github.com/keybase/client/go@v0.0.0-20240309051027-028f7c731f8b/teams/service_helper.go (about)

     1  package teams
     2  
     3  import (
     4  	"errors"
     5  	"fmt"
     6  	"strings"
     7  	"time"
     8  
     9  	"golang.org/x/net/context"
    10  
    11  	"github.com/keybase/client/go/avatars"
    12  	email_utils "github.com/keybase/client/go/emails"
    13  	"github.com/keybase/client/go/engine"
    14  	"github.com/keybase/client/go/externals"
    15  	"github.com/keybase/client/go/kbun"
    16  	"github.com/keybase/client/go/libkb"
    17  	"github.com/keybase/client/go/protocol/keybase1"
    18  )
    19  
    20  func LoadTeamPlusApplicationKeys(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID,
    21  	application keybase1.TeamApplication, refreshers keybase1.TeamRefreshers, includeKBFSKeys bool) (res keybase1.TeamPlusApplicationKeys, err error) {
    22  
    23  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
    24  		ID:         id,
    25  		Public:     id.IsPublic(), // infer publicness from id
    26  		Refreshers: refreshers,
    27  	})
    28  	if err != nil {
    29  		return res, err
    30  	}
    31  	return team.ExportToTeamPlusApplicationKeys(ctx, keybase1.Time(0), application, includeKBFSKeys)
    32  }
    33  
    34  // GetAnnotatedTeam bundles up various data, both on and off chain, about a specific team for
    35  // consumption by the UI. In particular, it supplies almost all of the information on a team's
    36  // subpage in the Teams tab.
    37  // It always repolls to ensure latest version of a team, but member infos (username, full name, if
    38  // they reset or not) are subject to UIDMapper caching.
    39  func GetAnnotatedTeam(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID) (res keybase1.AnnotatedTeam, err error) {
    40  	tracer := g.CTimeTracer(ctx, "GetAnnotatedTeam", true)
    41  	defer tracer.Finish()
    42  
    43  	mctx := libkb.NewMetaContext(ctx, g)
    44  
    45  	tracer.Stage("load team")
    46  	t, err := GetMaybeAdminByID(ctx, g, teamID, teamID.IsPublic())
    47  	if err != nil {
    48  		return res, err
    49  	}
    50  
    51  	settings := t.Settings()
    52  
    53  	tracer.Stage("members & invites")
    54  	members, annotatedInvites, err := GetAnnotatedInvitesAndMembersForUI(mctx, t)
    55  	if err != nil {
    56  		return res, err
    57  	}
    58  	members = membersFilterDeletedUsers(mctx.Ctx(), mctx.G(), members)
    59  	members = membersHideInactiveDuplicates(mctx.Ctx(), mctx.G(), members)
    60  
    61  	var transitiveSubteamsUnverified keybase1.SubteamListResult
    62  	var joinRequests []keybase1.TeamJoinRequest
    63  	var tarsDisabled bool
    64  	var showcase keybase1.TeamShowcase
    65  	if !t.IsImplicit() {
    66  		if settings.Open {
    67  			g.Log.CDebugf(ctx, "GetAnnotatedTeam: %q is an open team, filtering reset writers and readers", t.Name().String())
    68  			members = keybase1.FilterInactiveReadersWriters(members)
    69  		}
    70  
    71  		tracer.Stage("transitive subteams")
    72  		transitiveSubteamsUnverified, err = ListSubteamsUnverified(mctx, t.Name())
    73  		if err != nil {
    74  			return res, err
    75  		}
    76  
    77  		teamNameStr := t.Name().String()
    78  		myRole, err := t.myRole(ctx)
    79  		if err != nil {
    80  			return res, err
    81  		}
    82  		if myRole == keybase1.TeamRole_NONE || myRole.IsOrAbove(keybase1.TeamRole_ADMIN) {
    83  			// If we are an implicit admin, our role is NONE. Note that we would not be
    84  			// this far if we are not a member of that team - we would have failed with a
    85  			// membership error during team loading at the beginning of this function.
    86  			joinRequests, err = ListRequests(ctx, g, &teamNameStr)
    87  			if err != nil {
    88  				mctx.Debug("GetAnnotatedTeam: failed to load access requests: %s", err)
    89  			}
    90  			tarsDisabled, err = GetTarsDisabled(ctx, g, teamID)
    91  			if err != nil {
    92  				mctx.Debug("GetAnnotatedTeam: failed to load disabled TARs setting: %s", err)
    93  			}
    94  		}
    95  
    96  		showcase, err = GetTeamShowcase(ctx, g, teamID)
    97  		if err != nil {
    98  			return res, err
    99  		}
   100  	}
   101  
   102  	return keybase1.AnnotatedTeam{
   103  		TeamID:                       teamID,
   104  		Name:                         t.Name().String(),
   105  		TransitiveSubteamsUnverified: transitiveSubteamsUnverified,
   106  		Members:                      members,
   107  		Invites:                      annotatedInvites,
   108  		Settings:                     settings,
   109  		JoinRequests:                 joinRequests,
   110  		TarsDisabled:                 tarsDisabled,
   111  		KeyGeneration:                t.Generation(),
   112  		Showcase:                     showcase,
   113  	}, nil
   114  }
   115  
   116  func GetAnnotatedTeamByName(ctx context.Context, g *libkb.GlobalContext, teamName string) (res keybase1.AnnotatedTeam, err error) {
   117  	nameParsed, err := keybase1.TeamNameFromString(teamName)
   118  	if err != nil {
   119  		return res, err
   120  	}
   121  	teamID, err := ResolveNameToID(ctx, g, nameParsed)
   122  	if err != nil {
   123  		return res, err
   124  	}
   125  	return GetAnnotatedTeam(ctx, g, teamID)
   126  }
   127  
   128  func Details(ctx context.Context, g *libkb.GlobalContext, name string) (res keybase1.TeamDetails, err error) {
   129  	t, err := GetAnnotatedTeamByName(ctx, g, name)
   130  	if err != nil {
   131  		return res, err
   132  	}
   133  	return t.ToLegacyTeamDetails(), nil
   134  }
   135  
   136  func membersFilterDeletedUsers(ctx context.Context, g *libkb.GlobalContext, members []keybase1.TeamMemberDetails) (ret []keybase1.TeamMemberDetails) {
   137  	for _, member := range members {
   138  		if member.Status != keybase1.TeamMemberStatus_DELETED {
   139  			ret = append(ret, member)
   140  		} else {
   141  			g.Log.CDebugf(ctx, "membersHideDeletedUsers filtered out row: %v %v", member.Uv, member.Status)
   142  		}
   143  	}
   144  	return ret
   145  }
   146  
   147  // If a UID appears multiple times with different TeamMemberStatus, only show the 'ACTIVE' version.
   148  // This can happen when an owner resets and is re-added by an admin (though the admin could
   149  // choose to remove the old owner if they so wished).
   150  func membersHideInactiveDuplicates(ctx context.Context, g *libkb.GlobalContext, members []keybase1.TeamMemberDetails) (ret []keybase1.TeamMemberDetails) {
   151  	seenActive := make(map[keybase1.UID]bool)
   152  	// Scan for active rows
   153  	for _, member := range members {
   154  		if member.Status == keybase1.TeamMemberStatus_ACTIVE {
   155  			seenActive[member.Uv.Uid] = true
   156  		}
   157  	}
   158  	// Filter out superseded inactive rows
   159  	for _, member := range members {
   160  		if member.Status == keybase1.TeamMemberStatus_ACTIVE || !seenActive[member.Uv.Uid] {
   161  			ret = append(ret, member)
   162  		} else {
   163  			g.Log.CDebugf(ctx, "membersHideInactiveDuplicates filtered out row: %v %v", member.Uv, member.Status)
   164  		}
   165  	}
   166  	return ret
   167  }
   168  
   169  func MembersDetails(ctx context.Context, g *libkb.GlobalContext, t *Team) (ret []keybase1.TeamMemberDetails, err error) {
   170  	mctx := libkb.NewMetaContext(ctx, g)
   171  	m, err := t.Members()
   172  	if err != nil {
   173  		return nil, err
   174  	}
   175  
   176  	owners, err := userVersionsToDetails(mctx, m.Owners, t)
   177  	if err != nil {
   178  		return nil, err
   179  	}
   180  	admins, err := userVersionsToDetails(mctx, m.Admins, t)
   181  	if err != nil {
   182  		return nil, err
   183  	}
   184  	writers, err := userVersionsToDetails(mctx, m.Writers, t)
   185  	if err != nil {
   186  		return nil, err
   187  	}
   188  	readers, err := userVersionsToDetails(mctx, m.Readers, t)
   189  	if err != nil {
   190  		return nil, err
   191  	}
   192  	bots, err := userVersionsToDetails(mctx, m.Bots, t)
   193  	if err != nil {
   194  		return nil, err
   195  	}
   196  	restrictedBots, err := userVersionsToDetails(mctx, m.RestrictedBots, t)
   197  	if err != nil {
   198  		return nil, err
   199  	}
   200  	ret = append(ret, owners...)
   201  	ret = append(ret, admins...)
   202  	ret = append(ret, writers...)
   203  	ret = append(ret, readers...)
   204  	ret = append(ret, bots...)
   205  	ret = append(ret, restrictedBots...)
   206  	return ret, nil
   207  }
   208  
   209  // userVersionsToDetails returns a slice of TeamMemberDetails objects, to be
   210  // used in relation to a specific team. It requires the *Team parameter to get
   211  // the role and joinTime.
   212  func userVersionsToDetails(mctx libkb.MetaContext, uvs []keybase1.UserVersion, t *Team) (ret []keybase1.TeamMemberDetails, err error) {
   213  	uids := make([]keybase1.UID, len(uvs))
   214  	for i, uv := range uvs {
   215  		uids[i] = uv.Uid
   216  	}
   217  	packages, err := mctx.G().UIDMapper.MapUIDsToUsernamePackages(mctx.Ctx(), mctx.G(), uids,
   218  		defaultFullnameFreshness, defaultNetworkTimeBudget, true /* forceNetworkForFullNames */)
   219  	if err != nil {
   220  		return nil, err
   221  	}
   222  
   223  	ret = make([]keybase1.TeamMemberDetails, len(uvs))
   224  
   225  	for i, uv := range uvs {
   226  		pkg := packages[i]
   227  		status := keybase1.TeamMemberStatus_ACTIVE
   228  		var fullName keybase1.FullName
   229  		if pkg.FullName != nil {
   230  			if pkg.FullName.EldestSeqno != uv.EldestSeqno {
   231  				status = keybase1.TeamMemberStatus_RESET
   232  			}
   233  			if pkg.FullName.Status == keybase1.StatusCode_SCDeleted {
   234  				status = keybase1.TeamMemberStatus_DELETED
   235  			}
   236  			fullName = pkg.FullName.FullName
   237  		}
   238  		role, err := t.chain().GetUserRole(uv)
   239  		if err != nil {
   240  			return nil, err
   241  		}
   242  		ret[i] = keybase1.TeamMemberDetails{
   243  			Uv:       uvs[i],
   244  			Username: pkg.NormalizedUsername.String(),
   245  			FullName: fullName,
   246  			Status:   status,
   247  			Role:     role,
   248  		}
   249  		if status == keybase1.TeamMemberStatus_ACTIVE && t != nil {
   250  			joinTime, err := t.UserLastJoinTime(uv)
   251  			if err != nil {
   252  				return nil, err
   253  			}
   254  			ret[i].JoinTime = &joinTime
   255  		}
   256  	}
   257  	return ret, nil
   258  }
   259  
   260  func SetRoleOwner(ctx context.Context, g *libkb.GlobalContext, teamname, username string) error {
   261  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   262  	if err != nil {
   263  		return err
   264  	}
   265  	return ChangeRoles(ctx, g, teamname, keybase1.TeamChangeReq{Owners: []keybase1.UserVersion{uv}})
   266  }
   267  
   268  func SetRoleAdmin(ctx context.Context, g *libkb.GlobalContext, teamname, username string) error {
   269  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   270  	if err != nil {
   271  		return err
   272  	}
   273  	return ChangeRoles(ctx, g, teamname, keybase1.TeamChangeReq{Admins: []keybase1.UserVersion{uv}})
   274  }
   275  
   276  func SetRoleWriter(ctx context.Context, g *libkb.GlobalContext, teamname, username string) error {
   277  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   278  	if err != nil {
   279  		return err
   280  	}
   281  	return ChangeRoles(ctx, g, teamname, keybase1.TeamChangeReq{Writers: []keybase1.UserVersion{uv}})
   282  }
   283  
   284  func SetRoleReader(ctx context.Context, g *libkb.GlobalContext, teamname, username string) error {
   285  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   286  	if err != nil {
   287  		return err
   288  	}
   289  	return ChangeRoles(ctx, g, teamname, keybase1.TeamChangeReq{Readers: []keybase1.UserVersion{uv}})
   290  }
   291  
   292  func SetRoleBot(ctx context.Context, g *libkb.GlobalContext, teamname, username string) error {
   293  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   294  	if err != nil {
   295  		return err
   296  	}
   297  	return ChangeRoles(ctx, g, teamname, keybase1.TeamChangeReq{Bots: []keybase1.UserVersion{uv}})
   298  }
   299  
   300  func SetRoleRestrictedBot(ctx context.Context, g *libkb.GlobalContext, teamname, username string,
   301  	botSettings keybase1.TeamBotSettings) error {
   302  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   303  	if err != nil {
   304  		return err
   305  	}
   306  	req := keybase1.TeamChangeReq{
   307  		RestrictedBots: map[keybase1.UserVersion]keybase1.TeamBotSettings{
   308  			uv: botSettings,
   309  		},
   310  	}
   311  	return ChangeRoles(ctx, g, teamname, req)
   312  }
   313  
   314  func getUserProofsNoTracking(ctx context.Context, g *libkb.GlobalContext, username string) (*libkb.ProofSet, *libkb.IdentifyOutcome, error) {
   315  	arg := keybase1.Identify2Arg{
   316  		UserAssertion:    username,
   317  		UseDelegateUI:    false,
   318  		Reason:           keybase1.IdentifyReason{Reason: "clear invitation when adding team member"},
   319  		CanSuppressUI:    true,
   320  		IdentifyBehavior: keybase1.TLFIdentifyBehavior_RESOLVE_AND_CHECK,
   321  		NeedProofSet:     true,
   322  		ActLoggedOut:     true,
   323  	}
   324  	eng := engine.NewResolveThenIdentify2(g, &arg)
   325  	m := libkb.NewMetaContext(ctx, g)
   326  	if err := engine.RunEngine2(m, eng); err != nil {
   327  		return nil, nil, err
   328  	}
   329  	return eng.GetProofSet(), eng.GetIdentifyOutcome(), nil
   330  }
   331  
   332  func AddMemberByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, username string,
   333  	role keybase1.TeamRole, botSettings *keybase1.TeamBotSettings, emailInviteMsg *string) (res keybase1.TeamAddMemberResult, err error) {
   334  
   335  	err = RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   336  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, true /*needAdmin*/)
   337  		if err != nil {
   338  			return err
   339  		}
   340  
   341  		loggedInRole, err := t.myRole(ctx)
   342  		if err != nil {
   343  			return err
   344  		}
   345  		if role == keybase1.TeamRole_OWNER && loggedInRole == keybase1.TeamRole_ADMIN {
   346  			return fmt.Errorf("Cannot add owner to team as an admin")
   347  		}
   348  
   349  		tx := CreateAddMemberTx(t)
   350  		tx.AllowPUKless = true
   351  		tx.EmailInviteMsg = emailInviteMsg
   352  		resolvedUsername, uv, invite, err := tx.AddOrInviteMemberByAssertion(ctx, username, role, botSettings)
   353  		if err != nil {
   354  			return err
   355  		}
   356  
   357  		if !uv.IsNil() {
   358  			// Try to mark completed any invites for the user's social assertions.
