repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequence
docstring
stringlengths
6
2.61k
docstring_tokens
sequence
sha
stringlengths
40
40
url
stringlengths
85
252
partition
stringclasses
1 value
gravitational/teleport
lib/auth/auth_with_roles.go
SetClusterConfig
func (a *AuthWithRoles) SetClusterConfig(c services.ClusterConfig) error { if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.SetClusterConfig(c) }
go
func (a *AuthWithRoles) SetClusterConfig(c services.ClusterConfig) error { if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.action(defaults.Namespace, services.KindClusterConfig, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.SetClusterConfig(c) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "SetClusterConfig", "(", "c", "services", ".", "ClusterConfig", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterConfig", ",", "services", ".", "VerbCreate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterConfig", ",", "services", ".", "VerbUpdate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "SetClusterConfig", "(", "c", ")", "\n", "}" ]
// SetClusterConfig sets cluster level configuration.
[ "SetClusterConfig", "sets", "cluster", "level", "configuration", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1250-L1258
train
gravitational/teleport
lib/auth/auth_with_roles.go
GetClusterName
func (a *AuthWithRoles) GetClusterName(opts ...services.MarshalOption) (services.ClusterName, error) { if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbRead); err != nil { return nil, trace.Wrap(err) } return a.authServer.GetClusterName() }
go
func (a *AuthWithRoles) GetClusterName(opts ...services.MarshalOption) (services.ClusterName, error) { if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbRead); err != nil { return nil, trace.Wrap(err) } return a.authServer.GetClusterName() }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "GetClusterName", "(", "opts", "...", "services", ".", "MarshalOption", ")", "(", "services", ".", "ClusterName", ",", "error", ")", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterName", ",", "services", ".", "VerbRead", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "GetClusterName", "(", ")", "\n", "}" ]
// GetClusterName gets the name of the cluster.
[ "GetClusterName", "gets", "the", "name", "of", "the", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1261-L1266
train
gravitational/teleport
lib/auth/auth_with_roles.go
SetClusterName
func (a *AuthWithRoles) SetClusterName(c services.ClusterName) error { if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.SetClusterName(c) }
go
func (a *AuthWithRoles) SetClusterName(c services.ClusterName) error { if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbCreate); err != nil { return trace.Wrap(err) } if err := a.action(defaults.Namespace, services.KindClusterName, services.VerbUpdate); err != nil { return trace.Wrap(err) } return a.authServer.SetClusterName(c) }
[ "func", "(", "a", "*", "AuthWithRoles", ")", "SetClusterName", "(", "c", "services", ".", "ClusterName", ")", "error", "{", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterName", ",", "services", ".", "VerbCreate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "action", "(", "defaults", ".", "Namespace", ",", "services", ".", "KindClusterName", ",", "services", ".", "VerbUpdate", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "a", ".", "authServer", ".", "SetClusterName", "(", "c", ")", "\n", "}" ]
// SetClusterName sets the name of the cluster. SetClusterName can only be called once.
[ "SetClusterName", "sets", "the", "name", "of", "the", "cluster", ".", "SetClusterName", "can", "only", "be", "called", "once", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1269-L1277
train
gravitational/teleport
lib/auth/auth_with_roles.go
NewAdminAuthServer
func NewAdminAuthServer(authServer *AuthServer, sessions session.Service, alog events.IAuditLog) (ClientI, error) { ctx, err := NewAdminContext() if err != nil { return nil, trace.Wrap(err) } return &AuthWithRoles{ authServer: authServer, checker: ctx.Checker, user: ctx.User, alog: alog, sessions: sessions, }, nil }
go
func NewAdminAuthServer(authServer *AuthServer, sessions session.Service, alog events.IAuditLog) (ClientI, error) { ctx, err := NewAdminContext() if err != nil { return nil, trace.Wrap(err) } return &AuthWithRoles{ authServer: authServer, checker: ctx.Checker, user: ctx.User, alog: alog, sessions: sessions, }, nil }
[ "func", "NewAdminAuthServer", "(", "authServer", "*", "AuthServer", ",", "sessions", "session", ".", "Service", ",", "alog", "events", ".", "IAuditLog", ")", "(", "ClientI", ",", "error", ")", "{", "ctx", ",", "err", ":=", "NewAdminContext", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "AuthWithRoles", "{", "authServer", ":", "authServer", ",", "checker", ":", "ctx", ".", "Checker", ",", "user", ":", "ctx", ".", "User", ",", "alog", ":", "alog", ",", "sessions", ":", "sessions", ",", "}", ",", "nil", "\n", "}" ]
// NewAdminAuthServer returns auth server authorized as admin, // used for auth server cached access
[ "NewAdminAuthServer", "returns", "auth", "server", "authorized", "as", "admin", "used", "for", "auth", "server", "cached", "access" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1510-L1522
train
gravitational/teleport
lib/auth/auth_with_roles.go
NewAuthWithRoles
func NewAuthWithRoles(authServer *AuthServer, checker services.AccessChecker, user services.User, sessions session.Service, alog events.IAuditLog) *AuthWithRoles { return &AuthWithRoles{ authServer: authServer, checker: checker, sessions: sessions, user: user, alog: alog, } }
go
func NewAuthWithRoles(authServer *AuthServer, checker services.AccessChecker, user services.User, sessions session.Service, alog events.IAuditLog) *AuthWithRoles { return &AuthWithRoles{ authServer: authServer, checker: checker, sessions: sessions, user: user, alog: alog, } }
[ "func", "NewAuthWithRoles", "(", "authServer", "*", "AuthServer", ",", "checker", "services", ".", "AccessChecker", ",", "user", "services", ".", "User", ",", "sessions", "session", ".", "Service", ",", "alog", "events", ".", "IAuditLog", ")", "*", "AuthWithRoles", "{", "return", "&", "AuthWithRoles", "{", "authServer", ":", "authServer", ",", "checker", ":", "checker", ",", "sessions", ":", "sessions", ",", "user", ":", "user", ",", "alog", ":", "alog", ",", "}", "\n", "}" ]
// NewAuthWithRoles creates new auth server with access control
[ "NewAuthWithRoles", "creates", "new", "auth", "server", "with", "access", "control" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth_with_roles.go#L1525-L1537
train
gravitational/teleport
lib/sshutils/scp/local.go
SetChmod
func (l *localFileSystem) SetChmod(path string, mode int) error { chmode := os.FileMode(mode & int(os.ModePerm)) if err := os.Chmod(path, chmode); err != nil { return trace.Wrap(err) } return nil }
go
func (l *localFileSystem) SetChmod(path string, mode int) error { chmode := os.FileMode(mode & int(os.ModePerm)) if err := os.Chmod(path, chmode); err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "l", "*", "localFileSystem", ")", "SetChmod", "(", "path", "string", ",", "mode", "int", ")", "error", "{", "chmode", ":=", "os", ".", "FileMode", "(", "mode", "&", "int", "(", "os", ".", "ModePerm", ")", ")", "\n", "if", "err", ":=", "os", ".", "Chmod", "(", "path", ",", "chmode", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// SetChmod sets file permissions
[ "SetChmod", "sets", "file", "permissions" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L34-L41
train
gravitational/teleport
lib/sshutils/scp/local.go
MkDir
func (l *localFileSystem) MkDir(path string, mode int) error { fileMode := os.FileMode(mode & int(os.ModePerm)) err := os.MkdirAll(path, fileMode) if err != nil && !os.IsExist(err) { return trace.ConvertSystemError(err) } return nil }
go
func (l *localFileSystem) MkDir(path string, mode int) error { fileMode := os.FileMode(mode & int(os.ModePerm)) err := os.MkdirAll(path, fileMode) if err != nil && !os.IsExist(err) { return trace.ConvertSystemError(err) } return nil }
[ "func", "(", "l", "*", "localFileSystem", ")", "MkDir", "(", "path", "string", ",", "mode", "int", ")", "error", "{", "fileMode", ":=", "os", ".", "FileMode", "(", "mode", "&", "int", "(", "os", ".", "ModePerm", ")", ")", "\n", "err", ":=", "os", ".", "MkdirAll", "(", "path", ",", "fileMode", ")", "\n", "if", "err", "!=", "nil", "&&", "!", "os", ".", "IsExist", "(", "err", ")", "{", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// MkDir creates a directory
[ "MkDir", "creates", "a", "directory" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L44-L52
train
gravitational/teleport
lib/sshutils/scp/local.go
OpenFile
func (l *localFileSystem) OpenFile(filePath string) (io.ReadCloser, error) { f, err := os.Open(filePath) if err != nil { return nil, trace.Wrap(err) } return f, nil }
go
func (l *localFileSystem) OpenFile(filePath string) (io.ReadCloser, error) { f, err := os.Open(filePath) if err != nil { return nil, trace.Wrap(err) } return f, nil }
[ "func", "(", "l", "*", "localFileSystem", ")", "OpenFile", "(", "filePath", "string", ")", "(", "io", ".", "ReadCloser", ",", "error", ")", "{", "f", ",", "err", ":=", "os", ".", "Open", "(", "filePath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "f", ",", "nil", "\n", "}" ]
// OpenFile opens a file for read operations and returns a Reader
[ "OpenFile", "opens", "a", "file", "for", "read", "operations", "and", "returns", "a", "Reader" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L60-L67
train
gravitational/teleport
lib/sshutils/scp/local.go
GetFileInfo
func (l *localFileSystem) GetFileInfo(filePath string) (FileInfo, error) { info, err := makeFileInfo(filePath) if err != nil { return nil, trace.Wrap(err) } return info, nil }
go
func (l *localFileSystem) GetFileInfo(filePath string) (FileInfo, error) { info, err := makeFileInfo(filePath) if err != nil { return nil, trace.Wrap(err) } return info, nil }
[ "func", "(", "l", "*", "localFileSystem", ")", "GetFileInfo", "(", "filePath", "string", ")", "(", "FileInfo", ",", "error", ")", "{", "info", ",", "err", ":=", "makeFileInfo", "(", "filePath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "info", ",", "nil", "\n", "}" ]
// GetFileInfo returns FileInfo for a given file path
[ "GetFileInfo", "returns", "FileInfo", "for", "a", "given", "file", "path" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L70-L77
train
gravitational/teleport
lib/sshutils/scp/local.go
CreateFile
func (l *localFileSystem) CreateFile(filePath string, length uint64) (io.WriteCloser, error) { f, err := os.Create(filePath) if err != nil { return nil, trace.Wrap(err) } return f, nil }
go
func (l *localFileSystem) CreateFile(filePath string, length uint64) (io.WriteCloser, error) { f, err := os.Create(filePath) if err != nil { return nil, trace.Wrap(err) } return f, nil }
[ "func", "(", "l", "*", "localFileSystem", ")", "CreateFile", "(", "filePath", "string", ",", "length", "uint64", ")", "(", "io", ".", "WriteCloser", ",", "error", ")", "{", "f", ",", "err", ":=", "os", ".", "Create", "(", "filePath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "f", ",", "nil", "\n", "}" ]
// CreateFile creates a new file and returns a Writer
[ "CreateFile", "creates", "a", "new", "file", "and", "returns", "a", "Writer" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L80-L87
train
gravitational/teleport
lib/sshutils/scp/local.go
ReadDir
func (l *localFileInfo) ReadDir() ([]FileInfo, error) { f, err := os.Open(l.filePath) if err != nil { return nil, trace.Wrap(err) } fis, err := f.Readdir(0) if err != nil { return nil, trace.Wrap(err) } infos := make([]FileInfo, len(fis)) for i := range fis { fi := fis[i] info, err := makeFileInfo(filepath.Join(l.GetPath(), fi.Name())) if err != nil { return nil, trace.Wrap(err) } infos[i] = info } return infos, nil }
go
func (l *localFileInfo) ReadDir() ([]FileInfo, error) { f, err := os.Open(l.filePath) if err != nil { return nil, trace.Wrap(err) } fis, err := f.Readdir(0) if err != nil { return nil, trace.Wrap(err) } infos := make([]FileInfo, len(fis)) for i := range fis { fi := fis[i] info, err := makeFileInfo(filepath.Join(l.GetPath(), fi.Name())) if err != nil { return nil, trace.Wrap(err) } infos[i] = info } return infos, nil }
[ "func", "(", "l", "*", "localFileInfo", ")", "ReadDir", "(", ")", "(", "[", "]", "FileInfo", ",", "error", ")", "{", "f", ",", "err", ":=", "os", ".", "Open", "(", "l", ".", "filePath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "fis", ",", "err", ":=", "f", ".", "Readdir", "(", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "infos", ":=", "make", "(", "[", "]", "FileInfo", ",", "len", "(", "fis", ")", ")", "\n", "for", "i", ":=", "range", "fis", "{", "fi", ":=", "fis", "[", "i", "]", "\n", "info", ",", "err", ":=", "makeFileInfo", "(", "filepath", ".", "Join", "(", "l", ".", "GetPath", "(", ")", ",", "fi", ".", "Name", "(", ")", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "infos", "[", "i", "]", "=", "info", "\n", "}", "\n\n", "return", "infos", ",", "nil", "\n", "}" ]
// ReadDir returns all files in this directory
[ "ReadDir", "returns", "all", "files", "in", "this", "directory" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L128-L150
train
gravitational/teleport
lib/sshutils/scp/local.go
GetModePerm
func (l *localFileInfo) GetModePerm() os.FileMode { return l.fileInfo.Mode() & os.ModePerm }
go
func (l *localFileInfo) GetModePerm() os.FileMode { return l.fileInfo.Mode() & os.ModePerm }
[ "func", "(", "l", "*", "localFileInfo", ")", "GetModePerm", "(", ")", "os", ".", "FileMode", "{", "return", "l", ".", "fileInfo", ".", "Mode", "(", ")", "&", "os", ".", "ModePerm", "\n", "}" ]
// GetModePerm returns file permissions
[ "GetModePerm", "returns", "file", "permissions" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/sshutils/scp/local.go#L153-L155
train
gravitational/teleport
lib/reversetunnel/remotesite.go
Close
func (s *remoteSite) Close() error { s.Lock() defer s.Unlock() s.cancel() for i := range s.connections { s.connections[i].Close() } s.connections = []*remoteConn{} return nil }
go
func (s *remoteSite) Close() error { s.Lock() defer s.Unlock() s.cancel() for i := range s.connections { s.connections[i].Close() } s.connections = []*remoteConn{} return nil }
[ "func", "(", "s", "*", "remoteSite", ")", "Close", "(", ")", "error", "{", "s", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "Unlock", "(", ")", "\n\n", "s", ".", "cancel", "(", ")", "\n", "for", "i", ":=", "range", "s", ".", "connections", "{", "s", ".", "connections", "[", "i", "]", ".", "Close", "(", ")", "\n", "}", "\n", "s", ".", "connections", "=", "[", "]", "*", "remoteConn", "{", "}", "\n", "return", "nil", "\n", "}" ]
// Clos closes remote cluster connections
[ "Clos", "closes", "remote", "cluster", "connections" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L158-L168
train
gravitational/teleport
lib/reversetunnel/remotesite.go
nextConn
func (s *remoteSite) nextConn() (*remoteConn, error) { s.Lock() defer s.Unlock() s.removeInvalidConns() for i := 0; i < len(s.connections); i++ { s.lastUsed = (s.lastUsed + 1) % len(s.connections) remoteConn := s.connections[s.lastUsed] // connection could have been initated, but agent // on the other side is not ready yet. // Proxy assumes that connection is ready to serve when // it has received a first heartbeat, otherwise // it could attempt to use it before the agent // had a chance to start handling connection requests, // what could lead to proxy marking the connection // as invalid without a good reason. if remoteConn.isReady() { return remoteConn, nil } } return nil, trace.NotFound("%v is offline: no active tunnels to %v found", s.GetName(), s.srv.ClusterName) }
go
func (s *remoteSite) nextConn() (*remoteConn, error) { s.Lock() defer s.Unlock() s.removeInvalidConns() for i := 0; i < len(s.connections); i++ { s.lastUsed = (s.lastUsed + 1) % len(s.connections) remoteConn := s.connections[s.lastUsed] // connection could have been initated, but agent // on the other side is not ready yet. // Proxy assumes that connection is ready to serve when // it has received a first heartbeat, otherwise // it could attempt to use it before the agent // had a chance to start handling connection requests, // what could lead to proxy marking the connection // as invalid without a good reason. if remoteConn.isReady() { return remoteConn, nil } } return nil, trace.NotFound("%v is offline: no active tunnels to %v found", s.GetName(), s.srv.ClusterName) }
[ "func", "(", "s", "*", "remoteSite", ")", "nextConn", "(", ")", "(", "*", "remoteConn", ",", "error", ")", "{", "s", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "Unlock", "(", ")", "\n\n", "s", ".", "removeInvalidConns", "(", ")", "\n\n", "for", "i", ":=", "0", ";", "i", "<", "len", "(", "s", ".", "connections", ")", ";", "i", "++", "{", "s", ".", "lastUsed", "=", "(", "s", ".", "lastUsed", "+", "1", ")", "%", "len", "(", "s", ".", "connections", ")", "\n", "remoteConn", ":=", "s", ".", "connections", "[", "s", ".", "lastUsed", "]", "\n", "// connection could have been initated, but agent", "// on the other side is not ready yet.", "// Proxy assumes that connection is ready to serve when", "// it has received a first heartbeat, otherwise", "// it could attempt to use it before the agent", "// had a chance to start handling connection requests,", "// what could lead to proxy marking the connection", "// as invalid without a good reason.", "if", "remoteConn", ".", "isReady", "(", ")", "{", "return", "remoteConn", ",", "nil", "\n", "}", "\n", "}", "\n\n", "return", "nil", ",", "trace", ".", "NotFound", "(", "\"", "\"", ",", "s", ".", "GetName", "(", ")", ",", "s", ".", "srv", ".", "ClusterName", ")", "\n", "}" ]
// nextConn returns next connection that is ready // and has not been marked as invalid // it will close connections marked as invalid
[ "nextConn", "returns", "next", "connection", "that", "is", "ready", "and", "has", "not", "been", "marked", "as", "invalid", "it", "will", "close", "connections", "marked", "as", "invalid" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L173-L196
train
gravitational/teleport
lib/reversetunnel/remotesite.go
removeInvalidConns
func (s *remoteSite) removeInvalidConns() { // for first pass, do nothing if no connections are marked count := 0 for _, conn := range s.connections { if conn.isInvalid() { count++ } } if count == 0 { return } s.lastUsed = 0 conns := make([]*remoteConn, 0, len(s.connections)-count) for i := range s.connections { if !s.connections[i].isInvalid() { conns = append(conns, s.connections[i]) } else { go s.connections[i].Close() } } s.connections = conns }
go
func (s *remoteSite) removeInvalidConns() { // for first pass, do nothing if no connections are marked count := 0 for _, conn := range s.connections { if conn.isInvalid() { count++ } } if count == 0 { return } s.lastUsed = 0 conns := make([]*remoteConn, 0, len(s.connections)-count) for i := range s.connections { if !s.connections[i].isInvalid() { conns = append(conns, s.connections[i]) } else { go s.connections[i].Close() } } s.connections = conns }
[ "func", "(", "s", "*", "remoteSite", ")", "removeInvalidConns", "(", ")", "{", "// for first pass, do nothing if no connections are marked", "count", ":=", "0", "\n", "for", "_", ",", "conn", ":=", "range", "s", ".", "connections", "{", "if", "conn", ".", "isInvalid", "(", ")", "{", "count", "++", "\n", "}", "\n", "}", "\n", "if", "count", "==", "0", "{", "return", "\n", "}", "\n", "s", ".", "lastUsed", "=", "0", "\n", "conns", ":=", "make", "(", "[", "]", "*", "remoteConn", ",", "0", ",", "len", "(", "s", ".", "connections", ")", "-", "count", ")", "\n", "for", "i", ":=", "range", "s", ".", "connections", "{", "if", "!", "s", ".", "connections", "[", "i", "]", ".", "isInvalid", "(", ")", "{", "conns", "=", "append", "(", "conns", ",", "s", ".", "connections", "[", "i", "]", ")", "\n", "}", "else", "{", "go", "s", ".", "connections", "[", "i", "]", ".", "Close", "(", ")", "\n", "}", "\n", "}", "\n", "s", ".", "connections", "=", "conns", "\n", "}" ]
// removeInvalidConns removes connections marked as invalid, // it should be called only under write lock
[ "removeInvalidConns", "removes", "connections", "marked", "as", "invalid", "it", "should", "be", "called", "only", "under", "write", "lock" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L200-L221
train
gravitational/teleport
lib/reversetunnel/remotesite.go
addConn
func (s *remoteSite) addConn(conn net.Conn, sconn ssh.Conn) (*remoteConn, error) { s.Lock() defer s.Unlock() cn, err := s.localAccessPoint.GetClusterName() if err != nil { return nil, trace.Wrap(err) } rconn := newRemoteConn(&connConfig{ conn: conn, sconn: sconn, accessPoint: s.localAccessPoint, tunnelID: cn.GetClusterName(), tunnelType: string(services.ProxyTunnel), proxyName: s.connInfo.GetProxyName(), clusterName: s.domainName, }) s.connections = append(s.connections, rconn) s.lastUsed = 0 return rconn, nil }
go
