repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequence
docstring
stringlengths
6
2.61k
docstring_tokens
sequence
sha
stringlengths
40
40
url
stringlengths
85
252
partition
stringclasses
1 value
gravitational/teleport
lib/utils/socks/socks.go
writeReply
func writeReply(conn net.Conn) error { // Write success reply, similar to OpenSSH only success is written. // https://github.com/openssh/openssh-portable/blob/5d14019/channels.c#L1442-L1452 message := []byte{ socks5Version, socks5Succeeded, socks5Reserved, socks5AddressTypeIPv4, } n, err := conn.Write(message) if err != nil { return trace.Wrap(err) } if n != len(message) { return trace.BadParameter("wrote: %v wanted to write: %v", n, len(message)) } // Reply also requires BND.ADDR and BDN.PORT even though they are ignored // because Teleport only supports CONNECT. message = []byte{0, 0, 0, 0, 0, 0} n, err = conn.Write(message) if err != nil { return trace.Wrap(err) } if n != len(message) { return trace.BadParameter("wrote: %v wanted to write: %v", n, len(message)) } return nil }
go
func writeReply(conn net.Conn) error { // Write success reply, similar to OpenSSH only success is written. // https://github.com/openssh/openssh-portable/blob/5d14019/channels.c#L1442-L1452 message := []byte{ socks5Version, socks5Succeeded, socks5Reserved, socks5AddressTypeIPv4, } n, err := conn.Write(message) if err != nil { return trace.Wrap(err) } if n != len(message) { return trace.BadParameter("wrote: %v wanted to write: %v", n, len(message)) } // Reply also requires BND.ADDR and BDN.PORT even though they are ignored // because Teleport only supports CONNECT. message = []byte{0, 0, 0, 0, 0, 0} n, err = conn.Write(message) if err != nil { return trace.Wrap(err) } if n != len(message) { return trace.BadParameter("wrote: %v wanted to write: %v", n, len(message)) } return nil }
[ "func", "writeReply", "(", "conn", "net", ".", "Conn", ")", "error", "{", "// Write success reply, similar to OpenSSH only success is written.", "// https://github.com/openssh/openssh-portable/blob/5d14019/channels.c#L1442-L1452", "message", ":=", "[", "]", "byte", "{", "socks5Version", ",", "socks5Succeeded", ",", "socks5Reserved", ",", "socks5AddressTypeIPv4", ",", "}", "\n", "n", ",", "err", ":=", "conn", ".", "Write", "(", "message", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "n", "!=", "len", "(", "message", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "n", ",", "len", "(", "message", ")", ")", "\n", "}", "\n\n", "// Reply also requires BND.ADDR and BDN.PORT even though they are ignored", "// because Teleport only supports CONNECT.", "message", "=", "[", "]", "byte", "{", "0", ",", "0", ",", "0", ",", "0", ",", "0", ",", "0", "}", "\n", "n", ",", "err", "=", "conn", ".", "Write", "(", "message", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "n", "!=", "len", "(", "message", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "n", ",", "len", "(", "message", ")", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// Write the response to the client.
[ "Write", "the", "response", "to", "the", "client", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L209-L238
train
gravitational/teleport
lib/utils/socks/socks.go
readByte
func readByte(conn net.Conn) (byte, error) { b := make([]byte, 1) _, err := io.ReadFull(conn, b) if err != nil { return 0, trace.Wrap(err) } return b[0], nil }
go
func readByte(conn net.Conn) (byte, error) { b := make([]byte, 1) _, err := io.ReadFull(conn, b) if err != nil { return 0, trace.Wrap(err) } return b[0], nil }
[ "func", "readByte", "(", "conn", "net", ".", "Conn", ")", "(", "byte", ",", "error", ")", "{", "b", ":=", "make", "(", "[", "]", "byte", ",", "1", ")", "\n", "_", ",", "err", ":=", "io", ".", "ReadFull", "(", "conn", ",", "b", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "b", "[", "0", "]", ",", "nil", "\n", "}" ]
// readByte a single byte from the passed in net.Conn.
[ "readByte", "a", "single", "byte", "from", "the", "passed", "in", "net", ".", "Conn", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L241-L249
train
gravitational/teleport
lib/utils/socks/socks.go
byteSliceContains
func byteSliceContains(a []byte, b byte) bool { for _, v := range a { if v == b { return true } } return false }
go
func byteSliceContains(a []byte, b byte) bool { for _, v := range a { if v == b { return true } } return false }
[ "func", "byteSliceContains", "(", "a", "[", "]", "byte", ",", "b", "byte", ")", "bool", "{", "for", "_", ",", "v", ":=", "range", "a", "{", "if", "v", "==", "b", "{", "return", "true", "\n", "}", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// byteSliceContains checks if the slice a contains the byte b.
[ "byteSliceContains", "checks", "if", "the", "slice", "a", "contains", "the", "byte", "b", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/socks/socks.go#L252-L260
train
gravitational/teleport
lib/shell/shell.go
GetLoginShell
func GetLoginShell(username string) (string, error) { var err error var shellcmd string shellcmd, err = getLoginShell(username) if err != nil { if !trace.IsNotFound(err) { logrus.Warnf("No shell specified for %v, using default %v.", username, DefaultShell) return DefaultShell, nil } return "", trace.Wrap(err) } return shellcmd, nil }
go
func GetLoginShell(username string) (string, error) { var err error var shellcmd string shellcmd, err = getLoginShell(username) if err != nil { if !trace.IsNotFound(err) { logrus.Warnf("No shell specified for %v, using default %v.", username, DefaultShell) return DefaultShell, nil } return "", trace.Wrap(err) } return shellcmd, nil }
[ "func", "GetLoginShell", "(", "username", "string", ")", "(", "string", ",", "error", ")", "{", "var", "err", "error", "\n", "var", "shellcmd", "string", "\n\n", "shellcmd", ",", "err", "=", "getLoginShell", "(", "username", ")", "\n", "if", "err", "!=", "nil", "{", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "logrus", ".", "Warnf", "(", "\"", "\"", ",", "username", ",", "DefaultShell", ")", "\n", "return", "DefaultShell", ",", "nil", "\n", "}", "\n", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "shellcmd", ",", "nil", "\n", "}" ]
// GetLoginShell determines the login shell for a given username.
[ "GetLoginShell", "determines", "the", "login", "shell", "for", "a", "given", "username", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/shell/shell.go#L30-L44
train
gravitational/teleport
integration/helpers.go
GetRoles
func (s *InstanceSecrets) GetRoles() []services.Role { var roles []services.Role for _, ca := range s.GetCAs() { if ca.GetType() != services.UserCA { continue } role := services.RoleForCertAuthority(ca) role.SetLogins(services.Allow, s.AllowedLogins()) roles = append(roles, role) } return roles }
go
func (s *InstanceSecrets) GetRoles() []services.Role { var roles []services.Role for _, ca := range s.GetCAs() { if ca.GetType() != services.UserCA { continue } role := services.RoleForCertAuthority(ca) role.SetLogins(services.Allow, s.AllowedLogins()) roles = append(roles, role) } return roles }
[ "func", "(", "s", "*", "InstanceSecrets", ")", "GetRoles", "(", ")", "[", "]", "services", ".", "Role", "{", "var", "roles", "[", "]", "services", ".", "Role", "\n", "for", "_", ",", "ca", ":=", "range", "s", ".", "GetCAs", "(", ")", "{", "if", "ca", ".", "GetType", "(", ")", "!=", "services", ".", "UserCA", "{", "continue", "\n", "}", "\n", "role", ":=", "services", ".", "RoleForCertAuthority", "(", "ca", ")", "\n", "role", ".", "SetLogins", "(", "services", ".", "Allow", ",", "s", ".", "AllowedLogins", "(", ")", ")", "\n", "roles", "=", "append", "(", "roles", ",", "role", ")", "\n", "}", "\n", "return", "roles", "\n", "}" ]
// GetRoles returns a list of roles to initiate for this secret
[ "GetRoles", "returns", "a", "list", "of", "roles", "to", "initiate", "for", "this", "secret" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L231-L242
train
gravitational/teleport
integration/helpers.go
SetupUserCreds
func SetupUserCreds(tc *client.TeleportClient, proxyHost string, creds UserCreds) error { _, err := tc.AddKey(proxyHost, &creds.Key) if err != nil { return trace.Wrap(err) } err = tc.AddTrustedCA(creds.HostCA) if err != nil { return trace.Wrap(err) } return nil }
go
func SetupUserCreds(tc *client.TeleportClient, proxyHost string, creds UserCreds) error { _, err := tc.AddKey(proxyHost, &creds.Key) if err != nil { return trace.Wrap(err) } err = tc.AddTrustedCA(creds.HostCA) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "SetupUserCreds", "(", "tc", "*", "client", ".", "TeleportClient", ",", "proxyHost", "string", ",", "creds", "UserCreds", ")", "error", "{", "_", ",", "err", ":=", "tc", ".", "AddKey", "(", "proxyHost", ",", "&", "creds", ".", "Key", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "err", "=", "tc", ".", "AddTrustedCA", "(", "creds", ".", "HostCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// SetupUserCreds sets up user credentials for client
[ "SetupUserCreds", "sets", "up", "user", "credentials", "for", "client" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L357-L367
train
gravitational/teleport
integration/helpers.go
SetupUser
func SetupUser(process *service.TeleportProcess, username string, roles []services.Role) error { auth := process.GetAuthServer() teleUser, err := services.NewUser(username) if err != nil { return trace.Wrap(err) } if len(roles) == 0 { role := services.RoleForUser(teleUser) role.SetLogins(services.Allow, []string{username}) // allow tests to forward agent, still needs to be passed in client roleOptions := role.GetOptions() roleOptions.ForwardAgent = services.NewBool(true) role.SetOptions(roleOptions) err = auth.UpsertRole(role) if err != nil { return trace.Wrap(err) } teleUser.AddRole(role.GetMetadata().Name) roles = append(roles, role) } else { for _, role := range roles { err := auth.UpsertRole(role) if err != nil { return trace.Wrap(err) } teleUser.AddRole(role.GetName()) } } err = auth.UpsertUser(teleUser) if err != nil { return trace.Wrap(err) } return nil }
go
func SetupUser(process *service.TeleportProcess, username string, roles []services.Role) error { auth := process.GetAuthServer() teleUser, err := services.NewUser(username) if err != nil { return trace.Wrap(err) } if len(roles) == 0 { role := services.RoleForUser(teleUser) role.SetLogins(services.Allow, []string{username}) // allow tests to forward agent, still needs to be passed in client roleOptions := role.GetOptions() roleOptions.ForwardAgent = services.NewBool(true) role.SetOptions(roleOptions) err = auth.UpsertRole(role) if err != nil { return trace.Wrap(err) } teleUser.AddRole(role.GetMetadata().Name) roles = append(roles, role) } else { for _, role := range roles { err := auth.UpsertRole(role) if err != nil { return trace.Wrap(err) } teleUser.AddRole(role.GetName()) } } err = auth.UpsertUser(teleUser) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "SetupUser", "(", "process", "*", "service", ".", "TeleportProcess", ",", "username", "string", ",", "roles", "[", "]", "services", ".", "Role", ")", "error", "{", "auth", ":=", "process", ".", "GetAuthServer", "(", ")", "\n", "teleUser", ",", "err", ":=", "services", ".", "NewUser", "(", "username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "len", "(", "roles", ")", "==", "0", "{", "role", ":=", "services", ".", "RoleForUser", "(", "teleUser", ")", "\n", "role", ".", "SetLogins", "(", "services", ".", "Allow", ",", "[", "]", "string", "{", "username", "}", ")", "\n\n", "// allow tests to forward agent, still needs to be passed in client", "roleOptions", ":=", "role", ".", "GetOptions", "(", ")", "\n", "roleOptions", ".", "ForwardAgent", "=", "services", ".", "NewBool", "(", "true", ")", "\n", "role", ".", "SetOptions", "(", "roleOptions", ")", "\n\n", "err", "=", "auth", ".", "UpsertRole", "(", "role", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "teleUser", ".", "AddRole", "(", "role", ".", "GetMetadata", "(", ")", ".", "Name", ")", "\n", "roles", "=", "append", "(", "roles", ",", "role", ")", "\n", "}", "else", "{", "for", "_", ",", "role", ":=", "range", "roles", "{", "err", ":=", "auth", ".", "UpsertRole", "(", "role", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "teleUser", ".", "AddRole", "(", "role", ".", "GetName", "(", ")", ")", "\n", "}", "\n", "}", "\n", "err", "=", "auth", ".", "UpsertUser", "(", "teleUser", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// SetupUser sets up user in the cluster
[ "SetupUser", "sets", "up", "user", "in", "the", "cluster" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L370-L405
train
gravitational/teleport
integration/helpers.go
GenerateUserCreds
func GenerateUserCreds(process *service.TeleportProcess, username string) (*UserCreds, error) { priv, pub, err := testauthority.New().GenerateKeyPair("") if err != nil { return nil, trace.Wrap(err) } a := process.GetAuthServer() sshCert, x509Cert, err := a.GenerateUserCerts(pub, username, time.Hour, teleport.CertificateFormatStandard) if err != nil { return nil, trace.Wrap(err) } clusterName, err := a.GetClusterName() if err != nil { return nil, trace.Wrap(err) } ca, err := a.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName.GetClusterName(), }, false) if err != nil { return nil, trace.Wrap(err) } return &UserCreds{ HostCA: ca, Key: client.Key{ Priv: priv, Pub: pub, Cert: sshCert, TLSCert: x509Cert, }, }, nil }
go
func GenerateUserCreds(process *service.TeleportProcess, username string) (*UserCreds, error) { priv, pub, err := testauthority.New().GenerateKeyPair("") if err != nil { return nil, trace.Wrap(err) } a := process.GetAuthServer() sshCert, x509Cert, err := a.GenerateUserCerts(pub, username, time.Hour, teleport.CertificateFormatStandard) if err != nil { return nil, trace.Wrap(err) } clusterName, err := a.GetClusterName() if err != nil { return nil, trace.Wrap(err) } ca, err := a.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName.GetClusterName(), }, false) if err != nil { return nil, trace.Wrap(err) } return &UserCreds{ HostCA: ca, Key: client.Key{ Priv: priv, Pub: pub, Cert: sshCert, TLSCert: x509Cert, }, }, nil }
[ "func", "GenerateUserCreds", "(", "process", "*", "service", ".", "TeleportProcess", ",", "username", "string", ")", "(", "*", "UserCreds", ",", "error", ")", "{", "priv", ",", "pub", ",", "err", ":=", "testauthority", ".", "New", "(", ")", ".", "GenerateKeyPair", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "a", ":=", "process", ".", "GetAuthServer", "(", ")", "\n", "sshCert", ",", "x509Cert", ",", "err", ":=", "a", ".", "GenerateUserCerts", "(", "pub", ",", "username", ",", "time", ".", "Hour", ",", "teleport", ".", "CertificateFormatStandard", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "clusterName", ",", "err", ":=", "a", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "ca", ",", "err", ":=", "a", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "clusterName", ".", "GetClusterName", "(", ")", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "UserCreds", "{", "HostCA", ":", "ca", ",", "Key", ":", "client", ".", "Key", "{", "Priv", ":", "priv", ",", "Pub", ":", "pub", ",", "Cert", ":", "sshCert", ",", "TLSCert", ":", "x509Cert", ",", "}", ",", "}", ",", "nil", "\n", "}" ]
// GenerateUserCreds generates key to be used by client
[ "GenerateUserCreds", "generates", "key", "to", "be", "used", "by", "client" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L408-L438
train
gravitational/teleport
integration/helpers.go
StartNode
func (i *TeleInstance) StartNode(tconf *service.Config) (*service.TeleportProcess, error) { dataDir, err := ioutil.TempDir("", "cluster-"+i.Secrets.SiteName) if err != nil { return nil, trace.Wrap(err) } tconf.DataDir = dataDir authServer := utils.MustParseAddr(net.JoinHostPort(i.Hostname, i.GetPortAuth())) tconf.AuthServers = append(tconf.AuthServers, *authServer) tconf.Token = "token" tconf.UploadEventsC = i.UploadEventsC var ttl time.Duration tconf.CachePolicy = service.CachePolicy{ Enabled: true, RecentTTL: &ttl, } tconf.SSH.PublicAddrs = []utils.NetAddr{ utils.NetAddr{ AddrNetwork: "tcp", Addr: Loopback, }, utils.NetAddr{ AddrNetwork: "tcp", Addr: Host, }, } tconf.Auth.Enabled = false tconf.Proxy.Enabled = false // Create a new Teleport process and add it to the list of nodes that // compose this "cluster". process, err := service.NewTeleport(tconf) if err != nil { return nil, trace.Wrap(err) } i.Nodes = append(i.Nodes, process) // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{ service.NodeSSHReady, } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(process, expectedEvents) if err != nil { return nil, trace.Wrap(err) } log.Debugf("Teleport node (in instance %v) started: %v/%v events received.", i.Secrets.SiteName, len(expectedEvents), len(receivedEvents)) return process, nil }
go
func (i *TeleInstance) StartNode(tconf *service.Config) (*service.TeleportProcess, error) { dataDir, err := ioutil.TempDir("", "cluster-"+i.Secrets.SiteName) if err != nil { return nil, trace.Wrap(err) } tconf.DataDir = dataDir authServer := utils.MustParseAddr(net.JoinHostPort(i.Hostname, i.GetPortAuth())) tconf.AuthServers = append(tconf.AuthServers, *authServer) tconf.Token = "token" tconf.UploadEventsC = i.UploadEventsC var ttl time.Duration tconf.CachePolicy = service.CachePolicy{ Enabled: true, RecentTTL: &ttl, } tconf.SSH.PublicAddrs = []utils.NetAddr{ utils.NetAddr{ AddrNetwork: "tcp", Addr: Loopback, }, utils.NetAddr{ AddrNetwork: "tcp", Addr: Host, }, } tconf.Auth.Enabled = false tconf.Proxy.Enabled = false // Create a new Teleport process and add it to the list of nodes that // compose this "cluster". process, err := service.NewTeleport(tconf) if err != nil { return nil, trace.Wrap(err) } i.Nodes = append(i.Nodes, process) // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{ service.NodeSSHReady, } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(process, expectedEvents) if err != nil { return nil, trace.Wrap(err) } log.Debugf("Teleport node (in instance %v) started: %v/%v events received.", i.Secrets.SiteName, len(expectedEvents), len(receivedEvents)) return process, nil }
[ "func", "(", "i", "*", "TeleInstance", ")", "StartNode", "(", "tconf", "*", "service", ".", "Config", ")", "(", "*", "service", ".", "TeleportProcess", ",", "error", ")", "{", "dataDir", ",", "err", ":=", "ioutil", ".", "TempDir", "(", "\"", "\"", ",", "\"", "\"", "+", "i", ".", "Secrets", ".", "SiteName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tconf", ".", "DataDir", "=", "dataDir", "\n\n", "authServer", ":=", "utils", ".", "MustParseAddr", "(", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "i", ".", "GetPortAuth", "(", ")", ")", ")", "\n", "tconf", ".", "AuthServers", "=", "append", "(", "tconf", ".", "AuthServers", ",", "*", "authServer", ")", "\n", "tconf", ".", "Token", "=", "\"", "\"", "\n", "tconf", ".", "UploadEventsC", "=", "i", ".", "UploadEventsC", "\n", "var", "ttl", "time", ".", "Duration", "\n", "tconf", ".", "CachePolicy", "=", "service", ".", "CachePolicy", "{", "Enabled", ":", "true", ",", "RecentTTL", ":", "&", "ttl", ",", "}", "\n", "tconf", ".", "SSH", ".", "PublicAddrs", "=", "[", "]", "utils", ".", "NetAddr", "{", "utils", ".", "NetAddr", "{", "AddrNetwork", ":", "\"", "\"", ",", "Addr", ":", "Loopback", ",", "}", ",", "utils", ".", "NetAddr", "{", "AddrNetwork", ":", "\"", "\"", ",", "Addr", ":", "Host", ",", "}", ",", "}", "\n", "tconf", ".", "Auth", ".", "Enabled", "=", "false", "\n", "tconf", ".", "Proxy", ".", "Enabled", "=", "false", "\n\n", "// Create a new Teleport process and add it to the list of nodes that", "// compose this \"cluster\".", "process", ",", "err", ":=", "service", ".", "NewTeleport", "(", "tconf", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "i", ".", "Nodes", "=", "append", "(", "i", ".", "Nodes", ",", "process", ")", "\n\n", "// Build a list of expected events to wait for before unblocking based off", "// the configuration passed in.", "expectedEvents", ":=", "[", "]", "string", "{", "service", ".", "NodeSSHReady", ",", "}", "\n\n", "// Start the process and block until the expected events have arrived.", "receivedEvents", ",", "err", ":=", "startAndWait", "(", "process", ",", "expectedEvents", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "i", ".", "Secrets", ".", "SiteName", ",", "len", "(", "expectedEvents", ")", ",", "len", "(", "receivedEvents", ")", ")", "\n", "return", "process", ",", "nil", "\n", "}" ]
// StartNode starts a SSH node and connects it to the cluster.
[ "StartNode", "starts", "a", "SSH", "node", "and", "connects", "it", "to", "the", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L603-L655
train
gravitational/teleport
integration/helpers.go
StartNodeAndProxy
func (i *TeleInstance) StartNodeAndProxy(name string, sshPort, proxyWebPort, proxySSHPort int) error { dataDir, err := ioutil.TempDir("", "cluster-"+i.Secrets.SiteName) if err != nil { return trace.Wrap(err) } tconf := service.MakeDefaultConfig() authServer := utils.MustParseAddr(net.JoinHostPort(i.Hostname, i.GetPortAuth())) tconf.AuthServers = append(tconf.AuthServers, *authServer) tconf.Token = "token" tconf.HostUUID = name tconf.Hostname = name tconf.UploadEventsC = i.UploadEventsC tconf.DataDir = dataDir var ttl time.Duration tconf.CachePolicy = service.CachePolicy{ Enabled: true, RecentTTL: &ttl, } tconf.Auth.Enabled = false tconf.Proxy.Enabled = true tconf.Proxy.SSHAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", proxySSHPort)) tconf.Proxy.WebAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", proxyWebPort)) tconf.Proxy.DisableReverseTunnel = true tconf.Proxy.DisableWebService = true tconf.SSH.Enabled = true tconf.SSH.Addr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", sshPort)) tconf.SSH.PublicAddrs = []utils.NetAddr{ utils.NetAddr{ AddrNetwork: "tcp", Addr: Loopback, }, utils.NetAddr{ AddrNetwork: "tcp", Addr: Host, }, } // Create a new Teleport process and add it to the list of nodes that // compose this "cluster". process, err := service.NewTeleport(tconf) if err != nil { return trace.Wrap(err) } i.Nodes = append(i.Nodes, process) // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{ service.ProxySSHReady, service.NodeSSHReady, } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(process, expectedEvents) if err != nil { return trace.Wrap(err) } log.Debugf("Teleport node and proxy (in instance %v) started: %v/%v events received.", i.Secrets.SiteName, len(expectedEvents), len(receivedEvents)) return nil }
go
func (i *TeleInstance) StartNodeAndProxy(name string, sshPort, proxyWebPort, proxySSHPort int) error { dataDir, err := ioutil.TempDir("", "cluster-"+i.Secrets.SiteName) if err != nil { return trace.Wrap(err) } tconf := service.MakeDefaultConfig() authServer := utils.MustParseAddr(net.JoinHostPort(i.Hostname, i.GetPortAuth())) tconf.AuthServers = append(tconf.AuthServers, *authServer) tconf.Token = "token" tconf.HostUUID = name tconf.Hostname = name tconf.UploadEventsC = i.UploadEventsC tconf.DataDir = dataDir var ttl time.Duration tconf.CachePolicy = service.CachePolicy{ Enabled: true, RecentTTL: &ttl, } tconf.Auth.Enabled = false tconf.Proxy.Enabled = true tconf.Proxy.SSHAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", proxySSHPort)) tconf.Proxy.WebAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", proxyWebPort)) tconf.Proxy.DisableReverseTunnel = true tconf.Proxy.DisableWebService = true tconf.SSH.Enabled = true tconf.SSH.Addr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", sshPort)) tconf.SSH.PublicAddrs = []utils.NetAddr{ utils.NetAddr{ AddrNetwork: "tcp", Addr: Loopback, }, utils.NetAddr{ AddrNetwork: "tcp", Addr: Host, }, } // Create a new Teleport process and add it to the list of nodes that // compose this "cluster". process, err := service.NewTeleport(tconf) if err != nil { return trace.Wrap(err) } i.Nodes = append(i.Nodes, process) // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{ service.ProxySSHReady, service.NodeSSHReady, } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(process, expectedEvents) if err != nil { return trace.Wrap(err) } log.Debugf("Teleport node and proxy (in instance %v) started: %v/%v events received.", i.Secrets.SiteName, len(expectedEvents), len(receivedEvents)) return nil }
[ "func", "(", "i", "*", "TeleInstance", ")", "StartNodeAndProxy", "(", "name", "string", ",", "sshPort", ",", "proxyWebPort", ",", "proxySSHPort", "int", ")", "error", "{", "dataDir", ",", "err", ":=", "ioutil", ".", "TempDir", "(", "\"", "\"", ",", "\"", "\"", "+", "i", ".", "Secrets", ".", "SiteName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "tconf", ":=", "service", ".", "MakeDefaultConfig", "(", ")", "\n\n", "authServer", ":=", "utils", ".", "MustParseAddr", "(", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "i", ".", "GetPortAuth", "(", ")", ")", ")", "\n", "tconf", ".", "AuthServers", "=", "append", "(", "tconf", ".", "AuthServers", ",", "*", "authServer", ")", "\n", "tconf", ".", "Token", "=", "\"", "\"", "\n", "tconf", ".", "HostUUID", "=", "name", "\n", "tconf", ".", "Hostname", "=", "name", "\n", "tconf", ".", "UploadEventsC", "=", "i", ".", "UploadEventsC", "\n", "tconf", ".", "DataDir", "=", "dataDir", "\n", "var", "ttl", "time", ".", "Duration", "\n", "tconf", ".", "CachePolicy", "=", "service", ".", "CachePolicy", "{", "Enabled", ":", "true", ",", "RecentTTL", ":", "&", "ttl", ",", "}", "\n\n", "tconf", ".", "Auth", ".", "Enabled", "=", "false", "\n\n", "tconf", ".", "Proxy", ".", "Enabled", "=", "true", "\n", "tconf", ".", "Proxy", ".", "SSHAddr", ".", "Addr", "=", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "proxySSHPort", ")", ")", "\n", "tconf", ".", "Proxy", ".", "WebAddr", ".", "Addr", "=", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "proxyWebPort", ")", ")", "\n", "tconf", ".", "Proxy", ".", "DisableReverseTunnel", "=", "true", "\n", "tconf", ".", "Proxy", ".", "DisableWebService", "=", "true", "\n\n", "tconf", ".", "SSH", ".", "Enabled", "=", "true", "\n", "tconf", ".", "SSH", ".", "Addr", ".", "Addr", "=", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "sshPort", ")", ")", "\n", "tconf", ".", "SSH", ".", "PublicAddrs", "=", "[", "]", "utils", ".", "NetAddr", "{", "utils", ".", "NetAddr", "{", "AddrNetwork", ":", "\"", "\"", ",", "Addr", ":", "Loopback", ",", "}", ",", "utils", ".", "NetAddr", "{", "AddrNetwork", ":", "\"", "\"", ",", "Addr", ":", "Host", ",", "}", ",", "}", "\n\n", "// Create a new Teleport process and add it to the list of nodes that", "// compose this \"cluster\".", "process", ",", "err", ":=", "service", ".", "NewTeleport", "(", "tconf", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "i", ".", "Nodes", "=", "append", "(", "i", ".", "Nodes", ",", "process", ")", "\n\n", "// Build a list of expected events to wait for before unblocking based off", "// the configuration passed in.", "expectedEvents", ":=", "[", "]", "string", "{", "service", ".", "ProxySSHReady", ",", "service", ".", "NodeSSHReady", ",", "}", "\n\n", "// Start the process and block until the expected events have arrived.", "receivedEvents", ",", "err", ":=", "startAndWait", "(", "process", ",", "expectedEvents", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "i", ".", "Secrets", ".", "SiteName", ",", "len", "(", "expectedEvents", ")", ",", "len", "(", "receivedEvents", ")", ")", "\n", "return", "nil", "\n", "}" ]
// StartNodeAndProxy starts a SSH node and a Proxy Server and connects it to // the cluster.
