func assertUntracked(tc libkb.TestContext, username string) { me, err := libkb.LoadMe(libkb.NewLoadUserArg(tc.G)) if err != nil { tc.T.Fatal(err) } them, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(tc.G, username)) if err != nil { tc.T.Fatal(err) } s, err := me.TrackChainLinkFor(them.GetName(), them.GetUID()) if err != nil { tc.T.Fatal(err) } if s != nil { tc.T.Fatal("expected not to get a tracking statement; but got one") } s, err = libkb.LocalTrackChainLinkFor(me.GetUID(), them.GetUID(), tc.G) if err != nil { tc.T.Fatal(err) } if s != nil { tc.T.Fatal("expected not to get a local tracking statement; but got one") } }
func (s *SignupEngine) join(a libkb.LoginContext, username, email, inviteCode string, skipMail bool) error { joinEngine := NewSignupJoinEngine(s.G()) arg := SignupJoinEngineRunArg{ Username: username, Email: email, InviteCode: inviteCode, PWHash: s.ppStream.PWHash(), PWSalt: s.pwsalt, SkipMail: skipMail, } res := joinEngine.Run(a, arg) if res.Err != nil { return res } s.ppStream.SetGeneration(res.PpGen) a.CreateStreamCache(s.tsec, s.ppStream) s.uid = res.UID s.G().Log.Debug("contextified: %v\n", s.G()) user, err := libkb.LoadUser(libkb.LoadUserArg{Self: true, UID: res.UID, PublicKeyOptional: true, Contextified: libkb.NewContextified(s.G())}) if err != nil { return err } s.me = user return nil }
func (e *ListTrackingEngine) Run(ctx *Context) (err error) { var user *libkb.User if len(e.arg.ForAssertion) > 0 { user, err = libkb.LoadUser(libkb.NewLoadUserByNameArg(e.G(), e.arg.ForAssertion)) } else { user, err = libkb.LoadMe(libkb.NewLoadUserArg(e.G())) } if err != nil { return } var trackList TrackList trackList = user.IDTable().GetTrackList() trackList, err = filterRxx(trackList, e.arg.Filter) if err != nil { return } sort.Sort(trackList) if e.arg.JSON { err = e.runJSON(trackList, e.arg.Verbose) } else { err = e.runTable(trackList) } return }
func CreateAndSignupFakeUser(prefix string, g *libkb.GlobalContext) (*FakeUser, error) { fu, err := NewFakeUser(prefix) if err != nil { return nil, err } arg := engine.SignupEngineRunArg{ Username: fu.Username, Email: fu.Email, InviteCode: testInviteCode, Passphrase: fu.Passphrase, DeviceName: "my device", SkipGPG: true, SkipMail: true, } ctx := &engine.Context{ LogUI: g.UI.GetLogUI(), GPGUI: &gpgtestui{}, SecretUI: fu.NewSecretUI(), LoginUI: &libkb.TestLoginUI{Username: fu.Username}, } s := engine.NewSignupEngine(&arg, g) if err := engine.RunEngine(s, ctx); err != nil { return nil, err } fu.User, err = libkb.LoadUser(libkb.NewLoadUserByNameArg(g, fu.Username)) if err != nil { return nil, err } return fu, nil }
func (e *PGPPullEngine) runLoggedIn(ctx *Context, summaries []keybase1.UserSummary) error { // Loop over the list of all users we track. for _, userSummary := range summaries { // Compute the set of tracked pgp fingerprints. LoadUser will fetch key // data from the server, and we will compare it against this. trackedFingerprints := make(map[string]bool) for _, pubKey := range userSummary.Proofs.PublicKeys { if pubKey.PGPFingerprint != "" { trackedFingerprints[pubKey.PGPFingerprint] = true } } // Get user data from the server. user, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(e.G(), userSummary.Username)) if err != nil { ctx.LogUI.Errorf("Failed to load user %s: %s", userSummary.Username, err) continue } if err = e.exportKeysToGPG(ctx, user, trackedFingerprints); err != nil { return err } } return nil }
func (e *TrackToken) loadThem(username string) error { them, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(e.G(), username)) if err != nil { return err } e.them = them return nil }
func getNumKeys(tc libkb.TestContext, fu FakeUser) int { loaded, err := libkb.LoadUser(libkb.LoadUserArg{Name: fu.Username, ForceReload: true}) if err != nil { tc.T.Fatal(err) } ckf := loaded.GetComputedKeyFamily() return len(ckf.GetAllActiveSibkeys()) + len(ckf.GetAllActiveSubkeys()) }