   359  			// This can be a time-intensive process since it involves checking proofs.
   360  			// It is limited to a few seconds and failure is non-fatal.
   361  			timeoutCtx, timeoutCancel := context.WithTimeout(ctx, 2*time.Second)
   362  			if err := tx.CompleteSocialInvitesFor(timeoutCtx, uv, username); err != nil {
   363  				g.Log.CDebugf(ctx, "Failed in CompleteSocialInvitesFor, no invites will be cleared. Err was: %v", err)
   364  			}
   365  			timeoutCancel()
   366  		}
   367  
   368  		err = tx.Post(libkb.NewMetaContext(ctx, g))
   369  		if err != nil {
   370  			return err
   371  		}
   372  
   373  		// return value assign to escape closure
   374  		res = keybase1.TeamAddMemberResult{
   375  			User:    &keybase1.User{Uid: uv.Uid, Username: resolvedUsername.String()},
   376  			Invited: invite,
   377  		}
   378  		return nil
   379  	})
   380  	return res, err
   381  }
   382  
   383  func AddMember(ctx context.Context, g *libkb.GlobalContext, teamname, username string, role keybase1.TeamRole,
   384  	botSettings *keybase1.TeamBotSettings) (res keybase1.TeamAddMemberResult, err error) {
   385  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
   386  		Name:        teamname,
   387  		ForceRepoll: true,
   388  	})
   389  	if err != nil {
   390  		return res, err
   391  	}
   392  	return AddMemberByID(ctx, g, team.ID, username, role, botSettings, nil /* emailInviteMsg */)
   393  }
   394  
   395  type AddMembersRes struct {
   396  	Invite   bool                     // Whether the membership addition was an invite.
   397  	Username libkb.NormalizedUsername // Resolved username. May be nil for social assertions.
   398  }
   399  
   400  // AddMembers adds a bunch of people to a team. Assertions can contain usernames or social assertions.
   401  // Adds them all in a transaction so it's all or nothing.
   402  // If the first transaction fails due to TeamContactSettingsBlock error, it
   403  // will remove restricted users returned by the error, and retry once.
   404  // On success, returns a list where len(added) + len(noAdded) = len(assertions) and in
   405  // corresponding order, with restricted users having an empty AddMembersRes.
   406  //
   407  // @emailInviteMsg *string is an argument used as a welcome message in email invitations sent from the server
   408  func AddMembers(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, users []keybase1.UserRolePair,
   409  	emailInviteMsg *string) (added []AddMembersRes, notAdded []keybase1.User, err error) {
   410  	mctx := libkb.NewMetaContext(ctx, g)
   411  	tracer := g.CTimeTracer(ctx, "team.AddMembers", true)
   412  	defer tracer.Finish()
   413  
   414  	// restrictedUsers is nil initially, but if first attempt at adding members
   415  	// results in "contact settings block error", restrictedUsers becomes a set
   416  	// of blocked uids.
   417  	var restrictedUsers contactRestrictedUsers
   418  
   419  	addNonRestrictedMembersFunc := func(ctx context.Context, _ int) error {
   420  		added = []AddMembersRes{}
   421  		notAdded = []keybase1.User{}
   422  
   423  		team, err := GetForTeamManagementByTeamID(ctx, g, teamID, true /*needAdmin*/)
   424  		if err != nil {
   425  			return err
   426  		}
   427  
   428  		if team.IsSubteam() && keybase1.UserRolePairsHaveOwner(users) {
   429  			// Do the "owner in subteam" check early before we do anything else.
   430  			return NewSubteamOwnersError()
   431  		}
   432  
   433  		tx := CreateAddMemberTx(team)
   434  		tx.AllowPUKless = true
   435  		tx.EmailInviteMsg = emailInviteMsg
   436  
   437  		type sweepEntry struct {
   438  			Assertion string
   439  			UV        keybase1.UserVersion
   440  		}
   441  		var sweep []sweepEntry
   442  		for _, user := range users {
   443  			candidate, err := tx.ResolveUPKV2FromAssertion(mctx, user.Assertion)
   444  			if err != nil {
   445  				return NewAddMembersError(candidate.Full, err)
   446  			}
   447  
   448  			g.Log.CDebugf(ctx, "%q resolved to %s", user.Assertion, candidate.DebugString())
   449  
   450  			if restricted, kbUser := restrictedUsers.checkCandidate(candidate); restricted {
   451  				// Skip users with contact setting restrictions.
   452  				notAdded = append(notAdded, kbUser)
   453  				continue
   454  			}
   455  
   456  			username, uv, invite, err := tx.AddOrInviteMemberCandidate(ctx, candidate, user.Role, user.BotSettings)
   457  			if err != nil {
   458  				if _, ok := err.(AttemptedInviteSocialOwnerError); ok {
   459  					return err
   460  				}
   461  				return NewAddMembersError(candidate.Full, err)
   462  			}
   463  			var normalizedUsername libkb.NormalizedUsername
   464  			if !username.IsNil() {
   465  				normalizedUsername = username
   466  			}
   467  
   468  			added = append(added, AddMembersRes{
   469  				Invite:   invite,
   470  				Username: normalizedUsername,
   471  			})
   472  			if !uv.IsNil() {
   473  				sweep = append(sweep, sweepEntry{
   474  					Assertion: user.Assertion,
   475  					UV:        uv,
   476  				})
   477  			}
   478  		}
   479  
   480  		// Try to mark completed any invites for the users' social assertions.
   481  		// This can be a time-intensive process since it involves checking proofs.
   482  		// It is limited to a few seconds and failure is non-fatal.
   483  		timeoutCtx, timeoutCancel := context.WithTimeout(ctx, 2*time.Second)
   484  		for _, x := range sweep {
   485  			if err := tx.CompleteSocialInvitesFor(timeoutCtx, x.UV, x.Assertion); err != nil {
   486  				g.Log.CWarningf(ctx, "Failed in CompleteSocialInvitesFor(%v, %v) -> %v", x.UV, x.Assertion, err)
   487  			}
   488  		}
   489  		timeoutCancel()
   490  
   491  		return tx.Post(libkb.NewMetaContext(ctx, g))
   492  	}
   493  
   494  	// try to add
   495  	err = RetryIfPossible(ctx, g, addNonRestrictedMembersFunc)
   496  	if blockError, ok := err.(libkb.TeamContactSettingsBlockError); ok {
   497  		mctx.Debug("AddMembers: initial attempt failed with contact settings error: %v", err)
   498  		uids := blockError.BlockedUIDs()
   499  		if len(uids) == len(users) {
   500  			// If all users can't be added, quit. Do this check before calling
   501  			// `unpackContactRestrictedUsers` to avoid allocating and setting
   502  			// up the uid set if we fall in this case.
   503  			mctx.Debug("AddMembers: initial attempt failed and all users were restricted from being added. Not retrying.")
   504  			return nil, nil, err
   505  		}
   506  		restrictedUsers = unpackContactRestrictedUsers(blockError)
   507  		mctx.Debug("AddMembers: retrying without restricted users: %+v", blockError.BlockedUsernames())
   508  		err = RetryIfPossible(ctx, g, addNonRestrictedMembersFunc)
   509  	}
   510  
   511  	if err != nil {
   512  		return nil, nil, err
   513  	}
   514  	return added, notAdded, nil
   515  }
   516  
   517  func ReAddMemberAfterReset(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   518  	username string) (err error) {
   519  	defer g.CTrace(ctx, fmt.Sprintf("ReAddMemberAfterReset(%v,%v)", teamID, username), &err)()
   520  	err = reAddMemberAfterResetInner(ctx, g, teamID, username)
   521  	switch err.(type) {
   522  	case UserHasNotResetError:
   523  		// No-op is ok
   524  		g.Log.CDebugf(ctx, "suppressing error: %v", err)
   525  		return nil
   526  	default:
   527  		return err
   528  	}
   529  }
   530  
   531  func reAddMemberAfterResetInner(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   532  	username string) error {
   533  	arg := libkb.NewLoadUserArg(g).
   534  		WithNetContext(ctx).
   535  		WithName(username).
   536  		WithPublicKeyOptional().
   537  		WithForcePoll(true)
   538  	upak, _, err := g.GetUPAKLoader().LoadV2(arg)
   539  	if err != nil {
   540  		return err
   541  	}
   542  	_ = g.Pegboard.TrackUPAK(libkb.NewMetaContext(ctx, g), upak.Current)
   543  	uv := upak.Current.ToUserVersion()
   544  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   545  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, true)
   546  		if err != nil {
   547  			return err
   548  		}
   549  
   550  		// Look for invites first - invite will always be obsoleted (and
   551  		// removed) by membership or another invite; but membership can
   552  		// stay un-removed when superseded by new invite (is removed by
   553  		// new membership though).
   554  		var existingRole keybase1.TeamRole
   555  		var existingBotSettings *keybase1.TeamBotSettings
   556  		invite, existingUV, found := t.FindActiveKeybaseInvite(uv.Uid)
   557  		if found {
   558  			// User is PUKless member.
   559  			existingRole = invite.Role
   560  		} else {
   561  			foundUV, err := t.UserVersionByUID(ctx, uv.Uid)
   562  			if err != nil {
   563  				if _, ok := err.(libkb.NotFoundError); ok {
   564  					// username is neither crypto UV nor keybase invite in
   565  					// that team. bail out.
   566  					return libkb.NotFoundError{Msg: fmt.Sprintf("User %q (%s) is not a member of this team.",
   567  						username, uv.Uid)}
   568  				}
   569  				// ... or something else failed
   570  				return err
   571  			}
   572  
   573  			// User is existing crypto member - get their current role.