[ "StartNodeAndProxy", "starts", "a", "SSH", "node", "and", "a", "Proxy", "Server", "and", "connects", "it", "to", "the", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L659-L725
train
gravitational/teleport
integration/helpers.go
StartProxy
func (i *TeleInstance) StartProxy(cfg ProxyConfig) error { dataDir, err := ioutil.TempDir("", "cluster-"+i.Secrets.SiteName+"-"+cfg.Name) if err != nil { return trace.Wrap(err) } tconf := service.MakeDefaultConfig() authServer := utils.MustParseAddr(net.JoinHostPort(i.Hostname, i.GetPortAuth())) tconf.AuthServers = append(tconf.AuthServers, *authServer) tconf.CachePolicy = service.CachePolicy{Enabled: true} tconf.DataDir = dataDir tconf.UploadEventsC = i.UploadEventsC tconf.HostUUID = cfg.Name tconf.Hostname = cfg.Name tconf.Token = "token" tconf.Auth.Enabled = false tconf.SSH.Enabled = false tconf.Proxy.Enabled = true tconf.Proxy.SSHAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", cfg.SSHPort)) tconf.Proxy.PublicAddrs = []utils.NetAddr{ utils.NetAddr{ AddrNetwork: "tcp", Addr: Loopback, }, utils.NetAddr{ AddrNetwork: "tcp", Addr: Host, }, } tconf.Proxy.ReverseTunnelListenAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", cfg.ReverseTunnelPort)) tconf.Proxy.WebAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", cfg.WebPort)) tconf.Proxy.DisableReverseTunnel = false tconf.Proxy.DisableWebService = true // Create a new Teleport process and add it to the list of nodes that // compose this "cluster". process, err := service.NewTeleport(tconf) if err != nil { return trace.Wrap(err) } i.Nodes = append(i.Nodes, process) // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{ service.ProxyReverseTunnelReady, service.ProxySSHReady, } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(process, expectedEvents) if err != nil { return trace.Wrap(err) } log.Debugf("Teleport proxy (in instance %v) started: %v/%v events received.", i.Secrets.SiteName, len(expectedEvents), len(receivedEvents)) return nil }
go
func (i *TeleInstance) StartProxy(cfg ProxyConfig) error { dataDir, err := ioutil.TempDir("", "cluster-"+i.Secrets.SiteName+"-"+cfg.Name) if err != nil { return trace.Wrap(err) } tconf := service.MakeDefaultConfig() authServer := utils.MustParseAddr(net.JoinHostPort(i.Hostname, i.GetPortAuth())) tconf.AuthServers = append(tconf.AuthServers, *authServer) tconf.CachePolicy = service.CachePolicy{Enabled: true} tconf.DataDir = dataDir tconf.UploadEventsC = i.UploadEventsC tconf.HostUUID = cfg.Name tconf.Hostname = cfg.Name tconf.Token = "token" tconf.Auth.Enabled = false tconf.SSH.Enabled = false tconf.Proxy.Enabled = true tconf.Proxy.SSHAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", cfg.SSHPort)) tconf.Proxy.PublicAddrs = []utils.NetAddr{ utils.NetAddr{ AddrNetwork: "tcp", Addr: Loopback, }, utils.NetAddr{ AddrNetwork: "tcp", Addr: Host, }, } tconf.Proxy.ReverseTunnelListenAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", cfg.ReverseTunnelPort)) tconf.Proxy.WebAddr.Addr = net.JoinHostPort(i.Hostname, fmt.Sprintf("%v", cfg.WebPort)) tconf.Proxy.DisableReverseTunnel = false tconf.Proxy.DisableWebService = true // Create a new Teleport process and add it to the list of nodes that // compose this "cluster". process, err := service.NewTeleport(tconf) if err != nil { return trace.Wrap(err) } i.Nodes = append(i.Nodes, process) // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{ service.ProxyReverseTunnelReady, service.ProxySSHReady, } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(process, expectedEvents) if err != nil { return trace.Wrap(err) } log.Debugf("Teleport proxy (in instance %v) started: %v/%v events received.", i.Secrets.SiteName, len(expectedEvents), len(receivedEvents)) return nil }
[ "func", "(", "i", "*", "TeleInstance", ")", "StartProxy", "(", "cfg", "ProxyConfig", ")", "error", "{", "dataDir", ",", "err", ":=", "ioutil", ".", "TempDir", "(", "\"", "\"", ",", "\"", "\"", "+", "i", ".", "Secrets", ".", "SiteName", "+", "\"", "\"", "+", "cfg", ".", "Name", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "tconf", ":=", "service", ".", "MakeDefaultConfig", "(", ")", "\n\n", "authServer", ":=", "utils", ".", "MustParseAddr", "(", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "i", ".", "GetPortAuth", "(", ")", ")", ")", "\n", "tconf", ".", "AuthServers", "=", "append", "(", "tconf", ".", "AuthServers", ",", "*", "authServer", ")", "\n", "tconf", ".", "CachePolicy", "=", "service", ".", "CachePolicy", "{", "Enabled", ":", "true", "}", "\n", "tconf", ".", "DataDir", "=", "dataDir", "\n", "tconf", ".", "UploadEventsC", "=", "i", ".", "UploadEventsC", "\n", "tconf", ".", "HostUUID", "=", "cfg", ".", "Name", "\n", "tconf", ".", "Hostname", "=", "cfg", ".", "Name", "\n", "tconf", ".", "Token", "=", "\"", "\"", "\n\n", "tconf", ".", "Auth", ".", "Enabled", "=", "false", "\n\n", "tconf", ".", "SSH", ".", "Enabled", "=", "false", "\n\n", "tconf", ".", "Proxy", ".", "Enabled", "=", "true", "\n", "tconf", ".", "Proxy", ".", "SSHAddr", ".", "Addr", "=", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "cfg", ".", "SSHPort", ")", ")", "\n", "tconf", ".", "Proxy", ".", "PublicAddrs", "=", "[", "]", "utils", ".", "NetAddr", "{", "utils", ".", "NetAddr", "{", "AddrNetwork", ":", "\"", "\"", ",", "Addr", ":", "Loopback", ",", "}", ",", "utils", ".", "NetAddr", "{", "AddrNetwork", ":", "\"", "\"", ",", "Addr", ":", "Host", ",", "}", ",", "}", "\n", "tconf", ".", "Proxy", ".", "ReverseTunnelListenAddr", ".", "Addr", "=", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "cfg", ".", "ReverseTunnelPort", ")", ")", "\n", "tconf", ".", "Proxy", ".", "WebAddr", ".", "Addr", "=", "net", ".", "JoinHostPort", "(", "i", ".", "Hostname", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "cfg", ".", "WebPort", ")", ")", "\n", "tconf", ".", "Proxy", ".", "DisableReverseTunnel", "=", "false", "\n", "tconf", ".", "Proxy", ".", "DisableWebService", "=", "true", "\n\n", "// Create a new Teleport process and add it to the list of nodes that", "// compose this \"cluster\".", "process", ",", "err", ":=", "service", ".", "NewTeleport", "(", "tconf", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "i", ".", "Nodes", "=", "append", "(", "i", ".", "Nodes", ",", "process", ")", "\n\n", "// Build a list of expected events to wait for before unblocking based off", "// the configuration passed in.", "expectedEvents", ":=", "[", "]", "string", "{", "service", ".", "ProxyReverseTunnelReady", ",", "service", ".", "ProxySSHReady", ",", "}", "\n\n", "// Start the process and block until the expected events have arrived.", "receivedEvents", ",", "err", ":=", "startAndWait", "(", "process", ",", "expectedEvents", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "i", ".", "Secrets", ".", "SiteName", ",", "len", "(", "expectedEvents", ")", ",", "len", "(", "receivedEvents", ")", ")", "\n", "return", "nil", "\n", "}" ]
// StartProxy starts another Proxy Server and connects it to the cluster.
[ "StartProxy", "starts", "another", "Proxy", "Server", "and", "connects", "it", "to", "the", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L740-L802
train
gravitational/teleport
integration/helpers.go
Reset
func (i *TeleInstance) Reset() (err error) { i.Process, err = service.NewTeleport(i.Config) if err != nil { return trace.Wrap(err) } return nil }
go
func (i *TeleInstance) Reset() (err error) { i.Process, err = service.NewTeleport(i.Config) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "i", "*", "TeleInstance", ")", "Reset", "(", ")", "(", "err", "error", ")", "{", "i", ".", "Process", ",", "err", "=", "service", ".", "NewTeleport", "(", "i", ".", "Config", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Reset re-creates the teleport instance based on the same configuration // This is needed if you want to stop the instance, reset it and start again
[ "Reset", "re", "-", "creates", "the", "teleport", "instance", "based", "on", "the", "same", "configuration", "This", "is", "needed", "if", "you", "want", "to", "stop", "the", "instance", "reset", "it", "and", "start", "again" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L806-L812
train
gravitational/teleport
integration/helpers.go
AddUserWithRole
func (i *TeleInstance) AddUserWithRole(username string, role services.Role) *User { user := &User{ Username: username, Roles: []services.Role{role}, } i.Secrets.Users[username] = user return user }
go
func (i *TeleInstance) AddUserWithRole(username string, role services.Role) *User { user := &User{ Username: username, Roles: []services.Role{role}, } i.Secrets.Users[username] = user return user }
[ "func", "(", "i", "*", "TeleInstance", ")", "AddUserWithRole", "(", "username", "string", ",", "role", "services", ".", "Role", ")", "*", "User", "{", "user", ":=", "&", "User", "{", "Username", ":", "username", ",", "Roles", ":", "[", "]", "services", ".", "Role", "{", "role", "}", ",", "}", "\n", "i", ".", "Secrets", ".", "Users", "[", "username", "]", "=", "user", "\n", "return", "user", "\n", "}" ]
// AddUserUserWithRole adds user with assigned role
[ "AddUserUserWithRole", "adds", "user", "with", "assigned", "role" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L815-L822
train
gravitational/teleport
integration/helpers.go
AddUser
func (i *TeleInstance) AddUser(username string, mappings []string) *User { log.Infof("teleInstance.AddUser(%v) mapped to %v", username, mappings) if mappings == nil { mappings = make([]string, 0) } user := &User{ Username: username, AllowedLogins: mappings, } i.Secrets.Users[username] = user return user }
go
func (i *TeleInstance) AddUser(username string, mappings []string) *User { log.Infof("teleInstance.AddUser(%v) mapped to %v", username, mappings) if mappings == nil { mappings = make([]string, 0) } user := &User{ Username: username, AllowedLogins: mappings, } i.Secrets.Users[username] = user return user }
[ "func", "(", "i", "*", "TeleInstance", ")", "AddUser", "(", "username", "string", ",", "mappings", "[", "]", "string", ")", "*", "User", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "username", ",", "mappings", ")", "\n", "if", "mappings", "==", "nil", "{", "mappings", "=", "make", "(", "[", "]", "string", ",", "0", ")", "\n", "}", "\n", "user", ":=", "&", "User", "{", "Username", ":", "username", ",", "AllowedLogins", ":", "mappings", ",", "}", "\n", "i", ".", "Secrets", ".", "Users", "[", "username", "]", "=", "user", "\n", "return", "user", "\n", "}" ]
// Adds a new user into i Teleport instance. 'mappings' is a comma-separated // list of OS users
[ "Adds", "a", "new", "user", "into", "i", "Teleport", "instance", ".", "mappings", "is", "a", "comma", "-", "separated", "list", "of", "OS", "users" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L826-L837
train
gravitational/teleport
integration/helpers.go
Start
func (i *TeleInstance) Start() error { // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{} if i.Config.Auth.Enabled { expectedEvents = append(expectedEvents, service.AuthTLSReady) } if i.Config.Proxy.Enabled { expectedEvents = append(expectedEvents, service.ProxyReverseTunnelReady) expectedEvents = append(expectedEvents, service.ProxySSHReady) expectedEvents = append(expectedEvents, service.ProxyAgentPoolReady) if !i.Config.Proxy.DisableWebService { expectedEvents = append(expectedEvents, service.ProxyWebServerReady) } } if i.Config.SSH.Enabled { expectedEvents = append(expectedEvents, service.NodeSSHReady) } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(i.Process, expectedEvents) if err != nil { return trace.Wrap(err) } // Extract and set reversetunnel.Server and reversetunnel.AgentPool upon // receipt of a ProxyReverseTunnelReady and ProxyAgentPoolReady respectively. for _, re := range receivedEvents { switch re.Name { case service.ProxyReverseTunnelReady: ts, ok := re.Payload.(reversetunnel.Server) if ok { i.Tunnel = ts } case service.ProxyAgentPoolReady: ap, ok := re.Payload.(*reversetunnel.AgentPool) if ok { i.Pool = ap } } } log.Debugf("Teleport instance %v started: %v/%v events received.", i.Secrets.SiteName, len(receivedEvents), len(expectedEvents)) return nil }
go
func (i *TeleInstance) Start() error { // Build a list of expected events to wait for before unblocking based off // the configuration passed in. expectedEvents := []string{} if i.Config.Auth.Enabled { expectedEvents = append(expectedEvents, service.AuthTLSReady) } if i.Config.Proxy.Enabled { expectedEvents = append(expectedEvents, service.ProxyReverseTunnelReady) expectedEvents = append(expectedEvents, service.ProxySSHReady) expectedEvents = append(expectedEvents, service.ProxyAgentPoolReady) if !i.Config.Proxy.DisableWebService { expectedEvents = append(expectedEvents, service.ProxyWebServerReady) } } if i.Config.SSH.Enabled { expectedEvents = append(expectedEvents, service.NodeSSHReady) } // Start the process and block until the expected events have arrived. receivedEvents, err := startAndWait(i.Process, expectedEvents) if err != nil { return trace.Wrap(err) } // Extract and set reversetunnel.Server and reversetunnel.AgentPool upon // receipt of a ProxyReverseTunnelReady and ProxyAgentPoolReady respectively. for _, re := range receivedEvents { switch re.Name { case service.ProxyReverseTunnelReady: ts, ok := re.Payload.(reversetunnel.Server) if ok { i.Tunnel = ts } case service.ProxyAgentPoolReady: ap, ok := re.Payload.(*reversetunnel.AgentPool) if ok { i.Pool = ap } } } log.Debugf("Teleport instance %v started: %v/%v events received.", i.Secrets.SiteName, len(receivedEvents), len(expectedEvents)) return nil }
[ "func", "(", "i", "*", "TeleInstance", ")", "Start", "(", ")", "error", "{", "// Build a list of expected events to wait for before unblocking based off", "// the configuration passed in.", "expectedEvents", ":=", "[", "]", "string", "{", "}", "\n", "if", "i", ".", "Config", ".", "Auth", ".", "Enabled", "{", "expectedEvents", "=", "append", "(", "expectedEvents", ",", "service", ".", "AuthTLSReady", ")", "\n", "}", "\n", "if", "i", ".", "Config", ".", "Proxy", ".", "Enabled", "{", "expectedEvents", "=", "append", "(", "expectedEvents", ",", "service", ".", "ProxyReverseTunnelReady", ")", "\n", "expectedEvents", "=", "append", "(", "expectedEvents", ",", "service", ".", "ProxySSHReady", ")", "\n", "expectedEvents", "=", "append", "(", "expectedEvents", ",", "service", ".", "ProxyAgentPoolReady", ")", "\n", "if", "!", "i", ".", "Config", ".", "Proxy", ".", "DisableWebService", "{", "expectedEvents", "=", "append", "(", "expectedEvents", ",", "service", ".", "ProxyWebServerReady", ")", "\n", "}", "\n", "}", "\n", "if", "i", ".", "Config", ".", "SSH", ".", "Enabled", "{", "expectedEvents", "=", "append", "(", "expectedEvents", ",", "service", ".", "NodeSSHReady", ")", "\n", "}", "\n\n", "// Start the process and block until the expected events have arrived.", "receivedEvents", ",", "err", ":=", "startAndWait", "(", "i", ".", "Process", ",", "expectedEvents", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Extract and set reversetunnel.Server and reversetunnel.AgentPool upon", "// receipt of a ProxyReverseTunnelReady and ProxyAgentPoolReady respectively.", "for", "_", ",", "re", ":=", "range", "receivedEvents", "{", "switch", "re", ".", "Name", "{", "case", "service", ".", "ProxyReverseTunnelReady", ":", "ts", ",", "ok", ":=", "re", ".", "Payload", ".", "(", "reversetunnel", ".", "Server", ")", "\n", "if", "ok", "{", "i", ".", "Tunnel", "=", "ts", "\n", "}", "\n", "case", "service", ".", "ProxyAgentPoolReady", ":", "ap", ",", "ok", ":=", "re", ".", "Payload", ".", "(", "*", "reversetunnel", ".", "AgentPool", ")", "\n", "if", "ok", "{", "i", ".", "Pool", "=", "ap", "\n", "}", "\n", "}", "\n", "}", "\n\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "i", ".", "Secrets", ".", "SiteName", ",", "len", "(", "receivedEvents", ")", ",", "len", "(", "expectedEvents", ")", ")", "\n", "return", "nil", "\n", "}" ]
// Start will start the TeleInstance and then block until it is ready to // process requests based off the passed in configuration.
[ "Start", "will", "start", "the", "TeleInstance", "and", "then", "block", "until", "it", "is", "ready", "to", "process", "requests", "based", "off", "the", "passed", "in", "configuration", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L841-L886
train
gravitational/teleport
integration/helpers.go
NewClientWithCreds
func (i *TeleInstance) NewClientWithCreds(cfg ClientConfig, creds UserCreds) (tc *client.TeleportClient, err error) { clt, err := i.NewUnauthenticatedClient(cfg) if err != nil { return nil, trace.Wrap(err) } err = SetupUserCreds(clt, i.Config.Proxy.SSHAddr.Addr, creds) if err != nil { return nil, trace.Wrap(err) } return clt, nil }
go
func (i *TeleInstance) NewClientWithCreds(cfg ClientConfig, creds UserCreds) (tc *client.TeleportClient, err error) { clt, err := i.NewUnauthenticatedClient(cfg) if err != nil { return nil, trace.Wrap(err) } err = SetupUserCreds(clt, i.Config.Proxy.SSHAddr.Addr, creds) if err != nil { return nil, trace.Wrap(err) } return clt, nil }
[ "func", "(", "i", "*", "TeleInstance", ")", "NewClientWithCreds", "(", "cfg", "ClientConfig", ",", "creds", "UserCreds", ")", "(", "tc", "*", "client", ".", "TeleportClient", ",", "err", "error", ")", "{", "clt", ",", "err", ":=", "i", ".", "NewUnauthenticatedClient", "(", "cfg", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "err", "=", "SetupUserCreds", "(", "clt", ",", "i", ".", "Config", ".", "Proxy", ".", "SSHAddr", ".", "Addr", ",", "creds", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "clt", ",", "nil", "\n", "}" ]
// NewClientWithCreds creates client with credentials
[ "NewClientWithCreds", "creates", "client", "with", "credentials" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L906-L916
train
gravitational/teleport
integration/helpers.go
StopProxy
func (i *TeleInstance) StopProxy() error { var errors []error for _, p := range i.Nodes { if p.Config.Proxy.Enabled { if err := p.Close(); err != nil { errors = append(errors, err) log.Errorf("Failed closing extra proxy: %v.", err) } if err := p.Wait(); err != nil { errors = append(errors, err) log.Errorf("Failed to stop extra proxy: %v.", err) } } } return trace.NewAggregate(errors...) }
go
func (i *TeleInstance) StopProxy() error { var errors []error for _, p := range i.Nodes { if p.Config.Proxy.Enabled { if err := p.Close(); err != nil { errors = append(errors, err) log.Errorf("Failed closing extra proxy: %v.", err) } if err := p.Wait(); err != nil { errors = append(errors, err) log.Errorf("Failed to stop extra proxy: %v.", err) } } } return trace.NewAggregate(errors...) }
[ "func", "(", "i", "*", "TeleInstance", ")", "StopProxy", "(", ")", "error", "{", "var", "errors", "[", "]", "error", "\n\n", "for", "_", ",", "p", ":=", "range", "i", ".", "Nodes", "{", "if", "p", ".", "Config", ".", "Proxy", ".", "Enabled", "{", "if", "err", ":=", "p", ".", "Close", "(", ")", ";", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "if", "err", ":=", "p", ".", "Wait", "(", ")", ";", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "trace", ".", "NewAggregate", "(", "errors", "...", ")", "\n", "}" ]
// StopProxy loops over the extra nodes in a TeleInstance and stops all // nodes where the proxy server is enabled.
[ "StopProxy", "loops", "over", "the", "extra", "nodes", "in", "a", "TeleInstance", "and", "stops", "all", "nodes", "where", "the", "proxy", "server", "is", "enabled", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L993-L1010
train
gravitational/teleport
integration/helpers.go
StopNodes
func (i *TeleInstance) StopNodes() error { var errors []error for _, node := range i.Nodes { if err := node.Close(); err != nil { errors = append(errors, err) log.Errorf("failed closing extra node %v", err) } if err := node.Wait(); err != nil { errors = append(errors, err) log.Errorf("failed stopping extra node %v", err) } } return trace.NewAggregate(errors...) }
go
func (i *TeleInstance) StopNodes() error { var errors []error for _, node := range i.Nodes { if err := node.Close(); err != nil { errors = append(errors, err) log.Errorf("failed closing extra node %v", err) } if err := node.Wait(); err != nil { errors = append(errors, err) log.Errorf("failed stopping extra node %v", err) } } return trace.NewAggregate(errors...) }
[ "func", "(", "i", "*", "TeleInstance", ")", "StopNodes", "(", ")", "error", "{", "var", "errors", "[", "]", "error", "\n", "for", "_", ",", "node", ":=", "range", "i", ".", "Nodes", "{", "if", "err", ":=", "node", ".", "Close", "(", ")", ";", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "if", "err", ":=", "node", ".", "Wait", "(", ")", ";", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "return", "trace", ".", "NewAggregate", "(", "errors", "...", ")", "\n", "}" ]
// StopNodes stops additional nodes
[ "StopNodes", "stops", "additional", "nodes" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L1013-L1026
train
gravitational/teleport
integration/helpers.go
ServeHTTP
func (p *proxyServer) ServeHTTP(w http.ResponseWriter, r *http.Request) { // Validate http connect parameters. if r.Method != http.MethodConnect { trace.WriteError(w, trace.BadParameter("%v not supported", r.Method)) return } if r.Host == "" { trace.WriteError(w, trace.BadParameter("host not set")) return } // Dial to the target host, this is done before hijacking the connection to // ensure the target host is accessible. dconn, err := net.Dial("tcp", r.Host) if err != nil { trace.WriteError(w, err) return } defer dconn.Close() // Once the client receives 200 OK, the rest of the data will no longer be // http, but whatever protocol is being tunneled. w.WriteHeader(http.StatusOK) // Hijack request so we can get underlying connection. hj, ok := w.(http.Hijacker) if !ok { trace.WriteError(w, trace.AccessDenied("unable to hijack connection")) return } sconn, _, err := hj.Hijack() if err != nil { trace.WriteError(w, err) return } defer sconn.Close() // Success, we're proxying data now. p.Lock() p.count = p.count + 1 p.Unlock() // Copy from src to dst and dst to src. errc := make(chan error, 2) replicate := func(dst io.Writer, src io.Reader) { _, err := io.Copy(dst, src) errc <- err } go replicate(sconn, dconn) go replicate(dconn, sconn) // Wait until done, error, or 10 second. select { case <-time.After(10 * time.Second): case <-errc: } }
go
func (p *proxyServer) ServeHTTP(w http.ResponseWriter, r *http.Request) { // Validate http connect parameters. if r.Method != http.MethodConnect { trace.WriteError(w, trace.BadParameter("%v not supported", r.Method)) return } if r.Host == "" { trace.WriteError(w, trace.BadParameter("host not set")) return } // Dial to the target host, this is done before hijacking the connection to // ensure the target host is accessible. dconn, err := net.Dial("tcp", r.Host) if err != nil { trace.WriteError(w, err) return } defer dconn.Close() // Once the client receives 200 OK, the rest of the data will no longer be // http, but whatever protocol is being tunneled. w.WriteHeader(http.StatusOK) // Hijack request so we can get underlying connection. hj, ok := w.(http.Hijacker) if !ok { trace.WriteError(w, trace.AccessDenied("unable to hijack connection")) return } sconn, _, err := hj.Hijack() if err != nil { trace.WriteError(w, err) return } defer sconn.Close() // Success, we're proxying data now. p.Lock() p.count = p.count + 1 p.Unlock() // Copy from src to dst and dst to src. errc := make(chan error, 2) replicate := func(dst io.Writer, src io.Reader) { _, err := io.Copy(dst, src) errc <- err } go replicate(sconn, dconn) go replicate(dconn, sconn) // Wait until done, error, or 10 second. select { case <-time.After(10 * time.Second): case <-errc: } }
[ "func", "(", "p", "*", "proxyServer", ")", "ServeHTTP", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "// Validate http connect parameters.", "if", "r", ".", "Method", "!=", "http", ".", "MethodConnect", "{", "trace", ".", "WriteError", "(", "w", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "r", ".", "Method", ")", ")", "\n", "return", "\n", "}", "\n", "if", "r", ".", "Host", "==", "\"", "\"", "{", "trace", ".", "WriteError", "(", "w", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", ")", "\n", "return", "\n", "}", "\n\n", "// Dial to the target host, this is done before hijacking the connection to", "// ensure the target host is accessible.", "dconn", ",", "err", ":=", "net", ".", "Dial", "(", "\"", "\"", ",", "r", ".", "Host", ")", "\n", "if", "err", "!=", "nil", "{", "trace", ".", "WriteError", "(", "w", ",", "err", ")", "\n", "return", "\n", "}", "\n", "defer", "dconn", ".", "Close", "(", ")", "\n\n", "// Once the client receives 200 OK, the rest of the data will no longer be", "// http, but whatever protocol is being tunneled.", "w", ".", "WriteHeader", "(", "http", ".", "StatusOK", ")", "\n\n", "// Hijack request so we can get underlying connection.", "hj", ",", "ok", ":=", "w", ".", "(", "http", ".", "Hijacker", ")", "\n", "if", "!", "ok", "{", "trace", ".", "WriteError", "(", "w", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", ")", "\n", "return", "\n", "}", "\n", "sconn", ",", "_", ",", "err", ":=", "hj", ".", "Hijack", "(", ")", "\n", "if", "err", "!=", "nil", "{", "trace", ".", "WriteError", "(", "w", ",", "err", ")", "\n", "return", "\n", "}", "\n", "defer", "sconn", ".", "Close", "(", ")", "\n\n", "// Success, we're proxying data now.", "p", ".", "Lock", "(", ")", "\n", "p", ".", "count", "=", "p", ".", "count", "+", "1", "\n", "p", ".", "Unlock", "(", ")", "\n\n", "// Copy from src to dst and dst to src.", "errc", ":=", "make", "(", "chan", "error", ",", "2", ")", "\n", "replicate", ":=", "func", "(", "dst", "io", ".", "Writer", ",", "src", "io", ".", "Reader", ")", "{", "_", ",", "err", ":=", "io", ".", "Copy", "(", "dst", ",", "src", ")", "\n", "errc", "<-", "err", "\n", "}", "\n", "go", "replicate", "(", "sconn", ",", "dconn", ")", "\n", "go", "replicate", "(", "dconn", ",", "sconn", ")", "\n\n", "// Wait until done, error, or 10 second.", "select", "{", "case", "<-", "time", ".", "After", "(", "10", "*", "time", ".", "Second", ")", ":", "case", "<-", "errc", ":", "}", "\n", "}" ]
// ServeHTTP only accepts the CONNECT verb and will tunnel your connection to // the specified host. Also tracks the number of connections that it proxies for // debugging purposes.
