repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequence
docstring
stringlengths
6
2.61k
docstring_tokens
sequence
sha
stringlengths
40
40
url
stringlengths
85
252
partition
stringclasses
1 value
gravitational/teleport
lib/utils/utils.go
Deduplicate
func Deduplicate(in []string) []string { if len(in) == 0 { return in } out := make([]string, 0, len(in)) seen := make(map[string]bool, len(in)) for _, val := range in { if _, ok := seen[val]; !ok { out = append(out, val) seen[val] = true } } return out }
go
func Deduplicate(in []string) []string { if len(in) == 0 { return in } out := make([]string, 0, len(in)) seen := make(map[string]bool, len(in)) for _, val := range in { if _, ok := seen[val]; !ok { out = append(out, val) seen[val] = true } } return out }
[ "func", "Deduplicate", "(", "in", "[", "]", "string", ")", "[", "]", "string", "{", "if", "len", "(", "in", ")", "==", "0", "{", "return", "in", "\n", "}", "\n", "out", ":=", "make", "(", "[", "]", "string", ",", "0", ",", "len", "(", "in", ")", ")", "\n", "seen", ":=", "make", "(", "map", "[", "string", "]", "bool", ",", "len", "(", "in", ")", ")", "\n", "for", "_", ",", "val", ":=", "range", "in", "{", "if", "_", ",", "ok", ":=", "seen", "[", "val", "]", ";", "!", "ok", "{", "out", "=", "append", "(", "out", ",", "val", ")", "\n", "seen", "[", "val", "]", "=", "true", "\n", "}", "\n", "}", "\n", "return", "out", "\n", "}" ]
// Deduplicate deduplicates list of strings
[ "Deduplicate", "deduplicates", "list", "of", "strings" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L394-L407
train
gravitational/teleport
lib/utils/utils.go
SliceContainsStr
func SliceContainsStr(slice []string, value string) bool { for i := range slice { if slice[i] == value { return true } } return false }
go
func SliceContainsStr(slice []string, value string) bool { for i := range slice { if slice[i] == value { return true } } return false }
[ "func", "SliceContainsStr", "(", "slice", "[", "]", "string", ",", "value", "string", ")", "bool", "{", "for", "i", ":=", "range", "slice", "{", "if", "slice", "[", "i", "]", "==", "value", "{", "return", "true", "\n", "}", "\n", "}", "\n", "return", "false", "\n", "}" ]
// SliceContainsStr returns 'true' if the slice contains the given value
[ "SliceContainsStr", "returns", "true", "if", "the", "slice", "contains", "the", "given", "value" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L410-L417
train
gravitational/teleport
lib/utils/utils.go
RemoveFromSlice
func RemoveFromSlice(slice []string, values ...string) []string { output := make([]string, 0, len(slice)) remove := make(map[string]bool) for _, value := range values { remove[value] = true } for _, s := range slice { _, ok := remove[s] if ok { continue } output = append(output, s) } return output }
go
func RemoveFromSlice(slice []string, values ...string) []string { output := make([]string, 0, len(slice)) remove := make(map[string]bool) for _, value := range values { remove[value] = true } for _, s := range slice { _, ok := remove[s] if ok { continue } output = append(output, s) } return output }
[ "func", "RemoveFromSlice", "(", "slice", "[", "]", "string", ",", "values", "...", "string", ")", "[", "]", "string", "{", "output", ":=", "make", "(", "[", "]", "string", ",", "0", ",", "len", "(", "slice", ")", ")", "\n\n", "remove", ":=", "make", "(", "map", "[", "string", "]", "bool", ")", "\n", "for", "_", ",", "value", ":=", "range", "values", "{", "remove", "[", "value", "]", "=", "true", "\n", "}", "\n\n", "for", "_", ",", "s", ":=", "range", "slice", "{", "_", ",", "ok", ":=", "remove", "[", "s", "]", "\n", "if", "ok", "{", "continue", "\n", "}", "\n", "output", "=", "append", "(", "output", ",", "s", ")", "\n", "}", "\n\n", "return", "output", "\n", "}" ]
// RemoveFromSlice makes a copy of the slice and removes the passed in values from the copy.
[ "RemoveFromSlice", "makes", "a", "copy", "of", "the", "slice", "and", "removes", "the", "passed", "in", "values", "from", "the", "copy", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L420-L437
train
gravitational/teleport
lib/utils/utils.go
CheckCertificateFormatFlag
func CheckCertificateFormatFlag(s string) (string, error) { switch s { case teleport.CertificateFormatStandard, teleport.CertificateFormatOldSSH, teleport.CertificateFormatUnspecified: return s, nil default: return "", trace.BadParameter("invalid certificate format parameter: %q", s) } }
go
func CheckCertificateFormatFlag(s string) (string, error) { switch s { case teleport.CertificateFormatStandard, teleport.CertificateFormatOldSSH, teleport.CertificateFormatUnspecified: return s, nil default: return "", trace.BadParameter("invalid certificate format parameter: %q", s) } }
[ "func", "CheckCertificateFormatFlag", "(", "s", "string", ")", "(", "string", ",", "error", ")", "{", "switch", "s", "{", "case", "teleport", ".", "CertificateFormatStandard", ",", "teleport", ".", "CertificateFormatOldSSH", ",", "teleport", ".", "CertificateFormatUnspecified", ":", "return", "s", ",", "nil", "\n", "default", ":", "return", "\"", "\"", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "s", ")", "\n", "}", "\n", "}" ]
// CheckCertificateFormatFlag checks if the certificate format is valid.
[ "CheckCertificateFormatFlag", "checks", "if", "the", "certificate", "format", "is", "valid", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L440-L447
train
gravitational/teleport
lib/utils/utils.go
Addrs
func (s Strings) Addrs(defaultPort int) ([]NetAddr, error) { addrs := make([]NetAddr, len(s)) for i, val := range s { addr, err := ParseHostPortAddr(val, defaultPort) if err != nil { return nil, trace.Wrap(err) } addrs[i] = *addr } return addrs, nil }
go
func (s Strings) Addrs(defaultPort int) ([]NetAddr, error) { addrs := make([]NetAddr, len(s)) for i, val := range s { addr, err := ParseHostPortAddr(val, defaultPort) if err != nil { return nil, trace.Wrap(err) } addrs[i] = *addr } return addrs, nil }
[ "func", "(", "s", "Strings", ")", "Addrs", "(", "defaultPort", "int", ")", "(", "[", "]", "NetAddr", ",", "error", ")", "{", "addrs", ":=", "make", "(", "[", "]", "NetAddr", ",", "len", "(", "s", ")", ")", "\n", "for", "i", ",", "val", ":=", "range", "s", "{", "addr", ",", "err", ":=", "ParseHostPortAddr", "(", "val", ",", "defaultPort", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "addrs", "[", "i", "]", "=", "*", "addr", "\n", "}", "\n", "return", "addrs", ",", "nil", "\n", "}" ]
// Addrs returns strings list converted to address list
[ "Addrs", "returns", "strings", "list", "converted", "to", "address", "list" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L514-L524
train
gravitational/teleport
tool/tctl/common/tctl.go
connectToAuthService
func connectToAuthService(cfg *service.Config) (client auth.ClientI, err error) { // connect to the local auth server by default: cfg.Auth.Enabled = true if len(cfg.AuthServers) == 0 { cfg.AuthServers = []utils.NetAddr{ *defaults.AuthConnectAddr(), } } // read the host SSH keys and use them to open an SSH connection to the auth service i, err := auth.ReadLocalIdentity(filepath.Join(cfg.DataDir, teleport.ComponentProcess), auth.IdentityID{Role: teleport.RoleAdmin, HostUUID: cfg.HostUUID}) if err != nil { // the "admin" identity is not present? this means the tctl is running NOT on the auth server. if trace.IsNotFound(err) { return nil, trace.AccessDenied("tctl must be used on the auth server") } return nil, trace.Wrap(err) } tlsConfig, err := i.TLSConfig(cfg.CipherSuites) if err != nil { return nil, trace.Wrap(err) } client, err = auth.NewTLSClient(auth.ClientConfig{Addrs: cfg.AuthServers, TLS: tlsConfig}) if err != nil { return nil, trace.Wrap(err) } // Check connectivity by calling something on the client. _, err = client.GetClusterName() if err != nil { utils.Consolef(os.Stderr, teleport.ComponentClient, "Cannot connect to the auth server: %v.\nIs the auth server running on %v?", err, cfg.AuthServers[0].Addr) os.Exit(1) } return client, nil }
go
func connectToAuthService(cfg *service.Config) (client auth.ClientI, err error) { // connect to the local auth server by default: cfg.Auth.Enabled = true if len(cfg.AuthServers) == 0 { cfg.AuthServers = []utils.NetAddr{ *defaults.AuthConnectAddr(), } } // read the host SSH keys and use them to open an SSH connection to the auth service i, err := auth.ReadLocalIdentity(filepath.Join(cfg.DataDir, teleport.ComponentProcess), auth.IdentityID{Role: teleport.RoleAdmin, HostUUID: cfg.HostUUID}) if err != nil { // the "admin" identity is not present? this means the tctl is running NOT on the auth server. if trace.IsNotFound(err) { return nil, trace.AccessDenied("tctl must be used on the auth server") } return nil, trace.Wrap(err) } tlsConfig, err := i.TLSConfig(cfg.CipherSuites) if err != nil { return nil, trace.Wrap(err) } client, err = auth.NewTLSClient(auth.ClientConfig{Addrs: cfg.AuthServers, TLS: tlsConfig}) if err != nil { return nil, trace.Wrap(err) } // Check connectivity by calling something on the client. _, err = client.GetClusterName() if err != nil { utils.Consolef(os.Stderr, teleport.ComponentClient, "Cannot connect to the auth server: %v.\nIs the auth server running on %v?", err, cfg.AuthServers[0].Addr) os.Exit(1) } return client, nil }
[ "func", "connectToAuthService", "(", "cfg", "*", "service", ".", "Config", ")", "(", "client", "auth", ".", "ClientI", ",", "err", "error", ")", "{", "// connect to the local auth server by default:", "cfg", ".", "Auth", ".", "Enabled", "=", "true", "\n", "if", "len", "(", "cfg", ".", "AuthServers", ")", "==", "0", "{", "cfg", ".", "AuthServers", "=", "[", "]", "utils", ".", "NetAddr", "{", "*", "defaults", ".", "AuthConnectAddr", "(", ")", ",", "}", "\n", "}", "\n", "// read the host SSH keys and use them to open an SSH connection to the auth service", "i", ",", "err", ":=", "auth", ".", "ReadLocalIdentity", "(", "filepath", ".", "Join", "(", "cfg", ".", "DataDir", ",", "teleport", ".", "ComponentProcess", ")", ",", "auth", ".", "IdentityID", "{", "Role", ":", "teleport", ".", "RoleAdmin", ",", "HostUUID", ":", "cfg", ".", "HostUUID", "}", ")", "\n", "if", "err", "!=", "nil", "{", "// the \"admin\" identity is not present? this means the tctl is running NOT on the auth server.", "if", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tlsConfig", ",", "err", ":=", "i", ".", "TLSConfig", "(", "cfg", ".", "CipherSuites", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "client", ",", "err", "=", "auth", ".", "NewTLSClient", "(", "auth", ".", "ClientConfig", "{", "Addrs", ":", "cfg", ".", "AuthServers", ",", "TLS", ":", "tlsConfig", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Check connectivity by calling something on the client.", "_", ",", "err", "=", "client", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "utils", ".", "Consolef", "(", "os", ".", "Stderr", ",", "teleport", ".", "ComponentClient", ",", "\"", "\\n", "\"", ",", "err", ",", "cfg", ".", "AuthServers", "[", "0", "]", ".", "Addr", ")", "\n", "os", ".", "Exit", "(", "1", ")", "\n", "}", "\n", "return", "client", ",", "nil", "\n", "}" ]
// connectToAuthService creates a valid client connection to the auth service
[ "connectToAuthService", "creates", "a", "valid", "client", "connection", "to", "the", "auth", "service" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/tctl.go#L128-L163
train
gravitational/teleport
tool/tctl/common/tctl.go
applyConfig
func applyConfig(ccf *GlobalCLIFlags, cfg *service.Config) error { // load /etc/teleport.yaml and apply it's values: fileConf, err := config.ReadConfigFile(ccf.ConfigFile) if err != nil { return trace.Wrap(err) } // if configuration is passed as an environment variable, // try to decode it and override the config file if ccf.ConfigString != "" { fileConf, err = config.ReadFromString(ccf.ConfigString) if err != nil { return trace.Wrap(err) } } if err = config.ApplyFileConfig(fileConf, cfg); err != nil { return trace.Wrap(err) } // --debug flag if ccf.Debug { cfg.Debug = ccf.Debug utils.InitLogger(utils.LoggingForCLI, logrus.DebugLevel) logrus.Debugf("DEBUG logging enabled") } // read a host UUID for this node cfg.HostUUID, err = utils.ReadHostUUID(cfg.DataDir) if err != nil { utils.FatalError(err) } return nil }
go
func applyConfig(ccf *GlobalCLIFlags, cfg *service.Config) error { // load /etc/teleport.yaml and apply it's values: fileConf, err := config.ReadConfigFile(ccf.ConfigFile) if err != nil { return trace.Wrap(err) } // if configuration is passed as an environment variable, // try to decode it and override the config file if ccf.ConfigString != "" { fileConf, err = config.ReadFromString(ccf.ConfigString) if err != nil { return trace.Wrap(err) } } if err = config.ApplyFileConfig(fileConf, cfg); err != nil { return trace.Wrap(err) } // --debug flag if ccf.Debug { cfg.Debug = ccf.Debug utils.InitLogger(utils.LoggingForCLI, logrus.DebugLevel) logrus.Debugf("DEBUG logging enabled") } // read a host UUID for this node cfg.HostUUID, err = utils.ReadHostUUID(cfg.DataDir) if err != nil { utils.FatalError(err) } return nil }
[ "func", "applyConfig", "(", "ccf", "*", "GlobalCLIFlags", ",", "cfg", "*", "service", ".", "Config", ")", "error", "{", "// load /etc/teleport.yaml and apply it's values:", "fileConf", ",", "err", ":=", "config", ".", "ReadConfigFile", "(", "ccf", ".", "ConfigFile", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// if configuration is passed as an environment variable,", "// try to decode it and override the config file", "if", "ccf", ".", "ConfigString", "!=", "\"", "\"", "{", "fileConf", ",", "err", "=", "config", ".", "ReadFromString", "(", "ccf", ".", "ConfigString", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "if", "err", "=", "config", ".", "ApplyFileConfig", "(", "fileConf", ",", "cfg", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// --debug flag", "if", "ccf", ".", "Debug", "{", "cfg", ".", "Debug", "=", "ccf", ".", "Debug", "\n", "utils", ".", "InitLogger", "(", "utils", ".", "LoggingForCLI", ",", "logrus", ".", "DebugLevel", ")", "\n", "logrus", ".", "Debugf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// read a host UUID for this node", "cfg", ".", "HostUUID", ",", "err", "=", "utils", ".", "ReadHostUUID", "(", "cfg", ".", "DataDir", ")", "\n", "if", "err", "!=", "nil", "{", "utils", ".", "FatalError", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// applyConfig takes configuration values from the config file and applies // them to 'service.Config' object
[ "applyConfig", "takes", "configuration", "values", "from", "the", "config", "file", "and", "applies", "them", "to", "service", ".", "Config", "object" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/tctl.go#L167-L197
train
gravitational/teleport
lib/limiter/limiter.go
SetEnv
func (l *LimiterConfig) SetEnv(v string) error { if err := json.Unmarshal([]byte(v), l); err != nil { return trace.Wrap(err, "expected JSON encoded remote certificate") } return nil }
go
func (l *LimiterConfig) SetEnv(v string) error { if err := json.Unmarshal([]byte(v), l); err != nil { return trace.Wrap(err, "expected JSON encoded remote certificate") } return nil }
[ "func", "(", "l", "*", "LimiterConfig", ")", "SetEnv", "(", "v", "string", ")", "error", "{", "if", "err", ":=", "json", ".", "Unmarshal", "(", "[", "]", "byte", "(", "v", ")", ",", "l", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// SetEnv reads LimiterConfig from JSON string
[ "SetEnv", "reads", "LimiterConfig", "from", "JSON", "string" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/limiter.go#L49-L54
train
gravitational/teleport
lib/limiter/limiter.go
NewLimiter
func NewLimiter(config LimiterConfig) (*Limiter, error) { var err error limiter := Limiter{} limiter.ConnectionsLimiter, err = NewConnectionsLimiter(config) if err != nil { return nil, trace.Wrap(err) } limiter.rateLimiter, err = NewRateLimiter(config) if err != nil { return nil, trace.Wrap(err) } return &limiter, nil }
go
func NewLimiter(config LimiterConfig) (*Limiter, error) { var err error limiter := Limiter{} limiter.ConnectionsLimiter, err = NewConnectionsLimiter(config) if err != nil { return nil, trace.Wrap(err) } limiter.rateLimiter, err = NewRateLimiter(config) if err != nil { return nil, trace.Wrap(err) } return &limiter, nil }
[ "func", "NewLimiter", "(", "config", "LimiterConfig", ")", "(", "*", "Limiter", ",", "error", ")", "{", "var", "err", "error", "\n", "limiter", ":=", "Limiter", "{", "}", "\n\n", "limiter", ".", "ConnectionsLimiter", ",", "err", "=", "NewConnectionsLimiter", "(", "config", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "limiter", ".", "rateLimiter", ",", "err", "=", "NewRateLimiter", "(", "config", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "&", "limiter", ",", "nil", "\n", "}" ]
// NewLimiter returns new rate and connection limiter
[ "NewLimiter", "returns", "new", "rate", "and", "connection", "limiter" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/limiter.go#L57-L72
train
gravitational/teleport
lib/limiter/limiter.go
WrapHandle
func (l *Limiter) WrapHandle(h http.Handler) { l.rateLimiter.Wrap(h) l.ConnLimiter.Wrap(l.rateLimiter) }
go
func (l *Limiter) WrapHandle(h http.Handler) { l.rateLimiter.Wrap(h) l.ConnLimiter.Wrap(l.rateLimiter) }
[ "func", "(", "l", "*", "Limiter", ")", "WrapHandle", "(", "h", "http", ".", "Handler", ")", "{", "l", ".", "rateLimiter", ".", "Wrap", "(", "h", ")", "\n", "l", ".", "ConnLimiter", ".", "Wrap", "(", "l", ".", "rateLimiter", ")", "\n", "}" ]
// Add limiter to the handle
[ "Add", "limiter", "to", "the", "handle" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/limiter.go#L79-L82
train
gravitational/teleport
lib/web/apiserver.go
SetSessionStreamPollPeriod
func SetSessionStreamPollPeriod(period time.Duration) HandlerOption { return func(h *Handler) error { if period < 0 { return trace.BadParameter("period should be non zero") } h.sessionStreamPollPeriod = period return nil } }
go
func SetSessionStreamPollPeriod(period time.Duration) HandlerOption { return func(h *Handler) error { if period < 0 { return trace.BadParameter("period should be non zero") } h.sessionStreamPollPeriod = period return nil } }
[ "func", "SetSessionStreamPollPeriod", "(", "period", "time", ".", "Duration", ")", "HandlerOption", "{", "return", "func", "(", "h", "*", "Handler", ")", "error", "{", "if", "period", "<", "0", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "h", ".", "sessionStreamPollPeriod", "=", "period", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// SetSessionStreamPollPeriod sets polling period for session streams
[ "SetSessionStreamPollPeriod", "sets", "polling", "period", "for", "session", "streams" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L79-L87
train
gravitational/teleport
lib/web/apiserver.go
getWebConfig
func (h *Handler) getWebConfig(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { httplib.SetWebConfigHeaders(w.Header()) authProviders := []ui.WebConfigAuthProvider{} secondFactor := teleport.OFF // get all OIDC connectors oidcConnectors, err := h.cfg.ProxyClient.GetOIDCConnectors(false) if err != nil { log.Errorf("Cannot retrieve OIDC connectors: %v.", err) } for _, item := range oidcConnectors { authProviders = append(authProviders, ui.WebConfigAuthProvider{ Type: ui.WebConfigAuthProviderOIDCType, WebAPIURL: ui.WebConfigAuthProviderOIDCURL, Name: item.GetName(), DisplayName: item.GetDisplay(), }) } // get all SAML connectors samlConnectors, err := h.cfg.ProxyClient.GetSAMLConnectors(false) if err != nil { log.Errorf("Cannot retrieve SAML connectors: %v.", err) } for _, item := range samlConnectors { authProviders = append(authProviders, ui.WebConfigAuthProvider{ Type: ui.WebConfigAuthProviderSAMLType, WebAPIURL: ui.WebConfigAuthProviderSAMLURL, Name: item.GetName(), DisplayName: item.GetDisplay(), }) } // get all Github connectors githubConnectors, err := h.cfg.ProxyClient.GetGithubConnectors(false) if err != nil { log.Errorf("Cannot retrieve Github connectors: %v.", err) } for _, item := range githubConnectors { authProviders = append(authProviders, ui.WebConfigAuthProvider{ Type: ui.WebConfigAuthProviderGitHubType, WebAPIURL: ui.WebConfigAuthProviderGitHubURL, Name: item.GetName(), DisplayName: item.GetDisplay(), }) } // get second factor type cap, err := h.cfg.ProxyClient.GetAuthPreference() if err != nil { log.Errorf("Cannot retrieve AuthPreferences: %v.", err) } else { secondFactor = cap.GetSecondFactor() } // disable joining sessions if proxy session recording is enabled var canJoinSessions = true clsCfg, err := h.cfg.ProxyClient.GetClusterConfig() if err != nil { log.Errorf("Cannot retrieve ClusterConfig: %v.", err) } else { canJoinSessions = clsCfg.GetSessionRecording() != services.RecordAtProxy } authSettings := ui.WebConfigAuthSettings{ Providers: authProviders, SecondFactor: secondFactor, } webCfg := ui.WebConfig{ Auth: authSettings, CanJoinSessions: canJoinSessions, } out, err := json.Marshal(webCfg) if err != nil { return nil, trace.Wrap(err) } fmt.Fprintf(w, "var GRV_CONFIG = %v;", string(out)) return nil, nil }
go
func (h *Handler) getWebConfig(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { httplib.SetWebConfigHeaders(w.Header()) authProviders := []ui.WebConfigAuthProvider{} secondFactor := teleport.OFF // get all OIDC connectors oidcConnectors, err := h.cfg.ProxyClient.GetOIDCConnectors(false) if err != nil { log.Errorf("Cannot retrieve OIDC connectors: %v.", err) } for _, item := range oidcConnectors { authProviders = append(authProviders, ui.WebConfigAuthProvider{ Type: ui.WebConfigAuthProviderOIDCType, WebAPIURL: ui.WebConfigAuthProviderOIDCURL, Name: item.GetName(), DisplayName: item.GetDisplay(), }) } // get all SAML connectors samlConnectors, err := h.cfg.ProxyClient.GetSAMLConnectors(false) if err != nil { log.Errorf("Cannot retrieve SAML connectors: %v.", err) } for _, item := range samlConnectors { authProviders = append(authProviders, ui.WebConfigAuthProvider{ Type: ui.WebConfigAuthProviderSAMLType, WebAPIURL: ui.WebConfigAuthProviderSAMLURL, Name: item.GetName(), DisplayName: item.GetDisplay(), }) } // get all Github connectors githubConnectors, err := h.cfg.ProxyClient.GetGithubConnectors(false) if err != nil { log.Errorf("Cannot retrieve Github connectors: %v.", err) } for _, item := range githubConnectors { authProviders = append(authProviders, ui.WebConfigAuthProvider{ Type: ui.WebConfigAuthProviderGitHubType, WebAPIURL: ui.WebConfigAuthProviderGitHubURL, Name: item.GetName(), DisplayName: item.GetDisplay(), }) } // get second factor type cap, err := h.cfg.ProxyClient.GetAuthPreference() if err != nil { log.Errorf("Cannot retrieve AuthPreferences: %v.", err) } else { secondFactor = cap.GetSecondFactor() } // disable joining sessions if proxy session recording is enabled var canJoinSessions = true clsCfg, err := h.cfg.ProxyClient.GetClusterConfig() if err != nil { log.Errorf("Cannot retrieve ClusterConfig: %v.", err) } else { canJoinSessions = clsCfg.GetSessionRecording() != services.RecordAtProxy } authSettings := ui.WebConfigAuthSettings{ Providers: authProviders, SecondFactor: secondFactor, } webCfg := ui.WebConfig{ Auth: authSettings, CanJoinSessions: canJoinSessions, } out, err := json.Marshal(webCfg) if err != nil { return nil, trace.Wrap(err) } fmt.Fprintf(w, "var GRV_CONFIG = %v;", string(out)) return nil, nil }
[ "func", "(", "h", "*", "Handler", ")", "getWebConfig", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "p", "httprouter", ".", "Params", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "httplib", ".", "SetWebConfigHeaders", "(", "w", ".", "Header", "(", ")", ")", "\n\n", "authProviders", ":=", "[", "]", "ui", ".", "WebConfigAuthProvider", "{", "}", "\n", "secondFactor", ":=", "teleport", ".", "OFF", "\n\n", "// get all OIDC connectors", "oidcConnectors", ",", "err", ":=", "h", ".", "cfg", ".", "ProxyClient", ".", "GetOIDCConnectors", "(", "false", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "for", "_", ",", "item", ":=", "range", "oidcConnectors", "{", "authProviders", "=", "append", "(", "authProviders", ",", "ui", ".", "WebConfigAuthProvider", "{", "Type", ":", "ui", ".", "WebConfigAuthProviderOIDCType", ",", "WebAPIURL", ":", "ui", ".", "WebConfigAuthProviderOIDCURL", ",", "Name", ":", "item", ".", "GetName", "(", ")", ",", "DisplayName", ":", "item", ".", "GetDisplay", "(", ")", ",", "}", ")", "\n", "}", "\n\n", "// get all SAML connectors", "samlConnectors", ",", "err", ":=", "h", ".", "cfg", ".", "ProxyClient", ".", "GetSAMLConnectors", "(", "false", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "for", "_", ",", "item", ":=", "range", "samlConnectors", "{", "authProviders", "=", "append", "(", "authProviders", ",", "ui", ".", "WebConfigAuthProvider", "{", "Type", ":", "ui", ".", "WebConfigAuthProviderSAMLType", ",", "WebAPIURL", ":", "ui", ".", "WebConfigAuthProviderSAMLURL", ",", "Name", ":", "item", ".", "GetName", "(", ")", ",", "DisplayName", ":", "item", ".", "GetDisplay", "(", ")", ",", "}", ")", "\n", "}", "\n\n", "// get all Github connectors", "githubConnectors", ",", "err", ":=", "h", ".", "cfg", ".", "ProxyClient", ".", "GetGithubConnectors", "(", "false", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "for", "_", ",", "item", ":=", "range", "githubConnectors", "{", "authProviders", "=", "append", "(", "authProviders", ",", "ui", ".", "WebConfigAuthProvider", "{", "Type", ":", "ui", ".", "WebConfigAuthProviderGitHubType", ",", "WebAPIURL", ":", "ui", ".", "WebConfigAuthProviderGitHubURL", ",", "Name", ":", "item", ".", "GetName", "(", ")", ",", "DisplayName", ":", "item", ".", "GetDisplay", "(", ")", ",", "}", ")", "\n", "}", "\n\n", "// get second factor type", "cap", ",", "err", ":=", "h", ".", "cfg", ".", "ProxyClient", ".", "GetAuthPreference", "(", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "else", "{", "secondFactor", "=", "cap", ".", "GetSecondFactor", "(", ")", "\n", "}", "\n\n", "// disable joining sessions if proxy session recording is enabled", "var", "canJoinSessions", "=", "true", "\n", "clsCfg", ",", "err", ":=", "h", ".", "cfg", ".", "ProxyClient", ".", "GetClusterConfig", "(", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "else", "{", "canJoinSessions", "=", "clsCfg", ".", "GetSessionRecording", "(", ")", "!=", "services", ".", "RecordAtProxy", "\n", "}", "\n\n", "authSettings", ":=", "ui", ".", "WebConfigAuthSettings", "{", "Providers", ":", "authProviders", ",", "SecondFactor", ":", "secondFactor", ",", "}", "\n\n", "webCfg", ":=", "ui", ".", "WebConfig", "{", "Auth", ":", "authSettings", ",", "CanJoinSessions", ":", "canJoinSessions", ",", "}", "\n\n", "out", ",", "err", ":=", "json", ".", "Marshal", "(", "webCfg", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "fmt", ".", "Fprintf", "(", "w", ",", "\"", "\"", ",", "string", "(", "out", ")", ")", "\n", "return", "nil", ",", "nil", "\n", "}" ]
// getWebConfig returns configuration for the web application.