   574  			role, err := t.MemberRole(ctx, foundUV)
   575  			if err != nil {
   576  				return err
   577  			}
   578  			existingRole = role
   579  			existingUV = foundUV
   580  
   581  			if existingRole.IsRestrictedBot() {
   582  				bots, err := t.TeamBotSettings()
   583  				if err != nil {
   584  					return err
   585  				}
   586  				botSettings, ok := bots[existingUV]
   587  				if !ok {
   588  					botSettings = keybase1.TeamBotSettings{}
   589  				}
   590  				existingBotSettings = &botSettings
   591  			}
   592  		}
   593  
   594  		if existingUV.EldestSeqno == uv.EldestSeqno {
   595  			return NewUserHasNotResetError("user %s has not reset, no need to re-add, existing: %v new: %v",
   596  				username, existingUV.EldestSeqno, uv.EldestSeqno)
   597  		}
   598  
   599  		hasPUK := len(upak.Current.PerUserKeys) > 0
   600  
   601  		loggedInRole, err := t.myRole(ctx)
   602  		if err != nil {
   603  			return err
   604  		}
   605  
   606  		targetRole := existingRole
   607  		if existingRole.IsOrAbove(loggedInRole) {
   608  			// If an admin is trying to re-add an owner, re-add them as an admin.
   609  			// An admin cannot grant owner privileges, so this is the best we can do.
   610  			targetRole = loggedInRole
   611  		}
   612  
   613  		if !t.IsImplicit() {
   614  			_, err = AddMemberByID(ctx, g, t.ID, username, targetRole, existingBotSettings, nil /* emailInviteMsg */)
   615  			return err
   616  		}
   617  
   618  		tx := CreateAddMemberTx(t)
   619  		tx.AllowPUKless = true
   620  		if err := tx.ReAddMemberToImplicitTeam(ctx, uv, hasPUK, targetRole, existingBotSettings); err != nil {
   621  			return err
   622  		}
   623  
   624  		return tx.Post(libkb.NewMetaContext(ctx, g))
   625  	})
   626  }
   627  
   628  func InviteEmailPhoneMember(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, name string, typ string, role keybase1.TeamRole) error {
   629  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   630  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, true)
   631  		if err != nil {
   632  			return err
   633  		}
   634  
   635  		return t.InviteEmailPhoneMember(ctx, name, role, typ)
   636  	})
   637  }
   638  
   639  func AddEmailsBulk(ctx context.Context, g *libkb.GlobalContext, teamname, emails string, role keybase1.TeamRole) (res keybase1.BulkRes, err error) {
   640  	mctx := libkb.NewMetaContext(ctx, g)
   641  
   642  	mctx.Debug("parsing email list for team %q", teamname)
   643  
   644  	actx := mctx.G().MakeAssertionContext(mctx)
   645  
   646  	emailList := email_utils.ParseSeparatedEmails(mctx, emails, &res.Malformed)
   647  	var toAdd []keybase1.UserRolePair
   648  	for _, email := range emailList {
   649  		assertion, err := libkb.ParseAssertionURLKeyValue(actx, "email", email, false /* strict */)
   650  		if err != nil {
   651  			res.Malformed = append(res.Malformed, email)
   652  			mctx.Debug("Failed to create assertion from email %q: %s", email, err)
   653  			continue
   654  		}
   655  		toAdd = append(toAdd, keybase1.UserRolePair{Assertion: assertion.String(), Role: role})
   656  	}
   657  
   658  	if len(toAdd) == 0 {
   659  		// Nothing to do.
   660  		return res, nil
   661  	}
   662  
   663  	t, err := GetForTeamManagementByStringName(ctx, g, teamname, true)
   664  	if err != nil {
   665  		return res, err
   666  	}
   667  
   668  	_, _, err = AddMembers(ctx, g, t.ID, toAdd, nil /* emailInviteMsg */)
   669  	return res, err
   670  }
   671  
   672  func EditMember(ctx context.Context, g *libkb.GlobalContext, teamname, username string,
   673  	role keybase1.TeamRole, botSettings *keybase1.TeamBotSettings) error {
   674  	teamGetter := func() (*Team, error) { return GetForTeamManagementByStringName(ctx, g, teamname, true) }
   675  	return editMember(ctx, g, teamGetter, username, role, botSettings)
   676  }
   677  
   678  func EditMemberByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   679  	username string, role keybase1.TeamRole, botSettings *keybase1.TeamBotSettings) error {
   680  	teamGetter := func() (*Team, error) { return GetForTeamManagementByTeamID(ctx, g, teamID, true) }
   681  	return editMember(ctx, g, teamGetter, username, role, botSettings)
   682  }
   683  
   684  func EditMembers(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, users []keybase1.UserRolePair) (res keybase1.TeamEditMembersResult, err error) {
   685  	var failedToEdit []keybase1.UserRolePair
   686  
   687  	for _, userRolePair := range users {
   688  		err := EditMemberByID(ctx, g, teamID, userRolePair.Assertion, userRolePair.Role, userRolePair.BotSettings)
   689  		if err != nil {
   690  			failedToEdit = append(failedToEdit, userRolePair)
   691  			continue
   692  		}
   693  	}
   694  
   695  	res = keybase1.TeamEditMembersResult{Failures: failedToEdit}
   696  	return res, nil
   697  }
   698  
   699  func editMember(ctx context.Context, g *libkb.GlobalContext, teamGetter func() (*Team, error),
   700  	username string, role keybase1.TeamRole, botSettings *keybase1.TeamBotSettings) error {
   701  
   702  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   703  	if err == errInviteRequired {
   704  		return editMemberInvite(ctx, g, teamGetter, username, role, uv, botSettings)
   705  	}
   706  	if err != nil {
   707  		return err
   708  	}
   709  
   710  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   711  		t, err := teamGetter()
   712  		if err != nil {
   713  			return err
   714  		}
   715  		if !t.IsMember(ctx, uv) {
   716  			return libkb.NotFoundError{Msg: fmt.Sprintf("user %q is not a member of team %q", username, t.Name())}
   717  		}
   718  		existingRole, err := t.MemberRole(ctx, uv)
   719  		if err != nil {
   720  			return err
   721  		}
   722  
   723  		if existingRole == role {
   724  			if !role.IsRestrictedBot() {
   725  				g.Log.CDebugf(ctx, "bailing out, role given is the same as current")
   726  				return nil
   727  			}
   728  			teamBotSettings, err := t.TeamBotSettings()
   729  			if err != nil {
   730  				return err
   731  			}
   732  			existingBotSettings := teamBotSettings[uv]
   733  			if botSettings.Eq(&existingBotSettings) {
   734  				g.Log.CDebugf(ctx, "bailing out, role given is the same as current, botSettings unchanged")
   735  				return nil
   736  			}
   737  		}
   738  
   739  		req, err := reqFromRole(uv, role, botSettings)
   740  		if err != nil {
   741  			return err
   742  		}
   743  
   744  		return t.ChangeMembership(ctx, req)
   745  	})
   746  
   747  }
   748  
   749  func editMemberInvite(ctx context.Context, g *libkb.GlobalContext, teamGetter func() (*Team, error),
   750  	username string, role keybase1.TeamRole,
   751  	uv keybase1.UserVersion, botSettings *keybase1.TeamBotSettings) error {
   752  	t, err := teamGetter()
   753  	if err != nil {
   754  		return err
   755  	}
   756  	g.Log.CDebugf(ctx, "team %s: edit member %s, member is an invite link", t.ID, username)
   757  
   758  	// Note that there could be a problem if removeMemberInvite works but AddMember doesn't
   759  	// as the original invite will be lost. But the user will get an error and can try
   760  	// again.
   761  	if err := removeMemberInvite(ctx, g, t, username, uv); err != nil {
   762  		g.Log.CDebugf(ctx, "editMemberInvite error in removeMemberInvite: %s", err)
   763  		return err
   764  	}
   765  	// use AddMember in case it's possible to add them directly now
   766  	if _, err := AddMemberByID(ctx, g, t.ID, username, role, nil, nil /* emailInviteMsg */); err != nil {
   767  		g.Log.CDebugf(ctx, "editMemberInvite error in AddMember: %s", err)
   768  		return err
   769  	}
   770  	return nil
   771  }
   772  
   773  func SetBotSettings(ctx context.Context, g *libkb.GlobalContext, teamname, username string,
   774  	botSettings keybase1.TeamBotSettings) error {
   775  	teamGetter := func() (*Team, error) {
   776  		return GetForTeamManagementByStringName(ctx, g, teamname, false)
   777  	}
   778  
   779  	return setBotSettings(ctx, g, teamGetter, username, botSettings)
   780  }
   781  
   782  func SetBotSettingsByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   783  	username string, botSettings keybase1.TeamBotSettings) error {
   784  	teamGetter := func() (*Team, error) {
   785  		return GetForTeamManagementByTeamID(ctx, g, teamID, false)
   786  	}
   787  	return setBotSettings(ctx, g, teamGetter, username, botSettings)
   788  }
   789  
   790  func setBotSettings(ctx context.Context, g *libkb.GlobalContext, teamGetter func() (*Team, error),
   791  	username string, botSettings keybase1.TeamBotSettings) error {
   792  
   793  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   794  	if err != nil {
   795  		return err
   796  	}
   797  
   798  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   799  		t, err := teamGetter()
   800  		if err != nil {
   801  			return err
   802  		}
   803  
   804  		if !t.IsMember(ctx, uv) {
   805  			return libkb.NotFoundError{Msg: fmt.Sprintf("user %q is not a member of team %q", username, t.Name())}
   806  		}
   807  		role, err := t.MemberRole(ctx, uv)
   808  		if err != nil {
   809  			return err
   810  		}
   811  		if !role.IsRestrictedBot() {
   812  			return fmt.Errorf("%s is not a %v, but has the role %v",
   813  				username, keybase1.TeamRole_RESTRICTEDBOT, role)
   814  		}
   815  
   816  		return t.PostTeamBotSettings(ctx, map[keybase1.UserVersion]keybase1.TeamBotSettings{
   817  			uv: botSettings,
   818  		})
   819  	})
   820  }
   821  
   822  func GetBotSettings(ctx context.Context, g *libkb.GlobalContext,
   823  	teamname, username string) (res keybase1.TeamBotSettings, err error) {
   824  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
   825  		Name:        teamname,
   826  		ForceRepoll: true,
   827  	})
   828  	if err != nil {
   829  		return res, err
   830  	}
   831  	return getBotSettings(ctx, g, team, username)
   832  }
   833  
   834  func GetBotSettingsByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   835  	username string) (res keybase1.TeamBotSettings, err error) {
   836  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
   837  		ID:          teamID,
   838  		ForceRepoll: true,
   839  	})
   840  	if err != nil {
   841  		return res, err
   842  	}
   843  	return getBotSettings(ctx, g, team, username)
   844  }
   845  
   846  func getBotSettings(ctx context.Context, g *libkb.GlobalContext,
   847  	team *Team, username string) (res keybase1.TeamBotSettings, err error) {
   848  	uv, err := loadUserVersionByUsername(ctx, g, username, true /* useTracking */)
   849  	if err != nil {
   850  		return res, err
   851  	}
   852  
   853  	if !team.IsMember(ctx, uv) {
   854  		return res, libkb.NotFoundError{Msg: fmt.Sprintf("user %q is not a member of team %q", username, team.Name())}
   855  	}
   856  
   857  	role, err := team.MemberRole(ctx, uv)
   858  	if err != nil {
   859  		return res, err
   860  	}
   861  	if !role.IsRestrictedBot() {
   862  		return res, fmt.Errorf("%s is not a %v, but has the role %v",
   863  			username, keybase1.TeamRole_RESTRICTEDBOT, role)
   864  	}
   865  
   866  	botSettings, err := team.TeamBotSettings()
   867  	if err != nil {
   868  		return res, err
   869  	}
   870  	return botSettings[uv], nil
   871  }
   872  
   873  func MemberRole(ctx context.Context, g *libkb.GlobalContext, teamname, username string) (role keybase1.TeamRole, err error) {
   874  	uv, err := loadUserVersionByUsername(ctx, g, username, false /* useTracking */)
   875  	if err != nil {
   876  		return keybase1.TeamRole_NONE, err
   877  	}
   878  
   879  	err = RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   880  		t, err := GetForTeamManagementByStringName(ctx, g, teamname, false)
   881  		if err != nil {
   882  			return err
   883  		}
   884  		// return value assign to escape closure
   885  		role, err = t.MemberRole(ctx, uv)
   886  		return err
   887  	})
   888  	return role, err
   889  }
   890  
   891  func MemberRoleFromID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, username string) (role keybase1.TeamRole, err error) {
   892  	uv, err := loadUserVersionByUsername(ctx, g, username, false /* useTracking */)
   893  	if err != nil {
   894  		return keybase1.TeamRole_NONE, err
   895  	}
   896  
   897  	err = RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
   898  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, false)
   899  		if err != nil {
   900  			return err
   901  		}
   902  		// return value assign to escape closure
   903  		role, err = t.MemberRole(ctx, uv)
   904  		return err
   905  	})
   906  	return role, err
   907  }
   908  
   909  func RemoveMemberSingle(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   910  	member keybase1.TeamMemberToRemove) (err error) {
   911  	members := []keybase1.TeamMemberToRemove{member}
   912  	res, err := RemoveMembers(ctx, g, teamID, members, false /* NoErrorOnPartialFailure */)
   913  	if err != nil {