[ "ServeHTTP", "only", "accepts", "the", "CONNECT", "verb", "and", "will", "tunnel", "your", "connection", "to", "the", "specified", "host", ".", "Also", "tracks", "the", "number", "of", "connections", "that", "it", "proxies", "for", "debugging", "purposes", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L1093-L1149
train
gravitational/teleport
integration/helpers.go
Count
func (p *proxyServer) Count() int { p.Lock() defer p.Unlock() return p.count }
go
func (p *proxyServer) Count() int { p.Lock() defer p.Unlock() return p.count }
[ "func", "(", "p", "*", "proxyServer", ")", "Count", "(", ")", "int", "{", "p", ".", "Lock", "(", ")", "\n", "defer", "p", ".", "Unlock", "(", ")", "\n", "return", "p", ".", "count", "\n", "}" ]
// Count returns the number of connections that have been proxied.
[ "Count", "returns", "the", "number", "of", "connections", "that", "have", "been", "proxied", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L1152-L1156
train
gravitational/teleport
integration/helpers.go
createAgent
func createAgent(me *user.User, privateKeyByte []byte, certificateBytes []byte) (*teleagent.AgentServer, string, string, error) { // create a path to the unix socket sockDir, err := ioutil.TempDir("", "int-test") if err != nil { return nil, "", "", trace.Wrap(err) } sockPath := filepath.Join(sockDir, "agent.sock") uid, err := strconv.Atoi(me.Uid) if err != nil { return nil, "", "", trace.Wrap(err) } gid, err := strconv.Atoi(me.Gid) if err != nil { return nil, "", "", trace.Wrap(err) } // transform the key and certificate bytes into something the agent can understand publicKey, _, _, _, err := ssh.ParseAuthorizedKey(certificateBytes) if err != nil { return nil, "", "", trace.Wrap(err) } privateKey, err := ssh.ParseRawPrivateKey(privateKeyByte) if err != nil { return nil, "", "", trace.Wrap(err) } agentKey := agent.AddedKey{ PrivateKey: privateKey, Certificate: publicKey.(*ssh.Certificate), Comment: "", LifetimeSecs: 0, ConfirmBeforeUse: false, } // create a (unstarted) agent and add the key to it teleAgent := teleagent.NewServer() teleAgent.Add(agentKey) // start the SSH agent err = teleAgent.ListenUnixSocket(sockPath, uid, gid, 0600) if err != nil { return nil, "", "", trace.Wrap(err) } go teleAgent.Serve() return teleAgent, sockDir, sockPath, nil }
go
func createAgent(me *user.User, privateKeyByte []byte, certificateBytes []byte) (*teleagent.AgentServer, string, string, error) { // create a path to the unix socket sockDir, err := ioutil.TempDir("", "int-test") if err != nil { return nil, "", "", trace.Wrap(err) } sockPath := filepath.Join(sockDir, "agent.sock") uid, err := strconv.Atoi(me.Uid) if err != nil { return nil, "", "", trace.Wrap(err) } gid, err := strconv.Atoi(me.Gid) if err != nil { return nil, "", "", trace.Wrap(err) } // transform the key and certificate bytes into something the agent can understand publicKey, _, _, _, err := ssh.ParseAuthorizedKey(certificateBytes) if err != nil { return nil, "", "", trace.Wrap(err) } privateKey, err := ssh.ParseRawPrivateKey(privateKeyByte) if err != nil { return nil, "", "", trace.Wrap(err) } agentKey := agent.AddedKey{ PrivateKey: privateKey, Certificate: publicKey.(*ssh.Certificate), Comment: "", LifetimeSecs: 0, ConfirmBeforeUse: false, } // create a (unstarted) agent and add the key to it teleAgent := teleagent.NewServer() teleAgent.Add(agentKey) // start the SSH agent err = teleAgent.ListenUnixSocket(sockPath, uid, gid, 0600) if err != nil { return nil, "", "", trace.Wrap(err) } go teleAgent.Serve() return teleAgent, sockDir, sockPath, nil }
[ "func", "createAgent", "(", "me", "*", "user", ".", "User", ",", "privateKeyByte", "[", "]", "byte", ",", "certificateBytes", "[", "]", "byte", ")", "(", "*", "teleagent", ".", "AgentServer", ",", "string", ",", "string", ",", "error", ")", "{", "// create a path to the unix socket", "sockDir", ",", "err", ":=", "ioutil", ".", "TempDir", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "\"", "\"", ",", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "sockPath", ":=", "filepath", ".", "Join", "(", "sockDir", ",", "\"", "\"", ")", "\n\n", "uid", ",", "err", ":=", "strconv", ".", "Atoi", "(", "me", ".", "Uid", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "\"", "\"", ",", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "gid", ",", "err", ":=", "strconv", ".", "Atoi", "(", "me", ".", "Gid", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "\"", "\"", ",", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// transform the key and certificate bytes into something the agent can understand", "publicKey", ",", "_", ",", "_", ",", "_", ",", "err", ":=", "ssh", ".", "ParseAuthorizedKey", "(", "certificateBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "\"", "\"", ",", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "privateKey", ",", "err", ":=", "ssh", ".", "ParseRawPrivateKey", "(", "privateKeyByte", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "\"", "\"", ",", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "agentKey", ":=", "agent", ".", "AddedKey", "{", "PrivateKey", ":", "privateKey", ",", "Certificate", ":", "publicKey", ".", "(", "*", "ssh", ".", "Certificate", ")", ",", "Comment", ":", "\"", "\"", ",", "LifetimeSecs", ":", "0", ",", "ConfirmBeforeUse", ":", "false", ",", "}", "\n\n", "// create a (unstarted) agent and add the key to it", "teleAgent", ":=", "teleagent", ".", "NewServer", "(", ")", "\n", "teleAgent", ".", "Add", "(", "agentKey", ")", "\n\n", "// start the SSH agent", "err", "=", "teleAgent", ".", "ListenUnixSocket", "(", "sockPath", ",", "uid", ",", "gid", ",", "0600", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "\"", "\"", ",", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "go", "teleAgent", ".", "Serve", "(", ")", "\n\n", "return", "teleAgent", ",", "sockDir", ",", "sockPath", ",", "nil", "\n", "}" ]
// createAgent creates a SSH agent with the passed in private key and // certificate that can be used in tests. This is useful so tests don't // clobber your system agent.
[ "createAgent", "creates", "a", "SSH", "agent", "with", "the", "passed", "in", "private", "key", "and", "certificate", "that", "can", "be", "used", "in", "tests", ".", "This", "is", "useful", "so", "tests", "don", "t", "clobber", "your", "system", "agent", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/integration/helpers.go#L1307-L1353
train
gravitational/teleport
lib/auth/native/native.go
SetClock
func SetClock(clock clockwork.Clock) KeygenOption { return func(k *Keygen) error { k.clock = clock return nil } }
go
func SetClock(clock clockwork.Clock) KeygenOption { return func(k *Keygen) error { k.clock = clock return nil } }
[ "func", "SetClock", "(", "clock", "clockwork", ".", "Clock", ")", "KeygenOption", "{", "return", "func", "(", "k", "*", "Keygen", ")", "error", "{", "k", ".", "clock", "=", "clock", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// SetClock sets the clock to use for key generation.
[ "SetClock", "sets", "the", "clock", "to", "use", "for", "key", "generation", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L70-L75
train
gravitational/teleport
lib/auth/native/native.go
PrecomputeKeys
func PrecomputeKeys(count int) KeygenOption { return func(k *Keygen) error { k.precomputeCount = count return nil } }
go
func PrecomputeKeys(count int) KeygenOption { return func(k *Keygen) error { k.precomputeCount = count return nil } }
[ "func", "PrecomputeKeys", "(", "count", "int", ")", "KeygenOption", "{", "return", "func", "(", "k", "*", "Keygen", ")", "error", "{", "k", ".", "precomputeCount", "=", "count", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// PrecomputeKeys sets up a number of private keys to pre-compute // in background, 0 disables the process
[ "PrecomputeKeys", "sets", "up", "a", "number", "of", "private", "keys", "to", "pre", "-", "compute", "in", "background", "0", "disables", "the", "process" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L79-L84
train
gravitational/teleport
lib/auth/native/native.go
New
func New(ctx context.Context, opts ...KeygenOption) (*Keygen, error) { ctx, cancel := context.WithCancel(ctx) k := &Keygen{ ctx: ctx, cancel: cancel, precomputeCount: PrecomputedNum, clock: clockwork.NewRealClock(), } for _, opt := range opts { if err := opt(k); err != nil { return nil, trace.Wrap(err) } } if k.precomputeCount > 0 { log.Debugf("SSH cert authority is going to pre-compute %v keys.", k.precomputeCount) k.keysCh = make(chan keyPair, k.precomputeCount) go k.precomputeKeys() } else { log.Debugf("SSH cert authority started with no keys pre-compute.") } return k, nil }
go
func New(ctx context.Context, opts ...KeygenOption) (*Keygen, error) { ctx, cancel := context.WithCancel(ctx) k := &Keygen{ ctx: ctx, cancel: cancel, precomputeCount: PrecomputedNum, clock: clockwork.NewRealClock(), } for _, opt := range opts { if err := opt(k); err != nil { return nil, trace.Wrap(err) } } if k.precomputeCount > 0 { log.Debugf("SSH cert authority is going to pre-compute %v keys.", k.precomputeCount) k.keysCh = make(chan keyPair, k.precomputeCount) go k.precomputeKeys() } else { log.Debugf("SSH cert authority started with no keys pre-compute.") } return k, nil }
[ "func", "New", "(", "ctx", "context", ".", "Context", ",", "opts", "...", "KeygenOption", ")", "(", "*", "Keygen", ",", "error", ")", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "k", ":=", "&", "Keygen", "{", "ctx", ":", "ctx", ",", "cancel", ":", "cancel", ",", "precomputeCount", ":", "PrecomputedNum", ",", "clock", ":", "clockwork", ".", "NewRealClock", "(", ")", ",", "}", "\n", "for", "_", ",", "opt", ":=", "range", "opts", "{", "if", "err", ":=", "opt", "(", "k", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n\n", "if", "k", ".", "precomputeCount", ">", "0", "{", "log", ".", "Debugf", "(", "\"", "\"", ",", "k", ".", "precomputeCount", ")", "\n", "k", ".", "keysCh", "=", "make", "(", "chan", "keyPair", ",", "k", ".", "precomputeCount", ")", "\n", "go", "k", ".", "precomputeKeys", "(", ")", "\n", "}", "else", "{", "log", ".", "Debugf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "k", ",", "nil", "\n", "}" ]
// New returns a new key generator.
[ "New", "returns", "a", "new", "key", "generator", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L87-L110
train
gravitational/teleport
lib/auth/native/native.go
GetNewKeyPairFromPool
func (k *Keygen) GetNewKeyPairFromPool() ([]byte, []byte, error) { select { case key := <-k.keysCh: return key.privPem, key.pubBytes, nil default: return GenerateKeyPair("") } }
go
func (k *Keygen) GetNewKeyPairFromPool() ([]byte, []byte, error) { select { case key := <-k.keysCh: return key.privPem, key.pubBytes, nil default: return GenerateKeyPair("") } }
[ "func", "(", "k", "*", "Keygen", ")", "GetNewKeyPairFromPool", "(", ")", "(", "[", "]", "byte", ",", "[", "]", "byte", ",", "error", ")", "{", "select", "{", "case", "key", ":=", "<-", "k", ".", "keysCh", ":", "return", "key", ".", "privPem", ",", "key", ".", "pubBytes", ",", "nil", "\n", "default", ":", "return", "GenerateKeyPair", "(", "\"", "\"", ")", "\n", "}", "\n", "}" ]
// GetNewKeyPairFromPool returns precomputed key pair from the pool.
[ "GetNewKeyPairFromPool", "returns", "precomputed", "key", "pair", "from", "the", "pool", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L118-L125
train
gravitational/teleport
lib/auth/native/native.go
precomputeKeys
func (k *Keygen) precomputeKeys() { for { privPem, pubBytes, err := GenerateKeyPair("") if err != nil { log.Errorf("Unable to generate key pair: %v.", err) continue } key := keyPair{ privPem: privPem, pubBytes: pubBytes, } select { case <-k.ctx.Done(): log.Infof("Stopping key precomputation routine.") return case k.keysCh <- key: continue } } }
go
func (k *Keygen) precomputeKeys() { for { privPem, pubBytes, err := GenerateKeyPair("") if err != nil { log.Errorf("Unable to generate key pair: %v.", err) continue } key := keyPair{ privPem: privPem, pubBytes: pubBytes, } select { case <-k.ctx.Done(): log.Infof("Stopping key precomputation routine.") return case k.keysCh <- key: continue } } }
[ "func", "(", "k", "*", "Keygen", ")", "precomputeKeys", "(", ")", "{", "for", "{", "privPem", ",", "pubBytes", ",", "err", ":=", "GenerateKeyPair", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "continue", "\n", "}", "\n", "key", ":=", "keyPair", "{", "privPem", ":", "privPem", ",", "pubBytes", ":", "pubBytes", ",", "}", "\n\n", "select", "{", "case", "<-", "k", ".", "ctx", ".", "Done", "(", ")", ":", "log", ".", "Infof", "(", "\"", "\"", ")", "\n", "return", "\n", "case", "k", ".", "keysCh", "<-", "key", ":", "continue", "\n", "}", "\n", "}", "\n", "}" ]
// precomputeKeys continues loops forever trying to compute cache key pairs.
[ "precomputeKeys", "continues", "loops", "forever", "trying", "to", "compute", "cache", "key", "pairs", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L128-L148
train
gravitational/teleport
lib/auth/native/native.go
GenerateHostCert
func (k *Keygen) GenerateHostCert(c services.HostCertParams) ([]byte, error) { if err := c.Check(); err != nil { return nil, trace.Wrap(err) } pubKey, _, _, _, err := ssh.ParseAuthorizedKey(c.PublicHostKey) if err != nil { return nil, trace.Wrap(err) } signer, err := ssh.ParsePrivateKey(c.PrivateCASigningKey) if err != nil { return nil, trace.Wrap(err) } // Build a valid list of principals from the HostID and NodeName and then // add in any additional principals passed in. principals := BuildPrincipals(c.HostID, c.NodeName, c.ClusterName, c.Roles) principals = append(principals, c.Principals...) if len(principals) == 0 { return nil, trace.BadParameter("no principals provided: %v, %v, %v", c.HostID, c.NodeName, c.Principals) } principals = utils.Deduplicate(principals) // create certificate validBefore := uint64(ssh.CertTimeInfinity) if c.TTL != 0 { b := k.clock.Now().UTC().Add(c.TTL) validBefore = uint64(b.Unix()) } cert := &ssh.Certificate{ ValidPrincipals: principals, Key: pubKey, ValidAfter: uint64(k.clock.Now().UTC().Add(-1 * time.Minute).Unix()), ValidBefore: validBefore, CertType: ssh.HostCert, } cert.Permissions.Extensions = make(map[string]string) cert.Permissions.Extensions[utils.CertExtensionRole] = c.Roles.String() cert.Permissions.Extensions[utils.CertExtensionAuthority] = string(c.ClusterName) // sign host certificate with private signing key of certificate authority if err := cert.SignCert(rand.Reader, signer); err != nil { return nil, trace.Wrap(err) } log.Debugf("Generated SSH host certificate for role %v with principals: %v.", c.Roles, principals) return ssh.MarshalAuthorizedKey(cert), nil }
go
func (k *Keygen) GenerateHostCert(c services.HostCertParams) ([]byte, error) { if err := c.Check(); err != nil { return nil, trace.Wrap(err) } pubKey, _, _, _, err := ssh.ParseAuthorizedKey(c.PublicHostKey) if err != nil { return nil, trace.Wrap(err) } signer, err := ssh.ParsePrivateKey(c.PrivateCASigningKey) if err != nil { return nil, trace.Wrap(err) } // Build a valid list of principals from the HostID and NodeName and then // add in any additional principals passed in. principals := BuildPrincipals(c.HostID, c.NodeName, c.ClusterName, c.Roles) principals = append(principals, c.Principals...) if len(principals) == 0 { return nil, trace.BadParameter("no principals provided: %v, %v, %v", c.HostID, c.NodeName, c.Principals) } principals = utils.Deduplicate(principals) // create certificate validBefore := uint64(ssh.CertTimeInfinity) if c.TTL != 0 { b := k.clock.Now().UTC().Add(c.TTL) validBefore = uint64(b.Unix()) } cert := &ssh.Certificate{ ValidPrincipals: principals, Key: pubKey, ValidAfter: uint64(k.clock.Now().UTC().Add(-1 * time.Minute).Unix()), ValidBefore: validBefore, CertType: ssh.HostCert, } cert.Permissions.Extensions = make(map[string]string) cert.Permissions.Extensions[utils.CertExtensionRole] = c.Roles.String() cert.Permissions.Extensions[utils.CertExtensionAuthority] = string(c.ClusterName) // sign host certificate with private signing key of certificate authority if err := cert.SignCert(rand.Reader, signer); err != nil { return nil, trace.Wrap(err) } log.Debugf("Generated SSH host certificate for role %v with principals: %v.", c.Roles, principals) return ssh.MarshalAuthorizedKey(cert), nil }
[ "func", "(", "k", "*", "Keygen", ")", "GenerateHostCert", "(", "c", "services", ".", "HostCertParams", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "if", "err", ":=", "c", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "pubKey", ",", "_", ",", "_", ",", "_", ",", "err", ":=", "ssh", ".", "ParseAuthorizedKey", "(", "c", ".", "PublicHostKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "signer", ",", "err", ":=", "ssh", ".", "ParsePrivateKey", "(", "c", ".", "PrivateCASigningKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Build a valid list of principals from the HostID and NodeName and then", "// add in any additional principals passed in.", "principals", ":=", "BuildPrincipals", "(", "c", ".", "HostID", ",", "c", ".", "NodeName", ",", "c", ".", "ClusterName", ",", "c", ".", "Roles", ")", "\n", "principals", "=", "append", "(", "principals", ",", "c", ".", "Principals", "...", ")", "\n", "if", "len", "(", "principals", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ".", "HostID", ",", "c", ".", "NodeName", ",", "c", ".", "Principals", ")", "\n", "}", "\n", "principals", "=", "utils", ".", "Deduplicate", "(", "principals", ")", "\n\n", "// create certificate", "validBefore", ":=", "uint64", "(", "ssh", ".", "CertTimeInfinity", ")", "\n", "if", "c", ".", "TTL", "!=", "0", "{", "b", ":=", "k", ".", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "c", ".", "TTL", ")", "\n", "validBefore", "=", "uint64", "(", "b", ".", "Unix", "(", ")", ")", "\n", "}", "\n", "cert", ":=", "&", "ssh", ".", "Certificate", "{", "ValidPrincipals", ":", "principals", ",", "Key", ":", "pubKey", ",", "ValidAfter", ":", "uint64", "(", "k", ".", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "-", "1", "*", "time", ".", "Minute", ")", ".", "Unix", "(", ")", ")", ",", "ValidBefore", ":", "validBefore", ",", "CertType", ":", "ssh", ".", "HostCert", ",", "}", "\n", "cert", ".", "Permissions", ".", "Extensions", "=", "make", "(", "map", "[", "string", "]", "string", ")", "\n", "cert", ".", "Permissions", ".", "Extensions", "[", "utils", ".", "CertExtensionRole", "]", "=", "c", ".", "Roles", ".", "String", "(", ")", "\n", "cert", ".", "Permissions", ".", "Extensions", "[", "utils", ".", "CertExtensionAuthority", "]", "=", "string", "(", "c", ".", "ClusterName", ")", "\n\n", "// sign host certificate with private signing key of certificate authority", "if", "err", ":=", "cert", ".", "SignCert", "(", "rand", ".", "Reader", ",", "signer", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "c", ".", "Roles", ",", "principals", ")", "\n", "return", "ssh", ".", "MarshalAuthorizedKey", "(", "cert", ")", ",", "nil", "\n", "}" ]
// GenerateHostCert generates a host certificate with the passed in parameters. // The private key of the CA to sign the certificate must be provided.
[ "GenerateHostCert", "generates", "a", "host", "certificate", "with", "the", "passed", "in", "parameters", ".", "The", "private", "key", "of", "the", "CA", "to", "sign", "the", "certificate", "must", "be", "provided", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L181-L231
train
gravitational/teleport
lib/auth/native/native.go
GenerateUserCert
func (k *Keygen) GenerateUserCert(c services.UserCertParams) ([]byte, error) { if c.TTL < defaults.MinCertDuration { return nil, trace.BadParameter("wrong certificate TTL") } if len(c.AllowedLogins) == 0 { return nil, trace.BadParameter("allowedLogins: need allowed OS logins") } pubKey, _, _, _, err := ssh.ParseAuthorizedKey(c.PublicUserKey) if err != nil { return nil, trace.Wrap(err) } validBefore := uint64(ssh.CertTimeInfinity) if c.TTL != 0 { b := k.clock.Now().UTC().Add(c.TTL) validBefore = uint64(b.Unix()) log.Debugf("generated user key for %v with expiry on (%v) %v", c.AllowedLogins, validBefore, b) } cert := &ssh.Certificate{ // we have to use key id to identify teleport user KeyId: c.Username, ValidPrincipals: c.AllowedLogins, Key: pubKey, ValidAfter: uint64(k.clock.Now().UTC().Add(-1 * time.Minute).Unix()), ValidBefore: validBefore, CertType: ssh.UserCert, } cert.Permissions.Extensions = map[string]string{ teleport.CertExtensionPermitPTY: "", teleport.CertExtensionPermitPortForwarding: "", } if c.PermitAgentForwarding { cert.Permissions.Extensions[teleport.CertExtensionPermitAgentForwarding] = "" } if !c.PermitPortForwarding { delete(cert.Permissions.Extensions, teleport.CertExtensionPermitPortForwarding) } if len(c.Roles) != 0 { // only add roles to the certificate extensions if the standard format was // requested. we allow the option to omit this to support older versions of // OpenSSH due to a bug in <= OpenSSH 7.1 // https://bugzilla.mindrot.org/show_bug.cgi?id=2387 if c.CertificateFormat == teleport.CertificateFormatStandard { roles, err := services.MarshalCertRoles(c.Roles) if err != nil { return nil, trace.Wrap(err) } cert.Permissions.Extensions[teleport.CertExtensionTeleportRoles] = roles } } signer, err := ssh.ParsePrivateKey(c.PrivateCASigningKey) if err != nil { return nil, trace.Wrap(err) } if err := cert.SignCert(rand.Reader, signer); err != nil { return nil, trace.Wrap(err) } return ssh.MarshalAuthorizedKey(cert), nil }
go
func (k *Keygen) GenerateUserCert(c services.UserCertParams) ([]byte, error) { if c.TTL < defaults.MinCertDuration { return nil, trace.BadParameter("wrong certificate TTL") } if len(c.AllowedLogins) == 0 { return nil, trace.BadParameter("allowedLogins: need allowed OS logins") } pubKey, _, _, _, err := ssh.ParseAuthorizedKey(c.PublicUserKey) if err != nil { return nil, trace.Wrap(err) } validBefore := uint64(ssh.CertTimeInfinity) if c.TTL != 0 { b := k.clock.Now().UTC().Add(c.TTL) validBefore = uint64(b.Unix()) log.Debugf("generated user key for %v with expiry on (%v) %v", c.AllowedLogins, validBefore, b) } cert := &ssh.Certificate{ // we have to use key id to identify teleport user KeyId: c.Username, ValidPrincipals: c.AllowedLogins, Key: pubKey, ValidAfter: uint64(k.clock.Now().UTC().Add(-1 * time.Minute).Unix()), ValidBefore: validBefore, CertType: ssh.UserCert, } cert.Permissions.Extensions = map[string]string{ teleport.CertExtensionPermitPTY: "", teleport.CertExtensionPermitPortForwarding: "", } if c.PermitAgentForwarding { cert.Permissions.Extensions[teleport.CertExtensionPermitAgentForwarding] = "" } if !c.PermitPortForwarding { delete(cert.Permissions.Extensions, teleport.CertExtensionPermitPortForwarding) } if len(c.Roles) != 0 { // only add roles to the certificate extensions if the standard format was // requested. we allow the option to omit this to support older versions of // OpenSSH due to a bug in <= OpenSSH 7.1 // https://bugzilla.mindrot.org/show_bug.cgi?id=2387 if c.CertificateFormat == teleport.CertificateFormatStandard { roles, err := services.MarshalCertRoles(c.Roles) if err != nil { return nil, trace.Wrap(err) } cert.Permissions.Extensions[teleport.CertExtensionTeleportRoles] = roles } } signer, err := ssh.ParsePrivateKey(c.PrivateCASigningKey) if err != nil { return nil, trace.Wrap(err) } if err := cert.SignCert(rand.Reader, signer); err != nil { return nil, trace.Wrap(err) } return ssh.MarshalAuthorizedKey(cert), nil }
[ "func", "(", "k", "*", "Keygen", ")", "GenerateUserCert", "(", "c", "services", ".", "UserCertParams", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "if", "c", ".", "TTL", "<", "defaults", ".", "MinCertDuration", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "c", ".", "AllowedLogins", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "pubKey", ",", "_", ",", "_", ",", "_", ",", "err", ":=", "ssh", ".", "ParseAuthorizedKey", "(", "c", ".", "PublicUserKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "validBefore", ":=", "uint64", "(", "ssh", ".", "CertTimeInfinity", ")", "\n", "if", "c", ".", "TTL", "!=", "0", "{", "b", ":=", "k", ".", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "c", ".", "TTL", ")", "\n", "validBefore", "=", "uint64", "(", "b", ".", "Unix", "(", ")", ")", "\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "c", ".", "AllowedLogins", ",", "validBefore", ",", "b", ")", "\n", "}", "\n", "cert", ":=", "&", "ssh", ".", "Certificate", "{", "// we have to use key id to identify teleport user", "KeyId", ":", "c", ".", "Username", ",", "ValidPrincipals", ":", "c", ".", "AllowedLogins", ",", "Key", ":", "pubKey", ",", "ValidAfter", ":", "uint64", "(", "k", ".", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "-", "1", "*", "time", ".", "Minute", ")", ".", "Unix", "(", ")", ")", ",", "ValidBefore", ":", "validBefore", ",", "CertType", ":", "ssh", ".", "UserCert", ",", "}", "\n", "cert", ".", "Permissions", ".", "Extensions", "=", "map", "[", "string", "]", "string", "{", "teleport", ".", "CertExtensionPermitPTY", ":", "\"", "\"", ",", "teleport", ".", "CertExtensionPermitPortForwarding", ":", "\"", "\"", ",", "}", "\n", "if", "c", ".", "PermitAgentForwarding", "{", "cert", ".", "Permissions", ".", "Extensions", "[", "teleport", ".", "CertExtensionPermitAgentForwarding", "]", "=", "\"", "\"", "\n", "}", "\n", "if", "!", "c", ".", "PermitPortForwarding", "{", "delete", "(", "cert", ".", "Permissions", ".", "Extensions", ",", "teleport", ".", "CertExtensionPermitPortForwarding", ")", "\n", "}", "\n", "if", "len", "(", "c", ".", "Roles", ")", "!=", "0", "{", "// only add roles to the certificate extensions if the standard format was", "// requested. we allow the option to omit this to support older versions of", "// OpenSSH due to a bug in <= OpenSSH 7.1", "// https://bugzilla.mindrot.org/show_bug.cgi?id=2387", "if", "c", ".", "CertificateFormat", "==", "teleport", ".", "CertificateFormatStandard", "{", "roles", ",", "err", ":=", "services", ".", "MarshalCertRoles", "(", "c", ".", "Roles", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "cert", ".", "Permissions", ".", "Extensions", "[", "teleport", ".", "CertExtensionTeleportRoles", "]", "=", "roles", "\n", "}", "\n", "}", "\n", "signer", ",", "err", ":=", "ssh", ".", "ParsePrivateKey", "(", "c", ".", "PrivateCASigningKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "cert", ".", "SignCert", "(", "rand", ".", "Reader", ",", "signer", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ssh", ".", "MarshalAuthorizedKey", "(", "cert", ")", ",", "nil", "\n", "}" ]
// GenerateUserCert generates a host certificate with the passed in parameters. // The private key of the CA to sign the certificate must be provided.