func (s *remoteSite) addConn(conn net.Conn, sconn ssh.Conn) (*remoteConn, error) { s.Lock() defer s.Unlock() cn, err := s.localAccessPoint.GetClusterName() if err != nil { return nil, trace.Wrap(err) } rconn := newRemoteConn(&connConfig{ conn: conn, sconn: sconn, accessPoint: s.localAccessPoint, tunnelID: cn.GetClusterName(), tunnelType: string(services.ProxyTunnel), proxyName: s.connInfo.GetProxyName(), clusterName: s.domainName, }) s.connections = append(s.connections, rconn) s.lastUsed = 0 return rconn, nil }
[ "func", "(", "s", "*", "remoteSite", ")", "addConn", "(", "conn", "net", ".", "Conn", ",", "sconn", "ssh", ".", "Conn", ")", "(", "*", "remoteConn", ",", "error", ")", "{", "s", ".", "Lock", "(", ")", "\n", "defer", "s", ".", "Unlock", "(", ")", "\n\n", "cn", ",", "err", ":=", "s", ".", "localAccessPoint", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "rconn", ":=", "newRemoteConn", "(", "&", "connConfig", "{", "conn", ":", "conn", ",", "sconn", ":", "sconn", ",", "accessPoint", ":", "s", ".", "localAccessPoint", ",", "tunnelID", ":", "cn", ".", "GetClusterName", "(", ")", ",", "tunnelType", ":", "string", "(", "services", ".", "ProxyTunnel", ")", ",", "proxyName", ":", "s", ".", "connInfo", ".", "GetProxyName", "(", ")", ",", "clusterName", ":", "s", ".", "domainName", ",", "}", ")", "\n\n", "s", ".", "connections", "=", "append", "(", "s", ".", "connections", ",", "rconn", ")", "\n", "s", ".", "lastUsed", "=", "0", "\n", "return", "rconn", ",", "nil", "\n", "}" ]
// addConn helper adds a new active remote cluster connection to the list // of such connections
[ "addConn", "helper", "adds", "a", "new", "active", "remote", "cluster", "connection", "to", "the", "list", "of", "such", "connections" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L225-L247
train
gravitational/teleport
lib/reversetunnel/remotesite.go
deleteConnectionRecord
func (s *remoteSite) deleteConnectionRecord() { s.localAccessPoint.DeleteTunnelConnection(s.connInfo.GetClusterName(), s.connInfo.GetName()) }
go
func (s *remoteSite) deleteConnectionRecord() { s.localAccessPoint.DeleteTunnelConnection(s.connInfo.GetClusterName(), s.connInfo.GetName()) }
[ "func", "(", "s", "*", "remoteSite", ")", "deleteConnectionRecord", "(", ")", "{", "s", ".", "localAccessPoint", ".", "DeleteTunnelConnection", "(", "s", ".", "connInfo", ".", "GetClusterName", "(", ")", ",", "s", ".", "connInfo", ".", "GetName", "(", ")", ")", "\n", "}" ]
// deleteConnectionRecord deletes connection record to let know peer proxies // that this node lost the connection and needs to be discovered
[ "deleteConnectionRecord", "deletes", "connection", "record", "to", "let", "know", "peer", "proxies", "that", "this", "node", "lost", "the", "connection", "and", "needs", "to", "be", "discovered" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L291-L293
train
gravitational/teleport
lib/reversetunnel/remotesite.go
handleHeartbeat
func (s *remoteSite) handleHeartbeat(conn *remoteConn, ch ssh.Channel, reqC <-chan *ssh.Request) { defer func() { s.Infof("Cluster connection closed.") conn.Close() }() for { select { case <-s.ctx.Done(): s.Infof("closing") return case req := <-reqC: if req == nil { s.Infof("Cluster agent disconnected.") conn.markInvalid(trace.ConnectionProblem(nil, "agent disconnected")) if !s.hasValidConnections() { s.Debugf("Deleting connection record.") s.deleteConnectionRecord() } return } var timeSent time.Time var roundtrip time.Duration if req.Payload != nil { if err := timeSent.UnmarshalText(req.Payload); err == nil { roundtrip = s.srv.Clock.Now().Sub(timeSent) } } if roundtrip != 0 { s.WithFields(log.Fields{"latency": roundtrip}).Debugf("ping <- %v", conn.conn.RemoteAddr()) } else { s.Debugf("Ping <- %v.", conn.conn.RemoteAddr()) } tm := time.Now().UTC() conn.setLastHeartbeat(tm) go s.registerHeartbeat(tm) // since we block on select, time.After is re-created everytime we process a request. case <-time.After(defaults.ReverseTunnelOfflineThreshold): conn.markInvalid(trace.ConnectionProblem(nil, "no heartbeats for %v", defaults.ReverseTunnelOfflineThreshold)) } } }
go
func (s *remoteSite) handleHeartbeat(conn *remoteConn, ch ssh.Channel, reqC <-chan *ssh.Request) { defer func() { s.Infof("Cluster connection closed.") conn.Close() }() for { select { case <-s.ctx.Done(): s.Infof("closing") return case req := <-reqC: if req == nil { s.Infof("Cluster agent disconnected.") conn.markInvalid(trace.ConnectionProblem(nil, "agent disconnected")) if !s.hasValidConnections() { s.Debugf("Deleting connection record.") s.deleteConnectionRecord() } return } var timeSent time.Time var roundtrip time.Duration if req.Payload != nil { if err := timeSent.UnmarshalText(req.Payload); err == nil { roundtrip = s.srv.Clock.Now().Sub(timeSent) } } if roundtrip != 0 { s.WithFields(log.Fields{"latency": roundtrip}).Debugf("ping <- %v", conn.conn.RemoteAddr()) } else { s.Debugf("Ping <- %v.", conn.conn.RemoteAddr()) } tm := time.Now().UTC() conn.setLastHeartbeat(tm) go s.registerHeartbeat(tm) // since we block on select, time.After is re-created everytime we process a request. case <-time.After(defaults.ReverseTunnelOfflineThreshold): conn.markInvalid(trace.ConnectionProblem(nil, "no heartbeats for %v", defaults.ReverseTunnelOfflineThreshold)) } } }
[ "func", "(", "s", "*", "remoteSite", ")", "handleHeartbeat", "(", "conn", "*", "remoteConn", ",", "ch", "ssh", ".", "Channel", ",", "reqC", "<-", "chan", "*", "ssh", ".", "Request", ")", "{", "defer", "func", "(", ")", "{", "s", ".", "Infof", "(", "\"", "\"", ")", "\n", "conn", ".", "Close", "(", ")", "\n", "}", "(", ")", "\n", "for", "{", "select", "{", "case", "<-", "s", ".", "ctx", ".", "Done", "(", ")", ":", "s", ".", "Infof", "(", "\"", "\"", ")", "\n", "return", "\n", "case", "req", ":=", "<-", "reqC", ":", "if", "req", "==", "nil", "{", "s", ".", "Infof", "(", "\"", "\"", ")", "\n", "conn", ".", "markInvalid", "(", "trace", ".", "ConnectionProblem", "(", "nil", ",", "\"", "\"", ")", ")", "\n", "if", "!", "s", ".", "hasValidConnections", "(", ")", "{", "s", ".", "Debugf", "(", "\"", "\"", ")", "\n", "s", ".", "deleteConnectionRecord", "(", ")", "\n", "}", "\n", "return", "\n", "}", "\n", "var", "timeSent", "time", ".", "Time", "\n", "var", "roundtrip", "time", ".", "Duration", "\n", "if", "req", ".", "Payload", "!=", "nil", "{", "if", "err", ":=", "timeSent", ".", "UnmarshalText", "(", "req", ".", "Payload", ")", ";", "err", "==", "nil", "{", "roundtrip", "=", "s", ".", "srv", ".", "Clock", ".", "Now", "(", ")", ".", "Sub", "(", "timeSent", ")", "\n", "}", "\n", "}", "\n", "if", "roundtrip", "!=", "0", "{", "s", ".", "WithFields", "(", "log", ".", "Fields", "{", "\"", "\"", ":", "roundtrip", "}", ")", ".", "Debugf", "(", "\"", "\"", ",", "conn", ".", "conn", ".", "RemoteAddr", "(", ")", ")", "\n", "}", "else", "{", "s", ".", "Debugf", "(", "\"", "\"", ",", "conn", ".", "conn", ".", "RemoteAddr", "(", ")", ")", "\n", "}", "\n", "tm", ":=", "time", ".", "Now", "(", ")", ".", "UTC", "(", ")", "\n", "conn", ".", "setLastHeartbeat", "(", "tm", ")", "\n", "go", "s", ".", "registerHeartbeat", "(", "tm", ")", "\n", "// since we block on select, time.After is re-created everytime we process a request.", "case", "<-", "time", ".", "After", "(", "defaults", ".", "ReverseTunnelOfflineThreshold", ")", ":", "conn", ".", "markInvalid", "(", "trace", ".", "ConnectionProblem", "(", "nil", ",", "\"", "\"", ",", "defaults", ".", "ReverseTunnelOfflineThreshold", ")", ")", "\n", "}", "\n", "}", "\n", "}" ]
// handleHearbeat receives heartbeat messages from the connected agent // if the agent has missed several heartbeats in a row, Proxy marks // the connection as invalid.
[ "handleHearbeat", "receives", "heartbeat", "messages", "from", "the", "connected", "agent", "if", "the", "agent", "has", "missed", "several", "heartbeats", "in", "a", "row", "Proxy", "marks", "the", "connection", "as", "invalid", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L298-L338
train
gravitational/teleport
lib/reversetunnel/remotesite.go
updateCertAuthorities
func (s *remoteSite) updateCertAuthorities() error { // update main cluster cert authorities on the remote side // remote side makes sure that only relevant fields // are updated hostCA, err := s.localClient.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: s.srv.ClusterName, }, false) if err != nil { return trace.Wrap(err) } err = s.remoteClient.RotateExternalCertAuthority(hostCA) if err != nil { return trace.Wrap(err) } userCA, err := s.localClient.GetCertAuthority(services.CertAuthID{ Type: services.UserCA, DomainName: s.srv.ClusterName, }, false) if err != nil { return trace.Wrap(err) } err = s.remoteClient.RotateExternalCertAuthority(userCA) if err != nil { return trace.Wrap(err) } // update remote cluster's host cert authoritiy on a local cluster // local proxy is authorized to perform this operation only for // host authorities of remote clusters. remoteCA, err := s.remoteClient.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: s.domainName, }, false) if err != nil { return trace.Wrap(err) } if remoteCA.GetClusterName() != s.domainName { return trace.BadParameter( "remote cluster sent different cluster name %v instead of expected one %v", remoteCA.GetClusterName(), s.domainName) } err = s.localClient.UpsertCertAuthority(remoteCA) if err != nil { return trace.Wrap(err) } return s.compareAndSwapCertAuthority(remoteCA) }
go
func (s *remoteSite) updateCertAuthorities() error { // update main cluster cert authorities on the remote side // remote side makes sure that only relevant fields // are updated hostCA, err := s.localClient.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: s.srv.ClusterName, }, false) if err != nil { return trace.Wrap(err) } err = s.remoteClient.RotateExternalCertAuthority(hostCA) if err != nil { return trace.Wrap(err) } userCA, err := s.localClient.GetCertAuthority(services.CertAuthID{ Type: services.UserCA, DomainName: s.srv.ClusterName, }, false) if err != nil { return trace.Wrap(err) } err = s.remoteClient.RotateExternalCertAuthority(userCA) if err != nil { return trace.Wrap(err) } // update remote cluster's host cert authoritiy on a local cluster // local proxy is authorized to perform this operation only for // host authorities of remote clusters. remoteCA, err := s.remoteClient.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: s.domainName, }, false) if err != nil { return trace.Wrap(err) } if remoteCA.GetClusterName() != s.domainName { return trace.BadParameter( "remote cluster sent different cluster name %v instead of expected one %v", remoteCA.GetClusterName(), s.domainName) } err = s.localClient.UpsertCertAuthority(remoteCA) if err != nil { return trace.Wrap(err) } return s.compareAndSwapCertAuthority(remoteCA) }
[ "func", "(", "s", "*", "remoteSite", ")", "updateCertAuthorities", "(", ")", "error", "{", "// update main cluster cert authorities on the remote side", "// remote side makes sure that only relevant fields", "// are updated", "hostCA", ",", "err", ":=", "s", ".", "localClient", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "s", ".", "srv", ".", "ClusterName", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "err", "=", "s", ".", "remoteClient", ".", "RotateExternalCertAuthority", "(", "hostCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "userCA", ",", "err", ":=", "s", ".", "localClient", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "UserCA", ",", "DomainName", ":", "s", ".", "srv", ".", "ClusterName", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "err", "=", "s", ".", "remoteClient", ".", "RotateExternalCertAuthority", "(", "userCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// update remote cluster's host cert authoritiy on a local cluster", "// local proxy is authorized to perform this operation only for", "// host authorities of remote clusters.", "remoteCA", ",", "err", ":=", "s", ".", "remoteClient", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "s", ".", "domainName", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "remoteCA", ".", "GetClusterName", "(", ")", "!=", "s", ".", "domainName", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "remoteCA", ".", "GetClusterName", "(", ")", ",", "s", ".", "domainName", ")", "\n", "}", "\n", "err", "=", "s", ".", "localClient", ".", "UpsertCertAuthority", "(", "remoteCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "s", ".", "compareAndSwapCertAuthority", "(", "remoteCA", ")", "\n", "}" ]
// updateCertAuthorities updates local and remote cert authorities
[ "updateCertAuthorities", "updates", "local", "and", "remote", "cert", "authorities" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/remotesite.go#L371-L421
train
gravitational/teleport
lib/backend/report.go
CheckAndSetDefaults
func (r *ReporterConfig) CheckAndSetDefaults() error { if r.Backend == nil { return trace.BadParameter("missing parameter Backend") } if r.Component == "" { r.Component = teleport.ComponentBackend } return nil }
go
func (r *ReporterConfig) CheckAndSetDefaults() error { if r.Backend == nil { return trace.BadParameter("missing parameter Backend") } if r.Component == "" { r.Component = teleport.ComponentBackend } return nil }
[ "func", "(", "r", "*", "ReporterConfig", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "r", ".", "Backend", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "r", ".", "Component", "==", "\"", "\"", "{", "r", ".", "Component", "=", "teleport", ".", "ComponentBackend", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets
[ "CheckAndSetDefaults", "checks", "and", "sets" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/report.go#L44-L52
train
gravitational/teleport
lib/backend/report.go
NewReporter
func NewReporter(cfg ReporterConfig) (*Reporter, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } r := &Reporter{ ReporterConfig: cfg, } return r, nil }
go
func NewReporter(cfg ReporterConfig) (*Reporter, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } r := &Reporter{ ReporterConfig: cfg, } return r, nil }
[ "func", "NewReporter", "(", "cfg", "ReporterConfig", ")", "(", "*", "Reporter", ",", "error", ")", "{", "if", "err", ":=", "cfg", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "r", ":=", "&", "Reporter", "{", "ReporterConfig", ":", "cfg", ",", "}", "\n", "return", "r", ",", "nil", "\n", "}" ]
// NewReporter returns a new Reporter.
[ "NewReporter", "returns", "a", "new", "Reporter", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/report.go#L62-L70
train
gravitational/teleport
lib/backend/report.go
trackRequest
func (s *Reporter) trackRequest(opType OpType, key []byte, endKey []byte) { if !s.TrackTopRequests { return } if len(key) == 0 { return } // take just the first two parts, otherwise too many distinct requests // can end up in the map parts := bytes.Split(key, []byte{Separator}) if len(parts) > 3 { parts = parts[:3] } rangeSuffix := teleport.TagFalse if len(endKey) != 0 { // Range denotes range queries in stat entry rangeSuffix = teleport.TagTrue } counter, err := requests.GetMetricWithLabelValues(s.Component, string(bytes.Join(parts, []byte{Separator})), rangeSuffix) if err != nil { log.Warningf("Failed to get counter: %v", err) return } counter.Inc() }
go
func (s *Reporter) trackRequest(opType OpType, key []byte, endKey []byte) { if !s.TrackTopRequests { return } if len(key) == 0 { return } // take just the first two parts, otherwise too many distinct requests // can end up in the map parts := bytes.Split(key, []byte{Separator}) if len(parts) > 3 { parts = parts[:3] } rangeSuffix := teleport.TagFalse if len(endKey) != 0 { // Range denotes range queries in stat entry rangeSuffix = teleport.TagTrue } counter, err := requests.GetMetricWithLabelValues(s.Component, string(bytes.Join(parts, []byte{Separator})), rangeSuffix) if err != nil { log.Warningf("Failed to get counter: %v", err) return } counter.Inc() }
[ "func", "(", "s", "*", "Reporter", ")", "trackRequest", "(", "opType", "OpType", ",", "key", "[", "]", "byte", ",", "endKey", "[", "]", "byte", ")", "{", "if", "!", "s", ".", "TrackTopRequests", "{", "return", "\n", "}", "\n", "if", "len", "(", "key", ")", "==", "0", "{", "return", "\n", "}", "\n", "// take just the first two parts, otherwise too many distinct requests", "// can end up in the map", "parts", ":=", "bytes", ".", "Split", "(", "key", ",", "[", "]", "byte", "{", "Separator", "}", ")", "\n", "if", "len", "(", "parts", ")", ">", "3", "{", "parts", "=", "parts", "[", ":", "3", "]", "\n", "}", "\n", "rangeSuffix", ":=", "teleport", ".", "TagFalse", "\n", "if", "len", "(", "endKey", ")", "!=", "0", "{", "// Range denotes range queries in stat entry", "rangeSuffix", "=", "teleport", ".", "TagTrue", "\n", "}", "\n", "counter", ",", "err", ":=", "requests", ".", "GetMetricWithLabelValues", "(", "s", ".", "Component", ",", "string", "(", "bytes", ".", "Join", "(", "parts", ",", "[", "]", "byte", "{", "Separator", "}", ")", ")", ",", "rangeSuffix", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "\n", "}", "\n", "counter", ".", "Inc", "(", ")", "\n", "}" ]
// trackRequests tracks top requests, endKey is supplied for ranges
[ "trackRequests", "tracks", "top", "requests", "endKey", "is", "supplied", "for", "ranges" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/report.go#L220-L244
train
gravitational/teleport
lib/backend/report.go
NewReporterWatcher
func NewReporterWatcher(ctx context.Context, component string, w Watcher) *ReporterWatcher { rw := &ReporterWatcher{ Watcher: w, Component: component, } go rw.watch(ctx) return rw }
go
func NewReporterWatcher(ctx context.Context, component string, w Watcher) *ReporterWatcher { rw := &ReporterWatcher{ Watcher: w, Component: component, } go rw.watch(ctx) return rw }
[ "func", "NewReporterWatcher", "(", "ctx", "context", ".", "Context", ",", "component", "string", ",", "w", "Watcher", ")", "*", "ReporterWatcher", "{", "rw", ":=", "&", "ReporterWatcher", "{", "Watcher", ":", "w", ",", "Component", ":", "component", ",", "}", "\n", "go", "rw", ".", "watch", "(", "ctx", ")", "\n", "return", "rw", "\n", "}" ]
// NewReporterWatcher creates new reporter watcher instance
[ "NewReporterWatcher", "creates", "new", "reporter", "watcher", "instance" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/report.go#L254-L261
train
gravitational/teleport
lib/asciitable/table.go
MakeTable
func MakeTable(headers []string) Table { t := MakeHeadlessTable(len(headers)) for i := range t.columns { t.columns[i].title = headers[i] t.columns[i].width = len(headers[i]) } return t }
go
func MakeTable(headers []string) Table { t := MakeHeadlessTable(len(headers)) for i := range t.columns { t.columns[i].title = headers[i] t.columns[i].width = len(headers[i]) } return t }
[ "func", "MakeTable", "(", "headers", "[", "]", "string", ")", "Table", "{", "t", ":=", "MakeHeadlessTable", "(", "len", "(", "headers", ")", ")", "\n", "for", "i", ":=", "range", "t", ".", "columns", "{", "t", ".", "columns", "[", "i", "]", ".", "title", "=", "headers", "[", "i", "]", "\n", "t", ".", "columns", "[", "i", "]", ".", "width", "=", "len", "(", "headers", "[", "i", "]", ")", "\n", "}", "\n", "return", "t", "\n", "}" ]
// MakeTable creates a new instance of the table with given column names.
[ "MakeTable", "creates", "a", "new", "instance", "of", "the", "table", "with", "given", "column", "names", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/asciitable/table.go#L42-L49
train
gravitational/teleport
lib/asciitable/table.go
MakeHeadlessTable
func MakeHeadlessTable(columnCount int) Table { return Table{ columns: make([]column, columnCount), rows: make([][]string, 0), } }
go
func MakeHeadlessTable(columnCount int) Table { return Table{ columns: make([]column, columnCount), rows: make([][]string, 0), } }
[ "func", "MakeHeadlessTable", "(", "columnCount", "int", ")", "Table", "{", "return", "Table", "{", "columns", ":", "make", "(", "[", "]", "column", ",", "columnCount", ")", ",", "rows", ":", "make", "(", "[", "]", "[", "]", "string", ",", "0", ")", ",", "}", "\n", "}" ]
// MakeTable creates a new instance of the table without any column names. // The number of columns is required.
[ "MakeTable", "creates", "a", "new", "instance", "of", "the", "table", "without", "any", "column", "names", ".", "The", "number", "of", "columns", "is", "required", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/asciitable/table.go#L53-L58
train
gravitational/teleport
lib/asciitable/table.go
AddRow
func (t *Table) AddRow(row []string) { limit := min(len(row), len(t.columns)) for i := 0; i < limit; i++ { cellWidth := len(row[i]) t.columns[i].width = max(cellWidth, t.columns[i].width) } t.rows = append(t.rows, row[:limit]) }
go
func (t *Table) AddRow(row []string) { limit := min(len(row), len(t.columns)) for i := 0; i < limit; i++ { cellWidth := len(row[i]) t.columns[i].width = max(cellWidth, t.columns[i].width) } t.rows = append(t.rows, row[:limit]) }
[ "func", "(", "t", "*", "Table", ")", "AddRow", "(", "row", "[", "]", "string", ")", "{", "limit", ":=", "min", "(", "len", "(", "row", ")", ",", "len", "(", "t", ".", "columns", ")", ")", "\n", "for", "i", ":=", "0", ";", "i", "<", "limit", ";", "i", "++", "{", "cellWidth", ":=", "len", "(", "row", "[", "i", "]", ")", "\n", "t", ".", "columns", "[", "i", "]", ".", "width", "=", "max", "(", "cellWidth", ",", "t", ".", "columns", "[", "i", "]", ".", "width", ")", "\n", "}", "\n", "t", ".", "rows", "=", "append", "(", "t", ".", "rows", ",", "row", "[", ":", "limit", "]", ")", "\n", "}" ]
// AddRow adds a row of cells to the table.
