func (c *CmdLogin) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) if nargs > 1 { return errors.New("Invalid arguments.") } provisionByEmail := ctx.Bool("provision-by-email") if nargs == 1 { c.username = ctx.Args()[0] if provisionByEmail { // if --provision-by-email flag set, then they can // use an email address for provisioning. if !libkb.CheckEmail.F(c.username) { return errors.New("Invalid email format. Please login again via `keybase login --provision-by-email [email]`") } } else { // they must use a username if libkb.CheckEmail.F(c.username) { return errors.New("You must use a username. Please login again via `keybase login [username]`") } if !libkb.CheckUsername.F(c.username) { return errors.New("Invalid username format. Please login again via `keybase login [username]`") } } if ctx.Bool("emulate-gui") { c.clientType = keybase1.ClientType_GUI } } return nil }
func (c *CmdStatus) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("status") } c.json = ctx.Bool("json") return nil }
func (v *CmdUpdateRun) ParseArgv(ctx *cli.Context) error { currentVersion := ctx.String("current-version") if currentVersion != "" { v.options.Version = currentVersion } destinationPath := ctx.String("destination-path") if destinationPath != "" { v.options.DestinationPath = destinationPath } source := ctx.String("source") if source != "" { v.options.Source = source } v.options.URL = ctx.String("url") v.options.Force = ctx.Bool("force") if v.options.DestinationPath == "" { return fmt.Errorf("No default destination path for this environment") } return nil }
func (c *CmdVerify) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("verify") } msg := ctx.String("message") infile := ctx.String("infile") outfile := ctx.String("outfile") if ctx.Bool("no-output") { if len(outfile) > 0 { return errors.New("Cannot specify an outfile and no-output") } outfile = "/dev/null" } if err := c.FilterInit(msg, infile, outfile); err != nil { return err } c.signedBy = ctx.String("signed-by") detachedFilename := ctx.String("detached") if len(detachedFilename) > 0 { data, err := ioutil.ReadFile(detachedFilename) if err != nil { return err } c.detachedData = data } return nil }
func (v *cmdUpdateNotify) ParseArgv(ctx *cli.Context) error { v.force = ctx.Bool("force") v.event = ctx.Args().First() if v.event == "" { return fmt.Errorf("No event specified") } return nil }
func (v *CmdTrack) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) != 1 { return fmt.Errorf("Track only takes one argument, the user to track.") } v.user = ctx.Args()[0] v.options = keybase1.TrackOptions{LocalOnly: ctx.Bool("local"), BypassConfirm: ctx.Bool("y")} return nil }
func (c *CmdSearch) ParseArgv(ctx *cli.Context) error { c.query = strings.Join(ctx.Args(), " ") if c.query == "" { return fmt.Errorf("Search query must not be empty.") } c.json = ctx.Bool("json") return nil }
func (c *CmdDeviceRemove) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) != 1 { return fmt.Errorf("Device remove only takes one argument: the device ID or name.") } c.idOrName = ctx.Args()[0] c.force = ctx.Bool("force") return nil }
// ParseArgv parses the command args. func (c *CmdListTrackers) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) == 1 { c.assertion = ctx.Args()[0] } c.verbose = ctx.Bool("verbose") return nil }
func (c *CmdBTC) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) != 1 { return fmt.Errorf("Must provide exactly one address.") } c.address = ctx.Args()[0] c.force = ctx.Bool("force") return nil }
func (s *CmdPGPImport) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return fmt.Errorf("Invalid arguments") } s.arg.PushSecret = ctx.Bool("push-secret") s.infile = ctx.String("infile") return nil }
func (v *CmdVersion) ParseArgv(c *cli.Context) error { switch c.String("format") { case "s": v.mode = modeShort case "v": v.mode = modeVerbose } v.svc = !c.Bool("S") return nil }
func (v *CmdInstall) ParseArgv(ctx *cli.Context) error { v.force = ctx.Bool("force") v.format = ctx.String("format") v.binPath = ctx.String("bin-path") v.installer = ctx.String("installer") if ctx.String("components") == "" { v.components = []string{"cli", "service", "kbfs"} } else { v.components = strings.Split(ctx.String("components"), ",") } return nil }
func (v *CmdID) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) if nargs > 1 { return fmt.Errorf("Identify only takes one argument, the user to lookup.") } if nargs == 1 { v.user = ctx.Args()[0] } v.trackStatement = ctx.Bool("track-statement") return nil }
func (c *CmdDeviceRemove) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) != 1 { return fmt.Errorf("Device remove only takes one argument, the device ID.") } id, err := keybase1.DeviceIDFromString(ctx.Args()[0]) if err != nil { return err } c.id = id c.force = ctx.Bool("force") return nil }
func (v *CmdID) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) if nargs > 1 { return fmt.Errorf("Identify only takes one argument, the user to lookup.") } if nargs == 1 { v.user = ctx.Args()[0] } v.useDelegateUI = ctx.Bool("ui") v.skipProofCache = ctx.Bool("skip-proof-cache") return nil }
func (s *CmdPGPSign) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("pgp sign") } s.opts.BinaryOut = ctx.Bool("binary") s.opts.BinaryIn = !ctx.Bool("text") msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") clr := ctx.Bool("clearsign") dtch := ctx.Bool("detached") if clr && dtch { return fmt.Errorf("Can't specify both -c and -d") } if clr { s.opts.Mode = keybase1.SignMode_CLEAR } else if dtch { s.opts.Mode = keybase1.SignMode_DETACHED } else { s.opts.Mode = keybase1.SignMode_ATTACHED } s.opts.KeyQuery = ctx.String("key") return s.FilterInit(msg, infile, outfile) }
