id int32 0 167k | repo stringlengths 5 54 | path stringlengths 4 155 | func_name stringlengths 1 118 | original_string stringlengths 52 85.5k | language stringclasses 1
value | code stringlengths 52 85.5k | code_tokens listlengths 21 1.41k | docstring stringlengths 6 2.61k | docstring_tokens listlengths 3 215 | sha stringlengths 40 40 | url stringlengths 85 252 |
|---|---|---|---|---|---|---|---|---|---|---|---|
160,600 | keybase/client | go/protocol/keybase1/crypto.go | SignToString | func (c CryptoClient) SignToString(ctx context.Context, __arg SignToStringArg) (res string, err error) {
err = c.Cli.Call(ctx, "keybase.1.crypto.signToString", []interface{}{__arg}, &res)
return
} | go | func (c CryptoClient) SignToString(ctx context.Context, __arg SignToStringArg) (res string, err error) {
err = c.Cli.Call(ctx, "keybase.1.crypto.signToString", []interface{}{__arg}, &res)
return
} | [
"func",
"(",
"c",
"CryptoClient",
")",
"SignToString",
"(",
"ctx",
"context",
".",
"Context",
",",
"__arg",
"SignToStringArg",
")",
"(",
"res",
"string",
",",
"err",
"error",
")",
"{",
"err",
"=",
"c",
".",
"Cli",
".",
"Call",
"(",
"ctx",
",",
"\"",
... | // Same as the above except the full marshaled and encoded NaclSigInfo. | [
"Same",
"as",
"the",
"above",
"except",
"the",
"full",
"marshaled",
"and",
"encoded",
"NaclSigInfo",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/protocol/keybase1/crypto.go#L249-L252 |
160,601 | keybase/client | go/libkb/skb.go | DebugDumpKey | func DebugDumpKey(g *GlobalContext, name string, b []byte) {
tmp, err := ioutil.TempFile(os.TempDir(), "dump-"+name)
if err != nil {
g.Log.Warning("Failed to dumpKey %s: %s", name, err)
return
}
g.Log.Notice("DUMPKEY %s -> %s", name, tmp.Name())
buf := bytes.NewBuffer(b)
io.Copy(tmp, buf)
tmp.Close()
} | go | func DebugDumpKey(g *GlobalContext, name string, b []byte) {
tmp, err := ioutil.TempFile(os.TempDir(), "dump-"+name)
if err != nil {
g.Log.Warning("Failed to dumpKey %s: %s", name, err)
return
}
g.Log.Notice("DUMPKEY %s -> %s", name, tmp.Name())
buf := bytes.NewBuffer(b)
io.Copy(tmp, buf)
tmp.Close()
} | [
"func",
"DebugDumpKey",
"(",
"g",
"*",
"GlobalContext",
",",
"name",
"string",
",",
"b",
"[",
"]",
"byte",
")",
"{",
"tmp",
",",
"err",
":=",
"ioutil",
".",
"TempFile",
"(",
"os",
".",
"TempDir",
"(",
")",
",",
"\"",
"\"",
"+",
"name",
")",
"\n",... | // DebugDumpKey is used only in debugging. For now it's not in
// use but we might need it in the future. | [
"DebugDumpKey",
"is",
"used",
"only",
"in",
"debugging",
".",
"For",
"now",
"it",
"s",
"not",
"in",
"use",
"but",
"we",
"might",
"need",
"it",
"in",
"the",
"future",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/skb.go#L30-L40 |
160,602 | keybase/client | go/stellar/global.go | KickAutoClaimRunner | func (s *Stellar) KickAutoClaimRunner(mctx libkb.MetaContext, trigger gregor.MsgID) {
// Create the ACR if one does not exist.
mctx.Debug("KickAutoClaimRunner(trigger:%v)", trigger)
s.autoClaimRunnerLock.Lock()
defer s.autoClaimRunnerLock.Unlock()
if s.autoClaimRunner == nil {
s.autoClaimRunner = NewAutoClaimRunner(s.walletState)
}
s.autoClaimRunner.Kick(mctx, trigger)
} | go | func (s *Stellar) KickAutoClaimRunner(mctx libkb.MetaContext, trigger gregor.MsgID) {
// Create the ACR if one does not exist.
mctx.Debug("KickAutoClaimRunner(trigger:%v)", trigger)
s.autoClaimRunnerLock.Lock()
defer s.autoClaimRunnerLock.Unlock()
if s.autoClaimRunner == nil {
s.autoClaimRunner = NewAutoClaimRunner(s.walletState)
}
s.autoClaimRunner.Kick(mctx, trigger)
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"KickAutoClaimRunner",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"trigger",
"gregor",
".",
"MsgID",
")",
"{",
"// Create the ACR if one does not exist.",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"trigger",
")",
... | // `trigger` is optional, and is of the gregor message that caused the kick. | [
"trigger",
"is",
"optional",
"and",
"is",
"of",
"the",
"gregor",
"message",
"that",
"caused",
"the",
"kick",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L175-L184 |
160,603 | keybase/client | go/stellar/global.go | UpdateUnreadCount | func (s *Stellar) UpdateUnreadCount(ctx context.Context, accountID stellar1.AccountID, unread int) error {
if s.badger == nil {
s.G().Log.CDebugf(ctx, "Stellar Global has no badger")
return nil
}
s.badger.SetWalletAccountUnreadCount(ctx, accountID, unread)
return nil
} | go | func (s *Stellar) UpdateUnreadCount(ctx context.Context, accountID stellar1.AccountID, unread int) error {
if s.badger == nil {
s.G().Log.CDebugf(ctx, "Stellar Global has no badger")
return nil
}
s.badger.SetWalletAccountUnreadCount(ctx, accountID, unread)
return nil
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"UpdateUnreadCount",
"(",
"ctx",
"context",
".",
"Context",
",",
"accountID",
"stellar1",
".",
"AccountID",
",",
"unread",
"int",
")",
"error",
"{",
"if",
"s",
".",
"badger",
"==",
"nil",
"{",
"s",
".",
"G",
"("... | // UpdateUnreadCount will take the unread count for an account id and
// update the badger. | [
"UpdateUnreadCount",
"will",
"take",
"the",
"unread",
"count",
"for",
"an",
"account",
"id",
"and",
"update",
"the",
"badger",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L225-L233 |
160,604 | keybase/client | go/stellar/global.go | SpecMiniChatPayments | func (s *Stellar) SpecMiniChatPayments(mctx libkb.MetaContext, payments []libkb.MiniChatPayment) (*libkb.MiniChatPaymentSummary, error) {
return SpecMiniChatPayments(mctx, s.walletState, payments)
} | go | func (s *Stellar) SpecMiniChatPayments(mctx libkb.MetaContext, payments []libkb.MiniChatPayment) (*libkb.MiniChatPaymentSummary, error) {
return SpecMiniChatPayments(mctx, s.walletState, payments)
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"SpecMiniChatPayments",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"payments",
"[",
"]",
"libkb",
".",
"MiniChatPayment",
")",
"(",
"*",
"libkb",
".",
"MiniChatPaymentSummary",
",",
"error",
")",
"{",
"return",
"S... | // SpecMiniChatPayments creates a summary of the amounts that a list of MiniChatPayments will
// result in. | [
"SpecMiniChatPayments",
"creates",
"a",
"summary",
"of",
"the",
"amounts",
"that",
"a",
"list",
"of",
"MiniChatPayments",
"will",
"result",
"in",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L244-L246 |
160,605 | keybase/client | go/stellar/global.go | HandleOobm | func (s *Stellar) HandleOobm(ctx context.Context, obm gregor.OutOfBandMessage) (bool, error) {
if obm.System() == nil {
return false, errors.New("nil system in out of band message")
}
// make a new background context for the handlers
mctx := libkb.NewMetaContextBackground(s.G()).WithLogTag("WAOOBM")
// all of these handlers should be in goroutines so they don't block the
// oobm handler thread.
switch obm.System().String() {
case "internal.reconnect":
go s.handleReconnect(mctx)
// returning false, nil here so that others can handle this one too
return false, nil
case stellar1.PushPaymentStatus:
go s.handlePaymentStatus(mctx, obm)
return true, nil
case stellar1.PushPaymentNotification:
go s.handlePaymentNotification(mctx, obm)
return true, nil
case stellar1.PushRequestStatus:
go s.handleRequestStatus(mctx, obm)
return true, nil
}
return false, nil
} | go | func (s *Stellar) HandleOobm(ctx context.Context, obm gregor.OutOfBandMessage) (bool, error) {
if obm.System() == nil {
return false, errors.New("nil system in out of band message")
}
// make a new background context for the handlers
mctx := libkb.NewMetaContextBackground(s.G()).WithLogTag("WAOOBM")
// all of these handlers should be in goroutines so they don't block the
// oobm handler thread.
switch obm.System().String() {
case "internal.reconnect":
go s.handleReconnect(mctx)
// returning false, nil here so that others can handle this one too
return false, nil
case stellar1.PushPaymentStatus:
go s.handlePaymentStatus(mctx, obm)
return true, nil
case stellar1.PushPaymentNotification:
go s.handlePaymentNotification(mctx, obm)
return true, nil
case stellar1.PushRequestStatus:
go s.handleRequestStatus(mctx, obm)
return true, nil
}
return false, nil
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"HandleOobm",
"(",
"ctx",
"context",
".",
"Context",
",",
"obm",
"gregor",
".",
"OutOfBandMessage",
")",
"(",
"bool",
",",
"error",
")",
"{",
"if",
"obm",
".",
"System",
"(",
")",
"==",
"nil",
"{",
"return",
"... | // HandleOobm will handle any out of band gregor messages for stellar. | [
"HandleOobm",
"will",
"handle",
"any",
"out",
"of",
"band",
"gregor",
"messages",
"for",
"stellar",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L249-L277 |
160,606 | keybase/client | go/stellar/global.go | hasAcceptedDisclaimer | func (s *Stellar) hasAcceptedDisclaimer(ctx context.Context) (bool, error) {
log := func(format string, args ...interface{}) {
s.G().Log.CDebugf(ctx, "Stellar.hasAcceptedDisclaimer "+format, args...)
}
uv, err := s.G().GetMeUV(ctx)
if err != nil {
return false, err
}
s.disclaimerLock.Lock()
defer s.disclaimerLock.Unlock()
// Check memory
memAccepted := s.disclaimerAccepted != nil && s.disclaimerAccepted.Eq(uv)
log("mem -> %v", memAccepted)
if memAccepted {
return true, nil
}
// Check disk
dbKey := libkb.DbKey{
Typ: libkb.DBStellarDisclaimer,
Key: uv.String(),
}
var dbEntry hasAcceptedDisclaimerDBEntry
found, err := s.G().LocalDb.GetInto(&dbEntry, dbKey)
log("disk -> [found:%v err:(%v) v:%v accepted:%v]", found, err, dbEntry.Version, dbEntry.Accepted)
if err == nil && found && dbEntry.Version == 1 && dbEntry.Accepted {
err = s.informAcceptedDisclaimerLocked(ctx)
if err != nil {
log("store -> err:(%v)", err)
}
return true, nil
}
// Check remote
accepted, err := remote.GetAcceptedDisclaimer(ctx, s.G())
log("remote -> [err:(%v) accepted:%v]", err, accepted)
if err != nil {
return false, err
}
if accepted {
err = s.informAcceptedDisclaimerLocked(ctx)
if err != nil {
log("store -> err:(%v)", err)
}
}
return accepted, nil
} | go | func (s *Stellar) hasAcceptedDisclaimer(ctx context.Context) (bool, error) {
log := func(format string, args ...interface{}) {
s.G().Log.CDebugf(ctx, "Stellar.hasAcceptedDisclaimer "+format, args...)
}
uv, err := s.G().GetMeUV(ctx)
if err != nil {
return false, err
}
s.disclaimerLock.Lock()
defer s.disclaimerLock.Unlock()
// Check memory
memAccepted := s.disclaimerAccepted != nil && s.disclaimerAccepted.Eq(uv)
log("mem -> %v", memAccepted)
if memAccepted {
return true, nil
}
// Check disk
dbKey := libkb.DbKey{
Typ: libkb.DBStellarDisclaimer,
Key: uv.String(),
}
var dbEntry hasAcceptedDisclaimerDBEntry
found, err := s.G().LocalDb.GetInto(&dbEntry, dbKey)
log("disk -> [found:%v err:(%v) v:%v accepted:%v]", found, err, dbEntry.Version, dbEntry.Accepted)
if err == nil && found && dbEntry.Version == 1 && dbEntry.Accepted {
err = s.informAcceptedDisclaimerLocked(ctx)
if err != nil {
log("store -> err:(%v)", err)
}
return true, nil
}
// Check remote
accepted, err := remote.GetAcceptedDisclaimer(ctx, s.G())
log("remote -> [err:(%v) accepted:%v]", err, accepted)
if err != nil {
return false, err
}
if accepted {
err = s.informAcceptedDisclaimerLocked(ctx)
if err != nil {
log("store -> err:(%v)", err)
}
}
return accepted, nil
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"hasAcceptedDisclaimer",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"bool",
",",
"error",
")",
"{",
"log",
":=",
"func",
"(",
"format",
"string",
",",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"s",
... | // For a UV, accepted starts out false and transitions to true. It never becomes false again.
// A cached true is returned, but a false always hits the server. | [
"For",
"a",
"UV",
"accepted",
"starts",
"out",
"false",
"and",
"transitions",
"to",
"true",
".",
"It",
"never",
"becomes",
"false",
"again",
".",
"A",
"cached",
"true",
"is",
"returned",
"but",
"a",
"false",
"always",
"hits",
"the",
"server",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L356-L400 |
160,607 | keybase/client | go/stellar/global.go | stopBuildPayment | func (s *Stellar) stopBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) {
mctx.Debug("Stellar.stopBuildPayment(%v)", bid)
if bid.IsNil() {
s.buildPaymentSlot.Stop()
return
}
s.bidLock.Lock()
defer s.bidLock.Unlock()
for _, entry := range s.bids {
if entry.Bid.Eq(bid) {
if entry.Stopped {
mctx.Debug("payment already stopped")
return
}
entry.Slot.Shutdown()
entry.Stopped = true
mctx.Debug("payment shutdown")
return
}
}
mctx.Debug("payment not found to stop")
} | go | func (s *Stellar) stopBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) {
mctx.Debug("Stellar.stopBuildPayment(%v)", bid)
if bid.IsNil() {
s.buildPaymentSlot.Stop()
return
}
s.bidLock.Lock()
defer s.bidLock.Unlock()
for _, entry := range s.bids {
if entry.Bid.Eq(bid) {
if entry.Stopped {
mctx.Debug("payment already stopped")
return
}
entry.Slot.Shutdown()
entry.Stopped = true
mctx.Debug("payment shutdown")
return
}
}
mctx.Debug("payment not found to stop")
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"stopBuildPayment",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"bid",
"stellar1",
".",
"BuildPaymentID",
")",
"{",
"mctx",
".",
"Debug",
"(",
"\"",
"\"",
",",
"bid",
")",
"\n",
"if",
"bid",
".",
"IsNil",
"("... | // stopBuildPayment stops a bid forever. | [
"stopBuildPayment",
"stops",
"a",
"bid",
"forever",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L454-L475 |
160,608 | keybase/client | go/stellar/global.go | acquireBuildPayment | func (s *Stellar) acquireBuildPayment(mctx1 libkb.MetaContext, bid stellar1.BuildPaymentID, sessionID int) (
mctx libkb.MetaContext, data *buildPaymentData, release func(), err error) {
mctx = mctx1
mctx.Debug("Stellar.acquireBuildPayment(%v)", bid)
release = func() {}
s.bidLock.Lock()
defer s.bidLock.Unlock()
for _, entry := range s.bids {
entry := entry
if !entry.Bid.Eq(bid) {
continue
}
if entry.Stopped {
return mctx, nil, release, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.")
}
mctx = mctx.WithCtx(entry.Slot.Use(mctx.Ctx(), sessionID))
if err = mctx.Ctx().Err(); err != nil {
return mctx, nil, release, err
}
err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second)
if err != nil {
mctx.Debug("error while attempting to acquire data lock: %v", err)
return mctx, nil, release, err
}
release = libkb.Once(func() {
entry.DataLock.Unlock()
})
return mctx, &entry.Data, release, nil
}
return mctx, nil, release, fmt.Errorf("payment build not found")
} | go | func (s *Stellar) acquireBuildPayment(mctx1 libkb.MetaContext, bid stellar1.BuildPaymentID, sessionID int) (
mctx libkb.MetaContext, data *buildPaymentData, release func(), err error) {
mctx = mctx1
mctx.Debug("Stellar.acquireBuildPayment(%v)", bid)
release = func() {}
s.bidLock.Lock()
defer s.bidLock.Unlock()
for _, entry := range s.bids {
entry := entry
if !entry.Bid.Eq(bid) {
continue
}
if entry.Stopped {
return mctx, nil, release, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.")
}
mctx = mctx.WithCtx(entry.Slot.Use(mctx.Ctx(), sessionID))
if err = mctx.Ctx().Err(); err != nil {
return mctx, nil, release, err
}
err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second)
if err != nil {
mctx.Debug("error while attempting to acquire data lock: %v", err)
return mctx, nil, release, err
}
release = libkb.Once(func() {
entry.DataLock.Unlock()
})
return mctx, &entry.Data, release, nil
}
return mctx, nil, release, fmt.Errorf("payment build not found")
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"acquireBuildPayment",
"(",
"mctx1",
"libkb",
".",
"MetaContext",
",",
"bid",
"stellar1",
".",
"BuildPaymentID",
",",
"sessionID",
"int",
")",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"data",
"*",
"buildPaymentDat... | // acquireBuildPayment takes ownership of a payment build.
// Returns a new `mctx` that the caller should switch to. Because it runs within the slot.
// When err=nil the caller owns `data` and must release it with `release` when finished.
// When err!=nil data is nil.
// `release` can be called even when err!=nil.
// `mctx` can also be used if err!=nil.
// Callers should `release` soon after their context is canceled. | [
"acquireBuildPayment",
"takes",
"ownership",
"of",
"a",
"payment",
"build",
".",
"Returns",
"a",
"new",
"mctx",
"that",
"the",
"caller",
"should",
"switch",
"to",
".",
"Because",
"it",
"runs",
"within",
"the",
"slot",
".",
"When",
"err",
"=",
"nil",
"the",... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L484-L514 |
160,609 | keybase/client | go/stellar/global.go | finalizeBuildPayment | func (s *Stellar) finalizeBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) (res *buildPaymentData, err error) {
mctx.Debug("Stellar.finalizeBuildPayment(%v)", bid)
s.bidLock.Lock()
defer s.bidLock.Unlock()
for _, entry := range s.bids {
entry := entry
if !entry.Bid.Eq(bid) {
continue
}
if entry.Stopped {
return nil, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.")
