id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
listlengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
listlengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
159,900
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetRevision
func (md *RootMetadata) SetRevision(revision kbfsmd.Revision) { md.bareMd.SetRevision(revision) }
go
func (md *RootMetadata) SetRevision(revision kbfsmd.Revision) { md.bareMd.SetRevision(revision) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetRevision", "(", "revision", "kbfsmd", ".", "Revision", ")", "{", "md", ".", "bareMd", ".", "SetRevision", "(", "revision", ")", "\n", "}" ]
// SetRevision wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetRevision", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L769-L771
159,901
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetWriters
func (md *RootMetadata) SetWriters(writers []keybase1.UserOrTeamID) { md.bareMd.SetWriters(writers) }
go
func (md *RootMetadata) SetWriters(writers []keybase1.UserOrTeamID) { md.bareMd.SetWriters(writers) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetWriters", "(", "writers", "[", "]", "keybase1", ".", "UserOrTeamID", ")", "{", "md", ".", "bareMd", ".", "SetWriters", "(", "writers", ")", "\n", "}" ]
// SetWriters wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetWriters", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L774-L776
159,902
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetUnresolvedReaders
func (md *RootMetadata) SetUnresolvedReaders(readers []keybase1.SocialAssertion) { md.bareMd.SetUnresolvedReaders(readers) }
go
func (md *RootMetadata) SetUnresolvedReaders(readers []keybase1.SocialAssertion) { md.bareMd.SetUnresolvedReaders(readers) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetUnresolvedReaders", "(", "readers", "[", "]", "keybase1", ".", "SocialAssertion", ")", "{", "md", ".", "bareMd", ".", "SetUnresolvedReaders", "(", "readers", ")", "\n", "}" ]
// SetUnresolvedReaders wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetUnresolvedReaders", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L779-L781
159,903
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetUnresolvedWriters
func (md *RootMetadata) SetUnresolvedWriters(writers []keybase1.SocialAssertion) { md.bareMd.SetUnresolvedWriters(writers) }
go
func (md *RootMetadata) SetUnresolvedWriters(writers []keybase1.SocialAssertion) { md.bareMd.SetUnresolvedWriters(writers) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetUnresolvedWriters", "(", "writers", "[", "]", "keybase1", ".", "SocialAssertion", ")", "{", "md", ".", "bareMd", ".", "SetUnresolvedWriters", "(", "writers", ")", "\n", "}" ]
// SetUnresolvedWriters wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetUnresolvedWriters", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L784-L786
159,904
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetConflictInfo
func (md *RootMetadata) SetConflictInfo(ci *tlf.HandleExtension) { md.bareMd.SetConflictInfo(ci) }
go
func (md *RootMetadata) SetConflictInfo(ci *tlf.HandleExtension) { md.bareMd.SetConflictInfo(ci) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetConflictInfo", "(", "ci", "*", "tlf", ".", "HandleExtension", ")", "{", "md", ".", "bareMd", ".", "SetConflictInfo", "(", "ci", ")", "\n", "}" ]
// SetConflictInfo wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetConflictInfo", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L789-L791
159,905
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetFinalizedInfo
func (md *RootMetadata) SetFinalizedInfo(fi *tlf.HandleExtension) { md.bareMd.SetFinalizedInfo(fi) }
go
func (md *RootMetadata) SetFinalizedInfo(fi *tlf.HandleExtension) { md.bareMd.SetFinalizedInfo(fi) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetFinalizedInfo", "(", "fi", "*", "tlf", ".", "HandleExtension", ")", "{", "md", ".", "bareMd", ".", "SetFinalizedInfo", "(", "fi", ")", "\n", "}" ]
// SetFinalizedInfo wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetFinalizedInfo", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L794-L796
159,906
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetLastModifyingWriter
func (md *RootMetadata) SetLastModifyingWriter(user keybase1.UID) { md.bareMd.SetLastModifyingWriter(user) }
go
func (md *RootMetadata) SetLastModifyingWriter(user keybase1.UID) { md.bareMd.SetLastModifyingWriter(user) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetLastModifyingWriter", "(", "user", "keybase1", ".", "UID", ")", "{", "md", ".", "bareMd", ".", "SetLastModifyingWriter", "(", "user", ")", "\n", "}" ]
// SetLastModifyingWriter wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetLastModifyingWriter", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L799-L801
159,907
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetLastModifyingUser
func (md *RootMetadata) SetLastModifyingUser(user keybase1.UID) { md.bareMd.SetLastModifyingUser(user) }
go
func (md *RootMetadata) SetLastModifyingUser(user keybase1.UID) { md.bareMd.SetLastModifyingUser(user) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetLastModifyingUser", "(", "user", "keybase1", ".", "UID", ")", "{", "md", ".", "bareMd", ".", "SetLastModifyingUser", "(", "user", ")", "\n", "}" ]
// SetLastModifyingUser wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetLastModifyingUser", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L804-L806
159,908
keybase/client
go/kbfs/libkbfs/root_metadata.go
SetTlfID
func (md *RootMetadata) SetTlfID(tlf tlf.ID) { md.bareMd.SetTlfID(tlf) }
go
func (md *RootMetadata) SetTlfID(tlf tlf.ID) { md.bareMd.SetTlfID(tlf) }
[ "func", "(", "md", "*", "RootMetadata", ")", "SetTlfID", "(", "tlf", "tlf", ".", "ID", ")", "{", "md", ".", "bareMd", ".", "SetTlfID", "(", "tlf", ")", "\n", "}" ]
// SetTlfID wraps the respective method of the underlying BareRootMetadata for convenience.
[ "SetTlfID", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L809-L811
159,909
keybase/client
go/kbfs/libkbfs/root_metadata.go
HasKeyForUser
func (md *RootMetadata) HasKeyForUser(user keybase1.UID) ( bool, error) { writers, readers, err := md.bareMd.GetUserDevicePublicKeys(md.extra) if err != nil { return false, err } return len(writers[user]) > 0 || len(readers[user]) > 0, nil }
go
func (md *RootMetadata) HasKeyForUser(user keybase1.UID) ( bool, error) { writers, readers, err := md.bareMd.GetUserDevicePublicKeys(md.extra) if err != nil { return false, err } return len(writers[user]) > 0 || len(readers[user]) > 0, nil }
[ "func", "(", "md", "*", "RootMetadata", ")", "HasKeyForUser", "(", "user", "keybase1", ".", "UID", ")", "(", "bool", ",", "error", ")", "{", "writers", ",", "readers", ",", "err", ":=", "md", ".", "bareMd", ".", "GetUserDevicePublicKeys", "(", "md", "....
// HasKeyForUser wraps the respective method of the underlying BareRootMetadata for convenience.
[ "HasKeyForUser", "wraps", "the", "respective", "method", "of", "the", "underlying", "BareRootMetadata", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L814-L821
159,910
keybase/client
go/kbfs/libkbfs/root_metadata.go
fakeInitialRekey
func (md *RootMetadata) fakeInitialRekey() { bh, err := md.tlfHandle.ToBareHandle() if err != nil { panic(err) } md.extra = kbfsmd.FakeInitialRekey(md.bareMd, bh, kbfscrypto.TLFPublicKey{}) }
go
func (md *RootMetadata) fakeInitialRekey() { bh, err := md.tlfHandle.ToBareHandle() if err != nil { panic(err) } md.extra = kbfsmd.FakeInitialRekey(md.bareMd, bh, kbfscrypto.TLFPublicKey{}) }
[ "func", "(", "md", "*", "RootMetadata", ")", "fakeInitialRekey", "(", ")", "{", "bh", ",", "err", ":=", "md", ".", "tlfHandle", ".", "ToBareHandle", "(", ")", "\n", "if", "err", "!=", "nil", "{", "panic", "(", "err", ")", "\n", "}", "\n", "md", "...
// fakeInitialRekey wraps the FakeInitialRekey test function for // convenience.
[ "fakeInitialRekey", "wraps", "the", "FakeInitialRekey", "test", "function", "for", "convenience", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L825-L831
159,911
keybase/client
go/kbfs/libkbfs/root_metadata.go
AddKeyGeneration
func (md *RootMetadata) AddKeyGeneration(codec kbfscodec.Codec, wKeys, rKeys kbfsmd.UserDevicePublicKeys, ePubKey kbfscrypto.TLFEphemeralPublicKey, ePrivKey kbfscrypto.TLFEphemeralPrivateKey, pubKey kbfscrypto.TLFPublicKey, privKey kbfscrypto.TLFPrivateKey, currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) ( serverHalves kbfsmd.UserDeviceKeyServerHalves, err error) { nextExtra, serverHalves, err := md.bareMd.AddKeyGeneration( codec, md.extra, wKeys, rKeys, ePubKey, ePrivKey, pubKey, currCryptKey, nextCryptKey) if err != nil { return nil, err } md.extra = nextExtra md.data.TLFPrivateKey = privKey return serverHalves, nil }
go
func (md *RootMetadata) AddKeyGeneration(codec kbfscodec.Codec, wKeys, rKeys kbfsmd.UserDevicePublicKeys, ePubKey kbfscrypto.TLFEphemeralPublicKey, ePrivKey kbfscrypto.TLFEphemeralPrivateKey, pubKey kbfscrypto.TLFPublicKey, privKey kbfscrypto.TLFPrivateKey, currCryptKey, nextCryptKey kbfscrypto.TLFCryptKey) ( serverHalves kbfsmd.UserDeviceKeyServerHalves, err error) { nextExtra, serverHalves, err := md.bareMd.AddKeyGeneration( codec, md.extra, wKeys, rKeys, ePubKey, ePrivKey, pubKey, currCryptKey, nextCryptKey) if err != nil { return nil, err } md.extra = nextExtra md.data.TLFPrivateKey = privKey return serverHalves, nil }
[ "func", "(", "md", "*", "RootMetadata", ")", "AddKeyGeneration", "(", "codec", "kbfscodec", ".", "Codec", ",", "wKeys", ",", "rKeys", "kbfsmd", ".", "UserDevicePublicKeys", ",", "ePubKey", "kbfscrypto", ".", "TLFEphemeralPublicKey", ",", "ePrivKey", "kbfscrypto", ...
// AddKeyGeneration adds a new key generation to this revision of metadata.
[ "AddKeyGeneration", "adds", "a", "new", "key", "generation", "to", "this", "revision", "of", "metadata", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L839-L856
159,912
keybase/client
go/kbfs/libkbfs/root_metadata.go
GetHistoricTLFCryptKey
func (md *RootMetadata) GetHistoricTLFCryptKey( codec kbfscodec.Codec, keyGen kbfsmd.KeyGen, currentKey kbfscrypto.TLFCryptKey) (kbfscrypto.TLFCryptKey, error) { return md.bareMd.GetHistoricTLFCryptKey( codec, keyGen, currentKey, md.extra) }
go
func (md *RootMetadata) GetHistoricTLFCryptKey( codec kbfscodec.Codec, keyGen kbfsmd.KeyGen, currentKey kbfscrypto.TLFCryptKey) (kbfscrypto.TLFCryptKey, error) { return md.bareMd.GetHistoricTLFCryptKey( codec, keyGen, currentKey, md.extra) }
[ "func", "(", "md", "*", "RootMetadata", ")", "GetHistoricTLFCryptKey", "(", "codec", "kbfscodec", ".", "Codec", ",", "keyGen", "kbfsmd", ".", "KeyGen", ",", "currentKey", "kbfscrypto", ".", "TLFCryptKey", ")", "(", "kbfscrypto", ".", "TLFCryptKey", ",", "error...
// GetHistoricTLFCryptKey implements the KeyMetadata interface for RootMetadata.
[ "GetHistoricTLFCryptKey", "implements", "the", "KeyMetadata", "interface", "for", "RootMetadata", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L908-L913
159,913
keybase/client
go/kbfs/libkbfs/root_metadata.go
IsWriter
func (md *RootMetadata) IsWriter( ctx context.Context, checker kbfsmd.TeamMembershipChecker, osg idutil.OfflineStatusGetter, uid keybase1.UID, verifyingKey kbfscrypto.VerifyingKey) (bool, error) { h := md.GetTlfHandle() return IsWriterFromHandle(ctx, h, checker, osg, uid, verifyingKey) }
go
func (md *RootMetadata) IsWriter( ctx context.Context, checker kbfsmd.TeamMembershipChecker, osg idutil.OfflineStatusGetter, uid keybase1.UID, verifyingKey kbfscrypto.VerifyingKey) (bool, error) { h := md.GetTlfHandle() return IsWriterFromHandle(ctx, h, checker, osg, uid, verifyingKey) }
[ "func", "(", "md", "*", "RootMetadata", ")", "IsWriter", "(", "ctx", "context", ".", "Context", ",", "checker", "kbfsmd", ".", "TeamMembershipChecker", ",", "osg", "idutil", ".", "OfflineStatusGetter", ",", "uid", "keybase1", ".", "UID", ",", "verifyingKey", ...
// IsWriter checks that the given user is a valid writer of the TLF // right now. Implements the KeyMetadata interface for RootMetadata.
[ "IsWriter", "checks", "that", "the", "given", "user", "is", "a", "valid", "writer", "of", "the", "TLF", "right", "now", ".", "Implements", "the", "KeyMetadata", "interface", "for", "RootMetadata", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L917-L923
159,914
keybase/client
go/kbfs/libkbfs/root_metadata.go
IsReader
func (md *RootMetadata) IsReader( ctx context.Context, checker kbfsmd.TeamMembershipChecker, osg idutil.OfflineStatusGetter, uid keybase1.UID) (bool, error) { h := md.GetTlfHandle() return isReaderFromHandle(ctx, h, checker, osg, uid) }
go
func (md *RootMetadata) IsReader( ctx context.Context, checker kbfsmd.TeamMembershipChecker, osg idutil.OfflineStatusGetter, uid keybase1.UID) (bool, error) { h := md.GetTlfHandle() return isReaderFromHandle(ctx, h, checker, osg, uid) }
[ "func", "(", "md", "*", "RootMetadata", ")", "IsReader", "(", "ctx", "context", ".", "Context", ",", "checker", "kbfsmd", ".", "TeamMembershipChecker", ",", "osg", "idutil", ".", "OfflineStatusGetter", ",", "uid", "keybase1", ".", "UID", ")", "(", "bool", ...
// IsReader checks that the given user is a valid reader of the TLF // right now.
[ "IsReader", "checks", "that", "the", "given", "user", "is", "a", "valid", "reader", "of", "the", "TLF", "right", "now", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L927-L932
159,915
keybase/client
go/kbfs/libkbfs/root_metadata.go
CheckValidSuccessor
func (md ReadOnlyRootMetadata) CheckValidSuccessor( currID kbfsmd.ID, nextMd ReadOnlyRootMetadata) error { return md.bareMd.CheckValidSuccessor(currID, nextMd.bareMd) }
go
func (md ReadOnlyRootMetadata) CheckValidSuccessor( currID kbfsmd.ID, nextMd ReadOnlyRootMetadata) error { return md.bareMd.CheckValidSuccessor(currID, nextMd.bareMd) }
[ "func", "(", "md", "ReadOnlyRootMetadata", ")", "CheckValidSuccessor", "(", "currID", "kbfsmd", ".", "ID", ",", "nextMd", "ReadOnlyRootMetadata", ")", "error", "{", "return", "md", ".", "bareMd", ".", "CheckValidSuccessor", "(", "currID", ",", "nextMd", ".", "...
// CheckValidSuccessor makes sure the given ReadOnlyRootMetadata is a // valid successor to the current one, and returns an error otherwise.
[ "CheckValidSuccessor", "makes", "sure", "the", "given", "ReadOnlyRootMetadata", "is", "a", "valid", "successor", "to", "the", "current", "one", "and", "returns", "an", "error", "otherwise", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L951-L954
159,916
keybase/client
go/kbfs/libkbfs/root_metadata.go
MakeImmutableRootMetadata
func MakeImmutableRootMetadata( rmd *RootMetadata, writerVerifyingKey kbfscrypto.VerifyingKey, mdID kbfsmd.ID, localTimestamp time.Time, putToServer bool) ImmutableRootMetadata { if writerVerifyingKey == (kbfscrypto.VerifyingKey{}) { panic("zero writerVerifyingKey passed to MakeImmutableRootMetadata") } if mdID == (kbfsmd.ID{}) { panic("zero mdID passed to MakeImmutableRootMetadata") } if localTimestamp.IsZero() { panic("zero localTimestamp passed to MakeImmutableRootMetadata") } if bareMDV2, ok := rmd.bareMd.(*kbfsmd.RootMetadataV2); ok { writerSig := bareMDV2.WriterMetadataSigInfo if writerSig.IsNil() { panic("MDV2 with nil writer signature") } if writerSig.VerifyingKey != writerVerifyingKey { panic(fmt.Sprintf("key mismatch: sig has %s, expected %s", writerSig.VerifyingKey, writerVerifyingKey)) } } return ImmutableRootMetadata{ rmd.ReadOnly(), mdID, writerVerifyingKey, localTimestamp, putToServer} }
go
func MakeImmutableRootMetadata( rmd *RootMetadata, writerVerifyingKey kbfscrypto.VerifyingKey, mdID kbfsmd.ID, localTimestamp time.Time, putToServer bool) ImmutableRootMetadata { if writerVerifyingKey == (kbfscrypto.VerifyingKey{}) { panic("zero writerVerifyingKey passed to MakeImmutableRootMetadata") } if mdID == (kbfsmd.ID{}) { panic("zero mdID passed to MakeImmutableRootMetadata") } if localTimestamp.IsZero() { panic("zero localTimestamp passed to MakeImmutableRootMetadata") } if bareMDV2, ok := rmd.bareMd.(*kbfsmd.RootMetadataV2); ok { writerSig := bareMDV2.WriterMetadataSigInfo if writerSig.IsNil() { panic("MDV2 with nil writer signature") } if writerSig.VerifyingKey != writerVerifyingKey { panic(fmt.Sprintf("key mismatch: sig has %s, expected %s", writerSig.VerifyingKey, writerVerifyingKey)) } } return ImmutableRootMetadata{ rmd.ReadOnly(), mdID, writerVerifyingKey, localTimestamp, putToServer} }
[ "func", "MakeImmutableRootMetadata", "(", "rmd", "*", "RootMetadata", ",", "writerVerifyingKey", "kbfscrypto", ".", "VerifyingKey", ",", "mdID", "kbfsmd", ".", "ID", ",", "localTimestamp", "time", ".", "Time", ",", "putToServer", "bool", ")", "ImmutableRootMetadata"...
// MakeImmutableRootMetadata makes a new ImmutableRootMetadata from // the given RMD and its corresponding MdID.
[ "MakeImmutableRootMetadata", "makes", "a", "new", "ImmutableRootMetadata", "from", "the", "given", "RMD", "and", "its", "corresponding", "MdID", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/root_metadata.go#L989-L1014
159,917
keybase/client
go/kbfs/libdokan/reclaim_quota_file.go
WriteFile
func (f *ReclaimQuotaFile) WriteFile(ctx context.Context, fi *dokan.FileInfo, bs []byte, offset int64) (n int, err error) { f.folder.fs.logEnter(ctx, "ReclaimQuotaFile Write") defer func() { f.folder.reportErr(ctx, libkbfs.WriteMode, err) }() if len(bs) == 0 { return 0, nil } err = libkbfs.ForceQuotaReclamationForTesting( f.folder.fs.config, f.folder.getFolderBranch()) return len(bs), err }
go
func (f *ReclaimQuotaFile) WriteFile(ctx context.Context, fi *dokan.FileInfo, bs []byte, offset int64) (n int, err error) { f.folder.fs.logEnter(ctx, "ReclaimQuotaFile Write") defer func() { f.folder.reportErr(ctx, libkbfs.WriteMode, err) }() if len(bs) == 0 { return 0, nil } err = libkbfs.ForceQuotaReclamationForTesting( f.folder.fs.config, f.folder.getFolderBranch()) return len(bs), err }
[ "func", "(", "f", "*", "ReclaimQuotaFile", ")", "WriteFile", "(", "ctx", "context", ".", "Context", ",", "fi", "*", "dokan", ".", "FileInfo", ",", "bs", "[", "]", "byte", ",", "offset", "int64", ")", "(", "n", "int", ",", "err", "error", ")", "{", ...