[ "AddRow", "adds", "a", "row", "of", "cells", "to", "the", "table", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/asciitable/table.go#L61-L68
train
gravitational/teleport
lib/asciitable/table.go
IsHeadless
func (t *Table) IsHeadless() bool { total := 0 for i := range t.columns { total += len(t.columns[i].title) } return total == 0 }
go
func (t *Table) IsHeadless() bool { total := 0 for i := range t.columns { total += len(t.columns[i].title) } return total == 0 }
[ "func", "(", "t", "*", "Table", ")", "IsHeadless", "(", ")", "bool", "{", "total", ":=", "0", "\n", "for", "i", ":=", "range", "t", ".", "columns", "{", "total", "+=", "len", "(", "t", ".", "columns", "[", "i", "]", ".", "title", ")", "\n", "}", "\n", "return", "total", "==", "0", "\n", "}" ]
// IsHeadless returns true if none of the table title cells contains any text.
[ "IsHeadless", "returns", "true", "if", "none", "of", "the", "table", "title", "cells", "contains", "any", "text", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/asciitable/table.go#L104-L110
train
gravitational/teleport
lib/utils/uri.go
ParseSessionsURI
func ParseSessionsURI(in string) (*url.URL, error) { if in == "" { return nil, trace.BadParameter("uri is empty") } u, err := url.Parse(in) if err != nil { return nil, trace.BadParameter("failed to parse URI %q: %v", in, err) } if u.Scheme == "" { u.Scheme = teleport.SchemeFile } return u, nil }
go
func ParseSessionsURI(in string) (*url.URL, error) { if in == "" { return nil, trace.BadParameter("uri is empty") } u, err := url.Parse(in) if err != nil { return nil, trace.BadParameter("failed to parse URI %q: %v", in, err) } if u.Scheme == "" { u.Scheme = teleport.SchemeFile } return u, nil }
[ "func", "ParseSessionsURI", "(", "in", "string", ")", "(", "*", "url", ".", "URL", ",", "error", ")", "{", "if", "in", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "u", ",", "err", ":=", "url", ".", "Parse", "(", "in", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "in", ",", "err", ")", "\n", "}", "\n", "if", "u", ".", "Scheme", "==", "\"", "\"", "{", "u", ".", "Scheme", "=", "teleport", ".", "SchemeFile", "\n", "}", "\n", "return", "u", ",", "nil", "\n", "}" ]
// ParseSessionsURI parses uri per convention of session upload URIs // file is a default scheme
[ "ParseSessionsURI", "parses", "uri", "per", "convention", "of", "session", "upload", "URIs", "file", "is", "a", "default", "scheme" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/uri.go#L28-L40
train
gravitational/teleport
lib/utils/cli.go
GetIterations
func GetIterations() int { out := os.Getenv(teleport.IterationsEnvVar) if out == "" { return 1 } iter, err := strconv.Atoi(out) if err != nil { panic(err) } log.Debugf("Starting tests with %v iterations.", iter) return iter }
go
func GetIterations() int { out := os.Getenv(teleport.IterationsEnvVar) if out == "" { return 1 } iter, err := strconv.Atoi(out) if err != nil { panic(err) } log.Debugf("Starting tests with %v iterations.", iter) return iter }
[ "func", "GetIterations", "(", ")", "int", "{", "out", ":=", "os", ".", "Getenv", "(", "teleport", ".", "IterationsEnvVar", ")", "\n", "if", "out", "==", "\"", "\"", "{", "return", "1", "\n", "}", "\n", "iter", ",", "err", ":=", "strconv", ".", "Atoi", "(", "out", ")", "\n", "if", "err", "!=", "nil", "{", "panic", "(", "err", ")", "\n", "}", "\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "iter", ")", "\n", "return", "iter", "\n", "}" ]
// GetIterations provides a simple way to add iterations to the test // by setting environment variable "ITERATIONS", by default it returns 1
[ "GetIterations", "provides", "a", "simple", "way", "to", "add", "iterations", "to", "the", "test", "by", "setting", "environment", "variable", "ITERATIONS", "by", "default", "it", "returns", "1" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/cli.go#L103-L114
train
gravitational/teleport
lib/utils/cli.go
UserMessageFromError
func UserMessageFromError(err error) string { // untrusted cert? switch innerError := trace.Unwrap(err).(type) { case x509.HostnameError: return fmt.Sprintf("Cannot establish https connection to %s:\n%s\n%s\n", innerError.Host, innerError.Error(), "try a different hostname for --proxy or specify --insecure flag if you know what you're doing.") case x509.UnknownAuthorityError: return `WARNING: The proxy you are connecting to has presented a certificate signed by a unknown authority. This is most likely due to either being presented with a self-signed certificate or the certificate was truly signed by an authority not known to the client. If you know the certificate is self-signed and would like to ignore this error use the --insecure flag. If you have your own certificate authority that you would like to use to validate the certificate chain presented by the proxy, set the SSL_CERT_FILE and SSL_CERT_DIR environment variables respectively and try again. If you think something malicious may be occurring, contact your Teleport system administrator to resolve this issue. ` case x509.CertificateInvalidError: return fmt.Sprintf(`WARNING: The certificate presented by the proxy is invalid: %v. Contact your Teleport system administrator to resolve this issue.`, innerError) } if log.GetLevel() == log.DebugLevel { return trace.DebugReport(err) } if err != nil { // If the error is a trace error, check if it has a user message embedded in // it. If a user message is embedded in it, print the user message and the // original error. Otherwise return the original with a generic "A fatal // error occurred" message. if er, ok := err.(*trace.TraceErr); ok { if er.Message != "" { return fmt.Sprintf("error: %v", EscapeControl(er.Message)) } } return fmt.Sprintf("error: %v", EscapeControl(err.Error())) } return "" }
go
func UserMessageFromError(err error) string { // untrusted cert? switch innerError := trace.Unwrap(err).(type) { case x509.HostnameError: return fmt.Sprintf("Cannot establish https connection to %s:\n%s\n%s\n", innerError.Host, innerError.Error(), "try a different hostname for --proxy or specify --insecure flag if you know what you're doing.") case x509.UnknownAuthorityError: return `WARNING: The proxy you are connecting to has presented a certificate signed by a unknown authority. This is most likely due to either being presented with a self-signed certificate or the certificate was truly signed by an authority not known to the client. If you know the certificate is self-signed and would like to ignore this error use the --insecure flag. If you have your own certificate authority that you would like to use to validate the certificate chain presented by the proxy, set the SSL_CERT_FILE and SSL_CERT_DIR environment variables respectively and try again. If you think something malicious may be occurring, contact your Teleport system administrator to resolve this issue. ` case x509.CertificateInvalidError: return fmt.Sprintf(`WARNING: The certificate presented by the proxy is invalid: %v. Contact your Teleport system administrator to resolve this issue.`, innerError) } if log.GetLevel() == log.DebugLevel { return trace.DebugReport(err) } if err != nil { // If the error is a trace error, check if it has a user message embedded in // it. If a user message is embedded in it, print the user message and the // original error. Otherwise return the original with a generic "A fatal // error occurred" message. if er, ok := err.(*trace.TraceErr); ok { if er.Message != "" { return fmt.Sprintf("error: %v", EscapeControl(er.Message)) } } return fmt.Sprintf("error: %v", EscapeControl(err.Error())) } return "" }
[ "func", "UserMessageFromError", "(", "err", "error", ")", "string", "{", "// untrusted cert?", "switch", "innerError", ":=", "trace", ".", "Unwrap", "(", "err", ")", ".", "(", "type", ")", "{", "case", "x509", ".", "HostnameError", ":", "return", "fmt", ".", "Sprintf", "(", "\"", "\\n", "\\n", "\\n", "\"", ",", "innerError", ".", "Host", ",", "innerError", ".", "Error", "(", ")", ",", "\"", "\"", ")", "\n", "case", "x509", ".", "UnknownAuthorityError", ":", "return", "`WARNING:\n\n The proxy you are connecting to has presented a certificate signed by a\n unknown authority. This is most likely due to either being presented\n with a self-signed certificate or the certificate was truly signed by an\n authority not known to the client.\n\n If you know the certificate is self-signed and would like to ignore this\n error use the --insecure flag.\n\n If you have your own certificate authority that you would like to use to\n validate the certificate chain presented by the proxy, set the\n SSL_CERT_FILE and SSL_CERT_DIR environment variables respectively and try\n again.\n\n If you think something malicious may be occurring, contact your Teleport\n system administrator to resolve this issue.\n`", "\n", "case", "x509", ".", "CertificateInvalidError", ":", "return", "fmt", ".", "Sprintf", "(", "`WARNING:\n\n The certificate presented by the proxy is invalid: %v.\n\n Contact your Teleport system administrator to resolve this issue.`", ",", "innerError", ")", "\n", "}", "\n", "if", "log", ".", "GetLevel", "(", ")", "==", "log", ".", "DebugLevel", "{", "return", "trace", ".", "DebugReport", "(", "err", ")", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "// If the error is a trace error, check if it has a user message embedded in", "// it. If a user message is embedded in it, print the user message and the", "// original error. Otherwise return the original with a generic \"A fatal", "// error occurred\" message.", "if", "er", ",", "ok", ":=", "err", ".", "(", "*", "trace", ".", "TraceErr", ")", ";", "ok", "{", "if", "er", ".", "Message", "!=", "\"", "\"", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "EscapeControl", "(", "er", ".", "Message", ")", ")", "\n", "}", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "EscapeControl", "(", "err", ".", "Error", "(", ")", ")", ")", "\n", "}", "\n", "return", "\"", "\"", "\n", "}" ]
// UserMessageFromError returns user friendly error message from error
[ "UserMessageFromError", "returns", "user", "friendly", "error", "message", "from", "error" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/cli.go#L117-L167
train
gravitational/teleport
lib/utils/cli.go
InitCLIParser
func InitCLIParser(appName, appHelp string) (app *kingpin.Application) { app = kingpin.New(appName, appHelp) // hide "--help" flag app.HelpFlag.Hidden() app.HelpFlag.NoEnvar() // set our own help template return app.UsageTemplate(defaultUsageTemplate) }
go
func InitCLIParser(appName, appHelp string) (app *kingpin.Application) { app = kingpin.New(appName, appHelp) // hide "--help" flag app.HelpFlag.Hidden() app.HelpFlag.NoEnvar() // set our own help template return app.UsageTemplate(defaultUsageTemplate) }
[ "func", "InitCLIParser", "(", "appName", ",", "appHelp", "string", ")", "(", "app", "*", "kingpin", ".", "Application", ")", "{", "app", "=", "kingpin", ".", "New", "(", "appName", ",", "appHelp", ")", "\n\n", "// hide \"--help\" flag", "app", ".", "HelpFlag", ".", "Hidden", "(", ")", "\n", "app", ".", "HelpFlag", ".", "NoEnvar", "(", ")", "\n\n", "// set our own help template", "return", "app", ".", "UsageTemplate", "(", "defaultUsageTemplate", ")", "\n", "}" ]
// InitCLIParser configures kingpin command line args parser with // some defaults common for all Teleport CLI tools
[ "InitCLIParser", "configures", "kingpin", "command", "line", "args", "parser", "with", "some", "defaults", "common", "for", "all", "Teleport", "CLI", "tools" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/cli.go#L185-L194
train
gravitational/teleport
lib/utils/cli.go
needsQuoting
func needsQuoting(text string) bool { for _, r := range text { if !strconv.IsPrint(r) { return true } } return false }
go
func needsQuoting(text string) bool { for _, r := range text { if !strconv.IsPrint(r) { return true } } return false }
[ "func", "needsQuoting", "(", "text", "string", ")", "bool", "{", "for", "_", ",", "r", ":=", "range", "text", "{", "if", "!", "strconv", ".", "IsPrint", "(", "r", ")", "{", "return", "true", "\n", "}", "\n", "}", "\n", "return", "false", "\n", "}" ]
// needsQuoting returns true if any non-printable characters are found.
[ "needsQuoting", "returns", "true", "if", "any", "non", "-", "printable", "characters", "are", "found", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/cli.go#L208-L215
train
gravitational/teleport
lib/web/ui/server.go
MakeServers
func MakeServers(clusterName string, servers []services.Server) []Server { uiServers := []Server{} for _, server := range servers { uiLabels := []Label{} serverLabels := server.GetLabels() for name, value := range serverLabels { uiLabels = append(uiLabels, Label{ Name: name, Value: value, }) } serverCmdLabels := server.GetCmdLabels() for name, cmd := range serverCmdLabels { uiLabels = append(uiLabels, Label{ Name: name, Value: cmd.GetResult(), }) } sort.Sort(sortedLabels(uiLabels)) uiServers = append(uiServers, Server{ ClusterName: clusterName, Name: server.GetName(), Hostname: server.GetHostname(), Addr: server.GetAddr(), Labels: uiLabels, }) } return uiServers }
go
func MakeServers(clusterName string, servers []services.Server) []Server { uiServers := []Server{} for _, server := range servers { uiLabels := []Label{} serverLabels := server.GetLabels() for name, value := range serverLabels { uiLabels = append(uiLabels, Label{ Name: name, Value: value, }) } serverCmdLabels := server.GetCmdLabels() for name, cmd := range serverCmdLabels { uiLabels = append(uiLabels, Label{ Name: name, Value: cmd.GetResult(), }) } sort.Sort(sortedLabels(uiLabels)) uiServers = append(uiServers, Server{ ClusterName: clusterName, Name: server.GetName(), Hostname: server.GetHostname(), Addr: server.GetAddr(), Labels: uiLabels, }) } return uiServers }
[ "func", "MakeServers", "(", "clusterName", "string", ",", "servers", "[", "]", "services", ".", "Server", ")", "[", "]", "Server", "{", "uiServers", ":=", "[", "]", "Server", "{", "}", "\n", "for", "_", ",", "server", ":=", "range", "servers", "{", "uiLabels", ":=", "[", "]", "Label", "{", "}", "\n", "serverLabels", ":=", "server", ".", "GetLabels", "(", ")", "\n", "for", "name", ",", "value", ":=", "range", "serverLabels", "{", "uiLabels", "=", "append", "(", "uiLabels", ",", "Label", "{", "Name", ":", "name", ",", "Value", ":", "value", ",", "}", ")", "\n", "}", "\n\n", "serverCmdLabels", ":=", "server", ".", "GetCmdLabels", "(", ")", "\n", "for", "name", ",", "cmd", ":=", "range", "serverCmdLabels", "{", "uiLabels", "=", "append", "(", "uiLabels", ",", "Label", "{", "Name", ":", "name", ",", "Value", ":", "cmd", ".", "GetResult", "(", ")", ",", "}", ")", "\n", "}", "\n\n", "sort", ".", "Sort", "(", "sortedLabels", "(", "uiLabels", ")", ")", "\n\n", "uiServers", "=", "append", "(", "uiServers", ",", "Server", "{", "ClusterName", ":", "clusterName", ",", "Name", ":", "server", ".", "GetName", "(", ")", ",", "Hostname", ":", "server", ".", "GetHostname", "(", ")", ",", "Addr", ":", "server", ".", "GetAddr", "(", ")", ",", "Labels", ":", "uiLabels", ",", "}", ")", "\n", "}", "\n\n", "return", "uiServers", "\n", "}" ]
// MakeServers creates server objects for webapp
[ "MakeServers", "creates", "server", "objects", "for", "webapp" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/ui/server.go#L63-L95
train
gravitational/teleport
lib/service/signals.go
printShutdownStatus
func (process *TeleportProcess) printShutdownStatus(ctx context.Context) { t := time.NewTicker(defaults.HighResReportingPeriod) defer t.Stop() for { select { case <-ctx.Done(): return case <-t.C: log.Infof("Waiting for services: %v to finish.", process.Supervisor.Services()) } } }
go
func (process *TeleportProcess) printShutdownStatus(ctx context.Context) { t := time.NewTicker(defaults.HighResReportingPeriod) defer t.Stop() for { select { case <-ctx.Done(): return case <-t.C: log.Infof("Waiting for services: %v to finish.", process.Supervisor.Services()) } } }
[ "func", "(", "process", "*", "TeleportProcess", ")", "printShutdownStatus", "(", "ctx", "context", ".", "Context", ")", "{", "t", ":=", "time", ".", "NewTicker", "(", "defaults", ".", "HighResReportingPeriod", ")", "\n", "defer", "t", ".", "Stop", "(", ")", "\n", "for", "{", "select", "{", "case", "<-", "ctx", ".", "Done", "(", ")", ":", "return", "\n", "case", "<-", "t", ".", "C", ":", "log", ".", "Infof", "(", "\"", "\"", ",", "process", ".", "Supervisor", ".", "Services", "(", ")", ")", "\n", "}", "\n", "}", "\n", "}" ]
// printShutdownStatus prints running services until shut down
[ "printShutdownStatus", "prints", "running", "services", "until", "shut", "down" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/service/signals.go#L38-L49
train
gravitational/teleport
lib/service/signals.go
closeImportedDescriptors
func (process *TeleportProcess) closeImportedDescriptors(prefix string) error { process.Lock() defer process.Unlock() var errors []error for i := range process.importedDescriptors { d := process.importedDescriptors[i] if strings.HasPrefix(d.Type, prefix) { process.Infof("Closing imported but unused descriptor %v %v.", d.Type, d.Address) errors = append(errors, d.File.Close()) } } return trace.NewAggregate(errors...) }
go
func (process *TeleportProcess) closeImportedDescriptors(prefix string) error { process.Lock() defer process.Unlock() var errors []error for i := range process.importedDescriptors { d := process.importedDescriptors[i] if strings.HasPrefix(d.Type, prefix) { process.Infof("Closing imported but unused descriptor %v %v.", d.Type, d.Address) errors = append(errors, d.File.Close()) } } return trace.NewAggregate(errors...) }
[ "func", "(", "process", "*", "TeleportProcess", ")", "closeImportedDescriptors", "(", "prefix", "string", ")", "error", "{", "process", ".", "Lock", "(", ")", "\n", "defer", "process", ".", "Unlock", "(", ")", "\n\n", "var", "errors", "[", "]", "error", "\n", "for", "i", ":=", "range", "process", ".", "importedDescriptors", "{", "d", ":=", "process", ".", "importedDescriptors", "[", "i", "]", "\n", "if", "strings", ".", "HasPrefix", "(", "d", ".", "Type", ",", "prefix", ")", "{", "process", ".", "Infof", "(", "\"", "\"", ",", "d", ".", "Type", ",", "d", ".", "Address", ")", "\n", "errors", "=", "append", "(", "errors", ",", "d", ".", "File", ".", "Close", "(", ")", ")", "\n", "}", "\n", "}", "\n", "return", "trace", ".", "NewAggregate", "(", "errors", "...", ")", "\n", "}" ]
// closeImportedDescriptors closes imported but unused file descriptors, // what could happen if service has updated configuration
[ "closeImportedDescriptors", "closes", "imported", "but", "unused", "file", "descriptors", "what", "could", "happen", "if", "service", "has", "updated", "configuration" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/service/signals.go#L186-L199
train
gravitational/teleport
lib/service/signals.go
importListener
func (process *TeleportProcess) importListener(listenerType, address string) (net.Listener, error) { process.Lock() defer process.Unlock() for i := range process.importedDescriptors { d := process.importedDescriptors[i] if d.Type == listenerType && d.Address == address { l, err := d.ToListener() if err != nil { return nil, trace.Wrap(err) } process.importedDescriptors = append(process.importedDescriptors[:i], process.importedDescriptors[i+1:]...) process.registeredListeners = append(process.registeredListeners, RegisteredListener{Type: listenerType, Address: address, Listener: l}) return l, nil } } return nil, trace.NotFound("no file descriptor for type %v and address %v has been imported", listenerType, address) }
go
func (process *TeleportProcess) importListener(listenerType, address string) (net.Listener, error) { process.Lock() defer process.Unlock() for i := range process.importedDescriptors { d := process.importedDescriptors[i] if d.Type == listenerType && d.Address == address { l, err := d.ToListener() if err != nil { return nil, trace.Wrap(err) } process.importedDescriptors = append(process.importedDescriptors[:i], process.importedDescriptors[i+1:]...) process.registeredListeners = append(process.registeredListeners, RegisteredListener{Type: listenerType, Address: address, Listener: l}) return l, nil } } return nil, trace.NotFound("no file descriptor for type %v and address %v has been imported", listenerType, address) }
[ "func", "(", "process", "*", "TeleportProcess", ")", "importListener", "(", "listenerType", ",", "address", "string", ")", "(", "net", ".", "Listener", ",", "error", ")", "{", "process", ".", "Lock", "(", ")", "\n", "defer", "process", ".", "Unlock", "(", ")", "\n\n", "for", "i", ":=", "range", "process", ".", "importedDescriptors", "{", "d", ":=", "process", ".", "importedDescriptors", "[", "i", "]", "\n", "if", "d", ".", "Type", "==", "listenerType", "&&", "d", ".", "Address", "==", "address", "{", "l", ",", "err", ":=", "d", ".", "ToListener", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "process", ".", "importedDescriptors", "=", "append", "(", "process", ".", "importedDescriptors", "[", ":", "i", "]", ",", "process", ".", "importedDescriptors", "[", "i", "+", "1", ":", "]", "...", ")", "\n", "process", ".", "registeredListeners", "=", "append", "(", "process", ".", "registeredListeners", ",", "RegisteredListener", "{", "Type", ":", "listenerType", ",", "Address", ":", "address", ",", "Listener", ":", "l", "}", ")", "\n", "return", "l", ",", "nil", "\n", "}", "\n", "}", "\n\n", "return", "nil", ",", "trace", ".", "NotFound", "(", "\"", "\"", ",", "listenerType", ",", "address", ")", "\n", "}" ]
// importListener imports listener passed by the parent process, if no listener is found // returns NotFound, otherwise removes the file from the list
[ "importListener", "imports", "listener", "passed", "by", "the", "parent", "process", "if", "no", "listener", "is", "found", "returns", "NotFound", "otherwise", "removes", "the", "file", "from", "the", "list" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/service/signals.go#L233-L251
train
gravitational/teleport
lib/service/signals.go
createListener
func (process *TeleportProcess) createListener(listenerType, address string) (net.Listener, error) { listener, err := net.Listen("tcp", address) if err != nil { return nil, trace.Wrap(err) } process.Lock() defer process.Unlock() r := RegisteredListener{Type: listenerType, Address: address, Listener: listener} process.registeredListeners = append(process.registeredListeners, r) return listener, nil }
