repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequence | docstring
stringlengths 6
2.61k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 85
252
| partition
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|
gravitational/teleport | lib/client/redirect.go | callback | func (rd *Redirector) callback(w http.ResponseWriter, r *http.Request) (*auth.SSHLoginResponse, error) {
if r.URL.Path != "/callback" {
return nil, trace.NotFound("path not found")
}
// Decrypt ciphertext to get login response.
plaintext, err := rd.key.Open([]byte(r.URL.Query().Get("response")))
if err != nil {
return nil, trace.BadParameter("failed to decrypt response: in %v, err: %v", r.URL.String(), err)
}
var re *auth.SSHLoginResponse
err = json.Unmarshal(plaintext, &re)
if err != nil {
return nil, trace.BadParameter("failed to decrypt response: in %v, err: %v", r.URL.String(), err)
}
return re, nil
} | go | func (rd *Redirector) callback(w http.ResponseWriter, r *http.Request) (*auth.SSHLoginResponse, error) {
if r.URL.Path != "/callback" {
return nil, trace.NotFound("path not found")
}
// Decrypt ciphertext to get login response.
plaintext, err := rd.key.Open([]byte(r.URL.Query().Get("response")))
if err != nil {
return nil, trace.BadParameter("failed to decrypt response: in %v, err: %v", r.URL.String(), err)
}
var re *auth.SSHLoginResponse
err = json.Unmarshal(plaintext, &re)
if err != nil {
return nil, trace.BadParameter("failed to decrypt response: in %v, err: %v", r.URL.String(), err)
}
return re, nil
} | [
"func",
"(",
"rd",
"*",
"Redirector",
")",
"callback",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"(",
"*",
"auth",
".",
"SSHLoginResponse",
",",
"error",
")",
"{",
"if",
"r",
".",
"URL",
".",
"Path",
"!=",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Decrypt ciphertext to get login response.",
"plaintext",
",",
"err",
":=",
"rd",
".",
"key",
".",
"Open",
"(",
"[",
"]",
"byte",
"(",
"r",
".",
"URL",
".",
"Query",
"(",
")",
".",
"Get",
"(",
"\"",
"\"",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"r",
".",
"URL",
".",
"String",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n\n",
"var",
"re",
"*",
"auth",
".",
"SSHLoginResponse",
"\n",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"plaintext",
",",
"&",
"re",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"r",
".",
"URL",
".",
"String",
"(",
")",
",",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"re",
",",
"nil",
"\n",
"}"
] | // callback is used by Teleport proxy to send back credentials
// issued by Teleport proxy | [
"callback",
"is",
"used",
"by",
"Teleport",
"proxy",
"to",
"send",
"back",
"credentials",
"issued",
"by",
"Teleport",
"proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/redirect.go#L191-L209 | train |
gravitational/teleport | lib/client/redirect.go | Close | func (rd *Redirector) Close() error {
rd.cancel()
if rd.server != nil {
rd.server.Close()
}
return nil
} | go | func (rd *Redirector) Close() error {
rd.cancel()
if rd.server != nil {
rd.server.Close()
}
return nil
} | [
"func",
"(",
"rd",
"*",
"Redirector",
")",
"Close",
"(",
")",
"error",
"{",
"rd",
".",
"cancel",
"(",
")",
"\n",
"if",
"rd",
".",
"server",
"!=",
"nil",
"{",
"rd",
".",
"server",
".",
"Close",
"(",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Close closes redirector and releases all resources | [
"Close",
"closes",
"redirector",
"and",
"releases",
"all",
"resources"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/redirect.go#L212-L218 | train |
gravitational/teleport | lib/client/redirect.go | wrapCallback | func (rd *Redirector) wrapCallback(fn func(http.ResponseWriter, *http.Request) (*auth.SSHLoginResponse, error)) http.Handler {
clone := *rd.proxyURL
clone.Path = "/web/msg/error/login_failed"
errorURL := clone.String()
clone.Path = "/web/msg/info/login_success"
successURL := clone.String()
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
response, err := fn(w, r)
if err != nil {
if trace.IsNotFound(err) {
http.NotFound(w, r)
return
}
select {
case rd.errorC <- err:
case <-rd.context.Done():
http.Redirect(w, r, errorURL, http.StatusFound)
return
}
http.Redirect(w, r, errorURL, http.StatusFound)
return
}
select {
case rd.responseC <- response:
case <-rd.context.Done():
http.Redirect(w, r, errorURL, http.StatusFound)
return
}
http.Redirect(w, r, successURL, http.StatusFound)
})
} | go | func (rd *Redirector) wrapCallback(fn func(http.ResponseWriter, *http.Request) (*auth.SSHLoginResponse, error)) http.Handler {
clone := *rd.proxyURL
clone.Path = "/web/msg/error/login_failed"
errorURL := clone.String()
clone.Path = "/web/msg/info/login_success"
successURL := clone.String()
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
response, err := fn(w, r)
if err != nil {
if trace.IsNotFound(err) {
http.NotFound(w, r)
return
}
select {
case rd.errorC <- err:
case <-rd.context.Done():
http.Redirect(w, r, errorURL, http.StatusFound)
return
}
http.Redirect(w, r, errorURL, http.StatusFound)
return
}
select {
case rd.responseC <- response:
case <-rd.context.Done():
http.Redirect(w, r, errorURL, http.StatusFound)
return
}
http.Redirect(w, r, successURL, http.StatusFound)
})
} | [
"func",
"(",
"rd",
"*",
"Redirector",
")",
"wrapCallback",
"(",
"fn",
"func",
"(",
"http",
".",
"ResponseWriter",
",",
"*",
"http",
".",
"Request",
")",
"(",
"*",
"auth",
".",
"SSHLoginResponse",
",",
"error",
")",
")",
"http",
".",
"Handler",
"{",
"clone",
":=",
"*",
"rd",
".",
"proxyURL",
"\n",
"clone",
".",
"Path",
"=",
"\"",
"\"",
"\n",
"errorURL",
":=",
"clone",
".",
"String",
"(",
")",
"\n",
"clone",
".",
"Path",
"=",
"\"",
"\"",
"\n",
"successURL",
":=",
"clone",
".",
"String",
"(",
")",
"\n\n",
"return",
"http",
".",
"HandlerFunc",
"(",
"func",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"{",
"response",
",",
"err",
":=",
"fn",
"(",
"w",
",",
"r",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"http",
".",
"NotFound",
"(",
"w",
",",
"r",
")",
"\n",
"return",
"\n",
"}",
"\n",
"select",
"{",
"case",
"rd",
".",
"errorC",
"<-",
"err",
":",
"case",
"<-",
"rd",
".",
"context",
".",
"Done",
"(",
")",
":",
"http",
".",
"Redirect",
"(",
"w",
",",
"r",
",",
"errorURL",
",",
"http",
".",
"StatusFound",
")",
"\n",
"return",
"\n",
"}",
"\n",
"http",
".",
"Redirect",
"(",
"w",
",",
"r",
",",
"errorURL",
",",
"http",
".",
"StatusFound",
")",
"\n",
"return",
"\n",
"}",
"\n",
"select",
"{",
"case",
"rd",
".",
"responseC",
"<-",
"response",
":",
"case",
"<-",
"rd",
".",
"context",
".",
"Done",
"(",
")",
":",
"http",
".",
"Redirect",
"(",
"w",
",",
"r",
",",
"errorURL",
",",
"http",
".",
"StatusFound",
")",
"\n",
"return",
"\n",
"}",
"\n",
"http",
".",
"Redirect",
"(",
"w",
",",
"r",
",",
"successURL",
",",
"http",
".",
"StatusFound",
")",
"\n",
"}",
")",
"\n",
"}"
] | // wrapCallback is a helper wrapper method that wraps callback HTTP handler
// and sends a result to the channel and redirect users to error page | [
"wrapCallback",
"is",
"a",
"helper",
"wrapper",
"method",
"that",
"wraps",
"callback",
"HTTP",
"handler",
"and",
"sends",
"a",
"result",
"to",
"the",
"channel",
"and",
"redirect",
"users",
"to",
"error",
"page"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/redirect.go#L222-L253 | train |
gravitational/teleport | lib/services/license.go | NewLicense | func NewLicense(name string, spec LicenseSpecV3) (License, error) {
return &LicenseV3{
Kind: KindLicense,
Version: V3,
Metadata: Metadata{
Name: name,
Namespace: defaults.Namespace,
},
Spec: spec,
}, nil
} | go | func NewLicense(name string, spec LicenseSpecV3) (License, error) {
return &LicenseV3{
Kind: KindLicense,
Version: V3,
Metadata: Metadata{
Name: name,
Namespace: defaults.Namespace,
},
Spec: spec,
}, nil
} | [
"func",
"NewLicense",
"(",
"name",
"string",
",",
"spec",
"LicenseSpecV3",
")",
"(",
"License",
",",
"error",
")",
"{",
"return",
"&",
"LicenseV3",
"{",
"Kind",
":",
"KindLicense",
",",
"Version",
":",
"V3",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"name",
",",
"Namespace",
":",
"defaults",
".",
"Namespace",
",",
"}",
",",
"Spec",
":",
"spec",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewLicense is a convenience method to to create LicenseV3. | [
"NewLicense",
"is",
"a",
"convenience",
"method",
"to",
"to",
"create",
"LicenseV3",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/license.go#L73-L83 | train |
gravitational/teleport | lib/services/license.go | SetLabels | func (c *LicenseV3) SetLabels(labels map[string]string) {
c.Metadata.Labels = labels
} | go | func (c *LicenseV3) SetLabels(labels map[string]string) {
c.Metadata.Labels = labels
} | [
"func",
"(",
"c",
"*",
"LicenseV3",
")",
"SetLabels",
"(",
"labels",
"map",
"[",
"string",
"]",
"string",
")",
"{",
"c",
".",
"Metadata",
".",
"Labels",
"=",
"labels",
"\n",
"}"
] | // SetLabels sets metadata labels | [
"SetLabels",
"sets",
"metadata",
"labels"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/license.go#L139-L141 | train |
gravitational/teleport | lib/services/license.go | String | func (c *LicenseV3) String() string {
var features []string
if !c.Expiry().IsZero() {
features = append(features, fmt.Sprintf("expires at %v", c.Expiry()))
}
if c.Spec.ReportsUsage.Value() {
features = append(features, "reports usage")
}
if c.Spec.SupportsKubernetes.Value() {
features = append(features, "supports kubernetes")
}
if c.Spec.AWSProductID != "" {
features = append(features, fmt.Sprintf("is limited to AWS product ID %q", c.Spec.AWSProductID))
}
if c.Spec.AWSAccountID != "" {
features = append(features, fmt.Sprintf("is limited to AWS account ID %q", c.Spec.AWSAccountID))
}
if len(features) == 0 {
return ""
}
return strings.Join(features, ",")
} | go | func (c *LicenseV3) String() string {
var features []string
if !c.Expiry().IsZero() {
features = append(features, fmt.Sprintf("expires at %v", c.Expiry()))
}
if c.Spec.ReportsUsage.Value() {
features = append(features, "reports usage")
}
if c.Spec.SupportsKubernetes.Value() {
features = append(features, "supports kubernetes")
}
if c.Spec.AWSProductID != "" {
features = append(features, fmt.Sprintf("is limited to AWS product ID %q", c.Spec.AWSProductID))
}
if c.Spec.AWSAccountID != "" {
features = append(features, fmt.Sprintf("is limited to AWS account ID %q", c.Spec.AWSAccountID))
}
if len(features) == 0 {
return ""
}
return strings.Join(features, ",")
} | [
"func",
"(",
"c",
"*",
"LicenseV3",
")",
"String",
"(",
")",
"string",
"{",
"var",
"features",
"[",
"]",
"string",
"\n",
"if",
"!",
"c",
".",
"Expiry",
"(",
")",
".",
"IsZero",
"(",
")",
"{",
"features",
"=",
"append",
"(",
"features",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"c",
".",
"Expiry",
"(",
")",
")",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"Spec",
".",
"ReportsUsage",
".",
"Value",
"(",
")",
"{",
"features",
"=",
"append",
"(",
"features",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"Spec",
".",
"SupportsKubernetes",
".",
"Value",
"(",
")",
"{",
"features",
"=",
"append",
"(",
"features",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"Spec",
".",
"AWSProductID",
"!=",
"\"",
"\"",
"{",
"features",
"=",
"append",
"(",
"features",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"c",
".",
"Spec",
".",
"AWSProductID",
")",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"Spec",
".",
"AWSAccountID",
"!=",
"\"",
"\"",
"{",
"features",
"=",
"append",
"(",
"features",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"c",
".",
"Spec",
".",
"AWSAccountID",
")",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"features",
")",
"==",
"0",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n",
"return",
"strings",
".",
"Join",
"(",
"features",
",",
"\"",
"\"",
")",
"\n",
"}"
] | // String represents a human readable version of license enabled features | [
"String",
"represents",
"a",
"human",
"readable",
"version",
"of",
"license",
"enabled",
"features"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/license.go#L227-L248 | train |
gravitational/teleport | lib/services/license.go | UnmarshalLicense | func UnmarshalLicense(bytes []byte) (License, error) {
if len(bytes) == 0 {
return nil, trace.BadParameter("missing resource data")
}
schema := fmt.Sprintf(V2SchemaTemplate, MetadataSchema, LicenseSpecV3Template, DefaultDefinitions)
var license LicenseV3
err := utils.UnmarshalWithSchema(schema, &license, bytes)
if err != nil {
return nil, trace.BadParameter(err.Error())
}
if license.Version != V3 {
return nil, trace.BadParameter("unsupported version %v, expected version %v", license.Version, V3)
}
if err := license.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return &license, nil
} | go | func UnmarshalLicense(bytes []byte) (License, error) {
if len(bytes) == 0 {
return nil, trace.BadParameter("missing resource data")
}
schema := fmt.Sprintf(V2SchemaTemplate, MetadataSchema, LicenseSpecV3Template, DefaultDefinitions)
var license LicenseV3
err := utils.UnmarshalWithSchema(schema, &license, bytes)
if err != nil {
return nil, trace.BadParameter(err.Error())
}
if license.Version != V3 {
return nil, trace.BadParameter("unsupported version %v, expected version %v", license.Version, V3)
}
if err := license.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return &license, nil
} | [
"func",
"UnmarshalLicense",
"(",
"bytes",
"[",
"]",
"byte",
")",
"(",
"License",
",",
"error",
")",
"{",
"if",
"len",
"(",
"bytes",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"schema",
":=",
"fmt",
".",
"Sprintf",
"(",
"V2SchemaTemplate",
",",
"MetadataSchema",
",",
"LicenseSpecV3Template",
",",
"DefaultDefinitions",
")",
"\n\n",
"var",
"license",
"LicenseV3",
"\n",
"err",
":=",
"utils",
".",
"UnmarshalWithSchema",
"(",
"schema",
",",
"&",
"license",
",",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n\n",
"if",
"license",
".",
"Version",
"!=",
"V3",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"license",
".",
"Version",
",",
"V3",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"license",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"license",
",",
"nil",
"\n",
"}"
] | // UnmarshalLicense unmarshals License from JSON or YAML
// and validates schema | [
"UnmarshalLicense",
"unmarshals",
"License",
"from",
"JSON",
"or",
"YAML",
"and",
"validates",
"schema"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/license.go#L292-L314 | train |
gravitational/teleport | lib/services/license.go | MarshalLicense | func MarshalLicense(license License, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := license.(type) {
case *LicenseV3:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", license)
}
} | go | func MarshalLicense(license License, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := license.(type) {
case *LicenseV3:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", license)
}
} | [
"func",
"MarshalLicense",
"(",
"license",
"License",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"switch",
"resource",
":=",
"license",
".",
"(",
"type",
")",
"{",
"case",
"*",
"LicenseV3",
":",
"if",
"!",
"cfg",
".",
"PreserveResourceID",
"{",
"// avoid modifying the original object",
"// to prevent unexpected data races",
"copy",
":=",
"*",
"resource",
"\n",
"copy",
".",
"SetResourceID",
"(",
"0",
")",
"\n",
"resource",
"=",
"&",
"copy",
"\n",
"}",
"\n",
"return",
"utils",
".",
"FastMarshal",
"(",
"resource",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"license",
")",
"\n",
"}",
"\n",
"}"
] | // MarshalLicense marshals role to JSON or YAML. | [
"MarshalLicense",
"marshals",
"role",
"to",
"JSON",
"or",
"YAML",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/license.go#L317-L335 | train |
gravitational/teleport | lib/reversetunnel/agentpool.go | NewAgentPool | func NewAgentPool(cfg AgentPoolConfig) (*AgentPool, error) {
if err := cfg.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
ctx, cancel := context.WithCancel(cfg.Context)
pool := &AgentPool{
agents: make(map[agentKey][]*Agent),
cfg: cfg,
ctx: ctx,
cancel: cancel,
discoveryC: make(chan *discoveryRequest),
}
pool.Entry = log.WithFields(log.Fields{
trace.Component: teleport.ComponentReverseTunnelAgent,
trace.ComponentFields: log.Fields{
"cluster": cfg.Cluster,
},
})
return pool, nil
} | go | func NewAgentPool(cfg AgentPoolConfig) (*AgentPool, error) {
if err := cfg.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
ctx, cancel := context.WithCancel(cfg.Context)
pool := &AgentPool{
agents: make(map[agentKey][]*Agent),
cfg: cfg,
ctx: ctx,
cancel: cancel,
discoveryC: make(chan *discoveryRequest),
}
pool.Entry = log.WithFields(log.Fields{
trace.Component: teleport.ComponentReverseTunnelAgent,
trace.ComponentFields: log.Fields{
"cluster": cfg.Cluster,
},
})
return pool, nil
} | [
"func",
"NewAgentPool",
"(",
"cfg",
"AgentPoolConfig",
")",
"(",
"*",
"AgentPool",
",",
"error",
")",
"{",
"if",
"err",
":=",
"cfg",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"ctx",
",",
"cancel",
":=",
"context",
".",
"WithCancel",
"(",
"cfg",
".",
"Context",
")",
"\n",
"pool",
":=",
"&",
"AgentPool",
"{",
"agents",
":",
"make",
"(",
"map",
"[",
"agentKey",
"]",
"[",
"]",
"*",
"Agent",
")",
",",
"cfg",
":",
"cfg",
",",
"ctx",
":",
"ctx",
",",
"cancel",
":",
"cancel",
",",
"discoveryC",
":",
"make",
"(",
"chan",
"*",
"discoveryRequest",
")",
",",
"}",
"\n",
"pool",
".",
"Entry",
"=",
"log",
".",
"WithFields",
"(",
"log",
".",
"Fields",
"{",
"trace",
".",
"Component",
":",
"teleport",
".",
"ComponentReverseTunnelAgent",
",",
"trace",
".",
"ComponentFields",
":",
"log",
".",
"Fields",
"{",
"\"",
"\"",
":",
"cfg",
".",
"Cluster",
",",
"}",
",",
"}",
")",
"\n",
"return",
"pool",
",",
"nil",
"\n",
"}"
] | // NewAgentPool returns new isntance of the agent pool | [
"NewAgentPool",
"returns",
"new",
"isntance",
"of",
"the",
"agent",
"pool"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/agentpool.go#L114-L133 | train |
gravitational/teleport | lib/reversetunnel/agentpool.go | reportStats | func (m *AgentPool) reportStats() {
var logReport bool
if m.cfg.Clock.Now().Sub(m.lastReport) > defaults.ReportingPeriod {
m.lastReport = m.cfg.Clock.Now()
logReport = true
}
for key, agents := range m.agents {
m.Debugf("Outbound tunnel for %v connected to %v proxies.", key.tunnelID, len(agents))
countPerState := map[string]int{
agentStateConnecting: 0,
agentStateDiscovering: 0,
agentStateConnected: 0,
agentStateDiscovered: 0,
agentStateDisconnected: 0,
}
for _, a := range agents {
countPerState[a.getState()]++
}
for state, count := range countPerState {
gauge, err := trustedClustersStats.GetMetricWithLabelValues(key.tunnelID, state)
if err != nil {
m.Warningf("Failed to get gauge: %v.", err)
continue
}
gauge.Set(float64(count))
}
if logReport {
m.WithFields(log.Fields{"target": key.tunnelID, "stats": countPerState}).Info("Outbound tunnel stats.")
}
}
} | go | func (m *AgentPool) reportStats() {
var logReport bool
if m.cfg.Clock.Now().Sub(m.lastReport) > defaults.ReportingPeriod {
m.lastReport = m.cfg.Clock.Now()
logReport = true
}
for key, agents := range m.agents {
m.Debugf("Outbound tunnel for %v connected to %v proxies.", key.tunnelID, len(agents))
countPerState := map[string]int{
agentStateConnecting: 0,
agentStateDiscovering: 0,
agentStateConnected: 0,
agentStateDiscovered: 0,
agentStateDisconnected: 0,
}
for _, a := range agents {
countPerState[a.getState()]++
}
for state, count := range countPerState {
gauge, err := trustedClustersStats.GetMetricWithLabelValues(key.tunnelID, state)
if err != nil {
m.Warningf("Failed to get gauge: %v.", err)
continue
}
gauge.Set(float64(count))
}
if logReport {
m.WithFields(log.Fields{"target": key.tunnelID, "stats": countPerState}).Info("Outbound tunnel stats.")
}
}
} | [
"func",
"(",
"m",
"*",
"AgentPool",
")",
"reportStats",
"(",
")",
"{",
"var",
"logReport",
"bool",
"\n",
"if",
"m",
".",
"cfg",
".",
"Clock",
".",
"Now",
"(",
")",
".",
"Sub",
"(",
"m",
".",
"lastReport",
")",
">",
"defaults",
".",
"ReportingPeriod",
"{",
"m",
".",
"lastReport",
"=",
"m",
".",
"cfg",
".",
"Clock",
".",
"Now",
"(",
")",
"\n",
"logReport",
"=",
"true",
"\n",
"}",
"\n\n",
"for",
"key",
",",
"agents",
":=",
"range",
"m",
".",
"agents",
"{",
"m",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"key",
".",
"tunnelID",
",",
"len",
"(",
"agents",
")",
")",
"\n\n",
"countPerState",
":=",
"map",
"[",
"string",
"]",
"int",
"{",
"agentStateConnecting",
":",
"0",
",",
"agentStateDiscovering",
":",
"0",
",",
"agentStateConnected",
":",
"0",
",",
"agentStateDiscovered",
":",
"0",
",",
"agentStateDisconnected",
":",
"0",
",",
"}",
"\n",
"for",
"_",
",",
"a",
":=",
"range",
"agents",
"{",
"countPerState",
"[",
"a",
".",
"getState",
"(",
")",
"]",
"++",
"\n",
"}",
"\n",
"for",
"state",
",",
"count",
":=",
"range",
"countPerState",
"{",
"gauge",
",",
"err",
":=",
"trustedClustersStats",
".",
"GetMetricWithLabelValues",
"(",
"key",
".",
"tunnelID",
",",
"state",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"m",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"gauge",
".",
"Set",
"(",
"float64",
"(",
"count",
")",
")",
"\n",
"}",
"\n",
"if",
"logReport",
"{",
"m",
".",
"WithFields",
"(",
"log",
".",
"Fields",
"{",
"\"",
"\"",
":",
"key",
".",
"tunnelID",
",",
"\"",
"\"",
":",
"countPerState",
"}",
")",
".",
"Info",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // reportStats submits report about agents state once in a while at info
// level. Always logs more detailed information at debug level. | [
"reportStats",
"submits",
"report",
"about",
"agents",
"state",
"once",
"in",
"a",
"while",
"at",
"info",
"level",
".",
"Always",
"logs",
"more",
"detailed",
"information",
"at",
"debug",
"level",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/agentpool.go#L356-L388 | train |
gravitational/teleport | lib/reversetunnel/agentpool.go | removeDisconnected | func (m *AgentPool) removeDisconnected() {
for agentKey, agentSlice := range m.agents {
// Filter and close all disconnected agents.
validAgents := filterAndClose(agentSlice, func(agent *Agent) bool {
if agent.getState() == agentStateDisconnected {
return true
}
return false
})
// Update (or delete) agent key with filter applied.
if len(validAgents) > 0 {
m.agents[agentKey] = validAgents
} else {
delete(m.agents, agentKey)
}
}
} | go | func (m *AgentPool) removeDisconnected() {
for agentKey, agentSlice := range m.agents {
// Filter and close all disconnected agents.
validAgents := filterAndClose(agentSlice, func(agent *Agent) bool {
if agent.getState() == agentStateDisconnected {
return true
}
return false
})
// Update (or delete) agent key with filter applied.
if len(validAgents) > 0 {
m.agents[agentKey] = validAgents
} else {
delete(m.agents, agentKey)
}
}
} | [
"func",
"(",
"m",
"*",
"AgentPool",
")",
"removeDisconnected",
"(",
")",
"{",
"for",
"agentKey",
",",
"agentSlice",
":=",
"range",
"m",
".",
"agents",
"{",
"// Filter and close all disconnected agents.",
"validAgents",
":=",
"filterAndClose",
"(",
"agentSlice",
",",
"func",
"(",
"agent",
"*",
"Agent",
")",
"bool",
"{",
"if",
"agent",
".",
"getState",
"(",
")",
"==",
"agentStateDisconnected",
"{",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}",
")",
"\n\n",
"// Update (or delete) agent key with filter applied.",
"if",
"len",
"(",
"validAgents",
")",
">",
"0",
"{",
"m",
".",
"agents",
"[",
"agentKey",
"]",
"=",
"validAgents",
"\n",
"}",
"else",
"{",
"delete",
"(",
"m",
".",
"agents",
",",
"agentKey",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // removeDisconnected removes disconnected agents from the list of agents.
// This function should be called under a lock. | [
"removeDisconnected",
"removes",
"disconnected",
"agents",
"from",
"the",
"list",
"of",
"agents",
".",
"This",
"function",
"should",
"be",
"called",
"under",
"a",
"lock",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/agentpool.go#L447-L464 | train |
gravitational/teleport | lib/utils/storage.go | SetAddresses | func (fs *FileAddrStorage) SetAddresses(addrs []NetAddr) error {
bytes, err := json.Marshal(addrs)
if err != nil {
return trace.Wrap(err)
}
err = ioutil.WriteFile(fs.filePath, bytes, 0666)
if err != nil {
log.Error(err)
return trace.ConvertSystemError(err)
}
return nil
} | go | func (fs *FileAddrStorage) SetAddresses(addrs []NetAddr) error {
bytes, err := json.Marshal(addrs)
if err != nil {
return trace.Wrap(err)
}
err = ioutil.WriteFile(fs.filePath, bytes, 0666)
if err != nil {
log.Error(err)
return trace.ConvertSystemError(err)
}
return nil
} | [
"func",
"(",
"fs",
"*",
"FileAddrStorage",
")",
"SetAddresses",
"(",
"addrs",
"[",
"]",
"NetAddr",
")",
"error",
"{",
"bytes",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"addrs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"err",
"=",
"ioutil",
".",
"WriteFile",
"(",
"fs",
".",
"filePath",
",",
"bytes",
",",
"0666",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetAddresses updates storage with new address list | [
"SetAddresses",
"updates",
"storage",
"with",
"new",
"address",
"list"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/storage.go#L43-L54 | train |
gravitational/teleport | lib/utils/storage.go | GetAddresses | func (fs *FileAddrStorage) GetAddresses() ([]NetAddr, error) {
bytes, err := ioutil.ReadFile(fs.filePath)
if err != nil {
return nil, trace.ConvertSystemError(err)
}
var addrs []NetAddr
if len(bytes) > 0 {
err = json.Unmarshal(bytes, &addrs)
if err != nil {
return nil, trace.Wrap(err)
}
}
return addrs, nil
} | go | func (fs *FileAddrStorage) GetAddresses() ([]NetAddr, error) {
bytes, err := ioutil.ReadFile(fs.filePath)
if err != nil {
return nil, trace.ConvertSystemError(err)
}
var addrs []NetAddr
if len(bytes) > 0 {
err = json.Unmarshal(bytes, &addrs)
if err != nil {
return nil, trace.Wrap(err)
}
}
return addrs, nil
} | [
"func",
"(",
"fs",
"*",
"FileAddrStorage",
")",
"GetAddresses",
"(",
")",
"(",
"[",
"]",
"NetAddr",
",",
"error",
")",
"{",
"bytes",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"fs",
".",
"filePath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"addrs",
"[",
"]",
"NetAddr",
"\n",
"if",
"len",
"(",
"bytes",
")",
">",
"0",
"{",
"err",
"=",
"json",
".",
"Unmarshal",
"(",
"bytes",
",",
"&",
"addrs",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"addrs",
",",
"nil",
"\n",
"}"
] | // GetAddresses returns saved address list | [
"GetAddresses",
"returns",
"saved",
"address",
"list"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/storage.go#L57-L70 | train |
gravitational/teleport | lib/utils/tlsdial.go | TLSDial | func TLSDial(ctx context.Context, dial DialWithContextFunc, network, addr string, tlsConfig *tls.Config) (*tls.Conn, error) {
if tlsConfig == nil {
tlsConfig = &tls.Config{}
}
plainConn, err := dial(ctx, network, addr)
if err != nil {
return nil, trace.Wrap(err)
}
colonPos := strings.LastIndex(addr, ":")
if colonPos == -1 {
colonPos = len(addr)
}
hostname := addr[:colonPos]
// If no ServerName is set, infer the ServerName
// from the hostname we're connecting to.
if tlsConfig.ServerName == "" {
// Make a copy to avoid polluting argument or default.
c := tlsConfig.Clone()
c.ServerName = hostname
tlsConfig = c
}
conn := tls.Client(plainConn, tlsConfig)
errC := make(chan error, 1)
go func() {
err := conn.Handshake()
errC <- err
}()
select {
case err := <-errC:
if err != nil {
plainConn.Close()
return nil, trace.Wrap(err)
}
case <-ctx.Done():
plainConn.Close()
return nil, trace.BadParameter("tls handshake has been cancelled due to timeout")
}
if tlsConfig.InsecureSkipVerify {
return conn, nil
}
if err := conn.VerifyHostname(tlsConfig.ServerName); err != nil {
plainConn.Close()
return nil, trace.Wrap(err)
}
return conn, nil
} | go | func TLSDial(ctx context.Context, dial DialWithContextFunc, network, addr string, tlsConfig *tls.Config) (*tls.Conn, error) {
if tlsConfig == nil {
tlsConfig = &tls.Config{}
}
plainConn, err := dial(ctx, network, addr)
if err != nil {
return nil, trace.Wrap(err)
}
colonPos := strings.LastIndex(addr, ":")
if colonPos == -1 {
colonPos = len(addr)
}
hostname := addr[:colonPos]
// If no ServerName is set, infer the ServerName
// from the hostname we're connecting to.
if tlsConfig.ServerName == "" {
// Make a copy to avoid polluting argument or default.
c := tlsConfig.Clone()
c.ServerName = hostname
tlsConfig = c
}
conn := tls.Client(plainConn, tlsConfig)
errC := make(chan error, 1)
go func() {
err := conn.Handshake()
errC <- err
}()
select {
case err := <-errC:
if err != nil {
plainConn.Close()
return nil, trace.Wrap(err)
}
case <-ctx.Done():
plainConn.Close()
return nil, trace.BadParameter("tls handshake has been cancelled due to timeout")
}
if tlsConfig.InsecureSkipVerify {
return conn, nil
}
if err := conn.VerifyHostname(tlsConfig.ServerName); err != nil {
plainConn.Close()
return nil, trace.Wrap(err)
}
return conn, nil
} | [
"func",
"TLSDial",
"(",
"ctx",
"context",
".",
"Context",
",",
"dial",
"DialWithContextFunc",
",",
"network",
",",
"addr",
"string",
",",
"tlsConfig",
"*",
"tls",
".",
"Config",
")",
"(",
"*",
"tls",
".",
"Conn",
",",
"error",
")",
"{",
"if",
"tlsConfig",
"==",
"nil",
"{",
"tlsConfig",
"=",
"&",
"tls",
".",
"Config",
"{",
"}",
"\n",
"}",
"\n\n",
"plainConn",
",",
"err",
":=",
"dial",
"(",
"ctx",
",",
"network",
",",
"addr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"colonPos",
":=",
"strings",
".",
"LastIndex",
"(",
"addr",
",",
"\"",
"\"",
")",
"\n",
"if",
"colonPos",
"==",
"-",
"1",
"{",
"colonPos",
"=",
"len",
"(",
"addr",
")",
"\n",
"}",
"\n",
"hostname",
":=",
"addr",
"[",
":",
"colonPos",
"]",
"\n\n",
"// If no ServerName is set, infer the ServerName",
"// from the hostname we're connecting to.",
"if",
"tlsConfig",
".",
"ServerName",
"==",
"\"",
"\"",
"{",
"// Make a copy to avoid polluting argument or default.",
"c",
":=",
"tlsConfig",
".",
"Clone",
"(",
")",
"\n",
"c",
".",
"ServerName",
"=",
"hostname",
"\n",
"tlsConfig",
"=",
"c",
"\n",
"}",
"\n\n",
"conn",
":=",
"tls",
".",
"Client",
"(",
"plainConn",
",",
"tlsConfig",
")",
"\n",
"errC",
":=",
"make",
"(",
"chan",
"error",
",",
"1",
")",
"\n",
"go",
"func",
"(",
")",
"{",
"err",
":=",
"conn",
".",
"Handshake",
"(",
")",
"\n",
"errC",
"<-",
"err",
"\n",
"}",
"(",
")",
"\n\n",
"select",
"{",
"case",
"err",
":=",
"<-",
"errC",
":",
"if",
"err",
"!=",
"nil",
"{",
"plainConn",
".",
"Close",
"(",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"plainConn",
".",
"Close",
"(",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"tlsConfig",
".",
"InsecureSkipVerify",
"{",
"return",
"conn",
",",
"nil",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"conn",
".",
"VerifyHostname",
"(",
"tlsConfig",
".",
"ServerName",
")",
";",
"err",
"!=",
"nil",
"{",
"plainConn",
".",
"Close",
"(",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"conn",
",",
"nil",
"\n",
"}"
] | // TLSDial dials and establishes TLS connection using custom dialer
// is similar to tls.DialWithDialer | [
"TLSDial",
"dials",
"and",
"establishes",
"TLS",
"connection",
"using",
"custom",
"dialer",
"is",
"similar",
"to",
"tls",
".",
"DialWithDialer"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/tlsdial.go#L22-L75 | train |
gravitational/teleport | lib/web/ui/usercontext.go | NewUserContext | func NewUserContext(user services.User, userRoles services.RoleSet) (*userContext, error) {
ctx := &services.Context{User: user}
sessionAccess := newAccess(userRoles, ctx, services.KindSession)
roleAccess := newAccess(userRoles, ctx, services.KindRole)
authConnectors := newAccess(userRoles, ctx, services.KindAuthConnector)
trustedClusterAccess := newAccess(userRoles, ctx, services.KindTrustedCluster)
logins := getLogins(userRoles)
acl := userACL{
AuthConnectors: authConnectors,
TrustedClusters: trustedClusterAccess,
Sessions: sessionAccess,
Roles: roleAccess,
SSHLogins: logins,
}
// local user
authType := authLocal
// check for any SSO identities
isSSO := len(user.GetOIDCIdentities()) > 0 ||
len(user.GetGithubIdentities()) > 0 ||
len(user.GetSAMLIdentities()) > 0
if isSSO {
// SSO user
authType = authSSO
}
return &userContext{
Name: user.GetName(),
ACL: acl,
AuthType: authType,
Version: teleport.Version,
}, nil
} | go | func NewUserContext(user services.User, userRoles services.RoleSet) (*userContext, error) {
ctx := &services.Context{User: user}
sessionAccess := newAccess(userRoles, ctx, services.KindSession)
roleAccess := newAccess(userRoles, ctx, services.KindRole)
authConnectors := newAccess(userRoles, ctx, services.KindAuthConnector)
trustedClusterAccess := newAccess(userRoles, ctx, services.KindTrustedCluster)
logins := getLogins(userRoles)
acl := userACL{
AuthConnectors: authConnectors,
TrustedClusters: trustedClusterAccess,
Sessions: sessionAccess,
Roles: roleAccess,
SSHLogins: logins,
}
// local user
authType := authLocal
// check for any SSO identities
isSSO := len(user.GetOIDCIdentities()) > 0 ||
len(user.GetGithubIdentities()) > 0 ||
len(user.GetSAMLIdentities()) > 0
if isSSO {
// SSO user
authType = authSSO
}
return &userContext{
Name: user.GetName(),
ACL: acl,
AuthType: authType,
Version: teleport.Version,
}, nil
} | [
"func",
"NewUserContext",
"(",
"user",
"services",
".",
"User",
",",
"userRoles",
"services",
".",
"RoleSet",
")",
"(",
"*",
"userContext",
",",
"error",
")",
"{",
"ctx",
":=",
"&",
"services",
".",
"Context",
"{",
"User",
":",
"user",
"}",
"\n",
"sessionAccess",
":=",
"newAccess",
"(",
"userRoles",
",",
"ctx",
",",
"services",
".",
"KindSession",
")",
"\n",
"roleAccess",
":=",
"newAccess",
"(",
"userRoles",
",",
"ctx",
",",
"services",
".",
"KindRole",
")",
"\n",
"authConnectors",
":=",
"newAccess",
"(",
"userRoles",
",",
"ctx",
",",
"services",
".",
"KindAuthConnector",
")",
"\n",
"trustedClusterAccess",
":=",
"newAccess",
"(",
"userRoles",
",",
"ctx",
",",
"services",
".",
"KindTrustedCluster",
")",
"\n",
"logins",
":=",
"getLogins",
"(",
"userRoles",
")",
"\n\n",
"acl",
":=",
"userACL",
"{",
"AuthConnectors",
":",
"authConnectors",
",",
"TrustedClusters",
":",
"trustedClusterAccess",
",",
"Sessions",
":",
"sessionAccess",
",",
"Roles",
":",
"roleAccess",
",",
"SSHLogins",
":",
"logins",
",",
"}",
"\n\n",
"// local user",
"authType",
":=",
"authLocal",
"\n\n",
"// check for any SSO identities",
"isSSO",
":=",
"len",
"(",
"user",
".",
"GetOIDCIdentities",
"(",
")",
")",
">",
"0",
"||",
"len",
"(",
"user",
".",
"GetGithubIdentities",
"(",
")",
")",
">",
"0",
"||",
"len",
"(",
"user",
".",
"GetSAMLIdentities",
"(",
")",
")",
">",
"0",
"\n\n",
"if",
"isSSO",
"{",
"// SSO user",
"authType",
"=",
"authSSO",
"\n",
"}",
"\n\n",
"return",
"&",
"userContext",
"{",
"Name",
":",
"user",
".",
"GetName",
"(",
")",
",",
"ACL",
":",
"acl",
",",
"AuthType",
":",
"authType",
",",
"Version",
":",
"teleport",
".",
"Version",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewUserContext constructs user context from roles assigned to user | [
"NewUserContext",
"constructs",
"user",
"context",
"from",
"roles",
"assigned",
"to",
"user"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/ui/usercontext.go#L110-L145 | train |
gravitational/teleport | lib/auth/middleware.go | Serve | func (t *TLSServer) Serve(listener net.Listener) error {
return t.Server.Serve(tls.NewListener(listener, t.TLS))
} | go | func (t *TLSServer) Serve(listener net.Listener) error {
return t.Server.Serve(tls.NewListener(listener, t.TLS))
} | [
"func",
"(",
"t",
"*",
"TLSServer",
")",
"Serve",
"(",
"listener",
"net",
".",
"Listener",
")",
"error",
"{",
"return",
"t",
".",
"Server",
".",
"Serve",
"(",
"tls",
".",
"NewListener",
"(",
"listener",
",",
"t",
".",
"TLS",
")",
")",
"\n",
"}"
] | // Serve takes TCP listener, upgrades to TLS using config and starts serving | [
"Serve",
"takes",
"TCP",
"listener",
"upgrades",
"to",
"TLS",
"using",
"config",
"and",
"starts",
"serving"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/middleware.go#L126-L128 | train |
gravitational/teleport | lib/auth/middleware.go | GetUser | func (a *AuthMiddleware) GetUser(r *http.Request) (interface{}, error) {
peers := r.TLS.PeerCertificates
if len(peers) > 1 {
// when turning intermediaries on, don't forget to verify
// https://github.com/kubernetes/kubernetes/pull/34524/files#diff-2b283dde198c92424df5355f39544aa4R59
return nil, trace.AccessDenied("access denied: intermediaries are not supported")
}
localClusterName, err := a.AccessPoint.GetClusterName()
if err != nil {
return nil, trace.Wrap(err)
}
// with no client authentication in place, middleware
// assumes not-privileged Nop role.