}
entry.Slot.Shutdown()
entry.Stopped = true
err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second)
if err != nil {
// This likely means something in the Slot is not yielding to its context or forgot to release the lock.
mctx.Debug("error while attempting to acquire data lock: %v", err)
return nil, err
}
res = &entry.Data
entry.DataLock.Unlock()
return res, nil
}
return nil, fmt.Errorf("payment build not found")
} | go | func (s *Stellar) finalizeBuildPayment(mctx libkb.MetaContext, bid stellar1.BuildPaymentID) (res *buildPaymentData, err error) {
mctx.Debug("Stellar.finalizeBuildPayment(%v)", bid)
s.bidLock.Lock()
defer s.bidLock.Unlock()
for _, entry := range s.bids {
entry := entry
if !entry.Bid.Eq(bid) {
continue
}
if entry.Stopped {
return nil, fmt.Errorf("This payment might have already been sent. Check your recent payments before trying again.")
}
entry.Slot.Shutdown()
entry.Stopped = true
err = libkb.AcquireWithContextAndTimeout(mctx.Ctx(), &entry.DataLock, 5*time.Second)
if err != nil {
// This likely means something in the Slot is not yielding to its context or forgot to release the lock.
mctx.Debug("error while attempting to acquire data lock: %v", err)
return nil, err
}
res = &entry.Data
entry.DataLock.Unlock()
return res, nil
}
return nil, fmt.Errorf("payment build not found")
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"finalizeBuildPayment",
"(",
"mctx",
"libkb",
".",
"MetaContext",
",",
"bid",
"stellar1",
".",
"BuildPaymentID",
")",
"(",
"res",
"*",
"buildPaymentData",
",",
"err",
"error",
")",
"{",
"mctx",
".",
"Debug",
"(",
"\... | // finalizeBuildPayment stops a bid forever and returns its data. | [
"finalizeBuildPayment",
"stops",
"a",
"bid",
"forever",
"and",
"returns",
"its",
"data",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L517-L542 |
160,610 | keybase/client | go/stellar/global.go | BaseFee | func (s *Stellar) BaseFee(mctx libkb.MetaContext) uint64 {
return s.walletState.BaseFee(mctx)
} | go | func (s *Stellar) BaseFee(mctx libkb.MetaContext) uint64 {
return s.walletState.BaseFee(mctx)
} | [
"func",
"(",
"s",
"*",
"Stellar",
")",
"BaseFee",
"(",
"mctx",
"libkb",
".",
"MetaContext",
")",
"uint64",
"{",
"return",
"s",
".",
"walletState",
".",
"BaseFee",
"(",
"mctx",
")",
"\n",
"}"
] | // BaseFee returns the server-suggested base fee per operation. | [
"BaseFee",
"returns",
"the",
"server",
"-",
"suggested",
"base",
"fee",
"per",
"operation",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L549-L551 |
160,611 | keybase/client | go/stellar/global.go | getFederationClient | func getFederationClient(g *libkb.GlobalContext) federation.ClientInterface {
if g.Env.GetRunMode() != libkb.ProductionRunMode {
return federation.DefaultTestNetClient
}
return federation.DefaultPublicNetClient
} | go | func getFederationClient(g *libkb.GlobalContext) federation.ClientInterface {
if g.Env.GetRunMode() != libkb.ProductionRunMode {
return federation.DefaultTestNetClient
}
return federation.DefaultPublicNetClient
} | [
"func",
"getFederationClient",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"federation",
".",
"ClientInterface",
"{",
"if",
"g",
".",
"Env",
".",
"GetRunMode",
"(",
")",
"!=",
"libkb",
".",
"ProductionRunMode",
"{",
"return",
"federation",
".",
"Defau... | // getFederationClient is a helper function used during
// initialization. | [
"getFederationClient",
"is",
"a",
"helper",
"function",
"used",
"during",
"initialization",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/stellar/global.go#L555-L560 |
160,612 | keybase/client | go/client/cmd_simplefs_write.go | NewCmdSimpleFSWrite | func NewCmdSimpleFSWrite(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "write",
ArgumentHelp: "<path>",
Usage: "write input to file",
Action: func(c *cli.Context) {
cl.ChooseCommand(&CmdSimpleFSWrite{Contextified: libkb.NewContextified(g)}, "write", c)
cl.SetNoStandalone()
},
Flags: []cli.Flag{
cli.BoolFlag{
Name: "a, append",
Usage: "add to existing file",
},
cli.IntFlag{
Name: "b, buffersize",
Value: writeBufSizeDefault,
Usage: "write buffer size",
},
},
}
} | go | func NewCmdSimpleFSWrite(cl *libcmdline.CommandLine, g *libkb.GlobalContext) cli.Command {
return cli.Command{
Name: "write",
ArgumentHelp: "<path>",
Usage: "write input to file",
Action: func(c *cli.Context) {
cl.ChooseCommand(&CmdSimpleFSWrite{Contextified: libkb.NewContextified(g)}, "write", c)
cl.SetNoStandalone()
},
Flags: []cli.Flag{
cli.BoolFlag{
Name: "a, append",
Usage: "add to existing file",
},
cli.IntFlag{
Name: "b, buffersize",
Value: writeBufSizeDefault,
Usage: "write buffer size",
},
},
}
} | [
"func",
"NewCmdSimpleFSWrite",
"(",
"cl",
"*",
"libcmdline",
".",
"CommandLine",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"cli",
".",
"Command",
"{",
"return",
"cli",
".",
"Command",
"{",
"Name",
":",
"\"",
"\"",
",",
"ArgumentHelp",
":",
"\"",... | // NewCmdSimpleFSWrite creates a new cli.Command. | [
"NewCmdSimpleFSWrite",
"creates",
"a",
"new",
"cli",
".",
"Command",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs_write.go#L32-L53 |
160,613 | keybase/client | go/client/cmd_simplefs_write.go | ParseArgv | func (c *CmdSimpleFSWrite) ParseArgv(ctx *cli.Context) error {
nargs := len(ctx.Args())
var err error
c.bufSize = ctx.Int("buffersize")
if ctx.Bool("append") {
c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_APPEND | keybase1.OpenFlags_EXISTING
} else {
c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_REPLACE
}
if nargs != 1 {
return fmt.Errorf("write requires a path argument")
}
p, err := makeSimpleFSPath(ctx.Args()[0])
if err != nil {
return err
}
c.path = p
return err
} | go | func (c *CmdSimpleFSWrite) ParseArgv(ctx *cli.Context) error {
nargs := len(ctx.Args())
var err error
c.bufSize = ctx.Int("buffersize")
if ctx.Bool("append") {
c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_APPEND | keybase1.OpenFlags_EXISTING
} else {
c.flags = keybase1.OpenFlags_WRITE | keybase1.OpenFlags_REPLACE
}
if nargs != 1 {
return fmt.Errorf("write requires a path argument")
}
p, err := makeSimpleFSPath(ctx.Args()[0])
if err != nil {
return err
}
c.path = p
return err
} | [
"func",
"(",
"c",
"*",
"CmdSimpleFSWrite",
")",
"ParseArgv",
"(",
"ctx",
"*",
"cli",
".",
"Context",
")",
"error",
"{",
"nargs",
":=",
"len",
"(",
"ctx",
".",
"Args",
"(",
")",
")",
"\n",
"var",
"err",
"error",
"\n\n",
"c",
".",
"bufSize",
"=",
"... | // ParseArgv gets the arguments for this command. | [
"ParseArgv",
"gets",
"the",
"arguments",
"for",
"this",
"command",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/client/cmd_simplefs_write.go#L127-L150 |
160,614 | keybase/client | go/libkb/sync_trackers.go | compact | func (t Trackers) compact() (ret Trackers) {
index := make(map[keybase1.UID]int)
ret.Version = t.Version
for _, el := range t.Trackers {
if _, found := index[el.GetUID()]; !found {
index[el.GetUID()] = el.Status
if el.Status == TrackStatusTracking {
ret.Trackers = append(ret.Trackers, el)
}
}
}
return ret
} | go | func (t Trackers) compact() (ret Trackers) {
index := make(map[keybase1.UID]int)
ret.Version = t.Version
for _, el := range t.Trackers {
if _, found := index[el.GetUID()]; !found {
index[el.GetUID()] = el.Status
if el.Status == TrackStatusTracking {
ret.Trackers = append(ret.Trackers, el)
}
}
}
return ret
} | [
"func",
"(",
"t",
"Trackers",
")",
"compact",
"(",
")",
"(",
"ret",
"Trackers",
")",
"{",
"index",
":=",
"make",
"(",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"int",
")",
"\n\n",
"ret",
".",
"Version",
"=",
"t",
".",
"Version",
"\n\n",
"for",
"_"... | // Remove duplicates and "untrack" statements in the list | [
"Remove",
"duplicates",
"and",
"untrack",
"statements",
"in",
"the",
"list"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/libkb/sync_trackers.go#L42-L56 |
160,615 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | NewExtraMetadataV3 | func NewExtraMetadataV3(
wkb TLFWriterKeyBundleV3, rkb TLFReaderKeyBundleV3,
wkbNew, rkbNew bool) *ExtraMetadataV3 {
return &ExtraMetadataV3{wkb, rkb, wkbNew, rkbNew}
} | go | func NewExtraMetadataV3(
wkb TLFWriterKeyBundleV3, rkb TLFReaderKeyBundleV3,
wkbNew, rkbNew bool) *ExtraMetadataV3 {
return &ExtraMetadataV3{wkb, rkb, wkbNew, rkbNew}
} | [
"func",
"NewExtraMetadataV3",
"(",
"wkb",
"TLFWriterKeyBundleV3",
",",
"rkb",
"TLFReaderKeyBundleV3",
",",
"wkbNew",
",",
"rkbNew",
"bool",
")",
"*",
"ExtraMetadataV3",
"{",
"return",
"&",
"ExtraMetadataV3",
"{",
"wkb",
",",
"rkb",
",",
"wkbNew",
",",
"rkbNew",
... | // NewExtraMetadataV3 creates a new ExtraMetadataV3 given a pair of key bundles | [
"NewExtraMetadataV3",
"creates",
"a",
"new",
"ExtraMetadataV3",
"given",
"a",
"pair",
"of",
"key",
"bundles"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L142-L146 |
160,616 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | DeepCopy | func (extra ExtraMetadataV3) DeepCopy(codec kbfscodec.Codec) (
ExtraMetadata, error) {
wkb, err := extra.wkb.DeepCopy(codec)
if err != nil {
return nil, err
}
rkb, err := extra.rkb.DeepCopy(codec)
if err != nil {
return nil, err
}
return NewExtraMetadataV3(wkb, rkb, extra.wkbNew, extra.rkbNew), nil
} | go | func (extra ExtraMetadataV3) DeepCopy(codec kbfscodec.Codec) (
ExtraMetadata, error) {
wkb, err := extra.wkb.DeepCopy(codec)
if err != nil {
return nil, err
}
rkb, err := extra.rkb.DeepCopy(codec)
if err != nil {
return nil, err
}
return NewExtraMetadataV3(wkb, rkb, extra.wkbNew, extra.rkbNew), nil
} | [
"func",
"(",
"extra",
"ExtraMetadataV3",
")",
"DeepCopy",
"(",
"codec",
"kbfscodec",
".",
"Codec",
")",
"(",
"ExtraMetadata",
",",
"error",
")",
"{",
"wkb",
",",
"err",
":=",
"extra",
".",
"wkb",
".",
"DeepCopy",
"(",
"codec",
")",
"\n",
"if",
"err",
... | // DeepCopy implements the ExtraMetadata interface for ExtraMetadataV3. | [
"DeepCopy",
"implements",
"the",
"ExtraMetadata",
"interface",
"for",
"ExtraMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L159-L170 |
160,617 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | MakeSuccessorCopy | func (extra ExtraMetadataV3) MakeSuccessorCopy(codec kbfscodec.Codec) (
ExtraMetadata, error) {
wkb, err := extra.wkb.DeepCopy(codec)
if err != nil {
return nil, err
}
rkb, err := extra.rkb.DeepCopy(codec)
if err != nil {
return nil, err
}
return NewExtraMetadataV3(wkb, rkb, false, false), nil
} | go | func (extra ExtraMetadataV3) MakeSuccessorCopy(codec kbfscodec.Codec) (
ExtraMetadata, error) {
wkb, err := extra.wkb.DeepCopy(codec)
if err != nil {
return nil, err
}
rkb, err := extra.rkb.DeepCopy(codec)
if err != nil {
return nil, err
}
return NewExtraMetadataV3(wkb, rkb, false, false), nil
} | [
"func",
"(",
"extra",
"ExtraMetadataV3",
")",
"MakeSuccessorCopy",
"(",
"codec",
"kbfscodec",
".",
"Codec",
")",
"(",
"ExtraMetadata",
",",
"error",
")",
"{",
"wkb",
",",
"err",
":=",
"extra",
".",
"wkb",
".",
"DeepCopy",
"(",
"codec",
")",
"\n",
"if",
... | // MakeSuccessorCopy implements the ExtraMetadata interface for ExtraMetadataV3. | [
"MakeSuccessorCopy",
"implements",
"the",
"ExtraMetadata",
"interface",
"for",
"ExtraMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L173-L184 |
160,618 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | KeyGenerationsToUpdate | func (md *RootMetadataV3) KeyGenerationsToUpdate() (KeyGen, KeyGen) {
latest := md.LatestKeyGeneration()
if latest < FirstValidKeyGen {
return 0, 0
}
// We only keep track of the latest key generation in extra.
return latest, latest + 1
} | go | func (md *RootMetadataV3) KeyGenerationsToUpdate() (KeyGen, KeyGen) {
latest := md.LatestKeyGeneration()
if latest < FirstValidKeyGen {
return 0, 0
}
// We only keep track of the latest key generation in extra.
return latest, latest + 1
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"KeyGenerationsToUpdate",
"(",
")",
"(",
"KeyGen",
",",
"KeyGen",
")",
"{",
"latest",
":=",
"md",
".",
"LatestKeyGeneration",
"(",
")",
"\n",
"if",
"latest",
"<",
"FirstValidKeyGen",
"{",
"return",
"0",
",",
... | // KeyGenerationsToUpdate implements the RootMetadata interface
// for RootMetadataV3. | [
"KeyGenerationsToUpdate",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L265-L272 |
160,619 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | IsValidRekeyRequest | func (md *RootMetadataV3) IsValidRekeyRequest(
codec kbfscodec.Codec, prevBareMd RootMetadata,
user keybase1.UID, prevExtra, extra ExtraMetadata) (
bool, error) {
if !md.IsWriterMetadataCopiedSet() {
// Not a copy.
return false, nil
}
prevMd, ok := prevBareMd.(*RootMetadataV3)
if !ok {
// Not the same type so not a copy.
return false, nil
}
prevExtraV3, ok := prevExtra.(*ExtraMetadataV3)
if !ok {
return false, errors.New("Invalid previous extra metadata")
}
extraV3, ok := extra.(*ExtraMetadataV3)
if !ok {
return false, errors.New("Invalid extra metadata")
}
writerEqual, err := kbfscodec.Equal(
codec, md.WriterMetadata, prevMd.WriterMetadata)
if err != nil {
return false, err
}
if !writerEqual {
// Copy mismatch.
return false, nil
}
onlyUserRKeysChanged, err := md.haveOnlyUserRKeysChanged(
codec, prevMd, user, prevExtraV3.rkb, extraV3.rkb)
if err != nil {
return false, err
}
if !onlyUserRKeysChanged {
// Keys outside of this user's reader key set have changed.
return false, nil
}
return true, nil
} | go | func (md *RootMetadataV3) IsValidRekeyRequest(
codec kbfscodec.Codec, prevBareMd RootMetadata,
user keybase1.UID, prevExtra, extra ExtraMetadata) (
bool, error) {
if !md.IsWriterMetadataCopiedSet() {
// Not a copy.
return false, nil
}
prevMd, ok := prevBareMd.(*RootMetadataV3)
if !ok {
// Not the same type so not a copy.
return false, nil
}
prevExtraV3, ok := prevExtra.(*ExtraMetadataV3)
if !ok {
return false, errors.New("Invalid previous extra metadata")
}
extraV3, ok := extra.(*ExtraMetadataV3)
if !ok {
return false, errors.New("Invalid extra metadata")
}
writerEqual, err := kbfscodec.Equal(
codec, md.WriterMetadata, prevMd.WriterMetadata)
if err != nil {
return false, err
}
if !writerEqual {
// Copy mismatch.
return false, nil
}
onlyUserRKeysChanged, err := md.haveOnlyUserRKeysChanged(
codec, prevMd, user, prevExtraV3.rkb, extraV3.rkb)
if err != nil {
return false, err
}
if !onlyUserRKeysChanged {
// Keys outside of this user's reader key set have changed.
return false, nil
}
return true, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"IsValidRekeyRequest",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"prevBareMd",
"RootMetadata",
",",
"user",
"keybase1",
".",
"UID",
",",
"prevExtra",
",",
"extra",
"ExtraMetadata",
")",
"(",
"bool",
",",
"er... | // IsValidRekeyRequest implements the RootMetadata interface for RootMetadataV3. | [
"IsValidRekeyRequest",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L305-L345 |
160,620 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | MergedStatus | func (md *RootMetadataV3) MergedStatus() MergeStatus {
if md.WriterMetadata.WFlags&MetadataFlagUnmerged != 0 {
return Unmerged
}
return Merged
} | go | func (md *RootMetadataV3) MergedStatus() MergeStatus {
if md.WriterMetadata.WFlags&MetadataFlagUnmerged != 0 {
return Unmerged
}
return Merged
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"MergedStatus",
"(",
")",
"MergeStatus",
"{",
"if",
"md",
".",
"WriterMetadata",
".",
"WFlags",
"&",
"MetadataFlagUnmerged",
"!=",
"0",
"{",
"return",
"Unmerged",
"\n",
"}",
"\n",
"return",
"Merged",
"\n",
"}"... | // MergedStatus implements the RootMetadata interface for RootMetadataV3. | [
"MergedStatus",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L348-L353 |
160,621 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | IsWriter | func (md *RootMetadataV3) IsWriter(
ctx context.Context, user keybase1.UID,
cryptKey kbfscrypto.CryptPublicKey, verifyingKey kbfscrypto.VerifyingKey,
teamMemChecker TeamMembershipChecker, extra ExtraMetadata,
offline keybase1.OfflineAvailability) (bool, error) {
switch md.TypeForKeying() {
case tlf.TeamKeying:
err := md.checkNonPrivateExtra(extra)
if err != nil {
return false, err
}
tid, err := md.WriterMetadata.Writers[0].AsTeam()
if err != nil {
return false, err
}
// TODO: Eventually this will have to use a Merkle sequence
// number to check historic versions.
isWriter, err := teamMemChecker.IsTeamWriter(
ctx, tid, user, verifyingKey, offline)
if err != nil {
return false, err
}
return isWriter, nil
default:
return md.isNonTeamWriter(ctx, user, cryptKey, extra)
}
} | go | func (md *RootMetadataV3) IsWriter(
ctx context.Context, user keybase1.UID,
cryptKey kbfscrypto.CryptPublicKey, verifyingKey kbfscrypto.VerifyingKey,
teamMemChecker TeamMembershipChecker, extra ExtraMetadata,
offline keybase1.OfflineAvailability) (bool, error) {
switch md.TypeForKeying() {
case tlf.TeamKeying:
err := md.checkNonPrivateExtra(extra)
if err != nil {
return false, err
}
tid, err := md.WriterMetadata.Writers[0].AsTeam()
if err != nil {
return false, err
}
// TODO: Eventually this will have to use a Merkle sequence
// number to check historic versions.
