutableRootMetadata")
}
if mdID == (kbfsmd.ID{}) {
panic("zero mdID passed to MakeImmutableRootMetadata")
}
if localTimestamp.IsZero() {
panic("zero localTimestamp passed to MakeImmutableRootMetadata")
}
if bareMDV2, ok := rmd.bareMd.(*kbfsmd.RootMetadataV2); ok {
writerSig := bareMDV2.WriterMetadataSigInfo
if writerSig.IsNil() {
panic("MDV2 with nil writer signature")
}
if writerSig.VerifyingKey != writerVerifyingKey {
panic(fmt.Sprintf("key mismatch: sig has %s, expected %s",
writerSig.VerifyingKey, writerVerifyingKey))
}
}
return ImmutableRootMetadata{
rmd.ReadOnly(), mdID, writerVerifyingKey, localTimestamp, putToServer}
} | [
"func",
"MakeImmutableRootMetadata",
"(",
"rmd",
"*",
"RootMetadata",
",",
"writerVerifyingKey",
"kbfscrypto",
".",
"VerifyingKey",
",",
"mdID",
"kbfsmd",
".",
"ID",
",",
"localTimestamp",
"time",
".",
"Time",
",",
"putToServer",
"bool",
")",
"ImmutableRootMetadata"... | // MakeImmutableRootMetadata makes a new ImmutableRootMetadata from
// the given RMD and its corresponding MdID. | [
"MakeImmutableRootMetadata",
"makes",
"a",
"new",
"ImmutableRootMetadata",
"from",
"the",
"given",
"RMD",
"and",
"its",
"corresponding",
"MdID",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L989-L1014 |
159,917 | keybase/client | go/kbfs/libdokan/reclaim_quota_file.go | WriteFile | func (f *ReclaimQuotaFile) WriteFile(ctx context.Context, fi *dokan.FileInfo, bs []byte, offset int64) (n int, err error) {
f.folder.fs.logEnter(ctx, "ReclaimQuotaFile Write")
defer func() { f.folder.reportErr(ctx, libkbfs.WriteMode, err) }()
if len(bs) == 0 {
return 0, nil
}
err = libkbfs.ForceQuotaReclamationForTesting(
f.folder.fs.config, f.folder.getFolderBranch())
return len(bs), err
} | go | func (f *ReclaimQuotaFile) WriteFile(ctx context.Context, fi *dokan.FileInfo, bs []byte, offset int64) (n int, err error) {
f.folder.fs.logEnter(ctx, "ReclaimQuotaFile Write")
defer func() { f.folder.reportErr(ctx, libkbfs.WriteMode, err) }()
if len(bs) == 0 {
return 0, nil
}
err = libkbfs.ForceQuotaReclamationForTesting(
f.folder.fs.config, f.folder.getFolderBranch())
return len(bs), err
} | [
"func",
"(",
"f",
"*",
"ReclaimQuotaFile",
")",
"WriteFile",
"(",
"ctx",
"context",
".",
"Context",
",",
"fi",
"*",
"dokan",
".",
"FileInfo",
",",
"bs",
"[",
"]",
"byte",
",",
"offset",
"int64",
")",
"(",
"n",
"int",
",",
"err",
"error",
")",
"{",
... | // WriteFile implements writes for dokan. Note a write triggers quota
// reclamation, but does not wait for it to finish. If you want to
// wait, write to SyncFromServerFileName. | [
"WriteFile",
"implements",
"writes",
"for",
"dokan",
".",
"Note",
"a",
"write",
"triggers",
"quota",
"reclamation",
"but",
"does",
"not",
"wait",
"for",
"it",
"to",
"finish",
".",
"If",
"you",
"want",
"to",
"wait",
"write",
"to",
"SyncFromServerFileName",
".... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/reclaim_quota_file.go#L23-L32 |
159,918 | keybase/client | go/teams/transactions.go | findPayload | func (tx *AddMemberTx) findPayload(tag txPayloadTag, forUID keybase1.UID) interface{} {
minSeqno := 0
hasUID := !forUID.IsNil()
if hasUID {
minSeqno = tx.lastChangeForUID[forUID]
}
for i, v := range tx.payloads {
if i >= minSeqno && v.Tag == tag {
if hasUID && i > minSeqno {
tx.lastChangeForUID[forUID] = i
}
return v.Val
}
}
if hasUID {
tx.lastChangeForUID[forUID] = len(tx.payloads)
}
ret := txPayload{
Tag: tag,
}
switch tag {
case txPayloadTagCryptomembers:
ret.Val = &keybase1.TeamChangeReq{}
case txPayloadTagInviteKeybase, txPayloadTagInviteSocial:
ret.Val = &SCTeamInvites{}
default:
panic(fmt.Sprintf("Unexpected tag %q", tag))
}
tx.payloads = append(tx.payloads, ret)
return ret.Val
} | go | func (tx *AddMemberTx) findPayload(tag txPayloadTag, forUID keybase1.UID) interface{} {
minSeqno := 0
hasUID := !forUID.IsNil()
if hasUID {
minSeqno = tx.lastChangeForUID[forUID]
}
for i, v := range tx.payloads {
if i >= minSeqno && v.Tag == tag {
if hasUID && i > minSeqno {
tx.lastChangeForUID[forUID] = i
}
return v.Val
}
}
if hasUID {
tx.lastChangeForUID[forUID] = len(tx.payloads)
}
ret := txPayload{
Tag: tag,
}
switch tag {
case txPayloadTagCryptomembers:
ret.Val = &keybase1.TeamChangeReq{}
case txPayloadTagInviteKeybase, txPayloadTagInviteSocial:
ret.Val = &SCTeamInvites{}
default:
panic(fmt.Sprintf("Unexpected tag %q", tag))
}
tx.payloads = append(tx.payloads, ret)
return ret.Val
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"findPayload",
"(",
"tag",
"txPayloadTag",
",",
"forUID",
"keybase1",
".",
"UID",
")",
"interface",
"{",
"}",
"{",
"minSeqno",
":=",
"0",
"\n",
"hasUID",
":=",
"!",
"forUID",
".",
"IsNil",
"(",
")",
"\n",
"... | // Internal AddMemberTx methods. They should not be used by consumers
// of AddMemberTx API. Users of this API should avoid lowercase
// methods and fields at all cost, even from same package. | [
"Internal",
"AddMemberTx",
"methods",
".",
"They",
"should",
"not",
"be",
"used",
"by",
"consumers",
"of",
"AddMemberTx",
"API",
".",
"Users",
"of",
"this",
"API",
"should",
"avoid",
"lowercase",
"methods",
"and",
"fields",
"at",
"all",
"cost",
"even",
"from... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L75-L107 |
159,919 | keybase/client | go/teams/transactions.go | removeMember | func (tx *AddMemberTx) removeMember(uv keybase1.UserVersion) {
// Precondition: UV is a cryptomember.
payload := tx.changeMembershipPayload(uv.Uid)
payload.None = append(payload.None, uv)
} | go | func (tx *AddMemberTx) removeMember(uv keybase1.UserVersion) {
// Precondition: UV is a cryptomember.
payload := tx.changeMembershipPayload(uv.Uid)
payload.None = append(payload.None, uv)
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"removeMember",
"(",
"uv",
"keybase1",
".",
"UserVersion",
")",
"{",
"// Precondition: UV is a cryptomember.",
"payload",
":=",
"tx",
".",
"changeMembershipPayload",
"(",
"uv",
".",
"Uid",
")",
"\n",
"payload",
".",
... | // Methods modifying payloads are supposed to always succeed given the
// preconditions are satisfied. If not, the usual result is either a
// no-op or an invalid transaction that is rejected by team player
// pre-check or by the server. Public methods should make sure that
// internal methods are always called with these preconditions
// satisfied. | [
"Methods",
"modifying",
"payloads",
"are",
"supposed",
"to",
"always",
"succeed",
"given",
"the",
"preconditions",
"are",
"satisfied",
".",
"If",
"not",
"the",
"usual",
"result",
"is",
"either",
"a",
"no",
"-",
"op",
"or",
"an",
"invalid",
"transaction",
"th... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L128-L132 |
159,920 | keybase/client | go/teams/transactions.go | createKeybaseInvite | func (tx *AddMemberTx) createKeybaseInvite(uv keybase1.UserVersion, role keybase1.TeamRole) {
// Preconditions: UV is a PUKless user, and not already in the
// team, role is valid enum value and not NONE or OWNER.
tx.createInvite("keybase", uv.TeamInviteName(), role, uv.Uid)
} | go | func (tx *AddMemberTx) createKeybaseInvite(uv keybase1.UserVersion, role keybase1.TeamRole) {
// Preconditions: UV is a PUKless user, and not already in the
// team, role is valid enum value and not NONE or OWNER.
tx.createInvite("keybase", uv.TeamInviteName(), role, uv.Uid)
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"createKeybaseInvite",
"(",
"uv",
"keybase1",
".",
"UserVersion",
",",
"role",
"keybase1",
".",
"TeamRole",
")",
"{",
"// Preconditions: UV is a PUKless user, and not already in the",
"// team, role is valid enum value and not NONE ... | // createKeybaseInvite queues Keybase-type invite for given UV and role. | [
"createKeybaseInvite",
"queues",
"Keybase",
"-",
"type",
"invite",
"for",
"given",
"UV",
"and",
"role",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L160-L164 |
159,921 | keybase/client | go/teams/transactions.go | createInvite | func (tx *AddMemberTx) createInvite(typ string, name keybase1.TeamInviteName, role keybase1.TeamRole, uid keybase1.UID) {
var payload *SCTeamInvites
if typ == "keybase" {
payload = tx.inviteKeybasePayload(uid)
} else {
payload = tx.inviteSocialPayload(uid)
}
invite := SCTeamInvite{
Type: typ,
Name: name,
ID: NewInviteID(),
}
switch role {
case keybase1.TeamRole_READER:
payload.Readers = appendToInviteList(invite, payload.Readers)
case keybase1.TeamRole_WRITER:
payload.Writers = appendToInviteList(invite, payload.Writers)
case keybase1.TeamRole_ADMIN:
payload.Admins = appendToInviteList(invite, payload.Admins)
case keybase1.TeamRole_OWNER:
payload.Owners = appendToInviteList(invite, payload.Owners)
}
} | go | func (tx *AddMemberTx) createInvite(typ string, name keybase1.TeamInviteName, role keybase1.TeamRole, uid keybase1.UID) {
var payload *SCTeamInvites
if typ == "keybase" {
payload = tx.inviteKeybasePayload(uid)
} else {
payload = tx.inviteSocialPayload(uid)
}
invite := SCTeamInvite{
Type: typ,
Name: name,
ID: NewInviteID(),
}
switch role {
case keybase1.TeamRole_READER:
payload.Readers = appendToInviteList(invite, payload.Readers)
case keybase1.TeamRole_WRITER:
payload.Writers = appendToInviteList(invite, payload.Writers)
case keybase1.TeamRole_ADMIN:
payload.Admins = appendToInviteList(invite, payload.Admins)
case keybase1.TeamRole_OWNER:
payload.Owners = appendToInviteList(invite, payload.Owners)
}
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"createInvite",
"(",
"typ",
"string",
",",
"name",
"keybase1",
".",
"TeamInviteName",
",",
"role",
"keybase1",
".",
"TeamRole",
",",
"uid",
"keybase1",
".",
"UID",
")",
"{",
"var",
"payload",
"*",
"SCTeamInvites"... | // createInvite queues an invite for invite name with role. | [
"createInvite",
"queues",
"an",
"invite",
"for",
"invite",
"name",
"with",
"role",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L167-L191 |
159,922 | keybase/client | go/teams/transactions.go | sweepCryptoMembers | func (tx *AddMemberTx) sweepCryptoMembers(ctx context.Context, uid keybase1.UID,
exceptAdminsRemovingOwners bool) {
team := tx.team
var myRole keybase1.TeamRole
if exceptAdminsRemovingOwners {
var err error
myRole, err = tx.team.myRole(ctx)
if err != nil {
myRole = keybase1.TeamRole_NONE
}
}
for chainUv := range team.chain().inner.UserLog {
chainRole := team.chain().getUserRole(chainUv)
if chainUv.Uid.Equal(uid) && chainRole != keybase1.TeamRole_NONE {
if exceptAdminsRemovingOwners && myRole == keybase1.TeamRole_ADMIN && chainRole == keybase1.TeamRole_OWNER {
// Skip if we're an admin and they're an owner.
continue
}
tx.removeMember(chainUv)
}
}
} | go | func (tx *AddMemberTx) sweepCryptoMembers(ctx context.Context, uid keybase1.UID,
exceptAdminsRemovingOwners bool) {
team := tx.team
var myRole keybase1.TeamRole
if exceptAdminsRemovingOwners {
var err error
myRole, err = tx.team.myRole(ctx)
if err != nil {
myRole = keybase1.TeamRole_NONE
}
}
for chainUv := range team.chain().inner.UserLog {
chainRole := team.chain().getUserRole(chainUv)
if chainUv.Uid.Equal(uid) && chainRole != keybase1.TeamRole_NONE {
if exceptAdminsRemovingOwners && myRole == keybase1.TeamRole_ADMIN && chainRole == keybase1.TeamRole_OWNER {
// Skip if we're an admin and they're an owner.
continue
}
tx.removeMember(chainUv)
}
}
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"sweepCryptoMembers",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"exceptAdminsRemovingOwners",
"bool",
")",
"{",
"team",
":=",
"tx",
".",
"team",
"\n",
"var",
"myRole",
"keyba... | // sweepCryptoMembers will queue "removes" for all cryptomembers with given UID.