go
func (process *TeleportProcess) createListener(listenerType, address string) (net.Listener, error) { listener, err := net.Listen("tcp", address) if err != nil { return nil, trace.Wrap(err) } process.Lock() defer process.Unlock() r := RegisteredListener{Type: listenerType, Address: address, Listener: listener} process.registeredListeners = append(process.registeredListeners, r) return listener, nil }
[ "func", "(", "process", "*", "TeleportProcess", ")", "createListener", "(", "listenerType", ",", "address", "string", ")", "(", "net", ".", "Listener", ",", "error", ")", "{", "listener", ",", "err", ":=", "net", ".", "Listen", "(", "\"", "\"", ",", "address", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "process", ".", "Lock", "(", ")", "\n", "defer", "process", ".", "Unlock", "(", ")", "\n", "r", ":=", "RegisteredListener", "{", "Type", ":", "listenerType", ",", "Address", ":", "address", ",", "Listener", ":", "listener", "}", "\n", "process", ".", "registeredListeners", "=", "append", "(", "process", ".", "registeredListeners", ",", "r", ")", "\n", "return", "listener", ",", "nil", "\n", "}" ]
// createListener creates listener and adds to a list of tracked listeners
[ "createListener", "creates", "listener", "and", "adds", "to", "a", "list", "of", "tracked", "listeners" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/service/signals.go#L254-L264
train
gravitational/teleport
lib/service/signals.go
ExportFileDescriptors
func (process *TeleportProcess) ExportFileDescriptors() ([]FileDescriptor, error) { var out []FileDescriptor process.Lock() defer process.Unlock() for _, r := range process.registeredListeners { file, err := utils.GetListenerFile(r.Listener) if err != nil { return nil, trace.Wrap(err) } out = append(out, FileDescriptor{File: file, Type: r.Type, Address: r.Address}) } return out, nil }
go
func (process *TeleportProcess) ExportFileDescriptors() ([]FileDescriptor, error) { var out []FileDescriptor process.Lock() defer process.Unlock() for _, r := range process.registeredListeners { file, err := utils.GetListenerFile(r.Listener) if err != nil { return nil, trace.Wrap(err) } out = append(out, FileDescriptor{File: file, Type: r.Type, Address: r.Address}) } return out, nil }
[ "func", "(", "process", "*", "TeleportProcess", ")", "ExportFileDescriptors", "(", ")", "(", "[", "]", "FileDescriptor", ",", "error", ")", "{", "var", "out", "[", "]", "FileDescriptor", "\n", "process", ".", "Lock", "(", ")", "\n", "defer", "process", ".", "Unlock", "(", ")", "\n", "for", "_", ",", "r", ":=", "range", "process", ".", "registeredListeners", "{", "file", ",", "err", ":=", "utils", ".", "GetListenerFile", "(", "r", ".", "Listener", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", "=", "append", "(", "out", ",", "FileDescriptor", "{", "File", ":", "file", ",", "Type", ":", "r", ".", "Type", ",", "Address", ":", "r", ".", "Address", "}", ")", "\n", "}", "\n", "return", "out", ",", "nil", "\n", "}" ]
// ExportFileDescriptors exports file descriptors to be passed to child process
[ "ExportFileDescriptors", "exports", "file", "descriptors", "to", "be", "passed", "to", "child", "process" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/service/signals.go#L267-L279
train
gravitational/teleport
lib/service/signals.go
importFileDescriptors
func importFileDescriptors() ([]FileDescriptor, error) { // These files may be passed in by the parent process filesString := os.Getenv(teleportFilesEnvVar) if filesString == "" { return nil, nil } files, err := filesFromString(filesString) if err != nil { return nil, trace.BadParameter("child process has failed to read files, error %q", err) } if len(files) != 0 { log.Infof("Child has been passed files: %v", files) } return files, nil }
go
func importFileDescriptors() ([]FileDescriptor, error) { // These files may be passed in by the parent process filesString := os.Getenv(teleportFilesEnvVar) if filesString == "" { return nil, nil } files, err := filesFromString(filesString) if err != nil { return nil, trace.BadParameter("child process has failed to read files, error %q", err) } if len(files) != 0 { log.Infof("Child has been passed files: %v", files) } return files, nil }
[ "func", "importFileDescriptors", "(", ")", "(", "[", "]", "FileDescriptor", ",", "error", ")", "{", "// These files may be passed in by the parent process", "filesString", ":=", "os", ".", "Getenv", "(", "teleportFilesEnvVar", ")", "\n", "if", "filesString", "==", "\"", "\"", "{", "return", "nil", ",", "nil", "\n", "}", "\n\n", "files", ",", "err", ":=", "filesFromString", "(", "filesString", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "if", "len", "(", "files", ")", "!=", "0", "{", "log", ".", "Infof", "(", "\"", "\"", ",", "files", ")", "\n", "}", "\n\n", "return", "files", ",", "nil", "\n", "}" ]
// importFileDescriptors imports file descriptors from environment if there are any
[ "importFileDescriptors", "imports", "file", "descriptors", "from", "environment", "if", "there", "are", "any" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/service/signals.go#L282-L299
train
gravitational/teleport
lib/events/recorder.go
NewForwardRecorder
func NewForwardRecorder(cfg ForwardRecorderConfig) (*ForwardRecorder, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } // Always write sessions to local disk first, then forward them to the Auth // Server later. auditLog, err := NewForwarder(ForwarderConfig{ SessionID: cfg.SessionID, ServerID: teleport.ComponentUpload, DataDir: cfg.DataDir, RecordSessions: cfg.RecordSessions, Namespace: cfg.Namespace, ForwardTo: cfg.ForwardTo, }) if err != nil { return nil, trace.Wrap(err) } sr := &ForwardRecorder{ ForwardRecorderConfig: cfg, Entry: logrus.WithFields(logrus.Fields{ trace.Component: cfg.Component, }), AuditLog: auditLog, } return sr, nil }
go
func NewForwardRecorder(cfg ForwardRecorderConfig) (*ForwardRecorder, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } // Always write sessions to local disk first, then forward them to the Auth // Server later. auditLog, err := NewForwarder(ForwarderConfig{ SessionID: cfg.SessionID, ServerID: teleport.ComponentUpload, DataDir: cfg.DataDir, RecordSessions: cfg.RecordSessions, Namespace: cfg.Namespace, ForwardTo: cfg.ForwardTo, }) if err != nil { return nil, trace.Wrap(err) } sr := &ForwardRecorder{ ForwardRecorderConfig: cfg, Entry: logrus.WithFields(logrus.Fields{ trace.Component: cfg.Component, }), AuditLog: auditLog, } return sr, nil }
[ "func", "NewForwardRecorder", "(", "cfg", "ForwardRecorderConfig", ")", "(", "*", "ForwardRecorder", ",", "error", ")", "{", "if", "err", ":=", "cfg", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Always write sessions to local disk first, then forward them to the Auth", "// Server later.", "auditLog", ",", "err", ":=", "NewForwarder", "(", "ForwarderConfig", "{", "SessionID", ":", "cfg", ".", "SessionID", ",", "ServerID", ":", "teleport", ".", "ComponentUpload", ",", "DataDir", ":", "cfg", ".", "DataDir", ",", "RecordSessions", ":", "cfg", ".", "RecordSessions", ",", "Namespace", ":", "cfg", ".", "Namespace", ",", "ForwardTo", ":", "cfg", ".", "ForwardTo", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "sr", ":=", "&", "ForwardRecorder", "{", "ForwardRecorderConfig", ":", "cfg", ",", "Entry", ":", "logrus", ".", "WithFields", "(", "logrus", ".", "Fields", "{", "trace", ".", "Component", ":", "cfg", ".", "Component", ",", "}", ")", ",", "AuditLog", ":", "auditLog", ",", "}", "\n", "return", "sr", ",", "nil", "\n", "}" ]
// NewForwardRecorder returns a new instance of session recorder
[ "NewForwardRecorder", "returns", "a", "new", "instance", "of", "session", "recorder" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/recorder.go#L112-L139
train
gravitational/teleport
lib/events/recorder.go
Write
func (r *ForwardRecorder) Write(data []byte) (int, error) { // we are copying buffer to prevent data corruption: // io.Copy allocates single buffer and calls multiple writes in a loop // our PostSessionSlice is async and sends reader wrapping buffer // to the channel. This can lead to cases when the buffer is re-used // and data is corrupted unless we copy the data buffer in the first place dataCopy := make([]byte, len(data)) copy(dataCopy, data) // post the chunk of bytes to the audit log: chunk := &SessionChunk{ EventType: SessionPrintEvent, Data: dataCopy, Time: time.Now().UTC().UnixNano(), } if err := r.AuditLog.PostSessionSlice(SessionSlice{ Namespace: r.Namespace, SessionID: string(r.SessionID), Chunks: []*SessionChunk{chunk}, }); err != nil { r.Error(trace.DebugReport(err)) } return len(data), nil }
go
func (r *ForwardRecorder) Write(data []byte) (int, error) { // we are copying buffer to prevent data corruption: // io.Copy allocates single buffer and calls multiple writes in a loop // our PostSessionSlice is async and sends reader wrapping buffer // to the channel. This can lead to cases when the buffer is re-used // and data is corrupted unless we copy the data buffer in the first place dataCopy := make([]byte, len(data)) copy(dataCopy, data) // post the chunk of bytes to the audit log: chunk := &SessionChunk{ EventType: SessionPrintEvent, Data: dataCopy, Time: time.Now().UTC().UnixNano(), } if err := r.AuditLog.PostSessionSlice(SessionSlice{ Namespace: r.Namespace, SessionID: string(r.SessionID), Chunks: []*SessionChunk{chunk}, }); err != nil { r.Error(trace.DebugReport(err)) } return len(data), nil }
[ "func", "(", "r", "*", "ForwardRecorder", ")", "Write", "(", "data", "[", "]", "byte", ")", "(", "int", ",", "error", ")", "{", "// we are copying buffer to prevent data corruption:", "// io.Copy allocates single buffer and calls multiple writes in a loop", "// our PostSessionSlice is async and sends reader wrapping buffer", "// to the channel. This can lead to cases when the buffer is re-used", "// and data is corrupted unless we copy the data buffer in the first place", "dataCopy", ":=", "make", "(", "[", "]", "byte", ",", "len", "(", "data", ")", ")", "\n", "copy", "(", "dataCopy", ",", "data", ")", "\n", "// post the chunk of bytes to the audit log:", "chunk", ":=", "&", "SessionChunk", "{", "EventType", ":", "SessionPrintEvent", ",", "Data", ":", "dataCopy", ",", "Time", ":", "time", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "UnixNano", "(", ")", ",", "}", "\n", "if", "err", ":=", "r", ".", "AuditLog", ".", "PostSessionSlice", "(", "SessionSlice", "{", "Namespace", ":", "r", ".", "Namespace", ",", "SessionID", ":", "string", "(", "r", ".", "SessionID", ")", ",", "Chunks", ":", "[", "]", "*", "SessionChunk", "{", "chunk", "}", ",", "}", ")", ";", "err", "!=", "nil", "{", "r", ".", "Error", "(", "trace", ".", "DebugReport", "(", "err", ")", ")", "\n", "}", "\n", "return", "len", "(", "data", ")", ",", "nil", "\n", "}" ]
// Write takes a chunk and writes it into the audit log
[ "Write", "takes", "a", "chunk", "and", "writes", "it", "into", "the", "audit", "log" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/recorder.go#L147-L169
train
gravitational/teleport
lib/events/recorder.go
Close
func (r *ForwardRecorder) Close() error { var errors []error err := r.AuditLog.Close() errors = append(errors, err) // wait until all events from recorder get flushed, it is important // to do so before we send SessionEndEvent to advise the audit log // to release resources associated with this session. // not doing so will not result in memory leak, but could result // in missing playback events context, cancel := context.WithTimeout(context.TODO(), defaults.ReadHeadersTimeout) defer cancel() // releases resources if slowOperation completes before timeout elapses err = r.AuditLog.WaitForDelivery(context) if err != nil { errors = append(errors, err) r.Warnf("Timeout waiting for session to flush events: %v", trace.DebugReport(err)) } return trace.NewAggregate(errors...) }
go
func (r *ForwardRecorder) Close() error { var errors []error err := r.AuditLog.Close() errors = append(errors, err) // wait until all events from recorder get flushed, it is important // to do so before we send SessionEndEvent to advise the audit log // to release resources associated with this session. // not doing so will not result in memory leak, but could result // in missing playback events context, cancel := context.WithTimeout(context.TODO(), defaults.ReadHeadersTimeout) defer cancel() // releases resources if slowOperation completes before timeout elapses err = r.AuditLog.WaitForDelivery(context) if err != nil { errors = append(errors, err) r.Warnf("Timeout waiting for session to flush events: %v", trace.DebugReport(err)) } return trace.NewAggregate(errors...) }
[ "func", "(", "r", "*", "ForwardRecorder", ")", "Close", "(", ")", "error", "{", "var", "errors", "[", "]", "error", "\n", "err", ":=", "r", ".", "AuditLog", ".", "Close", "(", ")", "\n", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n\n", "// wait until all events from recorder get flushed, it is important", "// to do so before we send SessionEndEvent to advise the audit log", "// to release resources associated with this session.", "// not doing so will not result in memory leak, but could result", "// in missing playback events", "context", ",", "cancel", ":=", "context", ".", "WithTimeout", "(", "context", ".", "TODO", "(", ")", ",", "defaults", ".", "ReadHeadersTimeout", ")", "\n", "defer", "cancel", "(", ")", "// releases resources if slowOperation completes before timeout elapses", "\n", "err", "=", "r", ".", "AuditLog", ".", "WaitForDelivery", "(", "context", ")", "\n", "if", "err", "!=", "nil", "{", "errors", "=", "append", "(", "errors", ",", "err", ")", "\n", "r", ".", "Warnf", "(", "\"", "\"", ",", "trace", ".", "DebugReport", "(", "err", ")", ")", "\n", "}", "\n\n", "return", "trace", ".", "NewAggregate", "(", "errors", "...", ")", "\n", "}" ]
// Close closes audit log session recorder
[ "Close", "closes", "audit", "log", "session", "recorder" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/recorder.go#L172-L191
train
gravitational/teleport
lib/backend/helpers.go
AcquireLock
func AcquireLock(ctx context.Context, backend Backend, lockName string, ttl time.Duration) (err error) { if lockName == "" { return trace.BadParameter("missing parameter lock name") } key := []byte(filepath.Join(locksPrefix, lockName)) for { // Get will clear TTL on a lock backend.Get(ctx, key) // CreateVal is atomic: _, err = backend.Create(ctx, Item{Key: key, Value: []byte{1}, Expires: backend.Clock().Now().UTC().Add(ttl)}) if err == nil { break // success } if trace.IsAlreadyExists(err) { // locked? wait and repeat: backend.Clock().Sleep(250 * time.Millisecond) continue } return trace.ConvertSystemError(err) } return nil }
go
func AcquireLock(ctx context.Context, backend Backend, lockName string, ttl time.Duration) (err error) { if lockName == "" { return trace.BadParameter("missing parameter lock name") } key := []byte(filepath.Join(locksPrefix, lockName)) for { // Get will clear TTL on a lock backend.Get(ctx, key) // CreateVal is atomic: _, err = backend.Create(ctx, Item{Key: key, Value: []byte{1}, Expires: backend.Clock().Now().UTC().Add(ttl)}) if err == nil { break // success } if trace.IsAlreadyExists(err) { // locked? wait and repeat: backend.Clock().Sleep(250 * time.Millisecond) continue } return trace.ConvertSystemError(err) } return nil }
[ "func", "AcquireLock", "(", "ctx", "context", ".", "Context", ",", "backend", "Backend", ",", "lockName", "string", ",", "ttl", "time", ".", "Duration", ")", "(", "err", "error", ")", "{", "if", "lockName", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "key", ":=", "[", "]", "byte", "(", "filepath", ".", "Join", "(", "locksPrefix", ",", "lockName", ")", ")", "\n", "for", "{", "// Get will clear TTL on a lock", "backend", ".", "Get", "(", "ctx", ",", "key", ")", "\n\n", "// CreateVal is atomic:", "_", ",", "err", "=", "backend", ".", "Create", "(", "ctx", ",", "Item", "{", "Key", ":", "key", ",", "Value", ":", "[", "]", "byte", "{", "1", "}", ",", "Expires", ":", "backend", ".", "Clock", "(", ")", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "ttl", ")", "}", ")", "\n", "if", "err", "==", "nil", "{", "break", "// success", "\n", "}", "\n", "if", "trace", ".", "IsAlreadyExists", "(", "err", ")", "{", "// locked? wait and repeat:", "backend", ".", "Clock", "(", ")", ".", "Sleep", "(", "250", "*", "time", ".", "Millisecond", ")", "\n", "continue", "\n", "}", "\n", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// AcquireLock grabs a lock that will be released automatically in TTL
[ "AcquireLock", "grabs", "a", "lock", "that", "will", "be", "released", "automatically", "in", "TTL" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/helpers.go#L30-L51
train
gravitational/teleport
lib/backend/helpers.go
ReleaseLock
func ReleaseLock(ctx context.Context, backend Backend, lockName string) error { if lockName == "" { return trace.BadParameter("missing parameter lockName") } key := []byte(filepath.Join(locksPrefix, lockName)) if err := backend.Delete(ctx, key); err != nil { return trace.Wrap(err) } return nil }
go
func ReleaseLock(ctx context.Context, backend Backend, lockName string) error { if lockName == "" { return trace.BadParameter("missing parameter lockName") } key := []byte(filepath.Join(locksPrefix, lockName)) if err := backend.Delete(ctx, key); err != nil { return trace.Wrap(err) } return nil }
[ "func", "ReleaseLock", "(", "ctx", "context", ".", "Context", ",", "backend", "Backend", ",", "lockName", "string", ")", "error", "{", "if", "lockName", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "key", ":=", "[", "]", "byte", "(", "filepath", ".", "Join", "(", "locksPrefix", ",", "lockName", ")", ")", "\n", "if", "err", ":=", "backend", ".", "Delete", "(", "ctx", ",", "key", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// ReleaseLock forces lock release
[ "ReleaseLock", "forces", "lock", "release" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/backend/helpers.go#L54-L63
train
gravitational/teleport
lib/services/authority.go
Check
func (c *HostCertParams) Check() error { if c.HostID == "" && len(c.Principals) == 0 { return trace.BadParameter("HostID [%q] or Principals [%q] are required", c.HostID, c.Principals) } if c.ClusterName == "" { return trace.BadParameter("ClusterName [%q] is required", c.ClusterName) } if err := c.Roles.Check(); err != nil { return trace.Wrap(err) } return nil }
go
func (c *HostCertParams) Check() error { if c.HostID == "" && len(c.Principals) == 0 { return trace.BadParameter("HostID [%q] or Principals [%q] are required", c.HostID, c.Principals) } if c.ClusterName == "" { return trace.BadParameter("ClusterName [%q] is required", c.ClusterName) } if err := c.Roles.Check(); err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "HostCertParams", ")", "Check", "(", ")", "error", "{", "if", "c", ".", "HostID", "==", "\"", "\"", "&&", "len", "(", "c", ".", "Principals", ")", "==", "0", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ".", "HostID", ",", "c", ".", "Principals", ")", "\n", "}", "\n", "if", "c", ".", "ClusterName", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ".", "ClusterName", ")", "\n", "}", "\n\n", "if", "err", ":=", "c", ".", "Roles", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// Check checks parameters for errors
[ "Check", "checks", "parameters", "for", "errors" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L57-L71
train
gravitational/teleport
lib/services/authority.go
MarshalCertRoles
func MarshalCertRoles(roles []string) (string, error) { out, err := json.Marshal(CertRoles{Version: V1, Roles: roles}) if err != nil { return "", trace.Wrap(err) } return string(out), err }
go
func MarshalCertRoles(roles []string) (string, error) { out, err := json.Marshal(CertRoles{Version: V1, Roles: roles}) if err != nil { return "", trace.Wrap(err) } return string(out), err }
[ "func", "MarshalCertRoles", "(", "roles", "[", "]", "string", ")", "(", "string", ",", "error", ")", "{", "out", ",", "err", ":=", "json", ".", "Marshal", "(", "CertRoles", "{", "Version", ":", "V1", ",", "Roles", ":", "roles", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "string", "(", "out", ")", ",", "err", "\n", "}" ]
// MarshalCertRoles marshal roles list to OpenSSH
[ "MarshalCertRoles", "marshal", "roles", "list", "to", "OpenSSH" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L133-L139
train
gravitational/teleport
lib/services/authority.go
UnmarshalCertRoles
func UnmarshalCertRoles(data string) ([]string, error) { var certRoles CertRoles if err := utils.UnmarshalWithSchema(CertRolesSchema, &certRoles, []byte(data)); err != nil { return nil, trace.BadParameter(err.Error()) } return certRoles.Roles, nil }
go
func UnmarshalCertRoles(data string) ([]string, error) { var certRoles CertRoles if err := utils.UnmarshalWithSchema(CertRolesSchema, &certRoles, []byte(data)); err != nil { return nil, trace.BadParameter(err.Error()) } return certRoles.Roles, nil }
[ "func", "UnmarshalCertRoles", "(", "data", "string", ")", "(", "[", "]", "string", ",", "error", ")", "{", "var", "certRoles", "CertRoles", "\n", "if", "err", ":=", "utils", ".", "UnmarshalWithSchema", "(", "CertRolesSchema", ",", "&", "certRoles", ",", "[", "]", "byte", "(", "data", ")", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "return", "certRoles", ".", "Roles", ",", "nil", "\n", "}" ]
// UnmarshalCertRoles marshals roles list to OpenSSH
[ "UnmarshalCertRoles", "marshals", "roles", "list", "to", "OpenSSH" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L142-L148
train
gravitational/teleport
lib/services/authority.go
CertPoolFromCertAuthorities
func CertPoolFromCertAuthorities(cas []CertAuthority) (*x509.CertPool, error) { certPool := x509.NewCertPool() for _, ca := range cas { keyPairs := ca.GetTLSKeyPairs() if len(keyPairs) == 0 { continue } for _, keyPair := range keyPairs { cert, err := tlsca.ParseCertificatePEM(keyPair.Cert) if err != nil { return nil, trace.Wrap(err) } certPool.AddCert(cert) } return certPool, nil } return certPool, nil }
go