isWriter, err := teamMemChecker.IsTeamWriter(
ctx, tid, user, verifyingKey, offline)
if err != nil {
return false, err
}
return isWriter, nil
default:
return md.isNonTeamWriter(ctx, user, cryptKey, extra)
}
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"IsWriter",
"(",
"ctx",
"context",
".",
"Context",
",",
"user",
"keybase1",
".",
"UID",
",",
"cryptKey",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"verifyingKey",
"kbfscrypto",
".",
"VerifyingKey",
",",
"teamMemCh... | // IsWriter implements the RootMetadata interface for RootMetadataV3. | [
"IsWriter",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L438-L466 |
160,622 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | IsReader | func (md *RootMetadataV3) IsReader(
ctx context.Context, user keybase1.UID,
cryptKey kbfscrypto.CryptPublicKey, teamMemChecker TeamMembershipChecker,
extra ExtraMetadata, offline keybase1.OfflineAvailability) (bool, error) {
switch md.TypeForKeying() {
case tlf.PublicKeying:
err := md.checkNonPrivateExtra(extra)
if err != nil {
return false, err
}
return true, nil
case tlf.PrivateKeying:
// Writers are also readers.
isWriter, err := md.isNonTeamWriter(ctx, user, cryptKey, extra)
if err != nil {
return false, err
}
if isWriter {
return true, nil
}
_, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return false, err
}
return rkb.IsReader(user, cryptKey), nil
case tlf.TeamKeying:
err := md.checkNonPrivateExtra(extra)
if err != nil {
return false, err
}
tid, err := md.WriterMetadata.Writers[0].AsTeam()
if err != nil {
return false, err
}
if tid.IsPublic() {
return true, nil
}
// TODO: Eventually this will have to use a Merkle sequence
// number to check historic versions.
isReader, err := teamMemChecker.IsTeamReader(ctx, tid, user, offline)
if err != nil {
return false, err
}
return isReader, nil
default:
panic(fmt.Sprintf("Unknown TLF keying type: %s", md.TypeForKeying()))
}
} | go | func (md *RootMetadataV3) IsReader(
ctx context.Context, user keybase1.UID,
cryptKey kbfscrypto.CryptPublicKey, teamMemChecker TeamMembershipChecker,
extra ExtraMetadata, offline keybase1.OfflineAvailability) (bool, error) {
switch md.TypeForKeying() {
case tlf.PublicKeying:
err := md.checkNonPrivateExtra(extra)
if err != nil {
return false, err
}
return true, nil
case tlf.PrivateKeying:
// Writers are also readers.
isWriter, err := md.isNonTeamWriter(ctx, user, cryptKey, extra)
if err != nil {
return false, err
}
if isWriter {
return true, nil
}
_, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return false, err
}
return rkb.IsReader(user, cryptKey), nil
case tlf.TeamKeying:
err := md.checkNonPrivateExtra(extra)
if err != nil {
return false, err
}
tid, err := md.WriterMetadata.Writers[0].AsTeam()
if err != nil {
return false, err
}
if tid.IsPublic() {
return true, nil
}
// TODO: Eventually this will have to use a Merkle sequence
// number to check historic versions.
isReader, err := teamMemChecker.IsTeamReader(ctx, tid, user, offline)
if err != nil {
return false, err
}
return isReader, nil
default:
panic(fmt.Sprintf("Unknown TLF keying type: %s", md.TypeForKeying()))
}
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"IsReader",
"(",
"ctx",
"context",
".",
"Context",
",",
"user",
"keybase1",
".",
"UID",
",",
"cryptKey",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"teamMemChecker",
"TeamMembershipChecker",
",",
"extra",
"ExtraMetad... | // IsReader implements the RootMetadata interface for RootMetadataV3. | [
"IsReader",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L469-L520 |
160,623 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | DeepCopy | func (md *RootMetadataV3) DeepCopy(
codec kbfscodec.Codec) (MutableRootMetadata, error) {
var newMd RootMetadataV3
if err := kbfscodec.Update(codec, &newMd, md); err != nil {
return nil, err
}
return &newMd, nil
} | go | func (md *RootMetadataV3) DeepCopy(
codec kbfscodec.Codec) (MutableRootMetadata, error) {
var newMd RootMetadataV3
if err := kbfscodec.Update(codec, &newMd, md); err != nil {
return nil, err
}
return &newMd, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"DeepCopy",
"(",
"codec",
"kbfscodec",
".",
"Codec",
")",
"(",
"MutableRootMetadata",
",",
"error",
")",
"{",
"var",
"newMd",
"RootMetadataV3",
"\n",
"if",
"err",
":=",
"kbfscodec",
".",
"Update",
"(",
"codec"... | // DeepCopy implements the RootMetadata interface for RootMetadataV3. | [
"DeepCopy",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L523-L530 |
160,624 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | MakeSuccessorCopy | func (md *RootMetadataV3) MakeSuccessorCopy(
codec kbfscodec.Codec, extra ExtraMetadata, _ MetadataVer,
_ func() ([]kbfscrypto.TLFCryptKey, error), isReadableAndWriter bool) (
MutableRootMetadata, ExtraMetadata, error) {
var extraCopy ExtraMetadata
if extra != nil {
var err error
extraCopy, err = extra.MakeSuccessorCopy(codec)
if err != nil {
return nil, nil, err
}
}
mdCopy, err := md.DeepCopy(codec)
if err != nil {
return nil, nil, err
}
// TODO: If there is ever a RootMetadataV4 this will need to perform the conversion.
return mdCopy, extraCopy, nil
} | go | func (md *RootMetadataV3) MakeSuccessorCopy(
codec kbfscodec.Codec, extra ExtraMetadata, _ MetadataVer,
_ func() ([]kbfscrypto.TLFCryptKey, error), isReadableAndWriter bool) (
MutableRootMetadata, ExtraMetadata, error) {
var extraCopy ExtraMetadata
if extra != nil {
var err error
extraCopy, err = extra.MakeSuccessorCopy(codec)
if err != nil {
return nil, nil, err
}
}
mdCopy, err := md.DeepCopy(codec)
if err != nil {
return nil, nil, err
}
// TODO: If there is ever a RootMetadataV4 this will need to perform the conversion.
return mdCopy, extraCopy, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"MakeSuccessorCopy",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"extra",
"ExtraMetadata",
",",
"_",
"MetadataVer",
",",
"_",
"func",
"(",
")",
"(",
"[",
"]",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"error",
... | // MakeSuccessorCopy implements the ImmutableRootMetadata interface for RootMetadataV3. | [
"MakeSuccessorCopy",
"implements",
"the",
"ImmutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L533-L551 |
160,625 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | CheckValidSuccessor | func (md *RootMetadataV3) CheckValidSuccessor(
currID ID, nextMd RootMetadata) error {
// (1) Verify current metadata is non-final.
if md.IsFinal() {
return MetadataIsFinalError{}
}
// (2) Check TLF ID.
if nextMd.TlfID() != md.TlfID() {
return MDTlfIDMismatch{
CurrID: md.TlfID(),
NextID: nextMd.TlfID(),
}
}
// (3) Check revision.
if nextMd.RevisionNumber() != md.RevisionNumber()+1 {
return MDRevisionMismatch{
Rev: nextMd.RevisionNumber(),
Curr: md.RevisionNumber(),
}
}
// (4) Check PrevRoot pointer.
expectedPrevRoot := currID
if nextMd.IsFinal() {
expectedPrevRoot = md.GetPrevRoot()
}
if nextMd.GetPrevRoot() != expectedPrevRoot {
return MDPrevRootMismatch{
prevRoot: nextMd.GetPrevRoot(),
expectedPrevRoot: expectedPrevRoot,
}
}
// (5) Check branch ID.
if md.MergedStatus() == nextMd.MergedStatus() && md.BID() != nextMd.BID() {
return errors.Errorf("Unexpected branch ID on successor: %s vs. %s",
md.BID(), nextMd.BID())
} else if md.MergedStatus() == Unmerged && nextMd.MergedStatus() == Merged {
return errors.New("merged MD can't follow unmerged MD")
}
// (6) Check disk usage.
expectedUsage := md.DiskUsage()
if !nextMd.IsWriterMetadataCopiedSet() {
expectedUsage += nextMd.RefBytes() - nextMd.UnrefBytes()
}
if nextMd.DiskUsage() != expectedUsage {
return MDDiskUsageMismatch{
expectedDiskUsage: expectedUsage,
actualDiskUsage: nextMd.DiskUsage(),
}
}
expectedMDUsage := md.MDDiskUsage()
if !nextMd.IsWriterMetadataCopiedSet() {
expectedMDUsage += nextMd.MDRefBytes()
}
// Add an exception for the case where MDRefBytes is equal, since
// it probably indicates an older client just copied the previous
// MDRefBytes value as an unknown field.
if nextMd.MDDiskUsage() != expectedMDUsage &&
md.MDRefBytes() != nextMd.MDRefBytes() {
return MDDiskUsageMismatch{
expectedDiskUsage: expectedMDUsage,
actualDiskUsage: nextMd.MDDiskUsage(),
}
}
// TODO: Check that the successor (bare) TLF handle is the
// same or more resolved.
return nil
} | go | func (md *RootMetadataV3) CheckValidSuccessor(
currID ID, nextMd RootMetadata) error {
// (1) Verify current metadata is non-final.
if md.IsFinal() {
return MetadataIsFinalError{}
}
// (2) Check TLF ID.
if nextMd.TlfID() != md.TlfID() {
return MDTlfIDMismatch{
CurrID: md.TlfID(),
NextID: nextMd.TlfID(),
}
}
// (3) Check revision.
if nextMd.RevisionNumber() != md.RevisionNumber()+1 {
return MDRevisionMismatch{
Rev: nextMd.RevisionNumber(),
Curr: md.RevisionNumber(),
}
}
// (4) Check PrevRoot pointer.
expectedPrevRoot := currID
if nextMd.IsFinal() {
expectedPrevRoot = md.GetPrevRoot()
}
if nextMd.GetPrevRoot() != expectedPrevRoot {
return MDPrevRootMismatch{
prevRoot: nextMd.GetPrevRoot(),
expectedPrevRoot: expectedPrevRoot,
}
}
// (5) Check branch ID.
if md.MergedStatus() == nextMd.MergedStatus() && md.BID() != nextMd.BID() {
return errors.Errorf("Unexpected branch ID on successor: %s vs. %s",
md.BID(), nextMd.BID())
} else if md.MergedStatus() == Unmerged && nextMd.MergedStatus() == Merged {
return errors.New("merged MD can't follow unmerged MD")
}
// (6) Check disk usage.
expectedUsage := md.DiskUsage()
if !nextMd.IsWriterMetadataCopiedSet() {
expectedUsage += nextMd.RefBytes() - nextMd.UnrefBytes()
}
if nextMd.DiskUsage() != expectedUsage {
return MDDiskUsageMismatch{
expectedDiskUsage: expectedUsage,
actualDiskUsage: nextMd.DiskUsage(),
}
}
expectedMDUsage := md.MDDiskUsage()
if !nextMd.IsWriterMetadataCopiedSet() {
expectedMDUsage += nextMd.MDRefBytes()
}
// Add an exception for the case where MDRefBytes is equal, since
// it probably indicates an older client just copied the previous
// MDRefBytes value as an unknown field.
if nextMd.MDDiskUsage() != expectedMDUsage &&
md.MDRefBytes() != nextMd.MDRefBytes() {
return MDDiskUsageMismatch{
expectedDiskUsage: expectedMDUsage,
actualDiskUsage: nextMd.MDDiskUsage(),
}
}
// TODO: Check that the successor (bare) TLF handle is the
// same or more resolved.
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"CheckValidSuccessor",
"(",
"currID",
"ID",
",",
"nextMd",
"RootMetadata",
")",
"error",
"{",
"// (1) Verify current metadata is non-final.",
"if",
"md",
".",
"IsFinal",
"(",
")",
"{",
"return",
"MetadataIsFinalError",
... | // CheckValidSuccessor implements the RootMetadata interface for RootMetadataV3. | [
"CheckValidSuccessor",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L554-L627 |
160,626 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | CheckValidSuccessorForServer | func (md *RootMetadataV3) CheckValidSuccessorForServer(
currID ID, nextMd RootMetadata) error {
err := md.CheckValidSuccessor(currID, nextMd)
switch err := err.(type) {
case nil:
break
case MDRevisionMismatch:
return ServerErrorConflictRevision{
Expected: err.Curr + 1,
Actual: err.Rev,
}
case MDPrevRootMismatch:
return ServerErrorConflictPrevRoot{
Expected: err.expectedPrevRoot,
Actual: err.prevRoot,
}
case MDDiskUsageMismatch:
return ServerErrorConflictDiskUsage{
Expected: err.expectedDiskUsage,
Actual: err.actualDiskUsage,
}
default:
return ServerError{Err: err}
}
return nil
} | go | func (md *RootMetadataV3) CheckValidSuccessorForServer(
currID ID, nextMd RootMetadata) error {
err := md.CheckValidSuccessor(currID, nextMd)
switch err := err.(type) {
case nil:
break
case MDRevisionMismatch:
return ServerErrorConflictRevision{
Expected: err.Curr + 1,
Actual: err.Rev,
}
case MDPrevRootMismatch:
return ServerErrorConflictPrevRoot{
Expected: err.expectedPrevRoot,
Actual: err.prevRoot,
}
case MDDiskUsageMismatch:
return ServerErrorConflictDiskUsage{
Expected: err.expectedDiskUsage,
Actual: err.actualDiskUsage,
}
default:
return ServerError{Err: err}
}
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"CheckValidSuccessorForServer",
"(",
"currID",
"ID",
",",
"nextMd",
"RootMetadata",
")",
"error",
"{",
"err",
":=",
"md",
".",
"CheckValidSuccessor",
"(",
"currID",
",",
"nextMd",
")",
"\n",
"switch",
"err",
":=... | // CheckValidSuccessorForServer implements the RootMetadata interface for RootMetadataV3. | [
"CheckValidSuccessorForServer",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L630-L660 |
160,627 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | TypeForKeying | func (md *RootMetadataV3) TypeForKeying() tlf.KeyingType {
if md.isBackedByTeam() {
return tlf.TeamKeying
}
return md.TlfID().Type().ToKeyingType()
} | go | func (md *RootMetadataV3) TypeForKeying() tlf.KeyingType {
if md.isBackedByTeam() {
return tlf.TeamKeying
}
return md.TlfID().Type().ToKeyingType()
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"TypeForKeying",
"(",
")",
"tlf",
".",
"KeyingType",
"{",
"if",
"md",
".",
"isBackedByTeam",
"(",
")",
"{",
"return",
"tlf",
".",
"TeamKeying",
"\n",
"}",
"\n",
"return",
"md",
".",
"TlfID",
"(",
")",
".... | // TypeForKeying implements the RootMetadata interface for RootMetadataV3. | [
"TypeForKeying",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L678-L683 |
160,628 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | MakeBareTlfHandle | func (md *RootMetadataV3) MakeBareTlfHandle(extra ExtraMetadata) (
tlf.Handle, error) {
var writers, readers []keybase1.UserOrTeamID
if md.TypeForKeying() == tlf.PrivateKeying {
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return tlf.Handle{}, err
}
writers = make([]keybase1.UserOrTeamID, 0, len(wkb.Keys))
readers = make([]keybase1.UserOrTeamID, 0, len(rkb.Keys))
for w := range wkb.Keys {
writers = append(writers, w.AsUserOrTeam())
}
for r := range rkb.Keys {
// TODO: Return an error instead if r is
// PublicUID. Maybe return an error if r is in
// WKeys also. Or do all this in
// MakeBareTlfHandle.
if _, ok := wkb.Keys[r]; !ok &&
r != keybase1.PublicUID {
readers = append(readers, r.AsUserOrTeam())
}
}
} else {
err := md.checkNonPrivateExtra(extra)
if err != nil {
return tlf.Handle{}, err
}
writers = md.WriterMetadata.Writers
if md.TypeForKeying() == tlf.PublicKeying {
readers = []keybase1.UserOrTeamID{keybase1.PublicUID.AsUserOrTeam()}
}
}
return tlf.MakeHandle(
writers, readers,
md.WriterMetadata.UnresolvedWriters, md.UnresolvedReaders,
md.TlfHandleExtensions())
} | go | func (md *RootMetadataV3) MakeBareTlfHandle(extra ExtraMetadata) (
tlf.Handle, error) {
var writers, readers []keybase1.UserOrTeamID
if md.TypeForKeying() == tlf.PrivateKeying {
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return tlf.Handle{}, err
}
writers = make([]keybase1.UserOrTeamID, 0, len(wkb.Keys))
readers = make([]keybase1.UserOrTeamID, 0, len(rkb.Keys))
for w := range wkb.Keys {
writers = append(writers, w.AsUserOrTeam())
}
for r := range rkb.Keys {
// TODO: Return an error instead if r is
// PublicUID. Maybe return an error if r is in
// WKeys also. Or do all this in
// MakeBareTlfHandle.
if _, ok := wkb.Keys[r]; !ok &&
r != keybase1.PublicUID {
readers = append(readers, r.AsUserOrTeam())
}
}
} else {
err := md.checkNonPrivateExtra(extra)
if err != nil {
return tlf.Handle{}, err
}
writers = md.WriterMetadata.Writers
if md.TypeForKeying() == tlf.PublicKeying {
readers = []keybase1.UserOrTeamID{keybase1.PublicUID.AsUserOrTeam()}
}
}
return tlf.MakeHandle(
writers, readers,
md.WriterMetadata.UnresolvedWriters, md.UnresolvedReaders,
md.TlfHandleExtensions())
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"MakeBareTlfHandle",
"(",
"extra",
"ExtraMetadata",
")",
"(",
"tlf",
".",
"Handle",
",",
"error",
")",
"{",
"var",
"writers",
",",
"readers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
"\n",
"if",
"md",
".",... | // MakeBareTlfHandle implements the RootMetadata interface for RootMetadataV3. | [
"MakeBareTlfHandle",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L686-L725 |
160,629 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | PromoteReaders | func (md *RootMetadataV3) PromoteReaders(
readersToPromote map[keybase1.UID]bool, extra ExtraMetadata) error {
if md.TypeForKeying() != tlf.PrivateKeying {
return InvalidNonPrivateTLFOperation{md.TlfID(), "PromoteReaders", md.Version()}
}
if len(readersToPromote) == 0 {
return nil
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return err
}
for reader := range readersToPromote {
dkim, ok := rkb.Keys[reader]
if !ok {
return errors.Errorf("Could not find %s in rkb", reader)
}
// TODO: This is incorrect, since dkim contains offsets info
// rkb.TLFEphemeralPublicKeys, which don't directly translate
// to offsets into wkb.TLFEphemeralPublicKeys.
//
// Also, doing this may leave some entries in
// rkb.TLFEphemeralPublicKeys unreferenced, so they should be
// removed.