[ "getWebConfig", "returns", "configuration", "for", "the", "web", "application", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L577-L659
train
gravitational/teleport
lib/web/apiserver.go
ConstructSSHResponse
func ConstructSSHResponse(response AuthParams) (*url.URL, error) { u, err := url.Parse(response.ClientRedirectURL) if err != nil { return nil, trace.Wrap(err) } consoleResponse := auth.SSHLoginResponse{ Username: response.Username, Cert: response.Cert, TLSCert: response.TLSCert, HostSigners: auth.AuthoritiesToTrustedCerts(response.HostSigners), } out, err := json.Marshal(consoleResponse) if err != nil { return nil, trace.Wrap(err) } // Extract secret out of the request. Look for both "secret" which is the // old format and "secret_key" which is the new fomat. If this is not done, // then users would have to update their callback URL in their identity // provider. values := u.Query() secretV1 := values.Get("secret") secretV2 := values.Get("secret_key") values.Set("secret", "") values.Set("secret_key", "") var ciphertext []byte switch { // AES-GCM based symmetric cipher. case secretV2 != "": key, err := secret.ParseKey([]byte(secretV2)) if err != nil { return nil, trace.Wrap(err) } ciphertext, err = key.Seal(out) if err != nil { return nil, trace.Wrap(err) } // NaCl based symmetric cipher (legacy). case secretV1 != "": secretKeyBytes, err := lemma_secret.EncodedStringToKey(secretV1) if err != nil { return nil, trace.BadParameter("bad secret") } encryptor, err := lemma_secret.New(&lemma_secret.Config{KeyBytes: secretKeyBytes}) if err != nil { return nil, trace.Wrap(err) } sealedBytes, err := encryptor.Seal(out) if err != nil { return nil, trace.Wrap(err) } ciphertext, err = json.Marshal(sealedBytes) if err != nil { return nil, trace.Wrap(err) } default: return nil, trace.BadParameter("missing secret") } // Place ciphertext into the response body. values.Set("response", string(ciphertext)) u.RawQuery = values.Encode() return u, nil }
go
func ConstructSSHResponse(response AuthParams) (*url.URL, error) { u, err := url.Parse(response.ClientRedirectURL) if err != nil { return nil, trace.Wrap(err) } consoleResponse := auth.SSHLoginResponse{ Username: response.Username, Cert: response.Cert, TLSCert: response.TLSCert, HostSigners: auth.AuthoritiesToTrustedCerts(response.HostSigners), } out, err := json.Marshal(consoleResponse) if err != nil { return nil, trace.Wrap(err) } // Extract secret out of the request. Look for both "secret" which is the // old format and "secret_key" which is the new fomat. If this is not done, // then users would have to update their callback URL in their identity // provider. values := u.Query() secretV1 := values.Get("secret") secretV2 := values.Get("secret_key") values.Set("secret", "") values.Set("secret_key", "") var ciphertext []byte switch { // AES-GCM based symmetric cipher. case secretV2 != "": key, err := secret.ParseKey([]byte(secretV2)) if err != nil { return nil, trace.Wrap(err) } ciphertext, err = key.Seal(out) if err != nil { return nil, trace.Wrap(err) } // NaCl based symmetric cipher (legacy). case secretV1 != "": secretKeyBytes, err := lemma_secret.EncodedStringToKey(secretV1) if err != nil { return nil, trace.BadParameter("bad secret") } encryptor, err := lemma_secret.New(&lemma_secret.Config{KeyBytes: secretKeyBytes}) if err != nil { return nil, trace.Wrap(err) } sealedBytes, err := encryptor.Seal(out) if err != nil { return nil, trace.Wrap(err) } ciphertext, err = json.Marshal(sealedBytes) if err != nil { return nil, trace.Wrap(err) } default: return nil, trace.BadParameter("missing secret") } // Place ciphertext into the response body. values.Set("response", string(ciphertext)) u.RawQuery = values.Encode() return u, nil }
[ "func", "ConstructSSHResponse", "(", "response", "AuthParams", ")", "(", "*", "url", ".", "URL", ",", "error", ")", "{", "u", ",", "err", ":=", "url", ".", "Parse", "(", "response", ".", "ClientRedirectURL", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "consoleResponse", ":=", "auth", ".", "SSHLoginResponse", "{", "Username", ":", "response", ".", "Username", ",", "Cert", ":", "response", ".", "Cert", ",", "TLSCert", ":", "response", ".", "TLSCert", ",", "HostSigners", ":", "auth", ".", "AuthoritiesToTrustedCerts", "(", "response", ".", "HostSigners", ")", ",", "}", "\n", "out", ",", "err", ":=", "json", ".", "Marshal", "(", "consoleResponse", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Extract secret out of the request. Look for both \"secret\" which is the", "// old format and \"secret_key\" which is the new fomat. If this is not done,", "// then users would have to update their callback URL in their identity", "// provider.", "values", ":=", "u", ".", "Query", "(", ")", "\n", "secretV1", ":=", "values", ".", "Get", "(", "\"", "\"", ")", "\n", "secretV2", ":=", "values", ".", "Get", "(", "\"", "\"", ")", "\n", "values", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "values", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n\n", "var", "ciphertext", "[", "]", "byte", "\n\n", "switch", "{", "// AES-GCM based symmetric cipher.", "case", "secretV2", "!=", "\"", "\"", ":", "key", ",", "err", ":=", "secret", ".", "ParseKey", "(", "[", "]", "byte", "(", "secretV2", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "ciphertext", ",", "err", "=", "key", ".", "Seal", "(", "out", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// NaCl based symmetric cipher (legacy).", "case", "secretV1", "!=", "\"", "\"", ":", "secretKeyBytes", ",", "err", ":=", "lemma_secret", ".", "EncodedStringToKey", "(", "secretV1", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "encryptor", ",", "err", ":=", "lemma_secret", ".", "New", "(", "&", "lemma_secret", ".", "Config", "{", "KeyBytes", ":", "secretKeyBytes", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "sealedBytes", ",", "err", ":=", "encryptor", ".", "Seal", "(", "out", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "ciphertext", ",", "err", "=", "json", ".", "Marshal", "(", "sealedBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// Place ciphertext into the response body.", "values", ".", "Set", "(", "\"", "\"", ",", "string", "(", "ciphertext", ")", ")", "\n\n", "u", ".", "RawQuery", "=", "values", ".", "Encode", "(", ")", "\n", "return", "u", ",", "nil", "\n", "}" ]
// ConstructSSHResponse creates a special SSH response for SSH login method // that encodes everything using the client's secret key
[ "ConstructSSHResponse", "creates", "a", "special", "SSH", "response", "for", "SSH", "login", "method", "that", "encodes", "everything", "using", "the", "client", "s", "secret", "key" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L901-L967
train
gravitational/teleport
lib/web/apiserver.go
queryTime
func queryTime(query url.Values, name string, def time.Time) (time.Time, error) { str := query.Get(name) if str == "" { return def, nil } parsed, err := time.Parse(time.RFC3339, str) if err != nil { return time.Time{}, trace.BadParameter("failed to parse %v as RFC3339 time: %v", name, str) } return parsed, nil }
go
func queryTime(query url.Values, name string, def time.Time) (time.Time, error) { str := query.Get(name) if str == "" { return def, nil } parsed, err := time.Parse(time.RFC3339, str) if err != nil { return time.Time{}, trace.BadParameter("failed to parse %v as RFC3339 time: %v", name, str) } return parsed, nil }
[ "func", "queryTime", "(", "query", "url", ".", "Values", ",", "name", "string", ",", "def", "time", ".", "Time", ")", "(", "time", ".", "Time", ",", "error", ")", "{", "str", ":=", "query", ".", "Get", "(", "name", ")", "\n", "if", "str", "==", "\"", "\"", "{", "return", "def", ",", "nil", "\n", "}", "\n", "parsed", ",", "err", ":=", "time", ".", "Parse", "(", "time", ".", "RFC3339", ",", "str", ")", "\n", "if", "err", "!=", "nil", "{", "return", "time", ".", "Time", "{", "}", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "name", ",", "str", ")", "\n", "}", "\n", "return", "parsed", ",", "nil", "\n", "}" ]
// queryTime parses the query string parameter with the specified name as a // RFC3339 time and returns it. // // If there's no such parameter, specified default value is returned.
[ "queryTime", "parses", "the", "query", "string", "parameter", "with", "the", "specified", "name", "as", "a", "RFC3339", "time", "and", "returns", "it", ".", "If", "there", "s", "no", "such", "parameter", "specified", "default", "value", "is", "returned", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1643-L1653
train
gravitational/teleport
lib/web/apiserver.go
queryLimit
func queryLimit(query url.Values, name string, def int) (int, error) { str := query.Get(name) if str == "" { return def, nil } limit, err := strconv.Atoi(str) if err != nil { return 0, trace.BadParameter("failed to parse %v as limit: %v", name, str) } return limit, nil }
go
func queryLimit(query url.Values, name string, def int) (int, error) { str := query.Get(name) if str == "" { return def, nil } limit, err := strconv.Atoi(str) if err != nil { return 0, trace.BadParameter("failed to parse %v as limit: %v", name, str) } return limit, nil }
[ "func", "queryLimit", "(", "query", "url", ".", "Values", ",", "name", "string", ",", "def", "int", ")", "(", "int", ",", "error", ")", "{", "str", ":=", "query", ".", "Get", "(", "name", ")", "\n", "if", "str", "==", "\"", "\"", "{", "return", "def", ",", "nil", "\n", "}", "\n", "limit", ",", "err", ":=", "strconv", ".", "Atoi", "(", "str", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "name", ",", "str", ")", "\n", "}", "\n", "return", "limit", ",", "nil", "\n", "}" ]
// queryLimit returns the limit parameter with the specified name from the // query string. // // If there's no such parameter, specified default limit is returned.
[ "queryLimit", "returns", "the", "limit", "parameter", "with", "the", "specified", "name", "from", "the", "query", "string", ".", "If", "there", "s", "no", "such", "parameter", "specified", "default", "limit", "is", "returned", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1659-L1669
train
gravitational/teleport
lib/web/apiserver.go
hostCredentials
func (h *Handler) hostCredentials(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { var req auth.RegisterUsingTokenRequest if err := httplib.ReadJSON(r, &req); err != nil { return nil, trace.Wrap(err) } authClient := h.cfg.ProxyClient packedKeys, err := authClient.RegisterUsingToken(req) if err != nil { return nil, trace.Wrap(err) } return packedKeys, nil }
go
func (h *Handler) hostCredentials(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { var req auth.RegisterUsingTokenRequest if err := httplib.ReadJSON(r, &req); err != nil { return nil, trace.Wrap(err) } authClient := h.cfg.ProxyClient packedKeys, err := authClient.RegisterUsingToken(req) if err != nil { return nil, trace.Wrap(err) } return packedKeys, nil }
[ "func", "(", "h", "*", "Handler", ")", "hostCredentials", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "p", "httprouter", ".", "Params", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "var", "req", "auth", ".", "RegisterUsingTokenRequest", "\n", "if", "err", ":=", "httplib", ".", "ReadJSON", "(", "r", ",", "&", "req", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "authClient", ":=", "h", ".", "cfg", ".", "ProxyClient", "\n", "packedKeys", ",", "err", ":=", "authClient", ".", "RegisterUsingToken", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "packedKeys", ",", "nil", "\n", "}" ]
// hostCredentials sends a registration token and metadata to the Auth Server // and gets back SSH and TLS certificates.