   914  		msg := fmt.Sprintf("failed to remove member: %s", err)
   915  		if len(res.Failures) > 0 {
   916  			if res.Failures[0].ErrorAtTarget != nil {
   917  				msg += "; " + *res.Failures[0].ErrorAtTarget
   918  			}
   919  			if res.Failures[0].ErrorAtSubtree != nil {
   920  				msg += "; " + *res.Failures[0].ErrorAtSubtree
   921  			}
   922  		}
   923  		err = errors.New(msg)
   924  	}
   925  	return err
   926  }
   927  
   928  func RemoveMembers(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID,
   929  	members []keybase1.TeamMemberToRemove, shouldNotErrorOnPartialFailure bool,
   930  ) (res keybase1.TeamRemoveMembersResult, err error) {
   931  	mctx := libkb.NewMetaContext(ctx, g)
   932  
   933  	// Preliminary checks
   934  	for _, member := range members {
   935  		typ, err := member.Type()
   936  		if err != nil {
   937  			return res, err
   938  		}
   939  		switch typ {
   940  		case keybase1.TeamMemberToRemoveType_ASSERTION:
   941  		case keybase1.TeamMemberToRemoveType_INVITEID:
   942  		default:
   943  			return res, fmt.Errorf("unknown TeamMemberToRemoveType %v", typ)
   944  		}
   945  	}
   946  
   947  	// Removals
   948  	teamGetter := func() (*Team, error) {
   949  		return GetForTeamManagementByTeamID(ctx, g, teamID, true /* needAdmin */)
   950  	}
   951  	errstrp := func(e error) *string {
   952  		if e == nil {
   953  			return nil
   954  		}
   955  		s := e.Error()
   956  		return &s
   957  	}
   958  	var failures []keybase1.RemoveTeamMemberFailure
   959  	for _, member := range members {
   960  		typ, _ := member.Type()
   961  		switch typ {
   962  		case keybase1.TeamMemberToRemoveType_ASSERTION:
   963  			targetErr := remove(ctx, g, teamGetter, member.Assertion().Assertion)
   964  			var subtreeErr error
   965  			if member.Assertion().RemoveFromSubtree {
   966  				if targetErr == nil {
   967  					subtreeErr = removeMemberFromSubtree(mctx, teamID, member.Assertion().Assertion)
   968  				} else {
   969  					subtreeErr = errors.New("did not attempt to remove from subtree since removal failed at specified team")
   970  				}
   971  			}
   972  			if targetErr != nil || subtreeErr != nil {
   973  				failures = append(failures, keybase1.RemoveTeamMemberFailure{
   974  					TeamMember:     member,
   975  					ErrorAtTarget:  errstrp(targetErr),
   976  					ErrorAtSubtree: errstrp(subtreeErr),
   977  				})
   978  			}
   979  		case keybase1.TeamMemberToRemoveType_INVITEID:
   980  			targetErr := CancelInviteByID(ctx, g, teamID, member.Inviteid().InviteID)
   981  			if targetErr != nil {
   982  				failures = append(failures, keybase1.RemoveTeamMemberFailure{
   983  					TeamMember:     member,
   984  					ErrorAtSubtree: errstrp(targetErr),
   985  				})
   986  			}
   987  		}
   988  	}
   989  
   990  	if !shouldNotErrorOnPartialFailure && len(failures) > 0 {
   991  		err = fmt.Errorf("failed to remove %d members", len(failures))
   992  	} else {
   993  		err = nil
   994  	}
   995  	return keybase1.TeamRemoveMembersResult{Failures: failures}, err
   996  }
   997  
   998  // removeMemberFromSubtree removes member from all teams in the subtree of targetTeamID,
   999  // *not including* targetTeamID itself
  1000  func removeMemberFromSubtree(mctx libkb.MetaContext, targetTeamID keybase1.TeamID,
  1001  	assertion string) error {
  1002  	// We don't care about the roles; we just want the list of teams. So we can pass our
  1003  	// own username.
  1004  	myUsername := mctx.G().Env.GetUsername()
  1005  	guid := 0
  1006  	treeloader, err := NewTreeloader(mctx, myUsername.String(), targetTeamID, guid,
  1007  		false /* includeAncestors */)
  1008  	if err != nil {
  1009  		return fmt.Errorf("could not start loading subteams: %w", err)
  1010  	}
  1011  	// All or nothing; we can assume all results will be OK.
  1012  	teamTreeMemberships, err := treeloader.LoadSync(mctx)
  1013  	if err != nil {
  1014  		return fmt.Errorf("could not load subteams: %w", err)
  1015  	}
  1016  	var errs []error
  1017  	for _, membership := range teamTreeMemberships {
  1018  		status, _ := membership.Result.S()
  1019  		if status != keybase1.TeamTreeMembershipStatus_OK {
  1020  			return fmt.Errorf("removeMemberFromSubtree: unexpectedly got a non-OK status from Treeloader.LoadSync: %v", status)
  1021  		}
  1022  
  1023  		teamID := membership.Result.Ok().TeamID
  1024  
  1025  		// Don't remove member from the targetTeam; just the subtree
  1026  		if teamID == targetTeamID {
  1027  			continue
  1028  		}
  1029  
  1030  		teamGetter := func() (*Team, error) {
  1031  			return GetForTeamManagementByTeamID(mctx.Ctx(), mctx.G(), teamID, true /* needAdmin */)
  1032  		}
  1033  
  1034  		removeErr := remove(mctx.Ctx(), mctx.G(), teamGetter, assertion)
  1035  		var memberNotFoundErr *MemberNotFoundInChainError
  1036  		switch {
  1037  		case removeErr == nil:
  1038  		case errors.As(removeErr, &memberNotFoundErr):
  1039  			// If the member was not found in the sigchain (either via invite or cryptomember), we can
  1040  			// ignore the error. Because we got team memberships for ourselves and not the user, we
  1041  			// can't use the membership data provided by the Treeloader. (We're not using the
  1042  			// membership data from the treeloader because it does not support looking up by invites).
  1043  		default:
  1044  			errs = append(errs, fmt.Errorf("failed to remove from %s: %w",
  1045  				membership.TeamName, removeErr))
  1046  		}
  1047  	}
  1048  	return libkb.CombineErrors(errs...)
  1049  }
  1050  
  1051  func RemoveMemberByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, username string) error {
  1052  	teamGetter := func() (*Team, error) {
  1053  		return GetForTeamManagementByTeamID(ctx, g, teamID, true)
  1054  	}
  1055  	return remove(ctx, g, teamGetter, username)
  1056  }
  1057  
  1058  // RemoveMember removes members by username or assertions. For a function that can handle removal
  1059  // from subteams and inviteIDs, see RemoveMemberSingle and RemoveMembers.
  1060  func RemoveMember(ctx context.Context, g *libkb.GlobalContext, teamName string, username string) error {
  1061  	teamGetter := func() (*Team, error) {
  1062  		return GetForTeamManagementByStringName(ctx, g, teamName, true)
  1063  	}
  1064  	return remove(ctx, g, teamGetter, username)
  1065  }
  1066  
  1067  func remove(ctx context.Context, g *libkb.GlobalContext, teamGetter func() (*Team, error), username string) error {
  1068  	var inviteRequired bool
  1069  	uv, err := loadUserVersionByUsername(ctx, g, username, false /* useTracking */)
  1070  	if err != nil {
  1071  		switch err {
  1072  		case errInviteRequired:
  1073  			inviteRequired = true
  1074  		case errUserDeleted: // no-op
  1075  		default:
  1076  			return err
  1077  		}
  1078  		g.Log.CDebugf(ctx, "loadUserVersionByUsername(%s) returned %v,%q", username, uv, err)
  1079  	}
  1080  
  1081  	me, err := loadMeForSignatures(ctx, g)
  1082  	if err != nil {
  1083  		return err
  1084  	}
  1085  
  1086  	if me.GetNormalizedName().Eq(libkb.NewNormalizedUsername(username)) {
  1087  		return leave(ctx, g, teamGetter, false)
  1088  	}
  1089  
  1090  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1091  		t, err := teamGetter()
  1092  		if err != nil {
  1093  			return err
  1094  		}
  1095  
  1096  		if inviteRequired && !uv.Uid.Exists() {
  1097  			// Remove a non-keybase invite.
  1098  			return removeMemberInvite(ctx, g, t, username, uv)
  1099  		}
  1100  
  1101  		if _, _, found := t.FindActiveKeybaseInvite(uv.Uid); found {
  1102  			// Remove keybase invites.
  1103  			return removeKeybaseTypeInviteForUID(ctx, g, t, uv.Uid)
  1104  		}
  1105  
  1106  		existingUV, err := t.UserVersionByUID(ctx, uv.Uid)
  1107  		if err != nil {
  1108  			return NewMemberNotFoundInChainError(libkb.NotFoundError{Msg: fmt.Sprintf(
  1109  				"user %q is not a member of team %q", username, t.Name())})
  1110  		}
  1111  
  1112  		removePermanently := t.IsOpen() ||
  1113  			t.WasMostRecentlyAddedByInvitelink(existingUV)
  1114  		req := keybase1.TeamChangeReq{None: []keybase1.UserVersion{existingUV}}
  1115  		opts := ChangeMembershipOptions{
  1116  			Permanent:       removePermanently,
  1117  			SkipKeyRotation: t.CanSkipKeyRotation(),
  1118  		}
  1119  		return t.ChangeMembershipWithOptions(ctx, req, opts)
  1120  	})
  1121  }
  1122  
  1123  func CancelEmailInvite(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, email string) (err error) {
  1124  	g.CTrace(ctx, "CancelEmailInvite", &err)
  1125  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1126  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, true)
  1127  		if err != nil {
  1128  			return err
  1129  		}
  1130  
  1131  		if !libkb.CheckEmail.F(email) {
  1132  			return errors.New("Invalid email address")
  1133  		}
  1134  
  1135  		return removeMemberInviteOfType(ctx, g, t, keybase1.TeamInviteName(email), "email")
  1136  	})
  1137  }
  1138  
  1139  func CancelInviteByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, inviteID keybase1.TeamInviteID) (err error) {
  1140  	g.CTrace(ctx, "CancelInviteByID", &err)
  1141  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1142  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, true)
  1143  		if err != nil {
  1144  			return err
  1145  		}
  1146  
  1147  		// Service-side check for invite id, even though we operate on
  1148  		// TeamInviteID type, API consumer can give us any string.
  1149  		if _, err := keybase1.TeamInviteIDFromString(string(inviteID)); err != nil {
  1150  			return fmt.Errorf("Invalid invite ID: %s", err)
  1151  		}
  1152  
  1153  		return removeInviteID(ctx, t, inviteID)
  1154  	})
  1155  }
  1156  
  1157  func leave(ctx context.Context, g *libkb.GlobalContext, teamGetter func() (*Team, error), permanent bool) error {
  1158  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1159  		t, err := teamGetter()
  1160  		if err != nil {
  1161  			return err
  1162  		}
  1163  		err = t.Leave(ctx, permanent)
  1164  		if err != nil {
  1165  			return err
  1166  		}
  1167  
  1168  		err = FreezeTeam(libkb.NewMetaContext(ctx, g), t.ID)
  1169  		if err != nil {
  1170  			g.Log.CDebugf(ctx, "leave FreezeTeam error: %+v", err)
  1171  		}
  1172  
  1173  		return nil
  1174  	})
  1175  }
  1176  
  1177  func LeaveByID(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID, permanent bool) error {
  1178  	teamGetter := func() (*Team, error) {
  1179  		return GetForTeamManagementByTeamID(ctx, g, teamID, false)
  1180  	}
  1181  	return leave(ctx, g, teamGetter, permanent)
  1182  }
  1183  
  1184  func Leave(ctx context.Context, g *libkb.GlobalContext, teamname string, permanent bool) error {
  1185  	teamGetter := func() (*Team, error) {
  1186  		return GetForTeamManagementByStringName(ctx, g, teamname, false)
  1187  	}
  1188  	return leave(ctx, g, teamGetter, permanent)
  1189  }
  1190  
  1191  func Delete(ctx context.Context, g *libkb.GlobalContext, ui keybase1.TeamsUiInterface, teamID keybase1.TeamID) error {
  1192  	alreadyConfirmed := false
  1193  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1194  		t, err := GetForTeamManagementByTeamID(ctx, g, teamID, true)
  1195  		if err != nil {
  1196  			return err
  1197  		}
  1198  
  1199  		if !alreadyConfirmed {
  1200  			var confirmed bool
  1201  			if t.chain().IsSubteam() {
  1202  				confirmed, err = ui.ConfirmSubteamDelete(ctx, keybase1.ConfirmSubteamDeleteArg{TeamName: t.Name().String()})
  1203  			} else {
  1204  				confirmed, err = ui.ConfirmRootTeamDelete(ctx, keybase1.ConfirmRootTeamDeleteArg{TeamName: t.Name().String()})
  1205  			}
  1206  			if err != nil {
  1207  				return err
  1208  			}
  1209  			if !confirmed {
  1210  				return errors.New("team delete not confirmed")
  1211  			}
  1212  			alreadyConfirmed = true
  1213  		}
  1214  
  1215  		if t.chain().IsSubteam() {
  1216  			err = t.deleteSubteam(ctx)
  1217  		} else {
  1218  			err = t.deleteRoot(ctx)
  1219  		}
  1220  		if err != nil {
  1221  			return err
  1222  		}
  1223  
  1224  		err = TombstoneTeam(libkb.NewMetaContext(ctx, g), t.ID)
  1225  		if err != nil {
  1226  			g.Log.CDebugf(ctx, "Delete TombstoneTeam error: %+v", err)
  1227  			if g.Env.GetRunMode() == libkb.DevelRunMode {
  1228  				return err
  1229  			}
  1230  		}
  1231  
  1232  		return nil
  1233  	})
  1234  }
  1235  
  1236  func AcceptServerTrustInvite(ctx context.Context, g *libkb.GlobalContext, token string) error {
  1237  	mctx := libkb.NewMetaContext(ctx, g)
  1238  	arg := apiArg("team/token")
  1239  	arg.Args.Add("token", libkb.S{Val: token})
  1240  	_, err := mctx.G().API.Post(mctx, arg)
  1241  	return err
  1242  }
  1243  
  1244  func ChangeRoles(ctx context.Context, g *libkb.GlobalContext, teamname string, req keybase1.TeamChangeReq) error {
  1245  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1246  		// Don't needAdmin because we might be leaving, and this needs no information from stubbable links.