//
// See KBFS-1719.
wkb.Keys[reader] = dkim
delete(rkb.Keys, reader)
}
return nil
} | go | func (md *RootMetadataV3) PromoteReaders(
readersToPromote map[keybase1.UID]bool, extra ExtraMetadata) error {
if md.TypeForKeying() != tlf.PrivateKeying {
return InvalidNonPrivateTLFOperation{md.TlfID(), "PromoteReaders", md.Version()}
}
if len(readersToPromote) == 0 {
return nil
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return err
}
for reader := range readersToPromote {
dkim, ok := rkb.Keys[reader]
if !ok {
return errors.Errorf("Could not find %s in rkb", reader)
}
// TODO: This is incorrect, since dkim contains offsets info
// rkb.TLFEphemeralPublicKeys, which don't directly translate
// to offsets into wkb.TLFEphemeralPublicKeys.
//
// Also, doing this may leave some entries in
// rkb.TLFEphemeralPublicKeys unreferenced, so they should be
// removed.
//
// See KBFS-1719.
wkb.Keys[reader] = dkim
delete(rkb.Keys, reader)
}
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"PromoteReaders",
"(",
"readersToPromote",
"map",
"[",
"keybase1",
".",
"UID",
"]",
"bool",
",",
"extra",
"ExtraMetadata",
")",
"error",
"{",
"if",
"md",
".",
"TypeForKeying",
"(",
")",
"!=",
"tlf",
".",
"Pr... | // PromoteReaders implements the RootMetadata interface for
// RootMetadataV3. | [
"PromoteReaders",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L741-L774 |
160,630 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | RevokeRemovedDevices | func (md *RootMetadataV3) RevokeRemovedDevices(
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
extra ExtraMetadata) (ServerHalfRemovalInfo, error) {
if md.TypeForKeying() != tlf.PrivateKeying {
return nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "RevokeRemovedDevices", md.Version()}
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return nil, err
}
wRemovalInfo := wkb.Keys.RemoveDevicesNotIn(updatedWriterKeys)
rRemovalInfo := rkb.Keys.RemoveDevicesNotIn(updatedReaderKeys)
return wRemovalInfo.MergeUsers(rRemovalInfo)
} | go | func (md *RootMetadataV3) RevokeRemovedDevices(
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
extra ExtraMetadata) (ServerHalfRemovalInfo, error) {
if md.TypeForKeying() != tlf.PrivateKeying {
return nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "RevokeRemovedDevices", md.Version()}
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return nil, err
}
wRemovalInfo := wkb.Keys.RemoveDevicesNotIn(updatedWriterKeys)
rRemovalInfo := rkb.Keys.RemoveDevicesNotIn(updatedReaderKeys)
return wRemovalInfo.MergeUsers(rRemovalInfo)
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"RevokeRemovedDevices",
"(",
"updatedWriterKeys",
",",
"updatedReaderKeys",
"UserDevicePublicKeys",
",",
"extra",
"ExtraMetadata",
")",
"(",
"ServerHalfRemovalInfo",
",",
"error",
")",
"{",
"if",
"md",
".",
"TypeForKeyi... | // RevokeRemovedDevices implements the RootMetadata interface for
// RootMetadataV3. | [
"RevokeRemovedDevices",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L778-L794 |
160,631 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | GetUserDevicePublicKeys | func (md *RootMetadataV3) GetUserDevicePublicKeys(extra ExtraMetadata) (
writerDeviceKeys, readerDeviceKeys UserDevicePublicKeys, err error) {
if md.TypeForKeying() != tlf.PrivateKeying {
return nil, nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "GetUserDevicePublicKeys", md.Version()}
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return nil, nil, err
}
return wkb.Keys.ToPublicKeys(), rkb.Keys.ToPublicKeys(), nil
} | go | func (md *RootMetadataV3) GetUserDevicePublicKeys(extra ExtraMetadata) (
writerDeviceKeys, readerDeviceKeys UserDevicePublicKeys, err error) {
if md.TypeForKeying() != tlf.PrivateKeying {
return nil, nil, InvalidNonPrivateTLFOperation{
md.TlfID(), "GetUserDevicePublicKeys", md.Version()}
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return nil, nil, err
}
return wkb.Keys.ToPublicKeys(), rkb.Keys.ToPublicKeys(), nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"GetUserDevicePublicKeys",
"(",
"extra",
"ExtraMetadata",
")",
"(",
"writerDeviceKeys",
",",
"readerDeviceKeys",
"UserDevicePublicKeys",
",",
"err",
"error",
")",
"{",
"if",
"md",
".",
"TypeForKeying",
"(",
")",
"!=... | // GetUserDevicePublicKeys implements the RootMetadata interface
// for RootMetadataV3. | [
"GetUserDevicePublicKeys",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L798-L811 |
160,632 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | GetTLFCryptKeyParams | func (md *RootMetadataV3) GetTLFCryptKeyParams(
keyGen KeyGen, user keybase1.UID,
key kbfscrypto.CryptPublicKey, extra ExtraMetadata) (
kbfscrypto.TLFEphemeralPublicKey,
kbfscrypto.EncryptedTLFCryptKeyClientHalf,
kbfscrypto.TLFCryptKeyServerHalfID, bool, error) {
if keyGen != md.LatestKeyGeneration() {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false,
TLFCryptKeyNotPerDeviceEncrypted{md.TlfID(), keyGen}
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, err
}
isWriter := true
dkim := wkb.Keys[user]
if dkim == nil {
dkim = rkb.Keys[user]
if dkim == nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
isWriter = false
}
info, ok := dkim[key]
if !ok {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
var publicKeys kbfscrypto.TLFEphemeralPublicKeys
var keyType string
if isWriter {
publicKeys = wkb.TLFEphemeralPublicKeys
keyType = "writer"
} else {
publicKeys = rkb.TLFEphemeralPublicKeys
keyType = "reader"
}
keyCount := len(publicKeys)
index := info.EPubKeyIndex
if index >= keyCount {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false,
errors.Errorf("Invalid %s key index %d >= %d",
keyType, index, keyCount)
}
return publicKeys[index], info.ClientHalf, info.ServerHalfID, true, nil
} | go | func (md *RootMetadataV3) GetTLFCryptKeyParams(
keyGen KeyGen, user keybase1.UID,
key kbfscrypto.CryptPublicKey, extra ExtraMetadata) (
kbfscrypto.TLFEphemeralPublicKey,
kbfscrypto.EncryptedTLFCryptKeyClientHalf,
kbfscrypto.TLFCryptKeyServerHalfID, bool, error) {
if keyGen != md.LatestKeyGeneration() {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false,
TLFCryptKeyNotPerDeviceEncrypted{md.TlfID(), keyGen}
}
wkb, rkb, err := md.getTLFKeyBundles(extra)
if err != nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, err
}
isWriter := true
dkim := wkb.Keys[user]
if dkim == nil {
dkim = rkb.Keys[user]
if dkim == nil {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
isWriter = false
}
info, ok := dkim[key]
if !ok {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false, nil
}
var publicKeys kbfscrypto.TLFEphemeralPublicKeys
var keyType string
if isWriter {
publicKeys = wkb.TLFEphemeralPublicKeys
keyType = "writer"
} else {
publicKeys = rkb.TLFEphemeralPublicKeys
keyType = "reader"
}
keyCount := len(publicKeys)
index := info.EPubKeyIndex
if index >= keyCount {
return kbfscrypto.TLFEphemeralPublicKey{},
kbfscrypto.EncryptedTLFCryptKeyClientHalf{},
kbfscrypto.TLFCryptKeyServerHalfID{}, false,
errors.Errorf("Invalid %s key index %d >= %d",
keyType, index, keyCount)
}
return publicKeys[index], info.ClientHalf, info.ServerHalfID, true, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"GetTLFCryptKeyParams",
"(",
"keyGen",
"KeyGen",
",",
"user",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"CryptPublicKey",
",",
"extra",
"ExtraMetadata",
")",
"(",
"kbfscrypto",
".",
"TLFEphemeralPublicK... | // GetTLFCryptKeyParams implements the RootMetadata interface for RootMetadataV3. | [
"GetTLFCryptKeyParams",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L814-L869 |
160,633 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | CheckWKBID | func CheckWKBID(codec kbfscodec.Codec,
wkbID TLFWriterKeyBundleID, wkb TLFWriterKeyBundleV3) error {
computedWKBID, err := MakeTLFWriterKeyBundleID(codec, wkb)
if err != nil {
return err
}
if wkbID != computedWKBID {
return errors.Errorf("Expected WKB ID %s, got %s",
wkbID, computedWKBID)
}
return nil
} | go | func CheckWKBID(codec kbfscodec.Codec,
wkbID TLFWriterKeyBundleID, wkb TLFWriterKeyBundleV3) error {
computedWKBID, err := MakeTLFWriterKeyBundleID(codec, wkb)
if err != nil {
return err
}
if wkbID != computedWKBID {
return errors.Errorf("Expected WKB ID %s, got %s",
wkbID, computedWKBID)
}
return nil
} | [
"func",
"CheckWKBID",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"wkbID",
"TLFWriterKeyBundleID",
",",
"wkb",
"TLFWriterKeyBundleV3",
")",
"error",
"{",
"computedWKBID",
",",
"err",
":=",
"MakeTLFWriterKeyBundleID",
"(",
"codec",
",",
"wkb",
")",
"\n",
"if",
... | // CheckWKBID returns an error if the ID of the given writer key
// bundle doesn't match the given one. | [
"CheckWKBID",
"returns",
"an",
"error",
"if",
"the",
"ID",
"of",
"the",
"given",
"writer",
"key",
"bundle",
"doesn",
"t",
"match",
"the",
"given",
"one",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L873-L886 |
160,634 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | CheckRKBID | func CheckRKBID(codec kbfscodec.Codec,
rkbID TLFReaderKeyBundleID, rkb TLFReaderKeyBundleV3) error {
computedRKBID, err := MakeTLFReaderKeyBundleID(codec, rkb)
if err != nil {
return err
}
if rkbID != computedRKBID {
return errors.Errorf("Expected RKB ID %s, got %s",
rkbID, computedRKBID)
}
return nil
} | go | func CheckRKBID(codec kbfscodec.Codec,
rkbID TLFReaderKeyBundleID, rkb TLFReaderKeyBundleV3) error {
computedRKBID, err := MakeTLFReaderKeyBundleID(codec, rkb)
if err != nil {
return err
}
if rkbID != computedRKBID {
return errors.Errorf("Expected RKB ID %s, got %s",
rkbID, computedRKBID)
}
return nil
} | [
"func",
"CheckRKBID",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"rkbID",
"TLFReaderKeyBundleID",
",",
"rkb",
"TLFReaderKeyBundleV3",
")",
"error",
"{",
"computedRKBID",
",",
"err",
":=",
"MakeTLFReaderKeyBundleID",
"(",
"codec",
",",
"rkb",
")",
"\n",
"if",
... | // CheckRKBID returns an error if the ID of the given reader key
// bundle doesn't match the given one. | [
"CheckRKBID",
"returns",
"an",
"error",
"if",
"the",
"ID",
"of",
"the",
"given",
"reader",
"key",
"bundle",
"doesn",
"t",
"match",
"the",
"given",
"one",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L890-L903 |
160,635 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | IsLastModifiedBy | func (md *RootMetadataV3) IsLastModifiedBy(
uid keybase1.UID, key kbfscrypto.VerifyingKey) error {
// Verify the user and device are the writer.
writer := md.LastModifyingWriter()
if !md.IsWriterMetadataCopiedSet() {
if writer != uid {
return errors.Errorf("Last writer %s != %s", writer, uid)
}
}
// Verify the user and device are the last modifier.
user := md.GetLastModifyingUser()
if user != uid {
return errors.Errorf("Last modifier %s != %s", user, uid)
}
return nil
} | go | func (md *RootMetadataV3) IsLastModifiedBy(
uid keybase1.UID, key kbfscrypto.VerifyingKey) error {
// Verify the user and device are the writer.
writer := md.LastModifyingWriter()
if !md.IsWriterMetadataCopiedSet() {
if writer != uid {
return errors.Errorf("Last writer %s != %s", writer, uid)
}
}
// Verify the user and device are the last modifier.
user := md.GetLastModifyingUser()
if user != uid {
return errors.Errorf("Last modifier %s != %s", user, uid)
}
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"IsLastModifiedBy",
"(",
"uid",
"keybase1",
".",
"UID",
",",
"key",
"kbfscrypto",
".",
"VerifyingKey",
")",
"error",
"{",
"// Verify the user and device are the writer.",
"writer",
":=",
"md",
".",
"LastModifyingWriter"... | // IsLastModifiedBy implements the RootMetadata interface for
// RootMetadataV3. | [
"IsLastModifiedBy",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1016-L1033 |
160,636 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | GetSerializedWriterMetadata | func (md *RootMetadataV3) GetSerializedWriterMetadata(
codec kbfscodec.Codec) ([]byte, error) {
return codec.Encode(md.WriterMetadata)
} | go | func (md *RootMetadataV3) GetSerializedWriterMetadata(
codec kbfscodec.Codec) ([]byte, error) {
return codec.Encode(md.WriterMetadata)
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"GetSerializedWriterMetadata",
"(",
"codec",
"kbfscodec",
".",
"Codec",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"return",
"codec",
".",
"Encode",
"(",
"md",
".",
"WriterMetadata",
")",
"\n",
"}"
... | // GetSerializedWriterMetadata implements the RootMetadata interface for RootMetadataV3. | [
"GetSerializedWriterMetadata",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1176-L1179 |
160,637 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | SetLastModifyingWriter | func (md *RootMetadataV3) SetLastModifyingWriter(user keybase1.UID) {
md.WriterMetadata.LastModifyingWriter = user
} | go | func (md *RootMetadataV3) SetLastModifyingWriter(user keybase1.UID) {
md.WriterMetadata.LastModifyingWriter = user
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"SetLastModifyingWriter",
"(",
"user",
"keybase1",
".",
"UID",
")",
"{",
"md",
".",
"WriterMetadata",
".",
"LastModifyingWriter",
"=",
"user",
"\n",
"}"
] | // SetLastModifyingWriter implements the MutableRootMetadata interface for RootMetadataV3. | [
"SetLastModifyingWriter",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1193-L1195 |
160,638 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | SetUnresolvedWriters | func (md *RootMetadataV3) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.WriterMetadata.UnresolvedWriters = writers
} | go | func (md *RootMetadataV3) SetUnresolvedWriters(writers []keybase1.SocialAssertion) {
md.WriterMetadata.UnresolvedWriters = writers
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"SetUnresolvedWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
")",
"{",
"md",
".",
"WriterMetadata",
".",
"UnresolvedWriters",
"=",
"writers",
"\n",
"}"
] | // SetUnresolvedWriters implements the MutableRootMetadata interface for RootMetadataV3. | [
"SetUnresolvedWriters",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1401-L1403 |
160,639 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | SetWriters | func (md *RootMetadataV3) SetWriters(writers []keybase1.UserOrTeamID) {
md.WriterMetadata.Writers = writers
} | go | func (md *RootMetadataV3) SetWriters(writers []keybase1.UserOrTeamID) {
md.WriterMetadata.Writers = writers
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"SetWriters",
"(",
"writers",
"[",
"]",
"keybase1",
".",
"UserOrTeamID",
")",
"{",
"md",
".",
"WriterMetadata",
".",
"Writers",
"=",
"writers",
"\n",
"}"
] | // SetWriters implements the MutableRootMetadata interface for RootMetadataV3. | [
"SetWriters",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1416-L1418 |
160,640 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | ClearForV4Migration | func (md *RootMetadataV3) ClearForV4Migration() {
md.WriterMetadata.WKeyBundleID = TLFWriterKeyBundleID{}
md.RKeyBundleID = TLFReaderKeyBundleID{}
} | go | func (md *RootMetadataV3) ClearForV4Migration() {
md.WriterMetadata.WKeyBundleID = TLFWriterKeyBundleID{}
md.RKeyBundleID = TLFReaderKeyBundleID{}
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"ClearForV4Migration",
"(",
")",
"{",
"md",
".",
"WriterMetadata",
".",
"WKeyBundleID",
"=",
"TLFWriterKeyBundleID",
"{",
"}",
"\n",
"md",
".",
"RKeyBundleID",
"=",
"TLFReaderKeyBundleID",
"{",
"}",
"\n",
"}"
] | // ClearForV4Migration implements the MutableRootMetadata interface
// for RootMetadataV3. | [
"ClearForV4Migration",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1422-L1425 |
160,641 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | SetTlfID | func (md *RootMetadataV3) SetTlfID(tlf tlf.ID) {
md.WriterMetadata.ID = tlf
} | go | func (md *RootMetadataV3) SetTlfID(tlf tlf.ID) {
md.WriterMetadata.ID = tlf
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"SetTlfID",
"(",
"tlf",
"tlf",
".",
"ID",
")",
"{",
"md",
".",
"WriterMetadata",
".",
"ID",
"=",
"tlf",
"\n",
"}"
] | // SetTlfID implements the MutableRootMetadata interface for RootMetadataV3. | [
"SetTlfID",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1428-L1430 |
160,642 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | Version | func (md *RootMetadataV3) Version() MetadataVer {
if md.TlfID().Type() != tlf.SingleTeam &&
md.TypeForKeying() == tlf.TeamKeying {
return ImplicitTeamsVer
}
return SegregatedKeyBundlesVer
} | go | func (md *RootMetadataV3) Version() MetadataVer {
if md.TlfID().Type() != tlf.SingleTeam &&
md.TypeForKeying() == tlf.TeamKeying {
return ImplicitTeamsVer
}
return SegregatedKeyBundlesVer
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"Version",
"(",
")",
"MetadataVer",
"{",
"if",
"md",
".",
"TlfID",
"(",
")",
".",
"Type",
"(",
")",
"!=",
"tlf",
".",
"SingleTeam",
"&&",
"md",
".",
"TypeForKeying",
"(",
")",
"==",
"tlf",
".",
"TeamKe... | // Version implements the MutableRootMetadata interface for RootMetadataV3. | [
"Version",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1438-L1444 |
160,643 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | GetCurrentTLFPublicKey | func (md *RootMetadataV3) GetCurrentTLFPublicKey(
extra ExtraMetadata) (kbfscrypto.TLFPublicKey, error) {
wkb, _, err := md.getTLFKeyBundles(extra)
if err != nil {
return kbfscrypto.TLFPublicKey{}, err
}
return wkb.TLFPublicKey, nil
} | go | func (md *RootMetadataV3) GetCurrentTLFPublicKey(
extra ExtraMetadata) (kbfscrypto.TLFPublicKey, error) {
wkb, _, err := md.getTLFKeyBundles(extra)
if err != nil {
return kbfscrypto.TLFPublicKey{}, err
}
return wkb.TLFPublicKey, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"GetCurrentTLFPublicKey",
"(",
"extra",
"ExtraMetadata",
")",
"(",
"kbfscrypto",
".",
"TLFPublicKey",
",",
"error",
")",
"{",
"wkb",
",",
"_",
",",
"err",
":=",
"md",
".",
"getTLFKeyBundles",
"(",
"extra",
")"... | // GetCurrentTLFPublicKey implements the RootMetadata interface
// for RootMetadataV3. | [
"GetCurrentTLFPublicKey",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1448-L1455 |
160,644 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | GetUnresolvedParticipants | func (md *RootMetadataV3) GetUnresolvedParticipants() []keybase1.SocialAssertion {
writers := md.WriterMetadata.UnresolvedWriters
readers := md.UnresolvedReaders
users := make([]keybase1.SocialAssertion, 0, len(writers)+len(readers))
users = append(users, writers...)