func getFakeUsersBundlesList(tc libkb.TestContext, fu *FakeUser) []string { arg := libkb.NewLoadUserForceArg(tc.G) arg.Name = fu.Username user, err := libkb.LoadUser(arg) if err != nil { tc.T.Fatal("Failed loading user", err) } return user.GetKeyFamily().BundlesForTesting }
func (h *UserHandler) LoadUser(_ context.Context, arg keybase1.LoadUserArg) (user keybase1.User, err error) { u, err := libkb.LoadUser(libkb.LoadUserArg{UID: arg.Uid, Contextified: libkb.NewContextified(h.G())}) if err != nil { return } exportedUser := u.Export() user = *exportedUser return }
func TestSelectEngine(t *testing.T) { tc := SetupEngineTest(t, "select") defer tc.Cleanup() fu := NewFakeUserOrBust(t, "se") if err := tc.GenerateGPGKeyring(fu.Email); err != nil { t.Fatal(err) } arg := MakeTestSignupEngineRunArg(fu) arg.SkipGPG = false s := NewSignupEngine(&arg, tc.G) testui := &gpgtestui{} ctx := &Context{ LogUI: tc.G.UI.GetLogUI(), GPGUI: testui, SecretUI: fu.NewSecretUI(), LoginUI: &libkb.TestLoginUI{Username: fu.Username}, } if err := RunEngine(s, ctx); err != nil { t.Fatal(err) } fuUser, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(tc.G, fu.Username)) if err != nil { tc.T.Fatal(err) } publicKeys := fuUser.GetActivePGPKeys(false) if len(publicKeys) != 1 { tc.T.Fatal("There should be one generated PGP key") } key := publicKeys[0] fp := fmt.Sprintf("%s", key.GetFingerprint()) garg := GPGImportKeyArg{ Query: fp, AllowMulti: true, SkipImport: false, OnlyImport: false, } gpg := NewGPGImportKeyEngine(&garg, tc.G) err = RunEngine(gpg, ctx) // The GPGImportKeyEngine converts a multi select on the same key into // an update, so our test checks that the update code ran, by counting // on the test version of the update key prompt. if testui.keyChosenCount != 1 { tc.T.Fatal("Selected the same key twice and no update happened") } if len(gpg.duplicatedFingerprints) != 1 { tc.T.Fatal("Server didn't return an error while updating") } if !key.GetFingerprint().Eq(gpg.duplicatedFingerprints[0]) { tc.T.Fatal("Our fingerprint ID wasn't returned as up to date") } return }
// loadUser will load the user by name specified in e.username. func (e *LoginProvision) loadUser(ctx *Context) (*libkb.User, error) { if len(e.username) == 0 { return nil, libkb.NoUsernameError{} } e.G().Log.Debug("LoginProvision: loading user %s", e.username) arg := libkb.NewLoadUserByNameArg(e.G(), e.username) arg.PublicKeyOptional = true return libkb.LoadUser(arg) }
func (h *TrackHandler) FakeTrackingChanged(_ context.Context, arg keybase1.FakeTrackingChangedArg) error { user, err := libkb.LoadUser(libkb.LoadUserArg{ Name: arg.Username, }) if err != nil { return err } h.G().NotifyRouter.HandleTrackingChanged(user.GetUID(), user.GetName()) return nil }
func (e *Identify2WithUID) loadThem(ctx *Context) (err error) { arg := libkb.NewLoadUserArg(e.G()) arg.UID = e.arg.Uid arg.ResolveBody = e.ResolveBody e.them, err = libkb.LoadUser(arg) if e.them == nil { return libkb.UserNotFoundError{UID: arg.UID, Msg: "in Identify2WithUID"} } return err }
func (h *UserHandler) LoadPublicKeys(_ context.Context, arg keybase1.LoadPublicKeysArg) (keys []keybase1.PublicKey, err error) { u, err := libkb.LoadUser(libkb.LoadUserArg{UID: arg.Uid, Contextified: libkb.NewContextified(h.G())}) if err != nil { return } var publicKeys []keybase1.PublicKey if u.GetComputedKeyFamily() != nil { publicKeys = u.GetComputedKeyFamily().Export() } return publicKeys, nil }
func (h *UserHandler) LoadUser(_ context.Context, arg keybase1.LoadUserArg) (user keybase1.User, err error) { loadUserArg := libkb.NewLoadUserByUIDArg(h.G(), arg.Uid) loadUserArg.PublicKeyOptional = true u, err := libkb.LoadUser(loadUserArg) if err != nil { return } exportedUser := u.Export() user = *exportedUser return }
func getCurrentBTCAddr(tc libkb.TestContext, username string) string { u, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(tc.G, username)) if err != nil { tc.T.Fatal(err) } cryptoLink := u.IDTable().ActiveCryptocurrency() if cryptoLink == nil { return "" } return cryptoLink.ToDisplayString() }
