repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
sequence | docstring
stringlengths 6
2.61k
| docstring_tokens
sequence | sha
stringlengths 40
40
| url
stringlengths 85
252
| partition
stringclasses 1
value |
---|---|---|---|---|---|---|---|---|---|---|---|
gravitational/teleport | lib/utils/utils.go | Deduplicate | func Deduplicate(in []string) []string {
if len(in) == 0 {
return in
}
out := make([]string, 0, len(in))
seen := make(map[string]bool, len(in))
for _, val := range in {
if _, ok := seen[val]; !ok {
out = append(out, val)
seen[val] = true
}
}
return out
} | go | func Deduplicate(in []string) []string {
if len(in) == 0 {
return in
}
out := make([]string, 0, len(in))
seen := make(map[string]bool, len(in))
for _, val := range in {
if _, ok := seen[val]; !ok {
out = append(out, val)
seen[val] = true
}
}
return out
} | [
"func",
"Deduplicate",
"(",
"in",
"[",
"]",
"string",
")",
"[",
"]",
"string",
"{",
"if",
"len",
"(",
"in",
")",
"==",
"0",
"{",
"return",
"in",
"\n",
"}",
"\n",
"out",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"in",
")",
")",
"\n",
"seen",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"bool",
",",
"len",
"(",
"in",
")",
")",
"\n",
"for",
"_",
",",
"val",
":=",
"range",
"in",
"{",
"if",
"_",
",",
"ok",
":=",
"seen",
"[",
"val",
"]",
";",
"!",
"ok",
"{",
"out",
"=",
"append",
"(",
"out",
",",
"val",
")",
"\n",
"seen",
"[",
"val",
"]",
"=",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"out",
"\n",
"}"
] | // Deduplicate deduplicates list of strings | [
"Deduplicate",
"deduplicates",
"list",
"of",
"strings"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L394-L407 | train |
gravitational/teleport | lib/utils/utils.go | SliceContainsStr | func SliceContainsStr(slice []string, value string) bool {
for i := range slice {
if slice[i] == value {
return true
}
}
return false
} | go | func SliceContainsStr(slice []string, value string) bool {
for i := range slice {
if slice[i] == value {
return true
}
}
return false
} | [
"func",
"SliceContainsStr",
"(",
"slice",
"[",
"]",
"string",
",",
"value",
"string",
")",
"bool",
"{",
"for",
"i",
":=",
"range",
"slice",
"{",
"if",
"slice",
"[",
"i",
"]",
"==",
"value",
"{",
"return",
"true",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"false",
"\n",
"}"
] | // SliceContainsStr returns 'true' if the slice contains the given value | [
"SliceContainsStr",
"returns",
"true",
"if",
"the",
"slice",
"contains",
"the",
"given",
"value"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L410-L417 | train |
gravitational/teleport | lib/utils/utils.go | RemoveFromSlice | func RemoveFromSlice(slice []string, values ...string) []string {
output := make([]string, 0, len(slice))
remove := make(map[string]bool)
for _, value := range values {
remove[value] = true
}
for _, s := range slice {
_, ok := remove[s]
if ok {
continue
}
output = append(output, s)
}
return output
} | go | func RemoveFromSlice(slice []string, values ...string) []string {
output := make([]string, 0, len(slice))
remove := make(map[string]bool)
for _, value := range values {
remove[value] = true
}
for _, s := range slice {
_, ok := remove[s]
if ok {
continue
}
output = append(output, s)
}
return output
} | [
"func",
"RemoveFromSlice",
"(",
"slice",
"[",
"]",
"string",
",",
"values",
"...",
"string",
")",
"[",
"]",
"string",
"{",
"output",
":=",
"make",
"(",
"[",
"]",
"string",
",",
"0",
",",
"len",
"(",
"slice",
")",
")",
"\n\n",
"remove",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"bool",
")",
"\n",
"for",
"_",
",",
"value",
":=",
"range",
"values",
"{",
"remove",
"[",
"value",
"]",
"=",
"true",
"\n",
"}",
"\n\n",
"for",
"_",
",",
"s",
":=",
"range",
"slice",
"{",
"_",
",",
"ok",
":=",
"remove",
"[",
"s",
"]",
"\n",
"if",
"ok",
"{",
"continue",
"\n",
"}",
"\n",
"output",
"=",
"append",
"(",
"output",
",",
"s",
")",
"\n",
"}",
"\n\n",
"return",
"output",
"\n",
"}"
] | // RemoveFromSlice makes a copy of the slice and removes the passed in values from the copy. | [
"RemoveFromSlice",
"makes",
"a",
"copy",
"of",
"the",
"slice",
"and",
"removes",
"the",
"passed",
"in",
"values",
"from",
"the",
"copy",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L420-L437 | train |
gravitational/teleport | lib/utils/utils.go | CheckCertificateFormatFlag | func CheckCertificateFormatFlag(s string) (string, error) {
switch s {
case teleport.CertificateFormatStandard, teleport.CertificateFormatOldSSH, teleport.CertificateFormatUnspecified:
return s, nil
default:
return "", trace.BadParameter("invalid certificate format parameter: %q", s)
}
} | go | func CheckCertificateFormatFlag(s string) (string, error) {
switch s {
case teleport.CertificateFormatStandard, teleport.CertificateFormatOldSSH, teleport.CertificateFormatUnspecified:
return s, nil
default:
return "", trace.BadParameter("invalid certificate format parameter: %q", s)
}
} | [
"func",
"CheckCertificateFormatFlag",
"(",
"s",
"string",
")",
"(",
"string",
",",
"error",
")",
"{",
"switch",
"s",
"{",
"case",
"teleport",
".",
"CertificateFormatStandard",
",",
"teleport",
".",
"CertificateFormatOldSSH",
",",
"teleport",
".",
"CertificateFormatUnspecified",
":",
"return",
"s",
",",
"nil",
"\n",
"default",
":",
"return",
"\"",
"\"",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"s",
")",
"\n",
"}",
"\n",
"}"
] | // CheckCertificateFormatFlag checks if the certificate format is valid. | [
"CheckCertificateFormatFlag",
"checks",
"if",
"the",
"certificate",
"format",
"is",
"valid",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L440-L447 | train |
gravitational/teleport | lib/utils/utils.go | Addrs | func (s Strings) Addrs(defaultPort int) ([]NetAddr, error) {
addrs := make([]NetAddr, len(s))
for i, val := range s {
addr, err := ParseHostPortAddr(val, defaultPort)
if err != nil {
return nil, trace.Wrap(err)
}
addrs[i] = *addr
}
return addrs, nil
} | go | func (s Strings) Addrs(defaultPort int) ([]NetAddr, error) {
addrs := make([]NetAddr, len(s))
for i, val := range s {
addr, err := ParseHostPortAddr(val, defaultPort)
if err != nil {
return nil, trace.Wrap(err)
}
addrs[i] = *addr
}
return addrs, nil
} | [
"func",
"(",
"s",
"Strings",
")",
"Addrs",
"(",
"defaultPort",
"int",
")",
"(",
"[",
"]",
"NetAddr",
",",
"error",
")",
"{",
"addrs",
":=",
"make",
"(",
"[",
"]",
"NetAddr",
",",
"len",
"(",
"s",
")",
")",
"\n",
"for",
"i",
",",
"val",
":=",
"range",
"s",
"{",
"addr",
",",
"err",
":=",
"ParseHostPortAddr",
"(",
"val",
",",
"defaultPort",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"addrs",
"[",
"i",
"]",
"=",
"*",
"addr",
"\n",
"}",
"\n",
"return",
"addrs",
",",
"nil",
"\n",
"}"
] | // Addrs returns strings list converted to address list | [
"Addrs",
"returns",
"strings",
"list",
"converted",
"to",
"address",
"list"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/utils.go#L514-L524 | train |
gravitational/teleport | tool/tctl/common/tctl.go | connectToAuthService | func connectToAuthService(cfg *service.Config) (client auth.ClientI, err error) {
// connect to the local auth server by default:
cfg.Auth.Enabled = true
if len(cfg.AuthServers) == 0 {
cfg.AuthServers = []utils.NetAddr{
*defaults.AuthConnectAddr(),
}
}
// read the host SSH keys and use them to open an SSH connection to the auth service
i, err := auth.ReadLocalIdentity(filepath.Join(cfg.DataDir, teleport.ComponentProcess), auth.IdentityID{Role: teleport.RoleAdmin, HostUUID: cfg.HostUUID})
if err != nil {
// the "admin" identity is not present? this means the tctl is running NOT on the auth server.
if trace.IsNotFound(err) {
return nil, trace.AccessDenied("tctl must be used on the auth server")
}
return nil, trace.Wrap(err)
}
tlsConfig, err := i.TLSConfig(cfg.CipherSuites)
if err != nil {
return nil, trace.Wrap(err)
}
client, err = auth.NewTLSClient(auth.ClientConfig{Addrs: cfg.AuthServers, TLS: tlsConfig})
if err != nil {
return nil, trace.Wrap(err)
}
// Check connectivity by calling something on the client.
_, err = client.GetClusterName()
if err != nil {
utils.Consolef(os.Stderr, teleport.ComponentClient,
"Cannot connect to the auth server: %v.\nIs the auth server running on %v?",
err, cfg.AuthServers[0].Addr)
os.Exit(1)
}
return client, nil
} | go | func connectToAuthService(cfg *service.Config) (client auth.ClientI, err error) {
// connect to the local auth server by default:
cfg.Auth.Enabled = true
if len(cfg.AuthServers) == 0 {
cfg.AuthServers = []utils.NetAddr{
*defaults.AuthConnectAddr(),
}
}
// read the host SSH keys and use them to open an SSH connection to the auth service
i, err := auth.ReadLocalIdentity(filepath.Join(cfg.DataDir, teleport.ComponentProcess), auth.IdentityID{Role: teleport.RoleAdmin, HostUUID: cfg.HostUUID})
if err != nil {
// the "admin" identity is not present? this means the tctl is running NOT on the auth server.
if trace.IsNotFound(err) {
return nil, trace.AccessDenied("tctl must be used on the auth server")
}
return nil, trace.Wrap(err)
}
tlsConfig, err := i.TLSConfig(cfg.CipherSuites)
if err != nil {
return nil, trace.Wrap(err)
}
client, err = auth.NewTLSClient(auth.ClientConfig{Addrs: cfg.AuthServers, TLS: tlsConfig})
if err != nil {
return nil, trace.Wrap(err)
}
// Check connectivity by calling something on the client.
_, err = client.GetClusterName()
if err != nil {
utils.Consolef(os.Stderr, teleport.ComponentClient,
"Cannot connect to the auth server: %v.\nIs the auth server running on %v?",
err, cfg.AuthServers[0].Addr)
os.Exit(1)
}
return client, nil
} | [
"func",
"connectToAuthService",
"(",
"cfg",
"*",
"service",
".",
"Config",
")",
"(",
"client",
"auth",
".",
"ClientI",
",",
"err",
"error",
")",
"{",
"// connect to the local auth server by default:",
"cfg",
".",
"Auth",
".",
"Enabled",
"=",
"true",
"\n",
"if",
"len",
"(",
"cfg",
".",
"AuthServers",
")",
"==",
"0",
"{",
"cfg",
".",
"AuthServers",
"=",
"[",
"]",
"utils",
".",
"NetAddr",
"{",
"*",
"defaults",
".",
"AuthConnectAddr",
"(",
")",
",",
"}",
"\n",
"}",
"\n",
"// read the host SSH keys and use them to open an SSH connection to the auth service",
"i",
",",
"err",
":=",
"auth",
".",
"ReadLocalIdentity",
"(",
"filepath",
".",
"Join",
"(",
"cfg",
".",
"DataDir",
",",
"teleport",
".",
"ComponentProcess",
")",
",",
"auth",
".",
"IdentityID",
"{",
"Role",
":",
"teleport",
".",
"RoleAdmin",
",",
"HostUUID",
":",
"cfg",
".",
"HostUUID",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// the \"admin\" identity is not present? this means the tctl is running NOT on the auth server.",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"tlsConfig",
",",
"err",
":=",
"i",
".",
"TLSConfig",
"(",
"cfg",
".",
"CipherSuites",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"client",
",",
"err",
"=",
"auth",
".",
"NewTLSClient",
"(",
"auth",
".",
"ClientConfig",
"{",
"Addrs",
":",
"cfg",
".",
"AuthServers",
",",
"TLS",
":",
"tlsConfig",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Check connectivity by calling something on the client.",
"_",
",",
"err",
"=",
"client",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"utils",
".",
"Consolef",
"(",
"os",
".",
"Stderr",
",",
"teleport",
".",
"ComponentClient",
",",
"\"",
"\\n",
"\"",
",",
"err",
",",
"cfg",
".",
"AuthServers",
"[",
"0",
"]",
".",
"Addr",
")",
"\n",
"os",
".",
"Exit",
"(",
"1",
")",
"\n",
"}",
"\n",
"return",
"client",
",",
"nil",
"\n",
"}"
] | // connectToAuthService creates a valid client connection to the auth service | [
"connectToAuthService",
"creates",
"a",
"valid",
"client",
"connection",
"to",
"the",
"auth",
"service"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/tctl.go#L128-L163 | train |
gravitational/teleport | tool/tctl/common/tctl.go | applyConfig | func applyConfig(ccf *GlobalCLIFlags, cfg *service.Config) error {
// load /etc/teleport.yaml and apply it's values:
fileConf, err := config.ReadConfigFile(ccf.ConfigFile)
if err != nil {
return trace.Wrap(err)
}
// if configuration is passed as an environment variable,
// try to decode it and override the config file
if ccf.ConfigString != "" {
fileConf, err = config.ReadFromString(ccf.ConfigString)
if err != nil {
return trace.Wrap(err)
}
}
if err = config.ApplyFileConfig(fileConf, cfg); err != nil {
return trace.Wrap(err)
}
// --debug flag
if ccf.Debug {
cfg.Debug = ccf.Debug
utils.InitLogger(utils.LoggingForCLI, logrus.DebugLevel)
logrus.Debugf("DEBUG logging enabled")
}
// read a host UUID for this node
cfg.HostUUID, err = utils.ReadHostUUID(cfg.DataDir)
if err != nil {
utils.FatalError(err)
}
return nil
} | go | func applyConfig(ccf *GlobalCLIFlags, cfg *service.Config) error {
// load /etc/teleport.yaml and apply it's values:
fileConf, err := config.ReadConfigFile(ccf.ConfigFile)
if err != nil {
return trace.Wrap(err)
}
// if configuration is passed as an environment variable,
// try to decode it and override the config file
if ccf.ConfigString != "" {
fileConf, err = config.ReadFromString(ccf.ConfigString)
if err != nil {
return trace.Wrap(err)
}
}
if err = config.ApplyFileConfig(fileConf, cfg); err != nil {
return trace.Wrap(err)
}
// --debug flag
if ccf.Debug {
cfg.Debug = ccf.Debug
utils.InitLogger(utils.LoggingForCLI, logrus.DebugLevel)
logrus.Debugf("DEBUG logging enabled")
}
// read a host UUID for this node
cfg.HostUUID, err = utils.ReadHostUUID(cfg.DataDir)
if err != nil {
utils.FatalError(err)
}
return nil
} | [
"func",
"applyConfig",
"(",
"ccf",
"*",
"GlobalCLIFlags",
",",
"cfg",
"*",
"service",
".",
"Config",
")",
"error",
"{",
"// load /etc/teleport.yaml and apply it's values:",
"fileConf",
",",
"err",
":=",
"config",
".",
"ReadConfigFile",
"(",
"ccf",
".",
"ConfigFile",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// if configuration is passed as an environment variable,",
"// try to decode it and override the config file",
"if",
"ccf",
".",
"ConfigString",
"!=",
"\"",
"\"",
"{",
"fileConf",
",",
"err",
"=",
"config",
".",
"ReadFromString",
"(",
"ccf",
".",
"ConfigString",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
"=",
"config",
".",
"ApplyFileConfig",
"(",
"fileConf",
",",