users = append(users, readers...)
return users
} | go | func (md *RootMetadataV3) GetUnresolvedParticipants() []keybase1.SocialAssertion {
writers := md.WriterMetadata.UnresolvedWriters
readers := md.UnresolvedReaders
users := make([]keybase1.SocialAssertion, 0, len(writers)+len(readers))
users = append(users, writers...)
users = append(users, readers...)
return users
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"GetUnresolvedParticipants",
"(",
")",
"[",
"]",
"keybase1",
".",
"SocialAssertion",
"{",
"writers",
":=",
"md",
".",
"WriterMetadata",
".",
"UnresolvedWriters",
"\n",
"readers",
":=",
"md",
".",
"UnresolvedReaders"... | // GetUnresolvedParticipants implements the RootMetadata interface for RootMetadataV3. | [
"GetUnresolvedParticipants",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1458-L1465 |
160,645 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | UpdateKeyBundles | func (md *RootMetadataV3) UpdateKeyBundles(codec kbfscodec.Codec,
extra ExtraMetadata,
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
tlfCryptKeys []kbfscrypto.TLFCryptKey) (
[]UserDeviceKeyServerHalves, error) {
if len(tlfCryptKeys) != 1 {
return nil, fmt.Errorf(
"(MDv3) Expected 1 TLF crypt key, got %d",
len(tlfCryptKeys))
}
serverHalves, err := md.updateKeyBundles(codec, extra,
updatedWriterKeys, updatedReaderKeys,
ePubKey, ePrivKey, tlfCryptKeys[0])
if err != nil {
return nil, err
}
return []UserDeviceKeyServerHalves{serverHalves}, nil
} | go | func (md *RootMetadataV3) UpdateKeyBundles(codec kbfscodec.Codec,
extra ExtraMetadata,
updatedWriterKeys, updatedReaderKeys UserDevicePublicKeys,
ePubKey kbfscrypto.TLFEphemeralPublicKey,
ePrivKey kbfscrypto.TLFEphemeralPrivateKey,
tlfCryptKeys []kbfscrypto.TLFCryptKey) (
[]UserDeviceKeyServerHalves, error) {
if len(tlfCryptKeys) != 1 {
return nil, fmt.Errorf(
"(MDv3) Expected 1 TLF crypt key, got %d",
len(tlfCryptKeys))
}
serverHalves, err := md.updateKeyBundles(codec, extra,
updatedWriterKeys, updatedReaderKeys,
ePubKey, ePrivKey, tlfCryptKeys[0])
if err != nil {
return nil, err
}
return []UserDeviceKeyServerHalves{serverHalves}, nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"UpdateKeyBundles",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"extra",
"ExtraMetadata",
",",
"updatedWriterKeys",
",",
"updatedReaderKeys",
"UserDevicePublicKeys",
",",
"ePubKey",
"kbfscrypto",
".",
"TLFEphemeralPubli... | // UpdateKeyBundles implements the MutableRootMetadata interface
// for RootMetadataV3. | [
"UpdateKeyBundles",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1469-L1490 |
160,646 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | FinalizeRekey | func (md *RootMetadataV3) FinalizeRekey(
codec kbfscodec.Codec, extra ExtraMetadata) error {
extraV3, ok := extra.(*ExtraMetadataV3)
if !ok {
return errors.New("Invalid extra metadata")
}
oldWKBID := md.WriterMetadata.WKeyBundleID
oldRKBID := md.RKeyBundleID
newWKBID, err := MakeTLFWriterKeyBundleID(codec, extraV3.wkb)
if err != nil {
return err
}
newRKBID, err := MakeTLFReaderKeyBundleID(codec, extraV3.rkb)
if err != nil {
return err
}
md.WriterMetadata.WKeyBundleID = newWKBID
md.RKeyBundleID = newRKBID
extraV3.updateNew(newWKBID != oldWKBID, newRKBID != oldRKBID)
return nil
} | go | func (md *RootMetadataV3) FinalizeRekey(
codec kbfscodec.Codec, extra ExtraMetadata) error {
extraV3, ok := extra.(*ExtraMetadataV3)
if !ok {
return errors.New("Invalid extra metadata")
}
oldWKBID := md.WriterMetadata.WKeyBundleID
oldRKBID := md.RKeyBundleID
newWKBID, err := MakeTLFWriterKeyBundleID(codec, extraV3.wkb)
if err != nil {
return err
}
newRKBID, err := MakeTLFReaderKeyBundleID(codec, extraV3.rkb)
if err != nil {
return err
}
md.WriterMetadata.WKeyBundleID = newWKBID
md.RKeyBundleID = newRKBID
extraV3.updateNew(newWKBID != oldWKBID, newRKBID != oldRKBID)
return nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"FinalizeRekey",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"extra",
"ExtraMetadata",
")",
"error",
"{",
"extraV3",
",",
"ok",
":=",
"extra",
".",
"(",
"*",
"ExtraMetadataV3",
")",
"\n",
"if",
"!",
"ok",
... | // FinalizeRekey implements the MutableRootMetadata interface for RootMetadataV3. | [
"FinalizeRekey",
"implements",
"the",
"MutableRootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1503-L1527 |
160,647 | keybase/client | go/kbfs/kbfsmd/root_metadata_v3.go | GetHistoricTLFCryptKey | func (md *RootMetadataV3) GetHistoricTLFCryptKey(codec kbfscodec.Codec,
keyGen KeyGen, currentKey kbfscrypto.TLFCryptKey, extra ExtraMetadata) (
kbfscrypto.TLFCryptKey, error) {
extraV3, ok := extra.(*ExtraMetadataV3)
if !ok {
return kbfscrypto.TLFCryptKey{}, errors.New(
"Invalid extra metadata")
}
if keyGen < FirstValidKeyGen || keyGen >= md.LatestKeyGeneration() {
return kbfscrypto.TLFCryptKey{}, errors.Errorf(
"Invalid key generation %d", keyGen)
}
oldKeys, err := kbfscrypto.DecryptTLFCryptKeys(
codec, extraV3.wkb.EncryptedHistoricTLFCryptKeys, currentKey)
if err != nil {
return kbfscrypto.TLFCryptKey{}, err
}
index := int(keyGen - FirstValidKeyGen)
if index >= len(oldKeys) || index < 0 {
return kbfscrypto.TLFCryptKey{}, errors.Errorf(
"Index %d out of range (max: %d)", index, len(oldKeys))
}
return oldKeys[index], nil
} | go | func (md *RootMetadataV3) GetHistoricTLFCryptKey(codec kbfscodec.Codec,
keyGen KeyGen, currentKey kbfscrypto.TLFCryptKey, extra ExtraMetadata) (
kbfscrypto.TLFCryptKey, error) {
extraV3, ok := extra.(*ExtraMetadataV3)
if !ok {
return kbfscrypto.TLFCryptKey{}, errors.New(
"Invalid extra metadata")
}
if keyGen < FirstValidKeyGen || keyGen >= md.LatestKeyGeneration() {
return kbfscrypto.TLFCryptKey{}, errors.Errorf(
"Invalid key generation %d", keyGen)
}
oldKeys, err := kbfscrypto.DecryptTLFCryptKeys(
codec, extraV3.wkb.EncryptedHistoricTLFCryptKeys, currentKey)
if err != nil {
return kbfscrypto.TLFCryptKey{}, err
}
index := int(keyGen - FirstValidKeyGen)
if index >= len(oldKeys) || index < 0 {
return kbfscrypto.TLFCryptKey{}, errors.Errorf(
"Index %d out of range (max: %d)", index, len(oldKeys))
}
return oldKeys[index], nil
} | [
"func",
"(",
"md",
"*",
"RootMetadataV3",
")",
"GetHistoricTLFCryptKey",
"(",
"codec",
"kbfscodec",
".",
"Codec",
",",
"keyGen",
"KeyGen",
",",
"currentKey",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"extra",
"ExtraMetadata",
")",
"(",
"kbfscrypto",
".",
"TLFCryptK... | // GetHistoricTLFCryptKey implements the RootMetadata interface for RootMetadataV3. | [
"GetHistoricTLFCryptKey",
"implements",
"the",
"RootMetadata",
"interface",
"for",
"RootMetadataV3",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/kbfsmd/root_metadata_v3.go#L1535-L1558 |
160,648 | keybase/client | go/service/log.go | NewLogHandler | func NewLogHandler(xp rpc.Transporter, logReg *logRegister, g *libkb.GlobalContext) *LogHandler {
return &LogHandler{
BaseHandler: NewBaseHandler(g, xp),
logReg: logReg,
Contextified: libkb.NewContextified(g),
}
} | go | func NewLogHandler(xp rpc.Transporter, logReg *logRegister, g *libkb.GlobalContext) *LogHandler {
return &LogHandler{
BaseHandler: NewBaseHandler(g, xp),
logReg: logReg,
Contextified: libkb.NewContextified(g),
}
} | [
"func",
"NewLogHandler",
"(",
"xp",
"rpc",
".",
"Transporter",
",",
"logReg",
"*",
"logRegister",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
")",
"*",
"LogHandler",
"{",
"return",
"&",
"LogHandler",
"{",
"BaseHandler",
":",
"NewBaseHandler",
"(",
"g",
"... | // NewLogHandler creates a LogHandler for the xp transport. | [
"NewLogHandler",
"creates",
"a",
"LogHandler",
"for",
"the",
"xp",
"transport",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/service/log.go#L22-L28 |
160,649 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | NewKBFSOpsStandard | func NewKBFSOpsStandard(appStateUpdater env.AppStateUpdater, config Config) *KBFSOpsStandard {
log := config.MakeLogger("")
quLog := config.MakeLogger(QuotaUsageLogModule("KBFSOps"))
kops := &KBFSOpsStandard{
appStateUpdater: appStateUpdater,
config: config,
log: log,
deferLog: log.CloneWithAddedDepth(1),
ops: make(map[data.FolderBranch]*folderBranchOps),
opsByFav: make(map[favorites.Folder]*folderBranchOps),
reIdentifyControlChan: make(chan chan<- struct{}),
favs: NewFavorites(config),
quotaUsage: NewEventuallyConsistentQuotaUsage(
config, quLog, config.MakeVLogger(quLog)),
longOperationDebugDumper: NewImpatientDebugDumper(
config, longOperationDebugDumpDuration),
currentStatus: &kbfsCurrentStatus{},
}
kops.currentStatus.Init()
go kops.markForReIdentifyIfNeededLoop()
return kops
} | go | func NewKBFSOpsStandard(appStateUpdater env.AppStateUpdater, config Config) *KBFSOpsStandard {
log := config.MakeLogger("")
quLog := config.MakeLogger(QuotaUsageLogModule("KBFSOps"))
kops := &KBFSOpsStandard{
appStateUpdater: appStateUpdater,
config: config,
log: log,
deferLog: log.CloneWithAddedDepth(1),
ops: make(map[data.FolderBranch]*folderBranchOps),
opsByFav: make(map[favorites.Folder]*folderBranchOps),
reIdentifyControlChan: make(chan chan<- struct{}),
favs: NewFavorites(config),
quotaUsage: NewEventuallyConsistentQuotaUsage(
config, quLog, config.MakeVLogger(quLog)),
longOperationDebugDumper: NewImpatientDebugDumper(
config, longOperationDebugDumpDuration),
currentStatus: &kbfsCurrentStatus{},
}
kops.currentStatus.Init()
go kops.markForReIdentifyIfNeededLoop()
return kops
} | [
"func",
"NewKBFSOpsStandard",
"(",
"appStateUpdater",
"env",
".",
"AppStateUpdater",
",",
"config",
"Config",
")",
"*",
"KBFSOpsStandard",
"{",
"log",
":=",
"config",
".",
"MakeLogger",
"(",
"\"",
"\"",
")",
"\n",
"quLog",
":=",
"config",
".",
"MakeLogger",
... | // NewKBFSOpsStandard constructs a new KBFSOpsStandard object. | [
"NewKBFSOpsStandard",
"constructs",
"a",
"new",
"KBFSOpsStandard",
"object",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L66-L87 |
160,650 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Shutdown | func (fs *KBFSOpsStandard) Shutdown(ctx context.Context) error {
defer fs.longOperationDebugDumper.Shutdown() // shut it down last
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
err := fs.shutdownEdits(ctx)
if err != nil {
return err
}
close(fs.reIdentifyControlChan)
var errors []error
if err := fs.favs.Shutdown(); err != nil {
errors = append(errors, err)
}
for _, ops := range fs.ops {
if err := ops.Shutdown(ctx); err != nil {
errors = append(errors, err)
// Continue on and try to shut down the other FBOs.
}
}
if len(errors) == 1 {
return errors[0]
} else if len(errors) > 1 {
// Aggregate errors
return fmt.Errorf("Multiple errors on shutdown: %v", errors)
}
return nil
} | go | func (fs *KBFSOpsStandard) Shutdown(ctx context.Context) error {
defer fs.longOperationDebugDumper.Shutdown() // shut it down last
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
err := fs.shutdownEdits(ctx)
if err != nil {
return err
}
close(fs.reIdentifyControlChan)
var errors []error
if err := fs.favs.Shutdown(); err != nil {
errors = append(errors, err)
}
for _, ops := range fs.ops {
if err := ops.Shutdown(ctx); err != nil {
errors = append(errors, err)
// Continue on and try to shut down the other FBOs.
}
}
if len(errors) == 1 {
return errors[0]
} else if len(errors) > 1 {
// Aggregate errors
return fmt.Errorf("Multiple errors on shutdown: %v", errors)
}
return nil
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Shutdown",
"(",
"ctx",
"context",
".",
"Context",
")",
"error",
"{",
"defer",
"fs",
".",
"longOperationDebugDumper",
".",
"Shutdown",
"(",
")",
"// shut it down last",
"\n",
"timeTrackerDone",
":=",
"fs",
".",
... | // Shutdown safely shuts down any background goroutines that may have
// been launched by KBFSOpsStandard. | [
"Shutdown",
"safely",
"shuts",
"down",
"any",
"background",
"goroutines",
"that",
"may",
"have",
"been",
"launched",
"by",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L145-L173 |
160,651 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | ClearPrivateFolderMD | func (fs *KBFSOpsStandard) ClearPrivateFolderMD(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
// Block until all private folders have been reset. TODO:
// parallelize these, as they can block for a while waiting for
// the lock.
for _, fbo := range fs.ops {
// This call is a no-op for public folders.
fbo.ClearPrivateFolderMD(ctx)
}
} | go | func (fs *KBFSOpsStandard) ClearPrivateFolderMD(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
// Block until all private folders have been reset. TODO:
// parallelize these, as they can block for a while waiting for
// the lock.
for _, fbo := range fs.ops {
// This call is a no-op for public folders.
fbo.ClearPrivateFolderMD(ctx)
}
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"ClearPrivateFolderMD",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
"defer",
"timeTrackerDone",
"(",
")",
... | // ClearPrivateFolderMD implements the KBFSOps interface for
// KBFSOpsStandard. | [
"ClearPrivateFolderMD",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L215-L229 |
160,652 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | ForceFastForward | func (fs *KBFSOpsStandard) ForceFastForward(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
fs.log.CDebugf(ctx, "Forcing fast-forwards for %d folders", len(fs.ops))
for _, fbo := range fs.ops {
fbo.ForceFastForward(ctx)
}
} | go | func (fs *KBFSOpsStandard) ForceFastForward(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
fs.log.CDebugf(ctx, "Forcing fast-forwards for %d folders", len(fs.ops))
for _, fbo := range fs.ops {
fbo.ForceFastForward(ctx)
}
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"ForceFastForward",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
"defer",
"timeTrackerDone",
"(",
")",
"\... | // ForceFastForward implements the KBFSOps interface for
// KBFSOpsStandard. | [
"ForceFastForward",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L233-L244 |
160,653 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | InvalidateNodeAndChildren | func (fs *KBFSOpsStandard) InvalidateNodeAndChildren(
ctx context.Context, node Node) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, node)
return ops.InvalidateNodeAndChildren(ctx, node)
} | go | func (fs *KBFSOpsStandard) InvalidateNodeAndChildren(
ctx context.Context, node Node) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, node)
return ops.InvalidateNodeAndChildren(ctx, node)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"InvalidateNodeAndChildren",
"(",
"ctx",
"context",
".",
"Context",
",",
"node",
"Node",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
"... | // InvalidateNodeAndChildren implements the KBFSOps interface for
// KBFSOpsStandard. | [
"InvalidateNodeAndChildren",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L248-L255 |
160,654 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetFavorites | func (fs *KBFSOpsStandard) GetFavorites(ctx context.Context) (
[]favorites.Folder, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
return fs.favs.Get(ctx)
} | go | func (fs *KBFSOpsStandard) GetFavorites(ctx context.Context) (
[]favorites.Folder, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
return fs.favs.Get(ctx)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetFavorites",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"[",
"]",
"favorites",
".",
"Folder",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"("... | // GetFavorites implements the KBFSOps interface for
// KBFSOpsStandard. | [
"GetFavorites",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L259-L265 |
160,655 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetFavoritesAll | func (fs *KBFSOpsStandard) GetFavoritesAll(ctx context.Context) (keybase1.
FavoritesResult, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
return fs.favs.GetAll(ctx)
} | go | func (fs *KBFSOpsStandard) GetFavoritesAll(ctx context.Context) (keybase1.