// exceptAdminsRemovingOwners - But don't try to remove owners if we are admin. | [
"sweepCryptoMembers",
"will",
"queue",
"removes",
"for",
"all",
"cryptomembers",
"with",
"given",
"UID",
".",
"exceptAdminsRemovingOwners",
"-",
"But",
"don",
"t",
"try",
"to",
"remove",
"owners",
"if",
"we",
"are",
"admin",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L195-L216 |
159,923 | keybase/client | go/teams/transactions.go | sweepCryptoMembersOlderThan | func (tx *AddMemberTx) sweepCryptoMembersOlderThan(uv keybase1.UserVersion) {
team := tx.team
for chainUv := range team.chain().inner.UserLog {
if chainUv.Uid.Equal(uv.Uid) &&
chainUv.EldestSeqno < uv.EldestSeqno &&
team.chain().getUserRole(chainUv) != keybase1.TeamRole_NONE {
tx.removeMember(chainUv)
}
}
} | go | func (tx *AddMemberTx) sweepCryptoMembersOlderThan(uv keybase1.UserVersion) {
team := tx.team
for chainUv := range team.chain().inner.UserLog {
if chainUv.Uid.Equal(uv.Uid) &&
chainUv.EldestSeqno < uv.EldestSeqno &&
team.chain().getUserRole(chainUv) != keybase1.TeamRole_NONE {
tx.removeMember(chainUv)
}
}
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"sweepCryptoMembersOlderThan",
"(",
"uv",
"keybase1",
".",
"UserVersion",
")",
"{",
"team",
":=",
"tx",
".",
"team",
"\n",
"for",
"chainUv",
":=",
"range",
"team",
".",
"chain",
"(",
")",
".",
"inner",
".",
"... | // sweepCryptoMembersOlderThan will queue "removes" for all cryptomembers
// with same UID as given and EldestSeqno lower than in given UV. | [
"sweepCryptoMembersOlderThan",
"will",
"queue",
"removes",
"for",
"all",
"cryptomembers",
"with",
"same",
"UID",
"as",
"given",
"and",
"EldestSeqno",
"lower",
"than",
"in",
"given",
"UV",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L220-L229 |
159,924 | keybase/client | go/teams/transactions.go | AddMemberByUsername | func (tx *AddMemberTx) AddMemberByUsername(ctx context.Context, username string, role keybase1.TeamRole) (err error) {
team := tx.team
g := team.G()
m := libkb.NewMetaContext(ctx, g)
defer m.Trace(fmt.Sprintf("AddMemberTx.AddMemberByUsername(%s,%v) to team %q", username, role, team.Name()), func() error { return err })()
upak, err := engine.ResolveAndCheck(m, username, true /* useTracking */)
if err != nil {
return err
}
_, err = tx.addMemberByUPKV2(ctx, upak, role)
return err
} | go | func (tx *AddMemberTx) AddMemberByUsername(ctx context.Context, username string, role keybase1.TeamRole) (err error) {
team := tx.team
g := team.G()
m := libkb.NewMetaContext(ctx, g)
defer m.Trace(fmt.Sprintf("AddMemberTx.AddMemberByUsername(%s,%v) to team %q", username, role, team.Name()), func() error { return err })()
upak, err := engine.ResolveAndCheck(m, username, true /* useTracking */)
if err != nil {
return err
}
_, err = tx.addMemberByUPKV2(ctx, upak, role)
return err
} | [
"func",
"(",
"tx",
"*",
"AddMemberTx",
")",
"AddMemberByUsername",
"(",
"ctx",
"context",
".",
"Context",
",",
"username",
"string",
",",
"role",
"keybase1",
".",
"TeamRole",
")",
"(",
"err",
"error",
")",
"{",
"team",
":=",
"tx",
".",
"team",
"\n",
"g... | // AddMemberByUsername will add member by username and role. It
// checks if given username can become crypto member or a PUKless
// member. It will also clean up old invites and memberships if
// necessary. | [
"AddMemberByUsername",
"will",
"add",
"member",
"by",
"username",
"and",
"role",
".",
"It",
"checks",
"if",
"given",
"username",
"can",
"become",
"crypto",
"member",
"or",
"a",
"PUKless",
"member",
".",
"It",
"will",
"also",
"clean",
"up",
"old",
"invites",
... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L405-L418 |
159,925 | keybase/client | go/teams/nonce.go | newNonce24 | func newNonce24() (*nonce24, error) {
prefix, err := libkb.RandBytes(20)
if err != nil {
return nil, err
}
return &nonce24{prefix: prefix}, nil
} | go | func newNonce24() (*nonce24, error) {
prefix, err := libkb.RandBytes(20)
if err != nil {
return nil, err
}
return &nonce24{prefix: prefix}, nil
} | [
"func",
"newNonce24",
"(",
")",
"(",
"*",
"nonce24",
",",
"error",
")",
"{",
"prefix",
",",
"err",
":=",
"libkb",
".",
"RandBytes",
"(",
"20",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
... | // newNonce24 creates a nonce with a random 20 byte prefix and
// a counter starting at 0. | [
"newNonce24",
"creates",
"a",
"nonce",
"with",
"a",
"random",
"20",
"byte",
"prefix",
"and",
"a",
"counter",
"starting",
"at",
"0",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L21-L27 |
159,926 | keybase/client | go/teams/nonce.go | newNonce24SkipZero | func newNonce24SkipZero() (*nonce24, error) {
n, err := newNonce24()
if err != nil {
return nil, err
}
n.counter = 1
return n, nil
} | go | func newNonce24SkipZero() (*nonce24, error) {
n, err := newNonce24()
if err != nil {
return nil, err
}
n.counter = 1
return n, nil
} | [
"func",
"newNonce24SkipZero",
"(",
")",
"(",
"*",
"nonce24",
",",
"error",
")",
"{",
"n",
",",
"err",
":=",
"newNonce24",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"n",
".",
"counter",
"=",
"1",
... | // newNonce24 creates a nonce with a random 20 byte prefix and
// a counter starting at 1. | [
"newNonce24",
"creates",
"a",
"nonce",
"with",
"a",
"random",
"20",
"byte",
"prefix",
"and",
"a",
"counter",
"starting",
"at",
"1",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L31-L38 |
159,927 | keybase/client | go/teams/nonce.go | Nonce | func (n *nonce24) Nonce() ([24]byte, uint32) {
var nonce [24]byte
copy(nonce[:20], n.prefix)
copy(nonce[20:24], n.counterBytes())
counter := n.counter
n.counter++
return nonce, counter
} | go | func (n *nonce24) Nonce() ([24]byte, uint32) {
var nonce [24]byte
copy(nonce[:20], n.prefix)
copy(nonce[20:24], n.counterBytes())
counter := n.counter
n.counter++
return nonce, counter
} | [
"func",
"(",
"n",
"*",
"nonce24",
")",
"Nonce",
"(",
")",
"(",
"[",
"24",
"]",
"byte",
",",
"uint32",
")",
"{",
"var",
"nonce",
"[",
"24",
"]",
"byte",
"\n",
"copy",
"(",
"nonce",
"[",
":",
"20",
"]",
",",
"n",
".",
"prefix",
")",
"\n",
"co... | // Nonce gets the 24 byte nonce prefix + counter and increments
// the counter so that the nonce isn't reused. | [
"Nonce",
"gets",
"the",
"24",
"byte",
"nonce",
"prefix",
"+",
"counter",
"and",
"increments",
"the",
"counter",
"so",
"that",
"the",
"nonce",
"isn",
"t",
"reused",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L42-L49 |
159,928 | keybase/client | go/kbfs/libdokan/file_info_file.go | NewFileInfoFile | func NewFileInfoFile(
fs *FS, dir libkbfs.Node, name string) *SpecialReadFile {
return &SpecialReadFile{
read: func(ctx context.Context) ([]byte, time.Time, error) {
return libfs.GetFileInfo(ctx, fs.config, dir, name)
},
fs: fs,
}
} | go | func NewFileInfoFile(
fs *FS, dir libkbfs.Node, name string) *SpecialReadFile {
return &SpecialReadFile{
read: func(ctx context.Context) ([]byte, time.Time, error) {
return libfs.GetFileInfo(ctx, fs.config, dir, name)
},
fs: fs,
}
} | [
"func",
"NewFileInfoFile",
"(",
"fs",
"*",
"FS",
",",
"dir",
"libkbfs",
".",
"Node",
",",
"name",
"string",
")",
"*",
"SpecialReadFile",
"{",
"return",
"&",
"SpecialReadFile",
"{",
"read",
":",
"func",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"... | // NewFileInfoFile returns a special file that contains a text
// representation of a file's KBFS metadata. | [
"NewFileInfoFile",
"returns",
"a",
"special",
"file",
"that",
"contains",
"a",
"text",
"representation",
"of",
"a",
"file",
"s",
"KBFS",
"metadata",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/file_info_file.go#L17-L25 |
159,929 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NewKeybaseServiceBase | func NewKeybaseServiceBase(config Config, kbCtx Context, log logger.Logger) *KeybaseServiceBase {
k := KeybaseServiceBase{
config: config,
context: kbCtx,
log: log,
userCache: make(map[keybase1.UID]idutil.UserInfo),
userCacheUnverifiedKeys: make(map[keybase1.UID][]keybase1.PublicKey),
teamCache: make(map[keybase1.TeamID]idutil.TeamInfo),
}
if config != nil {
k.merkleRoot = NewEventuallyConsistentMerkleRoot(
config, &keybaseServiceMerkleGetter{&k})
}
return &k
} | go | func NewKeybaseServiceBase(config Config, kbCtx Context, log logger.Logger) *KeybaseServiceBase {
k := KeybaseServiceBase{
config: config,
context: kbCtx,
log: log,
userCache: make(map[keybase1.UID]idutil.UserInfo),
userCacheUnverifiedKeys: make(map[keybase1.UID][]keybase1.PublicKey),
teamCache: make(map[keybase1.TeamID]idutil.TeamInfo),
}
if config != nil {
k.merkleRoot = NewEventuallyConsistentMerkleRoot(
config, &keybaseServiceMerkleGetter{&k})
}
return &k
} | [
"func",
"NewKeybaseServiceBase",
"(",
"config",
"Config",
",",
"kbCtx",
"Context",
",",
"log",
"logger",
".",
"Logger",
")",
"*",
"KeybaseServiceBase",
"{",
"k",
":=",
"KeybaseServiceBase",
"{",
"config",
":",
"config",
",",
"context",
":",
"kbCtx",
",",
"lo... | // NewKeybaseServiceBase makes a new KeybaseService. | [
"NewKeybaseServiceBase",
"makes",
"a",
"new",
"KeybaseService",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L85-L99 |
159,930 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FillClients | func (k *KeybaseServiceBase) FillClients(
identifyClient keybase1.IdentifyInterface,
userClient keybase1.UserInterface, teamsClient keybase1.TeamsInterface,
merkleClient keybase1.MerkleInterface,
sessionClient keybase1.SessionInterface,
favoriteClient keybase1.FavoriteInterface,
kbfsClient keybase1.KbfsInterface,
kbfsMountClient keybase1.KbfsMountInterface,
gitClient keybase1.GitInterface) {
k.identifyClient = identifyClient
k.userClient = userClient
k.teamsClient = teamsClient
k.merkleClient = merkleClient
k.sessionClient = sessionClient
k.favoriteClient = favoriteClient
k.kbfsClient = kbfsClient
k.kbfsMountClient = kbfsMountClient
k.gitClient = gitClient
} | go | func (k *KeybaseServiceBase) FillClients(
identifyClient keybase1.IdentifyInterface,
userClient keybase1.UserInterface, teamsClient keybase1.TeamsInterface,
merkleClient keybase1.MerkleInterface,
sessionClient keybase1.SessionInterface,
favoriteClient keybase1.FavoriteInterface,
kbfsClient keybase1.KbfsInterface,
kbfsMountClient keybase1.KbfsMountInterface,
gitClient keybase1.GitInterface) {
k.identifyClient = identifyClient
k.userClient = userClient
k.teamsClient = teamsClient
k.merkleClient = merkleClient
k.sessionClient = sessionClient
k.favoriteClient = favoriteClient
k.kbfsClient = kbfsClient
k.kbfsMountClient = kbfsMountClient
k.gitClient = gitClient
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FillClients",
"(",
"identifyClient",
"keybase1",
".",
"IdentifyInterface",
",",
"userClient",
"keybase1",
".",
"UserInterface",
",",
"teamsClient",
"keybase1",
".",
"TeamsInterface",
",",
"merkleClient",
"keybase1",
... | // FillClients sets the client protocol implementations needed for a KeybaseService. | [
"FillClients",
"sets",
"the",
"client",
"protocol",
"implementations",
"needed",
"for",
"a",
"KeybaseService",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L102-L120 |
159,931 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | updateKIDNamesFromParents | func updateKIDNamesFromParents(kidNames map[keybase1.KID]string,
parents map[keybase1.KID]keybase1.KID) {
for kid, parent := range parents {
if _, ok := kidNames[kid]; ok {
continue
}
if parentName, ok := kidNames[parent]; ok {
kidNames[kid] = parentName
}
}
} | go | func updateKIDNamesFromParents(kidNames map[keybase1.KID]string,
parents map[keybase1.KID]keybase1.KID) {
for kid, parent := range parents {
if _, ok := kidNames[kid]; ok {
continue
}
if parentName, ok := kidNames[parent]; ok {
kidNames[kid] = parentName
}
}
} | [
"func",
"updateKIDNamesFromParents",
"(",
"kidNames",
"map",
"[",
"keybase1",
".",
"KID",
"]",
"string",
",",
"parents",
"map",
"[",
"keybase1",
".",
"KID",
"]",
"keybase1",
".",
"KID",
")",
"{",
"for",
"kid",
",",
"parent",
":=",
"range",
"parents",
"{"... | // updateKIDNamesFromParents sets the name of each KID without a name
// that has a a parent with a name, to that parent's name. | [
"updateKIDNamesFromParents",
"sets",
"the",
"name",
"of",
"each",
"KID",
"without",
"a",
"name",
"that",
"has",
"a",
"a",
"parent",
"with",
"a",
"name",
"to",
"that",
"parent",
"s",
"name",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L155-L165 |
159,932 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ClearCaches | func (k *KeybaseServiceBase) ClearCaches(ctx context.Context) {
k.log.CDebugf(ctx, "Clearing KBFS-side user and team caches")
k.setCachedCurrentSession(idutil.SessionInfo{})
func() {
k.userCacheLock.Lock()
defer k.userCacheLock.Unlock()
k.userCache = make(map[keybase1.UID]idutil.UserInfo)
k.userCacheUnverifiedKeys = make(map[keybase1.UID][]keybase1.PublicKey)
}()
k.teamCacheLock.Lock()
defer k.teamCacheLock.Unlock()
k.teamCache = make(map[keybase1.TeamID]idutil.TeamInfo)
} | go | func (k *KeybaseServiceBase) ClearCaches(ctx context.Context) {
k.log.CDebugf(ctx, "Clearing KBFS-side user and team caches")
k.setCachedCurrentSession(idutil.SessionInfo{})
func() {
k.userCacheLock.Lock()
defer k.userCacheLock.Unlock()
k.userCache = make(map[keybase1.UID]idutil.UserInfo)
k.userCacheUnverifiedKeys = make(map[keybase1.UID][]keybase1.PublicKey)
}()
k.teamCacheLock.Lock()
defer k.teamCacheLock.Unlock()
k.teamCache = make(map[keybase1.TeamID]idutil.TeamInfo)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ClearCaches",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n\n",
"k",
".",
"setCachedCurrentSession",
"(",
"idutil",
".",
"Sessi... | // ClearCaches implements the KeybaseService interface for
// KeybaseServiceBase. | [
"ClearCaches",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L321-L334 |
159,933 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | LoggedIn | func (k *KeybaseServiceBase) LoggedIn(ctx context.Context, name string) error {
k.log.CDebugf(ctx, "Current session logged in: %s", name)
// Since we don't have the whole session, just clear the cache and
// repopulate it. The `CurrentSession` call executes the "logged
// in" flow.
k.setCachedCurrentSession(idutil.SessionInfo{})
const sessionID = 0
_, err := k.CurrentSession(ctx, sessionID)
if err != nil {
k.log.CDebugf(ctx, "Getting current session failed when %s is logged "+
"in, so pretending user has logged out: %v",
name, err)
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
}
return nil
} | go | func (k *KeybaseServiceBase) LoggedIn(ctx context.Context, name string) error {
k.log.CDebugf(ctx, "Current session logged in: %s", name)
// Since we don't have the whole session, just clear the cache and
// repopulate it. The `CurrentSession` call executes the "logged
// in" flow.
k.setCachedCurrentSession(idutil.SessionInfo{})
const sessionID = 0
_, err := k.CurrentSession(ctx, sessionID)
if err != nil {
k.log.CDebugf(ctx, "Getting current session failed when %s is logged "+
"in, so pretending user has logged out: %v",
name, err)
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"LoggedIn",
"(",
"ctx",
"context",
".",
"Context",
",",
"name",
"string",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"name",
")",
"\n",
"// Since we don't have... | // LoggedIn implements keybase1.NotifySessionInterface. | [
"LoggedIn",
"implements",
"keybase1",
".",
"NotifySessionInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L337-L356 |
159,934 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | LoggedOut | func (k *KeybaseServiceBase) LoggedOut(ctx context.Context) error {
k.log.CDebugf(ctx, "Current session logged out")
k.setCachedCurrentSession(idutil.SessionInfo{})
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
} | go | func (k *KeybaseServiceBase) LoggedOut(ctx context.Context) error {
k.log.CDebugf(ctx, "Current session logged out")
k.setCachedCurrentSession(idutil.SessionInfo{})
if k.config != nil {
serviceLoggedOut(ctx, k.config)
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"LoggedOut",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
")",
"\n",
"k",
".",
"setCachedCurrentSession",
"(",
"idutil",
".",
... | // LoggedOut implements keybase1.NotifySessionInterface. | [
"LoggedOut",
"implements",
"keybase1",
".",
"NotifySessionInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L359-L366 |
159,935 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | KeyfamilyChanged | func (k *KeybaseServiceBase) KeyfamilyChanged(ctx context.Context,
uid keybase1.UID) error {
k.log.CDebugf(ctx, "Key family for user %s changed", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
k.clearCachedUnverifiedKeys(uid)
if k.getCachedCurrentSession().UID == uid {
mdServer := k.config.MDServer()
if mdServer != nil {
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | go | func (k *KeybaseServiceBase) KeyfamilyChanged(ctx context.Context,
uid keybase1.UID) error {
k.log.CDebugf(ctx, "Key family for user %s changed", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
k.clearCachedUnverifiedKeys(uid)
if k.getCachedCurrentSession().UID == uid {
mdServer := k.config.MDServer()
if mdServer != nil {
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"KeyfamilyChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"uid",
")",
"\n",
... | // KeyfamilyChanged implements keybase1.NotifyKeyfamilyInterface. | [
"KeyfamilyChanged",
"implements",
"keybase1",
".",
"NotifyKeyfamilyInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L369-L385 |
159,936 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ReachabilityChanged | func (k *KeybaseServiceBase) ReachabilityChanged(ctx context.Context,
reachability keybase1.Reachability) error {
k.log.CDebugf(ctx, "CheckReachability invoked: %v", reachability)
if reachability.Reachable == keybase1.Reachable_YES {
k.config.KBFSOps().PushConnectionStatusChange(GregorServiceName, nil)
} else {
k.config.KBFSOps().PushConnectionStatusChange(
GregorServiceName, errDisconnected{})
}
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckReachability(ctx)
}
return nil
} | go | func (k *KeybaseServiceBase) ReachabilityChanged(ctx context.Context,
reachability keybase1.Reachability) error {
k.log.CDebugf(ctx, "CheckReachability invoked: %v", reachability)
if reachability.Reachable == keybase1.Reachable_YES {
k.config.KBFSOps().PushConnectionStatusChange(GregorServiceName, nil)
} else {
k.config.KBFSOps().PushConnectionStatusChange(
GregorServiceName, errDisconnected{})
}
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckReachability(ctx)
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ReachabilityChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"reachability",
"keybase1",
".",
"Reachability",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"r... | // ReachabilityChanged implements keybase1.ReachabiltyInterface. | [
"ReachabilityChanged",
"implements",
"keybase1",
".",
"ReachabiltyInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L388-L402 |
159,937 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | StartReachability | func (k *KeybaseServiceBase) StartReachability(ctx context.Context) (res keybase1.Reachability, err error) {
return k.CheckReachability(ctx)
} | go | func (k *KeybaseServiceBase) StartReachability(ctx context.Context) (res keybase1.Reachability, err error) {
return k.CheckReachability(ctx)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"StartReachability",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"keybase1",
".",
"Reachability",
",",
"err",
"error",
")",
"{",
"return",
"k",
".",
"CheckReachability",
"(",
"ctx",
")",
"\n",
... | // StartReachability implements keybase1.ReachabilityInterface. | [
"StartReachability",
"implements",
"keybase1",
".",
"ReachabilityInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L405-L407 |
159,938 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | CheckReachability | func (k *KeybaseServiceBase) CheckReachability(ctx context.Context) (res keybase1.Reachability, err error) {
res.Reachable = keybase1.Reachable_NO
mdServer := k.config.MDServer()
if mdServer != nil && mdServer.IsConnected() {
res.Reachable = keybase1.Reachable_YES
}
return res, nil
} | go | func (k *KeybaseServiceBase) CheckReachability(ctx context.Context) (res keybase1.Reachability, err error) {
res.Reachable = keybase1.Reachable_NO
mdServer := k.config.MDServer()
if mdServer != nil && mdServer.IsConnected() {
res.Reachable = keybase1.Reachable_YES
}
return res, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"CheckReachability",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"res",
"keybase1",
".",
"Reachability",
",",
"err",
"error",
")",
"{",
"res",
".",
"Reachable",
"=",
"keybase1",
".",
"Reachable_NO",
"\... | // CheckReachability implements keybase1.ReachabilityInterface. | [
"CheckReachability",
"implements",
"keybase1",
".",
"ReachabilityInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L410-L417 |
159,939 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | PaperKeyCached | func (k *KeybaseServiceBase) PaperKeyCached(ctx context.Context,
arg keybase1.PaperKeyCachedArg) error {
k.log.CDebugf(ctx, "Paper key for %s cached", arg.Uid)
if k.getCachedCurrentSession().UID == arg.Uid {
err := k.config.KBFSOps().KickoffAllOutstandingRekeys()
if err != nil {
// Ignore and log errors here. For now the only way it could error
// is when the method is called on a folderBranchOps which is a
// developer mistake and not recoverable from code.