"cfg",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// --debug flag",
"if",
"ccf",
".",
"Debug",
"{",
"cfg",
".",
"Debug",
"=",
"ccf",
".",
"Debug",
"\n",
"utils",
".",
"InitLogger",
"(",
"utils",
".",
"LoggingForCLI",
",",
"logrus",
".",
"DebugLevel",
")",
"\n",
"logrus",
".",
"Debugf",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// read a host UUID for this node",
"cfg",
".",
"HostUUID",
",",
"err",
"=",
"utils",
".",
"ReadHostUUID",
"(",
"cfg",
".",
"DataDir",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"utils",
".",
"FatalError",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // applyConfig takes configuration values from the config file and applies
// them to 'service.Config' object | [
"applyConfig",
"takes",
"configuration",
"values",
"from",
"the",
"config",
"file",
"and",
"applies",
"them",
"to",
"service",
".",
"Config",
"object"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/tctl.go#L167-L197 | train |
gravitational/teleport | lib/limiter/limiter.go | SetEnv | func (l *LimiterConfig) SetEnv(v string) error {
if err := json.Unmarshal([]byte(v), l); err != nil {
return trace.Wrap(err, "expected JSON encoded remote certificate")
}
return nil
} | go | func (l *LimiterConfig) SetEnv(v string) error {
if err := json.Unmarshal([]byte(v), l); err != nil {
return trace.Wrap(err, "expected JSON encoded remote certificate")
}
return nil
} | [
"func",
"(",
"l",
"*",
"LimiterConfig",
")",
"SetEnv",
"(",
"v",
"string",
")",
"error",
"{",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"[",
"]",
"byte",
"(",
"v",
")",
",",
"l",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // SetEnv reads LimiterConfig from JSON string | [
"SetEnv",
"reads",
"LimiterConfig",
"from",
"JSON",
"string"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/limiter.go#L49-L54 | train |
gravitational/teleport | lib/limiter/limiter.go | NewLimiter | func NewLimiter(config LimiterConfig) (*Limiter, error) {
var err error
limiter := Limiter{}
limiter.ConnectionsLimiter, err = NewConnectionsLimiter(config)
if err != nil {
return nil, trace.Wrap(err)
}
limiter.rateLimiter, err = NewRateLimiter(config)
if err != nil {
return nil, trace.Wrap(err)
}
return &limiter, nil
} | go | func NewLimiter(config LimiterConfig) (*Limiter, error) {
var err error
limiter := Limiter{}
limiter.ConnectionsLimiter, err = NewConnectionsLimiter(config)
if err != nil {
return nil, trace.Wrap(err)
}
limiter.rateLimiter, err = NewRateLimiter(config)
if err != nil {
return nil, trace.Wrap(err)
}
return &limiter, nil
} | [
"func",
"NewLimiter",
"(",
"config",
"LimiterConfig",
")",
"(",
"*",
"Limiter",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n",
"limiter",
":=",
"Limiter",
"{",
"}",
"\n\n",
"limiter",
".",
"ConnectionsLimiter",
",",
"err",
"=",
"NewConnectionsLimiter",
"(",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"limiter",
".",
"rateLimiter",
",",
"err",
"=",
"NewRateLimiter",
"(",
"config",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"limiter",
",",
"nil",
"\n",
"}"
] | // NewLimiter returns new rate and connection limiter | [
"NewLimiter",
"returns",
"new",
"rate",
"and",
"connection",
"limiter"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/limiter.go#L57-L72 | train |
gravitational/teleport | lib/limiter/limiter.go | WrapHandle | func (l *Limiter) WrapHandle(h http.Handler) {
l.rateLimiter.Wrap(h)
l.ConnLimiter.Wrap(l.rateLimiter)
} | go | func (l *Limiter) WrapHandle(h http.Handler) {
l.rateLimiter.Wrap(h)
l.ConnLimiter.Wrap(l.rateLimiter)
} | [
"func",
"(",
"l",
"*",
"Limiter",
")",
"WrapHandle",
"(",
"h",
"http",
".",
"Handler",
")",
"{",
"l",
".",
"rateLimiter",
".",
"Wrap",
"(",
"h",
")",
"\n",
"l",
".",
"ConnLimiter",
".",
"Wrap",
"(",
"l",
".",
"rateLimiter",
")",
"\n",
"}"
] | // Add limiter to the handle | [
"Add",
"limiter",
"to",
"the",
"handle"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/limiter.go#L79-L82 | train |
gravitational/teleport | lib/web/apiserver.go | SetSessionStreamPollPeriod | func SetSessionStreamPollPeriod(period time.Duration) HandlerOption {
return func(h *Handler) error {
if period < 0 {
return trace.BadParameter("period should be non zero")
}
h.sessionStreamPollPeriod = period
return nil
}
} | go | func SetSessionStreamPollPeriod(period time.Duration) HandlerOption {
return func(h *Handler) error {
if period < 0 {
return trace.BadParameter("period should be non zero")
}
h.sessionStreamPollPeriod = period
return nil
}
} | [
"func",
"SetSessionStreamPollPeriod",
"(",
"period",
"time",
".",
"Duration",
")",
"HandlerOption",
"{",
"return",
"func",
"(",
"h",
"*",
"Handler",
")",
"error",
"{",
"if",
"period",
"<",
"0",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"h",
".",
"sessionStreamPollPeriod",
"=",
"period",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"}"
] | // SetSessionStreamPollPeriod sets polling period for session streams | [
"SetSessionStreamPollPeriod",
"sets",
"polling",
"period",
"for",
"session",
"streams"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L79-L87 | train |
gravitational/teleport | lib/web/apiserver.go | getWebConfig | func (h *Handler) getWebConfig(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
httplib.SetWebConfigHeaders(w.Header())
authProviders := []ui.WebConfigAuthProvider{}
secondFactor := teleport.OFF
// get all OIDC connectors
oidcConnectors, err := h.cfg.ProxyClient.GetOIDCConnectors(false)
if err != nil {
log.Errorf("Cannot retrieve OIDC connectors: %v.", err)
}
for _, item := range oidcConnectors {
authProviders = append(authProviders, ui.WebConfigAuthProvider{
Type: ui.WebConfigAuthProviderOIDCType,
WebAPIURL: ui.WebConfigAuthProviderOIDCURL,
Name: item.GetName(),
DisplayName: item.GetDisplay(),
})
}
// get all SAML connectors
samlConnectors, err := h.cfg.ProxyClient.GetSAMLConnectors(false)
if err != nil {
log.Errorf("Cannot retrieve SAML connectors: %v.", err)
}
for _, item := range samlConnectors {
authProviders = append(authProviders, ui.WebConfigAuthProvider{
Type: ui.WebConfigAuthProviderSAMLType,
WebAPIURL: ui.WebConfigAuthProviderSAMLURL,
Name: item.GetName(),
DisplayName: item.GetDisplay(),
})
}
// get all Github connectors
githubConnectors, err := h.cfg.ProxyClient.GetGithubConnectors(false)
if err != nil {
log.Errorf("Cannot retrieve Github connectors: %v.", err)
}
for _, item := range githubConnectors {
authProviders = append(authProviders, ui.WebConfigAuthProvider{
Type: ui.WebConfigAuthProviderGitHubType,
WebAPIURL: ui.WebConfigAuthProviderGitHubURL,
Name: item.GetName(),
DisplayName: item.GetDisplay(),
})
}
// get second factor type
cap, err := h.cfg.ProxyClient.GetAuthPreference()
if err != nil {
log.Errorf("Cannot retrieve AuthPreferences: %v.", err)
} else {
secondFactor = cap.GetSecondFactor()
}
// disable joining sessions if proxy session recording is enabled
var canJoinSessions = true
clsCfg, err := h.cfg.ProxyClient.GetClusterConfig()
if err != nil {
log.Errorf("Cannot retrieve ClusterConfig: %v.", err)
} else {
canJoinSessions = clsCfg.GetSessionRecording() != services.RecordAtProxy
}
authSettings := ui.WebConfigAuthSettings{
Providers: authProviders,
SecondFactor: secondFactor,
}
webCfg := ui.WebConfig{
Auth: authSettings,
CanJoinSessions: canJoinSessions,
}
out, err := json.Marshal(webCfg)
if err != nil {
return nil, trace.Wrap(err)
}
fmt.Fprintf(w, "var GRV_CONFIG = %v;", string(out))
return nil, nil
} | go | func (h *Handler) getWebConfig(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
httplib.SetWebConfigHeaders(w.Header())
authProviders := []ui.WebConfigAuthProvider{}
secondFactor := teleport.OFF
// get all OIDC connectors
oidcConnectors, err := h.cfg.ProxyClient.GetOIDCConnectors(false)
if err != nil {
log.Errorf("Cannot retrieve OIDC connectors: %v.", err)
}
for _, item := range oidcConnectors {
authProviders = append(authProviders, ui.WebConfigAuthProvider{
Type: ui.WebConfigAuthProviderOIDCType,
WebAPIURL: ui.WebConfigAuthProviderOIDCURL,
Name: item.GetName(),
DisplayName: item.GetDisplay(),
})
}
// get all SAML connectors
samlConnectors, err := h.cfg.ProxyClient.GetSAMLConnectors(false)
if err != nil {
log.Errorf("Cannot retrieve SAML connectors: %v.", err)
}
for _, item := range samlConnectors {
authProviders = append(authProviders, ui.WebConfigAuthProvider{
Type: ui.WebConfigAuthProviderSAMLType,
WebAPIURL: ui.WebConfigAuthProviderSAMLURL,
Name: item.GetName(),
DisplayName: item.GetDisplay(),
})
}
// get all Github connectors
githubConnectors, err := h.cfg.ProxyClient.GetGithubConnectors(false)
if err != nil {
log.Errorf("Cannot retrieve Github connectors: %v.", err)
}
for _, item := range githubConnectors {
authProviders = append(authProviders, ui.WebConfigAuthProvider{
Type: ui.WebConfigAuthProviderGitHubType,
WebAPIURL: ui.WebConfigAuthProviderGitHubURL,
Name: item.GetName(),
DisplayName: item.GetDisplay(),
})
}
// get second factor type
cap, err := h.cfg.ProxyClient.GetAuthPreference()
if err != nil {
log.Errorf("Cannot retrieve AuthPreferences: %v.", err)
} else {
secondFactor = cap.GetSecondFactor()
}
// disable joining sessions if proxy session recording is enabled
var canJoinSessions = true
clsCfg, err := h.cfg.ProxyClient.GetClusterConfig()
if err != nil {
log.Errorf("Cannot retrieve ClusterConfig: %v.", err)
} else {
canJoinSessions = clsCfg.GetSessionRecording() != services.RecordAtProxy
}
authSettings := ui.WebConfigAuthSettings{
Providers: authProviders,
SecondFactor: secondFactor,
}
webCfg := ui.WebConfig{
Auth: authSettings,
CanJoinSessions: canJoinSessions,
}
out, err := json.Marshal(webCfg)
if err != nil {
return nil, trace.Wrap(err)
}
fmt.Fprintf(w, "var GRV_CONFIG = %v;", string(out))
return nil, nil
} | [
"func",
"(",
"h",
"*",
"Handler",
")",
"getWebConfig",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"httplib",
".",
"SetWebConfigHeaders",
"(",
"w",
".",
"Header",
"(",
")",
")",
"\n\n",
"authProviders",
":=",
"[",
"]",
"ui",
".",
"WebConfigAuthProvider",
"{",
"}",
"\n",
"secondFactor",
":=",
"teleport",
".",
"OFF",
"\n\n",
"// get all OIDC connectors",
"oidcConnectors",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
".",
"GetOIDCConnectors",
"(",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"item",
":=",
"range",
"oidcConnectors",
"{",
"authProviders",
"=",
"append",
"(",
"authProviders",
",",
"ui",
".",
"WebConfigAuthProvider",
"{",
"Type",
":",
"ui",
".",
"WebConfigAuthProviderOIDCType",
",",
"WebAPIURL",
":",
"ui",
".",
"WebConfigAuthProviderOIDCURL",
",",
"Name",
":",
"item",
".",
"GetName",
"(",
")",
",",
"DisplayName",
":",
"item",
".",
"GetDisplay",
"(",
")",
",",
"}",
")",
"\n",
"}",
"\n\n",
"// get all SAML connectors",
"samlConnectors",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
".",
"GetSAMLConnectors",
"(",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"item",
":=",
"range",
"samlConnectors",
"{",
"authProviders",
"=",
"append",
"(",
"authProviders",
",",
"ui",
".",
"WebConfigAuthProvider",
"{",
"Type",
":",
"ui",
".",
"WebConfigAuthProviderSAMLType",
",",
"WebAPIURL",
":",
"ui",
".",
"WebConfigAuthProviderSAMLURL",
",",
"Name",
":",
"item",
".",
"GetName",
"(",
")",
",",
"DisplayName",
":",
"item",
".",
"GetDisplay",
"(",
")",
",",
"}",
")",
"\n",
"}",
"\n\n",
"// get all Github connectors",
"githubConnectors",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
".",
"GetGithubConnectors",
"(",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"item",
":=",
"range",
"githubConnectors",
"{",
"authProviders",
"=",
"append",
"(",
"authProviders",
",",
"ui",
".",
"WebConfigAuthProvider",
"{",
"Type",
":",
"ui",
".",
"WebConfigAuthProviderGitHubType",
",",
"WebAPIURL",
":",
"ui",
".",
"WebConfigAuthProviderGitHubURL",
",",
"Name",
":",
"item",
".",
"GetName",
"(",
")",
",",
"DisplayName",
":",
"item",
".",
"GetDisplay",
"(",
")",
",",
"}",
")",
"\n",
"}",
"\n\n",
"// get second factor type",
"cap",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
".",
"GetAuthPreference",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"else",
"{",
"secondFactor",
"=",
"cap",
".",
"GetSecondFactor",
"(",
")",
"\n",
"}",
"\n\n",
"// disable joining sessions if proxy session recording is enabled",
"var",
"canJoinSessions",
"=",
"true",
"\n",
"clsCfg",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
".",
"GetClusterConfig",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"else",
"{",
"canJoinSessions",
"=",
"clsCfg",
".",
"GetSessionRecording",
"(",
")",
"!=",
"services",
".",
"RecordAtProxy",
"\n",
"}",
"\n\n",
"authSettings",
":=",
"ui",
".",
"WebConfigAuthSettings",
"{",
"Providers",
":",
"authProviders",
",",
"SecondFactor",
":",
"secondFactor",
",",
"}",
"\n\n",
"webCfg",
":=",
"ui",
".",
"WebConfig",
"{",
"Auth",
":",
"authSettings",
",",
"CanJoinSessions",
":",
"canJoinSessions",
",",
"}",
"\n\n",
"out",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"webCfg",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"fmt",
".",
"Fprintf",
"(",
"w",
",",
"\"",
"\"",
",",
"string",
"(",
"out",
")",
")",
"\n",
"return",
"nil",
",",
"nil",
"\n",
"}"
] | // getWebConfig returns configuration for the web application. | [
"getWebConfig",
"returns",
"configuration",
"for",
"the",
"web",
"application",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L577-L659 | train |
gravitational/teleport | lib/web/apiserver.go | ConstructSSHResponse | func ConstructSSHResponse(response AuthParams) (*url.URL, error) {
u, err := url.Parse(response.ClientRedirectURL)
if err != nil {
return nil, trace.Wrap(err)
}
consoleResponse := auth.SSHLoginResponse{
Username: response.Username,
Cert: response.Cert,
TLSCert: response.TLSCert,
HostSigners: auth.AuthoritiesToTrustedCerts(response.HostSigners),
}
out, err := json.Marshal(consoleResponse)
if err != nil {
return nil, trace.Wrap(err)
}
// Extract secret out of the request. Look for both "secret" which is the
// old format and "secret_key" which is the new fomat. If this is not done,
// then users would have to update their callback URL in their identity
// provider.