// it theoretically possible to use bearer token auth even
// for connections without auth, but this is not active use-case
// therefore it is not allowed to reduce scope
if len(peers) == 0 {
return BuiltinRole{
GetClusterConfig: a.AccessPoint.GetClusterConfig,
Role: teleport.RoleNop,
Username: string(teleport.RoleNop),
ClusterName: localClusterName.GetClusterName(),
}, nil
}
clientCert := peers[0]
certClusterName, err := tlsca.ClusterName(clientCert.Issuer)
if err != nil {
log.Warnf("Failed to parse client certificate %v.", err)
return nil, trace.AccessDenied("access denied: invalid client certificate")
}
identity, err := tlsca.FromSubject(clientCert.Subject)
if err != nil {
return nil, trace.Wrap(err)
}
// If there is any restriction on the certificate usage
// reject the API server request. This is done so some classes
// of certificates issued for kubernetes usage by proxy, can not be used
// against auth server. Later on we can extend more
// advanced cert usage, but for now this is the safest option.
if len(identity.Usage) != 0 && !utils.StringSlicesEqual(a.AcceptedUsage, identity.Usage) {
log.Warningf("Restricted certificate of user %q with usage %v rejected while accessing the auth endpoint with acceptable usage %v.",
identity.Username, identity.Usage, a.AcceptedUsage)
return nil, trace.AccessDenied("access denied: invalid client certificate")
}
// this block assumes interactive user from remote cluster
// based on the remote certificate authority cluster name encoded in
// x509 organization name. This is a safe check because:
// 1. Trust and verification is established during TLS handshake
// by creating a cert pool constructed of trusted certificate authorities
// 2. Remote CAs are not allowed to have the same cluster name
// as the local certificate authority
if certClusterName != localClusterName.GetClusterName() {
// make sure that this user does not have system role
// the local auth server can not truste remote servers
// to issue certificates with system roles (e.g. Admin),
// to get unrestricted access to the local cluster
systemRole := findSystemRole(identity.Groups)
if systemRole != nil {
return RemoteBuiltinRole{
Role: *systemRole,
Username: identity.Username,
ClusterName: certClusterName,
}, nil
}
return RemoteUser{
ClusterName: certClusterName,
Username: identity.Username,
Principals: identity.Principals,
KubernetesGroups: identity.KubernetesGroups,
RemoteRoles: identity.Groups,
}, nil
}
// code below expects user or service from local cluster, to distinguish between
// interactive users and services (e.g. proxies), the code below
// checks for presence of system roles issued in certificate identity
systemRole := findSystemRole(identity.Groups)
// in case if the system role is present, assume this is a service
// agent, e.g. Proxy, connecting to the cluster
if systemRole != nil {
return BuiltinRole{
GetClusterConfig: a.AccessPoint.GetClusterConfig,
Role: *systemRole,
Username: identity.Username,
ClusterName: localClusterName.GetClusterName(),
}, nil
}
// otherwise assume that is a local role, no need to pass the roles
// as it will be fetched from the local database
return LocalUser{
Username: identity.Username,
}, nil
} | go | func (a *AuthMiddleware) GetUser(r *http.Request) (interface{}, error) {
peers := r.TLS.PeerCertificates
if len(peers) > 1 {
// when turning intermediaries on, don't forget to verify
// https://github.com/kubernetes/kubernetes/pull/34524/files#diff-2b283dde198c92424df5355f39544aa4R59
return nil, trace.AccessDenied("access denied: intermediaries are not supported")
}
localClusterName, err := a.AccessPoint.GetClusterName()
if err != nil {
return nil, trace.Wrap(err)
}
// with no client authentication in place, middleware
// assumes not-privileged Nop role.
// it theoretically possible to use bearer token auth even
// for connections without auth, but this is not active use-case
// therefore it is not allowed to reduce scope
if len(peers) == 0 {
return BuiltinRole{
GetClusterConfig: a.AccessPoint.GetClusterConfig,
Role: teleport.RoleNop,
Username: string(teleport.RoleNop),
ClusterName: localClusterName.GetClusterName(),
}, nil
}
clientCert := peers[0]
certClusterName, err := tlsca.ClusterName(clientCert.Issuer)
if err != nil {
log.Warnf("Failed to parse client certificate %v.", err)
return nil, trace.AccessDenied("access denied: invalid client certificate")
}
identity, err := tlsca.FromSubject(clientCert.Subject)
if err != nil {
return nil, trace.Wrap(err)
}
// If there is any restriction on the certificate usage
// reject the API server request. This is done so some classes
// of certificates issued for kubernetes usage by proxy, can not be used
// against auth server. Later on we can extend more
// advanced cert usage, but for now this is the safest option.
if len(identity.Usage) != 0 && !utils.StringSlicesEqual(a.AcceptedUsage, identity.Usage) {
log.Warningf("Restricted certificate of user %q with usage %v rejected while accessing the auth endpoint with acceptable usage %v.",
identity.Username, identity.Usage, a.AcceptedUsage)
return nil, trace.AccessDenied("access denied: invalid client certificate")
}
// this block assumes interactive user from remote cluster
// based on the remote certificate authority cluster name encoded in
// x509 organization name. This is a safe check because:
// 1. Trust and verification is established during TLS handshake
// by creating a cert pool constructed of trusted certificate authorities
// 2. Remote CAs are not allowed to have the same cluster name
// as the local certificate authority
if certClusterName != localClusterName.GetClusterName() {
// make sure that this user does not have system role
// the local auth server can not truste remote servers
// to issue certificates with system roles (e.g. Admin),
// to get unrestricted access to the local cluster
systemRole := findSystemRole(identity.Groups)
if systemRole != nil {
return RemoteBuiltinRole{
Role: *systemRole,
Username: identity.Username,
ClusterName: certClusterName,
}, nil
}
return RemoteUser{
ClusterName: certClusterName,
Username: identity.Username,
Principals: identity.Principals,
KubernetesGroups: identity.KubernetesGroups,
RemoteRoles: identity.Groups,
}, nil
}
// code below expects user or service from local cluster, to distinguish between
// interactive users and services (e.g. proxies), the code below
// checks for presence of system roles issued in certificate identity
systemRole := findSystemRole(identity.Groups)
// in case if the system role is present, assume this is a service
// agent, e.g. Proxy, connecting to the cluster
if systemRole != nil {
return BuiltinRole{
GetClusterConfig: a.AccessPoint.GetClusterConfig,
Role: *systemRole,
Username: identity.Username,
ClusterName: localClusterName.GetClusterName(),
}, nil
}
// otherwise assume that is a local role, no need to pass the roles
// as it will be fetched from the local database
return LocalUser{
Username: identity.Username,
}, nil
} | [
"func",
"(",
"a",
"*",
"AuthMiddleware",
")",
"GetUser",
"(",
"r",
"*",
"http",
".",
"Request",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"peers",
":=",
"r",
".",
"TLS",
".",
"PeerCertificates",
"\n",
"if",
"len",
"(",
"peers",
")",
">",
"1",
"{",
"// when turning intermediaries on, don't forget to verify",
"// https://github.com/kubernetes/kubernetes/pull/34524/files#diff-2b283dde198c92424df5355f39544aa4R59",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"localClusterName",
",",
"err",
":=",
"a",
".",
"AccessPoint",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// with no client authentication in place, middleware",
"// assumes not-privileged Nop role.",
"// it theoretically possible to use bearer token auth even",
"// for connections without auth, but this is not active use-case",
"// therefore it is not allowed to reduce scope",
"if",
"len",
"(",
"peers",
")",
"==",
"0",
"{",
"return",
"BuiltinRole",
"{",
"GetClusterConfig",
":",
"a",
".",
"AccessPoint",
".",
"GetClusterConfig",
",",
"Role",
":",
"teleport",
".",
"RoleNop",
",",
"Username",
":",
"string",
"(",
"teleport",
".",
"RoleNop",
")",
",",
"ClusterName",
":",
"localClusterName",
".",
"GetClusterName",
"(",
")",
",",
"}",
",",
"nil",
"\n",
"}",
"\n",
"clientCert",
":=",
"peers",
"[",
"0",
"]",
"\n",
"certClusterName",
",",
"err",
":=",
"tlsca",
".",
"ClusterName",
"(",
"clientCert",
".",
"Issuer",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"identity",
",",
"err",
":=",
"tlsca",
".",
"FromSubject",
"(",
"clientCert",
".",
"Subject",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// If there is any restriction on the certificate usage",
"// reject the API server request. This is done so some classes",
"// of certificates issued for kubernetes usage by proxy, can not be used",
"// against auth server. Later on we can extend more",
"// advanced cert usage, but for now this is the safest option.",
"if",
"len",
"(",
"identity",
".",
"Usage",
")",
"!=",
"0",
"&&",
"!",
"utils",
".",
"StringSlicesEqual",
"(",
"a",
".",
"AcceptedUsage",
",",
"identity",
".",
"Usage",
")",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"identity",
".",
"Username",
",",
"identity",
".",
"Usage",
",",
"a",
".",
"AcceptedUsage",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// this block assumes interactive user from remote cluster",
"// based on the remote certificate authority cluster name encoded in",
"// x509 organization name. This is a safe check because:",
"// 1. Trust and verification is established during TLS handshake",
"// by creating a cert pool constructed of trusted certificate authorities",
"// 2. Remote CAs are not allowed to have the same cluster name",
"// as the local certificate authority",
"if",
"certClusterName",
"!=",
"localClusterName",
".",
"GetClusterName",
"(",
")",
"{",
"// make sure that this user does not have system role",
"// the local auth server can not truste remote servers",
"// to issue certificates with system roles (e.g. Admin),",
"// to get unrestricted access to the local cluster",
"systemRole",
":=",
"findSystemRole",
"(",
"identity",
".",
"Groups",
")",
"\n",
"if",
"systemRole",
"!=",
"nil",
"{",
"return",
"RemoteBuiltinRole",
"{",
"Role",
":",
"*",
"systemRole",
",",
"Username",
":",
"identity",
".",
"Username",
",",
"ClusterName",
":",
"certClusterName",
",",
"}",
",",
"nil",
"\n",
"}",
"\n",
"return",
"RemoteUser",
"{",
"ClusterName",
":",
"certClusterName",
",",
"Username",
":",
"identity",
".",
"Username",
",",
"Principals",
":",
"identity",
".",
"Principals",
",",
"KubernetesGroups",
":",
"identity",
".",
"KubernetesGroups",
",",
"RemoteRoles",
":",
"identity",
".",
"Groups",
",",
"}",
",",
"nil",
"\n",
"}",
"\n",
"// code below expects user or service from local cluster, to distinguish between",
"// interactive users and services (e.g. proxies), the code below",
"// checks for presence of system roles issued in certificate identity",
"systemRole",
":=",
"findSystemRole",
"(",
"identity",
".",
"Groups",
")",
"\n",
"// in case if the system role is present, assume this is a service",
"// agent, e.g. Proxy, connecting to the cluster",
"if",
"systemRole",
"!=",
"nil",
"{",
"return",
"BuiltinRole",
"{",
"GetClusterConfig",
":",
"a",
".",
"AccessPoint",
".",
"GetClusterConfig",
",",
"Role",
":",
"*",
"systemRole",
",",
"Username",
":",
"identity",
".",
"Username",
",",
"ClusterName",
":",
"localClusterName",
".",
"GetClusterName",
"(",
")",
",",
"}",
",",
"nil",
"\n",
"}",
"\n",
"// otherwise assume that is a local role, no need to pass the roles",
"// as it will be fetched from the local database",
"return",
"LocalUser",
"{",
"Username",
":",
"identity",
".",
"Username",
",",
"}",
",",
"nil",
"\n",
"}"
] | // GetUser returns authenticated user based on request metadata set by HTTP server | [
"GetUser",
"returns",
"authenticated",
"user",
"based",
"on",
"request",
"metadata",
"set",
"by",
"HTTP",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/middleware.go#L189-L282 | train |
gravitational/teleport | lib/auth/middleware.go | ServeHTTP | func (a *AuthMiddleware) ServeHTTP(w http.ResponseWriter, r *http.Request) {
baseContext := r.Context()
if baseContext == nil {
baseContext = context.TODO()
}
user, err := a.GetUser(r)
if err != nil {
trace.WriteError(w, err)
return
}
// determine authenticated user based on the request parameters
requestWithContext := r.WithContext(context.WithValue(baseContext, ContextUser, user))
a.Handler.ServeHTTP(w, requestWithContext)
} | go | func (a *AuthMiddleware) ServeHTTP(w http.ResponseWriter, r *http.Request) {
baseContext := r.Context()
if baseContext == nil {
baseContext = context.TODO()
}
user, err := a.GetUser(r)
if err != nil {
trace.WriteError(w, err)
return
}
// determine authenticated user based on the request parameters
requestWithContext := r.WithContext(context.WithValue(baseContext, ContextUser, user))
a.Handler.ServeHTTP(w, requestWithContext)
} | [
"func",
"(",
"a",
"*",
"AuthMiddleware",
")",
"ServeHTTP",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"{",
"baseContext",
":=",
"r",
".",
"Context",
"(",
")",
"\n",
"if",
"baseContext",
"==",
"nil",
"{",
"baseContext",
"=",
"context",
".",
"TODO",
"(",
")",
"\n",
"}",
"\n",
"user",
",",
"err",
":=",
"a",
".",
"GetUser",
"(",
"r",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"trace",
".",
"WriteError",
"(",
"w",
",",
"err",
")",
"\n",
"return",
"\n",
"}",
"\n\n",
"// determine authenticated user based on the request parameters",
"requestWithContext",
":=",
"r",
".",
"WithContext",
"(",
"context",
".",
"WithValue",
"(",
"baseContext",
",",
"ContextUser",
",",
"user",
")",
")",
"\n",
"a",
".",
"Handler",
".",
"ServeHTTP",
"(",
"w",
",",
"requestWithContext",
")",
"\n",
"}"
] | // ServeHTTP serves HTTP requests | [
"ServeHTTP",
"serves",
"HTTP",
"requests"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/middleware.go#L296-L310 | train |
gravitational/teleport | lib/auth/middleware.go | ClientCertPool | func ClientCertPool(client AccessCache, clusterName string) (*x509.CertPool, error) {
pool := x509.NewCertPool()
var authorities []services.CertAuthority
if clusterName == "" {
hostCAs, err := client.GetCertAuthorities(services.HostCA, false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
userCAs, err := client.GetCertAuthorities(services.UserCA, false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
authorities = append(authorities, hostCAs...)
authorities = append(authorities, userCAs...)
} else {
hostCA, err := client.GetCertAuthority(
services.CertAuthID{Type: services.HostCA, DomainName: clusterName},
false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
userCA, err := client.GetCertAuthority(
services.CertAuthID{Type: services.UserCA, DomainName: clusterName},
false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
authorities = append(authorities, hostCA)
authorities = append(authorities, userCA)
}
for _, auth := range authorities {
for _, keyPair := range auth.GetTLSKeyPairs() {
cert, err := tlsca.ParseCertificatePEM(keyPair.Cert)
if err != nil {
return nil, trace.Wrap(err)
}
log.Debugf("ClientCertPool -> %v", CertInfo(cert))
pool.AddCert(cert)
}
}
return pool, nil
} | go | func ClientCertPool(client AccessCache, clusterName string) (*x509.CertPool, error) {
pool := x509.NewCertPool()
var authorities []services.CertAuthority
if clusterName == "" {
hostCAs, err := client.GetCertAuthorities(services.HostCA, false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
userCAs, err := client.GetCertAuthorities(services.UserCA, false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
authorities = append(authorities, hostCAs...)
authorities = append(authorities, userCAs...)
} else {
hostCA, err := client.GetCertAuthority(
services.CertAuthID{Type: services.HostCA, DomainName: clusterName},
false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
userCA, err := client.GetCertAuthority(
services.CertAuthID{Type: services.UserCA, DomainName: clusterName},
false, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
authorities = append(authorities, hostCA)
authorities = append(authorities, userCA)
}
for _, auth := range authorities {
for _, keyPair := range auth.GetTLSKeyPairs() {
cert, err := tlsca.ParseCertificatePEM(keyPair.Cert)
if err != nil {
return nil, trace.Wrap(err)
}
log.Debugf("ClientCertPool -> %v", CertInfo(cert))
pool.AddCert(cert)
}
}
return pool, nil
} | [
"func",
"ClientCertPool",
"(",
"client",
"AccessCache",
",",
"clusterName",
"string",
")",
"(",
"*",
"x509",
".",
"CertPool",
",",
"error",
")",
"{",
"pool",
":=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"var",
"authorities",
"[",
"]",
"services",
".",
"CertAuthority",
"\n",
"if",
"clusterName",
"==",
"\"",
"\"",
"{",
"hostCAs",
",",
"err",
":=",
"client",
".",
"GetCertAuthorities",
"(",
"services",
".",
"HostCA",
",",
"false",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"userCAs",
",",
"err",
":=",
"client",
".",
"GetCertAuthorities",
"(",
"services",
".",
"UserCA",
",",
"false",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"authorities",
"=",
"append",
"(",
"authorities",
",",
"hostCAs",
"...",
")",
"\n",
"authorities",
"=",
"append",
"(",
"authorities",
",",
"userCAs",
"...",
")",
"\n",
"}",
"else",
"{",
"hostCA",
",",
"err",
":=",
"client",
".",
"GetCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"HostCA",
",",
"DomainName",
":",
"clusterName",
"}",
",",
"false",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"userCA",
",",
"err",
":=",
"client",
".",
"GetCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"UserCA",
",",
"DomainName",
":",
"clusterName",
"}",
",",
"false",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"authorities",
"=",
"append",
"(",
"authorities",
",",
"hostCA",
")",
"\n",
"authorities",
"=",
"append",
"(",
"authorities",
",",
"userCA",
")",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"auth",
":=",
"range",
"authorities",
"{",
"for",
"_",
",",
"keyPair",
":=",
"range",
"auth",
".",
"GetTLSKeyPairs",
"(",
")",
"{",
"cert",
",",
"err",
":=",
"tlsca",
".",
"ParseCertificatePEM",
"(",
"keyPair",
".",
"Cert",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"CertInfo",
"(",
"cert",
")",
")",
"\n",
"pool",
".",
"AddCert",
"(",
"cert",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"pool",
",",
"nil",
"\n",
"}"
] | // ClientCertPool returns trusted x509 cerificate authority pool | [
"ClientCertPool",
"returns",
"trusted",
"x509",
"cerificate",
"authority",
"pool"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/middleware.go#L313-L355 | train |
gravitational/teleport | lib/config/configuration.go | applySSHConfig | func applySSHConfig(fc *FileConfig, cfg *service.Config) error {
if fc.SSH.ListenAddress != "" {
addr, err := utils.ParseHostPortAddr(fc.SSH.ListenAddress, int(defaults.SSHServerListenPort))
if err != nil {
return trace.Wrap(err)
}
cfg.SSH.Addr = *addr
}
if fc.SSH.Labels != nil {
cfg.SSH.Labels = make(map[string]string)
for k, v := range fc.SSH.Labels {
cfg.SSH.Labels[k] = v
}
}
if fc.SSH.Commands != nil {
cfg.SSH.CmdLabels = make(services.CommandLabels)
for _, cmdLabel := range fc.SSH.Commands {
cfg.SSH.CmdLabels[cmdLabel.Name] = &services.CommandLabelV2{
Period: services.NewDuration(cmdLabel.Period),
Command: cmdLabel.Command,
Result: "",
}
}
}
if fc.SSH.Namespace != "" {
cfg.SSH.Namespace = fc.SSH.Namespace
}
if fc.SSH.PermitUserEnvironment {
cfg.SSH.PermitUserEnvironment = true
}
if fc.SSH.PAM != nil {
cfg.SSH.PAM = fc.SSH.PAM.Parse()
// If PAM is enabled, make sure that Teleport was built with PAM support
// and the PAM library was found at runtime.
if cfg.SSH.PAM.Enabled {
if !pam.BuildHasPAM() {
errorMessage := "Unable to start Teleport: PAM was enabled in file configuration but this \n" +
"Teleport binary was built without PAM support. To continue either download a \n" +
"Teleport binary build with PAM support from https://gravitational.com/teleport \n" +
"or disable PAM in file configuration."
return trace.BadParameter(errorMessage)
}
if !pam.SystemHasPAM() {
errorMessage := "Unable to start Teleport: PAM was enabled in file configuration but this \n" +
"system does not have the needed PAM library installed. To continue either \n" +
"install libpam or disable PAM in file configuration."
return trace.BadParameter(errorMessage)
}
}
}
if len(fc.SSH.PublicAddr) != 0 {
addrs, err := fc.SSH.PublicAddr.Addrs(defaults.SSHServerListenPort)
if err != nil {
return trace.Wrap(err)
}
cfg.SSH.PublicAddrs = addrs
}
return nil
} | go | func applySSHConfig(fc *FileConfig, cfg *service.Config) error {
if fc.SSH.ListenAddress != "" {
addr, err := utils.ParseHostPortAddr(fc.SSH.ListenAddress, int(defaults.SSHServerListenPort))
if err != nil {
return trace.Wrap(err)
}
cfg.SSH.Addr = *addr
}
if fc.SSH.Labels != nil {
cfg.SSH.Labels = make(map[string]string)
for k, v := range fc.SSH.Labels {
cfg.SSH.Labels[k] = v
}
}
if fc.SSH.Commands != nil {
cfg.SSH.CmdLabels = make(services.CommandLabels)
for _, cmdLabel := range fc.SSH.Commands {
cfg.SSH.CmdLabels[cmdLabel.Name] = &services.CommandLabelV2{
Period: services.NewDuration(cmdLabel.Period),
Command: cmdLabel.Command,
Result: "",
}
}
}
if fc.SSH.Namespace != "" {
cfg.SSH.Namespace = fc.SSH.Namespace
}
if fc.SSH.PermitUserEnvironment {
cfg.SSH.PermitUserEnvironment = true
}
if fc.SSH.PAM != nil {
cfg.SSH.PAM = fc.SSH.PAM.Parse()
// If PAM is enabled, make sure that Teleport was built with PAM support
// and the PAM library was found at runtime.
if cfg.SSH.PAM.Enabled {
if !pam.BuildHasPAM() {
errorMessage := "Unable to start Teleport: PAM was enabled in file configuration but this \n" +
"Teleport binary was built without PAM support. To continue either download a \n" +
"Teleport binary build with PAM support from https://gravitational.com/teleport \n" +
"or disable PAM in file configuration."
return trace.BadParameter(errorMessage)
}
if !pam.SystemHasPAM() {
errorMessage := "Unable to start Teleport: PAM was enabled in file configuration but this \n" +
"system does not have the needed PAM library installed. To continue either \n" +
"install libpam or disable PAM in file configuration."
return trace.BadParameter(errorMessage)
}
}
}
if len(fc.SSH.PublicAddr) != 0 {
addrs, err := fc.SSH.PublicAddr.Addrs(defaults.SSHServerListenPort)
if err != nil {
return trace.Wrap(err)
}
cfg.SSH.PublicAddrs = addrs
}
return nil
} | [
"func",
"applySSHConfig",
"(",
"fc",
"*",
"FileConfig",
",",
"cfg",
"*",
"service",
".",
"Config",
")",
"error",
"{",
"if",
"fc",
".",
"SSH",
".",
"ListenAddress",
"!=",
"\"",
"\"",
"{",
"addr",
",",
"err",
":=",
"utils",
".",
"ParseHostPortAddr",
"(",
"fc",
".",
"SSH",
".",
"ListenAddress",
",",
"int",
"(",
"defaults",
".",
"SSHServerListenPort",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"cfg",
".",
"SSH",
".",
"Addr",
"=",
"*",
"addr",
"\n",
"}",
"\n",
"if",
"fc",
".",
"SSH",
".",
"Labels",
"!=",
"nil",
"{",
"cfg",
".",
"SSH",
".",
"Labels",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"for",
"k",
",",
"v",
":=",
"range",
"fc",
".",
"SSH",
".",
"Labels",
"{",
"cfg",
".",
"SSH",
".",
"Labels",
"[",
"k",
"]",
"=",
"v",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"fc",
".",
"SSH",
".",
"Commands",
"!=",
"nil",
"{",
"cfg",
".",
"SSH",
".",
"CmdLabels",
"=",
"make",
"(",
"services",
".",
"CommandLabels",
")",
"\n",
"for",
"_",
",",
"cmdLabel",
":=",
"range",
"fc",
".",
"SSH",
".",
"Commands",
"{",
"cfg",
".",
"SSH",
".",
"CmdLabels",
"[",
"cmdLabel",
".",
"Name",
"]",
"=",
"&",
"services",
".",
"CommandLabelV2",
"{",
"Period",
":",
"services",
".",
"NewDuration",
"(",
"cmdLabel",
".",
"Period",
")",
",",
"Command",
":",
"cmdLabel",
".",
"Command",
",",
"Result",
":",
"\"",
"\"",
",",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"fc",
".",
"SSH",
".",
"Namespace",
"!=",
"\"",
"\"",
"{",
"cfg",
".",
"SSH",
".",
"Namespace",
"=",
"fc",
".",
"SSH",
".",
"Namespace",
"\n",
"}",
"\n",
"if",
"fc",
".",
"SSH",
".",
"PermitUserEnvironment",
"{",
"cfg",
".",
"SSH",
".",
"PermitUserEnvironment",
"=",
"true",
"\n",
"}",
"\n",
"if",
"fc",
".",
"SSH",
".",
"PAM",
"!=",
"nil",
"{",
"cfg",
".",
"SSH",
".",
"PAM",
"=",
"fc",
".",
"SSH",
".",
"PAM",
".",
"Parse",
"(",
")",
"\n\n",
"// If PAM is enabled, make sure that Teleport was built with PAM support",
"// and the PAM library was found at runtime.",
"if",
"cfg",
".",
"SSH",
".",
"PAM",
".",
"Enabled",
"{",
"if",
"!",
"pam",
".",
"BuildHasPAM",
"(",
")",
"{",
"errorMessage",
":=",
"\"",
"\\n",
"\"",
"+",
"\"",
"\\n",
"\"",
"+",
"\"",
"\\n",
"\"",
"+",
"\"",
"\"",
"\n",
"return",
"trace",
".",
"BadParameter",
"(",
"errorMessage",
")",
"\n",
"}",
"\n",
"if",
"!",
"pam",
".",
"SystemHasPAM",
"(",
")",
"{",
"errorMessage",
":=",
"\"",
"\\n",
"\"",
"+",
"\"",
"\\n",
"\"",
"+",
"\"",
"\"",
"\n",
"return",
"trace",
".",
"BadParameter",
"(",
"errorMessage",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"fc",
".",
"SSH",
".",
"PublicAddr",
")",
"!=",
"0",
"{",
"addrs",
",",
"err",
":=",
"fc",
".",
"SSH",
".",
"PublicAddr",
".",
"Addrs",
"(",
"defaults",
".",
"SSHServerListenPort",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"cfg",
".",
"SSH",
".",
"PublicAddrs",
"=",
"addrs",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // applySSHConfig applies file configuration for the "ssh_service" section. | [
"applySSHConfig",
"applies",
"file",
"configuration",
"for",
"the",
"ssh_service",
"section",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L560-L620 | train |
gravitational/teleport | lib/config/configuration.go | parseAuthorizedKeys | func parseAuthorizedKeys(bytes []byte, allowedLogins []string) (services.CertAuthority, services.Role, error) {
pubkey, comment, _, _, err := ssh.ParseAuthorizedKey(bytes)
if err != nil {
return nil, nil, trace.Wrap(err)
}
comments, err := url.ParseQuery(comment)
if err != nil {
return nil, nil, trace.Wrap(err)
}
clusterName := comments.Get("clustername")
if clusterName == "" {
return nil, nil, trace.BadParameter("no clustername provided")
}
// create a new certificate authority
ca := services.NewCertAuthority(
services.UserCA,
clusterName,
nil,
[][]byte{ssh.MarshalAuthorizedKey(pubkey)},
nil)
// transform old allowed logins into roles
role := services.RoleForCertAuthority(ca)
role.SetLogins(services.Allow, allowedLogins)
ca.AddRole(role.GetName())
return ca, role, nil
} | go | func parseAuthorizedKeys(bytes []byte, allowedLogins []string) (services.CertAuthority, services.Role, error) {
pubkey, comment, _, _, err := ssh.ParseAuthorizedKey(bytes)
if err != nil {
return nil, nil, trace.Wrap(err)
}
comments, err := url.ParseQuery(comment)
if err != nil {
return nil, nil, trace.Wrap(err)
}
clusterName := comments.Get("clustername")
if clusterName == "" {
return nil, nil, trace.BadParameter("no clustername provided")
}
// create a new certificate authority
ca := services.NewCertAuthority(
services.UserCA,
clusterName,
nil,
[][]byte{ssh.MarshalAuthorizedKey(pubkey)},
nil)
// transform old allowed logins into roles
role := services.RoleForCertAuthority(ca)
role.SetLogins(services.Allow, allowedLogins)
ca.AddRole(role.GetName())
return ca, role, nil
} | [
"func",
"parseAuthorizedKeys",
"(",
"bytes",
"[",
"]",
"byte",
",",
"allowedLogins",
"[",
"]",
"string",
")",
"(",
"services",
".",
"CertAuthority",
",",
"services",
".",
"Role",
",",
"error",
")",
"{",
"pubkey",
",",
"comment",
",",
"_",
",",
"_",
",",
"err",
":=",
"ssh",
".",
"ParseAuthorizedKey",
"(",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"comments",
",",
"err",
":=",
"url",
".",
"ParseQuery",
"(",
"comment",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"clusterName",
":=",
"comments",
".",
"Get",
"(",
"\"",
"\"",
")",
"\n",
"if",
"clusterName",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// create a new certificate authority",
"ca",
":=",
"services",
".",
"NewCertAuthority",
"(",
"services",
".",
"UserCA",
",",
"clusterName",
",",
"nil",
",",
"[",
"]",
"[",
"]",
"byte",
"{",
"ssh",
".",
"MarshalAuthorizedKey",
"(",
"pubkey",
")",
"}",
",",
"nil",
")",
"\n\n",
"// transform old allowed logins into roles",
"role",
":=",
"services",
".",
"RoleForCertAuthority",
"(",
"ca",
")",
"\n",
"role",
".",
"SetLogins",
"(",
"services",
".",
"Allow",
",",
"allowedLogins",
")",
"\n",
"ca",
".",
"AddRole",
"(",
"role",
".",
"GetName",
"(",
")",
")",
"\n\n",
"return",
"ca",
",",
"role",
",",
"nil",
"\n",
"}"
] | // parseAuthorizedKeys parses keys in the authorized_keys format and
// returns a services.CertAuthority. | [
"parseAuthorizedKeys",
"parses",
"keys",
"in",
"the",
"authorized_keys",
"format",
"and",
"returns",
"a",
"services",
".",
"CertAuthority",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L624-L653 | train |
gravitational/teleport | lib/config/configuration.go | parseKnownHosts | func parseKnownHosts(bytes []byte, allowedLogins []string) (services.CertAuthority, services.Role, error) {
marker, options, pubKey, comment, _, err := ssh.ParseKnownHosts(bytes)
if marker != "cert-authority" {
return nil, nil, trace.BadParameter("invalid file format. expected '@cert-authority` marker")
}
if err != nil {
return nil, nil, trace.BadParameter("invalid public key")
}
teleportOpts, err := url.ParseQuery(comment)
if err != nil {
return nil, nil, trace.BadParameter("invalid key comment: '%s'", comment)
}
authType := services.CertAuthType(teleportOpts.Get("type"))
if authType != services.HostCA && authType != services.UserCA {
return nil, nil, trace.BadParameter("unsupported CA type: '%s'", authType)
}
if len(options) == 0 {
return nil, nil, trace.BadParameter("key without cluster_name")
}
const prefix = "*."