[ "GenerateUserCert", "generates", "a", "host", "certificate", "with", "the", "passed", "in", "parameters", ".", "The", "private", "key", "of", "the", "CA", "to", "sign", "the", "certificate", "must", "be", "provided", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/native/native.go#L235-L292
train
gravitational/teleport
lib/events/s3sessions/s3handler.go
NewHandler
func NewHandler(cfg Config) (*Handler, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } h := &Handler{ Entry: log.WithFields(log.Fields{ trace.Component: teleport.Component(teleport.SchemeS3), }), Config: cfg, uploader: s3manager.NewUploader(cfg.Session), downloader: s3manager.NewDownloader(cfg.Session), client: s3.New(cfg.Session), } start := time.Now() h.Infof("Setting up bucket %q, sessions path %q in region %q.", h.Bucket, h.Path, h.Region) if err := h.ensureBucket(); err != nil { return nil, trace.Wrap(err) } h.WithFields(log.Fields{"duration": time.Now().Sub(start)}).Infof("Setup bucket %q completed.", h.Bucket) return h, nil }
go
func NewHandler(cfg Config) (*Handler, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } h := &Handler{ Entry: log.WithFields(log.Fields{ trace.Component: teleport.Component(teleport.SchemeS3), }), Config: cfg, uploader: s3manager.NewUploader(cfg.Session), downloader: s3manager.NewDownloader(cfg.Session), client: s3.New(cfg.Session), } start := time.Now() h.Infof("Setting up bucket %q, sessions path %q in region %q.", h.Bucket, h.Path, h.Region) if err := h.ensureBucket(); err != nil { return nil, trace.Wrap(err) } h.WithFields(log.Fields{"duration": time.Now().Sub(start)}).Infof("Setup bucket %q completed.", h.Bucket) return h, nil }
[ "func", "NewHandler", "(", "cfg", "Config", ")", "(", "*", "Handler", ",", "error", ")", "{", "if", "err", ":=", "cfg", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "h", ":=", "&", "Handler", "{", "Entry", ":", "log", ".", "WithFields", "(", "log", ".", "Fields", "{", "trace", ".", "Component", ":", "teleport", ".", "Component", "(", "teleport", ".", "SchemeS3", ")", ",", "}", ")", ",", "Config", ":", "cfg", ",", "uploader", ":", "s3manager", ".", "NewUploader", "(", "cfg", ".", "Session", ")", ",", "downloader", ":", "s3manager", ".", "NewDownloader", "(", "cfg", ".", "Session", ")", ",", "client", ":", "s3", ".", "New", "(", "cfg", ".", "Session", ")", ",", "}", "\n", "start", ":=", "time", ".", "Now", "(", ")", "\n", "h", ".", "Infof", "(", "\"", "\"", ",", "h", ".", "Bucket", ",", "h", ".", "Path", ",", "h", ".", "Region", ")", "\n", "if", "err", ":=", "h", ".", "ensureBucket", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "h", ".", "WithFields", "(", "log", ".", "Fields", "{", "\"", "\"", ":", "time", ".", "Now", "(", ")", ".", "Sub", "(", "start", ")", "}", ")", ".", "Infof", "(", "\"", "\"", ",", "h", ".", "Bucket", ")", "\n", "return", "h", ",", "nil", "\n", "}" ]
// NewHandler returns new S3 uploader
[ "NewHandler", "returns", "new", "S3", "uploader" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/s3sessions/s3handler.go#L76-L97
train
gravitational/teleport
lib/events/s3sessions/s3handler.go
Upload
func (l *Handler) Upload(ctx context.Context, sessionID session.ID, reader io.Reader) (string, error) { path := l.path(sessionID) _, err := l.uploader.UploadWithContext(ctx, &s3manager.UploadInput{ Bucket: aws.String(l.Bucket), Key: aws.String(path), Body: reader, ServerSideEncryption: aws.String(s3.ServerSideEncryptionAwsKms), }) if err != nil { return "", ConvertS3Error(err) } return fmt.Sprintf("%v://%v/%v", teleport.SchemeS3, l.Bucket, path), nil }
go
func (l *Handler) Upload(ctx context.Context, sessionID session.ID, reader io.Reader) (string, error) { path := l.path(sessionID) _, err := l.uploader.UploadWithContext(ctx, &s3manager.UploadInput{ Bucket: aws.String(l.Bucket), Key: aws.String(path), Body: reader, ServerSideEncryption: aws.String(s3.ServerSideEncryptionAwsKms), }) if err != nil { return "", ConvertS3Error(err) } return fmt.Sprintf("%v://%v/%v", teleport.SchemeS3, l.Bucket, path), nil }
[ "func", "(", "l", "*", "Handler", ")", "Upload", "(", "ctx", "context", ".", "Context", ",", "sessionID", "session", ".", "ID", ",", "reader", "io", ".", "Reader", ")", "(", "string", ",", "error", ")", "{", "path", ":=", "l", ".", "path", "(", "sessionID", ")", "\n", "_", ",", "err", ":=", "l", ".", "uploader", ".", "UploadWithContext", "(", "ctx", ",", "&", "s3manager", ".", "UploadInput", "{", "Bucket", ":", "aws", ".", "String", "(", "l", ".", "Bucket", ")", ",", "Key", ":", "aws", ".", "String", "(", "path", ")", ",", "Body", ":", "reader", ",", "ServerSideEncryption", ":", "aws", ".", "String", "(", "s3", ".", "ServerSideEncryptionAwsKms", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "ConvertS3Error", "(", "err", ")", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "teleport", ".", "SchemeS3", ",", "l", ".", "Bucket", ",", "path", ")", ",", "nil", "\n", "}" ]
// Upload uploads object to S3 bucket, reads the contents of the object from reader // and returns the target S3 bucket path in case of successful upload.
[ "Upload", "uploads", "object", "to", "S3", "bucket", "reads", "the", "contents", "of", "the", "object", "from", "reader", "and", "returns", "the", "target", "S3", "bucket", "path", "in", "case", "of", "successful", "upload", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/s3sessions/s3handler.go#L117-L129
train
gravitational/teleport
lib/events/s3sessions/s3handler.go
Download
func (l *Handler) Download(ctx context.Context, sessionID session.ID, writer io.WriterAt) error { written, err := l.downloader.DownloadWithContext(ctx, writer, &s3.GetObjectInput{ Bucket: aws.String(l.Bucket), Key: aws.String(l.path(sessionID)), }) if err != nil { return ConvertS3Error(err) } if written == 0 { return trace.NotFound("recording for %v is not found", sessionID) } return nil }
go
func (l *Handler) Download(ctx context.Context, sessionID session.ID, writer io.WriterAt) error { written, err := l.downloader.DownloadWithContext(ctx, writer, &s3.GetObjectInput{ Bucket: aws.String(l.Bucket), Key: aws.String(l.path(sessionID)), }) if err != nil { return ConvertS3Error(err) } if written == 0 { return trace.NotFound("recording for %v is not found", sessionID) } return nil }
[ "func", "(", "l", "*", "Handler", ")", "Download", "(", "ctx", "context", ".", "Context", ",", "sessionID", "session", ".", "ID", ",", "writer", "io", ".", "WriterAt", ")", "error", "{", "written", ",", "err", ":=", "l", ".", "downloader", ".", "DownloadWithContext", "(", "ctx", ",", "writer", ",", "&", "s3", ".", "GetObjectInput", "{", "Bucket", ":", "aws", ".", "String", "(", "l", ".", "Bucket", ")", ",", "Key", ":", "aws", ".", "String", "(", "l", ".", "path", "(", "sessionID", ")", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ConvertS3Error", "(", "err", ")", "\n", "}", "\n", "if", "written", "==", "0", "{", "return", "trace", ".", "NotFound", "(", "\"", "\"", ",", "sessionID", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Download downloads recorded session from S3 bucket and writes the results into writer // return trace.NotFound error is object is not found
[ "Download", "downloads", "recorded", "session", "from", "S3", "bucket", "and", "writes", "the", "results", "into", "writer", "return", "trace", ".", "NotFound", "error", "is", "object", "is", "not", "found" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/s3sessions/s3handler.go#L133-L145
train
gravitational/teleport
lib/events/s3sessions/s3handler.go
deleteBucket
func (h *Handler) deleteBucket() error { // first, list and delete all the objects in the bucket out, err := h.client.ListObjectVersions(&s3.ListObjectVersionsInput{ Bucket: aws.String(h.Bucket), }) if err != nil { return ConvertS3Error(err) } for _, ver := range out.Versions { _, err := h.client.DeleteObject(&s3.DeleteObjectInput{ Bucket: aws.String(h.Bucket), Key: ver.Key, VersionId: ver.VersionId, }) if err != nil { return ConvertS3Error(err) } } _, err = h.client.DeleteBucket(&s3.DeleteBucketInput{ Bucket: aws.String(h.Bucket), }) return ConvertS3Error(err) }
go
func (h *Handler) deleteBucket() error { // first, list and delete all the objects in the bucket out, err := h.client.ListObjectVersions(&s3.ListObjectVersionsInput{ Bucket: aws.String(h.Bucket), }) if err != nil { return ConvertS3Error(err) } for _, ver := range out.Versions { _, err := h.client.DeleteObject(&s3.DeleteObjectInput{ Bucket: aws.String(h.Bucket), Key: ver.Key, VersionId: ver.VersionId, }) if err != nil { return ConvertS3Error(err) } } _, err = h.client.DeleteBucket(&s3.DeleteBucketInput{ Bucket: aws.String(h.Bucket), }) return ConvertS3Error(err) }
[ "func", "(", "h", "*", "Handler", ")", "deleteBucket", "(", ")", "error", "{", "// first, list and delete all the objects in the bucket", "out", ",", "err", ":=", "h", ".", "client", ".", "ListObjectVersions", "(", "&", "s3", ".", "ListObjectVersionsInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ConvertS3Error", "(", "err", ")", "\n", "}", "\n", "for", "_", ",", "ver", ":=", "range", "out", ".", "Versions", "{", "_", ",", "err", ":=", "h", ".", "client", ".", "DeleteObject", "(", "&", "s3", ".", "DeleteObjectInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "Key", ":", "ver", ".", "Key", ",", "VersionId", ":", "ver", ".", "VersionId", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "ConvertS3Error", "(", "err", ")", "\n", "}", "\n", "}", "\n", "_", ",", "err", "=", "h", ".", "client", ".", "DeleteBucket", "(", "&", "s3", ".", "DeleteBucketInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "}", ")", "\n", "return", "ConvertS3Error", "(", "err", ")", "\n", "}" ]
// delete bucket deletes bucket and all it's contents and is used in tests
[ "delete", "bucket", "deletes", "bucket", "and", "all", "it", "s", "contents", "and", "is", "used", "in", "tests" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/s3sessions/s3handler.go#L148-L170
train
gravitational/teleport
lib/events/s3sessions/s3handler.go
ensureBucket
func (h *Handler) ensureBucket() error { _, err := h.client.HeadBucket(&s3.HeadBucketInput{ Bucket: aws.String(h.Bucket), }) err = ConvertS3Error(err) // assumes that bucket is administered by other entity if err == nil { return nil } if !trace.IsNotFound(err) { return trace.Wrap(err) } input := &s3.CreateBucketInput{ Bucket: aws.String(h.Bucket), ACL: aws.String("private"), } _, err = h.client.CreateBucket(input) err = ConvertS3Error(err, "bucket %v already exists", aws.String(h.Bucket)) if err != nil { if !trace.IsAlreadyExists(err) { return trace.Wrap(err) } // if this client has not created the bucket, don't reconfigure it return nil } // turn on versioning ver := &s3.PutBucketVersioningInput{ Bucket: aws.String(h.Bucket), VersioningConfiguration: &s3.VersioningConfiguration{ Status: aws.String("Enabled"), }, } _, err = h.client.PutBucketVersioning(ver) err = ConvertS3Error(err, "failed to set versioning state for bucket %q", h.Bucket) if err != nil { return trace.Wrap(err) } _, err = h.client.PutBucketEncryption(&s3.PutBucketEncryptionInput{ Bucket: aws.String(h.Bucket), ServerSideEncryptionConfiguration: &s3.ServerSideEncryptionConfiguration{ Rules: []*s3.ServerSideEncryptionRule{&s3.ServerSideEncryptionRule{ ApplyServerSideEncryptionByDefault: &s3.ServerSideEncryptionByDefault{ SSEAlgorithm: aws.String(s3.ServerSideEncryptionAwsKms), }, }}, }, }) err = ConvertS3Error(err, "failed to set versioning state for bucket %q", h.Bucket) if err != nil { return trace.Wrap(err) } return nil }
go
func (h *Handler) ensureBucket() error { _, err := h.client.HeadBucket(&s3.HeadBucketInput{ Bucket: aws.String(h.Bucket), }) err = ConvertS3Error(err) // assumes that bucket is administered by other entity if err == nil { return nil } if !trace.IsNotFound(err) { return trace.Wrap(err) } input := &s3.CreateBucketInput{ Bucket: aws.String(h.Bucket), ACL: aws.String("private"), } _, err = h.client.CreateBucket(input) err = ConvertS3Error(err, "bucket %v already exists", aws.String(h.Bucket)) if err != nil { if !trace.IsAlreadyExists(err) { return trace.Wrap(err) } // if this client has not created the bucket, don't reconfigure it return nil } // turn on versioning ver := &s3.PutBucketVersioningInput{ Bucket: aws.String(h.Bucket), VersioningConfiguration: &s3.VersioningConfiguration{ Status: aws.String("Enabled"), }, } _, err = h.client.PutBucketVersioning(ver) err = ConvertS3Error(err, "failed to set versioning state for bucket %q", h.Bucket) if err != nil { return trace.Wrap(err) } _, err = h.client.PutBucketEncryption(&s3.PutBucketEncryptionInput{ Bucket: aws.String(h.Bucket), ServerSideEncryptionConfiguration: &s3.ServerSideEncryptionConfiguration{ Rules: []*s3.ServerSideEncryptionRule{&s3.ServerSideEncryptionRule{ ApplyServerSideEncryptionByDefault: &s3.ServerSideEncryptionByDefault{ SSEAlgorithm: aws.String(s3.ServerSideEncryptionAwsKms), }, }}, }, }) err = ConvertS3Error(err, "failed to set versioning state for bucket %q", h.Bucket) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "h", "*", "Handler", ")", "ensureBucket", "(", ")", "error", "{", "_", ",", "err", ":=", "h", ".", "client", ".", "HeadBucket", "(", "&", "s3", ".", "HeadBucketInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "}", ")", "\n", "err", "=", "ConvertS3Error", "(", "err", ")", "\n", "// assumes that bucket is administered by other entity", "if", "err", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "input", ":=", "&", "s3", ".", "CreateBucketInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "ACL", ":", "aws", ".", "String", "(", "\"", "\"", ")", ",", "}", "\n", "_", ",", "err", "=", "h", ".", "client", ".", "CreateBucket", "(", "input", ")", "\n", "err", "=", "ConvertS3Error", "(", "err", ",", "\"", "\"", ",", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "!", "trace", ".", "IsAlreadyExists", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// if this client has not created the bucket, don't reconfigure it", "return", "nil", "\n", "}", "\n", "// turn on versioning", "ver", ":=", "&", "s3", ".", "PutBucketVersioningInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "VersioningConfiguration", ":", "&", "s3", ".", "VersioningConfiguration", "{", "Status", ":", "aws", ".", "String", "(", "\"", "\"", ")", ",", "}", ",", "}", "\n", "_", ",", "err", "=", "h", ".", "client", ".", "PutBucketVersioning", "(", "ver", ")", "\n", "err", "=", "ConvertS3Error", "(", "err", ",", "\"", "\"", ",", "h", ".", "Bucket", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "_", ",", "err", "=", "h", ".", "client", ".", "PutBucketEncryption", "(", "&", "s3", ".", "PutBucketEncryptionInput", "{", "Bucket", ":", "aws", ".", "String", "(", "h", ".", "Bucket", ")", ",", "ServerSideEncryptionConfiguration", ":", "&", "s3", ".", "ServerSideEncryptionConfiguration", "{", "Rules", ":", "[", "]", "*", "s3", ".", "ServerSideEncryptionRule", "{", "&", "s3", ".", "ServerSideEncryptionRule", "{", "ApplyServerSideEncryptionByDefault", ":", "&", "s3", ".", "ServerSideEncryptionByDefault", "{", "SSEAlgorithm", ":", "aws", ".", "String", "(", "s3", ".", "ServerSideEncryptionAwsKms", ")", ",", "}", ",", "}", "}", ",", "}", ",", "}", ")", "\n", "err", "=", "ConvertS3Error", "(", "err", ",", "\"", "\"", ",", "h", ".", "Bucket", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// ensureBucket makes sure bucket exists, and if it does not, creates it
[ "ensureBucket", "makes", "sure", "bucket", "exists", "and", "if", "it", "does", "not", "creates", "it" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/s3sessions/s3handler.go#L180-L233
train
gravitational/teleport
lib/events/s3sessions/s3handler.go
ConvertS3Error
func ConvertS3Error(err error, args ...interface{}) error { if err == nil { return nil } if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case s3.ErrCodeNoSuchKey, s3.ErrCodeNoSuchBucket, s3.ErrCodeNoSuchUpload, "NotFound": return trace.NotFound(aerr.Error(), args...) case s3.ErrCodeBucketAlreadyExists, s3.ErrCodeBucketAlreadyOwnedByYou: return trace.AlreadyExists(aerr.Error(), args...) default: return trace.BadParameter(aerr.Error(), args...) } } return err }
go
func ConvertS3Error(err error, args ...interface{}) error { if err == nil { return nil } if aerr, ok := err.(awserr.Error); ok { switch aerr.Code() { case s3.ErrCodeNoSuchKey, s3.ErrCodeNoSuchBucket, s3.ErrCodeNoSuchUpload, "NotFound": return trace.NotFound(aerr.Error(), args...) case s3.ErrCodeBucketAlreadyExists, s3.ErrCodeBucketAlreadyOwnedByYou: return trace.AlreadyExists(aerr.Error(), args...) default: return trace.BadParameter(aerr.Error(), args...) } } return err }
[ "func", "ConvertS3Error", "(", "err", "error", ",", "args", "...", "interface", "{", "}", ")", "error", "{", "if", "err", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "if", "aerr", ",", "ok", ":=", "err", ".", "(", "awserr", ".", "Error", ")", ";", "ok", "{", "switch", "aerr", ".", "Code", "(", ")", "{", "case", "s3", ".", "ErrCodeNoSuchKey", ",", "s3", ".", "ErrCodeNoSuchBucket", ",", "s3", ".", "ErrCodeNoSuchUpload", ",", "\"", "\"", ":", "return", "trace", ".", "NotFound", "(", "aerr", ".", "Error", "(", ")", ",", "args", "...", ")", "\n", "case", "s3", ".", "ErrCodeBucketAlreadyExists", ",", "s3", ".", "ErrCodeBucketAlreadyOwnedByYou", ":", "return", "trace", ".", "AlreadyExists", "(", "aerr", ".", "Error", "(", ")", ",", "args", "...", ")", "\n", "default", ":", "return", "trace", ".", "BadParameter", "(", "aerr", ".", "Error", "(", ")", ",", "args", "...", ")", "\n", "}", "\n", "}", "\n", "return", "err", "\n", "}" ]
// ConvertS3Error wraps S3 error and returns trace equivalent
[ "ConvertS3Error", "wraps", "S3", "error", "and", "returns", "trace", "equivalent" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/s3sessions/s3handler.go#L236-L251
train
gravitational/teleport
roles.go
NewRoles
func NewRoles(in []string) (Roles, error) { var roles Roles for _, val := range in { role := Role(val) if err := role.Check(); err != nil { return nil, trace.Wrap(err) } roles = append(roles, role) } return roles, nil }
go
func NewRoles(in []string) (Roles, error) { var roles Roles for _, val := range in { role := Role(val) if err := role.Check(); err != nil { return nil, trace.Wrap(err) } roles = append(roles, role) } return roles, nil }
[ "func", "NewRoles", "(", "in", "[", "]", "string", ")", "(", "Roles", ",", "error", ")", "{", "var", "roles", "Roles", "\n", "for", "_", ",", "val", ":=", "range", "in", "{", "role", ":=", "Role", "(", "val", ")", "\n", "if", "err", ":=", "role", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "roles", "=", "append", "(", "roles", ",", "role", ")", "\n", "}", "\n", "return", "roles", ",", "nil", "\n", "}" ]
// NewRoles return a list of roles from slice of strings
[ "NewRoles", "return", "a", "list", "of", "roles", "from", "slice", "of", "strings" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L61-L71
train
gravitational/teleport
roles.go
ParseRoles
func ParseRoles(str string) (roles Roles, err error) { for _, s := range strings.Split(str, ",") { r := Role(strings.Title(strings.ToLower(strings.TrimSpace(s)))) if err = r.Check(); err != nil { return nil, trace.Wrap(err) } roles = append(roles, r) } return roles, nil }
go
func ParseRoles(str string) (roles Roles, err error) { for _, s := range strings.Split(str, ",") { r := Role(strings.Title(strings.ToLower(strings.TrimSpace(s)))) if err = r.Check(); err != nil { return nil, trace.Wrap(err) } roles = append(roles, r) } return roles, nil }
[ "func", "ParseRoles", "(", "str", "string", ")", "(", "roles", "Roles", ",", "err", "error", ")", "{", "for", "_", ",", "s", ":=", "range", "strings", ".", "Split", "(", "str", ",", "\"", "\"", ")", "{", "r", ":=", "Role", "(", "strings", ".", "Title", "(", "strings", ".", "ToLower", "(", "strings", ".", "TrimSpace", "(", "s", ")", ")", ")", ")", "\n", "if", "err", "=", "r", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "roles", "=", "append", "(", "roles", ",", "r", ")", "\n", "}", "\n", "return", "roles", ",", "nil", "\n", "}" ]
// ParseRoles takes a comma-separated list of roles and returns a slice // of roles, or an error if parsing failed
[ "ParseRoles", "takes", "a", "comma", "-", "separated", "list", "of", "roles", "and", "returns", "a", "slice", "of", "roles", "or", "an", "error", "if", "parsing", "failed" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L75-L84
train
gravitational/teleport
roles.go
Include
func (roles Roles) Include(role Role) bool { for _, r := range roles { if r == role { return true } } return false }
go
func (roles Roles) Include(role Role) bool { for _, r := range roles { if r == role { return true } } return false }
[ "func", "(", "roles", "Roles", ")", "Include", "(", "role", "Role", ")", "bool", "{", "for", "_", ",", "r", ":=", "range", "roles", "{", "if", "r", "==", "role", "{", "return", "true", "\n", "}", "\n", "}", "\n", "return", "false", "\n", "}" ]
// Includes returns 'true' if a given list of roles includes a given role
[ "Includes", "returns", "true", "if", "a", "given", "list", "of", "roles", "includes", "a", "given", "role" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L87-L94
train
gravitational/teleport
roles.go
StringSlice
func (roles Roles) StringSlice() []string { s := make([]string, 0) for _, r := range roles { s = append(s, r.String()) } return s }
go
func (roles Roles) StringSlice() []string { s := make([]string, 0) for _, r := range roles { s = append(s, r.String()) } return s }
[ "func", "(", "roles", "Roles", ")", "StringSlice", "(", ")", "[", "]", "string", "{", "s", ":=", "make", "(", "[", "]", "string", ",", "0", ")", "\n", "for", "_", ",", "r", ":=", "range", "roles", "{", "s", "=", "append", "(", "s", ",", "r", ".", "String", "(", ")", ")", "\n", "}", "\n", "return", "s", "\n", "}" ]
// Slice returns roles as string slice
[ "Slice", "returns", "roles", "as", "string", "slice" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L97-L103
train
gravitational/teleport
roles.go
Equals
func (roles Roles) Equals(other Roles) bool { if len(roles) != len(other) { return false } for _, r := range roles { if !other.Include(r) { return false } } return true }
go
func (roles Roles) Equals(other Roles) bool { if len(roles) != len(other) { return false } for _, r := range roles { if !other.Include(r) { return false } } return true }
[ "func", "(", "roles", "Roles", ")", "Equals", "(", "other", "Roles", ")", "bool", "{", "if", "len", "(", "roles", ")", "!=", "len", "(", "other", ")", "{", "return", "false", "\n", "}", "\n", "for", "_", ",", "r", ":=", "range", "roles", "{", "if", "!", "other", ".", "Include", "(", "r", ")", "{", "return", "false", "\n", "}", "\n", "}", "\n", "return", "true", "\n", "}" ]
// Equals compares two sets of roles
[ "Equals", "compares", "two", "sets", "of", "roles" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L106-L116
train
gravitational/teleport
roles.go
Set
func (r *Role) Set(v string) error { val := Role(strings.Title(v)) if err := val.Check(); err != nil { return trace.Wrap(err) } *r = val return nil }
go
func (r *Role) Set(v string) error { val := Role(strings.Title(v)) if err := val.Check(); err != nil { return trace.Wrap(err) } *r = val return nil }
[ "func", "(", "r", "*", "Role", ")", "Set", "(", "v", "string", ")", "error", "{", "val", ":=", "Role", "(", "strings", ".", "Title", "(", "v", ")", ")", "\n", "if", "err", ":=", "val", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "*", "r", "=", "val", "\n", "return", "nil", "\n", "}" ]
// Set sets the value of the role from string, used to integrate with CLI tools
[ "Set", "sets", "the", "value", "of", "the", "role", "from", "string", "used", "to", "integrate", "with", "CLI", "tools" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L134-L141
train
gravitational/teleport
roles.go
String
func (r *Role) String() string { switch string(*r) { case string(RoleSignup): return "User signup" case string(RoleTrustedCluster), string(LegacyClusterTokenType): return "trusted_cluster" default: return fmt.Sprintf("%v", string(*r)) } }
go
func (r *Role) String() string { switch string(*r) { case string(RoleSignup): return "User signup" case string(RoleTrustedCluster), string(LegacyClusterTokenType): return "trusted_cluster" default: return fmt.Sprintf("%v", string(*r)) } }
[ "func", "(", "r", "*", "Role", ")", "String", "(", ")", "string", "{", "switch", "string", "(", "*", "r", ")", "{", "case", "string", "(", "RoleSignup", ")", ":", "return", "\"", "\"", "\n", "case", "string", "(", "RoleTrustedCluster", ")", ",", "string", "(", "LegacyClusterTokenType", ")", ":", "return", "\"", "\"", "\n", "default", ":", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "string", "(", "*", "r", ")", ")", "\n", "}", "\n", "}" ]
// String returns debug-friendly representation of this role.
