本文整理汇总了Golang中github.com/keybase/client/go/libkb.NewNormalizedUsername函数的典型用法代码示例。如果您正苦于以下问题:Golang NewNormalizedUsername函数的具体用法?Golang NewNormalizedUsername怎么用?Golang NewNormalizedUsername使用的例子?那么恭喜您, 这里精选的函数代码示例或许可以为您提供帮助。
在下文中一共展示了NewNormalizedUsername函数的15个代码示例,这些例子默认根据受欢迎程度排序。您可以为喜欢或者感觉有用的代码点赞,您的评价将有助于系统推荐出更棒的Golang代码示例。
示例1: getBigScaryWarning
func (c *CmdDeprovision) getBigScaryWarning(username string) (string, error) {
// If the user is logged out, warn that we won't revoke their keys.
loggedOutWarning := ""
if !c.loggedIn {
loggedOutWarning = `
Note that you aren't currently logged in. That means we won't publicly revoke
this device's keys. To do that from another device, use 'keybase device remove'.`
}
// If the user has PGP secret keys in the SKBKeyring, print an additional warning.
keyring, err := libkb.LoadSKBKeyring(libkb.NewNormalizedUsername(username), c.G())
if err != nil {
return "", err
}
pgpWarning := ""
if keyring.HasPGPKeys() {
pgpWarning = fmt.Sprintf(`
Also, the secret keyring you're about to delete contains PGP keys. To list them
or copy them, use %s.`, "`keybase pgp export`")
}
// TODO: Print a list of the other devices on the user's account.
return fmt.Sprintf(`
%s, BE CAREFUL! \('o')/
You are about to delete this device from your account, including its secret
keys. If you don't have any other devices, you'll lose access to your account
and all your data!%s%s
Proceed?`, username, loggedOutWarning, pgpWarning), nil
}
示例2: TestTokenVerifyToken
func TestTokenVerifyToken(t *testing.T) {
keyPair, err := libkb.GenerateNaclSigningKeyPair()
if err != nil {
t.Fatal(err)
}
name := libkb.NewNormalizedUsername("alice")
uid := libkb.UsernameToUID(name.String())
expireIn := 10
server := "test"
clientName := "test_client"
clientVersion := "41651"
token := NewToken(uid, name, keyPair.GetKID(), server, expireIn, clientName, clientVersion)
sig, _, err := keyPair.SignToString(token.Bytes())
if err != nil {
t.Fatal(err)
}
_, err = VerifyToken("nope", server, testMaxTokenExpireIn)
if err == nil {
t.Fatal(fmt.Errorf("expected verification failure"))
}
token, err = VerifyToken(sig, server, testMaxTokenExpireIn)
if err != nil {
t.Fatal(err)
}
if err = checkToken(token, uid, name, keyPair.GetKID(),
server, expireIn, clientName, clientVersion); err != nil {
t.Fatal(err)
}
}
示例3: Post
func (s *SignupJoinEngine) Post(arg SignupJoinEngineRunArg) (err error) {
var res *libkb.APIRes
var ppGenTmp int
res, err = s.G().API.Post(libkb.APIArg{
Endpoint: "signup",
Args: libkb.HTTPArgs{
"salt": libkb.S{Val: hex.EncodeToString(arg.PWSalt)},
"pwh": libkb.S{Val: hex.EncodeToString(arg.PWHash)},
"username": libkb.S{Val: arg.Username},
"email": libkb.S{Val: arg.Email},
"invitation_id": libkb.S{Val: arg.InviteCode},
"pwh_version": libkb.I{Val: int(triplesec.Version)},
"skip_mail": libkb.B{Val: arg.SkipMail},
}})
if err == nil {
s.username = libkb.NewNormalizedUsername(arg.Username)
libkb.GetUIDVoid(res.Body.AtKey("uid"), &s.uid, &err)
res.Body.AtKey("session").GetStringVoid(&s.session, &err)
res.Body.AtKey("csrf_token").GetStringVoid(&s.csrf, &err)
res.Body.AtPath("me.basics.passphrase_generation").GetIntVoid(&ppGenTmp, &err)
}
if err == nil {
err = libkb.CheckUIDAgainstUsername(s.uid, arg.Username)
s.ppGen = libkb.PassphraseGeneration(ppGenTmp)
}
return
}
示例4: processUserPlusKeys
func (k *KeybaseDaemonRPC) processUserPlusKeys(upk keybase1.UserPlusKeys) (
UserInfo, error) {
verifyingKeys, cryptPublicKeys, kidNames, err := filterKeys(upk.DeviceKeys)
if err != nil {
return UserInfo{}, err
}
revokedVerifyingKeys, revokedCryptPublicKeys, revokedKidNames, err :=
filterRevokedKeys(upk.RevokedDeviceKeys)
if err != nil {
return UserInfo{}, err
}
if len(revokedKidNames) > 0 {
for k, v := range revokedKidNames {
kidNames[k] = v
}
}
u := UserInfo{
Name: libkb.NewNormalizedUsername(upk.Username),
UID: upk.Uid,
VerifyingKeys: verifyingKeys,
CryptPublicKeys: cryptPublicKeys,
KIDNames: kidNames,
RevokedVerifyingKeys: revokedVerifyingKeys,
RevokedCryptPublicKeys: revokedCryptPublicKeys,
}
k.setCachedUserInfo(upk.Uid, u)
return u, nil
}
示例5: NewDeprovisionEngine
func NewDeprovisionEngine(g *libkb.GlobalContext, username string, doRevoke bool) *DeprovisionEngine {
return &DeprovisionEngine{
Contextified: libkb.NewContextified(g),
username: libkb.NewNormalizedUsername(username),
doRevoke: doRevoke,
}
}
示例6: normalizeAssertionOrName
// TODO: this function can likely be replaced with a call to
// AssertionParseAndOnly when CORE-2967 and CORE-2968 are fixed.