k.log.CDebugf(ctx,
"Calling KickoffAllOutstandingRekeys error: %s", err)
}
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | go | func (k *KeybaseServiceBase) PaperKeyCached(ctx context.Context,
arg keybase1.PaperKeyCachedArg) error {
k.log.CDebugf(ctx, "Paper key for %s cached", arg.Uid)
if k.getCachedCurrentSession().UID == arg.Uid {
err := k.config.KBFSOps().KickoffAllOutstandingRekeys()
if err != nil {
// Ignore and log errors here. For now the only way it could error
// is when the method is called on a folderBranchOps which is a
// developer mistake and not recoverable from code.
k.log.CDebugf(ctx,
"Calling KickoffAllOutstandingRekeys error: %s", err)
}
// Ignore any errors for now, we don't want to block this
// notification and it's not worth spawning a goroutine for.
mdServer := k.config.MDServer()
if mdServer != nil {
mdServer.CheckForRekeys(context.Background())
}
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"PaperKeyCached",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"PaperKeyCachedArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
".... | // PaperKeyCached implements keybase1.NotifyPaperKeyInterface. | [
"PaperKeyCached",
"implements",
"keybase1",
".",
"NotifyPaperKeyInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L420-L442 |
159,940 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ClientOutOfDate | func (k *KeybaseServiceBase) ClientOutOfDate(ctx context.Context,
arg keybase1.ClientOutOfDateArg) error {
k.log.CDebugf(ctx, "Client out of date: %v", arg)
return nil
} | go | func (k *KeybaseServiceBase) ClientOutOfDate(ctx context.Context,
arg keybase1.ClientOutOfDateArg) error {
k.log.CDebugf(ctx, "Client out of date: %v", arg)
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ClientOutOfDate",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"ClientOutOfDateArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
... | // ClientOutOfDate implements keybase1.NotifySessionInterface. | [
"ClientOutOfDate",
"implements",
"keybase1",
".",
"NotifySessionInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L445-L449 |
159,941 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | RootAuditError | func (k *KeybaseServiceBase) RootAuditError(ctx context.Context,
arg keybase1.RootAuditErrorArg) error {
k.log.CDebugf(ctx, "Merkle tree audit error: %v", arg.Message)
return nil
} | go | func (k *KeybaseServiceBase) RootAuditError(ctx context.Context,
arg keybase1.RootAuditErrorArg) error {
k.log.CDebugf(ctx, "Merkle tree audit error: %v", arg.Message)
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"RootAuditError",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"RootAuditErrorArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"arg",
".... | // RootAuditError implements keybase1.NotifyAuditInterface. | [
"RootAuditError",
"implements",
"keybase1",
".",
"NotifyAuditInterface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L452-L456 |
159,942 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ConvertIdentifyError | func ConvertIdentifyError(assertion string, err error) error {
switch err.(type) {
case libkb.NotFoundError:
return idutil.NoSuchUserError{Input: assertion}
case libkb.ResolutionError:
return idutil.NoSuchUserError{Input: assertion}
}
return err
} | go | func ConvertIdentifyError(assertion string, err error) error {
switch err.(type) {
case libkb.NotFoundError:
return idutil.NoSuchUserError{Input: assertion}
case libkb.ResolutionError:
return idutil.NoSuchUserError{Input: assertion}
}
return err
} | [
"func",
"ConvertIdentifyError",
"(",
"assertion",
"string",
",",
"err",
"error",
")",
"error",
"{",
"switch",
"err",
".",
"(",
"type",
")",
"{",
"case",
"libkb",
".",
"NotFoundError",
":",
"return",
"idutil",
".",
"NoSuchUserError",
"{",
"Input",
":",
"ass... | // ConvertIdentifyError converts a errors during identify into KBFS errors | [
"ConvertIdentifyError",
"converts",
"a",
"errors",
"during",
"identify",
"into",
"KBFS",
"errors"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L459-L467 |
159,943 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | Resolve | func (k *KeybaseServiceBase) Resolve(
ctx context.Context, assertion string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
res, err := k.identifyClient.Resolve3(
ctx, keybase1.Resolve3Arg{
Assertion: assertion,
Oa: offline,
})
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
return kbname.NewNormalizedUsername(res.Name), res.Id, nil
} | go | func (k *KeybaseServiceBase) Resolve(
ctx context.Context, assertion string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
res, err := k.identifyClient.Resolve3(
ctx, keybase1.Resolve3Arg{
Assertion: assertion,
Oa: offline,
})
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
return kbname.NewNormalizedUsername(res.Name), res.Id, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"Resolve",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertion",
"string",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"kbname",
".",
"NormalizedUsername",
",",
"keybase1",
".",
"UserOr... | // Resolve implements the KeybaseService interface for KeybaseServiceBase. | [
"Resolve",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L470-L484 |
159,944 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | Identify | func (k *KeybaseServiceBase) Identify(
ctx context.Context, assertion, reason string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
// setting UseDelegateUI to true here will cause daemon to use
// registered identify ui providers instead of terminal if any
// are available. If not, then it will use the terminal UI.
arg := keybase1.IdentifyLiteArg{
Assertion: assertion,
UseDelegateUI: true,
Reason: keybase1.IdentifyReason{Reason: reason},
// No need to go back and forth with the UI until the service
// knows for sure there's a need for a dialogue.
CanSuppressUI: true,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.IdentifyLite(ctx, arg)
// IdentifyLite still returns keybase1.UserPlusKeys data (sans
// keys), even if it gives a NoSigChainError or a UserDeletedError,
// and in KBFS it's fine if the user doesn't have a full sigchain
// (e.g., it's just like the sharing before signup case, except
// the user already has a UID). Both types of users are based
// entirely on server trust anyway.
switch err.(type) {
case nil:
case libkb.NoSigChainError, libkb.UserDeletedError:
k.log.CDebugf(ctx,
"Ignoring error (%s) for user %s with no sigchain; "+
"error type=%T", err, res.Ul.Name, err)
ei.OnError(ctx)
default:
// If the caller is waiting for breaks, let them know we got an error.
ei.OnError(ctx)
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
// This is required for every identify call. The userBreak
// function will take care of checking if res.TrackBreaks is nil
// or not.
name := kbname.NormalizedUsername(res.Ul.Name)
if res.Ul.Id.IsUser() {
asUser, err := res.Ul.Id.AsUser()
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), err
}
ei.UserBreak(ctx, name, asUser, res.TrackBreaks)
} else if !res.Ul.Id.IsNil() {
ei.TeamBreak(ctx, res.Ul.Id.AsTeamOrBust(), res.TrackBreaks)
}
return name, res.Ul.Id, nil
} | go | func (k *KeybaseServiceBase) Identify(
ctx context.Context, assertion, reason string,
offline keybase1.OfflineAvailability) (
kbname.NormalizedUsername, keybase1.UserOrTeamID, error) {
// setting UseDelegateUI to true here will cause daemon to use
// registered identify ui providers instead of terminal if any
// are available. If not, then it will use the terminal UI.
arg := keybase1.IdentifyLiteArg{
Assertion: assertion,
UseDelegateUI: true,
Reason: keybase1.IdentifyReason{Reason: reason},
// No need to go back and forth with the UI until the service
// knows for sure there's a need for a dialogue.
CanSuppressUI: true,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.IdentifyLite(ctx, arg)
// IdentifyLite still returns keybase1.UserPlusKeys data (sans
// keys), even if it gives a NoSigChainError or a UserDeletedError,
// and in KBFS it's fine if the user doesn't have a full sigchain
// (e.g., it's just like the sharing before signup case, except
// the user already has a UID). Both types of users are based
// entirely on server trust anyway.
switch err.(type) {
case nil:
case libkb.NoSigChainError, libkb.UserDeletedError:
k.log.CDebugf(ctx,
"Ignoring error (%s) for user %s with no sigchain; "+
"error type=%T", err, res.Ul.Name, err)
ei.OnError(ctx)
default:
// If the caller is waiting for breaks, let them know we got an error.
ei.OnError(ctx)
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""),
ConvertIdentifyError(assertion, err)
}
// This is required for every identify call. The userBreak
// function will take care of checking if res.TrackBreaks is nil
// or not.
name := kbname.NormalizedUsername(res.Ul.Name)
if res.Ul.Id.IsUser() {
asUser, err := res.Ul.Id.AsUser()
if err != nil {
return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), err
}
ei.UserBreak(ctx, name, asUser, res.TrackBreaks)
} else if !res.Ul.Id.IsNil() {
ei.TeamBreak(ctx, res.Ul.Id.AsTeamOrBust(), res.TrackBreaks)
}
return name, res.Ul.Id, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"Identify",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertion",
",",
"reason",
"string",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"kbname",
".",
"NormalizedUsername",
",",
"keybase... | // Identify implements the KeybaseService interface for KeybaseServiceBase. | [
"Identify",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L487-L543 |
159,945 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NormalizeSocialAssertion | func (k *KeybaseServiceBase) NormalizeSocialAssertion(
ctx context.Context, assertion string) (keybase1.SocialAssertion, error) {
return k.identifyClient.NormalizeSocialAssertion(ctx, assertion)
} | go | func (k *KeybaseServiceBase) NormalizeSocialAssertion(
ctx context.Context, assertion string) (keybase1.SocialAssertion, error) {
return k.identifyClient.NormalizeSocialAssertion(ctx, assertion)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NormalizeSocialAssertion",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertion",
"string",
")",
"(",
"keybase1",
".",
"SocialAssertion",
",",
"error",
")",
"{",
"return",
"k",
".",
"identifyClient",
".",
... | // NormalizeSocialAssertion implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NormalizeSocialAssertion",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L547-L550 |
159,946 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ResolveIdentifyImplicitTeam | func (k *KeybaseServiceBase) ResolveIdentifyImplicitTeam(
ctx context.Context, assertions, suffix string, tlfType tlf.Type,
doIdentifies bool, reason string,
offline keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) {
if tlfType != tlf.Private && tlfType != tlf.Public {
return idutil.ImplicitTeamInfo{}, fmt.Errorf(
"Invalid implicit team TLF type: %s", tlfType)
}
arg := keybase1.ResolveIdentifyImplicitTeamArg{
Assertions: assertions,
Suffix: suffix,
DoIdentifies: doIdentifies,
Reason: keybase1.IdentifyReason{Reason: reason},
Create: true,
IsPublic: tlfType == tlf.Public,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.ResolveIdentifyImplicitTeam(ctx, arg)
if err != nil {
return idutil.ImplicitTeamInfo{}, ConvertIdentifyError(assertions, err)
}
name := kbname.NormalizedUsername(res.DisplayName)
// Exactly one break callback is required for every identify call.
if doIdentifies {
if len(res.TrackBreaks) > 0 {
// Iterate the map to get one entry, then break.
for userVer, breaks := range res.TrackBreaks {
// TODO: resolve the UID into a username so we don't have to
// pass in the full display name here?
ei.UserBreak(ctx, name, userVer.Uid, &breaks)
break
}
} else {
ei.TeamBreak(ctx, keybase1.TeamID(""), nil)
}
}
iteamInfo := idutil.ImplicitTeamInfo{
Name: name,
TID: res.TeamID,
}
if res.FolderID != "" {
iteamInfo.TlfID, err = tlf.ParseID(res.FolderID.String())
if err != nil {
return idutil.ImplicitTeamInfo{}, err
}
}
return iteamInfo, nil
} | go | func (k *KeybaseServiceBase) ResolveIdentifyImplicitTeam(
ctx context.Context, assertions, suffix string, tlfType tlf.Type,
doIdentifies bool, reason string,
offline keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) {
if tlfType != tlf.Private && tlfType != tlf.Public {
return idutil.ImplicitTeamInfo{}, fmt.Errorf(
"Invalid implicit team TLF type: %s", tlfType)
}
arg := keybase1.ResolveIdentifyImplicitTeamArg{
Assertions: assertions,
Suffix: suffix,
DoIdentifies: doIdentifies,
Reason: keybase1.IdentifyReason{Reason: reason},
Create: true,
IsPublic: tlfType == tlf.Public,
Oa: offline,
}
ei := tlfhandle.GetExtendedIdentify(ctx)
arg.IdentifyBehavior = ei.Behavior
res, err := k.identifyClient.ResolveIdentifyImplicitTeam(ctx, arg)
if err != nil {
return idutil.ImplicitTeamInfo{}, ConvertIdentifyError(assertions, err)
}
name := kbname.NormalizedUsername(res.DisplayName)
// Exactly one break callback is required for every identify call.
if doIdentifies {
if len(res.TrackBreaks) > 0 {
// Iterate the map to get one entry, then break.
for userVer, breaks := range res.TrackBreaks {
// TODO: resolve the UID into a username so we don't have to
// pass in the full display name here?
ei.UserBreak(ctx, name, userVer.Uid, &breaks)
break
}
} else {
ei.TeamBreak(ctx, keybase1.TeamID(""), nil)
}
}
iteamInfo := idutil.ImplicitTeamInfo{
Name: name,
TID: res.TeamID,
}
if res.FolderID != "" {
iteamInfo.TlfID, err = tlf.ParseID(res.FolderID.String())
if err != nil {
return idutil.ImplicitTeamInfo{}, err
}
}
return iteamInfo, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ResolveIdentifyImplicitTeam",
"(",
"ctx",
"context",
".",
"Context",
",",
"assertions",
",",
"suffix",
"string",
",",
"tlfType",
"tlf",
".",
"Type",
",",
"doIdentifies",
"bool",
",",
"reason",
"string",
",",
... | // ResolveIdentifyImplicitTeam implements the KeybaseService interface
// for KeybaseServiceBase. | [
"ResolveIdentifyImplicitTeam",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L554-L609 |
159,947 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | ResolveImplicitTeamByID | func (k *KeybaseServiceBase) ResolveImplicitTeamByID(
ctx context.Context, teamID keybase1.TeamID) (name string, err error) {
arg := keybase1.ResolveImplicitTeamArg{
Id: teamID,
}
res, err := k.identifyClient.ResolveImplicitTeam(ctx, arg)
if err != nil {
return "", err
}
return res.Name, nil
} | go | func (k *KeybaseServiceBase) ResolveImplicitTeamByID(
ctx context.Context, teamID keybase1.TeamID) (name string, err error) {
arg := keybase1.ResolveImplicitTeamArg{
Id: teamID,
}
res, err := k.identifyClient.ResolveImplicitTeam(ctx, arg)
if err != nil {
return "", err
}
return res.Name, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"ResolveImplicitTeamByID",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"(",
"name",
"string",
",",
"err",
"error",
")",
"{",
"arg",
":=",
"keybase1",
".",
"ResolveI... | // ResolveImplicitTeamByID implements the KeybaseService interface for
// KeybaseServiceBase. | [
"ResolveImplicitTeamByID",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L613-L624 |
159,948 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | LoadUserPlusKeys | func (k *KeybaseServiceBase) LoadUserPlusKeys(
ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID,
offline keybase1.OfflineAvailability) (idutil.UserInfo, error) {
cachedUserInfo := k.getCachedUserInfo(uid)
if cachedUserInfo.Name != kbname.NormalizedUsername("") {
if pollForKID == keybase1.KID("") {
return cachedUserInfo, nil
}
// Skip the cache if pollForKID isn't present in
// `VerifyingKeys` or one of the revoked verifying keys.