domainName := strings.TrimPrefix(options[0], prefix)
v1 := &services.CertAuthorityV1{
AllowedLogins: utils.CopyStrings(allowedLogins),
DomainName: domainName,
Type: authType,
CheckingKeys: [][]byte{ssh.MarshalAuthorizedKey(pubKey)},
}
ca, role := services.ConvertV1CertAuthority(v1)
return ca, role, nil
} | go | func parseKnownHosts(bytes []byte, allowedLogins []string) (services.CertAuthority, services.Role, error) {
marker, options, pubKey, comment, _, err := ssh.ParseKnownHosts(bytes)
if marker != "cert-authority" {
return nil, nil, trace.BadParameter("invalid file format. expected '@cert-authority` marker")
}
if err != nil {
return nil, nil, trace.BadParameter("invalid public key")
}
teleportOpts, err := url.ParseQuery(comment)
if err != nil {
return nil, nil, trace.BadParameter("invalid key comment: '%s'", comment)
}
authType := services.CertAuthType(teleportOpts.Get("type"))
if authType != services.HostCA && authType != services.UserCA {
return nil, nil, trace.BadParameter("unsupported CA type: '%s'", authType)
}
if len(options) == 0 {
return nil, nil, trace.BadParameter("key without cluster_name")
}
const prefix = "*."
domainName := strings.TrimPrefix(options[0], prefix)
v1 := &services.CertAuthorityV1{
AllowedLogins: utils.CopyStrings(allowedLogins),
DomainName: domainName,
Type: authType,
CheckingKeys: [][]byte{ssh.MarshalAuthorizedKey(pubKey)},
}
ca, role := services.ConvertV1CertAuthority(v1)
return ca, role, nil
} | [
"func",
"parseKnownHosts",
"(",
"bytes",
"[",
"]",
"byte",
",",
"allowedLogins",
"[",
"]",
"string",
")",
"(",
"services",
".",
"CertAuthority",
",",
"services",
".",
"Role",
",",
"error",
")",
"{",
"marker",
",",
"options",
",",
"pubKey",
",",
"comment",
",",
"_",
",",
"err",
":=",
"ssh",
".",
"ParseKnownHosts",
"(",
"bytes",
")",
"\n",
"if",
"marker",
"!=",
"\"",
"\"",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"teleportOpts",
",",
"err",
":=",
"url",
".",
"ParseQuery",
"(",
"comment",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"comment",
")",
"\n",
"}",
"\n",
"authType",
":=",
"services",
".",
"CertAuthType",
"(",
"teleportOpts",
".",
"Get",
"(",
"\"",
"\"",
")",
")",
"\n",
"if",
"authType",
"!=",
"services",
".",
"HostCA",
"&&",
"authType",
"!=",
"services",
".",
"UserCA",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"authType",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"options",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"const",
"prefix",
"=",
"\"",
"\"",
"\n",
"domainName",
":=",
"strings",
".",
"TrimPrefix",
"(",
"options",
"[",
"0",
"]",
",",
"prefix",
")",
"\n\n",
"v1",
":=",
"&",
"services",
".",
"CertAuthorityV1",
"{",
"AllowedLogins",
":",
"utils",
".",
"CopyStrings",
"(",
"allowedLogins",
")",
",",
"DomainName",
":",
"domainName",
",",
"Type",
":",
"authType",
",",
"CheckingKeys",
":",
"[",
"]",
"[",
"]",
"byte",
"{",
"ssh",
".",
"MarshalAuthorizedKey",
"(",
"pubKey",
")",
"}",
",",
"}",
"\n",
"ca",
",",
"role",
":=",
"services",
".",
"ConvertV1CertAuthority",
"(",
"v1",
")",
"\n",
"return",
"ca",
",",
"role",
",",
"nil",
"\n",
"}"
] | // parseKnownHosts parses keys in known_hosts format and returns a
// services.CertAuthority. | [
"parseKnownHosts",
"parses",
"keys",
"in",
"known_hosts",
"format",
"and",
"returns",
"a",
"services",
".",
"CertAuthority",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L657-L687 | train |
gravitational/teleport | lib/config/configuration.go | certificateAuthorityFormat | func certificateAuthorityFormat(bytes []byte) (string, error) {
_, _, _, _, err := ssh.ParseAuthorizedKey(bytes)
if err != nil {
_, _, _, _, _, err := ssh.ParseKnownHosts(bytes)
if err != nil {
return "", trace.BadParameter("unknown ca format")
}
return teleport.KnownHosts, nil
}
return teleport.AuthorizedKeys, nil
} | go | func certificateAuthorityFormat(bytes []byte) (string, error) {
_, _, _, _, err := ssh.ParseAuthorizedKey(bytes)
if err != nil {
_, _, _, _, _, err := ssh.ParseKnownHosts(bytes)
if err != nil {
return "", trace.BadParameter("unknown ca format")
}
return teleport.KnownHosts, nil
}
return teleport.AuthorizedKeys, nil
} | [
"func",
"certificateAuthorityFormat",
"(",
"bytes",
"[",
"]",
"byte",
")",
"(",
"string",
",",
"error",
")",
"{",
"_",
",",
"_",
",",
"_",
",",
"_",
",",
"err",
":=",
"ssh",
".",
"ParseAuthorizedKey",
"(",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"_",
",",
"_",
",",
"_",
",",
"_",
",",
"_",
",",
"err",
":=",
"ssh",
".",
"ParseKnownHosts",
"(",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"teleport",
".",
"KnownHosts",
",",
"nil",
"\n",
"}",
"\n",
"return",
"teleport",
".",
"AuthorizedKeys",
",",
"nil",
"\n",
"}"
] | // certificateAuthorityFormat parses bytes and determines if they are in
// known_hosts format or authorized_keys format. | [
"certificateAuthorityFormat",
"parses",
"bytes",
"and",
"determines",
"if",
"they",
"are",
"in",
"known_hosts",
"format",
"or",
"authorized_keys",
"format",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L691-L701 | train |
gravitational/teleport | lib/config/configuration.go | parseCAKey | func parseCAKey(bytes []byte, allowedLogins []string) (services.CertAuthority, services.Role, error) {
caFormat, err := certificateAuthorityFormat(bytes)
if err != nil {
return nil, nil, trace.Wrap(err)
}
if caFormat == teleport.AuthorizedKeys {
return parseAuthorizedKeys(bytes, allowedLogins)
}
return parseKnownHosts(bytes, allowedLogins)
} | go | func parseCAKey(bytes []byte, allowedLogins []string) (services.CertAuthority, services.Role, error) {
caFormat, err := certificateAuthorityFormat(bytes)
if err != nil {
return nil, nil, trace.Wrap(err)
}
if caFormat == teleport.AuthorizedKeys {
return parseAuthorizedKeys(bytes, allowedLogins)
}
return parseKnownHosts(bytes, allowedLogins)
} | [
"func",
"parseCAKey",
"(",
"bytes",
"[",
"]",
"byte",
",",
"allowedLogins",
"[",
"]",
"string",
")",
"(",
"services",
".",
"CertAuthority",
",",
"services",
".",
"Role",
",",
"error",
")",
"{",
"caFormat",
",",
"err",
":=",
"certificateAuthorityFormat",
"(",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"caFormat",
"==",
"teleport",
".",
"AuthorizedKeys",
"{",
"return",
"parseAuthorizedKeys",
"(",
"bytes",
",",
"allowedLogins",
")",
"\n",
"}",
"\n",
"return",
"parseKnownHosts",
"(",
"bytes",
",",
"allowedLogins",
")",
"\n",
"}"
] | // parseCAKey parses bytes either in known_hosts or authorized_keys format
// and returns a services.CertAuthority. | [
"parseCAKey",
"parses",
"bytes",
"either",
"in",
"known_hosts",
"or",
"authorized_keys",
"format",
"and",
"returns",
"a",
"services",
".",
"CertAuthority",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L705-L715 | train |
gravitational/teleport | lib/config/configuration.go | readTrustedClusters | func readTrustedClusters(clusters []TrustedCluster, conf *service.Config) error {
if len(clusters) == 0 {
return nil
}
// go over all trusted clusters:
for i := range clusters {
tc := &clusters[i]
// parse "allow_logins"
var allowedLogins []string
for _, login := range strings.Split(tc.AllowedLogins, ",") {
login = strings.TrimSpace(login)
if login != "" {
allowedLogins = append(allowedLogins, login)
}
}
// open the key file for this cluster:
log.Debugf("reading trusted cluster key file %s", tc.KeyFile)
if tc.KeyFile == "" {
return trace.Errorf("key_file is missing for a trusted cluster")
}
f, err := os.Open(tc.KeyFile)
if err != nil {
return trace.Errorf("reading trusted cluster keys: %v", err)
}
defer f.Close()
// read the keyfile for this cluster and get trusted CA keys:
var authorities []services.CertAuthority
var roles []services.Role
scanner := bufio.NewScanner(f)
for line := 0; scanner.Scan(); {
ca, role, err := parseCAKey(scanner.Bytes(), allowedLogins)
if err != nil {
return trace.BadParameter("%s:L%d. %v", tc.KeyFile, line, err)
}
if ca.GetType() == services.UserCA && len(allowedLogins) == 0 && len(tc.TunnelAddr) > 0 {
return trace.BadParameter("trusted cluster '%s' needs allow_logins parameter",
ca.GetClusterName())
}
authorities = append(authorities, ca)
if role != nil {
roles = append(roles, role)
}
}
conf.Auth.Authorities = append(conf.Auth.Authorities, authorities...)
conf.Auth.Roles = append(conf.Auth.Roles, roles...)
clusterName := authorities[0].GetClusterName()
// parse "tunnel_addr"
var tunnelAddresses []string
for _, ta := range strings.Split(tc.TunnelAddr, ",") {
ta := strings.TrimSpace(ta)
if ta == "" {
continue
}
addr, err := utils.ParseHostPortAddr(ta, defaults.SSHProxyTunnelListenPort)
if err != nil {
return trace.Wrap(err,
"Invalid tunnel address '%s' for cluster '%s'. Expect host:port format",
ta, clusterName)
}
tunnelAddresses = append(tunnelAddresses, addr.FullAddress())
}
if len(tunnelAddresses) > 0 {
conf.ReverseTunnels = append(conf.ReverseTunnels, services.NewReverseTunnel(clusterName, tunnelAddresses))
}
}
return nil
} | go | func readTrustedClusters(clusters []TrustedCluster, conf *service.Config) error {
if len(clusters) == 0 {
return nil
}
// go over all trusted clusters:
for i := range clusters {
tc := &clusters[i]
// parse "allow_logins"
var allowedLogins []string
for _, login := range strings.Split(tc.AllowedLogins, ",") {
login = strings.TrimSpace(login)
if login != "" {
allowedLogins = append(allowedLogins, login)
}
}
// open the key file for this cluster:
log.Debugf("reading trusted cluster key file %s", tc.KeyFile)
if tc.KeyFile == "" {
return trace.Errorf("key_file is missing for a trusted cluster")
}
f, err := os.Open(tc.KeyFile)
if err != nil {
return trace.Errorf("reading trusted cluster keys: %v", err)
}
defer f.Close()
// read the keyfile for this cluster and get trusted CA keys:
var authorities []services.CertAuthority
var roles []services.Role
scanner := bufio.NewScanner(f)
for line := 0; scanner.Scan(); {
ca, role, err := parseCAKey(scanner.Bytes(), allowedLogins)
if err != nil {
return trace.BadParameter("%s:L%d. %v", tc.KeyFile, line, err)
}
if ca.GetType() == services.UserCA && len(allowedLogins) == 0 && len(tc.TunnelAddr) > 0 {
return trace.BadParameter("trusted cluster '%s' needs allow_logins parameter",
ca.GetClusterName())
}
authorities = append(authorities, ca)
if role != nil {
roles = append(roles, role)
}
}
conf.Auth.Authorities = append(conf.Auth.Authorities, authorities...)
conf.Auth.Roles = append(conf.Auth.Roles, roles...)
clusterName := authorities[0].GetClusterName()
// parse "tunnel_addr"
var tunnelAddresses []string
for _, ta := range strings.Split(tc.TunnelAddr, ",") {
ta := strings.TrimSpace(ta)
if ta == "" {
continue
}
addr, err := utils.ParseHostPortAddr(ta, defaults.SSHProxyTunnelListenPort)
if err != nil {
return trace.Wrap(err,
"Invalid tunnel address '%s' for cluster '%s'. Expect host:port format",
ta, clusterName)
}
tunnelAddresses = append(tunnelAddresses, addr.FullAddress())
}
if len(tunnelAddresses) > 0 {
conf.ReverseTunnels = append(conf.ReverseTunnels, services.NewReverseTunnel(clusterName, tunnelAddresses))
}
}
return nil
} | [
"func",
"readTrustedClusters",
"(",
"clusters",
"[",
"]",
"TrustedCluster",
",",
"conf",
"*",
"service",
".",
"Config",
")",
"error",
"{",
"if",
"len",
"(",
"clusters",
")",
"==",
"0",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"// go over all trusted clusters:",
"for",
"i",
":=",
"range",
"clusters",
"{",
"tc",
":=",
"&",
"clusters",
"[",
"i",
"]",
"\n",
"// parse \"allow_logins\"",
"var",
"allowedLogins",
"[",
"]",
"string",
"\n",
"for",
"_",
",",
"login",
":=",
"range",
"strings",
".",
"Split",
"(",
"tc",
".",
"AllowedLogins",
",",
"\"",
"\"",
")",
"{",
"login",
"=",
"strings",
".",
"TrimSpace",
"(",
"login",
")",
"\n",
"if",
"login",
"!=",
"\"",
"\"",
"{",
"allowedLogins",
"=",
"append",
"(",
"allowedLogins",
",",
"login",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// open the key file for this cluster:",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"tc",
".",
"KeyFile",
")",
"\n",
"if",
"tc",
".",
"KeyFile",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"f",
",",
"err",
":=",
"os",
".",
"Open",
"(",
"tc",
".",
"KeyFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"defer",
"f",
".",
"Close",
"(",
")",
"\n",
"// read the keyfile for this cluster and get trusted CA keys:",
"var",
"authorities",
"[",
"]",
"services",
".",
"CertAuthority",
"\n",
"var",
"roles",
"[",
"]",
"services",
".",
"Role",
"\n",
"scanner",
":=",
"bufio",
".",
"NewScanner",
"(",
"f",
")",
"\n",
"for",
"line",
":=",
"0",
";",
"scanner",
".",
"Scan",
"(",
")",
";",
"{",
"ca",
",",
"role",
",",
"err",
":=",
"parseCAKey",
"(",
"scanner",
".",
"Bytes",
"(",
")",
",",
"allowedLogins",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"tc",
".",
"KeyFile",
",",
"line",
",",
"err",
")",
"\n",
"}",
"\n",
"if",
"ca",
".",
"GetType",
"(",
")",
"==",
"services",
".",
"UserCA",
"&&",
"len",
"(",
"allowedLogins",
")",
"==",
"0",
"&&",
"len",
"(",
"tc",
".",
"TunnelAddr",
")",
">",
"0",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"ca",
".",
"GetClusterName",
"(",
")",
")",
"\n",
"}",
"\n",
"authorities",
"=",
"append",
"(",
"authorities",
",",
"ca",
")",
"\n",
"if",
"role",
"!=",
"nil",
"{",
"roles",
"=",
"append",
"(",
"roles",
",",
"role",
")",
"\n",
"}",
"\n",
"}",
"\n",
"conf",
".",
"Auth",
".",
"Authorities",
"=",
"append",
"(",
"conf",
".",
"Auth",
".",
"Authorities",
",",
"authorities",
"...",
")",
"\n",
"conf",
".",
"Auth",
".",
"Roles",
"=",
"append",
"(",
"conf",
".",
"Auth",
".",
"Roles",
",",
"roles",
"...",
")",
"\n",
"clusterName",
":=",
"authorities",
"[",
"0",
"]",
".",
"GetClusterName",
"(",
")",
"\n",
"// parse \"tunnel_addr\"",
"var",
"tunnelAddresses",
"[",
"]",
"string",
"\n",
"for",
"_",
",",
"ta",
":=",
"range",
"strings",
".",
"Split",
"(",
"tc",
".",
"TunnelAddr",
",",
"\"",
"\"",
")",
"{",
"ta",
":=",
"strings",
".",
"TrimSpace",
"(",
"ta",
")",
"\n",
"if",
"ta",
"==",
"\"",
"\"",
"{",
"continue",
"\n",
"}",
"\n",
"addr",
",",
"err",
":=",
"utils",
".",
"ParseHostPortAddr",
"(",
"ta",
",",
"defaults",
".",
"SSHProxyTunnelListenPort",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
",",
"\"",
"\"",
",",
"ta",
",",
"clusterName",
")",
"\n",
"}",
"\n",
"tunnelAddresses",
"=",
"append",
"(",
"tunnelAddresses",
",",
"addr",
".",
"FullAddress",
"(",
")",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"tunnelAddresses",
")",
">",
"0",
"{",
"conf",
".",
"ReverseTunnels",
"=",
"append",
"(",
"conf",
".",
"ReverseTunnels",
",",
"services",
".",
"NewReverseTunnel",
"(",
"clusterName",
",",
"tunnelAddresses",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // readTrustedClusters parses the content of "trusted_clusters" YAML structure
// and modifies Teleport 'conf' by adding "authorities" and "reverse tunnels"
// to it | [
"readTrustedClusters",
"parses",
"the",
"content",
"of",
"trusted_clusters",
"YAML",
"structure",
"and",
"modifies",
"Teleport",
"conf",
"by",
"adding",
"authorities",
"and",
"reverse",
"tunnels",
"to",
"it"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L720-L786 | train |
gravitational/teleport | lib/config/configuration.go | applyString | func applyString(src string, target *string) bool {
if src != "" {
*target = src
return true
}
return false
} | go | func applyString(src string, target *string) bool {
if src != "" {
*target = src
return true
}
return false
} | [
"func",
"applyString",
"(",
"src",
"string",
",",
"target",
"*",
"string",
")",
"bool",
"{",
"if",
"src",
"!=",
"\"",
"\"",
"{",
"*",
"target",
"=",
"src",
"\n",
"return",
"true",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // applyString takes 'src' and overwrites target with it, unless 'src' is empty
// returns 'True' if 'src' was not empty | [
"applyString",
"takes",
"src",
"and",
"overwrites",
"target",
"with",
"it",
"unless",
"src",
"is",
"empty",
"returns",
"True",
"if",
"src",
"was",
"not",
"empty"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L790-L796 | train |
gravitational/teleport | lib/config/configuration.go | applyListenIP | func applyListenIP(ip net.IP, cfg *service.Config) {
listeningAddresses := []*utils.NetAddr{
&cfg.Auth.SSHAddr,
&cfg.Auth.SSHAddr,
&cfg.Proxy.SSHAddr,
&cfg.Proxy.WebAddr,
&cfg.SSH.Addr,
&cfg.Proxy.ReverseTunnelListenAddr,
}
for _, addr := range listeningAddresses {
replaceHost(addr, ip.String())
}
} | go | func applyListenIP(ip net.IP, cfg *service.Config) {
listeningAddresses := []*utils.NetAddr{
&cfg.Auth.SSHAddr,
&cfg.Auth.SSHAddr,
&cfg.Proxy.SSHAddr,
&cfg.Proxy.WebAddr,
&cfg.SSH.Addr,
&cfg.Proxy.ReverseTunnelListenAddr,
}
for _, addr := range listeningAddresses {
replaceHost(addr, ip.String())
}
} | [
"func",
"applyListenIP",
"(",
"ip",
"net",
".",
"IP",
",",
"cfg",
"*",
"service",
".",
"Config",
")",
"{",
"listeningAddresses",
":=",
"[",
"]",
"*",
"utils",
".",
"NetAddr",
"{",
"&",
"cfg",
".",
"Auth",
".",
"SSHAddr",
",",
"&",
"cfg",
".",
"Auth",
".",
"SSHAddr",
",",
"&",
"cfg",
".",
"Proxy",
".",
"SSHAddr",
",",
"&",
"cfg",
".",
"Proxy",
".",
"WebAddr",
",",
"&",
"cfg",
".",
"SSH",
".",
"Addr",
",",
"&",
"cfg",
".",
"Proxy",
".",
"ReverseTunnelListenAddr",
",",
"}",
"\n",
"for",
"_",
",",
"addr",
":=",
"range",
"listeningAddresses",
"{",
"replaceHost",
"(",
"addr",
",",
"ip",
".",
"String",
"(",
")",
")",
"\n",
"}",
"\n",
"}"
] | // applyListenIP replaces all 'listen addr' settings for all services with
// a given IP | [
"applyListenIP",
"replaces",
"all",
"listen",
"addr",
"settings",
"for",
"all",
"services",
"with",
"a",
"given",
"IP"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L1001-L1013 | train |
gravitational/teleport | lib/config/configuration.go | replaceHost | func replaceHost(addr *utils.NetAddr, newHost string) {
_, port, err := net.SplitHostPort(addr.Addr)
if err != nil {
log.Errorf("failed parsing address: '%v'", addr.Addr)
}
addr.Addr = net.JoinHostPort(newHost, port)
} | go | func replaceHost(addr *utils.NetAddr, newHost string) {
_, port, err := net.SplitHostPort(addr.Addr)
if err != nil {
log.Errorf("failed parsing address: '%v'", addr.Addr)
}
addr.Addr = net.JoinHostPort(newHost, port)
} | [
"func",
"replaceHost",
"(",
"addr",
"*",
"utils",
".",
"NetAddr",
",",
"newHost",
"string",
")",
"{",
"_",
",",
"port",
",",
"err",
":=",
"net",
".",
"SplitHostPort",
"(",
"addr",
".",
"Addr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"addr",
".",
"Addr",
")",
"\n",
"}",
"\n",
"addr",
".",
"Addr",
"=",
"net",
".",
"JoinHostPort",
"(",
"newHost",
",",
"port",
")",
"\n",
"}"
] | // replaceHost takes utils.NetAddr and replaces the hostname in it, preserving
// the original port | [
"replaceHost",
"takes",
"utils",
".",
"NetAddr",
"and",
"replaces",
"the",
"hostname",
"in",
"it",
"preserving",
"the",
"original",
"port"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/config/configuration.go#L1017-L1023 | train |
gravitational/teleport | lib/services/legacy/metadata.go | MarshalJSON | func (d Duration) MarshalJSON() ([]byte, error) {
return json.Marshal(fmt.Sprintf("%v", d.Duration))
} | go | func (d Duration) MarshalJSON() ([]byte, error) {
return json.Marshal(fmt.Sprintf("%v", d.Duration))
} | [
"func",
"(",
"d",
"Duration",
")",
"MarshalJSON",
"(",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"return",
"json",
".",
"Marshal",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"d",
".",
"Duration",
")",
")",
"\n",
"}"
] | // MarshalJSON marshals Duration to string | [
"MarshalJSON",
"marshals",
"Duration",
"to",
"string"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/legacy/metadata.go#L54-L56 | train |
gravitational/teleport | lib/auth/new_web_user.go | initializeTOTP | func (s *AuthServer) initializeTOTP(accountName string) (key string, qr []byte, err error) {
// create totp key
otpKey, err := totp.Generate(totp.GenerateOpts{
Issuer: "Teleport",
AccountName: accountName,
})
if err != nil {
return "", nil, trace.Wrap(err)
}
// create QR code
var otpQRBuf bytes.Buffer
otpImage, err := otpKey.Image(456, 456)
if err != nil {
return "", nil, trace.Wrap(err)
}
png.Encode(&otpQRBuf, otpImage)
return otpKey.Secret(), otpQRBuf.Bytes(), nil
} | go | func (s *AuthServer) initializeTOTP(accountName string) (key string, qr []byte, err error) {
// create totp key
otpKey, err := totp.Generate(totp.GenerateOpts{
Issuer: "Teleport",
AccountName: accountName,
})
if err != nil {
return "", nil, trace.Wrap(err)
}
// create QR code
var otpQRBuf bytes.Buffer
otpImage, err := otpKey.Image(456, 456)
if err != nil {
return "", nil, trace.Wrap(err)
}
png.Encode(&otpQRBuf, otpImage)
return otpKey.Secret(), otpQRBuf.Bytes(), nil
} | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"initializeTOTP",
"(",
"accountName",
"string",
")",
"(",
"key",
"string",
",",
"qr",
"[",
"]",
"byte",
",",
"err",
"error",
")",
"{",
"// create totp key",
"otpKey",
",",
"err",
":=",
"totp",
".",
"Generate",
"(",
"totp",
".",
"GenerateOpts",
"{",
"Issuer",
":",
"\"",
"\"",
",",
"AccountName",
":",
"accountName",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// create QR code",
"var",
"otpQRBuf",
"bytes",
".",
"Buffer",
"\n",
"otpImage",
",",
"err",
":=",
"otpKey",
".",
"Image",
"(",
"456",
",",
"456",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"png",
".",
"Encode",
"(",
"&",
"otpQRBuf",
",",
"otpImage",
")",
"\n\n",
"return",
"otpKey",
".",
"Secret",
"(",
")",
",",
"otpQRBuf",
".",
"Bytes",
"(",
")",
",",
"nil",
"\n",
"}"
] | // initializeTOTP creates TOTP algorithm and returns the key and QR code. | [
"initializeTOTP",
"creates",
"TOTP",
"algorithm",
"and",
"returns",
"the",
"key",
"and",
"QR",
"code",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/new_web_user.go#L119-L138 | train |
gravitational/teleport | lib/auth/new_web_user.go | rotateAndFetchSignupToken | func (s *AuthServer) rotateAndFetchSignupToken(token string) (*services.SignupToken, error) {
var err error
// Fetch original signup token.
st, err := s.GetSignupToken(token)
if err != nil {
return nil, trace.Wrap(err)
}
// Generate and set new OTP code for user in *services.SignupToken.
accountName := st.User.V2().GetName() + "@" + s.AuthServiceName
st.OTPKey, st.OTPQRCode, err = s.initializeTOTP(accountName)
if err != nil {
return nil, trace.Wrap(err)
}
// Upsert token into backend.
err = s.UpsertSignupToken(token, *st, st.Expires.Sub(s.clock.Now()))
if err != nil {
return nil, trace.Wrap(err)
}
return st, nil
} | go | func (s *AuthServer) rotateAndFetchSignupToken(token string) (*services.SignupToken, error) {
var err error
// Fetch original signup token.
st, err := s.GetSignupToken(token)
if err != nil {
return nil, trace.Wrap(err)
}
// Generate and set new OTP code for user in *services.SignupToken.
accountName := st.User.V2().GetName() + "@" + s.AuthServiceName
st.OTPKey, st.OTPQRCode, err = s.initializeTOTP(accountName)
if err != nil {
return nil, trace.Wrap(err)
}
// Upsert token into backend.
err = s.UpsertSignupToken(token, *st, st.Expires.Sub(s.clock.Now()))
if err != nil {
return nil, trace.Wrap(err)
}
return st, nil
} | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"rotateAndFetchSignupToken",
"(",
"token",
"string",
")",
"(",
"*",
"services",
".",
"SignupToken",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// Fetch original signup token.",
"st",
",",
"err",
":=",
"s",
".",
"GetSignupToken",
"(",
"token",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Generate and set new OTP code for user in *services.SignupToken.",
"accountName",
":=",
"st",
".",
"User",
".",
"V2",
"(",
")",
".",
"GetName",
"(",
")",
"+",
"\"",
"\"",
"+",
"s",
".",
"AuthServiceName",
"\n",
"st",
".",
"OTPKey",
",",
"st",
".",
"OTPQRCode",
",",
"err",
"=",
"s",
".",
"initializeTOTP",
"(",
"accountName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Upsert token into backend.",
"err",
"=",
"s",
".",
"UpsertSignupToken",
"(",
"token",
",",
"*",
"st",
",",
"st",
".",
"Expires",
".",
"Sub",
"(",
"s",
".",
"clock",
".",
"Now",
"(",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"st",
",",
"nil",
"\n",
"}"
] | // rotateAndFetchSignupToken rotates the signup token everytime it's fetched.
// This ensures that an attacker that gains the signup link can not view it,
// extract the OTP key from the QR code, then allow the user to signup with
// the same OTP token. | [
"rotateAndFetchSignupToken",
"rotates",
"the",
"signup",
"token",
"everytime",
"it",
"s",
"fetched",
".",
"This",
"ensures",
"that",
"an",
"attacker",
"that",
"gains",
"the",
"signup",
"link",
"can",
"not",
"view",
"it",
"extract",
"the",
"OTP",
"key",
"from",
"the",
"QR",
"code",
"then",
"allow",
"the",
"user",
"to",
"signup",
"with",
"the",
"same",
"OTP",
"token",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/new_web_user.go#L144-L167 | train |
gravitational/teleport | lib/auth/new_web_user.go | CreateUserWithOTP | func (s *AuthServer) CreateUserWithOTP(token string, password string, otpToken string) (services.WebSession, error) {
tokenData, err := s.GetSignupToken(token)
if err != nil {
log.Debugf("failed to get signup token: %v", err)
return nil, trace.AccessDenied("expired or incorrect signup token")
}
err = s.UpsertTOTP(tokenData.User.Name, tokenData.OTPKey)
if err != nil {
return nil, trace.Wrap(err)
}
err = s.CheckOTP(tokenData.User.Name, otpToken)
if err != nil {
log.Debugf("failed to validate a token: %v", err)
return nil, trace.AccessDenied("failed to validate a token")
}
err = s.UpsertPassword(tokenData.User.Name, []byte(password))
if err != nil {
return nil, trace.Wrap(err)
}
// create services.User and services.WebSession
webSession, err := s.createUserAndSession(tokenData)
if err != nil {
return nil, trace.Wrap(err)
}
return webSession, nil
} | go | func (s *AuthServer) CreateUserWithOTP(token string, password string, otpToken string) (services.WebSession, error) {
tokenData, err := s.GetSignupToken(token)
if err != nil {
log.Debugf("failed to get signup token: %v", err)
return nil, trace.AccessDenied("expired or incorrect signup token")
}
err = s.UpsertTOTP(tokenData.User.Name, tokenData.OTPKey)
if err != nil {
return nil, trace.Wrap(err)
}
err = s.CheckOTP(tokenData.User.Name, otpToken)
if err != nil {
log.Debugf("failed to validate a token: %v", err)
return nil, trace.AccessDenied("failed to validate a token")
}
err = s.UpsertPassword(tokenData.User.Name, []byte(password))
if err != nil {
return nil, trace.Wrap(err)
}
// create services.User and services.WebSession
webSession, err := s.createUserAndSession(tokenData)
if err != nil {
return nil, trace.Wrap(err)
}
return webSession, nil
} | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"CreateUserWithOTP",
"(",
"token",
"string",
",",
"password",
"string",
",",
"otpToken",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"tokenData",
",",
"err",
":=",
"s",
".",
"GetSignupToken",
"(",
"token",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"UpsertTOTP",
"(",
"tokenData",
".",
"User",
".",
"Name",
",",
"tokenData",
".",
"OTPKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"CheckOTP",
"(",
"tokenData",
".",
"User",
".",
"Name",
",",
"otpToken",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"UpsertPassword",
"(",
"tokenData",
".",
"User",
".",
"Name",
",",
"[",
"]",
"byte",
"(",
"password",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// create services.User and services.WebSession",
"webSession",
",",
"err",
":=",
"s",
".",
"createUserAndSession",
"(",
"tokenData",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"webSession",
",",
"nil",
"\n",
"}"
] | // CreateUserWithOTP creates account with provided token and password.
// Account username and hotp generator are taken from token data.