// loadUser will prompt for username (if not provided) and load the user. func (e *LoginProvision) loadUser(ctx *Context) (*libkb.User, error) { if len(e.arg.Username) == 0 { username, err := ctx.LoginUI.GetEmailOrUsername(context.TODO(), 0) if err != nil { return nil, err } e.arg.Username = username } arg := libkb.NewLoadUserByNameArg(e.G(), e.arg.Username) arg.PublicKeyOptional = true return libkb.LoadUser(arg) }
func paperDevs(tc libkb.TestContext, fu *FakeUser) (*libkb.User, []*libkb.Device) { arg := libkb.NewLoadUserForceArg(tc.G) arg.Name = fu.Username u, err := libkb.LoadUser(arg) if err != nil { tc.T.Fatal(err) } cki := u.GetComputedKeyInfos() if cki == nil { tc.T.Fatal("no computed key infos") } return u, cki.PaperDevices() }
func (e *DeviceHistory) loadUser() error { arg := libkb.NewLoadUserPubOptionalArg(e.G()) if len(e.username) == 0 { arg.Self = true } else { arg.Name = e.username } u, err := libkb.LoadUser(arg) if err != nil { return err } e.user = u return nil }
func getFakeUsersKeyBundleFromServer(tc libkb.TestContext, fu *FakeUser) *libkb.PGPKeyBundle { arg := libkb.NewLoadUserForceArg(tc.G) arg.Name = fu.Username user, err := libkb.LoadUser(arg) if err != nil { tc.T.Fatal("Failed loading user", err) } ckf := user.GetComputedKeyFamily() keys := ckf.GetActivePGPKeys(true /* sibkeys */) if len(keys) != 1 { tc.T.Fatal("Expected only one key.") } return keys[0] }
func (p *pgpPair) isTracking(meContext libkb.TestContext, username string) bool { me, err := libkb.LoadMe(libkb.NewLoadUserArg(meContext.G)) if err != nil { p.t.Fatal(err) } them, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(meContext.G, username)) if err != nil { p.t.Fatal(err) } s, err := me.TrackChainLinkFor(them.GetName(), them.GetUID()) if err != nil { p.t.Fatal(err) } return s != nil }
func (e *ListTrackersEngine) ensureUID() error { if e.uid.Exists() { return nil } if len(e.username) == 0 { e.uid = e.G().GetMyUID() return nil } user, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(e.G(), e.username)) if err != nil { return err } e.uid = user.GetUID() return nil }
func (e *PGPPullEngine) Run(ctx *Context) error { summaries, err := e.getTrackedUserSummaries(ctx) if err != nil { return err } gpgClient := libkb.NewGpgCLI(libkb.GpgCLIArg{ LogUI: ctx.LogUI, }) err = gpgClient.Configure() if err != nil { return err } // Loop over the list of all users we track. for _, userSummary := range summaries { // Compute the set of tracked pgp fingerprints. LoadUser will fetch key // data from the server, and we will compare it against this. trackedFingerprints := make(map[string]bool) for _, pubKey := range userSummary.Proofs.PublicKeys { if pubKey.PGPFingerprint != "" { trackedFingerprints[pubKey.PGPFingerprint] = true } } // Get user data from the server. user, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(e.G(), userSummary.Username)) if err != nil { ctx.LogUI.Errorf("Failed to load user %s: %s", userSummary.Username, err) continue } for _, bundle := range user.GetActivePGPKeys(false) { // Check each key against the tracked set. if !trackedFingerprints[bundle.GetFingerprint().String()] { ctx.LogUI.Warning("Keybase says that %s owns key %s, but you have not tracked this fingerprint before.", user.GetName(), bundle.GetFingerprint()) continue } err = gpgClient.ExportKey(*bundle) if err != nil { return err } ctx.LogUI.Info("Imported key for %s.", user.GetName()) } } return nil }
func (e *Identify2WithUID) loadThem(ctx *Context) (err error) { arg := libkb.NewLoadUserArg(e.G()) arg.UID = e.arg.Uid arg.ResolveBody = e.ResolveBody e.them, err = libkb.LoadUser(arg) if err != nil { if _, ok := err.(libkb.NoKeyError); ok { // convert this error to NoSigChainError return libkb.NoSigChainError{} } } if e.them == nil { return libkb.UserNotFoundError{UID: arg.UID, Msg: "in Identify2WithUID"} } return err }
// don't identify or track, just load the users func (e *PGPKeyfinder) loadUsers(ctx *Context) { if e.runerr != nil { return } for _, u := range e.arg.Usernames { arg := libkb.NewLoadUserByNameArg(e.G(), u) user, err := libkb.LoadUser(arg) if err != nil { e.runerr = err return } e.addUser(user, false) } }