  1247  		t, err := GetForTeamManagementByStringName(ctx, g, teamname, false)
  1248  		if err != nil {
  1249  			return err
  1250  		}
  1251  		return t.ChangeMembership(ctx, req)
  1252  	})
  1253  }
  1254  
  1255  var errInviteRequired = errors.New("invite required for username")
  1256  var errUserDeleted = errors.New("user is deleted")
  1257  
  1258  // loadUserVersionByUsername is a wrapper around `engine.ResolveAndCheck` to
  1259  // return UV by username or assertion. When the argument does not resolve to a
  1260  // Keybase user with PUK, `errInviteRequired` is returned.
  1261  //
  1262  // Returns `errInviteRequired` if given argument cannot be brought in as a
  1263  // crypto member - so it is either a reset and not provisioned Keybase user
  1264  // (keybase-type invite is required), or a social assertion that does not
  1265  // resolve to a user.
  1266  //
  1267  // NOTE: This also doesn't try to resolve server-trust assertions.
  1268  func loadUserVersionByUsername(ctx context.Context, g *libkb.GlobalContext, username string, useTracking bool) (keybase1.UserVersion, error) {
  1269  	m := libkb.NewMetaContext(ctx, g)
  1270  	upk, err := engine.ResolveAndCheck(m, username, useTracking)
  1271  	if err != nil {
  1272  		if e, ok := err.(libkb.ResolutionError); ok && e.Kind == libkb.ResolutionErrorNotFound {
  1273  			// couldn't find a keybase user for username assertion
  1274  			return keybase1.UserVersion{}, errInviteRequired
  1275  		}
  1276  		return keybase1.UserVersion{}, err
  1277  	}
  1278  
  1279  	return filterUserCornerCases(ctx, upk)
  1280  }
  1281  
  1282  func loadUserVersionByUID(ctx context.Context, g *libkb.GlobalContext, uid keybase1.UID) (keybase1.UserVersion, error) {
  1283  	upak, err := loadUPAK2(ctx, g, uid, true /*forcePoll */)
  1284  	if err != nil {
  1285  		return keybase1.UserVersion{}, err
  1286  	}
  1287  	return filterUserCornerCases(ctx, upak.Current)
  1288  }
  1289  
  1290  func filterUserCornerCases(ctx context.Context, upak keybase1.UserPlusKeysV2) (keybase1.UserVersion, error) {
  1291  	uv := upak.ToUserVersion()
  1292  	if upak.Status == keybase1.StatusCode_SCDeleted {
  1293  		return uv, errUserDeleted
  1294  	}
  1295  	if len(upak.PerUserKeys) == 0 {
  1296  		return uv, errInviteRequired
  1297  	}
  1298  	return uv, nil
  1299  }
  1300  
  1301  func reqFromRole(uv keybase1.UserVersion, role keybase1.TeamRole, botSettings *keybase1.TeamBotSettings) (req keybase1.TeamChangeReq, err error) {
  1302  	list := []keybase1.UserVersion{uv}
  1303  	if !role.IsRestrictedBot() && botSettings != nil {
  1304  		return req, fmt.Errorf("Unexpected botSettings for role %v", role)
  1305  	}
  1306  	switch role {
  1307  	case keybase1.TeamRole_OWNER:
  1308  		req.Owners = list
  1309  	case keybase1.TeamRole_ADMIN:
  1310  		req.Admins = list
  1311  	case keybase1.TeamRole_WRITER:
  1312  		req.Writers = list
  1313  	case keybase1.TeamRole_READER:
  1314  		req.Readers = list
  1315  	case keybase1.TeamRole_BOT:
  1316  		req.Bots = list
  1317  	case keybase1.TeamRole_RESTRICTEDBOT:
  1318  		if botSettings == nil {
  1319  			return req, errors.New("botSettings must be specified for RESTRICTEDBOT role")
  1320  		}
  1321  		req.RestrictedBots = map[keybase1.UserVersion]keybase1.TeamBotSettings{
  1322  			uv: *botSettings,
  1323  		}
  1324  	default:
  1325  		return req, errors.New("invalid team role")
  1326  	}
  1327  
  1328  	return req, nil
  1329  }
  1330  
  1331  func makeIdentifyLiteRes(id keybase1.TeamID, name keybase1.TeamName) keybase1.IdentifyLiteRes {
  1332  	return keybase1.IdentifyLiteRes{
  1333  		Ul: keybase1.UserOrTeamLite{
  1334  			Id:   id.AsUserOrTeam(),
  1335  			Name: name.String(),
  1336  		},
  1337  	}
  1338  }
  1339  
  1340  func identifyLiteByID(ctx context.Context, g *libkb.GlobalContext, utid keybase1.UserOrTeamID, id2 keybase1.TeamID) (res keybase1.IdentifyLiteRes, err error) {
  1341  
  1342  	var id1 keybase1.TeamID
  1343  	if utid.Exists() {
  1344  		id1, err = utid.AsTeam()
  1345  		if err != nil {
  1346  			return res, err
  1347  		}
  1348  	}
  1349  
  1350  	if id1.Exists() && id2.Exists() && !id1.Eq(id2) {
  1351  		return res, errors.New("two team IDs given that don't match")
  1352  	}
  1353  	if !id1.Exists() {
  1354  		id1 = id2
  1355  	}
  1356  	if !id1.Exists() {
  1357  		return res, errors.New("empty IDs given")
  1358  	}
  1359  	var name keybase1.TeamName
  1360  	name, err = ResolveIDToName(ctx, g, id1)
  1361  	if err != nil {
  1362  		return res, err
  1363  	}
  1364  
  1365  	return makeIdentifyLiteRes(id1, name), nil
  1366  }
  1367  
  1368  func identifyLiteByName(ctx context.Context, g *libkb.GlobalContext, name keybase1.TeamName) (res keybase1.IdentifyLiteRes, err error) {
  1369  	var id keybase1.TeamID
  1370  	id, err = ResolveNameToID(ctx, g, name)
  1371  	if err != nil {
  1372  		return res, err
  1373  	}
  1374  	return makeIdentifyLiteRes(id, name), nil
  1375  }
  1376  
  1377  func IdentifyLite(ctx context.Context, g *libkb.GlobalContext, arg keybase1.IdentifyLiteArg, au libkb.AssertionURL) (res keybase1.IdentifyLiteRes, err error) {
  1378  
  1379  	if arg.Id.Exists() || au.IsTeamID() {
  1380  		return identifyLiteByID(ctx, g, arg.Id, au.ToTeamID())
  1381  	}
  1382  	if au.IsTeamName() {
  1383  		return identifyLiteByName(ctx, g, au.ToTeamName())
  1384  	}
  1385  	return res, errors.New("could not identify team by ID or name")
  1386  }
  1387  
  1388  func memberInvite(ctx context.Context, g *libkb.GlobalContext, teamname string, iname keybase1.TeamInviteName, itype keybase1.TeamInviteType) (*keybase1.TeamInvite, error) {
  1389  	t, err := GetForTeamManagementByStringName(ctx, g, teamname, true)
  1390  	if err != nil {
  1391  		return nil, err
  1392  	}
  1393  	return t.chain().FindActiveInvite(iname, itype)
  1394  }
  1395  
  1396  func RequestAccess(ctx context.Context, g *libkb.GlobalContext, teamname string) (keybase1.TeamRequestAccessResult, error) {
  1397  	arg := apiArg("team/request_access")
  1398  	arg.Args.Add("team", libkb.S{Val: teamname})
  1399  	mctx := libkb.NewMetaContext(ctx, g)
  1400  	apiRes, err := g.API.Post(mctx, arg)
  1401  
  1402  	ret := keybase1.TeamRequestAccessResult{}
  1403  	if apiRes != nil && apiRes.Body != nil {
  1404  		// "is_open" key may not be included in result payload and it's
  1405  		// not an error.
  1406  		ret.Open, _ = apiRes.Body.AtKey("is_open").GetBool()
  1407  	}
  1408  	return ret, err
  1409  }
  1410  
  1411  func TeamAcceptInviteOrRequestAccess(ctx context.Context, g *libkb.GlobalContext, ui keybase1.TeamsUiInterface, tokenOrName string) (keybase1.TeamAcceptOrRequestResult, error) {
  1412  	g.Log.CDebugf(ctx, "trying seitan token")
  1413  
  1414  	mctx := libkb.NewMetaContext(ctx, g)
  1415  
  1416  	// If token looks at all like Seitan, don't pass to functions that might log or send to server.
  1417  	maybeSeitanToken, isSeitany := ParseSeitanTokenFromPaste(tokenOrName)
  1418  	if isSeitany {
  1419  		g.Log.CDebugf(ctx, "found seitan-y token")
  1420  		wasSeitan, err := ParseAndAcceptSeitanToken(mctx, ui, maybeSeitanToken)
  1421  		return keybase1.TeamAcceptOrRequestResult{WasSeitan: wasSeitan}, err
  1422  	}
  1423  
  1424  	g.Log.CDebugf(ctx, "trying email-style invite")
  1425  	err := AcceptServerTrustInvite(ctx, g, tokenOrName)
  1426  	if err == nil {
  1427  		return keybase1.TeamAcceptOrRequestResult{
  1428  			WasToken: true,
  1429  		}, nil
  1430  	}
  1431  	g.Log.CDebugf(ctx, "email-style invite error: %v", err)
  1432  	var reportErr error
  1433  	switch err := err.(type) {
  1434  	case libkb.TeamInviteTokenReusedError:
  1435  		reportErr = err
  1436  	default:
  1437  		reportErr = libkb.TeamInviteBadTokenError{}
  1438  	}
  1439  
  1440  	g.Log.CDebugf(ctx, "trying team name")
  1441  	_, err = keybase1.TeamNameFromString(tokenOrName)
  1442  	if err == nil {
  1443  		ret2, err := RequestAccess(ctx, g, tokenOrName)
  1444  		ret := keybase1.TeamAcceptOrRequestResult{
  1445  			WasTeamName: true,
  1446  			WasOpenTeam: ret2.Open, // this is probably just false in error case
  1447  		}
  1448  		return ret, err
  1449  	}
  1450  	g.Log.CDebugf(ctx, "not a team name")
  1451  
  1452  	// We don't know what this thing is. Return the error from AcceptInvite.
  1453  	return keybase1.TeamAcceptOrRequestResult{}, reportErr
  1454  }
  1455  
  1456  type accessRequest struct {
  1457  	FQName   string          `json:"fq_name"`
  1458  	TeamID   keybase1.TeamID `json:"team_id"`
  1459  	UID      keybase1.UID    `json:"uid"`
  1460  	Ctime    time.Time       `json:"ctime"`
  1461  	Username string          `json:"username"`
  1462  }
  1463  
  1464  type accessRequestList struct {
  1465  	Requests []accessRequest `json:"requests"`
  1466  	Status   libkb.AppStatus `json:"status"`
  1467  }
  1468  
  1469  func (r *accessRequestList) GetAppStatus() *libkb.AppStatus {
  1470  	return &r.Status
  1471  }
  1472  
  1473  // Lists all requests in all of user-owned teams or a single team and tries to
  1474  // resolve their full names.