// Deletes token after account creation. | [
"CreateUserWithOTP",
"creates",
"account",
"with",
"provided",
"token",
"and",
"password",
".",
"Account",
"username",
"and",
"hotp",
"generator",
"are",
"taken",
"from",
"token",
"data",
".",
"Deletes",
"token",
"after",
"account",
"creation",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/new_web_user.go#L232-L262 | train |
gravitational/teleport | lib/auth/new_web_user.go | CreateUserWithoutOTP | func (s *AuthServer) CreateUserWithoutOTP(token string, password string) (services.WebSession, error) {
authPreference, err := s.GetAuthPreference()
if err != nil {
return nil, trace.Wrap(err)
}
if authPreference.GetSecondFactor() != teleport.OFF {
return nil, trace.AccessDenied("missing second factor")
}
tokenData, err := s.GetSignupToken(token)
if err != nil {
log.Warningf("failed to get signup token: %v", err)
return nil, trace.AccessDenied("expired or incorrect signup token")
}
err = s.UpsertPassword(tokenData.User.Name, []byte(password))
if err != nil {
return nil, trace.Wrap(err)
}
// create services.User and services.WebSession
webSession, err := s.createUserAndSession(tokenData)
if err != nil {
return nil, trace.Wrap(err)
}
return webSession, nil
} | go | func (s *AuthServer) CreateUserWithoutOTP(token string, password string) (services.WebSession, error) {
authPreference, err := s.GetAuthPreference()
if err != nil {
return nil, trace.Wrap(err)
}
if authPreference.GetSecondFactor() != teleport.OFF {
return nil, trace.AccessDenied("missing second factor")
}
tokenData, err := s.GetSignupToken(token)
if err != nil {
log.Warningf("failed to get signup token: %v", err)
return nil, trace.AccessDenied("expired or incorrect signup token")
}
err = s.UpsertPassword(tokenData.User.Name, []byte(password))
if err != nil {
return nil, trace.Wrap(err)
}
// create services.User and services.WebSession
webSession, err := s.createUserAndSession(tokenData)
if err != nil {
return nil, trace.Wrap(err)
}
return webSession, nil
} | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"CreateUserWithoutOTP",
"(",
"token",
"string",
",",
"password",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"authPreference",
",",
"err",
":=",
"s",
".",
"GetAuthPreference",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"authPreference",
".",
"GetSecondFactor",
"(",
")",
"!=",
"teleport",
".",
"OFF",
"{",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"tokenData",
",",
"err",
":=",
"s",
".",
"GetSignupToken",
"(",
"token",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"UpsertPassword",
"(",
"tokenData",
".",
"User",
".",
"Name",
",",
"[",
"]",
"byte",
"(",
"password",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// create services.User and services.WebSession",
"webSession",
",",
"err",
":=",
"s",
".",
"createUserAndSession",
"(",
"tokenData",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"webSession",
",",
"nil",
"\n",
"}"
] | // CreateUserWithoutOTP creates an account with the provided password and deletes the token afterwards. | [
"CreateUserWithoutOTP",
"creates",
"an",
"account",
"with",
"the",
"provided",
"password",
"and",
"deletes",
"the",
"token",
"afterwards",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/new_web_user.go#L265-L291 | train |
gravitational/teleport | lib/services/statictokens.go | NewStaticTokens | func NewStaticTokens(spec StaticTokensSpecV2) (StaticTokens, error) {
st := StaticTokensV2{
Kind: KindStaticTokens,
Version: V2,
Metadata: Metadata{
Name: MetaNameStaticTokens,
Namespace: defaults.Namespace,
},
Spec: spec,
}
if err := st.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return &st, nil
} | go | func NewStaticTokens(spec StaticTokensSpecV2) (StaticTokens, error) {
st := StaticTokensV2{
Kind: KindStaticTokens,
Version: V2,
Metadata: Metadata{
Name: MetaNameStaticTokens,
Namespace: defaults.Namespace,
},
Spec: spec,
}
if err := st.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return &st, nil
} | [
"func",
"NewStaticTokens",
"(",
"spec",
"StaticTokensSpecV2",
")",
"(",
"StaticTokens",
",",
"error",
")",
"{",
"st",
":=",
"StaticTokensV2",
"{",
"Kind",
":",
"KindStaticTokens",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"MetaNameStaticTokens",
",",
"Namespace",
":",
"defaults",
".",
"Namespace",
",",
"}",
",",
"Spec",
":",
"spec",
",",
"}",
"\n",
"if",
"err",
":=",
"st",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"st",
",",
"nil",
"\n",
"}"
] | // NewStaticTokens is a convenience wrapper to create a StaticTokens resource. | [
"NewStaticTokens",
"is",
"a",
"convenience",
"wrapper",
"to",
"create",
"a",
"StaticTokens",
"resource",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/statictokens.go#L47-L62 | train |
gravitational/teleport | lib/services/statictokens.go | GetStaticTokensSchema | func GetStaticTokensSchema(extensionSchema string) string {
var staticTokensSchema string
if staticTokensSchema == "" {
staticTokensSchema = fmt.Sprintf(StaticTokensSpecSchemaTemplate, "")
} else {
staticTokensSchema = fmt.Sprintf(StaticTokensSpecSchemaTemplate, ","+extensionSchema)
}
return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, staticTokensSchema, DefaultDefinitions)
} | go | func GetStaticTokensSchema(extensionSchema string) string {
var staticTokensSchema string
if staticTokensSchema == "" {
staticTokensSchema = fmt.Sprintf(StaticTokensSpecSchemaTemplate, "")
} else {
staticTokensSchema = fmt.Sprintf(StaticTokensSpecSchemaTemplate, ","+extensionSchema)
}
return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, staticTokensSchema, DefaultDefinitions)
} | [
"func",
"GetStaticTokensSchema",
"(",
"extensionSchema",
"string",
")",
"string",
"{",
"var",
"staticTokensSchema",
"string",
"\n",
"if",
"staticTokensSchema",
"==",
"\"",
"\"",
"{",
"staticTokensSchema",
"=",
"fmt",
".",
"Sprintf",
"(",
"StaticTokensSpecSchemaTemplate",
",",
"\"",
"\"",
")",
"\n",
"}",
"else",
"{",
"staticTokensSchema",
"=",
"fmt",
".",
"Sprintf",
"(",
"StaticTokensSpecSchemaTemplate",
",",
"\"",
"\"",
"+",
"extensionSchema",
")",
"\n",
"}",
"\n",
"return",
"fmt",
".",
"Sprintf",
"(",
"V2SchemaTemplate",
",",
"MetadataSchema",
",",
"staticTokensSchema",
",",
"DefaultDefinitions",
")",
"\n",
"}"
] | // GetStaticTokensSchema returns the schema with optionally injected
// schema for extensions. | [
"GetStaticTokensSchema",
"returns",
"the",
"schema",
"with",
"optionally",
"injected",
"schema",
"for",
"extensions",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/statictokens.go#L197-L205 | train |
gravitational/teleport | lib/services/statictokens.go | Unmarshal | func (t *TeleportStaticTokensMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (StaticTokens, error) {
var staticTokens StaticTokensV2
if len(bytes) == 0 {
return nil, trace.BadParameter("missing resource data")
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.SkipValidation {
if err := utils.FastUnmarshal(bytes, &staticTokens); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
err = utils.UnmarshalWithSchema(GetStaticTokensSchema(""), &staticTokens, bytes)
if err != nil {
return nil, trace.BadParameter(err.Error())
}
}
err = staticTokens.CheckAndSetDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
staticTokens.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
staticTokens.SetExpiry(cfg.Expires)
}
return &staticTokens, nil
} | go | func (t *TeleportStaticTokensMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (StaticTokens, error) {
var staticTokens StaticTokensV2
if len(bytes) == 0 {
return nil, trace.BadParameter("missing resource data")
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.SkipValidation {
if err := utils.FastUnmarshal(bytes, &staticTokens); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
err = utils.UnmarshalWithSchema(GetStaticTokensSchema(""), &staticTokens, bytes)
if err != nil {
return nil, trace.BadParameter(err.Error())
}
}
err = staticTokens.CheckAndSetDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
staticTokens.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
staticTokens.SetExpiry(cfg.Expires)
}
return &staticTokens, nil
} | [
"func",
"(",
"t",
"*",
"TeleportStaticTokensMarshaler",
")",
"Unmarshal",
"(",
"bytes",
"[",
"]",
"byte",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"StaticTokens",
",",
"error",
")",
"{",
"var",
"staticTokens",
"StaticTokensV2",
"\n\n",
"if",
"len",
"(",
"bytes",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"cfg",
".",
"SkipValidation",
"{",
"if",
"err",
":=",
"utils",
".",
"FastUnmarshal",
"(",
"bytes",
",",
"&",
"staticTokens",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"err",
"=",
"utils",
".",
"UnmarshalWithSchema",
"(",
"GetStaticTokensSchema",
"(",
"\"",
"\"",
")",
",",
"&",
"staticTokens",
",",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"err",
"=",
"staticTokens",
".",
"CheckAndSetDefaults",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"cfg",
".",
"ID",
"!=",
"0",
"{",
"staticTokens",
".",
"SetResourceID",
"(",
"cfg",
".",
"ID",
")",
"\n",
"}",
"\n",
"if",
"!",
"cfg",
".",
"Expires",
".",
"IsZero",
"(",
")",
"{",
"staticTokens",
".",
"SetExpiry",
"(",
"cfg",
".",
"Expires",
")",
"\n",
"}",
"\n",
"return",
"&",
"staticTokens",
",",
"nil",
"\n",
"}"
] | // Unmarshal unmarshals StaticTokens from JSON. | [
"Unmarshal",
"unmarshals",
"StaticTokens",
"from",
"JSON",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/statictokens.go#L234-L269 | train |
gravitational/teleport | lib/services/statictokens.go | Marshal | func (t *TeleportStaticTokensMarshaler) Marshal(c StaticTokens, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := c.(type) {
case *StaticTokensV2:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", c)
}
} | go | func (t *TeleportStaticTokensMarshaler) Marshal(c StaticTokens, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := c.(type) {
case *StaticTokensV2:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", c)
}
} | [
"func",
"(",
"t",
"*",
"TeleportStaticTokensMarshaler",
")",
"Marshal",
"(",
"c",
"StaticTokens",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"switch",
"resource",
":=",
"c",
".",
"(",
"type",
")",
"{",
"case",
"*",
"StaticTokensV2",
":",
"if",
"!",
"cfg",
".",
"PreserveResourceID",
"{",
"// avoid modifying the original object",
"// to prevent unexpected data races",
"copy",
":=",
"*",
"resource",
"\n",
"copy",
".",
"SetResourceID",
"(",
"0",
")",
"\n",
"resource",
"=",
"&",
"copy",
"\n",
"}",
"\n",
"return",
"utils",
".",
"FastMarshal",
"(",
"resource",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"c",
")",
"\n",
"}",
"\n",
"}"
] | // Marshal marshals StaticTokens to JSON. | [
"Marshal",
"marshals",
"StaticTokens",
"to",
"JSON",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/statictokens.go#L272-L290 | train |
gravitational/teleport | lib/services/local/trust.go | DeleteAllCertAuthorities | func (s *CA) DeleteAllCertAuthorities(caType services.CertAuthType) error {
startKey := backend.Key(authoritiesPrefix, string(caType))
return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
} | go | func (s *CA) DeleteAllCertAuthorities(caType services.CertAuthType) error {
startKey := backend.Key(authoritiesPrefix, string(caType))
return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"DeleteAllCertAuthorities",
"(",
"caType",
"services",
".",
"CertAuthType",
")",
"error",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"string",
"(",
"caType",
")",
")",
"\n",
"return",
"s",
".",
"DeleteRange",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"startKey",
",",
"backend",
".",
"RangeEnd",
"(",
"startKey",
")",
")",
"\n",
"}"
] | // DeleteAllCertAuthorities deletes all certificate authorities of a certain type | [
"DeleteAllCertAuthorities",
"deletes",
"all",
"certificate",
"authorities",
"of",
"a",
"certain",
"type"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L26-L29 | train |
gravitational/teleport | lib/services/local/trust.go | CreateCertAuthority | func (s *CA) CreateCertAuthority(ca services.CertAuthority) error {
if err := ca.Check(); err != nil {
return trace.Wrap(err)
}
value, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authoritiesPrefix, string(ca.GetType()), ca.GetName()),
Value: value,
Expires: ca.Expiry(),
}
_, err = s.Create(context.TODO(), item)
if err != nil {
if trace.IsAlreadyExists(err) {
return trace.AlreadyExists("cluster %q already exists", ca.GetName())
}
return trace.Wrap(err)
}
return nil
} | go | func (s *CA) CreateCertAuthority(ca services.CertAuthority) error {
if err := ca.Check(); err != nil {
return trace.Wrap(err)
}
value, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authoritiesPrefix, string(ca.GetType()), ca.GetName()),
Value: value,
Expires: ca.Expiry(),
}
_, err = s.Create(context.TODO(), item)
if err != nil {
if trace.IsAlreadyExists(err) {
return trace.AlreadyExists("cluster %q already exists", ca.GetName())
}
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"CreateCertAuthority",
"(",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"if",
"err",
":=",
"ca",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"value",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"MarshalCertAuthority",
"(",
"ca",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"item",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"string",
"(",
"ca",
".",
"GetType",
"(",
")",
")",
",",
"ca",
".",
"GetName",
"(",
")",
")",
",",
"Value",
":",
"value",
",",
"Expires",
":",
"ca",
".",
"Expiry",
"(",
")",
",",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"Create",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"item",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsAlreadyExists",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"AlreadyExists",
"(",
"\"",
"\"",
",",
"ca",
".",
"GetName",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CreateCertAuthority updates or inserts a new certificate authority | [
"CreateCertAuthority",
"updates",
"or",
"inserts",
"a",
"new",
"certificate",
"authority"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L32-L54 | train |
gravitational/teleport | lib/services/local/trust.go | UpsertCertAuthority | func (s *CA) UpsertCertAuthority(ca services.CertAuthority) error {
if err := ca.Check(); err != nil {
return trace.Wrap(err)
}
value, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authoritiesPrefix, string(ca.GetType()), ca.GetName()),
Value: value,
Expires: ca.Expiry(),
ID: ca.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (s *CA) UpsertCertAuthority(ca services.CertAuthority) error {
if err := ca.Check(); err != nil {
return trace.Wrap(err)
}
value, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authoritiesPrefix, string(ca.GetType()), ca.GetName()),
Value: value,
Expires: ca.Expiry(),
ID: ca.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"UpsertCertAuthority",
"(",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"if",
"err",
":=",
"ca",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"value",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"MarshalCertAuthority",
"(",
"ca",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"item",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"string",
"(",
"ca",
".",
"GetType",
"(",
")",
")",
",",
"ca",
".",
"GetName",
"(",
")",
")",
",",
"Value",
":",
"value",
",",
"Expires",
":",
"ca",
".",
"Expiry",
"(",
")",
",",
"ID",
":",
"ca",
".",
"GetResourceID",
"(",
")",
",",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"Put",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"item",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // UpsertCertAuthority updates or inserts a new certificate authority | [
"UpsertCertAuthority",
"updates",
"or",
"inserts",
"a",
"new",
"certificate",
"authority"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L57-L77 | train |
gravitational/teleport | lib/services/local/trust.go | CompareAndSwapCertAuthority | func (s *CA) CompareAndSwapCertAuthority(new, existing services.CertAuthority) error {
if err := new.Check(); err != nil {
return trace.Wrap(err)
}
newValue, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(new)
if err != nil {
return trace.Wrap(err)
}
newItem := backend.Item{
Key: backend.Key(authoritiesPrefix, string(new.GetType()), new.GetName()),
Value: newValue,
Expires: new.Expiry(),
}
existingValue, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(existing)
if err != nil {
return trace.Wrap(err)
}
existingItem := backend.Item{
Key: backend.Key(authoritiesPrefix, string(existing.GetType()), existing.GetName()),
Value: existingValue,
Expires: existing.Expiry(),
}
_, err = s.CompareAndSwap(context.TODO(), existingItem, newItem)
if err != nil {
if trace.IsCompareFailed(err) {
return trace.CompareFailed("cluster %v settings have been updated, try again", new.GetName())
}
return trace.Wrap(err)
}
return nil
} | go | func (s *CA) CompareAndSwapCertAuthority(new, existing services.CertAuthority) error {
if err := new.Check(); err != nil {
return trace.Wrap(err)
}
newValue, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(new)
if err != nil {
return trace.Wrap(err)
}
newItem := backend.Item{
Key: backend.Key(authoritiesPrefix, string(new.GetType()), new.GetName()),
Value: newValue,
Expires: new.Expiry(),
}
existingValue, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(existing)
if err != nil {
return trace.Wrap(err)
}
existingItem := backend.Item{
Key: backend.Key(authoritiesPrefix, string(existing.GetType()), existing.GetName()),
Value: existingValue,
Expires: existing.Expiry(),
}
_, err = s.CompareAndSwap(context.TODO(), existingItem, newItem)
if err != nil {
if trace.IsCompareFailed(err) {
return trace.CompareFailed("cluster %v settings have been updated, try again", new.GetName())
}
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"CompareAndSwapCertAuthority",
"(",
"new",
",",
"existing",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"if",
"err",
":=",
"new",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"newValue",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"MarshalCertAuthority",
"(",
"new",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"newItem",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"string",
"(",
"new",
".",
"GetType",
"(",
")",
")",
",",
"new",
".",
"GetName",
"(",
")",
")",
",",
"Value",
":",
"newValue",
",",
"Expires",
":",
"new",
".",
"Expiry",
"(",
")",
",",
"}",
"\n\n",
"existingValue",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"MarshalCertAuthority",
"(",
"existing",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"existingItem",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"string",
"(",
"existing",
".",
"GetType",
"(",
")",
")",
",",
"existing",
".",
"GetName",
"(",
")",
")",
",",
"Value",
":",
"existingValue",
",",
"Expires",
":",
"existing",
".",
"Expiry",
"(",
")",
",",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"CompareAndSwap",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"existingItem",
",",
"newItem",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsCompareFailed",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"CompareFailed",
"(",
"\"",
"\"",
",",
"new",
".",
"GetName",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CompareAndSwapCertAuthority updates the cert authority value
// if the existing value matches existing parameter, returns nil if succeeds,
// trace.CompareFailed otherwise. | [
"CompareAndSwapCertAuthority",
"updates",
"the",
"cert",
"authority",
"value",
"if",
"the",
"existing",
"value",
"matches",
"existing",
"parameter",
"returns",
"nil",
"if",
"succeeds",
"trace",
".",
"CompareFailed",
"otherwise",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L82-L114 | train |
gravitational/teleport | lib/services/local/trust.go | DeleteCertAuthority | func (s *CA) DeleteCertAuthority(id services.CertAuthID) error {
if err := id.Check(); err != nil {
return trace.Wrap(err)
}
// when removing a services.CertAuthority also remove any deactivated
// services.CertAuthority as well if they exist.
err := s.Delete(context.TODO(), backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName))
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = s.Delete(context.TODO(), backend.Key(authoritiesPrefix, string(id.Type), id.DomainName))
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (s *CA) DeleteCertAuthority(id services.CertAuthID) error {
if err := id.Check(); err != nil {
return trace.Wrap(err)
}
// when removing a services.CertAuthority also remove any deactivated
// services.CertAuthority as well if they exist.
err := s.Delete(context.TODO(), backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName))
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = s.Delete(context.TODO(), backend.Key(authoritiesPrefix, string(id.Type), id.DomainName))
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"DeleteCertAuthority",
"(",
"id",
"services",
".",
"CertAuthID",
")",
"error",
"{",
"if",
"err",
":=",
"id",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// when removing a services.CertAuthority also remove any deactivated",
"// services.CertAuthority as well if they exist.",
"err",
":=",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"deactivatedPrefix",
",",
"string",
"(",
"id",
".",
"Type",
")",
",",
"id",
".",
"DomainName",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"!",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"err",
"=",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"string",
"(",
"id",
".",
"Type",
")",
",",
"id",
".",
"DomainName",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // DeleteCertAuthority deletes particular certificate authority | [
"DeleteCertAuthority",
"deletes",
"particular",
"certificate",
"authority"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L117-L134 | train |
gravitational/teleport | lib/services/local/trust.go | ActivateCertAuthority | func (s *CA) ActivateCertAuthority(id services.CertAuthID) error {
item, err := s.Get(context.TODO(), backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName))
if err != nil {
if trace.IsNotFound(err) {
return trace.BadParameter("can not activate cert authority %q which has not been deactivated", id.DomainName)
}
return trace.Wrap(err)
}
certAuthority, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(
item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires))
if err != nil {
return trace.Wrap(err)
}
err = s.UpsertCertAuthority(certAuthority)
if err != nil {
return trace.Wrap(err)
}
err = s.Delete(context.TODO(), backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName))
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (s *CA) ActivateCertAuthority(id services.CertAuthID) error {
item, err := s.Get(context.TODO(), backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName))
if err != nil {
if trace.IsNotFound(err) {
return trace.BadParameter("can not activate cert authority %q which has not been deactivated", id.DomainName)
}
return trace.Wrap(err)
}
certAuthority, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(
item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires))
if err != nil {
return trace.Wrap(err)
}
err = s.UpsertCertAuthority(certAuthority)
if err != nil {
return trace.Wrap(err)
}
err = s.Delete(context.TODO(), backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName))
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"ActivateCertAuthority",
"(",
"id",
"services",
".",
"CertAuthID",
")",
"error",
"{",
"item",
",",
"err",
":=",
"s",
".",
"Get",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"deactivatedPrefix",
",",
"string",
"(",
"id",
".",
"Type",
")",
",",
"id",
".",
"DomainName",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"id",
".",
"DomainName",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"certAuthority",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"UnmarshalCertAuthority",
"(",
"item",
".",
"Value",
",",
"services",
".",
"WithResourceID",
"(",
"item",
".",
"ID",
")",
",",
"services",
".",
"WithExpires",
"(",
"item",
".",
"Expires",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"UpsertCertAuthority",
"(",
"certAuthority",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"deactivatedPrefix",
",",
"string",
"(",
"id",
".",
"Type",
")",
",",
"id",
".",
"DomainName",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // ActivateCertAuthority moves a CertAuthority from the deactivated list to
// the normal list. | [
"ActivateCertAuthority",
"moves",
"a",
"CertAuthority",
"from",
"the",
"deactivated",
"list",
"to",
"the",
"normal",
"list",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L138-L164 | train |
gravitational/teleport | lib/services/local/trust.go | DeactivateCertAuthority | func (s *CA) DeactivateCertAuthority(id services.CertAuthID) error {
certAuthority, err := s.GetCertAuthority(id, true)
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("can not deactivate cert authority %q which does not exist", id.DomainName)
}
return trace.Wrap(err)
}
err = s.DeleteCertAuthority(id)
if err != nil {
return trace.Wrap(err)
}
value, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(certAuthority)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName),
Value: value,
Expires: certAuthority.Expiry(),
ID: certAuthority.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (s *CA) DeactivateCertAuthority(id services.CertAuthID) error {
certAuthority, err := s.GetCertAuthority(id, true)
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("can not deactivate cert authority %q which does not exist", id.DomainName)
}
return trace.Wrap(err)
}
err = s.DeleteCertAuthority(id)
if err != nil {
return trace.Wrap(err)
}
value, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(certAuthority)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authoritiesPrefix, deactivatedPrefix, string(id.Type), id.DomainName),
Value: value,
Expires: certAuthority.Expiry(),
ID: certAuthority.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"s",
"*",
"CA",
")",
"DeactivateCertAuthority",
"(",
"id",
"services",
".",
"CertAuthID",
")",
"error",
"{",
"certAuthority",
",",
"err",
":=",
"s",
".",
"GetCertAuthority",
"(",
"id",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
",",
"id",
".",
"DomainName",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"s",
".",
"DeleteCertAuthority",
"(",
"id",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"value",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"MarshalCertAuthority",
"(",
"certAuthority",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"item",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"authoritiesPrefix",
",",
"deactivatedPrefix",
",",
"string",
"(",
"id",
".",
"Type",
")",
",",
"id",
".",
"DomainName",
")",
",",
"Value",
":",
"value",
",",
"Expires",
":",
"certAuthority",
".",
"Expiry",
"(",
")",
",",
"ID",
":",
"certAuthority",
".",
"GetResourceID",
"(",
")",
",",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"Put",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"item",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeactivateCertAuthority moves a CertAuthority from the normal list to
// the deactivated list. | [
"DeactivateCertAuthority",
"moves",
"a",
"CertAuthority",
"from",
"the",
"normal",
"list",
"to",
"the",
"deactivated",
"list",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/trust.go#L168-L199 | train |
gravitational/teleport | lib/client/session.go | newSession | func newSession(client *NodeClient,
joinSession *session.Session,
env map[string]string,
stdin io.Reader,
stdout io.Writer,
stderr io.Writer) (*NodeSession, error) {
if stdin == nil {
stdin = os.Stdin
}
if stdout == nil {
stdout = os.Stdout
}
if stderr == nil {
stderr = os.Stderr
}
if env == nil {
env = make(map[string]string)
}
var err error
ns := &NodeSession{
env: env,
nodeClient: client,
stdin: stdin,
stdout: stdout,
stderr: stderr,
namespace: client.Namespace,
closer: utils.NewCloseBroadcaster(),
}
// if we're joining an existing session, we need to assume that session's
// existing/current terminal size:
if joinSession != nil {
ns.id = joinSession.ID
ns.namespace = joinSession.Namespace
tsize := joinSession.TerminalParams.Winsize()
if ns.isTerminalAttached() {
err = term.SetWinsize(0, tsize)
if err != nil {
log.Error(err)
}
os.Stdout.Write([]byte(fmt.Sprintf("\x1b[8;%d;%dt", tsize.Height, tsize.Width)))
}
// new session!
} else {
sid, ok := ns.env[sshutils.SessionEnvVar]
if !ok {
sid = string(session.NewID())
}
ns.id = session.ID(sid)
}
ns.env[sshutils.SessionEnvVar] = string(ns.id)
return ns, nil
} | go | func newSession(client *NodeClient,
joinSession *session.Session,
env map[string]string,
stdin io.Reader,
stdout io.Writer,
stderr io.Writer) (*NodeSession, error) {
if stdin == nil {
stdin = os.Stdin
}
if stdout == nil {
stdout = os.Stdout
}
if stderr == nil {
stderr = os.Stderr
}
if env == nil {
env = make(map[string]string)
}
var err error
ns := &NodeSession{
env: env,
nodeClient: client,
stdin: stdin,
stdout: stdout,
stderr: stderr,
namespace: client.Namespace,
closer: utils.NewCloseBroadcaster(),
}
// if we're joining an existing session, we need to assume that session's
// existing/current terminal size:
if joinSession != nil {
ns.id = joinSession.ID
ns.namespace = joinSession.Namespace
tsize := joinSession.TerminalParams.Winsize()
if ns.isTerminalAttached() {
err = term.SetWinsize(0, tsize)
if err != nil {
log.Error(err)
}
os.Stdout.Write([]byte(fmt.Sprintf("\x1b[8;%d;%dt", tsize.Height, tsize.Width)))
}
// new session!
} else {
sid, ok := ns.env[sshutils.SessionEnvVar]
if !ok {
sid = string(session.NewID())
}
ns.id = session.ID(sid)
}
ns.env[sshutils.SessionEnvVar] = string(ns.id)
return ns, nil
} | [
"func",
"newSession",
"(",
"client",
"*",
"NodeClient",
",",
"joinSession",
"*",
"session",
".",
"Session",
",",
"env",
"map",
"[",
"string",
"]",
"string",
",",
"stdin",
"io",
".",
"Reader",
",",
"stdout",
"io",
".",
"Writer",
",",
"stderr",
"io",
".",
"Writer",
")",
"(",
"*",
"NodeSession",
",",
"error",
")",
"{",
"if",
"stdin",
"==",
"nil",
"{",
"stdin",
"=",
"os",
".",
"Stdin",
"\n",
"}",
"\n",
"if",
"stdout",
"==",
"nil",
"{",
"stdout",
"=",
"os",
".",
"Stdout",
"\n",
"}",
"\n",
"if",
"stderr",
"==",
"nil",
"{",
"stderr",
"=",
"os",
".",
"Stderr",
"\n",
"}",
"\n",
"if",
"env",
"==",
"nil",
"{",
"env",
"=",
"make",
"(",
"map",
"[",
"string",
"]",
"string",
")",
"\n",
"}",
"\n\n",
"var",
"err",
"error",
"\n",
"ns",
":=",
"&",
"NodeSession",
"{",
"env",
":",
"env",
",",
"nodeClient",
":",
"client",
",",
"stdin",
":",
"stdin",
",",
"stdout",
":",
"stdout",
",",
"stderr",
":",
"stderr",
",",
"namespace",
":",
"client",
".",
"Namespace",
",",
"closer",
":",
"utils",
".",
"NewCloseBroadcaster",
"(",
")",
",",
"}",
"\n",
"// if we're joining an existing session, we need to assume that session's",
"// existing/current terminal size:",
"if",
"joinSession",
"!=",
"nil",
"{",
"ns",
".",
"id",
"=",
"joinSession",
".",
"ID",
"\n",
"ns",
".",
"namespace",
"=",
"joinSession",
".",
"Namespace",
"\n",
"tsize",
":=",
"joinSession",
".",
"TerminalParams",
".",
"Winsize",
"(",
")",
"\n",
"if",
"ns",
".",
"isTerminalAttached",
"(",
")",
"{",
"err",
"=",
"term",
".",
"SetWinsize",
"(",
"0",
",",
"tsize",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"}",
"\n",
"os",
".",
"Stdout",
".",
"Write",
"(",
"[",
"]",
"byte",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\\x1b",
"\"",
",",
"tsize",
".",
"Height",
",",
"tsize",
".",
"Width",
")",
")",
")",
"\n",
"}",
"\n",
"// new session!",
"}",
"else",
"{",
"sid",
",",
"ok",
":=",
"ns",
".",
"env",
"[",
"sshutils",
".",
"SessionEnvVar",
"]",
"\n",
"if",
"!",
"ok",
"{",
"sid",
"=",
"string",
"(",
"session",
".",
"NewID",
"(",
")",
")",
"\n",
"}",
"\n",
"ns",
".",
"id",
"=",
"session",
".",
"ID",
"(",
"sid",
")",
"\n",
"}",
"\n",
"ns",
".",
"env",
"[",
"sshutils",
".",
"SessionEnvVar",
"]",
"=",
"string",
"(",
"ns",
".",
"id",
")",
"\n",
"return",
"ns",
",",
"nil",
"\n",
"}"
] | // newSession creates a new Teleport session with the given remote node
// if 'joinSessin' is given, the session will join the existing session
// of another user | [
"newSession",
"creates",
"a",
"new",
"Teleport",
"session",
"with",
"the",
"given",
"remote",
"node",
"if",
"joinSessin",
"is",
"given",
"the",
"session",
"will",
"join",
"the",
"existing",
"session",
"of",
"another",
"user"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/session.go#L75-L128 | train |
gravitational/teleport | lib/client/session.go | interactiveSession | func (ns *NodeSession) interactiveSession(callback interactiveCallback) error {
// determine what kind of a terminal we need
termType := os.Getenv("TERM")
if termType == "" {
termType = teleport.SafeTerminalType
}
// create the server-side session:
sess, err := ns.createServerSession()
if err != nil {
return trace.Wrap(err)
}
// allocate terminal on the server:
remoteTerm, err := ns.allocateTerminal(termType, sess)
if err != nil {
return trace.Wrap(err)
}
defer remoteTerm.Close()
// call the passed callback and give them the established
// ssh session:
if err := callback(sess, remoteTerm); err != nil {
return trace.Wrap(err)
}
// Catch term signals, but only if we're attached to a real terminal
if ns.isTerminalAttached() {
ns.watchSignals(remoteTerm)
}
// start piping input into the remote shell and pipe the output from
// the remote shell into stdout:
ns.pipeInOut(remoteTerm)
// switch the terminal to raw mode (and switch back on exit!)
if ns.isTerminalAttached() {
ts, err := term.SetRawTerminal(0)
if err != nil {
log.Warn(err)
} else {
defer term.RestoreTerminal(0, ts)
}
}
// wait for the session to end
<-ns.closer.C
return nil
} | go | func (ns *NodeSession) interactiveSession(callback interactiveCallback) error {
// determine what kind of a terminal we need
termType := os.Getenv("TERM")
if termType == "" {
termType = teleport.SafeTerminalType
}
// create the server-side session:
sess, err := ns.createServerSession()
if err != nil {
return trace.Wrap(err)
}
// allocate terminal on the server:
remoteTerm, err := ns.allocateTerminal(termType, sess)
if err != nil {
return trace.Wrap(err)
}
defer remoteTerm.Close()
// call the passed callback and give them the established
// ssh session:
if err := callback(sess, remoteTerm); err != nil {
return trace.Wrap(err)
}
// Catch term signals, but only if we're attached to a real terminal
if ns.isTerminalAttached() {
ns.watchSignals(remoteTerm)
}
// start piping input into the remote shell and pipe the output from
// the remote shell into stdout:
ns.pipeInOut(remoteTerm)
// switch the terminal to raw mode (and switch back on exit!)