func CertPoolFromCertAuthorities(cas []CertAuthority) (*x509.CertPool, error) { certPool := x509.NewCertPool() for _, ca := range cas { keyPairs := ca.GetTLSKeyPairs() if len(keyPairs) == 0 { continue } for _, keyPair := range keyPairs { cert, err := tlsca.ParseCertificatePEM(keyPair.Cert) if err != nil { return nil, trace.Wrap(err) } certPool.AddCert(cert) } return certPool, nil } return certPool, nil }
[ "func", "CertPoolFromCertAuthorities", "(", "cas", "[", "]", "CertAuthority", ")", "(", "*", "x509", ".", "CertPool", ",", "error", ")", "{", "certPool", ":=", "x509", ".", "NewCertPool", "(", ")", "\n", "for", "_", ",", "ca", ":=", "range", "cas", "{", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n", "if", "len", "(", "keyPairs", ")", "==", "0", "{", "continue", "\n", "}", "\n", "for", "_", ",", "keyPair", ":=", "range", "keyPairs", "{", "cert", ",", "err", ":=", "tlsca", ".", "ParseCertificatePEM", "(", "keyPair", ".", "Cert", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "certPool", ".", "AddCert", "(", "cert", ")", "\n", "}", "\n", "return", "certPool", ",", "nil", "\n", "}", "\n", "return", "certPool", ",", "nil", "\n", "}" ]
// CertPoolFromCertAuthorities returns certificate pools from TLS certificates // set up in the certificate authorities list
[ "CertPoolFromCertAuthorities", "returns", "certificate", "pools", "from", "TLS", "certificates", "set", "up", "in", "the", "certificate", "authorities", "list" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L217-L234
train
gravitational/teleport
lib/services/authority.go
TLSCerts
func TLSCerts(ca CertAuthority) [][]byte { pairs := ca.GetTLSKeyPairs() out := make([][]byte, len(pairs)) for i, pair := range pairs { out[i] = append([]byte{}, pair.Cert...) } return out }
go
func TLSCerts(ca CertAuthority) [][]byte { pairs := ca.GetTLSKeyPairs() out := make([][]byte, len(pairs)) for i, pair := range pairs { out[i] = append([]byte{}, pair.Cert...) } return out }
[ "func", "TLSCerts", "(", "ca", "CertAuthority", ")", "[", "]", "[", "]", "byte", "{", "pairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n", "out", ":=", "make", "(", "[", "]", "[", "]", "byte", ",", "len", "(", "pairs", ")", ")", "\n", "for", "i", ",", "pair", ":=", "range", "pairs", "{", "out", "[", "i", "]", "=", "append", "(", "[", "]", "byte", "{", "}", ",", "pair", ".", "Cert", "...", ")", "\n", "}", "\n", "return", "out", "\n", "}" ]
// TLSCerts returns TLS certificates from CA
[ "TLSCerts", "returns", "TLS", "certificates", "from", "CA" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L255-L262
train
gravitational/teleport
lib/services/authority.go
NewCertAuthority
func NewCertAuthority(caType CertAuthType, clusterName string, signingKeys, checkingKeys [][]byte, roles []string) CertAuthority { return &CertAuthorityV2{ Kind: KindCertAuthority, Version: V2, SubKind: string(caType), Metadata: Metadata{ Name: clusterName, Namespace: defaults.Namespace, }, Spec: CertAuthoritySpecV2{ Roles: roles, Type: caType, ClusterName: clusterName, CheckingKeys: checkingKeys, SigningKeys: signingKeys, }, } }
go
func NewCertAuthority(caType CertAuthType, clusterName string, signingKeys, checkingKeys [][]byte, roles []string) CertAuthority { return &CertAuthorityV2{ Kind: KindCertAuthority, Version: V2, SubKind: string(caType), Metadata: Metadata{ Name: clusterName, Namespace: defaults.Namespace, }, Spec: CertAuthoritySpecV2{ Roles: roles, Type: caType, ClusterName: clusterName, CheckingKeys: checkingKeys, SigningKeys: signingKeys, }, } }
[ "func", "NewCertAuthority", "(", "caType", "CertAuthType", ",", "clusterName", "string", ",", "signingKeys", ",", "checkingKeys", "[", "]", "[", "]", "byte", ",", "roles", "[", "]", "string", ")", "CertAuthority", "{", "return", "&", "CertAuthorityV2", "{", "Kind", ":", "KindCertAuthority", ",", "Version", ":", "V2", ",", "SubKind", ":", "string", "(", "caType", ")", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "clusterName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "CertAuthoritySpecV2", "{", "Roles", ":", "roles", ",", "Type", ":", "caType", ",", "ClusterName", ":", "clusterName", ",", "CheckingKeys", ":", "checkingKeys", ",", "SigningKeys", ":", "signingKeys", ",", "}", ",", "}", "\n", "}" ]
// NewCertAuthority returns new cert authority
[ "NewCertAuthority", "returns", "new", "cert", "authority" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L265-L282
train
gravitational/teleport
lib/services/authority.go
CertAuthoritiesToV1
func CertAuthoritiesToV1(in []CertAuthority) ([]CertAuthorityV1, error) { out := make([]CertAuthorityV1, len(in)) type cav1 interface { V1() *CertAuthorityV1 } for i, ca := range in { v1, ok := ca.(cav1) if !ok { return nil, trace.BadParameter("could not transform object to V1") } out[i] = *(v1.V1()) } return out, nil }
go
func CertAuthoritiesToV1(in []CertAuthority) ([]CertAuthorityV1, error) { out := make([]CertAuthorityV1, len(in)) type cav1 interface { V1() *CertAuthorityV1 } for i, ca := range in { v1, ok := ca.(cav1) if !ok { return nil, trace.BadParameter("could not transform object to V1") } out[i] = *(v1.V1()) } return out, nil }
[ "func", "CertAuthoritiesToV1", "(", "in", "[", "]", "CertAuthority", ")", "(", "[", "]", "CertAuthorityV1", ",", "error", ")", "{", "out", ":=", "make", "(", "[", "]", "CertAuthorityV1", ",", "len", "(", "in", ")", ")", "\n", "type", "cav1", "interface", "{", "V1", "(", ")", "*", "CertAuthorityV1", "\n", "}", "\n", "for", "i", ",", "ca", ":=", "range", "in", "{", "v1", ",", "ok", ":=", "ca", ".", "(", "cav1", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "out", "[", "i", "]", "=", "*", "(", "v1", ".", "V1", "(", ")", ")", "\n", "}", "\n", "return", "out", ",", "nil", "\n", "}" ]
// CertAuthoritiesToV1 converts list of cert authorities to V1 slice
[ "CertAuthoritiesToV1", "converts", "list", "of", "cert", "authorities", "to", "V1", "slice" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L285-L298
train
gravitational/teleport
lib/services/authority.go
Clone
func (c *CertAuthorityV2) Clone() CertAuthority { out := *c out.Spec.CheckingKeys = utils.CopyByteSlices(c.Spec.CheckingKeys) out.Spec.SigningKeys = utils.CopyByteSlices(c.Spec.SigningKeys) for i, kp := range c.Spec.TLSKeyPairs { out.Spec.TLSKeyPairs[i] = TLSKeyPair{ Key: utils.CopyByteSlice(kp.Key), Cert: utils.CopyByteSlice(kp.Cert), } } out.Spec.Roles = utils.CopyStrings(c.Spec.Roles) return &out }
go
func (c *CertAuthorityV2) Clone() CertAuthority { out := *c out.Spec.CheckingKeys = utils.CopyByteSlices(c.Spec.CheckingKeys) out.Spec.SigningKeys = utils.CopyByteSlices(c.Spec.SigningKeys) for i, kp := range c.Spec.TLSKeyPairs { out.Spec.TLSKeyPairs[i] = TLSKeyPair{ Key: utils.CopyByteSlice(kp.Key), Cert: utils.CopyByteSlice(kp.Cert), } } out.Spec.Roles = utils.CopyStrings(c.Spec.Roles) return &out }
[ "func", "(", "c", "*", "CertAuthorityV2", ")", "Clone", "(", ")", "CertAuthority", "{", "out", ":=", "*", "c", "\n", "out", ".", "Spec", ".", "CheckingKeys", "=", "utils", ".", "CopyByteSlices", "(", "c", ".", "Spec", ".", "CheckingKeys", ")", "\n", "out", ".", "Spec", ".", "SigningKeys", "=", "utils", ".", "CopyByteSlices", "(", "c", ".", "Spec", ".", "SigningKeys", ")", "\n", "for", "i", ",", "kp", ":=", "range", "c", ".", "Spec", ".", "TLSKeyPairs", "{", "out", ".", "Spec", ".", "TLSKeyPairs", "[", "i", "]", "=", "TLSKeyPair", "{", "Key", ":", "utils", ".", "CopyByteSlice", "(", "kp", ".", "Key", ")", ",", "Cert", ":", "utils", ".", "CopyByteSlice", "(", "kp", ".", "Cert", ")", ",", "}", "\n", "}", "\n", "out", ".", "Spec", ".", "Roles", "=", "utils", ".", "CopyStrings", "(", "c", ".", "Spec", ".", "Roles", ")", "\n", "return", "&", "out", "\n", "}" ]
// Clone returns a copy of the cert authority object.
[ "Clone", "returns", "a", "copy", "of", "the", "cert", "authority", "object", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L321-L333
train
gravitational/teleport
lib/services/authority.go
GetRotation
func (c *CertAuthorityV2) GetRotation() Rotation { if c.Spec.Rotation == nil { return Rotation{} } return *c.Spec.Rotation }
go
func (c *CertAuthorityV2) GetRotation() Rotation { if c.Spec.Rotation == nil { return Rotation{} } return *c.Spec.Rotation }
[ "func", "(", "c", "*", "CertAuthorityV2", ")", "GetRotation", "(", ")", "Rotation", "{", "if", "c", ".", "Spec", ".", "Rotation", "==", "nil", "{", "return", "Rotation", "{", "}", "\n", "}", "\n", "return", "*", "c", ".", "Spec", ".", "Rotation", "\n", "}" ]
// GetRotation returns rotation state.
[ "GetRotation", "returns", "rotation", "state", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L336-L341
train
gravitational/teleport
lib/services/authority.go
TLSCA
func (c *CertAuthorityV2) TLSCA() (*tlsca.CertAuthority, error) { if len(c.Spec.TLSKeyPairs) == 0 { return nil, trace.BadParameter("no TLS key pairs found for certificate authority") } return tlsca.New(c.Spec.TLSKeyPairs[0].Cert, c.Spec.TLSKeyPairs[0].Key) }
go
func (c *CertAuthorityV2) TLSCA() (*tlsca.CertAuthority, error) { if len(c.Spec.TLSKeyPairs) == 0 { return nil, trace.BadParameter("no TLS key pairs found for certificate authority") } return tlsca.New(c.Spec.TLSKeyPairs[0].Cert, c.Spec.TLSKeyPairs[0].Key) }
[ "func", "(", "c", "*", "CertAuthorityV2", ")", "TLSCA", "(", ")", "(", "*", "tlsca", ".", "CertAuthority", ",", "error", ")", "{", "if", "len", "(", "c", ".", "Spec", ".", "TLSKeyPairs", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "tlsca", ".", "New", "(", "c", ".", "Spec", ".", "TLSKeyPairs", "[", "0", "]", ".", "Cert", ",", "c", ".", "Spec", ".", "TLSKeyPairs", "[", "0", "]", ".", "Key", ")", "\n", "}" ]
// TLSCA returns TLS certificate authority
[ "TLSCA", "returns", "TLS", "certificate", "authority" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L349-L354
train
gravitational/teleport
lib/services/authority.go
String
func (c *CertAuthorityV2) String() string { return fmt.Sprintf("CA(name=%v, type=%v)", c.GetClusterName(), c.GetType()) }
go
func (c *CertAuthorityV2) String() string { return fmt.Sprintf("CA(name=%v, type=%v)", c.GetClusterName(), c.GetType()) }
[ "func", "(", "c", "*", "CertAuthorityV2", ")", "String", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "c", ".", "GetClusterName", "(", ")", ",", "c", ".", "GetType", "(", ")", ")", "\n", "}" ]
// String returns human readable version of the CertAuthorityV2.
[ "String", "returns", "human", "readable", "version", "of", "the", "CertAuthorityV2", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L402-L404
train
gravitational/teleport
lib/services/authority.go
AddRole
func (ca *CertAuthorityV2) AddRole(name string) { for _, r := range ca.Spec.Roles { if r == name { return } } ca.Spec.Roles = append(ca.Spec.Roles, name) }
go
func (ca *CertAuthorityV2) AddRole(name string) { for _, r := range ca.Spec.Roles { if r == name { return } } ca.Spec.Roles = append(ca.Spec.Roles, name) }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "AddRole", "(", "name", "string", ")", "{", "for", "_", ",", "r", ":=", "range", "ca", ".", "Spec", ".", "Roles", "{", "if", "r", "==", "name", "{", "return", "\n", "}", "\n", "}", "\n", "ca", ".", "Spec", ".", "Roles", "=", "append", "(", "ca", ".", "Spec", ".", "Roles", ",", "name", ")", "\n", "}" ]
// AddRole adds a role to ca role list
[ "AddRole", "adds", "a", "role", "to", "ca", "role", "list" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L417-L424
train
gravitational/teleport
lib/services/authority.go
SetSigningKeys
func (ca *CertAuthorityV2) SetSigningKeys(keys [][]byte) error { ca.Spec.SigningKeys = keys return nil }
go
func (ca *CertAuthorityV2) SetSigningKeys(keys [][]byte) error { ca.Spec.SigningKeys = keys return nil }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "SetSigningKeys", "(", "keys", "[", "]", "[", "]", "byte", ")", "error", "{", "ca", ".", "Spec", ".", "SigningKeys", "=", "keys", "\n", "return", "nil", "\n", "}" ]
// SetSigningKeys sets signing keys
[ "SetSigningKeys", "sets", "signing", "keys" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L432-L435
train
gravitational/teleport
lib/services/authority.go
SetCheckingKeys
func (ca *CertAuthorityV2) SetCheckingKeys(keys [][]byte) error { ca.Spec.CheckingKeys = keys return nil }
go
func (ca *CertAuthorityV2) SetCheckingKeys(keys [][]byte) error { ca.Spec.CheckingKeys = keys return nil }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "SetCheckingKeys", "(", "keys", "[", "]", "[", "]", "byte", ")", "error", "{", "ca", ".", "Spec", ".", "CheckingKeys", "=", "keys", "\n", "return", "nil", "\n", "}" ]
// SetCheckingKeys sets SSH public keys
[ "SetCheckingKeys", "sets", "SSH", "public", "keys" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L438-L441
train
gravitational/teleport
lib/services/authority.go
GetID
func (ca *CertAuthorityV2) GetID() CertAuthID { return CertAuthID{Type: ca.Spec.Type, DomainName: ca.Metadata.Name} }
go
func (ca *CertAuthorityV2) GetID() CertAuthID { return CertAuthID{Type: ca.Spec.Type, DomainName: ca.Metadata.Name} }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "GetID", "(", ")", "CertAuthID", "{", "return", "CertAuthID", "{", "Type", ":", "ca", ".", "Spec", ".", "Type", ",", "DomainName", ":", "ca", ".", "Metadata", ".", "Name", "}", "\n", "}" ]
// GetID returns certificate authority ID - // combined type and name
[ "GetID", "returns", "certificate", "authority", "ID", "-", "combined", "type", "and", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L445-L447
train
gravitational/teleport
lib/services/authority.go
SetRoleMap
func (c *CertAuthorityV2) SetRoleMap(m RoleMap) { c.Spec.RoleMap = []RoleMapping(m) }
go
func (c *CertAuthorityV2) SetRoleMap(m RoleMap) { c.Spec.RoleMap = []RoleMapping(m) }
[ "func", "(", "c", "*", "CertAuthorityV2", ")", "SetRoleMap", "(", "m", "RoleMap", ")", "{", "c", ".", "Spec", ".", "RoleMap", "=", "[", "]", "RoleMapping", "(", "m", ")", "\n", "}" ]
// SetRoleMap sets role map
[ "SetRoleMap", "sets", "role", "map" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L500-L502
train
gravitational/teleport
lib/services/authority.go
FirstSigningKey
func (ca *CertAuthorityV2) FirstSigningKey() ([]byte, error) { if len(ca.Spec.SigningKeys) == 0 { return nil, trace.NotFound("%v has no signing keys", ca.Metadata.Name) } return ca.Spec.SigningKeys[0], nil }
go
func (ca *CertAuthorityV2) FirstSigningKey() ([]byte, error) { if len(ca.Spec.SigningKeys) == 0 { return nil, trace.NotFound("%v has no signing keys", ca.Metadata.Name) } return ca.Spec.SigningKeys[0], nil }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "FirstSigningKey", "(", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "if", "len", "(", "ca", ".", "Spec", ".", "SigningKeys", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "NotFound", "(", "\"", "\"", ",", "ca", ".", "Metadata", ".", "Name", ")", "\n", "}", "\n", "return", "ca", ".", "Spec", ".", "SigningKeys", "[", "0", "]", ",", "nil", "\n", "}" ]
// FirstSigningKey returns first signing key or returns error if it's not here
[ "FirstSigningKey", "returns", "first", "signing", "key", "or", "returns", "error", "if", "it", "s", "not", "here" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L505-L510
train
gravitational/teleport
lib/services/authority.go
Checkers
func (ca *CertAuthorityV2) Checkers() ([]ssh.PublicKey, error) { out := make([]ssh.PublicKey, 0, len(ca.Spec.CheckingKeys)) for _, keyBytes := range ca.Spec.CheckingKeys { key, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes) if err != nil { return nil, trace.BadParameter("invalid authority public key (len=%d): %v", len(keyBytes), err) } out = append(out, key) } return out, nil }
go
func (ca *CertAuthorityV2) Checkers() ([]ssh.PublicKey, error) { out := make([]ssh.PublicKey, 0, len(ca.Spec.CheckingKeys)) for _, keyBytes := range ca.Spec.CheckingKeys { key, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes) if err != nil { return nil, trace.BadParameter("invalid authority public key (len=%d): %v", len(keyBytes), err) } out = append(out, key) } return out, nil }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "Checkers", "(", ")", "(", "[", "]", "ssh", ".", "PublicKey", ",", "error", ")", "{", "out", ":=", "make", "(", "[", "]", "ssh", ".", "PublicKey", ",", "0", ",", "len", "(", "ca", ".", "Spec", ".", "CheckingKeys", ")", ")", "\n", "for", "_", ",", "keyBytes", ":=", "range", "ca", ".", "Spec", ".", "CheckingKeys", "{", "key", ",", "_", ",", "_", ",", "_", ",", "err", ":=", "ssh", ".", "ParseAuthorizedKey", "(", "keyBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "len", "(", "keyBytes", ")", ",", "err", ")", "\n", "}", "\n", "out", "=", "append", "(", "out", ",", "key", ")", "\n", "}", "\n", "return", "out", ",", "nil", "\n", "}" ]
// Checkers returns public keys that can be used to check cert authorities
[ "Checkers", "returns", "public", "keys", "that", "can", "be", "used", "to", "check", "cert", "authorities" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L519-L529
train
gravitational/teleport
lib/services/authority.go
Signers
func (ca *CertAuthorityV2) Signers() ([]ssh.Signer, error) { out := make([]ssh.Signer, 0, len(ca.Spec.SigningKeys)) for _, keyBytes := range ca.Spec.SigningKeys { signer, err := ssh.ParsePrivateKey(keyBytes) if err != nil { return nil, trace.Wrap(err) } out = append(out, signer) } return out, nil }
go
func (ca *CertAuthorityV2) Signers() ([]ssh.Signer, error) { out := make([]ssh.Signer, 0, len(ca.Spec.SigningKeys)) for _, keyBytes := range ca.Spec.SigningKeys { signer, err := ssh.ParsePrivateKey(keyBytes) if err != nil { return nil, trace.Wrap(err) } out = append(out, signer) } return out, nil }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "Signers", "(", ")", "(", "[", "]", "ssh", ".", "Signer", ",", "error", ")", "{", "out", ":=", "make", "(", "[", "]", "ssh", ".", "Signer", ",", "0", ",", "len", "(", "ca", ".", "Spec", ".", "SigningKeys", ")", ")", "\n", "for", "_", ",", "keyBytes", ":=", "range", "ca", ".", "Spec", ".", "SigningKeys", "{", "signer", ",", "err", ":=", "ssh", ".", "ParsePrivateKey", "(", "keyBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", "=", "append", "(", "out", ",", "signer", ")", "\n", "}", "\n", "return", "out", ",", "nil", "\n", "}" ]
// Signers returns a list of signers that could be used to sign keys
[ "Signers", "returns", "a", "list", "of", "signers", "that", "could", "be", "used", "to", "sign", "keys" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L532-L542
train
gravitational/teleport
lib/services/authority.go
Check
func (ca *CertAuthorityV2) Check() error { err := ca.ID().Check() if err != nil { return trace.Wrap(err) } _, err = ca.Checkers() if err != nil { return trace.Wrap(err) } _, err = ca.Signers() if err != nil { return trace.Wrap(err) } // This is to force users to migrate if len(ca.Spec.Roles) != 0 && len(ca.Spec.RoleMap) != 0 { return trace.BadParameter("should set either 'roles' or 'role_map', not both") } if err := RoleMap(ca.Spec.RoleMap).Check(); err != nil { return trace.Wrap(err) } return nil }
go
func (ca *CertAuthorityV2) Check() error { err := ca.ID().Check() if err != nil { return trace.Wrap(err) } _, err = ca.Checkers() if err != nil { return trace.Wrap(err) } _, err = ca.Signers() if err != nil { return trace.Wrap(err) } // This is to force users to migrate if len(ca.Spec.Roles) != 0 && len(ca.Spec.RoleMap) != 0 { return trace.BadParameter("should set either 'roles' or 'role_map', not both") } if err := RoleMap(ca.Spec.RoleMap).Check(); err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "ca", "*", "CertAuthorityV2", ")", "Check", "(", ")", "error", "{", "err", ":=", "ca", ".", "ID", "(", ")", ".", "Check", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "ca", ".", "Checkers", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "ca", ".", "Signers", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// This is to force users to migrate", "if", "len", "(", "ca", ".", "Spec", ".", "Roles", ")", "!=", "0", "&&", "len", "(", "ca", ".", "Spec", ".", "RoleMap", ")", "!=", "0", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "err", ":=", "RoleMap", "(", "ca", ".", "Spec", ".", "RoleMap", ")", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Check checks if all passed parameters are valid
[ "Check", "checks", "if", "all", "passed", "parameters", "are", "valid" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L545-L566
train
gravitational/teleport
lib/services/authority.go
RemoveCASecrets
func RemoveCASecrets(ca CertAuthority) { ca.SetSigningKeys(nil) keyPairs := ca.GetTLSKeyPairs() for i := range keyPairs { keyPairs[i].Key = nil } ca.SetTLSKeyPairs(keyPairs) }
go
func RemoveCASecrets(ca CertAuthority) { ca.SetSigningKeys(nil) keyPairs := ca.GetTLSKeyPairs() for i := range keyPairs { keyPairs[i].Key = nil } ca.SetTLSKeyPairs(keyPairs) }
[ "func", "RemoveCASecrets", "(", "ca", "CertAuthority", ")", "{", "ca", ".", "SetSigningKeys", "(", "nil", ")", "\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n", "for", "i", ":=", "range", "keyPairs", "{", "keyPairs", "[", "i", "]", ".", "Key", "=", "nil", "\n", "}", "\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "}" ]
// RemoveCASecrets removes secret values and keys // from the certificate authority
[ "RemoveCASecrets", "removes", "secret", "values", "and", "keys", "from", "the", "certificate", "authority" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L585-L592
train
gravitational/teleport
lib/services/authority.go
Matches
func (s *Rotation) Matches(rotation Rotation) bool { return s.CurrentID == rotation.CurrentID && s.State == rotation.State && s.Phase == rotation.Phase }
go
func (s *Rotation) Matches(rotation Rotation) bool { return s.CurrentID == rotation.CurrentID && s.State == rotation.State && s.Phase == rotation.Phase }
[ "func", "(", "s", "*", "Rotation", ")", "Matches", "(", "rotation", "Rotation", ")", "bool", "{", "return", "s", ".", "CurrentID", "==", "rotation", ".", "CurrentID", "&&", "s", ".", "State", "==", "rotation", ".", "State", "&&", "s", ".", "Phase", "==", "rotation", ".", "Phase", "\n", "}" ]
// Matches returns true if this state rotation matches // external rotation state, phase and rotation ID should match, // notice that matches does not behave like Equals because it does not require // all fields to be the same.