values := u.Query()
secretV1 := values.Get("secret")
secretV2 := values.Get("secret_key")
values.Set("secret", "")
values.Set("secret_key", "")
var ciphertext []byte
switch {
// AES-GCM based symmetric cipher.
case secretV2 != "":
key, err := secret.ParseKey([]byte(secretV2))
if err != nil {
return nil, trace.Wrap(err)
}
ciphertext, err = key.Seal(out)
if err != nil {
return nil, trace.Wrap(err)
}
// NaCl based symmetric cipher (legacy).
case secretV1 != "":
secretKeyBytes, err := lemma_secret.EncodedStringToKey(secretV1)
if err != nil {
return nil, trace.BadParameter("bad secret")
}
encryptor, err := lemma_secret.New(&lemma_secret.Config{KeyBytes: secretKeyBytes})
if err != nil {
return nil, trace.Wrap(err)
}
sealedBytes, err := encryptor.Seal(out)
if err != nil {
return nil, trace.Wrap(err)
}
ciphertext, err = json.Marshal(sealedBytes)
if err != nil {
return nil, trace.Wrap(err)
}
default:
return nil, trace.BadParameter("missing secret")
}
// Place ciphertext into the response body.
values.Set("response", string(ciphertext))
u.RawQuery = values.Encode()
return u, nil
} | go | func ConstructSSHResponse(response AuthParams) (*url.URL, error) {
u, err := url.Parse(response.ClientRedirectURL)
if err != nil {
return nil, trace.Wrap(err)
}
consoleResponse := auth.SSHLoginResponse{
Username: response.Username,
Cert: response.Cert,
TLSCert: response.TLSCert,
HostSigners: auth.AuthoritiesToTrustedCerts(response.HostSigners),
}
out, err := json.Marshal(consoleResponse)
if err != nil {
return nil, trace.Wrap(err)
}
// Extract secret out of the request. Look for both "secret" which is the
// old format and "secret_key" which is the new fomat. If this is not done,
// then users would have to update their callback URL in their identity
// provider.
values := u.Query()
secretV1 := values.Get("secret")
secretV2 := values.Get("secret_key")
values.Set("secret", "")
values.Set("secret_key", "")
var ciphertext []byte
switch {
// AES-GCM based symmetric cipher.
case secretV2 != "":
key, err := secret.ParseKey([]byte(secretV2))
if err != nil {
return nil, trace.Wrap(err)
}
ciphertext, err = key.Seal(out)
if err != nil {
return nil, trace.Wrap(err)
}
// NaCl based symmetric cipher (legacy).
case secretV1 != "":
secretKeyBytes, err := lemma_secret.EncodedStringToKey(secretV1)
if err != nil {
return nil, trace.BadParameter("bad secret")
}
encryptor, err := lemma_secret.New(&lemma_secret.Config{KeyBytes: secretKeyBytes})
if err != nil {
return nil, trace.Wrap(err)
}
sealedBytes, err := encryptor.Seal(out)
if err != nil {
return nil, trace.Wrap(err)
}
ciphertext, err = json.Marshal(sealedBytes)
if err != nil {
return nil, trace.Wrap(err)
}
default:
return nil, trace.BadParameter("missing secret")
}
// Place ciphertext into the response body.
values.Set("response", string(ciphertext))
u.RawQuery = values.Encode()
return u, nil
} | [
"func",
"ConstructSSHResponse",
"(",
"response",
"AuthParams",
")",
"(",
"*",
"url",
".",
"URL",
",",
"error",
")",
"{",
"u",
",",
"err",
":=",
"url",
".",
"Parse",
"(",
"response",
".",
"ClientRedirectURL",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"consoleResponse",
":=",
"auth",
".",
"SSHLoginResponse",
"{",
"Username",
":",
"response",
".",
"Username",
",",
"Cert",
":",
"response",
".",
"Cert",
",",
"TLSCert",
":",
"response",
".",
"TLSCert",
",",
"HostSigners",
":",
"auth",
".",
"AuthoritiesToTrustedCerts",
"(",
"response",
".",
"HostSigners",
")",
",",
"}",
"\n",
"out",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"consoleResponse",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Extract secret out of the request. Look for both \"secret\" which is the",
"// old format and \"secret_key\" which is the new fomat. If this is not done,",
"// then users would have to update their callback URL in their identity",
"// provider.",
"values",
":=",
"u",
".",
"Query",
"(",
")",
"\n",
"secretV1",
":=",
"values",
".",
"Get",
"(",
"\"",
"\"",
")",
"\n",
"secretV2",
":=",
"values",
".",
"Get",
"(",
"\"",
"\"",
")",
"\n",
"values",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"values",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n\n",
"var",
"ciphertext",
"[",
"]",
"byte",
"\n\n",
"switch",
"{",
"// AES-GCM based symmetric cipher.",
"case",
"secretV2",
"!=",
"\"",
"\"",
":",
"key",
",",
"err",
":=",
"secret",
".",
"ParseKey",
"(",
"[",
"]",
"byte",
"(",
"secretV2",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"ciphertext",
",",
"err",
"=",
"key",
".",
"Seal",
"(",
"out",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// NaCl based symmetric cipher (legacy).",
"case",
"secretV1",
"!=",
"\"",
"\"",
":",
"secretKeyBytes",
",",
"err",
":=",
"lemma_secret",
".",
"EncodedStringToKey",
"(",
"secretV1",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"encryptor",
",",
"err",
":=",
"lemma_secret",
".",
"New",
"(",
"&",
"lemma_secret",
".",
"Config",
"{",
"KeyBytes",
":",
"secretKeyBytes",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"sealedBytes",
",",
"err",
":=",
"encryptor",
".",
"Seal",
"(",
"out",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"ciphertext",
",",
"err",
"=",
"json",
".",
"Marshal",
"(",
"sealedBytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// Place ciphertext into the response body.",
"values",
".",
"Set",
"(",
"\"",
"\"",
",",
"string",
"(",
"ciphertext",
")",
")",
"\n\n",
"u",
".",
"RawQuery",
"=",
"values",
".",
"Encode",
"(",
")",
"\n",
"return",
"u",
",",
"nil",
"\n",
"}"
] | // ConstructSSHResponse creates a special SSH response for SSH login method
// that encodes everything using the client's secret key | [
"ConstructSSHResponse",
"creates",
"a",
"special",
"SSH",
"response",
"for",
"SSH",
"login",
"method",
"that",
"encodes",
"everything",
"using",
"the",
"client",
"s",
"secret",
"key"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L901-L967 | train |
gravitational/teleport | lib/web/apiserver.go | queryTime | func queryTime(query url.Values, name string, def time.Time) (time.Time, error) {
str := query.Get(name)
if str == "" {
return def, nil
}
parsed, err := time.Parse(time.RFC3339, str)
if err != nil {
return time.Time{}, trace.BadParameter("failed to parse %v as RFC3339 time: %v", name, str)
}
return parsed, nil
} | go | func queryTime(query url.Values, name string, def time.Time) (time.Time, error) {
str := query.Get(name)
if str == "" {
return def, nil
}
parsed, err := time.Parse(time.RFC3339, str)
if err != nil {
return time.Time{}, trace.BadParameter("failed to parse %v as RFC3339 time: %v", name, str)
}
return parsed, nil
} | [
"func",
"queryTime",
"(",
"query",
"url",
".",
"Values",
",",
"name",
"string",
",",
"def",
"time",
".",
"Time",
")",
"(",
"time",
".",
"Time",
",",
"error",
")",
"{",
"str",
":=",
"query",
".",
"Get",
"(",
"name",
")",
"\n",
"if",
"str",
"==",
"\"",
"\"",
"{",
"return",
"def",
",",
"nil",
"\n",
"}",
"\n",
"parsed",
",",
"err",
":=",
"time",
".",
"Parse",
"(",
"time",
".",
"RFC3339",
",",
"str",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"time",
".",
"Time",
"{",
"}",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"name",
",",
"str",
")",
"\n",
"}",
"\n",
"return",
"parsed",
",",
"nil",
"\n",
"}"
] | // queryTime parses the query string parameter with the specified name as a
// RFC3339 time and returns it.
//
// If there's no such parameter, specified default value is returned. | [
"queryTime",
"parses",
"the",
"query",
"string",
"parameter",
"with",
"the",
"specified",
"name",
"as",
"a",
"RFC3339",
"time",
"and",
"returns",
"it",
".",
"If",
"there",
"s",
"no",
"such",
"parameter",
"specified",
"default",
"value",
"is",
"returned",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1643-L1653 | train |
gravitational/teleport | lib/web/apiserver.go | queryLimit | func queryLimit(query url.Values, name string, def int) (int, error) {
str := query.Get(name)
if str == "" {
return def, nil
}
limit, err := strconv.Atoi(str)
if err != nil {
return 0, trace.BadParameter("failed to parse %v as limit: %v", name, str)
}
return limit, nil
} | go | func queryLimit(query url.Values, name string, def int) (int, error) {
str := query.Get(name)
if str == "" {
return def, nil
}
limit, err := strconv.Atoi(str)
if err != nil {
return 0, trace.BadParameter("failed to parse %v as limit: %v", name, str)
}
return limit, nil
} | [
"func",
"queryLimit",
"(",
"query",
"url",
".",
"Values",
",",
"name",
"string",
",",
"def",
"int",
")",
"(",
"int",
",",
"error",
")",
"{",
"str",
":=",
"query",
".",
"Get",
"(",
"name",
")",
"\n",
"if",
"str",
"==",
"\"",
"\"",
"{",
"return",
"def",
",",
"nil",
"\n",
"}",
"\n",
"limit",
",",
"err",
":=",
"strconv",
".",
"Atoi",
"(",
"str",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"0",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"name",
",",
"str",
")",
"\n",
"}",
"\n",
"return",
"limit",
",",
"nil",
"\n",
"}"
] | // queryLimit returns the limit parameter with the specified name from the
// query string.
//
// If there's no such parameter, specified default limit is returned. | [
"queryLimit",
"returns",
"the",
"limit",
"parameter",
"with",
"the",
"specified",
"name",
"from",
"the",
"query",
"string",
".",
"If",
"there",
"s",
"no",
"such",
"parameter",
"specified",
"default",
"limit",
"is",
"returned",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1659-L1669 | train |
gravitational/teleport | lib/web/apiserver.go | hostCredentials | func (h *Handler) hostCredentials(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
var req auth.RegisterUsingTokenRequest
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
authClient := h.cfg.ProxyClient
packedKeys, err := authClient.RegisterUsingToken(req)
if err != nil {
return nil, trace.Wrap(err)
}
return packedKeys, nil
} | go | func (h *Handler) hostCredentials(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
var req auth.RegisterUsingTokenRequest
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
authClient := h.cfg.ProxyClient
packedKeys, err := authClient.RegisterUsingToken(req)
if err != nil {
return nil, trace.Wrap(err)
}
return packedKeys, nil
} | [
"func",
"(",
"h",
"*",
"Handler",
")",
"hostCredentials",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"var",
"req",
"auth",
".",
"RegisterUsingTokenRequest",
"\n",
"if",
"err",
":=",
"httplib",
".",
"ReadJSON",
"(",
"r",
",",
"&",
"req",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"authClient",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
"\n",
"packedKeys",
",",
"err",
":=",
"authClient",
".",
"RegisterUsingToken",
"(",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"packedKeys",
",",
"nil",
"\n",
"}"
] | // hostCredentials sends a registration token and metadata to the Auth Server
// and gets back SSH and TLS certificates. | [
"hostCredentials",
"sends",
"a",
"registration",
"token",
"and",
"metadata",
"to",
"the",
"Auth",
"Server",
"and",
"gets",
"back",
"SSH",
"and",
"TLS",
"certificates",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1832-L1845 | train |
gravitational/teleport | lib/web/apiserver.go | WithClusterAuth | func (h *Handler) WithClusterAuth(fn ClusterHandler) httprouter.Handle {
return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
ctx, err := h.AuthenticateRequest(w, r, true)
if err != nil {
log.Info(err)
// clear session just in case if the authentication request is not valid
ClearSession(w)
return nil, trace.Wrap(err)
}
siteName := p.ByName("site")
if siteName == currentSiteShortcut {
res, err := h.cfg.ProxyClient.GetClusterName()
if err != nil {
log.Warn(err)
return nil, trace.Wrap(err)
}
siteName = res.GetClusterName()
}
site, err := h.cfg.Proxy.GetSite(siteName)
if err != nil {
log.Warn(err)
return nil, trace.Wrap(err)
}
return fn(w, r, p, ctx, site)
})
} | go | func (h *Handler) WithClusterAuth(fn ClusterHandler) httprouter.Handle {
return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
ctx, err := h.AuthenticateRequest(w, r, true)
if err != nil {
log.Info(err)
// clear session just in case if the authentication request is not valid
ClearSession(w)
return nil, trace.Wrap(err)
}
siteName := p.ByName("site")
if siteName == currentSiteShortcut {
res, err := h.cfg.ProxyClient.GetClusterName()
if err != nil {
log.Warn(err)
return nil, trace.Wrap(err)
}
siteName = res.GetClusterName()
}
site, err := h.cfg.Proxy.GetSite(siteName)
if err != nil {
log.Warn(err)
return nil, trace.Wrap(err)
}
return fn(w, r, p, ctx, site)
})
} | [
"func",
"(",
"h",
"*",
"Handler",
")",
"WithClusterAuth",
"(",
"fn",
"ClusterHandler",
")",
"httprouter",
".",
"Handle",
"{",
"return",
"httplib",
".",
"MakeHandler",
"(",
"func",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"ctx",
",",
"err",
":=",
"h",
".",
"AuthenticateRequest",
"(",
"w",
",",
"r",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Info",
"(",
"err",
")",
"\n",
"// clear session just in case if the authentication request is not valid",
"ClearSession",
"(",
"w",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"siteName",
":=",
"p",
".",
"ByName",
"(",
"\"",
"\"",
")",
"\n",
"if",
"siteName",
"==",
"currentSiteShortcut",
"{",
"res",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"ProxyClient",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warn",
"(",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"siteName",
"=",
"res",
".",
"GetClusterName",
"(",
")",
"\n",
"}",
"\n",
"site",
",",
"err",
":=",
"h",
".",
"cfg",
".",
"Proxy",
".",
"GetSite",
"(",
"siteName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Warn",
"(",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"fn",
"(",
"w",
",",
"r",
",",
"p",
",",
"ctx",
",",
"site",
")",
"\n",
"}",
")",
"\n",
"}"
] | // WithClusterAuth ensures that request is authenticated and is issued for existing cluster | [
"WithClusterAuth",
"ensures",
"that",
"request",
"is",
"authenticated",
"and",
"is",
"issued",
"for",
"existing",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L1976-L2003 | train |
gravitational/teleport | lib/web/apiserver.go | WithAuth | func (h *Handler) WithAuth(fn ContextHandler) httprouter.Handle {
return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
ctx, err := h.AuthenticateRequest(w, r, true)
if err != nil {
return nil, trace.Wrap(err)
}
return fn(w, r, p, ctx)
})
} | go | func (h *Handler) WithAuth(fn ContextHandler) httprouter.Handle {
return httplib.MakeHandler(func(w http.ResponseWriter, r *http.Request, p httprouter.Params) (interface{}, error) {
ctx, err := h.AuthenticateRequest(w, r, true)
if err != nil {
return nil, trace.Wrap(err)
}
return fn(w, r, p, ctx)
})
} | [
"func",
"(",
"h",
"*",
"Handler",
")",
"WithAuth",
"(",
"fn",
"ContextHandler",
")",
"httprouter",
".",
"Handle",
"{",
"return",
"httplib",
".",
"MakeHandler",
"(",
"func",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"ctx",
",",
"err",
":=",
"h",
".",
"AuthenticateRequest",
"(",
"w",
",",
"r",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"fn",
"(",
"w",
",",
"r",
",",
"p",
",",
"ctx",
")",
"\n",
"}",
")",
"\n",
"}"
] | // WithAuth ensures that request is authenticated | [
"WithAuth",
"ensures",
"that",
"request",
"is",
"authenticated"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2006-L2014 | train |
gravitational/teleport | lib/web/apiserver.go | AuthenticateRequest | func (h *Handler) AuthenticateRequest(w http.ResponseWriter, r *http.Request, checkBearerToken bool) (*SessionContext, error) {
const missingCookieMsg = "missing session cookie"
logger := log.WithFields(log.Fields{
"request": fmt.Sprintf("%v %v", r.Method, r.URL.Path),
})
cookie, err := r.Cookie("session")
if err != nil || (cookie != nil && cookie.Value == "") {
if err != nil {
logger.Warn(err)
}
return nil, trace.AccessDenied(missingCookieMsg)
}
d, err := DecodeCookie(cookie.Value)
if err != nil {
logger.Warningf("failed to decode cookie: %v", err)
return nil, trace.AccessDenied("failed to decode cookie")
}
ctx, err := h.auth.ValidateSession(d.User, d.SID)
if err != nil {
logger.Warningf("invalid session: %v", err)
ClearSession(w)
return nil, trace.AccessDenied("need auth")
}
if checkBearerToken {
creds, err := roundtrip.ParseAuthHeaders(r)
if err != nil {
logger.Warningf("no auth headers %v", err)
return nil, trace.AccessDenied("need auth")
}
if subtle.ConstantTimeCompare([]byte(creds.Password), []byte(ctx.GetWebSession().GetBearerToken())) != 1 {
logger.Warningf("Request failed: bad bearer token.")