// WriteFile implements writes for dokan. Note a write triggers quota // reclamation, but does not wait for it to finish. If you want to // wait, write to SyncFromServerFileName.
[ "WriteFile", "implements", "writes", "for", "dokan", ".", "Note", "a", "write", "triggers", "quota", "reclamation", "but", "does", "not", "wait", "for", "it", "to", "finish", ".", "If", "you", "want", "to", "wait", "write", "to", "SyncFromServerFileName", "....
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/reclaim_quota_file.go#L23-L32
159,918
keybase/client
go/teams/transactions.go
findPayload
func (tx *AddMemberTx) findPayload(tag txPayloadTag, forUID keybase1.UID) interface{} { minSeqno := 0 hasUID := !forUID.IsNil() if hasUID { minSeqno = tx.lastChangeForUID[forUID] } for i, v := range tx.payloads { if i >= minSeqno && v.Tag == tag { if hasUID && i > minSeqno { tx.lastChangeForUID[forUID] = i } return v.Val } } if hasUID { tx.lastChangeForUID[forUID] = len(tx.payloads) } ret := txPayload{ Tag: tag, } switch tag { case txPayloadTagCryptomembers: ret.Val = &keybase1.TeamChangeReq{} case txPayloadTagInviteKeybase, txPayloadTagInviteSocial: ret.Val = &SCTeamInvites{} default: panic(fmt.Sprintf("Unexpected tag %q", tag)) } tx.payloads = append(tx.payloads, ret) return ret.Val }
go
func (tx *AddMemberTx) findPayload(tag txPayloadTag, forUID keybase1.UID) interface{} { minSeqno := 0 hasUID := !forUID.IsNil() if hasUID { minSeqno = tx.lastChangeForUID[forUID] } for i, v := range tx.payloads { if i >= minSeqno && v.Tag == tag { if hasUID && i > minSeqno { tx.lastChangeForUID[forUID] = i } return v.Val } } if hasUID { tx.lastChangeForUID[forUID] = len(tx.payloads) } ret := txPayload{ Tag: tag, } switch tag { case txPayloadTagCryptomembers: ret.Val = &keybase1.TeamChangeReq{} case txPayloadTagInviteKeybase, txPayloadTagInviteSocial: ret.Val = &SCTeamInvites{} default: panic(fmt.Sprintf("Unexpected tag %q", tag)) } tx.payloads = append(tx.payloads, ret) return ret.Val }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "findPayload", "(", "tag", "txPayloadTag", ",", "forUID", "keybase1", ".", "UID", ")", "interface", "{", "}", "{", "minSeqno", ":=", "0", "\n", "hasUID", ":=", "!", "forUID", ".", "IsNil", "(", ")", "\n", "...
// Internal AddMemberTx methods. They should not be used by consumers // of AddMemberTx API. Users of this API should avoid lowercase // methods and fields at all cost, even from same package.
[ "Internal", "AddMemberTx", "methods", ".", "They", "should", "not", "be", "used", "by", "consumers", "of", "AddMemberTx", "API", ".", "Users", "of", "this", "API", "should", "avoid", "lowercase", "methods", "and", "fields", "at", "all", "cost", "even", "from...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L75-L107
159,919
keybase/client
go/teams/transactions.go
removeMember
func (tx *AddMemberTx) removeMember(uv keybase1.UserVersion) { // Precondition: UV is a cryptomember. payload := tx.changeMembershipPayload(uv.Uid) payload.None = append(payload.None, uv) }
go
func (tx *AddMemberTx) removeMember(uv keybase1.UserVersion) { // Precondition: UV is a cryptomember. payload := tx.changeMembershipPayload(uv.Uid) payload.None = append(payload.None, uv) }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "removeMember", "(", "uv", "keybase1", ".", "UserVersion", ")", "{", "// Precondition: UV is a cryptomember.", "payload", ":=", "tx", ".", "changeMembershipPayload", "(", "uv", ".", "Uid", ")", "\n", "payload", ".", ...
// Methods modifying payloads are supposed to always succeed given the // preconditions are satisfied. If not, the usual result is either a // no-op or an invalid transaction that is rejected by team player // pre-check or by the server. Public methods should make sure that // internal methods are always called with these preconditions // satisfied.
[ "Methods", "modifying", "payloads", "are", "supposed", "to", "always", "succeed", "given", "the", "preconditions", "are", "satisfied", ".", "If", "not", "the", "usual", "result", "is", "either", "a", "no", "-", "op", "or", "an", "invalid", "transaction", "th...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L128-L132
159,920
keybase/client
go/teams/transactions.go
createKeybaseInvite
func (tx *AddMemberTx) createKeybaseInvite(uv keybase1.UserVersion, role keybase1.TeamRole) { // Preconditions: UV is a PUKless user, and not already in the // team, role is valid enum value and not NONE or OWNER. tx.createInvite("keybase", uv.TeamInviteName(), role, uv.Uid) }
go
func (tx *AddMemberTx) createKeybaseInvite(uv keybase1.UserVersion, role keybase1.TeamRole) { // Preconditions: UV is a PUKless user, and not already in the // team, role is valid enum value and not NONE or OWNER. tx.createInvite("keybase", uv.TeamInviteName(), role, uv.Uid) }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "createKeybaseInvite", "(", "uv", "keybase1", ".", "UserVersion", ",", "role", "keybase1", ".", "TeamRole", ")", "{", "// Preconditions: UV is a PUKless user, and not already in the", "// team, role is valid enum value and not NONE ...
// createKeybaseInvite queues Keybase-type invite for given UV and role.
[ "createKeybaseInvite", "queues", "Keybase", "-", "type", "invite", "for", "given", "UV", "and", "role", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L160-L164
159,921
keybase/client
go/teams/transactions.go
createInvite
func (tx *AddMemberTx) createInvite(typ string, name keybase1.TeamInviteName, role keybase1.TeamRole, uid keybase1.UID) { var payload *SCTeamInvites if typ == "keybase" { payload = tx.inviteKeybasePayload(uid) } else { payload = tx.inviteSocialPayload(uid) } invite := SCTeamInvite{ Type: typ, Name: name, ID: NewInviteID(), } switch role { case keybase1.TeamRole_READER: payload.Readers = appendToInviteList(invite, payload.Readers) case keybase1.TeamRole_WRITER: payload.Writers = appendToInviteList(invite, payload.Writers) case keybase1.TeamRole_ADMIN: payload.Admins = appendToInviteList(invite, payload.Admins) case keybase1.TeamRole_OWNER: payload.Owners = appendToInviteList(invite, payload.Owners) } }
go
func (tx *AddMemberTx) createInvite(typ string, name keybase1.TeamInviteName, role keybase1.TeamRole, uid keybase1.UID) { var payload *SCTeamInvites if typ == "keybase" { payload = tx.inviteKeybasePayload(uid) } else { payload = tx.inviteSocialPayload(uid) } invite := SCTeamInvite{ Type: typ, Name: name, ID: NewInviteID(), } switch role { case keybase1.TeamRole_READER: payload.Readers = appendToInviteList(invite, payload.Readers) case keybase1.TeamRole_WRITER: payload.Writers = appendToInviteList(invite, payload.Writers) case keybase1.TeamRole_ADMIN: payload.Admins = appendToInviteList(invite, payload.Admins) case keybase1.TeamRole_OWNER: payload.Owners = appendToInviteList(invite, payload.Owners) } }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "createInvite", "(", "typ", "string", ",", "name", "keybase1", ".", "TeamInviteName", ",", "role", "keybase1", ".", "TeamRole", ",", "uid", "keybase1", ".", "UID", ")", "{", "var", "payload", "*", "SCTeamInvites"...
// createInvite queues an invite for invite name with role.
[ "createInvite", "queues", "an", "invite", "for", "invite", "name", "with", "role", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L167-L191
159,922
keybase/client
go/teams/transactions.go
sweepCryptoMembers
func (tx *AddMemberTx) sweepCryptoMembers(ctx context.Context, uid keybase1.UID, exceptAdminsRemovingOwners bool) { team := tx.team var myRole keybase1.TeamRole if exceptAdminsRemovingOwners { var err error myRole, err = tx.team.myRole(ctx) if err != nil { myRole = keybase1.TeamRole_NONE } } for chainUv := range team.chain().inner.UserLog { chainRole := team.chain().getUserRole(chainUv) if chainUv.Uid.Equal(uid) && chainRole != keybase1.TeamRole_NONE { if exceptAdminsRemovingOwners && myRole == keybase1.TeamRole_ADMIN && chainRole == keybase1.TeamRole_OWNER { // Skip if we're an admin and they're an owner. continue } tx.removeMember(chainUv) } } }
go
func (tx *AddMemberTx) sweepCryptoMembers(ctx context.Context, uid keybase1.UID, exceptAdminsRemovingOwners bool) { team := tx.team var myRole keybase1.TeamRole if exceptAdminsRemovingOwners { var err error myRole, err = tx.team.myRole(ctx) if err != nil { myRole = keybase1.TeamRole_NONE } } for chainUv := range team.chain().inner.UserLog { chainRole := team.chain().getUserRole(chainUv) if chainUv.Uid.Equal(uid) && chainRole != keybase1.TeamRole_NONE { if exceptAdminsRemovingOwners && myRole == keybase1.TeamRole_ADMIN && chainRole == keybase1.TeamRole_OWNER { // Skip if we're an admin and they're an owner. continue } tx.removeMember(chainUv) } } }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "sweepCryptoMembers", "(", "ctx", "context", ".", "Context", ",", "uid", "keybase1", ".", "UID", ",", "exceptAdminsRemovingOwners", "bool", ")", "{", "team", ":=", "tx", ".", "team", "\n", "var", "myRole", "keyba...
// sweepCryptoMembers will queue "removes" for all cryptomembers with given UID. // exceptAdminsRemovingOwners - But don't try to remove owners if we are admin.
[ "sweepCryptoMembers", "will", "queue", "removes", "for", "all", "cryptomembers", "with", "given", "UID", ".", "exceptAdminsRemovingOwners", "-", "But", "don", "t", "try", "to", "remove", "owners", "if", "we", "are", "admin", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L195-L216
159,923
keybase/client
go/teams/transactions.go
sweepCryptoMembersOlderThan
func (tx *AddMemberTx) sweepCryptoMembersOlderThan(uv keybase1.UserVersion) { team := tx.team for chainUv := range team.chain().inner.UserLog { if chainUv.Uid.Equal(uv.Uid) && chainUv.EldestSeqno < uv.EldestSeqno && team.chain().getUserRole(chainUv) != keybase1.TeamRole_NONE { tx.removeMember(chainUv) } } }
go
func (tx *AddMemberTx) sweepCryptoMembersOlderThan(uv keybase1.UserVersion) { team := tx.team for chainUv := range team.chain().inner.UserLog { if chainUv.Uid.Equal(uv.Uid) && chainUv.EldestSeqno < uv.EldestSeqno && team.chain().getUserRole(chainUv) != keybase1.TeamRole_NONE { tx.removeMember(chainUv) } } }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "sweepCryptoMembersOlderThan", "(", "uv", "keybase1", ".", "UserVersion", ")", "{", "team", ":=", "tx", ".", "team", "\n", "for", "chainUv", ":=", "range", "team", ".", "chain", "(", ")", ".", "inner", ".", "...
// sweepCryptoMembersOlderThan will queue "removes" for all cryptomembers // with same UID as given and EldestSeqno lower than in given UV.
[ "sweepCryptoMembersOlderThan", "will", "queue", "removes", "for", "all", "cryptomembers", "with", "same", "UID", "as", "given", "and", "EldestSeqno", "lower", "than", "in", "given", "UV", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L220-L229
159,924
keybase/client
go/teams/transactions.go
AddMemberByUsername
func (tx *AddMemberTx) AddMemberByUsername(ctx context.Context, username string, role keybase1.TeamRole) (err error) { team := tx.team g := team.G() m := libkb.NewMetaContext(ctx, g) defer m.Trace(fmt.Sprintf("AddMemberTx.AddMemberByUsername(%s,%v) to team %q", username, role, team.Name()), func() error { return err })() upak, err := engine.ResolveAndCheck(m, username, true /* useTracking */) if err != nil { return err } _, err = tx.addMemberByUPKV2(ctx, upak, role) return err }
go
func (tx *AddMemberTx) AddMemberByUsername(ctx context.Context, username string, role keybase1.TeamRole) (err error) { team := tx.team g := team.G() m := libkb.NewMetaContext(ctx, g) defer m.Trace(fmt.Sprintf("AddMemberTx.AddMemberByUsername(%s,%v) to team %q", username, role, team.Name()), func() error { return err })() upak, err := engine.ResolveAndCheck(m, username, true /* useTracking */) if err != nil { return err } _, err = tx.addMemberByUPKV2(ctx, upak, role) return err }
[ "func", "(", "tx", "*", "AddMemberTx", ")", "AddMemberByUsername", "(", "ctx", "context", ".", "Context", ",", "username", "string", ",", "role", "keybase1", ".", "TeamRole", ")", "(", "err", "error", ")", "{", "team", ":=", "tx", ".", "team", "\n", "g...
// AddMemberByUsername will add member by username and role. It // checks if given username can become crypto member or a PUKless // member. It will also clean up old invites and memberships if // necessary.
[ "AddMemberByUsername", "will", "add", "member", "by", "username", "and", "role", ".", "It", "checks", "if", "given", "username", "can", "become", "crypto", "member", "or", "a", "PUKless", "member", ".", "It", "will", "also", "clean", "up", "old", "invites", ...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/transactions.go#L405-L418
159,925
keybase/client
go/teams/nonce.go
newNonce24
func newNonce24() (*nonce24, error) { prefix, err := libkb.RandBytes(20) if err != nil { return nil, err } return &nonce24{prefix: prefix}, nil }
go
func newNonce24() (*nonce24, error) { prefix, err := libkb.RandBytes(20) if err != nil { return nil, err } return &nonce24{prefix: prefix}, nil }
[ "func", "newNonce24", "(", ")", "(", "*", "nonce24", ",", "error", ")", "{", "prefix", ",", "err", ":=", "libkb", ".", "RandBytes", "(", "20", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", ...
// newNonce24 creates a nonce with a random 20 byte prefix and // a counter starting at 0.
[ "newNonce24", "creates", "a", "nonce", "with", "a", "random", "20", "byte", "prefix", "and", "a", "counter", "starting", "at", "0", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L21-L27
159,926
keybase/client
go/teams/nonce.go
newNonce24SkipZero
func newNonce24SkipZero() (*nonce24, error) { n, err := newNonce24() if err != nil { return nil, err } n.counter = 1 return n, nil }
go
func newNonce24SkipZero() (*nonce24, error) { n, err := newNonce24() if err != nil { return nil, err } n.counter = 1 return n, nil }
[ "func", "newNonce24SkipZero", "(", ")", "(", "*", "nonce24", ",", "error", ")", "{", "n", ",", "err", ":=", "newNonce24", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "n", ".", "counter", "=", "1", ...
// newNonce24 creates a nonce with a random 20 byte prefix and // a counter starting at 1.
[ "newNonce24", "creates", "a", "nonce", "with", "a", "random", "20", "byte", "prefix", "and", "a", "counter", "starting", "at", "1", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L31-L38
159,927
keybase/client
go/teams/nonce.go
Nonce
func (n *nonce24) Nonce() ([24]byte, uint32) { var nonce [24]byte copy(nonce[:20], n.prefix) copy(nonce[20:24], n.counterBytes()) counter := n.counter n.counter++ return nonce, counter }
go
func (n *nonce24) Nonce() ([24]byte, uint32) { var nonce [24]byte copy(nonce[:20], n.prefix) copy(nonce[20:24], n.counterBytes()) counter := n.counter n.counter++ return nonce, counter }
[ "func", "(", "n", "*", "nonce24", ")", "Nonce", "(", ")", "(", "[", "24", "]", "byte", ",", "uint32", ")", "{", "var", "nonce", "[", "24", "]", "byte", "\n", "copy", "(", "nonce", "[", ":", "20", "]", ",", "n", ".", "prefix", ")", "\n", "co...
// Nonce gets the 24 byte nonce prefix + counter and increments // the counter so that the nonce isn't reused.
[ "Nonce", "gets", "the", "24", "byte", "nonce", "prefix", "+", "counter", "and", "increments", "the", "counter", "so", "that", "the", "nonce", "isn", "t", "reused", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/nonce.go#L42-L49
159,928
keybase/client
go/kbfs/libdokan/file_info_file.go
NewFileInfoFile
func NewFileInfoFile( fs *FS, dir libkbfs.Node, name string) *SpecialReadFile { return &SpecialReadFile{ read: func(ctx context.Context) ([]byte, time.Time, error) { return libfs.GetFileInfo(ctx, fs.config, dir, name) }, fs: fs, } }
go
func NewFileInfoFile( fs *FS, dir libkbfs.Node, name string) *SpecialReadFile { return &SpecialReadFile{ read: func(ctx context.Context) ([]byte, time.Time, error) { return libfs.GetFileInfo(ctx, fs.config, dir, name) }, fs: fs, } }
[ "func", "NewFileInfoFile", "(", "fs", "*", "FS", ",", "dir", "libkbfs", ".", "Node", ",", "name", "string", ")", "*", "SpecialReadFile", "{", "return", "&", "SpecialReadFile", "{", "read", ":", "func", "(", "ctx", "context", ".", "Context", ")", "(", "...
// NewFileInfoFile returns a special file that contains a text // representation of a file's KBFS metadata.
[ "NewFileInfoFile", "returns", "a", "special", "file", "that", "contains", "a", "text", "representation", "of", "a", "file", "s", "KBFS", "metadata", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libdokan/file_info_file.go#L17-L25
159,929
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
NewKeybaseServiceBase
func NewKeybaseServiceBase(config Config, kbCtx Context, log logger.Logger) *KeybaseServiceBase { k := KeybaseServiceBase{ config: config, context: kbCtx, log: log, userCache: make(map[keybase1.UID]idutil.UserInfo), userCacheUnverifiedKeys: make(map[keybase1.UID][]keybase1.PublicKey), teamCache: make(map[keybase1.TeamID]idutil.TeamInfo), } if config != nil { k.merkleRoot = NewEventuallyConsistentMerkleRoot( config, &keybaseServiceMerkleGetter{&k}) } return &k }
go
func NewKeybaseServiceBase(config Config, kbCtx Context, log logger.Logger) *KeybaseServiceBase { k := KeybaseServiceBase{ config: config, context: kbCtx, log: log, userCache: make(map[keybase1.UID]idutil.UserInfo), userCacheUnverifiedKeys: make(map[keybase1.UID][]keybase1.PublicKey), teamCache: make(map[keybase1.TeamID]idutil.TeamInfo), } if config != nil { k.merkleRoot = NewEventuallyConsistentMerkleRoot( config, &keybaseServiceMerkleGetter{&k}) } return &k }
[ "func", "NewKeybaseServiceBase", "(", "config", "Config", ",", "kbCtx", "Context", ",", "log", "logger", ".", "Logger", ")", "*", "KeybaseServiceBase", "{", "k", ":=", "KeybaseServiceBase", "{", "config", ":", "config", ",", "context", ":", "kbCtx", ",", "lo...
// NewKeybaseServiceBase makes a new KeybaseService.