if ns.isTerminalAttached() {
ts, err := term.SetRawTerminal(0)
if err != nil {
log.Warn(err)
} else {
defer term.RestoreTerminal(0, ts)
}
}
// wait for the session to end
<-ns.closer.C
return nil
} | [
"func",
"(",
"ns",
"*",
"NodeSession",
")",
"interactiveSession",
"(",
"callback",
"interactiveCallback",
")",
"error",
"{",
"// determine what kind of a terminal we need",
"termType",
":=",
"os",
".",
"Getenv",
"(",
"\"",
"\"",
")",
"\n",
"if",
"termType",
"==",
"\"",
"\"",
"{",
"termType",
"=",
"teleport",
".",
"SafeTerminalType",
"\n",
"}",
"\n",
"// create the server-side session:",
"sess",
",",
"err",
":=",
"ns",
".",
"createServerSession",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// allocate terminal on the server:",
"remoteTerm",
",",
"err",
":=",
"ns",
".",
"allocateTerminal",
"(",
"termType",
",",
"sess",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"defer",
"remoteTerm",
".",
"Close",
"(",
")",
"\n\n",
"// call the passed callback and give them the established",
"// ssh session:",
"if",
"err",
":=",
"callback",
"(",
"sess",
",",
"remoteTerm",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Catch term signals, but only if we're attached to a real terminal",
"if",
"ns",
".",
"isTerminalAttached",
"(",
")",
"{",
"ns",
".",
"watchSignals",
"(",
"remoteTerm",
")",
"\n",
"}",
"\n\n",
"// start piping input into the remote shell and pipe the output from",
"// the remote shell into stdout:",
"ns",
".",
"pipeInOut",
"(",
"remoteTerm",
")",
"\n\n",
"// switch the terminal to raw mode (and switch back on exit!)",
"if",
"ns",
".",
"isTerminalAttached",
"(",
")",
"{",
"ts",
",",
"err",
":=",
"term",
".",
"SetRawTerminal",
"(",
"0",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warn",
"(",
"err",
")",
"\n",
"}",
"else",
"{",
"defer",
"term",
".",
"RestoreTerminal",
"(",
"0",
",",
"ts",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// wait for the session to end",
"<-",
"ns",
".",
"closer",
".",
"C",
"\n",
"return",
"nil",
"\n",
"}"
] | // interactiveSession creates an interactive session on the remote node, executes
// the given callback on it, and waits for the session to end | [
"interactiveSession",
"creates",
"an",
"interactive",
"session",
"on",
"the",
"remote",
"node",
"executes",
"the",
"given",
"callback",
"on",
"it",
"and",
"waits",
"for",
"the",
"session",
"to",
"end"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/session.go#L189-L234 | train |
gravitational/teleport | lib/client/session.go | runShell | func (ns *NodeSession) runShell(callback ShellCreatedCallback) error {
return ns.interactiveSession(func(s *ssh.Session, shell io.ReadWriteCloser) error {
// start the shell on the server:
if err := s.Shell(); err != nil {
return trace.Wrap(err)
}
// call the client-supplied callback
if callback != nil {
exit, err := callback(s, ns.NodeClient().Client, shell)
if exit {
return trace.Wrap(err)
}
}
return nil
})
} | go | func (ns *NodeSession) runShell(callback ShellCreatedCallback) error {
return ns.interactiveSession(func(s *ssh.Session, shell io.ReadWriteCloser) error {
// start the shell on the server:
if err := s.Shell(); err != nil {
return trace.Wrap(err)
}
// call the client-supplied callback
if callback != nil {
exit, err := callback(s, ns.NodeClient().Client, shell)
if exit {
return trace.Wrap(err)
}
}
return nil
})
} | [
"func",
"(",
"ns",
"*",
"NodeSession",
")",
"runShell",
"(",
"callback",
"ShellCreatedCallback",
")",
"error",
"{",
"return",
"ns",
".",
"interactiveSession",
"(",
"func",
"(",
"s",
"*",
"ssh",
".",
"Session",
",",
"shell",
"io",
".",
"ReadWriteCloser",
")",
"error",
"{",
"// start the shell on the server:",
"if",
"err",
":=",
"s",
".",
"Shell",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// call the client-supplied callback",
"if",
"callback",
"!=",
"nil",
"{",
"exit",
",",
"err",
":=",
"callback",
"(",
"s",
",",
"ns",
".",
"NodeClient",
"(",
")",
".",
"Client",
",",
"shell",
")",
"\n",
"if",
"exit",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}",
")",
"\n",
"}"
] | // runShell executes user's shell on the remote node under an interactive session | [
"runShell",
"executes",
"user",
"s",
"shell",
"on",
"the",
"remote",
"node",
"under",
"an",
"interactive",
"session"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/session.go#L397-L412 | train |
gravitational/teleport | lib/client/session.go | watchSignals | func (ns *NodeSession) watchSignals(shell io.Writer) {
exitSignals := make(chan os.Signal, 1)
// catch SIGTERM
signal.Notify(exitSignals, syscall.SIGTERM)
go func() {
defer ns.closer.Close()
<-exitSignals
}()
// Catch Ctrl-C signal
ctrlCSignal := make(chan os.Signal, 1)
signal.Notify(ctrlCSignal, syscall.SIGINT)
go func() {
for {
<-ctrlCSignal
_, err := shell.Write([]byte{3})
if err != nil {
log.Errorf(err.Error())
}
}
}()
// Catch Ctrl-Z signal
ctrlZSignal := make(chan os.Signal, 1)
signal.Notify(ctrlZSignal, syscall.SIGTSTP)
go func() {
for {
<-ctrlZSignal
_, err := shell.Write([]byte{26})
if err != nil {
log.Errorf(err.Error())
}
}
}()
} | go | func (ns *NodeSession) watchSignals(shell io.Writer) {
exitSignals := make(chan os.Signal, 1)
// catch SIGTERM
signal.Notify(exitSignals, syscall.SIGTERM)
go func() {
defer ns.closer.Close()
<-exitSignals
}()
// Catch Ctrl-C signal
ctrlCSignal := make(chan os.Signal, 1)
signal.Notify(ctrlCSignal, syscall.SIGINT)
go func() {
for {
<-ctrlCSignal
_, err := shell.Write([]byte{3})
if err != nil {
log.Errorf(err.Error())
}
}
}()
// Catch Ctrl-Z signal
ctrlZSignal := make(chan os.Signal, 1)
signal.Notify(ctrlZSignal, syscall.SIGTSTP)
go func() {
for {
<-ctrlZSignal
_, err := shell.Write([]byte{26})
if err != nil {
log.Errorf(err.Error())
}
}
}()
} | [
"func",
"(",
"ns",
"*",
"NodeSession",
")",
"watchSignals",
"(",
"shell",
"io",
".",
"Writer",
")",
"{",
"exitSignals",
":=",
"make",
"(",
"chan",
"os",
".",
"Signal",
",",
"1",
")",
"\n",
"// catch SIGTERM",
"signal",
".",
"Notify",
"(",
"exitSignals",
",",
"syscall",
".",
"SIGTERM",
")",
"\n",
"go",
"func",
"(",
")",
"{",
"defer",
"ns",
".",
"closer",
".",
"Close",
"(",
")",
"\n",
"<-",
"exitSignals",
"\n",
"}",
"(",
")",
"\n",
"// Catch Ctrl-C signal",
"ctrlCSignal",
":=",
"make",
"(",
"chan",
"os",
".",
"Signal",
",",
"1",
")",
"\n",
"signal",
".",
"Notify",
"(",
"ctrlCSignal",
",",
"syscall",
".",
"SIGINT",
")",
"\n",
"go",
"func",
"(",
")",
"{",
"for",
"{",
"<-",
"ctrlCSignal",
"\n",
"_",
",",
"err",
":=",
"shell",
".",
"Write",
"(",
"[",
"]",
"byte",
"{",
"3",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"// Catch Ctrl-Z signal",
"ctrlZSignal",
":=",
"make",
"(",
"chan",
"os",
".",
"Signal",
",",
"1",
")",
"\n",
"signal",
".",
"Notify",
"(",
"ctrlZSignal",
",",
"syscall",
".",
"SIGTSTP",
")",
"\n",
"go",
"func",
"(",
")",
"{",
"for",
"{",
"<-",
"ctrlZSignal",
"\n",
"_",
",",
"err",
":=",
"shell",
".",
"Write",
"(",
"[",
"]",
"byte",
"{",
"26",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}"
] | // watchSignals register UNIX signal handlers and properly terminates a remote shell session
// must be called as a goroutine right after a remote shell is created | [
"watchSignals",
"register",
"UNIX",
"signal",
"handlers",
"and",
"properly",
"terminates",
"a",
"remote",
"shell",
"session",
"must",
"be",
"called",
"as",
"a",
"goroutine",
"right",
"after",
"a",
"remote",
"shell",
"is",
"created"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/session.go#L488-L520 | train |
gravitational/teleport | lib/multiplexer/multiplexer.go | CheckAndSetDefaults | func (c *Config) CheckAndSetDefaults() error {
if c.Listener == nil {
return trace.BadParameter("missing parameter Listener")
}
if c.Context == nil {
c.Context = context.TODO()
}
if c.ReadDeadline == 0 {
c.ReadDeadline = defaults.ReadHeadersTimeout
}
if c.Clock == nil {
c.Clock = clockwork.NewRealClock()
}
return nil
} | go | func (c *Config) CheckAndSetDefaults() error {
if c.Listener == nil {
return trace.BadParameter("missing parameter Listener")
}
if c.Context == nil {
c.Context = context.TODO()
}
if c.ReadDeadline == 0 {
c.ReadDeadline = defaults.ReadHeadersTimeout
}
if c.Clock == nil {
c.Clock = clockwork.NewRealClock()
}
return nil
} | [
"func",
"(",
"c",
"*",
"Config",
")",
"CheckAndSetDefaults",
"(",
")",
"error",
"{",
"if",
"c",
".",
"Listener",
"==",
"nil",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"Context",
"==",
"nil",
"{",
"c",
".",
"Context",
"=",
"context",
".",
"TODO",
"(",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"ReadDeadline",
"==",
"0",
"{",
"c",
".",
"ReadDeadline",
"=",
"defaults",
".",
"ReadHeadersTimeout",
"\n",
"}",
"\n",
"if",
"c",
".",
"Clock",
"==",
"nil",
"{",
"c",
".",
"Clock",
"=",
"clockwork",
".",
"NewRealClock",
"(",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CheckAndSetDefaults verifies configuration and sets defaults | [
"CheckAndSetDefaults",
"verifies",
"configuration",
"and",
"sets",
"defaults"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/multiplexer/multiplexer.go#L66-L80 | train |
gravitational/teleport | lib/multiplexer/multiplexer.go | New | func New(cfg Config) (*Mux, error) {
if err := cfg.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
ctx, cancel := context.WithCancel(cfg.Context)
waitContext, waitCancel := context.WithCancel(context.TODO())
return &Mux{
Entry: log.WithFields(log.Fields{
trace.Component: teleport.Component("mx", cfg.ID),
}),
Config: cfg,
context: ctx,
cancel: cancel,
sshListener: newListener(ctx, cfg.Listener.Addr()),
tlsListener: newListener(ctx, cfg.Listener.Addr()),
waitContext: waitContext,
waitCancel: waitCancel,
}, nil
} | go | func New(cfg Config) (*Mux, error) {
if err := cfg.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
ctx, cancel := context.WithCancel(cfg.Context)
waitContext, waitCancel := context.WithCancel(context.TODO())
return &Mux{
Entry: log.WithFields(log.Fields{
trace.Component: teleport.Component("mx", cfg.ID),
}),
Config: cfg,
context: ctx,
cancel: cancel,
sshListener: newListener(ctx, cfg.Listener.Addr()),
tlsListener: newListener(ctx, cfg.Listener.Addr()),
waitContext: waitContext,
waitCancel: waitCancel,
}, nil
} | [
"func",
"New",
"(",
"cfg",
"Config",
")",
"(",
"*",
"Mux",
",",
"error",
")",
"{",
"if",
"err",
":=",
"cfg",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"ctx",
",",
"cancel",
":=",
"context",
".",
"WithCancel",
"(",
"cfg",
".",
"Context",
")",
"\n",
"waitContext",
",",
"waitCancel",
":=",
"context",
".",
"WithCancel",
"(",
"context",
".",
"TODO",
"(",
")",
")",
"\n",
"return",
"&",
"Mux",
"{",
"Entry",
":",
"log",
".",
"WithFields",
"(",
"log",
".",
"Fields",
"{",
"trace",
".",
"Component",
":",
"teleport",
".",
"Component",
"(",
"\"",
"\"",
",",
"cfg",
".",
"ID",
")",
",",
"}",
")",
",",
"Config",
":",
"cfg",
",",
"context",
":",
"ctx",
",",
"cancel",
":",
"cancel",
",",
"sshListener",
":",
"newListener",
"(",
"ctx",
",",
"cfg",
".",
"Listener",
".",
"Addr",
"(",
")",
")",
",",
"tlsListener",
":",
"newListener",
"(",
"ctx",
",",
"cfg",
".",
"Listener",
".",
"Addr",
"(",
")",
")",
",",
"waitContext",
":",
"waitContext",
",",
"waitCancel",
":",
"waitCancel",
",",
"}",
",",
"nil",
"\n",
"}"
] | // New returns a new instance of multiplexer | [
"New",
"returns",
"a",
"new",
"instance",
"of",
"multiplexer"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/multiplexer/multiplexer.go#L83-L102 | train |
gravitational/teleport | lib/multiplexer/multiplexer.go | Serve | func (m *Mux) Serve() error {
defer m.waitCancel()
backoffTimer := time.NewTicker(5 * time.Second)
defer backoffTimer.Stop()
for {
conn, err := m.Listener.Accept()
if err == nil {
if tcpConn, ok := conn.(*net.TCPConn); ok {
tcpConn.SetKeepAlive(true)
tcpConn.SetKeepAlivePeriod(3 * time.Minute)
}
go m.detectAndForward(conn)
continue
}
if m.isClosed() {
return nil
}
select {
case <-backoffTimer.C:
m.Debugf("backoff on accept error: %v", trace.DebugReport(err))
case <-m.context.Done():
return nil
}
}
} | go | func (m *Mux) Serve() error {
defer m.waitCancel()
backoffTimer := time.NewTicker(5 * time.Second)
defer backoffTimer.Stop()
for {
conn, err := m.Listener.Accept()
if err == nil {
if tcpConn, ok := conn.(*net.TCPConn); ok {
tcpConn.SetKeepAlive(true)
tcpConn.SetKeepAlivePeriod(3 * time.Minute)
}
go m.detectAndForward(conn)
continue
}
if m.isClosed() {
return nil
}
select {
case <-backoffTimer.C:
m.Debugf("backoff on accept error: %v", trace.DebugReport(err))
case <-m.context.Done():
return nil
}
}
} | [
"func",
"(",
"m",
"*",
"Mux",
")",
"Serve",
"(",
")",
"error",
"{",
"defer",
"m",
".",
"waitCancel",
"(",
")",
"\n",
"backoffTimer",
":=",
"time",
".",
"NewTicker",
"(",
"5",
"*",
"time",
".",
"Second",
")",
"\n",
"defer",
"backoffTimer",
".",
"Stop",
"(",
")",
"\n",
"for",
"{",
"conn",
",",
"err",
":=",
"m",
".",
"Listener",
".",
"Accept",
"(",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"if",
"tcpConn",
",",
"ok",
":=",
"conn",
".",
"(",
"*",
"net",
".",
"TCPConn",
")",
";",
"ok",
"{",
"tcpConn",
".",
"SetKeepAlive",
"(",
"true",
")",
"\n",
"tcpConn",
".",
"SetKeepAlivePeriod",
"(",
"3",
"*",
"time",
".",
"Minute",
")",
"\n",
"}",
"\n",
"go",
"m",
".",
"detectAndForward",
"(",
"conn",
")",
"\n",
"continue",
"\n",
"}",
"\n",
"if",
"m",
".",
"isClosed",
"(",
")",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"select",
"{",
"case",
"<-",
"backoffTimer",
".",
"C",
":",
"m",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"trace",
".",
"DebugReport",
"(",
"err",
")",
")",
"\n",
"case",
"<-",
"m",
".",
"context",
".",
"Done",
"(",
")",
":",
"return",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // Serve is a blocking function that serves on the listening socket
// and accepts requests. Every request is served in a separate goroutine | [
"Serve",
"is",
"a",
"blocking",
"function",
"that",
"serves",
"on",
"the",
"listening",
"socket",
"and",
"accepts",
"requests",
".",
"Every",
"request",
"is",
"served",
"in",
"a",
"separate",
"goroutine"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/multiplexer/multiplexer.go#L164-L188 | train |
gravitational/teleport | lib/auth/grpcserver.go | SendKeepAlives | func (g *GRPCServer) SendKeepAlives(stream proto.AuthService_SendKeepAlivesServer) error {
defer stream.SendAndClose(&empty.Empty{})
auth, err := g.authenticate(stream.Context())
if err != nil {
return trail.ToGRPC(err)
}
g.Debugf("Got heartbeat connection from %v.", auth.User.GetName())
for {
keepAlive, err := stream.Recv()
if err == io.EOF {
g.Debugf("Connection closed.")
return nil
}
if err != nil {
g.Debugf("Failed to receive heartbeat: %v", err)
return trail.ToGRPC(err)
}
err = auth.KeepAliveNode(stream.Context(), *keepAlive)
if err != nil {
return trail.ToGRPC(err)
}
}
} | go | func (g *GRPCServer) SendKeepAlives(stream proto.AuthService_SendKeepAlivesServer) error {
defer stream.SendAndClose(&empty.Empty{})
auth, err := g.authenticate(stream.Context())
if err != nil {
return trail.ToGRPC(err)
}
g.Debugf("Got heartbeat connection from %v.", auth.User.GetName())
for {
keepAlive, err := stream.Recv()
if err == io.EOF {
g.Debugf("Connection closed.")
return nil
}
if err != nil {
g.Debugf("Failed to receive heartbeat: %v", err)
return trail.ToGRPC(err)
}
err = auth.KeepAliveNode(stream.Context(), *keepAlive)
if err != nil {
return trail.ToGRPC(err)
}
}
} | [
"func",
"(",
"g",
"*",
"GRPCServer",
")",
"SendKeepAlives",
"(",
"stream",
"proto",
".",
"AuthService_SendKeepAlivesServer",
")",
"error",
"{",
"defer",
"stream",
".",
"SendAndClose",
"(",
"&",
"empty",
".",
"Empty",
"{",
"}",
")",
"\n",
"auth",
",",
"err",
":=",
"g",
".",
"authenticate",
"(",
"stream",
".",
"Context",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"g",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"auth",
".",
"User",
".",
"GetName",
"(",
")",
")",
"\n",
"for",
"{",
"keepAlive",
",",
"err",
":=",
"stream",
".",
"Recv",
"(",
")",
"\n",
"if",
"err",
"==",
"io",
".",
"EOF",
"{",
"g",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"g",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"err",
"=",
"auth",
".",
"KeepAliveNode",
"(",
"stream",
".",
"Context",
"(",
")",
",",
"*",
"keepAlive",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // SendKeepAlives allows node to send a stream of keep alive requests | [
"SendKeepAlives",
"allows",
"node",
"to",
"send",
"a",
"stream",
"of",
"keep",
"alive",
"requests"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpcserver.go#L48-L70 | train |
gravitational/teleport | lib/auth/grpcserver.go | WatchEvents | func (g *GRPCServer) WatchEvents(watch *proto.Watch, stream proto.AuthService_WatchEventsServer) error {
auth, err := g.authenticate(stream.Context())
if err != nil {
return trail.ToGRPC(err)
}
servicesWatch := services.Watch{
Name: auth.User.GetName(),
}
for _, kind := range watch.Kinds {
servicesWatch.Kinds = append(servicesWatch.Kinds, services.WatchKind{
Name: kind.Name,
Kind: kind.Kind,
LoadSecrets: kind.LoadSecrets,
})
}
watcher, err := auth.NewWatcher(stream.Context(), servicesWatch)
if err != nil {
return trail.ToGRPC(err)
}
defer watcher.Close()
for {
select {
case <-stream.Context().Done():
return nil
case <-watcher.Done():
return trail.ToGRPC(watcher.Error())
case event := <-watcher.Events():
out, err := eventToGRPC(event)
if err != nil {
return trail.ToGRPC(err)
}
if err := stream.Send(out); err != nil {
return trail.ToGRPC(err)
}
}
}
} | go | func (g *GRPCServer) WatchEvents(watch *proto.Watch, stream proto.AuthService_WatchEventsServer) error {
auth, err := g.authenticate(stream.Context())
if err != nil {
return trail.ToGRPC(err)
}
servicesWatch := services.Watch{
Name: auth.User.GetName(),
}
for _, kind := range watch.Kinds {
servicesWatch.Kinds = append(servicesWatch.Kinds, services.WatchKind{
Name: kind.Name,
Kind: kind.Kind,
LoadSecrets: kind.LoadSecrets,
})
}
watcher, err := auth.NewWatcher(stream.Context(), servicesWatch)
if err != nil {
return trail.ToGRPC(err)
}
defer watcher.Close()
for {
select {
case <-stream.Context().Done():
return nil
case <-watcher.Done():
return trail.ToGRPC(watcher.Error())
case event := <-watcher.Events():
out, err := eventToGRPC(event)
if err != nil {
return trail.ToGRPC(err)
}
if err := stream.Send(out); err != nil {
return trail.ToGRPC(err)
}
}
}
} | [
"func",
"(",
"g",
"*",
"GRPCServer",
")",
"WatchEvents",
"(",
"watch",
"*",
"proto",
".",
"Watch",
",",
"stream",
"proto",
".",
"AuthService_WatchEventsServer",
")",
"error",
"{",
"auth",
",",
"err",
":=",
"g",
".",
"authenticate",
"(",
"stream",
".",
"Context",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"servicesWatch",
":=",
"services",
".",
"Watch",
"{",
"Name",
":",
"auth",
".",
"User",
".",
"GetName",
"(",
")",
",",
"}",
"\n",
"for",
"_",
",",
"kind",
":=",
"range",
"watch",
".",
"Kinds",
"{",
"servicesWatch",
".",
"Kinds",
"=",
"append",
"(",
"servicesWatch",
".",
"Kinds",
",",
"services",
".",
"WatchKind",
"{",
"Name",
":",
"kind",
".",
"Name",
",",
"Kind",
":",
"kind",
".",
"Kind",
",",
"LoadSecrets",
":",
"kind",
".",
"LoadSecrets",
",",
"}",
")",
"\n",
"}",
"\n",
"watcher",
",",
"err",
":=",
"auth",
".",
"NewWatcher",
"(",
"stream",
".",
"Context",
"(",
")",
",",
"servicesWatch",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"defer",
"watcher",
".",
"Close",
"(",
")",
"\n\n",
"for",
"{",
"select",
"{",
"case",
"<-",
"stream",
".",
"Context",
"(",
")",
".",
"Done",
"(",
")",
":",
"return",
"nil",
"\n",
"case",
"<-",
"watcher",
".",
"Done",
"(",
")",
":",
"return",
"trail",
".",
"ToGRPC",
"(",
"watcher",
".",
"Error",
"(",
")",
")",
"\n",
"case",
"event",
":=",
"<-",
"watcher",
".",
"Events",
"(",
")",
":",
"out",
",",
"err",
":=",
"eventToGRPC",
"(",
"event",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"stream",
".",
"Send",
"(",
"out",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}"
] | // WatchEvents returns a new stream of cluster events | [
"WatchEvents",
"returns",
"a",
"new",
"stream",
"of",
"cluster",
"events"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpcserver.go#L73-L110 | train |
gravitational/teleport | lib/auth/grpcserver.go | UpsertNode | func (g *GRPCServer) UpsertNode(ctx context.Context, server *services.ServerV2) (*services.KeepAlive, error) {
auth, err := g.authenticate(ctx)
if err != nil {
return nil, trail.ToGRPC(err)
}
keepAlive, err := auth.UpsertNode(server)
if err != nil {
return nil, trail.ToGRPC(err)
}
return keepAlive, nil
} | go | func (g *GRPCServer) UpsertNode(ctx context.Context, server *services.ServerV2) (*services.KeepAlive, error) {
auth, err := g.authenticate(ctx)
if err != nil {
return nil, trail.ToGRPC(err)
}
keepAlive, err := auth.UpsertNode(server)
if err != nil {
return nil, trail.ToGRPC(err)
}
return keepAlive, nil
} | [
"func",
"(",
"g",
"*",
"GRPCServer",
")",
"UpsertNode",
"(",
"ctx",
"context",
".",
"Context",
",",
"server",
"*",
"services",
".",
"ServerV2",
")",
"(",
"*",
"services",
".",
"KeepAlive",
",",
"error",
")",
"{",
"auth",
",",
"err",
":=",
"g",
".",
"authenticate",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"keepAlive",
",",
"err",
":=",
"auth",
".",
"UpsertNode",
"(",
"server",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trail",
".",
"ToGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"keepAlive",
",",
"nil",
"\n",
"}"
] | // UpsertNode upserts node | [
"UpsertNode",
"upserts",
"node"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpcserver.go#L113-L123 | train |
gravitational/teleport | lib/auth/grpcserver.go | authenticate | func (g *GRPCServer) authenticate(ctx context.Context) (*grpcContext, error) {
// HTTPS server expects auth context to be set by the auth middleware
authContext, err := g.Authorizer.Authorize(ctx)
if err != nil {
// propagate connection problem error so we can differentiate
// between connection failed and access denied
if trace.IsConnectionProblem(err) {
return nil, trace.ConnectionProblem(err, "[10] failed to connect to the database")
} else if trace.IsAccessDenied(err) {
// don't print stack trace, just log the warning
log.Warn(err)
} else {
log.Warn(trace.DebugReport(err))
}
return nil, trace.AccessDenied("[10] access denied")
}
return &grpcContext{
AuthContext: authContext,
AuthWithRoles: &AuthWithRoles{
authServer: g.AuthServer,
user: authContext.User,
checker: authContext.Checker,
sessions: g.SessionService,
alog: g.AuthServer.IAuditLog,
},
}, nil
} | go | func (g *GRPCServer) authenticate(ctx context.Context) (*grpcContext, error) {
// HTTPS server expects auth context to be set by the auth middleware
authContext, err := g.Authorizer.Authorize(ctx)
if err != nil {
// propagate connection problem error so we can differentiate
// between connection failed and access denied
if trace.IsConnectionProblem(err) {
return nil, trace.ConnectionProblem(err, "[10] failed to connect to the database")
} else if trace.IsAccessDenied(err) {
// don't print stack trace, just log the warning
log.Warn(err)
} else {
log.Warn(trace.DebugReport(err))
}
return nil, trace.AccessDenied("[10] access denied")
}
return &grpcContext{
AuthContext: authContext,
AuthWithRoles: &AuthWithRoles{
authServer: g.AuthServer,
user: authContext.User,
checker: authContext.Checker,
sessions: g.SessionService,
alog: g.AuthServer.IAuditLog,
},
}, nil
} | [
"func",
"(",
"g",
"*",
"GRPCServer",
")",
"authenticate",
"(",
"ctx",
"context",
".",
"Context",
")",
"(",
"*",
"grpcContext",
",",
"error",
")",
"{",
"// HTTPS server expects auth context to be set by the auth middleware",
"authContext",
",",
"err",
":=",
"g",
".",
"Authorizer",
".",
"Authorize",
"(",
"ctx",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// propagate connection problem error so we can differentiate",
"// between connection failed and access denied",
"if",
"trace",
".",
"IsConnectionProblem",
"(",
"err",
")",
"{",
"return",
"nil",
",",
"trace",
".",
"ConnectionProblem",
"(",
"err",
",",
"\"",
"\"",
")",
"\n",
"}",
"else",
"if",
"trace",
".",
"IsAccessDenied",
"(",
"err",
")",
"{",
"// don't print stack trace, just log the warning",
"log",
".",
"Warn",
"(",
"err",
")",
"\n",
"}",
"else",
"{",
"log",
".",
"Warn",
"(",
"trace",
".",
"DebugReport",
"(",
"err",
")",
")",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"&",
"grpcContext",
"{",
"AuthContext",
":",
"authContext",
",",
"AuthWithRoles",
":",
"&",
"AuthWithRoles",
"{",
"authServer",
":",
"g",
".",
"AuthServer",
",",
"user",
":",
"authContext",
".",
"User",
",",
"checker",
":",
"authContext",
".",
"Checker",
",",
"sessions",
":",
"g",
".",
"SessionService",
",",
"alog",
":",
"g",
".",
"AuthServer",
".",
"IAuditLog",
",",
"}",
",",
"}",
",",
"nil",
"\n",
"}"
] | // authenticate extracts authentication context and returns initialized auth server | [
"authenticate",
"extracts",
"authentication",
"context",
"and",
"returns",
"initialized",
"auth",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpcserver.go#L131-L157 | train |
gravitational/teleport | lib/auth/grpcserver.go | NewGRPCServer | func NewGRPCServer(cfg APIConfig) http.Handler {
authServer := &GRPCServer{
APIConfig: cfg,
Entry: logrus.WithFields(logrus.Fields{
trace.Component: teleport.Component(teleport.ComponentAuth, teleport.ComponentGRPC),
}),
httpHandler: NewAPIServer(&cfg),
grpcHandler: grpc.NewServer(),
}
proto.RegisterAuthServiceServer(authServer.grpcHandler, authServer)
return authServer
} | go | func NewGRPCServer(cfg APIConfig) http.Handler {
authServer := &GRPCServer{
APIConfig: cfg,
Entry: logrus.WithFields(logrus.Fields{
trace.Component: teleport.Component(teleport.ComponentAuth, teleport.ComponentGRPC),
}),
httpHandler: NewAPIServer(&cfg),
grpcHandler: grpc.NewServer(),
}
proto.RegisterAuthServiceServer(authServer.grpcHandler, authServer)
return authServer
} | [
"func",
"NewGRPCServer",
"(",
"cfg",
"APIConfig",
")",
"http",
".",
"Handler",
"{",
"authServer",
":=",
"&",
"GRPCServer",
"{",
"APIConfig",
":",
"cfg",
",",
"Entry",
":",
"logrus",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"trace",
".",
"Component",
":",
"teleport",
".",
"Component",
"(",
"teleport",
".",
"ComponentAuth",
",",
"teleport",
".",
"ComponentGRPC",
")",
",",
"}",
")",
",",
"httpHandler",
":",
"NewAPIServer",
"(",
"&",
"cfg",
")",
",",
"grpcHandler",
":",
"grpc",
".",
"NewServer",
"(",
")",
",",
"}",
"\n",
"proto",
".",
"RegisterAuthServiceServer",
"(",
"authServer",
".",
"grpcHandler",
",",
"authServer",
")",
"\n",
"return",
"authServer",
"\n",
"}"
] | // NewGRPCServer returns a new instance of GRPC server | [
"NewGRPCServer",
"returns",
"a",
"new",
"instance",
"of",
"GRPC",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpcserver.go#L160-L171 | train |
gravitational/teleport | lib/auth/grpcserver.go | ServeHTTP | func (g *GRPCServer) ServeHTTP(w http.ResponseWriter, r *http.Request) {
// magic combo match signifying GRPC request
// https://grpc.io/blog/coreos
if r.ProtoMajor == 2 && strings.Contains(r.Header.Get("Content-Type"), "application/grpc") {
g.grpcHandler.ServeHTTP(w, r)
} else {
g.httpHandler.ServeHTTP(w, r)
}
} | go | func (g *GRPCServer) ServeHTTP(w http.ResponseWriter, r *http.Request) {
// magic combo match signifying GRPC request
// https://grpc.io/blog/coreos
if r.ProtoMajor == 2 && strings.Contains(r.Header.Get("Content-Type"), "application/grpc") {
g.grpcHandler.ServeHTTP(w, r)
} else {
g.httpHandler.ServeHTTP(w, r)
}
} | [
"func",
"(",
"g",
"*",
"GRPCServer",
")",
"ServeHTTP",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
")",
"{",
"// magic combo match signifying GRPC request",
"// https://grpc.io/blog/coreos",
"if",
"r",
".",
"ProtoMajor",
"==",
"2",
"&&",
"strings",
".",
"Contains",
"(",
"r",
".",
"Header",
".",
"Get",
"(",
"\"",
"\"",
")",
",",
"\"",
"\"",
")",
"{",
"g",
".",
"grpcHandler",
".",
"ServeHTTP",
"(",
"w",
",",
"r",
")",
"\n",
"}",
"else",
"{",
"g",
".",
"httpHandler",
".",
"ServeHTTP",
"(",
"w",
",",
"r",
")",
"\n",
"}",
"\n",
"}"
] | // ServeHTTP dispatches requests based on the request type | [
"ServeHTTP",
"dispatches",
"requests",
"based",
"on",
"the",
"request",
"type"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpcserver.go#L174-L182 | train |
gravitational/teleport | lib/srv/regular/sites.go | Start | func (t *proxySitesSubsys) Start(sconn *ssh.ServerConn, ch ssh.Channel, req *ssh.Request, ctx *srv.ServerContext) error {
log.Debugf("proxysites.start(%v)", ctx)
remoteSites := t.srv.proxyTun.GetSites()
// build an arary of services.Site structures:
retval := make([]services.Site, 0, len(remoteSites))
for _, s := range remoteSites {
retval = append(retval, services.Site{
Name: s.GetName(),
Status: s.GetStatus(),
LastConnected: s.GetLastConnected(),
})
}
// serialize them into JSON and write back:
data, err := json.Marshal(retval)
if err != nil {
return trace.Wrap(err)
}
if _, err := ch.Write(data); err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (t *proxySitesSubsys) Start(sconn *ssh.ServerConn, ch ssh.Channel, req *ssh.Request, ctx *srv.ServerContext) error {
log.Debugf("proxysites.start(%v)", ctx)
remoteSites := t.srv.proxyTun.GetSites()
// build an arary of services.Site structures:
retval := make([]services.Site, 0, len(remoteSites))
for _, s := range remoteSites {
retval = append(retval, services.Site{
Name: s.GetName(),
Status: s.GetStatus(),
LastConnected: s.GetLastConnected(),
})
}
// serialize them into JSON and write back:
data, err := json.Marshal(retval)
if err != nil {
return trace.Wrap(err)
}
if _, err := ch.Write(data); err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"t",
"*",
"proxySitesSubsys",
")",
"Start",
"(",
"sconn",
"*",
"ssh",
".",
"ServerConn",
",",
"ch",
"ssh",
".",
"Channel",
",",
"req",
"*",
"ssh",
".",
"Request",
",",
"ctx",
"*",
"srv",
".",
"ServerContext",
")",
"error",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"ctx",
")",
"\n",
"remoteSites",
":=",
"t",
".",
"srv",
".",
"proxyTun",
".",
"GetSites",
"(",
")",
"\n\n",
"// build an arary of services.Site structures:",
"retval",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"Site",
",",
"0",
",",
"len",
"(",
"remoteSites",
")",
")",
"\n",
"for",
"_",
",",
"s",
":=",
"range",
"remoteSites",
"{",
"retval",
"=",
"append",
"(",
"retval",
",",
"services",
".",
"Site",
"{",
"Name",
":",
"s",
".",
"GetName",
"(",
")",
",",
"Status",
":",
"s",
".",
"GetStatus",
"(",
")",
",",
"LastConnected",
":",
"s",
".",
"GetLastConnected",
"(",
")",
",",
"}",
")",
"\n",
"}",
"\n",
"// serialize them into JSON and write back:",
"data",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"retval",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"_",
",",
"err",
":=",
"ch",
".",
"Write",
"(",
"data",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Start serves a request for "proxysites" custom SSH subsystem. It builds an array of
// service.Site structures, and writes it serialized as JSON back to the SSH client | [
"Start",
"serves",
"a",
"request",
"for",
"proxysites",
"custom",
"SSH",
"subsystem",
".",
"It",
"builds",
"an",
"array",
"of",
"service",
".",
"Site",
"structures",
"and",
"writes",
"it",
"serialized",
"as",
"JSON",
"back",
"to",
"the",
"SSH",
"client"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/regular/sites.go#L53-L75 | train |
gravitational/teleport | lib/events/multilog.go | Close | func (m *MultiLog) Close() error {
var errors []error
for _, log := range m.loggers {
errors = append(errors, log.Close())
}
return trace.NewAggregate(errors...)
} | go | func (m *MultiLog) Close() error {
var errors []error
for _, log := range m.loggers {
errors = append(errors, log.Close())
}
return trace.NewAggregate(errors...)
} | [
"func",
"(",
"m",
"*",
"MultiLog",
")",
"Close",
"(",
")",
"error",
"{",
"var",
"errors",
"[",
"]",
"error",
"\n",
"for",
"_",
",",
"log",
":=",
"range",
"m",
".",
"loggers",
"{",
"errors",
"=",
"append",
"(",
"errors",
",",
"log",
".",
"Close",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"NewAggregate",
"(",
"errors",
"...",
")",
"\n",
"}"
] | // Closer releases connections and resources associated with logs if any | [
"Closer",
"releases",
"connections",
"and",
"resources",
"associated",
"with",
"logs",
"if",
"any"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/multilog.go#L49-L55 | train |
gravitational/teleport | lib/client/client.go | FindServersByLabels | func (proxy *ProxyClient) FindServersByLabels(ctx context.Context, namespace string, labels map[string]string) ([]services.Server, error) {
if namespace == "" {
return nil, trace.BadParameter(auth.MissingNamespaceError)
}
nodes := make([]services.Server, 0)
site, err := proxy.CurrentClusterAccessPoint(ctx, false)
if err != nil {
return nil, trace.Wrap(err)
}
siteNodes, err := site.GetNodes(namespace, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
// look at every node on this site and see which ones match:
for _, node := range siteNodes {
if node.MatchAgainst(labels) {
nodes = append(nodes, node)
}
}
return nodes, nil
} | go | func (proxy *ProxyClient) FindServersByLabels(ctx context.Context, namespace string, labels map[string]string) ([]services.Server, error) {
if namespace == "" {
return nil, trace.BadParameter(auth.MissingNamespaceError)
}
nodes := make([]services.Server, 0)
site, err := proxy.CurrentClusterAccessPoint(ctx, false)
if err != nil {
return nil, trace.Wrap(err)
}
siteNodes, err := site.GetNodes(namespace, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
// look at every node on this site and see which ones match:
for _, node := range siteNodes {
if node.MatchAgainst(labels) {
nodes = append(nodes, node)
}
}
return nodes, nil
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"FindServersByLabels",
"(",
"ctx",
"context",
".",
"Context",
",",
"namespace",
"string",
",",
"labels",
"map",
"[",
"string",
"]",
"string",
")",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"error",
")",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"auth",
".",
"MissingNamespaceError",
")",
"\n",
"}",
"\n",
"nodes",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"0",
")",
"\n",
"site",
",",
"err",
":=",
"proxy",
".",
"CurrentClusterAccessPoint",
"(",
"ctx",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"siteNodes",
",",
"err",
":=",
"site",
".",
"GetNodes",
"(",
"namespace",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// look at every node on this site and see which ones match:",
"for",
"_",
",",
"node",
":=",
"range",
"siteNodes",
"{",
"if",
"node",
".",
"MatchAgainst",
"(",
"labels",
")",
"{",
"nodes",
"=",
"append",
"(",
"nodes",
",",
"node",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nodes",
",",
"nil",
"\n",
"}"
] | // FindServersByLabels returns list of the nodes which have labels exactly matching
// the given label set.
//
// A server is matched when ALL labels match.