for _, key := range cachedUserInfo.VerifyingKeys {
if key.KID().Equal(pollForKID) {
return cachedUserInfo, nil
}
}
// Check if the key is revoked, and fill in the merkle info in
// that case.
cachedUserInfo, exists, err := k.checkForRevokedVerifyingKey(
ctx, cachedUserInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
if exists {
return cachedUserInfo, nil
}
}
arg := keybase1.LoadUserPlusKeysV2Arg{
Uid: uid,
PollForKID: pollForKID,
Oa: offline,
}
res, err := k.userClient.LoadUserPlusKeysV2(ctx, arg)
if err != nil {
return idutil.UserInfo{}, err
}
userInfo, err := k.processUserPlusKeys(ctx, res)
if err != nil {
return idutil.UserInfo{}, err
}
if pollForKID != keybase1.KID("") {
// Fill in merkle info if we were explicitly trying to load a
// revoked key.
userInfo, _, err = k.checkForRevokedVerifyingKey(
ctx, userInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
}
return userInfo, nil
} | go | func (k *KeybaseServiceBase) LoadUserPlusKeys(
ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID,
offline keybase1.OfflineAvailability) (idutil.UserInfo, error) {
cachedUserInfo := k.getCachedUserInfo(uid)
if cachedUserInfo.Name != kbname.NormalizedUsername("") {
if pollForKID == keybase1.KID("") {
return cachedUserInfo, nil
}
// Skip the cache if pollForKID isn't present in
// `VerifyingKeys` or one of the revoked verifying keys.
for _, key := range cachedUserInfo.VerifyingKeys {
if key.KID().Equal(pollForKID) {
return cachedUserInfo, nil
}
}
// Check if the key is revoked, and fill in the merkle info in
// that case.
cachedUserInfo, exists, err := k.checkForRevokedVerifyingKey(
ctx, cachedUserInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
if exists {
return cachedUserInfo, nil
}
}
arg := keybase1.LoadUserPlusKeysV2Arg{
Uid: uid,
PollForKID: pollForKID,
Oa: offline,
}
res, err := k.userClient.LoadUserPlusKeysV2(ctx, arg)
if err != nil {
return idutil.UserInfo{}, err
}
userInfo, err := k.processUserPlusKeys(ctx, res)
if err != nil {
return idutil.UserInfo{}, err
}
if pollForKID != keybase1.KID("") {
// Fill in merkle info if we were explicitly trying to load a
// revoked key.
userInfo, _, err = k.checkForRevokedVerifyingKey(
ctx, userInfo, pollForKID)
if err != nil {
return idutil.UserInfo{}, err
}
}
return userInfo, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"LoadUserPlusKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
",",
"pollForKID",
"keybase1",
".",
"KID",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"idu... | // LoadUserPlusKeys implements the KeybaseService interface for
// KeybaseServiceBase. | [
"LoadUserPlusKeys",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L691-L744 |
159,949 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | CreateTeamTLF | func (k *KeybaseServiceBase) CreateTeamTLF(
ctx context.Context, teamID keybase1.TeamID, tlfID tlf.ID) (err error) {
return k.kbfsClient.CreateTLF(ctx, keybase1.CreateTLFArg{
TeamID: teamID,
TlfID: keybase1.TLFID(tlfID.String()),
})
} | go | func (k *KeybaseServiceBase) CreateTeamTLF(
ctx context.Context, teamID keybase1.TeamID, tlfID tlf.ID) (err error) {
return k.kbfsClient.CreateTLF(ctx, keybase1.CreateTLFArg{
TeamID: teamID,
TlfID: keybase1.TLFID(tlfID.String()),
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"CreateTeamTLF",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"(",
"err",
"error",
")",
"{",
"return",
"k",
".",
"kbfsClient",
".... | // CreateTeamTLF implements the KeybaseService interface for
// KeybaseServiceBase. | [
"CreateTeamTLF",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L920-L926 |
159,950 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetTeamSettings | func (k *KeybaseServiceBase) GetTeamSettings(
ctx context.Context, teamID keybase1.TeamID,
offline keybase1.OfflineAvailability) (
keybase1.KBFSTeamSettings, error) {
// TODO: get invalidations from the server and cache the settings?
return k.kbfsClient.GetKBFSTeamSettings(
ctx, keybase1.GetKBFSTeamSettingsArg{
TeamID: teamID,
Oa: offline,
})
} | go | func (k *KeybaseServiceBase) GetTeamSettings(
ctx context.Context, teamID keybase1.TeamID,
offline keybase1.OfflineAvailability) (
keybase1.KBFSTeamSettings, error) {
// TODO: get invalidations from the server and cache the settings?
return k.kbfsClient.GetKBFSTeamSettings(
ctx, keybase1.GetKBFSTeamSettingsArg{
TeamID: teamID,
Oa: offline,
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetTeamSettings",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
",",
"offline",
"keybase1",
".",
"OfflineAvailability",
")",
"(",
"keybase1",
".",
"KBFSTeamSettings",
",",
"e... | // GetTeamSettings implements the KeybaseService interface for
// KeybaseServiceBase. | [
"GetTeamSettings",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L930-L940 |
159,951 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetCurrentMerkleRoot | func (k *KeybaseServiceBase) GetCurrentMerkleRoot(ctx context.Context) (
keybase1.MerkleRootV2, time.Time, error) {
// Refresh the cached value in the background if the cached value
// is older than 30s; if our cached value is more than 60s old,
// block.
_, root, rootTime, err := k.merkleRoot.Get(
ctx, 30*time.Second, 60*time.Second)
return root, rootTime, err
} | go | func (k *KeybaseServiceBase) GetCurrentMerkleRoot(ctx context.Context) (
keybase1.MerkleRootV2, time.Time, error) {
// Refresh the cached value in the background if the cached value
// is older than 30s; if our cached value is more than 60s old,
// block.
_, root, rootTime, err := k.merkleRoot.Get(
ctx, 30*time.Second, 60*time.Second)
return root, rootTime, err
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetCurrentMerkleRoot",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"keybase1",
".",
"MerkleRootV2",
",",
"time",
".",
"Time",
",",
"error",
")",
"{",
"// Refresh the cached value in the background if the cached... | // GetCurrentMerkleRoot implements the KeybaseService interface for
// KeybaseServiceBase. | [
"GetCurrentMerkleRoot",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L955-L963 |
159,952 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | VerifyMerkleRoot | func (k *KeybaseServiceBase) VerifyMerkleRoot(
ctx context.Context, root keybase1.MerkleRootV2,
kbfsRoot keybase1.KBFSRoot) error {
return k.merkleClient.VerifyMerkleRootAndKBFS(ctx,
keybase1.VerifyMerkleRootAndKBFSArg{
Root: root,
ExpectedKBFSRoot: kbfsRoot,
})
} | go | func (k *KeybaseServiceBase) VerifyMerkleRoot(
ctx context.Context, root keybase1.MerkleRootV2,
kbfsRoot keybase1.KBFSRoot) error {
return k.merkleClient.VerifyMerkleRootAndKBFS(ctx,
keybase1.VerifyMerkleRootAndKBFSArg{
Root: root,
ExpectedKBFSRoot: kbfsRoot,
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"VerifyMerkleRoot",
"(",
"ctx",
"context",
".",
"Context",
",",
"root",
"keybase1",
".",
"MerkleRootV2",
",",
"kbfsRoot",
"keybase1",
".",
"KBFSRoot",
")",
"error",
"{",
"return",
"k",
".",
"merkleClient",
".... | // VerifyMerkleRoot implements the KBPKI interface for KeybaseServiceBase. | [
"VerifyMerkleRoot",
"implements",
"the",
"KBPKI",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L966-L974 |
159,953 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | CurrentSession | func (k *KeybaseServiceBase) CurrentSession(
ctx context.Context, sessionID int) (
idutil.SessionInfo, error) {
ctx = CtxWithRandomIDReplayable(
ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log)
s, newSession, err := k.getCurrentSession(ctx, sessionID)
if err != nil {
return idutil.SessionInfo{}, err
}
if newSession && k.config != nil {
// Don't hold the lock while calling `serviceLoggedIn`.
_ = serviceLoggedIn(ctx, k.config, s, TLFJournalBackgroundWorkEnabled)
}
return s, nil
} | go | func (k *KeybaseServiceBase) CurrentSession(
ctx context.Context, sessionID int) (
idutil.SessionInfo, error) {
ctx = CtxWithRandomIDReplayable(
ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log)
s, newSession, err := k.getCurrentSession(ctx, sessionID)
if err != nil {
return idutil.SessionInfo{}, err
}
if newSession && k.config != nil {
// Don't hold the lock while calling `serviceLoggedIn`.
_ = serviceLoggedIn(ctx, k.config, s, TLFJournalBackgroundWorkEnabled)
}
return s, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"CurrentSession",
"(",
"ctx",
"context",
".",
"Context",
",",
"sessionID",
"int",
")",
"(",
"idutil",
".",
"SessionInfo",
",",
"error",
")",
"{",
"ctx",
"=",
"CtxWithRandomIDReplayable",
"(",
"ctx",
",",
"C... | // CurrentSession implements the KeybaseService interface for KeybaseServiceBase. | [
"CurrentSession",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1112-L1129 |
159,954 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FavoriteAdd | func (k *KeybaseServiceBase) FavoriteAdd(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteAdd(ctx, keybase1.FavoriteAddArg{Folder: folder})
} | go | func (k *KeybaseServiceBase) FavoriteAdd(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteAdd(ctx, keybase1.FavoriteAddArg{Folder: folder})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FavoriteAdd",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"error",
"{",
"return",
"k",
".",
"favoriteClient",
".",
"FavoriteAdd",
"(",
"ctx",
",",
"keybase1",
".",... | // FavoriteAdd implements the KeybaseService interface for KeybaseServiceBase. | [
"FavoriteAdd",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1132-L1134 |
159,955 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FavoriteDelete | func (k *KeybaseServiceBase) FavoriteDelete(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteIgnore(ctx,
keybase1.FavoriteIgnoreArg{Folder: folder})
} | go | func (k *KeybaseServiceBase) FavoriteDelete(ctx context.Context, folder keybase1.Folder) error {
return k.favoriteClient.FavoriteIgnore(ctx,
keybase1.FavoriteIgnoreArg{Folder: folder})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FavoriteDelete",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"error",
"{",
"return",
"k",
".",
"favoriteClient",
".",
"FavoriteIgnore",
"(",
"ctx",
",",
"keybase1",
... | // FavoriteDelete implements the KeybaseService interface for KeybaseServiceBase. | [
"FavoriteDelete",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1137-L1140 |
159,956 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FavoriteList | func (k *KeybaseServiceBase) FavoriteList(ctx context.Context,
sessionID int) (keybase1.FavoritesResult, error) {
return k.favoriteClient.GetFavorites(ctx, sessionID)
} | go | func (k *KeybaseServiceBase) FavoriteList(ctx context.Context,
sessionID int) (keybase1.FavoritesResult, error) {
return k.favoriteClient.GetFavorites(ctx, sessionID)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FavoriteList",
"(",
"ctx",
"context",
".",
"Context",
",",
"sessionID",
"int",
")",
"(",
"keybase1",
".",
"FavoritesResult",
",",
"error",
")",
"{",
"return",
"k",
".",
"favoriteClient",
".",
"GetFavorites",... | // FavoriteList implements the KeybaseService interface for KeybaseServiceBase. | [
"FavoriteList",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1143-L1146 |
159,957 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifyOnlineStatusChanged | func (k *KeybaseServiceBase) NotifyOnlineStatusChanged(ctx context.Context,
online bool) error {
k.log.CDebugf(ctx, "Sending notification for onlineStatus: online=%v", online)
return k.kbfsClient.FSOnlineStatusChangedEvent(ctx, online)
} | go | func (k *KeybaseServiceBase) NotifyOnlineStatusChanged(ctx context.Context,
online bool) error {
k.log.CDebugf(ctx, "Sending notification for onlineStatus: online=%v", online)
return k.kbfsClient.FSOnlineStatusChangedEvent(ctx, online)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifyOnlineStatusChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"online",
"bool",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"online",
")",
"\n",
"ret... | // NotifyOnlineStatusChanged implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifyOnlineStatusChanged",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1160-L1164 |
159,958 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | Notify | func (k *KeybaseServiceBase) Notify(ctx context.Context, notification *keybase1.FSNotification) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if notification.Filename != k.lastNotificationFilename {
k.lastNotificationFilename = notification.Filename
k.log.CDebugf(ctx, "Sending notification for %s", notification.Filename)
}
}()
return k.kbfsClient.FSEvent(ctx, *notification)
} | go | func (k *KeybaseServiceBase) Notify(ctx context.Context, notification *keybase1.FSNotification) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if notification.Filename != k.lastNotificationFilename {
k.lastNotificationFilename = notification.Filename
k.log.CDebugf(ctx, "Sending notification for %s", notification.Filename)
}
}()
return k.kbfsClient.FSEvent(ctx, *notification)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"Notify",
"(",
"ctx",
"context",
".",
"Context",
",",
"notification",
"*",
"keybase1",
".",
"FSNotification",
")",
"error",
"{",
"// Reduce log spam by not repeating log lines for",
"// notifications with the same filename... | // Notify implements the KeybaseService interface for KeybaseServiceBase. | [
"Notify",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1167-L1181 |
159,959 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifyPathUpdated | func (k *KeybaseServiceBase) NotifyPathUpdated(
ctx context.Context, path string) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if path != k.lastPathUpdated {
k.lastPathUpdated = path
k.log.CDebugf(ctx, "Sending path updated notification for %s", path)
}
}()
return k.kbfsClient.FSPathUpdate(ctx, path)
} | go | func (k *KeybaseServiceBase) NotifyPathUpdated(
ctx context.Context, path string) error {
// Reduce log spam by not repeating log lines for
// notifications with the same filename.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if path != k.lastPathUpdated {
k.lastPathUpdated = path
k.log.CDebugf(ctx, "Sending path updated notification for %s", path)
}
}()
return k.kbfsClient.FSPathUpdate(ctx, path)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifyPathUpdated",
"(",
"ctx",
"context",
".",
"Context",
",",
"path",
"string",
")",
"error",
"{",
"// Reduce log spam by not repeating log lines for",
"// notifications with the same filename.",
"//",
"// TODO: Only do t... | // NotifyPathUpdated implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifyPathUpdated",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1185-L1200 |
159,960 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifySyncStatus | func (k *KeybaseServiceBase) NotifySyncStatus(ctx context.Context,
status *keybase1.FSPathSyncStatus) error {
// Reduce log spam by not repeating log lines for
// notifications with the same pathname.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if status.Path != k.lastSyncNotificationPath {
k.lastSyncNotificationPath = status.Path
k.log.CDebugf(ctx, "Sending notification for %s", status.Path)
}
}()
return k.kbfsClient.FSSyncEvent(ctx, *status)
} | go | func (k *KeybaseServiceBase) NotifySyncStatus(ctx context.Context,
status *keybase1.FSPathSyncStatus) error {
// Reduce log spam by not repeating log lines for
// notifications with the same pathname.
//
// TODO: Only do this in debug mode.
func() {
k.lastNotificationFilenameLock.Lock()
defer k.lastNotificationFilenameLock.Unlock()
if status.Path != k.lastSyncNotificationPath {
k.lastSyncNotificationPath = status.Path
k.log.CDebugf(ctx, "Sending notification for %s", status.Path)
}
}()
return k.kbfsClient.FSSyncEvent(ctx, *status)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifySyncStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"status",
"*",
"keybase1",
".",
"FSPathSyncStatus",
")",
"error",
"{",
"// Reduce log spam by not repeating log lines for",
"// notifications with the same pa... | // NotifySyncStatus implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifySyncStatus",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1204-L1219 |
159,961 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | NotifyOverallSyncStatus | func (k *KeybaseServiceBase) NotifyOverallSyncStatus(
ctx context.Context, status keybase1.FolderSyncStatus) error {
return k.kbfsClient.FSOverallSyncEvent(ctx, status)
} | go | func (k *KeybaseServiceBase) NotifyOverallSyncStatus(
ctx context.Context, status keybase1.FolderSyncStatus) error {
return k.kbfsClient.FSOverallSyncEvent(ctx, status)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"NotifyOverallSyncStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"status",
"keybase1",
".",
"FolderSyncStatus",
")",
"error",
"{",
"return",
"k",
".",
"kbfsClient",
".",
"FSOverallSyncEvent",
"(",
"ctx",
... | // NotifyOverallSyncStatus implements the KeybaseService interface for
// KeybaseServiceBase. | [
"NotifyOverallSyncStatus",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1223-L1226 |
159,962 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FlushUserFromLocalCache | func (k *KeybaseServiceBase) FlushUserFromLocalCache(ctx context.Context,
uid keybase1.UID) {
k.log.CDebugf(ctx, "Flushing cache for user %s", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
} | go | func (k *KeybaseServiceBase) FlushUserFromLocalCache(ctx context.Context,
uid keybase1.UID) {
k.log.CDebugf(ctx, "Flushing cache for user %s", uid)
k.setCachedUserInfo(uid, idutil.UserInfo{})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FlushUserFromLocalCache",
"(",
"ctx",
"context",
".",
"Context",
",",
"uid",
"keybase1",
".",
"UID",
")",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"uid",
")",
"\n",
"k"... | // FlushUserFromLocalCache implements the KeybaseService interface for
// KeybaseServiceBase. | [
"FlushUserFromLocalCache",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1230-L1234 |
159,963 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FSEditListRequest | func (k *KeybaseServiceBase) FSEditListRequest(ctx context.Context,
req keybase1.FSEditListRequest) (err error) {
ctx = CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID,
k.log)
k.log.CDebugf(ctx, "Edit list request for %s (public: %t)",
req.Folder.Name, !req.Folder.Private)
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, req.Folder.Name,
!req.Folder.Private)
if err != nil {
return err
}
rootNode, _, err := k.config.KBFSOps().