[ "NewKeybaseServiceBase", "makes", "a", "new", "KeybaseService", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L85-L99
159,930
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FillClients
func (k *KeybaseServiceBase) FillClients( identifyClient keybase1.IdentifyInterface, userClient keybase1.UserInterface, teamsClient keybase1.TeamsInterface, merkleClient keybase1.MerkleInterface, sessionClient keybase1.SessionInterface, favoriteClient keybase1.FavoriteInterface, kbfsClient keybase1.KbfsInterface, kbfsMountClient keybase1.KbfsMountInterface, gitClient keybase1.GitInterface) { k.identifyClient = identifyClient k.userClient = userClient k.teamsClient = teamsClient k.merkleClient = merkleClient k.sessionClient = sessionClient k.favoriteClient = favoriteClient k.kbfsClient = kbfsClient k.kbfsMountClient = kbfsMountClient k.gitClient = gitClient }
go
func (k *KeybaseServiceBase) FillClients( identifyClient keybase1.IdentifyInterface, userClient keybase1.UserInterface, teamsClient keybase1.TeamsInterface, merkleClient keybase1.MerkleInterface, sessionClient keybase1.SessionInterface, favoriteClient keybase1.FavoriteInterface, kbfsClient keybase1.KbfsInterface, kbfsMountClient keybase1.KbfsMountInterface, gitClient keybase1.GitInterface) { k.identifyClient = identifyClient k.userClient = userClient k.teamsClient = teamsClient k.merkleClient = merkleClient k.sessionClient = sessionClient k.favoriteClient = favoriteClient k.kbfsClient = kbfsClient k.kbfsMountClient = kbfsMountClient k.gitClient = gitClient }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FillClients", "(", "identifyClient", "keybase1", ".", "IdentifyInterface", ",", "userClient", "keybase1", ".", "UserInterface", ",", "teamsClient", "keybase1", ".", "TeamsInterface", ",", "merkleClient", "keybase1", ...
// FillClients sets the client protocol implementations needed for a KeybaseService.
[ "FillClients", "sets", "the", "client", "protocol", "implementations", "needed", "for", "a", "KeybaseService", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L102-L120
159,931
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
updateKIDNamesFromParents
func updateKIDNamesFromParents(kidNames map[keybase1.KID]string, parents map[keybase1.KID]keybase1.KID) { for kid, parent := range parents { if _, ok := kidNames[kid]; ok { continue } if parentName, ok := kidNames[parent]; ok { kidNames[kid] = parentName } } }
go
func updateKIDNamesFromParents(kidNames map[keybase1.KID]string, parents map[keybase1.KID]keybase1.KID) { for kid, parent := range parents { if _, ok := kidNames[kid]; ok { continue } if parentName, ok := kidNames[parent]; ok { kidNames[kid] = parentName } } }
[ "func", "updateKIDNamesFromParents", "(", "kidNames", "map", "[", "keybase1", ".", "KID", "]", "string", ",", "parents", "map", "[", "keybase1", ".", "KID", "]", "keybase1", ".", "KID", ")", "{", "for", "kid", ",", "parent", ":=", "range", "parents", "{"...
// updateKIDNamesFromParents sets the name of each KID without a name // that has a a parent with a name, to that parent's name.
[ "updateKIDNamesFromParents", "sets", "the", "name", "of", "each", "KID", "without", "a", "name", "that", "has", "a", "a", "parent", "with", "a", "name", "to", "that", "parent", "s", "name", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L155-L165
159,932
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
ClearCaches
func (k *KeybaseServiceBase) ClearCaches(ctx context.Context) { k.log.CDebugf(ctx, "Clearing KBFS-side user and team caches") k.setCachedCurrentSession(idutil.SessionInfo{}) func() { k.userCacheLock.Lock() defer k.userCacheLock.Unlock() k.userCache = make(map[keybase1.UID]idutil.UserInfo) k.userCacheUnverifiedKeys = make(map[keybase1.UID][]keybase1.PublicKey) }() k.teamCacheLock.Lock() defer k.teamCacheLock.Unlock() k.teamCache = make(map[keybase1.TeamID]idutil.TeamInfo) }
go
func (k *KeybaseServiceBase) ClearCaches(ctx context.Context) { k.log.CDebugf(ctx, "Clearing KBFS-side user and team caches") k.setCachedCurrentSession(idutil.SessionInfo{}) func() { k.userCacheLock.Lock() defer k.userCacheLock.Unlock() k.userCache = make(map[keybase1.UID]idutil.UserInfo) k.userCacheUnverifiedKeys = make(map[keybase1.UID][]keybase1.PublicKey) }() k.teamCacheLock.Lock() defer k.teamCacheLock.Unlock() k.teamCache = make(map[keybase1.TeamID]idutil.TeamInfo) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "ClearCaches", "(", "ctx", "context", ".", "Context", ")", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ")", "\n\n", "k", ".", "setCachedCurrentSession", "(", "idutil", ".", "Sessi...
// ClearCaches implements the KeybaseService interface for // KeybaseServiceBase.
[ "ClearCaches", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L321-L334
159,933
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
LoggedIn
func (k *KeybaseServiceBase) LoggedIn(ctx context.Context, name string) error { k.log.CDebugf(ctx, "Current session logged in: %s", name) // Since we don't have the whole session, just clear the cache and // repopulate it. The `CurrentSession` call executes the "logged // in" flow. k.setCachedCurrentSession(idutil.SessionInfo{}) const sessionID = 0 _, err := k.CurrentSession(ctx, sessionID) if err != nil { k.log.CDebugf(ctx, "Getting current session failed when %s is logged "+ "in, so pretending user has logged out: %v", name, err) if k.config != nil { serviceLoggedOut(ctx, k.config) } return nil } return nil }
go
func (k *KeybaseServiceBase) LoggedIn(ctx context.Context, name string) error { k.log.CDebugf(ctx, "Current session logged in: %s", name) // Since we don't have the whole session, just clear the cache and // repopulate it. The `CurrentSession` call executes the "logged // in" flow. k.setCachedCurrentSession(idutil.SessionInfo{}) const sessionID = 0 _, err := k.CurrentSession(ctx, sessionID) if err != nil { k.log.CDebugf(ctx, "Getting current session failed when %s is logged "+ "in, so pretending user has logged out: %v", name, err) if k.config != nil { serviceLoggedOut(ctx, k.config) } return nil } return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "LoggedIn", "(", "ctx", "context", ".", "Context", ",", "name", "string", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "name", ")", "\n", "// Since we don't have...
// LoggedIn implements keybase1.NotifySessionInterface.
[ "LoggedIn", "implements", "keybase1", ".", "NotifySessionInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L337-L356
159,934
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
LoggedOut
func (k *KeybaseServiceBase) LoggedOut(ctx context.Context) error { k.log.CDebugf(ctx, "Current session logged out") k.setCachedCurrentSession(idutil.SessionInfo{}) if k.config != nil { serviceLoggedOut(ctx, k.config) } return nil }
go
func (k *KeybaseServiceBase) LoggedOut(ctx context.Context) error { k.log.CDebugf(ctx, "Current session logged out") k.setCachedCurrentSession(idutil.SessionInfo{}) if k.config != nil { serviceLoggedOut(ctx, k.config) } return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "LoggedOut", "(", "ctx", "context", ".", "Context", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ")", "\n", "k", ".", "setCachedCurrentSession", "(", "idutil", ".", ...
// LoggedOut implements keybase1.NotifySessionInterface.
[ "LoggedOut", "implements", "keybase1", ".", "NotifySessionInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L359-L366
159,935
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
KeyfamilyChanged
func (k *KeybaseServiceBase) KeyfamilyChanged(ctx context.Context, uid keybase1.UID) error { k.log.CDebugf(ctx, "Key family for user %s changed", uid) k.setCachedUserInfo(uid, idutil.UserInfo{}) k.clearCachedUnverifiedKeys(uid) if k.getCachedCurrentSession().UID == uid { mdServer := k.config.MDServer() if mdServer != nil { // Ignore any errors for now, we don't want to block this // notification and it's not worth spawning a goroutine for. mdServer.CheckForRekeys(context.Background()) } } return nil }
go
func (k *KeybaseServiceBase) KeyfamilyChanged(ctx context.Context, uid keybase1.UID) error { k.log.CDebugf(ctx, "Key family for user %s changed", uid) k.setCachedUserInfo(uid, idutil.UserInfo{}) k.clearCachedUnverifiedKeys(uid) if k.getCachedCurrentSession().UID == uid { mdServer := k.config.MDServer() if mdServer != nil { // Ignore any errors for now, we don't want to block this // notification and it's not worth spawning a goroutine for. mdServer.CheckForRekeys(context.Background()) } } return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "KeyfamilyChanged", "(", "ctx", "context", ".", "Context", ",", "uid", "keybase1", ".", "UID", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "uid", ")", "\n", ...
// KeyfamilyChanged implements keybase1.NotifyKeyfamilyInterface.
[ "KeyfamilyChanged", "implements", "keybase1", ".", "NotifyKeyfamilyInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L369-L385
159,936
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
ReachabilityChanged
func (k *KeybaseServiceBase) ReachabilityChanged(ctx context.Context, reachability keybase1.Reachability) error { k.log.CDebugf(ctx, "CheckReachability invoked: %v", reachability) if reachability.Reachable == keybase1.Reachable_YES { k.config.KBFSOps().PushConnectionStatusChange(GregorServiceName, nil) } else { k.config.KBFSOps().PushConnectionStatusChange( GregorServiceName, errDisconnected{}) } mdServer := k.config.MDServer() if mdServer != nil { mdServer.CheckReachability(ctx) } return nil }
go
func (k *KeybaseServiceBase) ReachabilityChanged(ctx context.Context, reachability keybase1.Reachability) error { k.log.CDebugf(ctx, "CheckReachability invoked: %v", reachability) if reachability.Reachable == keybase1.Reachable_YES { k.config.KBFSOps().PushConnectionStatusChange(GregorServiceName, nil) } else { k.config.KBFSOps().PushConnectionStatusChange( GregorServiceName, errDisconnected{}) } mdServer := k.config.MDServer() if mdServer != nil { mdServer.CheckReachability(ctx) } return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "ReachabilityChanged", "(", "ctx", "context", ".", "Context", ",", "reachability", "keybase1", ".", "Reachability", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "r...
// ReachabilityChanged implements keybase1.ReachabiltyInterface.
[ "ReachabilityChanged", "implements", "keybase1", ".", "ReachabiltyInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L388-L402
159,937
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
StartReachability
func (k *KeybaseServiceBase) StartReachability(ctx context.Context) (res keybase1.Reachability, err error) { return k.CheckReachability(ctx) }
go
func (k *KeybaseServiceBase) StartReachability(ctx context.Context) (res keybase1.Reachability, err error) { return k.CheckReachability(ctx) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "StartReachability", "(", "ctx", "context", ".", "Context", ")", "(", "res", "keybase1", ".", "Reachability", ",", "err", "error", ")", "{", "return", "k", ".", "CheckReachability", "(", "ctx", ")", "\n", ...
// StartReachability implements keybase1.ReachabilityInterface.
[ "StartReachability", "implements", "keybase1", ".", "ReachabilityInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L405-L407
159,938
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
CheckReachability
func (k *KeybaseServiceBase) CheckReachability(ctx context.Context) (res keybase1.Reachability, err error) { res.Reachable = keybase1.Reachable_NO mdServer := k.config.MDServer() if mdServer != nil && mdServer.IsConnected() { res.Reachable = keybase1.Reachable_YES } return res, nil }
go
func (k *KeybaseServiceBase) CheckReachability(ctx context.Context) (res keybase1.Reachability, err error) { res.Reachable = keybase1.Reachable_NO mdServer := k.config.MDServer() if mdServer != nil && mdServer.IsConnected() { res.Reachable = keybase1.Reachable_YES } return res, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "CheckReachability", "(", "ctx", "context", ".", "Context", ")", "(", "res", "keybase1", ".", "Reachability", ",", "err", "error", ")", "{", "res", ".", "Reachable", "=", "keybase1", ".", "Reachable_NO", "\...
// CheckReachability implements keybase1.ReachabilityInterface.
[ "CheckReachability", "implements", "keybase1", ".", "ReachabilityInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L410-L417
159,939
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
PaperKeyCached
func (k *KeybaseServiceBase) PaperKeyCached(ctx context.Context, arg keybase1.PaperKeyCachedArg) error { k.log.CDebugf(ctx, "Paper key for %s cached", arg.Uid) if k.getCachedCurrentSession().UID == arg.Uid { err := k.config.KBFSOps().KickoffAllOutstandingRekeys() if err != nil { // Ignore and log errors here. For now the only way it could error // is when the method is called on a folderBranchOps which is a // developer mistake and not recoverable from code. k.log.CDebugf(ctx, "Calling KickoffAllOutstandingRekeys error: %s", err) } // Ignore any errors for now, we don't want to block this // notification and it's not worth spawning a goroutine for. mdServer := k.config.MDServer() if mdServer != nil { mdServer.CheckForRekeys(context.Background()) } } return nil }
go
func (k *KeybaseServiceBase) PaperKeyCached(ctx context.Context, arg keybase1.PaperKeyCachedArg) error { k.log.CDebugf(ctx, "Paper key for %s cached", arg.Uid) if k.getCachedCurrentSession().UID == arg.Uid { err := k.config.KBFSOps().KickoffAllOutstandingRekeys() if err != nil { // Ignore and log errors here. For now the only way it could error // is when the method is called on a folderBranchOps which is a // developer mistake and not recoverable from code. k.log.CDebugf(ctx, "Calling KickoffAllOutstandingRekeys error: %s", err) } // Ignore any errors for now, we don't want to block this // notification and it's not worth spawning a goroutine for. mdServer := k.config.MDServer() if mdServer != nil { mdServer.CheckForRekeys(context.Background()) } } return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "PaperKeyCached", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "PaperKeyCachedArg", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "arg", "....
// PaperKeyCached implements keybase1.NotifyPaperKeyInterface.
[ "PaperKeyCached", "implements", "keybase1", ".", "NotifyPaperKeyInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L420-L442
159,940
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
ClientOutOfDate
func (k *KeybaseServiceBase) ClientOutOfDate(ctx context.Context, arg keybase1.ClientOutOfDateArg) error { k.log.CDebugf(ctx, "Client out of date: %v", arg) return nil }
go
func (k *KeybaseServiceBase) ClientOutOfDate(ctx context.Context, arg keybase1.ClientOutOfDateArg) error { k.log.CDebugf(ctx, "Client out of date: %v", arg) return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "ClientOutOfDate", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "ClientOutOfDateArg", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "arg", ...
// ClientOutOfDate implements keybase1.NotifySessionInterface.
[ "ClientOutOfDate", "implements", "keybase1", ".", "NotifySessionInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L445-L449
159,941
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
RootAuditError
func (k *KeybaseServiceBase) RootAuditError(ctx context.Context, arg keybase1.RootAuditErrorArg) error { k.log.CDebugf(ctx, "Merkle tree audit error: %v", arg.Message) return nil }
go
func (k *KeybaseServiceBase) RootAuditError(ctx context.Context, arg keybase1.RootAuditErrorArg) error { k.log.CDebugf(ctx, "Merkle tree audit error: %v", arg.Message) return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "RootAuditError", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "RootAuditErrorArg", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "arg", "....
// RootAuditError implements keybase1.NotifyAuditInterface.
[ "RootAuditError", "implements", "keybase1", ".", "NotifyAuditInterface", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L452-L456
159,942
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
ConvertIdentifyError
func ConvertIdentifyError(assertion string, err error) error { switch err.(type) { case libkb.NotFoundError: return idutil.NoSuchUserError{Input: assertion} case libkb.ResolutionError: return idutil.NoSuchUserError{Input: assertion} } return err }
go
func ConvertIdentifyError(assertion string, err error) error { switch err.(type) { case libkb.NotFoundError: return idutil.NoSuchUserError{Input: assertion} case libkb.ResolutionError: return idutil.NoSuchUserError{Input: assertion} } return err }
[ "func", "ConvertIdentifyError", "(", "assertion", "string", ",", "err", "error", ")", "error", "{", "switch", "err", ".", "(", "type", ")", "{", "case", "libkb", ".", "NotFoundError", ":", "return", "idutil", ".", "NoSuchUserError", "{", "Input", ":", "ass...
// ConvertIdentifyError converts a errors during identify into KBFS errors
[ "ConvertIdentifyError", "converts", "a", "errors", "during", "identify", "into", "KBFS", "errors" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L459-L467
159,943
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
Resolve
func (k *KeybaseServiceBase) Resolve( ctx context.Context, assertion string, offline keybase1.OfflineAvailability) ( kbname.NormalizedUsername, keybase1.UserOrTeamID, error) { res, err := k.identifyClient.Resolve3( ctx, keybase1.Resolve3Arg{ Assertion: assertion, Oa: offline, }) if err != nil { return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), ConvertIdentifyError(assertion, err) } return kbname.NewNormalizedUsername(res.Name), res.Id, nil }
go
func (k *KeybaseServiceBase) Resolve( ctx context.Context, assertion string, offline keybase1.OfflineAvailability) ( kbname.NormalizedUsername, keybase1.UserOrTeamID, error) { res, err := k.identifyClient.Resolve3( ctx, keybase1.Resolve3Arg{ Assertion: assertion, Oa: offline, }) if err != nil { return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), ConvertIdentifyError(assertion, err) } return kbname.NewNormalizedUsername(res.Name), res.Id, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "Resolve", "(", "ctx", "context", ".", "Context", ",", "assertion", "string", ",", "offline", "keybase1", ".", "OfflineAvailability", ")", "(", "kbname", ".", "NormalizedUsername", ",", "keybase1", ".", "UserOr...
// Resolve implements the KeybaseService interface for KeybaseServiceBase.
[ "Resolve", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L470-L484
159,944
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
Identify
func (k *KeybaseServiceBase) Identify( ctx context.Context, assertion, reason string, offline keybase1.OfflineAvailability) ( kbname.NormalizedUsername, keybase1.UserOrTeamID, error) { // setting UseDelegateUI to true here will cause daemon to use // registered identify ui providers instead of terminal if any // are available. If not, then it will use the terminal UI. arg := keybase1.IdentifyLiteArg{ Assertion: assertion, UseDelegateUI: true, Reason: keybase1.IdentifyReason{Reason: reason}, // No need to go back and forth with the UI until the service // knows for sure there's a need for a dialogue. CanSuppressUI: true, Oa: offline, } ei := tlfhandle.GetExtendedIdentify(ctx) arg.IdentifyBehavior = ei.Behavior res, err := k.identifyClient.IdentifyLite(ctx, arg) // IdentifyLite still returns keybase1.UserPlusKeys data (sans // keys), even if it gives a NoSigChainError or a UserDeletedError, // and in KBFS it's fine if the user doesn't have a full sigchain // (e.g., it's just like the sharing before signup case, except // the user already has a UID). Both types of users are based // entirely on server trust anyway. switch err.(type) { case nil: case libkb.NoSigChainError, libkb.UserDeletedError: k.log.CDebugf(ctx, "Ignoring error (%s) for user %s with no sigchain; "+ "error type=%T", err, res.Ul.Name, err) ei.OnError(ctx) default: // If the caller is waiting for breaks, let them know we got an error. ei.OnError(ctx) return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), ConvertIdentifyError(assertion, err) } // This is required for every identify call. The userBreak // function will take care of checking if res.TrackBreaks is nil // or not. name := kbname.NormalizedUsername(res.Ul.Name) if res.Ul.Id.IsUser() { asUser, err := res.Ul.Id.AsUser() if err != nil { return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), err } ei.UserBreak(ctx, name, asUser, res.TrackBreaks) } else if !res.Ul.Id.IsNil() { ei.TeamBreak(ctx, res.Ul.Id.AsTeamOrBust(), res.TrackBreaks) } return name, res.Ul.Id, nil }
go
func (k *KeybaseServiceBase) Identify( ctx context.Context, assertion, reason string, offline keybase1.OfflineAvailability) ( kbname.NormalizedUsername, keybase1.UserOrTeamID, error) { // setting UseDelegateUI to true here will cause daemon to use // registered identify ui providers instead of terminal if any // are available. If not, then it will use the terminal UI. arg := keybase1.IdentifyLiteArg{ Assertion: assertion, UseDelegateUI: true, Reason: keybase1.IdentifyReason{Reason: reason}, // No need to go back and forth with the UI until the service // knows for sure there's a need for a dialogue. CanSuppressUI: true, Oa: offline, } ei := tlfhandle.GetExtendedIdentify(ctx) arg.IdentifyBehavior = ei.Behavior res, err := k.identifyClient.IdentifyLite(ctx, arg) // IdentifyLite still returns keybase1.UserPlusKeys data (sans // keys), even if it gives a NoSigChainError or a UserDeletedError, // and in KBFS it's fine if the user doesn't have a full sigchain // (e.g., it's just like the sharing before signup case, except // the user already has a UID). Both types of users are based // entirely on server trust anyway. switch err.(type) { case nil: case libkb.NoSigChainError, libkb.UserDeletedError: k.log.CDebugf(ctx, "Ignoring error (%s) for user %s with no sigchain; "+ "error type=%T", err, res.Ul.Name, err) ei.OnError(ctx) default: // If the caller is waiting for breaks, let them know we got an error. ei.OnError(ctx) return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), ConvertIdentifyError(assertion, err) } // This is required for every identify call. The userBreak // function will take care of checking if res.TrackBreaks is nil // or not. name := kbname.NormalizedUsername(res.Ul.Name) if res.Ul.Id.IsUser() { asUser, err := res.Ul.Id.AsUser() if err != nil { return kbname.NormalizedUsername(""), keybase1.UserOrTeamID(""), err } ei.UserBreak(ctx, name, asUser, res.TrackBreaks) } else if !res.Ul.Id.IsNil() { ei.TeamBreak(ctx, res.Ul.Id.AsTeamOrBust(), res.TrackBreaks) } return name, res.Ul.Id, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "Identify", "(", "ctx", "context", ".", "Context", ",", "assertion", ",", "reason", "string", ",", "offline", "keybase1", ".", "OfflineAvailability", ")", "(", "kbname", ".", "NormalizedUsername", ",", "keybase...