FavoritesResult, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
return fs.favs.GetAll(ctx)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetFavoritesAll",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"keybase1",
".",
"FavoritesResult",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
... | // GetFavoritesAll implements the KBFSOps interface for
// KBFSOpsStandard. | [
"GetFavoritesAll",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L269-L275 |
160,656 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | RefreshCachedFavorites | func (fs *KBFSOpsStandard) RefreshCachedFavorites(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.favs.RefreshCache(ctx)
} | go | func (fs *KBFSOpsStandard) RefreshCachedFavorites(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.favs.RefreshCache(ctx)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"RefreshCachedFavorites",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
"defer",
"timeTrackerDone",
"(",
")"... | // RefreshCachedFavorites implements the KBFSOps interface for
// KBFSOpsStandard. | [
"RefreshCachedFavorites",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L279-L284 |
160,657 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | ClearCachedFavorites | func (fs *KBFSOpsStandard) ClearCachedFavorites(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.favs.ClearCache(ctx)
} | go | func (fs *KBFSOpsStandard) ClearCachedFavorites(ctx context.Context) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.favs.ClearCache(ctx)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"ClearCachedFavorites",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
"defer",
"timeTrackerDone",
"(",
")",
... | // ClearCachedFavorites implements the KBFSOps interface for
// KBFSOpsStandard. | [
"ClearCachedFavorites",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L288-L293 |
160,658 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | AddFavorite | func (fs *KBFSOpsStandard) AddFavorite(ctx context.Context,
fav favorites.Folder, data favorites.Data) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
kbpki := fs.config.KBPKI()
_, err := kbpki.GetCurrentSession(ctx)
isLoggedIn := err == nil
if isLoggedIn {
err := fs.favs.Add(ctx, favorites.ToAdd{
Folder: fav,
Data: data,
Created: false,
})
if err != nil {
return err
}
}
return nil
} | go | func (fs *KBFSOpsStandard) AddFavorite(ctx context.Context,
fav favorites.Folder, data favorites.Data) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
kbpki := fs.config.KBPKI()
_, err := kbpki.GetCurrentSession(ctx)
isLoggedIn := err == nil
if isLoggedIn {
err := fs.favs.Add(ctx, favorites.ToAdd{
Folder: fav,
Data: data,
Created: false,
})
if err != nil {
return err
}
}
return nil
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"AddFavorite",
"(",
"ctx",
"context",
".",
"Context",
",",
"fav",
"favorites",
".",
"Folder",
",",
"data",
"favorites",
".",
"Data",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDum... | // AddFavorite implements the KBFSOps interface for KBFSOpsStandard. | [
"AddFavorite",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L296-L317 |
160,659 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | SetFavoritesHomeTLFInfo | func (fs *KBFSOpsStandard) SetFavoritesHomeTLFInfo(ctx context.Context,
info homeTLFInfo) {
fs.favs.setHomeTLFInfo(ctx, info)
} | go | func (fs *KBFSOpsStandard) SetFavoritesHomeTLFInfo(ctx context.Context,
info homeTLFInfo) {
fs.favs.setHomeTLFInfo(ctx, info)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"SetFavoritesHomeTLFInfo",
"(",
"ctx",
"context",
".",
"Context",
",",
"info",
"homeTLFInfo",
")",
"{",
"fs",
".",
"favs",
".",
"setHomeTLFInfo",
"(",
"ctx",
",",
"info",
")",
"\n",
"}"
] | // SetFavoritesHomeTLFInfo implements the KBFSOps interface for KBFSOpsStandard. | [
"SetFavoritesHomeTLFInfo",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L320-L323 |
160,660 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | RefreshEditHistory | func (fs *KBFSOpsStandard) RefreshEditHistory(fav favorites.Folder) {
fbo := fs.getOpsByFav(fav)
if fbo != nil {
fbo.refreshEditHistory()
}
} | go | func (fs *KBFSOpsStandard) RefreshEditHistory(fav favorites.Folder) {
fbo := fs.getOpsByFav(fav)
if fbo != nil {
fbo.refreshEditHistory()
}
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"RefreshEditHistory",
"(",
"fav",
"favorites",
".",
"Folder",
")",
"{",
"fbo",
":=",
"fs",
".",
"getOpsByFav",
"(",
"fav",
")",
"\n",
"if",
"fbo",
"!=",
"nil",
"{",
"fbo",
".",
"refreshEditHistory",
"(",
... | // RefreshEditHistory implements the KBFSOps interface for KBFSOpsStandard | [
"RefreshEditHistory",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L332-L337 |
160,661 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | DeleteFavorite | func (fs *KBFSOpsStandard) DeleteFavorite(ctx context.Context,
fav favorites.Folder) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
kbpki := fs.config.KBPKI()
_, err := kbpki.GetCurrentSession(ctx)
isLoggedIn := err == nil
// Let this ops remove itself, if we have one available.
ops := fs.getOpsByFav(fav)
if ops != nil {
err := ops.doFavoritesOp(ctx, fs.favs, FavoritesOpRemove, nil)
if _, ok := err.(OpsCantHandleFavorite); !ok {
return err
}
// If the ops couldn't handle the delete, fall through to
// going directly via Favorites.
}
if isLoggedIn {
err := fs.favs.Delete(ctx, fav)
if err != nil {
return err
}
}
// TODO: Shut down the running folderBranchOps, if one exists?
// What about open file handles?
return nil
} | go | func (fs *KBFSOpsStandard) DeleteFavorite(ctx context.Context,
fav favorites.Folder) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
kbpki := fs.config.KBPKI()
_, err := kbpki.GetCurrentSession(ctx)
isLoggedIn := err == nil
// Let this ops remove itself, if we have one available.
ops := fs.getOpsByFav(fav)
if ops != nil {
err := ops.doFavoritesOp(ctx, fs.favs, FavoritesOpRemove, nil)
if _, ok := err.(OpsCantHandleFavorite); !ok {
return err
}
// If the ops couldn't handle the delete, fall through to
// going directly via Favorites.
}
if isLoggedIn {
err := fs.favs.Delete(ctx, fav)
if err != nil {
return err
}
}
// TODO: Shut down the running folderBranchOps, if one exists?
// What about open file handles?
return nil
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"DeleteFavorite",
"(",
"ctx",
"context",
".",
"Context",
",",
"fav",
"favorites",
".",
"Folder",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",... | // DeleteFavorite implements the KBFSOps interface for
// KBFSOpsStandard. | [
"DeleteFavorite",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L341-L372 |
160,662 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | createAndStoreTlfIDIfNeeded | func (fs *KBFSOpsStandard) createAndStoreTlfIDIfNeeded(
ctx context.Context, h *tlfhandle.Handle) error {
if h.TlfID() != tlf.NullID {
return nil
}
return fs.resetTlfID(ctx, h)
} | go | func (fs *KBFSOpsStandard) createAndStoreTlfIDIfNeeded(
ctx context.Context, h *tlfhandle.Handle) error {
if h.TlfID() != tlf.NullID {
return nil
}
return fs.resetTlfID(ctx, h)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"createAndStoreTlfIDIfNeeded",
"(",
"ctx",
"context",
".",
"Context",
",",
"h",
"*",
"tlfhandle",
".",
"Handle",
")",
"error",
"{",
"if",
"h",
".",
"TlfID",
"(",
")",
"!=",
"tlf",
".",
"NullID",
"{",
"ret... | // createAndStoreTlfIDIfNeeded creates a TLF ID for a team-backed
// handle that doesn't have one yet, and associates it in the service
// with the team. If it returns a `nil` error, it may have modified
// `h` to include the new TLF ID. | [
"createAndStoreTlfIDIfNeeded",
"creates",
"a",
"TLF",
"ID",
"for",
"a",
"team",
"-",
"backed",
"handle",
"that",
"doesn",
"t",
"have",
"one",
"yet",
"and",
"associates",
"it",
"in",
"the",
"service",
"with",
"the",
"team",
".",
"If",
"it",
"returns",
"a",
... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L512-L519 |
160,663 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetTLFCryptKeys | func (fs *KBFSOpsStandard) GetTLFCryptKeys(
ctx context.Context, tlfHandle *tlfhandle.Handle) (
keys []kbfscrypto.TLFCryptKey, id tlf.ID, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.log.CDebugf(ctx, "GetTLFCryptKeys(%s)", tlfHandle.GetCanonicalPath())
defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }()
rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange)
if err != nil {
return nil, tlf.ID{}, err
}
keys, err = fs.config.KeyManager().GetTLFCryptKeyOfAllGenerations(ctx, rmd)
return keys, rmd.TlfID(), err
} | go | func (fs *KBFSOpsStandard) GetTLFCryptKeys(
ctx context.Context, tlfHandle *tlfhandle.Handle) (
keys []kbfscrypto.TLFCryptKey, id tlf.ID, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.log.CDebugf(ctx, "GetTLFCryptKeys(%s)", tlfHandle.GetCanonicalPath())
defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }()
rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange)
if err != nil {
return nil, tlf.ID{}, err
}
keys, err = fs.config.KeyManager().GetTLFCryptKeyOfAllGenerations(ctx, rmd)
return keys, rmd.TlfID(), err
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetTLFCryptKeys",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfHandle",
"*",
"tlfhandle",
".",
"Handle",
")",
"(",
"keys",
"[",
"]",
"kbfscrypto",
".",
"TLFCryptKey",
",",
"id",
"tlf",
".",
"ID",
",",
... | // GetTLFCryptKeys implements the KBFSOps interface for
// KBFSOpsStandard | [
"GetTLFCryptKeys",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L680-L695 |
160,664 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetTLFID | func (fs *KBFSOpsStandard) GetTLFID(ctx context.Context,
tlfHandle *tlfhandle.Handle) (id tlf.ID, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.log.CDebugf(ctx, "GetTLFID(%s)", tlfHandle.GetCanonicalPath())
defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }()
rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange)
if err != nil {
return tlf.ID{}, err
}
return rmd.TlfID(), err
} | go | func (fs *KBFSOpsStandard) GetTLFID(ctx context.Context,
tlfHandle *tlfhandle.Handle) (id tlf.ID, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.log.CDebugf(ctx, "GetTLFID(%s)", tlfHandle.GetCanonicalPath())
defer func() { fs.deferLog.CDebugf(ctx, "Done: %+v", err) }()
rmd, err := fs.getMDByHandle(ctx, tlfHandle, FavoritesOpNoChange)
if err != nil {
return tlf.ID{}, err
}
return rmd.TlfID(), err
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetTLFID",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfHandle",
"*",
"tlfhandle",
".",
"Handle",
")",
"(",
"id",
"tlf",
".",
"ID",
",",
"err",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
... | // GetTLFID implements the KBFSOps interface for KBFSOpsStandard. | [
"GetTLFID",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L698-L711 |
160,665 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetTLFHandle | func (fs *KBFSOpsStandard) GetTLFHandle(ctx context.Context, node Node) (
*tlfhandle.Handle, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, node)
return ops.GetTLFHandle(ctx, node)
} | go | func (fs *KBFSOpsStandard) GetTLFHandle(ctx context.Context, node Node) (
*tlfhandle.Handle, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, node)
return ops.GetTLFHandle(ctx, node)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetTLFHandle",
"(",
"ctx",
"context",
".",
"Context",
",",
"node",
"Node",
")",
"(",
"*",
"tlfhandle",
".",
"Handle",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
"... | // GetTLFHandle implements the KBFSOps interface for KBFSOpsStandard. | [
"GetTLFHandle",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L714-L721 |
160,666 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetOrCreateRootNode | func (fs *KBFSOpsStandard) GetOrCreateRootNode(
ctx context.Context, h *tlfhandle.Handle, branch data.BranchName) (
node Node, ei data.EntryInfo, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
return fs.getMaybeCreateRootNode(ctx, h, branch, true)
} | go | func (fs *KBFSOpsStandard) GetOrCreateRootNode(
ctx context.Context, h *tlfhandle.Handle, branch data.BranchName) (
node Node, ei data.EntryInfo, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
return fs.getMaybeCreateRootNode(ctx, h, branch, true)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetOrCreateRootNode",
"(",
"ctx",
"context",
".",
"Context",
",",
"h",
"*",
"tlfhandle",
".",
"Handle",
",",
"branch",
"data",
".",
"BranchName",
")",
"(",
"node",
"Node",
",",
"ei",
"data",
".",
"EntryInf... | // GetOrCreateRootNode implements the KBFSOps interface for
// KBFSOpsStandard | [
"GetOrCreateRootNode",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L852-L859 |
160,667 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetDirChildren | func (fs *KBFSOpsStandard) GetDirChildren(ctx context.Context, dir Node) (
map[string]data.EntryInfo, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, dir)
return ops.GetDirChildren(ctx, dir)
} | go | func (fs *KBFSOpsStandard) GetDirChildren(ctx context.Context, dir Node) (
map[string]data.EntryInfo, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, dir)
return ops.GetDirChildren(ctx, dir)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetDirChildren",
"(",
"ctx",
"context",
".",
"Context",
",",
"dir",
"Node",
")",
"(",
"map",
"[",
"string",
"]",
"data",
".",
"EntryInfo",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"lon... | // GetDirChildren implements the KBFSOps interface for KBFSOpsStandard | [
"GetDirChildren",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L874-L881 |
160,668 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Stat | func (fs *KBFSOpsStandard) Stat(ctx context.Context, node Node) (
data.EntryInfo, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, node)
return ops.Stat(ctx, node)
} | go | func (fs *KBFSOpsStandard) Stat(ctx context.Context, node Node) (
data.EntryInfo, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, node)
return ops.Stat(ctx, node)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Stat",
"(",
"ctx",
"context",
".",
"Context",
",",
"node",
"Node",
")",
"(",
"data",
".",
"EntryInfo",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
... | // Stat implements the KBFSOps interface for KBFSOpsStandard | [
"Stat",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L894-L901 |
160,669 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | CreateFile | func (fs *KBFSOpsStandard) CreateFile(
ctx context.Context, dir Node, name string, isExec bool, excl Excl) (
Node, data.EntryInfo, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, dir)
return ops.CreateFile(ctx, dir, name, isExec, excl)
} | go | func (fs *KBFSOpsStandard) CreateFile(
ctx context.Context, dir Node, name string, isExec bool, excl Excl) (
Node, data.EntryInfo, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, dir)
return ops.CreateFile(ctx, dir, name, isExec, excl)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"CreateFile",
"(",
"ctx",
"context",
".",
"Context",
",",
"dir",
"Node",
",",
"name",
"string",
",",
"isExec",
"bool",
",",
"excl",
"Excl",
")",
"(",
"Node",
",",
"data",
".",
"EntryInfo",
",",
"error",
... | // CreateFile implements the KBFSOps interface for KBFSOpsStandard | [
"CreateFile",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L914-L922 |
160,670 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | RemoveDir | func (fs *KBFSOpsStandard) RemoveDir(
ctx context.Context, dir Node, name string) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, dir)
return ops.RemoveDir(ctx, dir, name)
} | go | func (fs *KBFSOpsStandard) RemoveDir(
ctx context.Context, dir Node, name string) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, dir)
return ops.RemoveDir(ctx, dir, name)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"RemoveDir",
"(",
"ctx",
"context",
".",
"Context",
",",
"dir",
"Node",
",",
"name",
"string",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",... | // RemoveDir implements the KBFSOps interface for KBFSOpsStandard | [
"RemoveDir",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L936-L943 |
160,671 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Rename | func (fs *KBFSOpsStandard) Rename(
ctx context.Context, oldParent Node, oldName string, newParent Node,
newName string) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
oldFB := oldParent.GetFolderBranch()
newFB := newParent.GetFolderBranch()
// only works for nodes within the same topdir
if oldFB != newFB {
return RenameAcrossDirsError{}
}
ops := fs.getOpsByNode(ctx, oldParent)
return ops.Rename(ctx, oldParent, oldName, newParent, newName)
} | go | func (fs *KBFSOpsStandard) Rename(
ctx context.Context, oldParent Node, oldName string, newParent Node,
newName string) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
oldFB := oldParent.GetFolderBranch()
newFB := newParent.GetFolderBranch()
// only works for nodes within the same topdir
if oldFB != newFB {
return RenameAcrossDirsError{}
}
ops := fs.getOpsByNode(ctx, oldParent)
return ops.Rename(ctx, oldParent, oldName, newParent, newName)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Rename",
"(",
"ctx",
"context",
".",
"Context",
",",
"oldParent",
"Node",
",",
"oldName",
"string",
",",
"newParent",
"Node",
",",
"newName",
"string",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
... | // Rename implements the KBFSOps interface for KBFSOpsStandard | [
"Rename",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L956-L972 |
160,672 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Read | func (fs *KBFSOpsStandard) Read(
ctx context.Context, file Node, dest []byte, off int64) (
numRead int64, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.Read(ctx, file, dest, off)
} | go | func (fs *KBFSOpsStandard) Read(
ctx context.Context, file Node, dest []byte, off int64) (
numRead int64, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.Read(ctx, file, dest, off)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Read",
"(",
"ctx",
"context",
".",
"Context",
",",
"file",
"Node",
",",
"dest",
"[",
"]",
"byte",
",",
"off",
"int64",
")",
"(",
"numRead",
"int64",
",",
"err",
"error",
")",
"{",
"timeTrackerDone",
":... | // Read implements the KBFSOps interface for KBFSOpsStandard | [
"Read",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L975-L983 |
160,673 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Write | func (fs *KBFSOpsStandard) Write(
ctx context.Context, file Node, data []byte, off int64) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.Write(ctx, file, data, off)
} | go | func (fs *KBFSOpsStandard) Write(
ctx context.Context, file Node, data []byte, off int64) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.Write(ctx, file, data, off)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Write",
"(",
"ctx",
"context",
".",
"Context",
",",
"file",
"Node",
",",
"data",
"[",
"]",
"byte",
",",
"off",
"int64",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".... | // Write implements the KBFSOps interface for KBFSOpsStandard | [
"Write",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L986-L993 |
160,674 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Truncate | func (fs *KBFSOpsStandard) Truncate(
ctx context.Context, file Node, size uint64) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.Truncate(ctx, file, size)
} | go | func (fs *KBFSOpsStandard) Truncate(
ctx context.Context, file Node, size uint64) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.Truncate(ctx, file, size)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Truncate",
"(",
"ctx",
"context",
".",
"Context",
",",
"file",
"Node",
",",
"size",
"uint64",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",... | // Truncate implements the KBFSOps interface for KBFSOpsStandard | [
"Truncate",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L996-L1003 |
160,675 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | SetEx | func (fs *KBFSOpsStandard) SetEx(
ctx context.Context, file Node, ex bool) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.SetEx(ctx, file, ex)
} | go | func (fs *KBFSOpsStandard) SetEx(
ctx context.Context, file Node, ex bool) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.SetEx(ctx, file, ex)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"SetEx",
"(",
"ctx",
"context",
".",
"Context",
",",
"file",
"Node",
",",
"ex",
"bool",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n"... | // SetEx implements the KBFSOps interface for KBFSOpsStandard | [
"SetEx",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1006-L1013 |
160,676 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | SetMtime | func (fs *KBFSOpsStandard) SetMtime(
ctx context.Context, file Node, mtime *time.Time) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.SetMtime(ctx, file, mtime)
} | go | func (fs *KBFSOpsStandard) SetMtime(
ctx context.Context, file Node, mtime *time.Time) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOpsByNode(ctx, file)
return ops.SetMtime(ctx, file, mtime)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"SetMtime",
"(",
"ctx",
"context",
".",
"Context",
",",
"file",
"Node",
",",
"mtime",
"*",
"time",
".",
"Time",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",... | // SetMtime implements the KBFSOps interface for KBFSOpsStandard | [
"SetMtime",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1016-L1023 |
160,677 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | FolderStatus | func (fs *KBFSOpsStandard) FolderStatus(
ctx context.Context, folderBranch data.FolderBranch) (
FolderBranchStatus, <-chan StatusUpdate, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange)
return ops.FolderStatus(ctx, folderBranch)
} | go | func (fs *KBFSOpsStandard) FolderStatus(
ctx context.Context, folderBranch data.FolderBranch) (
FolderBranchStatus, <-chan StatusUpdate, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange)
return ops.FolderStatus(ctx, folderBranch)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"FolderStatus",
"(",
"ctx",
"context",
".",
"Context",
",",
"folderBranch",
"data",
".",
"FolderBranch",
")",
"(",
"FolderBranchStatus",
",",
"<-",
"chan",
"StatusUpdate",
",",
"error",
")",
"{",
"timeTrackerDone... | // FolderStatus implements the KBFSOps interface for KBFSOpsStandard | [
"FolderStatus",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1036-L1044 |
160,678 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Status | func (fs *KBFSOpsStandard) Status(ctx context.Context) (
KBFSStatus, <-chan StatusUpdate, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
session, err := fs.config.KBPKI().GetCurrentSession(ctx)
var usageBytes, archiveBytes, limitBytes int64 = -1, -1, -1
var gitUsageBytes, gitArchiveBytes, gitLimitBytes int64 = -1, -1, -1
// Don't request the quota info until we're sure we've
// authenticated with our password. TODO: fix this in the
// service/GUI by handling multiple simultaneous passphrase
// requests at once.