GetOrCreateRootNode(ctx, tlfHandle, data.MasterBranch)
if err != nil {
return err
}
history, err := k.config.KBFSOps().GetEditHistory(ctx,
rootNode.GetFolderBranch())
if err != nil {
return err
}
// TODO(KBFS-2996) Convert the edits to an RPC response.
resp := keybase1.FSEditListArg{
RequestID: req.RequestID,
Edits: history,
}
k.log.CDebugf(ctx, "Sending edit history response with %d writer clusters",
len(resp.Edits.History))
return k.kbfsClient.FSEditList(ctx, resp)
} | go | func (k *KeybaseServiceBase) FSEditListRequest(ctx context.Context,
req keybase1.FSEditListRequest) (err error) {
ctx = CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID,
k.log)
k.log.CDebugf(ctx, "Edit list request for %s (public: %t)",
req.Folder.Name, !req.Folder.Private)
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, req.Folder.Name,
!req.Folder.Private)
if err != nil {
return err
}
rootNode, _, err := k.config.KBFSOps().
GetOrCreateRootNode(ctx, tlfHandle, data.MasterBranch)
if err != nil {
return err
}
history, err := k.config.KBFSOps().GetEditHistory(ctx,
rootNode.GetFolderBranch())
if err != nil {
return err
}
// TODO(KBFS-2996) Convert the edits to an RPC response.
resp := keybase1.FSEditListArg{
RequestID: req.RequestID,
Edits: history,
}
k.log.CDebugf(ctx, "Sending edit history response with %d writer clusters",
len(resp.Edits.History))
return k.kbfsClient.FSEditList(ctx, resp)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FSEditListRequest",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"keybase1",
".",
"FSEditListRequest",
")",
"(",
"err",
"error",
")",
"{",
"ctx",
"=",
"CtxWithRandomIDReplayable",
"(",
"ctx",
",",
"Ctx... | // FSEditListRequest implements keybase1.NotifyFSRequestInterface for
// KeybaseServiceBase. | [
"FSEditListRequest",
"implements",
"keybase1",
".",
"NotifyFSRequestInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1252-L1285 |
159,964 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FSSyncStatusRequest | func (k *KeybaseServiceBase) FSSyncStatusRequest(ctx context.Context,
req keybase1.FSSyncStatusRequest) (err error) {
k.log.CDebugf(ctx, "Got sync status request: %v", req)
resp := keybase1.FSSyncStatusArg{RequestID: req.RequestID}
// For now, just return the number of syncing bytes.
jManager, err := GetJournalManager(k.config)
if err == nil {
status, _ := jManager.Status(ctx)
resp.Status.TotalSyncingBytes = status.UnflushedBytes
k.log.CDebugf(ctx, "Sending sync status response with %d syncing bytes",
status.UnflushedBytes)
} else {
k.log.CDebugf(ctx, "No journal server, sending empty response")
}
return k.kbfsClient.FSSyncStatus(ctx, resp)
} | go | func (k *KeybaseServiceBase) FSSyncStatusRequest(ctx context.Context,
req keybase1.FSSyncStatusRequest) (err error) {
k.log.CDebugf(ctx, "Got sync status request: %v", req)
resp := keybase1.FSSyncStatusArg{RequestID: req.RequestID}
// For now, just return the number of syncing bytes.
jManager, err := GetJournalManager(k.config)
if err == nil {
status, _ := jManager.Status(ctx)
resp.Status.TotalSyncingBytes = status.UnflushedBytes
k.log.CDebugf(ctx, "Sending sync status response with %d syncing bytes",
status.UnflushedBytes)
} else {
k.log.CDebugf(ctx, "No journal server, sending empty response")
}
return k.kbfsClient.FSSyncStatus(ctx, resp)
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FSSyncStatusRequest",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"keybase1",
".",
"FSSyncStatusRequest",
")",
"(",
"err",
"error",
")",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\""... | // FSSyncStatusRequest implements keybase1.NotifyFSRequestInterface for
// KeybaseServiceBase. | [
"FSSyncStatusRequest",
"implements",
"keybase1",
".",
"NotifyFSRequestInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1289-L1307 |
159,965 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamChangedByID | func (k *KeybaseServiceBase) TeamChangedByID(ctx context.Context,
arg keybase1.TeamChangedByIDArg) error {
k.log.CDebugf(ctx, "Flushing cache for team %s "+
"(membershipChange=%t, keyRotated=%t, renamed=%t)",
arg.TeamID, arg.Changes.MembershipChanged,
arg.Changes.KeyRotated, arg.Changes.Renamed)
k.setCachedTeamInfo(arg.TeamID, idutil.TeamInfo{})
if arg.Changes.Renamed {
k.config.KBFSOps().TeamNameChanged(ctx, arg.TeamID)
}
return nil
} | go | func (k *KeybaseServiceBase) TeamChangedByID(ctx context.Context,
arg keybase1.TeamChangedByIDArg) error {
k.log.CDebugf(ctx, "Flushing cache for team %s "+
"(membershipChange=%t, keyRotated=%t, renamed=%t)",
arg.TeamID, arg.Changes.MembershipChanged,
arg.Changes.KeyRotated, arg.Changes.Renamed)
k.setCachedTeamInfo(arg.TeamID, idutil.TeamInfo{})
if arg.Changes.Renamed {
k.config.KBFSOps().TeamNameChanged(ctx, arg.TeamID)
}
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"TeamChangedByID",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"TeamChangedByIDArg",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
"+",
"\"",
"... | // TeamChangedByID implements keybase1.NotifyTeamInterface for
// KeybaseServiceBase. | [
"TeamChangedByID",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1311-L1323 |
159,966 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamChangedByName | func (k *KeybaseServiceBase) TeamChangedByName(ctx context.Context,
arg keybase1.TeamChangedByNameArg) error {
// ignore
return nil
} | go | func (k *KeybaseServiceBase) TeamChangedByName(ctx context.Context,
arg keybase1.TeamChangedByNameArg) error {
// ignore
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"TeamChangedByName",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"TeamChangedByNameArg",
")",
"error",
"{",
"// ignore",
"return",
"nil",
"\n",
"}"
] | // TeamChangedByName implements keybase1.NotifyTeamInterface for
// KeybaseServiceBase. | [
"TeamChangedByName",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1327-L1331 |
159,967 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamDeleted | func (k *KeybaseServiceBase) TeamDeleted(ctx context.Context,
teamID keybase1.TeamID) error {
return nil
} | go | func (k *KeybaseServiceBase) TeamDeleted(ctx context.Context,
teamID keybase1.TeamID) error {
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"TeamDeleted",
"(",
"ctx",
"context",
".",
"Context",
",",
"teamID",
"keybase1",
".",
"TeamID",
")",
"error",
"{",
"return",
"nil",
"\n",
"}"
] | // TeamDeleted implements keybase1.NotifyTeamInterface for
// KeybaseServiceBase. | [
"TeamDeleted",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1335-L1338 |
159,968 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | TeamAbandoned | func (k *KeybaseDaemonRPC) TeamAbandoned(
ctx context.Context, tid keybase1.TeamID) error {
k.log.CDebugf(ctx, "Implicit team %s abandoned", tid)
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
k.config.KBFSOps().TeamAbandoned(ctx, tid)
return nil
} | go | func (k *KeybaseDaemonRPC) TeamAbandoned(
ctx context.Context, tid keybase1.TeamID) error {
k.log.CDebugf(ctx, "Implicit team %s abandoned", tid)
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
k.config.KBFSOps().TeamAbandoned(ctx, tid)
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseDaemonRPC",
")",
"TeamAbandoned",
"(",
"ctx",
"context",
".",
"Context",
",",
"tid",
"keybase1",
".",
"TeamID",
")",
"error",
"{",
"k",
".",
"log",
".",
"CDebugf",
"(",
"ctx",
",",
"\"",
"\"",
",",
"tid",
")",
"\n",
"... | // TeamAbandoned implements keybase1.NotifyTeamInterface for KeybaseServiceBase. | [
"TeamAbandoned",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1352-L1358 |
159,969 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | AvatarUpdated | func (k *KeybaseDaemonRPC) AvatarUpdated(ctx context.Context,
arg keybase1.AvatarUpdatedArg) error {
return nil
} | go | func (k *KeybaseDaemonRPC) AvatarUpdated(ctx context.Context,
arg keybase1.AvatarUpdatedArg) error {
return nil
} | [
"func",
"(",
"k",
"*",
"KeybaseDaemonRPC",
")",
"AvatarUpdated",
"(",
"ctx",
"context",
".",
"Context",
",",
"arg",
"keybase1",
".",
"AvatarUpdatedArg",
")",
"error",
"{",
"return",
"nil",
"\n",
"}"
] | // AvatarUpdated implements keybase1.NotifyTeamInterface for KeybaseServiceBase. | [
"AvatarUpdated",
"implements",
"keybase1",
".",
"NotifyTeamInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1361-L1364 |
159,970 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | StartMigration | func (k *KeybaseServiceBase) StartMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
mdServer := k.config.MDServer()
if mdServer == nil {
return errors.New("no mdserver")
}
// Making a favorite here to reuse the code that converts from
// `keybase1.FolderType` into `tlf.Type`.
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
return k.config.MDServer().StartImplicitTeamMigration(ctx, handle.TlfID())
} | go | func (k *KeybaseServiceBase) StartMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
mdServer := k.config.MDServer()
if mdServer == nil {
return errors.New("no mdserver")
}
// Making a favorite here to reuse the code that converts from
// `keybase1.FolderType` into `tlf.Type`.
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
return k.config.MDServer().StartImplicitTeamMigration(ctx, handle.TlfID())
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"StartMigration",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"(",
"err",
"error",
")",
"{",
"mdServer",
":=",
"k",
".",
"config",
".",
"MDServer",
"(",
")",
"\... | // StartMigration implements keybase1.ImplicitTeamMigrationInterface for
// KeybaseServiceBase. | [
"StartMigration",
"implements",
"keybase1",
".",
"ImplicitTeamMigrationInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1368-L1383 |
159,971 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | FinalizeMigration | func (k *KeybaseServiceBase) FinalizeMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
if handle.TypeForKeying() == tlf.TeamKeying {
// Clear the cache for this implicit team, to ensure we get
// all the latest key generations for the team info during the
// migration.
id := handle.FirstResolvedWriter()
if id.IsTeamOrSubteam() {
tid, err := id.AsTeam()
if err != nil {
return err
}
k.log.CDebugf(ctx, "Clearing team info for tid=%s, handle=%s",
tid, handle.GetCanonicalPath())
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
}
}
return k.config.KBFSOps().MigrateToImplicitTeam(ctx, handle.TlfID())
} | go | func (k *KeybaseServiceBase) FinalizeMigration(ctx context.Context,
folder keybase1.Folder) (err error) {
fav := favorites.NewFolderFromProtocol(folder)
handle, err := GetHandleFromFolderNameAndType(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type)
if err != nil {
return err
}
if handle.TypeForKeying() == tlf.TeamKeying {
// Clear the cache for this implicit team, to ensure we get
// all the latest key generations for the team info during the
// migration.
id := handle.FirstResolvedWriter()
if id.IsTeamOrSubteam() {
tid, err := id.AsTeam()
if err != nil {
return err
}
k.log.CDebugf(ctx, "Clearing team info for tid=%s, handle=%s",
tid, handle.GetCanonicalPath())
k.setCachedTeamInfo(tid, idutil.TeamInfo{})
}
}
return k.config.KBFSOps().MigrateToImplicitTeam(ctx, handle.TlfID())
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"FinalizeMigration",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
")",
"(",
"err",
"error",
")",
"{",
"fav",
":=",
"favorites",
".",
"NewFolderFromProtocol",
"(",
"folder",... | // FinalizeMigration implements keybase1.ImplicitTeamMigrationInterface for
// KeybaseServiceBase. | [
"FinalizeMigration",
"implements",
"keybase1",
".",
"ImplicitTeamMigrationInterface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1387-L1411 |
159,972 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetTLFCryptKeys | func (k *KeybaseServiceBase) GetTLFCryptKeys(ctx context.Context,
query keybase1.TLFQuery) (res keybase1.GetTLFCryptKeysRes, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.GetTLFCryptKeysRes{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, false)
if err != nil {
return res, err
}
res.NameIDBreaks.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
keys, id, err := k.config.KBFSOps().GetTLFCryptKeys(ctx, tlfHandle)
if err != nil {
return res, err
}
res.NameIDBreaks.TlfID = keybase1.TLFID(id.String())
for i, key := range keys {
res.CryptKeys = append(res.CryptKeys, keybase1.CryptKey{
KeyGeneration: int(kbfsmd.FirstValidKeyGen) + i,
Key: keybase1.Bytes32(key.Data()),
})
}
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.NameIDBreaks.Breaks = tlfhandle.GetExtendedIdentify(ctx).
GetTlfBreakAndClose()
}
return res, nil
} | go | func (k *KeybaseServiceBase) GetTLFCryptKeys(ctx context.Context,
query keybase1.TLFQuery) (res keybase1.GetTLFCryptKeysRes, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.GetTLFCryptKeysRes{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, false)
if err != nil {
return res, err
}
res.NameIDBreaks.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
keys, id, err := k.config.KBFSOps().GetTLFCryptKeys(ctx, tlfHandle)
if err != nil {
return res, err
}
res.NameIDBreaks.TlfID = keybase1.TLFID(id.String())
for i, key := range keys {
res.CryptKeys = append(res.CryptKeys, keybase1.CryptKey{
KeyGeneration: int(kbfsmd.FirstValidKeyGen) + i,
Key: keybase1.Bytes32(key.Data()),
})
}
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.NameIDBreaks.Breaks = tlfhandle.GetExtendedIdentify(ctx).