func (s *CmdListTracking) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) == 1 { s.assertion = ctx.Args()[0] } else if len(ctx.Args()) > 1 { return fmt.Errorf("list-following takes at most one argument") } s.json = ctx.Bool("json") s.verbose = ctx.Bool("verbose") s.headers = ctx.Bool("headers") s.filter = ctx.String("filter") return nil }
func (s *CmdSign) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("sign") } s.detached = ctx.Bool("detached") s.binary = ctx.Bool("binary") msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") return s.FilterInit(msg, infile, outfile) }
func (c *CmdPGPDecrypt) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("pgp decrypt") } msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") if err := c.FilterInit(msg, infile, outfile); err != nil { return err } c.signed = ctx.Bool("signed") c.signedBy = ctx.String("signed-by") return nil }
func (s *CmdPGPExport) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) var err error s.arg.Options.Secret = ctx.Bool("secret") s.arg.Options.Query = ctx.String("query") s.outfile = ctx.String("outfile") if nargs > 0 { err = fmt.Errorf("export doesn't take args") } return err }
func (s *CmdListTracking) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) var err error s.json = ctx.Bool("json") s.verbose = ctx.Bool("verbose") s.headers = ctx.Bool("headers") s.filter = ctx.String("filter") if nargs > 0 { err = fmt.Errorf("List tracking doesn't take any arguments.") } return err }
// ParseArgv parses arguments for the prove command. func (p *CmdProve) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) var err error p.arg.Force = ctx.Bool("force") p.output = ctx.String("output") if nargs > 2 || nargs == 0 { err = fmt.Errorf("prove takes 1 or 2 args: <service> [<username>]") } else { p.arg.Service = ctx.Args()[0] if nargs == 2 { p.arg.Username = ctx.Args()[1] } } return err }
func (c *CmdEncrypt) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) == 0 { return errors.New("Encrypt needs at least one recipient") } c.recipients = ctx.Args() msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") c.noSelfEncrypt = ctx.Bool("no-self") c.binary = ctx.Bool("binary") if err := c.filter.FilterInit(msg, infile, outfile); err != nil { return err } return nil }
func (v *CmdInstall) ParseArgv(ctx *cli.Context) error { v.force = ctx.Bool("force") v.format = ctx.String("format") v.binPath = ctx.String("bin-path") v.installer = ctx.String("installer") if ctx.String("components") == "" { v.components = []string{"updater", "service", "kbfs"} } else { v.components = strings.Split(ctx.String("components"), ",") } // Brew uses the auto installer by default if libkb.IsBrewBuild && v.installer == "" { v.installer = "auto" } return nil }
func (c *CmdDecrypt) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("decrypt") } interactive := ctx.Bool("interactive") c.spui = &SaltpackUI{ Contextified: libkb.NewContextified(c.G()), interactive: interactive, force: ctx.Bool("force"), } c.opts.Interactive = interactive msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") if err := c.filter.FilterInit(msg, infile, outfile); err != nil { return err } return nil }
func (c *CmdLogin) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) if nargs > 1 { return errors.New("Invalid arguments.") } if nargs == 1 { c.username = ctx.Args()[0] if libkb.CheckEmail.F(c.username) { return errors.New("Please login again via `keybase login [username]`") } if !libkb.CheckUsername.F(c.username) { return errors.New("Invalid username format. Please login again via `keybase login [username]`") } } if ctx.Bool("emulate-gui") { c.clientType = keybase1.ClientType_GUI } return nil }
// ParseArgv parses arguments for the prove command. func (p *CmdProve) ParseArgv(ctx *cli.Context) error { nargs := len(ctx.Args()) p.arg.Force = ctx.Bool("force") p.output = ctx.String("output") if nargs > 2 || nargs == 0 { return fmt.Errorf("prove takes 1 or 2 args: <service> [<username>]") } p.arg.Service = ctx.Args()[0] if nargs == 2 { p.arg.Username = ctx.Args()[1] } if libkb.RemoteServiceTypes[p.arg.Service] == keybase1.ProofType_ROOTER { p.arg.Auto = ctx.Bool("auto") if p.arg.Auto && len(p.arg.Username) == 0 { return fmt.Errorf("must specify the username when using auto flag") } } return nil }
func (c *CmdPGPEncrypt) ParseArgv(ctx *cli.Context) error { c.noSelf = ctx.Bool("no-self") if c.noSelf && len(ctx.Args()) == 0 { return errors.New("Encrypt needs at least one recipient, or --no-self=false") } msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") if err := c.FilterInit(msg, infile, outfile); err != nil { return err } c.recipients = ctx.Args() c.trackOptions = keybase1.TrackOptions{ LocalOnly: ctx.Bool("local"), BypassConfirm: ctx.Bool("y"), } c.sign = ctx.Bool("sign") c.keyQuery = ctx.String("key") c.binaryOut = ctx.Bool("binary") return nil }
func (c *CmdDecrypt) ParseArgv(ctx *cli.Context) error { if len(ctx.Args()) > 0 { return UnexpectedArgsError("decrypt") } interactive := ctx.Bool("interactive") c.spui = &SaltpackUI{ Contextified: libkb.NewContextified(c.G()), interactive: interactive, force: ctx.Bool("force"), } c.opts.Interactive = interactive c.opts.UsePaperKey = ctx.Bool("paperkey") msg := ctx.String("message") outfile := ctx.String("outfile") infile := ctx.String("infile") senderfile := ctx.String("encryptor-outfile") if err := c.filter.FilterInit(msg, infile, outfile); err != nil { return err } if senderfile != "" { c.senderfile = NewFileSink(senderfile) } return nil }