本文整理匯總了Golang中github.com/keybase/client/go/libkb.NewNormalizedUsername函數的典型用法代碼示例。如果您正苦於以下問題:Golang NewNormalizedUsername函數的具體用法?Golang NewNormalizedUsername怎麽用?Golang NewNormalizedUsername使用的例子?那麽, 這裏精選的函數代碼示例或許可以為您提供幫助。
在下文中一共展示了NewNormalizedUsername函數的15個代碼示例,這些例子默認根據受歡迎程度排序。您可以為喜歡或者感覺有用的代碼點讚,您的評價將有助於係統推薦出更棒的Golang代碼示例。
示例1: getBigScaryWarning
func (c *CmdDeprovision) getBigScaryWarning(username string) (string, error) {
// If the user is logged out, warn that we won't revoke their keys.
loggedOutWarning := ""
if !c.loggedIn {
loggedOutWarning = `
Note that you aren't currently logged in. That means we won't publicly revoke
this device's keys. To do that from another device, use 'keybase device remove'.`
}
// If the user has PGP secret keys in the SKBKeyring, print an additional warning.
keyring, err := libkb.LoadSKBKeyring(libkb.NewNormalizedUsername(username), c.G())
if err != nil {
return "", err
}
pgpWarning := ""
if keyring.HasPGPKeys() {
pgpWarning = fmt.Sprintf(`
Also, the secret keyring you're about to delete contains PGP keys. To list them
or copy them, use %s.`, "`keybase pgp export`")
}
// TODO: Print a list of the other devices on the user's account.
return fmt.Sprintf(`
%s, BE CAREFUL! \('o')/
You are about to delete this device from your account, including its secret
keys. If you don't have any other devices, you'll lose access to your account
and all your data!%s%s
Proceed?`, username, loggedOutWarning, pgpWarning), nil
}
示例2: TestTokenVerifyToken
func TestTokenVerifyToken(t *testing.T) {
keyPair, err := libkb.GenerateNaclSigningKeyPair()
if err != nil {
t.Fatal(err)
}
name := libkb.NewNormalizedUsername("alice")
uid := libkb.UsernameToUID(name.String())
expireIn := 10
server := "test"
clientName := "test_client"
clientVersion := "41651"
token := NewToken(uid, name, keyPair.GetKID(), server, expireIn, clientName, clientVersion)
sig, _, err := keyPair.SignToString(token.Bytes())
if err != nil {
t.Fatal(err)
}
_, err = VerifyToken("nope", server, testMaxTokenExpireIn)
if err == nil {
t.Fatal(fmt.Errorf("expected verification failure"))
}
token, err = VerifyToken(sig, server, testMaxTokenExpireIn)
if err != nil {
t.Fatal(err)
}
if err = checkToken(token, uid, name, keyPair.GetKID(),
server, expireIn, clientName, clientVersion); err != nil {
t.Fatal(err)
}
}
示例3: Post
func (s *SignupJoinEngine) Post(arg SignupJoinEngineRunArg) (err error) {
var res *libkb.APIRes
var ppGenTmp int
res, err = s.G().API.Post(libkb.APIArg{
Endpoint: "signup",
Args: libkb.HTTPArgs{
"salt": libkb.S{Val: hex.EncodeToString(arg.PWSalt)},
"pwh": libkb.S{Val: hex.EncodeToString(arg.PWHash)},
"username": libkb.S{Val: arg.Username},
"email": libkb.S{Val: arg.Email},
"invitation_id": libkb.S{Val: arg.InviteCode},
"pwh_version": libkb.I{Val: int(triplesec.Version)},
"skip_mail": libkb.B{Val: arg.SkipMail},
}})
if err == nil {
s.username = libkb.NewNormalizedUsername(arg.Username)
libkb.GetUIDVoid(res.Body.AtKey("uid"), &s.uid, &err)
res.Body.AtKey("session").GetStringVoid(&s.session, &err)
res.Body.AtKey("csrf_token").GetStringVoid(&s.csrf, &err)
res.Body.AtPath("me.basics.passphrase_generation").GetIntVoid(&ppGenTmp, &err)
}
if err == nil {
err = libkb.CheckUIDAgainstUsername(s.uid, arg.Username)
s.ppGen = libkb.PassphraseGeneration(ppGenTmp)
}
return
}
示例4: processUserPlusKeys
func (k *KeybaseDaemonRPC) processUserPlusKeys(upk keybase1.UserPlusKeys) (
UserInfo, error) {
verifyingKeys, cryptPublicKeys, kidNames, err := filterKeys(upk.DeviceKeys)
if err != nil {
return UserInfo{}, err
}
revokedVerifyingKeys, revokedCryptPublicKeys, revokedKidNames, err :=
filterRevokedKeys(upk.RevokedDeviceKeys)
if err != nil {
return UserInfo{}, err
}
if len(revokedKidNames) > 0 {
for k, v := range revokedKidNames {
kidNames[k] = v
}
}
u := UserInfo{
Name: libkb.NewNormalizedUsername(upk.Username),
UID: upk.Uid,
VerifyingKeys: verifyingKeys,
CryptPublicKeys: cryptPublicKeys,
KIDNames: kidNames,
RevokedVerifyingKeys: revokedVerifyingKeys,
RevokedCryptPublicKeys: revokedCryptPublicKeys,
}
k.setCachedUserInfo(upk.Uid, u)
return u, nil
}
示例5: NewDeprovisionEngine
func NewDeprovisionEngine(g *libkb.GlobalContext, username string, doRevoke bool) *DeprovisionEngine {
return &DeprovisionEngine{
Contextified: libkb.NewContextified(g),
username: libkb.NewNormalizedUsername(username),
doRevoke: doRevoke,
}
}
示例6: normalizeAssertionOrName
// TODO: this function can likely be replaced with a call to
// AssertionParseAndOnly when CORE-2967 and CORE-2968 are fixed.