func normalizeAssertionOrName(s string) (string, error) {
if libkb.CheckUsername.F(s) {
return libkb.NewNormalizedUsername(s).String(), nil
}
// TODO: this fails for http and https right now (see CORE-2968).
socialAssertion, isSocialAssertion := libkb.NormalizeSocialAssertion(s)
if isSocialAssertion {
return socialAssertion.String(), nil
}
if expr, err := libkb.AssertionParseAndOnly(s); err == nil {
// If the expression only contains a single url, make sure
// it's not a just considered a single keybase username. If
// it is, then some non-username slipped into the default
// "keybase" case and should be considered an error.
urls := expr.CollectUrls(nil)
if len(urls) == 1 && urls[0].IsKeybase() {
return "", NoSuchUserError{s}
}
// Normalize and return. Ideally `AssertionParseAndOnly`
// would normalize for us, but that doesn't work yet, so for
// now we'll just lower-case. This will incorrectly lower
// case http/https/web assertions, as well as case-sensitive
// social assertions in AND expressions. TODO: see CORE-2967.
return strings.ToLower(s), nil
}
return "", BadTLFNameError{s}
}
示例7: TestMaxExpires
func TestMaxExpires(t *testing.T) {
keyPair, err := libkb.GenerateNaclSigningKeyPair()
if err != nil {
t.Fatal(err)
}
name := libkb.NewNormalizedUsername("charlie")
uid := libkb.UsernameToUID(name.String())
expireIn := testMaxTokenExpireIn + 1
server := "test"
clientName := "test_client"
clientVersion := "93021"
challenge, err := GenerateChallenge()
if err != nil {
t.Fatal(err)
}
token := NewToken(uid, name, keyPair.GetKID(), server, challenge,
time.Now().Unix(), expireIn, clientName, clientVersion)
sig, _, err := keyPair.SignToString(token.Bytes())
if err != nil {
t.Fatal(err)
}
_, err = VerifyToken(sig, server, challenge, testMaxTokenExpireIn)
_, maxExpires := err.(MaxTokenExpiresError)
if !maxExpires {
t.Fatal(fmt.Errorf("expected max token expires error"))
}
}
示例8: TestTokenServerInvalid
func TestTokenServerInvalid(t *testing.T) {
keyPair, err := libkb.GenerateNaclSigningKeyPair()
if err != nil {
t.Fatal(err)
}
name := libkb.NewNormalizedUsername("dana")
uid := libkb.UsernameToUID(name.String())
expireIn := 10
server := "test"
clientName := "test_client"
clientVersion := "20192"
token := NewToken(uid, name, keyPair.GetKID(), server, expireIn, clientName, clientVersion)
sig, _, err := keyPair.SignToString(token.Bytes())
if err != nil {
t.Fatal(err)
}
_, err = VerifyToken(sig, "nope", testMaxTokenExpireIn)
_, invalid := err.(InvalidTokenServerError)
if !invalid {
t.Fatal(fmt.Errorf("expected invalid token server error"))
}
token, err = VerifyToken(sig, server, testMaxTokenExpireIn)
if err != nil {
t.Fatal(err)
}
if err = checkToken(token, uid, name, keyPair.GetKID(),
server, expireIn, clientName, clientVersion); err != nil {
t.Fatal(err)
}
}
示例9: normalizeUserNamesInTLF
// normalizeUserNamesInTLF takes a split TLF name and, without doing
// any resolutions or identify calls, normalizes all elements of the
// name that are bare user names. It then returns the normalized name.