  1475  //
  1476  // Full names are not guaranteed to be present in the response. Given a large
  1477  // enough volume of access requests by unknown (to us) users, it's possible to
  1478  // run into a scenario where resolving thousands of username bundles would take
  1479  // longer than the 10s.
  1480  func ListRequests(ctx context.Context, g *libkb.GlobalContext, teamName *string) ([]keybase1.TeamJoinRequest, error) {
  1481  	var arg libkb.APIArg
  1482  	mctx := libkb.NewMetaContext(ctx, g)
  1483  	if teamName != nil {
  1484  		arg = apiArg("team/access_requests")
  1485  		arg.Args.Add("team", libkb.S{Val: *teamName})
  1486  	} else {
  1487  		arg = apiArg("team/laar")
  1488  	}
  1489  
  1490  	var arList accessRequestList
  1491  	if err := mctx.G().API.GetDecode(mctx, arg, &arList); err != nil {
  1492  		return nil, err
  1493  	}
  1494  
  1495  	var (
  1496  		joinRequests  = make([]keybase1.TeamJoinRequest, len(arList.Requests))
  1497  		requesterUIDs = make([]keybase1.UID, len(arList.Requests))
  1498  	)
  1499  	for i, ar := range arList.Requests {
  1500  		username := libkb.NewNormalizedUsername(ar.Username)
  1501  		uid := libkb.GetUIDByNormalizedUsername(g, username)
  1502  
  1503  		requesterUIDs[i] = uid
  1504  		joinRequests[i] = keybase1.TeamJoinRequest{
  1505  			Name:     ar.FQName,
  1506  			Username: username.String(),
  1507  			Ctime:    keybase1.ToUnixTime(ar.Ctime),
  1508  		}
  1509  	}
  1510  
  1511  	packages, err := g.UIDMapper.MapUIDsToUsernamePackages(ctx, g, requesterUIDs,
  1512  		defaultFullnameFreshness, 10*time.Second, true /* forceNetworkForFullNames */)
  1513  	if err != nil {
  1514  		g.Log.Debug("TeamsListRequests: failed to run uid mapper: %s", err)
  1515  	}
  1516  	for i, uid := range requesterUIDs {
  1517  		if packages[i].NormalizedUsername.IsNil() {
  1518  			g.Log.Debug("TeamsListRequests: failed to get username for: %s", uid)
  1519  			continue
  1520  		}
  1521  		if packages[i].FullName != nil {
  1522  			joinRequests[i].FullName = packages[i].FullName.FullName
  1523  		}
  1524  	}
  1525  
  1526  	return joinRequests, nil
  1527  }
  1528  
  1529  type myAccessRequestsList struct {
  1530  	Requests []struct {
  1531  		FQName string          `json:"fq_name"`
  1532  		TeamID keybase1.TeamID `json:"team_id"`
  1533  	} `json:"requests"`
  1534  	Status libkb.AppStatus `json:"status"`
  1535  }
  1536  
  1537  func (r *myAccessRequestsList) GetAppStatus() *libkb.AppStatus {
  1538  	return &r.Status
  1539  }
  1540  
  1541  func ListMyAccessRequests(ctx context.Context, g *libkb.GlobalContext, teamName *string) (res []keybase1.TeamName, err error) {
  1542  	mctx := libkb.NewMetaContext(ctx, g)
  1543  	arg := apiArg("team/my_access_requests")
  1544  	if teamName != nil {
  1545  		arg.Args.Add("team", libkb.S{Val: *teamName})
  1546  	}
  1547  
  1548  	var arList myAccessRequestsList
  1549  	if err := mctx.G().API.GetDecode(mctx, arg, &arList); err != nil {
  1550  		return nil, err
  1551  	}
  1552  
  1553  	for _, req := range arList.Requests {
  1554  		name, err := keybase1.TeamNameFromString(req.FQName)
  1555  		if err != nil {
  1556  			return nil, err
  1557  		}
  1558  		res = append(res, name)
  1559  	}
  1560  
  1561  	return res, nil
  1562  }
  1563  
  1564  func IgnoreRequest(ctx context.Context, g *libkb.GlobalContext, teamName, username string) error {
  1565  	mctx := libkb.NewMetaContext(ctx, g)
  1566  	uv, err := loadUserVersionByUsername(ctx, g, username, false /* useTracking */)
  1567  	if err != nil {
  1568  		if err == errInviteRequired {
  1569  			return libkb.NotFoundError{
  1570  				Msg: fmt.Sprintf("No keybase user found (%s)", username),
  1571  			}
  1572  		}
  1573  		return err
  1574  	}
  1575  	arg := apiArg("team/deny_access")
  1576  	arg.Args.Add("team", libkb.S{Val: teamName})
  1577  	arg.Args.Add("uid", libkb.S{Val: uv.Uid.String()})
  1578  	if _, err := mctx.G().API.Post(mctx, arg); err != nil {
  1579  		return err
  1580  	}
  1581  	t, err := GetForTeamManagementByStringName(ctx, g, teamName, true)
  1582  	if err != nil {
  1583  		return err
  1584  	}
  1585  	return t.notifyNoChainChange(ctx, keybase1.TeamChangeSet{Misc: true})
  1586  }
  1587  
  1588  func apiArg(endpoint string) libkb.APIArg {
  1589  	arg := libkb.NewAPIArg(endpoint)
  1590  	arg.Args = libkb.NewHTTPArgs()
  1591  	arg.SessionType = libkb.APISessionTypeREQUIRED
  1592  	return arg
  1593  }
  1594  
  1595  func GetRootID(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID) (keybase1.TeamID, error) {
  1596  	team, _, err := g.GetTeamLoader().Load(ctx, keybase1.LoadTeamArg{
  1597  		ID:      id,
  1598  		Public:  id.IsPublic(),
  1599  		StaleOK: true,
  1600  	})
  1601  
  1602  	if err != nil {
  1603  		return keybase1.TeamID(""), err
  1604  	}
  1605  
  1606  	return team.Name.RootAncestorName().ToTeamID(id.IsPublic()), nil
  1607  }
  1608  
  1609  func ChangeTeamSettings(ctx context.Context, g *libkb.GlobalContext, teamName string, settings keybase1.TeamSettings) error {
  1610  	mctx := libkb.NewMetaContext(ctx, g)
  1611  	id, err := GetTeamIDByNameRPC(mctx, teamName)
  1612  	if err != nil {
  1613  		return err
  1614  	}
  1615  	return ChangeTeamSettingsByID(ctx, g, id, settings)
  1616  }
  1617  
  1618  func ChangeTeamSettingsByID(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID,
  1619  	settings keybase1.TeamSettings) error {
  1620  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1621  		t, err := GetForTeamManagementByTeamID(ctx, g, id, true)
  1622  		if err != nil {
  1623  			return err
  1624  		}
  1625  
  1626  		if !settings.Open && !t.IsOpen() {
  1627  			g.Log.CDebugf(ctx, "team is already closed, just returning: %s", id)
  1628  			return nil
  1629  		}
  1630  
  1631  		if settings.Open && t.IsOpen() && t.OpenTeamJoinAs() == settings.JoinAs {
  1632  			g.Log.CDebugf(ctx, "team is already open with default role: team: %s role: %s",
  1633  				id, strings.ToLower(t.OpenTeamJoinAs().String()))
  1634  			return nil
  1635  		}
  1636  
  1637  		// Rotate if team is moving from open to closed.
  1638  		rotateKey := t.IsOpen() && !settings.Open
  1639  		return t.PostTeamSettings(ctx, settings, rotateKey)
  1640  	})
  1641  }
  1642  
  1643  func removeMemberInvite(ctx context.Context, g *libkb.GlobalContext, team *Team, username string, uv keybase1.UserVersion) (err error) {
  1644  	g.CTrace(ctx, "removeMemberInvite", &err)
  1645  	var lookingFor keybase1.TeamInviteName
  1646  	var typ string
  1647  	if !uv.IsNil() {
  1648  		lookingFor = uv.TeamInviteName()
  1649  		typ = "keybase"
  1650  	} else {
  1651  		ptyp, name, err := parseSocialAssertion(libkb.NewMetaContext(ctx, g), username)
  1652  		if err != nil {
  1653  			return err
  1654  		}
  1655  		lookingFor = keybase1.TeamInviteName(name)
  1656  		typ = ptyp
  1657  	}
  1658  
  1659  	return removeMemberInviteOfType(ctx, g, team, lookingFor, typ)
  1660  }
  1661  
  1662  func removeMemberInviteOfType(ctx context.Context, g *libkb.GlobalContext, team *Team, inviteName keybase1.TeamInviteName, typ string) error {
  1663  	g.Log.CDebugf(ctx, "looking for active invite in %s for %s/%s", team.Name(), typ, inviteName)
  1664  
  1665  	// make sure this is a valid invite type
  1666  	itype, err := TeamInviteTypeFromString(libkb.NewMetaContext(ctx, g), typ)
  1667  	if err != nil {
  1668  		return err
  1669  	}
  1670  	validatedType, err := itype.String()
  1671  	if err != nil {
  1672  		return err
  1673  	}
  1674  
  1675  	for _, invMD := range team.chain().ActiveInvites() {
  1676  		inv := invMD.Invite
  1677  		invTypeStr, err := inv.Type.String()
  1678  		if err != nil {
  1679  			return err
  1680  		}
  1681  		if invTypeStr != validatedType {
  1682  			continue
  1683  		}
  1684  		if inv.Name != inviteName {
  1685  			continue
  1686  		}
  1687  
  1688  		g.Log.CDebugf(ctx, "found invite %s for %s/%s, removing it", inv.Id, validatedType, inviteName)
  1689  		return removeInviteID(ctx, team, inv.Id)
  1690  	}
  1691  
  1692  	g.Log.CDebugf(ctx, "no invites found to remove for %s/%s", validatedType, inviteName)
  1693  	return NewMemberNotFoundInChainError(libkb.NotFoundError{})
  1694  }
  1695  
  1696  func removeKeybaseTypeInviteForUID(ctx context.Context, g *libkb.GlobalContext, team *Team, uid keybase1.UID) (err error) {
  1697  	g.CTrace(ctx, "removeKeybaseTypeInviteForUID", &err)
  1698  	g.Log.CDebugf(ctx, "looking for active or obsolete keybase-type invite in %s for %s", team.Name(), uid)
  1699  
  1700  	// Remove all invites with given UID, so we don't have to worry
  1701  	// about old teams that might have duplicates.
  1702  
  1703  	var toRemove []keybase1.TeamInviteID
  1704  	allInvites := team.GetActiveAndObsoleteInvites()
  1705  	for _, invite := range allInvites {
  1706  		if inviteUv, err := invite.KeybaseUserVersion(); err == nil {
  1707  			if inviteUv.Uid.Equal(uid) {
  1708  				g.Log.CDebugf(ctx, "found keybase-type invite %s for %s, removing", invite.Id, invite.Name)
  1709  				toRemove = append(toRemove, invite.Id)
  1710  			}
  1711  		}
  1712  	}
  1713  
  1714  	if len(toRemove) > 0 {
  1715  		g.Log.CDebugf(ctx, "found %d keybase-type invites for %s, trying to post remove invite link",
  1716  			len(toRemove), uid)
  1717  		return removeMultipleInviteIDs(ctx, team, toRemove)
  1718  	}
  1719  
  1720  	g.Log.CDebugf(ctx, "no keybase-invites found to remove %s", uid)
  1721  	return NewMemberNotFoundInChainError(libkb.NotFoundError{})
  1722  }
  1723  
  1724  func removeMultipleInviteIDs(ctx context.Context, team *Team, invIDs []keybase1.TeamInviteID) error {
  1725  	var cancelList []SCTeamInviteID
  1726  	for _, invID := range invIDs {
  1727  		cancelList = append(cancelList, SCTeamInviteID(invID))
  1728  	}
  1729  	invites := SCTeamInvites{
  1730  		Cancel: &cancelList,
  1731  	}
  1732  	return team.postTeamInvites(ctx, invites)
  1733  }
  1734  
  1735  func removeInviteID(ctx context.Context, team *Team, invID keybase1.TeamInviteID) (err error) {
  1736  	defer team.MetaContext(ctx).Trace("remoteInviteID", &err)()
  1737  	cancelList := []SCTeamInviteID{SCTeamInviteID(invID)}
  1738  	invites := SCTeamInvites{
  1739  		Cancel: &cancelList,
  1740  	}
  1741  	return team.postTeamInvites(ctx, invites)
  1742  }
  1743  
  1744  func CreateSeitanToken(ctx context.Context, g *libkb.GlobalContext, teamname string, role keybase1.TeamRole, label keybase1.SeitanKeyLabel) (keybase1.SeitanIKey, error) {
  1745  	t, err := GetForTeamManagementByStringName(ctx, g, teamname, true)
  1746  	if err != nil {
  1747  		return "", err
  1748  	}
  1749  	ikey, err := t.InviteSeitan(ctx, role, label)
  1750  	if err != nil {
  1751  		return "", err
  1752  	}
  1753  
  1754  	return keybase1.SeitanIKey(ikey), err
  1755  }
  1756  
  1757  func CreateSeitanTokenV2(ctx context.Context, g *libkb.GlobalContext, teamname string, role keybase1.TeamRole, label keybase1.SeitanKeyLabel) (keybase1.SeitanIKeyV2, error) {
  1758  	t, err := GetForTeamManagementByStringName(ctx, g, teamname, true)
  1759  	if err != nil {
  1760  		return "", err
  1761  	}
  1762  	ikey, err := t.InviteSeitanV2(ctx, role, label)
  1763  	if err != nil {
  1764  		return "", err
  1765  	}
  1766  
  1767  	return keybase1.SeitanIKeyV2(ikey), err
  1768  }
  1769  
  1770  func CreateInvitelink(mctx libkb.MetaContext, teamname string,
  1771  	role keybase1.TeamRole, maxUses keybase1.TeamInviteMaxUses,
  1772  	etime *keybase1.UnixTime) (invitelink keybase1.Invitelink, err error) {
  1773  	t, err := GetForTeamManagementByStringName(mctx.Ctx(), mctx.G(), teamname, true)
  1774  	if err != nil {
  1775  		return invitelink, err
  1776  	}
  1777  	ikey, id, err := t.InviteInvitelink(mctx.Ctx(), role, maxUses, etime)
  1778  	if err != nil {
  1779  		return invitelink, err
  1780  	}
  1781  	shortID, err := id.ToShortInviteID()
  1782  	if err != nil {
  1783  		return invitelink, err
  1784  	}
  1785  	return keybase1.Invitelink{
  1786  		Ikey: ikey,
  1787  		Url:  GenerateInvitelinkURL(mctx, ikey, shortID),
  1788  	}, err
  1789  }
  1790  
  1791  // CreateTLF is called by KBFS when a TLF ID is associated with an implicit team.