[ "String", "returns", "debug", "-", "friendly", "representation", "of", "this", "role", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L144-L153
train
gravitational/teleport
roles.go
Check
func (r *Role) Check() error { switch *r { case RoleAuth, RoleWeb, RoleNode, RoleAdmin, RoleProvisionToken, RoleTrustedCluster, LegacyClusterTokenType, RoleSignup, RoleProxy, RoleNop: return nil } return trace.BadParameter("role %v is not registered", *r) }
go
func (r *Role) Check() error { switch *r { case RoleAuth, RoleWeb, RoleNode, RoleAdmin, RoleProvisionToken, RoleTrustedCluster, LegacyClusterTokenType, RoleSignup, RoleProxy, RoleNop: return nil } return trace.BadParameter("role %v is not registered", *r) }
[ "func", "(", "r", "*", "Role", ")", "Check", "(", ")", "error", "{", "switch", "*", "r", "{", "case", "RoleAuth", ",", "RoleWeb", ",", "RoleNode", ",", "RoleAdmin", ",", "RoleProvisionToken", ",", "RoleTrustedCluster", ",", "LegacyClusterTokenType", ",", "RoleSignup", ",", "RoleProxy", ",", "RoleNop", ":", "return", "nil", "\n", "}", "\n", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "*", "r", ")", "\n", "}" ]
// Check checks if this a a valid role value, returns nil // if it's ok, false otherwise
[ "Check", "checks", "if", "this", "a", "a", "valid", "role", "value", "returns", "nil", "if", "it", "s", "ok", "false", "otherwise" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/roles.go#L157-L166
train
gravitational/teleport
lib/backend/lite/lite.go
CheckAndSetDefaults
func (cfg *Config) CheckAndSetDefaults() error { if cfg.Path == "" && !cfg.Memory { return trace.BadParameter("specify directory path to the database using 'path' parameter") } if cfg.BufferSize == 0 { cfg.BufferSize = backend.DefaultBufferSize } if cfg.PollStreamPeriod == 0 { cfg.PollStreamPeriod = backend.DefaultPollStreamPeriod } if cfg.Clock == nil { cfg.Clock = clockwork.NewRealClock() } if cfg.Sync == "" { cfg.Sync = syncOFF } if cfg.BusyTimeout == 0 { cfg.BusyTimeout = busyTimeout } if cfg.MemoryName == "" { cfg.MemoryName = defaultDBFile } return nil }
go
func (cfg *Config) CheckAndSetDefaults() error { if cfg.Path == "" && !cfg.Memory { return trace.BadParameter("specify directory path to the database using 'path' parameter") } if cfg.BufferSize == 0 { cfg.BufferSize = backend.DefaultBufferSize } if cfg.PollStreamPeriod == 0 { cfg.PollStreamPeriod = backend.DefaultPollStreamPeriod } if cfg.Clock == nil { cfg.Clock = clockwork.NewRealClock() } if cfg.Sync == "" { cfg.Sync = syncOFF } if cfg.BusyTimeout == 0 { cfg.BusyTimeout = busyTimeout } if cfg.MemoryName == "" { cfg.MemoryName = defaultDBFile } return nil }
[ "func", "(", "cfg", "*", "Config", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "cfg", ".", "Path", "==", "\"", "\"", "&&", "!", "cfg", ".", "Memory", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "cfg", ".", "BufferSize", "==", "0", "{", "cfg", ".", "BufferSize", "=", "backend", ".", "DefaultBufferSize", "\n", "}", "\n", "if", "cfg", ".", "PollStreamPeriod", "==", "0", "{", "cfg", ".", "PollStreamPeriod", "=", "backend", ".", "DefaultPollStreamPeriod", "\n", "}", "\n", "if", "cfg", ".", "Clock", "==", "nil", "{", "cfg", ".", "Clock", "=", "clockwork", ".", "NewRealClock", "(", ")", "\n", "}", "\n", "if", "cfg", ".", "Sync", "==", "\"", "\"", "{", "cfg", ".", "Sync", "=", "syncOFF", "\n", "}", "\n", "if", "cfg", ".", "BusyTimeout", "==", "0", "{", "cfg", ".", "BusyTimeout", "=", "busyTimeout", "\n", "}", "\n", "if", "cfg", ".", "MemoryName", "==", "\"", "\"", "{", "cfg", ".", "MemoryName", "=", "defaultDBFile", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults is a helper returns an error if the supplied configuration // is not enough to connect to sqlite
[ "CheckAndSetDefaults", "is", "a", "helper", "returns", "an", "error", "if", "the", "supplied", "configuration", "is", "not", "enough", "to", "connect", "to", "sqlite" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L94-L117
train
gravitational/teleport
lib/backend/lite/lite.go
New
func New(ctx context.Context, params backend.Params) (*LiteBackend, error) { var cfg *Config err := utils.ObjectToStruct(params, &cfg) if err != nil { return nil, trace.BadParameter("SQLite configuration is invalid: %v", err) } return NewWithConfig(ctx, *cfg) }
go
func New(ctx context.Context, params backend.Params) (*LiteBackend, error) { var cfg *Config err := utils.ObjectToStruct(params, &cfg) if err != nil { return nil, trace.BadParameter("SQLite configuration is invalid: %v", err) } return NewWithConfig(ctx, *cfg) }
[ "func", "New", "(", "ctx", "context", ".", "Context", ",", "params", "backend", ".", "Params", ")", "(", "*", "LiteBackend", ",", "error", ")", "{", "var", "cfg", "*", "Config", "\n", "err", ":=", "utils", ".", "ObjectToStruct", "(", "params", ",", "&", "cfg", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "return", "NewWithConfig", "(", "ctx", ",", "*", "cfg", ")", "\n", "}" ]
// New returns a new instance of sqlite backend
[ "New", "returns", "a", "new", "instance", "of", "sqlite", "backend" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L120-L127
train
gravitational/teleport
lib/backend/lite/lite.go
NewWithConfig
func NewWithConfig(ctx context.Context, cfg Config) (*LiteBackend, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } var connectorURL string if !cfg.Memory { // Ensure that the path to the root directory exists. err := os.MkdirAll(cfg.Path, defaultDirMode) if err != nil { return nil, trace.ConvertSystemError(err) } fullPath := filepath.Join(cfg.Path, defaultDBFile) connectorURL = fmt.Sprintf("file:%v?_busy_timeout=%v&_sync=%v", fullPath, cfg.BusyTimeout, cfg.Sync) } else { connectorURL = fmt.Sprintf("file:%v?mode=memory", cfg.MemoryName) } db, err := sql.Open(BackendName, connectorURL) if err != nil { return nil, trace.Wrap(err, "error opening URI: %v", connectorURL) } // serialize access to sqlite to avoid database is locked errors db.SetMaxOpenConns(1) buf, err := backend.NewCircularBuffer(ctx, cfg.BufferSize) if err != nil { return nil, trace.Wrap(err) } closeCtx, cancel := context.WithCancel(ctx) watchStarted, signalWatchStart := context.WithCancel(ctx) l := &LiteBackend{ Config: cfg, db: db, Entry: log.WithFields(log.Fields{trace.Component: BackendName}), clock: cfg.Clock, buf: buf, ctx: closeCtx, cancel: cancel, watchStarted: watchStarted, signalWatchStart: signalWatchStart, } l.Debugf("Connected to: %v, poll stream period: %v", connectorURL, cfg.PollStreamPeriod) if err := l.createSchema(); err != nil { return nil, trace.Wrap(err, "error creating schema: %v", connectorURL) } if err := l.showPragmas(); err != nil { l.Warningf("Failed to show pragma settings: %v.", err) } go l.runPeriodicOperations() return l, nil }
go
func NewWithConfig(ctx context.Context, cfg Config) (*LiteBackend, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } var connectorURL string if !cfg.Memory { // Ensure that the path to the root directory exists. err := os.MkdirAll(cfg.Path, defaultDirMode) if err != nil { return nil, trace.ConvertSystemError(err) } fullPath := filepath.Join(cfg.Path, defaultDBFile) connectorURL = fmt.Sprintf("file:%v?_busy_timeout=%v&_sync=%v", fullPath, cfg.BusyTimeout, cfg.Sync) } else { connectorURL = fmt.Sprintf("file:%v?mode=memory", cfg.MemoryName) } db, err := sql.Open(BackendName, connectorURL) if err != nil { return nil, trace.Wrap(err, "error opening URI: %v", connectorURL) } // serialize access to sqlite to avoid database is locked errors db.SetMaxOpenConns(1) buf, err := backend.NewCircularBuffer(ctx, cfg.BufferSize) if err != nil { return nil, trace.Wrap(err) } closeCtx, cancel := context.WithCancel(ctx) watchStarted, signalWatchStart := context.WithCancel(ctx) l := &LiteBackend{ Config: cfg, db: db, Entry: log.WithFields(log.Fields{trace.Component: BackendName}), clock: cfg.Clock, buf: buf, ctx: closeCtx, cancel: cancel, watchStarted: watchStarted, signalWatchStart: signalWatchStart, } l.Debugf("Connected to: %v, poll stream period: %v", connectorURL, cfg.PollStreamPeriod) if err := l.createSchema(); err != nil { return nil, trace.Wrap(err, "error creating schema: %v", connectorURL) } if err := l.showPragmas(); err != nil { l.Warningf("Failed to show pragma settings: %v.", err) } go l.runPeriodicOperations() return l, nil }
[ "func", "NewWithConfig", "(", "ctx", "context", ".", "Context", ",", "cfg", "Config", ")", "(", "*", "LiteBackend", ",", "error", ")", "{", "if", "err", ":=", "cfg", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "connectorURL", "string", "\n", "if", "!", "cfg", ".", "Memory", "{", "// Ensure that the path to the root directory exists.", "err", ":=", "os", ".", "MkdirAll", "(", "cfg", ".", "Path", ",", "defaultDirMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "fullPath", ":=", "filepath", ".", "Join", "(", "cfg", ".", "Path", ",", "defaultDBFile", ")", "\n", "connectorURL", "=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "fullPath", ",", "cfg", ".", "BusyTimeout", ",", "cfg", ".", "Sync", ")", "\n", "}", "else", "{", "connectorURL", "=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "cfg", ".", "MemoryName", ")", "\n", "}", "\n", "db", ",", "err", ":=", "sql", ".", "Open", "(", "BackendName", ",", "connectorURL", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ",", "connectorURL", ")", "\n", "}", "\n", "// serialize access to sqlite to avoid database is locked errors", "db", ".", "SetMaxOpenConns", "(", "1", ")", "\n", "buf", ",", "err", ":=", "backend", ".", "NewCircularBuffer", "(", "ctx", ",", "cfg", ".", "BufferSize", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "closeCtx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "watchStarted", ",", "signalWatchStart", ":=", "context", ".", "WithCancel", "(", "ctx", ")", "\n", "l", ":=", "&", "LiteBackend", "{", "Config", ":", "cfg", ",", "db", ":", "db", ",", "Entry", ":", "log", ".", "WithFields", "(", "log", ".", "Fields", "{", "trace", ".", "Component", ":", "BackendName", "}", ")", ",", "clock", ":", "cfg", ".", "Clock", ",", "buf", ":", "buf", ",", "ctx", ":", "closeCtx", ",", "cancel", ":", "cancel", ",", "watchStarted", ":", "watchStarted", ",", "signalWatchStart", ":", "signalWatchStart", ",", "}", "\n", "l", ".", "Debugf", "(", "\"", "\"", ",", "connectorURL", ",", "cfg", ".", "PollStreamPeriod", ")", "\n", "if", "err", ":=", "l", ".", "createSchema", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ",", "connectorURL", ")", "\n", "}", "\n", "if", "err", ":=", "l", ".", "showPragmas", "(", ")", ";", "err", "!=", "nil", "{", "l", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "go", "l", ".", "runPeriodicOperations", "(", ")", "\n", "return", "l", ",", "nil", "\n", "}" ]
// NewWithConfig returns a new instance of lite backend using // configuration struct as a parameter
[ "NewWithConfig", "returns", "a", "new", "instance", "of", "lite", "backend", "using", "configuration", "struct", "as", "a", "parameter" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L131-L179
train
gravitational/teleport
lib/backend/lite/lite.go
showPragmas
func (l *LiteBackend) showPragmas() error { return l.inTransaction(l.ctx, func(tx *sql.Tx) error { row := tx.QueryRowContext(l.ctx, "PRAGMA synchronous;") var syncValue string if err := row.Scan(&syncValue); err != nil { return trace.Wrap(err) } var timeoutValue string row = tx.QueryRowContext(l.ctx, "PRAGMA busy_timeout;") if err := row.Scan(&timeoutValue); err != nil { return trace.Wrap(err) } l.Debugf("Synchronous: %v, busy timeout: %v", syncValue, timeoutValue) return nil }) }
go
func (l *LiteBackend) showPragmas() error { return l.inTransaction(l.ctx, func(tx *sql.Tx) error { row := tx.QueryRowContext(l.ctx, "PRAGMA synchronous;") var syncValue string if err := row.Scan(&syncValue); err != nil { return trace.Wrap(err) } var timeoutValue string row = tx.QueryRowContext(l.ctx, "PRAGMA busy_timeout;") if err := row.Scan(&timeoutValue); err != nil { return trace.Wrap(err) } l.Debugf("Synchronous: %v, busy timeout: %v", syncValue, timeoutValue) return nil }) }
[ "func", "(", "l", "*", "LiteBackend", ")", "showPragmas", "(", ")", "error", "{", "return", "l", ".", "inTransaction", "(", "l", ".", "ctx", ",", "func", "(", "tx", "*", "sql", ".", "Tx", ")", "error", "{", "row", ":=", "tx", ".", "QueryRowContext", "(", "l", ".", "ctx", ",", "\"", "\"", ")", "\n", "var", "syncValue", "string", "\n", "if", "err", ":=", "row", ".", "Scan", "(", "&", "syncValue", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "timeoutValue", "string", "\n", "row", "=", "tx", ".", "QueryRowContext", "(", "l", ".", "ctx", ",", "\"", "\"", ")", "\n", "if", "err", ":=", "row", ".", "Scan", "(", "&", "timeoutValue", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "l", ".", "Debugf", "(", "\"", "\"", ",", "syncValue", ",", "timeoutValue", ")", "\n", "return", "nil", "\n", "}", ")", "\n", "}" ]
// showPragmas is used to debug SQLite database connection // parameters, when called, logs some key PRAGMA values
[ "showPragmas", "is", "used", "to", "debug", "SQLite", "database", "connection", "parameters", "when", "called", "logs", "some", "key", "PRAGMA", "values" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L205-L220
train
gravitational/teleport
lib/backend/lite/lite.go
Imported
func (l *LiteBackend) Imported(ctx context.Context) (imported bool, err error) { err = l.inTransaction(ctx, func(tx *sql.Tx) error { q, err := tx.PrepareContext(ctx, "SELECT imported from meta LIMIT 1") if err != nil { return trace.Wrap(err) } row := q.QueryRowContext(ctx) if err := row.Scan(&imported); err != nil { if err != sql.ErrNoRows { return trace.Wrap(err) } } return nil }) return imported, err }
go
func (l *LiteBackend) Imported(ctx context.Context) (imported bool, err error) { err = l.inTransaction(ctx, func(tx *sql.Tx) error { q, err := tx.PrepareContext(ctx, "SELECT imported from meta LIMIT 1") if err != nil { return trace.Wrap(err) } row := q.QueryRowContext(ctx) if err := row.Scan(&imported); err != nil { if err != sql.ErrNoRows { return trace.Wrap(err) } } return nil }) return imported, err }
[ "func", "(", "l", "*", "LiteBackend", ")", "Imported", "(", "ctx", "context", ".", "Context", ")", "(", "imported", "bool", ",", "err", "error", ")", "{", "err", "=", "l", ".", "inTransaction", "(", "ctx", ",", "func", "(", "tx", "*", "sql", ".", "Tx", ")", "error", "{", "q", ",", "err", ":=", "tx", ".", "PrepareContext", "(", "ctx", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "row", ":=", "q", ".", "QueryRowContext", "(", "ctx", ")", "\n", "if", "err", ":=", "row", ".", "Scan", "(", "&", "imported", ")", ";", "err", "!=", "nil", "{", "if", "err", "!=", "sql", ".", "ErrNoRows", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}", ")", "\n", "return", "imported", ",", "err", "\n", "}" ]
// Imported returns true if backend already imported data from another backend
[ "Imported", "returns", "true", "if", "backend", "already", "imported", "data", "from", "another", "backend" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L413-L429
train
gravitational/teleport
lib/backend/lite/lite.go
Import
func (l *LiteBackend) Import(ctx context.Context, items []backend.Item) error { for i := range items { if items[i].Key == nil { return trace.BadParameter("missing parameter key in item %v", i) } } err := l.inTransaction(ctx, func(tx *sql.Tx) error { q, err := tx.PrepareContext(ctx, "SELECT imported from meta LIMIT 1") if err != nil { return trace.Wrap(err) } var imported bool row := q.QueryRowContext(ctx) if err := row.Scan(&imported); err != nil { if err != sql.ErrNoRows { return trace.Wrap(err) } } if imported { return trace.AlreadyExists("database has been already imported") } if err := l.putRangeInTransaction(ctx, tx, items, true); err != nil { return trace.Wrap(err) } stmt, err := tx.PrepareContext(ctx, "INSERT INTO meta(version, imported) values(?, ?)") if err != nil { return trace.Wrap(err) } if _, err := stmt.ExecContext(ctx, schemaVersion, true); err != nil { return trace.Wrap(err) } return nil }) if err != nil { return trace.Wrap(err) } return nil }
go
func (l *LiteBackend) Import(ctx context.Context, items []backend.Item) error { for i := range items { if items[i].Key == nil { return trace.BadParameter("missing parameter key in item %v", i) } } err := l.inTransaction(ctx, func(tx *sql.Tx) error { q, err := tx.PrepareContext(ctx, "SELECT imported from meta LIMIT 1") if err != nil { return trace.Wrap(err) } var imported bool row := q.QueryRowContext(ctx) if err := row.Scan(&imported); err != nil { if err != sql.ErrNoRows { return trace.Wrap(err) } } if imported { return trace.AlreadyExists("database has been already imported") } if err := l.putRangeInTransaction(ctx, tx, items, true); err != nil { return trace.Wrap(err) } stmt, err := tx.PrepareContext(ctx, "INSERT INTO meta(version, imported) values(?, ?)") if err != nil { return trace.Wrap(err) } if _, err := stmt.ExecContext(ctx, schemaVersion, true); err != nil { return trace.Wrap(err) } return nil }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "l", "*", "LiteBackend", ")", "Import", "(", "ctx", "context", ".", "Context", ",", "items", "[", "]", "backend", ".", "Item", ")", "error", "{", "for", "i", ":=", "range", "items", "{", "if", "items", "[", "i", "]", ".", "Key", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "i", ")", "\n", "}", "\n", "}", "\n", "err", ":=", "l", ".", "inTransaction", "(", "ctx", ",", "func", "(", "tx", "*", "sql", ".", "Tx", ")", "error", "{", "q", ",", "err", ":=", "tx", ".", "PrepareContext", "(", "ctx", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "imported", "bool", "\n", "row", ":=", "q", ".", "QueryRowContext", "(", "ctx", ")", "\n", "if", "err", ":=", "row", ".", "Scan", "(", "&", "imported", ")", ";", "err", "!=", "nil", "{", "if", "err", "!=", "sql", ".", "ErrNoRows", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "if", "imported", "{", "return", "trace", ".", "AlreadyExists", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "err", ":=", "l", ".", "putRangeInTransaction", "(", "ctx", ",", "tx", ",", "items", ",", "true", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "stmt", ",", "err", ":=", "tx", ".", "PrepareContext", "(", "ctx", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "_", ",", "err", ":=", "stmt", ".", "ExecContext", "(", "ctx", ",", "schemaVersion", ",", "true", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Import imports elements, makes sure elements are imported only once // returns trace.AlreadyExists if elements have been imported
[ "Import", "imports", "elements", "makes", "sure", "elements", "are", "imported", "only", "once", "returns", "trace", ".", "AlreadyExists", "if", "elements", "have", "been", "imported" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L433-L474
train
gravitational/teleport
lib/backend/lite/lite.go
getInTransaction
func (l *LiteBackend) getInTransaction(ctx context.Context, key []byte, tx *sql.Tx, item *backend.Item) error { now := l.clock.Now().UTC() q, err := tx.PrepareContext(ctx, "SELECT key, value, expires, modified FROM kv WHERE key = ? AND (expires IS NULL OR expires > ?) LIMIT 1") if err != nil { return trace.Wrap(err) } row := q.QueryRowContext(ctx, string(key), now) var expires NullTime if err := row.Scan(&item.Key, &item.Value, &expires, &item.ID); err != nil { if err == sql.ErrNoRows { return trace.NotFound("key %v is not found", string(key)) } return trace.Wrap(err) } item.Expires = expires.Time return nil }
go
func (l *LiteBackend) getInTransaction(ctx context.Context, key []byte, tx *sql.Tx, item *backend.Item) error { now := l.clock.Now().UTC() q, err := tx.PrepareContext(ctx, "SELECT key, value, expires, modified FROM kv WHERE key = ? AND (expires IS NULL OR expires > ?) LIMIT 1") if err != nil { return trace.Wrap(err) } row := q.QueryRowContext(ctx, string(key), now) var expires NullTime if err := row.Scan(&item.Key, &item.Value, &expires, &item.ID); err != nil { if err == sql.ErrNoRows { return trace.NotFound("key %v is not found", string(key)) } return trace.Wrap(err) } item.Expires = expires.Time return nil }
[ "func", "(", "l", "*", "LiteBackend", ")", "getInTransaction", "(", "ctx", "context", ".", "Context", ",", "key", "[", "]", "byte", ",", "tx", "*", "sql", ".", "Tx", ",", "item", "*", "backend", ".", "Item", ")", "error", "{", "now", ":=", "l", ".", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", "\n", "q", ",", "err", ":=", "tx", ".", "PrepareContext", "(", "ctx", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "row", ":=", "q", ".", "QueryRowContext", "(", "ctx", ",", "string", "(", "key", ")", ",", "now", ")", "\n", "var", "expires", "NullTime", "\n", "if", "err", ":=", "row", ".", "Scan", "(", "&", "item", ".", "Key", ",", "&", "item", ".", "Value", ",", "&", "expires", ",", "&", "item", ".", "ID", ")", ";", "err", "!=", "nil", "{", "if", "err", "==", "sql", ".", "ErrNoRows", "{", "return", "trace", ".", "NotFound", "(", "\"", "\"", ",", "string", "(", "key", ")", ")", "\n", "}", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "item", ".", "Expires", "=", "expires", ".", "Time", "\n", "return", "nil", "\n", "}" ]
// getInTransaction returns an item, works in transaction
[ "getInTransaction", "returns", "an", "item", "works", "in", "transaction" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/lite/lite.go#L579-L596
train
gravitational/teleport
lib/modules/modules.go
PrintVersion
func (p *defaultModules) PrintVersion() { var buf bytes.Buffer buf.WriteString(fmt.Sprintf("Teleport v%s ", teleport.Version)) buf.WriteString(fmt.Sprintf("git:%s ", teleport.Gitref)) buf.WriteString(runtime.Version()) fmt.Println(buf.String()) }
go
func (p *defaultModules) PrintVersion() { var buf bytes.Buffer buf.WriteString(fmt.Sprintf("Teleport v%s ", teleport.Version)) buf.WriteString(fmt.Sprintf("git:%s ", teleport.Gitref)) buf.WriteString(runtime.Version()) fmt.Println(buf.String()) }
[ "func", "(", "p", "*", "defaultModules", ")", "PrintVersion", "(", ")", "{", "var", "buf", "bytes", ".", "Buffer", "\n\n", "buf", ".", "WriteString", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "teleport", ".", "Version", ")", ")", "\n", "buf", ".", "WriteString", "(", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "teleport", ".", "Gitref", ")", ")", "\n", "buf", ".", "WriteString", "(", "runtime", ".", "Version", "(", ")", ")", "\n\n", "fmt", ".", "Println", "(", "buf", ".", "String", "(", ")", ")", "\n", "}" ]
// PrintVersion prints the Teleport version.
[ "PrintVersion", "prints", "the", "Teleport", "version", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/modules/modules.go#L85-L93
train
gravitational/teleport
lib/modules/modules.go
TraitsFromLogins
func (p *defaultModules) TraitsFromLogins(logins []string, kubeGroups []string) map[string][]string { return map[string][]string{ teleport.TraitLogins: logins, teleport.TraitKubeGroups: kubeGroups, } }
go
func (p *defaultModules) TraitsFromLogins(logins []string, kubeGroups []string) map[string][]string { return map[string][]string{ teleport.TraitLogins: logins, teleport.TraitKubeGroups: kubeGroups, } }
[ "func", "(", "p", "*", "defaultModules", ")", "TraitsFromLogins", "(", "logins", "[", "]", "string", ",", "kubeGroups", "[", "]", "string", ")", "map", "[", "string", "]", "[", "]", "string", "{", "return", "map", "[", "string", "]", "[", "]", "string", "{", "teleport", ".", "TraitLogins", ":", "logins", ",", "teleport", ".", "TraitKubeGroups", ":", "kubeGroups", ",", "}", "\n", "}" ]
// TraitsFromLogins returns traits for external user based on the logins // extracted from the connector // // By default logins are treated as allowed logins user traits.