[ "hostCredentials", "sends", "a", "registration", "token", "and", "metadata", "to", "the", "Auth", "Server", "and", "gets", "back", "SSH", "and", "TLS", "certificates", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1832-L1845
train
gravitational/teleport
lib/web/apiserver.go
WithClusterAuth
func (h *Handler) WithClusterAuth(fn ClusterHandler) httprouter.Handle { return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { ctx, err := h.AuthenticateRequest(w, r, true) if err != nil { log.Info(err) // clear session just in case if the authentication request is not valid ClearSession(w) return nil, trace.Wrap(err) } siteName := p.ByName("site") if siteName == currentSiteShortcut { res, err := h.cfg.ProxyClient.GetClusterName() if err != nil { log.Warn(err) return nil, trace.Wrap(err) } siteName = res.GetClusterName() } site, err := h.cfg.Proxy.GetSite(siteName) if err != nil { log.Warn(err) return nil, trace.Wrap(err) } return fn(w, r, p, ctx, site) }) }
go
func (h *Handler) WithClusterAuth(fn ClusterHandler) httprouter.Handle { return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { ctx, err := h.AuthenticateRequest(w, r, true) if err != nil { log.Info(err) // clear session just in case if the authentication request is not valid ClearSession(w) return nil, trace.Wrap(err) } siteName := p.ByName("site") if siteName == currentSiteShortcut { res, err := h.cfg.ProxyClient.GetClusterName() if err != nil { log.Warn(err) return nil, trace.Wrap(err) } siteName = res.GetClusterName() } site, err := h.cfg.Proxy.GetSite(siteName) if err != nil { log.Warn(err) return nil, trace.Wrap(err) } return fn(w, r, p, ctx, site) }) }
[ "func", "(", "h", "*", "Handler", ")", "WithClusterAuth", "(", "fn", "ClusterHandler", ")", "httprouter", ".", "Handle", "{", "return", "httplib", ".", "MakeHandler", "(", "func", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "p", "httprouter", ".", "Params", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "ctx", ",", "err", ":=", "h", ".", "AuthenticateRequest", "(", "w", ",", "r", ",", "true", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Info", "(", "err", ")", "\n", "// clear session just in case if the authentication request is not valid", "ClearSession", "(", "w", ")", "\n", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "siteName", ":=", "p", ".", "ByName", "(", "\"", "\"", ")", "\n", "if", "siteName", "==", "currentSiteShortcut", "{", "res", ",", "err", ":=", "h", ".", "cfg", ".", "ProxyClient", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warn", "(", "err", ")", "\n", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "siteName", "=", "res", ".", "GetClusterName", "(", ")", "\n", "}", "\n", "site", ",", "err", ":=", "h", ".", "cfg", ".", "Proxy", ".", "GetSite", "(", "siteName", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Warn", "(", "err", ")", "\n", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "fn", "(", "w", ",", "r", ",", "p", ",", "ctx", ",", "site", ")", "\n", "}", ")", "\n", "}" ]
// WithClusterAuth ensures that request is authenticated and is issued for existing cluster
[ "WithClusterAuth", "ensures", "that", "request", "is", "authenticated", "and", "is", "issued", "for", "existing", "cluster" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1976-L2003
train
gravitational/teleport
lib/web/apiserver.go
WithAuth
func (h *Handler) WithAuth(fn ContextHandler) httprouter.Handle { return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { ctx, err := h.AuthenticateRequest(w, r, true) if err != nil { return nil, trace.Wrap(err) } return fn(w, r, p, ctx) }) }
go
func (h *Handler) WithAuth(fn ContextHandler) httprouter.Handle { return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) { ctx, err := h.AuthenticateRequest(w, r, true) if err != nil { return nil, trace.Wrap(err) } return fn(w, r, p, ctx) }) }
[ "func", "(", "h", "*", "Handler", ")", "WithAuth", "(", "fn", "ContextHandler", ")", "httprouter", ".", "Handle", "{", "return", "httplib", ".", "MakeHandler", "(", "func", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "p", "httprouter", ".", "Params", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "ctx", ",", "err", ":=", "h", ".", "AuthenticateRequest", "(", "w", ",", "r", ",", "true", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "fn", "(", "w", ",", "r", ",", "p", ",", "ctx", ")", "\n", "}", ")", "\n", "}" ]
// WithAuth ensures that request is authenticated
[ "WithAuth", "ensures", "that", "request", "is", "authenticated" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2006-L2014
train
gravitational/teleport
lib/web/apiserver.go
AuthenticateRequest
func (h *Handler) AuthenticateRequest(w http.ResponseWriter, r *http.Request, checkBearerToken bool) (*SessionContext, error) { const missingCookieMsg = "missing session cookie" logger := log.WithFields(log.Fields{ "request": fmt.Sprintf("%v %v", r.Method, r.URL.Path), }) cookie, err := r.Cookie("session") if err != nil || (cookie != nil && cookie.Value == "") { if err != nil { logger.Warn(err) } return nil, trace.AccessDenied(missingCookieMsg) } d, err := DecodeCookie(cookie.Value) if err != nil { logger.Warningf("failed to decode cookie: %v", err) return nil, trace.AccessDenied("failed to decode cookie") } ctx, err := h.auth.ValidateSession(d.User, d.SID) if err != nil { logger.Warningf("invalid session: %v", err) ClearSession(w) return nil, trace.AccessDenied("need auth") } if checkBearerToken { creds, err := roundtrip.ParseAuthHeaders(r) if err != nil { logger.Warningf("no auth headers %v", err) return nil, trace.AccessDenied("need auth") } if subtle.ConstantTimeCompare([]byte(creds.Password), []byte(ctx.GetWebSession().GetBearerToken())) != 1 { logger.Warningf("Request failed: bad bearer token.") return nil, trace.AccessDenied("bad bearer token") } } return ctx, nil }
go
func (h *Handler) AuthenticateRequest(w http.ResponseWriter, r *http.Request, checkBearerToken bool) (*SessionContext, error) { const missingCookieMsg = "missing session cookie" logger := log.WithFields(log.Fields{ "request": fmt.Sprintf("%v %v", r.Method, r.URL.Path), }) cookie, err := r.Cookie("session") if err != nil || (cookie != nil && cookie.Value == "") { if err != nil { logger.Warn(err) } return nil, trace.AccessDenied(missingCookieMsg) } d, err := DecodeCookie(cookie.Value) if err != nil { logger.Warningf("failed to decode cookie: %v", err) return nil, trace.AccessDenied("failed to decode cookie") } ctx, err := h.auth.ValidateSession(d.User, d.SID) if err != nil { logger.Warningf("invalid session: %v", err) ClearSession(w) return nil, trace.AccessDenied("need auth") } if checkBearerToken { creds, err := roundtrip.ParseAuthHeaders(r) if err != nil { logger.Warningf("no auth headers %v", err) return nil, trace.AccessDenied("need auth") } if subtle.ConstantTimeCompare([]byte(creds.Password), []byte(ctx.GetWebSession().GetBearerToken())) != 1 { logger.Warningf("Request failed: bad bearer token.") return nil, trace.AccessDenied("bad bearer token") } } return ctx, nil }
[ "func", "(", "h", "*", "Handler", ")", "AuthenticateRequest", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "checkBearerToken", "bool", ")", "(", "*", "SessionContext", ",", "error", ")", "{", "const", "missingCookieMsg", "=", "\"", "\"", "\n", "logger", ":=", "log", ".", "WithFields", "(", "log", ".", "Fields", "{", "\"", "\"", ":", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "r", ".", "Method", ",", "r", ".", "URL", ".", "Path", ")", ",", "}", ")", "\n", "cookie", ",", "err", ":=", "r", ".", "Cookie", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "||", "(", "cookie", "!=", "nil", "&&", "cookie", ".", "Value", "==", "\"", "\"", ")", "{", "if", "err", "!=", "nil", "{", "logger", ".", "Warn", "(", "err", ")", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "missingCookieMsg", ")", "\n", "}", "\n", "d", ",", "err", ":=", "DecodeCookie", "(", "cookie", ".", "Value", ")", "\n", "if", "err", "!=", "nil", "{", "logger", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n", "ctx", ",", "err", ":=", "h", ".", "auth", ".", "ValidateSession", "(", "d", ".", "User", ",", "d", ".", "SID", ")", "\n", "if", "err", "!=", "nil", "{", "logger", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "ClearSession", "(", "w", ")", "\n", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "checkBearerToken", "{", "creds", ",", "err", ":=", "roundtrip", ".", "ParseAuthHeaders", "(", "r", ")", "\n", "if", "err", "!=", "nil", "{", "logger", ".", "Warningf", "(", "\"", "\"", ",", "err", ")", "\n", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "subtle", ".", "ConstantTimeCompare", "(", "[", "]", "byte", "(", "creds", ".", "Password", ")", ",", "[", "]", "byte", "(", "ctx", ".", "GetWebSession", "(", ")", ".", "GetBearerToken", "(", ")", ")", ")", "!=", "1", "{", "logger", ".", "Warningf", "(", "\"", "\"", ")", "\n", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n", "}", "\n", "return", "ctx", ",", "nil", "\n", "}" ]
// AuthenticateRequest authenticates request using combination of a session cookie // and bearer token
[ "AuthenticateRequest", "authenticates", "request", "using", "combination", "of", "a", "session", "cookie", "and", "bearer", "token" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2018-L2054
train
gravitational/teleport
lib/web/apiserver.go
CreateSignupLink
func CreateSignupLink(client auth.ClientI, token string) (string, string) { proxyHost := "<proxyhost>:3080" proxies, err := client.GetProxies() if err != nil { log.Errorf("Unable to retrieve proxy list: %v", err) } if len(proxies) > 0 { proxyHost = proxies[0].GetPublicAddr() if proxyHost == "" { proxyHost = fmt.Sprintf("%v:%v", proxies[0].GetHostname(), defaults.HTTPListenPort) log.Debugf("public_address not set for proxy, returning proxyHost: %q", proxyHost) } } u := &url.URL{ Scheme: "https", Host: proxyHost, Path: "web/newuser/" + token, } return u.String(), proxyHost }
go
func CreateSignupLink(client auth.ClientI, token string) (string, string) { proxyHost := "<proxyhost>:3080" proxies, err := client.GetProxies() if err != nil { log.Errorf("Unable to retrieve proxy list: %v", err) } if len(proxies) > 0 { proxyHost = proxies[0].GetPublicAddr() if proxyHost == "" { proxyHost = fmt.Sprintf("%v:%v", proxies[0].GetHostname(), defaults.HTTPListenPort) log.Debugf("public_address not set for proxy, returning proxyHost: %q", proxyHost) } } u := &url.URL{ Scheme: "https", Host: proxyHost, Path: "web/newuser/" + token, } return u.String(), proxyHost }
[ "func", "CreateSignupLink", "(", "client", "auth", ".", "ClientI", ",", "token", "string", ")", "(", "string", ",", "string", ")", "{", "proxyHost", ":=", "\"", "\"", "\n\n", "proxies", ",", "err", ":=", "client", ".", "GetProxies", "(", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "if", "len", "(", "proxies", ")", ">", "0", "{", "proxyHost", "=", "proxies", "[", "0", "]", ".", "GetPublicAddr", "(", ")", "\n", "if", "proxyHost", "==", "\"", "\"", "{", "proxyHost", "=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "proxies", "[", "0", "]", ".", "GetHostname", "(", ")", ",", "defaults", ".", "HTTPListenPort", ")", "\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "proxyHost", ")", "\n", "}", "\n", "}", "\n\n", "u", ":=", "&", "url", ".", "URL", "{", "Scheme", ":", "\"", "\"", ",", "Host", ":", "proxyHost", ",", "Path", ":", "\"", "\"", "+", "token", ",", "}", "\n", "return", "u", ".", "String", "(", ")", ",", "proxyHost", "\n", "}" ]
// CreateSignupLink generates and returns a URL which is given to a new // user to complete registration with Teleport via Web UI
[ "CreateSignupLink", "generates", "and", "returns", "a", "URL", "which", "is", "given", "to", "a", "new", "user", "to", "complete", "registration", "with", "Teleport", "via", "Web", "UI" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2080-L2102
train
gravitational/teleport
lib/web/apiserver.go
makeTeleportClientConfig
func makeTeleportClientConfig(ctx *SessionContext) (*client.Config, error) { agent, cert, err := ctx.GetAgent() if err != nil { return nil, trace.BadParameter("failed to get user credentials: %v", err) } signers, err := agent.Signers() if err != nil { return nil, trace.BadParameter("failed to get user credentials: %v", err) } tlsConfig, err := ctx.ClientTLSConfig() if err != nil { return nil, trace.BadParameter("failed to get client TLS config: %v", err) } config := &client.Config{ Username: ctx.user, Agent: agent, SkipLocalAuth: true, TLS: tlsConfig, AuthMethods: []ssh.AuthMethod{ssh.PublicKeys(signers...)}, DefaultPrincipal: cert.ValidPrincipals[0], HostKeyCallback: func(string, net.Addr, ssh.PublicKey) error { return nil }, } return config, nil }
go
func makeTeleportClientConfig(ctx *SessionContext) (*client.Config, error) { agent, cert, err := ctx.GetAgent() if err != nil { return nil, trace.BadParameter("failed to get user credentials: %v", err) } signers, err := agent.Signers() if err != nil { return nil, trace.BadParameter("failed to get user credentials: %v", err) } tlsConfig, err := ctx.ClientTLSConfig() if err != nil { return nil, trace.BadParameter("failed to get client TLS config: %v", err) } config := &client.Config{ Username: ctx.user, Agent: agent, SkipLocalAuth: true, TLS: tlsConfig, AuthMethods: []ssh.AuthMethod{ssh.PublicKeys(signers...)}, DefaultPrincipal: cert.ValidPrincipals[0], HostKeyCallback: func(string, net.Addr, ssh.PublicKey) error { return nil }, } return config, nil }
[ "func", "makeTeleportClientConfig", "(", "ctx", "*", "SessionContext", ")", "(", "*", "client", ".", "Config", ",", "error", ")", "{", "agent", ",", "cert", ",", "err", ":=", "ctx", ".", "GetAgent", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "signers", ",", "err", ":=", "agent", ".", "Signers", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "tlsConfig", ",", "err", ":=", "ctx", ".", "ClientTLSConfig", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "config", ":=", "&", "client", ".", "Config", "{", "Username", ":", "ctx", ".", "user", ",", "Agent", ":", "agent", ",", "SkipLocalAuth", ":", "true", ",", "TLS", ":", "tlsConfig", ",", "AuthMethods", ":", "[", "]", "ssh", ".", "AuthMethod", "{", "ssh", ".", "PublicKeys", "(", "signers", "...", ")", "}", ",", "DefaultPrincipal", ":", "cert", ".", "ValidPrincipals", "[", "0", "]", ",", "HostKeyCallback", ":", "func", "(", "string", ",", "net", ".", "Addr", ",", "ssh", ".", "PublicKey", ")", "error", "{", "return", "nil", "}", ",", "}", "\n\n", "return", "config", ",", "nil", "\n", "}" ]
// makeTeleportClientConfig creates default teleport client configuration // that is used to initiate an SSH terminal session or SCP file transfer
[ "makeTeleportClientConfig", "creates", "default", "teleport", "client", "configuration", "that", "is", "used", "to", "initiate", "an", "SSH", "terminal", "session", "or", "SCP", "file", "transfer" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2114-L2141
train
gravitational/teleport
lib/client/keyagent.go
LoadKey
func (a *LocalKeyAgent) LoadKey(key Key) (*agent.AddedKey, error) { agents := []agent.Agent{a.Agent} if a.sshAgent != nil { agents = append(agents, a.sshAgent) } // convert keys into a format understood by the ssh agent agentKeys, err := key.AsAgentKeys() if err != nil { return nil, trace.Wrap(err) } // remove any keys that the user may already have loaded err = a.UnloadKey() if err != nil { return nil, trace.Wrap(err) } // iterate over all teleport and system agent and load key for i, _ := range agents { for _, agentKey := range agentKeys { err = agents[i].Add(*agentKey) if err != nil { a.log.Warnf("Unable to communicate with agent and add key: %v", err) } } } // return the first key because it has the embedded private key in it. // see docs for AsAgentKeys for more details. return agentKeys[0], nil }
go
func (a *LocalKeyAgent) LoadKey(key Key) (*agent.AddedKey, error) { agents := []agent.Agent{a.Agent} if a.sshAgent != nil { agents = append(agents, a.sshAgent) } // convert keys into a format understood by the ssh agent agentKeys, err := key.AsAgentKeys() if err != nil { return nil, trace.Wrap(err) } // remove any keys that the user may already have loaded err = a.UnloadKey() if err != nil { return nil, trace.Wrap(err) } // iterate over all teleport and system agent and load key for i, _ := range agents { for _, agentKey := range agentKeys { err = agents[i].Add(*agentKey) if err != nil { a.log.Warnf("Unable to communicate with agent and add key: %v", err) } } } // return the first key because it has the embedded private key in it. // see docs for AsAgentKeys for more details. return agentKeys[0], nil }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "LoadKey", "(", "key", "Key", ")", "(", "*", "agent", ".", "AddedKey", ",", "error", ")", "{", "agents", ":=", "[", "]", "agent", ".", "Agent", "{", "a", ".", "Agent", "}", "\n", "if", "a", ".", "sshAgent", "!=", "nil", "{", "agents", "=", "append", "(", "agents", ",", "a", ".", "sshAgent", ")", "\n", "}", "\n\n", "// convert keys into a format understood by the ssh agent", "agentKeys", ",", "err", ":=", "key", ".", "AsAgentKeys", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// remove any keys that the user may already have loaded", "err", "=", "a", ".", "UnloadKey", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// iterate over all teleport and system agent and load key", "for", "i", ",", "_", ":=", "range", "agents", "{", "for", "_", ",", "agentKey", ":=", "range", "agentKeys", "{", "err", "=", "agents", "[", "i", "]", ".", "Add", "(", "*", "agentKey", ")", "\n", "if", "err", "!=", "nil", "{", "a", ".", "log", ".", "Warnf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "// return the first key because it has the embedded private key in it.", "// see docs for AsAgentKeys for more details.", "return", "agentKeys", "[", "0", "]", ",", "nil", "\n", "}" ]
// LoadKey adds a key into the Teleport ssh agent as well as the system ssh // agent.
[ "LoadKey", "adds", "a", "key", "into", "the", "Teleport", "ssh", "agent", "as", "well", "as", "the", "system", "ssh", "agent", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L123-L154
train
gravitational/teleport
lib/client/keyagent.go
UnloadKey
func (a *LocalKeyAgent) UnloadKey() error { agents := []agent.Agent{a.Agent} if a.sshAgent != nil { agents = append(agents, a.sshAgent) } // iterate over all agents we have and unload keys for this user for i, _ := range agents { // get a list of all keys in the agent keyList, err := agents[i].List() if err != nil { a.log.Warnf("Unable to communicate with agent and list keys: %v", err) } // remove any teleport keys we currently have loaded in the agent for this user for _, key := range keyList { if key.Comment == fmt.Sprintf("teleport:%v", a.username) { err = agents[i].Remove(key) if err != nil { a.log.Warnf("Unable to communicate with agent and remove key: %v", err) } } } } return nil }
go
func (a *LocalKeyAgent) UnloadKey() error { agents := []agent.Agent{a.Agent} if a.sshAgent != nil { agents = append(agents, a.sshAgent) } // iterate over all agents we have and unload keys for this user for i, _ := range agents { // get a list of all keys in the agent keyList, err := agents[i].List() if err != nil { a.log.Warnf("Unable to communicate with agent and list keys: %v", err) } // remove any teleport keys we currently have loaded in the agent for this user for _, key := range keyList { if key.Comment == fmt.Sprintf("teleport:%v", a.username) { err = agents[i].Remove(key) if err != nil { a.log.Warnf("Unable to communicate with agent and remove key: %v", err) } } } } return nil }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "UnloadKey", "(", ")", "error", "{", "agents", ":=", "[", "]", "agent", ".", "Agent", "{", "a", ".", "Agent", "}", "\n", "if", "a", ".", "sshAgent", "!=", "nil", "{", "agents", "=", "append", "(", "agents", ",", "a", ".", "sshAgent", ")", "\n", "}", "\n\n", "// iterate over all agents we have and unload keys for this user", "for", "i", ",", "_", ":=", "range", "agents", "{", "// get a list of all keys in the agent", "keyList", ",", "err", ":=", "agents", "[", "i", "]", ".", "List", "(", ")", "\n", "if", "err", "!=", "nil", "{", "a", ".", "log", ".", "Warnf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// remove any teleport keys we currently have loaded in the agent for this user", "for", "_", ",", "key", ":=", "range", "keyList", "{", "if", "key", ".", "Comment", "==", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "a", ".", "username", ")", "{", "err", "=", "agents", "[", "i", "]", ".", "Remove", "(", "key", ")", "\n", "if", "err", "!=", "nil", "{", "a", ".", "log", ".", "Warnf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// UnloadKey will unload key for user from the teleport ssh agent as well as // the system agent.
[ "UnloadKey", "will", "unload", "key", "for", "user", "from", "the", "teleport", "ssh", "agent", "as", "well", "as", "the", "system", "agent", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L158-L184
train
gravitational/teleport
lib/client/keyagent.go
UnloadKeys
func (a *LocalKeyAgent) UnloadKeys() error { agents := []agent.Agent{a.Agent} if a.sshAgent != nil { agents = append(agents, a.sshAgent) } // iterate over all agents we have for i, _ := range agents { // get a list of all keys in the agent keyList, err := agents[i].List() if err != nil { a.log.Warnf("Unable to communicate with agent and list keys: %v", err) } // remove any teleport keys we currently have loaded in the agent for _, key := range keyList { if strings.HasPrefix(key.Comment, "teleport:") { err = agents[i].Remove(key) if err != nil { a.log.Warnf("Unable to communicate with agent and remove key: %v", err) } } } } return nil }
go
func (a *LocalKeyAgent) UnloadKeys() error { agents := []agent.Agent{a.Agent} if a.sshAgent != nil { agents = append(agents, a.sshAgent) } // iterate over all agents we have for i, _ := range agents { // get a list of all keys in the agent keyList, err := agents[i].List() if err != nil { a.log.Warnf("Unable to communicate with agent and list keys: %v", err) } // remove any teleport keys we currently have loaded in the agent for _, key := range keyList { if strings.HasPrefix(key.Comment, "teleport:") { err = agents[i].Remove(key) if err != nil { a.log.Warnf("Unable to communicate with agent and remove key: %v", err) } } } } return nil }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "UnloadKeys", "(", ")", "error", "{", "agents", ":=", "[", "]", "agent", ".", "Agent", "{", "a", ".", "Agent", "}", "\n", "if", "a", ".", "sshAgent", "!=", "nil", "{", "agents", "=", "append", "(", "agents", ",", "a", ".", "sshAgent", ")", "\n", "}", "\n\n", "// iterate over all agents we have", "for", "i", ",", "_", ":=", "range", "agents", "{", "// get a list of all keys in the agent", "keyList", ",", "err", ":=", "agents", "[", "i", "]", ".", "List", "(", ")", "\n", "if", "err", "!=", "nil", "{", "a", ".", "log", ".", "Warnf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// remove any teleport keys we currently have loaded in the agent", "for", "_", ",", "key", ":=", "range", "keyList", "{", "if", "strings", ".", "HasPrefix", "(", "key", ".", "Comment", ",", "\"", "\"", ")", "{", "err", "=", "agents", "[", "i", "]", ".", "Remove", "(", "key", ")", "\n", "if", "err", "!=", "nil", "{", "a", ".", "log", ".", "Warnf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// UnloadKeys will unload all Teleport keys from the teleport agent as well as // the system agent.
[ "UnloadKeys", "will", "unload", "all", "Teleport", "keys", "from", "the", "teleport", "agent", "as", "well", "as", "the", "system", "agent", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L188-L214
train
gravitational/teleport
lib/client/keyagent.go
AddHostSignersToCache
func (a *LocalKeyAgent) AddHostSignersToCache(certAuthorities []auth.TrustedCerts) error { for _, ca := range certAuthorities { publicKeys, err := ca.SSHCertPublicKeys() if err != nil { a.log.Error(err) return trace.Wrap(err) } a.log.Debugf("Adding CA key for %s", ca.ClusterName) err = a.keyStore.AddKnownHostKeys(ca.ClusterName, publicKeys) if err != nil { return trace.Wrap(err) } } return nil }
go
func (a *LocalKeyAgent) AddHostSignersToCache(certAuthorities []auth.TrustedCerts) error { for _, ca := range certAuthorities { publicKeys, err := ca.SSHCertPublicKeys() if err != nil { a.log.Error(err) return trace.Wrap(err) } a.log.Debugf("Adding CA key for %s", ca.ClusterName) err = a.keyStore.AddKnownHostKeys(ca.ClusterName, publicKeys) if err != nil { return trace.Wrap(err) } } return nil }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "AddHostSignersToCache", "(", "certAuthorities", "[", "]", "auth", ".", "TrustedCerts", ")", "error", "{", "for", "_", ",", "ca", ":=", "range", "certAuthorities", "{", "publicKeys", ",", "err", ":=", "ca", ".", "SSHCertPublicKeys", "(", ")", "\n", "if", "err", "!=", "nil", "{", "a", ".", "log", ".", "Error", "(", "err", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "a", ".", "log", ".", "Debugf", "(", "\"", "\"", ",", "ca", ".", "ClusterName", ")", "\n", "err", "=", "a", ".", "keyStore", ".", "AddKnownHostKeys", "(", "ca", ".", "ClusterName", ",", "publicKeys", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// AddHostSignersToCache takes a list of CAs whom we trust. This list is added to a database // of "seen" CAs. // // Every time we connect to a new host, we'll request its certificaate to be signed by one // of these trusted CAs. // // Why do we trust these CAs? Because we received them from a trusted Teleport Proxy. // Why do we trust the proxy? Because we've connected to it via HTTPS + username + Password + HOTP.
[ "AddHostSignersToCache", "takes", "a", "list", "of", "CAs", "whom", "we", "trust", ".", "This", "list", "is", "added", "to", "a", "database", "of", "seen", "CAs", ".", "Every", "time", "we", "connect", "to", "a", "new", "host", "we", "ll", "request", "its", "certificaate", "to", "be", "signed", "by", "one", "of", "these", "trusted", "CAs", ".", "Why", "do", "we", "trust", "these", "CAs?", "Because", "we", "received", "them", "from", "a", "trusted", "Teleport", "Proxy", ".", "Why", "do", "we", "trust", "the", "proxy?", "Because", "we", "ve", "connected", "to", "it", "via", "HTTPS", "+", "username", "+", "Password", "+", "HOTP", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L230-L244
train
gravitational/teleport
lib/client/keyagent.go
AddKey
func (a *LocalKeyAgent) AddKey(key *Key) (*agent.AddedKey, error) { // save it to disk (usually into ~/.tsh) err := a.keyStore.AddKey(a.proxyHost, a.username, key) if err != nil { return nil, trace.Wrap(err) } // load key into the teleport agent and system agent return a.LoadKey(*key) }
go
func (a *LocalKeyAgent) AddKey(key *Key) (*agent.AddedKey, error) { // save it to disk (usually into ~/.tsh) err := a.keyStore.AddKey(a.proxyHost, a.username, key) if err != nil { return nil, trace.Wrap(err) } // load key into the teleport agent and system agent return a.LoadKey(*key) }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "AddKey", "(", "key", "*", "Key", ")", "(", "*", "agent", ".", "AddedKey", ",", "error", ")", "{", "// save it to disk (usually into ~/.tsh)", "err", ":=", "a", ".", "keyStore", ".", "AddKey", "(", "a", ".", "proxyHost", ",", "a", ".", "username", ",", "key", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// load key into the teleport agent and system agent", "return", "a", ".", "LoadKey", "(", "*", "key", ")", "\n", "}" ]
// AddKey activates a new signed session key by adding it into the keystore and also // by loading it into the SSH agent
[ "AddKey", "activates", "a", "new", "signed", "session", "key", "by", "adding", "it", "into", "the", "keystore", "and", "also", "by", "loading", "it", "into", "the", "SSH", "agent" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L370-L379
train
gravitational/teleport
lib/client/keyagent.go
DeleteKey
func (a *LocalKeyAgent) DeleteKey() error { // remove key from key store err := a.keyStore.DeleteKey(a.proxyHost, a.username) if err != nil { return trace.Wrap(err) } // remove any keys that are loaded for this user from the teleport and // system agents err = a.UnloadKey() if err != nil { return trace.Wrap(err) } return nil }
go
func (a *LocalKeyAgent) DeleteKey() error { // remove key from key store err := a.keyStore.DeleteKey(a.proxyHost, a.username) if err != nil { return trace.Wrap(err) } // remove any keys that are loaded for this user from the teleport and // system agents err = a.UnloadKey() if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "DeleteKey", "(", ")", "error", "{", "// remove key from key store", "err", ":=", "a", ".", "keyStore", ".", "DeleteKey", "(", "a", ".", "proxyHost", ",", "a", ".", "username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// remove any keys that are loaded for this user from the teleport and", "// system agents", "err", "=", "a", ".", "UnloadKey", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// DeleteKey removes the key from the key store as well as unloading the key // from the agent.