// If no labels are passed, ALL nodes are returned. | [
"FindServersByLabels",
"returns",
"list",
"of",
"the",
"nodes",
"which",
"have",
"labels",
"exactly",
"matching",
"the",
"given",
"label",
"set",
".",
"A",
"server",
"is",
"matched",
"when",
"ALL",
"labels",
"match",
".",
"If",
"no",
"labels",
"are",
"passed",
"ALL",
"nodes",
"are",
"returned",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L116-L138 | train |
gravitational/teleport | lib/client/client.go | CurrentClusterAccessPoint | func (proxy *ProxyClient) CurrentClusterAccessPoint(ctx context.Context, quiet bool) (auth.AccessPoint, error) {
// get the current cluster:
cluster, err := proxy.currentCluster()
if err != nil {
return nil, trace.Wrap(err)
}
return proxy.ClusterAccessPoint(ctx, cluster.Name, quiet)
} | go | func (proxy *ProxyClient) CurrentClusterAccessPoint(ctx context.Context, quiet bool) (auth.AccessPoint, error) {
// get the current cluster:
cluster, err := proxy.currentCluster()
if err != nil {
return nil, trace.Wrap(err)
}
return proxy.ClusterAccessPoint(ctx, cluster.Name, quiet)
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"CurrentClusterAccessPoint",
"(",
"ctx",
"context",
".",
"Context",
",",
"quiet",
"bool",
")",
"(",
"auth",
".",
"AccessPoint",
",",
"error",
")",
"{",
"// get the current cluster:",
"cluster",
",",
"err",
":=",
"proxy",
".",
"currentCluster",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"proxy",
".",
"ClusterAccessPoint",
"(",
"ctx",
",",
"cluster",
".",
"Name",
",",
"quiet",
")",
"\n",
"}"
] | // CurrentClusterAccessPoint returns cluster access point to the currently
// selected cluster and is used for discovery
// and could be cached based on the access policy | [
"CurrentClusterAccessPoint",
"returns",
"cluster",
"access",
"point",
"to",
"the",
"currently",
"selected",
"cluster",
"and",
"is",
"used",
"for",
"discovery",
"and",
"could",
"be",
"cached",
"based",
"on",
"the",
"access",
"policy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L143-L150 | train |
gravitational/teleport | lib/client/client.go | ClusterAccessPoint | func (proxy *ProxyClient) ClusterAccessPoint(ctx context.Context, clusterName string, quiet bool) (auth.AccessPoint, error) {
if clusterName == "" {
return nil, trace.BadParameter("parameter clusterName is missing")
}
clt, err := proxy.ConnectToCluster(ctx, clusterName, quiet)
if err != nil {
return nil, trace.Wrap(err)
}
return proxy.teleportClient.accessPoint(clt, proxy.proxyAddress, clusterName)
} | go | func (proxy *ProxyClient) ClusterAccessPoint(ctx context.Context, clusterName string, quiet bool) (auth.AccessPoint, error) {
if clusterName == "" {
return nil, trace.BadParameter("parameter clusterName is missing")
}
clt, err := proxy.ConnectToCluster(ctx, clusterName, quiet)
if err != nil {
return nil, trace.Wrap(err)
}
return proxy.teleportClient.accessPoint(clt, proxy.proxyAddress, clusterName)
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"ClusterAccessPoint",
"(",
"ctx",
"context",
".",
"Context",
",",
"clusterName",
"string",
",",
"quiet",
"bool",
")",
"(",
"auth",
".",
"AccessPoint",
",",
"error",
")",
"{",
"if",
"clusterName",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"clt",
",",
"err",
":=",
"proxy",
".",
"ConnectToCluster",
"(",
"ctx",
",",
"clusterName",
",",
"quiet",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"proxy",
".",
"teleportClient",
".",
"accessPoint",
"(",
"clt",
",",
"proxy",
".",
"proxyAddress",
",",
"clusterName",
")",
"\n",
"}"
] | // ClusterAccessPoint returns cluster access point used for discovery
// and could be cached based on the access policy | [
"ClusterAccessPoint",
"returns",
"cluster",
"access",
"point",
"used",
"for",
"discovery",
"and",
"could",
"be",
"cached",
"based",
"on",
"the",
"access",
"policy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L154-L163 | train |
gravitational/teleport | lib/client/client.go | ConnectToCurrentCluster | func (proxy *ProxyClient) ConnectToCurrentCluster(ctx context.Context, quiet bool) (auth.ClientI, error) {
cluster, err := proxy.currentCluster()
if err != nil {
return nil, trace.Wrap(err)
}
return proxy.ConnectToCluster(ctx, cluster.Name, quiet)
} | go | func (proxy *ProxyClient) ConnectToCurrentCluster(ctx context.Context, quiet bool) (auth.ClientI, error) {
cluster, err := proxy.currentCluster()
if err != nil {
return nil, trace.Wrap(err)
}
return proxy.ConnectToCluster(ctx, cluster.Name, quiet)
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"ConnectToCurrentCluster",
"(",
"ctx",
"context",
".",
"Context",
",",
"quiet",
"bool",
")",
"(",
"auth",
".",
"ClientI",
",",
"error",
")",
"{",
"cluster",
",",
"err",
":=",
"proxy",
".",
"currentCluster",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"proxy",
".",
"ConnectToCluster",
"(",
"ctx",
",",
"cluster",
".",
"Name",
",",
"quiet",
")",
"\n",
"}"
] | // ConnectToCurrentCluster connects to the auth server of the currently selected
// cluster via proxy. It returns connected and authenticated auth server client
//
// if 'quiet' is set to true, no errors will be printed to stdout, otherwise
// any connection errors are visible to a user. | [
"ConnectToCurrentCluster",
"connects",
"to",
"the",
"auth",
"server",
"of",
"the",
"currently",
"selected",
"cluster",
"via",
"proxy",
".",
"It",
"returns",
"connected",
"and",
"authenticated",
"auth",
"server",
"client",
"if",
"quiet",
"is",
"set",
"to",
"true",
"no",
"errors",
"will",
"be",
"printed",
"to",
"stdout",
"otherwise",
"any",
"connection",
"errors",
"are",
"visible",
"to",
"a",
"user",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L170-L176 | train |
gravitational/teleport | lib/client/client.go | ConnectToCluster | func (proxy *ProxyClient) ConnectToCluster(ctx context.Context, clusterName string, quiet bool) (auth.ClientI, error) {
dialer := func(ctx context.Context, network, _ string) (net.Conn, error) {
return proxy.dialAuthServer(ctx, clusterName)
}
if proxy.teleportClient.SkipLocalAuth {
return auth.NewTLSClient(auth.ClientConfig{
DialContext: dialer,
TLS: proxy.teleportClient.TLS,
})
}
// Because Teleport clients can't be configured (yet), they take the default
// list of cipher suites from Go.
tlsConfig := utils.TLSConfig(nil)
localAgent := proxy.teleportClient.LocalAgent()
pool, err := localAgent.GetCerts()
if err != nil {
return nil, trace.Wrap(err)
}
tlsConfig.RootCAs = pool
key, err := localAgent.GetKey()
if err != nil {
return nil, trace.Wrap(err, "failed to fetch TLS key for %v", proxy.teleportClient.Username)
}
if len(key.TLSCert) != 0 {
tlsCert, err := tls.X509KeyPair(key.TLSCert, key.Priv)
if err != nil {
return nil, trace.Wrap(err, "failed to parse TLS cert and key")
}
tlsConfig.Certificates = append(tlsConfig.Certificates, tlsCert)
}
if len(tlsConfig.Certificates) == 0 {
return nil, trace.BadParameter("no TLS keys found for user %v, please relogin to get new credentials", proxy.teleportClient.Username)
}
clt, err := auth.NewTLSClient(auth.ClientConfig{
DialContext: dialer,
TLS: tlsConfig,
})
if err != nil {
return nil, trace.Wrap(err)
}
return clt, nil
} | go | func (proxy *ProxyClient) ConnectToCluster(ctx context.Context, clusterName string, quiet bool) (auth.ClientI, error) {
dialer := func(ctx context.Context, network, _ string) (net.Conn, error) {
return proxy.dialAuthServer(ctx, clusterName)
}
if proxy.teleportClient.SkipLocalAuth {
return auth.NewTLSClient(auth.ClientConfig{
DialContext: dialer,
TLS: proxy.teleportClient.TLS,
})
}
// Because Teleport clients can't be configured (yet), they take the default
// list of cipher suites from Go.
tlsConfig := utils.TLSConfig(nil)
localAgent := proxy.teleportClient.LocalAgent()
pool, err := localAgent.GetCerts()
if err != nil {
return nil, trace.Wrap(err)
}
tlsConfig.RootCAs = pool
key, err := localAgent.GetKey()
if err != nil {
return nil, trace.Wrap(err, "failed to fetch TLS key for %v", proxy.teleportClient.Username)
}
if len(key.TLSCert) != 0 {
tlsCert, err := tls.X509KeyPair(key.TLSCert, key.Priv)
if err != nil {
return nil, trace.Wrap(err, "failed to parse TLS cert and key")
}
tlsConfig.Certificates = append(tlsConfig.Certificates, tlsCert)
}
if len(tlsConfig.Certificates) == 0 {
return nil, trace.BadParameter("no TLS keys found for user %v, please relogin to get new credentials", proxy.teleportClient.Username)
}
clt, err := auth.NewTLSClient(auth.ClientConfig{
DialContext: dialer,
TLS: tlsConfig,
})
if err != nil {
return nil, trace.Wrap(err)
}
return clt, nil
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"ConnectToCluster",
"(",
"ctx",
"context",
".",
"Context",
",",
"clusterName",
"string",
",",
"quiet",
"bool",
")",
"(",
"auth",
".",
"ClientI",
",",
"error",
")",
"{",
"dialer",
":=",
"func",
"(",
"ctx",
"context",
".",
"Context",
",",
"network",
",",
"_",
"string",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"return",
"proxy",
".",
"dialAuthServer",
"(",
"ctx",
",",
"clusterName",
")",
"\n",
"}",
"\n\n",
"if",
"proxy",
".",
"teleportClient",
".",
"SkipLocalAuth",
"{",
"return",
"auth",
".",
"NewTLSClient",
"(",
"auth",
".",
"ClientConfig",
"{",
"DialContext",
":",
"dialer",
",",
"TLS",
":",
"proxy",
".",
"teleportClient",
".",
"TLS",
",",
"}",
")",
"\n",
"}",
"\n\n",
"// Because Teleport clients can't be configured (yet), they take the default",
"// list of cipher suites from Go.",
"tlsConfig",
":=",
"utils",
".",
"TLSConfig",
"(",
"nil",
")",
"\n",
"localAgent",
":=",
"proxy",
".",
"teleportClient",
".",
"LocalAgent",
"(",
")",
"\n",
"pool",
",",
"err",
":=",
"localAgent",
".",
"GetCerts",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"tlsConfig",
".",
"RootCAs",
"=",
"pool",
"\n",
"key",
",",
"err",
":=",
"localAgent",
".",
"GetKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
",",
"\"",
"\"",
",",
"proxy",
".",
"teleportClient",
".",
"Username",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"key",
".",
"TLSCert",
")",
"!=",
"0",
"{",
"tlsCert",
",",
"err",
":=",
"tls",
".",
"X509KeyPair",
"(",
"key",
".",
"TLSCert",
",",
"key",
".",
"Priv",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"tlsConfig",
".",
"Certificates",
"=",
"append",
"(",
"tlsConfig",
".",
"Certificates",
",",
"tlsCert",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"tlsConfig",
".",
"Certificates",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"proxy",
".",
"teleportClient",
".",
"Username",
")",
"\n",
"}",
"\n",
"clt",
",",
"err",
":=",
"auth",
".",
"NewTLSClient",
"(",
"auth",
".",
"ClientConfig",
"{",
"DialContext",
":",
"dialer",
",",
"TLS",
":",
"tlsConfig",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"clt",
",",
"nil",
"\n",
"}"
] | // ConnectToCluster connects to the auth server of the given cluster via proxy.
// It returns connected and authenticated auth server client
//
// if 'quiet' is set to true, no errors will be printed to stdout, otherwise
// any connection errors are visible to a user. | [
"ConnectToCluster",
"connects",
"to",
"the",
"auth",
"server",
"of",
"the",
"given",
"cluster",
"via",
"proxy",
".",
"It",
"returns",
"connected",
"and",
"authenticated",
"auth",
"server",
"client",
"if",
"quiet",
"is",
"set",
"to",
"true",
"no",
"errors",
"will",
"be",
"printed",
"to",
"stdout",
"otherwise",
"any",
"connection",
"errors",
"are",
"visible",
"to",
"a",
"user",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L183-L226 | train |
gravitational/teleport | lib/client/client.go | addCloser | func (c *closerConn) addCloser(closer io.Closer) {
c.closers = append(c.closers, closer)
} | go | func (c *closerConn) addCloser(closer io.Closer) {
c.closers = append(c.closers, closer)
} | [
"func",
"(",
"c",
"*",
"closerConn",
")",
"addCloser",
"(",
"closer",
"io",
".",
"Closer",
")",
"{",
"c",
".",
"closers",
"=",
"append",
"(",
"c",
".",
"closers",
",",
"closer",
")",
"\n",
"}"
] | // addCloser adds any closer in ctx that will be called
// whenever server closes session channel | [
"addCloser",
"adds",
"any",
"closer",
"in",
"ctx",
"that",
"will",
"be",
"called",
"whenever",
"server",
"closes",
"session",
"channel"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L236-L238 | train |
gravitational/teleport | lib/client/client.go | nodeName | func nodeName(node string) string {
n, _, err := net.SplitHostPort(node)
if err != nil {
return node
}
return n
} | go | func nodeName(node string) string {
n, _, err := net.SplitHostPort(node)
if err != nil {
return node
}
return n
} | [
"func",
"nodeName",
"(",
"node",
"string",
")",
"string",
"{",
"n",
",",
"_",
",",
"err",
":=",
"net",
".",
"SplitHostPort",
"(",
"node",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"node",
"\n",
"}",
"\n",
"return",
"n",
"\n",
"}"
] | // nodeName removes the port number from the hostname, if present | [
"nodeName",
"removes",
"the",
"port",
"number",
"from",
"the",
"hostname",
"if",
"present"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L250-L256 | train |
gravitational/teleport | lib/client/client.go | isRecordingProxy | func (proxy *ProxyClient) isRecordingProxy() (bool, error) {
responseCh := make(chan proxyResponse)
// we have to run this in a goroutine because older version of Teleport handled
// global out-of-band requests incorrectly: Teleport would ignore requests it
// does not know about and never reply to them. So if we wait a second and
// don't hear anything back, most likley we are trying to connect to an older
// version of Teleport and we should not try and forward our agent.
go func() {
ok, responseBytes, err := proxy.Client.SendRequest(teleport.RecordingProxyReqType, true, nil)
if err != nil {
responseCh <- proxyResponse{isRecord: false, err: trace.Wrap(err)}
return
}
if !ok {
responseCh <- proxyResponse{isRecord: false, err: trace.AccessDenied("unable to determine proxy type")}
return
}
recordingProxy, err := strconv.ParseBool(string(responseBytes))
if err != nil {
responseCh <- proxyResponse{isRecord: false, err: trace.Wrap(err)}
return
}
responseCh <- proxyResponse{isRecord: recordingProxy, err: nil}
}()
select {
case resp := <-responseCh:
if resp.err != nil {
return false, trace.Wrap(resp.err)
}
return resp.isRecord, nil
case <-time.After(1 * time.Second):
// probably the older version of the proxy or at least someone that is
// responding incorrectly, don't forward agent to it
return false, nil
}
} | go | func (proxy *ProxyClient) isRecordingProxy() (bool, error) {
responseCh := make(chan proxyResponse)
// we have to run this in a goroutine because older version of Teleport handled
// global out-of-band requests incorrectly: Teleport would ignore requests it
// does not know about and never reply to them. So if we wait a second and
// don't hear anything back, most likley we are trying to connect to an older
// version of Teleport and we should not try and forward our agent.
go func() {
ok, responseBytes, err := proxy.Client.SendRequest(teleport.RecordingProxyReqType, true, nil)
if err != nil {
responseCh <- proxyResponse{isRecord: false, err: trace.Wrap(err)}
return
}
if !ok {
responseCh <- proxyResponse{isRecord: false, err: trace.AccessDenied("unable to determine proxy type")}
return
}
recordingProxy, err := strconv.ParseBool(string(responseBytes))
if err != nil {
responseCh <- proxyResponse{isRecord: false, err: trace.Wrap(err)}
return
}
responseCh <- proxyResponse{isRecord: recordingProxy, err: nil}
}()
select {
case resp := <-responseCh:
if resp.err != nil {
return false, trace.Wrap(resp.err)
}
return resp.isRecord, nil
case <-time.After(1 * time.Second):
// probably the older version of the proxy or at least someone that is
// responding incorrectly, don't forward agent to it
return false, nil
}
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"isRecordingProxy",
"(",
")",
"(",
"bool",
",",
"error",
")",
"{",
"responseCh",
":=",
"make",
"(",
"chan",
"proxyResponse",
")",
"\n\n",
"// we have to run this in a goroutine because older version of Teleport handled",
"// global out-of-band requests incorrectly: Teleport would ignore requests it",
"// does not know about and never reply to them. So if we wait a second and",
"// don't hear anything back, most likley we are trying to connect to an older",
"// version of Teleport and we should not try and forward our agent.",
"go",
"func",
"(",
")",
"{",
"ok",
",",
"responseBytes",
",",
"err",
":=",
"proxy",
".",
"Client",
".",
"SendRequest",
"(",
"teleport",
".",
"RecordingProxyReqType",
",",
"true",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"responseCh",
"<-",
"proxyResponse",
"{",
"isRecord",
":",
"false",
",",
"err",
":",
"trace",
".",
"Wrap",
"(",
"err",
")",
"}",
"\n",
"return",
"\n",
"}",
"\n",
"if",
"!",
"ok",
"{",
"responseCh",
"<-",
"proxyResponse",
"{",
"isRecord",
":",
"false",
",",
"err",
":",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"}",
"\n",
"return",
"\n",
"}",
"\n\n",
"recordingProxy",
",",
"err",
":=",
"strconv",
".",
"ParseBool",
"(",
"string",
"(",
"responseBytes",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"responseCh",
"<-",
"proxyResponse",
"{",
"isRecord",
":",
"false",
",",
"err",
":",
"trace",
".",
"Wrap",
"(",
"err",
")",
"}",
"\n",
"return",
"\n",
"}",
"\n\n",
"responseCh",
"<-",
"proxyResponse",
"{",
"isRecord",
":",
"recordingProxy",
",",
"err",
":",
"nil",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"select",
"{",
"case",
"resp",
":=",
"<-",
"responseCh",
":",
"if",
"resp",
".",
"err",
"!=",
"nil",
"{",
"return",
"false",
",",
"trace",
".",
"Wrap",
"(",
"resp",
".",
"err",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"isRecord",
",",
"nil",
"\n",
"case",
"<-",
"time",
".",
"After",
"(",
"1",
"*",
"time",
".",
"Second",
")",
":",
"// probably the older version of the proxy or at least someone that is",
"// responding incorrectly, don't forward agent to it",
"return",
"false",
",",
"nil",
"\n",
"}",
"\n",
"}"
] | // isRecordingProxy returns true if the proxy is in recording mode. Note, this
// function can only be called after authentication has occurred and should be
// called before the first session is created. | [
"isRecordingProxy",
"returns",
"true",
"if",
"the",
"proxy",
"is",
"in",
"recording",
"mode",
".",
"Note",
"this",
"function",
"can",
"only",
"be",
"called",
"after",
"authentication",
"has",
"occurred",
"and",
"should",
"be",
"called",
"before",
"the",
"first",
"session",
"is",
"created",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L266-L305 | train |
gravitational/teleport | lib/client/client.go | dialAuthServer | func (proxy *ProxyClient) dialAuthServer(ctx context.Context, clusterName string) (net.Conn, error) {
log.Debugf("Client %v is connecting to auth server on cluster %q.", proxy.clientAddr, clusterName)
address := "@" + clusterName
// parse destination first:
localAddr, err := utils.ParseAddr("tcp://" + proxy.proxyAddress)
if err != nil {
return nil, trace.Wrap(err)
}
fakeAddr, err := utils.ParseAddr("tcp://" + address)
if err != nil {
return nil, trace.Wrap(err)
}
proxySession, err := proxy.Client.NewSession()
if err != nil {
return nil, trace.Wrap(err)
}
proxyWriter, err := proxySession.StdinPipe()
if err != nil {
return nil, trace.Wrap(err)
}
proxyReader, err := proxySession.StdoutPipe()
if err != nil {
return nil, trace.Wrap(err)
}
proxyErr, err := proxySession.StderrPipe()
if err != nil {
return nil, trace.Wrap(err)
}
err = proxySession.RequestSubsystem("proxy:" + address)
if err != nil {
// read the stderr output from the failed SSH session and append
// it to the end of our own message:
serverErrorMsg, _ := ioutil.ReadAll(proxyErr)
return nil, trace.ConnectionProblem(err, "failed connecting to node %v. %s",
nodeName(strings.Split(address, "@")[0]), serverErrorMsg)
}
return utils.NewPipeNetConn(
proxyReader,
proxyWriter,
proxySession,
localAddr,
fakeAddr,
), nil
} | go | func (proxy *ProxyClient) dialAuthServer(ctx context.Context, clusterName string) (net.Conn, error) {
log.Debugf("Client %v is connecting to auth server on cluster %q.", proxy.clientAddr, clusterName)
address := "@" + clusterName
// parse destination first:
localAddr, err := utils.ParseAddr("tcp://" + proxy.proxyAddress)
if err != nil {
return nil, trace.Wrap(err)
}
fakeAddr, err := utils.ParseAddr("tcp://" + address)
if err != nil {
return nil, trace.Wrap(err)
}
proxySession, err := proxy.Client.NewSession()
if err != nil {
return nil, trace.Wrap(err)
}
proxyWriter, err := proxySession.StdinPipe()
if err != nil {
return nil, trace.Wrap(err)
}
proxyReader, err := proxySession.StdoutPipe()
if err != nil {
return nil, trace.Wrap(err)
}
proxyErr, err := proxySession.StderrPipe()
if err != nil {
return nil, trace.Wrap(err)
}
err = proxySession.RequestSubsystem("proxy:" + address)
if err != nil {
// read the stderr output from the failed SSH session and append
// it to the end of our own message:
serverErrorMsg, _ := ioutil.ReadAll(proxyErr)
return nil, trace.ConnectionProblem(err, "failed connecting to node %v. %s",
nodeName(strings.Split(address, "@")[0]), serverErrorMsg)
}
return utils.NewPipeNetConn(
proxyReader,
proxyWriter,
proxySession,
localAddr,
fakeAddr,
), nil
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"dialAuthServer",
"(",
"ctx",
"context",
".",
"Context",
",",
"clusterName",
"string",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"proxy",
".",
"clientAddr",
",",
"clusterName",
")",
"\n\n",
"address",
":=",
"\"",
"\"",
"+",
"clusterName",
"\n\n",
"// parse destination first:",
"localAddr",
",",
"err",
":=",
"utils",
".",
"ParseAddr",
"(",
"\"",
"\"",
"+",
"proxy",
".",
"proxyAddress",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"fakeAddr",
",",
"err",
":=",
"utils",
".",
"ParseAddr",
"(",
"\"",
"\"",
"+",
"address",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"proxySession",
",",
"err",
":=",
"proxy",
".",
"Client",
".",
"NewSession",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"proxyWriter",
",",
"err",
":=",
"proxySession",
".",
"StdinPipe",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"proxyReader",
",",
"err",
":=",
"proxySession",
".",
"StdoutPipe",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"proxyErr",
",",
"err",
":=",
"proxySession",
".",
"StderrPipe",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"err",
"=",
"proxySession",
".",
"RequestSubsystem",
"(",
"\"",
"\"",
"+",
"address",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// read the stderr output from the failed SSH session and append",
"// it to the end of our own message:",
"serverErrorMsg",
",",
"_",
":=",
"ioutil",
".",
"ReadAll",
"(",
"proxyErr",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"ConnectionProblem",
"(",
"err",
",",
"\"",
"\"",
",",
"nodeName",
"(",
"strings",
".",
"Split",
"(",
"address",
",",
"\"",
"\"",
")",
"[",
"0",
"]",
")",
",",
"serverErrorMsg",
")",
"\n",
"}",
"\n",
"return",
"utils",
".",
"NewPipeNetConn",
"(",
"proxyReader",
",",
"proxyWriter",
",",
"proxySession",
",",
"localAddr",
",",
"fakeAddr",
",",
")",
",",
"nil",
"\n",
"}"
] | // dialAuthServer returns auth server connection forwarded via proxy | [
"dialAuthServer",
"returns",
"auth",
"server",
"connection",
"forwarded",
"via",
"proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L308-L355 | train |
gravitational/teleport | lib/client/client.go | newClientConn | func newClientConn(ctx context.Context,
conn net.Conn,
nodeAddress string,
config *ssh.ClientConfig) (ssh.Conn, <-chan ssh.NewChannel, <-chan *ssh.Request, error) {
type response struct {
conn ssh.Conn
chanCh <-chan ssh.NewChannel
reqCh <-chan *ssh.Request
err error
}
respCh := make(chan response, 1)
go func() {
conn, chans, reqs, err := ssh.NewClientConn(conn, nodeAddress, config)
respCh <- response{conn, chans, reqs, err}
}()
select {
case resp := <-respCh:
if resp.err != nil {
return nil, nil, nil, trace.Wrap(resp.err, "failed to connect to %q", nodeAddress)
}
return resp.conn, resp.chanCh, resp.reqCh, nil
case <-ctx.Done():
errClose := conn.Close()
if errClose != nil {
log.Error(errClose)
}
// drain the channel
resp := <-respCh
return nil, nil, nil, trace.ConnectionProblem(resp.err, "failed to connect to %q", nodeAddress)
}
} | go | func newClientConn(ctx context.Context,
conn net.Conn,
nodeAddress string,
config *ssh.ClientConfig) (ssh.Conn, <-chan ssh.NewChannel, <-chan *ssh.Request, error) {
type response struct {
conn ssh.Conn
chanCh <-chan ssh.NewChannel
reqCh <-chan *ssh.Request
err error
}
respCh := make(chan response, 1)
go func() {
conn, chans, reqs, err := ssh.NewClientConn(conn, nodeAddress, config)
respCh <- response{conn, chans, reqs, err}
}()
select {
case resp := <-respCh:
if resp.err != nil {
return nil, nil, nil, trace.Wrap(resp.err, "failed to connect to %q", nodeAddress)
}
return resp.conn, resp.chanCh, resp.reqCh, nil
case <-ctx.Done():
errClose := conn.Close()
if errClose != nil {
log.Error(errClose)
}
// drain the channel
resp := <-respCh
return nil, nil, nil, trace.ConnectionProblem(resp.err, "failed to connect to %q", nodeAddress)
}
} | [
"func",
"newClientConn",
"(",
"ctx",
"context",
".",
"Context",
",",
"conn",
"net",
".",
"Conn",
",",
"nodeAddress",
"string",
",",
"config",
"*",
"ssh",
".",
"ClientConfig",
")",
"(",
"ssh",
".",
"Conn",
",",
"<-",
"chan",
"ssh",
".",
"NewChannel",
",",
"<-",
"chan",
"*",
"ssh",
".",
"Request",
",",
"error",
")",
"{",
"type",
"response",
"struct",
"{",
"conn",
"ssh",
".",
"Conn",
"\n",
"chanCh",
"<-",
"chan",
"ssh",
".",
"NewChannel",
"\n",
"reqCh",
"<-",
"chan",
"*",
"ssh",
".",
"Request",
"\n",
"err",
"error",
"\n",
"}",
"\n\n",
"respCh",
":=",
"make",
"(",
"chan",
"response",
",",
"1",
")",
"\n",
"go",
"func",
"(",
")",
"{",
"conn",
",",
"chans",
",",
"reqs",
",",
"err",
":=",
"ssh",
".",
"NewClientConn",
"(",
"conn",
",",
"nodeAddress",
",",
"config",
")",
"\n",
"respCh",
"<-",
"response",
"{",
"conn",
",",
"chans",
",",
"reqs",
",",
"err",
"}",
"\n",
"}",
"(",
")",
"\n\n",
"select",
"{",
"case",
"resp",
":=",
"<-",
"respCh",
":",
"if",
"resp",
".",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"resp",
".",
"err",
",",
"\"",
"\"",
",",
"nodeAddress",
")",
"\n",
"}",
"\n",
"return",
"resp",
".",
"conn",
",",
"resp",
".",
"chanCh",
",",
"resp",
".",
"reqCh",
",",
"nil",
"\n",
"case",
"<-",
"ctx",
".",
"Done",
"(",
")",
":",
"errClose",
":=",
"conn",
".",
"Close",
"(",
")",
"\n",
"if",
"errClose",
"!=",
"nil",
"{",
"log",
".",
"Error",
"(",
"errClose",
")",
"\n",
"}",
"\n",
"// drain the channel",
"resp",
":=",
"<-",
"respCh",
"\n",
"return",
"nil",
",",
"nil",
",",
"nil",
",",
"trace",
".",
"ConnectionProblem",
"(",
"resp",
".",
"err",
",",
"\"",
"\"",
",",
"nodeAddress",
")",
"\n",
"}",
"\n",
"}"
] | // newClientConn is a wrapper around ssh.NewClientConn | [
"newClientConn",
"is",
"a",
"wrapper",
"around",
"ssh",
".",
"NewClientConn"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L517-L550 | train |
gravitational/teleport | lib/client/client.go | listenAndForward | func (c *NodeClient) listenAndForward(ctx context.Context, ln net.Listener, remoteAddr string) {
defer ln.Close()
defer c.Close()
for {
// Accept connections from the client.
conn, err := ln.Accept()
if err != nil {
log.Errorf("Port forwarding failed: %v.", err)
break
}
// Proxy the connection to the remote address.
go func() {
err := c.proxyConnection(ctx, conn, remoteAddr)
if err != nil {
log.Warnf("Failed to proxy connection: %v.", err)
}
}()
}
} | go | func (c *NodeClient) listenAndForward(ctx context.Context, ln net.Listener, remoteAddr string) {
defer ln.Close()
defer c.Close()
for {
// Accept connections from the client.
conn, err := ln.Accept()
if err != nil {
log.Errorf("Port forwarding failed: %v.", err)
break
}
// Proxy the connection to the remote address.
go func() {
err := c.proxyConnection(ctx, conn, remoteAddr)
if err != nil {
log.Warnf("Failed to proxy connection: %v.", err)
}
}()
}
} | [
"func",
"(",
"c",
"*",
"NodeClient",
")",
"listenAndForward",
"(",
"ctx",
"context",
".",
"Context",
",",
"ln",
"net",
".",
"Listener",
",",
"remoteAddr",
"string",
")",
"{",
"defer",
"ln",
".",
"Close",
"(",
")",
"\n",
"defer",
"c",
".",
"Close",
"(",
")",
"\n\n",
"for",
"{",
"// Accept connections from the client.",
"conn",
",",
"err",
":=",
"ln",
".",
"Accept",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"break",
"\n",
"}",
"\n\n",
"// Proxy the connection to the remote address.",
"go",
"func",
"(",
")",
"{",
"err",
":=",
"c",
".",
"proxyConnection",
"(",
"ctx",
",",
"conn",
",",
"remoteAddr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n",
"}"
] | // listenAndForward listens on a given socket and forwards all incoming
// commands to the remote address through the SSH tunnel. | [
"listenAndForward",
"listens",
"on",
"a",
"given",
"socket",
"and",
"forwards",
"all",
"incoming",
"commands",
"to",
"the",
"remote",
"address",
"through",
"the",
"SSH",
"tunnel",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L675-L695 | train |
gravitational/teleport | lib/client/client.go | dynamicListenAndForward | func (c *NodeClient) dynamicListenAndForward(ctx context.Context, ln net.Listener) {
defer ln.Close()
defer c.Close()
for {
// Accept connection from the client. Here the client is typically
// something like a web browser or other SOCKS5 aware application.
conn, err := ln.Accept()
if err != nil {
log.Errorf("Dynamic port forwarding (SOCKS5) failed: %v.", err)
break
}
// Perform the SOCKS5 handshake with the client to find out the remote
// address to proxy.
remoteAddr, err := socks.Handshake(conn)
if err != nil {
log.Errorf("SOCKS5 handshake failed: %v.", err)
break
}
log.Debugf("SOCKS5 proxy forwarding requests to %v.", remoteAddr)
// Proxy the connection to the remote address.
go func() {
err := c.proxyConnection(ctx, conn, remoteAddr)
if err != nil {
log.Warnf("Failed to proxy connection: %v.", err)
}
}()
}
} | go | func (c *NodeClient) dynamicListenAndForward(ctx context.Context, ln net.Listener) {
defer ln.Close()
defer c.Close()
for {
// Accept connection from the client. Here the client is typically
// something like a web browser or other SOCKS5 aware application.
conn, err := ln.Accept()
if err != nil {
log.Errorf("Dynamic port forwarding (SOCKS5) failed: %v.", err)
break
}
// Perform the SOCKS5 handshake with the client to find out the remote
// address to proxy.
remoteAddr, err := socks.Handshake(conn)
if err != nil {
log.Errorf("SOCKS5 handshake failed: %v.", err)
break
}
log.Debugf("SOCKS5 proxy forwarding requests to %v.", remoteAddr)
// Proxy the connection to the remote address.
go func() {
err := c.proxyConnection(ctx, conn, remoteAddr)
if err != nil {
log.Warnf("Failed to proxy connection: %v.", err)
}
}()
}
} | [
"func",
"(",
"c",
"*",
"NodeClient",
")",
"dynamicListenAndForward",
"(",
"ctx",
"context",
".",
"Context",
",",
"ln",
"net",
".",
"Listener",
")",
"{",
"defer",
"ln",
".",
"Close",
"(",
")",
"\n",
"defer",
"c",
".",
"Close",
"(",
")",
"\n\n",
"for",
"{",
"// Accept connection from the client. Here the client is typically",
"// something like a web browser or other SOCKS5 aware application.",
"conn",
",",
"err",
":=",
"ln",
".",
"Accept",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"break",
"\n",
"}",
"\n\n",
"// Perform the SOCKS5 handshake with the client to find out the remote",
"// address to proxy.",
"remoteAddr",
",",
"err",
":=",
"socks",
".",
"Handshake",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"break",
"\n",
"}",
"\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"remoteAddr",
")",
"\n\n",
"// Proxy the connection to the remote address.",
"go",
"func",
"(",
")",
"{",
"err",
":=",
"c",
".",
"proxyConnection",
"(",
"ctx",
",",
"conn",
",",
"remoteAddr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"(",
")",
"\n",
"}",
"\n",
"}"
] | // dynamicListenAndForward listens for connections, performs a SOCKS5
// handshake, and then proxies the connection to the requested address. | [
"dynamicListenAndForward",
"listens",
"for",
"connections",
"performs",
"a",
"SOCKS5",
"handshake",
"and",
"then",
"proxies",
"the",
"connection",
"to",
"the",
"requested",
"address",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L699-L729 | train |
gravitational/teleport | lib/client/client.go | currentCluster | func (proxy *ProxyClient) currentCluster() (*services.Site, error) {
sites, err := proxy.GetSites()
if err != nil {
return nil, trace.Wrap(err)
}
if len(sites) == 0 {
return nil, trace.NotFound("no clusters registered")
}
if proxy.siteName == "" {
return &sites[0], nil
}
for _, site := range sites {
if site.Name == proxy.siteName {
return &site, nil
}
}
return nil, trace.NotFound("cluster %v not found", proxy.siteName)
} | go | func (proxy *ProxyClient) currentCluster() (*services.Site, error) {
sites, err := proxy.GetSites()
if err != nil {
return nil, trace.Wrap(err)
}
if len(sites) == 0 {
return nil, trace.NotFound("no clusters registered")
}
if proxy.siteName == "" {
return &sites[0], nil
}
for _, site := range sites {
if site.Name == proxy.siteName {
return &site, nil
}
}
return nil, trace.NotFound("cluster %v not found", proxy.siteName)
} | [
"func",
"(",
"proxy",
"*",
"ProxyClient",
")",
"currentCluster",
"(",
")",
"(",
"*",
"services",
".",
"Site",
",",
"error",
")",
"{",
"sites",
",",
"err",
":=",
"proxy",
".",
"GetSites",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"sites",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"proxy",
".",
"siteName",
"==",
"\"",
"\"",
"{",
"return",
"&",
"sites",
"[",
"0",
"]",
",",
"nil",
"\n",
"}",
"\n",
"for",
"_",
",",
"site",
":=",
"range",
"sites",
"{",
"if",
"site",
".",
"Name",
"==",
"proxy",
".",
"siteName",
"{",
"return",
"&",
"site",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
",",
"proxy",
".",
"siteName",
")",
"\n",
"}"
] | // currentCluster returns the connection to the API of the current cluster | [
"currentCluster",
"returns",
"the",
"connection",
"to",
"the",
"API",
"of",
"the",
"current",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/client.go#L737-L754 | train |
gravitational/teleport | lib/sshutils/scp/scp.go | CreateDownloadCommand | func CreateDownloadCommand(cfg Config) (Command, error) {
cfg.Flags.Sink = true
cfg.Flags.Source = false
cmd, err := CreateCommand(cfg)
if err != nil {
return nil, trace.Wrap(err)
}
return cmd, nil
} | go | func CreateDownloadCommand(cfg Config) (Command, error) {
cfg.Flags.Sink = true
cfg.Flags.Source = false
cmd, err := CreateCommand(cfg)
if err != nil {
return nil, trace.Wrap(err)
}
return cmd, nil
} | [
"func",
"CreateDownloadCommand",
"(",
"cfg",
"Config",
")",
"(",
"Command",
",",
"error",
")",
"{",
"cfg",
".",
"Flags",
".",
"Sink",
"=",
"true",
"\n",
"cfg",
".",
"Flags",
".",
"Source",
"=",
"false",
"\n",
"cmd",
",",
"err",
":=",
"CreateCommand",
"(",
"cfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"cmd",
",",
"nil",
"\n",
"}"
] | // CreateDownloadCommand configures and returns a command used
// to download a file | [
"CreateDownloadCommand",
"configures",
"and",
"returns",
"a",
"command",
"used",
"to",
"download",
"a",
"file"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/scp.go#L129-L138 | train |
gravitational/teleport | lib/sshutils/scp/scp.go | CreateCommand | func CreateCommand(cfg Config) (Command, error) {
err := cfg.CheckAndSetDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
cmd := command{
Config: cfg,
}
cmd.log = log.WithFields(log.Fields{
trace.Component: "SCP",
trace.ComponentFields: log.Fields{
"LocalAddr": cfg.Flags.LocalAddr,
"RemoteAddr": cfg.Flags.RemoteAddr,
"Target": cfg.Flags.Target,
"User": cfg.User,
"RunOnServer": cfg.RunOnServer,
"RemoteLocation": cfg.RemoteLocation,
},
})
return &cmd, nil
} | go | func CreateCommand(cfg Config) (Command, error) {
err := cfg.CheckAndSetDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
cmd := command{
Config: cfg,
}
cmd.log = log.WithFields(log.Fields{
trace.Component: "SCP",
trace.ComponentFields: log.Fields{
"LocalAddr": cfg.Flags.LocalAddr,
"RemoteAddr": cfg.Flags.RemoteAddr,
"Target": cfg.Flags.Target,
"User": cfg.User,
"RunOnServer": cfg.RunOnServer,
"RemoteLocation": cfg.RemoteLocation,
},
})
return &cmd, nil
} | [
"func",
"CreateCommand",
"(",
"cfg",
"Config",
")",
"(",
"Command",
",",
"error",
")",
"{",
"err",
":=",
"cfg",
".",
"CheckAndSetDefaults",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"cmd",
":=",
"command",
"{",
"Config",
":",
"cfg",
",",
"}",
"\n\n",
"cmd",
".",
"log",
"=",
"log",
".",
"WithFields",
"(",
"log",
".",
"Fields",
"{",
"trace",
".",
"Component",
":",
"\"",
"\"",
",",
"trace",
".",
"ComponentFields",
":",
"log",
".",
"Fields",
"{",
"\"",
"\"",
":",
"cfg",
".",
"Flags",
".",
"LocalAddr",
",",
"\"",
"\"",
":",
"cfg",
".",
"Flags",
".",
"RemoteAddr",
",",
"\"",
"\"",
":",
"cfg",
".",
"Flags",
".",
"Target",
",",
"\"",
"\"",
":",
"cfg",
".",
"User",
",",
"\"",
"\"",
":",
"cfg",
".",
"RunOnServer",
",",
"\"",
"\"",
":",
"cfg",
".",
"RemoteLocation",
",",
"}",
",",
"}",
")",
"\n\n",
"return",
"&",
"cmd",
",",
"nil",
"\n",
"}"
] | // CreateCommand creates and returns a new Command | [
"CreateCommand",
"creates",
"and",
"returns",
"a",
"new",
"Command"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/scp.go#L167-L190 | train |
gravitational/teleport | lib/sshutils/scp/scp.go | sendError | func (cmd *command) sendError(ch io.ReadWriter, err error) error {
if err == nil {
return nil
}
cmd.log.Error(err)
message := err.Error()
bytes := make([]byte, 0, len(message)+2)
bytes = append(bytes, ErrByte)
bytes = append(bytes, message...)
bytes = append(bytes, []byte{'\n'}...)