GetTlfBreakAndClose()
}
return res, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetTLFCryptKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"query",
"keybase1",
".",
"TLFQuery",
")",
"(",
"res",
"keybase1",
".",
"GetTLFCryptKeysRes",
",",
"err",
"error",
")",
"{",
"if",
"ctx",
",",
... | // GetTLFCryptKeys implements the TlfKeysInterface interface for
// KeybaseServiceBase. | [
"GetTLFCryptKeys",
"implements",
"the",
"TlfKeysInterface",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1415-L1453 |
159,973 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | GetPublicCanonicalTLFNameAndID | func (k *KeybaseServiceBase) GetPublicCanonicalTLFNameAndID(
ctx context.Context, query keybase1.TLFQuery) (
res keybase1.CanonicalTLFNameAndIDWithBreaks, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.CanonicalTLFNameAndIDWithBreaks{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName,
true /* public */)
if err != nil {
return res, err
}
res.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
id, err := k.config.KBFSOps().GetTLFID(ctx, tlfHandle)
if err != nil {
return res, err
}
res.TlfID = keybase1.TLFID(id.String())
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.Breaks = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose()
}
return res, nil
} | go | func (k *KeybaseServiceBase) GetPublicCanonicalTLFNameAndID(
ctx context.Context, query keybase1.TLFQuery) (
res keybase1.CanonicalTLFNameAndIDWithBreaks, err error) {
if ctx, err = tlfhandle.MakeExtendedIdentify(
CtxWithRandomIDReplayable(ctx,
CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log),
query.IdentifyBehavior,
); err != nil {
return keybase1.CanonicalTLFNameAndIDWithBreaks{}, err
}
tlfHandle, err := getHandleFromFolderName(
ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName,
true /* public */)
if err != nil {
return res, err
}
res.CanonicalName = keybase1.CanonicalTlfName(
tlfHandle.GetCanonicalName())
id, err := k.config.KBFSOps().GetTLFID(ctx, tlfHandle)
if err != nil {
return res, err
}
res.TlfID = keybase1.TLFID(id.String())
if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() {
res.Breaks = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose()
}
return res, nil
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"GetPublicCanonicalTLFNameAndID",
"(",
"ctx",
"context",
".",
"Context",
",",
"query",
"keybase1",
".",
"TLFQuery",
")",
"(",
"res",
"keybase1",
".",
"CanonicalTLFNameAndIDWithBreaks",
",",
"err",
"error",
")",
"... | // GetPublicCanonicalTLFNameAndID implements the TlfKeysInterface interface for
// KeybaseServiceBase. | [
"GetPublicCanonicalTLFNameAndID",
"implements",
"the",
"TlfKeysInterface",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1457-L1489 |
159,974 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | EstablishMountDir | func (k *KeybaseServiceBase) EstablishMountDir(ctx context.Context) (
string, error) {
dir, err := k.kbfsMountClient.GetCurrentMountDir(ctx)
if err != nil {
k.log.CInfof(ctx, "GetCurrentMountDir fails - ", err)
return "", err
}
if dir == "" {
dirs, err := k.kbfsMountClient.GetAllAvailableMountDirs(ctx)
if err != nil {
k.log.CInfof(ctx, "GetAllAvailableMountDirs fails - ", err)
return "", err
}
dir, err = chooseDefaultMount(ctx, dirs, k.log)
if err != nil {
k.log.CInfof(ctx, "chooseDefaultMount fails - ", err)
return "", err
}
err2 := k.kbfsMountClient.SetCurrentMountDir(ctx, dir)
if err2 != nil {
k.log.CInfof(ctx, "SetCurrentMountDir fails - ", err2)
}
// Continue mounting even if we can't save the mount
k.log.CDebugf(ctx, "Choosing mountdir %s from %v", dir, dirs)
}
return dir, err
} | go | func (k *KeybaseServiceBase) EstablishMountDir(ctx context.Context) (
string, error) {
dir, err := k.kbfsMountClient.GetCurrentMountDir(ctx)
if err != nil {
k.log.CInfof(ctx, "GetCurrentMountDir fails - ", err)
return "", err
}
if dir == "" {
dirs, err := k.kbfsMountClient.GetAllAvailableMountDirs(ctx)
if err != nil {
k.log.CInfof(ctx, "GetAllAvailableMountDirs fails - ", err)
return "", err
}
dir, err = chooseDefaultMount(ctx, dirs, k.log)
if err != nil {
k.log.CInfof(ctx, "chooseDefaultMount fails - ", err)
return "", err
}
err2 := k.kbfsMountClient.SetCurrentMountDir(ctx, dir)
if err2 != nil {
k.log.CInfof(ctx, "SetCurrentMountDir fails - ", err2)
}
// Continue mounting even if we can't save the mount
k.log.CDebugf(ctx, "Choosing mountdir %s from %v", dir, dirs)
}
return dir, err
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"EstablishMountDir",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"string",
",",
"error",
")",
"{",
"dir",
",",
"err",
":=",
"k",
".",
"kbfsMountClient",
".",
"GetCurrentMountDir",
"(",
"ctx",
")",
"\... | // EstablishMountDir asks the service for the current mount path | [
"EstablishMountDir",
"asks",
"the",
"service",
"for",
"the",
"current",
"mount",
"path"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1492-L1518 |
159,975 | keybase/client | go/kbfs/libkbfs/keybase_service_base.go | PutGitMetadata | func (k *KeybaseServiceBase) PutGitMetadata(
ctx context.Context, folder keybase1.Folder, repoID keybase1.RepoID,
metadata keybase1.GitLocalMetadata) error {
return k.gitClient.PutGitMetadata(ctx, keybase1.PutGitMetadataArg{
Folder: folder,
RepoID: repoID,
Metadata: metadata,
})
} | go | func (k *KeybaseServiceBase) PutGitMetadata(
ctx context.Context, folder keybase1.Folder, repoID keybase1.RepoID,
metadata keybase1.GitLocalMetadata) error {
return k.gitClient.PutGitMetadata(ctx, keybase1.PutGitMetadataArg{
Folder: folder,
RepoID: repoID,
Metadata: metadata,
})
} | [
"func",
"(",
"k",
"*",
"KeybaseServiceBase",
")",
"PutGitMetadata",
"(",
"ctx",
"context",
".",
"Context",
",",
"folder",
"keybase1",
".",
"Folder",
",",
"repoID",
"keybase1",
".",
"RepoID",
",",
"metadata",
"keybase1",
".",
"GitLocalMetadata",
")",
"error",
... | // PutGitMetadata implements the KeybaseService interface for
// KeybaseServiceBase. | [
"PutGitMetadata",
"implements",
"the",
"KeybaseService",
"interface",
"for",
"KeybaseServiceBase",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1522-L1530 |
159,976 | keybase/client | go/kbfs/libkbfs/merkle_root.go | NewEventuallyConsistentMerkleRoot | func NewEventuallyConsistentMerkleRoot(
config Config, getter idutil.MerkleRootGetter) *EventuallyConsistentMerkleRoot {
ecmr := &EventuallyConsistentMerkleRoot{
config: config,
log: config.MakeLogger(ECMRID),
getter: getter,
}
ecmr.fetcher = newFetchDecider(
ecmr.log, config.MakeVLogger(ecmr.log), ecmr.getAndCache,
ECMRCtxTagKey{}, ECMRID, ecmr.config)
return ecmr
} | go | func NewEventuallyConsistentMerkleRoot(
config Config, getter idutil.MerkleRootGetter) *EventuallyConsistentMerkleRoot {
ecmr := &EventuallyConsistentMerkleRoot{
config: config,
log: config.MakeLogger(ECMRID),
getter: getter,
}
ecmr.fetcher = newFetchDecider(
ecmr.log, config.MakeVLogger(ecmr.log), ecmr.getAndCache,
ECMRCtxTagKey{}, ECMRID, ecmr.config)
return ecmr
} | [
"func",
"NewEventuallyConsistentMerkleRoot",
"(",
"config",
"Config",
",",
"getter",
"idutil",
".",
"MerkleRootGetter",
")",
"*",
"EventuallyConsistentMerkleRoot",
"{",
"ecmr",
":=",
"&",
"EventuallyConsistentMerkleRoot",
"{",
"config",
":",
"config",
",",
"log",
":",... | // NewEventuallyConsistentMerkleRoot creates a new
// EventuallyConsistentMerkleRoot object. | [
"NewEventuallyConsistentMerkleRoot",
"creates",
"a",
"new",
"EventuallyConsistentMerkleRoot",
"object",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/merkle_root.go#L48-L59 |
159,977 | keybase/client | go/kbfs/libkbfs/merkle_root.go | Get | func (ecmr *EventuallyConsistentMerkleRoot) Get(
ctx context.Context, bgTolerance, blockTolerance time.Duration) (
timestamp time.Time, root keybase1.MerkleRootV2,
rootTime time.Time, err error) {
c := ecmr.getCached()
err = ecmr.fetcher.Do(ctx, bgTolerance, blockTolerance, c.timestamp)
if err != nil {
return time.Time{}, keybase1.MerkleRootV2{}, time.Time{}, err
}
c = ecmr.getCached()
return c.timestamp, c.root, c.rootTime, nil
} | go | func (ecmr *EventuallyConsistentMerkleRoot) Get(
ctx context.Context, bgTolerance, blockTolerance time.Duration) (
timestamp time.Time, root keybase1.MerkleRootV2,
rootTime time.Time, err error) {
c := ecmr.getCached()
err = ecmr.fetcher.Do(ctx, bgTolerance, blockTolerance, c.timestamp)
if err != nil {
return time.Time{}, keybase1.MerkleRootV2{}, time.Time{}, err
}
c = ecmr.getCached()
return c.timestamp, c.root, c.rootTime, nil
} | [
"func",
"(",
"ecmr",
"*",
"EventuallyConsistentMerkleRoot",
")",
"Get",
"(",
"ctx",
"context",
".",
"Context",
",",
"bgTolerance",
",",
"blockTolerance",
"time",
".",
"Duration",
")",
"(",
"timestamp",
"time",
".",
"Time",
",",
"root",
"keybase1",
".",
"Merk... | // Get returns the current merkle root, and the server timestamp of
// that root. To help avoid having too frequent calls into the API
// server, caller can provide a positive tolerance, to accept stale
// LimitBytes and UsageBytes data. If tolerance is 0 or negative, this
// always makes a blocking RPC to bserver and return latest quota
// usage.
//
// 1) If the age of cached data is more than blockTolerance, a blocking RPC is
// issued and the function only returns after RPC finishes, with the newest
// data from RPC. The RPC causes cached data to be refreshed as well.
// 2) Otherwise, if the age of cached data is more than bgTolerance,
// a background RPC is spawned to refresh cached data, and the stale
// data is returned immediately.
// 3) Otherwise, the cached stale data is returned immediately. | [
"Get",
"returns",
"the",
"current",
"merkle",
"root",
"and",
"the",
"server",
"timestamp",
"of",
"that",
"root",
".",
"To",
"help",
"avoid",
"having",
"too",
"frequent",
"calls",
"into",
"the",
"API",
"server",
"caller",
"can",
"provide",
"a",
"positive",
... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/merkle_root.go#L100-L111 |
159,978 | keybase/client | go/libkb/chain_link.go | checkSpecialLinksTable | func (c ChainLink) checkSpecialLinksTable(tab map[keybase1.LinkID]SpecialChainLink, uid keybase1.UID, why string) (found bool, reason string, err error) {
var scl SpecialChainLink
// The combination of hashVerified and chainVerified should ensure that this link
// is only considered here after all prevs have been successfully checked.
if !c.canTrustID() {
return false, "", ChainLinkError{fmt.Sprintf("cannot check if a link is %q without a verified link ID (linkID=%s, uid=%s, hash=%v, chain=%v, diskVersion=%d)", why, c.id, uid, c.hashVerified, c.chainVerified, c.diskVersion)}
}
scl, found = tab[c.LinkID().Export()]
if !found {
return false, "", nil
}
if !c.GetSeqno().Eq(scl.Seqno) {
return false, "", NewChainLinkWrongSeqnoError(fmt.Sprintf("malicious bad link in from server has wrong seqno in %q check: %d != %d", why, c.GetSeqno(), scl.Seqno))
}
if !scl.UID.Equal(uid) {
return false, "", NewUIDMismatchError(fmt.Sprintf("malicious bad link from server in %q check; UID %s != %s", why, scl.UID, uid))
}
return true, scl.Reason, nil
} | go | func (c ChainLink) checkSpecialLinksTable(tab map[keybase1.LinkID]SpecialChainLink, uid keybase1.UID, why string) (found bool, reason string, err error) {
var scl SpecialChainLink
// The combination of hashVerified and chainVerified should ensure that this link
// is only considered here after all prevs have been successfully checked.
if !c.canTrustID() {
return false, "", ChainLinkError{fmt.Sprintf("cannot check if a link is %q without a verified link ID (linkID=%s, uid=%s, hash=%v, chain=%v, diskVersion=%d)", why, c.id, uid, c.hashVerified, c.chainVerified, c.diskVersion)}
}
scl, found = tab[c.LinkID().Export()]
if !found {
return false, "", nil
}
if !c.GetSeqno().Eq(scl.Seqno) {
return false, "", NewChainLinkWrongSeqnoError(fmt.Sprintf("malicious bad link in from server has wrong seqno in %q check: %d != %d", why, c.GetSeqno(), scl.Seqno))
}
if !scl.UID.Equal(uid) {
return false, "", NewUIDMismatchError(fmt.Sprintf("malicious bad link from server in %q check; UID %s != %s", why, scl.UID, uid))
}
return true, scl.Reason, nil
} | [
"func",
"(",
"c",
"ChainLink",
")",
"checkSpecialLinksTable",
"(",
"tab",
"map",
"[",
"keybase1",
".",
"LinkID",
"]",
"SpecialChainLink",
",",
"uid",
"keybase1",
".",
"UID",
",",
"why",
"string",
")",
"(",
"found",
"bool",
",",
"reason",
"string",
",",
"... | // See NCC-KB2018-006 | [
"See",
"NCC",
"-",
"KB2018",
"-",
"006"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L245-L265 |
159,979 | keybase/client | go/libkb/chain_link.go | ToMerkleTriple | func (c ChainLink) ToMerkleTriple() *MerkleTriple {
if c.IsStubbed() {
return nil
}
return &MerkleTriple{
Seqno: c.GetSeqno(),
LinkID: c.id,
SigID: c.GetSigID(),
}
} | go | func (c ChainLink) ToMerkleTriple() *MerkleTriple {
if c.IsStubbed() {
return nil
}
return &MerkleTriple{
Seqno: c.GetSeqno(),
LinkID: c.id,
SigID: c.GetSigID(),
}
} | [
"func",
"(",
"c",
"ChainLink",
")",
"ToMerkleTriple",
"(",
")",
"*",
"MerkleTriple",
"{",
"if",
"c",
".",
"IsStubbed",
"(",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"return",
"&",
"MerkleTriple",
"{",
"Seqno",
":",
"c",
".",
"GetSeqno",
"(",
")",
... | // ToLinkSummary converts a ChainLink into a MerkleTriple object. | [
"ToLinkSummary",
"converts",
"a",
"ChainLink",
"into",
"a",
"MerkleTriple",
"object",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L1482-L1491 |
159,980 | keybase/client | go/libkb/chain_link.go | IsHighUserLink | func (c ChainLink) IsHighUserLink(mctx MetaContext, uid keybase1.UID) (bool, error) {
v2Type, err := c.GetSigchainV2Type()
if err != nil {
return false, err
}
hardcodedEldest := false
if c.GetSeqno() > 1 {
prevLink := c.parent.GetLinkFromSeqno(c.GetSeqno() - 1)
if prevLink == nil {
return false, ChainLinkWrongSeqnoError{}
}
hardcodedEldest, err = isSubchainStart(mctx, &c, prevLink, uid)
if err != nil {
return false, err
}
}
isFirstLink := v2Type == SigchainV2TypeEldest || c.GetSeqno() == 1 || hardcodedEldest
isNewHighLink := isFirstLink ||
v2Type == SigchainV2TypeRevoke ||
v2Type == SigchainV2TypeWebServiceBindingWithRevoke ||
v2Type == SigchainV2TypeCryptocurrencyWithRevoke ||
v2Type == SigchainV2TypeSibkey ||
v2Type == SigchainV2TypePGPUpdate
return isNewHighLink, nil
} | go | func (c ChainLink) IsHighUserLink(mctx MetaContext, uid keybase1.UID) (bool, error) {
v2Type, err := c.GetSigchainV2Type()
if err != nil {
return false, err
}
hardcodedEldest := false
if c.GetSeqno() > 1 {
prevLink := c.parent.GetLinkFromSeqno(c.GetSeqno() - 1)
if prevLink == nil {
return false, ChainLinkWrongSeqnoError{}
}
hardcodedEldest, err = isSubchainStart(mctx, &c, prevLink, uid)
if err != nil {
return false, err
}
}
isFirstLink := v2Type == SigchainV2TypeEldest || c.GetSeqno() == 1 || hardcodedEldest
isNewHighLink := isFirstLink ||
v2Type == SigchainV2TypeRevoke ||
v2Type == SigchainV2TypeWebServiceBindingWithRevoke ||
v2Type == SigchainV2TypeCryptocurrencyWithRevoke ||
v2Type == SigchainV2TypeSibkey ||
v2Type == SigchainV2TypePGPUpdate
return isNewHighLink, nil
} | [
"func",
"(",
"c",
"ChainLink",
")",
"IsHighUserLink",
"(",
"mctx",
"MetaContext",
",",
"uid",
"keybase1",
".",
"UID",
")",
"(",
"bool",
",",
"error",
")",
"{",
"v2Type",
",",
"err",
":=",
"c",
".",
"GetSigchainV2Type",
"(",
")",
"\n",
"if",
"err",
"!... | // IsHighUserLink determines whether a chainlink counts as "high" in a user's chain,
// which is defined as an Eldest link, a link with seqno=1, a link that is Sibkey,
// PGPUpdate, Revoke, or any link that is revoking. | [
"IsHighUserLink",
"determines",
"whether",
"a",
"chainlink",
"counts",
"as",
"high",
"in",
"a",
"user",
"s",
"chain",
"which",
"is",
"defined",
"as",
"an",
"Eldest",
"link",
"a",
"link",
"with",
"seqno",
"=",
"1",
"a",
"link",
"that",
"is",
"Sibkey",
"PG... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L1545-L1571 |
159,981 | keybase/client | go/teams/teams.go | ApplicationKey | func (t *Team) ApplicationKey(ctx context.Context, application keybase1.TeamApplication) (keybase1.TeamApplicationKey, error) {
latestGen := t.chain().GetLatestGeneration()
return t.ApplicationKeyAtGeneration(ctx, application, latestGen)
} | go | func (t *Team) ApplicationKey(ctx context.Context, application keybase1.TeamApplication) (keybase1.TeamApplicationKey, error) {
latestGen := t.chain().GetLatestGeneration()
return t.ApplicationKeyAtGeneration(ctx, application, latestGen)
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"ApplicationKey",
"(",
"ctx",
"context",
".",
"Context",
",",
"application",
"keybase1",
".",
"TeamApplication",
")",
"(",
"keybase1",
".",
"TeamApplicationKey",
",",
"error",
")",
"{",
"latestGen",
":=",
"t",
".",
"chai... | // ApplicationKey returns the most recent key for an application. | [
"ApplicationKey",
"returns",
"the",
"most",
"recent",
"key",
"for",
"an",
"application",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L429-L432 |
159,982 | keybase/client | go/teams/teams.go | InviteMember | func (t *Team) InviteMember(ctx context.Context, username string, role keybase1.TeamRole, resolvedUsername libkb.NormalizedUsername, uv keybase1.UserVersion) (keybase1.TeamAddMemberResult, error) {
// if a user version was previously loaded, then there is a keybase user for username, but
// without a PUK or without any keys.
if uv.Uid.Exists() {
return t.inviteKeybaseMember(ctx, uv, role, resolvedUsername)
}
// If a social, or email, or other type of invite, assert it's not an owner.
if role.IsOrAbove(keybase1.TeamRole_OWNER) {
return keybase1.TeamAddMemberResult{}, errors.New("You cannot invite an owner to a team.")