return nil, trace.AccessDenied("bad bearer token")
}
}
return ctx, nil
} | go | func (h *Handler) AuthenticateRequest(w http.ResponseWriter, r *http.Request, checkBearerToken bool) (*SessionContext, error) {
const missingCookieMsg = "missing session cookie"
logger := log.WithFields(log.Fields{
"request": fmt.Sprintf("%v %v", r.Method, r.URL.Path),
})
cookie, err := r.Cookie("session")
if err != nil || (cookie != nil && cookie.Value == "") {
if err != nil {
logger.Warn(err)
}
return nil, trace.AccessDenied(missingCookieMsg)
}
d, err := DecodeCookie(cookie.Value)
if err != nil {
logger.Warningf("failed to decode cookie: %v", err)
return nil, trace.AccessDenied("failed to decode cookie")
}
ctx, err := h.auth.ValidateSession(d.User, d.SID)
if err != nil {
logger.Warningf("invalid session: %v", err)
ClearSession(w)
return nil, trace.AccessDenied("need auth")
}
if checkBearerToken {
creds, err := roundtrip.ParseAuthHeaders(r)
if err != nil {
logger.Warningf("no auth headers %v", err)
return nil, trace.AccessDenied("need auth")
}
if subtle.ConstantTimeCompare([]byte(creds.Password), []byte(ctx.GetWebSession().GetBearerToken())) != 1 {
logger.Warningf("Request failed: bad bearer token.")
return nil, trace.AccessDenied("bad bearer token")
}
}
return ctx, nil
} | [
"func",
"(",
"h",
"*",
"Handler",
")",
"AuthenticateRequest",
"(",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"checkBearerToken",
"bool",
")",
"(",
"*",
"SessionContext",
",",
"error",
")",
"{",
"const",
"missingCookieMsg",
"=",
"\"",
"\"",
"\n",
"logger",
":=",
"log",
".",
"WithFields",
"(",
"log",
".",
"Fields",
"{",
"\"",
"\"",
":",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"r",
".",
"Method",
",",
"r",
".",
"URL",
".",
"Path",
")",
",",
"}",
")",
"\n",
"cookie",
",",
"err",
":=",
"r",
".",
"Cookie",
"(",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"||",
"(",
"cookie",
"!=",
"nil",
"&&",
"cookie",
".",
"Value",
"==",
"\"",
"\"",
")",
"{",
"if",
"err",
"!=",
"nil",
"{",
"logger",
".",
"Warn",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"missingCookieMsg",
")",
"\n",
"}",
"\n",
"d",
",",
"err",
":=",
"DecodeCookie",
"(",
"cookie",
".",
"Value",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logger",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"ctx",
",",
"err",
":=",
"h",
".",
"auth",
".",
"ValidateSession",
"(",
"d",
".",
"User",
",",
"d",
".",
"SID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logger",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"ClearSession",
"(",
"w",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"checkBearerToken",
"{",
"creds",
",",
"err",
":=",
"roundtrip",
".",
"ParseAuthHeaders",
"(",
"r",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"logger",
".",
"Warningf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"if",
"subtle",
".",
"ConstantTimeCompare",
"(",
"[",
"]",
"byte",
"(",
"creds",
".",
"Password",
")",
",",
"[",
"]",
"byte",
"(",
"ctx",
".",
"GetWebSession",
"(",
")",
".",
"GetBearerToken",
"(",
")",
")",
")",
"!=",
"1",
"{",
"logger",
".",
"Warningf",
"(",
"\"",
"\"",
")",
"\n",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"ctx",
",",
"nil",
"\n",
"}"
] | // AuthenticateRequest authenticates request using combination of a session cookie
// and bearer token | [
"AuthenticateRequest",
"authenticates",
"request",
"using",
"combination",
"of",
"a",
"session",
"cookie",
"and",
"bearer",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2018-L2054 | train |
gravitational/teleport | lib/web/apiserver.go | CreateSignupLink | func CreateSignupLink(client auth.ClientI, token string) (string, string) {
proxyHost := "<proxyhost>:3080"
proxies, err := client.GetProxies()
if err != nil {
log.Errorf("Unable to retrieve proxy list: %v", err)
}
if len(proxies) > 0 {
proxyHost = proxies[0].GetPublicAddr()
if proxyHost == "" {
proxyHost = fmt.Sprintf("%v:%v", proxies[0].GetHostname(), defaults.HTTPListenPort)
log.Debugf("public_address not set for proxy, returning proxyHost: %q", proxyHost)
}
}
u := &url.URL{
Scheme: "https",
Host: proxyHost,
Path: "web/newuser/" + token,
}
return u.String(), proxyHost
} | go | func CreateSignupLink(client auth.ClientI, token string) (string, string) {
proxyHost := "<proxyhost>:3080"
proxies, err := client.GetProxies()
if err != nil {
log.Errorf("Unable to retrieve proxy list: %v", err)
}
if len(proxies) > 0 {
proxyHost = proxies[0].GetPublicAddr()
if proxyHost == "" {
proxyHost = fmt.Sprintf("%v:%v", proxies[0].GetHostname(), defaults.HTTPListenPort)
log.Debugf("public_address not set for proxy, returning proxyHost: %q", proxyHost)
}
}
u := &url.URL{
Scheme: "https",
Host: proxyHost,
Path: "web/newuser/" + token,
}
return u.String(), proxyHost
} | [
"func",
"CreateSignupLink",
"(",
"client",
"auth",
".",
"ClientI",
",",
"token",
"string",
")",
"(",
"string",
",",
"string",
")",
"{",
"proxyHost",
":=",
"\"",
"\"",
"\n\n",
"proxies",
",",
"err",
":=",
"client",
".",
"GetProxies",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"len",
"(",
"proxies",
")",
">",
"0",
"{",
"proxyHost",
"=",
"proxies",
"[",
"0",
"]",
".",
"GetPublicAddr",
"(",
")",
"\n",
"if",
"proxyHost",
"==",
"\"",
"\"",
"{",
"proxyHost",
"=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"proxies",
"[",
"0",
"]",
".",
"GetHostname",
"(",
")",
",",
"defaults",
".",
"HTTPListenPort",
")",
"\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"proxyHost",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"u",
":=",
"&",
"url",
".",
"URL",
"{",
"Scheme",
":",
"\"",
"\"",
",",
"Host",
":",
"proxyHost",
",",
"Path",
":",
"\"",
"\"",
"+",
"token",
",",
"}",
"\n",
"return",
"u",
".",
"String",
"(",
")",
",",
"proxyHost",
"\n",
"}"
] | // CreateSignupLink generates and returns a URL which is given to a new
// user to complete registration with Teleport via Web UI | [
"CreateSignupLink",
"generates",
"and",
"returns",
"a",
"URL",
"which",
"is",
"given",
"to",
"a",
"new",
"user",
"to",
"complete",
"registration",
"with",
"Teleport",
"via",
"Web",
"UI"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2080-L2102 | train |
gravitational/teleport | lib/web/apiserver.go | makeTeleportClientConfig | func makeTeleportClientConfig(ctx *SessionContext) (*client.Config, error) {
agent, cert, err := ctx.GetAgent()
if err != nil {
return nil, trace.BadParameter("failed to get user credentials: %v", err)
}
signers, err := agent.Signers()
if err != nil {
return nil, trace.BadParameter("failed to get user credentials: %v", err)
}
tlsConfig, err := ctx.ClientTLSConfig()
if err != nil {
return nil, trace.BadParameter("failed to get client TLS config: %v", err)
}
config := &client.Config{
Username: ctx.user,
Agent: agent,
SkipLocalAuth: true,
TLS: tlsConfig,
AuthMethods: []ssh.AuthMethod{ssh.PublicKeys(signers...)},
DefaultPrincipal: cert.ValidPrincipals[0],
HostKeyCallback: func(string, net.Addr, ssh.PublicKey) error { return nil },
}
return config, nil
} | go | func makeTeleportClientConfig(ctx *SessionContext) (*client.Config, error) {
agent, cert, err := ctx.GetAgent()
if err != nil {
return nil, trace.BadParameter("failed to get user credentials: %v", err)
}
signers, err := agent.Signers()
if err != nil {
return nil, trace.BadParameter("failed to get user credentials: %v", err)
}
tlsConfig, err := ctx.ClientTLSConfig()
if err != nil {
return nil, trace.BadParameter("failed to get client TLS config: %v", err)
}
config := &client.Config{
Username: ctx.user,
Agent: agent,
SkipLocalAuth: true,
TLS: tlsConfig,
AuthMethods: []ssh.AuthMethod{ssh.PublicKeys(signers...)},
DefaultPrincipal: cert.ValidPrincipals[0],
HostKeyCallback: func(string, net.Addr, ssh.PublicKey) error { return nil },
}
return config, nil
} | [
"func",
"makeTeleportClientConfig",
"(",
"ctx",
"*",
"SessionContext",
")",
"(",
"*",
"client",
".",
"Config",
",",
"error",
")",
"{",
"agent",
",",
"cert",
",",
"err",
":=",
"ctx",
".",
"GetAgent",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"signers",
",",
"err",
":=",
"agent",
".",
"Signers",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"tlsConfig",
",",
"err",
":=",
"ctx",
".",
"ClientTLSConfig",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"config",
":=",
"&",
"client",
".",
"Config",
"{",
"Username",
":",
"ctx",
".",
"user",
",",
"Agent",
":",
"agent",
",",
"SkipLocalAuth",
":",
"true",
",",
"TLS",
":",
"tlsConfig",
",",
"AuthMethods",
":",
"[",
"]",
"ssh",
".",
"AuthMethod",
"{",
"ssh",
".",
"PublicKeys",
"(",
"signers",
"...",
")",
"}",
",",
"DefaultPrincipal",
":",
"cert",
".",
"ValidPrincipals",
"[",
"0",
"]",
",",
"HostKeyCallback",
":",
"func",
"(",
"string",
",",
"net",
".",
"Addr",
",",
"ssh",
".",
"PublicKey",
")",
"error",
"{",
"return",
"nil",
"}",
",",
"}",
"\n\n",
"return",
"config",
",",
"nil",
"\n",
"}"
] | // makeTeleportClientConfig creates default teleport client configuration
// that is used to initiate an SSH terminal session or SCP file transfer | [
"makeTeleportClientConfig",
"creates",
"default",
"teleport",
"client",
"configuration",
"that",
"is",
"used",
"to",
"initiate",
"an",
"SSH",
"terminal",
"session",
"or",
"SCP",
"file",
"transfer"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/web/apiserver.go#L2114-L2141 | train |
gravitational/teleport | lib/client/keyagent.go | LoadKey | func (a *LocalKeyAgent) LoadKey(key Key) (*agent.AddedKey, error) {
agents := []agent.Agent{a.Agent}
if a.sshAgent != nil {
agents = append(agents, a.sshAgent)
}
// convert keys into a format understood by the ssh agent
agentKeys, err := key.AsAgentKeys()
if err != nil {
return nil, trace.Wrap(err)
}
// remove any keys that the user may already have loaded
err = a.UnloadKey()
if err != nil {
return nil, trace.Wrap(err)
}
// iterate over all teleport and system agent and load key
for i, _ := range agents {
for _, agentKey := range agentKeys {
err = agents[i].Add(*agentKey)
if err != nil {
a.log.Warnf("Unable to communicate with agent and add key: %v", err)
}
}
}
// return the first key because it has the embedded private key in it.
// see docs for AsAgentKeys for more details.
return agentKeys[0], nil
} | go | func (a *LocalKeyAgent) LoadKey(key Key) (*agent.AddedKey, error) {
agents := []agent.Agent{a.Agent}
if a.sshAgent != nil {
agents = append(agents, a.sshAgent)
}
// convert keys into a format understood by the ssh agent
agentKeys, err := key.AsAgentKeys()
if err != nil {
return nil, trace.Wrap(err)
}
// remove any keys that the user may already have loaded
err = a.UnloadKey()
if err != nil {
return nil, trace.Wrap(err)
}
// iterate over all teleport and system agent and load key
for i, _ := range agents {
for _, agentKey := range agentKeys {
err = agents[i].Add(*agentKey)
if err != nil {
a.log.Warnf("Unable to communicate with agent and add key: %v", err)
}
}
}
// return the first key because it has the embedded private key in it.