if err == nil && fs.config.MDServer().IsConnected() {
var quErr error
_, usageBytes, archiveBytes, limitBytes,
gitUsageBytes, gitArchiveBytes, gitLimitBytes, quErr =
fs.quotaUsage.GetAllTypes(
ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance)
if quErr != nil {
// The error is ignored here so that other fields can still be populated
// even if this fails.
fs.log.CDebugf(ctx, "Getting quota usage error: %v", quErr)
}
}
failures, ch := fs.currentStatus.CurrentStatus()
var jManagerStatus *JournalManagerStatus
jManager, jErr := GetJournalManager(fs.config)
if jErr == nil {
status, tlfIDs := jManager.Status(ctx)
jManagerStatus = &status
err := FillInJournalStatusUnflushedPaths(
ctx, fs.config, jManagerStatus, tlfIDs)
if err != nil {
// The caller might depend on the channel (e.g., in
// libfs/remote_status.go), even in the case where err !=
// nil.
return KBFSStatus{}, ch, err
}
if usageBytes >= 0 {
usageBytes += status.UnflushedBytes
}
}
dbc := fs.config.DiskBlockCache()
var dbcStatus map[string]DiskBlockCacheStatus
if dbc != nil {
dbcStatus = dbc.Status(ctx)
}
dmc := fs.config.DiskMDCache()
var dmcStatus DiskMDCacheStatus
if dmc != nil {
dmcStatus = dmc.Status(ctx)
}
dqc := fs.config.DiskQuotaCache()
var dqcStatus DiskQuotaCacheStatus
if dqc != nil {
dqcStatus = dqc.Status(ctx)
}
return KBFSStatus{
CurrentUser: session.Name.String(),
IsConnected: fs.config.MDServer().IsConnected(),
UsageBytes: usageBytes,
ArchiveBytes: archiveBytes,
LimitBytes: limitBytes,
GitUsageBytes: gitUsageBytes,
GitArchiveBytes: gitArchiveBytes,
GitLimitBytes: gitLimitBytes,
FailingServices: failures,
JournalManager: jManagerStatus,
DiskBlockCacheStatus: dbcStatus,
DiskMDCacheStatus: dmcStatus,
DiskQuotaCacheStatus: dqcStatus,
}, ch, err
} | go | func (fs *KBFSOpsStandard) Status(ctx context.Context) (
KBFSStatus, <-chan StatusUpdate, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
session, err := fs.config.KBPKI().GetCurrentSession(ctx)
var usageBytes, archiveBytes, limitBytes int64 = -1, -1, -1
var gitUsageBytes, gitArchiveBytes, gitLimitBytes int64 = -1, -1, -1
// Don't request the quota info until we're sure we've
// authenticated with our password. TODO: fix this in the
// service/GUI by handling multiple simultaneous passphrase
// requests at once.
if err == nil && fs.config.MDServer().IsConnected() {
var quErr error
_, usageBytes, archiveBytes, limitBytes,
gitUsageBytes, gitArchiveBytes, gitLimitBytes, quErr =
fs.quotaUsage.GetAllTypes(
ctx, quotaUsageStaleTolerance/2, quotaUsageStaleTolerance)
if quErr != nil {
// The error is ignored here so that other fields can still be populated
// even if this fails.
fs.log.CDebugf(ctx, "Getting quota usage error: %v", quErr)
}
}
failures, ch := fs.currentStatus.CurrentStatus()
var jManagerStatus *JournalManagerStatus
jManager, jErr := GetJournalManager(fs.config)
if jErr == nil {
status, tlfIDs := jManager.Status(ctx)
jManagerStatus = &status
err := FillInJournalStatusUnflushedPaths(
ctx, fs.config, jManagerStatus, tlfIDs)
if err != nil {
// The caller might depend on the channel (e.g., in
// libfs/remote_status.go), even in the case where err !=
// nil.
return KBFSStatus{}, ch, err
}
if usageBytes >= 0 {
usageBytes += status.UnflushedBytes
}
}
dbc := fs.config.DiskBlockCache()
var dbcStatus map[string]DiskBlockCacheStatus
if dbc != nil {
dbcStatus = dbc.Status(ctx)
}
dmc := fs.config.DiskMDCache()
var dmcStatus DiskMDCacheStatus
if dmc != nil {
dmcStatus = dmc.Status(ctx)
}
dqc := fs.config.DiskQuotaCache()
var dqcStatus DiskQuotaCacheStatus
if dqc != nil {
dqcStatus = dqc.Status(ctx)
}
return KBFSStatus{
CurrentUser: session.Name.String(),
IsConnected: fs.config.MDServer().IsConnected(),
UsageBytes: usageBytes,
ArchiveBytes: archiveBytes,
LimitBytes: limitBytes,
GitUsageBytes: gitUsageBytes,
GitArchiveBytes: gitArchiveBytes,
GitLimitBytes: gitLimitBytes,
FailingServices: failures,
JournalManager: jManagerStatus,
DiskBlockCacheStatus: dbcStatus,
DiskMDCacheStatus: dmcStatus,
DiskQuotaCacheStatus: dqcStatus,
}, ch, err
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Status",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"KBFSStatus",
",",
"<-",
"chan",
"StatusUpdate",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
... | // Status implements the KBFSOps interface for KBFSOpsStandard | [
"Status",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1047-L1122 |
160,679 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | RequestRekey | func (fs *KBFSOpsStandard) RequestRekey(ctx context.Context, id tlf.ID) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
// We currently only support rekeys of master branches.
ops := fs.getOps(ctx,
data.FolderBranch{Tlf: id, Branch: data.MasterBranch}, FavoritesOpNoChange)
ops.RequestRekey(ctx, id)
} | go | func (fs *KBFSOpsStandard) RequestRekey(ctx context.Context, id tlf.ID) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
// We currently only support rekeys of master branches.
ops := fs.getOps(ctx,
data.FolderBranch{Tlf: id, Branch: data.MasterBranch}, FavoritesOpNoChange)
ops.RequestRekey(ctx, id)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"RequestRekey",
"(",
"ctx",
"context",
".",
"Context",
",",
"id",
"tlf",
".",
"ID",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
"defer",
"t... | // RequestRekey implements the KBFSOps interface for KBFSOpsStandard | [
"RequestRekey",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1136-L1144 |
160,680 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | SyncFromServer | func (fs *KBFSOpsStandard) SyncFromServer(ctx context.Context,
folderBranch data.FolderBranch, lockBeforeGet *keybase1.LockID) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd)
return ops.SyncFromServer(ctx, folderBranch, lockBeforeGet)
} | go | func (fs *KBFSOpsStandard) SyncFromServer(ctx context.Context,
folderBranch data.FolderBranch, lockBeforeGet *keybase1.LockID) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd)
return ops.SyncFromServer(ctx, folderBranch, lockBeforeGet)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"SyncFromServer",
"(",
"ctx",
"context",
".",
"Context",
",",
"folderBranch",
"data",
".",
"FolderBranch",
",",
"lockBeforeGet",
"*",
"keybase1",
".",
"LockID",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
... | // SyncFromServer implements the KBFSOps interface for KBFSOpsStandard | [
"SyncFromServer",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1147-L1154 |
160,681 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetUpdateHistory | func (fs *KBFSOpsStandard) GetUpdateHistory(ctx context.Context,
folderBranch data.FolderBranch) (history TLFUpdateHistory, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd)
return ops.GetUpdateHistory(ctx, folderBranch)
} | go | func (fs *KBFSOpsStandard) GetUpdateHistory(ctx context.Context,
folderBranch data.FolderBranch) (history TLFUpdateHistory, err error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd)
return ops.GetUpdateHistory(ctx, folderBranch)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetUpdateHistory",
"(",
"ctx",
"context",
".",
"Context",
",",
"folderBranch",
"data",
".",
"FolderBranch",
")",
"(",
"history",
"TLFUpdateHistory",
",",
"err",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
... | // GetUpdateHistory implements the KBFSOps interface for KBFSOpsStandard | [
"GetUpdateHistory",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1157-L1164 |
160,682 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetEditHistory | func (fs *KBFSOpsStandard) GetEditHistory(
ctx context.Context, folderBranch data.FolderBranch) (
tlfHistory keybase1.FSFolderEditHistory, err error) {
ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd)
return ops.GetEditHistory(ctx, folderBranch)
} | go | func (fs *KBFSOpsStandard) GetEditHistory(
ctx context.Context, folderBranch data.FolderBranch) (
tlfHistory keybase1.FSFolderEditHistory, err error) {
ops := fs.getOps(ctx, folderBranch, FavoritesOpAdd)
return ops.GetEditHistory(ctx, folderBranch)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetEditHistory",
"(",
"ctx",
"context",
".",
"Context",
",",
"folderBranch",
"data",
".",
"FolderBranch",
")",
"(",
"tlfHistory",
"keybase1",
".",
"FSFolderEditHistory",
",",
"err",
"error",
")",
"{",
"ops",
"... | // GetEditHistory implements the KBFSOps interface for KBFSOpsStandard | [
"GetEditHistory",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1167-L1172 |
160,683 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetRootNodeMetadata | func (fs *KBFSOpsStandard) GetRootNodeMetadata(
ctx context.Context, folderBranch data.FolderBranch) (
NodeMetadata, *tlfhandle.Handle, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange)
rootNode, _, _, err := ops.getRootNode(ctx)
if err != nil {
return NodeMetadata{}, nil, err
}
md, err := ops.GetNodeMetadata(ctx, rootNode)
if err != nil {
return NodeMetadata{}, nil, err
}
h, err := ops.GetTLFHandle(ctx, rootNode)
if err != nil {
return NodeMetadata{}, nil, err
}
return md, h, nil
} | go | func (fs *KBFSOpsStandard) GetRootNodeMetadata(
ctx context.Context, folderBranch data.FolderBranch) (
NodeMetadata, *tlfhandle.Handle, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx, folderBranch, FavoritesOpNoChange)
rootNode, _, _, err := ops.getRootNode(ctx)
if err != nil {
return NodeMetadata{}, nil, err
}
md, err := ops.GetNodeMetadata(ctx, rootNode)
if err != nil {
return NodeMetadata{}, nil, err
}
h, err := ops.GetTLFHandle(ctx, rootNode)
if err != nil {
return NodeMetadata{}, nil, err
}
return md, h, nil
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetRootNodeMetadata",
"(",
"ctx",
"context",
".",
"Context",
",",
"folderBranch",
"data",
".",
"FolderBranch",
")",
"(",
"NodeMetadata",
",",
"*",
"tlfhandle",
".",
"Handle",
",",
"error",
")",
"{",
"timeTrack... | // GetRootNodeMetadata implements the KBFSOps interface for KBFSOpsStandard | [
"GetRootNodeMetadata",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1185-L1206 |
160,684 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | TeamNameChanged | func (fs *KBFSOpsStandard) TeamNameChanged(
ctx context.Context, tid keybase1.TeamID) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.log.CDebugf(ctx, "Got TeamNameChanged for %s", tid)
fbo := fs.findTeamByID(ctx, tid)
if fbo != nil {
go fbo.TeamNameChanged(ctx, tid)
}
} | go | func (fs *KBFSOpsStandard) TeamNameChanged(
ctx context.Context, tid keybase1.TeamID) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
fs.log.CDebugf(ctx, "Got TeamNameChanged for %s", tid)
fbo := fs.findTeamByID(ctx, tid)
if fbo != nil {
go fbo.TeamNameChanged(ctx, tid)
}
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"TeamNameChanged",
"(",
"ctx",
"context",
".",
"Context",
",",
"tid",
"keybase1",
".",
"TeamID",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")",
"\n",
... | // TeamNameChanged implements the KBFSOps interface for KBFSOpsStandard | [
"TeamNameChanged",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1244-L1254 |
160,685 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | KickoffAllOutstandingRekeys | func (fs *KBFSOpsStandard) KickoffAllOutstandingRekeys() error {
for _, op := range fs.ops {
op.rekeyFSM.Event(newRekeyKickoffEvent())
}
return nil
} | go | func (fs *KBFSOpsStandard) KickoffAllOutstandingRekeys() error {
for _, op := range fs.ops {
op.rekeyFSM.Event(newRekeyKickoffEvent())
}
return nil
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"KickoffAllOutstandingRekeys",
"(",
")",
"error",
"{",
"for",
"_",
",",
"op",
":=",
"range",
"fs",
".",
"ops",
"{",
"op",
".",
"rekeyFSM",
".",
"Event",
"(",
"newRekeyKickoffEvent",
"(",
")",
")",
"\n",
"... | // KickoffAllOutstandingRekeys implements the KBFSOps interface for
// KBFSOpsStandard. | [
"KickoffAllOutstandingRekeys",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1283-L1288 |
160,686 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | NewNotificationChannel | func (fs *KBFSOpsStandard) NewNotificationChannel(
ctx context.Context, handle *tlfhandle.Handle, convID chat1.ConversationID,
channelName string) {
if !fs.config.Mode().TLFEditHistoryEnabled() {
return
}
fs.log.CDebugf(ctx, "New notification channel for %s",
handle.GetCanonicalPath())
// If the FBO already exists, notify it. If the FBO doesn't exist
// yet, we need to create it, so that it shows up in the edit
// history.
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
fav := handle.ToFavorite()
if ops, ok := fs.opsByFav[fav]; ok {
ops.NewNotificationChannel(ctx, handle, convID, channelName)
} else if handle.TlfID() != tlf.NullID {
fs.editActivity.Add(1)
go func() {
defer fs.editActivity.Done()
fs.log.CDebugf(ctx, "Initializing TLF %s for the edit history",
handle.GetCanonicalPath())
ctx := CtxWithRandomIDReplayable(
context.Background(), CtxFBOIDKey, CtxFBOOpID, fs.log)
// Fully initialize the TLF in order to kick off any
// necessary prefetches.
err := fs.initTLFWithoutIdentifyPopups(ctx, handle)
if err != nil {
fs.log.CDebugf(ctx, "Couldn't initialize TLF: %+v", err)
}
}()
} else {
fs.log.CWarningf(ctx,
"Handle %s for existing folder unexpectedly has no TLF ID",
handle.GetCanonicalName())
}
} | go | func (fs *KBFSOpsStandard) NewNotificationChannel(
ctx context.Context, handle *tlfhandle.Handle, convID chat1.ConversationID,
channelName string) {
if !fs.config.Mode().TLFEditHistoryEnabled() {
return
}
fs.log.CDebugf(ctx, "New notification channel for %s",
handle.GetCanonicalPath())
// If the FBO already exists, notify it. If the FBO doesn't exist
// yet, we need to create it, so that it shows up in the edit
// history.
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
fav := handle.ToFavorite()
if ops, ok := fs.opsByFav[fav]; ok {
ops.NewNotificationChannel(ctx, handle, convID, channelName)
} else if handle.TlfID() != tlf.NullID {
fs.editActivity.Add(1)
go func() {
defer fs.editActivity.Done()
fs.log.CDebugf(ctx, "Initializing TLF %s for the edit history",
handle.GetCanonicalPath())
ctx := CtxWithRandomIDReplayable(
context.Background(), CtxFBOIDKey, CtxFBOOpID, fs.log)
// Fully initialize the TLF in order to kick off any
// necessary prefetches.
err := fs.initTLFWithoutIdentifyPopups(ctx, handle)
if err != nil {
fs.log.CDebugf(ctx, "Couldn't initialize TLF: %+v", err)
}
}()
} else {
fs.log.CWarningf(ctx,
"Handle %s for existing folder unexpectedly has no TLF ID",
handle.GetCanonicalName())
}
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"NewNotificationChannel",
"(",
"ctx",
"context",
".",
"Context",
",",
"handle",
"*",
"tlfhandle",
".",
"Handle",
",",
"convID",
"chat1",
".",
"ConversationID",
",",
"channelName",
"string",
")",
"{",
"if",
"!",... | // NewNotificationChannel implements the KBFSOps interface for
// KBFSOpsStandard. | [
"NewNotificationChannel",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1313-L1351 |
160,687 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | Reset | func (fs *KBFSOpsStandard) Reset(
ctx context.Context, handle *tlfhandle.Handle) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
// First, make sure the folder has been reset according to the
// mdserver.
bareHandle, err := handle.ToBareHandle()
if err != nil {
return err
}
id, _, err := fs.config.MDServer().GetForHandle(
ctx, bareHandle, kbfsmd.Merged, nil)
if err == nil {
fs.log.CDebugf(ctx, "Folder %s can't be reset; still has ID %s",
handle.GetCanonicalPath(), id)
return errors.WithStack(FolderNotResetOnServer{handle})
} else if _, ok := errors.Cause(err).(kbfsmd.ServerErrorClassicTLFDoesNotExist); !ok {
// Return errors if they don't indicate the folder is new.
return err
}
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
fs.log.CDebugf(ctx, "Reset %s", handle.GetCanonicalPath())
fb := data.FolderBranch{Tlf: handle.TlfID(), Branch: data.MasterBranch}
ops, ok := fs.ops[fb]
if ok {
err := ops.Reset(ctx, handle)
if err != nil {
return err
}
delete(fs.ops, fb)
fav := handle.ToFavorite()
delete(fs.opsByFav, fav)
err = ops.Shutdown(ctx)
if err != nil {
return err
}
}
// Reset the TLF by overwriting the TLF ID in the sigchain. This
// assumes that the server is in implicit team mode for new TLFs,
// which at this point it should always be.
return fs.resetTlfID(ctx, handle)
} | go | func (fs *KBFSOpsStandard) Reset(
ctx context.Context, handle *tlfhandle.Handle) error {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
// First, make sure the folder has been reset according to the
// mdserver.
bareHandle, err := handle.ToBareHandle()
if err != nil {
return err
}
id, _, err := fs.config.MDServer().GetForHandle(
ctx, bareHandle, kbfsmd.Merged, nil)
if err == nil {
fs.log.CDebugf(ctx, "Folder %s can't be reset; still has ID %s",
handle.GetCanonicalPath(), id)
return errors.WithStack(FolderNotResetOnServer{handle})
} else if _, ok := errors.Cause(err).(kbfsmd.ServerErrorClassicTLFDoesNotExist); !ok {
// Return errors if they don't indicate the folder is new.
return err
}
fs.opsLock.Lock()
defer fs.opsLock.Unlock()
fs.log.CDebugf(ctx, "Reset %s", handle.GetCanonicalPath())
fb := data.FolderBranch{Tlf: handle.TlfID(), Branch: data.MasterBranch}
ops, ok := fs.ops[fb]
if ok {
err := ops.Reset(ctx, handle)
if err != nil {
return err
}
delete(fs.ops, fb)
fav := handle.ToFavorite()
delete(fs.opsByFav, fav)
err = ops.Shutdown(ctx)
if err != nil {
return err
}
}
// Reset the TLF by overwriting the TLF ID in the sigchain. This
// assumes that the server is in implicit team mode for new TLFs,
// which at this point it should always be.