}
return t.inviteSBSMember(ctx, username, role)
} | go | func (t *Team) InviteMember(ctx context.Context, username string, role keybase1.TeamRole, resolvedUsername libkb.NormalizedUsername, uv keybase1.UserVersion) (keybase1.TeamAddMemberResult, error) {
// if a user version was previously loaded, then there is a keybase user for username, but
// without a PUK or without any keys.
if uv.Uid.Exists() {
return t.inviteKeybaseMember(ctx, uv, role, resolvedUsername)
}
// If a social, or email, or other type of invite, assert it's not an owner.
if role.IsOrAbove(keybase1.TeamRole_OWNER) {
return keybase1.TeamAddMemberResult{}, errors.New("You cannot invite an owner to a team.")
}
return t.inviteSBSMember(ctx, username, role)
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"InviteMember",
"(",
"ctx",
"context",
".",
"Context",
",",
"username",
"string",
",",
"role",
"keybase1",
".",
"TeamRole",
",",
"resolvedUsername",
"libkb",
".",
"NormalizedUsername",
",",
"uv",
"keybase1",
".",
"UserVers... | // If uv.Uid is set, then username is ignored.
// Otherwise resolvedUsername and uv are ignored. | [
"If",
"uv",
".",
"Uid",
"is",
"set",
"then",
"username",
"is",
"ignored",
".",
"Otherwise",
"resolvedUsername",
"and",
"uv",
"are",
"ignored",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L908-L921 |
159,983 | keybase/client | go/teams/teams.go | ForceMerkleRootUpdate | func (t *Team) ForceMerkleRootUpdate(ctx context.Context) error {
return ForceMerkleRootUpdateByTeamID(t.MetaContext(ctx), t.ID)
} | go | func (t *Team) ForceMerkleRootUpdate(ctx context.Context) error {
return ForceMerkleRootUpdateByTeamID(t.MetaContext(ctx), t.ID)
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"ForceMerkleRootUpdate",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"return",
"ForceMerkleRootUpdateByTeamID",
"(",
"t",
".",
"MetaContext",
"(",
"ctx",
")",
",",
"t",
".",
"ID",
")",
"\n",
"}"
] | // ForceMerkleRootUpdate will call LookupTeam on MerkleClient to
// update cached merkle root to include latest team sigs. Needed if
// client wants to create a signature that refers to an adminship,
// signature's merkle_root has to be more fresh than adminship's. | [
"ForceMerkleRootUpdate",
"will",
"call",
"LookupTeam",
"on",
"MerkleClient",
"to",
"update",
"cached",
"merkle",
"root",
"to",
"include",
"latest",
"team",
"sigs",
".",
"Needed",
"if",
"client",
"wants",
"to",
"create",
"a",
"signature",
"that",
"refers",
"to",
... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L1668-L1670 |
159,984 | keybase/client | go/teams/teams.go | AllAdmins | func (t *Team) AllAdmins(ctx context.Context) ([]keybase1.UserVersion, error) {
set := make(map[keybase1.UserVersion]bool)
owners, err := t.UsersWithRole(keybase1.TeamRole_OWNER)
if err != nil {
return nil, err
}
for _, m := range owners {
set[m] = true
}
admins, err := t.UsersWithRole(keybase1.TeamRole_ADMIN)
if err != nil {
return nil, err
}
for _, m := range admins {
set[m] = true
}
if t.IsSubteam() {
imp, err := t.G().GetTeamLoader().ImplicitAdmins(ctx, t.ID)
if err != nil {
return nil, err
}
for _, m := range imp {
set[m] = true
}
}
var all []keybase1.UserVersion
for uv := range set {
all = append(all, uv)
}
return all, nil
} | go | func (t *Team) AllAdmins(ctx context.Context) ([]keybase1.UserVersion, error) {
set := make(map[keybase1.UserVersion]bool)
owners, err := t.UsersWithRole(keybase1.TeamRole_OWNER)
if err != nil {
return nil, err
}
for _, m := range owners {
set[m] = true
}
admins, err := t.UsersWithRole(keybase1.TeamRole_ADMIN)
if err != nil {
return nil, err
}
for _, m := range admins {
set[m] = true
}
if t.IsSubteam() {
imp, err := t.G().GetTeamLoader().ImplicitAdmins(ctx, t.ID)
if err != nil {
return nil, err
}
for _, m := range imp {
set[m] = true
}
}
var all []keybase1.UserVersion
for uv := range set {
all = append(all, uv)
}
return all, nil
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"AllAdmins",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"keybase1",
".",
"UserVersion",
",",
"error",
")",
"{",
"set",
":=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UserVersion",
"]",
"bool",
"... | // All admins, owners, and implicit admins of this team. | [
"All",
"admins",
"owners",
"and",
"implicit",
"admins",
"of",
"this",
"team",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L1678-L1712 |
159,985 | keybase/client | go/teams/teams.go | notify | func (t *Team) notify(ctx context.Context, changes keybase1.TeamChangeSet, latestSeqno keybase1.Seqno) error {
changes.KeyRotated = changes.KeyRotated || t.rotated
m := libkb.NewMetaContext(ctx, t.G())
var err error
if latestSeqno > 0 {
err = HintLatestSeqno(m, t.ID, latestSeqno)
}
t.G().NotifyRouter.HandleTeamChangedByBothKeys(ctx, t.ID, t.Name().String(), t.NextSeqno(), t.IsImplicit(), changes)
return err
} | go | func (t *Team) notify(ctx context.Context, changes keybase1.TeamChangeSet, latestSeqno keybase1.Seqno) error {
changes.KeyRotated = changes.KeyRotated || t.rotated
m := libkb.NewMetaContext(ctx, t.G())
var err error
if latestSeqno > 0 {
err = HintLatestSeqno(m, t.ID, latestSeqno)
}
t.G().NotifyRouter.HandleTeamChangedByBothKeys(ctx, t.ID, t.Name().String(), t.NextSeqno(), t.IsImplicit(), changes)
return err
} | [
"func",
"(",
"t",
"*",
"Team",
")",
"notify",
"(",
"ctx",
"context",
".",
"Context",
",",
"changes",
"keybase1",
".",
"TeamChangeSet",
",",
"latestSeqno",
"keybase1",
".",
"Seqno",
")",
"error",
"{",
"changes",
".",
"KeyRotated",
"=",
"changes",
".",
"Ke... | // Send notifyrouter messages.
// Modifies `changes`
// Update to the latest seqno that we're passing though, don't make any assumptions about number of sigs.
// Note that we're probably going to be getting this same notification a second time, since it will
// bounce off a gregor and back to us. But they are idempotent, so it should be fine to be double-notified. | [
"Send",
"notifyrouter",
"messages",
".",
"Modifies",
"changes",
"Update",
"to",
"the",
"latest",
"seqno",
"that",
"we",
"re",
"passing",
"though",
"don",
"t",
"make",
"any",
"assumptions",
"about",
"number",
"of",
"sigs",
".",
"Note",
"that",
"we",
"re",
"... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L2015-L2024 |
159,986 | keybase/client | go/teams/ftl.go | NewFastTeamLoader | func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader {
ret := &FastTeamChainLoader{
world: NewLoaderContextFromG(g),
featureFlagGate: libkb.NewFeatureFlagGate(libkb.FeatureFTL, 2*time.Minute),
storage: NewFTLStorage(g),
}
return ret
} | go | func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader {
ret := &FastTeamChainLoader{
world: NewLoaderContextFromG(g),
featureFlagGate: libkb.NewFeatureFlagGate(libkb.FeatureFTL, 2*time.Minute),
storage: NewFTLStorage(g),
}
return ret
} | [
"func",
"NewFastTeamLoader",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"FastTeamChainLoader",
"{",
"ret",
":=",
"&",
"FastTeamChainLoader",
"{",
"world",
":",
"NewLoaderContextFromG",
"(",
"g",
")",
",",
"featureFlagGate",
":",
"libkb",
".",
"New... | // NewFastLoader makes a new fast loader and initializes it. | [
"NewFastLoader",
"makes",
"a",
"new",
"fast",
"loader",
"and",
"initializes",
"it",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L54-L61 |
159,987 | keybase/client | go/teams/ftl.go | NewFastTeamLoaderAndInstall | func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader {
l := NewFastTeamLoader(g)
g.SetFastTeamLoader(l)
g.AddLogoutHook(l, "fastTeamLoader")
g.AddDbNukeHook(l, "fastTeamLoader")
return l
} | go | func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader {
l := NewFastTeamLoader(g)
g.SetFastTeamLoader(l)
g.AddLogoutHook(l, "fastTeamLoader")
g.AddDbNukeHook(l, "fastTeamLoader")
return l
} | [
"func",
"NewFastTeamLoaderAndInstall",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"FastTeamChainLoader",
"{",
"l",
":=",
"NewFastTeamLoader",
"(",
"g",
")",
"\n",
"g",
".",
"SetFastTeamLoader",
"(",
"l",
")",
"\n",
"g",
".",
"AddLogoutHook",
"("... | // NewFastTeamLoaderAndInstall creates a new loader and installs it into G. | [
"NewFastTeamLoaderAndInstall",
"creates",
"a",
"new",
"loader",
"and",
"installs",
"it",
"into",
"G",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L64-L70 |
159,988 | keybase/client | go/teams/ftl.go | Load | func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) {
m = ftlLogTag(m)
defer m.TraceTimed(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), func() error { return err })()
originalArg := arg.DeepCopy()
err = f.featureFlagGate.ErrorIfFlagged(m)
if err != nil {
return res, err
}
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) {
m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String())
arg.ForceRefresh = true
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if !arg.AssertTeamName.Eq(res.Name) {
return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String()))
}
}
if ShouldRunBoxAudit(m) {
newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public))
if shouldReload {
return f.Load(newM, originalArg)
}
} else {
m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...")
}
return res, nil
} | go | func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) {
m = ftlLogTag(m)
defer m.TraceTimed(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), func() error { return err })()
originalArg := arg.DeepCopy()
err = f.featureFlagGate.ErrorIfFlagged(m)
if err != nil {
return res, err
}
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) {
m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String())
arg.ForceRefresh = true
res, err = f.loadOneAttempt(m, arg)
if err != nil {
return res, err
}
if !arg.AssertTeamName.Eq(res.Name) {
return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String()))
}
}
if ShouldRunBoxAudit(m) {
newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public))
if shouldReload {
return f.Load(newM, originalArg)
}
} else {
m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...")
}
return res, nil
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"Load",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"keybase1",
".",
"FastTeamLoadArg",
")",
"(",
"res",
"keybase1",
".",
"FastTeamLoadRes",
",",
"err",
"error",
")",
"{",
"m",
"=",
"ftlLogTag",
"... | // Load fast-loads the given team. Provide some hints as to how to load it. You can specify an application
// and key generations needed, if you are entering chat. Those links will be returned unstubbed
// from the server, and then the keys can be output in the result. | [
"Load",
"fast",
"-",
"loads",
"the",
"given",
"team",
".",
"Provide",
"some",
"hints",
"as",
"to",
"how",
"to",
"load",
"it",
".",
"You",
"can",
"specify",
"an",
"application",
"and",
"key",
"generations",
"needed",
"if",
"you",
"are",
"entering",
"chat"... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L85-L122 |
159,989 | keybase/client | go/teams/ftl.go | verifyTeamNameViaParentLoad | func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#verifyTeamNameViaParentLoad(%s,%s)", id, unverifiedName), func() error { return err })()
if parent == nil {
if !unverifiedName.IsRootTeam() {
return res, NewBadNameError("expected a root team")
}
if !unverifiedName.ToTeamID(isPublic).Eq(id) {
return res, NewBadNameError("root team v. team ID mismatch")
}
return unverifiedName, nil
}
if parent.ParentID.IsPublic() != isPublic {
return res, NewBadPublicError(parent.ParentID, isPublic)
}
parentRes, err := f.load(m, fastLoadArg{
FastTeamLoadArg: keybase1.FastTeamLoadArg{
ID: parent.ParentID,
Public: isPublic,
ForceRefresh: forceRefresh,
},
downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno},
needLatestName: true,
readSubteamID: bottomSubteam,
})
if err != nil {
return res, err
}
downPointer, ok := parentRes.downPointers[parent.ParentSeqno]
if !ok {
return res, NewBadNameError("down pointer not found in parent")
}
suffix := downPointer.NameComponent
parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh)
if err != nil {
return res, err
}
return parentName.Append(suffix)
} | go | func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#verifyTeamNameViaParentLoad(%s,%s)", id, unverifiedName), func() error { return err })()
if parent == nil {
if !unverifiedName.IsRootTeam() {
return res, NewBadNameError("expected a root team")
}
if !unverifiedName.ToTeamID(isPublic).Eq(id) {
return res, NewBadNameError("root team v. team ID mismatch")
}
return unverifiedName, nil
}
if parent.ParentID.IsPublic() != isPublic {
return res, NewBadPublicError(parent.ParentID, isPublic)
}
parentRes, err := f.load(m, fastLoadArg{
FastTeamLoadArg: keybase1.FastTeamLoadArg{
ID: parent.ParentID,
Public: isPublic,
ForceRefresh: forceRefresh,
},
downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno},
needLatestName: true,
readSubteamID: bottomSubteam,
})
if err != nil {
return res, err
}
downPointer, ok := parentRes.downPointers[parent.ParentSeqno]
if !ok {
return res, NewBadNameError("down pointer not found in parent")
}
suffix := downPointer.NameComponent
parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh)
if err != nil {
return res, err
}
return parentName.Append(suffix)
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"verifyTeamNameViaParentLoad",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"id",
"keybase1",
".",
"TeamID",
",",
"isPublic",
"bool",
",",
"unverifiedName",
"keybase1",
".",
"TeamName",
",",
"parent",
"*",
"key... | // verifyTeamNameViaParentLoad takes a team ID, and a pointer to a parent team's sigchain, and computes
// the full resolved team name. If the pointer is null, we'll assume this is a root team and do the
// verification via hash-comparison. | [
"verifyTeamNameViaParentLoad",
"takes",
"a",
"team",
"ID",
"and",
"a",
"pointer",
"to",
"a",
"parent",
"team",
"s",
"sigchain",
"and",
"computes",
"the",
"full",
"resolved",
"team",
"name",
".",
"If",
"the",
"pointer",
"is",
"null",
"we",
"ll",
"assume",
"... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L161-L204 |
159,990 | keybase/client | go/teams/ftl.go | load | func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), func() error { return err })()
// Single-flight lock by team ID.
lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String())
defer lock.Release(m.Ctx())
return f.loadLockedWithRetries(m, arg)
} | go | func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), func() error { return err })()
// Single-flight lock by team ID.
lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String())
defer lock.Release(m.Ctx())
return f.loadLockedWithRetries(m, arg)
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"load",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"fastLoadArg",
")",
"(",
"res",
"*",
"fastLoadRes",
",",
"err",
"error",
")",
"{",
"defer",
"m",
".",
"Trace",
"(",
"fmt",
".",
"Sprintf",
"... | // load acquires a lock by team ID, and the runs loadLockedWithRetries. | [
"load",
"acquires",
"a",
"lock",
"by",
"team",
"ID",
"and",
"the",
"runs",
"loadLockedWithRetries",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L232-L241 |
159,991 | keybase/client | go/teams/ftl.go | loadLockedWithRetries | func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
for i := 0; i < 2; i++ {
res, err = f.loadLocked(m, arg)
if err == nil {
return res, err
}
if _, ok := err.(FTLMissingSeedError); !ok {
return nil, err
}
m.Debug("Got retriable error %s; will force reset", err)
arg.forceReset = true
}
return res, err
} | go | func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) {
for i := 0; i < 2; i++ {
res, err = f.loadLocked(m, arg)
if err == nil {
return res, err
}
if _, ok := err.(FTLMissingSeedError); !ok {
return nil, err
}
m.Debug("Got retriable error %s; will force reset", err)
arg.forceReset = true
}
return res, err
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"loadLockedWithRetries",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"fastLoadArg",
")",
"(",
"res",
"*",
"fastLoadRes",
",",
"err",
"error",
")",
"{",
"for",
"i",
":=",
"0",
";",
"i",
"<",
"2",... | // loadLockedWithRetries attempts two loads of the team. If the first iteration returns an FTLMissingSeedError,
// we'll blast through the cache and attempt a full reload a second time. Then that's for all the marbles. | [
"loadLockedWithRetries",
"attempts",
"two",
"loads",
"of",
"the",
"team",
".",
"If",
"the",
"first",
"iteration",
"returns",
"an",
"FTLMissingSeedError",
"we",
"ll",
"blast",
"through",
"the",
"cache",
"and",
"attempt",
"a",
"full",
"reload",
"a",
"second",
"t... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L245-L259 |
159,992 | keybase/client | go/teams/ftl.go | deriveSeedAtGeneration | func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (seed keybase1.PerTeamKeySeed, err error) {
seed, ok := state.Chain.PerTeamKeySeedsVerified[gen]
if ok {
return seed, nil
}
var tmp keybase1.PerTeamKeySeed
tmp, ok = state.PerTeamKeySeedsUnverified[gen]
if !ok {
// See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam
// name before we were members of the team, and then later get added to the team, and then try to
// reload the team. We didn't have boxes from the first time around, so just force a full reload.