[ "DeleteKey", "removes", "the", "key", "from", "the", "key", "store", "as", "well", "as", "unloading", "the", "key", "from", "the", "agent", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L383-L398
train
gravitational/teleport
lib/client/keyagent.go
DeleteKeys
func (a *LocalKeyAgent) DeleteKeys() error { // Remove keys from the filesystem. err := a.keyStore.DeleteKeys() if err != nil { return trace.Wrap(err) } // Remove all keys from the Teleport and system agents. err = a.UnloadKeys() if err != nil { return trace.Wrap(err) } return nil }
go
func (a *LocalKeyAgent) DeleteKeys() error { // Remove keys from the filesystem. err := a.keyStore.DeleteKeys() if err != nil { return trace.Wrap(err) } // Remove all keys from the Teleport and system agents. err = a.UnloadKeys() if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "a", "*", "LocalKeyAgent", ")", "DeleteKeys", "(", ")", "error", "{", "// Remove keys from the filesystem.", "err", ":=", "a", ".", "keyStore", ".", "DeleteKeys", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Remove all keys from the Teleport and system agents.", "err", "=", "a", ".", "UnloadKeys", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// DeleteKeys removes all keys from the keystore as well as unloads keys // from the agent.
[ "DeleteKeys", "removes", "all", "keys", "from", "the", "keystore", "as", "well", "as", "unloads", "keys", "from", "the", "agent", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L402-L416
train
gravitational/teleport
lib/utils/fs_unix.go
FSWriteLock
func FSWriteLock(f *os.File) error { if err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX); err != nil { return trace.ConvertSystemError(err) } return nil }
go
func FSWriteLock(f *os.File) error { if err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX); err != nil { return trace.ConvertSystemError(err) } return nil }
[ "func", "FSWriteLock", "(", "f", "*", "os", ".", "File", ")", "error", "{", "if", "err", ":=", "syscall", ".", "Flock", "(", "int", "(", "f", ".", "Fd", "(", ")", ")", ",", "syscall", ".", "LOCK_EX", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// FSWriteLock grabs Flock-style filesystem lock on an open file // in exclusive mode.
[ "FSWriteLock", "grabs", "Flock", "-", "style", "filesystem", "lock", "on", "an", "open", "file", "in", "exclusive", "mode", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fs_unix.go#L30-L35
train
gravitational/teleport
lib/utils/fs_unix.go
FSTryWriteLock
func FSTryWriteLock(f *os.File) error { err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX|syscall.LOCK_NB) if err != nil { if err == syscall.EWOULDBLOCK { return trace.CompareFailed("lock %v is acquired by another process", f.Name()) } return trace.ConvertSystemError(err) } return nil }
go
func FSTryWriteLock(f *os.File) error { err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX|syscall.LOCK_NB) if err != nil { if err == syscall.EWOULDBLOCK { return trace.CompareFailed("lock %v is acquired by another process", f.Name()) } return trace.ConvertSystemError(err) } return nil }
[ "func", "FSTryWriteLock", "(", "f", "*", "os", ".", "File", ")", "error", "{", "err", ":=", "syscall", ".", "Flock", "(", "int", "(", "f", ".", "Fd", "(", ")", ")", ",", "syscall", ".", "LOCK_EX", "|", "syscall", ".", "LOCK_NB", ")", "\n", "if", "err", "!=", "nil", "{", "if", "err", "==", "syscall", ".", "EWOULDBLOCK", "{", "return", "trace", ".", "CompareFailed", "(", "\"", "\"", ",", "f", ".", "Name", "(", ")", ")", "\n", "}", "\n", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// FSTryWriteLock tries to grab write lock, returns CompareFailed // if lock is already grabbed
[ "FSTryWriteLock", "tries", "to", "grab", "write", "lock", "returns", "CompareFailed", "if", "lock", "is", "already", "grabbed" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fs_unix.go#L39-L48
train
gravitational/teleport
lib/utils/fs_unix.go
FSUnlock
func FSUnlock(f *os.File) error { if err := syscall.Flock(int(f.Fd()), syscall.LOCK_UN); err != nil { return trace.ConvertSystemError(err) } return nil }
go
func FSUnlock(f *os.File) error { if err := syscall.Flock(int(f.Fd()), syscall.LOCK_UN); err != nil { return trace.ConvertSystemError(err) } return nil }
[ "func", "FSUnlock", "(", "f", "*", "os", ".", "File", ")", "error", "{", "if", "err", ":=", "syscall", ".", "Flock", "(", "int", "(", "f", ".", "Fd", "(", ")", ")", ",", "syscall", ".", "LOCK_UN", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "ConvertSystemError", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// FSUnlock unlcocks Flock-style filesystem lock
[ "FSUnlock", "unlcocks", "Flock", "-", "style", "filesystem", "lock" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fs_unix.go#L60-L65
train
gravitational/teleport
lib/limiter/ratelimiter.go
NewRateLimiter
func NewRateLimiter(config LimiterConfig) (*RateLimiter, error) { limiter := RateLimiter{ Mutex: &sync.Mutex{}, } ipExtractor, err := utils.NewExtractor("client.ip") if err != nil { return nil, trace.Wrap(err) } limiter.rates = ratelimit.NewRateSet() for _, rate := range config.Rates { err := limiter.rates.Add(rate.Period, rate.Average, rate.Burst) if err != nil { return nil, trace.Wrap(err) } } if len(config.Rates) == 0 { err := limiter.rates.Add(time.Second, DefaultRate, DefaultRate) if err != nil { return nil, trace.Wrap(err) } } if config.Clock == nil { config.Clock = &timetools.RealTime{} } limiter.clock = config.Clock limiter.TokenLimiter, err = ratelimit.New(nil, ipExtractor, limiter.rates, ratelimit.Clock(config.Clock)) if err != nil { return nil, trace.Wrap(err) } maxNumberOfUsers := config.MaxNumberOfUsers if maxNumberOfUsers <= 0 { maxNumberOfUsers = DefaultMaxNumberOfUsers } limiter.rateLimits, err = ttlmap.NewMap( maxNumberOfUsers, ttlmap.Clock(config.Clock)) if err != nil { return nil, trace.Wrap(err) } return &limiter, nil }
go
func NewRateLimiter(config LimiterConfig) (*RateLimiter, error) { limiter := RateLimiter{ Mutex: &sync.Mutex{}, } ipExtractor, err := utils.NewExtractor("client.ip") if err != nil { return nil, trace.Wrap(err) } limiter.rates = ratelimit.NewRateSet() for _, rate := range config.Rates { err := limiter.rates.Add(rate.Period, rate.Average, rate.Burst) if err != nil { return nil, trace.Wrap(err) } } if len(config.Rates) == 0 { err := limiter.rates.Add(time.Second, DefaultRate, DefaultRate) if err != nil { return nil, trace.Wrap(err) } } if config.Clock == nil { config.Clock = &timetools.RealTime{} } limiter.clock = config.Clock limiter.TokenLimiter, err = ratelimit.New(nil, ipExtractor, limiter.rates, ratelimit.Clock(config.Clock)) if err != nil { return nil, trace.Wrap(err) } maxNumberOfUsers := config.MaxNumberOfUsers if maxNumberOfUsers <= 0 { maxNumberOfUsers = DefaultMaxNumberOfUsers } limiter.rateLimits, err = ttlmap.NewMap( maxNumberOfUsers, ttlmap.Clock(config.Clock)) if err != nil { return nil, trace.Wrap(err) } return &limiter, nil }
[ "func", "NewRateLimiter", "(", "config", "LimiterConfig", ")", "(", "*", "RateLimiter", ",", "error", ")", "{", "limiter", ":=", "RateLimiter", "{", "Mutex", ":", "&", "sync", ".", "Mutex", "{", "}", ",", "}", "\n\n", "ipExtractor", ",", "err", ":=", "utils", ".", "NewExtractor", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "limiter", ".", "rates", "=", "ratelimit", ".", "NewRateSet", "(", ")", "\n", "for", "_", ",", "rate", ":=", "range", "config", ".", "Rates", "{", "err", ":=", "limiter", ".", "rates", ".", "Add", "(", "rate", ".", "Period", ",", "rate", ".", "Average", ",", "rate", ".", "Burst", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "if", "len", "(", "config", ".", "Rates", ")", "==", "0", "{", "err", ":=", "limiter", ".", "rates", ".", "Add", "(", "time", ".", "Second", ",", "DefaultRate", ",", "DefaultRate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n\n", "if", "config", ".", "Clock", "==", "nil", "{", "config", ".", "Clock", "=", "&", "timetools", ".", "RealTime", "{", "}", "\n", "}", "\n", "limiter", ".", "clock", "=", "config", ".", "Clock", "\n\n", "limiter", ".", "TokenLimiter", ",", "err", "=", "ratelimit", ".", "New", "(", "nil", ",", "ipExtractor", ",", "limiter", ".", "rates", ",", "ratelimit", ".", "Clock", "(", "config", ".", "Clock", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "maxNumberOfUsers", ":=", "config", ".", "MaxNumberOfUsers", "\n", "if", "maxNumberOfUsers", "<=", "0", "{", "maxNumberOfUsers", "=", "DefaultMaxNumberOfUsers", "\n", "}", "\n", "limiter", ".", "rateLimits", ",", "err", "=", "ttlmap", ".", "NewMap", "(", "maxNumberOfUsers", ",", "ttlmap", ".", "Clock", "(", "config", ".", "Clock", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "&", "limiter", ",", "nil", "\n", "}" ]
// NewRateLimiter returns new request rate controller
[ "NewRateLimiter", "returns", "new", "request", "rate", "controller" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/ratelimiter.go#L50-L96
train
gravitational/teleport
lib/limiter/ratelimiter.go
RegisterRequest
func (l *RateLimiter) RegisterRequest(token string) error { l.Lock() defer l.Unlock() bucketSetI, exists := l.rateLimits.Get(token) var bucketSet *ratelimit.TokenBucketSet if exists { bucketSet = bucketSetI.(*ratelimit.TokenBucketSet) bucketSet.Update(l.rates) } else { bucketSet = ratelimit.NewTokenBucketSet(l.rates, l.clock) // We set ttl as 10 times rate period. E.g. if rate is 100 requests/second per client ip // the counters for this ip will expire after 10 seconds of inactivity err := l.rateLimits.Set(token, bucketSet, int(bucketSet.GetMaxPeriod()/time.Second)*10+1) if err != nil { return trace.Wrap(err) } } delay, err := bucketSet.Consume(1) if err != nil { return err } if delay > 0 { return &ratelimit.MaxRateError{} } return nil }
go
func (l *RateLimiter) RegisterRequest(token string) error { l.Lock() defer l.Unlock() bucketSetI, exists := l.rateLimits.Get(token) var bucketSet *ratelimit.TokenBucketSet if exists { bucketSet = bucketSetI.(*ratelimit.TokenBucketSet) bucketSet.Update(l.rates) } else { bucketSet = ratelimit.NewTokenBucketSet(l.rates, l.clock) // We set ttl as 10 times rate period. E.g. if rate is 100 requests/second per client ip // the counters for this ip will expire after 10 seconds of inactivity err := l.rateLimits.Set(token, bucketSet, int(bucketSet.GetMaxPeriod()/time.Second)*10+1) if err != nil { return trace.Wrap(err) } } delay, err := bucketSet.Consume(1) if err != nil { return err } if delay > 0 { return &ratelimit.MaxRateError{} } return nil }
[ "func", "(", "l", "*", "RateLimiter", ")", "RegisterRequest", "(", "token", "string", ")", "error", "{", "l", ".", "Lock", "(", ")", "\n", "defer", "l", ".", "Unlock", "(", ")", "\n\n", "bucketSetI", ",", "exists", ":=", "l", ".", "rateLimits", ".", "Get", "(", "token", ")", "\n", "var", "bucketSet", "*", "ratelimit", ".", "TokenBucketSet", "\n\n", "if", "exists", "{", "bucketSet", "=", "bucketSetI", ".", "(", "*", "ratelimit", ".", "TokenBucketSet", ")", "\n", "bucketSet", ".", "Update", "(", "l", ".", "rates", ")", "\n", "}", "else", "{", "bucketSet", "=", "ratelimit", ".", "NewTokenBucketSet", "(", "l", ".", "rates", ",", "l", ".", "clock", ")", "\n", "// We set ttl as 10 times rate period. E.g. if rate is 100 requests/second per client ip", "// the counters for this ip will expire after 10 seconds of inactivity", "err", ":=", "l", ".", "rateLimits", ".", "Set", "(", "token", ",", "bucketSet", ",", "int", "(", "bucketSet", ".", "GetMaxPeriod", "(", ")", "/", "time", ".", "Second", ")", "*", "10", "+", "1", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "delay", ",", "err", ":=", "bucketSet", ".", "Consume", "(", "1", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "if", "delay", ">", "0", "{", "return", "&", "ratelimit", ".", "MaxRateError", "{", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// RegisterRequest increases number of requests for the provided token // Returns error if there are too many requests with the provided token
[ "RegisterRequest", "increases", "number", "of", "requests", "for", "the", "provided", "token", "Returns", "error", "if", "there", "are", "too", "many", "requests", "with", "the", "provided", "token" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/ratelimiter.go#L100-L127
train
gravitational/teleport
lib/limiter/ratelimiter.go
WrapHandle
func (l *RateLimiter) WrapHandle(h http.Handler) { l.TokenLimiter.Wrap(h) }
go
func (l *RateLimiter) WrapHandle(h http.Handler) { l.TokenLimiter.Wrap(h) }
[ "func", "(", "l", "*", "RateLimiter", ")", "WrapHandle", "(", "h", "http", ".", "Handler", ")", "{", "l", ".", "TokenLimiter", ".", "Wrap", "(", "h", ")", "\n", "}" ]
// Add rate limiter to the handle
[ "Add", "rate", "limiter", "to", "the", "handle" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/ratelimiter.go#L130-L132
train
gravitational/teleport
lib/auth/clt.go
EncodeClusterName
func EncodeClusterName(clusterName string) string { // hex is used to hide "." that will prevent wildcard *. entry to match return fmt.Sprintf("%v.%v", hex.EncodeToString([]byte(clusterName)), teleport.APIDomain) }
go
func EncodeClusterName(clusterName string) string { // hex is used to hide "." that will prevent wildcard *. entry to match return fmt.Sprintf("%v.%v", hex.EncodeToString([]byte(clusterName)), teleport.APIDomain) }
[ "func", "EncodeClusterName", "(", "clusterName", "string", ")", "string", "{", "// hex is used to hide \".\" that will prevent wildcard *. entry to match", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "hex", ".", "EncodeToString", "(", "[", "]", "byte", "(", "clusterName", ")", ")", ",", "teleport", ".", "APIDomain", ")", "\n", "}" ]
// EncodeClusterName encodes cluster name in the SNI hostname
[ "EncodeClusterName", "encodes", "cluster", "name", "in", "the", "SNI", "hostname" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L97-L100
train
gravitational/teleport
lib/auth/clt.go
NewAddrDialer
func NewAddrDialer(addrs []utils.NetAddr) DialContext { dialer := net.Dialer{ Timeout: defaults.DefaultDialTimeout, KeepAlive: defaults.ReverseTunnelAgentHeartbeatPeriod, } return func(in context.Context, network, _ string) (net.Conn, error) { var err error var conn net.Conn for _, addr := range addrs { conn, err = dialer.DialContext(in, network, addr.Addr) if err == nil { return conn, nil } log.Errorf("Failed to dial auth server %v: %v.", addr.Addr, err) } // not wrapping on purpose to preserve the original error return nil, err } }
go
func NewAddrDialer(addrs []utils.NetAddr) DialContext { dialer := net.Dialer{ Timeout: defaults.DefaultDialTimeout, KeepAlive: defaults.ReverseTunnelAgentHeartbeatPeriod, } return func(in context.Context, network, _ string) (net.Conn, error) { var err error var conn net.Conn for _, addr := range addrs { conn, err = dialer.DialContext(in, network, addr.Addr) if err == nil { return conn, nil } log.Errorf("Failed to dial auth server %v: %v.", addr.Addr, err) } // not wrapping on purpose to preserve the original error return nil, err } }
[ "func", "NewAddrDialer", "(", "addrs", "[", "]", "utils", ".", "NetAddr", ")", "DialContext", "{", "dialer", ":=", "net", ".", "Dialer", "{", "Timeout", ":", "defaults", ".", "DefaultDialTimeout", ",", "KeepAlive", ":", "defaults", ".", "ReverseTunnelAgentHeartbeatPeriod", ",", "}", "\n", "return", "func", "(", "in", "context", ".", "Context", ",", "network", ",", "_", "string", ")", "(", "net", ".", "Conn", ",", "error", ")", "{", "var", "err", "error", "\n", "var", "conn", "net", ".", "Conn", "\n", "for", "_", ",", "addr", ":=", "range", "addrs", "{", "conn", ",", "err", "=", "dialer", ".", "DialContext", "(", "in", ",", "network", ",", "addr", ".", "Addr", ")", "\n", "if", "err", "==", "nil", "{", "return", "conn", ",", "nil", "\n", "}", "\n", "log", ".", "Errorf", "(", "\"", "\"", ",", "addr", ".", "Addr", ",", "err", ")", "\n", "}", "\n", "// not wrapping on purpose to preserve the original error", "return", "nil", ",", "err", "\n", "}", "\n", "}" ]
// NewAddrDialer returns new dialer from a list of addresses
[ "NewAddrDialer", "returns", "new", "dialer", "from", "a", "list", "of", "addresses" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L124-L142
train
gravitational/teleport
lib/auth/clt.go
ClientTimeout
func ClientTimeout(timeout time.Duration) roundtrip.ClientParam { return func(c *roundtrip.Client) error { transport, ok := (c.HTTPClient().Transport).(*http.Transport) if !ok { return nil } transport.IdleConnTimeout = timeout transport.ResponseHeaderTimeout = timeout return nil } }
go
func ClientTimeout(timeout time.Duration) roundtrip.ClientParam { return func(c *roundtrip.Client) error { transport, ok := (c.HTTPClient().Transport).(*http.Transport) if !ok { return nil } transport.IdleConnTimeout = timeout transport.ResponseHeaderTimeout = timeout return nil } }
[ "func", "ClientTimeout", "(", "timeout", "time", ".", "Duration", ")", "roundtrip", ".", "ClientParam", "{", "return", "func", "(", "c", "*", "roundtrip", ".", "Client", ")", "error", "{", "transport", ",", "ok", ":=", "(", "c", ".", "HTTPClient", "(", ")", ".", "Transport", ")", ".", "(", "*", "http", ".", "Transport", ")", "\n", "if", "!", "ok", "{", "return", "nil", "\n", "}", "\n", "transport", ".", "IdleConnTimeout", "=", "timeout", "\n", "transport", ".", "ResponseHeaderTimeout", "=", "timeout", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// ClientTimeout sets idle and dial timeouts of the HTTP transport // used by the client.