func normalizeAssertionOrName(s string) (string, error) {
if libkb.CheckUsername.F(s) {
return libkb.NewNormalizedUsername(s).String(), nil
}
// TODO: this fails for http and https right now (see CORE-2968).
socialAssertion, isSocialAssertion := libkb.NormalizeSocialAssertion(s)
if isSocialAssertion {
return socialAssertion.String(), nil
}
if expr, err := libkb.AssertionParseAndOnly(s); err == nil {
// If the expression only contains a single url, make sure
// it's not a just considered a single keybase username. If
// it is, then some non-username slipped into the default
// "keybase" case and should be considered an error.
urls := expr.CollectUrls(nil)
if len(urls) == 1 && urls[0].IsKeybase() {
return "", NoSuchUserError{s}
}
// Normalize and return. Ideally `AssertionParseAndOnly`
// would normalize for us, but that doesn't work yet, so for
// now we'll just lower-case. This will incorrectly lower
// case http/https/web assertions, as well as case-sensitive
// social assertions in AND expressions. TODO: see CORE-2967.
return strings.ToLower(s), nil
}
return "", BadTLFNameError{s}
}
示例7: TestMaxExpires
func TestMaxExpires(t *testing.T) {
keyPair, err := libkb.GenerateNaclSigningKeyPair()
if err != nil {
t.Fatal(err)
}
name := libkb.NewNormalizedUsername("charlie")
uid := libkb.UsernameToUID(name.String())
expireIn := testMaxTokenExpireIn + 1
server := "test"
clientName := "test_client"
clientVersion := "93021"
challenge, err := GenerateChallenge()
if err != nil {
t.Fatal(err)
}
token := NewToken(uid, name, keyPair.GetKID(), server, challenge,
time.Now().Unix(), expireIn, clientName, clientVersion)
sig, _, err := keyPair.SignToString(token.Bytes())
if err != nil {
t.Fatal(err)
}
_, err = VerifyToken(sig, server, challenge, testMaxTokenExpireIn)
_, maxExpires := err.(MaxTokenExpiresError)
if !maxExpires {
t.Fatal(fmt.Errorf("expected max token expires error"))
}
}
示例8: TestTokenServerInvalid
func TestTokenServerInvalid(t *testing.T) {
keyPair, err := libkb.GenerateNaclSigningKeyPair()
if err != nil {
t.Fatal(err)
}
name := libkb.NewNormalizedUsername("dana")
uid := libkb.UsernameToUID(name.String())
expireIn := 10
server := "test"
clientName := "test_client"
clientVersion := "20192"
token := NewToken(uid, name, keyPair.GetKID(), server, expireIn, clientName, clientVersion)
sig, _, err := keyPair.SignToString(token.Bytes())
if err != nil {
t.Fatal(err)
}
_, err = VerifyToken(sig, "nope", testMaxTokenExpireIn)
_, invalid := err.(InvalidTokenServerError)
if !invalid {
t.Fatal(fmt.Errorf("expected invalid token server error"))
}
token, err = VerifyToken(sig, server, testMaxTokenExpireIn)
if err != nil {
t.Fatal(err)
}
if err = checkToken(token, uid, name, keyPair.GetKID(),
server, expireIn, clientName, clientVersion); err != nil {
t.Fatal(err)
}
}
示例9: normalizeUserNamesInTLF
// normalizeUserNamesInTLF takes a split TLF name and, without doing
// any resolutions or identify calls, normalizes all elements of the
// name that are bare user names. It then returns the normalized name.