// see docs for AsAgentKeys for more details.
return agentKeys[0], nil
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"LoadKey",
"(",
"key",
"Key",
")",
"(",
"*",
"agent",
".",
"AddedKey",
",",
"error",
")",
"{",
"agents",
":=",
"[",
"]",
"agent",
".",
"Agent",
"{",
"a",
".",
"Agent",
"}",
"\n",
"if",
"a",
".",
"sshAgent",
"!=",
"nil",
"{",
"agents",
"=",
"append",
"(",
"agents",
",",
"a",
".",
"sshAgent",
")",
"\n",
"}",
"\n\n",
"// convert keys into a format understood by the ssh agent",
"agentKeys",
",",
"err",
":=",
"key",
".",
"AsAgentKeys",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// remove any keys that the user may already have loaded",
"err",
"=",
"a",
".",
"UnloadKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// iterate over all teleport and system agent and load key",
"for",
"i",
",",
"_",
":=",
"range",
"agents",
"{",
"for",
"_",
",",
"agentKey",
":=",
"range",
"agentKeys",
"{",
"err",
"=",
"agents",
"[",
"i",
"]",
".",
"Add",
"(",
"*",
"agentKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"a",
".",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"// return the first key because it has the embedded private key in it.",
"// see docs for AsAgentKeys for more details.",
"return",
"agentKeys",
"[",
"0",
"]",
",",
"nil",
"\n",
"}"
] | // LoadKey adds a key into the Teleport ssh agent as well as the system ssh
// agent. | [
"LoadKey",
"adds",
"a",
"key",
"into",
"the",
"Teleport",
"ssh",
"agent",
"as",
"well",
"as",
"the",
"system",
"ssh",
"agent",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L123-L154 | train |
gravitational/teleport | lib/client/keyagent.go | UnloadKey | func (a *LocalKeyAgent) UnloadKey() error {
agents := []agent.Agent{a.Agent}
if a.sshAgent != nil {
agents = append(agents, a.sshAgent)
}
// iterate over all agents we have and unload keys for this user
for i, _ := range agents {
// get a list of all keys in the agent
keyList, err := agents[i].List()
if err != nil {
a.log.Warnf("Unable to communicate with agent and list keys: %v", err)
}
// remove any teleport keys we currently have loaded in the agent for this user
for _, key := range keyList {
if key.Comment == fmt.Sprintf("teleport:%v", a.username) {
err = agents[i].Remove(key)
if err != nil {
a.log.Warnf("Unable to communicate with agent and remove key: %v", err)
}
}
}
}
return nil
} | go | func (a *LocalKeyAgent) UnloadKey() error {
agents := []agent.Agent{a.Agent}
if a.sshAgent != nil {
agents = append(agents, a.sshAgent)
}
// iterate over all agents we have and unload keys for this user
for i, _ := range agents {
// get a list of all keys in the agent
keyList, err := agents[i].List()
if err != nil {
a.log.Warnf("Unable to communicate with agent and list keys: %v", err)
}
// remove any teleport keys we currently have loaded in the agent for this user
for _, key := range keyList {
if key.Comment == fmt.Sprintf("teleport:%v", a.username) {
err = agents[i].Remove(key)
if err != nil {
a.log.Warnf("Unable to communicate with agent and remove key: %v", err)
}
}
}
}
return nil
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"UnloadKey",
"(",
")",
"error",
"{",
"agents",
":=",
"[",
"]",
"agent",
".",
"Agent",
"{",
"a",
".",
"Agent",
"}",
"\n",
"if",
"a",
".",
"sshAgent",
"!=",
"nil",
"{",
"agents",
"=",
"append",
"(",
"agents",
",",
"a",
".",
"sshAgent",
")",
"\n",
"}",
"\n\n",
"// iterate over all agents we have and unload keys for this user",
"for",
"i",
",",
"_",
":=",
"range",
"agents",
"{",
"// get a list of all keys in the agent",
"keyList",
",",
"err",
":=",
"agents",
"[",
"i",
"]",
".",
"List",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"a",
".",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// remove any teleport keys we currently have loaded in the agent for this user",
"for",
"_",
",",
"key",
":=",
"range",
"keyList",
"{",
"if",
"key",
".",
"Comment",
"==",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"a",
".",
"username",
")",
"{",
"err",
"=",
"agents",
"[",
"i",
"]",
".",
"Remove",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"a",
".",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // UnloadKey will unload key for user from the teleport ssh agent as well as
// the system agent. | [
"UnloadKey",
"will",
"unload",
"key",
"for",
"user",
"from",
"the",
"teleport",
"ssh",
"agent",
"as",
"well",
"as",
"the",
"system",
"agent",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L158-L184 | train |
gravitational/teleport | lib/client/keyagent.go | UnloadKeys | func (a *LocalKeyAgent) UnloadKeys() error {
agents := []agent.Agent{a.Agent}
if a.sshAgent != nil {
agents = append(agents, a.sshAgent)
}
// iterate over all agents we have
for i, _ := range agents {
// get a list of all keys in the agent
keyList, err := agents[i].List()
if err != nil {
a.log.Warnf("Unable to communicate with agent and list keys: %v", err)
}
// remove any teleport keys we currently have loaded in the agent
for _, key := range keyList {
if strings.HasPrefix(key.Comment, "teleport:") {
err = agents[i].Remove(key)
if err != nil {
a.log.Warnf("Unable to communicate with agent and remove key: %v", err)
}
}
}
}
return nil
} | go | func (a *LocalKeyAgent) UnloadKeys() error {
agents := []agent.Agent{a.Agent}
if a.sshAgent != nil {
agents = append(agents, a.sshAgent)
}
// iterate over all agents we have
for i, _ := range agents {
// get a list of all keys in the agent
keyList, err := agents[i].List()
if err != nil {
a.log.Warnf("Unable to communicate with agent and list keys: %v", err)
}
// remove any teleport keys we currently have loaded in the agent
for _, key := range keyList {
if strings.HasPrefix(key.Comment, "teleport:") {
err = agents[i].Remove(key)
if err != nil {
a.log.Warnf("Unable to communicate with agent and remove key: %v", err)
}
}
}
}
return nil
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"UnloadKeys",
"(",
")",
"error",
"{",
"agents",
":=",
"[",
"]",
"agent",
".",
"Agent",
"{",
"a",
".",
"Agent",
"}",
"\n",
"if",
"a",
".",
"sshAgent",
"!=",
"nil",
"{",
"agents",
"=",
"append",
"(",
"agents",
",",
"a",
".",
"sshAgent",
")",
"\n",
"}",
"\n\n",
"// iterate over all agents we have",
"for",
"i",
",",
"_",
":=",
"range",
"agents",
"{",
"// get a list of all keys in the agent",
"keyList",
",",
"err",
":=",
"agents",
"[",
"i",
"]",
".",
"List",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"a",
".",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n\n",
"// remove any teleport keys we currently have loaded in the agent",
"for",
"_",
",",
"key",
":=",
"range",
"keyList",
"{",
"if",
"strings",
".",
"HasPrefix",
"(",
"key",
".",
"Comment",
",",
"\"",
"\"",
")",
"{",
"err",
"=",
"agents",
"[",
"i",
"]",
".",
"Remove",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"a",
".",
"log",
".",
"Warnf",
"(",
"\"",
"\"",
",",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // UnloadKeys will unload all Teleport keys from the teleport agent as well as
// the system agent. | [
"UnloadKeys",
"will",
"unload",
"all",
"Teleport",
"keys",
"from",
"the",
"teleport",
"agent",
"as",
"well",
"as",
"the",
"system",
"agent",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L188-L214 | train |
gravitational/teleport | lib/client/keyagent.go | AddHostSignersToCache | func (a *LocalKeyAgent) AddHostSignersToCache(certAuthorities []auth.TrustedCerts) error {
for _, ca := range certAuthorities {
publicKeys, err := ca.SSHCertPublicKeys()
if err != nil {
a.log.Error(err)
return trace.Wrap(err)
}
a.log.Debugf("Adding CA key for %s", ca.ClusterName)
err = a.keyStore.AddKnownHostKeys(ca.ClusterName, publicKeys)
if err != nil {
return trace.Wrap(err)
}
}
return nil
} | go | func (a *LocalKeyAgent) AddHostSignersToCache(certAuthorities []auth.TrustedCerts) error {
for _, ca := range certAuthorities {
publicKeys, err := ca.SSHCertPublicKeys()
if err != nil {
a.log.Error(err)
return trace.Wrap(err)
}
a.log.Debugf("Adding CA key for %s", ca.ClusterName)
err = a.keyStore.AddKnownHostKeys(ca.ClusterName, publicKeys)
if err != nil {
return trace.Wrap(err)
}
}
return nil
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"AddHostSignersToCache",
"(",
"certAuthorities",
"[",
"]",
"auth",
".",
"TrustedCerts",
")",
"error",
"{",
"for",
"_",
",",
"ca",
":=",
"range",
"certAuthorities",
"{",
"publicKeys",
",",
"err",
":=",
"ca",
".",
"SSHCertPublicKeys",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"a",
".",
"log",
".",
"Error",
"(",
"err",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"a",
".",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"ca",
".",
"ClusterName",
")",
"\n",
"err",
"=",
"a",
".",
"keyStore",
".",
"AddKnownHostKeys",
"(",
"ca",
".",
"ClusterName",
",",
"publicKeys",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // AddHostSignersToCache takes a list of CAs whom we trust. This list is added to a database
// of "seen" CAs.
//
// Every time we connect to a new host, we'll request its certificaate to be signed by one
// of these trusted CAs.
//
// Why do we trust these CAs? Because we received them from a trusted Teleport Proxy.
// Why do we trust the proxy? Because we've connected to it via HTTPS + username + Password + HOTP. | [
"AddHostSignersToCache",
"takes",
"a",
"list",
"of",
"CAs",
"whom",
"we",
"trust",
".",
"This",
"list",
"is",
"added",
"to",
"a",
"database",
"of",
"seen",
"CAs",
".",
"Every",
"time",
"we",
"connect",
"to",
"a",
"new",
"host",
"we",
"ll",
"request",
"its",
"certificaate",
"to",
"be",
"signed",
"by",
"one",
"of",
"these",
"trusted",
"CAs",
".",
"Why",
"do",
"we",
"trust",
"these",
"CAs?",
"Because",
"we",
"received",
"them",
"from",
"a",
"trusted",
"Teleport",
"Proxy",
".",
"Why",
"do",
"we",
"trust",
"the",
"proxy?",
"Because",
"we",
"ve",
"connected",
"to",
"it",
"via",
"HTTPS",
"+",
"username",
"+",
"Password",
"+",
"HOTP",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L230-L244 | train |
gravitational/teleport | lib/client/keyagent.go | AddKey | func (a *LocalKeyAgent) AddKey(key *Key) (*agent.AddedKey, error) {
// save it to disk (usually into ~/.tsh)
err := a.keyStore.AddKey(a.proxyHost, a.username, key)
if err != nil {
return nil, trace.Wrap(err)
}
// load key into the teleport agent and system agent
return a.LoadKey(*key)
} | go | func (a *LocalKeyAgent) AddKey(key *Key) (*agent.AddedKey, error) {
// save it to disk (usually into ~/.tsh)
err := a.keyStore.AddKey(a.proxyHost, a.username, key)
if err != nil {
return nil, trace.Wrap(err)
}
// load key into the teleport agent and system agent
return a.LoadKey(*key)
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"AddKey",
"(",
"key",
"*",
"Key",
")",
"(",
"*",
"agent",
".",
"AddedKey",
",",
"error",
")",
"{",
"// save it to disk (usually into ~/.tsh)",
"err",
":=",
"a",
".",
"keyStore",
".",
"AddKey",
"(",
"a",
".",
"proxyHost",
",",
"a",
".",
"username",
",",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// load key into the teleport agent and system agent",
"return",
"a",
".",
"LoadKey",
"(",
"*",
"key",
")",
"\n",
"}"
] | // AddKey activates a new signed session key by adding it into the keystore and also
// by loading it into the SSH agent | [
"AddKey",
"activates",
"a",
"new",
"signed",
"session",
"key",
"by",
"adding",
"it",
"into",
"the",
"keystore",
"and",
"also",
"by",
"loading",
"it",
"into",
"the",
"SSH",
"agent"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L370-L379 | train |
gravitational/teleport | lib/client/keyagent.go | DeleteKey | func (a *LocalKeyAgent) DeleteKey() error {
// remove key from key store
err := a.keyStore.DeleteKey(a.proxyHost, a.username)
if err != nil {
return trace.Wrap(err)
}
// remove any keys that are loaded for this user from the teleport and
// system agents
err = a.UnloadKey()
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (a *LocalKeyAgent) DeleteKey() error {
// remove key from key store
err := a.keyStore.DeleteKey(a.proxyHost, a.username)
if err != nil {
return trace.Wrap(err)
}
// remove any keys that are loaded for this user from the teleport and
// system agents
err = a.UnloadKey()
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"DeleteKey",
"(",
")",
"error",
"{",
"// remove key from key store",
"err",
":=",
"a",
".",
"keyStore",
".",
"DeleteKey",
"(",
"a",
".",
"proxyHost",
",",
"a",
".",
"username",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// remove any keys that are loaded for this user from the teleport and",
"// system agents",
"err",
"=",
"a",
".",
"UnloadKey",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteKey removes the key from the key store as well as unloading the key
// from the agent. | [
"DeleteKey",
"removes",
"the",
"key",
"from",
"the",
"key",
"store",
"as",
"well",
"as",
"unloading",
"the",
"key",
"from",
"the",
"agent",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L383-L398 | train |
gravitational/teleport | lib/client/keyagent.go | DeleteKeys | func (a *LocalKeyAgent) DeleteKeys() error {
// Remove keys from the filesystem.
err := a.keyStore.DeleteKeys()
if err != nil {
return trace.Wrap(err)
}
// Remove all keys from the Teleport and system agents.
err = a.UnloadKeys()
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (a *LocalKeyAgent) DeleteKeys() error {
// Remove keys from the filesystem.
err := a.keyStore.DeleteKeys()
if err != nil {
return trace.Wrap(err)
}
// Remove all keys from the Teleport and system agents.