func assertNotTracking(tc libkb.TestContext, username string) { me, err := libkb.LoadMe(libkb.NewLoadUserArg(tc.G)) if err != nil { tc.T.Fatal(err) } them, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(tc.G, username)) if err != nil { tc.T.Fatal(err) } s, err := me.TrackChainLinkFor(them.GetName(), them.GetUID()) if err != nil { tc.T.Fatal(err) } if s != nil { tc.T.Errorf("a tracking statement exists for %s -> %s", me.GetName(), them.GetName()) } }
func assertTracking(tc libkb.TestContext, username string) { me, err := libkb.LoadMe(libkb.NewLoadUserArg(tc.G)) if err != nil { tc.T.Fatal(err) } them, err := libkb.LoadUser(libkb.NewLoadUserByNameArg(tc.G, username)) if err != nil { tc.T.Fatal(err) } s, err := me.TrackChainLinkFor(them.GetName(), them.GetUID()) if err != nil { tc.T.Fatal(err) } if s == nil { tc.T.Fatal("expected a tracking statement; but didn't see one") } }
func (e *TrackEngine) Run(ctx *Context) error { arg := &keybase1.Identify2Arg{ UserAssertion: e.arg.UserAssertion, ForceRemoteCheck: e.arg.ForceRemoteCheck, NeedProofSet: true, NoErrorOnTrackFailure: true, } ieng := NewResolveThenIdentify2WithTrack(e.G(), arg, e.arg.Options) if err := RunEngine(ieng, ctx); err != nil { return err } upk := ieng.Result().Upk var err error e.them, err = libkb.LoadUser(libkb.NewLoadUserByUIDArg(e.G(), upk.Uid)) if err != nil { return err } confirmResult := ieng.ConfirmResult() if !confirmResult.IdentityConfirmed { e.G().Log.Debug("confirmResult: %+v", confirmResult) return errors.New("Track not confirmed") } // if they didn't specify local only on the command line, then if they answer no to posting // the tracking statement publicly to keybase, change LocalOnly to true here: if !e.arg.Options.LocalOnly && !confirmResult.RemoteConfirmed { e.arg.Options.LocalOnly = true } if !e.arg.Options.ExpiringLocal && confirmResult.ExpiringLocal { e.G().Log.Debug("-ExpiringLocal-") e.arg.Options.ExpiringLocal = true } targ := &TrackTokenArg{ Token: ieng.TrackToken(), Me: e.arg.Me, Options: e.arg.Options, } teng := NewTrackToken(targ, e.G()) return RunEngine(teng, ctx) }
func (h IdentifyUIHandler) handleShowTrackerPopupDismiss(ctx context.Context, cli gregor1.IncomingInterface, item gregor.Item) error { h.G().Log.Debug("handleShowTrackerPopupDismiss: %+v", item) if item.Body() == nil { return errors.New("gregor dismissal for show_tracker_popup: nil message body") } body, err := jsonw.Unmarshal(item.Body().Bytes()) if err != nil { h.G().Log.Debug("body failed to unmarshal", err) return err } uidString, err := body.AtPath("uid").GetString() if err != nil { h.G().Log.Debug("failed to extract uid", err) return err } uid, err := keybase1.UIDFromString(uidString) if err != nil { h.G().Log.Debug("failed to convert UID from string", err) return err } user, err := libkb.LoadUser(libkb.NewLoadUserByUIDArg(h.G(), uid)) if err != nil { h.G().Log.Debug("failed to load user from UID", err) return err } identifyUI, err := h.G().UIRouter.GetIdentifyUI() if err != nil { h.G().Log.Debug("failed to get IdentifyUI", err) return err } if identifyUI == nil { h.G().Log.Debug("got nil IdentifyUI") return errors.New("got nil IdentifyUI") } reason := keybase1.DismissReason{ Type: keybase1.DismissReasonType_HANDLED_ELSEWHERE, } identifyUI.Dismiss(user.GetName(), reason) return nil }
func getActiveDevicesAndKeys(tc libkb.TestContext, u *FakeUser) ([]*libkb.Device, []libkb.GenericKey) { arg := libkb.NewLoadUserByNameArg(tc.G, u.Username) arg.PublicKeyOptional = true user, err := libkb.LoadUser(arg) if err != nil { tc.T.Fatal(err) } sibkeys := user.GetComputedKeyFamily().GetAllActiveSibkeys() subkeys := user.GetComputedKeyFamily().GetAllActiveSubkeys() activeDevices := []*libkb.Device{} for _, device := range user.GetComputedKeyFamily().GetAllDevices() { if device.Status != nil && *device.Status == libkb.DeviceStatusActive { activeDevices = append(activeDevices, device) } } return activeDevices, append(sibkeys, subkeys...) }