//
// Note that this normalizes (i.e., lower-cases) any assertions in the
// name as well, but doesn't resolve them. This is safe since the
// libkb assertion parser does that same thing.
func normalizeUserNamesInTLF(writerNames, readerNames []string) string {
sortedWriterNames := make([]string, len(writerNames))
for i, w := range writerNames {
sortedWriterNames[i] = libkb.NewNormalizedUsername(w).String()
}
sort.Strings(sortedWriterNames)
normalizedName := strings.Join(sortedWriterNames, ",")
if len(readerNames) > 0 {
sortedReaderNames := make([]string, len(readerNames))
for i, r := range readerNames {
sortedReaderNames[i] =
libkb.NewNormalizedUsername(r).String()
}
sort.Strings(sortedReaderNames)
normalizedName += ReaderSep + strings.Join(sortedReaderNames, ",")
}
return normalizedName
}
示例10: Resolve
// Resolve implements the KeybaseDaemon interface for KeybaseDaemonRPC.
func (k *KeybaseDaemonRPC) Resolve(ctx context.Context, assertion string) (
libkb.NormalizedUsername, keybase1.UID, error) {
user, err := k.identifyClient.Resolve2(ctx, assertion)
if err != nil {
return libkb.NormalizedUsername(""), keybase1.UID(""),
convertIdentifyError(assertion, err)
}
return libkb.NewNormalizedUsername(user.Username), user.Uid, nil
}
示例11: expectUsernameCall
func expectUsernameCall(u keybase1.UID, config *ConfigMock) {
name := libkb.NewNormalizedUsername(fmt.Sprintf("user_%s", u))
config.mockKbpki.EXPECT().GetNormalizedUsername(gomock.Any(), u).AnyTimes().
Return(name, nil)
config.mockKbpki.EXPECT().Resolve(gomock.Any(), string(name)).AnyTimes().
Return(u, nil)
// Ideally, this would be 0 or 1 times.
config.mockKbpki.EXPECT().Identify(gomock.Any(), name.String(), gomock.Any()).AnyTimes().
Return(UserInfo{Name: name, UID: u}, nil)
}
示例12: saveLoginState
// saveLoginState stores the user's login state. The user config
// file is stored in a temporary location, since we're usually in a
// "config file transaction" at this point.
func (e *Kex2Provisionee) saveLoginState() error {
if err := e.ctx.LoginContext.LoadLoginSession(e.username); err != nil {
return err
}
err := e.ctx.LoginContext.SaveState(string(e.sessionToken), string(e.csrfToken), libkb.NewNormalizedUsername(e.username), e.uid, e.device.ID)
if err != nil {
return err
}
return nil
}
示例13: Run
// Run starts the engine.
func (e *LoginCurrentDevice) Run(ctx *Context) error {
// already logged in?
in, err := e.G().LoginState().LoggedInProvisionedLoad()
if err == nil && in {
if len(e.username) == 0 || e.G().Env.GetUsername() == libkb.NewNormalizedUsername(e.username) {
return nil
}
}
var config *libkb.UserConfig
if len(e.username) == 0 {
config, err = e.G().Env.GetConfig().GetUserConfig()
} else {
nu := libkb.NewNormalizedUsername(e.username)
config, err = e.G().Env.GetConfig().GetUserConfigForUsername(nu)
}
if err != nil {
e.G().Log.Debug("error getting user config: %s (%T)", err, err)
return errNoConfig
}
if config == nil {
e.G().Log.Debug("user config is nil")
return errNoConfig
}
if config.GetDeviceID().IsNil() {
e.G().Log.Debug("no device in user config")
return errNoDevice
}
// at this point, there is a user config either for the current user or for e.username
// and it has a device id, so this should be a provisioned device. Thus, they should
// just login normally.
var afterLogin = func(lctx libkb.LoginContext) error {
if err := lctx.LocalSession().SetDeviceProvisioned(e.G().Env.GetDeviceID()); err != nil {
// not a fatal error, session will stay in memory
e.G().Log.Warning("error saving session file: %s", err)
}
return nil
}
return e.G().LoginState().LoginWithPrompt(e.username, ctx.LoginUI, ctx.SecretUI, afterLogin)
}
示例14: userHasStoredSecretViaSecretStore
func userHasStoredSecretViaSecretStore(tc *libkb.TestContext, username string) bool {
secretStore := libkb.NewSecretStore(libkb.NewNormalizedUsername(username))
if secretStore == nil {
tc.T.Errorf("SecretStore for %s unexpectedly nil", username)
return false
}
_, err := secretStore.RetrieveSecret()
// TODO: Have RetrieveSecret return platform-independent errors
// so that we can make sure we got the right one.
return (err == nil)
}
示例15: newTestUser
func newTestUser(nKeys int) *testUser {
un := genUsername()
ret := testUser{
username: libkb.NewNormalizedUsername(un),
uid: libkb.UsernameToUID(un),
keys: make([]keybase1.KID, nKeys),
}
for i := 0; i < nKeys; i++ {
ret.keys[i] = genKID()
}
return &ret
}