err = a.UnloadKeys()
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"a",
"*",
"LocalKeyAgent",
")",
"DeleteKeys",
"(",
")",
"error",
"{",
"// Remove keys from the filesystem.",
"err",
":=",
"a",
".",
"keyStore",
".",
"DeleteKeys",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Remove all keys from the Teleport and system agents.",
"err",
"=",
"a",
".",
"UnloadKeys",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // DeleteKeys removes all keys from the keystore as well as unloads keys
// from the agent. | [
"DeleteKeys",
"removes",
"all",
"keys",
"from",
"the",
"keystore",
"as",
"well",
"as",
"unloads",
"keys",
"from",
"the",
"agent",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/keyagent.go#L402-L416 | train |
gravitational/teleport | lib/utils/fs_unix.go | FSWriteLock | func FSWriteLock(f *os.File) error {
if err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX); err != nil {
return trace.ConvertSystemError(err)
}
return nil
} | go | func FSWriteLock(f *os.File) error {
if err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX); err != nil {
return trace.ConvertSystemError(err)
}
return nil
} | [
"func",
"FSWriteLock",
"(",
"f",
"*",
"os",
".",
"File",
")",
"error",
"{",
"if",
"err",
":=",
"syscall",
".",
"Flock",
"(",
"int",
"(",
"f",
".",
"Fd",
"(",
")",
")",
",",
"syscall",
".",
"LOCK_EX",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // FSWriteLock grabs Flock-style filesystem lock on an open file
// in exclusive mode. | [
"FSWriteLock",
"grabs",
"Flock",
"-",
"style",
"filesystem",
"lock",
"on",
"an",
"open",
"file",
"in",
"exclusive",
"mode",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fs_unix.go#L30-L35 | train |
gravitational/teleport | lib/utils/fs_unix.go | FSTryWriteLock | func FSTryWriteLock(f *os.File) error {
err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX|syscall.LOCK_NB)
if err != nil {
if err == syscall.EWOULDBLOCK {
return trace.CompareFailed("lock %v is acquired by another process", f.Name())
}
return trace.ConvertSystemError(err)
}
return nil
} | go | func FSTryWriteLock(f *os.File) error {
err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX|syscall.LOCK_NB)
if err != nil {
if err == syscall.EWOULDBLOCK {
return trace.CompareFailed("lock %v is acquired by another process", f.Name())
}
return trace.ConvertSystemError(err)
}
return nil
} | [
"func",
"FSTryWriteLock",
"(",
"f",
"*",
"os",
".",
"File",
")",
"error",
"{",
"err",
":=",
"syscall",
".",
"Flock",
"(",
"int",
"(",
"f",
".",
"Fd",
"(",
")",
")",
",",
"syscall",
".",
"LOCK_EX",
"|",
"syscall",
".",
"LOCK_NB",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"err",
"==",
"syscall",
".",
"EWOULDBLOCK",
"{",
"return",
"trace",
".",
"CompareFailed",
"(",
"\"",
"\"",
",",
"f",
".",
"Name",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // FSTryWriteLock tries to grab write lock, returns CompareFailed
// if lock is already grabbed | [
"FSTryWriteLock",
"tries",
"to",
"grab",
"write",
"lock",
"returns",
"CompareFailed",
"if",
"lock",
"is",
"already",
"grabbed"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fs_unix.go#L39-L48 | train |
gravitational/teleport | lib/utils/fs_unix.go | FSUnlock | func FSUnlock(f *os.File) error {
if err := syscall.Flock(int(f.Fd()), syscall.LOCK_UN); err != nil {
return trace.ConvertSystemError(err)
}
return nil
} | go | func FSUnlock(f *os.File) error {
if err := syscall.Flock(int(f.Fd()), syscall.LOCK_UN); err != nil {
return trace.ConvertSystemError(err)
}
return nil
} | [
"func",
"FSUnlock",
"(",
"f",
"*",
"os",
".",
"File",
")",
"error",
"{",
"if",
"err",
":=",
"syscall",
".",
"Flock",
"(",
"int",
"(",
"f",
".",
"Fd",
"(",
")",
")",
",",
"syscall",
".",
"LOCK_UN",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"ConvertSystemError",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // FSUnlock unlcocks Flock-style filesystem lock | [
"FSUnlock",
"unlcocks",
"Flock",
"-",
"style",
"filesystem",
"lock"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fs_unix.go#L60-L65 | train |
gravitational/teleport | lib/limiter/ratelimiter.go | NewRateLimiter | func NewRateLimiter(config LimiterConfig) (*RateLimiter, error) {
limiter := RateLimiter{
Mutex: &sync.Mutex{},
}
ipExtractor, err := utils.NewExtractor("client.ip")
if err != nil {
return nil, trace.Wrap(err)
}
limiter.rates = ratelimit.NewRateSet()
for _, rate := range config.Rates {
err := limiter.rates.Add(rate.Period, rate.Average, rate.Burst)
if err != nil {
return nil, trace.Wrap(err)
}
}
if len(config.Rates) == 0 {
err := limiter.rates.Add(time.Second, DefaultRate, DefaultRate)
if err != nil {
return nil, trace.Wrap(err)
}
}
if config.Clock == nil {
config.Clock = &timetools.RealTime{}
}
limiter.clock = config.Clock
limiter.TokenLimiter, err = ratelimit.New(nil, ipExtractor,
limiter.rates, ratelimit.Clock(config.Clock))
if err != nil {
return nil, trace.Wrap(err)
}
maxNumberOfUsers := config.MaxNumberOfUsers
if maxNumberOfUsers <= 0 {
maxNumberOfUsers = DefaultMaxNumberOfUsers
}
limiter.rateLimits, err = ttlmap.NewMap(
maxNumberOfUsers, ttlmap.Clock(config.Clock))
if err != nil {
return nil, trace.Wrap(err)
}
return &limiter, nil
} | go | func NewRateLimiter(config LimiterConfig) (*RateLimiter, error) {
limiter := RateLimiter{
Mutex: &sync.Mutex{},
}
ipExtractor, err := utils.NewExtractor("client.ip")
if err != nil {
return nil, trace.Wrap(err)
}
limiter.rates = ratelimit.NewRateSet()
for _, rate := range config.Rates {
err := limiter.rates.Add(rate.Period, rate.Average, rate.Burst)
if err != nil {
return nil, trace.Wrap(err)
}
}
if len(config.Rates) == 0 {
err := limiter.rates.Add(time.Second, DefaultRate, DefaultRate)
if err != nil {
return nil, trace.Wrap(err)
}
}
if config.Clock == nil {
config.Clock = &timetools.RealTime{}
}
limiter.clock = config.Clock
limiter.TokenLimiter, err = ratelimit.New(nil, ipExtractor,
limiter.rates, ratelimit.Clock(config.Clock))
if err != nil {
return nil, trace.Wrap(err)
}
maxNumberOfUsers := config.MaxNumberOfUsers
if maxNumberOfUsers <= 0 {
maxNumberOfUsers = DefaultMaxNumberOfUsers
}
limiter.rateLimits, err = ttlmap.NewMap(
maxNumberOfUsers, ttlmap.Clock(config.Clock))
if err != nil {
return nil, trace.Wrap(err)
}
return &limiter, nil
} | [
"func",
"NewRateLimiter",
"(",
"config",
"LimiterConfig",
")",
"(",
"*",
"RateLimiter",
",",
"error",
")",
"{",
"limiter",
":=",
"RateLimiter",
"{",
"Mutex",
":",
"&",
"sync",
".",
"Mutex",
"{",
"}",
",",
"}",
"\n\n",
"ipExtractor",
",",
"err",
":=",
"utils",
".",
"NewExtractor",
"(",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"limiter",
".",
"rates",
"=",
"ratelimit",
".",
"NewRateSet",
"(",
")",
"\n",
"for",
"_",
",",
"rate",
":=",
"range",
"config",
".",
"Rates",
"{",
"err",
":=",
"limiter",
".",
"rates",
".",
"Add",
"(",
"rate",
".",
"Period",
",",
"rate",
".",
"Average",
",",
"rate",
".",
"Burst",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"len",
"(",
"config",
".",
"Rates",
")",
"==",
"0",
"{",
"err",
":=",
"limiter",
".",
"rates",
".",
"Add",
"(",
"time",
".",
"Second",
",",
"DefaultRate",
",",
"DefaultRate",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"config",
".",
"Clock",
"==",
"nil",
"{",
"config",
".",
"Clock",
"=",
"&",
"timetools",
".",
"RealTime",
"{",
"}",
"\n",
"}",
"\n",
"limiter",
".",
"clock",
"=",
"config",
".",
"Clock",
"\n\n",
"limiter",
".",
"TokenLimiter",
",",
"err",
"=",
"ratelimit",
".",
"New",
"(",
"nil",
",",
"ipExtractor",
",",
"limiter",
".",
"rates",
",",
"ratelimit",
".",
"Clock",
"(",
"config",
".",
"Clock",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"maxNumberOfUsers",
":=",
"config",
".",
"MaxNumberOfUsers",
"\n",
"if",
"maxNumberOfUsers",
"<=",
"0",
"{",
"maxNumberOfUsers",
"=",
"DefaultMaxNumberOfUsers",
"\n",
"}",
"\n",
"limiter",
".",
"rateLimits",
",",
"err",
"=",
"ttlmap",
".",
"NewMap",
"(",
"maxNumberOfUsers",
",",
"ttlmap",
".",
"Clock",
"(",
"config",
".",
"Clock",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"limiter",
",",
"nil",
"\n",
"}"
] | // NewRateLimiter returns new request rate controller | [
"NewRateLimiter",
"returns",
"new",
"request",
"rate",
"controller"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/ratelimiter.go#L50-L96 | train |
gravitational/teleport | lib/limiter/ratelimiter.go | RegisterRequest | func (l *RateLimiter) RegisterRequest(token string) error {
l.Lock()
defer l.Unlock()
bucketSetI, exists := l.rateLimits.Get(token)
var bucketSet *ratelimit.TokenBucketSet
if exists {
bucketSet = bucketSetI.(*ratelimit.TokenBucketSet)
bucketSet.Update(l.rates)
} else {
bucketSet = ratelimit.NewTokenBucketSet(l.rates, l.clock)
// We set ttl as 10 times rate period. E.g. if rate is 100 requests/second per client ip
// the counters for this ip will expire after 10 seconds of inactivity
err := l.rateLimits.Set(token, bucketSet, int(bucketSet.GetMaxPeriod()/time.Second)*10+1)
if err != nil {
return trace.Wrap(err)
}
}
delay, err := bucketSet.Consume(1)
if err != nil {
return err
}
if delay > 0 {
return &ratelimit.MaxRateError{}
}
return nil
} | go | func (l *RateLimiter) RegisterRequest(token string) error {
l.Lock()
defer l.Unlock()
bucketSetI, exists := l.rateLimits.Get(token)
var bucketSet *ratelimit.TokenBucketSet
if exists {
bucketSet = bucketSetI.(*ratelimit.TokenBucketSet)
bucketSet.Update(l.rates)
} else {
bucketSet = ratelimit.NewTokenBucketSet(l.rates, l.clock)
// We set ttl as 10 times rate period. E.g. if rate is 100 requests/second per client ip
// the counters for this ip will expire after 10 seconds of inactivity
err := l.rateLimits.Set(token, bucketSet, int(bucketSet.GetMaxPeriod()/time.Second)*10+1)
if err != nil {
return trace.Wrap(err)
}
}
delay, err := bucketSet.Consume(1)
if err != nil {
return err
}
if delay > 0 {
return &ratelimit.MaxRateError{}
}
return nil
} | [
"func",
"(",
"l",
"*",
"RateLimiter",
")",
"RegisterRequest",
"(",
"token",
"string",
")",
"error",
"{",
"l",
".",
"Lock",
"(",
")",
"\n",
"defer",
"l",
".",
"Unlock",
"(",
")",
"\n\n",
"bucketSetI",
",",
"exists",
":=",
"l",
".",
"rateLimits",
".",
"Get",
"(",
"token",
")",
"\n",
"var",
"bucketSet",
"*",
"ratelimit",
".",
"TokenBucketSet",
"\n\n",
"if",
"exists",
"{",
"bucketSet",
"=",
"bucketSetI",
".",
"(",
"*",
"ratelimit",
".",
"TokenBucketSet",
")",
"\n",
"bucketSet",
".",
"Update",
"(",
"l",
".",
"rates",
")",
"\n",
"}",
"else",
"{",
"bucketSet",
"=",
"ratelimit",
".",
"NewTokenBucketSet",
"(",
"l",
".",
"rates",
",",
"l",
".",
"clock",
")",
"\n",
"// We set ttl as 10 times rate period. E.g. if rate is 100 requests/second per client ip",
"// the counters for this ip will expire after 10 seconds of inactivity",
"err",
":=",
"l",
".",
"rateLimits",
".",
"Set",
"(",
"token",
",",
"bucketSet",
",",
"int",
"(",
"bucketSet",
".",
"GetMaxPeriod",
"(",
")",
"/",
"time",
".",
"Second",
")",
"*",
"10",
"+",
"1",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"delay",
",",
"err",
":=",
"bucketSet",
".",
"Consume",
"(",
"1",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"delay",
">",
"0",
"{",
"return",
"&",
"ratelimit",
".",
"MaxRateError",
"{",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // RegisterRequest increases number of requests for the provided token
// Returns error if there are too many requests with the provided token | [
"RegisterRequest",
"increases",
"number",
"of",
"requests",
"for",
"the",
"provided",
"token",
"Returns",
"error",
"if",
"there",
"are",
"too",
"many",
"requests",
"with",
"the",
"provided",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/ratelimiter.go#L100-L127 | train |
gravitational/teleport | lib/limiter/ratelimiter.go | WrapHandle | func (l *RateLimiter) WrapHandle(h http.Handler) {
l.TokenLimiter.Wrap(h)
} | go | func (l *RateLimiter) WrapHandle(h http.Handler) {
l.TokenLimiter.Wrap(h)
} | [
"func",
"(",
"l",
"*",
"RateLimiter",
")",
"WrapHandle",
"(",
"h",
"http",
".",
"Handler",
")",
"{",
"l",
".",
"TokenLimiter",
".",
"Wrap",
"(",
"h",
")",
"\n",
"}"
] | // Add rate limiter to the handle | [
"Add",
"rate",
"limiter",
"to",
"the",
"handle"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/limiter/ratelimiter.go#L130-L132 | train |
gravitational/teleport | lib/auth/clt.go | EncodeClusterName | func EncodeClusterName(clusterName string) string {
// hex is used to hide "." that will prevent wildcard *. entry to match
return fmt.Sprintf("%v.%v", hex.EncodeToString([]byte(clusterName)), teleport.APIDomain)
} | go | func EncodeClusterName(clusterName string) string {
// hex is used to hide "." that will prevent wildcard *. entry to match
return fmt.Sprintf("%v.%v", hex.EncodeToString([]byte(clusterName)), teleport.APIDomain)
} | [
"func",
"EncodeClusterName",
"(",
"clusterName",
"string",
")",
"string",
"{",
"// hex is used to hide \".\" that will prevent wildcard *. entry to match",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"hex",
".",
"EncodeToString",
"(",
"[",
"]",
"byte",
"(",
"clusterName",
")",
")",
",",
"teleport",
".",
"APIDomain",
")",
"\n",
"}"
] | // EncodeClusterName encodes cluster name in the SNI hostname | [
"EncodeClusterName",
"encodes",
"cluster",
"name",
"in",
"the",
"SNI",
"hostname"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L97-L100 | train |
gravitational/teleport | lib/auth/clt.go | NewAddrDialer | func NewAddrDialer(addrs []utils.NetAddr) DialContext {
dialer := net.Dialer{
Timeout: defaults.DefaultDialTimeout,
KeepAlive: defaults.ReverseTunnelAgentHeartbeatPeriod,
}
return func(in context.Context, network, _ string) (net.Conn, error) {
var err error
var conn net.Conn
for _, addr := range addrs {
conn, err = dialer.DialContext(in, network, addr.Addr)
if err == nil {
return conn, nil
}
log.Errorf("Failed to dial auth server %v: %v.", addr.Addr, err)
}
// not wrapping on purpose to preserve the original error
return nil, err
}
} | go | func NewAddrDialer(addrs []utils.NetAddr) DialContext {
dialer := net.Dialer{
Timeout: defaults.DefaultDialTimeout,
KeepAlive: defaults.ReverseTunnelAgentHeartbeatPeriod,
}
return func(in context.Context, network, _ string) (net.Conn, error) {
var err error
var conn net.Conn
for _, addr := range addrs {
conn, err = dialer.DialContext(in, network, addr.Addr)
if err == nil {
return conn, nil
}
log.Errorf("Failed to dial auth server %v: %v.", addr.Addr, err)
}
// not wrapping on purpose to preserve the original error
return nil, err
}
} | [
"func",
"NewAddrDialer",
"(",
"addrs",
"[",
"]",
"utils",
".",
"NetAddr",
")",
"DialContext",
"{",
"dialer",
":=",
"net",
".",
"Dialer",
"{",
"Timeout",
":",
"defaults",
".",
"DefaultDialTimeout",
",",
"KeepAlive",
":",
"defaults",
".",
"ReverseTunnelAgentHeartbeatPeriod",
",",
"}",
"\n",
"return",
"func",
"(",
"in",
"context",
".",
"Context",
",",
"network",
",",
"_",
"string",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n",
"var",
"conn",
"net",
".",
"Conn",
"\n",
"for",
"_",
",",
"addr",
":=",
"range",
"addrs",
"{",
"conn",
",",
"err",
"=",
"dialer",
".",
"DialContext",
"(",
"in",
",",
"network",
",",
"addr",
".",
"Addr",
")",
"\n",
"if",
"err",
"==",
"nil",
"{",
"return",
"conn",
",",
"nil",
"\n",
"}",
"\n",
"log",
".",
"Errorf",
"(",
"\"",
"\"",
",",
"addr",
".",
"Addr",
",",
"err",
")",
"\n",
"}",
"\n",
"// not wrapping on purpose to preserve the original error",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"}"
] | // NewAddrDialer returns new dialer from a list of addresses | [
"NewAddrDialer",
"returns",
"new",
"dialer",
"from",
"a",
"list",
"of",
"addresses"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L124-L142 | train |
gravitational/teleport | lib/auth/clt.go | ClientTimeout | func ClientTimeout(timeout time.Duration) roundtrip.ClientParam {
return func(c *roundtrip.Client) error {
transport, ok := (c.HTTPClient().Transport).(*http.Transport)
if !ok {
return nil
}
transport.IdleConnTimeout = timeout
transport.ResponseHeaderTimeout = timeout
return nil
}
} | go | func ClientTimeout(timeout time.Duration) roundtrip.ClientParam {
return func(c *roundtrip.Client) error {