[ "ClientTimeout", "sets", "idle", "and", "dial", "timeouts", "of", "the", "HTTP", "transport", "used", "by", "the", "client", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L146-L156
train
gravitational/teleport
lib/auth/clt.go
CheckAndSetDefaults
func (c *ClientConfig) CheckAndSetDefaults() error { if len(c.Addrs) == 0 && c.DialContext == nil { return trace.BadParameter("set parameter Addrs or DialContext") } if c.TLS == nil { return trace.BadParameter("missing parameter TLS") } if c.KeepAlivePeriod == 0 { c.KeepAlivePeriod = defaults.ServerKeepAliveTTL } if c.KeepAliveCount == 0 { c.KeepAliveCount = defaults.KeepAliveCountMax } if c.DialContext == nil { c.DialContext = NewAddrDialer(c.Addrs) } if c.TLS.ServerName == "" { c.TLS.ServerName = teleport.APIDomain } // this logic is necessary to force client to always send certificate // regardless of the server setting, otherwise client may pick // not to send the client certificate by looking at certificate request if len(c.TLS.Certificates) != 0 { cert := c.TLS.Certificates[0] c.TLS.Certificates = nil c.TLS.GetClientCertificate = func(_ *tls.CertificateRequestInfo) (*tls.Certificate, error) { return &cert, nil } } return nil }
go
func (c *ClientConfig) CheckAndSetDefaults() error { if len(c.Addrs) == 0 && c.DialContext == nil { return trace.BadParameter("set parameter Addrs or DialContext") } if c.TLS == nil { return trace.BadParameter("missing parameter TLS") } if c.KeepAlivePeriod == 0 { c.KeepAlivePeriod = defaults.ServerKeepAliveTTL } if c.KeepAliveCount == 0 { c.KeepAliveCount = defaults.KeepAliveCountMax } if c.DialContext == nil { c.DialContext = NewAddrDialer(c.Addrs) } if c.TLS.ServerName == "" { c.TLS.ServerName = teleport.APIDomain } // this logic is necessary to force client to always send certificate // regardless of the server setting, otherwise client may pick // not to send the client certificate by looking at certificate request if len(c.TLS.Certificates) != 0 { cert := c.TLS.Certificates[0] c.TLS.Certificates = nil c.TLS.GetClientCertificate = func(_ *tls.CertificateRequestInfo) (*tls.Certificate, error) { return &cert, nil } } return nil }
[ "func", "(", "c", "*", "ClientConfig", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "len", "(", "c", ".", "Addrs", ")", "==", "0", "&&", "c", ".", "DialContext", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "c", ".", "TLS", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "c", ".", "KeepAlivePeriod", "==", "0", "{", "c", ".", "KeepAlivePeriod", "=", "defaults", ".", "ServerKeepAliveTTL", "\n", "}", "\n", "if", "c", ".", "KeepAliveCount", "==", "0", "{", "c", ".", "KeepAliveCount", "=", "defaults", ".", "KeepAliveCountMax", "\n", "}", "\n", "if", "c", ".", "DialContext", "==", "nil", "{", "c", ".", "DialContext", "=", "NewAddrDialer", "(", "c", ".", "Addrs", ")", "\n", "}", "\n", "if", "c", ".", "TLS", ".", "ServerName", "==", "\"", "\"", "{", "c", ".", "TLS", ".", "ServerName", "=", "teleport", ".", "APIDomain", "\n", "}", "\n", "// this logic is necessary to force client to always send certificate", "// regardless of the server setting, otherwise client may pick", "// not to send the client certificate by looking at certificate request", "if", "len", "(", "c", ".", "TLS", ".", "Certificates", ")", "!=", "0", "{", "cert", ":=", "c", ".", "TLS", ".", "Certificates", "[", "0", "]", "\n", "c", ".", "TLS", ".", "Certificates", "=", "nil", "\n", "c", ".", "TLS", ".", "GetClientCertificate", "=", "func", "(", "_", "*", "tls", ".", "CertificateRequestInfo", ")", "(", "*", "tls", ".", "Certificate", ",", "error", ")", "{", "return", "&", "cert", ",", "nil", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default config values
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "config", "values" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L175-L206
train
gravitational/teleport
lib/auth/clt.go
NewTLSClient
func NewTLSClient(cfg ClientConfig, params ...roundtrip.ClientParam) (*Client, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } transport := &http.Transport{ // notice that below roundtrip.Client is passed // teleport.APIEndpoint as an address for the API server, this is // to make sure client verifies the DNS name of the API server // custom DialContext overrides this DNS name to the real address // in addition this dialer tries multiple adresses if provided DialContext: cfg.DialContext, ResponseHeaderTimeout: defaults.DefaultDialTimeout, TLSClientConfig: cfg.TLS, // Increase the size of the connection pool. This substantially improves the // performance of Teleport under load as it reduces the number of TLS // handshakes performed. MaxIdleConns: defaults.HTTPMaxIdleConns, MaxIdleConnsPerHost: defaults.HTTPMaxIdleConnsPerHost, // IdleConnTimeout defines the maximum amount of time before idle connections // are closed. Leaving this unset will lead to connections open forever and // will cause memory leaks in a long running process. IdleConnTimeout: defaults.HTTPIdleTimeout, } clientParams := append( []roundtrip.ClientParam{ roundtrip.HTTPClient(&http.Client{Transport: transport}), roundtrip.SanitizerEnabled(true), }, params..., ) roundtripClient, err := roundtrip.NewClient("https://"+teleport.APIDomain, CurrentVersion, clientParams...) if err != nil { return nil, trace.Wrap(err) } return &Client{ ClientConfig: cfg, Client: *roundtripClient, transport: transport, }, nil }
go
func NewTLSClient(cfg ClientConfig, params ...roundtrip.ClientParam) (*Client, error) { if err := cfg.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } transport := &http.Transport{ // notice that below roundtrip.Client is passed // teleport.APIEndpoint as an address for the API server, this is // to make sure client verifies the DNS name of the API server // custom DialContext overrides this DNS name to the real address // in addition this dialer tries multiple adresses if provided DialContext: cfg.DialContext, ResponseHeaderTimeout: defaults.DefaultDialTimeout, TLSClientConfig: cfg.TLS, // Increase the size of the connection pool. This substantially improves the // performance of Teleport under load as it reduces the number of TLS // handshakes performed. MaxIdleConns: defaults.HTTPMaxIdleConns, MaxIdleConnsPerHost: defaults.HTTPMaxIdleConnsPerHost, // IdleConnTimeout defines the maximum amount of time before idle connections // are closed. Leaving this unset will lead to connections open forever and // will cause memory leaks in a long running process. IdleConnTimeout: defaults.HTTPIdleTimeout, } clientParams := append( []roundtrip.ClientParam{ roundtrip.HTTPClient(&http.Client{Transport: transport}), roundtrip.SanitizerEnabled(true), }, params..., ) roundtripClient, err := roundtrip.NewClient("https://"+teleport.APIDomain, CurrentVersion, clientParams...) if err != nil { return nil, trace.Wrap(err) } return &Client{ ClientConfig: cfg, Client: *roundtripClient, transport: transport, }, nil }
[ "func", "NewTLSClient", "(", "cfg", "ClientConfig", ",", "params", "...", "roundtrip", ".", "ClientParam", ")", "(", "*", "Client", ",", "error", ")", "{", "if", "err", ":=", "cfg", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "transport", ":=", "&", "http", ".", "Transport", "{", "// notice that below roundtrip.Client is passed", "// teleport.APIEndpoint as an address for the API server, this is", "// to make sure client verifies the DNS name of the API server", "// custom DialContext overrides this DNS name to the real address", "// in addition this dialer tries multiple adresses if provided", "DialContext", ":", "cfg", ".", "DialContext", ",", "ResponseHeaderTimeout", ":", "defaults", ".", "DefaultDialTimeout", ",", "TLSClientConfig", ":", "cfg", ".", "TLS", ",", "// Increase the size of the connection pool. This substantially improves the", "// performance of Teleport under load as it reduces the number of TLS", "// handshakes performed.", "MaxIdleConns", ":", "defaults", ".", "HTTPMaxIdleConns", ",", "MaxIdleConnsPerHost", ":", "defaults", ".", "HTTPMaxIdleConnsPerHost", ",", "// IdleConnTimeout defines the maximum amount of time before idle connections", "// are closed. Leaving this unset will lead to connections open forever and", "// will cause memory leaks in a long running process.", "IdleConnTimeout", ":", "defaults", ".", "HTTPIdleTimeout", ",", "}", "\n\n", "clientParams", ":=", "append", "(", "[", "]", "roundtrip", ".", "ClientParam", "{", "roundtrip", ".", "HTTPClient", "(", "&", "http", ".", "Client", "{", "Transport", ":", "transport", "}", ")", ",", "roundtrip", ".", "SanitizerEnabled", "(", "true", ")", ",", "}", ",", "params", "...", ",", ")", "\n", "roundtripClient", ",", "err", ":=", "roundtrip", ".", "NewClient", "(", "\"", "\"", "+", "teleport", ".", "APIDomain", ",", "CurrentVersion", ",", "clientParams", "...", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "Client", "{", "ClientConfig", ":", "cfg", ",", "Client", ":", "*", "roundtripClient", ",", "transport", ":", "transport", ",", "}", ",", "nil", "\n", "}" ]
// NewTLSClient returns a new TLS client that uses mutual TLS authentication // and dials the remote server using dialer
[ "NewTLSClient", "returns", "a", "new", "TLS", "client", "that", "uses", "mutual", "TLS", "authentication", "and", "dials", "the", "remote", "server", "using", "dialer" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L210-L252
train
gravitational/teleport
lib/auth/clt.go
grpc
func (c *Client) grpc() (proto.AuthServiceClient, error) { // it's ok to lock here, because Dial below is not locking c.Lock() defer c.Unlock() if c.grpcClient != nil { return c.grpcClient, nil } dialer := grpc.WithDialer(func(addr string, timeout time.Duration) (net.Conn, error) { if c.isClosed() { return nil, trace.ConnectionProblem(nil, "client is closed") } c, err := c.DialContext(context.TODO(), "tcp", addr) if err != nil { log.Debugf("Dial to addr %v failed: %v.", addr, err) } return c, err }) tlsConfig := c.TLS.Clone() tlsConfig.NextProtos = []string{http2.NextProtoTLS} log.Debugf("GRPC(): keep alive %v count: %v.", c.KeepAlivePeriod, c.KeepAliveCount) conn, err := grpc.Dial(teleport.APIDomain, dialer, grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)), grpc.WithKeepaliveParams(keepalive.ClientParameters{ Time: c.KeepAlivePeriod, Timeout: c.KeepAlivePeriod * time.Duration(c.KeepAliveCount), }), ) if err != nil { return nil, trail.FromGRPC(err) } c.conn = conn c.grpcClient = proto.NewAuthServiceClient(c.conn) return c.grpcClient, nil }
go
func (c *Client) grpc() (proto.AuthServiceClient, error) { // it's ok to lock here, because Dial below is not locking c.Lock() defer c.Unlock() if c.grpcClient != nil { return c.grpcClient, nil } dialer := grpc.WithDialer(func(addr string, timeout time.Duration) (net.Conn, error) { if c.isClosed() { return nil, trace.ConnectionProblem(nil, "client is closed") } c, err := c.DialContext(context.TODO(), "tcp", addr) if err != nil { log.Debugf("Dial to addr %v failed: %v.", addr, err) } return c, err }) tlsConfig := c.TLS.Clone() tlsConfig.NextProtos = []string{http2.NextProtoTLS} log.Debugf("GRPC(): keep alive %v count: %v.", c.KeepAlivePeriod, c.KeepAliveCount) conn, err := grpc.Dial(teleport.APIDomain, dialer, grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)), grpc.WithKeepaliveParams(keepalive.ClientParameters{ Time: c.KeepAlivePeriod, Timeout: c.KeepAlivePeriod * time.Duration(c.KeepAliveCount), }), ) if err != nil { return nil, trail.FromGRPC(err) } c.conn = conn c.grpcClient = proto.NewAuthServiceClient(c.conn) return c.grpcClient, nil }
[ "func", "(", "c", "*", "Client", ")", "grpc", "(", ")", "(", "proto", ".", "AuthServiceClient", ",", "error", ")", "{", "// it's ok to lock here, because Dial below is not locking", "c", ".", "Lock", "(", ")", "\n", "defer", "c", ".", "Unlock", "(", ")", "\n\n", "if", "c", ".", "grpcClient", "!=", "nil", "{", "return", "c", ".", "grpcClient", ",", "nil", "\n", "}", "\n", "dialer", ":=", "grpc", ".", "WithDialer", "(", "func", "(", "addr", "string", ",", "timeout", "time", ".", "Duration", ")", "(", "net", ".", "Conn", ",", "error", ")", "{", "if", "c", ".", "isClosed", "(", ")", "{", "return", "nil", ",", "trace", ".", "ConnectionProblem", "(", "nil", ",", "\"", "\"", ")", "\n", "}", "\n", "c", ",", "err", ":=", "c", ".", "DialContext", "(", "context", ".", "TODO", "(", ")", ",", "\"", "\"", ",", "addr", ")", "\n", "if", "err", "!=", "nil", "{", "log", ".", "Debugf", "(", "\"", "\"", ",", "addr", ",", "err", ")", "\n", "}", "\n", "return", "c", ",", "err", "\n", "}", ")", "\n", "tlsConfig", ":=", "c", ".", "TLS", ".", "Clone", "(", ")", "\n", "tlsConfig", ".", "NextProtos", "=", "[", "]", "string", "{", "http2", ".", "NextProtoTLS", "}", "\n", "log", ".", "Debugf", "(", "\"", "\"", ",", "c", ".", "KeepAlivePeriod", ",", "c", ".", "KeepAliveCount", ")", "\n", "conn", ",", "err", ":=", "grpc", ".", "Dial", "(", "teleport", ".", "APIDomain", ",", "dialer", ",", "grpc", ".", "WithTransportCredentials", "(", "credentials", ".", "NewTLS", "(", "tlsConfig", ")", ")", ",", "grpc", ".", "WithKeepaliveParams", "(", "keepalive", ".", "ClientParameters", "{", "Time", ":", "c", ".", "KeepAlivePeriod", ",", "Timeout", ":", "c", ".", "KeepAlivePeriod", "*", "time", ".", "Duration", "(", "c", ".", "KeepAliveCount", ")", ",", "}", ")", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trail", ".", "FromGRPC", "(", "err", ")", "\n", "}", "\n", "c", ".", "conn", "=", "conn", "\n", "c", ".", "grpcClient", "=", "proto", ".", "NewAuthServiceClient", "(", "c", ".", "conn", ")", "\n\n", "return", "c", ".", "grpcClient", ",", "nil", "\n", "}" ]
// grpc returns grpc client
[ "grpc", "returns", "grpc", "client" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L263-L299
train
gravitational/teleport
lib/auth/clt.go
PutJSON
func (c *Client) PutJSON( endpoint string, val interface{}) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.PutJSON(context.TODO(), endpoint, val)) }
go
func (c *Client) PutJSON( endpoint string, val interface{}) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.PutJSON(context.TODO(), endpoint, val)) }
[ "func", "(", "c", "*", "Client", ")", "PutJSON", "(", "endpoint", "string", ",", "val", "interface", "{", "}", ")", "(", "*", "roundtrip", ".", "Response", ",", "error", ")", "{", "return", "httplib", ".", "ConvertResponse", "(", "c", ".", "Client", ".", "PutJSON", "(", "context", ".", "TODO", "(", ")", ",", "endpoint", ",", "val", ")", ")", "\n", "}" ]
// PutJSON is a generic method that issues http PUT request to the server
[ "PutJSON", "is", "a", "generic", "method", "that", "issues", "http", "PUT", "request", "to", "the", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L312-L315
train
gravitational/teleport
lib/auth/clt.go
PostForm
func (c *Client) PostForm( endpoint string, vals url.Values, files ...roundtrip.File) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.PostForm(context.TODO(), endpoint, vals, files...)) }
go
func (c *Client) PostForm( endpoint string, vals url.Values, files ...roundtrip.File) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.PostForm(context.TODO(), endpoint, vals, files...)) }
[ "func", "(", "c", "*", "Client", ")", "PostForm", "(", "endpoint", "string", ",", "vals", "url", ".", "Values", ",", "files", "...", "roundtrip", ".", "File", ")", "(", "*", "roundtrip", ".", "Response", ",", "error", ")", "{", "return", "httplib", ".", "ConvertResponse", "(", "c", ".", "Client", ".", "PostForm", "(", "context", ".", "TODO", "(", ")", ",", "endpoint", ",", "vals", ",", "files", "...", ")", ")", "\n", "}" ]
// PostForm is a generic method that issues http POST request to the server
[ "PostForm", "is", "a", "generic", "method", "that", "issues", "http", "POST", "request", "to", "the", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L318-L323
train
gravitational/teleport
lib/auth/clt.go
Get
func (c *Client) Get(u string, params url.Values) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.Get(context.TODO(), u, params)) }
go
func (c *Client) Get(u string, params url.Values) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.Get(context.TODO(), u, params)) }
[ "func", "(", "c", "*", "Client", ")", "Get", "(", "u", "string", ",", "params", "url", ".", "Values", ")", "(", "*", "roundtrip", ".", "Response", ",", "error", ")", "{", "return", "httplib", ".", "ConvertResponse", "(", "c", ".", "Client", ".", "Get", "(", "context", ".", "TODO", "(", ")", ",", "u", ",", "params", ")", ")", "\n", "}" ]
// Get issues http GET request to the server
[ "Get", "issues", "http", "GET", "request", "to", "the", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L326-L328
train
gravitational/teleport
lib/auth/clt.go
Delete
func (c *Client) Delete(u string) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.Delete(context.TODO(), u)) }
go
func (c *Client) Delete(u string) (*roundtrip.Response, error) { return httplib.ConvertResponse(c.Client.Delete(context.TODO(), u)) }
[ "func", "(", "c", "*", "Client", ")", "Delete", "(", "u", "string", ")", "(", "*", "roundtrip", ".", "Response", ",", "error", ")", "{", "return", "httplib", ".", "ConvertResponse", "(", "c", ".", "Client", ".", "Delete", "(", "context", ".", "TODO", "(", ")", ",", "u", ")", ")", "\n", "}" ]
// Delete issues http Delete Request to the server
[ "Delete", "issues", "http", "Delete", "Request", "to", "the", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L331-L333
train
gravitational/teleport
lib/auth/clt.go
GetSessions
func (c *Client) GetSessions(namespace string) ([]session.Session, error) { if namespace == "" { return nil, trace.BadParameter(MissingNamespaceError) } out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var sessions []session.Session if err := json.Unmarshal(out.Bytes(), &sessions); err != nil { return nil, err } return sessions, nil }
go
func (c *Client) GetSessions(namespace string) ([]session.Session, error) { if namespace == "" { return nil, trace.BadParameter(MissingNamespaceError) } out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var sessions []session.Session if err := json.Unmarshal(out.Bytes(), &sessions); err != nil { return nil, err } return sessions, nil }
[ "func", "(", "c", "*", "Client", ")", "GetSessions", "(", "namespace", "string", ")", "(", "[", "]", "session", ".", "Session", ",", "error", ")", "{", "if", "namespace", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "MissingNamespaceError", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "namespace", ",", "\"", "\"", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "sessions", "[", "]", "session", ".", "Session", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "sessions", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "sessions", ",", "nil", "\n", "}" ]
// GetSessions returns a list of active sessions in the cluster // as reported by auth server
[ "GetSessions", "returns", "a", "list", "of", "active", "sessions", "in", "the", "cluster", "as", "reported", "by", "auth", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L354-L367
train
gravitational/teleport
lib/auth/clt.go
GetSession
func (c *Client) GetSession(namespace string, id session.ID) (*session.Session, error) { if namespace == "" { return nil, trace.BadParameter(MissingNamespaceError) } // saving extra round-trip if err := id.Check(); err != nil { return nil, trace.Wrap(err) } out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions", string(id)), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var sess *session.Session if err := json.Unmarshal(out.Bytes(), &sess); err != nil { return nil, trace.Wrap(err) } return sess, nil }
go
func (c *Client) GetSession(namespace string, id session.ID) (*session.Session, error) { if namespace == "" { return nil, trace.BadParameter(MissingNamespaceError) } // saving extra round-trip if err := id.Check(); err != nil { return nil, trace.Wrap(err) } out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions", string(id)), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var sess *session.Session if err := json.Unmarshal(out.Bytes(), &sess); err != nil { return nil, trace.Wrap(err) } return sess, nil }
[ "func", "(", "c", "*", "Client", ")", "GetSession", "(", "namespace", "string", ",", "id", "session", ".", "ID", ")", "(", "*", "session", ".", "Session", ",", "error", ")", "{", "if", "namespace", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "MissingNamespaceError", ")", "\n", "}", "\n", "// saving extra round-trip", "if", "err", ":=", "id", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "namespace", ",", "\"", "\"", ",", "string", "(", "id", ")", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "sess", "*", "session", ".", "Session", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "sess", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "sess", ",", "nil", "\n", "}" ]
// GetSession returns a session by ID
[ "GetSession", "returns", "a", "session", "by", "ID" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L370-L387
train
gravitational/teleport
lib/auth/clt.go
DeleteSession
func (c *Client) DeleteSession(namespace, id string) error { if namespace == "" { return trace.BadParameter(MissingNamespaceError) } _, err := c.Delete(c.Endpoint("namespaces", namespace, "sessions", id)) return trace.Wrap(err) }
go
func (c *Client) DeleteSession(namespace, id string) error { if namespace == "" { return trace.BadParameter(MissingNamespaceError) } _, err := c.Delete(c.Endpoint("namespaces", namespace, "sessions", id)) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "DeleteSession", "(", "namespace", ",", "id", "string", ")", "error", "{", "if", "namespace", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "MissingNamespaceError", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "namespace", ",", "\"", "\"", ",", "id", ")", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteSession deletes a session by ID
[ "DeleteSession", "deletes", "a", "session", "by", "ID" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L390-L396
train
gravitational/teleport
lib/auth/clt.go
CreateSession
func (c *Client) CreateSession(sess session.Session) error { if sess.Namespace == "" { return trace.BadParameter(MissingNamespaceError) } _, err := c.PostJSON(c.Endpoint("namespaces", sess.Namespace, "sessions"), createSessionReq{Session: sess}) return trace.Wrap(err) }
go
func (c *Client) CreateSession(sess session.Session) error { if sess.Namespace == "" { return trace.BadParameter(MissingNamespaceError) } _, err := c.PostJSON(c.Endpoint("namespaces", sess.Namespace, "sessions"), createSessionReq{Session: sess}) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "CreateSession", "(", "sess", "session", ".", "Session", ")", "error", "{", "if", "sess", ".", "Namespace", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "MissingNamespaceError", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "sess", ".", "Namespace", ",", "\"", "\"", ")", ",", "createSessionReq", "{", "Session", ":", "sess", "}", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// CreateSession creates new session
[ "CreateSession", "creates", "new", "session" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L399-L405
train
gravitational/teleport
lib/auth/clt.go
UpdateSession
func (c *Client) UpdateSession(req session.UpdateRequest) error { if err := req.Check(); err != nil { return trace.Wrap(err) } _, err := c.PutJSON(c.Endpoint("namespaces", req.Namespace, "sessions", string(req.ID)), updateSessionReq{Update: req}) return trace.Wrap(err) }
go
func (c *Client) UpdateSession(req session.UpdateRequest) error { if err := req.Check(); err != nil { return trace.Wrap(err) } _, err := c.PutJSON(c.Endpoint("namespaces", req.Namespace, "sessions", string(req.ID)), updateSessionReq{Update: req}) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "UpdateSession", "(", "req", "session", ".", "UpdateRequest", ")", "error", "{", "if", "err", ":=", "req", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "PutJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "req", ".", "Namespace", ",", "\"", "\"", ",", "string", "(", "req", ".", "ID", ")", ")", ",", "updateSessionReq", "{", "Update", ":", "req", "}", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// UpdateSession updates existing session
[ "UpdateSession", "updates", "existing", "session" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L408-L414
train
gravitational/teleport
lib/auth/clt.go
GetDomainName
func (c *Client) GetDomainName() (string, error) { out, err := c.Get(c.Endpoint("domain"), url.Values{}) if err != nil { return "", trace.Wrap(err) } var domain string if err := json.Unmarshal(out.Bytes(), &domain); err != nil { return "", trace.Wrap(err) } return domain, nil }
go
func (c *Client) GetDomainName() (string, error) { out, err := c.Get(c.Endpoint("domain"), url.Values{}) if err != nil { return "", trace.Wrap(err) } var domain string if err := json.Unmarshal(out.Bytes(), &domain); err != nil { return "", trace.Wrap(err) } return domain, nil }
[ "func", "(", "c", "*", "Client", ")", "GetDomainName", "(", ")", "(", "string", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "domain", "string", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "domain", ")", ";", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "domain", ",", "nil", "\n", "}" ]
// GetDomainName returns local auth domain of the current auth server
[ "GetDomainName", "returns", "local", "auth", "domain", "of", "the", "current", "auth", "server" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L417-L427
train
gravitational/teleport
lib/auth/clt.go
RotateExternalCertAuthority
func (c *Client) RotateExternalCertAuthority(ca services.CertAuthority) error { if err := ca.Check(); err != nil { return trace.Wrap(err) } data, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("authorities", string(ca.GetType()), "rotate", "external"), &rotateExternalCertAuthorityRawReq{CA: data}) return trace.Wrap(err) }
go
func (c *Client) RotateExternalCertAuthority(ca services.CertAuthority) error { if err := ca.Check(); err != nil { return trace.Wrap(err) } data, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("authorities", string(ca.GetType()), "rotate", "external"), &rotateExternalCertAuthorityRawReq{CA: data}) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "RotateExternalCertAuthority", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "if", "err", ":=", "ca", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "data", ",", "err", ":=", "services", ".", "GetCertAuthorityMarshaler", "(", ")", ".", "MarshalCertAuthority", "(", "ca", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "string", "(", "ca", ".", "GetType", "(", ")", ")", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "&", "rotateExternalCertAuthorityRawReq", "{", "CA", ":", "data", "}", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// RotateExternalCertAuthority rotates external certificate authority, // this method is used to update only public keys and certificates of the // the certificate authorities of trusted clusters.