// Identify implements the KeybaseService interface for KeybaseServiceBase.
[ "Identify", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L487-L543
159,945
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
NormalizeSocialAssertion
func (k *KeybaseServiceBase) NormalizeSocialAssertion( ctx context.Context, assertion string) (keybase1.SocialAssertion, error) { return k.identifyClient.NormalizeSocialAssertion(ctx, assertion) }
go
func (k *KeybaseServiceBase) NormalizeSocialAssertion( ctx context.Context, assertion string) (keybase1.SocialAssertion, error) { return k.identifyClient.NormalizeSocialAssertion(ctx, assertion) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "NormalizeSocialAssertion", "(", "ctx", "context", ".", "Context", ",", "assertion", "string", ")", "(", "keybase1", ".", "SocialAssertion", ",", "error", ")", "{", "return", "k", ".", "identifyClient", ".", ...
// NormalizeSocialAssertion implements the KeybaseService interface for // KeybaseServiceBase.
[ "NormalizeSocialAssertion", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L547-L550
159,946
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
ResolveIdentifyImplicitTeam
func (k *KeybaseServiceBase) ResolveIdentifyImplicitTeam( ctx context.Context, assertions, suffix string, tlfType tlf.Type, doIdentifies bool, reason string, offline keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) { if tlfType != tlf.Private && tlfType != tlf.Public { return idutil.ImplicitTeamInfo{}, fmt.Errorf( "Invalid implicit team TLF type: %s", tlfType) } arg := keybase1.ResolveIdentifyImplicitTeamArg{ Assertions: assertions, Suffix: suffix, DoIdentifies: doIdentifies, Reason: keybase1.IdentifyReason{Reason: reason}, Create: true, IsPublic: tlfType == tlf.Public, Oa: offline, } ei := tlfhandle.GetExtendedIdentify(ctx) arg.IdentifyBehavior = ei.Behavior res, err := k.identifyClient.ResolveIdentifyImplicitTeam(ctx, arg) if err != nil { return idutil.ImplicitTeamInfo{}, ConvertIdentifyError(assertions, err) } name := kbname.NormalizedUsername(res.DisplayName) // Exactly one break callback is required for every identify call. if doIdentifies { if len(res.TrackBreaks) > 0 { // Iterate the map to get one entry, then break. for userVer, breaks := range res.TrackBreaks { // TODO: resolve the UID into a username so we don't have to // pass in the full display name here? ei.UserBreak(ctx, name, userVer.Uid, &breaks) break } } else { ei.TeamBreak(ctx, keybase1.TeamID(""), nil) } } iteamInfo := idutil.ImplicitTeamInfo{ Name: name, TID: res.TeamID, } if res.FolderID != "" { iteamInfo.TlfID, err = tlf.ParseID(res.FolderID.String()) if err != nil { return idutil.ImplicitTeamInfo{}, err } } return iteamInfo, nil }
go
func (k *KeybaseServiceBase) ResolveIdentifyImplicitTeam( ctx context.Context, assertions, suffix string, tlfType tlf.Type, doIdentifies bool, reason string, offline keybase1.OfflineAvailability) (idutil.ImplicitTeamInfo, error) { if tlfType != tlf.Private && tlfType != tlf.Public { return idutil.ImplicitTeamInfo{}, fmt.Errorf( "Invalid implicit team TLF type: %s", tlfType) } arg := keybase1.ResolveIdentifyImplicitTeamArg{ Assertions: assertions, Suffix: suffix, DoIdentifies: doIdentifies, Reason: keybase1.IdentifyReason{Reason: reason}, Create: true, IsPublic: tlfType == tlf.Public, Oa: offline, } ei := tlfhandle.GetExtendedIdentify(ctx) arg.IdentifyBehavior = ei.Behavior res, err := k.identifyClient.ResolveIdentifyImplicitTeam(ctx, arg) if err != nil { return idutil.ImplicitTeamInfo{}, ConvertIdentifyError(assertions, err) } name := kbname.NormalizedUsername(res.DisplayName) // Exactly one break callback is required for every identify call. if doIdentifies { if len(res.TrackBreaks) > 0 { // Iterate the map to get one entry, then break. for userVer, breaks := range res.TrackBreaks { // TODO: resolve the UID into a username so we don't have to // pass in the full display name here? ei.UserBreak(ctx, name, userVer.Uid, &breaks) break } } else { ei.TeamBreak(ctx, keybase1.TeamID(""), nil) } } iteamInfo := idutil.ImplicitTeamInfo{ Name: name, TID: res.TeamID, } if res.FolderID != "" { iteamInfo.TlfID, err = tlf.ParseID(res.FolderID.String()) if err != nil { return idutil.ImplicitTeamInfo{}, err } } return iteamInfo, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "ResolveIdentifyImplicitTeam", "(", "ctx", "context", ".", "Context", ",", "assertions", ",", "suffix", "string", ",", "tlfType", "tlf", ".", "Type", ",", "doIdentifies", "bool", ",", "reason", "string", ",", ...
// ResolveIdentifyImplicitTeam implements the KeybaseService interface // for KeybaseServiceBase.
[ "ResolveIdentifyImplicitTeam", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L554-L609
159,947
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
ResolveImplicitTeamByID
func (k *KeybaseServiceBase) ResolveImplicitTeamByID( ctx context.Context, teamID keybase1.TeamID) (name string, err error) { arg := keybase1.ResolveImplicitTeamArg{ Id: teamID, } res, err := k.identifyClient.ResolveImplicitTeam(ctx, arg) if err != nil { return "", err } return res.Name, nil }
go
func (k *KeybaseServiceBase) ResolveImplicitTeamByID( ctx context.Context, teamID keybase1.TeamID) (name string, err error) { arg := keybase1.ResolveImplicitTeamArg{ Id: teamID, } res, err := k.identifyClient.ResolveImplicitTeam(ctx, arg) if err != nil { return "", err } return res.Name, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "ResolveImplicitTeamByID", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ")", "(", "name", "string", ",", "err", "error", ")", "{", "arg", ":=", "keybase1", ".", "ResolveI...
// ResolveImplicitTeamByID implements the KeybaseService interface for // KeybaseServiceBase.
[ "ResolveImplicitTeamByID", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L613-L624
159,948
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
LoadUserPlusKeys
func (k *KeybaseServiceBase) LoadUserPlusKeys( ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID, offline keybase1.OfflineAvailability) (idutil.UserInfo, error) { cachedUserInfo := k.getCachedUserInfo(uid) if cachedUserInfo.Name != kbname.NormalizedUsername("") { if pollForKID == keybase1.KID("") { return cachedUserInfo, nil } // Skip the cache if pollForKID isn't present in // `VerifyingKeys` or one of the revoked verifying keys. for _, key := range cachedUserInfo.VerifyingKeys { if key.KID().Equal(pollForKID) { return cachedUserInfo, nil } } // Check if the key is revoked, and fill in the merkle info in // that case. cachedUserInfo, exists, err := k.checkForRevokedVerifyingKey( ctx, cachedUserInfo, pollForKID) if err != nil { return idutil.UserInfo{}, err } if exists { return cachedUserInfo, nil } } arg := keybase1.LoadUserPlusKeysV2Arg{ Uid: uid, PollForKID: pollForKID, Oa: offline, } res, err := k.userClient.LoadUserPlusKeysV2(ctx, arg) if err != nil { return idutil.UserInfo{}, err } userInfo, err := k.processUserPlusKeys(ctx, res) if err != nil { return idutil.UserInfo{}, err } if pollForKID != keybase1.KID("") { // Fill in merkle info if we were explicitly trying to load a // revoked key. userInfo, _, err = k.checkForRevokedVerifyingKey( ctx, userInfo, pollForKID) if err != nil { return idutil.UserInfo{}, err } } return userInfo, nil }
go
func (k *KeybaseServiceBase) LoadUserPlusKeys( ctx context.Context, uid keybase1.UID, pollForKID keybase1.KID, offline keybase1.OfflineAvailability) (idutil.UserInfo, error) { cachedUserInfo := k.getCachedUserInfo(uid) if cachedUserInfo.Name != kbname.NormalizedUsername("") { if pollForKID == keybase1.KID("") { return cachedUserInfo, nil } // Skip the cache if pollForKID isn't present in // `VerifyingKeys` or one of the revoked verifying keys. for _, key := range cachedUserInfo.VerifyingKeys { if key.KID().Equal(pollForKID) { return cachedUserInfo, nil } } // Check if the key is revoked, and fill in the merkle info in // that case. cachedUserInfo, exists, err := k.checkForRevokedVerifyingKey( ctx, cachedUserInfo, pollForKID) if err != nil { return idutil.UserInfo{}, err } if exists { return cachedUserInfo, nil } } arg := keybase1.LoadUserPlusKeysV2Arg{ Uid: uid, PollForKID: pollForKID, Oa: offline, } res, err := k.userClient.LoadUserPlusKeysV2(ctx, arg) if err != nil { return idutil.UserInfo{}, err } userInfo, err := k.processUserPlusKeys(ctx, res) if err != nil { return idutil.UserInfo{}, err } if pollForKID != keybase1.KID("") { // Fill in merkle info if we were explicitly trying to load a // revoked key. userInfo, _, err = k.checkForRevokedVerifyingKey( ctx, userInfo, pollForKID) if err != nil { return idutil.UserInfo{}, err } } return userInfo, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "LoadUserPlusKeys", "(", "ctx", "context", ".", "Context", ",", "uid", "keybase1", ".", "UID", ",", "pollForKID", "keybase1", ".", "KID", ",", "offline", "keybase1", ".", "OfflineAvailability", ")", "(", "idu...
// LoadUserPlusKeys implements the KeybaseService interface for // KeybaseServiceBase.
[ "LoadUserPlusKeys", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L691-L744
159,949
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
CreateTeamTLF
func (k *KeybaseServiceBase) CreateTeamTLF( ctx context.Context, teamID keybase1.TeamID, tlfID tlf.ID) (err error) { return k.kbfsClient.CreateTLF(ctx, keybase1.CreateTLFArg{ TeamID: teamID, TlfID: keybase1.TLFID(tlfID.String()), }) }
go
func (k *KeybaseServiceBase) CreateTeamTLF( ctx context.Context, teamID keybase1.TeamID, tlfID tlf.ID) (err error) { return k.kbfsClient.CreateTLF(ctx, keybase1.CreateTLFArg{ TeamID: teamID, TlfID: keybase1.TLFID(tlfID.String()), }) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "CreateTeamTLF", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ",", "tlfID", "tlf", ".", "ID", ")", "(", "err", "error", ")", "{", "return", "k", ".", "kbfsClient", "....
// CreateTeamTLF implements the KeybaseService interface for // KeybaseServiceBase.
[ "CreateTeamTLF", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L920-L926
159,950
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
GetTeamSettings
func (k *KeybaseServiceBase) GetTeamSettings( ctx context.Context, teamID keybase1.TeamID, offline keybase1.OfflineAvailability) ( keybase1.KBFSTeamSettings, error) { // TODO: get invalidations from the server and cache the settings? return k.kbfsClient.GetKBFSTeamSettings( ctx, keybase1.GetKBFSTeamSettingsArg{ TeamID: teamID, Oa: offline, }) }
go
func (k *KeybaseServiceBase) GetTeamSettings( ctx context.Context, teamID keybase1.TeamID, offline keybase1.OfflineAvailability) ( keybase1.KBFSTeamSettings, error) { // TODO: get invalidations from the server and cache the settings? return k.kbfsClient.GetKBFSTeamSettings( ctx, keybase1.GetKBFSTeamSettingsArg{ TeamID: teamID, Oa: offline, }) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "GetTeamSettings", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ",", "offline", "keybase1", ".", "OfflineAvailability", ")", "(", "keybase1", ".", "KBFSTeamSettings", ",", "e...
// GetTeamSettings implements the KeybaseService interface for // KeybaseServiceBase.
[ "GetTeamSettings", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L930-L940
159,951
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
GetCurrentMerkleRoot
func (k *KeybaseServiceBase) GetCurrentMerkleRoot(ctx context.Context) ( keybase1.MerkleRootV2, time.Time, error) { // Refresh the cached value in the background if the cached value // is older than 30s; if our cached value is more than 60s old, // block. _, root, rootTime, err := k.merkleRoot.Get( ctx, 30*time.Second, 60*time.Second) return root, rootTime, err }
go
func (k *KeybaseServiceBase) GetCurrentMerkleRoot(ctx context.Context) ( keybase1.MerkleRootV2, time.Time, error) { // Refresh the cached value in the background if the cached value // is older than 30s; if our cached value is more than 60s old, // block. _, root, rootTime, err := k.merkleRoot.Get( ctx, 30*time.Second, 60*time.Second) return root, rootTime, err }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "GetCurrentMerkleRoot", "(", "ctx", "context", ".", "Context", ")", "(", "keybase1", ".", "MerkleRootV2", ",", "time", ".", "Time", ",", "error", ")", "{", "// Refresh the cached value in the background if the cached...
// GetCurrentMerkleRoot implements the KeybaseService interface for // KeybaseServiceBase.
[ "GetCurrentMerkleRoot", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L955-L963
159,952
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
VerifyMerkleRoot
func (k *KeybaseServiceBase) VerifyMerkleRoot( ctx context.Context, root keybase1.MerkleRootV2, kbfsRoot keybase1.KBFSRoot) error { return k.merkleClient.VerifyMerkleRootAndKBFS(ctx, keybase1.VerifyMerkleRootAndKBFSArg{ Root: root, ExpectedKBFSRoot: kbfsRoot, }) }
go
func (k *KeybaseServiceBase) VerifyMerkleRoot( ctx context.Context, root keybase1.MerkleRootV2, kbfsRoot keybase1.KBFSRoot) error { return k.merkleClient.VerifyMerkleRootAndKBFS(ctx, keybase1.VerifyMerkleRootAndKBFSArg{ Root: root, ExpectedKBFSRoot: kbfsRoot, }) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "VerifyMerkleRoot", "(", "ctx", "context", ".", "Context", ",", "root", "keybase1", ".", "MerkleRootV2", ",", "kbfsRoot", "keybase1", ".", "KBFSRoot", ")", "error", "{", "return", "k", ".", "merkleClient", "....
// VerifyMerkleRoot implements the KBPKI interface for KeybaseServiceBase.
[ "VerifyMerkleRoot", "implements", "the", "KBPKI", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L966-L974
159,953
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
CurrentSession
func (k *KeybaseServiceBase) CurrentSession( ctx context.Context, sessionID int) ( idutil.SessionInfo, error) { ctx = CtxWithRandomIDReplayable( ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log) s, newSession, err := k.getCurrentSession(ctx, sessionID) if err != nil { return idutil.SessionInfo{}, err } if newSession && k.config != nil { // Don't hold the lock while calling `serviceLoggedIn`. _ = serviceLoggedIn(ctx, k.config, s, TLFJournalBackgroundWorkEnabled) } return s, nil }
go
func (k *KeybaseServiceBase) CurrentSession( ctx context.Context, sessionID int) ( idutil.SessionInfo, error) { ctx = CtxWithRandomIDReplayable( ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log) s, newSession, err := k.getCurrentSession(ctx, sessionID) if err != nil { return idutil.SessionInfo{}, err } if newSession && k.config != nil { // Don't hold the lock while calling `serviceLoggedIn`. _ = serviceLoggedIn(ctx, k.config, s, TLFJournalBackgroundWorkEnabled) } return s, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "CurrentSession", "(", "ctx", "context", ".", "Context", ",", "sessionID", "int", ")", "(", "idutil", ".", "SessionInfo", ",", "error", ")", "{", "ctx", "=", "CtxWithRandomIDReplayable", "(", "ctx", ",", "C...
// CurrentSession implements the KeybaseService interface for KeybaseServiceBase.
[ "CurrentSession", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1112-L1129
159,954
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FavoriteAdd
func (k *KeybaseServiceBase) FavoriteAdd(ctx context.Context, folder keybase1.Folder) error { return k.favoriteClient.FavoriteAdd(ctx, keybase1.FavoriteAddArg{Folder: folder}) }
go
func (k *KeybaseServiceBase) FavoriteAdd(ctx context.Context, folder keybase1.Folder) error { return k.favoriteClient.FavoriteAdd(ctx, keybase1.FavoriteAddArg{Folder: folder}) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FavoriteAdd", "(", "ctx", "context", ".", "Context", ",", "folder", "keybase1", ".", "Folder", ")", "error", "{", "return", "k", ".", "favoriteClient", ".", "FavoriteAdd", "(", "ctx", ",", "keybase1", ".",...
// FavoriteAdd implements the KeybaseService interface for KeybaseServiceBase.
[ "FavoriteAdd", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1132-L1134
159,955
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FavoriteDelete
func (k *KeybaseServiceBase) FavoriteDelete(ctx context.Context, folder keybase1.Folder) error { return k.favoriteClient.FavoriteIgnore(ctx, keybase1.FavoriteIgnoreArg{Folder: folder}) }
go
func (k *KeybaseServiceBase) FavoriteDelete(ctx context.Context, folder keybase1.Folder) error { return k.favoriteClient.FavoriteIgnore(ctx, keybase1.FavoriteIgnoreArg{Folder: folder}) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FavoriteDelete", "(", "ctx", "context", ".", "Context", ",", "folder", "keybase1", ".", "Folder", ")", "error", "{", "return", "k", ".", "favoriteClient", ".", "FavoriteIgnore", "(", "ctx", ",", "keybase1", ...
// FavoriteDelete implements the KeybaseService interface for KeybaseServiceBase.