transport, ok := (c.HTTPClient().Transport).(*http.Transport)
if !ok {
return nil
}
transport.IdleConnTimeout = timeout
transport.ResponseHeaderTimeout = timeout
return nil
}
} | [
"func",
"ClientTimeout",
"(",
"timeout",
"time",
".",
"Duration",
")",
"roundtrip",
".",
"ClientParam",
"{",
"return",
"func",
"(",
"c",
"*",
"roundtrip",
".",
"Client",
")",
"error",
"{",
"transport",
",",
"ok",
":=",
"(",
"c",
".",
"HTTPClient",
"(",
")",
".",
"Transport",
")",
".",
"(",
"*",
"http",
".",
"Transport",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
"\n",
"}",
"\n",
"transport",
".",
"IdleConnTimeout",
"=",
"timeout",
"\n",
"transport",
".",
"ResponseHeaderTimeout",
"=",
"timeout",
"\n",
"return",
"nil",
"\n",
"}",
"\n",
"}"
] | // ClientTimeout sets idle and dial timeouts of the HTTP transport
// used by the client. | [
"ClientTimeout",
"sets",
"idle",
"and",
"dial",
"timeouts",
"of",
"the",
"HTTP",
"transport",
"used",
"by",
"the",
"client",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L146-L156 | train |
gravitational/teleport | lib/auth/clt.go | CheckAndSetDefaults | func (c *ClientConfig) CheckAndSetDefaults() error {
if len(c.Addrs) == 0 && c.DialContext == nil {
return trace.BadParameter("set parameter Addrs or DialContext")
}
if c.TLS == nil {
return trace.BadParameter("missing parameter TLS")
}
if c.KeepAlivePeriod == 0 {
c.KeepAlivePeriod = defaults.ServerKeepAliveTTL
}
if c.KeepAliveCount == 0 {
c.KeepAliveCount = defaults.KeepAliveCountMax
}
if c.DialContext == nil {
c.DialContext = NewAddrDialer(c.Addrs)
}
if c.TLS.ServerName == "" {
c.TLS.ServerName = teleport.APIDomain
}
// this logic is necessary to force client to always send certificate
// regardless of the server setting, otherwise client may pick
// not to send the client certificate by looking at certificate request
if len(c.TLS.Certificates) != 0 {
cert := c.TLS.Certificates[0]
c.TLS.Certificates = nil
c.TLS.GetClientCertificate = func(_ *tls.CertificateRequestInfo) (*tls.Certificate, error) {
return &cert, nil
}
}
return nil
} | go | func (c *ClientConfig) CheckAndSetDefaults() error {
if len(c.Addrs) == 0 && c.DialContext == nil {
return trace.BadParameter("set parameter Addrs or DialContext")
}
if c.TLS == nil {
return trace.BadParameter("missing parameter TLS")
}
if c.KeepAlivePeriod == 0 {
c.KeepAlivePeriod = defaults.ServerKeepAliveTTL
}
if c.KeepAliveCount == 0 {
c.KeepAliveCount = defaults.KeepAliveCountMax
}
if c.DialContext == nil {
c.DialContext = NewAddrDialer(c.Addrs)
}
if c.TLS.ServerName == "" {
c.TLS.ServerName = teleport.APIDomain
}
// this logic is necessary to force client to always send certificate
// regardless of the server setting, otherwise client may pick
// not to send the client certificate by looking at certificate request
if len(c.TLS.Certificates) != 0 {
cert := c.TLS.Certificates[0]
c.TLS.Certificates = nil
c.TLS.GetClientCertificate = func(_ *tls.CertificateRequestInfo) (*tls.Certificate, error) {
return &cert, nil
}
}
return nil
} | [
"func",
"(",
"c",
"*",
"ClientConfig",
")",
"CheckAndSetDefaults",
"(",
")",
"error",
"{",
"if",
"len",
"(",
"c",
".",
"Addrs",
")",
"==",
"0",
"&&",
"c",
".",
"DialContext",
"==",
"nil",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"TLS",
"==",
"nil",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"KeepAlivePeriod",
"==",
"0",
"{",
"c",
".",
"KeepAlivePeriod",
"=",
"defaults",
".",
"ServerKeepAliveTTL",
"\n",
"}",
"\n",
"if",
"c",
".",
"KeepAliveCount",
"==",
"0",
"{",
"c",
".",
"KeepAliveCount",
"=",
"defaults",
".",
"KeepAliveCountMax",
"\n",
"}",
"\n",
"if",
"c",
".",
"DialContext",
"==",
"nil",
"{",
"c",
".",
"DialContext",
"=",
"NewAddrDialer",
"(",
"c",
".",
"Addrs",
")",
"\n",
"}",
"\n",
"if",
"c",
".",
"TLS",
".",
"ServerName",
"==",
"\"",
"\"",
"{",
"c",
".",
"TLS",
".",
"ServerName",
"=",
"teleport",
".",
"APIDomain",
"\n",
"}",
"\n",
"// this logic is necessary to force client to always send certificate",
"// regardless of the server setting, otherwise client may pick",
"// not to send the client certificate by looking at certificate request",
"if",
"len",
"(",
"c",
".",
"TLS",
".",
"Certificates",
")",
"!=",
"0",
"{",
"cert",
":=",
"c",
".",
"TLS",
".",
"Certificates",
"[",
"0",
"]",
"\n",
"c",
".",
"TLS",
".",
"Certificates",
"=",
"nil",
"\n",
"c",
".",
"TLS",
".",
"GetClientCertificate",
"=",
"func",
"(",
"_",
"*",
"tls",
".",
"CertificateRequestInfo",
")",
"(",
"*",
"tls",
".",
"Certificate",
",",
"error",
")",
"{",
"return",
"&",
"cert",
",",
"nil",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // CheckAndSetDefaults checks and sets default config values | [
"CheckAndSetDefaults",
"checks",
"and",
"sets",
"default",
"config",
"values"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L175-L206 | train |
gravitational/teleport | lib/auth/clt.go | NewTLSClient | func NewTLSClient(cfg ClientConfig, params ...roundtrip.ClientParam) (*Client, error) {
if err := cfg.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
transport := &http.Transport{
// notice that below roundtrip.Client is passed
// teleport.APIEndpoint as an address for the API server, this is
// to make sure client verifies the DNS name of the API server
// custom DialContext overrides this DNS name to the real address
// in addition this dialer tries multiple adresses if provided
DialContext: cfg.DialContext,
ResponseHeaderTimeout: defaults.DefaultDialTimeout,
TLSClientConfig: cfg.TLS,
// Increase the size of the connection pool. This substantially improves the
// performance of Teleport under load as it reduces the number of TLS
// handshakes performed.
MaxIdleConns: defaults.HTTPMaxIdleConns,
MaxIdleConnsPerHost: defaults.HTTPMaxIdleConnsPerHost,
// IdleConnTimeout defines the maximum amount of time before idle connections
// are closed. Leaving this unset will lead to connections open forever and
// will cause memory leaks in a long running process.
IdleConnTimeout: defaults.HTTPIdleTimeout,
}
clientParams := append(
[]roundtrip.ClientParam{
roundtrip.HTTPClient(&http.Client{Transport: transport}),
roundtrip.SanitizerEnabled(true),
},
params...,
)
roundtripClient, err := roundtrip.NewClient("https://"+teleport.APIDomain, CurrentVersion, clientParams...)
if err != nil {
return nil, trace.Wrap(err)
}
return &Client{
ClientConfig: cfg,
Client: *roundtripClient,
transport: transport,
}, nil
} | go | func NewTLSClient(cfg ClientConfig, params ...roundtrip.ClientParam) (*Client, error) {
if err := cfg.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
transport := &http.Transport{
// notice that below roundtrip.Client is passed
// teleport.APIEndpoint as an address for the API server, this is
// to make sure client verifies the DNS name of the API server
// custom DialContext overrides this DNS name to the real address
// in addition this dialer tries multiple adresses if provided
DialContext: cfg.DialContext,
ResponseHeaderTimeout: defaults.DefaultDialTimeout,
TLSClientConfig: cfg.TLS,
// Increase the size of the connection pool. This substantially improves the
// performance of Teleport under load as it reduces the number of TLS
// handshakes performed.
MaxIdleConns: defaults.HTTPMaxIdleConns,
MaxIdleConnsPerHost: defaults.HTTPMaxIdleConnsPerHost,
// IdleConnTimeout defines the maximum amount of time before idle connections
// are closed. Leaving this unset will lead to connections open forever and
// will cause memory leaks in a long running process.
IdleConnTimeout: defaults.HTTPIdleTimeout,
}
clientParams := append(
[]roundtrip.ClientParam{
roundtrip.HTTPClient(&http.Client{Transport: transport}),
roundtrip.SanitizerEnabled(true),
},
params...,
)
roundtripClient, err := roundtrip.NewClient("https://"+teleport.APIDomain, CurrentVersion, clientParams...)
if err != nil {
return nil, trace.Wrap(err)
}
return &Client{
ClientConfig: cfg,
Client: *roundtripClient,
transport: transport,
}, nil
} | [
"func",
"NewTLSClient",
"(",
"cfg",
"ClientConfig",
",",
"params",
"...",
"roundtrip",
".",
"ClientParam",
")",
"(",
"*",
"Client",
",",
"error",
")",
"{",
"if",
"err",
":=",
"cfg",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"transport",
":=",
"&",
"http",
".",
"Transport",
"{",
"// notice that below roundtrip.Client is passed",
"// teleport.APIEndpoint as an address for the API server, this is",
"// to make sure client verifies the DNS name of the API server",
"// custom DialContext overrides this DNS name to the real address",
"// in addition this dialer tries multiple adresses if provided",
"DialContext",
":",
"cfg",
".",
"DialContext",
",",
"ResponseHeaderTimeout",
":",
"defaults",
".",
"DefaultDialTimeout",
",",
"TLSClientConfig",
":",
"cfg",
".",
"TLS",
",",
"// Increase the size of the connection pool. This substantially improves the",
"// performance of Teleport under load as it reduces the number of TLS",
"// handshakes performed.",
"MaxIdleConns",
":",
"defaults",
".",
"HTTPMaxIdleConns",
",",
"MaxIdleConnsPerHost",
":",
"defaults",
".",
"HTTPMaxIdleConnsPerHost",
",",
"// IdleConnTimeout defines the maximum amount of time before idle connections",
"// are closed. Leaving this unset will lead to connections open forever and",
"// will cause memory leaks in a long running process.",
"IdleConnTimeout",
":",
"defaults",
".",
"HTTPIdleTimeout",
",",
"}",
"\n\n",
"clientParams",
":=",
"append",
"(",
"[",
"]",
"roundtrip",
".",
"ClientParam",
"{",
"roundtrip",
".",
"HTTPClient",
"(",
"&",
"http",
".",
"Client",
"{",
"Transport",
":",
"transport",
"}",
")",
",",
"roundtrip",
".",
"SanitizerEnabled",
"(",
"true",
")",
",",
"}",
",",
"params",
"...",
",",
")",
"\n",
"roundtripClient",
",",
"err",
":=",
"roundtrip",
".",
"NewClient",
"(",
"\"",
"\"",
"+",
"teleport",
".",
"APIDomain",
",",
"CurrentVersion",
",",
"clientParams",
"...",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"&",
"Client",
"{",
"ClientConfig",
":",
"cfg",
",",
"Client",
":",
"*",
"roundtripClient",
",",
"transport",
":",
"transport",
",",
"}",
",",
"nil",
"\n",
"}"
] | // NewTLSClient returns a new TLS client that uses mutual TLS authentication
// and dials the remote server using dialer | [
"NewTLSClient",
"returns",
"a",
"new",
"TLS",
"client",
"that",
"uses",
"mutual",
"TLS",
"authentication",
"and",
"dials",
"the",
"remote",
"server",
"using",
"dialer"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L210-L252 | train |
gravitational/teleport | lib/auth/clt.go | grpc | func (c *Client) grpc() (proto.AuthServiceClient, error) {
// it's ok to lock here, because Dial below is not locking
c.Lock()
defer c.Unlock()
if c.grpcClient != nil {
return c.grpcClient, nil
}
dialer := grpc.WithDialer(func(addr string, timeout time.Duration) (net.Conn, error) {
if c.isClosed() {
return nil, trace.ConnectionProblem(nil, "client is closed")
}
c, err := c.DialContext(context.TODO(), "tcp", addr)
if err != nil {
log.Debugf("Dial to addr %v failed: %v.", addr, err)
}
return c, err
})
tlsConfig := c.TLS.Clone()
tlsConfig.NextProtos = []string{http2.NextProtoTLS}
log.Debugf("GRPC(): keep alive %v count: %v.", c.KeepAlivePeriod, c.KeepAliveCount)
conn, err := grpc.Dial(teleport.APIDomain,
dialer,
grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)),
grpc.WithKeepaliveParams(keepalive.ClientParameters{
Time: c.KeepAlivePeriod,
Timeout: c.KeepAlivePeriod * time.Duration(c.KeepAliveCount),
}),
)
if err != nil {
return nil, trail.FromGRPC(err)
}
c.conn = conn
c.grpcClient = proto.NewAuthServiceClient(c.conn)
return c.grpcClient, nil
} | go | func (c *Client) grpc() (proto.AuthServiceClient, error) {
// it's ok to lock here, because Dial below is not locking
c.Lock()
defer c.Unlock()
if c.grpcClient != nil {
return c.grpcClient, nil
}
dialer := grpc.WithDialer(func(addr string, timeout time.Duration) (net.Conn, error) {
if c.isClosed() {
return nil, trace.ConnectionProblem(nil, "client is closed")
}
c, err := c.DialContext(context.TODO(), "tcp", addr)
if err != nil {
log.Debugf("Dial to addr %v failed: %v.", addr, err)
}
return c, err
})
tlsConfig := c.TLS.Clone()
tlsConfig.NextProtos = []string{http2.NextProtoTLS}
log.Debugf("GRPC(): keep alive %v count: %v.", c.KeepAlivePeriod, c.KeepAliveCount)
conn, err := grpc.Dial(teleport.APIDomain,
dialer,
grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)),
grpc.WithKeepaliveParams(keepalive.ClientParameters{
Time: c.KeepAlivePeriod,
Timeout: c.KeepAlivePeriod * time.Duration(c.KeepAliveCount),
}),
)
if err != nil {
return nil, trail.FromGRPC(err)
}
c.conn = conn
c.grpcClient = proto.NewAuthServiceClient(c.conn)
return c.grpcClient, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"grpc",
"(",
")",
"(",
"proto",
".",
"AuthServiceClient",
",",
"error",
")",
"{",
"// it's ok to lock here, because Dial below is not locking",
"c",
".",
"Lock",
"(",
")",
"\n",
"defer",
"c",
".",
"Unlock",
"(",
")",
"\n\n",
"if",
"c",
".",
"grpcClient",
"!=",
"nil",
"{",
"return",
"c",
".",
"grpcClient",
",",
"nil",
"\n",
"}",
"\n",
"dialer",
":=",
"grpc",
".",
"WithDialer",
"(",
"func",
"(",
"addr",
"string",
",",
"timeout",
"time",
".",
"Duration",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"if",
"c",
".",
"isClosed",
"(",
")",
"{",
"return",
"nil",
",",
"trace",
".",
"ConnectionProblem",
"(",
"nil",
",",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"c",
",",
"err",
":=",
"c",
".",
"DialContext",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"\"",
"\"",
",",
"addr",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"addr",
",",
"err",
")",
"\n",
"}",
"\n",
"return",
"c",
",",
"err",
"\n",
"}",
")",
"\n",
"tlsConfig",
":=",
"c",
".",
"TLS",
".",
"Clone",
"(",
")",
"\n",
"tlsConfig",
".",
"NextProtos",
"=",
"[",
"]",
"string",
"{",
"http2",
".",
"NextProtoTLS",
"}",
"\n",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"c",
".",
"KeepAlivePeriod",
",",
"c",
".",
"KeepAliveCount",
")",
"\n",
"conn",
",",
"err",
":=",
"grpc",
".",
"Dial",
"(",
"teleport",
".",
"APIDomain",
",",
"dialer",
",",
"grpc",
".",
"WithTransportCredentials",
"(",
"credentials",
".",
"NewTLS",
"(",
"tlsConfig",
")",
")",
",",
"grpc",
".",
"WithKeepaliveParams",
"(",
"keepalive",
".",
"ClientParameters",
"{",
"Time",
":",
"c",
".",
"KeepAlivePeriod",
",",
"Timeout",
":",
"c",
".",
"KeepAlivePeriod",
"*",
"time",
".",
"Duration",
"(",
"c",
".",
"KeepAliveCount",
")",
",",
"}",
")",
",",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trail",
".",
"FromGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"c",
".",
"conn",
"=",
"conn",
"\n",
"c",
".",
"grpcClient",
"=",
"proto",
".",
"NewAuthServiceClient",
"(",
"c",
".",
"conn",
")",
"\n\n",
"return",
"c",
".",
"grpcClient",
",",
"nil",
"\n",
"}"
] | // grpc returns grpc client | [
"grpc",
"returns",
"grpc",
"client"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L263-L299 | train |
gravitational/teleport | lib/auth/clt.go | PutJSON | func (c *Client) PutJSON(
endpoint string, val interface{}) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.PutJSON(context.TODO(), endpoint, val))
} | go | func (c *Client) PutJSON(
endpoint string, val interface{}) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.PutJSON(context.TODO(), endpoint, val))
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"PutJSON",
"(",
"endpoint",
"string",
",",
"val",
"interface",
"{",
"}",
")",
"(",
"*",
"roundtrip",
".",
"Response",
",",
"error",
")",
"{",
"return",
"httplib",
".",
"ConvertResponse",
"(",
"c",
".",
"Client",
".",
"PutJSON",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"endpoint",
",",
"val",
")",
")",
"\n",
"}"
] | // PutJSON is a generic method that issues http PUT request to the server | [
"PutJSON",
"is",
"a",
"generic",
"method",
"that",
"issues",
"http",
"PUT",
"request",
"to",
"the",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L312-L315 | train |
gravitational/teleport | lib/auth/clt.go | PostForm | func (c *Client) PostForm(
endpoint string,
vals url.Values,
files ...roundtrip.File) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.PostForm(context.TODO(), endpoint, vals, files...))