[ "RotateExternalCertAuthority", "rotates", "external", "certificate", "authority", "this", "method", "is", "used", "to", "update", "only", "public", "keys", "and", "certificates", "of", "the", "the", "certificate", "authorities", "of", "trusted", "clusters", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L479-L490
train
gravitational/teleport
lib/auth/clt.go
GetCertAuthorities
func (c *Client) GetCertAuthorities(caType services.CertAuthType, loadKeys bool, opts ...services.MarshalOption) ([]services.CertAuthority, error) { if err := caType.Check(); err != nil { return nil, trace.Wrap(err) } out, err := c.Get(c.Endpoint("authorities", string(caType)), url.Values{ "load_keys": []string{fmt.Sprintf("%t", loadKeys)}, }) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, err } re := make([]services.CertAuthority, len(items)) for i, raw := range items { ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } re[i] = ca } return re, nil }
go
func (c *Client) GetCertAuthorities(caType services.CertAuthType, loadKeys bool, opts ...services.MarshalOption) ([]services.CertAuthority, error) { if err := caType.Check(); err != nil { return nil, trace.Wrap(err) } out, err := c.Get(c.Endpoint("authorities", string(caType)), url.Values{ "load_keys": []string{fmt.Sprintf("%t", loadKeys)}, }) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, err } re := make([]services.CertAuthority, len(items)) for i, raw := range items { ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } re[i] = ca } return re, nil }
[ "func", "(", "c", "*", "Client", ")", "GetCertAuthorities", "(", "caType", "services", ".", "CertAuthType", ",", "loadKeys", "bool", ",", "opts", "...", "services", ".", "MarshalOption", ")", "(", "[", "]", "services", ".", "CertAuthority", ",", "error", ")", "{", "if", "err", ":=", "caType", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "string", "(", "caType", ")", ")", ",", "url", ".", "Values", "{", "\"", "\"", ":", "[", "]", "string", "{", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "loadKeys", ")", "}", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "re", ":=", "make", "(", "[", "]", "services", ".", "CertAuthority", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "items", "{", "ca", ",", "err", ":=", "services", ".", "GetCertAuthorityMarshaler", "(", ")", ".", "UnmarshalCertAuthority", "(", "raw", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "re", "[", "i", "]", "=", "ca", "\n", "}", "\n", "return", "re", ",", "nil", "\n", "}" ]
// GetCertAuthorities returns a list of certificate authorities
[ "GetCertAuthorities", "returns", "a", "list", "of", "certificate", "authorities" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L513-L536
train
gravitational/teleport
lib/auth/clt.go
DeleteCertAuthority
func (c *Client) DeleteCertAuthority(id services.CertAuthID) error { if err := id.Check(); err != nil { return trace.Wrap(err) } _, err := c.Delete(c.Endpoint("authorities", string(id.Type), id.DomainName)) return trace.Wrap(err) }
go
func (c *Client) DeleteCertAuthority(id services.CertAuthID) error { if err := id.Check(); err != nil { return trace.Wrap(err) } _, err := c.Delete(c.Endpoint("authorities", string(id.Type), id.DomainName)) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "DeleteCertAuthority", "(", "id", "services", ".", "CertAuthID", ")", "error", "{", "if", "err", ":=", "id", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "string", "(", "id", ".", "Type", ")", ",", "id", ".", "DomainName", ")", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteCertAuthority deletes cert authority by ID
[ "DeleteCertAuthority", "deletes", "cert", "authority", "by", "ID" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L555-L561
train
gravitational/teleport
lib/auth/clt.go
GenerateToken
func (c *Client) GenerateToken(req GenerateTokenRequest) (string, error) { out, err := c.PostJSON(c.Endpoint("tokens"), req) if err != nil { return "", trace.Wrap(err) } var token string if err := json.Unmarshal(out.Bytes(), &token); err != nil { return "", trace.Wrap(err) } return token, nil }
go
func (c *Client) GenerateToken(req GenerateTokenRequest) (string, error) { out, err := c.PostJSON(c.Endpoint("tokens"), req) if err != nil { return "", trace.Wrap(err) } var token string if err := json.Unmarshal(out.Bytes(), &token); err != nil { return "", trace.Wrap(err) } return token, nil }
[ "func", "(", "c", "*", "Client", ")", "GenerateToken", "(", "req", "GenerateTokenRequest", ")", "(", "string", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "token", "string", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "token", ")", ";", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "token", ",", "nil", "\n", "}" ]
// GenerateToken creates a special provisioning token for a new SSH server // that is valid for ttl period seconds. // // This token is used by SSH server to authenticate with Auth server // and get signed certificate and private key from the auth server. // // If token is not supplied, it will be auto generated and returned. // If TTL is not supplied, token will be valid until removed.
[ "GenerateToken", "creates", "a", "special", "provisioning", "token", "for", "a", "new", "SSH", "server", "that", "is", "valid", "for", "ttl", "period", "seconds", ".", "This", "token", "is", "used", "by", "SSH", "server", "to", "authenticate", "with", "Auth", "server", "and", "get", "signed", "certificate", "and", "private", "key", "from", "the", "auth", "server", ".", "If", "token", "is", "not", "supplied", "it", "will", "be", "auto", "generated", "and", "returned", ".", "If", "TTL", "is", "not", "supplied", "token", "will", "be", "valid", "until", "removed", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L583-L593
train
gravitational/teleport
lib/auth/clt.go
RegisterUsingToken
func (c *Client) RegisterUsingToken(req RegisterUsingTokenRequest) (*PackedKeys, error) { if err := req.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } out, err := c.PostJSON(c.Endpoint("tokens", "register"), req) if err != nil { return nil, trace.Wrap(err) } var keys PackedKeys if err := json.Unmarshal(out.Bytes(), &keys); err != nil { return nil, trace.Wrap(err) } return &keys, nil }
go
func (c *Client) RegisterUsingToken(req RegisterUsingTokenRequest) (*PackedKeys, error) { if err := req.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } out, err := c.PostJSON(c.Endpoint("tokens", "register"), req) if err != nil { return nil, trace.Wrap(err) } var keys PackedKeys if err := json.Unmarshal(out.Bytes(), &keys); err != nil { return nil, trace.Wrap(err) } return &keys, nil }
[ "func", "(", "c", "*", "Client", ")", "RegisterUsingToken", "(", "req", "RegisterUsingTokenRequest", ")", "(", "*", "PackedKeys", ",", "error", ")", "{", "if", "err", ":=", "req", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "req", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "keys", "PackedKeys", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "keys", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "keys", ",", "nil", "\n", "}" ]
// RegisterUsingToken calls the auth service API to register a new node using a registration token // which was previously issued via GenerateToken.
[ "RegisterUsingToken", "calls", "the", "auth", "service", "API", "to", "register", "a", "new", "node", "using", "a", "registration", "token", "which", "was", "previously", "issued", "via", "GenerateToken", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L597-L610
train
gravitational/teleport
lib/auth/clt.go
GetTokens
func (c *Client) GetTokens(opts ...services.MarshalOption) ([]services.ProvisionToken, error) { out, err := c.Get(c.Endpoint("tokens"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var tokens []services.ProvisionTokenV1 if err := json.Unmarshal(out.Bytes(), &tokens); err != nil { return nil, trace.Wrap(err) } return services.ProvisionTokensFromV1(tokens), nil }
go
func (c *Client) GetTokens(opts ...services.MarshalOption) ([]services.ProvisionToken, error) { out, err := c.Get(c.Endpoint("tokens"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var tokens []services.ProvisionTokenV1 if err := json.Unmarshal(out.Bytes(), &tokens); err != nil { return nil, trace.Wrap(err) } return services.ProvisionTokensFromV1(tokens), nil }
[ "func", "(", "c", "*", "Client", ")", "GetTokens", "(", "opts", "...", "services", ".", "MarshalOption", ")", "(", "[", "]", "services", ".", "ProvisionToken", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "tokens", "[", "]", "services", ".", "ProvisionTokenV1", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "tokens", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "ProvisionTokensFromV1", "(", "tokens", ")", ",", "nil", "\n", "}" ]
// GetTokens returns a list of active invitation tokens for nodes and users
[ "GetTokens", "returns", "a", "list", "of", "active", "invitation", "tokens", "for", "nodes", "and", "users" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L644-L654
train
gravitational/teleport
lib/auth/clt.go
GetToken
func (c *Client) GetToken(token string) (services.ProvisionToken, error) { out, err := c.Get(c.Endpoint("tokens", token), url.Values{}) if err != nil { return nil, trace.Wrap(err) } return services.UnmarshalProvisionToken(out.Bytes(), services.SkipValidation()) }
go
func (c *Client) GetToken(token string) (services.ProvisionToken, error) { out, err := c.Get(c.Endpoint("tokens", token), url.Values{}) if err != nil { return nil, trace.Wrap(err) } return services.UnmarshalProvisionToken(out.Bytes(), services.SkipValidation()) }
[ "func", "(", "c", "*", "Client", ")", "GetToken", "(", "token", "string", ")", "(", "services", ".", "ProvisionToken", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "token", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "UnmarshalProvisionToken", "(", "out", ".", "Bytes", "(", ")", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "}" ]
// GetToken returns provisioning token
[ "GetToken", "returns", "provisioning", "token" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L657-L663
train
gravitational/teleport
lib/auth/clt.go
RegisterNewAuthServer
func (c *Client) RegisterNewAuthServer(token string) error { _, err := c.PostJSON(c.Endpoint("tokens", "register", "auth"), registerNewAuthServerReq{ Token: token, }) return trace.Wrap(err) }
go
func (c *Client) RegisterNewAuthServer(token string) error { _, err := c.PostJSON(c.Endpoint("tokens", "register", "auth"), registerNewAuthServerReq{ Token: token, }) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "RegisterNewAuthServer", "(", "token", "string", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "registerNewAuthServerReq", "{", "Token", ":", "token", ",", "}", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// RegisterNewAuthServer is used to register new auth server with token
[ "RegisterNewAuthServer", "is", "used", "to", "register", "new", "auth", "server", "with", "token" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L673-L678
train
gravitational/teleport
lib/auth/clt.go
UpsertNode
func (c *Client) UpsertNode(s services.Server) (*services.KeepAlive, error) { if s.GetNamespace() == "" { return nil, trace.BadParameter("missing node namespace") } protoServer, ok := s.(*services.ServerV2) if !ok { return nil, trace.BadParameter("unsupported client") } clt, err := c.grpc() if err != nil { return nil, trace.Wrap(err) } keepAlive, err := clt.UpsertNode(context.TODO(), protoServer) if err != nil { return nil, trail.FromGRPC(err) } return keepAlive, nil }
go
func (c *Client) UpsertNode(s services.Server) (*services.KeepAlive, error) { if s.GetNamespace() == "" { return nil, trace.BadParameter("missing node namespace") } protoServer, ok := s.(*services.ServerV2) if !ok { return nil, trace.BadParameter("unsupported client") } clt, err := c.grpc() if err != nil { return nil, trace.Wrap(err) } keepAlive, err := clt.UpsertNode(context.TODO(), protoServer) if err != nil { return nil, trail.FromGRPC(err) } return keepAlive, nil }
[ "func", "(", "c", "*", "Client", ")", "UpsertNode", "(", "s", "services", ".", "Server", ")", "(", "*", "services", ".", "KeepAlive", ",", "error", ")", "{", "if", "s", ".", "GetNamespace", "(", ")", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "protoServer", ",", "ok", ":=", "s", ".", "(", "*", "services", ".", "ServerV2", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "clt", ",", "err", ":=", "c", ".", "grpc", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "keepAlive", ",", "err", ":=", "clt", ".", "UpsertNode", "(", "context", ".", "TODO", "(", ")", ",", "protoServer", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trail", ".", "FromGRPC", "(", "err", ")", "\n", "}", "\n", "return", "keepAlive", ",", "nil", "\n", "}" ]
// UpsertNode is used by SSH servers to reprt their presence // to the auth servers in form of hearbeat expiring after ttl period.
[ "UpsertNode", "is", "used", "by", "SSH", "servers", "to", "reprt", "their", "presence", "to", "the", "auth", "servers", "in", "form", "of", "hearbeat", "expiring", "after", "ttl", "period", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L682-L699
train
gravitational/teleport
lib/auth/clt.go
KeepAliveNode
func (c *Client) KeepAliveNode(ctx context.Context, keepAlive services.KeepAlive) error { return trace.BadParameter("not implemented, use StreamKeepAlives instead") }
go
func (c *Client) KeepAliveNode(ctx context.Context, keepAlive services.KeepAlive) error { return trace.BadParameter("not implemented, use StreamKeepAlives instead") }
[ "func", "(", "c", "*", "Client", ")", "KeepAliveNode", "(", "ctx", "context", ".", "Context", ",", "keepAlive", "services", ".", "KeepAlive", ")", "error", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}" ]
// KeepAliveNode updates node keep alive information
[ "KeepAliveNode", "updates", "node", "keep", "alive", "information" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L702-L704
train
gravitational/teleport
lib/auth/clt.go
recv
func (k *streamKeepAliver) recv() { err := k.stream.RecvMsg(&empty.Empty{}) k.closeWithError(trail.FromGRPC(err)) }
go
func (k *streamKeepAliver) recv() { err := k.stream.RecvMsg(&empty.Empty{}) k.closeWithError(trail.FromGRPC(err)) }
[ "func", "(", "k", "*", "streamKeepAliver", ")", "recv", "(", ")", "{", "err", ":=", "k", ".", "stream", ".", "RecvMsg", "(", "&", "empty", ".", "Empty", "{", "}", ")", "\n", "k", ".", "closeWithError", "(", "trail", ".", "FromGRPC", "(", "err", ")", ")", "\n", "}" ]
// recv is necessary to receive errors from the // server, otherwise no errors will be propagated
[ "recv", "is", "necessary", "to", "receive", "errors", "from", "the", "server", "otherwise", "no", "errors", "will", "be", "propagated" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L769-L772
train
gravitational/teleport
lib/auth/clt.go
UpsertNodes
func (c *Client) UpsertNodes(namespace string, servers []services.Server) error { if namespace == "" { return trace.BadParameter("missing node namespace") } bytes, err := services.GetServerMarshaler().MarshalServers(servers) if err != nil { return trace.Wrap(err) } args := &upsertNodesReq{ Namespace: namespace, Nodes: bytes, } _, err = c.PutJSON(c.Endpoint("namespaces", namespace, "nodes"), args) return trace.Wrap(err) }
go
func (c *Client) UpsertNodes(namespace string, servers []services.Server) error { if namespace == "" { return trace.BadParameter("missing node namespace") } bytes, err := services.GetServerMarshaler().MarshalServers(servers) if err != nil { return trace.Wrap(err) } args := &upsertNodesReq{ Namespace: namespace, Nodes: bytes, } _, err = c.PutJSON(c.Endpoint("namespaces", namespace, "nodes"), args) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "UpsertNodes", "(", "namespace", "string", ",", "servers", "[", "]", "services", ".", "Server", ")", "error", "{", "if", "namespace", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "bytes", ",", "err", ":=", "services", ".", "GetServerMarshaler", "(", ")", ".", "MarshalServers", "(", "servers", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "args", ":=", "&", "upsertNodesReq", "{", "Namespace", ":", "namespace", ",", "Nodes", ":", "bytes", ",", "}", "\n", "_", ",", "err", "=", "c", ".", "PutJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "namespace", ",", "\"", "\"", ")", ",", "args", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// UpsertNodes bulk inserts nodes.
[ "UpsertNodes", "bulk", "inserts", "nodes", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L873-L888
train
gravitational/teleport
lib/auth/clt.go
DeleteNode
func (c *Client) DeleteNode(namespace string, name string) error { if namespace == "" { return trace.BadParameter("missing parameter namespace") } if name == "" { return trace.BadParameter("missing parameter name") } _, err := c.Delete(c.Endpoint("namespaces", namespace, "nodes", name)) if err != nil { return trace.Wrap(err) } return nil }
go
func (c *Client) DeleteNode(namespace string, name string) error { if namespace == "" { return trace.BadParameter("missing parameter namespace") } if name == "" { return trace.BadParameter("missing parameter name") } _, err := c.Delete(c.Endpoint("namespaces", namespace, "nodes", name)) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "Client", ")", "DeleteNode", "(", "namespace", "string", ",", "name", "string", ")", "error", "{", "if", "namespace", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "name", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "namespace", ",", "\"", "\"", ",", "name", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// DeleteNode deletes node in the namespace by name
[ "DeleteNode", "deletes", "node", "in", "the", "namespace", "by", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L900-L912
train
gravitational/teleport
lib/auth/clt.go
GetNodes
func (c *Client) GetNodes(namespace string, opts ...services.MarshalOption) ([]services.Server, error) { if namespace == "" { return nil, trace.BadParameter(MissingNamespaceError) } cfg, err := services.CollectOptions(opts) if err != nil { return nil, trace.Wrap(err) } out, err := c.Get(c.Endpoint("namespaces", namespace, "nodes"), url.Values{ "skip_validation": []string{fmt.Sprintf("%t", cfg.SkipValidation)}, }) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } re := make([]services.Server, len(items)) for i, raw := range items { s, err := services.GetServerMarshaler().UnmarshalServer( raw, services.KindNode, services.AddOptions(opts, services.SkipValidation())...) if err != nil { return nil, trace.Wrap(err) } re[i] = s } return re, nil }
go
func (c *Client) GetNodes(namespace string, opts ...services.MarshalOption) ([]services.Server, error) { if namespace == "" { return nil, trace.BadParameter(MissingNamespaceError) } cfg, err := services.CollectOptions(opts) if err != nil { return nil, trace.Wrap(err) } out, err := c.Get(c.Endpoint("namespaces", namespace, "nodes"), url.Values{ "skip_validation": []string{fmt.Sprintf("%t", cfg.SkipValidation)}, }) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } re := make([]services.Server, len(items)) for i, raw := range items { s, err := services.GetServerMarshaler().UnmarshalServer( raw, services.KindNode, services.AddOptions(opts, services.SkipValidation())...) if err != nil { return nil, trace.Wrap(err) } re[i] = s } return re, nil }
[ "func", "(", "c", "*", "Client", ")", "GetNodes", "(", "namespace", "string", ",", "opts", "...", "services", ".", "MarshalOption", ")", "(", "[", "]", "services", ".", "Server", ",", "error", ")", "{", "if", "namespace", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "MissingNamespaceError", ")", "\n", "}", "\n", "cfg", ",", "err", ":=", "services", ".", "CollectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "namespace", ",", "\"", "\"", ")", ",", "url", ".", "Values", "{", "\"", "\"", ":", "[", "]", "string", "{", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "cfg", ".", "SkipValidation", ")", "}", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "re", ":=", "make", "(", "[", "]", "services", ".", "Server", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "items", "{", "s", ",", "err", ":=", "services", ".", "GetServerMarshaler", "(", ")", ".", "UnmarshalServer", "(", "raw", ",", "services", ".", "KindNode", ",", "services", ".", "AddOptions", "(", "opts", ",", "services", ".", "SkipValidation", "(", ")", ")", "...", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "re", "[", "i", "]", "=", "s", "\n", "}", "\n\n", "return", "re", ",", "nil", "\n", "}" ]
// GetNodes returns the list of servers registered in the cluster.
[ "GetNodes", "returns", "the", "list", "of", "servers", "registered", "in", "the", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L915-L948
train
gravitational/teleport
lib/auth/clt.go
UpsertReverseTunnel
func (c *Client) UpsertReverseTunnel(tunnel services.ReverseTunnel) error { data, err := services.GetReverseTunnelMarshaler().MarshalReverseTunnel(tunnel) if err != nil { return trace.Wrap(err) } args := &upsertReverseTunnelRawReq{ ReverseTunnel: data, } _, err = c.PostJSON(c.Endpoint("reversetunnels"), args) return trace.Wrap(err) }
go
func (c *Client) UpsertReverseTunnel(tunnel services.ReverseTunnel) error { data, err := services.GetReverseTunnelMarshaler().MarshalReverseTunnel(tunnel) if err != nil { return trace.Wrap(err) } args := &upsertReverseTunnelRawReq{ ReverseTunnel: data, } _, err = c.PostJSON(c.Endpoint("reversetunnels"), args) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "UpsertReverseTunnel", "(", "tunnel", "services", ".", "ReverseTunnel", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "GetReverseTunnelMarshaler", "(", ")", ".", "MarshalReverseTunnel", "(", "tunnel", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "args", ":=", "&", "upsertReverseTunnelRawReq", "{", "ReverseTunnel", ":", "data", ",", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "args", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// UpsertReverseTunnel is used by admins to create a new reverse tunnel // to the remote proxy to bypass firewall restrictions
[ "UpsertReverseTunnel", "is", "used", "by", "admins", "to", "create", "a", "new", "reverse", "tunnel", "to", "the", "remote", "proxy", "to", "bypass", "firewall", "restrictions" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L952-L962
train
gravitational/teleport
lib/auth/clt.go
GetReverseTunnels
func (c *Client) GetReverseTunnels(opts ...services.MarshalOption) ([]services.ReverseTunnel, error) { out, err := c.Get(c.Endpoint("reversetunnels"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } tunnels := make([]services.ReverseTunnel, len(items)) for i, raw := range items { tunnel, err := services.GetReverseTunnelMarshaler().UnmarshalReverseTunnel(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } tunnels[i] = tunnel } return tunnels, nil }
go
func (c *Client) GetReverseTunnels(opts ...services.MarshalOption) ([]services.ReverseTunnel, error) { out, err := c.Get(c.Endpoint("reversetunnels"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } tunnels := make([]services.ReverseTunnel, len(items)) for i, raw := range items { tunnel, err := services.GetReverseTunnelMarshaler().UnmarshalReverseTunnel(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } tunnels[i] = tunnel } return tunnels, nil }
[ "func", "(", "c", "*", "Client", ")", "GetReverseTunnels", "(", "opts", "...", "services", ".", "MarshalOption", ")", "(", "[", "]", "services", ".", "ReverseTunnel", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tunnels", ":=", "make", "(", "[", "]", "services", ".", "ReverseTunnel", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "items", "{", "tunnel", ",", "err", ":=", "services", ".", "GetReverseTunnelMarshaler", "(", ")", ".", "UnmarshalReverseTunnel", "(", "raw", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "tunnels", "[", "i", "]", "=", "tunnel", "\n", "}", "\n", "return", "tunnels", ",", "nil", "\n", "}" ]
// GetReverseTunnels returns the list of created reverse tunnels
[ "GetReverseTunnels", "returns", "the", "list", "of", "created", "reverse", "tunnels" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L970-L988
train
gravitational/teleport
lib/auth/clt.go
DeleteReverseTunnel
func (c *Client) DeleteReverseTunnel(domainName string) error { // this is to avoid confusing error in case if domain empty for example // HTTP route will fail producing generic not found error // instead we catch the error here if strings.TrimSpace(domainName) == "" { return trace.BadParameter("empty domain name") } _, err := c.Delete(c.Endpoint("reversetunnels", domainName)) return trace.Wrap(err) }
go
func (c *Client) DeleteReverseTunnel(domainName string) error { // this is to avoid confusing error in case if domain empty for example // HTTP route will fail producing generic not found error // instead we catch the error here if strings.TrimSpace(domainName) == "" { return trace.BadParameter("empty domain name") } _, err := c.Delete(c.Endpoint("reversetunnels", domainName)) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "DeleteReverseTunnel", "(", "domainName", "string", ")", "error", "{", "// this is to avoid confusing error in case if domain empty for example", "// HTTP route will fail producing generic not found error", "// instead we catch the error here", "if", "strings", ".", "TrimSpace", "(", "domainName", ")", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "domainName", ")", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteReverseTunnel deletes reverse tunnel by domain name
[ "DeleteReverseTunnel", "deletes", "reverse", "tunnel", "by", "domain", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L991-L1000
train
gravitational/teleport
lib/auth/clt.go
UpsertTunnelConnection
func (c *Client) UpsertTunnelConnection(conn services.TunnelConnection) error { data, err := services.MarshalTunnelConnection(conn) if err != nil { return trace.Wrap(err) } args := &upsertTunnelConnectionRawReq{ TunnelConnection: data, } _, err = c.PostJSON(c.Endpoint("tunnelconnections"), args) return trace.Wrap(err) }
go
func (c *Client) UpsertTunnelConnection(conn services.TunnelConnection) error { data, err := services.MarshalTunnelConnection(conn) if err != nil { return trace.Wrap(err) } args := &upsertTunnelConnectionRawReq{ TunnelConnection: data, } _, err = c.PostJSON(c.Endpoint("tunnelconnections"), args) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "UpsertTunnelConnection", "(", "conn", "services", ".", "TunnelConnection", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "MarshalTunnelConnection", "(", "conn", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "args", ":=", "&", "upsertTunnelConnectionRawReq", "{", "TunnelConnection", ":", "data", ",", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "args", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// UpsertTunnelConnection upserts tunnel connection
[ "UpsertTunnelConnection", "upserts", "tunnel", "connection" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1003-L1013
train
gravitational/teleport
lib/auth/clt.go
CreateRemoteCluster
func (c *Client) CreateRemoteCluster(rc services.RemoteCluster) error { data, err := services.MarshalRemoteCluster(rc) if err != nil { return trace.Wrap(err) } args := &createRemoteClusterRawReq{ RemoteCluster: data, } _, err = c.PostJSON(c.Endpoint("remoteclusters"), args) return trace.Wrap(err) }
go
func (c *Client) CreateRemoteCluster(rc services.RemoteCluster) error { data, err := services.MarshalRemoteCluster(rc) if err != nil { return trace.Wrap(err) } args := &createRemoteClusterRawReq{ RemoteCluster: data, } _, err = c.PostJSON(c.Endpoint("remoteclusters"), args) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "CreateRemoteCluster", "(", "rc", "services", ".", "RemoteCluster", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "MarshalRemoteCluster", "(", "rc", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "args", ":=", "&", "createRemoteClusterRawReq", "{", "RemoteCluster", ":", "data", ",", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "args", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// CreateRemoteCluster creates remote cluster resource
[ "CreateRemoteCluster", "creates", "remote", "cluster", "resource" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1151-L1161
train
gravitational/teleport
lib/auth/clt.go
GetAuthServers
func (c *Client) GetAuthServers() ([]services.Server, error) { out, err := c.Get(c.Endpoint("authservers"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } re := make([]services.Server, len(items)) for i, raw := range items { server, err := services.GetServerMarshaler().UnmarshalServer(raw, services.KindAuthServer, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } re[i] = server } return re, nil }
go
func (c *Client) GetAuthServers() ([]services.Server, error) { out, err := c.Get(c.Endpoint("authservers"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } re := make([]services.Server, len(items)) for i, raw := range items { server, err := services.GetServerMarshaler().UnmarshalServer(raw, services.KindAuthServer, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } re[i] = server } return re, nil }
[ "func", "(", "c", "*", "Client", ")", "GetAuthServers", "(", ")", "(", "[", "]", "services", ".", "Server", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "re", ":=", "make", "(", "[", "]", "services", ".", "Server", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "items", "{", "server", ",", "err", ":=", "services", ".", "GetServerMarshaler", "(", ")", ".", "UnmarshalServer", "(", "raw", ",", "services", ".", "KindAuthServer", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "re", "[", "i", "]", "=", "server", "\n", "}", "\n", "return", "re", ",", "nil", "\n", "}" ]
// GetAuthServers returns the list of auth servers registered in the cluster.