_, writeErr := ch.Write(bytes)
if writeErr != nil {
cmd.log.Error(writeErr)
}
return trace.Wrap(err)
} | go | func (cmd *command) sendError(ch io.ReadWriter, err error) error {
if err == nil {
return nil
}
cmd.log.Error(err)
message := err.Error()
bytes := make([]byte, 0, len(message)+2)
bytes = append(bytes, ErrByte)
bytes = append(bytes, message...)
bytes = append(bytes, []byte{'\n'}...)
_, writeErr := ch.Write(bytes)
if writeErr != nil {
cmd.log.Error(writeErr)
}
return trace.Wrap(err)
} | [
"func",
"(",
"cmd",
"*",
"command",
")",
"sendError",
"(",
"ch",
"io",
".",
"ReadWriter",
",",
"err",
"error",
")",
"error",
"{",
"if",
"err",
"==",
"nil",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"cmd",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"message",
":=",
"err",
".",
"Error",
"(",
")",
"\n",
"bytes",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"0",
",",
"len",
"(",
"message",
")",
"+",
"2",
")",
"\n",
"bytes",
"=",
"append",
"(",
"bytes",
",",
"ErrByte",
")",
"\n",
"bytes",
"=",
"append",
"(",
"bytes",
",",
"message",
"...",
")",
"\n",
"bytes",
"=",
"append",
"(",
"bytes",
",",
"[",
"]",
"byte",
"{",
"'\\n'",
"}",
"...",
")",
"\n",
"_",
",",
"writeErr",
":=",
"ch",
".",
"Write",
"(",
"bytes",
")",
"\n",
"if",
"writeErr",
"!=",
"nil",
"{",
"cmd",
".",
"log",
".",
"Error",
"(",
"writeErr",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // sendError gets called during all errors during SCP transmission.
// It writes it back to the SCP client | [
"sendError",
"gets",
"called",
"during",
"all",
"errors",
"during",
"SCP",
"transmission",
".",
"It",
"writes",
"it",
"back",
"to",
"the",
"SCP",
"client"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/scp.go#L515-L530 | train |
gravitational/teleport | lib/sshutils/scp/scp.go | read | func (r *reader) read() error {
n, err := r.r.Read(r.b)
if err != nil {
return trace.Wrap(err)
}
if n < 1 {
return trace.Errorf("unexpected error, read 0 bytes")
}
switch r.b[0] {
case OKByte:
return nil
case WarnByte, ErrByte:
r.s.Scan()
if err := r.s.Err(); err != nil {
return trace.Wrap(err)
}
return trace.Errorf(r.s.Text())
}
return trace.Errorf("unrecognized command: %#v", r.b)
} | go | func (r *reader) read() error {
n, err := r.r.Read(r.b)
if err != nil {
return trace.Wrap(err)
}
if n < 1 {
return trace.Errorf("unexpected error, read 0 bytes")
}
switch r.b[0] {
case OKByte:
return nil
case WarnByte, ErrByte:
r.s.Scan()
if err := r.s.Err(); err != nil {
return trace.Wrap(err)
}
return trace.Errorf(r.s.Text())
}
return trace.Errorf("unrecognized command: %#v", r.b)
} | [
"func",
"(",
"r",
"*",
"reader",
")",
"read",
"(",
")",
"error",
"{",
"n",
",",
"err",
":=",
"r",
".",
"r",
".",
"Read",
"(",
"r",
".",
"b",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"n",
"<",
"1",
"{",
"return",
"trace",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"switch",
"r",
".",
"b",
"[",
"0",
"]",
"{",
"case",
"OKByte",
":",
"return",
"nil",
"\n",
"case",
"WarnByte",
",",
"ErrByte",
":",
"r",
".",
"s",
".",
"Scan",
"(",
")",
"\n",
"if",
"err",
":=",
"r",
".",
"s",
".",
"Err",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Errorf",
"(",
"r",
".",
"s",
".",
"Text",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"r",
".",
"b",
")",
"\n",
"}"
] | // read is used to "ask" for response messages after each SCP transmission
// it only reads text data until a newline and returns 'nil' for "OK" responses
// and errors for everything else | [
"read",
"is",
"used",
"to",
"ask",
"for",
"response",
"messages",
"after",
"each",
"SCP",
"transmission",
"it",
"only",
"reads",
"text",
"data",
"until",
"a",
"newline",
"and",
"returns",
"nil",
"for",
"OK",
"responses",
"and",
"errors",
"for",
"everything",
"else"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/scp.go#L639-L659 | train |
gravitational/teleport | lib/client/keystore.go | AddKey | func (fs *FSLocalKeyStore) AddKey(host, username string, key *Key) error {
dirPath, err := fs.dirFor(host, true)
if err != nil {
return trace.Wrap(err)
}
writeBytes := func(fname string, data []byte) error {
fp := filepath.Join(dirPath, fname)
err := ioutil.WriteFile(fp, data, keyFilePerms)
if err != nil {
fs.log.Error(err)
}
return err
}
if err = writeBytes(username+fileExtCert, key.Cert); err != nil {
return trace.Wrap(err)
}
if err = writeBytes(username+fileExtTLSCert, key.TLSCert); err != nil {
return trace.Wrap(err)
}
if err = writeBytes(username+fileExtPub, key.Pub); err != nil {
return trace.Wrap(err)
}
if err = writeBytes(username, key.Priv); err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (fs *FSLocalKeyStore) AddKey(host, username string, key *Key) error {
dirPath, err := fs.dirFor(host, true)
if err != nil {
return trace.Wrap(err)
}
writeBytes := func(fname string, data []byte) error {
fp := filepath.Join(dirPath, fname)
err := ioutil.WriteFile(fp, data, keyFilePerms)
if err != nil {
fs.log.Error(err)
}
return err
}
if err = writeBytes(username+fileExtCert, key.Cert); err != nil {
return trace.Wrap(err)
}
if err = writeBytes(username+fileExtTLSCert, key.TLSCert); err != nil {
return trace.Wrap(err)
}
if err = writeBytes(username+fileExtPub, key.Pub); err != nil {
return trace.Wrap(err)
}
if err = writeBytes(username, key.Priv); err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"AddKey",
"(",
"host",
",",
"username",
"string",
",",
"key",
"*",
"Key",
")",
"error",
"{",
"dirPath",
",",
"err",
":=",
"fs",
".",
"dirFor",
"(",
"host",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"writeBytes",
":=",
"func",
"(",
"fname",
"string",
",",
"data",
"[",
"]",
"byte",
")",
"error",
"{",
"fp",
":=",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"fname",
")",
"\n",
"err",
":=",
"ioutil",
".",
"WriteFile",
"(",
"fp",
",",
"data",
",",
"keyFilePerms",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fs",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
"=",
"writeBytes",
"(",
"username",
"+",
"fileExtCert",
",",
"key",
".",
"Cert",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
"=",
"writeBytes",
"(",
"username",
"+",
"fileExtTLSCert",
",",
"key",
".",
"TLSCert",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
"=",
"writeBytes",
"(",
"username",
"+",
"fileExtPub",
",",
"key",
".",
"Pub",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
"=",
"writeBytes",
"(",
"username",
",",
"key",
".",
"Priv",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // AddKey adds a new key to the session store. If a key for the host is already
// stored, overwrites it. | [
"AddKey",
"adds",
"a",
"new",
"key",
"to",
"the",
"session",
"store",
".",
"If",
"a",
"key",
"for",
"the",
"host",
"is",
"already",
"stored",
"overwrites",
"it",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L142-L168 | train |
gravitational/teleport | lib/client/keystore.go | DeleteKey | func (fs *FSLocalKeyStore) DeleteKey(host string, username string) error {
dirPath, err := fs.dirFor(host, false)
if err != nil {
return trace.Wrap(err)
}
files := []string{
filepath.Join(dirPath, username+fileExtCert),
filepath.Join(dirPath, username+fileExtTLSCert),
filepath.Join(dirPath, username+fileExtPub),
filepath.Join(dirPath, username),
}
for _, fn := range files {
if err = os.Remove(fn); err != nil {
return trace.Wrap(err)
}
}
return nil
} | go | func (fs *FSLocalKeyStore) DeleteKey(host string, username string) error {
dirPath, err := fs.dirFor(host, false)
if err != nil {
return trace.Wrap(err)
}
files := []string{
filepath.Join(dirPath, username+fileExtCert),
filepath.Join(dirPath, username+fileExtTLSCert),
filepath.Join(dirPath, username+fileExtPub),
filepath.Join(dirPath, username),
}
for _, fn := range files {
if err = os.Remove(fn); err != nil {
return trace.Wrap(err)
}
}
return nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"DeleteKey",
"(",
"host",
"string",
",",
"username",
"string",
")",
"error",
"{",
"dirPath",
",",
"err",
":=",
"fs",
".",
"dirFor",
"(",
"host",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"files",
":=",
"[",
"]",
"string",
"{",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
"+",
"fileExtCert",
")",
",",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
"+",
"fileExtTLSCert",
")",
",",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
"+",
"fileExtPub",
")",
",",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
")",
",",
"}",
"\n",
"for",
"_",
",",
"fn",
":=",
"range",
"files",
"{",
"if",
"err",
"=",
"os",
".",
"Remove",
"(",
"fn",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // DeleteKey deletes a key from the local store | [
"DeleteKey",
"deletes",
"a",
"key",
"from",
"the",
"local",
"store"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L171-L188 | train |
gravitational/teleport | lib/client/keystore.go | DeleteKeys | func (fs *FSLocalKeyStore) DeleteKeys() error {
dirPath := filepath.Join(fs.KeyDir, sessionKeyDir)
err := os.RemoveAll(dirPath)
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (fs *FSLocalKeyStore) DeleteKeys() error {
dirPath := filepath.Join(fs.KeyDir, sessionKeyDir)
err := os.RemoveAll(dirPath)
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"DeleteKeys",
"(",
")",
"error",
"{",
"dirPath",
":=",
"filepath",
".",
"Join",
"(",
"fs",
".",
"KeyDir",
",",
"sessionKeyDir",
")",
"\n\n",
"err",
":=",
"os",
".",
"RemoveAll",
"(",
"dirPath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteKeys removes all session keys from disk. | [
"DeleteKeys",
"removes",
"all",
"session",
"keys",
"from",
"disk",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L191-L200 | train |
gravitational/teleport | lib/client/keystore.go | GetKey | func (fs *FSLocalKeyStore) GetKey(proxyHost string, username string) (*Key, error) {
dirPath, err := fs.dirFor(proxyHost, false)
if err != nil {
return nil, trace.Wrap(err)
}
_, err = ioutil.ReadDir(dirPath)
if err != nil {
return nil, trace.NotFound("no session keys for %v in %v", username, proxyHost)
}
certFile := filepath.Join(dirPath, username+fileExtCert)
cert, err := ioutil.ReadFile(certFile)
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
tlsCertFile := filepath.Join(dirPath, username+fileExtTLSCert)
tlsCert, err := ioutil.ReadFile(tlsCertFile)
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
pub, err := ioutil.ReadFile(filepath.Join(dirPath, username+fileExtPub))
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
priv, err := ioutil.ReadFile(filepath.Join(dirPath, username))
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
key := &Key{Pub: pub, Priv: priv, Cert: cert, ProxyHost: proxyHost, TLSCert: tlsCert}
// Validate the key loaded from disk.
err = key.CheckCert()
if err != nil {
// KeyStore should return expired certificates as well
if !utils.IsCertExpiredError(err) {
return nil, trace.Wrap(err)
}
}
sshCertExpiration, err := key.CertValidBefore()
if err != nil {
return nil, trace.Wrap(err)
}
tlsCertExpiration, err := key.TLSCertValidBefore()
if err != nil {
return nil, trace.Wrap(err)
}
// Note, we may be returning expired certificates here, that is okay. If the
// certificates is expired, it's the responsibility of the TeleportClient to
// perform cleanup of the certificates and the profile.
fs.log.Debugf("Returning SSH certificate %q valid until %q, TLS certificate %q valid until %q.",
certFile, sshCertExpiration, tlsCertFile, tlsCertExpiration)
return key, nil
} | go | func (fs *FSLocalKeyStore) GetKey(proxyHost string, username string) (*Key, error) {
dirPath, err := fs.dirFor(proxyHost, false)
if err != nil {
return nil, trace.Wrap(err)
}
_, err = ioutil.ReadDir(dirPath)
if err != nil {
return nil, trace.NotFound("no session keys for %v in %v", username, proxyHost)
}
certFile := filepath.Join(dirPath, username+fileExtCert)
cert, err := ioutil.ReadFile(certFile)
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
tlsCertFile := filepath.Join(dirPath, username+fileExtTLSCert)
tlsCert, err := ioutil.ReadFile(tlsCertFile)
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
pub, err := ioutil.ReadFile(filepath.Join(dirPath, username+fileExtPub))
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
priv, err := ioutil.ReadFile(filepath.Join(dirPath, username))
if err != nil {
fs.log.Error(err)
return nil, trace.Wrap(err)
}
key := &Key{Pub: pub, Priv: priv, Cert: cert, ProxyHost: proxyHost, TLSCert: tlsCert}
// Validate the key loaded from disk.
err = key.CheckCert()
if err != nil {
// KeyStore should return expired certificates as well
if !utils.IsCertExpiredError(err) {
return nil, trace.Wrap(err)
}
}
sshCertExpiration, err := key.CertValidBefore()
if err != nil {
return nil, trace.Wrap(err)
}
tlsCertExpiration, err := key.TLSCertValidBefore()
if err != nil {
return nil, trace.Wrap(err)
}
// Note, we may be returning expired certificates here, that is okay. If the
// certificates is expired, it's the responsibility of the TeleportClient to
// perform cleanup of the certificates and the profile.
fs.log.Debugf("Returning SSH certificate %q valid until %q, TLS certificate %q valid until %q.",
certFile, sshCertExpiration, tlsCertFile, tlsCertExpiration)
return key, nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"GetKey",
"(",
"proxyHost",
"string",
",",
"username",
"string",
")",
"(",
"*",
"Key",
",",
"error",
")",
"{",
"dirPath",
",",
"err",
":=",
"fs",
".",
"dirFor",
"(",
"proxyHost",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"ioutil",
".",
"ReadDir",
"(",
"dirPath",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
",",
"username",
",",
"proxyHost",
")",
"\n",
"}",
"\n\n",
"certFile",
":=",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
"+",
"fileExtCert",
")",
"\n",
"cert",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"certFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fs",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"tlsCertFile",
":=",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
"+",
"fileExtTLSCert",
")",
"\n",
"tlsCert",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"tlsCertFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fs",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"pub",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
"+",
"fileExtPub",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fs",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"priv",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"dirPath",
",",
"username",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"fs",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"key",
":=",
"&",
"Key",
"{",
"Pub",
":",
"pub",
",",
"Priv",
":",
"priv",
",",
"Cert",
":",
"cert",
",",
"ProxyHost",
":",
"proxyHost",
",",
"TLSCert",
":",
"tlsCert",
"}",
"\n\n",
"// Validate the key loaded from disk.",
"err",
"=",
"key",
".",
"CheckCert",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// KeyStore should return expired certificates as well",
"if",
"!",
"utils",
".",
"IsCertExpiredError",
"(",
"err",
")",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"sshCertExpiration",
",",
"err",
":=",
"key",
".",
"CertValidBefore",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"tlsCertExpiration",
",",
"err",
":=",
"key",
".",
"TLSCertValidBefore",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Note, we may be returning expired certificates here, that is okay. If the",
"// certificates is expired, it's the responsibility of the TeleportClient to",
"// perform cleanup of the certificates and the profile.",
"fs",
".",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"certFile",
",",
"sshCertExpiration",
",",
"tlsCertFile",
",",
"tlsCertExpiration",
")",
"\n\n",
"return",
"key",
",",
"nil",
"\n",
"}"
] | // GetKey returns a key for a given host. If the key is not found,
// returns trace.NotFound error. | [
"GetKey",
"returns",
"a",
"key",
"for",
"a",
"given",
"host",
".",
"If",
"the",
"key",
"is",
"not",
"found",
"returns",
"trace",
".",
"NotFound",
"error",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L204-L263 | train |
gravitational/teleport | lib/client/keystore.go | SaveCerts | func (fs *FSLocalKeyStore) SaveCerts(proxy string, cas []auth.TrustedCerts) error {
dir, err := fs.dirFor(proxy, true)
if err != nil {
return trace.Wrap(err)
}
fp, err := os.OpenFile(filepath.Join(dir, fileNameTLSCerts), os.O_CREATE|os.O_RDWR|os.O_TRUNC, 0640)
if err != nil {
return trace.Wrap(err)
}
defer fp.Sync()
defer fp.Close()
for _, ca := range cas {
for _, cert := range ca.TLSCertificates {
_, err := fp.Write(cert)
if err != nil {
return trace.ConvertSystemError(err)
}
_, err = fp.WriteString("\n")
if err != nil {
return trace.ConvertSystemError(err)
}
}
}
return nil
} | go | func (fs *FSLocalKeyStore) SaveCerts(proxy string, cas []auth.TrustedCerts) error {
dir, err := fs.dirFor(proxy, true)
if err != nil {
return trace.Wrap(err)
}
fp, err := os.OpenFile(filepath.Join(dir, fileNameTLSCerts), os.O_CREATE|os.O_RDWR|os.O_TRUNC, 0640)
if err != nil {
return trace.Wrap(err)
}
defer fp.Sync()
defer fp.Close()
for _, ca := range cas {
for _, cert := range ca.TLSCertificates {
_, err := fp.Write(cert)
if err != nil {
return trace.ConvertSystemError(err)
}
_, err = fp.WriteString("\n")
if err != nil {
return trace.ConvertSystemError(err)
}
}
}
return nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"SaveCerts",
"(",
"proxy",
"string",
",",
"cas",
"[",
"]",
"auth",
".",
"TrustedCerts",
")",
"error",
"{",
"dir",
",",
"err",
":=",
"fs",
".",
"dirFor",
"(",
"proxy",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"fp",
",",
"err",
":=",
"os",
".",
"OpenFile",
"(",
"filepath",
".",
"Join",
"(",
"dir",
",",
"fileNameTLSCerts",
")",
",",
"os",
".",
"O_CREATE",
"|",
"os",
".",
"O_RDWR",
"|",
"os",
".",
"O_TRUNC",
",",
"0640",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"defer",
"fp",
".",
"Sync",
"(",
")",
"\n",
"defer",
"fp",
".",
"Close",
"(",
")",
"\n",
"for",
"_",
",",
"ca",
":=",
"range",
"cas",
"{",
"for",
"_",
",",
"cert",
":=",
"range",
"ca",
".",
"TLSCertificates",
"{",
"_",
",",
"err",
":=",
"fp",
".",
"Write",
"(",
"cert",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"fp",
".",
"WriteString",
"(",
"\"",
"\\n",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SaveCerts saves trusted TLS certificates of certificate authorities | [
"SaveCerts",
"saves",
"trusted",
"TLS",
"certificates",
"of",
"certificate",
"authorities"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L266-L290 | train |
gravitational/teleport | lib/client/keystore.go | GetCertsPEM | func (fs *FSLocalKeyStore) GetCertsPEM(proxy string) ([]byte, error) {
dir, err := fs.dirFor(proxy, false)
if err != nil {
return nil, trace.Wrap(err)
}
return ioutil.ReadFile(filepath.Join(dir, fileNameTLSCerts))
} | go | func (fs *FSLocalKeyStore) GetCertsPEM(proxy string) ([]byte, error) {
dir, err := fs.dirFor(proxy, false)
if err != nil {
return nil, trace.Wrap(err)
}
return ioutil.ReadFile(filepath.Join(dir, fileNameTLSCerts))
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"GetCertsPEM",
"(",
"proxy",
"string",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"dir",
",",
"err",
":=",
"fs",
".",
"dirFor",
"(",
"proxy",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"dir",
",",
"fileNameTLSCerts",
")",
")",
"\n",
"}"
] | // GetCertsPEM returns trusted TLS certificates of certificate authorities PEM block | [
"GetCertsPEM",
"returns",
"trusted",
"TLS",
"certificates",
"of",
"certificate",
"authorities",
"PEM",
"block"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L293-L299 | train |
gravitational/teleport | lib/client/keystore.go | GetCerts | func (fs *FSLocalKeyStore) GetCerts(proxy string) (*x509.CertPool, error) {
dir, err := fs.dirFor(proxy, false)
if err != nil {
return nil, trace.Wrap(err)
}
bytes, err := ioutil.ReadFile(filepath.Join(dir, fileNameTLSCerts))
if err != nil {
return nil, trace.ConvertSystemError(err)
}
pool := x509.NewCertPool()
for len(bytes) > 0 {
var block *pem.Block
block, bytes = pem.Decode(bytes)
if block == nil {
break
}
if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
fs.log.Debugf("Skipping PEM block type=%v headers=%v.", block.Type, block.Headers)
continue
}
cert, err := x509.ParseCertificate(block.Bytes)
if err != nil {
return nil, trace.BadParameter("failed to parse certificate: %v", err)
}
fs.log.Debugf("Adding trusted cluster certificate authority %q to trusted pool.", cert.Issuer)
pool.AddCert(cert)
}
return pool, nil
} | go | func (fs *FSLocalKeyStore) GetCerts(proxy string) (*x509.CertPool, error) {
dir, err := fs.dirFor(proxy, false)
if err != nil {
return nil, trace.Wrap(err)
}
bytes, err := ioutil.ReadFile(filepath.Join(dir, fileNameTLSCerts))
if err != nil {
return nil, trace.ConvertSystemError(err)
}
pool := x509.NewCertPool()
for len(bytes) > 0 {
var block *pem.Block
block, bytes = pem.Decode(bytes)
if block == nil {
break
}
if block.Type != "CERTIFICATE" || len(block.Headers) != 0 {
fs.log.Debugf("Skipping PEM block type=%v headers=%v.", block.Type, block.Headers)
continue
}
cert, err := x509.ParseCertificate(block.Bytes)
if err != nil {
return nil, trace.BadParameter("failed to parse certificate: %v", err)
}
fs.log.Debugf("Adding trusted cluster certificate authority %q to trusted pool.", cert.Issuer)
pool.AddCert(cert)
}
return pool, nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"GetCerts",
"(",
"proxy",
"string",
")",
"(",
"*",
"x509",
".",
"CertPool",
",",
"error",
")",
"{",
"dir",
",",
"err",
":=",
"fs",
".",
"dirFor",
"(",
"proxy",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"bytes",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"dir",
",",
"fileNameTLSCerts",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"pool",
":=",
"x509",
".",
"NewCertPool",
"(",
")",
"\n",
"for",
"len",
"(",
"bytes",
")",
">",
"0",
"{",
"var",
"block",
"*",
"pem",
".",
"Block",
"\n",
"block",
",",
"bytes",
"=",
"pem",
".",
"Decode",
"(",
"bytes",
")",
"\n",
"if",
"block",
"==",
"nil",
"{",
"break",
"\n",
"}",
"\n",
"if",
"block",
".",
"Type",
"!=",
"\"",
"\"",
"||",
"len",
"(",
"block",
".",
"Headers",
")",
"!=",
"0",
"{",
"fs",
".",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"block",
".",
"Type",
",",
"block",
".",
"Headers",
")",
"\n",
"continue",
"\n",
"}",
"\n\n",
"cert",
",",
"err",
":=",
"x509",
".",
"ParseCertificate",
"(",
"block",
".",
"Bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"fs",
".",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"cert",
".",
"Issuer",
")",
"\n",
"pool",
".",
"AddCert",
"(",
"cert",
")",
"\n",
"}",
"\n",
"return",
"pool",
",",
"nil",
"\n",
"}"
] | // GetCerts returns trusted TLS certificates of certificate authorities | [
"GetCerts",
"returns",
"trusted",
"TLS",
"certificates",
"of",
"certificate",
"authorities"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L302-L331 | train |
gravitational/teleport | lib/client/keystore.go | AddKnownHostKeys | func (fs *FSLocalKeyStore) AddKnownHostKeys(hostname string, hostKeys []ssh.PublicKey) error {
fp, err := os.OpenFile(filepath.Join(fs.KeyDir, fileNameKnownHosts), os.O_CREATE|os.O_RDWR, 0640)
if err != nil {
return trace.Wrap(err)
}
defer fp.Sync()
defer fp.Close()
// read all existing entries into a map (this removes any pre-existing dupes)
entries := make(map[string]int)
output := make([]string, 0)
scanner := bufio.NewScanner(fp)
for scanner.Scan() {
line := scanner.Text()
if _, exists := entries[line]; !exists {
output = append(output, line)
entries[line] = 1
}
}
// add every host key to the list of entries
for i := range hostKeys {
fs.log.Debugf("Adding known host %s with key: %v", hostname, sshutils.Fingerprint(hostKeys[i]))
bytes := ssh.MarshalAuthorizedKey(hostKeys[i])
line := strings.TrimSpace(fmt.Sprintf("%s %s", hostname, bytes))
if _, exists := entries[line]; !exists {
output = append(output, line)
}
}
// re-create the file:
_, err = fp.Seek(0, 0)
if err != nil {
return trace.Wrap(err)
}
if err = fp.Truncate(0); err != nil {
return trace.Wrap(err)
}
for _, line := range output {
fmt.Fprintf(fp, "%s\n", line)
}
return nil
} | go | func (fs *FSLocalKeyStore) AddKnownHostKeys(hostname string, hostKeys []ssh.PublicKey) error {
fp, err := os.OpenFile(filepath.Join(fs.KeyDir, fileNameKnownHosts), os.O_CREATE|os.O_RDWR, 0640)
if err != nil {
return trace.Wrap(err)
}
defer fp.Sync()
defer fp.Close()
// read all existing entries into a map (this removes any pre-existing dupes)
entries := make(map[string]int)
output := make([]string, 0)
scanner := bufio.NewScanner(fp)
for scanner.Scan() {
line := scanner.Text()
if _, exists := entries[line]; !exists {
output = append(output, line)
entries[line] = 1
}
}
// add every host key to the list of entries
for i := range hostKeys {
fs.log.Debugf("Adding known host %s with key: %v", hostname, sshutils.Fingerprint(hostKeys[i]))
bytes := ssh.MarshalAuthorizedKey(hostKeys[i])
line := strings.TrimSpace(fmt.Sprintf("%s %s", hostname, bytes))
if _, exists := entries[line]; !exists {
output = append(output, line)
}
}
// re-create the file:
_, err = fp.Seek(0, 0)
if err != nil {
return trace.Wrap(err)
}
if err = fp.Truncate(0); err != nil {
return trace.Wrap(err)
}
for _, line := range output {
fmt.Fprintf(fp, "%s\n", line)
}
return nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"AddKnownHostKeys",
"(",
"hostname",
"string",
",",
"hostKeys",
"[",
"]",
"ssh",
".",
"PublicKey",
")",
"error",
"{",
"fp",
",",
"err",
":=",
"os",
".",
"OpenFile",
"(",
"filepath",
".",
"Join",
"(",
"fs",
".",
"KeyDir",
",",
"fileNameKnownHosts",
")",
",",
"os",
".",
"O_CREATE",
"|",
"os",
".",
"O_RDWR",
",",
"0640",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"defer",
"fp",
".",
"Sync",
"(",
")",
"\n",
"defer",
"fp",
".",
"Close",
"(",
")",
"\n",
"// read all existing entries into a map (this removes any pre-existing dupes)",
"entries",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"int",
")",
"\n",
"output",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
")",
"\n",
"scanner",
":=",
"bufio",
".",
"NewScanner",
"(",
"fp",
")",
"\n",
"for",
"scanner",
".",
"Scan",
"(",
")",
"{",
"line",
":=",
"scanner",
".",
"Text",
"(",
")",
"\n",
"if",
"_",
",",
"exists",
":=",
"entries",
"[",
"line",
"]",
";",
"!",
"exists",
"{",
"output",
"=",
"append",
"(",
"output",
",",
"line",
")",
"\n",
"entries",
"[",
"line",
"]",
"=",
"1",
"\n",
"}",
"\n",
"}",
"\n",
"// add every host key to the list of entries",
"for",
"i",
":=",
"range",
"hostKeys",
"{",
"fs",
".",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"hostname",
",",
"sshutils",
".",
"Fingerprint",
"(",
"hostKeys",
"[",
"i",
"]",
")",
")",
"\n",
"bytes",
":=",
"ssh",
".",
"MarshalAuthorizedKey",
"(",
"hostKeys",
"[",
"i",
"]",
")",
"\n",
"line",
":=",
"strings",
".",
"TrimSpace",
"(",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"hostname",
",",
"bytes",
")",
")",
"\n",
"if",
"_",
",",
"exists",
":=",
"entries",
"[",
"line",
"]",
";",
"!",
"exists",
"{",
"output",
"=",
"append",
"(",
"output",
",",
"line",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// re-create the file:",
"_",
",",
"err",
"=",
"fp",
".",
"Seek",
"(",
"0",
",",
"0",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
"=",
"fp",
".",
"Truncate",
"(",
"0",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"line",
":=",
"range",
"output",
"{",
"fmt",
".",
"Fprintf",
"(",
"fp",
",",
"\"",
"\\n",
"\"",
",",
"line",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // AddKnownHostKeys adds a new entry to 'known_hosts' file | [
"AddKnownHostKeys",
"adds",
"a",
"new",
"entry",
"to",
"known_hosts",
"file"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L334-L373 | train |
gravitational/teleport | lib/client/keystore.go | GetKnownHostKeys | func (fs *FSLocalKeyStore) GetKnownHostKeys(hostname string) ([]ssh.PublicKey, error) {
bytes, err := ioutil.ReadFile(filepath.Join(fs.KeyDir, fileNameKnownHosts))
if err != nil {
if os.IsNotExist(err) {
return nil, nil
}
return nil, trace.Wrap(err)
}
var (
pubKey ssh.PublicKey
retval []ssh.PublicKey = make([]ssh.PublicKey, 0)
hosts []string
hostMatch bool
)
for err == nil {
_, hosts, pubKey, _, bytes, err = ssh.ParseKnownHosts(bytes)
if err == nil {
hostMatch = (hostname == "")
if !hostMatch {
for i := range hosts {
if hosts[i] == hostname {
hostMatch = true
break
}
}
}
if hostMatch {
retval = append(retval, pubKey)
}
}
}
if err != io.EOF {
return nil, trace.Wrap(err)
}
return retval, nil
} | go | func (fs *FSLocalKeyStore) GetKnownHostKeys(hostname string) ([]ssh.PublicKey, error) {
bytes, err := ioutil.ReadFile(filepath.Join(fs.KeyDir, fileNameKnownHosts))
if err != nil {
if os.IsNotExist(err) {
return nil, nil
}
return nil, trace.Wrap(err)
}
var (
pubKey ssh.PublicKey
retval []ssh.PublicKey = make([]ssh.PublicKey, 0)
hosts []string
hostMatch bool
)
for err == nil {
_, hosts, pubKey, _, bytes, err = ssh.ParseKnownHosts(bytes)
if err == nil {
hostMatch = (hostname == "")
if !hostMatch {
for i := range hosts {
if hosts[i] == hostname {
hostMatch = true
break
}
}
}
if hostMatch {
retval = append(retval, pubKey)
}
}
}
if err != io.EOF {
return nil, trace.Wrap(err)
}
return retval, nil
} | [
"func",
"(",
"fs",
"*",
"FSLocalKeyStore",
")",
"GetKnownHostKeys",
"(",
"hostname",
"string",
")",
"(",
"[",
"]",
"ssh",
".",
"PublicKey",
",",
"error",
")",
"{",
"bytes",
",",
"err",
":=",
"ioutil",
".",
"ReadFile",
"(",
"filepath",
".",
"Join",
"(",
"fs",
".",
"KeyDir",
",",
"fileNameKnownHosts",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"os",
".",
"IsNotExist",
"(",
"err",
")",
"{",
"return",
"nil",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"(",
"pubKey",
"ssh",
".",
"PublicKey",
"\n",
"retval",
"[",
"]",
"ssh",
".",
"PublicKey",
"=",
"make",
"(",
"[",
"]",
"ssh",
".",
"PublicKey",
",",
"0",
")",
"\n",
"hosts",
"[",
"]",
"string",
"\n",
"hostMatch",
"bool",
"\n",
")",
"\n",
"for",
"err",
"==",
"nil",
"{",
"_",
",",
"hosts",
",",
"pubKey",
",",
"_",
",",
"bytes",
",",
"err",
"=",
"ssh",
".",
"ParseKnownHosts",
"(",
"bytes",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"hostMatch",
"=",
"(",
"hostname",
"==",
"\"",
"\"",
")",
"\n",
"if",
"!",
"hostMatch",
"{",
"for",
"i",
":=",
"range",
"hosts",
"{",
"if",
"hosts",
"[",
"i",
"]",
"==",
"hostname",
"{",
"hostMatch",
"=",
"true",
"\n",
"break",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"hostMatch",
"{",
"retval",
"=",
"append",
"(",
"retval",
",",
"pubKey",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
"!=",
"io",
".",
"EOF",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"retval",
",",
"nil",
"\n",
"}"
] | // GetKnownHostKeys returns all known public keys from 'known_hosts' | [
"GetKnownHostKeys",
"returns",
"all",
"known",
"public",
"keys",
"from",
"known_hosts"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keystore.go#L376-L411 | train |
gravitational/teleport | tool/tctl/common/node_command.go | Initialize | func (c *NodeCommand) Initialize(app *kingpin.Application, config *service.Config) {
c.config = config
// add node command
nodes := app.Command("nodes", "Issue invites for other nodes to join the cluster")
c.nodeAdd = nodes.Command("add", "Generate a node invitation token")
c.nodeAdd.Flag("roles", "Comma-separated list of roles for the new node to assume [node]").Default("node").StringVar(&c.roles)
c.nodeAdd.Flag("ttl", "Time to live for a generated token").Default(defaults.ProvisioningTokenTTL.String()).DurationVar(&c.ttl)
c.nodeAdd.Flag("token", "Custom token to use, autogenerated if not provided").StringVar(&c.token)
c.nodeAdd.Flag("format", "Output format, 'text' or 'json'").Hidden().Default("text").StringVar(&c.format)
c.nodeAdd.Alias(AddNodeHelp)
c.nodeList = nodes.Command("ls", "List all active SSH nodes within the cluster")
c.nodeList.Flag("namespace", "Namespace of the nodes").Default(defaults.Namespace).StringVar(&c.namespace)
c.nodeList.Alias(ListNodesHelp)
} | go | func (c *NodeCommand) Initialize(app *kingpin.Application, config *service.Config) {
c.config = config
// add node command
nodes := app.Command("nodes", "Issue invites for other nodes to join the cluster")
c.nodeAdd = nodes.Command("add", "Generate a node invitation token")
c.nodeAdd.Flag("roles", "Comma-separated list of roles for the new node to assume [node]").Default("node").StringVar(&c.roles)
c.nodeAdd.Flag("ttl", "Time to live for a generated token").Default(defaults.ProvisioningTokenTTL.String()).DurationVar(&c.ttl)
c.nodeAdd.Flag("token", "Custom token to use, autogenerated if not provided").StringVar(&c.token)
c.nodeAdd.Flag("format", "Output format, 'text' or 'json'").Hidden().Default("text").StringVar(&c.format)
c.nodeAdd.Alias(AddNodeHelp)
c.nodeList = nodes.Command("ls", "List all active SSH nodes within the cluster")
c.nodeList.Flag("namespace", "Namespace of the nodes").Default(defaults.Namespace).StringVar(&c.namespace)
c.nodeList.Alias(ListNodesHelp)
} | [
"func",
"(",
"c",
"*",
"NodeCommand",
")",
"Initialize",
"(",
"app",
"*",
"kingpin",
".",
"Application",
",",
"config",
"*",
"service",
".",
"Config",
")",
"{",
"c",
".",
"config",
"=",
"config",
"\n\n",
"// add node command",
"nodes",
":=",
"app",
".",
"Command",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"c",
".",
"nodeAdd",
"=",
"nodes",
".",
"Command",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"c",
".",
"nodeAdd",
".",
"Flag",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
".",
"Default",
"(",
"\"",
"\"",
")",
".",
"StringVar",
"(",
"&",
"c",
".",
"roles",
")",
"\n",
"c",
".",
"nodeAdd",
".",
"Flag",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
".",
"Default",
"(",
"defaults",
".",
"ProvisioningTokenTTL",
".",
"String",
"(",
")",
")",
".",
"DurationVar",
"(",
"&",
"c",
".",
"ttl",
")",
"\n",
"c",
".",
"nodeAdd",
".",
"Flag",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
".",
"StringVar",
"(",
"&",
"c",
".",
"token",
")",
"\n",
"c",
".",
"nodeAdd",
".",
"Flag",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
".",
"Hidden",
"(",
")",
".",
"Default",
"(",
"\"",
"\"",
")",
".",
"StringVar",
"(",
"&",
"c",
".",
"format",
")",
"\n",
"c",
".",
"nodeAdd",
".",
"Alias",
"(",
"AddNodeHelp",
")",
"\n\n",
"c",
".",
"nodeList",
"=",
"nodes",
".",
"Command",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"c",
".",
"nodeList",
".",
"Flag",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
".",
"Default",
"(",
"defaults",
".",
"Namespace",
")",
".",
"StringVar",
"(",
"&",
"c",
".",
"namespace",
")",
"\n",
"c",
".",
"nodeList",
".",
"Alias",
"(",
"ListNodesHelp",
")",
"\n",
"}"
] | // Initialize allows NodeCommand to plug itself into the CLI parser | [
"Initialize",
"allows",
"NodeCommand",
"to",
"plug",
"itself",
"into",
"the",
"CLI",
"parser"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/node_command.go#L57-L72 | train |
gravitational/teleport | tool/tctl/common/node_command.go | Invite | func (c *NodeCommand) Invite(client auth.ClientI) error {
// parse --roles flag
roles, err := teleport.ParseRoles(c.roles)
if err != nil {
return trace.Wrap(err)
}
token, err := client.GenerateToken(auth.GenerateTokenRequest{Roles: roles, TTL: c.ttl, Token: c.token})
if err != nil {
return trace.Wrap(err)
}
// Calculate the CA pin for this cluster. The CA pin is used by the client
// to verify the identity of the Auth Server.
caPin, err := calculateCAPin(client)
if err != nil {
return trace.Wrap(err)
}
authServers, err := client.GetAuthServers()
if err != nil {
return trace.Wrap(err)
}
if len(authServers) == 0 {
return trace.Errorf("This cluster does not have any auth servers running.")