[ "TraitsFromLogins", "returns", "traits", "for", "external", "user", "based", "on", "the", "logins", "extracted", "from", "the", "connector", "By", "default", "logins", "are", "treated", "as", "allowed", "logins", "user", "traits", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/modules/modules.go#L108-L113
train
gravitational/teleport
lib/services/github.go
NewGithubConnector
func NewGithubConnector(name string, spec GithubConnectorSpecV3) GithubConnector { return &GithubConnectorV3{ Kind: KindGithubConnector, Version: V3, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, } }
go
func NewGithubConnector(name string, spec GithubConnectorSpecV3) GithubConnector { return &GithubConnectorV3{ Kind: KindGithubConnector, Version: V3, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, } }
[ "func", "NewGithubConnector", "(", "name", "string", ",", "spec", "GithubConnectorSpecV3", ")", "GithubConnector", "{", "return", "&", "GithubConnectorV3", "{", "Kind", ":", "KindGithubConnector", ",", "Version", ":", "V3", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "name", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", "\n", "}" ]
// NewGithubConnector creates a new Github connector from name and spec
[ "NewGithubConnector", "creates", "a", "new", "Github", "connector", "from", "name", "and", "spec" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/github.go#L63-L73
train
gravitational/teleport
lib/services/github.go
SetExpiry
func (c *GithubConnectorV3) SetExpiry(expires time.Time) { c.Metadata.SetExpiry(expires) }
go
func (c *GithubConnectorV3) SetExpiry(expires time.Time) { c.Metadata.SetExpiry(expires) }
[ "func", "(", "c", "*", "GithubConnectorV3", ")", "SetExpiry", "(", "expires", "time", ".", "Time", ")", "{", "c", ".", "Metadata", ".", "SetExpiry", "(", "expires", ")", "\n", "}" ]
// SetExpiry sets the connector expiration time
[ "SetExpiry", "sets", "the", "connector", "expiration", "time" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/github.go#L169-L171
train
gravitational/teleport
lib/services/github.go
SetTTL
func (c *GithubConnectorV3) SetTTL(clock clockwork.Clock, ttl time.Duration) { c.Metadata.SetTTL(clock, ttl) }
go
func (c *GithubConnectorV3) SetTTL(clock clockwork.Clock, ttl time.Duration) { c.Metadata.SetTTL(clock, ttl) }
[ "func", "(", "c", "*", "GithubConnectorV3", ")", "SetTTL", "(", "clock", "clockwork", ".", "Clock", ",", "ttl", "time", ".", "Duration", ")", "{", "c", ".", "Metadata", ".", "SetTTL", "(", "clock", ",", "ttl", ")", "\n", "}" ]
// SetTTL sets the connector TTL
[ "SetTTL", "sets", "the", "connector", "TTL" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/github.go#L174-L176
train
gravitational/teleport
lib/services/github.go
MapClaims
func (c *GithubConnectorV3) MapClaims(claims GithubClaims) ([]string, []string) { var logins, kubeGroups []string for _, mapping := range c.GetTeamsToLogins() { teams, ok := claims.OrganizationToTeams[mapping.Organization] if !ok { // the user does not belong to this organization continue } for _, team := range teams { // see if the user belongs to this team if team == mapping.Team { logins = append(logins, mapping.Logins...) kubeGroups = append(kubeGroups, mapping.KubeGroups...) } } } return utils.Deduplicate(logins), utils.Deduplicate(kubeGroups) }
go
func (c *GithubConnectorV3) MapClaims(claims GithubClaims) ([]string, []string) { var logins, kubeGroups []string for _, mapping := range c.GetTeamsToLogins() { teams, ok := claims.OrganizationToTeams[mapping.Organization] if !ok { // the user does not belong to this organization continue } for _, team := range teams { // see if the user belongs to this team if team == mapping.Team { logins = append(logins, mapping.Logins...) kubeGroups = append(kubeGroups, mapping.KubeGroups...) } } } return utils.Deduplicate(logins), utils.Deduplicate(kubeGroups) }
[ "func", "(", "c", "*", "GithubConnectorV3", ")", "MapClaims", "(", "claims", "GithubClaims", ")", "(", "[", "]", "string", ",", "[", "]", "string", ")", "{", "var", "logins", ",", "kubeGroups", "[", "]", "string", "\n", "for", "_", ",", "mapping", ":=", "range", "c", ".", "GetTeamsToLogins", "(", ")", "{", "teams", ",", "ok", ":=", "claims", ".", "OrganizationToTeams", "[", "mapping", ".", "Organization", "]", "\n", "if", "!", "ok", "{", "// the user does not belong to this organization", "continue", "\n", "}", "\n", "for", "_", ",", "team", ":=", "range", "teams", "{", "// see if the user belongs to this team", "if", "team", "==", "mapping", ".", "Team", "{", "logins", "=", "append", "(", "logins", ",", "mapping", ".", "Logins", "...", ")", "\n", "kubeGroups", "=", "append", "(", "kubeGroups", ",", "mapping", ".", "KubeGroups", "...", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "utils", ".", "Deduplicate", "(", "logins", ")", ",", "utils", ".", "Deduplicate", "(", "kubeGroups", ")", "\n", "}" ]
// MapClaims returns a list of logins based on the provided claims, // returns a list of logins and list of kubernetes groups
[ "MapClaims", "returns", "a", "list", "of", "logins", "based", "on", "the", "provided", "claims", "returns", "a", "list", "of", "logins", "and", "list", "of", "kubernetes", "groups" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/github.go#L243-L260
train
gravitational/teleport
lib/services/github.go
Unmarshal
func (*TeleportGithubConnectorMarshaler) Unmarshal(bytes []byte) (GithubConnector, error) { var h ResourceHeader if err := json.Unmarshal(bytes, &h); err != nil { return nil, trace.Wrap(err) } switch h.Version { case V3: var c GithubConnectorV3 if err := utils.UnmarshalWithSchema(GetGithubConnectorSchema(), &c, bytes); err != nil { return nil, trace.Wrap(err) } if err := c.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &c, nil } return nil, trace.BadParameter( "Github connector resource version %q is not supported", h.Version) }
go
func (*TeleportGithubConnectorMarshaler) Unmarshal(bytes []byte) (GithubConnector, error) { var h ResourceHeader if err := json.Unmarshal(bytes, &h); err != nil { return nil, trace.Wrap(err) } switch h.Version { case V3: var c GithubConnectorV3 if err := utils.UnmarshalWithSchema(GetGithubConnectorSchema(), &c, bytes); err != nil { return nil, trace.Wrap(err) } if err := c.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &c, nil } return nil, trace.BadParameter( "Github connector resource version %q is not supported", h.Version) }
[ "func", "(", "*", "TeleportGithubConnectorMarshaler", ")", "Unmarshal", "(", "bytes", "[", "]", "byte", ")", "(", "GithubConnector", ",", "error", ")", "{", "var", "h", "ResourceHeader", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "bytes", ",", "&", "h", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "h", ".", "Version", "{", "case", "V3", ":", "var", "c", "GithubConnectorV3", "\n", "if", "err", ":=", "utils", ".", "UnmarshalWithSchema", "(", "GetGithubConnectorSchema", "(", ")", ",", "&", "c", ",", "bytes", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "c", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "c", ",", "nil", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "h", ".", "Version", ")", "\n", "}" ]
// UnmarshalGithubConnector unmarshals Github connector from JSON
[ "UnmarshalGithubConnector", "unmarshals", "Github", "connector", "from", "JSON" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/github.go#L295-L313
train
gravitational/teleport
lib/services/github.go
Marshal
func (*TeleportGithubConnectorMarshaler) Marshal(c GithubConnector, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *GithubConnectorV3: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
go
func (*TeleportGithubConnectorMarshaler) Marshal(c GithubConnector, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *GithubConnectorV3: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
[ "func", "(", "*", "TeleportGithubConnectorMarshaler", ")", "Marshal", "(", "c", "GithubConnector", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "resource", ":=", "c", ".", "(", "type", ")", "{", "case", "*", "GithubConnectorV3", ":", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "resource", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "resource", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "resource", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ")", "\n", "}", "\n", "}" ]
// MarshalGithubConnector marshals Github connector to JSON
[ "MarshalGithubConnector", "marshals", "Github", "connector", "to", "JSON" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/github.go#L316-L334
train
gravitational/teleport
lib/services/local/provisioning.go
DeleteAllTokens
func (s *ProvisioningService) DeleteAllTokens() error { startKey := backend.Key(tokensPrefix) return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey)) }
go
func (s *ProvisioningService) DeleteAllTokens() error { startKey := backend.Key(tokensPrefix) return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey)) }
[ "func", "(", "s", "*", "ProvisioningService", ")", "DeleteAllTokens", "(", ")", "error", "{", "startKey", ":=", "backend", ".", "Key", "(", "tokensPrefix", ")", "\n", "return", "s", ".", "DeleteRange", "(", "context", ".", "TODO", "(", ")", ",", "startKey", ",", "backend", ".", "RangeEnd", "(", "startKey", ")", ")", "\n", "}" ]
// DeleteAllTokens deletes all provisioning tokens
[ "DeleteAllTokens", "deletes", "all", "provisioning", "tokens" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/provisioning.go#L66-L69
train
gravitational/teleport
lib/services/clusterconfig.go
NewClusterConfig
func NewClusterConfig(spec ClusterConfigSpecV3) (ClusterConfig, error) { cc := ClusterConfigV3{ Kind: KindClusterConfig, Version: V3, Metadata: Metadata{ Name: MetaNameClusterConfig, Namespace: defaults.Namespace, }, Spec: spec, } if err := cc.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &cc, nil }
go
func NewClusterConfig(spec ClusterConfigSpecV3) (ClusterConfig, error) { cc := ClusterConfigV3{ Kind: KindClusterConfig, Version: V3, Metadata: Metadata{ Name: MetaNameClusterConfig, Namespace: defaults.Namespace, }, Spec: spec, } if err := cc.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &cc, nil }
[ "func", "NewClusterConfig", "(", "spec", "ClusterConfigSpecV3", ")", "(", "ClusterConfig", ",", "error", ")", "{", "cc", ":=", "ClusterConfigV3", "{", "Kind", ":", "KindClusterConfig", ",", "Version", ":", "V3", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "MetaNameClusterConfig", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", "\n", "if", "err", ":=", "cc", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "&", "cc", ",", "nil", "\n", "}" ]
// NewClusterConfig is a convenience wrapper to create a ClusterConfig resource.
[ "NewClusterConfig", "is", "a", "convenience", "wrapper", "to", "create", "a", "ClusterConfig", "resource", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L97-L112
train
gravitational/teleport
lib/services/clusterconfig.go
AuditConfigFromObject
func AuditConfigFromObject(in interface{}) (*AuditConfig, error) { var cfg AuditConfig if in == nil { return &cfg, nil } if err := utils.ObjectToStruct(in, &cfg); err != nil { return nil, trace.Wrap(err) } return &cfg, nil }
go
func AuditConfigFromObject(in interface{}) (*AuditConfig, error) { var cfg AuditConfig if in == nil { return &cfg, nil } if err := utils.ObjectToStruct(in, &cfg); err != nil { return nil, trace.Wrap(err) } return &cfg, nil }
[ "func", "AuditConfigFromObject", "(", "in", "interface", "{", "}", ")", "(", "*", "AuditConfig", ",", "error", ")", "{", "var", "cfg", "AuditConfig", "\n", "if", "in", "==", "nil", "{", "return", "&", "cfg", ",", "nil", "\n", "}", "\n", "if", "err", ":=", "utils", ".", "ObjectToStruct", "(", "in", ",", "&", "cfg", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "cfg", ",", "nil", "\n", "}" ]
// AuditConfigFromObject returns audit config from interface object
[ "AuditConfigFromObject", "returns", "audit", "config", "from", "interface", "object" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L140-L149
train
gravitational/teleport
lib/services/clusterconfig.go
SetClientIdleTimeout
func (c *ClusterConfigV3) SetClientIdleTimeout(d time.Duration) { c.Spec.ClientIdleTimeout = Duration(d) }
go
func (c *ClusterConfigV3) SetClientIdleTimeout(d time.Duration) { c.Spec.ClientIdleTimeout = Duration(d) }
[ "func", "(", "c", "*", "ClusterConfigV3", ")", "SetClientIdleTimeout", "(", "d", "time", ".", "Duration", ")", "{", "c", ".", "Spec", ".", "ClientIdleTimeout", "=", "Duration", "(", "d", ")", "\n", "}" ]
// SetClientIdleTimeout sets client idle timeout setting
[ "SetClientIdleTimeout", "sets", "client", "idle", "timeout", "setting" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L279-L281
train
gravitational/teleport
lib/services/clusterconfig.go
SetDisconnectExpiredCert
func (c *ClusterConfigV3) SetDisconnectExpiredCert(b bool) { c.Spec.DisconnectExpiredCert = NewBool(b) }
go
func (c *ClusterConfigV3) SetDisconnectExpiredCert(b bool) { c.Spec.DisconnectExpiredCert = NewBool(b) }
[ "func", "(", "c", "*", "ClusterConfigV3", ")", "SetDisconnectExpiredCert", "(", "b", "bool", ")", "{", "c", ".", "Spec", ".", "DisconnectExpiredCert", "=", "NewBool", "(", "b", ")", "\n", "}" ]
// SetDisconnectExpiredCert sets disconnect client with expired certificate setting
[ "SetDisconnectExpiredCert", "sets", "disconnect", "client", "with", "expired", "certificate", "setting" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L289-L291
train
gravitational/teleport
lib/services/clusterconfig.go
SetKeepAliveInterval
func (c *ClusterConfigV3) SetKeepAliveInterval(t time.Duration) { c.Spec.KeepAliveInterval = Duration(t) }
go
func (c *ClusterConfigV3) SetKeepAliveInterval(t time.Duration) { c.Spec.KeepAliveInterval = Duration(t) }
[ "func", "(", "c", "*", "ClusterConfigV3", ")", "SetKeepAliveInterval", "(", "t", "time", ".", "Duration", ")", "{", "c", ".", "Spec", ".", "KeepAliveInterval", "=", "Duration", "(", "t", ")", "\n", "}" ]
// SetKeepAliveInterval sets the keep-alive interval.
[ "SetKeepAliveInterval", "sets", "the", "keep", "-", "alive", "interval", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L299-L301
train
gravitational/teleport
lib/services/clusterconfig.go
String
func (c *ClusterConfigV3) String() string { return fmt.Sprintf("ClusterConfig(SessionRecording=%v, ClusterID=%v, ProxyChecksHostKeys=%v)", c.Spec.SessionRecording, c.Spec.ClusterID, c.Spec.ProxyChecksHostKeys) }
go
func (c *ClusterConfigV3) String() string { return fmt.Sprintf("ClusterConfig(SessionRecording=%v, ClusterID=%v, ProxyChecksHostKeys=%v)", c.Spec.SessionRecording, c.Spec.ClusterID, c.Spec.ProxyChecksHostKeys) }
[ "func", "(", "c", "*", "ClusterConfigV3", ")", "String", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "c", ".", "Spec", ".", "SessionRecording", ",", "c", ".", "Spec", ".", "ClusterID", ",", "c", ".", "Spec", ".", "ProxyChecksHostKeys", ")", "\n", "}" ]
// String represents a human readable version of the cluster name.
[ "String", "represents", "a", "human", "readable", "version", "of", "the", "cluster", "name", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L363-L366
train
gravitational/teleport
lib/services/clusterconfig.go
GetClusterConfigSchema
func GetClusterConfigSchema(extensionSchema string) string { var clusterConfigSchema string if clusterConfigSchema == "" { clusterConfigSchema = fmt.Sprintf(ClusterConfigSpecSchemaTemplate, "") } else { clusterConfigSchema = fmt.Sprintf(ClusterConfigSpecSchemaTemplate, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterConfigSchema, DefaultDefinitions) }
go
func GetClusterConfigSchema(extensionSchema string) string { var clusterConfigSchema string if clusterConfigSchema == "" { clusterConfigSchema = fmt.Sprintf(ClusterConfigSpecSchemaTemplate, "") } else { clusterConfigSchema = fmt.Sprintf(ClusterConfigSpecSchemaTemplate, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterConfigSchema, DefaultDefinitions) }
[ "func", "GetClusterConfigSchema", "(", "extensionSchema", "string", ")", "string", "{", "var", "clusterConfigSchema", "string", "\n", "if", "clusterConfigSchema", "==", "\"", "\"", "{", "clusterConfigSchema", "=", "fmt", ".", "Sprintf", "(", "ClusterConfigSpecSchemaTemplate", ",", "\"", "\"", ")", "\n", "}", "else", "{", "clusterConfigSchema", "=", "fmt", ".", "Sprintf", "(", "ClusterConfigSpecSchemaTemplate", ",", "\"", "\"", "+", "extensionSchema", ")", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "V2SchemaTemplate", ",", "MetadataSchema", ",", "clusterConfigSchema", ",", "DefaultDefinitions", ")", "\n", "}" ]
// GetClusterConfigSchema returns the schema with optionally injected // schema for extensions.
[ "GetClusterConfigSchema", "returns", "the", "schema", "with", "optionally", "injected", "schema", "for", "extensions", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L427-L435
train
gravitational/teleport
lib/services/clusterconfig.go
Unmarshal
func (t *TeleportClusterConfigMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterConfig, error) { var clusterConfig ClusterConfigV3 if len(bytes) == 0 { return nil, trace.BadParameter("missing resource data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &clusterConfig); err != nil { return nil, trace.BadParameter(err.Error()) } } else { err = utils.UnmarshalWithSchema(GetClusterConfigSchema(""), &clusterConfig, bytes) if err != nil { return nil, trace.BadParameter(err.Error()) } } err = clusterConfig.CheckAndSetDefaults() if err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { clusterConfig.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { clusterConfig.SetExpiry(cfg.Expires) } return &clusterConfig, nil }
go
func (t *TeleportClusterConfigMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterConfig, error) { var clusterConfig ClusterConfigV3 if len(bytes) == 0 { return nil, trace.BadParameter("missing resource data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &clusterConfig); err != nil { return nil, trace.BadParameter(err.Error()) } } else { err = utils.UnmarshalWithSchema(GetClusterConfigSchema(""), &clusterConfig, bytes) if err != nil { return nil, trace.BadParameter(err.Error()) } } err = clusterConfig.CheckAndSetDefaults() if err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { clusterConfig.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { clusterConfig.SetExpiry(cfg.Expires) } return &clusterConfig, nil }
[ "func", "(", "t", "*", "TeleportClusterConfigMarshaler", ")", "Unmarshal", "(", "bytes", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ClusterConfig", ",", "error", ")", "{", "var", "clusterConfig", "ClusterConfigV3", "\n\n", "if", "len", "(", "bytes", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "bytes", ",", "&", "clusterConfig", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "err", "=", "utils", ".", "UnmarshalWithSchema", "(", "GetClusterConfigSchema", "(", "\"", "\"", ")", ",", "&", "clusterConfig", ",", "bytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "clusterConfig", ".", "CheckAndSetDefaults", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "cfg", ".", "ID", "!=", "0", "{", "clusterConfig", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "if", "!", "cfg", ".", "Expires", ".", "IsZero", "(", ")", "{", "clusterConfig", ".", "SetExpiry", "(", "cfg", ".", "Expires", ")", "\n", "}", "\n", "return", "&", "clusterConfig", ",", "nil", "\n", "}" ]
// Unmarshal unmarshals ClusterConfig from JSON.
[ "Unmarshal", "unmarshals", "ClusterConfig", "from", "JSON", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L464-L499
train
gravitational/teleport
lib/services/clusterconfig.go
Marshal
func (t *TeleportClusterConfigMarshaler) Marshal(c ClusterConfig, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *ClusterConfigV3: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
go
func (t *TeleportClusterConfigMarshaler) Marshal(c ClusterConfig, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *ClusterConfigV3: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
[ "func", "(", "t", "*", "TeleportClusterConfigMarshaler", ")", "Marshal", "(", "c", "ClusterConfig", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "resource", ":=", "c", ".", "(", "type", ")", "{", "case", "*", "ClusterConfigV3", ":", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "resource", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "resource", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "resource", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ")", "\n", "}", "\n", "}" ]
// Marshal marshals ClusterConfig to JSON.
[ "Marshal", "marshals", "ClusterConfig", "to", "JSON", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clusterconfig.go#L502-L520
train
gravitational/teleport
lib/utils/ver.go
CheckVersions
func CheckVersions(clientVersion string, minClientVersion string) error { clientSemver, err := semver.NewVersion(clientVersion) if err != nil { return trace.Wrap(err, "unsupported version format, need semver format: %q, e.g 1.0.0", clientVersion) } minClientSemver, err := semver.NewVersion(minClientVersion) if err != nil { return trace.Wrap(err, "unsupported version format, need semver format: %q, e.g 1.0.0", minClientVersion) } if clientSemver.Compare(*minClientSemver) < 0 { errorMessage := fmt.Sprintf("minimum client version supported by the server "+ "is %v. Please upgrade the client, downgrade the server, or use the "+ "--skip-version-check flag to by-pass this check.", minClientVersion) return trace.BadParameter(errorMessage) } return nil }
go
func CheckVersions(clientVersion string, minClientVersion string) error { clientSemver, err := semver.NewVersion(clientVersion) if err != nil { return trace.Wrap(err, "unsupported version format, need semver format: %q, e.g 1.0.0", clientVersion) } minClientSemver, err := semver.NewVersion(minClientVersion) if err != nil { return trace.Wrap(err, "unsupported version format, need semver format: %q, e.g 1.0.0", minClientVersion) } if clientSemver.Compare(*minClientSemver) < 0 { errorMessage := fmt.Sprintf("minimum client version supported by the server "+ "is %v. Please upgrade the client, downgrade the server, or use the "+ "--skip-version-check flag to by-pass this check.", minClientVersion) return trace.BadParameter(errorMessage) } return nil }
[ "func", "CheckVersions", "(", "clientVersion", "string", ",", "minClientVersion", "string", ")", "error", "{", "clientSemver", ",", "err", ":=", "semver", ".", "NewVersion", "(", "clientVersion", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ",", "clientVersion", ")", "\n", "}", "\n\n", "minClientSemver", ",", "err", ":=", "semver", ".", "NewVersion", "(", "minClientVersion", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ",", "minClientVersion", ")", "\n", "}", "\n\n", "if", "clientSemver", ".", "Compare", "(", "*", "minClientSemver", ")", "<", "0", "{", "errorMessage", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", "+", "\"", "\"", "+", "\"", "\"", ",", "minClientVersion", ")", "\n", "return", "trace", ".", "BadParameter", "(", "errorMessage", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckVersions compares client and server versions and makes sure that the // client version is greater than or equal to the minimum version supported // by the server.
[ "CheckVersions", "compares", "client", "and", "server", "versions", "and", "makes", "sure", "that", "the", "client", "version", "is", "greater", "than", "or", "equal", "to", "the", "minimum", "version", "supported", "by", "the", "server", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/ver.go#L30-L51
train
gravitational/teleport
lib/srv/exec.go
NewExecRequest
func NewExecRequest(ctx *ServerContext, command string) (Exec, error) { // It doesn't matter what mode the cluster is in, if this is a Teleport node // return a local *localExec. if ctx.srv.Component() == teleport.ComponentNode { return &localExec{ Ctx: ctx, Command: command, }, nil } // When in recording mode, return an *remoteExec which will execute the // command on a remote host. This is used by in-memory forwarding nodes. if ctx.ClusterConfig.GetSessionRecording() == services.RecordAtProxy { return &remoteExec{ ctx: ctx, command: command, session: ctx.RemoteSession, }, nil } // Otherwise return a *localExec which will execute locally on the server. // used by the regular Teleport nodes. return &localExec{ Ctx: ctx, Command: command, }, nil }
go
func NewExecRequest(ctx *ServerContext, command string) (Exec, error) { // It doesn't matter what mode the cluster is in, if this is a Teleport node // return a local *localExec. if ctx.srv.Component() == teleport.ComponentNode { return &localExec{ Ctx: ctx, Command: command, }, nil } // When in recording mode, return an *remoteExec which will execute the // command on a remote host. This is used by in-memory forwarding nodes. if ctx.ClusterConfig.GetSessionRecording() == services.RecordAtProxy { return &remoteExec{ ctx: ctx, command: command, session: ctx.RemoteSession, }, nil } // Otherwise return a *localExec which will execute locally on the server. // used by the regular Teleport nodes. return &localExec{ Ctx: ctx, Command: command, }, nil }
[ "func", "NewExecRequest", "(", "ctx", "*", "ServerContext", ",", "command", "string", ")", "(", "Exec", ",", "error", ")", "{", "// It doesn't matter what mode the cluster is in, if this is a Teleport node", "// return a local *localExec.", "if", "ctx", ".", "srv", ".", "Component", "(", ")", "==", "teleport", ".", "ComponentNode", "{", "return", "&", "localExec", "{", "Ctx", ":", "ctx", ",", "Command", ":", "command", ",", "}", ",", "nil", "\n", "}", "\n\n", "// When in recording mode, return an *remoteExec which will execute the", "// command on a remote host. This is used by in-memory forwarding nodes.", "if", "ctx", ".", "ClusterConfig", ".", "GetSessionRecording", "(", ")", "==", "services", ".", "RecordAtProxy", "{", "return", "&", "remoteExec", "{", "ctx", ":", "ctx", ",", "command", ":", "command", ",", "session", ":", "ctx", ".", "RemoteSession", ",", "}", ",", "nil", "\n", "}", "\n\n", "// Otherwise return a *localExec which will execute locally on the server.", "// used by the regular Teleport nodes.", "return", "&", "localExec", "{", "Ctx", ":", "ctx", ",", "Command", ":", "command", ",", "}", ",", "nil", "\n", "}" ]
// NewExecRequest creates a new local or remote Exec.
[ "NewExecRequest", "creates", "a", "new", "local", "or", "remote", "Exec", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/exec.go#L78-L104
train
gravitational/teleport
lib/srv/exec.go
Wait
func (e *localExec) Wait() (*ExecResult, error) { if e.Cmd.Process == nil { e.Ctx.Errorf("no process") } // wait for the command to complete, then figure out if the command // successfully exited or if it exited in failure execResult, err := collectLocalStatus(e.Cmd, e.Cmd.Wait()) // emit the result of execution to the audit log emitExecAuditEvent(e.Ctx, e.GetCommand(), execResult, err) return execResult, trace.Wrap(err) }
go
func (e *localExec) Wait() (*ExecResult, error) { if e.Cmd.Process == nil { e.Ctx.Errorf("no process") } // wait for the command to complete, then figure out if the command // successfully exited or if it exited in failure execResult, err := collectLocalStatus(e.Cmd, e.Cmd.Wait()) // emit the result of execution to the audit log emitExecAuditEvent(e.Ctx, e.GetCommand(), execResult, err) return execResult, trace.Wrap(err) }
[ "func", "(", "e", "*", "localExec", ")", "Wait", "(", ")", "(", "*", "ExecResult", ",", "error", ")", "{", "if", "e", ".", "Cmd", ".", "Process", "==", "nil", "{", "e", ".", "Ctx", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// wait for the command to complete, then figure out if the command", "// successfully exited or if it exited in failure", "execResult", ",", "err", ":=", "collectLocalStatus", "(", "e", ".", "Cmd", ",", "e", ".", "Cmd", ".", "Wait", "(", ")", ")", "\n\n", "// emit the result of execution to the audit log", "emitExecAuditEvent", "(", "e", ".", "Ctx", ",", "e", ".", "GetCommand", "(", ")", ",", "execResult", ",", "err", ")", "\n\n", "return", "execResult", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// Wait will block while the command executes.
[ "Wait", "will", "block", "while", "the", "command", "executes", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/exec.go#L175-L188
train
gravitational/teleport
lib/srv/exec.go
Wait
func (r *remoteExec) Wait() (*ExecResult, error) { // block until the command is finished and then figure out if the command // successfully exited or if it exited in failure execResult, err := r.collectRemoteStatus(r.session.Wait()) // emit the result of execution to the audit log emitExecAuditEvent(r.ctx, r.command, execResult, err) return execResult, trace.Wrap(err) }
go
func (r *remoteExec) Wait() (*ExecResult, error) { // block until the command is finished and then figure out if the command // successfully exited or if it exited in failure execResult, err := r.collectRemoteStatus(r.session.Wait()) // emit the result of execution to the audit log emitExecAuditEvent(r.ctx, r.command, execResult, err) return execResult, trace.Wrap(err) }
[ "func", "(", "r", "*", "remoteExec", ")", "Wait", "(", ")", "(", "*", "ExecResult", ",", "error", ")", "{", "// block until the command is finished and then figure out if the command", "// successfully exited or if it exited in failure", "execResult", ",", "err", ":=", "r", ".", "collectRemoteStatus", "(", "r", ".", "session", ".", "Wait", "(", ")", ")", "\n\n", "// emit the result of execution to the audit log", "emitExecAuditEvent", "(", "r", ".", "ctx", ",", "r", ".", "command", ",", "execResult", ",", "err", ")", "\n\n", "return", "execResult", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// Wait will block while the command executes then return the result as well // as emit an event to the Audit Log.