return fs.resetTlfID(ctx, handle)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"Reset",
"(",
"ctx",
"context",
".",
"Context",
",",
"handle",
"*",
"tlfhandle",
".",
"Handle",
")",
"error",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperationDebugDumper",
".",
"Begin",
"(",
"ctx",
")"... | // Reset implements the KBFSOps interface for KBFSOpsStandard. | [
"Reset",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1354-L1399 |
160,688 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | ClearConflictView | func (fs *KBFSOpsStandard) ClearConflictView(ctx context.Context,
tlfID tlf.ID) error {
fbo := fs.getOpsNoAdd(ctx, data.FolderBranch{
Tlf: tlfID,
Branch: data.MasterBranch,
})
return fbo.clearConflictView(ctx)
} | go | func (fs *KBFSOpsStandard) ClearConflictView(ctx context.Context,
tlfID tlf.ID) error {
fbo := fs.getOpsNoAdd(ctx, data.FolderBranch{
Tlf: tlfID,
Branch: data.MasterBranch,
})
return fbo.clearConflictView(ctx)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"ClearConflictView",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"error",
"{",
"fbo",
":=",
"fs",
".",
"getOpsNoAdd",
"(",
"ctx",
",",
"data",
".",
"FolderBranch",
"{",
"Tl... | // ClearConflictView resets a TLF's jounral and conflict DB to a non
// -conflicting state. | [
"ClearConflictView",
"resets",
"a",
"TLF",
"s",
"jounral",
"and",
"conflict",
"DB",
"to",
"a",
"non",
"-",
"conflicting",
"state",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1403-L1410 |
160,689 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | GetSyncConfig | func (fs *KBFSOpsStandard) GetSyncConfig(
ctx context.Context, tlfID tlf.ID) (keybase1.FolderSyncConfig, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx,
data.FolderBranch{Tlf: tlfID, Branch: data.MasterBranch}, FavoritesOpNoChange)
return ops.GetSyncConfig(ctx, tlfID)
} | go | func (fs *KBFSOpsStandard) GetSyncConfig(
ctx context.Context, tlfID tlf.ID) (keybase1.FolderSyncConfig, error) {
timeTrackerDone := fs.longOperationDebugDumper.Begin(ctx)
defer timeTrackerDone()
ops := fs.getOps(ctx,
data.FolderBranch{Tlf: tlfID, Branch: data.MasterBranch}, FavoritesOpNoChange)
return ops.GetSyncConfig(ctx, tlfID)
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"GetSyncConfig",
"(",
"ctx",
"context",
".",
"Context",
",",
"tlfID",
"tlf",
".",
"ID",
")",
"(",
"keybase1",
".",
"FolderSyncConfig",
",",
"error",
")",
"{",
"timeTrackerDone",
":=",
"fs",
".",
"longOperatio... | // GetSyncConfig implements the KBFSOps interface for KBFSOpsStandard. | [
"GetSyncConfig",
"implements",
"the",
"KBFSOps",
"interface",
"for",
"KBFSOpsStandard",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1413-L1421 |
160,690 | keybase/client | go/kbfs/libkbfs/kbfs_ops.go | RegisterForChanges | func (fs *KBFSOpsStandard) RegisterForChanges(
folderBranches []data.FolderBranch, obs Observer) error {
for _, fb := range folderBranches {
// TODO: add branch parameter to notifier interface
ops := fs.getOps(context.Background(), fb, FavoritesOpNoChange)
return ops.RegisterForChanges(obs)
}
return nil
} | go | func (fs *KBFSOpsStandard) RegisterForChanges(
folderBranches []data.FolderBranch, obs Observer) error {
for _, fb := range folderBranches {
// TODO: add branch parameter to notifier interface
ops := fs.getOps(context.Background(), fb, FavoritesOpNoChange)
return ops.RegisterForChanges(obs)
}
return nil
} | [
"func",
"(",
"fs",
"*",
"KBFSOpsStandard",
")",
"RegisterForChanges",
"(",
"folderBranches",
"[",
"]",
"data",
".",
"FolderBranch",
",",
"obs",
"Observer",
")",
"error",
"{",
"for",
"_",
",",
"fb",
":=",
"range",
"folderBranches",
"{",
"// TODO: add branch par... | // RegisterForChanges implements the Notifer interface for KBFSOpsStandard | [
"RegisterForChanges",
"implements",
"the",
"Notifer",
"interface",
"for",
"KBFSOpsStandard"
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libkbfs/kbfs_ops.go#L1453-L1461 |
160,691 | keybase/client | go/chat/attachments/utils.go | NewFileReadCloseResetter | func NewFileReadCloseResetter(name string) (ReadCloseResetter, error) {
f := &FileReadCloseResetter{filename: name}
if err := f.open(); err != nil {
return nil, err
}
return f, nil
} | go | func NewFileReadCloseResetter(name string) (ReadCloseResetter, error) {
f := &FileReadCloseResetter{filename: name}
if err := f.open(); err != nil {
return nil, err
}
return f, nil
} | [
"func",
"NewFileReadCloseResetter",
"(",
"name",
"string",
")",
"(",
"ReadCloseResetter",
",",
"error",
")",
"{",
"f",
":=",
"&",
"FileReadCloseResetter",
"{",
"filename",
":",
"name",
"}",
"\n",
"if",
"err",
":=",
"f",
".",
"open",
"(",
")",
";",
"err",... | // NewFileReadCloseResetter creates a ReadCloseResetter that uses an on-disk file as
// source of data. | [
"NewFileReadCloseResetter",
"creates",
"a",
"ReadCloseResetter",
"that",
"uses",
"an",
"on",
"-",
"disk",
"file",
"as",
"source",
"of",
"data",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L98-L104 |
160,692 | keybase/client | go/chat/attachments/utils.go | Read | func (f *KbfsReadCloseResetter) Read(p []byte) (int, error) {
content, err := f.client.SimpleFSRead(f.ctx, keybase1.SimpleFSReadArg{
OpID: f.opid,
Offset: atomic.LoadInt64(&f.offset),
Size: len(p),
})
if err != nil {
return 0, err
}
if len(content.Data) == 0 {
// Unfortunately SimpleFSRead doesn't return EOF error.
return 0, io.EOF
}
atomic.AddInt64(&f.offset, int64(len(content.Data)))
copy(p, content.Data)
return len(content.Data), nil
} | go | func (f *KbfsReadCloseResetter) Read(p []byte) (int, error) {
content, err := f.client.SimpleFSRead(f.ctx, keybase1.SimpleFSReadArg{
OpID: f.opid,
Offset: atomic.LoadInt64(&f.offset),
Size: len(p),
})
if err != nil {
return 0, err
}
if len(content.Data) == 0 {
// Unfortunately SimpleFSRead doesn't return EOF error.
return 0, io.EOF
}
atomic.AddInt64(&f.offset, int64(len(content.Data)))
copy(p, content.Data)
return len(content.Data), nil
} | [
"func",
"(",
"f",
"*",
"KbfsReadCloseResetter",
")",
"Read",
"(",
"p",
"[",
"]",
"byte",
")",
"(",
"int",
",",
"error",
")",
"{",
"content",
",",
"err",
":=",
"f",
".",
"client",
".",
"SimpleFSRead",
"(",
"f",
".",
"ctx",
",",
"keybase1",
".",
"S... | // Read implements the ReadCloseResetter interface. | [
"Read",
"implements",
"the",
"ReadCloseResetter",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L204-L220 |
160,693 | keybase/client | go/chat/attachments/utils.go | Close | func (f *KbfsReadCloseResetter) Close() error {
return f.client.SimpleFSClose(f.ctx, f.opid)
} | go | func (f *KbfsReadCloseResetter) Close() error {
return f.client.SimpleFSClose(f.ctx, f.opid)
} | [
"func",
"(",
"f",
"*",
"KbfsReadCloseResetter",
")",
"Close",
"(",
")",
"error",
"{",
"return",
"f",
".",
"client",
".",
"SimpleFSClose",
"(",
"f",
".",
"ctx",
",",
"f",
".",
"opid",
")",
"\n",
"}"
] | // Close implements the ReadCloseResetter interface. | [
"Close",
"implements",
"the",
"ReadCloseResetter",
"interface",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L229-L231 |
160,694 | keybase/client | go/chat/attachments/utils.go | NewReadCloseResetter | func NewReadCloseResetter(ctx context.Context, g *libkb.GlobalContext,
p string) (ReadCloseResetter, error) {
if isKbfsPath(p) {
return NewKbfsReadCloseResetter(ctx, g, p)
}
return NewFileReadCloseResetter(p)
} | go | func NewReadCloseResetter(ctx context.Context, g *libkb.GlobalContext,
p string) (ReadCloseResetter, error) {
if isKbfsPath(p) {
return NewKbfsReadCloseResetter(ctx, g, p)
}
return NewFileReadCloseResetter(p)
} | [
"func",
"NewReadCloseResetter",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"p",
"string",
")",
"(",
"ReadCloseResetter",
",",
"error",
")",
"{",
"if",
"isKbfsPath",
"(",
"p",
")",
"{",
"return",
"NewKbfsReadCl... | // NewReadCloseResetter creates a ReadCloseResetter using either on-disk file
// or SimpleFS depending on if p is a KBFS path. | [
"NewReadCloseResetter",
"creates",
"a",
"ReadCloseResetter",
"using",
"either",
"on",
"-",
"disk",
"file",
"or",
"SimpleFS",
"depending",
"on",
"if",
"p",
"is",
"a",
"KBFS",
"path",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L235-L241 |
160,695 | keybase/client | go/chat/attachments/utils.go | StatOSOrKbfsFile | func StatOSOrKbfsFile(ctx context.Context, g *libkb.GlobalContext, p string) (
fi os.FileInfo, err error) {
if !isKbfsPath(p) {
return os.Stat(p)
}
client, err := makeSimpleFSClientFromGlobalContext(g)
if err != nil {
return nil, err
}
dirent, err := client.SimpleFSStat(ctx, keybase1.SimpleFSStatArg{
Path: keybase1.NewPathWithKbfs(p[len(kbfsPrefix):]),
})
if err != nil {
return nil, err
}
return kbfsFileInfo{dirent: &dirent}, nil
} | go | func StatOSOrKbfsFile(ctx context.Context, g *libkb.GlobalContext, p string) (
fi os.FileInfo, err error) {
if !isKbfsPath(p) {
return os.Stat(p)
}
client, err := makeSimpleFSClientFromGlobalContext(g)
if err != nil {
return nil, err
}
dirent, err := client.SimpleFSStat(ctx, keybase1.SimpleFSStatArg{
Path: keybase1.NewPathWithKbfs(p[len(kbfsPrefix):]),
})
if err != nil {
return nil, err
}
return kbfsFileInfo{dirent: &dirent}, nil
} | [
"func",
"StatOSOrKbfsFile",
"(",
"ctx",
"context",
".",
"Context",
",",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"p",
"string",
")",
"(",
"fi",
"os",
".",
"FileInfo",
",",
"err",
"error",
")",
"{",
"if",
"!",
"isKbfsPath",
"(",
"p",
")",
"{",
... | // StatOSOrKbfsFile stats the file located at p, using SimpleFSStat if it's a
// KBFS path, or os.Stat if not. | [
"StatOSOrKbfsFile",
"stats",
"the",
"file",
"located",
"at",
"p",
"using",
"SimpleFSStat",
"if",
"it",
"s",
"a",
"KBFS",
"path",
"or",
"os",
".",
"Stat",
"if",
"not",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/attachments/utils.go#L274-L293 |
160,696 | keybase/client | go/engine/puk_upkeep_background.go | NewPerUserKeyUpkeepBackground | func NewPerUserKeyUpkeepBackground(g *libkb.GlobalContext, args *PerUserKeyUpkeepBackgroundArgs) *PerUserKeyUpkeepBackground {
task := NewBackgroundTask(g, &BackgroundTaskArgs{
Name: "PerUserKeyUpkeepBackground",
F: PerUserKeyUpkeepBackgroundRound,
Settings: PerUserKeyUpkeepBackgroundSettings,
testingMetaCh: args.testingMetaCh,
testingRoundResCh: args.testingRoundResCh,
})
return &PerUserKeyUpkeepBackground{
Contextified: libkb.NewContextified(g),
args: args,
// Install the task early so that Shutdown can be called before RunEngine.
task: task,
}
} | go | func NewPerUserKeyUpkeepBackground(g *libkb.GlobalContext, args *PerUserKeyUpkeepBackgroundArgs) *PerUserKeyUpkeepBackground {
task := NewBackgroundTask(g, &BackgroundTaskArgs{
Name: "PerUserKeyUpkeepBackground",
F: PerUserKeyUpkeepBackgroundRound,
Settings: PerUserKeyUpkeepBackgroundSettings,
testingMetaCh: args.testingMetaCh,
testingRoundResCh: args.testingRoundResCh,
})
return &PerUserKeyUpkeepBackground{
Contextified: libkb.NewContextified(g),
args: args,
// Install the task early so that Shutdown can be called before RunEngine.
task: task,
}
} | [
"func",
"NewPerUserKeyUpkeepBackground",
"(",
"g",
"*",
"libkb",
".",
"GlobalContext",
",",
"args",
"*",
"PerUserKeyUpkeepBackgroundArgs",
")",
"*",
"PerUserKeyUpkeepBackground",
"{",
"task",
":=",
"NewBackgroundTask",
"(",
"g",
",",
"&",
"BackgroundTaskArgs",
"{",
... | // NewPerUserKeyUpkeepBackground creates a PerUserKeyUpkeepBackground engine. | [
"NewPerUserKeyUpkeepBackground",
"creates",
"a",
"PerUserKeyUpkeepBackground",
"engine",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/engine/puk_upkeep_background.go#L41-L56 |
160,697 | keybase/client | go/kbfs/libfuse/debug_server_file.go | Write | func (f *DebugServerFile) Write(ctx context.Context, req *fuse.WriteRequest,
resp *fuse.WriteResponse) (err error) {
f.fs.log.CDebugf(ctx, "DebugServerFile (enable: %t) Write", f.enable)
defer func() { err = f.fs.processError(ctx, libkbfs.WriteMode, err) }()
if len(req.Data) == 0 {
return nil
}
if f.enable {
portStr := strings.TrimSpace(string(req.Data))
port, err := strconv.ParseUint(portStr, 10, 16)
if err != nil {
return err
}
err = f.fs.enableDebugServer(ctx, uint16(port))
if err != nil {
return err
}
} else {
err := f.fs.disableDebugServer(ctx)
if err != nil {
return err
}
}
resp.Size = len(req.Data)
return nil
} | go | func (f *DebugServerFile) Write(ctx context.Context, req *fuse.WriteRequest,
resp *fuse.WriteResponse) (err error) {
f.fs.log.CDebugf(ctx, "DebugServerFile (enable: %t) Write", f.enable)
defer func() { err = f.fs.processError(ctx, libkbfs.WriteMode, err) }()
if len(req.Data) == 0 {
return nil
}
if f.enable {
portStr := strings.TrimSpace(string(req.Data))
port, err := strconv.ParseUint(portStr, 10, 16)
if err != nil {
return err
}
err = f.fs.enableDebugServer(ctx, uint16(port))
if err != nil {
return err
}
} else {
err := f.fs.disableDebugServer(ctx)
if err != nil {
return err
}
}
resp.Size = len(req.Data)
return nil
} | [
"func",
"(",
"f",
"*",
"DebugServerFile",
")",
"Write",
"(",
"ctx",
"context",
".",
"Context",
",",
"req",
"*",
"fuse",
".",
"WriteRequest",
",",
"resp",
"*",
"fuse",
".",
"WriteResponse",
")",
"(",
"err",
"error",
")",
"{",
"f",
".",
"fs",
".",
"l... | // Write implements the fs.HandleWriter interface for DebugServerFile. | [
"Write",
"implements",
"the",
"fs",
".",
"HandleWriter",
"interface",
"for",
"DebugServerFile",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/kbfs/libfuse/debug_server_file.go#L46-L74 |
160,698 | keybase/client | go/chat/ephemeral_purger.go | Push | func (pq *priorityQueue) Push(x interface{}) {
pq.Lock()
defer pq.Unlock()
item := x.(*queueItem)
item.index = len(pq.queue)
pq.queue = append(pq.queue, item)
pq.itemMap[item.purgeInfo.ConvID.String()] = item
} | go | func (pq *priorityQueue) Push(x interface{}) {
pq.Lock()
defer pq.Unlock()
item := x.(*queueItem)
item.index = len(pq.queue)
pq.queue = append(pq.queue, item)
pq.itemMap[item.purgeInfo.ConvID.String()] = item
} | [
"func",
"(",
"pq",
"*",
"priorityQueue",
")",
"Push",
"(",
"x",
"interface",
"{",
"}",
")",
"{",
"pq",
".",
"Lock",
"(",
")",
"\n",
"defer",
"pq",
".",
"Unlock",
"(",
")",
"\n\n",
"item",
":=",
"x",
".",
"(",
"*",
"queueItem",
")",
"\n",
"item"... | // Note this method should not be used directly since we only want each
// conversation to appear once in the heap. Use
// `BackgroundEphemeralPurger.update` instead since it handles this as
// intended. | [
"Note",
"this",
"method",
"should",
"not",
"be",
"used",
"directly",
"since",
"we",
"only",
"want",
"each",
"conversation",
"to",
"appear",
"once",
"in",
"the",
"heap",
".",
"Use",
"BackgroundEphemeralPurger",
".",
"update",
"instead",
"since",
"it",
"handles"... | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/ephemeral_purger.go#L78-L86 |
160,699 | keybase/client | go/chat/ephemeral_purger.go | initQueue | func (b *BackgroundEphemeralPurger) initQueue(ctx context.Context) {
b.queueLock.Lock()
defer b.queueLock.Unlock()
// Create a new queue
b.pq = newPriorityQueue()
heap.Init(b.pq)
allPurgeInfo, err := b.storage.GetAllPurgeInfo(ctx, b.uid)
if err != nil {
b.Debug(ctx, "unable to get purgeInfo: %v", allPurgeInfo)
}
for _, purgeInfo := range allPurgeInfo {
if purgeInfo.IsActive {
b.updateQueue(purgeInfo)
}
}
} | go | func (b *BackgroundEphemeralPurger) initQueue(ctx context.Context) {
b.queueLock.Lock()
defer b.queueLock.Unlock()
// Create a new queue
b.pq = newPriorityQueue()
heap.Init(b.pq)
allPurgeInfo, err := b.storage.GetAllPurgeInfo(ctx, b.uid)
if err != nil {
b.Debug(ctx, "unable to get purgeInfo: %v", allPurgeInfo)
}
for _, purgeInfo := range allPurgeInfo {
if purgeInfo.IsActive {
b.updateQueue(purgeInfo)
}
}
} | [
"func",
"(",
"b",
"*",
"BackgroundEphemeralPurger",
")",
"initQueue",
"(",
"ctx",
"context",
".",
"Context",
")",
"{",
"b",
".",
"queueLock",
".",
"Lock",
"(",
")",
"\n",
"defer",
"b",
".",
"queueLock",
".",
"Unlock",
"(",
")",
"\n\n",
"// Create a new q... | // Read all purgeInfo from disk and startup our queue. | [
"Read",
"all",
"purgeInfo",
"from",
"disk",
"and",
"startup",
"our",
"queue",
"."
] | b352622cd8cc94798cfacbcb56ada203c18e519e | https://github.com/keybase/client/blob/b352622cd8cc94798cfacbcb56ada203c18e519e/go/chat/ephemeral_purger.go#L226-L243 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.