}
// output format swtich:
if c.format == "text" {
if roles.Include(teleport.RoleTrustedCluster) || roles.Include(teleport.LegacyClusterTokenType) {
fmt.Printf(trustedClusterMessage, token, int(c.ttl.Minutes()))
} else {
fmt.Printf(nodeMessage,
token,
int(c.ttl.Minutes()),
strings.ToLower(roles.String()),
token,
caPin,
authServers[0].GetAddr(),
int(c.ttl.Minutes()),
authServers[0].GetAddr(),
)
}
} else {
// Always return a list, otherwise we'll break users tooling. See #1846 for
// more details.
tokens := []string{token}
out, err := json.Marshal(tokens)
if err != nil {
return trace.Wrap(err, "failed to marshal token")
}
fmt.Printf(string(out))
}
return nil
} | go | func (c *NodeCommand) Invite(client auth.ClientI) error {
// parse --roles flag
roles, err := teleport.ParseRoles(c.roles)
if err != nil {
return trace.Wrap(err)
}
token, err := client.GenerateToken(auth.GenerateTokenRequest{Roles: roles, TTL: c.ttl, Token: c.token})
if err != nil {
return trace.Wrap(err)
}
// Calculate the CA pin for this cluster. The CA pin is used by the client
// to verify the identity of the Auth Server.
caPin, err := calculateCAPin(client)
if err != nil {
return trace.Wrap(err)
}
authServers, err := client.GetAuthServers()
if err != nil {
return trace.Wrap(err)
}
if len(authServers) == 0 {
return trace.Errorf("This cluster does not have any auth servers running.")
}
// output format swtich:
if c.format == "text" {
if roles.Include(teleport.RoleTrustedCluster) || roles.Include(teleport.LegacyClusterTokenType) {
fmt.Printf(trustedClusterMessage, token, int(c.ttl.Minutes()))
} else {
fmt.Printf(nodeMessage,
token,
int(c.ttl.Minutes()),
strings.ToLower(roles.String()),
token,
caPin,
authServers[0].GetAddr(),
int(c.ttl.Minutes()),
authServers[0].GetAddr(),
)
}
} else {
// Always return a list, otherwise we'll break users tooling. See #1846 for
// more details.
tokens := []string{token}
out, err := json.Marshal(tokens)
if err != nil {
return trace.Wrap(err, "failed to marshal token")
}
fmt.Printf(string(out))
}
return nil
} | [
"func",
"(",
"c",
"*",
"NodeCommand",
")",
"Invite",
"(",
"client",
"auth",
".",
"ClientI",
")",
"error",
"{",
"// parse --roles flag",
"roles",
",",
"err",
":=",
"teleport",
".",
"ParseRoles",
"(",
"c",
".",
"roles",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"token",
",",
"err",
":=",
"client",
".",
"GenerateToken",
"(",
"auth",
".",
"GenerateTokenRequest",
"{",
"Roles",
":",
"roles",
",",
"TTL",
":",
"c",
".",
"ttl",
",",
"Token",
":",
"c",
".",
"token",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Calculate the CA pin for this cluster. The CA pin is used by the client",
"// to verify the identity of the Auth Server.",
"caPin",
",",
"err",
":=",
"calculateCAPin",
"(",
"client",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"authServers",
",",
"err",
":=",
"client",
".",
"GetAuthServers",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"authServers",
")",
"==",
"0",
"{",
"return",
"trace",
".",
"Errorf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// output format swtich:",
"if",
"c",
".",
"format",
"==",
"\"",
"\"",
"{",
"if",
"roles",
".",
"Include",
"(",
"teleport",
".",
"RoleTrustedCluster",
")",
"||",
"roles",
".",
"Include",
"(",
"teleport",
".",
"LegacyClusterTokenType",
")",
"{",
"fmt",
".",
"Printf",
"(",
"trustedClusterMessage",
",",
"token",
",",
"int",
"(",
"c",
".",
"ttl",
".",
"Minutes",
"(",
")",
")",
")",
"\n",
"}",
"else",
"{",
"fmt",
".",
"Printf",
"(",
"nodeMessage",
",",
"token",
",",
"int",
"(",
"c",
".",
"ttl",
".",
"Minutes",
"(",
")",
")",
",",
"strings",
".",
"ToLower",
"(",
"roles",
".",
"String",
"(",
")",
")",
",",
"token",
",",
"caPin",
",",
"authServers",
"[",
"0",
"]",
".",
"GetAddr",
"(",
")",
",",
"int",
"(",
"c",
".",
"ttl",
".",
"Minutes",
"(",
")",
")",
",",
"authServers",
"[",
"0",
"]",
".",
"GetAddr",
"(",
")",
",",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"// Always return a list, otherwise we'll break users tooling. See #1846 for",
"// more details.",
"tokens",
":=",
"[",
"]",
"string",
"{",
"token",
"}",
"\n",
"out",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"tokens",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"fmt",
".",
"Printf",
"(",
"string",
"(",
"out",
")",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // Invite generates a token which can be used to add another SSH node
// to a cluster | [
"Invite",
"generates",
"a",
"token",
"which",
"can",
"be",
"used",
"to",
"add",
"another",
"SSH",
"node",
"to",
"a",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/node_command.go#L113-L166 | train |
gravitational/teleport | tool/tctl/common/node_command.go | ListActive | func (c *NodeCommand) ListActive(client auth.ClientI) error {
nodes, err := client.GetNodes(c.namespace, services.SkipValidation())
if err != nil {
return trace.Wrap(err)
}
coll := &serverCollection{servers: nodes}
coll.writeText(os.Stdout)
return nil
} | go | func (c *NodeCommand) ListActive(client auth.ClientI) error {
nodes, err := client.GetNodes(c.namespace, services.SkipValidation())
if err != nil {
return trace.Wrap(err)
}
coll := &serverCollection{servers: nodes}
coll.writeText(os.Stdout)
return nil
} | [
"func",
"(",
"c",
"*",
"NodeCommand",
")",
"ListActive",
"(",
"client",
"auth",
".",
"ClientI",
")",
"error",
"{",
"nodes",
",",
"err",
":=",
"client",
".",
"GetNodes",
"(",
"c",
".",
"namespace",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"coll",
":=",
"&",
"serverCollection",
"{",
"servers",
":",
"nodes",
"}",
"\n",
"coll",
".",
"writeText",
"(",
"os",
".",
"Stdout",
")",
"\n",
"return",
"nil",
"\n",
"}"
] | // ListActive retreives the list of nodes who recently sent heartbeats to
// to a cluster and prints it to stdout | [
"ListActive",
"retreives",
"the",
"list",
"of",
"nodes",
"who",
"recently",
"sent",
"heartbeats",
"to",
"to",
"a",
"cluster",
"and",
"prints",
"it",
"to",
"stdout"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/node_command.go#L170-L178 | train |
gravitational/teleport | lib/client/hotp_mock.go | GetTokenFromHOTPMockFile | func GetTokenFromHOTPMockFile(path string) (token string, e error) {
otp, err := LoadHOTPMockFromFile(path)
if err != nil {
return "", trace.Wrap(err)
}
token = otp.OTP()
err = otp.SaveToFile(path)
if err != nil {
return "", trace.Wrap(err)
}
return token, nil
} | go | func GetTokenFromHOTPMockFile(path string) (token string, e error) {
otp, err := LoadHOTPMockFromFile(path)
if err != nil {
return "", trace.Wrap(err)
}
token = otp.OTP()
err = otp.SaveToFile(path)
if err != nil {
return "", trace.Wrap(err)
}
return token, nil
} | [
"func",
"GetTokenFromHOTPMockFile",
"(",
"path",
"string",
")",
"(",
"token",
"string",
",",
"e",
"error",
")",
"{",
"otp",
",",
"err",
":=",
"LoadHOTPMockFromFile",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"token",
"=",
"otp",
".",
"OTP",
"(",
")",
"\n\n",
"err",
"=",
"otp",
".",
"SaveToFile",
"(",
"path",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"token",
",",
"nil",
"\n",
"}"
] | // GetTokenFromHOTPMockFile opens HOTPMock from file, gets token value,
// increases hotp and saves it to the file. Returns hotp token value. | [
"GetTokenFromHOTPMockFile",
"opens",
"HOTPMock",
"from",
"file",
"gets",
"token",
"value",
"increases",
"hotp",
"and",
"saves",
"it",
"to",
"the",
"file",
".",
"Returns",
"hotp",
"token",
"value",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/hotp_mock.go#L73-L87 | train |
gravitational/teleport | lib/utils/proxy/noproxy.go | useProxy | func useProxy(addr string) bool {
if len(addr) == 0 {
return true
}
var noProxy string
for _, env := range []string{teleport.NoProxy, strings.ToLower(teleport.NoProxy)} {
noProxy = os.Getenv(env)
if noProxy != "" {
break
}
}
if noProxy == "" {
return true
}
if noProxy == "*" {
return false
}
addr = strings.ToLower(strings.TrimSpace(addr))
if hasPort(addr) {
addr = addr[:strings.LastIndex(addr, ":")]
}
for _, p := range strings.Split(noProxy, ",") {
p = strings.ToLower(strings.TrimSpace(p))
if len(p) == 0 {
continue
}
if hasPort(p) {
p = p[:strings.LastIndex(p, ":")]
}
if addr == p {
return false
}
if len(p) == 0 {
// There is no host part, likely the entry is malformed; ignore.
continue
}
if p[0] == '.' && (strings.HasSuffix(addr, p) || addr == p[1:]) {
// no_proxy ".foo.com" matches "bar.foo.com" or "foo.com"
return false
}
if p[0] != '.' && strings.HasSuffix(addr, p) && addr[len(addr)-len(p)-1] == '.' {
// no_proxy "foo.com" matches "bar.foo.com"
return false
}
}
return true
} | go | func useProxy(addr string) bool {
if len(addr) == 0 {
return true
}
var noProxy string
for _, env := range []string{teleport.NoProxy, strings.ToLower(teleport.NoProxy)} {
noProxy = os.Getenv(env)
if noProxy != "" {
break
}
}
if noProxy == "" {
return true
}
if noProxy == "*" {
return false
}
addr = strings.ToLower(strings.TrimSpace(addr))
if hasPort(addr) {
addr = addr[:strings.LastIndex(addr, ":")]
}
for _, p := range strings.Split(noProxy, ",") {
p = strings.ToLower(strings.TrimSpace(p))
if len(p) == 0 {
continue
}
if hasPort(p) {
p = p[:strings.LastIndex(p, ":")]
}
if addr == p {
return false
}
if len(p) == 0 {
// There is no host part, likely the entry is malformed; ignore.
continue
}
if p[0] == '.' && (strings.HasSuffix(addr, p) || addr == p[1:]) {
// no_proxy ".foo.com" matches "bar.foo.com" or "foo.com"
return false
}
if p[0] != '.' && strings.HasSuffix(addr, p) && addr[len(addr)-len(p)-1] == '.' {
// no_proxy "foo.com" matches "bar.foo.com"
return false
}
}
return true
} | [
"func",
"useProxy",
"(",
"addr",
"string",
")",
"bool",
"{",
"if",
"len",
"(",
"addr",
")",
"==",
"0",
"{",
"return",
"true",
"\n",
"}",
"\n",
"var",
"noProxy",
"string",
"\n",
"for",
"_",
",",
"env",
":=",
"range",
"[",
"]",
"string",
"{",
"teleport",
".",
"NoProxy",
",",
"strings",
".",
"ToLower",
"(",
"teleport",
".",
"NoProxy",
")",
"}",
"{",
"noProxy",
"=",
"os",
".",
"Getenv",
"(",
"env",
")",
"\n",
"if",
"noProxy",
"!=",
"\"",
"\"",
"{",
"break",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"noProxy",
"==",
"\"",
"\"",
"{",
"return",
"true",
"\n",
"}",
"\n",
"if",
"noProxy",
"==",
"\"",
"\"",
"{",
"return",
"false",
"\n",
"}",
"\n\n",
"addr",
"=",
"strings",
".",
"ToLower",
"(",
"strings",
".",
"TrimSpace",
"(",
"addr",
")",
")",
"\n",
"if",
"hasPort",
"(",
"addr",
")",
"{",
"addr",
"=",
"addr",
"[",
":",
"strings",
".",
"LastIndex",
"(",
"addr",
",",
"\"",
"\"",
")",
"]",
"\n",
"}",
"\n",
"for",
"_",
",",
"p",
":=",
"range",
"strings",
".",
"Split",
"(",
"noProxy",
",",
"\"",
"\"",
")",
"{",
"p",
"=",
"strings",
".",
"ToLower",
"(",
"strings",
".",
"TrimSpace",
"(",
"p",
")",
")",
"\n",
"if",
"len",
"(",
"p",
")",
"==",
"0",
"{",
"continue",
"\n",
"}",
"\n",
"if",
"hasPort",
"(",
"p",
")",
"{",
"p",
"=",
"p",
"[",
":",
"strings",
".",
"LastIndex",
"(",
"p",
",",
"\"",
"\"",
")",
"]",
"\n",
"}",
"\n",
"if",
"addr",
"==",
"p",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"len",
"(",
"p",
")",
"==",
"0",
"{",
"// There is no host part, likely the entry is malformed; ignore.",
"continue",
"\n",
"}",
"\n",
"if",
"p",
"[",
"0",
"]",
"==",
"'.'",
"&&",
"(",
"strings",
".",
"HasSuffix",
"(",
"addr",
",",
"p",
")",
"||",
"addr",
"==",
"p",
"[",
"1",
":",
"]",
")",
"{",
"// no_proxy \".foo.com\" matches \"bar.foo.com\" or \"foo.com\"",
"return",
"false",
"\n",
"}",
"\n",
"if",
"p",
"[",
"0",
"]",
"!=",
"'.'",
"&&",
"strings",
".",
"HasSuffix",
"(",
"addr",
",",
"p",
")",
"&&",
"addr",
"[",
"len",
"(",
"addr",
")",
"-",
"len",
"(",
"p",
")",
"-",
"1",
"]",
"==",
"'.'",
"{",
"// no_proxy \"foo.com\" matches \"bar.foo.com\"",
"return",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"true",
"\n",
"}"
] | // useProxy reports whether requests to addr should use a proxy,
// according to the NO_PROXY or no_proxy environment variable.
// addr is always a canonicalAddr with a host and port. | [
"useProxy",
"reports",
"whether",
"requests",
"to",
"addr",
"should",
"use",
"a",
"proxy",
"according",
"to",
"the",
"NO_PROXY",
"or",
"no_proxy",
"environment",
"variable",
".",
"addr",
"is",
"always",
"a",
"canonicalAddr",
"with",
"a",
"host",
"and",
"port",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/proxy/noproxy.go#L22-L70 | train |
gravitational/teleport | lib/utils/agentconn/agent_windows.go | Dial | func Dial(socket string) (net.Conn, error) {
conn, err := winio.DialPipe(defaults.WindowsOpenSSHNamedPipe, nil)
if err != nil {
return nil, trace.Wrap(err)
}
return conn, nil
} | go | func Dial(socket string) (net.Conn, error) {
conn, err := winio.DialPipe(defaults.WindowsOpenSSHNamedPipe, nil)
if err != nil {
return nil, trace.Wrap(err)
}
return conn, nil
} | [
"func",
"Dial",
"(",
"socket",
"string",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"conn",
",",
"err",
":=",
"winio",
".",
"DialPipe",
"(",
"defaults",
".",
"WindowsOpenSSHNamedPipe",
",",
"nil",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"conn",
",",
"nil",
"\n",
"}"
] | // Dial creates net.Conn to a SSH agent listening on a Windows named pipe.
// This is behind a build flag because winio.DialPipe is only available on
// Windows. | [
"Dial",
"creates",
"net",
".",
"Conn",
"to",
"a",
"SSH",
"agent",
"listening",
"on",
"a",
"Windows",
"named",
"pipe",
".",
"This",
"is",
"behind",
"a",
"build",
"flag",
"because",
"winio",
".",
"DialPipe",
"is",
"only",
"available",
"on",
"Windows",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/agentconn/agent_windows.go#L34-L41 | train |
gravitational/teleport | lib/auth/grpclog.go | Infoln | func (g *GLogger) Infoln(args ...interface{}) {
// GRPC is very verbose, so this is intentionally
// pushes info level statements as Teleport's debug level ones
g.Entry.Debug(fmt.Sprintln(args...))
} | go | func (g *GLogger) Infoln(args ...interface{}) {
// GRPC is very verbose, so this is intentionally
// pushes info level statements as Teleport's debug level ones
g.Entry.Debug(fmt.Sprintln(args...))
} | [
"func",
"(",
"g",
"*",
"GLogger",
")",
"Infoln",
"(",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"// GRPC is very verbose, so this is intentionally",
"// pushes info level statements as Teleport's debug level ones",
"g",
".",
"Entry",
".",
"Debug",
"(",
"fmt",
".",
"Sprintln",
"(",
"args",
"...",
")",
")",
"\n",
"}"
] | // Infoln logs to INFO log. Arguments are handled in the manner of fmt.Println. | [
"Infoln",
"logs",
"to",
"INFO",
"log",
".",
"Arguments",
"are",
"handled",
"in",
"the",
"manner",
"of",
"fmt",
".",
"Println",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpclog.go#L54-L58 | train |
gravitational/teleport | lib/auth/grpclog.go | Infof | func (g *GLogger) Infof(format string, args ...interface{}) {
// GRPC is very verbose, so this is intentionally
// pushes info level statements as Teleport's debug level ones
g.Entry.Debugf(format, args...)
} | go | func (g *GLogger) Infof(format string, args ...interface{}) {
// GRPC is very verbose, so this is intentionally
// pushes info level statements as Teleport's debug level ones
g.Entry.Debugf(format, args...)
} | [
"func",
"(",
"g",
"*",
"GLogger",
")",
"Infof",
"(",
"format",
"string",
",",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"// GRPC is very verbose, so this is intentionally",
"// pushes info level statements as Teleport's debug level ones",
"g",
".",
"Entry",
".",
"Debugf",
"(",
"format",
",",
"args",
"...",
")",
"\n",
"}"
] | // Infof logs to INFO log. Arguments are handled in the manner of fmt.Printf. | [
"Infof",
"logs",
"to",
"INFO",
"log",
".",
"Arguments",
"are",
"handled",
"in",
"the",
"manner",
"of",
"fmt",
".",
"Printf",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpclog.go#L61-L65 | train |
gravitational/teleport | lib/auth/grpclog.go | Warningln | func (g *GLogger) Warningln(args ...interface{}) {
g.Entry.Warning(fmt.Sprintln(args...))
} | go | func (g *GLogger) Warningln(args ...interface{}) {
g.Entry.Warning(fmt.Sprintln(args...))
} | [
"func",
"(",
"g",
"*",
"GLogger",
")",
"Warningln",
"(",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"g",
".",
"Entry",
".",
"Warning",
"(",
"fmt",
".",
"Sprintln",
"(",
"args",
"...",
")",
")",
"\n",
"}"
] | // Warningln logs to WARNING log. Arguments are handled in the manner of fmt.Println. | [
"Warningln",
"logs",
"to",
"WARNING",
"log",
".",
"Arguments",
"are",
"handled",
"in",
"the",
"manner",
"of",
"fmt",
".",
"Println",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpclog.go#L73-L75 | train |
gravitational/teleport | lib/auth/grpclog.go | Warningf | func (g *GLogger) Warningf(format string, args ...interface{}) {
g.Entry.Warningf(format, args...)
} | go | func (g *GLogger) Warningf(format string, args ...interface{}) {
g.Entry.Warningf(format, args...)
} | [
"func",
"(",
"g",
"*",
"GLogger",
")",
"Warningf",
"(",
"format",
"string",
",",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"g",
".",
"Entry",
".",
"Warningf",
"(",
"format",
",",
"args",
"...",
")",
"\n",
"}"
] | // Warningf logs to WARNING log. Arguments are handled in the manner of fmt.Printf. | [
"Warningf",
"logs",
"to",
"WARNING",
"log",
".",
"Arguments",
"are",
"handled",
"in",
"the",
"manner",
"of",
"fmt",
".",
"Printf",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpclog.go#L78-L80 | train |
gravitational/teleport | lib/auth/grpclog.go | Errorln | func (g *GLogger) Errorln(args ...interface{}) {
g.Entry.Error(fmt.Sprintln(args...))
} | go | func (g *GLogger) Errorln(args ...interface{}) {
g.Entry.Error(fmt.Sprintln(args...))
} | [
"func",
"(",
"g",
"*",
"GLogger",
")",
"Errorln",
"(",
"args",
"...",
"interface",
"{",
"}",
")",
"{",
"g",
".",
"Entry",
".",
"Error",
"(",
"fmt",
".",
"Sprintln",
"(",
"args",
"...",
")",
")",
"\n",
"}"
] | // Errorln logs to ERROR log. Arguments are handled in the manner of fmt.Println. | [
"Errorln",
"logs",
"to",
"ERROR",
"log",
".",
"Arguments",
"are",
"handled",
"in",
"the",
"manner",
"of",
"fmt",
".",
"Println",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/grpclog.go#L88-L90 | train |
gravitational/teleport | lib/utils/socks/socks.go | Handshake | func Handshake(conn net.Conn) (string, error) {
// Read in the version and reject anything other than SOCKS5.
version, err := readByte(conn)
if err != nil {
return "", trace.Wrap(err)
}
if version != socks5Version {
return "", trace.BadParameter("only SOCKS5 is supported")
}
// Read in the authentication method requested by the client and write back
// the method that was selected. At the moment only "no authentication
// required" is supported.
authMethods, err := readAuthenticationMethod(conn)
if err != nil {
return "", trace.Wrap(err)
}
if !byteSliceContains(authMethods, socks5AuthNotRequired) {
return "", trace.BadParameter("only 'no authentication required' is supported")
}
err = writeMethodSelection(conn)
if err != nil {
return "", trace.Wrap(err)
}
// Read in the request from the client and make sure the requested command
// is supported and extract the remote address. If everything is good, write
// out a success response.
remoteAddr, err := readRequest(conn)
if err != nil {
return "", trace.Wrap(err)
}
err = writeReply(conn)
if err != nil {
return "", trace.Wrap(err)
}
return remoteAddr, nil
} | go | func Handshake(conn net.Conn) (string, error) {
// Read in the version and reject anything other than SOCKS5.
version, err := readByte(conn)
if err != nil {
return "", trace.Wrap(err)
}
if version != socks5Version {
return "", trace.BadParameter("only SOCKS5 is supported")
}
// Read in the authentication method requested by the client and write back
// the method that was selected. At the moment only "no authentication
// required" is supported.
authMethods, err := readAuthenticationMethod(conn)
if err != nil {
return "", trace.Wrap(err)
}
if !byteSliceContains(authMethods, socks5AuthNotRequired) {
return "", trace.BadParameter("only 'no authentication required' is supported")
}
err = writeMethodSelection(conn)
if err != nil {
return "", trace.Wrap(err)
}
// Read in the request from the client and make sure the requested command
// is supported and extract the remote address. If everything is good, write
// out a success response.
remoteAddr, err := readRequest(conn)
if err != nil {
return "", trace.Wrap(err)
}
err = writeReply(conn)
if err != nil {
return "", trace.Wrap(err)
}
return remoteAddr, nil
} | [
"func",
"Handshake",
"(",
"conn",
"net",
".",
"Conn",
")",
"(",
"string",
",",
"error",
")",
"{",
"// Read in the version and reject anything other than SOCKS5.",
"version",
",",
"err",
":=",
"readByte",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"version",
"!=",
"socks5Version",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Read in the authentication method requested by the client and write back",
"// the method that was selected. At the moment only \"no authentication",
"// required\" is supported.",
"authMethods",
",",
"err",
":=",
"readAuthenticationMethod",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"!",
"byteSliceContains",
"(",
"authMethods",
",",
"socks5AuthNotRequired",
")",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"err",
"=",
"writeMethodSelection",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Read in the request from the client and make sure the requested command",
"// is supported and extract the remote address. If everything is good, write",
"// out a success response.",
"remoteAddr",
",",
"err",
":=",
"readRequest",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"err",
"=",
"writeReply",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"remoteAddr",
",",
"nil",
"\n",
"}"
] | // Handshake performs a SOCKS5 handshake with the client and returns
// the remote address to proxy the connection to. | [
"Handshake",
"performs",
"a",
"SOCKS5",
"handshake",
"with",
"the",
"client",
"and",
"returns",
"the",
"remote",
"address",
"to",
"proxy",
"the",
"connection",
"to",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L49-L87 | train |
gravitational/teleport | lib/utils/socks/socks.go | readAuthenticationMethod | func readAuthenticationMethod(conn net.Conn) ([]byte, error) {
// Read in the number of authentication methods supported.
nmethods, err := readByte(conn)
if err != nil {
return nil, trace.Wrap(err)
}
// Read nmethods number of bytes from the connection return the list of
// supported authentication methods to the caller.
authMethods := make([]byte, nmethods)
for i := byte(0); i < nmethods; i++ {
method, err := readByte(conn)
if err != nil {
return nil, trace.Wrap(err)
}
authMethods = append(authMethods, method)
}
return authMethods, nil
} | go | func readAuthenticationMethod(conn net.Conn) ([]byte, error) {
// Read in the number of authentication methods supported.
nmethods, err := readByte(conn)
if err != nil {
return nil, trace.Wrap(err)
}
// Read nmethods number of bytes from the connection return the list of
// supported authentication methods to the caller.
authMethods := make([]byte, nmethods)
for i := byte(0); i < nmethods; i++ {
method, err := readByte(conn)
if err != nil {
return nil, trace.Wrap(err)
}
authMethods = append(authMethods, method)
}
return authMethods, nil
} | [
"func",
"readAuthenticationMethod",
"(",
"conn",
"net",
".",
"Conn",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"// Read in the number of authentication methods supported.",
"nmethods",
",",
"err",
":=",
"readByte",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Read nmethods number of bytes from the connection return the list of",
"// supported authentication methods to the caller.",
"authMethods",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"nmethods",
")",
"\n",
"for",
"i",
":=",
"byte",
"(",
"0",
")",
";",
"i",
"<",
"nmethods",
";",
"i",
"++",
"{",
"method",
",",
"err",
":=",
"readByte",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"authMethods",
"=",
"append",
"(",
"authMethods",
",",
"method",
")",
"\n",
"}",
"\n\n",
"return",
"authMethods",
",",
"nil",
"\n",
"}"
] | // readAuthenticationMethod reads in the authentication methods the client
// supports. | [
"readAuthenticationMethod",
"reads",
"in",
"the",
"authentication",
"methods",
"the",
"client",
"supports",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L91-L111 | train |
gravitational/teleport | lib/utils/socks/socks.go | writeMethodSelection | func writeMethodSelection(conn net.Conn) error {
message := []byte{socks5Version, socks5AuthNotRequired}
n, err := conn.Write(message)
if err != nil {
return trace.Wrap(err)
}
if n != len(message) {
return trace.BadParameter("wrote: %v wanted to write: %v", n, len(message))
}
return nil
} | go | func writeMethodSelection(conn net.Conn) error {
message := []byte{socks5Version, socks5AuthNotRequired}
n, err := conn.Write(message)
if err != nil {
return trace.Wrap(err)
}
if n != len(message) {
return trace.BadParameter("wrote: %v wanted to write: %v", n, len(message))
}
return nil
} | [
"func",
"writeMethodSelection",
"(",
"conn",
"net",
".",
"Conn",
")",
"error",
"{",
"message",
":=",
"[",
"]",
"byte",
"{",
"socks5Version",
",",
"socks5AuthNotRequired",
"}",
"\n\n",
"n",
",",
"err",
":=",
"conn",
".",
"Write",
"(",
"message",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"n",
"!=",
"len",
"(",
"message",
")",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"n",
",",
"len",
"(",
"message",
")",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // writeMethodSelection writes out the response to the authentication methods.
// Right now, only SOCKS5 and "no authentication methods" is supported. | [
"writeMethodSelection",
"writes",
"out",
"the",
"response",
"to",
"the",
"authentication",
"methods",
".",
"Right",
"now",
"only",
"SOCKS5",
"and",
"no",
"authentication",
"methods",
"is",
"supported",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L115-L127 | train |
gravitational/teleport | lib/utils/socks/socks.go | readAddrType | func readAddrType(conn net.Conn) (int, error) {
// Read in the type of the remote host.
addrType, err := readByte(conn)
if err != nil {
return 0, trace.Wrap(err)
}
// Based off the type, determine how many more bytes to read in for the
// remote address. For IPv4 it's 4 bytes, for IPv6 it's 16, and for domain
// names read in another byte to determine the length of the field.
switch addrType {
case socks5AddressTypeIPv4:
return net.IPv4len, nil
case socks5AddressTypeIPv6:
return net.IPv6len, nil
case socks5AddressTypeDomainName:
len, err := readByte(conn)
if err != nil {
return 0, trace.Wrap(err)
}
return int(len), nil
default:
return 0, trace.BadParameter("unsupported address type: %v", addrType)
}
} | go | func readAddrType(conn net.Conn) (int, error) {
// Read in the type of the remote host.
addrType, err := readByte(conn)
if err != nil {
return 0, trace.Wrap(err)
}
// Based off the type, determine how many more bytes to read in for the
// remote address. For IPv4 it's 4 bytes, for IPv6 it's 16, and for domain
// names read in another byte to determine the length of the field.
switch addrType {
case socks5AddressTypeIPv4:
return net.IPv4len, nil
case socks5AddressTypeIPv6:
return net.IPv6len, nil
case socks5AddressTypeDomainName:
len, err := readByte(conn)
if err != nil {
return 0, trace.Wrap(err)
}
return int(len), nil
default:
return 0, trace.BadParameter("unsupported address type: %v", addrType)
}
} | [
"func",
"readAddrType",
"(",
"conn",
"net",
".",
"Conn",
")",
"(",
"int",
",",
"error",
")",
"{",
"// Read in the type of the remote host.",
"addrType",
",",
"err",
":=",
"readByte",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"0",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Based off the type, determine how many more bytes to read in for the",
"// remote address. For IPv4 it's 4 bytes, for IPv6 it's 16, and for domain",
"// names read in another byte to determine the length of the field.",
"switch",
"addrType",
"{",
"case",
"socks5AddressTypeIPv4",
":",
"return",
"net",
".",
"IPv4len",
",",
"nil",
"\n",
"case",
"socks5AddressTypeIPv6",
":",
"return",
"net",
".",
"IPv6len",
",",
"nil",
"\n",
"case",
"socks5AddressTypeDomainName",
":",
"len",
",",
"err",
":=",
"readByte",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"0",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"int",
"(",
"len",
")",
",",
"nil",
"\n",
"default",
":",
"return",
"0",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"addrType",
")",
"\n",
"}",
"\n",
"}"
] | // readAddrType reads in the address type and returns the length of the dest
// addr field. | [
"readAddrType",
"reads",
"in",
"the",
"address",
"type",
"and",
"returns",
"the",
"length",
"of",
"the",
"dest",
"addr",
"field",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L182-L206 | train |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.