  1792  // Should work on either named or implicit teams.
  1793  func CreateTLF(ctx context.Context, g *libkb.GlobalContext, arg keybase1.CreateTLFArg) (err error) {
  1794  	defer g.CTrace(ctx, fmt.Sprintf("CreateTLF(%v)", arg), &err)()
  1795  	ctx = libkb.WithLogTag(ctx, "CREATETLF")
  1796  	return RetryIfPossible(ctx, g, func(ctx context.Context, _ int) error {
  1797  		t, err := GetForTeamManagementByTeamID(ctx, g, arg.TeamID, false)
  1798  		if err != nil {
  1799  			return err
  1800  		}
  1801  		role, err := t.myRole(ctx)
  1802  		if err != nil {
  1803  			return err
  1804  		}
  1805  		if !role.IsWriterOrAbove() {
  1806  			return fmt.Errorf("permission denied: need writer access (or above)")
  1807  		}
  1808  		return t.AssociateWithTLFID(ctx, arg.TlfID)
  1809  	})
  1810  }
  1811  
  1812  func GetKBFSTeamSettings(ctx context.Context, g *libkb.GlobalContext, isPublic bool, teamID keybase1.TeamID) (res keybase1.KBFSTeamSettings, err error) {
  1813  	defer g.CTrace(ctx, fmt.Sprintf("GetKBFSTeamSettings(%v,%v)", isPublic, teamID), &err)()
  1814  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
  1815  		ID:     teamID,
  1816  		Public: isPublic,
  1817  	})
  1818  	if err != nil {
  1819  		return res, err
  1820  	}
  1821  	res.TlfID = team.LatestKBFSTLFID()
  1822  	g.Log.CDebugf(ctx, "res: %+v", res)
  1823  	return res, err
  1824  }
  1825  
  1826  func CanUserPerform(ctx context.Context, g *libkb.GlobalContext, teamname string) (ret keybase1.TeamOperation, err error) {
  1827  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
  1828  		Name:                      teamname,
  1829  		StaleOK:                   true,
  1830  		Public:                    false, // assume private team
  1831  		AllowNameLookupBurstCache: true,
  1832  		AuditMode:                 keybase1.AuditMode_SKIP,
  1833  	})
  1834  	if err != nil {
  1835  		// Note: we eat the error here, assuming it meant this user
  1836  		// is not a member
  1837  		g.Log.CWarningf(ctx, "CanUserPerform team Load failure, continuing: %v)", err)
  1838  		return ret, nil
  1839  	}
  1840  	meUV, err := team.currentUserUV(ctx)
  1841  	if err != nil {
  1842  		return ret, err
  1843  	}
  1844  
  1845  	getIsImplicitAdmin := func() (bool, error) {
  1846  		if team.ID.IsRootTeam() {
  1847  			return false, nil
  1848  		}
  1849  		uvs, err := g.GetTeamLoader().ImplicitAdmins(ctx, team.ID)
  1850  		if err != nil {
  1851  			return false, err
  1852  		}
  1853  		for _, uv := range uvs {
  1854  			if uv == meUV {
  1855  				return true, nil
  1856  			}
  1857  		}
  1858  		return false, nil
  1859  	}
  1860  
  1861  	teamRole, err := team.MemberRole(ctx, meUV)
  1862  	if err != nil {
  1863  		return ret, err
  1864  	}
  1865  
  1866  	isRoleOrAbove := teamRole.IsOrAbove
  1867  
  1868  	canMemberShowcase := func() (bool, error) {
  1869  		if teamRole.IsOrAbove(keybase1.TeamRole_ADMIN) {
  1870  			return true, nil
  1871  		} else if teamRole == keybase1.TeamRole_NONE {
  1872  			return false, nil
  1873  		}
  1874  		showcase, err := GetTeamShowcase(ctx, g, team.ID)
  1875  		if err != nil {
  1876  			return false, err
  1877  		}
  1878  		return showcase.AnyMemberShowcase, nil
  1879  	}
  1880  
  1881  	getHasOtherOwner := func() (bool, error) {
  1882  		owners, err := team.UsersWithRole(keybase1.TeamRole_OWNER)
  1883  		if err != nil {
  1884  			return false, err
  1885  		}
  1886  		if len(owners) > 1 {
  1887  			return true, nil
  1888  		}
  1889  		for _, owner := range owners {
  1890  			if owner == meUV {
  1891  				g.Log.CDebugf(ctx, "hasOtherOwner: I am the sole owner")
  1892  				return false, nil
  1893  			}
  1894  		}
  1895  		return true, nil
  1896  	}
  1897  
  1898  	isBot := isRoleOrAbove(keybase1.TeamRole_BOT)
  1899  	isWriter := isRoleOrAbove(keybase1.TeamRole_WRITER)
  1900  	isAdmin := isRoleOrAbove(keybase1.TeamRole_ADMIN)
  1901  	isOwner := isRoleOrAbove(keybase1.TeamRole_OWNER)
  1902  	isImplicitAdmin, err := getIsImplicitAdmin()
  1903  	if err != nil {
  1904  		return ret, err
  1905  	}
  1906  
  1907  	// team settings
  1908  	ret.ListFirst = isImplicitAdmin
  1909  	ret.JoinTeam = teamRole == keybase1.TeamRole_NONE && isImplicitAdmin
  1910  	ret.SetPublicityAny = isAdmin || isImplicitAdmin
  1911  	ret.ManageMembers = isAdmin || isImplicitAdmin
  1912  	ret.ManageSubteams = isAdmin || isImplicitAdmin
  1913  	ret.RenameTeam = team.IsSubteam() && isImplicitAdmin
  1914  	ret.SetTeamShowcase = isAdmin || isImplicitAdmin
  1915  	ret.ChangeOpenTeam = isAdmin || isImplicitAdmin
  1916  	ret.ChangeTarsDisabled = isAdmin || isImplicitAdmin
  1917  	ret.EditTeamDescription = isAdmin || isImplicitAdmin
  1918  	ret.ManageBots = isAdmin || isImplicitAdmin
  1919  	ret.ManageEmojis = isWriter
  1920  	ret.DeleteOtherEmojis = isAdmin
  1921  	ret.SetMemberShowcase, err = canMemberShowcase()
  1922  	if err != nil {
  1923  		return ret, err
  1924  	}
  1925  	if team.chain().IsSubteam() {
  1926  		ret.DeleteTeam = isImplicitAdmin
  1927  	} else {
  1928  		ret.DeleteTeam = isOwner
  1929  	}
  1930  
  1931  	// only check hasOtherOwner if we have to.
  1932  	if teamRole != keybase1.TeamRole_NONE {
  1933  		leaveTeam := true
  1934  		if isOwner {
  1935  			hasOtherOwner, err := getHasOtherOwner()
  1936  			if err != nil {
  1937  				return ret, err
  1938  			}
  1939  			leaveTeam = hasOtherOwner
  1940  		}
  1941  		ret.LeaveTeam = leaveTeam
  1942  	}
  1943  
  1944  	// chat settings
  1945  	ret.Chat = isBot
  1946  	ret.CreateChannel = isWriter
  1947  	ret.RenameChannel = isWriter
  1948  	ret.EditChannelDescription = isWriter
  1949  	ret.DeleteChannel = isAdmin
  1950  	ret.SetRetentionPolicy = isAdmin
  1951  	ret.SetMinWriterRole = isAdmin
  1952  	ret.DeleteChatHistory = isAdmin
  1953  	ret.DeleteOtherMessages = isAdmin
  1954  	ret.PinMessage = isWriter
  1955  
  1956  	return ret, err
  1957  }
  1958  
  1959  func RotateKey(ctx context.Context, g *libkb.GlobalContext, arg keybase1.TeamRotateKeyArg) (err error) {
  1960  	teamID := arg.TeamID
  1961  	defer g.CTrace(ctx, fmt.Sprintf("RotateKey(%+v)", arg), &err)()
  1962  	return RetryIfPossible(ctx, g, func(ctx context.Context, attempt int) error {
  1963  		team, err := Load(ctx, g, keybase1.LoadTeamArg{
  1964  			ID:          teamID,
  1965  			Public:      teamID.IsPublic(),
  1966  			ForceRepoll: attempt > 0,
  1967  		})
  1968  		if err != nil {
  1969  			return err
  1970  		}
  1971  		return team.Rotate(ctx, arg.Rt)
  1972  	})
  1973  }
  1974  
  1975  func RotateKeyVisible(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID) error {
  1976  	return RotateKey(ctx, g, keybase1.TeamRotateKeyArg{TeamID: id, Rt: keybase1.RotationType_VISIBLE})
  1977  }
  1978  
  1979  func TeamDebug(ctx context.Context, g *libkb.GlobalContext, teamID keybase1.TeamID) (res keybase1.TeamDebugRes, err error) {
  1980  	defer g.CTrace(ctx, fmt.Sprintf("TeamDebug(%v)", teamID), &err)()
  1981  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
  1982  		ID:          teamID,
  1983  		Public:      teamID.IsPublic(),
  1984  		ForceRepoll: true,
  1985  	})
  1986  	if err != nil {
  1987  		return res, err
  1988  	}
  1989  	return keybase1.TeamDebugRes{Chain: team.Data.Chain}, nil
  1990  }
  1991  
  1992  func MapImplicitTeamIDToDisplayName(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID, isPublic bool) (folder keybase1.Folder, err error) {
  1993  
  1994  	team, err := Load(ctx, g, keybase1.LoadTeamArg{
  1995  		ID:     id,
  1996  		Public: isPublic,
  1997  	})
  1998  	if err != nil {
  1999  		return folder, err
  2000  	}
  2001  
  2002  	if !team.IsImplicit() {
  2003  		return folder, NewExplicitTeamOperationError("MapImplicitTeamIDToDisplayName")
  2004  	}
  2005  
  2006  	itdn, err := team.ImplicitTeamDisplayName(ctx)
  2007  	if err != nil {
  2008  		return folder, err
  2009  	}
  2010  
  2011  	folder.Name, err = FormatImplicitTeamDisplayName(ctx, g, itdn)
  2012  	if err != nil {
  2013  		return folder, err
  2014  	}
  2015  	folder.Private = !isPublic
  2016  	if isPublic {
  2017  		folder.FolderType = keybase1.FolderType_PUBLIC
  2018  	} else {
  2019  		folder.FolderType = keybase1.FolderType_PRIVATE
  2020  	}
  2021  	return folder, nil
  2022  }
  2023  
  2024  type disableTARsRes struct {
  2025  	Status   libkb.AppStatus `json:"status"`
  2026  	Disabled bool            `json:"disabled"`
  2027  }
  2028  
  2029  func (c *disableTARsRes) GetAppStatus() *libkb.AppStatus {
  2030  	return &c.Status
  2031  }
  2032  
  2033  func GetTarsDisabled(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID) (bool, error) {
  2034  	mctx := libkb.NewMetaContext(ctx, g)
  2035  	arg := apiArg("team/disable_tars")
  2036  	arg.Args.Add("tid", libkb.S{Val: id.String()})
  2037  	var ret disableTARsRes
  2038  	if err := mctx.G().API.GetDecode(mctx, arg, &ret); err != nil {
  2039  		return false, err
  2040  	}
  2041  
  2042  	return ret.Disabled, nil
  2043  }
  2044  
  2045  func SetTarsDisabled(ctx context.Context, g *libkb.GlobalContext, id keybase1.TeamID, disabled bool) error {
  2046  	mctx := libkb.NewMetaContext(ctx, g)
  2047  	t, err := GetForTeamManagementByTeamID(ctx, g, id, true)
  2048  	if err != nil {
  2049  		return err
  2050  	}
  2051  
  2052  	arg := apiArg("team/disable_tars")
  2053  	arg.Args.Add("tid", libkb.S{Val: id.String()})
  2054  	arg.Args.Add("disabled", libkb.B{Val: disabled})
  2055  	if _, err := mctx.G().API.Post(mctx, arg); err != nil {
  2056  		return err
  2057  	}
  2058  	return t.notifyNoChainChange(ctx, keybase1.TeamChangeSet{Misc: true})
  2059  }
  2060  
  2061  type listProfileAddServerRes struct {
  2062  	libkb.AppStatusEmbed
  2063  	Teams []listProfileAddResEntry `json:"teams"`
  2064  }
  2065  
  2066  type listProfileAddResEntry struct {
  2067  	TeamID     keybase1.TeamID `json:"team_id"`
  2068  	FqName     string          `json:"fq_name"`
  2069  	IsOpenTeam bool            `json:"is_open_team"`
  2070  	// Whether the caller has admin powers.
