forked from keybase/client
/
track.go
108 lines (94 loc) · 3.33 KB
/
track.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
// Copyright 2015 Keybase, Inc. All rights reserved. Use of
// this source code is governed by the included BSD license.
package service
import (
"time"
"github.com/keybase/client/go/engine"
"github.com/keybase/client/go/libkb"
keybase1 "github.com/keybase/client/go/protocol/keybase1"
"github.com/keybase/go-framed-msgpack-rpc/rpc"
"golang.org/x/net/context"
)
// TrackHandler is the RPC handler for the track interface.
type TrackHandler struct {
*BaseHandler
libkb.Contextified
lastCheckTime time.Time
}
var _ keybase1.TrackInterface = (*TrackHandler)(nil)
// NewTrackHandler creates a TrackHandler for the xp transport.
func NewTrackHandler(xp rpc.Transporter, g *libkb.GlobalContext) *TrackHandler {
return &TrackHandler{
BaseHandler: NewBaseHandler(g, xp),
Contextified: libkb.NewContextified(g),
}
}
// Track creates a TrackEngine and runs it.
func (h *TrackHandler) Track(_ context.Context, arg keybase1.TrackArg) (keybase1.ConfirmResult, error) {
earg := engine.TrackEngineArg{
UserAssertion: arg.UserAssertion,
Options: arg.Options,
ForceRemoteCheck: arg.ForceRemoteCheck,
}
ctx := engine.Context{
IdentifyUI: h.NewRemoteIdentifyUI(arg.SessionID, h.G()),
SecretUI: h.getSecretUI(arg.SessionID, h.G()),
SessionID: arg.SessionID,
}
eng := engine.NewTrackEngine(&earg, h.G())
err := engine.RunEngine(eng, &ctx)
res := eng.ConfirmResult()
return res, err
}
func (h *TrackHandler) TrackWithToken(_ context.Context, arg keybase1.TrackWithTokenArg) error {
earg := engine.TrackTokenArg{
Token: arg.TrackToken,
Options: arg.Options,
}
ctx := engine.Context{
IdentifyUI: h.NewRemoteIdentifyUI(arg.SessionID, h.G()),
SecretUI: h.getSecretUI(arg.SessionID, h.G()),
SessionID: arg.SessionID,
}
eng := engine.NewTrackToken(&earg, h.G())
return engine.RunEngine(eng, &ctx)
}
func (h *TrackHandler) DismissWithToken(ctx context.Context, arg keybase1.DismissWithTokenArg) error {
outcome, err := h.G().TrackCache.Get(arg.TrackToken)
if err != nil {
h.G().Log.Error("Failed to get track token", err)
return err
}
if outcome.ResponsibleGregorItem == nil {
h.G().Log.Debug("No responsible gregor item found for track token %s", arg.TrackToken)
return nil
}
return h.G().GregorDismisser.DismissItem(ctx, nil, outcome.ResponsibleGregorItem.Metadata().MsgID())
}
// Untrack creates an UntrackEngine and runs it.
func (h *TrackHandler) Untrack(_ context.Context, arg keybase1.UntrackArg) error {
earg := engine.UntrackEngineArg{
Username: libkb.NewNormalizedUsername(arg.Username),
}
ctx := engine.Context{
SecretUI: h.getSecretUI(arg.SessionID, h.G()),
SessionID: arg.SessionID,
}
eng := engine.NewUntrackEngine(&earg, h.G())
return engine.RunEngine(eng, &ctx)
}
func (h *TrackHandler) CheckTracking(_ context.Context, sessionID int) error {
if !h.G().RateLimits.GetPermission(libkb.CheckTrackingRateLimit, libkb.TrackingRateLimitSeconds*time.Second) {
h.G().Log.Debug("Skipping CheckTracking due to rate limit.")
return nil
}
return libkb.CheckTracking(h.G())
}
func (h *TrackHandler) FakeTrackingChanged(_ context.Context, arg keybase1.FakeTrackingChangedArg) error {
user, err := libkb.LoadUser(libkb.NewLoadUserArg(h.G()).WithName(arg.Username))
if err != nil {
return err
}
h.G().NotifyRouter.HandleTrackingChanged(user.GetUID(), user.GetNormalizedName(), arg.IsTracking)
return nil
}