//
// Note that this normalizes (i.e., lower-cases) any assertions in the
// name as well, but doesn't resolve them. This is safe since the
// libkb assertion parser does that same thing.
func normalizeUserNamesInTLF(writerNames, readerNames []string) string {
sortedWriterNames := make([]string, len(writerNames))
for i, w := range writerNames {
sortedWriterNames[i] = libkb.NewNormalizedUsername(w).String()
}
sort.Strings(sortedWriterNames)
normalizedName := strings.Join(sortedWriterNames, ",")
if len(readerNames) > 0 {
sortedReaderNames := make([]string, len(readerNames))
for i, r := range readerNames {
sortedReaderNames[i] =
libkb.NewNormalizedUsername(r).String()
}
sort.Strings(sortedReaderNames)
normalizedName += ReaderSep + strings.Join(sortedReaderNames, ",")
}
return normalizedName
}
示例10: Resolve
// Resolve implements the KeybaseDaemon interface for KeybaseDaemonRPC.
func (k *KeybaseDaemonRPC) Resolve(ctx context.Context, assertion string) (
libkb.NormalizedUsername, keybase1.UID, error) {
user, err := k.identifyClient.Resolve2(ctx, assertion)
if err != nil {
return libkb.NormalizedUsername(""), keybase1.UID(""),
convertIdentifyError(assertion, err)
}
return libkb.NewNormalizedUsername(user.Username), user.Uid, nil
}
示例11: expectUsernameCall
func expectUsernameCall(u keybase1.UID, config *ConfigMock) {
name := libkb.NewNormalizedUsername(fmt.Sprintf("user_%s", u))
config.mockKbpki.EXPECT().GetNormalizedUsername(gomock.Any(), u).AnyTimes().
Return(name, nil)
config.mockKbpki.EXPECT().Resolve(gomock.Any(), string(name)).AnyTimes().
Return(u, nil)
// Ideally, this would be 0 or 1 times.
config.mockKbpki.EXPECT().Identify(gomock.Any(), name.String(), gomock.Any()).AnyTimes().
Return(UserInfo{Name: name, UID: u}, nil)
}
示例12: saveLoginState
// saveLoginState stores the user's login state. The user config
// file is stored in a temporary location, since we're usually in a
// "config file transaction" at this point.
func (e *Kex2Provisionee) saveLoginState() error {
if err := e.ctx.LoginContext.LoadLoginSession(e.username); err != nil {
return err
}
err := e.ctx.LoginContext.SaveState(string(e.sessionToken), string(e.csrfToken), libkb.NewNormalizedUsername(e.username), e.uid, e.device.ID)
if err != nil {
return err
}
return nil
}
示例13: Run
// Run starts the engine.
func (e *LoginCurrentDevice) Run(ctx *Context) error {
// already logged in?
in, err := e.G().LoginState().LoggedInProvisionedLoad()
if err == nil && in {
if len(e.username) == 0 || e.G().Env.GetUsername() == libkb.NewNormalizedUsername(e.username) {
return nil
}
}
var config *libkb.UserConfig
if len(e.username) == 0 {
config, err = e.G().Env.GetConfig().GetUserConfig()
} else {
nu := libkb.NewNormalizedUsername(e.username)
config, err = e.G().Env.GetConfig().GetUserConfigForUsername(nu)
}
if err != nil {
e.G().Log.Debug("error getting user config: %s (%T)", err, err)
return errNoConfig
}
if config == nil {
e.G().Log.Debug("user config is nil")
return errNoConfig
}
if config.GetDeviceID().IsNil() {
e.G().Log.Debug("no device in user config")
return errNoDevice
}
// at this point, there is a user config either for the current user or for e.username
// and it has a device id, so this should be a provisioned device. Thus, they should
// just login normally.
var afterLogin = func(lctx libkb.LoginContext) error {
if err := lctx.LocalSession().SetDeviceProvisioned(e.G().Env.GetDeviceID()); err != nil {
// not a fatal error, session will stay in memory
e.G().Log.Warning("error saving session file: %s", err)
}
return nil
}
return e.G().LoginState().LoginWithPrompt(e.username, ctx.LoginUI, ctx.SecretUI, afterLogin)
}
示例14: userHasStoredSecretViaSecretStore
func userHasStoredSecretViaSecretStore(tc *libkb.TestContext, username string) bool {
secretStore := libkb.NewSecretStore(libkb.NewNormalizedUsername(username))
if secretStore == nil {
tc.T.Errorf("SecretStore for %s unexpectedly nil", username)
return false
}
_, err := secretStore.RetrieveSecret()
// TODO: Have RetrieveSecret return platform-independent errors
// so that we can make sure we got the right one.
return (err == nil)
}
示例15: newTestUser
func newTestUser(nKeys int) *testUser {
un := genUsername()
ret := testUser{
username: libkb.NewNormalizedUsername(un),
uid: libkb.UsernameToUID(un),
keys: make([]keybase1.KID, nKeys),
}
for i := 0; i < nKeys; i++ {
ret.keys[i] = genKID()
}
return &ret
}