[ "Wait", "will", "block", "while", "the", "command", "executes", "then", "return", "the", "result", "as", "well", "as", "emit", "an", "event", "to", "the", "Audit", "Log", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/exec.go#L448-L457
train
gravitational/teleport
lib/srv/exec.go
parseSecureCopy
func parseSecureCopy(path string) (string, string, bool, error) { parts := strings.Fields(path) if len(parts) == 0 { return "", "", false, trace.BadParameter("no executable found") } // Look for the -t flag, it indicates that an upload occurred. The other // flags do no matter for now. action := events.SCPActionDownload if utils.SliceContainsStr(parts, "-t") { action = events.SCPActionUpload } // Exract the name of the Teleport executable on disk. teleportPath, err := os.Executable() if err != nil { return "", "", false, trace.Wrap(err) } _, teleportBinary := filepath.Split(teleportPath) // Extract the name of the executable that was run. The command was secure // copy if the executable was "scp" or "teleport". _, executable := filepath.Split(parts[0]) switch executable { case teleport.SCP, teleportBinary: return parts[len(parts)-1], action, true, nil default: return "", "", false, nil } }
go
func parseSecureCopy(path string) (string, string, bool, error) { parts := strings.Fields(path) if len(parts) == 0 { return "", "", false, trace.BadParameter("no executable found") } // Look for the -t flag, it indicates that an upload occurred. The other // flags do no matter for now. action := events.SCPActionDownload if utils.SliceContainsStr(parts, "-t") { action = events.SCPActionUpload } // Exract the name of the Teleport executable on disk. teleportPath, err := os.Executable() if err != nil { return "", "", false, trace.Wrap(err) } _, teleportBinary := filepath.Split(teleportPath) // Extract the name of the executable that was run. The command was secure // copy if the executable was "scp" or "teleport". _, executable := filepath.Split(parts[0]) switch executable { case teleport.SCP, teleportBinary: return parts[len(parts)-1], action, true, nil default: return "", "", false, nil } }
[ "func", "parseSecureCopy", "(", "path", "string", ")", "(", "string", ",", "string", ",", "bool", ",", "error", ")", "{", "parts", ":=", "strings", ".", "Fields", "(", "path", ")", "\n", "if", "len", "(", "parts", ")", "==", "0", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "false", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// Look for the -t flag, it indicates that an upload occurred. The other", "// flags do no matter for now.", "action", ":=", "events", ".", "SCPActionDownload", "\n", "if", "utils", ".", "SliceContainsStr", "(", "parts", ",", "\"", "\"", ")", "{", "action", "=", "events", ".", "SCPActionUpload", "\n", "}", "\n\n", "// Exract the name of the Teleport executable on disk.", "teleportPath", ",", "err", ":=", "os", ".", "Executable", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "false", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "teleportBinary", ":=", "filepath", ".", "Split", "(", "teleportPath", ")", "\n\n", "// Extract the name of the executable that was run. The command was secure", "// copy if the executable was \"scp\" or \"teleport\".", "_", ",", "executable", ":=", "filepath", ".", "Split", "(", "parts", "[", "0", "]", ")", "\n", "switch", "executable", "{", "case", "teleport", ".", "SCP", ",", "teleportBinary", ":", "return", "parts", "[", "len", "(", "parts", ")", "-", "1", "]", ",", "action", ",", "true", ",", "nil", "\n", "default", ":", "return", "\"", "\"", ",", "\"", "\"", ",", "false", ",", "nil", "\n", "}", "\n", "}" ]
// parseSecureCopy will parse a command and return if it's secure copy or not.
[ "parseSecureCopy", "will", "parse", "a", "command", "and", "return", "if", "it", "s", "secure", "copy", "or", "not", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/exec.go#L602-L631
train
gravitational/teleport
lib/client/identity.go
MakeIdentityFile
func MakeIdentityFile(filePath string, key *Key, format IdentityFileFormat, certAuthorities []services.CertAuthority) (err error) { const ( // the files and the dir will be created with these permissions: fileMode = 0600 dirMode = 0700 ) if filePath == "" { return trace.BadParameter("identity location is not specified") } var output io.Writer = os.Stdout switch format { // dump user identity into a single file: case IdentityFormatFile: f, err := os.OpenFile(filePath, os.O_CREATE|os.O_WRONLY, fileMode) if err != nil { return trace.Wrap(err) } output = f defer f.Close() // write key: if _, err = output.Write(key.Priv); err != nil { return trace.Wrap(err) } // append cert: if _, err = output.Write(key.Cert); err != nil { return trace.Wrap(err) } // append trusted host certificate authorities for _, ca := range certAuthorities { for _, publicKey := range ca.GetCheckingKeys() { data, err := sshutils.MarshalAuthorizedHostsFormat(ca.GetClusterName(), publicKey, nil) if err != nil { return trace.Wrap(err) } if _, err = output.Write([]byte(data)); err != nil { return trace.Wrap(err) } if _, err = output.Write([]byte("\n")); err != nil { return trace.Wrap(err) } } } // dump user identity into separate files: case IdentityFormatOpenSSH: keyPath := filePath certPath := keyPath + "-cert.pub" err = ioutil.WriteFile(certPath, key.Cert, fileMode) if err != nil { return trace.Wrap(err) } err = ioutil.WriteFile(keyPath, key.Priv, fileMode) if err != nil { return trace.Wrap(err) } default: return trace.BadParameter("unsupported identity format: %q, use either %q or %q", format, IdentityFormatFile, IdentityFormatOpenSSH) } return nil }
go
func MakeIdentityFile(filePath string, key *Key, format IdentityFileFormat, certAuthorities []services.CertAuthority) (err error) { const ( // the files and the dir will be created with these permissions: fileMode = 0600 dirMode = 0700 ) if filePath == "" { return trace.BadParameter("identity location is not specified") } var output io.Writer = os.Stdout switch format { // dump user identity into a single file: case IdentityFormatFile: f, err := os.OpenFile(filePath, os.O_CREATE|os.O_WRONLY, fileMode) if err != nil { return trace.Wrap(err) } output = f defer f.Close() // write key: if _, err = output.Write(key.Priv); err != nil { return trace.Wrap(err) } // append cert: if _, err = output.Write(key.Cert); err != nil { return trace.Wrap(err) } // append trusted host certificate authorities for _, ca := range certAuthorities { for _, publicKey := range ca.GetCheckingKeys() { data, err := sshutils.MarshalAuthorizedHostsFormat(ca.GetClusterName(), publicKey, nil) if err != nil { return trace.Wrap(err) } if _, err = output.Write([]byte(data)); err != nil { return trace.Wrap(err) } if _, err = output.Write([]byte("\n")); err != nil { return trace.Wrap(err) } } } // dump user identity into separate files: case IdentityFormatOpenSSH: keyPath := filePath certPath := keyPath + "-cert.pub" err = ioutil.WriteFile(certPath, key.Cert, fileMode) if err != nil { return trace.Wrap(err) } err = ioutil.WriteFile(keyPath, key.Priv, fileMode) if err != nil { return trace.Wrap(err) } default: return trace.BadParameter("unsupported identity format: %q, use either %q or %q", format, IdentityFormatFile, IdentityFormatOpenSSH) } return nil }
[ "func", "MakeIdentityFile", "(", "filePath", "string", ",", "key", "*", "Key", ",", "format", "IdentityFileFormat", ",", "certAuthorities", "[", "]", "services", ".", "CertAuthority", ")", "(", "err", "error", ")", "{", "const", "(", "// the files and the dir will be created with these permissions:", "fileMode", "=", "0600", "\n", "dirMode", "=", "0700", "\n", ")", "\n\n", "if", "filePath", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "var", "output", "io", ".", "Writer", "=", "os", ".", "Stdout", "\n", "switch", "format", "{", "// dump user identity into a single file:", "case", "IdentityFormatFile", ":", "f", ",", "err", ":=", "os", ".", "OpenFile", "(", "filePath", ",", "os", ".", "O_CREATE", "|", "os", ".", "O_WRONLY", ",", "fileMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "output", "=", "f", "\n", "defer", "f", ".", "Close", "(", ")", "\n\n", "// write key:", "if", "_", ",", "err", "=", "output", ".", "Write", "(", "key", ".", "Priv", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// append cert:", "if", "_", ",", "err", "=", "output", ".", "Write", "(", "key", ".", "Cert", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// append trusted host certificate authorities", "for", "_", ",", "ca", ":=", "range", "certAuthorities", "{", "for", "_", ",", "publicKey", ":=", "range", "ca", ".", "GetCheckingKeys", "(", ")", "{", "data", ",", "err", ":=", "sshutils", ".", "MarshalAuthorizedHostsFormat", "(", "ca", ".", "GetClusterName", "(", ")", ",", "publicKey", ",", "nil", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "_", ",", "err", "=", "output", ".", "Write", "(", "[", "]", "byte", "(", "data", ")", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "_", ",", "err", "=", "output", ".", "Write", "(", "[", "]", "byte", "(", "\"", "\\n", "\"", ")", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "// dump user identity into separate files:", "case", "IdentityFormatOpenSSH", ":", "keyPath", ":=", "filePath", "\n", "certPath", ":=", "keyPath", "+", "\"", "\"", "\n\n", "err", "=", "ioutil", ".", "WriteFile", "(", "certPath", ",", "key", ".", "Cert", ",", "fileMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "err", "=", "ioutil", ".", "WriteFile", "(", "keyPath", ",", "key", ".", "Priv", ",", "fileMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "default", ":", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "format", ",", "IdentityFormatFile", ",", "IdentityFormatOpenSSH", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// MakeIdentityFile takes a username + their credentials and saves them to disk // in a specified format
[ "MakeIdentityFile", "takes", "a", "username", "+", "their", "credentials", "and", "saves", "them", "to", "disk", "in", "a", "specified", "format" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/identity.go#L62-L127
train
gravitational/teleport
lib/events/filesessions/fileuploader.go
CheckAndSetDefaults
func (s *Config) CheckAndSetDefaults() error { if s.Directory == "" { return trace.BadParameter("missing parameter Directory") } if !utils.IsDir(s.Directory) { return trace.BadParameter("path %q does not exist or is not a directory", s.Directory) } return nil }
go
func (s *Config) CheckAndSetDefaults() error { if s.Directory == "" { return trace.BadParameter("missing parameter Directory") } if !utils.IsDir(s.Directory) { return trace.BadParameter("path %q does not exist or is not a directory", s.Directory) } return nil }
[ "func", "(", "s", "*", "Config", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "s", ".", "Directory", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "!", "utils", ".", "IsDir", "(", "s", ".", "Directory", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "s", ".", "Directory", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default values of file handler config
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "values", "of", "file", "handler", "config" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/filesessions/fileuploader.go#L41-L49
train
gravitational/teleport
lib/events/filesessions/fileuploader.go
NewHandler
func NewHandler(cfg Config) (*Handler, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } h := &Handler{ Entry: log.WithFields(log.Fields{ trace.Component: teleport.Component(teleport.SchemeFile), }), Config: cfg, } return h, nil }
go
func NewHandler(cfg Config) (*Handler, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } h := &Handler{ Entry: log.WithFields(log.Fields{ trace.Component: teleport.Component(teleport.SchemeFile), }), Config: cfg, } return h, nil }
[ "func", "NewHandler", "(", "cfg", "Config", ")", "(", "*", "Handler", ",", "error", ")", "{", "if", "err", ":=", "cfg", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "h", ":=", "&", "Handler", "{", "Entry", ":", "log", ".", "WithFields", "(", "log", ".", "Fields", "{", "trace", ".", "Component", ":", "teleport", ".", "Component", "(", "teleport", ".", "SchemeFile", ")", ",", "}", ")", ",", "Config", ":", "cfg", ",", "}", "\n", "return", "h", ",", "nil", "\n", "}" ]
// NewHandler returns new file sessions handler
[ "NewHandler", "returns", "new", "file", "sessions", "handler" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/filesessions/fileuploader.go#L52-L64
train
gravitational/teleport
lib/events/filesessions/fileuploader.go
Download
func (l *Handler) Download(ctx context.Context, sessionID session.ID, writer io.WriterAt) error { path := l.path(sessionID) _, err := os.Stat(filepath.Dir(path)) f, err := os.Open(path) if err != nil { return trace.ConvertSystemError(err) } defer f.Close() _, err = io.Copy(writer.(io.Writer), f) if err != nil { return trace.Wrap(err) } return nil }
go
func (l *Handler) Download(ctx context.Context, sessionID session.ID, writer io.WriterAt) error { path := l.path(sessionID) _, err := os.Stat(filepath.Dir(path)) f, err := os.Open(path) if err != nil { return trace.ConvertSystemError(err) } defer f.Close() _, err = io.Copy(writer.(io.Writer), f) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "l", "*", "Handler", ")", "Download", "(", "ctx", "context", ".", "Context", ",", "sessionID", "session", ".", "ID", ",", "writer", "io", ".", "WriterAt", ")", "error", "{", "path", ":=", "l", ".", "path", "(", "sessionID", ")", "\n", "_", ",", "err", ":=", "os", ".", "Stat", "(", "filepath", ".", "Dir", "(", "path", ")", ")", "\n", "f", ",", "err", ":=", "os", ".", "Open", "(", "path", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "defer", "f", ".", "Close", "(", ")", "\n", "_", ",", "err", "=", "io", ".", "Copy", "(", "writer", ".", "(", "io", ".", "Writer", ")", ",", "f", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Download downloads session recording from storage, in case of file handler reads the // file from local directory
[ "Download", "downloads", "session", "recording", "from", "storage", "in", "case", "of", "file", "handler", "reads", "the", "file", "from", "local", "directory" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/filesessions/fileuploader.go#L82-L95
train
gravitational/teleport
lib/events/filesessions/fileuploader.go
Upload
func (l *Handler) Upload(ctx context.Context, sessionID session.ID, reader io.Reader) (string, error) { path := l.path(sessionID) f, err := os.Create(path) if err != nil { return "", trace.ConvertSystemError(err) } defer f.Close() _, err = io.Copy(f, reader) if err != nil { return "", trace.Wrap(err) } return fmt.Sprintf("%v://%v", teleport.SchemeFile, path), nil }
go
func (l *Handler) Upload(ctx context.Context, sessionID session.ID, reader io.Reader) (string, error) { path := l.path(sessionID) f, err := os.Create(path) if err != nil { return "", trace.ConvertSystemError(err) } defer f.Close() _, err = io.Copy(f, reader) if err != nil { return "", trace.Wrap(err) } return fmt.Sprintf("%v://%v", teleport.SchemeFile, path), nil }
[ "func", "(", "l", "*", "Handler", ")", "Upload", "(", "ctx", "context", ".", "Context", ",", "sessionID", "session", ".", "ID", ",", "reader", "io", ".", "Reader", ")", "(", "string", ",", "error", ")", "{", "path", ":=", "l", ".", "path", "(", "sessionID", ")", "\n", "f", ",", "err", ":=", "os", ".", "Create", "(", "path", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "defer", "f", ".", "Close", "(", ")", "\n", "_", ",", "err", "=", "io", ".", "Copy", "(", "f", ",", "reader", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "teleport", ".", "SchemeFile", ",", "path", ")", ",", "nil", "\n", "}" ]
// Upload uploads session recording to file storage, in case of file handler, // writes the file to local directory
[ "Upload", "uploads", "session", "recording", "to", "file", "storage", "in", "case", "of", "file", "handler", "writes", "the", "file", "to", "local", "directory" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/filesessions/fileuploader.go#L99-L111
train
gravitational/teleport
tool/tctl/common/token_command.go
List
func (c *TokenCommand) List(client auth.ClientI) error { tokens, err := client.GetTokens() if err != nil { return trace.Wrap(err) } if len(tokens) == 0 { fmt.Println("No active tokens found.") return nil } // Sort by expire time. sort.Slice(tokens, func(i, j int) bool { return tokens[i].Expiry().Unix() < tokens[j].Expiry().Unix() }) if c.format == teleport.Text { tokensView := func() string { table := asciitable.MakeTable([]string{"Token", "Type", "Expiry Time (UTC)"}) for _, t := range tokens { expiry := "never" if t.Expiry().Unix() > 0 { expiry = t.Expiry().Format(time.RFC822) } table.AddRow([]string{t.GetName(), t.GetRoles().String(), expiry}) } return table.AsBuffer().String() } fmt.Printf(tokensView()) } else { data, err := json.MarshalIndent(tokens, "", " ") if err != nil { return trace.Wrap(err, "failed to marshal tokens") } fmt.Printf(string(data)) } return nil }
go
func (c *TokenCommand) List(client auth.ClientI) error { tokens, err := client.GetTokens() if err != nil { return trace.Wrap(err) } if len(tokens) == 0 { fmt.Println("No active tokens found.") return nil } // Sort by expire time. sort.Slice(tokens, func(i, j int) bool { return tokens[i].Expiry().Unix() < tokens[j].Expiry().Unix() }) if c.format == teleport.Text { tokensView := func() string { table := asciitable.MakeTable([]string{"Token", "Type", "Expiry Time (UTC)"}) for _, t := range tokens { expiry := "never" if t.Expiry().Unix() > 0 { expiry = t.Expiry().Format(time.RFC822) } table.AddRow([]string{t.GetName(), t.GetRoles().String(), expiry}) } return table.AsBuffer().String() } fmt.Printf(tokensView()) } else { data, err := json.MarshalIndent(tokens, "", " ") if err != nil { return trace.Wrap(err, "failed to marshal tokens") } fmt.Printf(string(data)) } return nil }
[ "func", "(", "c", "*", "TokenCommand", ")", "List", "(", "client", "auth", ".", "ClientI", ")", "error", "{", "tokens", ",", "err", ":=", "client", ".", "GetTokens", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "len", "(", "tokens", ")", "==", "0", "{", "fmt", ".", "Println", "(", "\"", "\"", ")", "\n", "return", "nil", "\n", "}", "\n\n", "// Sort by expire time.", "sort", ".", "Slice", "(", "tokens", ",", "func", "(", "i", ",", "j", "int", ")", "bool", "{", "return", "tokens", "[", "i", "]", ".", "Expiry", "(", ")", ".", "Unix", "(", ")", "<", "tokens", "[", "j", "]", ".", "Expiry", "(", ")", ".", "Unix", "(", ")", "}", ")", "\n\n", "if", "c", ".", "format", "==", "teleport", ".", "Text", "{", "tokensView", ":=", "func", "(", ")", "string", "{", "table", ":=", "asciitable", ".", "MakeTable", "(", "[", "]", "string", "{", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", "}", ")", "\n", "for", "_", ",", "t", ":=", "range", "tokens", "{", "expiry", ":=", "\"", "\"", "\n", "if", "t", ".", "Expiry", "(", ")", ".", "Unix", "(", ")", ">", "0", "{", "expiry", "=", "t", ".", "Expiry", "(", ")", ".", "Format", "(", "time", ".", "RFC822", ")", "\n", "}", "\n", "table", ".", "AddRow", "(", "[", "]", "string", "{", "t", ".", "GetName", "(", ")", ",", "t", ".", "GetRoles", "(", ")", ".", "String", "(", ")", ",", "expiry", "}", ")", "\n", "}", "\n", "return", "table", ".", "AsBuffer", "(", ")", ".", "String", "(", ")", "\n", "}", "\n", "fmt", ".", "Printf", "(", "tokensView", "(", ")", ")", "\n", "}", "else", "{", "data", ",", "err", ":=", "json", ".", "MarshalIndent", "(", "tokens", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "fmt", ".", "Printf", "(", "string", "(", "data", ")", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// List is called to execute "tokens ls" command.
[ "List", "is", "called", "to", "execute", "tokens", "ls", "command", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/token_command.go#L173-L207
train
gravitational/teleport
tool/tctl/common/token_command.go
calculateCAPin
func calculateCAPin(client auth.ClientI) (string, error) { localCA, err := client.GetClusterCACert() if err != nil { return "", trace.Wrap(err) } tlsCA, err := tlsca.ParseCertificatePEM(localCA.TLSCA) if err != nil { return "", trace.Wrap(err) } return utils.CalculateSPKI(tlsCA), nil }
go
func calculateCAPin(client auth.ClientI) (string, error) { localCA, err := client.GetClusterCACert() if err != nil { return "", trace.Wrap(err) } tlsCA, err := tlsca.ParseCertificatePEM(localCA.TLSCA) if err != nil { return "", trace.Wrap(err) } return utils.CalculateSPKI(tlsCA), nil }
[ "func", "calculateCAPin", "(", "client", "auth", ".", "ClientI", ")", "(", "string", ",", "error", ")", "{", "localCA", ",", "err", ":=", "client", ".", "GetClusterCACert", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tlsCA", ",", "err", ":=", "tlsca", ".", "ParseCertificatePEM", "(", "localCA", ".", "TLSCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "utils", ".", "CalculateSPKI", "(", "tlsCA", ")", ",", "nil", "\n", "}" ]
// calculateCAPin returns the SPKI pin for the local cluster.
[ "calculateCAPin", "returns", "the", "SPKI", "pin", "for", "the", "local", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/token_command.go#L210-L221
train
gravitational/teleport
lib/backend/sanitize.go
isKeySafe
func isKeySafe(s []byte) bool { return whitelistPattern.Match(s) && !blacklistPattern.Match(s) }
go
func isKeySafe(s []byte) bool { return whitelistPattern.Match(s) && !blacklistPattern.Match(s) }
[ "func", "isKeySafe", "(", "s", "[", "]", "byte", ")", "bool", "{", "return", "whitelistPattern", ".", "Match", "(", "s", ")", "&&", "!", "blacklistPattern", ".", "Match", "(", "s", ")", "\n", "}" ]
// isKeySafe checks if the passed in key conforms to whitelist
[ "isKeySafe", "checks", "if", "the", "passed", "in", "key", "conforms", "to", "whitelist" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/sanitize.go#L40-L42
train
gravitational/teleport
lib/client/weblogin.go
Check
func (r SSOLoginConsoleReq) Check() error { if r.RedirectURL == "" { return trace.BadParameter("missing RedirectURL") } if len(r.PublicKey) == 0 { return trace.BadParameter("missing PublicKey") } if r.ConnectorID == "" { return trace.BadParameter("missing ConnectorID") } return nil }
go
func (r SSOLoginConsoleReq) Check() error { if r.RedirectURL == "" { return trace.BadParameter("missing RedirectURL") } if len(r.PublicKey) == 0 { return trace.BadParameter("missing PublicKey") } if r.ConnectorID == "" { return trace.BadParameter("missing ConnectorID") } return nil }
[ "func", "(", "r", "SSOLoginConsoleReq", ")", "Check", "(", ")", "error", "{", "if", "r", ".", "RedirectURL", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "r", ".", "PublicKey", ")", "==", "0", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "r", ".", "ConnectorID", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Check makes sure that the request is valid
[ "Check", "makes", "sure", "that", "the", "request", "is", "valid" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/weblogin.go#L60-L71
train
gravitational/teleport
lib/client/weblogin.go
NewCredentialsClient
func NewCredentialsClient(proxyAddr string, insecure bool, pool *x509.CertPool) (*CredentialsClient, error) { log := logrus.WithFields(logrus.Fields{ trace.Component: teleport.ComponentClient, }) log.Debugf("HTTPS client init(proxyAddr=%v, insecure=%v)", proxyAddr, insecure) // validate proxyAddr: host, port, err := net.SplitHostPort(proxyAddr) if err != nil || host == "" || port == "" { if err != nil { log.Error(err) } return nil, trace.BadParameter("'%v' is not a valid proxy address", proxyAddr) } proxyAddr = "https://" + net.JoinHostPort(host, port) u, err := url.Parse(proxyAddr) if err != nil { return nil, trace.BadParameter("'%v' is not a valid proxy address", proxyAddr) } var opts []roundtrip.ClientParam if insecure { // Skip https cert verification, print a warning that this is insecure. fmt.Printf("WARNING: You are using insecure connection to SSH proxy %v\n", proxyAddr) opts = append(opts, roundtrip.HTTPClient(NewInsecureWebClient())) } else if pool != nil { // use custom set of trusted CAs opts = append(opts, roundtrip.HTTPClient(newClientWithPool(pool))) } clt, err := NewWebClient(proxyAddr, opts...) if err != nil { return nil, trace.Wrap(err) } return &CredentialsClient{ log: log, clt: clt, url: u, }, nil }
go
func NewCredentialsClient(proxyAddr string, insecure bool, pool *x509.CertPool) (*CredentialsClient, error) { log := logrus.WithFields(logrus.Fields{ trace.Component: teleport.ComponentClient, }) log.Debugf("HTTPS client init(proxyAddr=%v, insecure=%v)", proxyAddr, insecure) // validate proxyAddr: host, port, err := net.SplitHostPort(proxyAddr) if err != nil || host == "" || port == "" { if err != nil { log.Error(err) } return nil, trace.BadParameter("'%v' is not a valid proxy address", proxyAddr) } proxyAddr = "https://" + net.JoinHostPort(host, port) u, err := url.Parse(proxyAddr) if err != nil { return nil, trace.BadParameter("'%v' is not a valid proxy address", proxyAddr) } var opts []roundtrip.ClientParam if insecure { // Skip https cert verification, print a warning that this is insecure. fmt.Printf("WARNING: You are using insecure connection to SSH proxy %v\n", proxyAddr) opts = append(opts, roundtrip.HTTPClient(NewInsecureWebClient())) } else if pool != nil { // use custom set of trusted CAs opts = append(opts, roundtrip.HTTPClient(newClientWithPool(pool))) } clt, err := NewWebClient(proxyAddr, opts...) if err != nil { return nil, trace.Wrap(err) } return &CredentialsClient{ log: log, clt: clt, url: u, }, nil }
[ "func", "NewCredentialsClient", "(", "proxyAddr", "string", ",", "insecure", "bool", ",", "pool", "*", "x509", ".", "CertPool", ")", "(", "*", "CredentialsClient", ",", "error", ")", "{", "log", ":=", "logrus", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "trace", ".", "Component", ":", "teleport", ".", "ComponentClient", ",", "}", ")", "\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "proxyAddr", ",", "insecure", ")", "\n\n", "// validate proxyAddr:", "host", ",", "port", ",", "err", ":=", "net", ".", "SplitHostPort", "(", "proxyAddr", ")", "\n", "if", "err", "!=", "nil", "||", "host", "==", "\"", "\"", "||", "port", "==", "\"", "\"", "{", "if", "err", "!=", "nil", "{", "log", ".", "Error", "(", "err", ")", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "proxyAddr", ")", "\n", "}", "\n", "proxyAddr", "=", "\"", "\"", "+", "net", ".", "JoinHostPort", "(", "host", ",", "port", ")", "\n", "u", ",", "err", ":=", "url", ".", "Parse", "(", "proxyAddr", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "proxyAddr", ")", "\n", "}", "\n\n", "var", "opts", "[", "]", "roundtrip", ".", "ClientParam", "\n\n", "if", "insecure", "{", "// Skip https cert verification, print a warning that this is insecure.", "fmt", ".", "Printf", "(", "\"", "\\n", "\"", ",", "proxyAddr", ")", "\n", "opts", "=", "append", "(", "opts", ",", "roundtrip", ".", "HTTPClient", "(", "NewInsecureWebClient", "(", ")", ")", ")", "\n", "}", "else", "if", "pool", "!=", "nil", "{", "// use custom set of trusted CAs", "opts", "=", "append", "(", "opts", ",", "roundtrip", ".", "HTTPClient", "(", "newClientWithPool", "(", "pool", ")", ")", ")", "\n", "}", "\n\n", "clt", ",", "err", ":=", "NewWebClient", "(", "proxyAddr", ",", "opts", "...", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "&", "CredentialsClient", "{", "log", ":", "log", ",", "clt", ":", "clt", ",", "url", ":", "u", ",", "}", ",", "nil", "\n", "}" ]
// NewCredentialsClient creates a new client to the HTTPS web proxy.