[ "GetAuthServers", "returns", "the", "list", "of", "auth", "servers", "registered", "in", "the", "cluster", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1178-L1196
train
gravitational/teleport
lib/auth/clt.go
UpsertProxy
func (c *Client) UpsertProxy(s services.Server) error { data, err := services.GetServerMarshaler().MarshalServer(s) if err != nil { return trace.Wrap(err) } args := &upsertServerRawReq{ Server: data, } _, err = c.PostJSON(c.Endpoint("proxies"), args) return trace.Wrap(err) }
go
func (c *Client) UpsertProxy(s services.Server) error { data, err := services.GetServerMarshaler().MarshalServer(s) if err != nil { return trace.Wrap(err) } args := &upsertServerRawReq{ Server: data, } _, err = c.PostJSON(c.Endpoint("proxies"), args) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "UpsertProxy", "(", "s", "services", ".", "Server", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "GetServerMarshaler", "(", ")", ".", "MarshalServer", "(", "s", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "args", ":=", "&", "upsertServerRawReq", "{", "Server", ":", "data", ",", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "args", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// UpsertProxy is used by proxies to report their presence // to other auth servers in form of hearbeat expiring after ttl period.
[ "UpsertProxy", "is", "used", "by", "proxies", "to", "report", "their", "presence", "to", "other", "auth", "servers", "in", "form", "of", "hearbeat", "expiring", "after", "ttl", "period", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1210-L1220
train
gravitational/teleport
lib/auth/clt.go
UpsertPassword
func (c *Client) UpsertPassword(user string, password []byte) error { _, err := c.PostJSON( c.Endpoint("users", user, "web", "password"), upsertPasswordReq{ Password: string(password), }) if err != nil { return trace.Wrap(err) } return nil }
go
func (c *Client) UpsertPassword(user string, password []byte) error { _, err := c.PostJSON( c.Endpoint("users", user, "web", "password"), upsertPasswordReq{ Password: string(password), }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "Client", ")", "UpsertPassword", "(", "user", "string", ",", "password", "[", "]", "byte", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "user", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "upsertPasswordReq", "{", "Password", ":", "string", "(", "password", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// UpsertPassword updates web access password for the user
[ "UpsertPassword", "updates", "web", "access", "password", "for", "the", "user" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1278-L1289
train
gravitational/teleport
lib/auth/clt.go
UpsertUser
func (c *Client) UpsertUser(user services.User) error { data, err := services.GetUserMarshaler().MarshalUser(user) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("users"), &upsertUserRawReq{User: data}) return trace.Wrap(err) }
go
func (c *Client) UpsertUser(user services.User) error { data, err := services.GetUserMarshaler().MarshalUser(user) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("users"), &upsertUserRawReq{User: data}) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "UpsertUser", "(", "user", "services", ".", "User", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "GetUserMarshaler", "(", ")", ".", "MarshalUser", "(", "user", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "&", "upsertUserRawReq", "{", "User", ":", "data", "}", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// UpsertUser user updates or inserts user entry
[ "UpsertUser", "user", "updates", "or", "inserts", "user", "entry" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1292-L1299
train
gravitational/teleport
lib/auth/clt.go
ChangePassword
func (c *Client) ChangePassword(req services.ChangePasswordReq) error { _, err := c.PutJSON(c.Endpoint("users", req.User, "web", "password"), req) return trace.Wrap(err) }
go
func (c *Client) ChangePassword(req services.ChangePasswordReq) error { _, err := c.PutJSON(c.Endpoint("users", req.User, "web", "password"), req) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "ChangePassword", "(", "req", "services", ".", "ChangePasswordReq", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "PutJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "req", ".", "User", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "req", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// ChangePassword changes user password
[ "ChangePassword", "changes", "user", "password" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1302-L1305
train
gravitational/teleport
lib/auth/clt.go
CheckPassword
func (c *Client) CheckPassword(user string, password []byte, otpToken string) error { _, err := c.PostJSON( c.Endpoint("users", user, "web", "password", "check"), checkPasswordReq{ Password: string(password), OTPToken: otpToken, }) return trace.Wrap(err) }
go
func (c *Client) CheckPassword(user string, password []byte, otpToken string) error { _, err := c.PostJSON( c.Endpoint("users", user, "web", "password", "check"), checkPasswordReq{ Password: string(password), OTPToken: otpToken, }) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "CheckPassword", "(", "user", "string", ",", "password", "[", "]", "byte", ",", "otpToken", "string", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "user", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "checkPasswordReq", "{", "Password", ":", "string", "(", "password", ")", ",", "OTPToken", ":", "otpToken", ",", "}", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// CheckPassword checks if the suplied web access password is valid.
[ "CheckPassword", "checks", "if", "the", "suplied", "web", "access", "password", "is", "valid", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1308-L1316
train
gravitational/teleport
lib/auth/clt.go
GetU2FSignRequest
func (c *Client) GetU2FSignRequest(user string, password []byte) (*u2f.SignRequest, error) { out, err := c.PostJSON( c.Endpoint("u2f", "users", user, "sign"), signInReq{ Password: string(password), }, ) if err != nil { return nil, trace.Wrap(err) } var signRequest *u2f.SignRequest if err := json.Unmarshal(out.Bytes(), &signRequest); err != nil { return nil, err } return signRequest, nil }
go
func (c *Client) GetU2FSignRequest(user string, password []byte) (*u2f.SignRequest, error) { out, err := c.PostJSON( c.Endpoint("u2f", "users", user, "sign"), signInReq{ Password: string(password), }, ) if err != nil { return nil, trace.Wrap(err) } var signRequest *u2f.SignRequest if err := json.Unmarshal(out.Bytes(), &signRequest); err != nil { return nil, err } return signRequest, nil }
[ "func", "(", "c", "*", "Client", ")", "GetU2FSignRequest", "(", "user", "string", ",", "password", "[", "]", "byte", ")", "(", "*", "u2f", ".", "SignRequest", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "user", ",", "\"", "\"", ")", ",", "signInReq", "{", "Password", ":", "string", "(", "password", ")", ",", "}", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "signRequest", "*", "u2f", ".", "SignRequest", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "signRequest", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "signRequest", ",", "nil", "\n", "}" ]
// GetU2FSignRequest generates request for user trying to authenticate with U2F token
[ "GetU2FSignRequest", "generates", "request", "for", "user", "trying", "to", "authenticate", "with", "U2F", "token" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1319-L1334
train
gravitational/teleport
lib/auth/clt.go
ExtendWebSession
func (c *Client) ExtendWebSession(user string, prevSessionID string) (services.WebSession, error) { out, err := c.PostJSON( c.Endpoint("users", user, "web", "sessions"), createWebSessionReq{ PrevSessionID: prevSessionID, }, ) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
go
func (c *Client) ExtendWebSession(user string, prevSessionID string) (services.WebSession, error) { out, err := c.PostJSON( c.Endpoint("users", user, "web", "sessions"), createWebSessionReq{ PrevSessionID: prevSessionID, }, ) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
[ "func", "(", "c", "*", "Client", ")", "ExtendWebSession", "(", "user", "string", ",", "prevSessionID", "string", ")", "(", "services", ".", "WebSession", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "user", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "createWebSessionReq", "{", "PrevSessionID", ":", "prevSessionID", ",", "}", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "UnmarshalWebSession", "(", "out", ".", "Bytes", "(", ")", ")", "\n", "}" ]
// ExtendWebSession creates a new web session for a user based on another // valid web session
[ "ExtendWebSession", "creates", "a", "new", "web", "session", "for", "a", "user", "based", "on", "another", "valid", "web", "session" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1338-L1349
train
gravitational/teleport
lib/auth/clt.go
GetWebSessionInfo
func (c *Client) GetWebSessionInfo(user string, sid string) (services.WebSession, error) { out, err := c.Get( c.Endpoint("users", user, "web", "sessions", sid), url.Values{}) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
go
func (c *Client) GetWebSessionInfo(user string, sid string) (services.WebSession, error) { out, err := c.Get( c.Endpoint("users", user, "web", "sessions", sid), url.Values{}) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
[ "func", "(", "c", "*", "Client", ")", "GetWebSessionInfo", "(", "user", "string", ",", "sid", "string", ")", "(", "services", ".", "WebSession", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "user", ",", "\"", "\"", ",", "\"", "\"", ",", "sid", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "UnmarshalWebSession", "(", "out", ".", "Bytes", "(", ")", ")", "\n", "}" ]
// GetWebSessionInfo checks if a web sesion is valid, returns session id in case if // it is valid, or error otherwise.
[ "GetWebSessionInfo", "checks", "if", "a", "web", "sesion", "is", "valid", "returns", "session", "id", "in", "case", "if", "it", "is", "valid", "or", "error", "otherwise", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1395-L1402
train
gravitational/teleport
lib/auth/clt.go
DeleteWebSession
func (c *Client) DeleteWebSession(user string, sid string) error { _, err := c.Delete(c.Endpoint("users", user, "web", "sessions", sid)) return trace.Wrap(err) }
go
func (c *Client) DeleteWebSession(user string, sid string) error { _, err := c.Delete(c.Endpoint("users", user, "web", "sessions", sid)) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "DeleteWebSession", "(", "user", "string", ",", "sid", "string", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "user", ",", "\"", "\"", ",", "\"", "\"", ",", "sid", ")", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteWebSession deletes a web session for this user by id
[ "DeleteWebSession", "deletes", "a", "web", "session", "for", "this", "user", "by", "id" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1405-L1408
train
gravitational/teleport
lib/auth/clt.go
GetUser
func (c *Client) GetUser(name string) (services.User, error) { if name == "" { return nil, trace.BadParameter("missing username") } out, err := c.Get(c.Endpoint("users", name), url.Values{}) if err != nil { return nil, trace.Wrap(err) } user, err := services.GetUserMarshaler().UnmarshalUser(out.Bytes(), services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } return user, nil }
go
func (c *Client) GetUser(name string) (services.User, error) { if name == "" { return nil, trace.BadParameter("missing username") } out, err := c.Get(c.Endpoint("users", name), url.Values{}) if err != nil { return nil, trace.Wrap(err) } user, err := services.GetUserMarshaler().UnmarshalUser(out.Bytes(), services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } return user, nil }
[ "func", "(", "c", "*", "Client", ")", "GetUser", "(", "name", "string", ")", "(", "services", ".", "User", ",", "error", ")", "{", "if", "name", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "name", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "user", ",", "err", ":=", "services", ".", "GetUserMarshaler", "(", ")", ".", "UnmarshalUser", "(", "out", ".", "Bytes", "(", ")", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "user", ",", "nil", "\n", "}" ]
// GetUser returns a list of usernames registered in the system
[ "GetUser", "returns", "a", "list", "of", "usernames", "registered", "in", "the", "system" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1411-L1424
train
gravitational/teleport
lib/auth/clt.go
GetUsers
func (c *Client) GetUsers() ([]services.User, error) { out, err := c.Get(c.Endpoint("users"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } users := make([]services.User, len(items)) for i, userBytes := range items { user, err := services.GetUserMarshaler().UnmarshalUser(userBytes, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } users[i] = user } return users, nil }
go
func (c *Client) GetUsers() ([]services.User, error) { out, err := c.Get(c.Endpoint("users"), url.Values{}) if err != nil { return nil, trace.Wrap(err) } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } users := make([]services.User, len(items)) for i, userBytes := range items { user, err := services.GetUserMarshaler().UnmarshalUser(userBytes, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } users[i] = user } return users, nil }
[ "func", "(", "c", "*", "Client", ")", "GetUsers", "(", ")", "(", "[", "]", "services", ".", "User", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "users", ":=", "make", "(", "[", "]", "services", ".", "User", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "userBytes", ":=", "range", "items", "{", "user", ",", "err", ":=", "services", ".", "GetUserMarshaler", "(", ")", ".", "UnmarshalUser", "(", "userBytes", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "users", "[", "i", "]", "=", "user", "\n", "}", "\n", "return", "users", ",", "nil", "\n", "}" ]
// GetUsers returns a list of usernames registered in the system
[ "GetUsers", "returns", "a", "list", "of", "usernames", "registered", "in", "the", "system" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1427-L1445
train
gravitational/teleport
lib/auth/clt.go
DeleteUser
func (c *Client) DeleteUser(user string) error { _, err := c.Delete(c.Endpoint("users", user)) return trace.Wrap(err) }
go
func (c *Client) DeleteUser(user string) error { _, err := c.Delete(c.Endpoint("users", user)) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "DeleteUser", "(", "user", "string", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "user", ")", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteUser deletes a user by username
[ "DeleteUser", "deletes", "a", "user", "by", "username" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1448-L1451
train
gravitational/teleport
lib/auth/clt.go
GenerateHostCert
func (c *Client) GenerateHostCert( key []byte, hostID, nodeName string, principals []string, clusterName string, roles teleport.Roles, ttl time.Duration) ([]byte, error) { out, err := c.PostJSON(c.Endpoint("ca", "host", "certs"), generateHostCertReq{ Key: key, HostID: hostID, NodeName: nodeName, Principals: principals, ClusterName: clusterName, Roles: roles, TTL: ttl, }) if err != nil { return nil, trace.Wrap(err) } var cert string if err := json.Unmarshal(out.Bytes(), &cert); err != nil { return nil, err } return []byte(cert), nil }
go
func (c *Client) GenerateHostCert( key []byte, hostID, nodeName string, principals []string, clusterName string, roles teleport.Roles, ttl time.Duration) ([]byte, error) { out, err := c.PostJSON(c.Endpoint("ca", "host", "certs"), generateHostCertReq{ Key: key, HostID: hostID, NodeName: nodeName, Principals: principals, ClusterName: clusterName, Roles: roles, TTL: ttl, }) if err != nil { return nil, trace.Wrap(err) } var cert string if err := json.Unmarshal(out.Bytes(), &cert); err != nil { return nil, err } return []byte(cert), nil }
[ "func", "(", "c", "*", "Client", ")", "GenerateHostCert", "(", "key", "[", "]", "byte", ",", "hostID", ",", "nodeName", "string", ",", "principals", "[", "]", "string", ",", "clusterName", "string", ",", "roles", "teleport", ".", "Roles", ",", "ttl", "time", ".", "Duration", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "generateHostCertReq", "{", "Key", ":", "key", ",", "HostID", ":", "hostID", ",", "NodeName", ":", "nodeName", ",", "Principals", ":", "principals", ",", "ClusterName", ":", "clusterName", ",", "Roles", ":", "roles", ",", "TTL", ":", "ttl", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "var", "cert", "string", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "cert", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "[", "]", "byte", "(", "cert", ")", ",", "nil", "\n", "}" ]
// GenerateHostCert takes the public key in the Open SSH ``authorized_keys`` // plain text format, signs it using Host Certificate Authority private key and returns the // resulting certificate.
[ "GenerateHostCert", "takes", "the", "public", "key", "in", "the", "Open", "SSH", "authorized_keys", "plain", "text", "format", "signs", "it", "using", "Host", "Certificate", "Authority", "private", "key", "and", "returns", "the", "resulting", "certificate", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1471-L1494
train
gravitational/teleport
lib/auth/clt.go
GetSignupTokenData
func (c *Client) GetSignupTokenData(token string) (user string, otpQRCode []byte, e error) { out, err := c.Get(c.Endpoint("signuptokens", token), url.Values{}) if err != nil { return "", nil, err } var tokenData getSignupTokenDataResponse if err := json.Unmarshal(out.Bytes(), &tokenData); err != nil { return "", nil, err } return tokenData.User, tokenData.QRImg, nil }
go
func (c *Client) GetSignupTokenData(token string) (user string, otpQRCode []byte, e error) { out, err := c.Get(c.Endpoint("signuptokens", token), url.Values{}) if err != nil { return "", nil, err } var tokenData getSignupTokenDataResponse if err := json.Unmarshal(out.Bytes(), &tokenData); err != nil { return "", nil, err } return tokenData.User, tokenData.QRImg, nil }
[ "func", "(", "c", "*", "Client", ")", "GetSignupTokenData", "(", "token", "string", ")", "(", "user", "string", ",", "otpQRCode", "[", "]", "byte", ",", "e", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "token", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "err", "\n", "}", "\n\n", "var", "tokenData", "getSignupTokenDataResponse", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "tokenData", ")", ";", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "nil", ",", "err", "\n", "}", "\n\n", "return", "tokenData", ".", "User", ",", "tokenData", ".", "QRImg", ",", "nil", "\n", "}" ]
// GetSignupTokenData returns token data for a valid token
[ "GetSignupTokenData", "returns", "token", "data", "for", "a", "valid", "token" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1517-L1529
train
gravitational/teleport
lib/auth/clt.go
GenerateUserCert
func (c *Client) GenerateUserCert(key []byte, user string, ttl time.Duration, compatibility string) ([]byte, error) { out, err := c.PostJSON(c.Endpoint("ca", "user", "certs"), generateUserCertReq{ Key: key, User: user, TTL: ttl, Compatibility: compatibility, }) if err != nil { return nil, trace.Wrap(err) } var cert string if err := json.Unmarshal(out.Bytes(), &cert); err != nil { return nil, trace.Wrap(err) } return []byte(cert), nil }
go
func (c *Client) GenerateUserCert(key []byte, user string, ttl time.Duration, compatibility string) ([]byte, error) { out, err := c.PostJSON(c.Endpoint("ca", "user", "certs"), generateUserCertReq{ Key: key, User: user, TTL: ttl, Compatibility: compatibility, }) if err != nil { return nil, trace.Wrap(err) } var cert string if err := json.Unmarshal(out.Bytes(), &cert); err != nil { return nil, trace.Wrap(err) } return []byte(cert), nil }
[ "func", "(", "c", "*", "Client", ")", "GenerateUserCert", "(", "key", "[", "]", "byte", ",", "user", "string", ",", "ttl", "time", ".", "Duration", ",", "compatibility", "string", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "generateUserCertReq", "{", "Key", ":", "key", ",", "User", ":", "user", ",", "TTL", ":", "ttl", ",", "Compatibility", ":", "compatibility", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "cert", "string", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "cert", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "[", "]", "byte", "(", "cert", ")", ",", "nil", "\n", "}" ]
// GenerateUserCert takes the public key in the OpenSSH `authorized_keys` plain // text format, signs it using User Certificate Authority signing key and // returns the resulting certificate.