[ "Matches", "returns", "true", "if", "this", "state", "rotation", "matches", "external", "rotation", "state", "phase", "and", "rotation", "ID", "should", "match", "notice", "that", "matches", "does", "not", "behave", "like", "Equals", "because", "it", "does", "not", "require", "all", "fields", "to", "be", "the", "same", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L641-L643
train
gravitational/teleport
lib/services/authority.go
LastRotatedDescription
func (r *Rotation) LastRotatedDescription() string { if r.LastRotated.IsZero() { return "never updated" } return fmt.Sprintf("last rotated %v", r.LastRotated.Format(teleport.HumanDateFormatSeconds)) }
go
func (r *Rotation) LastRotatedDescription() string { if r.LastRotated.IsZero() { return "never updated" } return fmt.Sprintf("last rotated %v", r.LastRotated.Format(teleport.HumanDateFormatSeconds)) }
[ "func", "(", "r", "*", "Rotation", ")", "LastRotatedDescription", "(", ")", "string", "{", "if", "r", ".", "LastRotated", ".", "IsZero", "(", ")", "{", "return", "\"", "\"", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "r", ".", "LastRotated", ".", "Format", "(", "teleport", ".", "HumanDateFormatSeconds", ")", ")", "\n", "}" ]
// LastRotatedDescription returns human friendly description.
[ "LastRotatedDescription", "returns", "human", "friendly", "description", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L646-L651
train
gravitational/teleport
lib/services/authority.go
PhaseDescription
func (r *Rotation) PhaseDescription() string { switch r.Phase { case RotationPhaseInit: return "initialized" case RotationPhaseStandby, "": return "on standby" case RotationPhaseUpdateClients: return "rotating clients" case RotationPhaseUpdateServers: return "rotating servers" case RotationPhaseRollback: return "rolling back" default: return fmt.Sprintf("unknown phase: %q", r.Phase) } }
go
func (r *Rotation) PhaseDescription() string { switch r.Phase { case RotationPhaseInit: return "initialized" case RotationPhaseStandby, "": return "on standby" case RotationPhaseUpdateClients: return "rotating clients" case RotationPhaseUpdateServers: return "rotating servers" case RotationPhaseRollback: return "rolling back" default: return fmt.Sprintf("unknown phase: %q", r.Phase) } }
[ "func", "(", "r", "*", "Rotation", ")", "PhaseDescription", "(", ")", "string", "{", "switch", "r", ".", "Phase", "{", "case", "RotationPhaseInit", ":", "return", "\"", "\"", "\n", "case", "RotationPhaseStandby", ",", "\"", "\"", ":", "return", "\"", "\"", "\n", "case", "RotationPhaseUpdateClients", ":", "return", "\"", "\"", "\n", "case", "RotationPhaseUpdateServers", ":", "return", "\"", "\"", "\n", "case", "RotationPhaseRollback", ":", "return", "\"", "\"", "\n", "default", ":", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "r", ".", "Phase", ")", "\n", "}", "\n", "}" ]
// PhaseDescription returns human friendly description of a current rotation phase.
[ "PhaseDescription", "returns", "human", "friendly", "description", "of", "a", "current", "rotation", "phase", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L654-L669
train
gravitational/teleport
lib/services/authority.go
String
func (r *Rotation) String() string { switch r.State { case "", RotationStateStandby: if r.LastRotated.IsZero() { return "never updated" } return fmt.Sprintf("rotated %v", r.LastRotated.Format(teleport.HumanDateFormatSeconds)) case RotationStateInProgress: return fmt.Sprintf("%v (mode: %v, started: %v, ending: %v)", r.PhaseDescription(), r.Mode, r.Started.Format(teleport.HumanDateFormatSeconds), r.Started.Add(r.GracePeriod.Duration()).Format(teleport.HumanDateFormatSeconds), ) default: return "unknown" } }
go
func (r *Rotation) String() string { switch r.State { case "", RotationStateStandby: if r.LastRotated.IsZero() { return "never updated" } return fmt.Sprintf("rotated %v", r.LastRotated.Format(teleport.HumanDateFormatSeconds)) case RotationStateInProgress: return fmt.Sprintf("%v (mode: %v, started: %v, ending: %v)", r.PhaseDescription(), r.Mode, r.Started.Format(teleport.HumanDateFormatSeconds), r.Started.Add(r.GracePeriod.Duration()).Format(teleport.HumanDateFormatSeconds), ) default: return "unknown" } }
[ "func", "(", "r", "*", "Rotation", ")", "String", "(", ")", "string", "{", "switch", "r", ".", "State", "{", "case", "\"", "\"", ",", "RotationStateStandby", ":", "if", "r", ".", "LastRotated", ".", "IsZero", "(", ")", "{", "return", "\"", "\"", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "r", ".", "LastRotated", ".", "Format", "(", "teleport", ".", "HumanDateFormatSeconds", ")", ")", "\n", "case", "RotationStateInProgress", ":", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "r", ".", "PhaseDescription", "(", ")", ",", "r", ".", "Mode", ",", "r", ".", "Started", ".", "Format", "(", "teleport", ".", "HumanDateFormatSeconds", ")", ",", "r", ".", "Started", ".", "Add", "(", "r", ".", "GracePeriod", ".", "Duration", "(", ")", ")", ".", "Format", "(", "teleport", ".", "HumanDateFormatSeconds", ")", ",", ")", "\n", "default", ":", "return", "\"", "\"", "\n", "}", "\n", "}" ]
// String returns user friendly information about certificate authority.
[ "String", "returns", "user", "friendly", "information", "about", "certificate", "authority", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L672-L689
train
gravitational/teleport
lib/services/authority.go
CheckAndSetDefaults
func (r *Rotation) CheckAndSetDefaults(clock clockwork.Clock) error { switch r.Phase { case "", RotationPhaseRollback, RotationPhaseUpdateClients, RotationPhaseUpdateServers: default: return trace.BadParameter("unsupported phase: %q", r.Phase) } switch r.Mode { case "", RotationModeAuto, RotationModeManual: default: return trace.BadParameter("unsupported mode: %q", r.Mode) } switch r.State { case "": r.State = RotationStateStandby case RotationStateStandby: case RotationStateInProgress: if r.CurrentID == "" { return trace.BadParameter("set 'current_id' parameter for in progress rotation") } if r.Started.IsZero() { return trace.BadParameter("set 'started' parameter for in progress rotation") } default: return trace.BadParameter( "unsupported rotation 'state': %q, supported states are: %q, %q", r.State, RotationStateStandby, RotationStateInProgress) } return nil }
go
func (r *Rotation) CheckAndSetDefaults(clock clockwork.Clock) error { switch r.Phase { case "", RotationPhaseRollback, RotationPhaseUpdateClients, RotationPhaseUpdateServers: default: return trace.BadParameter("unsupported phase: %q", r.Phase) } switch r.Mode { case "", RotationModeAuto, RotationModeManual: default: return trace.BadParameter("unsupported mode: %q", r.Mode) } switch r.State { case "": r.State = RotationStateStandby case RotationStateStandby: case RotationStateInProgress: if r.CurrentID == "" { return trace.BadParameter("set 'current_id' parameter for in progress rotation") } if r.Started.IsZero() { return trace.BadParameter("set 'started' parameter for in progress rotation") } default: return trace.BadParameter( "unsupported rotation 'state': %q, supported states are: %q, %q", r.State, RotationStateStandby, RotationStateInProgress) } return nil }
[ "func", "(", "r", "*", "Rotation", ")", "CheckAndSetDefaults", "(", "clock", "clockwork", ".", "Clock", ")", "error", "{", "switch", "r", ".", "Phase", "{", "case", "\"", "\"", ",", "RotationPhaseRollback", ",", "RotationPhaseUpdateClients", ",", "RotationPhaseUpdateServers", ":", "default", ":", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "r", ".", "Phase", ")", "\n", "}", "\n", "switch", "r", ".", "Mode", "{", "case", "\"", "\"", ",", "RotationModeAuto", ",", "RotationModeManual", ":", "default", ":", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "r", ".", "Mode", ")", "\n", "}", "\n", "switch", "r", ".", "State", "{", "case", "\"", "\"", ":", "r", ".", "State", "=", "RotationStateStandby", "\n", "case", "RotationStateStandby", ":", "case", "RotationStateInProgress", ":", "if", "r", ".", "CurrentID", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "r", ".", "Started", ".", "IsZero", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "default", ":", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "r", ".", "State", ",", "RotationStateStandby", ",", "RotationStateInProgress", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default rotation parameters.
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "rotation", "parameters", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L692-L720
train
gravitational/teleport
lib/services/authority.go
GenerateSchedule
func GenerateSchedule(clock clockwork.Clock, gracePeriod time.Duration) (*RotationSchedule, error) { if gracePeriod <= 0 { return nil, trace.BadParameter("invalid grace period %q, provide value > 0", gracePeriod) } return &RotationSchedule{ UpdateClients: clock.Now().UTC().Add(gracePeriod / 3).UTC(), UpdateServers: clock.Now().UTC().Add((gracePeriod * 2) / 3).UTC(), Standby: clock.Now().UTC().Add(gracePeriod).UTC(), }, nil }
go
func GenerateSchedule(clock clockwork.Clock, gracePeriod time.Duration) (*RotationSchedule, error) { if gracePeriod <= 0 { return nil, trace.BadParameter("invalid grace period %q, provide value > 0", gracePeriod) } return &RotationSchedule{ UpdateClients: clock.Now().UTC().Add(gracePeriod / 3).UTC(), UpdateServers: clock.Now().UTC().Add((gracePeriod * 2) / 3).UTC(), Standby: clock.Now().UTC().Add(gracePeriod).UTC(), }, nil }
[ "func", "GenerateSchedule", "(", "clock", "clockwork", ".", "Clock", ",", "gracePeriod", "time", ".", "Duration", ")", "(", "*", "RotationSchedule", ",", "error", ")", "{", "if", "gracePeriod", "<=", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "gracePeriod", ")", "\n", "}", "\n", "return", "&", "RotationSchedule", "{", "UpdateClients", ":", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "gracePeriod", "/", "3", ")", ".", "UTC", "(", ")", ",", "UpdateServers", ":", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "(", "gracePeriod", "*", "2", ")", "/", "3", ")", ".", "UTC", "(", ")", ",", "Standby", ":", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Add", "(", "gracePeriod", ")", ".", "UTC", "(", ")", ",", "}", ",", "nil", "\n", "}" ]
// GenerateSchedule generates schedule based on the time period, using // even time periods between rotation phases.
[ "GenerateSchedule", "generates", "schedule", "based", "on", "the", "time", "period", "using", "even", "time", "periods", "between", "rotation", "phases", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L724-L733
train
gravitational/teleport
lib/services/authority.go
CheckAndSetDefaults
func (s *RotationSchedule) CheckAndSetDefaults(clock clockwork.Clock) error { if s.UpdateServers.IsZero() { return trace.BadParameter("phase %q has no time switch scheduled", RotationPhaseUpdateServers) } if s.Standby.IsZero() { return trace.BadParameter("phase %q has no time switch scheduled", RotationPhaseStandby) } if s.Standby.Before(s.UpdateServers) { return trace.BadParameter("phase %q can not be scheduled before %q", RotationPhaseStandby, RotationPhaseUpdateServers) } if s.UpdateServers.Before(clock.Now()) { return trace.BadParameter("phase %q can not be scheduled in the past", RotationPhaseUpdateServers) } if s.Standby.Before(clock.Now()) { return trace.BadParameter("phase %q can not be scheduled in the past", RotationPhaseStandby) } return nil }
go
func (s *RotationSchedule) CheckAndSetDefaults(clock clockwork.Clock) error { if s.UpdateServers.IsZero() { return trace.BadParameter("phase %q has no time switch scheduled", RotationPhaseUpdateServers) } if s.Standby.IsZero() { return trace.BadParameter("phase %q has no time switch scheduled", RotationPhaseStandby) } if s.Standby.Before(s.UpdateServers) { return trace.BadParameter("phase %q can not be scheduled before %q", RotationPhaseStandby, RotationPhaseUpdateServers) } if s.UpdateServers.Before(clock.Now()) { return trace.BadParameter("phase %q can not be scheduled in the past", RotationPhaseUpdateServers) } if s.Standby.Before(clock.Now()) { return trace.BadParameter("phase %q can not be scheduled in the past", RotationPhaseStandby) } return nil }
[ "func", "(", "s", "*", "RotationSchedule", ")", "CheckAndSetDefaults", "(", "clock", "clockwork", ".", "Clock", ")", "error", "{", "if", "s", ".", "UpdateServers", ".", "IsZero", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "RotationPhaseUpdateServers", ")", "\n", "}", "\n", "if", "s", ".", "Standby", ".", "IsZero", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "RotationPhaseStandby", ")", "\n", "}", "\n", "if", "s", ".", "Standby", ".", "Before", "(", "s", ".", "UpdateServers", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "RotationPhaseStandby", ",", "RotationPhaseUpdateServers", ")", "\n", "}", "\n", "if", "s", ".", "UpdateServers", ".", "Before", "(", "clock", ".", "Now", "(", ")", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "RotationPhaseUpdateServers", ")", "\n", "}", "\n", "if", "s", ".", "Standby", ".", "Before", "(", "clock", ".", "Now", "(", ")", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "RotationPhaseStandby", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default values of the rotation schedule.
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "values", "of", "the", "rotation", "schedule", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L736-L753
train
gravitational/teleport
lib/services/authority.go
String
func (c *CertAuthorityV1) String() string { return fmt.Sprintf("CA(name=%v, type=%v)", c.DomainName, c.Type) }
go
func (c *CertAuthorityV1) String() string { return fmt.Sprintf("CA(name=%v, type=%v)", c.DomainName, c.Type) }
[ "func", "(", "c", "*", "CertAuthorityV1", ")", "String", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "c", ".", "DomainName", ",", "c", ".", "Type", ")", "\n", "}" ]
// String returns human readable version of the CertAuthorityV1.
[ "String", "returns", "human", "readable", "version", "of", "the", "CertAuthorityV1", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L878-L880
train
gravitational/teleport
lib/services/authority.go
GetCertAuthoritySchema
func GetCertAuthoritySchema() string { return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, fmt.Sprintf(CertAuthoritySpecV2Schema, RotationSchema, RoleMapSchema), DefaultDefinitions) }
go
func GetCertAuthoritySchema() string { return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, fmt.Sprintf(CertAuthoritySpecV2Schema, RotationSchema, RoleMapSchema), DefaultDefinitions) }
[ "func", "GetCertAuthoritySchema", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "V2SchemaTemplate", ",", "MetadataSchema", ",", "fmt", ".", "Sprintf", "(", "CertAuthoritySpecV2Schema", ",", "RotationSchema", ",", "RoleMapSchema", ")", ",", "DefaultDefinitions", ")", "\n", "}" ]
// GetCertAuthoritySchema returns JSON Schema for cert authorities
[ "GetCertAuthoritySchema", "returns", "JSON", "Schema", "for", "cert", "authorities" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L912-L914
train
gravitational/teleport
lib/services/authority.go
UnmarshalCertAuthority
func (*TeleportCertAuthorityMarshaler) UnmarshalCertAuthority(bytes []byte, opts ...MarshalOption) (CertAuthority, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } var h ResourceHeader err = utils.FastUnmarshal(bytes, &h) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case "": var ca CertAuthorityV1 err := json.Unmarshal(bytes, &ca) if err != nil { return nil, trace.Wrap(err) } return ca.V2(), nil case V2: var ca CertAuthorityV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &ca); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetCertAuthoritySchema(), &ca, bytes); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := ca.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { ca.SetResourceID(cfg.ID) } return &ca, nil } return nil, trace.BadParameter("cert authority resource version %v is not supported", h.Version) }
go
func (*TeleportCertAuthorityMarshaler) UnmarshalCertAuthority(bytes []byte, opts ...MarshalOption) (CertAuthority, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } var h ResourceHeader err = utils.FastUnmarshal(bytes, &h) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case "": var ca CertAuthorityV1 err := json.Unmarshal(bytes, &ca) if err != nil { return nil, trace.Wrap(err) } return ca.V2(), nil case V2: var ca CertAuthorityV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &ca); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetCertAuthoritySchema(), &ca, bytes); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := ca.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { ca.SetResourceID(cfg.ID) } return &ca, nil } return nil, trace.BadParameter("cert authority resource version %v is not supported", h.Version) }
[ "func", "(", "*", "TeleportCertAuthorityMarshaler", ")", "UnmarshalCertAuthority", "(", "bytes", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "CertAuthority", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "h", "ResourceHeader", "\n", "err", "=", "utils", ".", "FastUnmarshal", "(", "bytes", ",", "&", "h", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "h", ".", "Version", "{", "case", "\"", "\"", ":", "var", "ca", "CertAuthorityV1", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "bytes", ",", "&", "ca", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ".", "V2", "(", ")", ",", "nil", "\n", "case", "V2", ":", "var", "ca", "CertAuthorityV2", "\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "bytes", ",", "&", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "if", "err", ":=", "utils", ".", "UnmarshalWithSchema", "(", "GetCertAuthoritySchema", "(", ")", ",", "&", "ca", ",", "bytes", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n", "if", "err", ":=", "ca", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "cfg", ".", "ID", "!=", "0", "{", "ca", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "return", "&", "ca", ",", "nil", "\n", "}", "\n\n", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "h", ".", "Version", ")", "\n", "}" ]
// UnmarshalCertAuthority unmarshals cert authority from JSON
[ "UnmarshalCertAuthority", "unmarshals", "cert", "authority", "from", "JSON" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L926-L965
train
gravitational/teleport
lib/services/authority.go
MarshalCertAuthority
func (*TeleportCertAuthorityMarshaler) MarshalCertAuthority(ca CertAuthority, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } type cav1 interface { V1() *CertAuthorityV1 } type cav2 interface { V2() *CertAuthorityV2 } version := cfg.GetVersion() switch version { case V1: v, ok := ca.(cav1) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V1) } return utils.FastMarshal(v.V1()) case V2: v, ok := ca.(cav2) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V2) } v2 := v.V2() if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *v2 copy.SetResourceID(0) v2 = &copy } return utils.FastMarshal(v2) default: return nil, trace.BadParameter("version %v is not supported", version) } }
go
func (*TeleportCertAuthorityMarshaler) MarshalCertAuthority(ca CertAuthority, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } type cav1 interface { V1() *CertAuthorityV1 } type cav2 interface { V2() *CertAuthorityV2 } version := cfg.GetVersion() switch version { case V1: v, ok := ca.(cav1) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V1) } return utils.FastMarshal(v.V1()) case V2: v, ok := ca.(cav2) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V2) } v2 := v.V2() if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *v2 copy.SetResourceID(0) v2 = &copy } return utils.FastMarshal(v2) default: return nil, trace.BadParameter("version %v is not supported", version) } }
[ "func", "(", "*", "TeleportCertAuthorityMarshaler", ")", "MarshalCertAuthority", "(", "ca", "CertAuthority", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "type", "cav1", "interface", "{", "V1", "(", ")", "*", "CertAuthorityV1", "\n", "}", "\n\n", "type", "cav2", "interface", "{", "V2", "(", ")", "*", "CertAuthorityV2", "\n", "}", "\n", "version", ":=", "cfg", ".", "GetVersion", "(", ")", "\n", "switch", "version", "{", "case", "V1", ":", "v", ",", "ok", ":=", "ca", ".", "(", "cav1", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "V1", ")", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "v", ".", "V1", "(", ")", ")", "\n", "case", "V2", ":", "v", ",", "ok", ":=", "ca", ".", "(", "cav2", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "V2", ")", "\n", "}", "\n", "v2", ":=", "v", ".", "V2", "(", ")", "\n", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "v2", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "v2", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "v2", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "version", ")", "\n", "}", "\n", "}" ]
// MarshalCertAuthority marshalls cert authority into JSON
[ "MarshalCertAuthority", "marshalls", "cert", "authority", "into", "JSON" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/authority.go#L968-L1005
train
gravitational/teleport
lib/events/fields.go
UpdateEventFields
func UpdateEventFields(event Event, fields EventFields, clock clockwork.Clock, uid utils.UID) (err error) { additionalFields := make(map[string]interface{}) if fields.GetType() == "" { additionalFields[EventType] = event.Name } if fields.GetID() == "" { additionalFields[EventID] = uid.New() } if fields.GetTimestamp().IsZero() { additionalFields[EventTime] = clock.Now().UTC().Round(time.Second) } if event.Code != "" { additionalFields[EventCode] = event.Code } for k, v := range additionalFields { fields[k] = v } return nil }
go
func UpdateEventFields(event Event, fields EventFields, clock clockwork.Clock, uid utils.UID) (err error) { additionalFields := make(map[string]interface{}) if fields.GetType() == "" { additionalFields[EventType] = event.Name } if fields.GetID() == "" { additionalFields[EventID] = uid.New() } if fields.GetTimestamp().IsZero() { additionalFields[EventTime] = clock.Now().UTC().Round(time.Second) } if event.Code != "" { additionalFields[EventCode] = event.Code } for k, v := range additionalFields { fields[k] = v } return nil }
[ "func", "UpdateEventFields", "(", "event", "Event", ",", "fields", "EventFields", ",", "clock", "clockwork", ".", "Clock", ",", "uid", "utils", ".", "UID", ")", "(", "err", "error", ")", "{", "additionalFields", ":=", "make", "(", "map", "[", "string", "]", "interface", "{", "}", ")", "\n", "if", "fields", ".", "GetType", "(", ")", "==", "\"", "\"", "{", "additionalFields", "[", "EventType", "]", "=", "event", ".", "Name", "\n", "}", "\n", "if", "fields", ".", "GetID", "(", ")", "==", "\"", "\"", "{", "additionalFields", "[", "EventID", "]", "=", "uid", ".", "New", "(", ")", "\n", "}", "\n", "if", "fields", ".", "GetTimestamp", "(", ")", ".", "IsZero", "(", ")", "{", "additionalFields", "[", "EventTime", "]", "=", "clock", ".", "Now", "(", ")", ".", "UTC", "(", ")", ".", "Round", "(", "time", ".", "Second", ")", "\n", "}", "\n", "if", "event", ".", "Code", "!=", "\"", "\"", "{", "additionalFields", "[", "EventCode", "]", "=", "event", ".", "Code", "\n", "}", "\n", "for", "k", ",", "v", ":=", "range", "additionalFields", "{", "fields", "[", "k", "]", "=", "v", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// UpdateEventFields updates passed event fields with additional information // common for all event types such as unique IDs, timestamps, codes, etc. // // This method is a "final stop" for various audit log implementations for // updating event fields before it gets persisted in the backend.