// It's inefficient but it's a very rare case.
return seed, NewFTLMissingSeedError(gen)
}
ptkChain, ok := state.Chain.PerTeamKeys[gen]
if !ok {
return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen))
}
km, err := NewTeamKeyManagerWithSecret(tmp, gen)
if err != nil {
return seed, err
}
sigKey, err := km.SigningKey()
if err != nil {
return seed, err
}
if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) {
m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen))
}
encKey, err := km.EncryptionKey()
if err != nil {
return seed, err
}
if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) {
m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen))
}
// write back to cache
seed = tmp
state.Chain.PerTeamKeySeedsVerified[gen] = seed
return seed, err
} | go | func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (seed keybase1.PerTeamKeySeed, err error) {
seed, ok := state.Chain.PerTeamKeySeedsVerified[gen]
if ok {
return seed, nil
}
var tmp keybase1.PerTeamKeySeed
tmp, ok = state.PerTeamKeySeedsUnverified[gen]
if !ok {
// See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam
// name before we were members of the team, and then later get added to the team, and then try to
// reload the team. We didn't have boxes from the first time around, so just force a full reload.
// It's inefficient but it's a very rare case.
return seed, NewFTLMissingSeedError(gen)
}
ptkChain, ok := state.Chain.PerTeamKeys[gen]
if !ok {
return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen))
}
km, err := NewTeamKeyManagerWithSecret(tmp, gen)
if err != nil {
return seed, err
}
sigKey, err := km.SigningKey()
if err != nil {
return seed, err
}
if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) {
m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen))
}
encKey, err := km.EncryptionKey()
if err != nil {
return seed, err
}
if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) {
m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID)
return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen))
}
// write back to cache
seed = tmp
state.Chain.PerTeamKeySeedsVerified[gen] = seed
return seed, err
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"deriveSeedAtGeneration",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"gen",
"keybase1",
".",
"PerTeamKeyGeneration",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"seed",
"keybase1",
".",
"Per... | // dervieSeedAtGeneration either goes to cache or rederives the PTK private seed
// for the given generation gen. | [
"dervieSeedAtGeneration",
"either",
"goes",
"to",
"cache",
"or",
"rederives",
"the",
"PTK",
"private",
"seed",
"for",
"the",
"given",
"generation",
"gen",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L263-L313 |
159,993 | keybase/client | go/teams/ftl.go | deriveKeyForApplicationAtGeneration | func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (key keybase1.TeamApplicationKey, err error) {
seed, err := f.deriveSeedAtGeneration(m, gen, state)
if err != nil {
return key, err
}
var mask *keybase1.MaskB64
if m := state.ReaderKeyMasks[app]; m != nil {
tmp, ok := m[gen]
if ok {
mask = &tmp
}
}
if mask == nil {
m.Debug("Could not get reader key mask for <%s,%d>", app, gen)
if state.ID().IsSubTeam() {
m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam")
return key, NewNotExplicitMemberOfSubteamError()
}
return key, NewFastLoadError("Could not load application keys")
}
rkm := keybase1.ReaderKeyMask{
Application: app,
Generation: gen,
Mask: *mask,
}
return applicationKeyForMask(rkm, seed)
} | go | func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (key keybase1.TeamApplicationKey, err error) {
seed, err := f.deriveSeedAtGeneration(m, gen, state)
if err != nil {
return key, err
}
var mask *keybase1.MaskB64
if m := state.ReaderKeyMasks[app]; m != nil {
tmp, ok := m[gen]
if ok {
mask = &tmp
}
}
if mask == nil {
m.Debug("Could not get reader key mask for <%s,%d>", app, gen)
if state.ID().IsSubTeam() {
m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam")
return key, NewNotExplicitMemberOfSubteamError()
}
return key, NewFastLoadError("Could not load application keys")
}
rkm := keybase1.ReaderKeyMask{
Application: app,
Generation: gen,
Mask: *mask,
}
return applicationKeyForMask(rkm, seed)
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"deriveKeyForApplicationAtGeneration",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"app",
"keybase1",
".",
"TeamApplication",
",",
"gen",
"keybase1",
".",
"PerTeamKeyGeneration",
",",
"state",
"*",
"keybase1",
"."... | // deriveKeyForApplicationAtGeneration pulls from cache or generates the PTK for the
// given application at the given generation. | [
"deriveKeyForApplicationAtGeneration",
"pulls",
"from",
"cache",
"or",
"generates",
"the",
"PTK",
"for",
"the",
"given",
"application",
"at",
"the",
"given",
"generation",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L317-L346 |
159,994 | keybase/client | go/teams/ftl.go | deriveKeysForApplication | func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, state *keybase1.FastTeamData) (keys []keybase1.TeamApplicationKey, err error) {
var didLatest bool
doKey := func(gen keybase1.PerTeamKeyGeneration) error {
var key keybase1.TeamApplicationKey
key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, state)
if err != nil {
return err
}
keys = append(keys, key)
if gen == state.LatestKeyGeneration {
didLatest = true
}
return nil
}
if arg.NeedLatestKey {
// This debug is useful to have since it will spell out which version is the latest in the log
// if the caller asked for latest.
m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", state.LatestKeyGeneration)
}
for _, gen := range arg.KeyGenerationsNeeded {
if err = doKey(gen); err != nil {
return nil, err
}
}
if !didLatest && arg.NeedLatestKey {
if err = doKey(state.LatestKeyGeneration); err != nil {
return nil, err
}
}
return keys, nil
} | go | func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, state *keybase1.FastTeamData) (keys []keybase1.TeamApplicationKey, err error) {
var didLatest bool
doKey := func(gen keybase1.PerTeamKeyGeneration) error {
var key keybase1.TeamApplicationKey
key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, state)
if err != nil {
return err
}
keys = append(keys, key)
if gen == state.LatestKeyGeneration {
didLatest = true
}
return nil
}
if arg.NeedLatestKey {
// This debug is useful to have since it will spell out which version is the latest in the log
// if the caller asked for latest.
m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", state.LatestKeyGeneration)
}
for _, gen := range arg.KeyGenerationsNeeded {
if err = doKey(gen); err != nil {
return nil, err
}
}
if !didLatest && arg.NeedLatestKey {
if err = doKey(state.LatestKeyGeneration); err != nil {
return nil, err
}
}
return keys, nil
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"deriveKeysForApplication",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"app",
"keybase1",
".",
"TeamApplication",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"keys... | // deriveKeysForApplication pulls from cache or generates several geneartions of PTKs
// for the given application. | [
"deriveKeysForApplication",
"pulls",
"from",
"cache",
"or",
"generates",
"several",
"geneartions",
"of",
"PTKs",
"for",
"the",
"given",
"application",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L350-L383 |
159,995 | keybase/client | go/teams/ftl.go | toResult | func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (res *fastLoadRes, err error) {
res = &fastLoadRes{
unverifiedName: state.Name,
downPointers: state.Chain.DownPointers,
upPointer: state.Chain.LastUpPointer,
}
res.applicationKeys, err = f.deriveKeys(m, arg, state)
if err != nil {
return nil, err
}
return res, nil
} | go | func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (res *fastLoadRes, err error) {
res = &fastLoadRes{
unverifiedName: state.Name,
downPointers: state.Chain.DownPointers,
upPointer: state.Chain.LastUpPointer,
}
res.applicationKeys, err = f.deriveKeys(m, arg, state)
if err != nil {
return nil, err
}
return res, nil
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"toResult",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"res",
"*",
"fastLoadRes",
",",
"err",
"error",
")",
"{",
"res"... | // toResult turns the current fast state into a fastLoadRes. | [
"toResult",
"turns",
"the",
"current",
"fast",
"state",
"into",
"a",
"fastLoadRes",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L400-L411 |
159,996 | keybase/client | go/teams/ftl.go | findStateInCache | func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) *keybase1.FastTeamData {
tmp := f.storage.Get(m, id, id.IsPublic())
if tmp == nil {
return nil
}
return tmp
} | go | func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) *keybase1.FastTeamData {
tmp := f.storage.Get(m, id, id.IsPublic())
if tmp == nil {
return nil
}
return tmp
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"findStateInCache",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"id",
"keybase1",
".",
"TeamID",
")",
"*",
"keybase1",
".",
"FastTeamData",
"{",
"tmp",
":=",
"f",
".",
"storage",
".",
"Get",
"(",
"m",
... | // findState in cache finds the team ID's state in an in-memory cache. | [
"findState",
"in",
"cache",
"finds",
"the",
"team",
"ID",
"s",
"state",
"in",
"an",
"in",
"-",
"memory",
"cache",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L414-L420 |
159,997 | keybase/client | go/teams/ftl.go | stateHasKeys | func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (fresh bool) {
gens := make(map[keybase1.PerTeamKeyGeneration]struct{})
fresh = true
if arg.NeedLatestKey && !state.LoadedLatest {
m.Debug("latest was never loaded, we need to load it")
shoppingList.needMerkleRefresh = true
shoppingList.needLatestKey = true
fresh = false
}
// The key generations needed are the ones passed in, and also, potentially, our cached
// LatestKeyGeneration from the state. It could be that when we go to the server, this is no
// longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should
// pull down the mask, since it's a bug to not have it if it turns out the server refresh
// didn't budge the latest key generation.
kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...)
if arg.NeedLatestKey && state.LoadedLatest && state.LatestKeyGeneration > 0 {
kgn = append(kgn, state.LatestKeyGeneration)
}
for _, app := range arg.Applications {
for _, gen := range kgn {
add := false
if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil {
m.Debug("state doesn't have mask for <%d,%d>", app, gen)
add = true
}
if !stateHasKeySeed(m, gen, state) {
m.Debug("state doesn't have key seed for gen=%d", gen)
add = true
}
if add {
gens[gen] = struct{}{}
fresh = false
}
}
}
shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...)
if !fresh {
for gen := range gens {
shoppingList.generations = append(shoppingList.generations, gen)
}
}
return fresh
} | go | func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (fresh bool) {
gens := make(map[keybase1.PerTeamKeyGeneration]struct{})
fresh = true
if arg.NeedLatestKey && !state.LoadedLatest {
m.Debug("latest was never loaded, we need to load it")
shoppingList.needMerkleRefresh = true
shoppingList.needLatestKey = true
fresh = false
}
// The key generations needed are the ones passed in, and also, potentially, our cached
// LatestKeyGeneration from the state. It could be that when we go to the server, this is no
// longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should
// pull down the mask, since it's a bug to not have it if it turns out the server refresh
// didn't budge the latest key generation.
kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...)
if arg.NeedLatestKey && state.LoadedLatest && state.LatestKeyGeneration > 0 {
kgn = append(kgn, state.LatestKeyGeneration)
}
for _, app := range arg.Applications {
for _, gen := range kgn {
add := false
if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil {
m.Debug("state doesn't have mask for <%d,%d>", app, gen)
add = true
}
if !stateHasKeySeed(m, gen, state) {
m.Debug("state doesn't have key seed for gen=%d", gen)
add = true
}
if add {
gens[gen] = struct{}{}
fresh = false
}
}
}
shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...)
if !fresh {
for gen := range gens {
shoppingList.generations = append(shoppingList.generations, gen)
}
}
return fresh
} | [
"func",
"stateHasKeys",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"shoppingList",
"*",
"shoppingList",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"fresh",
"bool",
")",
"{",
"gens",
":=",
"make",
"(",
"map",
... | // stateHasKeys checks to see if the given state has the keys specified in the shopping list. If not, it will
// modify the shopping list and return false. If yes, it will leave the shopping list unchanged and return
// true. | [
"stateHasKeys",
"checks",
"to",
"see",
"if",
"the",
"given",
"state",
"has",
"the",
"keys",
"specified",
"in",
"the",
"shopping",
"list",
".",
"If",
"not",
"it",
"will",
"modify",
"the",
"shopping",
"list",
"and",
"return",
"false",
".",
"If",
"yes",
"it... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L444-L492 |
159,998 | keybase/client | go/teams/ftl.go | stateHasDownPointers | func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) {
ret = true
for _, seqno := range arg.downPointersNeeded {
if _, ok := state.Chain.DownPointers[seqno]; !ok {
m.Debug("Down pointer at seqno=%d wasn't found", seqno)
shoppingList.addDownPointer(seqno)
ret = false
}
}
return ret
} | go | func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) {
ret = true
for _, seqno := range arg.downPointersNeeded {
if _, ok := state.Chain.DownPointers[seqno]; !ok {
m.Debug("Down pointer at seqno=%d wasn't found", seqno)
shoppingList.addDownPointer(seqno)
ret = false
}
}
return ret
} | [
"func",
"stateHasDownPointers",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"shoppingList",
"*",
"shoppingList",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"(",
"ret",
"bool",
")",
"{",
"ret",
"=",
"true",
"\n\n",
"... | // stateHasDownPointers checks to see if the given state has the down pointers specified in the shopping list.
// If not, it will change the shopping list to have the down pointers and return false. If yes, it will
// leave the shopping list unchanged and return true. | [
"stateHasDownPointers",
"checks",
"to",
"see",
"if",
"the",
"given",
"state",
"has",
"the",
"down",
"pointers",
"specified",
"in",
"the",
"shopping",
"list",
".",
"If",
"not",
"it",
"will",
"change",
"the",
"shopping",
"list",
"to",
"have",
"the",
"down",
... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L497-L508 |
159,999 | keybase/client | go/teams/ftl.go | computeWithPreviousState | func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) {
cachedAt := state.CachedAt.Time()
s.linksSince = state.Chain.Last.Seqno
if arg.forceReset {
s.linksSince = keybase1.Seqno(0)
m.Debug("forceReset specified, so reloading from low=0")
}
if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour {
m.Debug("cached value is more than an hour old (cached at %s)", cachedAt)
s.needMerkleRefresh = true
}
if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno {
m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno)
s.needMerkleRefresh = true
}
if arg.ForceRefresh {
m.Debug("refresh forced via flag")
s.needMerkleRefresh = true
}
if !s.needMerkleRefresh && f.InForceRepollMode(m) {
m.Debug("must repoll since in force mode")
s.needMerkleRefresh = true
}
if !stateHasKeys(m, s, arg, state) {
m.Debug("state was missing needed encryption keys, or we need the freshest")
}
if !stateHasDownPointers(m, s, arg, state) {
m.Debug("state was missing unstubbed links")
}
} | go | func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) {
cachedAt := state.CachedAt.Time()
s.linksSince = state.Chain.Last.Seqno
if arg.forceReset {
s.linksSince = keybase1.Seqno(0)
m.Debug("forceReset specified, so reloading from low=0")
}
if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour {
m.Debug("cached value is more than an hour old (cached at %s)", cachedAt)
s.needMerkleRefresh = true
}
if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno {
m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno)
s.needMerkleRefresh = true
}
if arg.ForceRefresh {
m.Debug("refresh forced via flag")
s.needMerkleRefresh = true
}
if !s.needMerkleRefresh && f.InForceRepollMode(m) {
m.Debug("must repoll since in force mode")
s.needMerkleRefresh = true
}
if !stateHasKeys(m, s, arg, state) {
m.Debug("state was missing needed encryption keys, or we need the freshest")
}
if !stateHasDownPointers(m, s, arg, state) {
m.Debug("state was missing unstubbed links")
}
} | [
"func",
"(",
"f",
"*",
"FastTeamChainLoader",
")",
"computeWithPreviousState",
"(",
"m",
"libkb",
".",
"MetaContext",
",",
"s",
"*",
"shoppingList",
",",
"arg",
"fastLoadArg",
",",
"state",
"*",
"keybase1",
".",
"FastTeamData",
")",
"{",
"cachedAt",
":=",
"s... | // computeWithPreviousState looks into the given load arg, and also our current cached state, to figure
// what to get from the server. The results are compiled into a "shopping list" that we'll later
// use when we concoct our server request. | [
"computeWithPreviousState",
"looks",
"into",
"the",
"given",
"load",
"arg",
"and",
"also",
"our",
"current",
"cached",
"state",
"to",
"figure",
"what",
"to",
"get",
"from",
"the",
"server",
".",
"The",
"results",
"are",
"compiled",
"into",
"a",
"shopping",
"... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L560-L591 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.