  2071  	CallerAdmin bool `json:"caller_admin"`
  2072  	// Whether the 'them' user is an explicit member.
  2073  	ThemMember bool `json:"them_member"`
  2074  }
  2075  
  2076  func TeamProfileAddList(ctx context.Context, g *libkb.GlobalContext, username string) (res []keybase1.TeamProfileAddEntry, err error) {
  2077  	uname := kbun.NewNormalizedUsername(username)
  2078  	uid, err := g.GetUPAKLoader().LookupUID(ctx, uname)
  2079  	if err != nil {
  2080  		return nil, err
  2081  	}
  2082  	arg := apiArg("team/list_profile_add")
  2083  	arg.Args.Add("uid", libkb.S{Val: uid.String()})
  2084  	var serverRes listProfileAddServerRes
  2085  	mctx := libkb.NewMetaContext(ctx, g)
  2086  	if err = mctx.G().API.GetDecode(mctx, arg, &serverRes); err != nil {
  2087  		return nil, err
  2088  	}
  2089  	for _, entry := range serverRes.Teams {
  2090  		teamName, err := keybase1.TeamNameFromString(entry.FqName)
  2091  		if err != nil {
  2092  			mctx.Debug("TeamProfileAddList server returned bad team name %v: %v", entry.FqName, err)
  2093  			continue
  2094  		}
  2095  		disabledReason := ""
  2096  		if !entry.CallerAdmin {
  2097  			disabledReason = "Only admins can add people."
  2098  		} else if entry.ThemMember {
  2099  			disabledReason = fmt.Sprintf("%v is already a member.", uname.String())
  2100  		}
  2101  		res = append(res, keybase1.TeamProfileAddEntry{
  2102  			TeamID:         entry.TeamID,
  2103  			TeamName:       teamName,
  2104  			Open:           entry.IsOpenTeam,
  2105  			DisabledReason: disabledReason,
  2106  		})
  2107  	}
  2108  	return res, nil
  2109  }
  2110  
  2111  func ChangeTeamAvatar(mctx libkb.MetaContext, arg keybase1.UploadTeamAvatarArg) error {
  2112  	team, err := Load(mctx.Ctx(), mctx.G(), keybase1.LoadTeamArg{
  2113  		Name:        arg.Teamname,
  2114  		Public:      false,
  2115  		ForceRepoll: false,
  2116  		NeedAdmin:   true,
  2117  	})
  2118  	if err != nil {
  2119  		return fixupTeamGetError(mctx.Ctx(), mctx.G(), err, arg.Teamname, false /* public */)
  2120  	}
  2121  
  2122  	if err := avatars.UploadImage(mctx, arg.Filename, &team.ID, arg.Crop); err != nil {
  2123  		return err
  2124  	}
  2125  
  2126  	if arg.SendChatNotification {
  2127  		SendTeamChatChangeAvatar(mctx, team.Name().String(), mctx.G().Env.GetUsername().String())
  2128  	}
  2129  	return nil
  2130  }
  2131  
  2132  func FindNextMerkleRootAfterRemoval(mctx libkb.MetaContext, arg keybase1.FindNextMerkleRootAfterTeamRemovalBySigningKeyArg) (res keybase1.NextMerkleRootRes, err error) {
  2133  	defer mctx.Trace(fmt.Sprintf("teams.FindNextMerkleRootAfterRemoval(%+v)", arg), &err)()
  2134  
  2135  	team, err := Load(mctx.Ctx(), mctx.G(), keybase1.LoadTeamArg{
  2136  		ID:          arg.Team,
  2137  		Public:      arg.IsPublic,
  2138  		ForceRepoll: false,
  2139  		NeedAdmin:   false,
  2140  	})
  2141  	if err != nil {
  2142  		return res, err
  2143  	}
  2144  	upak, _, err := mctx.G().GetUPAKLoader().LoadV2(libkb.NewLoadUserArgWithMetaContext(mctx).
  2145  		WithUID(arg.Uid).
  2146  		WithPublicKeyOptional().
  2147  		WithForcePoll(false))
  2148  	if err != nil {
  2149  		return res, err
  2150  	}
  2151  
  2152  	vers, _ := upak.FindKID(arg.SigningKey)
  2153  	if vers == nil {
  2154  		return res, libkb.NotFoundError{Msg: fmt.Sprintf("KID %s not found for %s", arg.SigningKey, arg.Uid)}
  2155  	}
  2156  
  2157  	uv := vers.ToUserVersion()
  2158  	logPoints := team.chain().inner.UserLog[uv]
  2159  	demotionPredicate := func(p keybase1.UserLogPoint) bool {
  2160  		if arg.AnyRoleAllowed {
  2161  			return !p.Role.IsBotOrAbove()
  2162  		}
  2163  		return !p.Role.IsWriterOrAbove()
  2164  	}
  2165  	var earliestDemotion int
  2166  	var logPoint *keybase1.UserLogPoint
  2167  	for i := len(logPoints) - 1; i >= 0; i-- {
  2168  		if demotionPredicate(logPoints[i]) {
  2169  			earliestDemotion = i
  2170  		} else if earliestDemotion != 0 {
  2171  			p := logPoints[earliestDemotion].DeepCopy()
  2172  			logPoint = &p
  2173  			break
  2174  		}
  2175  	}
  2176  	if logPoint == nil {
  2177  		return res, libkb.NotFoundError{Msg: "no downgraded log point for user found"}
  2178  	}
  2179  
  2180  	return libkb.FindNextMerkleRootAfterTeamRemoval(mctx, keybase1.FindNextMerkleRootAfterTeamRemovalArg{
  2181  		Uid:               arg.Uid,
  2182  		Team:              arg.Team,
  2183  		IsPublic:          arg.IsPublic,
  2184  		TeamSigchainSeqno: logPoint.SigMeta.SigChainLocation.Seqno,
  2185  		Prev:              logPoint.SigMeta.PrevMerkleRootSigned,
  2186  	})
  2187  }
  2188  
  2189  func ProfileTeamLoad(mctx libkb.MetaContext, arg keybase1.LoadTeamArg) (res keybase1.ProfileTeamLoadRes, err error) {
  2190  	pre := mctx.G().Clock().Now()
  2191  	_, err = Load(mctx.Ctx(), mctx.G(), arg)
  2192  	post := mctx.G().Clock().Now()
  2193  	res.LoadTimeNsec = post.Sub(pre).Nanoseconds()
  2194  	return res, err
  2195  }
  2196  
  2197  func GetTeamIDByNameRPC(mctx libkb.MetaContext, teamName string) (res keybase1.TeamID, err error) {
  2198  	nameParsed, err := keybase1.TeamNameFromString(teamName)
  2199  	if err != nil {
  2200  		return "", err
  2201  	}
  2202  	id, err := ResolveNameToID(mctx.Ctx(), mctx.G(), nameParsed)
  2203  	if err != nil {
  2204  		return "", err
  2205  	}
  2206  	return id, nil
  2207  }
  2208  
  2209  func FindAssertionsInTeamNoResolve(mctx libkb.MetaContext, teamID keybase1.TeamID, assertions []string) (ret []string, err error) {
  2210  	team, err := GetForTeamManagementByTeamID(mctx.Ctx(), mctx.G(), teamID, true /* needAdmin */)
  2211  	if err != nil {
  2212  		return nil, err
  2213  	}
  2214  
  2215  	// Don't check one assertion more than once, if we got duplicates.
  2216  	checkedAssertions := make(map[string]struct{})
  2217  
  2218  	actx := externals.MakeAssertionContext(mctx)
  2219  	for _, assertionStr := range assertions {
  2220  		if _, found := checkedAssertions[assertionStr]; found {
  2221  			continue
  2222  		}
  2223  		checkedAssertions[assertionStr] = struct{}{}
  2224  
  2225  		assertion, err := libkb.AssertionParseAndOnly(actx, assertionStr)
  2226  		if err != nil {
  2227  			return nil, fmt.Errorf("failed to parse assertion %q: %w", assertionStr, err)
  2228  		}
  2229  
  2230  		var url libkb.AssertionURL
  2231  		urls := assertion.CollectUrls(nil)
  2232  		if len(urls) > 1 {
  2233  			// For compound assertions, try to find exactly one Keybase
  2234  			// assertion among the factors. Any other compound assertions
  2235  			// should not have been passed to this function.
  2236  			for _, u := range urls {
  2237  				if u.IsKeybase() {
  2238  					if url != nil {
  2239  						return nil, fmt.Errorf("assertion %q has more than one Keybase username", assertionStr)
  2240  					}
  2241  					url = u
  2242  				}
  2243  			}
  2244  			if url == nil {
  2245  				return nil, fmt.Errorf("assertion %q does not have Keybase username", assertionStr)
  2246  			}
  2247  		} else {
  2248  			url = urls[0]
  2249  		}
  2250  
  2251  		if url.IsKeybase() {
  2252  			// Load the user to get the right eldest seqno. We don't want
  2253  			// untrusted seqnos here from uidmapper, because UI might be
  2254  			// making decisions about whom to add to the team basing on
  2255  			// results from this function.
  2256  			loadUserArg := libkb.NewLoadUserArgWithMetaContext(mctx).WithName(url.GetValue()).WithPublicKeyOptional()
  2257  			user, err := libkb.LoadUser(loadUserArg)
  2258  			if err != nil {
  2259  				if _, ok := err.(libkb.NotFoundError); ok {
  2260  					// User not found - that's fine.
  2261  					continue
  2262  				}
  2263  				return nil, fmt.Errorf("error when loading user for assertion %q: %w", assertionStr, err)
  2264  			}
  2265  			if user.GetStatus() != keybase1.StatusCode_SCOk {
  2266  				// User is deleted or similar. Skip for now.
  2267  				continue
  2268  			}
  2269  			uv := user.ToUserVersion()
  2270  			_, kbInviteUV, found := team.FindActiveKeybaseInvite(user.GetUID())
  2271  			if found && kbInviteUV.Eq(uv) {
  2272  				// Either user still doesn't have a PUK, or if they do, they
  2273  				// should be added automatically through team_rekeyd
  2274  				// notification soon.
  2275  				ret = append(ret, assertionStr)
  2276  				continue
  2277  			}
  2278  
  2279  			teamUVs := team.AllUserVersionsByUID(mctx.Ctx(), user.GetUID())
  2280  			for _, teamUV := range teamUVs {
  2281  				if teamUV.Eq(uv) {
  2282  					ret = append(ret, assertionStr)
  2283  					break
  2284  				}
  2285  				// or else user is in the team but with old UV, so it's fine to
  2286  				// add them again.
  2287  			}
  2288  		} else {
  2289  			social, err := assertion.ToSocialAssertion()
  2290  			if err != nil {
  2291  				return nil, fmt.Errorf(
  2292  					"Don't know what to do with %q - not a social assertion or keybase username: %w",
  2293  					assertionStr, err)
  2294  			}
  2295  			hasInvite, err := team.HasActiveInvite(mctx, social.TeamInviteName(), social.TeamInviteType())
  2296  			if err != nil {
  2297  				return nil, fmt.Errorf("Failed checking %q: %w", assertionStr, err)
  2298  			}
  2299  			if hasInvite {
  2300  				ret = append(ret, assertionStr)
  2301  			}
  2302  		}
  2303  	}
  2304  
  2305  	return ret, nil
  2306  }