[ "UpdateEventFields", "updates", "passed", "event", "fields", "with", "additional", "information", "common", "for", "all", "event", "types", "such", "as", "unique", "IDs", "timestamps", "codes", "etc", ".", "This", "method", "is", "a", "final", "stop", "for", "various", "audit", "log", "implementations", "for", "updating", "event", "fields", "before", "it", "gets", "persisted", "in", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/events/fields.go#L32-L50
train
gravitational/teleport
lib/reversetunnel/api.go
CheckAndSetDefaults
func (d *DialParams) CheckAndSetDefaults() error { if d.From == nil { return trace.BadParameter("parameter From required") } if d.To == nil { return trace.BadParameter("parameter To required") } return nil }
go
func (d *DialParams) CheckAndSetDefaults() error { if d.From == nil { return trace.BadParameter("parameter From required") } if d.To == nil { return trace.BadParameter("parameter To required") } return nil }
[ "func", "(", "d", "*", "DialParams", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "d", ".", "From", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "d", ".", "To", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults makes sure the minimal parameters are set.
[ "CheckAndSetDefaults", "makes", "sure", "the", "minimal", "parameters", "are", "set", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/api.go#L54-L63
train
gravitational/teleport
lib/services/trustedcluster.go
NewTrustedCluster
func NewTrustedCluster(name string, spec TrustedClusterSpecV2) (TrustedCluster, error) { return &TrustedClusterV2{ Kind: KindTrustedCluster, Version: V2, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, }, nil }
go
func NewTrustedCluster(name string, spec TrustedClusterSpecV2) (TrustedCluster, error) { return &TrustedClusterV2{ Kind: KindTrustedCluster, Version: V2, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, }, nil }
[ "func", "NewTrustedCluster", "(", "name", "string", ",", "spec", "TrustedClusterSpecV2", ")", "(", "TrustedCluster", ",", "error", ")", "{", "return", "&", "TrustedClusterV2", "{", "Kind", ":", "KindTrustedCluster", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "name", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", ",", "nil", "\n", "}" ]
// NewTrustedCluster is a convenience wa to create a TrustedCluster resource.
[ "NewTrustedCluster", "is", "a", "convenience", "wa", "to", "create", "a", "TrustedCluster", "resource", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L71-L81
train
gravitational/teleport
lib/services/trustedcluster.go
Equals
func (r RoleMap) Equals(o RoleMap) bool { if len(r) != len(o) { return false } for i := range r { if !r[i].Equals(o[i]) { return false } } return true }
go
func (r RoleMap) Equals(o RoleMap) bool { if len(r) != len(o) { return false } for i := range r { if !r[i].Equals(o[i]) { return false } } return true }
[ "func", "(", "r", "RoleMap", ")", "Equals", "(", "o", "RoleMap", ")", "bool", "{", "if", "len", "(", "r", ")", "!=", "len", "(", "o", ")", "{", "return", "false", "\n", "}", "\n", "for", "i", ":=", "range", "r", "{", "if", "!", "r", "[", "i", "]", ".", "Equals", "(", "o", "[", "i", "]", ")", "{", "return", "false", "\n", "}", "\n", "}", "\n", "return", "true", "\n", "}" ]
// Equals checks if the two role maps are equal.
[ "Equals", "checks", "if", "the", "two", "role", "maps", "are", "equal", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L131-L141
train
gravitational/teleport
lib/services/trustedcluster.go
String
func (r RoleMap) String() string { values, err := r.parse() if err != nil { return fmt.Sprintf("<failed to parse: %v", err) } if len(values) != 0 { return fmt.Sprintf("%v", values) } return "<empty>" }
go
func (r RoleMap) String() string { values, err := r.parse() if err != nil { return fmt.Sprintf("<failed to parse: %v", err) } if len(values) != 0 { return fmt.Sprintf("%v", values) } return "<empty>" }
[ "func", "(", "r", "RoleMap", ")", "String", "(", ")", "string", "{", "values", ",", "err", ":=", "r", ".", "parse", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "if", "len", "(", "values", ")", "!=", "0", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "values", ")", "\n", "}", "\n", "return", "\"", "\"", "\n", "}" ]
// String prints user friendly representation of role mapping
[ "String", "prints", "user", "friendly", "representation", "of", "role", "mapping" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L144-L153
train
gravitational/teleport
lib/services/trustedcluster.go
Map
func (r RoleMap) Map(remoteRoles []string) ([]string, error) { _, err := r.parse() if err != nil { return nil, trace.Wrap(err) } var outRoles []string // when no remote roles is specified, assume that // there is a single empty remote role (that should match wildcards) if len(remoteRoles) == 0 { remoteRoles = []string{""} } for _, mapping := range r { expression := mapping.Remote for _, remoteRole := range remoteRoles { // never map default implicit role, it is always // added by default if remoteRole == teleport.DefaultImplicitRole { continue } for _, replacementRole := range mapping.Local { replacement, err := utils.ReplaceRegexp(expression, replacementRole, remoteRole) switch { case err == nil: // empty replacement can occur when $2 expand refers // to non-existing capture group in match expression if replacement != "" { outRoles = append(outRoles, replacement) } case trace.IsNotFound(err): continue default: return nil, trace.Wrap(err) } } } } return outRoles, nil }
go
func (r RoleMap) Map(remoteRoles []string) ([]string, error) { _, err := r.parse() if err != nil { return nil, trace.Wrap(err) } var outRoles []string // when no remote roles is specified, assume that // there is a single empty remote role (that should match wildcards) if len(remoteRoles) == 0 { remoteRoles = []string{""} } for _, mapping := range r { expression := mapping.Remote for _, remoteRole := range remoteRoles { // never map default implicit role, it is always // added by default if remoteRole == teleport.DefaultImplicitRole { continue } for _, replacementRole := range mapping.Local { replacement, err := utils.ReplaceRegexp(expression, replacementRole, remoteRole) switch { case err == nil: // empty replacement can occur when $2 expand refers // to non-existing capture group in match expression if replacement != "" { outRoles = append(outRoles, replacement) } case trace.IsNotFound(err): continue default: return nil, trace.Wrap(err) } } } } return outRoles, nil }
[ "func", "(", "r", "RoleMap", ")", "Map", "(", "remoteRoles", "[", "]", "string", ")", "(", "[", "]", "string", ",", "error", ")", "{", "_", ",", "err", ":=", "r", ".", "parse", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "outRoles", "[", "]", "string", "\n", "// when no remote roles is specified, assume that", "// there is a single empty remote role (that should match wildcards)", "if", "len", "(", "remoteRoles", ")", "==", "0", "{", "remoteRoles", "=", "[", "]", "string", "{", "\"", "\"", "}", "\n", "}", "\n", "for", "_", ",", "mapping", ":=", "range", "r", "{", "expression", ":=", "mapping", ".", "Remote", "\n", "for", "_", ",", "remoteRole", ":=", "range", "remoteRoles", "{", "// never map default implicit role, it is always", "// added by default", "if", "remoteRole", "==", "teleport", ".", "DefaultImplicitRole", "{", "continue", "\n", "}", "\n", "for", "_", ",", "replacementRole", ":=", "range", "mapping", ".", "Local", "{", "replacement", ",", "err", ":=", "utils", ".", "ReplaceRegexp", "(", "expression", ",", "replacementRole", ",", "remoteRole", ")", "\n", "switch", "{", "case", "err", "==", "nil", ":", "// empty replacement can occur when $2 expand refers", "// to non-existing capture group in match expression", "if", "replacement", "!=", "\"", "\"", "{", "outRoles", "=", "append", "(", "outRoles", ",", "replacement", ")", "\n", "}", "\n", "case", "trace", ".", "IsNotFound", "(", "err", ")", ":", "continue", "\n", "default", ":", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "outRoles", ",", "nil", "\n", "}" ]
// Map maps local roles to remote roles
[ "Map", "maps", "local", "roles", "to", "remote", "roles" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L187-L224
train
gravitational/teleport
lib/services/trustedcluster.go
Check
func (r RoleMap) Check() error { _, err := r.parse() return trace.Wrap(err) }
go
func (r RoleMap) Check() error { _, err := r.parse() return trace.Wrap(err) }
[ "func", "(", "r", "RoleMap", ")", "Check", "(", ")", "error", "{", "_", ",", "err", ":=", "r", ".", "parse", "(", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// Check checks RoleMap for errors
[ "Check", "checks", "RoleMap", "for", "errors" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L227-L230
train
gravitational/teleport
lib/services/trustedcluster.go
Equals
func (r RoleMapping) Equals(o RoleMapping) bool { if r.Remote != o.Remote { return false } if !utils.StringSlicesEqual(r.Local, r.Local) { return false } return true }
go
func (r RoleMapping) Equals(o RoleMapping) bool { if r.Remote != o.Remote { return false } if !utils.StringSlicesEqual(r.Local, r.Local) { return false } return true }
[ "func", "(", "r", "RoleMapping", ")", "Equals", "(", "o", "RoleMapping", ")", "bool", "{", "if", "r", ".", "Remote", "!=", "o", ".", "Remote", "{", "return", "false", "\n", "}", "\n", "if", "!", "utils", ".", "StringSlicesEqual", "(", "r", ".", "Local", ",", "r", ".", "Local", ")", "{", "return", "false", "\n", "}", "\n", "return", "true", "\n", "}" ]
// Equals checks if the two role mappings are equal.
[ "Equals", "checks", "if", "the", "two", "role", "mappings", "are", "equal", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L233-L241
train
gravitational/teleport
lib/services/trustedcluster.go
CanChangeStateTo
func (c *TrustedClusterV2) CanChangeStateTo(t TrustedCluster) error { if c.GetToken() != t.GetToken() { return trace.BadParameter("can not update token for existing trusted cluster") } if c.GetProxyAddress() != t.GetProxyAddress() { return trace.BadParameter("can not update proxy address for existing trusted cluster") } if c.GetReverseTunnelAddress() != t.GetReverseTunnelAddress() { return trace.BadParameter("can not update proxy address for existing trusted cluster") } if !utils.StringSlicesEqual(c.GetRoles(), t.GetRoles()) { return trace.BadParameter("can not update roles for existing trusted cluster") } if !c.GetRoleMap().Equals(t.GetRoleMap()) { return trace.BadParameter("can not update role map for existing trusted cluster") } if c.GetEnabled() == t.GetEnabled() { if t.GetEnabled() == true { return trace.AlreadyExists("trusted cluster is already enabled") } return trace.AlreadyExists("trusted cluster state is already disabled") } return nil }
go
func (c *TrustedClusterV2) CanChangeStateTo(t TrustedCluster) error { if c.GetToken() != t.GetToken() { return trace.BadParameter("can not update token for existing trusted cluster") } if c.GetProxyAddress() != t.GetProxyAddress() { return trace.BadParameter("can not update proxy address for existing trusted cluster") } if c.GetReverseTunnelAddress() != t.GetReverseTunnelAddress() { return trace.BadParameter("can not update proxy address for existing trusted cluster") } if !utils.StringSlicesEqual(c.GetRoles(), t.GetRoles()) { return trace.BadParameter("can not update roles for existing trusted cluster") } if !c.GetRoleMap().Equals(t.GetRoleMap()) { return trace.BadParameter("can not update role map for existing trusted cluster") } if c.GetEnabled() == t.GetEnabled() { if t.GetEnabled() == true { return trace.AlreadyExists("trusted cluster is already enabled") } return trace.AlreadyExists("trusted cluster state is already disabled") } return nil }
[ "func", "(", "c", "*", "TrustedClusterV2", ")", "CanChangeStateTo", "(", "t", "TrustedCluster", ")", "error", "{", "if", "c", ".", "GetToken", "(", ")", "!=", "t", ".", "GetToken", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "c", ".", "GetProxyAddress", "(", ")", "!=", "t", ".", "GetProxyAddress", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "c", ".", "GetReverseTunnelAddress", "(", ")", "!=", "t", ".", "GetReverseTunnelAddress", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "!", "utils", ".", "StringSlicesEqual", "(", "c", ".", "GetRoles", "(", ")", ",", "t", ".", "GetRoles", "(", ")", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "!", "c", ".", "GetRoleMap", "(", ")", ".", "Equals", "(", "t", ".", "GetRoleMap", "(", ")", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "c", ".", "GetEnabled", "(", ")", "==", "t", ".", "GetEnabled", "(", ")", "{", "if", "t", ".", "GetEnabled", "(", ")", "==", "true", "{", "return", "trace", ".", "AlreadyExists", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "trace", ".", "AlreadyExists", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CanChangeState checks if the state change is allowed or not. If not, returns // an error explaining the reason.
[ "CanChangeState", "checks", "if", "the", "state", "change", "is", "allowed", "or", "not", ".", "If", "not", "returns", "an", "error", "explaining", "the", "reason", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L408-L433
train
gravitational/teleport
lib/services/trustedcluster.go
String
func (c *TrustedClusterV2) String() string { return fmt.Sprintf("TrustedCluster(Enabled=%v,Roles=%v,Token=%v,ProxyAddress=%v,ReverseTunnelAddress=%v)", c.Spec.Enabled, c.Spec.Roles, c.Spec.Token, c.Spec.ProxyAddress, c.Spec.ReverseTunnelAddress) }
go
func (c *TrustedClusterV2) String() string { return fmt.Sprintf("TrustedCluster(Enabled=%v,Roles=%v,Token=%v,ProxyAddress=%v,ReverseTunnelAddress=%v)", c.Spec.Enabled, c.Spec.Roles, c.Spec.Token, c.Spec.ProxyAddress, c.Spec.ReverseTunnelAddress) }
[ "func", "(", "c", "*", "TrustedClusterV2", ")", "String", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "c", ".", "Spec", ".", "Enabled", ",", "c", ".", "Spec", ".", "Roles", ",", "c", ".", "Spec", ".", "Token", ",", "c", ".", "Spec", ".", "ProxyAddress", ",", "c", ".", "Spec", ".", "ReverseTunnelAddress", ")", "\n", "}" ]
// String represents a human readable version of trusted cluster settings.
[ "String", "represents", "a", "human", "readable", "version", "of", "trusted", "cluster", "settings", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L436-L439
train
gravitational/teleport
lib/services/trustedcluster.go
GetTrustedClusterSchema
func GetTrustedClusterSchema(extensionSchema string) string { var trustedClusterSchema string if extensionSchema == "" { trustedClusterSchema = fmt.Sprintf(TrustedClusterSpecSchemaTemplate, RoleMapSchema, "") } else { trustedClusterSchema = fmt.Sprintf(TrustedClusterSpecSchemaTemplate, RoleMapSchema, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, trustedClusterSchema, DefaultDefinitions) }
go
func GetTrustedClusterSchema(extensionSchema string) string { var trustedClusterSchema string if extensionSchema == "" { trustedClusterSchema = fmt.Sprintf(TrustedClusterSpecSchemaTemplate, RoleMapSchema, "") } else { trustedClusterSchema = fmt.Sprintf(TrustedClusterSpecSchemaTemplate, RoleMapSchema, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, trustedClusterSchema, DefaultDefinitions) }
[ "func", "GetTrustedClusterSchema", "(", "extensionSchema", "string", ")", "string", "{", "var", "trustedClusterSchema", "string", "\n", "if", "extensionSchema", "==", "\"", "\"", "{", "trustedClusterSchema", "=", "fmt", ".", "Sprintf", "(", "TrustedClusterSpecSchemaTemplate", ",", "RoleMapSchema", ",", "\"", "\"", ")", "\n", "}", "else", "{", "trustedClusterSchema", "=", "fmt", ".", "Sprintf", "(", "TrustedClusterSpecSchemaTemplate", ",", "RoleMapSchema", ",", "\"", "\"", "+", "extensionSchema", ")", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "V2SchemaTemplate", ",", "MetadataSchema", ",", "trustedClusterSchema", ",", "DefaultDefinitions", ")", "\n", "}" ]
// GetTrustedClusterSchema returns the schema with optionally injected // schema for extensions.
[ "GetTrustedClusterSchema", "returns", "the", "schema", "with", "optionally", "injected", "schema", "for", "extensions", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L480-L488
train
gravitational/teleport
lib/services/trustedcluster.go
Less
func (s SortedTrustedCluster) Less(i, j int) bool { return s[i].GetName() < s[j].GetName() }
go
func (s SortedTrustedCluster) Less(i, j int) bool { return s[i].GetName() < s[j].GetName() }
[ "func", "(", "s", "SortedTrustedCluster", ")", "Less", "(", "i", ",", "j", "int", ")", "bool", "{", "return", "s", "[", "i", "]", ".", "GetName", "(", ")", "<", "s", "[", "j", "]", ".", "GetName", "(", ")", "\n", "}" ]
// Less compares items by name.
[ "Less", "compares", "items", "by", "name", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L579-L581
train
gravitational/teleport
lib/services/trustedcluster.go
Swap
func (s SortedTrustedCluster) Swap(i, j int) { s[i], s[j] = s[j], s[i] }
go
func (s SortedTrustedCluster) Swap(i, j int) { s[i], s[j] = s[j], s[i] }
[ "func", "(", "s", "SortedTrustedCluster", ")", "Swap", "(", "i", ",", "j", "int", ")", "{", "s", "[", "i", "]", ",", "s", "[", "j", "]", "=", "s", "[", "j", "]", ",", "s", "[", "i", "]", "\n", "}" ]
// Swap swaps two items in a list.
[ "Swap", "swaps", "two", "items", "in", "a", "list", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trustedcluster.go#L584-L586
train
gravitational/teleport
lib/client/profile.go
Name
func (c *ClientProfile) Name() string { if c.ProxyHost != "" { return c.ProxyHost } addr, _, err := net.SplitHostPort(c.WebProxyAddr) if err != nil { return c.WebProxyAddr } return addr }
go
func (c *ClientProfile) Name() string { if c.ProxyHost != "" { return c.ProxyHost } addr, _, err := net.SplitHostPort(c.WebProxyAddr) if err != nil { return c.WebProxyAddr } return addr }
[ "func", "(", "c", "*", "ClientProfile", ")", "Name", "(", ")", "string", "{", "if", "c", ".", "ProxyHost", "!=", "\"", "\"", "{", "return", "c", ".", "ProxyHost", "\n", "}", "\n\n", "addr", ",", "_", ",", "err", ":=", "net", ".", "SplitHostPort", "(", "c", ".", "WebProxyAddr", ")", "\n", "if", "err", "!=", "nil", "{", "return", "c", ".", "WebProxyAddr", "\n", "}", "\n\n", "return", "addr", "\n", "}" ]
// Name returns the name of the profile.