[ "FavoriteDelete", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1137-L1140
159,956
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FavoriteList
func (k *KeybaseServiceBase) FavoriteList(ctx context.Context, sessionID int) (keybase1.FavoritesResult, error) { return k.favoriteClient.GetFavorites(ctx, sessionID) }
go
func (k *KeybaseServiceBase) FavoriteList(ctx context.Context, sessionID int) (keybase1.FavoritesResult, error) { return k.favoriteClient.GetFavorites(ctx, sessionID) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FavoriteList", "(", "ctx", "context", ".", "Context", ",", "sessionID", "int", ")", "(", "keybase1", ".", "FavoritesResult", ",", "error", ")", "{", "return", "k", ".", "favoriteClient", ".", "GetFavorites",...
// FavoriteList implements the KeybaseService interface for KeybaseServiceBase.
[ "FavoriteList", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1143-L1146
159,957
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
NotifyOnlineStatusChanged
func (k *KeybaseServiceBase) NotifyOnlineStatusChanged(ctx context.Context, online bool) error { k.log.CDebugf(ctx, "Sending notification for onlineStatus: online=%v", online) return k.kbfsClient.FSOnlineStatusChangedEvent(ctx, online) }
go
func (k *KeybaseServiceBase) NotifyOnlineStatusChanged(ctx context.Context, online bool) error { k.log.CDebugf(ctx, "Sending notification for onlineStatus: online=%v", online) return k.kbfsClient.FSOnlineStatusChangedEvent(ctx, online) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "NotifyOnlineStatusChanged", "(", "ctx", "context", ".", "Context", ",", "online", "bool", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "online", ")", "\n", "ret...
// NotifyOnlineStatusChanged implements the KeybaseService interface for // KeybaseServiceBase.
[ "NotifyOnlineStatusChanged", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1160-L1164
159,958
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
Notify
func (k *KeybaseServiceBase) Notify(ctx context.Context, notification *keybase1.FSNotification) error { // Reduce log spam by not repeating log lines for // notifications with the same filename. // // TODO: Only do this in debug mode. func() { k.lastNotificationFilenameLock.Lock() defer k.lastNotificationFilenameLock.Unlock() if notification.Filename != k.lastNotificationFilename { k.lastNotificationFilename = notification.Filename k.log.CDebugf(ctx, "Sending notification for %s", notification.Filename) } }() return k.kbfsClient.FSEvent(ctx, *notification) }
go
func (k *KeybaseServiceBase) Notify(ctx context.Context, notification *keybase1.FSNotification) error { // Reduce log spam by not repeating log lines for // notifications with the same filename. // // TODO: Only do this in debug mode. func() { k.lastNotificationFilenameLock.Lock() defer k.lastNotificationFilenameLock.Unlock() if notification.Filename != k.lastNotificationFilename { k.lastNotificationFilename = notification.Filename k.log.CDebugf(ctx, "Sending notification for %s", notification.Filename) } }() return k.kbfsClient.FSEvent(ctx, *notification) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "Notify", "(", "ctx", "context", ".", "Context", ",", "notification", "*", "keybase1", ".", "FSNotification", ")", "error", "{", "// Reduce log spam by not repeating log lines for", "// notifications with the same filename...
// Notify implements the KeybaseService interface for KeybaseServiceBase.
[ "Notify", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1167-L1181
159,959
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
NotifyPathUpdated
func (k *KeybaseServiceBase) NotifyPathUpdated( ctx context.Context, path string) error { // Reduce log spam by not repeating log lines for // notifications with the same filename. // // TODO: Only do this in debug mode. func() { k.lastNotificationFilenameLock.Lock() defer k.lastNotificationFilenameLock.Unlock() if path != k.lastPathUpdated { k.lastPathUpdated = path k.log.CDebugf(ctx, "Sending path updated notification for %s", path) } }() return k.kbfsClient.FSPathUpdate(ctx, path) }
go
func (k *KeybaseServiceBase) NotifyPathUpdated( ctx context.Context, path string) error { // Reduce log spam by not repeating log lines for // notifications with the same filename. // // TODO: Only do this in debug mode. func() { k.lastNotificationFilenameLock.Lock() defer k.lastNotificationFilenameLock.Unlock() if path != k.lastPathUpdated { k.lastPathUpdated = path k.log.CDebugf(ctx, "Sending path updated notification for %s", path) } }() return k.kbfsClient.FSPathUpdate(ctx, path) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "NotifyPathUpdated", "(", "ctx", "context", ".", "Context", ",", "path", "string", ")", "error", "{", "// Reduce log spam by not repeating log lines for", "// notifications with the same filename.", "//", "// TODO: Only do t...
// NotifyPathUpdated implements the KeybaseService interface for // KeybaseServiceBase.
[ "NotifyPathUpdated", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1185-L1200
159,960
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
NotifySyncStatus
func (k *KeybaseServiceBase) NotifySyncStatus(ctx context.Context, status *keybase1.FSPathSyncStatus) error { // Reduce log spam by not repeating log lines for // notifications with the same pathname. // // TODO: Only do this in debug mode. func() { k.lastNotificationFilenameLock.Lock() defer k.lastNotificationFilenameLock.Unlock() if status.Path != k.lastSyncNotificationPath { k.lastSyncNotificationPath = status.Path k.log.CDebugf(ctx, "Sending notification for %s", status.Path) } }() return k.kbfsClient.FSSyncEvent(ctx, *status) }
go
func (k *KeybaseServiceBase) NotifySyncStatus(ctx context.Context, status *keybase1.FSPathSyncStatus) error { // Reduce log spam by not repeating log lines for // notifications with the same pathname. // // TODO: Only do this in debug mode. func() { k.lastNotificationFilenameLock.Lock() defer k.lastNotificationFilenameLock.Unlock() if status.Path != k.lastSyncNotificationPath { k.lastSyncNotificationPath = status.Path k.log.CDebugf(ctx, "Sending notification for %s", status.Path) } }() return k.kbfsClient.FSSyncEvent(ctx, *status) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "NotifySyncStatus", "(", "ctx", "context", ".", "Context", ",", "status", "*", "keybase1", ".", "FSPathSyncStatus", ")", "error", "{", "// Reduce log spam by not repeating log lines for", "// notifications with the same pa...
// NotifySyncStatus implements the KeybaseService interface for // KeybaseServiceBase.
[ "NotifySyncStatus", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1204-L1219
159,961
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
NotifyOverallSyncStatus
func (k *KeybaseServiceBase) NotifyOverallSyncStatus( ctx context.Context, status keybase1.FolderSyncStatus) error { return k.kbfsClient.FSOverallSyncEvent(ctx, status) }
go
func (k *KeybaseServiceBase) NotifyOverallSyncStatus( ctx context.Context, status keybase1.FolderSyncStatus) error { return k.kbfsClient.FSOverallSyncEvent(ctx, status) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "NotifyOverallSyncStatus", "(", "ctx", "context", ".", "Context", ",", "status", "keybase1", ".", "FolderSyncStatus", ")", "error", "{", "return", "k", ".", "kbfsClient", ".", "FSOverallSyncEvent", "(", "ctx", ...
// NotifyOverallSyncStatus implements the KeybaseService interface for // KeybaseServiceBase.
[ "NotifyOverallSyncStatus", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1223-L1226
159,962
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FlushUserFromLocalCache
func (k *KeybaseServiceBase) FlushUserFromLocalCache(ctx context.Context, uid keybase1.UID) { k.log.CDebugf(ctx, "Flushing cache for user %s", uid) k.setCachedUserInfo(uid, idutil.UserInfo{}) }
go
func (k *KeybaseServiceBase) FlushUserFromLocalCache(ctx context.Context, uid keybase1.UID) { k.log.CDebugf(ctx, "Flushing cache for user %s", uid) k.setCachedUserInfo(uid, idutil.UserInfo{}) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FlushUserFromLocalCache", "(", "ctx", "context", ".", "Context", ",", "uid", "keybase1", ".", "UID", ")", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "uid", ")", "\n", "k"...
// FlushUserFromLocalCache implements the KeybaseService interface for // KeybaseServiceBase.
[ "FlushUserFromLocalCache", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1230-L1234
159,963
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FSEditListRequest
func (k *KeybaseServiceBase) FSEditListRequest(ctx context.Context, req keybase1.FSEditListRequest) (err error) { ctx = CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log) k.log.CDebugf(ctx, "Edit list request for %s (public: %t)", req.Folder.Name, !req.Folder.Private) tlfHandle, err := getHandleFromFolderName( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, req.Folder.Name, !req.Folder.Private) if err != nil { return err } rootNode, _, err := k.config.KBFSOps(). GetOrCreateRootNode(ctx, tlfHandle, data.MasterBranch) if err != nil { return err } history, err := k.config.KBFSOps().GetEditHistory(ctx, rootNode.GetFolderBranch()) if err != nil { return err } // TODO(KBFS-2996) Convert the edits to an RPC response. resp := keybase1.FSEditListArg{ RequestID: req.RequestID, Edits: history, } k.log.CDebugf(ctx, "Sending edit history response with %d writer clusters", len(resp.Edits.History)) return k.kbfsClient.FSEditList(ctx, resp) }
go
func (k *KeybaseServiceBase) FSEditListRequest(ctx context.Context, req keybase1.FSEditListRequest) (err error) { ctx = CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log) k.log.CDebugf(ctx, "Edit list request for %s (public: %t)", req.Folder.Name, !req.Folder.Private) tlfHandle, err := getHandleFromFolderName( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, req.Folder.Name, !req.Folder.Private) if err != nil { return err } rootNode, _, err := k.config.KBFSOps(). GetOrCreateRootNode(ctx, tlfHandle, data.MasterBranch) if err != nil { return err } history, err := k.config.KBFSOps().GetEditHistory(ctx, rootNode.GetFolderBranch()) if err != nil { return err } // TODO(KBFS-2996) Convert the edits to an RPC response. resp := keybase1.FSEditListArg{ RequestID: req.RequestID, Edits: history, } k.log.CDebugf(ctx, "Sending edit history response with %d writer clusters", len(resp.Edits.History)) return k.kbfsClient.FSEditList(ctx, resp) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FSEditListRequest", "(", "ctx", "context", ".", "Context", ",", "req", "keybase1", ".", "FSEditListRequest", ")", "(", "err", "error", ")", "{", "ctx", "=", "CtxWithRandomIDReplayable", "(", "ctx", ",", "Ctx...
// FSEditListRequest implements keybase1.NotifyFSRequestInterface for // KeybaseServiceBase.
[ "FSEditListRequest", "implements", "keybase1", ".", "NotifyFSRequestInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1252-L1285
159,964
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FSSyncStatusRequest
func (k *KeybaseServiceBase) FSSyncStatusRequest(ctx context.Context, req keybase1.FSSyncStatusRequest) (err error) { k.log.CDebugf(ctx, "Got sync status request: %v", req) resp := keybase1.FSSyncStatusArg{RequestID: req.RequestID} // For now, just return the number of syncing bytes. jManager, err := GetJournalManager(k.config) if err == nil { status, _ := jManager.Status(ctx) resp.Status.TotalSyncingBytes = status.UnflushedBytes k.log.CDebugf(ctx, "Sending sync status response with %d syncing bytes", status.UnflushedBytes) } else { k.log.CDebugf(ctx, "No journal server, sending empty response") } return k.kbfsClient.FSSyncStatus(ctx, resp) }
go
func (k *KeybaseServiceBase) FSSyncStatusRequest(ctx context.Context, req keybase1.FSSyncStatusRequest) (err error) { k.log.CDebugf(ctx, "Got sync status request: %v", req) resp := keybase1.FSSyncStatusArg{RequestID: req.RequestID} // For now, just return the number of syncing bytes. jManager, err := GetJournalManager(k.config) if err == nil { status, _ := jManager.Status(ctx) resp.Status.TotalSyncingBytes = status.UnflushedBytes k.log.CDebugf(ctx, "Sending sync status response with %d syncing bytes", status.UnflushedBytes) } else { k.log.CDebugf(ctx, "No journal server, sending empty response") } return k.kbfsClient.FSSyncStatus(ctx, resp) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FSSyncStatusRequest", "(", "ctx", "context", ".", "Context", ",", "req", "keybase1", ".", "FSSyncStatusRequest", ")", "(", "err", "error", ")", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\""...
// FSSyncStatusRequest implements keybase1.NotifyFSRequestInterface for // KeybaseServiceBase.
[ "FSSyncStatusRequest", "implements", "keybase1", ".", "NotifyFSRequestInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1289-L1307
159,965
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
TeamChangedByID
func (k *KeybaseServiceBase) TeamChangedByID(ctx context.Context, arg keybase1.TeamChangedByIDArg) error { k.log.CDebugf(ctx, "Flushing cache for team %s "+ "(membershipChange=%t, keyRotated=%t, renamed=%t)", arg.TeamID, arg.Changes.MembershipChanged, arg.Changes.KeyRotated, arg.Changes.Renamed) k.setCachedTeamInfo(arg.TeamID, idutil.TeamInfo{}) if arg.Changes.Renamed { k.config.KBFSOps().TeamNameChanged(ctx, arg.TeamID) } return nil }
go
func (k *KeybaseServiceBase) TeamChangedByID(ctx context.Context, arg keybase1.TeamChangedByIDArg) error { k.log.CDebugf(ctx, "Flushing cache for team %s "+ "(membershipChange=%t, keyRotated=%t, renamed=%t)", arg.TeamID, arg.Changes.MembershipChanged, arg.Changes.KeyRotated, arg.Changes.Renamed) k.setCachedTeamInfo(arg.TeamID, idutil.TeamInfo{}) if arg.Changes.Renamed { k.config.KBFSOps().TeamNameChanged(ctx, arg.TeamID) } return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "TeamChangedByID", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "TeamChangedByIDArg", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", "+", "\"", "...
// TeamChangedByID implements keybase1.NotifyTeamInterface for // KeybaseServiceBase.
[ "TeamChangedByID", "implements", "keybase1", ".", "NotifyTeamInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1311-L1323
159,966
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
TeamChangedByName
func (k *KeybaseServiceBase) TeamChangedByName(ctx context.Context, arg keybase1.TeamChangedByNameArg) error { // ignore return nil }
go
func (k *KeybaseServiceBase) TeamChangedByName(ctx context.Context, arg keybase1.TeamChangedByNameArg) error { // ignore return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "TeamChangedByName", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "TeamChangedByNameArg", ")", "error", "{", "// ignore", "return", "nil", "\n", "}" ]
// TeamChangedByName implements keybase1.NotifyTeamInterface for // KeybaseServiceBase.
[ "TeamChangedByName", "implements", "keybase1", ".", "NotifyTeamInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1327-L1331
159,967
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
TeamDeleted
func (k *KeybaseServiceBase) TeamDeleted(ctx context.Context, teamID keybase1.TeamID) error { return nil }
go
func (k *KeybaseServiceBase) TeamDeleted(ctx context.Context, teamID keybase1.TeamID) error { return nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "TeamDeleted", "(", "ctx", "context", ".", "Context", ",", "teamID", "keybase1", ".", "TeamID", ")", "error", "{", "return", "nil", "\n", "}" ]
// TeamDeleted implements keybase1.NotifyTeamInterface for // KeybaseServiceBase.
[ "TeamDeleted", "implements", "keybase1", ".", "NotifyTeamInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1335-L1338
159,968
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
TeamAbandoned
func (k *KeybaseDaemonRPC) TeamAbandoned( ctx context.Context, tid keybase1.TeamID) error { k.log.CDebugf(ctx, "Implicit team %s abandoned", tid) k.setCachedTeamInfo(tid, idutil.TeamInfo{}) k.config.KBFSOps().TeamAbandoned(ctx, tid) return nil }
go
func (k *KeybaseDaemonRPC) TeamAbandoned( ctx context.Context, tid keybase1.TeamID) error { k.log.CDebugf(ctx, "Implicit team %s abandoned", tid) k.setCachedTeamInfo(tid, idutil.TeamInfo{}) k.config.KBFSOps().TeamAbandoned(ctx, tid) return nil }
[ "func", "(", "k", "*", "KeybaseDaemonRPC", ")", "TeamAbandoned", "(", "ctx", "context", ".", "Context", ",", "tid", "keybase1", ".", "TeamID", ")", "error", "{", "k", ".", "log", ".", "CDebugf", "(", "ctx", ",", "\"", "\"", ",", "tid", ")", "\n", "...
// TeamAbandoned implements keybase1.NotifyTeamInterface for KeybaseServiceBase.
[ "TeamAbandoned", "implements", "keybase1", ".", "NotifyTeamInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1352-L1358
159,969
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
AvatarUpdated
func (k *KeybaseDaemonRPC) AvatarUpdated(ctx context.Context, arg keybase1.AvatarUpdatedArg) error { return nil }
go
func (k *KeybaseDaemonRPC) AvatarUpdated(ctx context.Context, arg keybase1.AvatarUpdatedArg) error { return nil }
[ "func", "(", "k", "*", "KeybaseDaemonRPC", ")", "AvatarUpdated", "(", "ctx", "context", ".", "Context", ",", "arg", "keybase1", ".", "AvatarUpdatedArg", ")", "error", "{", "return", "nil", "\n", "}" ]
// AvatarUpdated implements keybase1.NotifyTeamInterface for KeybaseServiceBase.
[ "AvatarUpdated", "implements", "keybase1", ".", "NotifyTeamInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1361-L1364
159,970
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
StartMigration
func (k *KeybaseServiceBase) StartMigration(ctx context.Context, folder keybase1.Folder) (err error) { mdServer := k.config.MDServer() if mdServer == nil { return errors.New("no mdserver") } // Making a favorite here to reuse the code that converts from // `keybase1.FolderType` into `tlf.Type`. fav := favorites.NewFolderFromProtocol(folder) handle, err := GetHandleFromFolderNameAndType( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type) if err != nil { return err } return k.config.MDServer().StartImplicitTeamMigration(ctx, handle.TlfID()) }
go
func (k *KeybaseServiceBase) StartMigration(ctx context.Context, folder keybase1.Folder) (err error) { mdServer := k.config.MDServer() if mdServer == nil { return errors.New("no mdserver") } // Making a favorite here to reuse the code that converts from // `keybase1.FolderType` into `tlf.Type`. fav := favorites.NewFolderFromProtocol(folder) handle, err := GetHandleFromFolderNameAndType( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type) if err != nil { return err } return k.config.MDServer().StartImplicitTeamMigration(ctx, handle.TlfID()) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "StartMigration", "(", "ctx", "context", ".", "Context", ",", "folder", "keybase1", ".", "Folder", ")", "(", "err", "error", ")", "{", "mdServer", ":=", "k", ".", "config", ".", "MDServer", "(", ")", "\...
// StartMigration implements keybase1.ImplicitTeamMigrationInterface for // KeybaseServiceBase.
[ "StartMigration", "implements", "keybase1", ".", "ImplicitTeamMigrationInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1368-L1383
159,971
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
FinalizeMigration
func (k *KeybaseServiceBase) FinalizeMigration(ctx context.Context, folder keybase1.Folder) (err error) { fav := favorites.NewFolderFromProtocol(folder) handle, err := GetHandleFromFolderNameAndType( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type) if err != nil { return err } if handle.TypeForKeying() == tlf.TeamKeying { // Clear the cache for this implicit team, to ensure we get // all the latest key generations for the team info during the // migration. id := handle.FirstResolvedWriter() if id.IsTeamOrSubteam() { tid, err := id.AsTeam() if err != nil { return err } k.log.CDebugf(ctx, "Clearing team info for tid=%s, handle=%s", tid, handle.GetCanonicalPath()) k.setCachedTeamInfo(tid, idutil.TeamInfo{}) } } return k.config.KBFSOps().MigrateToImplicitTeam(ctx, handle.TlfID()) }
go
func (k *KeybaseServiceBase) FinalizeMigration(ctx context.Context, folder keybase1.Folder) (err error) { fav := favorites.NewFolderFromProtocol(folder) handle, err := GetHandleFromFolderNameAndType( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, fav.Name, fav.Type) if err != nil { return err } if handle.TypeForKeying() == tlf.TeamKeying { // Clear the cache for this implicit team, to ensure we get // all the latest key generations for the team info during the // migration. id := handle.FirstResolvedWriter() if id.IsTeamOrSubteam() { tid, err := id.AsTeam() if err != nil { return err } k.log.CDebugf(ctx, "Clearing team info for tid=%s, handle=%s", tid, handle.GetCanonicalPath()) k.setCachedTeamInfo(tid, idutil.TeamInfo{}) } } return k.config.KBFSOps().MigrateToImplicitTeam(ctx, handle.TlfID()) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "FinalizeMigration", "(", "ctx", "context", ".", "Context", ",", "folder", "keybase1", ".", "Folder", ")", "(", "err", "error", ")", "{", "fav", ":=", "favorites", ".", "NewFolderFromProtocol", "(", "folder",...