[ "GenerateUserCert", "takes", "the", "public", "key", "in", "the", "OpenSSH", "authorized_keys", "plain", "text", "format", "signs", "it", "using", "User", "Certificate", "Authority", "signing", "key", "and", "returns", "the", "resulting", "certificate", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1534-L1550
train
gravitational/teleport
lib/auth/clt.go
GetSignupU2FRegisterRequest
func (c *Client) GetSignupU2FRegisterRequest(token string) (u2fRegisterRequest *u2f.RegisterRequest, e error) { out, err := c.Get(c.Endpoint("u2f", "signuptokens", token), url.Values{}) if err != nil { return nil, err } var u2fRegReq u2f.RegisterRequest if err := json.Unmarshal(out.Bytes(), &u2fRegReq); err != nil { return nil, err } return &u2fRegReq, nil }
go
func (c *Client) GetSignupU2FRegisterRequest(token string) (u2fRegisterRequest *u2f.RegisterRequest, e error) { out, err := c.Get(c.Endpoint("u2f", "signuptokens", token), url.Values{}) if err != nil { return nil, err } var u2fRegReq u2f.RegisterRequest if err := json.Unmarshal(out.Bytes(), &u2fRegReq); err != nil { return nil, err } return &u2fRegReq, nil }
[ "func", "(", "c", "*", "Client", ")", "GetSignupU2FRegisterRequest", "(", "token", "string", ")", "(", "u2fRegisterRequest", "*", "u2f", ".", "RegisterRequest", ",", "e", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "token", ")", ",", "url", ".", "Values", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "var", "u2fRegReq", "u2f", ".", "RegisterRequest", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "u2fRegReq", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "u2fRegReq", ",", "nil", "\n", "}" ]
// GetSignupU2FRegisterRequest generates sign request for user trying to sign up with invite tokenx
[ "GetSignupU2FRegisterRequest", "generates", "sign", "request", "for", "user", "trying", "to", "sign", "up", "with", "invite", "tokenx" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1553-L1563
train
gravitational/teleport
lib/auth/clt.go
CreateUserWithOTP
func (c *Client) CreateUserWithOTP(token, password, otpToken string) (services.WebSession, error) { out, err := c.PostJSON(c.Endpoint("signuptokens", "users"), createUserWithTokenReq{ Token: token, Password: password, OTPToken: otpToken, }) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
go
func (c *Client) CreateUserWithOTP(token, password, otpToken string) (services.WebSession, error) { out, err := c.PostJSON(c.Endpoint("signuptokens", "users"), createUserWithTokenReq{ Token: token, Password: password, OTPToken: otpToken, }) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
[ "func", "(", "c", "*", "Client", ")", "CreateUserWithOTP", "(", "token", ",", "password", ",", "otpToken", "string", ")", "(", "services", ".", "WebSession", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "createUserWithTokenReq", "{", "Token", ":", "token", ",", "Password", ":", "password", ",", "OTPToken", ":", "otpToken", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "UnmarshalWebSession", "(", "out", ".", "Bytes", "(", ")", ")", "\n", "}" ]
// CreateUserWithOTP creates account with provided token and password. // Account username and OTP key are taken from token data. // Deletes token after account creation.
[ "CreateUserWithOTP", "creates", "account", "with", "provided", "token", "and", "password", ".", "Account", "username", "and", "OTP", "key", "are", "taken", "from", "token", "data", ".", "Deletes", "token", "after", "account", "creation", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1568-L1578
train
gravitational/teleport
lib/auth/clt.go
CreateUserWithU2FToken
func (c *Client) CreateUserWithU2FToken(token string, password string, u2fRegisterResponse u2f.RegisterResponse) (services.WebSession, error) { out, err := c.PostJSON(c.Endpoint("u2f", "users"), createUserWithU2FTokenReq{ Token: token, Password: password, U2FRegisterResponse: u2fRegisterResponse, }) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
go
func (c *Client) CreateUserWithU2FToken(token string, password string, u2fRegisterResponse u2f.RegisterResponse) (services.WebSession, error) { out, err := c.PostJSON(c.Endpoint("u2f", "users"), createUserWithU2FTokenReq{ Token: token, Password: password, U2FRegisterResponse: u2fRegisterResponse, }) if err != nil { return nil, trace.Wrap(err) } return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes()) }
[ "func", "(", "c", "*", "Client", ")", "CreateUserWithU2FToken", "(", "token", "string", ",", "password", "string", ",", "u2fRegisterResponse", "u2f", ".", "RegisterResponse", ")", "(", "services", ".", "WebSession", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "createUserWithU2FTokenReq", "{", "Token", ":", "token", ",", "Password", ":", "password", ",", "U2FRegisterResponse", ":", "u2fRegisterResponse", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "UnmarshalWebSession", "(", "out", ".", "Bytes", "(", ")", ")", "\n", "}" ]
// CreateUserWithU2FToken creates user account with provided token and U2F sign response
[ "CreateUserWithU2FToken", "creates", "user", "account", "with", "provided", "token", "and", "U2F", "sign", "response" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1594-L1604
train
gravitational/teleport
lib/auth/clt.go
UpsertOIDCConnector
func (c *Client) UpsertOIDCConnector(connector services.OIDCConnector) error { data, err := services.GetOIDCConnectorMarshaler().MarshalOIDCConnector(connector) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("oidc", "connectors"), &upsertOIDCConnectorRawReq{ Connector: data, }) if err != nil { return trace.Wrap(err) } return nil }
go
func (c *Client) UpsertOIDCConnector(connector services.OIDCConnector) error { data, err := services.GetOIDCConnectorMarshaler().MarshalOIDCConnector(connector) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("oidc", "connectors"), &upsertOIDCConnectorRawReq{ Connector: data, }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "Client", ")", "UpsertOIDCConnector", "(", "connector", "services", ".", "OIDCConnector", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "GetOIDCConnectorMarshaler", "(", ")", ".", "MarshalOIDCConnector", "(", "connector", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "&", "upsertOIDCConnectorRawReq", "{", "Connector", ":", "data", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// UpsertOIDCConnector updates or creates OIDC connector
[ "UpsertOIDCConnector", "updates", "or", "creates", "OIDC", "connector" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1607-L1619
train
gravitational/teleport
lib/auth/clt.go
GetOIDCConnector
func (c *Client) GetOIDCConnector(id string, withSecrets bool) (services.OIDCConnector, error) { if id == "" { return nil, trace.BadParameter("missing connector id") } out, err := c.Get(c.Endpoint("oidc", "connectors", id), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, err } return services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(out.Bytes(), services.SkipValidation()) }
go
func (c *Client) GetOIDCConnector(id string, withSecrets bool) (services.OIDCConnector, error) { if id == "" { return nil, trace.BadParameter("missing connector id") } out, err := c.Get(c.Endpoint("oidc", "connectors", id), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, err } return services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(out.Bytes(), services.SkipValidation()) }
[ "func", "(", "c", "*", "Client", ")", "GetOIDCConnector", "(", "id", "string", ",", "withSecrets", "bool", ")", "(", "services", ".", "OIDCConnector", ",", "error", ")", "{", "if", "id", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "id", ")", ",", "url", ".", "Values", "{", "\"", "\"", ":", "[", "]", "string", "{", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "withSecrets", ")", "}", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "services", ".", "GetOIDCConnectorMarshaler", "(", ")", ".", "UnmarshalOIDCConnector", "(", "out", ".", "Bytes", "(", ")", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "}" ]
// GetOIDCConnector returns OIDC connector information by id
[ "GetOIDCConnector", "returns", "OIDC", "connector", "information", "by", "id" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1622-L1632
train
gravitational/teleport
lib/auth/clt.go
GetOIDCConnectors
func (c *Client) GetOIDCConnectors(withSecrets bool) ([]services.OIDCConnector, error) { out, err := c.Get(c.Endpoint("oidc", "connectors"), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, err } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } connectors := make([]services.OIDCConnector, len(items)) for i, raw := range items { connector, err := services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } connectors[i] = connector } return connectors, nil }
go
func (c *Client) GetOIDCConnectors(withSecrets bool) ([]services.OIDCConnector, error) { out, err := c.Get(c.Endpoint("oidc", "connectors"), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, err } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } connectors := make([]services.OIDCConnector, len(items)) for i, raw := range items { connector, err := services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } connectors[i] = connector } return connectors, nil }
[ "func", "(", "c", "*", "Client", ")", "GetOIDCConnectors", "(", "withSecrets", "bool", ")", "(", "[", "]", "services", ".", "OIDCConnector", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "url", ".", "Values", "{", "\"", "\"", ":", "[", "]", "string", "{", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "withSecrets", ")", "}", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "connectors", ":=", "make", "(", "[", "]", "services", ".", "OIDCConnector", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "items", "{", "connector", ",", "err", ":=", "services", ".", "GetOIDCConnectorMarshaler", "(", ")", ".", "UnmarshalOIDCConnector", "(", "raw", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "connectors", "[", "i", "]", "=", "connector", "\n", "}", "\n", "return", "connectors", ",", "nil", "\n", "}" ]
// GetOIDCConnector gets OIDC connectors list
[ "GetOIDCConnector", "gets", "OIDC", "connectors", "list" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1635-L1654
train
gravitational/teleport
lib/auth/clt.go
CreateOIDCAuthRequest
func (c *Client) CreateOIDCAuthRequest(req services.OIDCAuthRequest) (*services.OIDCAuthRequest, error) { out, err := c.PostJSON(c.Endpoint("oidc", "requests", "create"), createOIDCAuthRequestReq{ Req: req, }) if err != nil { return nil, trace.Wrap(err) } var response *services.OIDCAuthRequest if err := json.Unmarshal(out.Bytes(), &response); err != nil { return nil, trace.Wrap(err) } return response, nil }
go
func (c *Client) CreateOIDCAuthRequest(req services.OIDCAuthRequest) (*services.OIDCAuthRequest, error) { out, err := c.PostJSON(c.Endpoint("oidc", "requests", "create"), createOIDCAuthRequestReq{ Req: req, }) if err != nil { return nil, trace.Wrap(err) } var response *services.OIDCAuthRequest if err := json.Unmarshal(out.Bytes(), &response); err != nil { return nil, trace.Wrap(err) } return response, nil }
[ "func", "(", "c", "*", "Client", ")", "CreateOIDCAuthRequest", "(", "req", "services", ".", "OIDCAuthRequest", ")", "(", "*", "services", ".", "OIDCAuthRequest", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "createOIDCAuthRequestReq", "{", "Req", ":", "req", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "response", "*", "services", ".", "OIDCAuthRequest", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "response", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "response", ",", "nil", "\n", "}" ]
// CreateOIDCAuthRequest creates OIDCAuthRequest
[ "CreateOIDCAuthRequest", "creates", "OIDCAuthRequest" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1666-L1678
train
gravitational/teleport
lib/auth/clt.go
CreateSAMLConnector
func (c *Client) CreateSAMLConnector(connector services.SAMLConnector) error { data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("saml", "connectors"), &createSAMLConnectorRawReq{ Connector: data, }) if err != nil { return trace.Wrap(err) } return nil }
go
func (c *Client) CreateSAMLConnector(connector services.SAMLConnector) error { data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector) if err != nil { return trace.Wrap(err) } _, err = c.PostJSON(c.Endpoint("saml", "connectors"), &createSAMLConnectorRawReq{ Connector: data, }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "Client", ")", "CreateSAMLConnector", "(", "connector", "services", ".", "SAMLConnector", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "GetSAMLConnectorMarshaler", "(", ")", ".", "MarshalSAMLConnector", "(", "connector", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "&", "createSAMLConnectorRawReq", "{", "Connector", ":", "data", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CreateOIDCConnector creates SAML connector
[ "CreateOIDCConnector", "creates", "SAML", "connector" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1718-L1730
train
gravitational/teleport
lib/auth/clt.go
UpsertSAMLConnector
func (c *Client) UpsertSAMLConnector(connector services.SAMLConnector) error { data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector) if err != nil { return trace.Wrap(err) } _, err = c.PutJSON(c.Endpoint("saml", "connectors"), &upsertSAMLConnectorRawReq{ Connector: data, }) if err != nil { return trace.Wrap(err) } return nil }
go
func (c *Client) UpsertSAMLConnector(connector services.SAMLConnector) error { data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector) if err != nil { return trace.Wrap(err) } _, err = c.PutJSON(c.Endpoint("saml", "connectors"), &upsertSAMLConnectorRawReq{ Connector: data, }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "Client", ")", "UpsertSAMLConnector", "(", "connector", "services", ".", "SAMLConnector", ")", "error", "{", "data", ",", "err", ":=", "services", ".", "GetSAMLConnectorMarshaler", "(", ")", ".", "MarshalSAMLConnector", "(", "connector", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "c", ".", "PutJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "&", "upsertSAMLConnectorRawReq", "{", "Connector", ":", "data", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// UpsertSAMLConnector updates or creates OIDC connector
[ "UpsertSAMLConnector", "updates", "or", "creates", "OIDC", "connector" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1733-L1745
train
gravitational/teleport
lib/auth/clt.go
GetSAMLConnector
func (c *Client) GetSAMLConnector(id string, withSecrets bool) (services.SAMLConnector, error) { if id == "" { return nil, trace.BadParameter("missing connector id") } out, err := c.Get(c.Endpoint("saml", "connectors", id), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, trace.Wrap(err) } return services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(out.Bytes(), services.SkipValidation()) }
go
func (c *Client) GetSAMLConnector(id string, withSecrets bool) (services.SAMLConnector, error) { if id == "" { return nil, trace.BadParameter("missing connector id") } out, err := c.Get(c.Endpoint("saml", "connectors", id), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, trace.Wrap(err) } return services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(out.Bytes(), services.SkipValidation()) }
[ "func", "(", "c", "*", "Client", ")", "GetSAMLConnector", "(", "id", "string", ",", "withSecrets", "bool", ")", "(", "services", ".", "SAMLConnector", ",", "error", ")", "{", "if", "id", "==", "\"", "\"", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "id", ")", ",", "url", ".", "Values", "{", "\"", "\"", ":", "[", "]", "string", "{", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "withSecrets", ")", "}", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetSAMLConnectorMarshaler", "(", ")", ".", "UnmarshalSAMLConnector", "(", "out", ".", "Bytes", "(", ")", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "}" ]
// GetOIDCConnector returns SAML connector information by id
[ "GetOIDCConnector", "returns", "SAML", "connector", "information", "by", "id" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1748-L1758
train
gravitational/teleport
lib/auth/clt.go
GetSAMLConnectors
func (c *Client) GetSAMLConnectors(withSecrets bool) ([]services.SAMLConnector, error) { out, err := c.Get(c.Endpoint("saml", "connectors"), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, err } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } connectors := make([]services.SAMLConnector, len(items)) for i, raw := range items { connector, err := services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } connectors[i] = connector } return connectors, nil }
go
func (c *Client) GetSAMLConnectors(withSecrets bool) ([]services.SAMLConnector, error) { out, err := c.Get(c.Endpoint("saml", "connectors"), url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}}) if err != nil { return nil, err } var items []json.RawMessage if err := json.Unmarshal(out.Bytes(), &items); err != nil { return nil, trace.Wrap(err) } connectors := make([]services.SAMLConnector, len(items)) for i, raw := range items { connector, err := services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(raw, services.SkipValidation()) if err != nil { return nil, trace.Wrap(err) } connectors[i] = connector } return connectors, nil }
[ "func", "(", "c", "*", "Client", ")", "GetSAMLConnectors", "(", "withSecrets", "bool", ")", "(", "[", "]", "services", ".", "SAMLConnector", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "Get", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "url", ".", "Values", "{", "\"", "\"", ":", "[", "]", "string", "{", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "withSecrets", ")", "}", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "var", "items", "[", "]", "json", ".", "RawMessage", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "items", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "connectors", ":=", "make", "(", "[", "]", "services", ".", "SAMLConnector", ",", "len", "(", "items", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "items", "{", "connector", ",", "err", ":=", "services", ".", "GetSAMLConnectorMarshaler", "(", ")", ".", "UnmarshalSAMLConnector", "(", "raw", ",", "services", ".", "SkipValidation", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "connectors", "[", "i", "]", "=", "connector", "\n", "}", "\n", "return", "connectors", ",", "nil", "\n", "}" ]
// GetSAMLConnectors gets SAML connectors list
[ "GetSAMLConnectors", "gets", "SAML", "connectors", "list" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1761-L1780
train
gravitational/teleport
lib/auth/clt.go
DeleteSAMLConnector
func (c *Client) DeleteSAMLConnector(connectorID string) error { if connectorID == "" { return trace.BadParameter("missing connector id") } _, err := c.Delete(c.Endpoint("saml", "connectors", connectorID)) return trace.Wrap(err) }
go
func (c *Client) DeleteSAMLConnector(connectorID string) error { if connectorID == "" { return trace.BadParameter("missing connector id") } _, err := c.Delete(c.Endpoint("saml", "connectors", connectorID)) return trace.Wrap(err) }
[ "func", "(", "c", "*", "Client", ")", "DeleteSAMLConnector", "(", "connectorID", "string", ")", "error", "{", "if", "connectorID", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "_", ",", "err", ":=", "c", ".", "Delete", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "connectorID", ")", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}" ]
// DeleteSAMLConnector deletes SAML connector by ID
[ "DeleteSAMLConnector", "deletes", "SAML", "connector", "by", "ID" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1783-L1789
train
gravitational/teleport
lib/auth/clt.go
CreateSAMLAuthRequest
func (c *Client) CreateSAMLAuthRequest(req services.SAMLAuthRequest) (*services.SAMLAuthRequest, error) { out, err := c.PostJSON(c.Endpoint("saml", "requests", "create"), createSAMLAuthRequestReq{ Req: req, }) if err != nil { return nil, trace.Wrap(err) } var response *services.SAMLAuthRequest if err := json.Unmarshal(out.Bytes(), &response); err != nil { return nil, trace.Wrap(err) } return response, nil }
go
func (c *Client) CreateSAMLAuthRequest(req services.SAMLAuthRequest) (*services.SAMLAuthRequest, error) { out, err := c.PostJSON(c.Endpoint("saml", "requests", "create"), createSAMLAuthRequestReq{ Req: req, }) if err != nil { return nil, trace.Wrap(err) } var response *services.SAMLAuthRequest if err := json.Unmarshal(out.Bytes(), &response); err != nil { return nil, trace.Wrap(err) } return response, nil }
[ "func", "(", "c", "*", "Client", ")", "CreateSAMLAuthRequest", "(", "req", "services", ".", "SAMLAuthRequest", ")", "(", "*", "services", ".", "SAMLAuthRequest", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "createSAMLAuthRequestReq", "{", "Req", ":", "req", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "response", "*", "services", ".", "SAMLAuthRequest", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "response", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "response", ",", "nil", "\n", "}" ]
// CreateSAMLAuthRequest creates SAML AuthnRequest
[ "CreateSAMLAuthRequest", "creates", "SAML", "AuthnRequest" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1792-L1804
train
gravitational/teleport
lib/auth/clt.go
ValidateSAMLResponse
func (c *Client) ValidateSAMLResponse(re string) (*SAMLAuthResponse, error) { out, err := c.PostJSON(c.Endpoint("saml", "requests", "validate"), validateSAMLResponseReq{ Response: re, }) if err != nil { return nil, trace.Wrap(err) } var rawResponse *samlAuthRawResponse if err := json.Unmarshal(out.Bytes(), &rawResponse); err != nil { return nil, trace.Wrap(err) } response := SAMLAuthResponse{ Username: rawResponse.Username, Identity: rawResponse.Identity, Cert: rawResponse.Cert, Req: rawResponse.Req, TLSCert: rawResponse.TLSCert, } if len(rawResponse.Session) != 0 { session, err := services.GetWebSessionMarshaler().UnmarshalWebSession(rawResponse.Session) if err != nil { return nil, trace.Wrap(err) } response.Session = session } response.HostSigners = make([]services.CertAuthority, len(rawResponse.HostSigners)) for i, raw := range rawResponse.HostSigners { ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw) if err != nil { return nil, trace.Wrap(err) } response.HostSigners[i] = ca } return &response, nil }
go
func (c *Client) ValidateSAMLResponse(re string) (*SAMLAuthResponse, error) { out, err := c.PostJSON(c.Endpoint("saml", "requests", "validate"), validateSAMLResponseReq{ Response: re, }) if err != nil { return nil, trace.Wrap(err) } var rawResponse *samlAuthRawResponse if err := json.Unmarshal(out.Bytes(), &rawResponse); err != nil { return nil, trace.Wrap(err) } response := SAMLAuthResponse{ Username: rawResponse.Username, Identity: rawResponse.Identity, Cert: rawResponse.Cert, Req: rawResponse.Req, TLSCert: rawResponse.TLSCert, } if len(rawResponse.Session) != 0 { session, err := services.GetWebSessionMarshaler().UnmarshalWebSession(rawResponse.Session) if err != nil { return nil, trace.Wrap(err) } response.Session = session } response.HostSigners = make([]services.CertAuthority, len(rawResponse.HostSigners)) for i, raw := range rawResponse.HostSigners { ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw) if err != nil { return nil, trace.Wrap(err) } response.HostSigners[i] = ca } return &response, nil }
[ "func", "(", "c", "*", "Client", ")", "ValidateSAMLResponse", "(", "re", "string", ")", "(", "*", "SAMLAuthResponse", ",", "error", ")", "{", "out", ",", "err", ":=", "c", ".", "PostJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ")", ",", "validateSAMLResponseReq", "{", "Response", ":", "re", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "rawResponse", "*", "samlAuthRawResponse", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "out", ".", "Bytes", "(", ")", ",", "&", "rawResponse", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "response", ":=", "SAMLAuthResponse", "{", "Username", ":", "rawResponse", ".", "Username", ",", "Identity", ":", "rawResponse", ".", "Identity", ",", "Cert", ":", "rawResponse", ".", "Cert", ",", "Req", ":", "rawResponse", ".", "Req", ",", "TLSCert", ":", "rawResponse", ".", "TLSCert", ",", "}", "\n", "if", "len", "(", "rawResponse", ".", "Session", ")", "!=", "0", "{", "session", ",", "err", ":=", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "UnmarshalWebSession", "(", "rawResponse", ".", "Session", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "response", ".", "Session", "=", "session", "\n", "}", "\n", "response", ".", "HostSigners", "=", "make", "(", "[", "]", "services", ".", "CertAuthority", ",", "len", "(", "rawResponse", ".", "HostSigners", ")", ")", "\n", "for", "i", ",", "raw", ":=", "range", "rawResponse", ".", "HostSigners", "{", "ca", ",", "err", ":=", "services", ".", "GetCertAuthorityMarshaler", "(", ")", ".", "UnmarshalCertAuthority", "(", "raw", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "response", ".", "HostSigners", "[", "i", "]", "=", "ca", "\n", "}", "\n", "return", "&", "response", ",", "nil", "\n", "}" ]
// ValidateSAMLResponse validates response returned by SAML identity provider
[ "ValidateSAMLResponse", "validates", "response", "returned", "by", "SAML", "identity", "provider" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1807-L1841
train
gravitational/teleport
lib/auth/clt.go
UpsertGithubConnector
func (c *Client) UpsertGithubConnector(connector services.GithubConnector) error { bytes, err := services.GetGithubConnectorMarshaler().Marshal(connector) if err != nil { return trace.Wrap(err) } _, err = c.PutJSON(c.Endpoint("github", "connectors"), &upsertGithubConnectorRawReq{ Connector: bytes, }) if err != nil { return trace.Wrap(err) } return nil }
go
func (c *Client) UpsertGithubConnector(connector services.GithubConnector) error { bytes, err := services.GetGithubConnectorMarshaler().Marshal(connector) if err != nil { return trace.Wrap(err) } _, err = c.PutJSON(c.Endpoint("github", "connectors"), &upsertGithubConnectorRawReq{ Connector: bytes, }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "c", "*", "Client", ")", "UpsertGithubConnector", "(", "connector", "services", ".", "GithubConnector", ")", "error", "{", "bytes", ",", "err", ":=", "services", ".", "GetGithubConnectorMarshaler", "(", ")", ".", "Marshal", "(", "connector", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "_", ",", "err", "=", "c", ".", "PutJSON", "(", "c", ".", "Endpoint", "(", "\"", "\"", ",", "\"", "\"", ")", ",", "&", "upsertGithubConnectorRawReq", "{", "Connector", ":", "bytes", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// UpsertGithubConnector creates or updates a Github connector
[ "UpsertGithubConnector", "creates", "or", "updates", "a", "Github", "connector" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1859-L1871
train