[ "NewCredentialsClient", "creates", "a", "new", "client", "to", "the", "HTTPS", "web", "proxy", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/weblogin.go#L253-L294
train
gravitational/teleport
lib/client/weblogin.go
SSHAgentLogin
func (c *CredentialsClient) SSHAgentLogin(ctx context.Context, user string, password string, otpToken string, pubKey []byte, ttl time.Duration, compatibility string) (*auth.SSHLoginResponse, error) { re, err := c.clt.PostJSON(ctx, c.clt.Endpoint("webapi", "ssh", "certs"), CreateSSHCertReq{ User: user, Password: password, OTPToken: otpToken, PubKey: pubKey, TTL: ttl, Compatibility: compatibility, }) if err != nil { return nil, trace.Wrap(err) } var out *auth.SSHLoginResponse err = json.Unmarshal(re.Bytes(), &out) if err != nil { return nil, trace.Wrap(err) } return out, nil }
go
func (c *CredentialsClient) SSHAgentLogin(ctx context.Context, user string, password string, otpToken string, pubKey []byte, ttl time.Duration, compatibility string) (*auth.SSHLoginResponse, error) { re, err := c.clt.PostJSON(ctx, c.clt.Endpoint("webapi", "ssh", "certs"), CreateSSHCertReq{ User: user, Password: password, OTPToken: otpToken, PubKey: pubKey, TTL: ttl, Compatibility: compatibility, }) if err != nil { return nil, trace.Wrap(err) } var out *auth.SSHLoginResponse err = json.Unmarshal(re.Bytes(), &out) if err != nil { return nil, trace.Wrap(err) } return out, nil }
[ "func", "(", "c", "*", "CredentialsClient", ")", "SSHAgentLogin", "(", "ctx", "context", ".", "Context", ",", "user", "string", ",", "password", "string", ",", "otpToken", "string", ",", "pubKey", "[", "]", "byte", ",", "ttl", "time", ".", "Duration", ",", "compatibility", "string", ")", "(", "*", "auth", ".", "SSHLoginResponse", ",", "error", ")", "{", "re", ",", "err", ":=", "c", ".", "clt", ".", "PostJSON", "(", "ctx", ",", "c", ".", "clt", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "CreateSSHCertReq", "{", "User", ":", "user", ",", "Password", ":", "password", ",", "OTPToken", ":", "otpToken", ",", "PubKey", ":", "pubKey", ",", "TTL", ":", "ttl", ",", "Compatibility", ":", "compatibility", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "var", "out", "*", "auth", ".", "SSHLoginResponse", "\n", "err", "=", "json", ".", "Unmarshal", "(", "re", ".", "Bytes", "(", ")", ",", "&", "out", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "out", ",", "nil", "\n", "}" ]
// SSHAgentLogin is used by tsh to fetch local user credentials.
[ "SSHAgentLogin", "is", "used", "by", "tsh", "to", "fetch", "local", "user", "credentials", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/weblogin.go#L400-L420
train
gravitational/teleport
lib/client/weblogin.go
HostCredentials
func (c *CredentialsClient) HostCredentials(ctx context.Context, req auth.RegisterUsingTokenRequest) (*auth.PackedKeys, error) { resp, err := c.clt.PostJSON(ctx, c.clt.Endpoint("webapi", "host", "credentials"), req) if err != nil { return nil, trace.Wrap(err) } var packedKeys *auth.PackedKeys err = json.Unmarshal(resp.Bytes(), &packedKeys) if err != nil { return nil, trace.Wrap(err) } return packedKeys, nil }
go
func (c *CredentialsClient) HostCredentials(ctx context.Context, req auth.RegisterUsingTokenRequest) (*auth.PackedKeys, error) { resp, err := c.clt.PostJSON(ctx, c.clt.Endpoint("webapi", "host", "credentials"), req) if err != nil { return nil, trace.Wrap(err) } var packedKeys *auth.PackedKeys err = json.Unmarshal(resp.Bytes(), &packedKeys) if err != nil { return nil, trace.Wrap(err) } return packedKeys, nil }
[ "func", "(", "c", "*", "CredentialsClient", ")", "HostCredentials", "(", "ctx", "context", ".", "Context", ",", "req", "auth", ".", "RegisterUsingTokenRequest", ")", "(", "*", "auth", ".", "PackedKeys", ",", "error", ")", "{", "resp", ",", "err", ":=", "c", ".", "clt", ".", "PostJSON", "(", "ctx", ",", "c", ".", "clt", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "var", "packedKeys", "*", "auth", ".", "PackedKeys", "\n", "err", "=", "json", ".", "Unmarshal", "(", "resp", ".", "Bytes", "(", ")", ",", "&", "packedKeys", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "packedKeys", ",", "nil", "\n", "}" ]
// HostCredentials is used to fetch host credentials for a node.
[ "HostCredentials", "is", "used", "to", "fetch", "host", "credentials", "for", "a", "node", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/weblogin.go#L508-L521
train
gravitational/teleport
lib/services/local/access.go
DeleteAllRoles
func (s *AccessService) DeleteAllRoles() error { return s.DeleteRange(context.TODO(), backend.Key(rolesPrefix), backend.RangeEnd(backend.Key(rolesPrefix))) }
go
func (s *AccessService) DeleteAllRoles() error { return s.DeleteRange(context.TODO(), backend.Key(rolesPrefix), backend.RangeEnd(backend.Key(rolesPrefix))) }
[ "func", "(", "s", "*", "AccessService", ")", "DeleteAllRoles", "(", ")", "error", "{", "return", "s", ".", "DeleteRange", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "rolesPrefix", ")", ",", "backend", ".", "RangeEnd", "(", "backend", ".", "Key", "(", "rolesPrefix", ")", ")", ")", "\n", "}" ]
// DeleteAllRoles deletes all roles
[ "DeleteAllRoles", "deletes", "all", "roles" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/access.go#L40-L42
train
gravitational/teleport
lib/services/local/access.go
GetRoles
func (s *AccessService) GetRoles() ([]services.Role, error) { result, err := s.GetRange(context.TODO(), backend.Key(rolesPrefix), backend.RangeEnd(backend.Key(rolesPrefix)), backend.NoLimit) if err != nil { return nil, trace.Wrap(err) } out := make([]services.Role, 0, len(result.Items)) for _, item := range result.Items { role, err := services.GetRoleMarshaler().UnmarshalRole(item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires)) if err != nil { return nil, trace.Wrap(err) } out = append(out, role) } sort.Sort(services.SortedRoles(out)) return out, nil }
go
func (s *AccessService) GetRoles() ([]services.Role, error) { result, err := s.GetRange(context.TODO(), backend.Key(rolesPrefix), backend.RangeEnd(backend.Key(rolesPrefix)), backend.NoLimit) if err != nil { return nil, trace.Wrap(err) } out := make([]services.Role, 0, len(result.Items)) for _, item := range result.Items { role, err := services.GetRoleMarshaler().UnmarshalRole(item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires)) if err != nil { return nil, trace.Wrap(err) } out = append(out, role) } sort.Sort(services.SortedRoles(out)) return out, nil }
[ "func", "(", "s", "*", "AccessService", ")", "GetRoles", "(", ")", "(", "[", "]", "services", ".", "Role", ",", "error", ")", "{", "result", ",", "err", ":=", "s", ".", "GetRange", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "rolesPrefix", ")", ",", "backend", ".", "RangeEnd", "(", "backend", ".", "Key", "(", "rolesPrefix", ")", ")", ",", "backend", ".", "NoLimit", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", ":=", "make", "(", "[", "]", "services", ".", "Role", ",", "0", ",", "len", "(", "result", ".", "Items", ")", ")", "\n", "for", "_", ",", "item", ":=", "range", "result", ".", "Items", "{", "role", ",", "err", ":=", "services", ".", "GetRoleMarshaler", "(", ")", ".", "UnmarshalRole", "(", "item", ".", "Value", ",", "services", ".", "WithResourceID", "(", "item", ".", "ID", ")", ",", "services", ".", "WithExpires", "(", "item", ".", "Expires", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", "=", "append", "(", "out", ",", "role", ")", "\n", "}", "\n", "sort", ".", "Sort", "(", "services", ".", "SortedRoles", "(", "out", ")", ")", "\n", "return", "out", ",", "nil", "\n", "}" ]
// GetRoles returns a list of roles registered with the local auth server
[ "GetRoles", "returns", "a", "list", "of", "roles", "registered", "with", "the", "local", "auth", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/access.go#L45-L61
train
gravitational/teleport
lib/services/local/access.go
CreateRole
func (s *AccessService) CreateRole(role services.Role) error { value, err := services.GetRoleMarshaler().MarshalRole(role) if err != nil { return trace.Wrap(err) } item := backend.Item{ Key: backend.Key(rolesPrefix, role.GetName(), paramsPrefix), Value: value, Expires: role.Expiry(), } _, err = s.Create(context.TODO(), item) if err != nil { return trace.Wrap(err) } return nil }
go
func (s *AccessService) CreateRole(role services.Role) error { value, err := services.GetRoleMarshaler().MarshalRole(role) if err != nil { return trace.Wrap(err) } item := backend.Item{ Key: backend.Key(rolesPrefix, role.GetName(), paramsPrefix), Value: value, Expires: role.Expiry(), } _, err = s.Create(context.TODO(), item) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "s", "*", "AccessService", ")", "CreateRole", "(", "role", "services", ".", "Role", ")", "error", "{", "value", ",", "err", ":=", "services", ".", "GetRoleMarshaler", "(", ")", ".", "MarshalRole", "(", "role", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "item", ":=", "backend", ".", "Item", "{", "Key", ":", "backend", ".", "Key", "(", "rolesPrefix", ",", "role", ".", "GetName", "(", ")", ",", "paramsPrefix", ")", ",", "Value", ":", "value", ",", "Expires", ":", "role", ".", "Expiry", "(", ")", ",", "}", "\n\n", "_", ",", "err", "=", "s", ".", "Create", "(", "context", ".", "TODO", "(", ")", ",", "item", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CreateRole creates a role on the backend.
[ "CreateRole", "creates", "a", "role", "on", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/access.go#L64-L81
train
gravitational/teleport
lib/services/local/access.go
GetRole
func (s *AccessService) GetRole(name string) (services.Role, error) { if name == "" { return nil, trace.BadParameter("missing role name") } item, err := s.Get(context.TODO(), backend.Key(rolesPrefix, name, paramsPrefix)) if err != nil { if trace.IsNotFound(err) { return nil, trace.NotFound("role %v is not found", name) } return nil, trace.Wrap(err) } return services.GetRoleMarshaler().UnmarshalRole(item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires)) }
go
func (s *AccessService) GetRole(name string) (services.Role, error) { if name == "" { return nil, trace.BadParameter("missing role name") } item, err := s.Get(context.TODO(), backend.Key(rolesPrefix, name, paramsPrefix)) if err != nil { if trace.IsNotFound(err) { return nil, trace.NotFound("role %v is not found", name) } return nil, trace.Wrap(err) } return services.GetRoleMarshaler().UnmarshalRole(item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires)) }
[ "func", "(", "s", "*", "AccessService", ")", "GetRole", "(", "name", "string", ")", "(", "services", ".", "Role", ",", "error", ")", "{", "if", "name", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "item", ",", "err", ":=", "s", ".", "Get", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "rolesPrefix", ",", "name", ",", "paramsPrefix", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "nil", ",", "trace", ".", "NotFound", "(", "\"", "\"", ",", "name", ")", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetRoleMarshaler", "(", ")", ".", "UnmarshalRole", "(", "item", ".", "Value", ",", "services", ".", "WithResourceID", "(", "item", ".", "ID", ")", ",", "services", ".", "WithExpires", "(", "item", ".", "Expires", ")", ")", "\n", "}" ]
// GetRole returns a role by name
[ "GetRole", "returns", "a", "role", "by", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/access.go#L105-L118
train
gravitational/teleport
lib/services/local/access.go
DeleteRole
func (s *AccessService) DeleteRole(name string) error { if name == "" { return trace.BadParameter("missing role name") } err := s.Delete(context.TODO(), backend.Key(rolesPrefix, name, paramsPrefix)) if err != nil { if trace.IsNotFound(err) { return trace.NotFound("role %q is not found", name) } } return trace.Wrap(err) }
go
func (s *AccessService) DeleteRole(name string) error { if name == "" { return trace.BadParameter("missing role name") } err := s.Delete(context.TODO(), backend.Key(rolesPrefix, name, paramsPrefix)) if err != nil { if trace.IsNotFound(err) { return trace.NotFound("role %q is not found", name) } } return trace.Wrap(err) }
[ "func", "(", "s", "*", "AccessService", ")", "DeleteRole", "(", "name", "string", ")", "error", "{", "if", "name", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "err", ":=", "s", ".", "Delete", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "rolesPrefix", ",", "name", ",", "paramsPrefix", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "NotFound", "(", "\"", "\"", ",", "name", ")", "\n", "}", "\n", "}", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteRole deletes a role from the backend
[ "DeleteRole", "deletes", "a", "role", "from", "the", "backend" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/access.go#L121-L132
train
gravitational/teleport
lib/auth/auth_with_roles.go
hasRemoteBuiltinRole
func (a *AuthWithRoles) hasRemoteBuiltinRole(name string) bool { if _, ok := a.checker.(RemoteBuiltinRoleSet); !ok { return false } if !a.checker.HasRole(name) { return false } return true }
go
func (a *AuthWithRoles) hasRemoteBuiltinRole(name string) bool { if _, ok := a.checker.(RemoteBuiltinRoleSet); !ok { return false } if !a.checker.HasRole(name) { return false } return true }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "hasRemoteBuiltinRole", "(", "name", "string", ")", "bool", "{", "if", "_", ",", "ok", ":=", "a", ".", "checker", ".", "(", "RemoteBuiltinRoleSet", ")", ";", "!", "ok", "{", "return", "false", "\n", "}", "\n", "if", "!", "a", ".", "checker", ".", "HasRole", "(", "name", ")", "{", "return", "false", "\n", "}", "\n\n", "return", "true", "\n", "}" ]
// hasRemoteBuiltinRole checks the type of the role set returned and the name. // Returns true if role set is remote builtin and the name matches.
[ "hasRemoteBuiltinRole", "checks", "the", "type", "of", "the", "role", "set", "returned", "and", "the", "name", ".", "Returns", "true", "if", "role", "set", "is", "remote", "builtin", "and", "the", "name", "matches", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L98-L107
train
gravitational/teleport
lib/auth/auth_with_roles.go
RotateExternalCertAuthority
func (a *AuthWithRoles) RotateExternalCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } ctx := &services.Context{User: a.user, Resource: ca} if err := a.actionWithContext(ctx, defaults.Namespace, services.KindCertAuthority, services.VerbRotate); err != nil { return trace.Wrap(err) } return a.authServer.RotateExternalCertAuthority(ca) }
go
func (a *AuthWithRoles) RotateExternalCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } ctx := &services.Context{User: a.user, Resource: ca} if err := a.actionWithContext(ctx, defaults.Namespace, services.KindCertAuthority, services.VerbRotate); err != nil { return trace.Wrap(err) } return a.authServer.RotateExternalCertAuthority(ca) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "RotateExternalCertAuthority", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "if", "ca", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "ctx", ":=", "&", "services", ".", "Context", "{", "User", ":", "a", ".", "user", ",", "Resource", ":", "ca", "}", "\n", "if", "err", ":=", "a", ".", "actionWithContext", "(", "ctx", ",", "defaults", ".", "Namespace", ",", "services", ".", "KindCertAuthority", ",", "services", ".", "VerbRotate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "RotateExternalCertAuthority", "(", "ca", ")", "\n", "}" ]
// RotateExternalCertAuthority rotates external certificate authority, // this method is called by a remote trusted cluster and is used to update // only public keys and certificates of the certificate authority.
[ "RotateExternalCertAuthority", "rotates", "external", "certificate", "authority", "this", "method", "is", "called", "by", "a", "remote", "trusted", "cluster", "and", "is", "used", "to", "update", "only", "public", "keys", "and", "certificates", "of", "the", "certificate", "authority", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L181-L190
train
gravitational/teleport
lib/auth/auth_with_roles.go
UpsertCertAuthority
func (a *AuthWithRoles) UpsertCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } ctx := &services.Context{User: a.user, Resource: ca} if err := a.actionWithContext(ctx, defaults.Namespace, services.KindCertAuthority, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.actionWithContext(ctx, defaults.Namespace, services.KindCertAuthority, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.UpsertCertAuthority(ca) }
go
func (a *AuthWithRoles) UpsertCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } ctx := &services.Context{User: a.user, Resource: ca} if err := a.actionWithContext(ctx, defaults.Namespace, services.KindCertAuthority, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.actionWithContext(ctx, defaults.Namespace, services.KindCertAuthority, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.UpsertCertAuthority(ca) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "UpsertCertAuthority", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "if", "ca", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "ctx", ":=", "&", "services", ".", "Context", "{", "User", ":", "a", ".", "user", ",", "Resource", ":", "ca", "}", "\n", "if", "err", ":=", "a", ".", "actionWithContext", "(", "ctx", ",", "defaults", ".", "Namespace", ",", "services", ".", "KindCertAuthority", ",", "services", ".", "VerbCreate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "actionWithContext", "(", "ctx", ",", "defaults", ".", "Namespace", ",", "services", ".", "KindCertAuthority", ",", "services", ".", "VerbUpdate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "UpsertCertAuthority", "(", "ca", ")", "\n", "}" ]
// UpsertCertAuthority updates existing cert authority or updates the existing one.
[ "UpsertCertAuthority", "updates", "existing", "cert", "authority", "or", "updates", "the", "existing", "one", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L193-L205
train
gravitational/teleport
lib/auth/auth_with_roles.go
UpsertNodes
func (a *AuthWithRoles) UpsertNodes(namespace string, servers []services.Server) error { if err := a.action(namespace, services.KindNode, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.action(namespace, services.KindNode, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.UpsertNodes(namespace, servers) }
go
func (a *AuthWithRoles) UpsertNodes(namespace string, servers []services.Server) error { if err := a.action(namespace, services.KindNode, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.action(namespace, services.KindNode, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.UpsertNodes(namespace, servers) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "UpsertNodes", "(", "namespace", "string", ",", "servers", "[", "]", "services", ".", "Server", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "namespace", ",", "services", ".", "KindNode", ",", "services", ".", "VerbCreate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "action", "(", "namespace", ",", "services", ".", "KindNode", ",", "services", ".", "VerbUpdate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "UpsertNodes", "(", "namespace", ",", "servers", ")", "\n", "}" ]
// UpsertNodes bulk upserts nodes into the backend.
[ "UpsertNodes", "bulk", "upserts", "nodes", "into", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L327-L335
train
gravitational/teleport
lib/auth/auth_with_roles.go
filterNodes
func (a *AuthWithRoles) filterNodes(nodes []services.Server) ([]services.Server, error) { // For certain built-in roles, continue to allow full access and return // the full set of nodes to not break existing clusters during migration. // // In addition, allow proxy (and remote proxy) to access all nodes for it's // smart resolution address resolution. Once the smart resolution logic is // moved to the auth server, this logic can be removed. if a.hasBuiltinRole(string(teleport.RoleAdmin)) || a.hasBuiltinRole(string(teleport.RoleProxy)) || a.hasRemoteBuiltinRole(string(teleport.RoleRemoteProxy)) { return nodes, nil } // Fetch services.RoleSet for the identity of the logged in user. roles, err := services.FetchRoles(a.user.GetRoles(), a.authServer, a.user.GetTraits()) if err != nil { return nil, trace.Wrap(err) } // Extract all unique allowed logins across all roles. allowedLogins := make(map[string]bool) for _, role := range roles { for _, login := range role.GetLogins(services.Allow) { allowedLogins[login] = true } } // Loop over all nodes and check if the caller has access. filteredNodes := make([]services.Server, 0, len(nodes)) NextNode: for _, node := range nodes { for login, _ := range allowedLogins { err := roles.CheckAccessToServer(login, node) if err == nil { filteredNodes = append(filteredNodes, node) continue NextNode } } } return filteredNodes, nil }
go
func (a *AuthWithRoles) filterNodes(nodes []services.Server) ([]services.Server, error) { // For certain built-in roles, continue to allow full access and return // the full set of nodes to not break existing clusters during migration. // // In addition, allow proxy (and remote proxy) to access all nodes for it's // smart resolution address resolution. Once the smart resolution logic is // moved to the auth server, this logic can be removed. if a.hasBuiltinRole(string(teleport.RoleAdmin)) || a.hasBuiltinRole(string(teleport.RoleProxy)) || a.hasRemoteBuiltinRole(string(teleport.RoleRemoteProxy)) { return nodes, nil } // Fetch services.RoleSet for the identity of the logged in user. roles, err := services.FetchRoles(a.user.GetRoles(), a.authServer, a.user.GetTraits()) if err != nil { return nil, trace.Wrap(err) } // Extract all unique allowed logins across all roles. allowedLogins := make(map[string]bool) for _, role := range roles { for _, login := range role.GetLogins(services.Allow) { allowedLogins[login] = true } } // Loop over all nodes and check if the caller has access. filteredNodes := make([]services.Server, 0, len(nodes)) NextNode: for _, node := range nodes { for login, _ := range allowedLogins { err := roles.CheckAccessToServer(login, node) if err == nil { filteredNodes = append(filteredNodes, node) continue NextNode } } } return filteredNodes, nil }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "filterNodes", "(", "nodes", "[", "]", "services", ".", "Server", ")", "(", "[", "]", "services", ".", "Server", ",", "error", ")", "{", "// For certain built-in roles, continue to allow full access and return", "// the full set of nodes to not break existing clusters during migration.", "//", "// In addition, allow proxy (and remote proxy) to access all nodes for it's", "// smart resolution address resolution. Once the smart resolution logic is", "// moved to the auth server, this logic can be removed.", "if", "a", ".", "hasBuiltinRole", "(", "string", "(", "teleport", ".", "RoleAdmin", ")", ")", "||", "a", ".", "hasBuiltinRole", "(", "string", "(", "teleport", ".", "RoleProxy", ")", ")", "||", "a", ".", "hasRemoteBuiltinRole", "(", "string", "(", "teleport", ".", "RoleRemoteProxy", ")", ")", "{", "return", "nodes", ",", "nil", "\n", "}", "\n\n", "// Fetch services.RoleSet for the identity of the logged in user.", "roles", ",", "err", ":=", "services", ".", "FetchRoles", "(", "a", ".", "user", ".", "GetRoles", "(", ")", ",", "a", ".", "authServer", ",", "a", ".", "user", ".", "GetTraits", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Extract all unique allowed logins across all roles.", "allowedLogins", ":=", "make", "(", "map", "[", "string", "]", "bool", ")", "\n", "for", "_", ",", "role", ":=", "range", "roles", "{", "for", "_", ",", "login", ":=", "range", "role", ".", "GetLogins", "(", "services", ".", "Allow", ")", "{", "allowedLogins", "[", "login", "]", "=", "true", "\n", "}", "\n", "}", "\n\n", "// Loop over all nodes and check if the caller has access.", "filteredNodes", ":=", "make", "(", "[", "]", "services", ".", "Server", ",", "0", ",", "len", "(", "nodes", ")", ")", "\n", "NextNode", ":", "for", "_", ",", "node", ":=", "range", "nodes", "{", "for", "login", ",", "_", ":=", "range", "allowedLogins", "{", "err", ":=", "roles", ".", "CheckAccessToServer", "(", "login", ",", "node", ")", "\n", "if", "err", "==", "nil", "{", "filteredNodes", "=", "append", "(", "filteredNodes", ",", "node", ")", "\n", "continue", "NextNode", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "filteredNodes", ",", "nil", "\n", "}" ]
// filterNodes filters nodes based off the role of the logged in user.
[ "filterNodes", "filters", "nodes", "based", "off", "the", "role", "of", "the", "logged", "in", "user", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L448-L489
train
gravitational/teleport
lib/auth/auth_with_roles.go
DeleteProxy
func (a *AuthWithRoles) DeleteProxy(name string) error { if err := a.action(defaults.Namespace, services.KindProxy, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteProxy(name) }
go
func (a *AuthWithRoles) DeleteProxy(name string) error { if err := a.action(defaults.Namespace, services.KindProxy, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteProxy(name) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "DeleteProxy", "(", "name", "string", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindProxy", ",", "services", ".", "VerbDelete", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "DeleteProxy", "(", "name", ")", "\n", "}" ]
// DeleteProxy deletes proxy by name
[ "DeleteProxy", "deletes", "proxy", "by", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L604-L609
train
gravitational/teleport
lib/auth/auth_with_roles.go
DeleteNamespace
func (a *AuthWithRoles) DeleteNamespace(name string) error { if err := a.action(defaults.Namespace, services.KindNamespace, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteNamespace(name) }
go
func (a *AuthWithRoles) DeleteNamespace(name string) error { if err := a.action(defaults.Namespace, services.KindNamespace, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteNamespace(name) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "DeleteNamespace", "(", "name", "string", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindNamespace", ",", "services", ".", "VerbDelete", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "DeleteNamespace", "(", "name", ")", "\n", "}" ]
// DeleteNamespace deletes namespace by name
[ "DeleteNamespace", "deletes", "namespace", "by", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1163-L1168
train
gravitational/teleport
lib/auth/auth_with_roles.go
DeleteRole
func (a *AuthWithRoles) DeleteRole(name string) error { if err := a.action(defaults.Namespace, services.KindRole, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteRole(name) }
go
func (a *AuthWithRoles) DeleteRole(name string) error { if err := a.action(defaults.Namespace, services.KindRole, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteRole(name) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "DeleteRole", "(", "name", "string", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindRole", ",", "services", ".", "VerbDelete", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "DeleteRole", "(", "name", ")", "\n", "}" ]
// DeleteRole deletes role by name
[ "DeleteRole", "deletes", "role", "by", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1210-L1215
train
gravitational/teleport
lib/auth/auth_with_roles.go
GetClusterConfig
func (a *AuthWithRoles) GetClusterConfig(opts ...services.MarshalOption) (services.ClusterConfig, error) { if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbRead); err != nil { return nil, trace.Wrap(err) } return a.authServer.GetClusterConfig(opts...) }
go
func (a *AuthWithRoles) GetClusterConfig(opts ...services.MarshalOption) (services.ClusterConfig, error) { if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbRead); err != nil { return nil, trace.Wrap(err) } return a.authServer.GetClusterConfig(opts...) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "GetClusterConfig", "(", "opts", "...", "services", ".", "MarshalOption", ")", "(", "services", ".", "ClusterConfig", ",", "error", ")", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterConfig", ",", "services", ".", "VerbRead", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "GetClusterConfig", "(", "opts", "...", ")", "\n", "}" ]
// GetClusterConfig gets cluster level configuration.
[ "GetClusterConfig", "gets", "cluster", "level", "configuration", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1218-L1223
train
gravitational/teleport
lib/auth/auth_with_roles.go
DeleteClusterConfig
func (a *AuthWithRoles) DeleteClusterConfig() error { if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteClusterConfig() }
go
func (a *AuthWithRoles) DeleteClusterConfig() error { if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteClusterConfig() }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "DeleteClusterConfig", "(", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterConfig", ",", "services", ".", "VerbDelete", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "DeleteClusterConfig", "(", ")", "\n", "}" ]
// DeleteClusterConfig deletes cluster config
[ "DeleteClusterConfig", "deletes", "cluster", "config" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1226-L1231
train
gravitational/teleport
lib/auth/auth_with_roles.go
DeleteClusterName
func (a *AuthWithRoles) DeleteClusterName() error { if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteClusterName() }
go
func (a *AuthWithRoles) DeleteClusterName() error { if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbDelete); err != nil { return trace.Wrap(err) } return a.authServer.DeleteClusterName() }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "DeleteClusterName", "(", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterName", ",", "services", ".", "VerbDelete", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "DeleteClusterName", "(", ")", "\n", "}" ]
// DeleteClusterName deletes cluster name
[ "DeleteClusterName", "deletes", "cluster", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1234-L1239
train