// FinalizeMigration implements keybase1.ImplicitTeamMigrationInterface for // KeybaseServiceBase.
[ "FinalizeMigration", "implements", "keybase1", ".", "ImplicitTeamMigrationInterface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1387-L1411
159,972
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
GetTLFCryptKeys
func (k *KeybaseServiceBase) GetTLFCryptKeys(ctx context.Context, query keybase1.TLFQuery) (res keybase1.GetTLFCryptKeysRes, err error) { if ctx, err = tlfhandle.MakeExtendedIdentify( CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log), query.IdentifyBehavior, ); err != nil { return keybase1.GetTLFCryptKeysRes{}, err } tlfHandle, err := getHandleFromFolderName( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, false) if err != nil { return res, err } res.NameIDBreaks.CanonicalName = keybase1.CanonicalTlfName( tlfHandle.GetCanonicalName()) keys, id, err := k.config.KBFSOps().GetTLFCryptKeys(ctx, tlfHandle) if err != nil { return res, err } res.NameIDBreaks.TlfID = keybase1.TLFID(id.String()) for i, key := range keys { res.CryptKeys = append(res.CryptKeys, keybase1.CryptKey{ KeyGeneration: int(kbfsmd.FirstValidKeyGen) + i, Key: keybase1.Bytes32(key.Data()), }) } if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() { res.NameIDBreaks.Breaks = tlfhandle.GetExtendedIdentify(ctx). GetTlfBreakAndClose() } return res, nil }
go
func (k *KeybaseServiceBase) GetTLFCryptKeys(ctx context.Context, query keybase1.TLFQuery) (res keybase1.GetTLFCryptKeysRes, err error) { if ctx, err = tlfhandle.MakeExtendedIdentify( CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log), query.IdentifyBehavior, ); err != nil { return keybase1.GetTLFCryptKeysRes{}, err } tlfHandle, err := getHandleFromFolderName( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, false) if err != nil { return res, err } res.NameIDBreaks.CanonicalName = keybase1.CanonicalTlfName( tlfHandle.GetCanonicalName()) keys, id, err := k.config.KBFSOps().GetTLFCryptKeys(ctx, tlfHandle) if err != nil { return res, err } res.NameIDBreaks.TlfID = keybase1.TLFID(id.String()) for i, key := range keys { res.CryptKeys = append(res.CryptKeys, keybase1.CryptKey{ KeyGeneration: int(kbfsmd.FirstValidKeyGen) + i, Key: keybase1.Bytes32(key.Data()), }) } if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() { res.NameIDBreaks.Breaks = tlfhandle.GetExtendedIdentify(ctx). GetTlfBreakAndClose() } return res, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "GetTLFCryptKeys", "(", "ctx", "context", ".", "Context", ",", "query", "keybase1", ".", "TLFQuery", ")", "(", "res", "keybase1", ".", "GetTLFCryptKeysRes", ",", "err", "error", ")", "{", "if", "ctx", ",", ...
// GetTLFCryptKeys implements the TlfKeysInterface interface for // KeybaseServiceBase.
[ "GetTLFCryptKeys", "implements", "the", "TlfKeysInterface", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1415-L1453
159,973
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
GetPublicCanonicalTLFNameAndID
func (k *KeybaseServiceBase) GetPublicCanonicalTLFNameAndID( ctx context.Context, query keybase1.TLFQuery) ( res keybase1.CanonicalTLFNameAndIDWithBreaks, err error) { if ctx, err = tlfhandle.MakeExtendedIdentify( CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log), query.IdentifyBehavior, ); err != nil { return keybase1.CanonicalTLFNameAndIDWithBreaks{}, err } tlfHandle, err := getHandleFromFolderName( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, true /* public */) if err != nil { return res, err } res.CanonicalName = keybase1.CanonicalTlfName( tlfHandle.GetCanonicalName()) id, err := k.config.KBFSOps().GetTLFID(ctx, tlfHandle) if err != nil { return res, err } res.TlfID = keybase1.TLFID(id.String()) if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() { res.Breaks = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose() } return res, nil }
go
func (k *KeybaseServiceBase) GetPublicCanonicalTLFNameAndID( ctx context.Context, query keybase1.TLFQuery) ( res keybase1.CanonicalTLFNameAndIDWithBreaks, err error) { if ctx, err = tlfhandle.MakeExtendedIdentify( CtxWithRandomIDReplayable(ctx, CtxKeybaseServiceIDKey, CtxKeybaseServiceOpID, k.log), query.IdentifyBehavior, ); err != nil { return keybase1.CanonicalTLFNameAndIDWithBreaks{}, err } tlfHandle, err := getHandleFromFolderName( ctx, k.config.KBPKI(), k.config.MDOps(), k.config, query.TlfName, true /* public */) if err != nil { return res, err } res.CanonicalName = keybase1.CanonicalTlfName( tlfHandle.GetCanonicalName()) id, err := k.config.KBFSOps().GetTLFID(ctx, tlfHandle) if err != nil { return res, err } res.TlfID = keybase1.TLFID(id.String()) if query.IdentifyBehavior.WarningInsteadOfErrorOnBrokenTracks() { res.Breaks = tlfhandle.GetExtendedIdentify(ctx).GetTlfBreakAndClose() } return res, nil }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "GetPublicCanonicalTLFNameAndID", "(", "ctx", "context", ".", "Context", ",", "query", "keybase1", ".", "TLFQuery", ")", "(", "res", "keybase1", ".", "CanonicalTLFNameAndIDWithBreaks", ",", "err", "error", ")", "...
// GetPublicCanonicalTLFNameAndID implements the TlfKeysInterface interface for // KeybaseServiceBase.
[ "GetPublicCanonicalTLFNameAndID", "implements", "the", "TlfKeysInterface", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1457-L1489
159,974
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
EstablishMountDir
func (k *KeybaseServiceBase) EstablishMountDir(ctx context.Context) ( string, error) { dir, err := k.kbfsMountClient.GetCurrentMountDir(ctx) if err != nil { k.log.CInfof(ctx, "GetCurrentMountDir fails - ", err) return "", err } if dir == "" { dirs, err := k.kbfsMountClient.GetAllAvailableMountDirs(ctx) if err != nil { k.log.CInfof(ctx, "GetAllAvailableMountDirs fails - ", err) return "", err } dir, err = chooseDefaultMount(ctx, dirs, k.log) if err != nil { k.log.CInfof(ctx, "chooseDefaultMount fails - ", err) return "", err } err2 := k.kbfsMountClient.SetCurrentMountDir(ctx, dir) if err2 != nil { k.log.CInfof(ctx, "SetCurrentMountDir fails - ", err2) } // Continue mounting even if we can't save the mount k.log.CDebugf(ctx, "Choosing mountdir %s from %v", dir, dirs) } return dir, err }
go
func (k *KeybaseServiceBase) EstablishMountDir(ctx context.Context) ( string, error) { dir, err := k.kbfsMountClient.GetCurrentMountDir(ctx) if err != nil { k.log.CInfof(ctx, "GetCurrentMountDir fails - ", err) return "", err } if dir == "" { dirs, err := k.kbfsMountClient.GetAllAvailableMountDirs(ctx) if err != nil { k.log.CInfof(ctx, "GetAllAvailableMountDirs fails - ", err) return "", err } dir, err = chooseDefaultMount(ctx, dirs, k.log) if err != nil { k.log.CInfof(ctx, "chooseDefaultMount fails - ", err) return "", err } err2 := k.kbfsMountClient.SetCurrentMountDir(ctx, dir) if err2 != nil { k.log.CInfof(ctx, "SetCurrentMountDir fails - ", err2) } // Continue mounting even if we can't save the mount k.log.CDebugf(ctx, "Choosing mountdir %s from %v", dir, dirs) } return dir, err }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "EstablishMountDir", "(", "ctx", "context", ".", "Context", ")", "(", "string", ",", "error", ")", "{", "dir", ",", "err", ":=", "k", ".", "kbfsMountClient", ".", "GetCurrentMountDir", "(", "ctx", ")", "\...
// EstablishMountDir asks the service for the current mount path
[ "EstablishMountDir", "asks", "the", "service", "for", "the", "current", "mount", "path" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1492-L1518
159,975
keybase/client
go/kbfs/libkbfs/keybase_service_base.go
PutGitMetadata
func (k *KeybaseServiceBase) PutGitMetadata( ctx context.Context, folder keybase1.Folder, repoID keybase1.RepoID, metadata keybase1.GitLocalMetadata) error { return k.gitClient.PutGitMetadata(ctx, keybase1.PutGitMetadataArg{ Folder: folder, RepoID: repoID, Metadata: metadata, }) }
go
func (k *KeybaseServiceBase) PutGitMetadata( ctx context.Context, folder keybase1.Folder, repoID keybase1.RepoID, metadata keybase1.GitLocalMetadata) error { return k.gitClient.PutGitMetadata(ctx, keybase1.PutGitMetadataArg{ Folder: folder, RepoID: repoID, Metadata: metadata, }) }
[ "func", "(", "k", "*", "KeybaseServiceBase", ")", "PutGitMetadata", "(", "ctx", "context", ".", "Context", ",", "folder", "keybase1", ".", "Folder", ",", "repoID", "keybase1", ".", "RepoID", ",", "metadata", "keybase1", ".", "GitLocalMetadata", ")", "error", ...
// PutGitMetadata implements the KeybaseService interface for // KeybaseServiceBase.
[ "PutGitMetadata", "implements", "the", "KeybaseService", "interface", "for", "KeybaseServiceBase", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/keybase_service_base.go#L1522-L1530
159,976
keybase/client
go/kbfs/libkbfs/merkle_root.go
NewEventuallyConsistentMerkleRoot
func NewEventuallyConsistentMerkleRoot( config Config, getter idutil.MerkleRootGetter) *EventuallyConsistentMerkleRoot { ecmr := &EventuallyConsistentMerkleRoot{ config: config, log: config.MakeLogger(ECMRID), getter: getter, } ecmr.fetcher = newFetchDecider( ecmr.log, config.MakeVLogger(ecmr.log), ecmr.getAndCache, ECMRCtxTagKey{}, ECMRID, ecmr.config) return ecmr }
go
func NewEventuallyConsistentMerkleRoot( config Config, getter idutil.MerkleRootGetter) *EventuallyConsistentMerkleRoot { ecmr := &EventuallyConsistentMerkleRoot{ config: config, log: config.MakeLogger(ECMRID), getter: getter, } ecmr.fetcher = newFetchDecider( ecmr.log, config.MakeVLogger(ecmr.log), ecmr.getAndCache, ECMRCtxTagKey{}, ECMRID, ecmr.config) return ecmr }
[ "func", "NewEventuallyConsistentMerkleRoot", "(", "config", "Config", ",", "getter", "idutil", ".", "MerkleRootGetter", ")", "*", "EventuallyConsistentMerkleRoot", "{", "ecmr", ":=", "&", "EventuallyConsistentMerkleRoot", "{", "config", ":", "config", ",", "log", ":",...
// NewEventuallyConsistentMerkleRoot creates a new // EventuallyConsistentMerkleRoot object.
[ "NewEventuallyConsistentMerkleRoot", "creates", "a", "new", "EventuallyConsistentMerkleRoot", "object", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/merkle_root.go#L48-L59
159,977
keybase/client
go/kbfs/libkbfs/merkle_root.go
Get
func (ecmr *EventuallyConsistentMerkleRoot) Get( ctx context.Context, bgTolerance, blockTolerance time.Duration) ( timestamp time.Time, root keybase1.MerkleRootV2, rootTime time.Time, err error) { c := ecmr.getCached() err = ecmr.fetcher.Do(ctx, bgTolerance, blockTolerance, c.timestamp) if err != nil { return time.Time{}, keybase1.MerkleRootV2{}, time.Time{}, err } c = ecmr.getCached() return c.timestamp, c.root, c.rootTime, nil }
go
func (ecmr *EventuallyConsistentMerkleRoot) Get( ctx context.Context, bgTolerance, blockTolerance time.Duration) ( timestamp time.Time, root keybase1.MerkleRootV2, rootTime time.Time, err error) { c := ecmr.getCached() err = ecmr.fetcher.Do(ctx, bgTolerance, blockTolerance, c.timestamp) if err != nil { return time.Time{}, keybase1.MerkleRootV2{}, time.Time{}, err } c = ecmr.getCached() return c.timestamp, c.root, c.rootTime, nil }
[ "func", "(", "ecmr", "*", "EventuallyConsistentMerkleRoot", ")", "Get", "(", "ctx", "context", ".", "Context", ",", "bgTolerance", ",", "blockTolerance", "time", ".", "Duration", ")", "(", "timestamp", "time", ".", "Time", ",", "root", "keybase1", ".", "Merk...
// Get returns the current merkle root, and the server timestamp of // that root. To help avoid having too frequent calls into the API // server, caller can provide a positive tolerance, to accept stale // LimitBytes and UsageBytes data. If tolerance is 0 or negative, this // always makes a blocking RPC to bserver and return latest quota // usage. // // 1) If the age of cached data is more than blockTolerance, a blocking RPC is // issued and the function only returns after RPC finishes, with the newest // data from RPC. The RPC causes cached data to be refreshed as well. // 2) Otherwise, if the age of cached data is more than bgTolerance, // a background RPC is spawned to refresh cached data, and the stale // data is returned immediately. // 3) Otherwise, the cached stale data is returned immediately.
[ "Get", "returns", "the", "current", "merkle", "root", "and", "the", "server", "timestamp", "of", "that", "root", ".", "To", "help", "avoid", "having", "too", "frequent", "calls", "into", "the", "API", "server", "caller", "can", "provide", "a", "positive", ...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/merkle_root.go#L100-L111
159,978
keybase/client
go/libkb/chain_link.go
checkSpecialLinksTable
func (c ChainLink) checkSpecialLinksTable(tab map[keybase1.LinkID]SpecialChainLink, uid keybase1.UID, why string) (found bool, reason string, err error) { var scl SpecialChainLink // The combination of hashVerified and chainVerified should ensure that this link // is only considered here after all prevs have been successfully checked. if !c.canTrustID() { return false, "", ChainLinkError{fmt.Sprintf("cannot check if a link is %q without a verified link ID (linkID=%s, uid=%s, hash=%v, chain=%v, diskVersion=%d)", why, c.id, uid, c.hashVerified, c.chainVerified, c.diskVersion)} } scl, found = tab[c.LinkID().Export()] if !found { return false, "", nil } if !c.GetSeqno().Eq(scl.Seqno) { return false, "", NewChainLinkWrongSeqnoError(fmt.Sprintf("malicious bad link in from server has wrong seqno in %q check: %d != %d", why, c.GetSeqno(), scl.Seqno)) } if !scl.UID.Equal(uid) { return false, "", NewUIDMismatchError(fmt.Sprintf("malicious bad link from server in %q check; UID %s != %s", why, scl.UID, uid)) } return true, scl.Reason, nil }
go
func (c ChainLink) checkSpecialLinksTable(tab map[keybase1.LinkID]SpecialChainLink, uid keybase1.UID, why string) (found bool, reason string, err error) { var scl SpecialChainLink // The combination of hashVerified and chainVerified should ensure that this link // is only considered here after all prevs have been successfully checked. if !c.canTrustID() { return false, "", ChainLinkError{fmt.Sprintf("cannot check if a link is %q without a verified link ID (linkID=%s, uid=%s, hash=%v, chain=%v, diskVersion=%d)", why, c.id, uid, c.hashVerified, c.chainVerified, c.diskVersion)} } scl, found = tab[c.LinkID().Export()] if !found { return false, "", nil } if !c.GetSeqno().Eq(scl.Seqno) { return false, "", NewChainLinkWrongSeqnoError(fmt.Sprintf("malicious bad link in from server has wrong seqno in %q check: %d != %d", why, c.GetSeqno(), scl.Seqno)) } if !scl.UID.Equal(uid) { return false, "", NewUIDMismatchError(fmt.Sprintf("malicious bad link from server in %q check; UID %s != %s", why, scl.UID, uid)) } return true, scl.Reason, nil }
[ "func", "(", "c", "ChainLink", ")", "checkSpecialLinksTable", "(", "tab", "map", "[", "keybase1", ".", "LinkID", "]", "SpecialChainLink", ",", "uid", "keybase1", ".", "UID", ",", "why", "string", ")", "(", "found", "bool", ",", "reason", "string", ",", "...
// See NCC-KB2018-006
[ "See", "NCC", "-", "KB2018", "-", "006" ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L245-L265
159,979
keybase/client
go/libkb/chain_link.go
ToMerkleTriple
func (c ChainLink) ToMerkleTriple() *MerkleTriple { if c.IsStubbed() { return nil } return &MerkleTriple{ Seqno: c.GetSeqno(), LinkID: c.id, SigID: c.GetSigID(), } }
go
func (c ChainLink) ToMerkleTriple() *MerkleTriple { if c.IsStubbed() { return nil } return &MerkleTriple{ Seqno: c.GetSeqno(), LinkID: c.id, SigID: c.GetSigID(), } }
[ "func", "(", "c", "ChainLink", ")", "ToMerkleTriple", "(", ")", "*", "MerkleTriple", "{", "if", "c", ".", "IsStubbed", "(", ")", "{", "return", "nil", "\n", "}", "\n", "return", "&", "MerkleTriple", "{", "Seqno", ":", "c", ".", "GetSeqno", "(", ")", ...
// ToLinkSummary converts a ChainLink into a MerkleTriple object.
[ "ToLinkSummary", "converts", "a", "ChainLink", "into", "a", "MerkleTriple", "object", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L1482-L1491
159,980
keybase/client
go/libkb/chain_link.go
IsHighUserLink
func (c ChainLink) IsHighUserLink(mctx MetaContext, uid keybase1.UID) (bool, error) { v2Type, err := c.GetSigchainV2Type() if err != nil { return false, err } hardcodedEldest := false if c.GetSeqno() > 1 { prevLink := c.parent.GetLinkFromSeqno(c.GetSeqno() - 1) if prevLink == nil { return false, ChainLinkWrongSeqnoError{} } hardcodedEldest, err = isSubchainStart(mctx, &c, prevLink, uid) if err != nil { return false, err } } isFirstLink := v2Type == SigchainV2TypeEldest || c.GetSeqno() == 1 || hardcodedEldest isNewHighLink := isFirstLink || v2Type == SigchainV2TypeRevoke || v2Type == SigchainV2TypeWebServiceBindingWithRevoke || v2Type == SigchainV2TypeCryptocurrencyWithRevoke || v2Type == SigchainV2TypeSibkey || v2Type == SigchainV2TypePGPUpdate return isNewHighLink, nil }
go
func (c ChainLink) IsHighUserLink(mctx MetaContext, uid keybase1.UID) (bool, error) { v2Type, err := c.GetSigchainV2Type() if err != nil { return false, err } hardcodedEldest := false if c.GetSeqno() > 1 { prevLink := c.parent.GetLinkFromSeqno(c.GetSeqno() - 1) if prevLink == nil { return false, ChainLinkWrongSeqnoError{} } hardcodedEldest, err = isSubchainStart(mctx, &c, prevLink, uid) if err != nil { return false, err } } isFirstLink := v2Type == SigchainV2TypeEldest || c.GetSeqno() == 1 || hardcodedEldest isNewHighLink := isFirstLink || v2Type == SigchainV2TypeRevoke || v2Type == SigchainV2TypeWebServiceBindingWithRevoke || v2Type == SigchainV2TypeCryptocurrencyWithRevoke || v2Type == SigchainV2TypeSibkey || v2Type == SigchainV2TypePGPUpdate return isNewHighLink, nil }
[ "func", "(", "c", "ChainLink", ")", "IsHighUserLink", "(", "mctx", "MetaContext", ",", "uid", "keybase1", ".", "UID", ")", "(", "bool", ",", "error", ")", "{", "v2Type", ",", "err", ":=", "c", ".", "GetSigchainV2Type", "(", ")", "\n", "if", "err", "!...