[ "Name", "returns", "the", "name", "of", "the", "profile", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/profile.go#L72-L83
train
gravitational/teleport
lib/client/profile.go
UnlinkCurrentProfile
func UnlinkCurrentProfile() error { return trace.Wrap(os.Remove(filepath.Join(FullProfilePath(""), CurrentProfileSymlink))) }
go
func UnlinkCurrentProfile() error { return trace.Wrap(os.Remove(filepath.Join(FullProfilePath(""), CurrentProfileSymlink))) }
[ "func", "UnlinkCurrentProfile", "(", ")", "error", "{", "return", "trace", ".", "Wrap", "(", "os", ".", "Remove", "(", "filepath", ".", "Join", "(", "FullProfilePath", "(", "\"", "\"", ")", ",", "CurrentProfileSymlink", ")", ")", ")", "\n", "}" ]
// If there's a current profile symlink, remove it
[ "If", "there", "s", "a", "current", "profile", "symlink", "remove", "it" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/profile.go#L103-L105
train
gravitational/teleport
lib/client/profile.go
ProfileFromFile
func ProfileFromFile(filePath string) (*ClientProfile, error) { bytes, err := ioutil.ReadFile(filePath) if err != nil { return nil, trace.Wrap(err) } var cp *ClientProfile if err = yaml.Unmarshal(bytes, &cp); err != nil { return nil, trace.Wrap(err) } return cp, nil }
go
func ProfileFromFile(filePath string) (*ClientProfile, error) { bytes, err := ioutil.ReadFile(filePath) if err != nil { return nil, trace.Wrap(err) } var cp *ClientProfile if err = yaml.Unmarshal(bytes, &cp); err != nil { return nil, trace.Wrap(err) } return cp, nil }
[ "func", "ProfileFromFile", "(", "filePath", "string", ")", "(", "*", "ClientProfile", ",", "error", ")", "{", "bytes", ",", "err", ":=", "ioutil", ".", "ReadFile", "(", "filePath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "cp", "*", "ClientProfile", "\n", "if", "err", "=", "yaml", ".", "Unmarshal", "(", "bytes", ",", "&", "cp", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "cp", ",", "nil", "\n", "}" ]
// ProfileFromFile loads the profile from a YAML file
[ "ProfileFromFile", "loads", "the", "profile", "from", "a", "YAML", "file" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/profile.go#L121-L131
train
gravitational/teleport
lib/client/profile.go
SaveTo
func (cp *ClientProfile) SaveTo(loc ProfileLocation) error { bytes, err := yaml.Marshal(&cp) if err != nil { return trace.Wrap(err) } if err = ioutil.WriteFile(loc.Path, bytes, 0660); err != nil { return trace.Wrap(err) } if loc.AliasPath != "" && filepath.Base(loc.AliasPath) != filepath.Base(loc.Path) { if err := os.Remove(loc.AliasPath); err != nil { log.Warningf("Failed to remove symlink alias: %v", err) } err := os.Symlink(filepath.Base(loc.Path), loc.AliasPath) if err != nil { log.Warningf("Failed to create profile alias: %v", err) } } // set 'current' symlink: if loc.Options&ProfileMakeCurrent != 0 { symlink := filepath.Join(filepath.Dir(loc.Path), CurrentProfileSymlink) if err := os.Remove(symlink); err != nil { log.Warningf("Failed to remove symlink: %v", err) } err = os.Symlink(filepath.Base(loc.Path), symlink) } return trace.Wrap(err) }
go
func (cp *ClientProfile) SaveTo(loc ProfileLocation) error { bytes, err := yaml.Marshal(&cp) if err != nil { return trace.Wrap(err) } if err = ioutil.WriteFile(loc.Path, bytes, 0660); err != nil { return trace.Wrap(err) } if loc.AliasPath != "" && filepath.Base(loc.AliasPath) != filepath.Base(loc.Path) { if err := os.Remove(loc.AliasPath); err != nil { log.Warningf("Failed to remove symlink alias: %v", err) } err := os.Symlink(filepath.Base(loc.Path), loc.AliasPath) if err != nil { log.Warningf("Failed to create profile alias: %v", err) } } // set 'current' symlink: if loc.Options&ProfileMakeCurrent != 0 { symlink := filepath.Join(filepath.Dir(loc.Path), CurrentProfileSymlink) if err := os.Remove(symlink); err != nil { log.Warningf("Failed to remove symlink: %v", err) } err = os.Symlink(filepath.Base(loc.Path), symlink) } return trace.Wrap(err) }
[ "func", "(", "cp", "*", "ClientProfile", ")", "SaveTo", "(", "loc", "ProfileLocation", ")", "error", "{", "bytes", ",", "err", ":=", "yaml", ".", "Marshal", "(", "&", "cp", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", "=", "ioutil", ".", "WriteFile", "(", "loc", ".", "Path", ",", "bytes", ",", "0660", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "loc", ".", "AliasPath", "!=", "\"", "\"", "&&", "filepath", ".", "Base", "(", "loc", ".", "AliasPath", ")", "!=", "filepath", ".", "Base", "(", "loc", ".", "Path", ")", "{", "if", "err", ":=", "os", ".", "Remove", "(", "loc", ".", "AliasPath", ")", ";", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "err", ":=", "os", ".", "Symlink", "(", "filepath", ".", "Base", "(", "loc", ".", "Path", ")", ",", "loc", ".", "AliasPath", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "// set 'current' symlink:", "if", "loc", ".", "Options", "&", "ProfileMakeCurrent", "!=", "0", "{", "symlink", ":=", "filepath", ".", "Join", "(", "filepath", ".", "Dir", "(", "loc", ".", "Path", ")", ",", "CurrentProfileSymlink", ")", "\n", "if", "err", ":=", "os", ".", "Remove", "(", "symlink", ")", ";", "err", "!=", "nil", "{", "log", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "err", "=", "os", ".", "Symlink", "(", "filepath", ".", "Base", "(", "loc", ".", "Path", ")", ",", "symlink", ")", "\n", "}", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// SaveTo saves the profile into a given filename, optionally overwriting it.
[ "SaveTo", "saves", "the", "profile", "into", "a", "given", "filename", "optionally", "overwriting", "it", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/profile.go#L145-L171
train
gravitational/teleport
lib/auth/helpers.go
CreateUploaderDir
func CreateUploaderDir(dir string) error { err := os.MkdirAll(filepath.Join(dir, teleport.LogsDir, teleport.ComponentUpload, events.SessionLogsDir, defaults.Namespace), teleport.SharedDirMode) if err != nil { return trace.ConvertSystemError(err) } return nil }
go
func CreateUploaderDir(dir string) error { err := os.MkdirAll(filepath.Join(dir, teleport.LogsDir, teleport.ComponentUpload, events.SessionLogsDir, defaults.Namespace), teleport.SharedDirMode) if err != nil { return trace.ConvertSystemError(err) } return nil }
[ "func", "CreateUploaderDir", "(", "dir", "string", ")", "error", "{", "err", ":=", "os", ".", "MkdirAll", "(", "filepath", ".", "Join", "(", "dir", ",", "teleport", ".", "LogsDir", ",", "teleport", ".", "ComponentUpload", ",", "events", ".", "SessionLogsDir", ",", "defaults", ".", "Namespace", ")", ",", "teleport", ".", "SharedDirMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CreateUploaderDir creates directory for file uploader service
[ "CreateUploaderDir", "creates", "directory", "for", "file", "uploader", "service" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L78-L86
train
gravitational/teleport
lib/auth/helpers.go
GenerateCertificate
func GenerateCertificate(authServer *AuthServer, identity TestIdentity) ([]byte, []byte, error) { switch id := identity.I.(type) { case LocalUser: user, err := authServer.GetUser(id.Username) if err != nil { return nil, nil, trace.Wrap(err) } roles, err := services.FetchRoles(user.GetRoles(), authServer, user.GetTraits()) if err != nil { return nil, nil, trace.Wrap(err) } if identity.TTL == 0 { identity.TTL = time.Hour } priv, pub, err := authServer.GenerateKeyPair("") if err != nil { return nil, nil, trace.Wrap(err) } certs, err := authServer.generateUserCert(certRequest{ publicKey: pub, user: user, roles: roles, ttl: identity.TTL, usage: identity.AcceptedUsage, }) if err != nil { return nil, nil, trace.Wrap(err) } return certs.tls, priv, nil case BuiltinRole: keys, err := authServer.GenerateServerKeys(GenerateServerKeysRequest{ HostID: id.Username, NodeName: id.Username, Roles: teleport.Roles{id.Role}, }) if err != nil { return nil, nil, trace.Wrap(err) } return keys.TLSCert, keys.Key, nil default: return nil, nil, trace.BadParameter("identity of unknown type %T is unsupported", identity) } }
go
func GenerateCertificate(authServer *AuthServer, identity TestIdentity) ([]byte, []byte, error) { switch id := identity.I.(type) { case LocalUser: user, err := authServer.GetUser(id.Username) if err != nil { return nil, nil, trace.Wrap(err) } roles, err := services.FetchRoles(user.GetRoles(), authServer, user.GetTraits()) if err != nil { return nil, nil, trace.Wrap(err) } if identity.TTL == 0 { identity.TTL = time.Hour } priv, pub, err := authServer.GenerateKeyPair("") if err != nil { return nil, nil, trace.Wrap(err) } certs, err := authServer.generateUserCert(certRequest{ publicKey: pub, user: user, roles: roles, ttl: identity.TTL, usage: identity.AcceptedUsage, }) if err != nil { return nil, nil, trace.Wrap(err) } return certs.tls, priv, nil case BuiltinRole: keys, err := authServer.GenerateServerKeys(GenerateServerKeysRequest{ HostID: id.Username, NodeName: id.Username, Roles: teleport.Roles{id.Role}, }) if err != nil { return nil, nil, trace.Wrap(err) } return keys.TLSCert, keys.Key, nil default: return nil, nil, trace.BadParameter("identity of unknown type %T is unsupported", identity) } }
[ "func", "GenerateCertificate", "(", "authServer", "*", "AuthServer", ",", "identity", "TestIdentity", ")", "(", "[", "]", "byte", ",", "[", "]", "byte", ",", "error", ")", "{", "switch", "id", ":=", "identity", ".", "I", ".", "(", "type", ")", "{", "case", "LocalUser", ":", "user", ",", "err", ":=", "authServer", ".", "GetUser", "(", "id", ".", "Username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "roles", ",", "err", ":=", "services", ".", "FetchRoles", "(", "user", ".", "GetRoles", "(", ")", ",", "authServer", ",", "user", ".", "GetTraits", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "identity", ".", "TTL", "==", "0", "{", "identity", ".", "TTL", "=", "time", ".", "Hour", "\n", "}", "\n", "priv", ",", "pub", ",", "err", ":=", "authServer", ".", "GenerateKeyPair", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "certs", ",", "err", ":=", "authServer", ".", "generateUserCert", "(", "certRequest", "{", "publicKey", ":", "pub", ",", "user", ":", "user", ",", "roles", ":", "roles", ",", "ttl", ":", "identity", ".", "TTL", ",", "usage", ":", "identity", ".", "AcceptedUsage", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "certs", ".", "tls", ",", "priv", ",", "nil", "\n", "case", "BuiltinRole", ":", "keys", ",", "err", ":=", "authServer", ".", "GenerateServerKeys", "(", "GenerateServerKeysRequest", "{", "HostID", ":", "id", ".", "Username", ",", "NodeName", ":", "id", ".", "Username", ",", "Roles", ":", "teleport", ".", "Roles", "{", "id", ".", "Role", "}", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "keys", ".", "TLSCert", ",", "keys", ".", "Key", ",", "nil", "\n", "default", ":", "return", "nil", ",", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "identity", ")", "\n", "}", "\n", "}" ]
// GenerateCertificate generates certificate for identity, // returns private public key pair
[ "GenerateCertificate", "generates", "certificate", "for", "identity", "returns", "private", "public", "key", "pair" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L251-L293
train
gravitational/teleport
lib/auth/helpers.go
NewCertificate
func (a *TestAuthServer) NewCertificate(identity TestIdentity) (*tls.Certificate, error) { cert, key, err := GenerateCertificate(a.AuthServer, identity) if err != nil { return nil, trace.Wrap(err) } tlsCert, err := tls.X509KeyPair(cert, key) if err != nil { return nil, trace.Wrap(err) } return &tlsCert, nil }
go
func (a *TestAuthServer) NewCertificate(identity TestIdentity) (*tls.Certificate, error) { cert, key, err := GenerateCertificate(a.AuthServer, identity) if err != nil { return nil, trace.Wrap(err) } tlsCert, err := tls.X509KeyPair(cert, key) if err != nil { return nil, trace.Wrap(err) } return &tlsCert, nil }
[ "func", "(", "a", "*", "TestAuthServer", ")", "NewCertificate", "(", "identity", "TestIdentity", ")", "(", "*", "tls", ".", "Certificate", ",", "error", ")", "{", "cert", ",", "key", ",", "err", ":=", "GenerateCertificate", "(", "a", ".", "AuthServer", ",", "identity", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tlsCert", ",", "err", ":=", "tls", ".", "X509KeyPair", "(", "cert", ",", "key", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "tlsCert", ",", "nil", "\n", "}" ]
// NewCertificate returns new TLS credentials generated by test auth server
[ "NewCertificate", "returns", "new", "TLS", "credentials", "generated", "by", "test", "auth", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L296-L306
train
gravitational/teleport
lib/auth/helpers.go
Trust
func (a *TestAuthServer) Trust(remote *TestAuthServer, roleMap services.RoleMap) error { remoteCA, err := remote.AuthServer.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: remote.ClusterName, }, false) if err != nil { return trace.Wrap(err) } err = a.AuthServer.UpsertCertAuthority(remoteCA) if err != nil { return trace.Wrap(err) } remoteCA, err = remote.AuthServer.GetCertAuthority(services.CertAuthID{ Type: services.UserCA, DomainName: remote.ClusterName, }, false) if err != nil { return trace.Wrap(err) } remoteCA.SetRoleMap(roleMap) err = a.AuthServer.UpsertCertAuthority(remoteCA) if err != nil { return trace.Wrap(err) } return nil }
go
func (a *TestAuthServer) Trust(remote *TestAuthServer, roleMap services.RoleMap) error { remoteCA, err := remote.AuthServer.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: remote.ClusterName, }, false) if err != nil { return trace.Wrap(err) } err = a.AuthServer.UpsertCertAuthority(remoteCA) if err != nil { return trace.Wrap(err) } remoteCA, err = remote.AuthServer.GetCertAuthority(services.CertAuthID{ Type: services.UserCA, DomainName: remote.ClusterName, }, false) if err != nil { return trace.Wrap(err) } remoteCA.SetRoleMap(roleMap) err = a.AuthServer.UpsertCertAuthority(remoteCA) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "a", "*", "TestAuthServer", ")", "Trust", "(", "remote", "*", "TestAuthServer", ",", "roleMap", "services", ".", "RoleMap", ")", "error", "{", "remoteCA", ",", "err", ":=", "remote", ".", "AuthServer", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "remote", ".", "ClusterName", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "err", "=", "a", ".", "AuthServer", ".", "UpsertCertAuthority", "(", "remoteCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "remoteCA", ",", "err", "=", "remote", ".", "AuthServer", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "UserCA", ",", "DomainName", ":", "remote", ".", "ClusterName", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "remoteCA", ".", "SetRoleMap", "(", "roleMap", ")", "\n", "err", "=", "a", ".", "AuthServer", ".", "UpsertCertAuthority", "(", "remoteCA", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Trust adds other server host certificate authority as trusted
[ "Trust", "adds", "other", "server", "host", "certificate", "authority", "as", "trusted" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L314-L339
train
gravitational/teleport
lib/auth/helpers.go
NewRemoteClient
func (a *TestAuthServer) NewRemoteClient(identity TestIdentity, addr net.Addr, pool *x509.CertPool) (*Client, error) { tlsConfig := utils.TLSConfig(a.CipherSuites) cert, err := a.NewCertificate(identity) if err != nil { return nil, trace.Wrap(err) } tlsConfig.Certificates = []tls.Certificate{*cert} tlsConfig.RootCAs = pool addrs := []utils.NetAddr{{ AddrNetwork: addr.Network(), Addr: addr.String()}} return NewTLSClient(ClientConfig{Addrs: addrs, TLS: tlsConfig}) }
go
func (a *TestAuthServer) NewRemoteClient(identity TestIdentity, addr net.Addr, pool *x509.CertPool) (*Client, error) { tlsConfig := utils.TLSConfig(a.CipherSuites) cert, err := a.NewCertificate(identity) if err != nil { return nil, trace.Wrap(err) } tlsConfig.Certificates = []tls.Certificate{*cert} tlsConfig.RootCAs = pool addrs := []utils.NetAddr{{ AddrNetwork: addr.Network(), Addr: addr.String()}} return NewTLSClient(ClientConfig{Addrs: addrs, TLS: tlsConfig}) }
[ "func", "(", "a", "*", "TestAuthServer", ")", "NewRemoteClient", "(", "identity", "TestIdentity", ",", "addr", "net", ".", "Addr", ",", "pool", "*", "x509", ".", "CertPool", ")", "(", "*", "Client", ",", "error", ")", "{", "tlsConfig", ":=", "utils", ".", "TLSConfig", "(", "a", ".", "CipherSuites", ")", "\n", "cert", ",", "err", ":=", "a", ".", "NewCertificate", "(", "identity", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tlsConfig", ".", "Certificates", "=", "[", "]", "tls", ".", "Certificate", "{", "*", "cert", "}", "\n", "tlsConfig", ".", "RootCAs", "=", "pool", "\n", "addrs", ":=", "[", "]", "utils", ".", "NetAddr", "{", "{", "AddrNetwork", ":", "addr", ".", "Network", "(", ")", ",", "Addr", ":", "addr", ".", "String", "(", ")", "}", "}", "\n", "return", "NewTLSClient", "(", "ClientConfig", "{", "Addrs", ":", "addrs", ",", "TLS", ":", "tlsConfig", "}", ")", "\n", "}" ]
// NewRemoteClient creates new client to the remote server using identity // generated for this certificate authority
[ "NewRemoteClient", "creates", "new", "client", "to", "the", "remote", "server", "using", "identity", "generated", "for", "this", "certificate", "authority" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L362-L374
train
gravitational/teleport
lib/auth/helpers.go
CheckAndSetDefaults
func (cfg *TestTLSServerConfig) CheckAndSetDefaults() error { if cfg.APIConfig == nil { return trace.BadParameter("missing parameter APIConfig") } if cfg.AuthServer == nil { return trace.BadParameter("missing parameter AuthServer") } // use very permissive limiter configuration by default if cfg.Limiter == nil { cfg.Limiter = &limiter.LimiterConfig{ MaxConnections: 1000, MaxNumberOfUsers: 1000, } } return nil }
go
func (cfg *TestTLSServerConfig) CheckAndSetDefaults() error { if cfg.APIConfig == nil { return trace.BadParameter("missing parameter APIConfig") } if cfg.AuthServer == nil { return trace.BadParameter("missing parameter AuthServer") } // use very permissive limiter configuration by default if cfg.Limiter == nil { cfg.Limiter = &limiter.LimiterConfig{ MaxConnections: 1000, MaxNumberOfUsers: 1000, } } return nil }
[ "func", "(", "cfg", "*", "TestTLSServerConfig", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "cfg", ".", "APIConfig", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "cfg", ".", "AuthServer", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "// use very permissive limiter configuration by default", "if", "cfg", ".", "Limiter", "==", "nil", "{", "cfg", ".", "Limiter", "=", "&", "limiter", ".", "LimiterConfig", "{", "MaxConnections", ":", "1000", ",", "MaxNumberOfUsers", ":", "1000", ",", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets limiter defaults
[ "CheckAndSetDefaults", "checks", "and", "sets", "limiter", "defaults" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L416-L431
train
gravitational/teleport
lib/auth/helpers.go
NewClientFromWebSession
func (t *TestTLSServer) NewClientFromWebSession(sess services.WebSession) (*Client, error) { tlsConfig, err := t.Identity.TLSConfig(t.AuthServer.CipherSuites) if err != nil { return nil, trace.Wrap(err) } tlsCert, err := tls.X509KeyPair(sess.GetTLSCert(), sess.GetPriv()) if err != nil { return nil, trace.Wrap(err, "failed to parse TLS cert and key") } tlsConfig.Certificates = []tls.Certificate{tlsCert} addrs := []utils.NetAddr{utils.FromAddr(t.Listener.Addr())} return NewTLSClient(ClientConfig{Addrs: addrs, TLS: tlsConfig}) }
go
func (t *TestTLSServer) NewClientFromWebSession(sess services.WebSession) (*Client, error) { tlsConfig, err := t.Identity.TLSConfig(t.AuthServer.CipherSuites) if err != nil { return nil, trace.Wrap(err) } tlsCert, err := tls.X509KeyPair(sess.GetTLSCert(), sess.GetPriv()) if err != nil { return nil, trace.Wrap(err, "failed to parse TLS cert and key") } tlsConfig.Certificates = []tls.Certificate{tlsCert} addrs := []utils.NetAddr{utils.FromAddr(t.Listener.Addr())} return NewTLSClient(ClientConfig{Addrs: addrs, TLS: tlsConfig}) }
[ "func", "(", "t", "*", "TestTLSServer", ")", "NewClientFromWebSession", "(", "sess", "services", ".", "WebSession", ")", "(", "*", "Client", ",", "error", ")", "{", "tlsConfig", ",", "err", ":=", "t", ".", "Identity", ".", "TLSConfig", "(", "t", ".", "AuthServer", ".", "CipherSuites", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tlsCert", ",", "err", ":=", "tls", ".", "X509KeyPair", "(", "sess", ".", "GetTLSCert", "(", ")", ",", "sess", ".", "GetPriv", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "tlsConfig", ".", "Certificates", "=", "[", "]", "tls", ".", "Certificate", "{", "tlsCert", "}", "\n", "addrs", ":=", "[", "]", "utils", ".", "NetAddr", "{", "utils", ".", "FromAddr", "(", "t", ".", "Listener", ".", "Addr", "(", ")", ")", "}", "\n", "return", "NewTLSClient", "(", "ClientConfig", "{", "Addrs", ":", "addrs", ",", "TLS", ":", "tlsConfig", "}", ")", "\n", "}" ]
// NewClientFromWebSession returns new authenticated client from web session
[ "NewClientFromWebSession", "returns", "new", "authenticated", "client", "from", "web", "session" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/helpers.go#L513-L525
train