// IsHighUserLink determines whether a chainlink counts as "high" in a user's chain, // which is defined as an Eldest link, a link with seqno=1, a link that is Sibkey, // PGPUpdate, Revoke, or any link that is revoking.
[ "IsHighUserLink", "determines", "whether", "a", "chainlink", "counts", "as", "high", "in", "a", "user", "s", "chain", "which", "is", "defined", "as", "an", "Eldest", "link", "a", "link", "with", "seqno", "=", "1", "a", "link", "that", "is", "Sibkey", "PG...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/chain_link.go#L1545-L1571
159,981
keybase/client
go/teams/teams.go
ApplicationKey
func (t *Team) ApplicationKey(ctx context.Context, application keybase1.TeamApplication) (keybase1.TeamApplicationKey, error) { latestGen := t.chain().GetLatestGeneration() return t.ApplicationKeyAtGeneration(ctx, application, latestGen) }
go
func (t *Team) ApplicationKey(ctx context.Context, application keybase1.TeamApplication) (keybase1.TeamApplicationKey, error) { latestGen := t.chain().GetLatestGeneration() return t.ApplicationKeyAtGeneration(ctx, application, latestGen) }
[ "func", "(", "t", "*", "Team", ")", "ApplicationKey", "(", "ctx", "context", ".", "Context", ",", "application", "keybase1", ".", "TeamApplication", ")", "(", "keybase1", ".", "TeamApplicationKey", ",", "error", ")", "{", "latestGen", ":=", "t", ".", "chai...
// ApplicationKey returns the most recent key for an application.
[ "ApplicationKey", "returns", "the", "most", "recent", "key", "for", "an", "application", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L429-L432
159,982
keybase/client
go/teams/teams.go
InviteMember
func (t *Team) InviteMember(ctx context.Context, username string, role keybase1.TeamRole, resolvedUsername libkb.NormalizedUsername, uv keybase1.UserVersion) (keybase1.TeamAddMemberResult, error) { // if a user version was previously loaded, then there is a keybase user for username, but // without a PUK or without any keys. if uv.Uid.Exists() { return t.inviteKeybaseMember(ctx, uv, role, resolvedUsername) } // If a social, or email, or other type of invite, assert it's not an owner. if role.IsOrAbove(keybase1.TeamRole_OWNER) { return keybase1.TeamAddMemberResult{}, errors.New("You cannot invite an owner to a team.") } return t.inviteSBSMember(ctx, username, role) }
go
func (t *Team) InviteMember(ctx context.Context, username string, role keybase1.TeamRole, resolvedUsername libkb.NormalizedUsername, uv keybase1.UserVersion) (keybase1.TeamAddMemberResult, error) { // if a user version was previously loaded, then there is a keybase user for username, but // without a PUK or without any keys. if uv.Uid.Exists() { return t.inviteKeybaseMember(ctx, uv, role, resolvedUsername) } // If a social, or email, or other type of invite, assert it's not an owner. if role.IsOrAbove(keybase1.TeamRole_OWNER) { return keybase1.TeamAddMemberResult{}, errors.New("You cannot invite an owner to a team.") } return t.inviteSBSMember(ctx, username, role) }
[ "func", "(", "t", "*", "Team", ")", "InviteMember", "(", "ctx", "context", ".", "Context", ",", "username", "string", ",", "role", "keybase1", ".", "TeamRole", ",", "resolvedUsername", "libkb", ".", "NormalizedUsername", ",", "uv", "keybase1", ".", "UserVers...
// If uv.Uid is set, then username is ignored. // Otherwise resolvedUsername and uv are ignored.
[ "If", "uv", ".", "Uid", "is", "set", "then", "username", "is", "ignored", ".", "Otherwise", "resolvedUsername", "and", "uv", "are", "ignored", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L908-L921
159,983
keybase/client
go/teams/teams.go
ForceMerkleRootUpdate
func (t *Team) ForceMerkleRootUpdate(ctx context.Context) error { return ForceMerkleRootUpdateByTeamID(t.MetaContext(ctx), t.ID) }
go
func (t *Team) ForceMerkleRootUpdate(ctx context.Context) error { return ForceMerkleRootUpdateByTeamID(t.MetaContext(ctx), t.ID) }
[ "func", "(", "t", "*", "Team", ")", "ForceMerkleRootUpdate", "(", "ctx", "context", ".", "Context", ")", "error", "{", "return", "ForceMerkleRootUpdateByTeamID", "(", "t", ".", "MetaContext", "(", "ctx", ")", ",", "t", ".", "ID", ")", "\n", "}" ]
// ForceMerkleRootUpdate will call LookupTeam on MerkleClient to // update cached merkle root to include latest team sigs. Needed if // client wants to create a signature that refers to an adminship, // signature's merkle_root has to be more fresh than adminship's.
[ "ForceMerkleRootUpdate", "will", "call", "LookupTeam", "on", "MerkleClient", "to", "update", "cached", "merkle", "root", "to", "include", "latest", "team", "sigs", ".", "Needed", "if", "client", "wants", "to", "create", "a", "signature", "that", "refers", "to", ...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L1668-L1670
159,984
keybase/client
go/teams/teams.go
AllAdmins
func (t *Team) AllAdmins(ctx context.Context) ([]keybase1.UserVersion, error) { set := make(map[keybase1.UserVersion]bool) owners, err := t.UsersWithRole(keybase1.TeamRole_OWNER) if err != nil { return nil, err } for _, m := range owners { set[m] = true } admins, err := t.UsersWithRole(keybase1.TeamRole_ADMIN) if err != nil { return nil, err } for _, m := range admins { set[m] = true } if t.IsSubteam() { imp, err := t.G().GetTeamLoader().ImplicitAdmins(ctx, t.ID) if err != nil { return nil, err } for _, m := range imp { set[m] = true } } var all []keybase1.UserVersion for uv := range set { all = append(all, uv) } return all, nil }
go
func (t *Team) AllAdmins(ctx context.Context) ([]keybase1.UserVersion, error) { set := make(map[keybase1.UserVersion]bool) owners, err := t.UsersWithRole(keybase1.TeamRole_OWNER) if err != nil { return nil, err } for _, m := range owners { set[m] = true } admins, err := t.UsersWithRole(keybase1.TeamRole_ADMIN) if err != nil { return nil, err } for _, m := range admins { set[m] = true } if t.IsSubteam() { imp, err := t.G().GetTeamLoader().ImplicitAdmins(ctx, t.ID) if err != nil { return nil, err } for _, m := range imp { set[m] = true } } var all []keybase1.UserVersion for uv := range set { all = append(all, uv) } return all, nil }
[ "func", "(", "t", "*", "Team", ")", "AllAdmins", "(", "ctx", "context", ".", "Context", ")", "(", "[", "]", "keybase1", ".", "UserVersion", ",", "error", ")", "{", "set", ":=", "make", "(", "map", "[", "keybase1", ".", "UserVersion", "]", "bool", "...
// All admins, owners, and implicit admins of this team.
[ "All", "admins", "owners", "and", "implicit", "admins", "of", "this", "team", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L1678-L1712
159,985
keybase/client
go/teams/teams.go
notify
func (t *Team) notify(ctx context.Context, changes keybase1.TeamChangeSet, latestSeqno keybase1.Seqno) error { changes.KeyRotated = changes.KeyRotated || t.rotated m := libkb.NewMetaContext(ctx, t.G()) var err error if latestSeqno > 0 { err = HintLatestSeqno(m, t.ID, latestSeqno) } t.G().NotifyRouter.HandleTeamChangedByBothKeys(ctx, t.ID, t.Name().String(), t.NextSeqno(), t.IsImplicit(), changes) return err }
go
func (t *Team) notify(ctx context.Context, changes keybase1.TeamChangeSet, latestSeqno keybase1.Seqno) error { changes.KeyRotated = changes.KeyRotated || t.rotated m := libkb.NewMetaContext(ctx, t.G()) var err error if latestSeqno > 0 { err = HintLatestSeqno(m, t.ID, latestSeqno) } t.G().NotifyRouter.HandleTeamChangedByBothKeys(ctx, t.ID, t.Name().String(), t.NextSeqno(), t.IsImplicit(), changes) return err }
[ "func", "(", "t", "*", "Team", ")", "notify", "(", "ctx", "context", ".", "Context", ",", "changes", "keybase1", ".", "TeamChangeSet", ",", "latestSeqno", "keybase1", ".", "Seqno", ")", "error", "{", "changes", ".", "KeyRotated", "=", "changes", ".", "Ke...
// Send notifyrouter messages. // Modifies `changes` // Update to the latest seqno that we're passing though, don't make any assumptions about number of sigs. // Note that we're probably going to be getting this same notification a second time, since it will // bounce off a gregor and back to us. But they are idempotent, so it should be fine to be double-notified.
[ "Send", "notifyrouter", "messages", ".", "Modifies", "changes", "Update", "to", "the", "latest", "seqno", "that", "we", "re", "passing", "though", "don", "t", "make", "any", "assumptions", "about", "number", "of", "sigs", ".", "Note", "that", "we", "re", "...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/teams.go#L2015-L2024
159,986
keybase/client
go/teams/ftl.go
NewFastTeamLoader
func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader { ret := &FastTeamChainLoader{ world: NewLoaderContextFromG(g), featureFlagGate: libkb.NewFeatureFlagGate(libkb.FeatureFTL, 2*time.Minute), storage: NewFTLStorage(g), } return ret }
go
func NewFastTeamLoader(g *libkb.GlobalContext) *FastTeamChainLoader { ret := &FastTeamChainLoader{ world: NewLoaderContextFromG(g), featureFlagGate: libkb.NewFeatureFlagGate(libkb.FeatureFTL, 2*time.Minute), storage: NewFTLStorage(g), } return ret }
[ "func", "NewFastTeamLoader", "(", "g", "*", "libkb", ".", "GlobalContext", ")", "*", "FastTeamChainLoader", "{", "ret", ":=", "&", "FastTeamChainLoader", "{", "world", ":", "NewLoaderContextFromG", "(", "g", ")", ",", "featureFlagGate", ":", "libkb", ".", "New...
// NewFastLoader makes a new fast loader and initializes it.
[ "NewFastLoader", "makes", "a", "new", "fast", "loader", "and", "initializes", "it", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L54-L61
159,987
keybase/client
go/teams/ftl.go
NewFastTeamLoaderAndInstall
func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader { l := NewFastTeamLoader(g) g.SetFastTeamLoader(l) g.AddLogoutHook(l, "fastTeamLoader") g.AddDbNukeHook(l, "fastTeamLoader") return l }
go
func NewFastTeamLoaderAndInstall(g *libkb.GlobalContext) *FastTeamChainLoader { l := NewFastTeamLoader(g) g.SetFastTeamLoader(l) g.AddLogoutHook(l, "fastTeamLoader") g.AddDbNukeHook(l, "fastTeamLoader") return l }
[ "func", "NewFastTeamLoaderAndInstall", "(", "g", "*", "libkb", ".", "GlobalContext", ")", "*", "FastTeamChainLoader", "{", "l", ":=", "NewFastTeamLoader", "(", "g", ")", "\n", "g", ".", "SetFastTeamLoader", "(", "l", ")", "\n", "g", ".", "AddLogoutHook", "("...
// NewFastTeamLoaderAndInstall creates a new loader and installs it into G.
[ "NewFastTeamLoaderAndInstall", "creates", "a", "new", "loader", "and", "installs", "it", "into", "G", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L64-L70
159,988
keybase/client
go/teams/ftl.go
Load
func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) { m = ftlLogTag(m) defer m.TraceTimed(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), func() error { return err })() originalArg := arg.DeepCopy() err = f.featureFlagGate.ErrorIfFlagged(m) if err != nil { return res, err } res, err = f.loadOneAttempt(m, arg) if err != nil { return res, err } if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) { m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String()) arg.ForceRefresh = true res, err = f.loadOneAttempt(m, arg) if err != nil { return res, err } if !arg.AssertTeamName.Eq(res.Name) { return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String())) } } if ShouldRunBoxAudit(m) { newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public)) if shouldReload { return f.Load(newM, originalArg) } } else { m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...") } return res, nil }
go
func (f *FastTeamChainLoader) Load(m libkb.MetaContext, arg keybase1.FastTeamLoadArg) (res keybase1.FastTeamLoadRes, err error) { m = ftlLogTag(m) defer m.TraceTimed(fmt.Sprintf("FastTeamChainLoader#Load(%+v)", arg), func() error { return err })() originalArg := arg.DeepCopy() err = f.featureFlagGate.ErrorIfFlagged(m) if err != nil { return res, err } res, err = f.loadOneAttempt(m, arg) if err != nil { return res, err } if arg.AssertTeamName != nil && !arg.AssertTeamName.Eq(res.Name) { m.Debug("Did not get expected subteam name; will reattempt with forceRefresh (%s != %s)", arg.AssertTeamName.String(), res.Name.String()) arg.ForceRefresh = true res, err = f.loadOneAttempt(m, arg) if err != nil { return res, err } if !arg.AssertTeamName.Eq(res.Name) { return res, NewBadNameError(fmt.Sprintf("After force-refresh, still bad team name: wanted %s, but got %s", arg.AssertTeamName.String(), res.Name.String())) } } if ShouldRunBoxAudit(m) { newM, shouldReload := VerifyBoxAudit(m, res.Name.ToTeamID(arg.Public)) if shouldReload { return f.Load(newM, originalArg) } } else { m.Debug("Box auditor feature flagged off; not checking jail during ftl team load...") } return res, nil }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "Load", "(", "m", "libkb", ".", "MetaContext", ",", "arg", "keybase1", ".", "FastTeamLoadArg", ")", "(", "res", "keybase1", ".", "FastTeamLoadRes", ",", "err", "error", ")", "{", "m", "=", "ftlLogTag", "...
// Load fast-loads the given team. Provide some hints as to how to load it. You can specify an application // and key generations needed, if you are entering chat. Those links will be returned unstubbed // from the server, and then the keys can be output in the result.
[ "Load", "fast", "-", "loads", "the", "given", "team", ".", "Provide", "some", "hints", "as", "to", "how", "to", "load", "it", ".", "You", "can", "specify", "an", "application", "and", "key", "generations", "needed", "if", "you", "are", "entering", "chat"...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L85-L122
159,989
keybase/client
go/teams/ftl.go
verifyTeamNameViaParentLoad
func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) { defer m.Trace(fmt.Sprintf("FastTeamChainLoader#verifyTeamNameViaParentLoad(%s,%s)", id, unverifiedName), func() error { return err })() if parent == nil { if !unverifiedName.IsRootTeam() { return res, NewBadNameError("expected a root team") } if !unverifiedName.ToTeamID(isPublic).Eq(id) { return res, NewBadNameError("root team v. team ID mismatch") } return unverifiedName, nil } if parent.ParentID.IsPublic() != isPublic { return res, NewBadPublicError(parent.ParentID, isPublic) } parentRes, err := f.load(m, fastLoadArg{ FastTeamLoadArg: keybase1.FastTeamLoadArg{ ID: parent.ParentID, Public: isPublic, ForceRefresh: forceRefresh, }, downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno}, needLatestName: true, readSubteamID: bottomSubteam, }) if err != nil { return res, err } downPointer, ok := parentRes.downPointers[parent.ParentSeqno] if !ok { return res, NewBadNameError("down pointer not found in parent") } suffix := downPointer.NameComponent parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh) if err != nil { return res, err } return parentName.Append(suffix) }
go
func (f *FastTeamChainLoader) verifyTeamNameViaParentLoad(m libkb.MetaContext, id keybase1.TeamID, isPublic bool, unverifiedName keybase1.TeamName, parent *keybase1.UpPointer, bottomSubteam keybase1.TeamID, forceRefresh bool) (res keybase1.TeamName, err error) { defer m.Trace(fmt.Sprintf("FastTeamChainLoader#verifyTeamNameViaParentLoad(%s,%s)", id, unverifiedName), func() error { return err })() if parent == nil { if !unverifiedName.IsRootTeam() { return res, NewBadNameError("expected a root team") } if !unverifiedName.ToTeamID(isPublic).Eq(id) { return res, NewBadNameError("root team v. team ID mismatch") } return unverifiedName, nil } if parent.ParentID.IsPublic() != isPublic { return res, NewBadPublicError(parent.ParentID, isPublic) } parentRes, err := f.load(m, fastLoadArg{ FastTeamLoadArg: keybase1.FastTeamLoadArg{ ID: parent.ParentID, Public: isPublic, ForceRefresh: forceRefresh, }, downPointersNeeded: []keybase1.Seqno{parent.ParentSeqno}, needLatestName: true, readSubteamID: bottomSubteam, }) if err != nil { return res, err } downPointer, ok := parentRes.downPointers[parent.ParentSeqno] if !ok { return res, NewBadNameError("down pointer not found in parent") } suffix := downPointer.NameComponent parentName, err := f.verifyTeamNameViaParentLoad(m, parent.ParentID, isPublic, parentRes.unverifiedName, parentRes.upPointer, bottomSubteam, forceRefresh) if err != nil { return res, err } return parentName.Append(suffix) }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "verifyTeamNameViaParentLoad", "(", "m", "libkb", ".", "MetaContext", ",", "id", "keybase1", ".", "TeamID", ",", "isPublic", "bool", ",", "unverifiedName", "keybase1", ".", "TeamName", ",", "parent", "*", "key...
// verifyTeamNameViaParentLoad takes a team ID, and a pointer to a parent team's sigchain, and computes // the full resolved team name. If the pointer is null, we'll assume this is a root team and do the // verification via hash-comparison.
[ "verifyTeamNameViaParentLoad", "takes", "a", "team", "ID", "and", "a", "pointer", "to", "a", "parent", "team", "s", "sigchain", "and", "computes", "the", "full", "resolved", "team", "name", ".", "If", "the", "pointer", "is", "null", "we", "ll", "assume", "...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L161-L204
159,990
keybase/client
go/teams/ftl.go
load
func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), func() error { return err })() // Single-flight lock by team ID. lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String()) defer lock.Release(m.Ctx()) return f.loadLockedWithRetries(m, arg) }
go
func (f *FastTeamChainLoader) load(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { defer m.Trace(fmt.Sprintf("FastTeamChainLoader#load(%+v)", arg), func() error { return err })() // Single-flight lock by team ID. lock := f.locktab.AcquireOnName(m.Ctx(), m.G(), arg.ID.String()) defer lock.Release(m.Ctx()) return f.loadLockedWithRetries(m, arg) }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "load", "(", "m", "libkb", ".", "MetaContext", ",", "arg", "fastLoadArg", ")", "(", "res", "*", "fastLoadRes", ",", "err", "error", ")", "{", "defer", "m", ".", "Trace", "(", "fmt", ".", "Sprintf", "...
// load acquires a lock by team ID, and the runs loadLockedWithRetries.
[ "load", "acquires", "a", "lock", "by", "team", "ID", "and", "the", "runs", "loadLockedWithRetries", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L232-L241
159,991
keybase/client
go/teams/ftl.go
loadLockedWithRetries
func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { for i := 0; i < 2; i++ { res, err = f.loadLocked(m, arg) if err == nil { return res, err } if _, ok := err.(FTLMissingSeedError); !ok { return nil, err } m.Debug("Got retriable error %s; will force reset", err) arg.forceReset = true } return res, err }
go
func (f *FastTeamChainLoader) loadLockedWithRetries(m libkb.MetaContext, arg fastLoadArg) (res *fastLoadRes, err error) { for i := 0; i < 2; i++ { res, err = f.loadLocked(m, arg) if err == nil { return res, err } if _, ok := err.(FTLMissingSeedError); !ok { return nil, err } m.Debug("Got retriable error %s; will force reset", err) arg.forceReset = true } return res, err }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "loadLockedWithRetries", "(", "m", "libkb", ".", "MetaContext", ",", "arg", "fastLoadArg", ")", "(", "res", "*", "fastLoadRes", ",", "err", "error", ")", "{", "for", "i", ":=", "0", ";", "i", "<", "2",...
// loadLockedWithRetries attempts two loads of the team. If the first iteration returns an FTLMissingSeedError, // we'll blast through the cache and attempt a full reload a second time. Then that's for all the marbles.
[ "loadLockedWithRetries", "attempts", "two", "loads", "of", "the", "team", ".", "If", "the", "first", "iteration", "returns", "an", "FTLMissingSeedError", "we", "ll", "blast", "through", "the", "cache", "and", "attempt", "a", "full", "reload", "a", "second", "t...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L245-L259
159,992
keybase/client
go/teams/ftl.go
deriveSeedAtGeneration
func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (seed keybase1.PerTeamKeySeed, err error) { seed, ok := state.Chain.PerTeamKeySeedsVerified[gen] if ok { return seed, nil } var tmp keybase1.PerTeamKeySeed tmp, ok = state.PerTeamKeySeedsUnverified[gen] if !ok { // See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam // name before we were members of the team, and then later get added to the team, and then try to // reload the team. We didn't have boxes from the first time around, so just force a full reload. // It's inefficient but it's a very rare case. return seed, NewFTLMissingSeedError(gen) } ptkChain, ok := state.Chain.PerTeamKeys[gen] if !ok { return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen)) } km, err := NewTeamKeyManagerWithSecret(tmp, gen) if err != nil { return seed, err } sigKey, err := km.SigningKey() if err != nil { return seed, err } if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) { m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID) return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen)) } encKey, err := km.EncryptionKey() if err != nil { return seed, err } if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) { m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID) return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen)) } // write back to cache seed = tmp state.Chain.PerTeamKeySeedsVerified[gen] = seed return seed, err }
go
func (f *FastTeamChainLoader) deriveSeedAtGeneration(m libkb.MetaContext, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (seed keybase1.PerTeamKeySeed, err error) { seed, ok := state.Chain.PerTeamKeySeedsVerified[gen] if ok { return seed, nil } var tmp keybase1.PerTeamKeySeed tmp, ok = state.PerTeamKeySeedsUnverified[gen] if !ok { // See CORE-9207. We can hit this case if we previously loaded a parent team for verifying a subteam // name before we were members of the team, and then later get added to the team, and then try to // reload the team. We didn't have boxes from the first time around, so just force a full reload. // It's inefficient but it's a very rare case. return seed, NewFTLMissingSeedError(gen) } ptkChain, ok := state.Chain.PerTeamKeys[gen] if !ok { return seed, NewFastLoadError(fmt.Sprintf("no per team key public halves at generation %d", gen)) } km, err := NewTeamKeyManagerWithSecret(tmp, gen) if err != nil { return seed, err } sigKey, err := km.SigningKey() if err != nil { return seed, err } if !ptkChain.SigKID.SecureEqual(sigKey.GetKID()) { m.Debug("sig KID gen:%v (local) %v != %v (chain)", gen, sigKey.GetKID(), ptkChain.SigKID) return seed, NewFastLoadError(fmt.Sprintf("wrong team key (sig) found at generation %v", gen)) } encKey, err := km.EncryptionKey() if err != nil { return seed, err } if !ptkChain.EncKID.SecureEqual(encKey.GetKID()) { m.Debug("enc KID gen:%v (local) %v != %v (chain)", gen, encKey.GetKID(), ptkChain.EncKID) return seed, NewFastLoadError(fmt.Sprintf("wrong team key (enc) found at generation %v", gen)) } // write back to cache seed = tmp state.Chain.PerTeamKeySeedsVerified[gen] = seed return seed, err }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "deriveSeedAtGeneration", "(", "m", "libkb", ".", "MetaContext", ",", "gen", "keybase1", ".", "PerTeamKeyGeneration", ",", "state", "*", "keybase1", ".", "FastTeamData", ")", "(", "seed", "keybase1", ".", "Per...
// dervieSeedAtGeneration either goes to cache or rederives the PTK private seed // for the given generation gen.
[ "dervieSeedAtGeneration", "either", "goes", "to", "cache", "or", "rederives", "the", "PTK", "private", "seed", "for", "the", "given", "generation", "gen", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L263-L313
159,993
keybase/client
go/teams/ftl.go
deriveKeyForApplicationAtGeneration
func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (key keybase1.TeamApplicationKey, err error) { seed, err := f.deriveSeedAtGeneration(m, gen, state) if err != nil { return key, err } var mask *keybase1.MaskB64 if m := state.ReaderKeyMasks[app]; m != nil { tmp, ok := m[gen] if ok { mask = &tmp } } if mask == nil { m.Debug("Could not get reader key mask for <%s,%d>", app, gen) if state.ID().IsSubTeam() { m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam") return key, NewNotExplicitMemberOfSubteamError() } return key, NewFastLoadError("Could not load application keys") } rkm := keybase1.ReaderKeyMask{ Application: app, Generation: gen, Mask: *mask, } return applicationKeyForMask(rkm, seed) }
go
func (f *FastTeamChainLoader) deriveKeyForApplicationAtGeneration(m libkb.MetaContext, app keybase1.TeamApplication, gen keybase1.PerTeamKeyGeneration, state *keybase1.FastTeamData) (key keybase1.TeamApplicationKey, err error) { seed, err := f.deriveSeedAtGeneration(m, gen, state) if err != nil { return key, err } var mask *keybase1.MaskB64 if m := state.ReaderKeyMasks[app]; m != nil { tmp, ok := m[gen] if ok { mask = &tmp } } if mask == nil { m.Debug("Could not get reader key mask for <%s,%d>", app, gen) if state.ID().IsSubTeam() { m.Debug("guessing lack of RKM is due to not being an explicit member of the subteam") return key, NewNotExplicitMemberOfSubteamError() } return key, NewFastLoadError("Could not load application keys") } rkm := keybase1.ReaderKeyMask{ Application: app, Generation: gen, Mask: *mask, } return applicationKeyForMask(rkm, seed) }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "deriveKeyForApplicationAtGeneration", "(", "m", "libkb", ".", "MetaContext", ",", "app", "keybase1", ".", "TeamApplication", ",", "gen", "keybase1", ".", "PerTeamKeyGeneration", ",", "state", "*", "keybase1", "."...
// deriveKeyForApplicationAtGeneration pulls from cache or generates the PTK for the // given application at the given generation.
[ "deriveKeyForApplicationAtGeneration", "pulls", "from", "cache", "or", "generates", "the", "PTK", "for", "the", "given", "application", "at", "the", "given", "generation", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L317-L346
159,994
keybase/client
go/teams/ftl.go
deriveKeysForApplication
func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, state *keybase1.FastTeamData) (keys []keybase1.TeamApplicationKey, err error) { var didLatest bool doKey := func(gen keybase1.PerTeamKeyGeneration) error { var key keybase1.TeamApplicationKey key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, state) if err != nil { return err } keys = append(keys, key) if gen == state.LatestKeyGeneration { didLatest = true } return nil } if arg.NeedLatestKey { // This debug is useful to have since it will spell out which version is the latest in the log // if the caller asked for latest. m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", state.LatestKeyGeneration) } for _, gen := range arg.KeyGenerationsNeeded { if err = doKey(gen); err != nil { return nil, err } } if !didLatest && arg.NeedLatestKey { if err = doKey(state.LatestKeyGeneration); err != nil { return nil, err } } return keys, nil }
go
func (f *FastTeamChainLoader) deriveKeysForApplication(m libkb.MetaContext, app keybase1.TeamApplication, arg fastLoadArg, state *keybase1.FastTeamData) (keys []keybase1.TeamApplicationKey, err error) { var didLatest bool doKey := func(gen keybase1.PerTeamKeyGeneration) error { var key keybase1.TeamApplicationKey key, err = f.deriveKeyForApplicationAtGeneration(m, app, gen, state) if err != nil { return err } keys = append(keys, key) if gen == state.LatestKeyGeneration { didLatest = true } return nil } if arg.NeedLatestKey { // This debug is useful to have since it will spell out which version is the latest in the log // if the caller asked for latest. m.Debug("FastTeamChainLoader#deriveKeysForApplication: sending back latest at key generation %d", state.LatestKeyGeneration) } for _, gen := range arg.KeyGenerationsNeeded { if err = doKey(gen); err != nil { return nil, err } } if !didLatest && arg.NeedLatestKey { if err = doKey(state.LatestKeyGeneration); err != nil { return nil, err } } return keys, nil }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "deriveKeysForApplication", "(", "m", "libkb", ".", "MetaContext", ",", "app", "keybase1", ".", "TeamApplication", ",", "arg", "fastLoadArg", ",", "state", "*", "keybase1", ".", "FastTeamData", ")", "(", "keys...
// deriveKeysForApplication pulls from cache or generates several geneartions of PTKs // for the given application.
[ "deriveKeysForApplication", "pulls", "from", "cache", "or", "generates", "several", "geneartions", "of", "PTKs", "for", "the", "given", "application", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L350-L383
159,995
keybase/client
go/teams/ftl.go
toResult
func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (res *fastLoadRes, err error) { res = &fastLoadRes{ unverifiedName: state.Name, downPointers: state.Chain.DownPointers, upPointer: state.Chain.LastUpPointer, } res.applicationKeys, err = f.deriveKeys(m, arg, state) if err != nil { return nil, err } return res, nil }
go
func (f *FastTeamChainLoader) toResult(m libkb.MetaContext, arg fastLoadArg, state *keybase1.FastTeamData) (res *fastLoadRes, err error) { res = &fastLoadRes{ unverifiedName: state.Name, downPointers: state.Chain.DownPointers, upPointer: state.Chain.LastUpPointer, } res.applicationKeys, err = f.deriveKeys(m, arg, state) if err != nil { return nil, err } return res, nil }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "toResult", "(", "m", "libkb", ".", "MetaContext", ",", "arg", "fastLoadArg", ",", "state", "*", "keybase1", ".", "FastTeamData", ")", "(", "res", "*", "fastLoadRes", ",", "err", "error", ")", "{", "res"...
// toResult turns the current fast state into a fastLoadRes.
[ "toResult", "turns", "the", "current", "fast", "state", "into", "a", "fastLoadRes", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L400-L411
159,996
keybase/client
go/teams/ftl.go
findStateInCache
func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) *keybase1.FastTeamData { tmp := f.storage.Get(m, id, id.IsPublic()) if tmp == nil { return nil } return tmp }
go
func (f *FastTeamChainLoader) findStateInCache(m libkb.MetaContext, id keybase1.TeamID) *keybase1.FastTeamData { tmp := f.storage.Get(m, id, id.IsPublic()) if tmp == nil { return nil } return tmp }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "findStateInCache", "(", "m", "libkb", ".", "MetaContext", ",", "id", "keybase1", ".", "TeamID", ")", "*", "keybase1", ".", "FastTeamData", "{", "tmp", ":=", "f", ".", "storage", ".", "Get", "(", "m", ...
// findState in cache finds the team ID's state in an in-memory cache.
[ "findState", "in", "cache", "finds", "the", "team", "ID", "s", "state", "in", "an", "in", "-", "memory", "cache", "." ]
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L414-L420
159,997
keybase/client
go/teams/ftl.go
stateHasKeys
func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (fresh bool) { gens := make(map[keybase1.PerTeamKeyGeneration]struct{}) fresh = true if arg.NeedLatestKey && !state.LoadedLatest { m.Debug("latest was never loaded, we need to load it") shoppingList.needMerkleRefresh = true shoppingList.needLatestKey = true fresh = false } // The key generations needed are the ones passed in, and also, potentially, our cached // LatestKeyGeneration from the state. It could be that when we go to the server, this is no // longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should // pull down the mask, since it's a bug to not have it if it turns out the server refresh // didn't budge the latest key generation. kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...) if arg.NeedLatestKey && state.LoadedLatest && state.LatestKeyGeneration > 0 { kgn = append(kgn, state.LatestKeyGeneration) } for _, app := range arg.Applications { for _, gen := range kgn { add := false if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil { m.Debug("state doesn't have mask for <%d,%d>", app, gen) add = true } if !stateHasKeySeed(m, gen, state) { m.Debug("state doesn't have key seed for gen=%d", gen) add = true } if add { gens[gen] = struct{}{} fresh = false } } } shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...) if !fresh { for gen := range gens { shoppingList.generations = append(shoppingList.generations, gen) } } return fresh }
go
func stateHasKeys(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (fresh bool) { gens := make(map[keybase1.PerTeamKeyGeneration]struct{}) fresh = true if arg.NeedLatestKey && !state.LoadedLatest { m.Debug("latest was never loaded, we need to load it") shoppingList.needMerkleRefresh = true shoppingList.needLatestKey = true fresh = false } // The key generations needed are the ones passed in, and also, potentially, our cached // LatestKeyGeneration from the state. It could be that when we go to the server, this is no // longer the LatestKeyGeneration, but it might be. It depends. But in either case, we should // pull down the mask, since it's a bug to not have it if it turns out the server refresh // didn't budge the latest key generation. kgn := append([]keybase1.PerTeamKeyGeneration{}, arg.KeyGenerationsNeeded...) if arg.NeedLatestKey && state.LoadedLatest && state.LatestKeyGeneration > 0 { kgn = append(kgn, state.LatestKeyGeneration) } for _, app := range arg.Applications { for _, gen := range kgn { add := false if state.ReaderKeyMasks[app] == nil || state.ReaderKeyMasks[app][gen] == nil { m.Debug("state doesn't have mask for <%d,%d>", app, gen) add = true } if !stateHasKeySeed(m, gen, state) { m.Debug("state doesn't have key seed for gen=%d", gen) add = true } if add { gens[gen] = struct{}{} fresh = false } } } shoppingList.applications = append([]keybase1.TeamApplication{}, arg.Applications...) if !fresh { for gen := range gens { shoppingList.generations = append(shoppingList.generations, gen) } } return fresh }
[ "func", "stateHasKeys", "(", "m", "libkb", ".", "MetaContext", ",", "shoppingList", "*", "shoppingList", ",", "arg", "fastLoadArg", ",", "state", "*", "keybase1", ".", "FastTeamData", ")", "(", "fresh", "bool", ")", "{", "gens", ":=", "make", "(", "map", ...
// stateHasKeys checks to see if the given state has the keys specified in the shopping list. If not, it will // modify the shopping list and return false. If yes, it will leave the shopping list unchanged and return // true.
[ "stateHasKeys", "checks", "to", "see", "if", "the", "given", "state", "has", "the", "keys", "specified", "in", "the", "shopping", "list", ".", "If", "not", "it", "will", "modify", "the", "shopping", "list", "and", "return", "false", ".", "If", "yes", "it...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L444-L492
159,998
keybase/client
go/teams/ftl.go
stateHasDownPointers
func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) { ret = true for _, seqno := range arg.downPointersNeeded { if _, ok := state.Chain.DownPointers[seqno]; !ok { m.Debug("Down pointer at seqno=%d wasn't found", seqno) shoppingList.addDownPointer(seqno) ret = false } } return ret }
go
func stateHasDownPointers(m libkb.MetaContext, shoppingList *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) (ret bool) { ret = true for _, seqno := range arg.downPointersNeeded { if _, ok := state.Chain.DownPointers[seqno]; !ok { m.Debug("Down pointer at seqno=%d wasn't found", seqno) shoppingList.addDownPointer(seqno) ret = false } } return ret }
[ "func", "stateHasDownPointers", "(", "m", "libkb", ".", "MetaContext", ",", "shoppingList", "*", "shoppingList", ",", "arg", "fastLoadArg", ",", "state", "*", "keybase1", ".", "FastTeamData", ")", "(", "ret", "bool", ")", "{", "ret", "=", "true", "\n\n", "...
// stateHasDownPointers checks to see if the given state has the down pointers specified in the shopping list. // If not, it will change the shopping list to have the down pointers and return false. If yes, it will // leave the shopping list unchanged and return true.
[ "stateHasDownPointers", "checks", "to", "see", "if", "the", "given", "state", "has", "the", "down", "pointers", "specified", "in", "the", "shopping", "list", ".", "If", "not", "it", "will", "change", "the", "shopping", "list", "to", "have", "the", "down", ...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L497-L508
159,999
keybase/client
go/teams/ftl.go
computeWithPreviousState
func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) { cachedAt := state.CachedAt.Time() s.linksSince = state.Chain.Last.Seqno if arg.forceReset { s.linksSince = keybase1.Seqno(0) m.Debug("forceReset specified, so reloading from low=0") } if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour { m.Debug("cached value is more than an hour old (cached at %s)", cachedAt) s.needMerkleRefresh = true } if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno { m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno) s.needMerkleRefresh = true } if arg.ForceRefresh { m.Debug("refresh forced via flag") s.needMerkleRefresh = true } if !s.needMerkleRefresh && f.InForceRepollMode(m) { m.Debug("must repoll since in force mode") s.needMerkleRefresh = true } if !stateHasKeys(m, s, arg, state) { m.Debug("state was missing needed encryption keys, or we need the freshest") } if !stateHasDownPointers(m, s, arg, state) { m.Debug("state was missing unstubbed links") } }
go
func (f *FastTeamChainLoader) computeWithPreviousState(m libkb.MetaContext, s *shoppingList, arg fastLoadArg, state *keybase1.FastTeamData) { cachedAt := state.CachedAt.Time() s.linksSince = state.Chain.Last.Seqno if arg.forceReset { s.linksSince = keybase1.Seqno(0) m.Debug("forceReset specified, so reloading from low=0") } if arg.needChainTail() && m.G().Clock().Now().Sub(cachedAt) > time.Hour { m.Debug("cached value is more than an hour old (cached at %s)", cachedAt) s.needMerkleRefresh = true } if arg.needChainTail() && state.LatestSeqnoHint > state.Chain.Last.Seqno { m.Debug("cached value is stale: seqno %d > %d", state.LatestSeqnoHint, state.Chain.Last.Seqno) s.needMerkleRefresh = true } if arg.ForceRefresh { m.Debug("refresh forced via flag") s.needMerkleRefresh = true } if !s.needMerkleRefresh && f.InForceRepollMode(m) { m.Debug("must repoll since in force mode") s.needMerkleRefresh = true } if !stateHasKeys(m, s, arg, state) { m.Debug("state was missing needed encryption keys, or we need the freshest") } if !stateHasDownPointers(m, s, arg, state) { m.Debug("state was missing unstubbed links") } }
[ "func", "(", "f", "*", "FastTeamChainLoader", ")", "computeWithPreviousState", "(", "m", "libkb", ".", "MetaContext", ",", "s", "*", "shoppingList", ",", "arg", "fastLoadArg", ",", "state", "*", "keybase1", ".", "FastTeamData", ")", "{", "cachedAt", ":=", "s...
// computeWithPreviousState looks into the given load arg, and also our current cached state, to figure // what to get from the server. The results are compiled into a "shopping list" that we'll later // use when we concoct our server request.
[ "computeWithPreviousState", "looks", "into", "the", "given", "load", "arg", "and", "also", "our", "current", "cached", "state", "to", "figure", "what", "to", "get", "from", "the", "server", ".", "The", "results", "are", "compiled", "into", "a", "shopping", "...
b352622cd8cc94798cfacbcb56ada203c18e519e
https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/teams/ftl.go#L560-L591