} | go | func (c *Client) PostForm(
endpoint string,
vals url.Values,
files ...roundtrip.File) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.PostForm(context.TODO(), endpoint, vals, files...))
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"PostForm",
"(",
"endpoint",
"string",
",",
"vals",
"url",
".",
"Values",
",",
"files",
"...",
"roundtrip",
".",
"File",
")",
"(",
"*",
"roundtrip",
".",
"Response",
",",
"error",
")",
"{",
"return",
"httplib",
".",
"ConvertResponse",
"(",
"c",
".",
"Client",
".",
"PostForm",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"endpoint",
",",
"vals",
",",
"files",
"...",
")",
")",
"\n",
"}"
] | // PostForm is a generic method that issues http POST request to the server | [
"PostForm",
"is",
"a",
"generic",
"method",
"that",
"issues",
"http",
"POST",
"request",
"to",
"the",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L318-L323 | train |
gravitational/teleport | lib/auth/clt.go | Get | func (c *Client) Get(u string, params url.Values) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.Get(context.TODO(), u, params))
} | go | func (c *Client) Get(u string, params url.Values) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.Get(context.TODO(), u, params))
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"Get",
"(",
"u",
"string",
",",
"params",
"url",
".",
"Values",
")",
"(",
"*",
"roundtrip",
".",
"Response",
",",
"error",
")",
"{",
"return",
"httplib",
".",
"ConvertResponse",
"(",
"c",
".",
"Client",
".",
"Get",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"u",
",",
"params",
")",
")",
"\n",
"}"
] | // Get issues http GET request to the server | [
"Get",
"issues",
"http",
"GET",
"request",
"to",
"the",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L326-L328 | train |
gravitational/teleport | lib/auth/clt.go | Delete | func (c *Client) Delete(u string) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.Delete(context.TODO(), u))
} | go | func (c *Client) Delete(u string) (*roundtrip.Response, error) {
return httplib.ConvertResponse(c.Client.Delete(context.TODO(), u))
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"Delete",
"(",
"u",
"string",
")",
"(",
"*",
"roundtrip",
".",
"Response",
",",
"error",
")",
"{",
"return",
"httplib",
".",
"ConvertResponse",
"(",
"c",
".",
"Client",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"u",
")",
")",
"\n",
"}"
] | // Delete issues http Delete Request to the server | [
"Delete",
"issues",
"http",
"Delete",
"Request",
"to",
"the",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L331-L333 | train |
gravitational/teleport | lib/auth/clt.go | GetSessions | func (c *Client) GetSessions(namespace string) ([]session.Session, error) {
if namespace == "" {
return nil, trace.BadParameter(MissingNamespaceError)
}
out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var sessions []session.Session
if err := json.Unmarshal(out.Bytes(), &sessions); err != nil {
return nil, err
}
return sessions, nil
} | go | func (c *Client) GetSessions(namespace string) ([]session.Session, error) {
if namespace == "" {
return nil, trace.BadParameter(MissingNamespaceError)
}
out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var sessions []session.Session
if err := json.Unmarshal(out.Bytes(), &sessions); err != nil {
return nil, err
}
return sessions, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetSessions",
"(",
"namespace",
"string",
")",
"(",
"[",
"]",
"session",
".",
"Session",
",",
"error",
")",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"MissingNamespaceError",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"namespace",
",",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"sessions",
"[",
"]",
"session",
".",
"Session",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"sessions",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"sessions",
",",
"nil",
"\n",
"}"
] | // GetSessions returns a list of active sessions in the cluster
// as reported by auth server | [
"GetSessions",
"returns",
"a",
"list",
"of",
"active",
"sessions",
"in",
"the",
"cluster",
"as",
"reported",
"by",
"auth",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L354-L367 | train |
gravitational/teleport | lib/auth/clt.go | GetSession | func (c *Client) GetSession(namespace string, id session.ID) (*session.Session, error) {
if namespace == "" {
return nil, trace.BadParameter(MissingNamespaceError)
}
// saving extra round-trip
if err := id.Check(); err != nil {
return nil, trace.Wrap(err)
}
out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions", string(id)), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var sess *session.Session
if err := json.Unmarshal(out.Bytes(), &sess); err != nil {
return nil, trace.Wrap(err)
}
return sess, nil
} | go | func (c *Client) GetSession(namespace string, id session.ID) (*session.Session, error) {
if namespace == "" {
return nil, trace.BadParameter(MissingNamespaceError)
}
// saving extra round-trip
if err := id.Check(); err != nil {
return nil, trace.Wrap(err)
}
out, err := c.Get(c.Endpoint("namespaces", namespace, "sessions", string(id)), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var sess *session.Session
if err := json.Unmarshal(out.Bytes(), &sess); err != nil {
return nil, trace.Wrap(err)
}
return sess, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetSession",
"(",
"namespace",
"string",
",",
"id",
"session",
".",
"ID",
")",
"(",
"*",
"session",
".",
"Session",
",",
"error",
")",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"MissingNamespaceError",
")",
"\n",
"}",
"\n",
"// saving extra round-trip",
"if",
"err",
":=",
"id",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"namespace",
",",
"\"",
"\"",
",",
"string",
"(",
"id",
")",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"sess",
"*",
"session",
".",
"Session",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"sess",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"sess",
",",
"nil",
"\n",
"}"
] | // GetSession returns a session by ID | [
"GetSession",
"returns",
"a",
"session",
"by",
"ID"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L370-L387 | train |
gravitational/teleport | lib/auth/clt.go | DeleteSession | func (c *Client) DeleteSession(namespace, id string) error {
if namespace == "" {
return trace.BadParameter(MissingNamespaceError)
}
_, err := c.Delete(c.Endpoint("namespaces", namespace, "sessions", id))
return trace.Wrap(err)
} | go | func (c *Client) DeleteSession(namespace, id string) error {
if namespace == "" {
return trace.BadParameter(MissingNamespaceError)
}
_, err := c.Delete(c.Endpoint("namespaces", namespace, "sessions", id))
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteSession",
"(",
"namespace",
",",
"id",
"string",
")",
"error",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"MissingNamespaceError",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"namespace",
",",
"\"",
"\"",
",",
"id",
")",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // DeleteSession deletes a session by ID | [
"DeleteSession",
"deletes",
"a",
"session",
"by",
"ID"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L390-L396 | train |
gravitational/teleport | lib/auth/clt.go | CreateSession | func (c *Client) CreateSession(sess session.Session) error {
if sess.Namespace == "" {
return trace.BadParameter(MissingNamespaceError)
}
_, err := c.PostJSON(c.Endpoint("namespaces", sess.Namespace, "sessions"), createSessionReq{Session: sess})
return trace.Wrap(err)
} | go | func (c *Client) CreateSession(sess session.Session) error {
if sess.Namespace == "" {
return trace.BadParameter(MissingNamespaceError)
}
_, err := c.PostJSON(c.Endpoint("namespaces", sess.Namespace, "sessions"), createSessionReq{Session: sess})
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateSession",
"(",
"sess",
"session",
".",
"Session",
")",
"error",
"{",
"if",
"sess",
".",
"Namespace",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"MissingNamespaceError",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"sess",
".",
"Namespace",
",",
"\"",
"\"",
")",
",",
"createSessionReq",
"{",
"Session",
":",
"sess",
"}",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // CreateSession creates new session | [
"CreateSession",
"creates",
"new",
"session"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L399-L405 | train |
gravitational/teleport | lib/auth/clt.go | UpdateSession | func (c *Client) UpdateSession(req session.UpdateRequest) error {
if err := req.Check(); err != nil {
return trace.Wrap(err)
}
_, err := c.PutJSON(c.Endpoint("namespaces", req.Namespace, "sessions", string(req.ID)), updateSessionReq{Update: req})
return trace.Wrap(err)
} | go | func (c *Client) UpdateSession(req session.UpdateRequest) error {
if err := req.Check(); err != nil {
return trace.Wrap(err)
}
_, err := c.PutJSON(c.Endpoint("namespaces", req.Namespace, "sessions", string(req.ID)), updateSessionReq{Update: req})
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpdateSession",
"(",
"req",
"session",
".",
"UpdateRequest",
")",
"error",
"{",
"if",
"err",
":=",
"req",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"PutJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"req",
".",
"Namespace",
",",
"\"",
"\"",
",",
"string",
"(",
"req",
".",
"ID",
")",
")",
",",
"updateSessionReq",
"{",
"Update",
":",
"req",
"}",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // UpdateSession updates existing session | [
"UpdateSession",
"updates",
"existing",
"session"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L408-L414 | train |
gravitational/teleport | lib/auth/clt.go | GetDomainName | func (c *Client) GetDomainName() (string, error) {
out, err := c.Get(c.Endpoint("domain"), url.Values{})
if err != nil {
return "", trace.Wrap(err)
}
var domain string
if err := json.Unmarshal(out.Bytes(), &domain); err != nil {
return "", trace.Wrap(err)
}
return domain, nil
} | go | func (c *Client) GetDomainName() (string, error) {
out, err := c.Get(c.Endpoint("domain"), url.Values{})
if err != nil {
return "", trace.Wrap(err)
}
var domain string
if err := json.Unmarshal(out.Bytes(), &domain); err != nil {
return "", trace.Wrap(err)
}
return domain, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetDomainName",
"(",
")",
"(",
"string",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"domain",
"string",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"domain",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"domain",
",",
"nil",
"\n",
"}"
] | // GetDomainName returns local auth domain of the current auth server | [
"GetDomainName",
"returns",
"local",
"auth",
"domain",
"of",
"the",
"current",
"auth",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L417-L427 | train |
gravitational/teleport | lib/auth/clt.go | RotateExternalCertAuthority | func (c *Client) RotateExternalCertAuthority(ca services.CertAuthority) error {
if err := ca.Check(); err != nil {
return trace.Wrap(err)
}
data, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("authorities", string(ca.GetType()), "rotate", "external"),
&rotateExternalCertAuthorityRawReq{CA: data})
return trace.Wrap(err)
} | go | func (c *Client) RotateExternalCertAuthority(ca services.CertAuthority) error {
if err := ca.Check(); err != nil {
return trace.Wrap(err)
}
data, err := services.GetCertAuthorityMarshaler().MarshalCertAuthority(ca)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("authorities", string(ca.GetType()), "rotate", "external"),
&rotateExternalCertAuthorityRawReq{CA: data})
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"RotateExternalCertAuthority",
"(",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"if",
"err",
":=",
"ca",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"data",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"MarshalCertAuthority",
"(",
"ca",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"string",
"(",
"ca",
".",
"GetType",
"(",
")",
")",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"&",
"rotateExternalCertAuthorityRawReq",
"{",
"CA",
":",
"data",
"}",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // RotateExternalCertAuthority rotates external certificate authority,
// this method is used to update only public keys and certificates of the
// the certificate authorities of trusted clusters. | [
"RotateExternalCertAuthority",
"rotates",
"external",
"certificate",
"authority",
"this",
"method",
"is",
"used",
"to",
"update",
"only",
"public",
"keys",
"and",
"certificates",
"of",
"the",
"the",
"certificate",
"authorities",
"of",
"trusted",
"clusters",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L479-L490 | train |
gravitational/teleport | lib/auth/clt.go | GetCertAuthorities | func (c *Client) GetCertAuthorities(caType services.CertAuthType, loadKeys bool, opts ...services.MarshalOption) ([]services.CertAuthority, error) {
if err := caType.Check(); err != nil {
return nil, trace.Wrap(err)
}
out, err := c.Get(c.Endpoint("authorities", string(caType)), url.Values{
"load_keys": []string{fmt.Sprintf("%t", loadKeys)},
})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, err
}
re := make([]services.CertAuthority, len(items))
for i, raw := range items {
ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
re[i] = ca
}
return re, nil
} | go | func (c *Client) GetCertAuthorities(caType services.CertAuthType, loadKeys bool, opts ...services.MarshalOption) ([]services.CertAuthority, error) {
if err := caType.Check(); err != nil {
return nil, trace.Wrap(err)
}
out, err := c.Get(c.Endpoint("authorities", string(caType)), url.Values{
"load_keys": []string{fmt.Sprintf("%t", loadKeys)},
})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, err
}
re := make([]services.CertAuthority, len(items))
for i, raw := range items {
ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
re[i] = ca
}
return re, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetCertAuthorities",
"(",
"caType",
"services",
".",
"CertAuthType",
",",
"loadKeys",
"bool",
",",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"CertAuthority",
",",
"error",
")",
"{",
"if",
"err",
":=",
"caType",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"string",
"(",
"caType",
")",
")",
",",
"url",
".",
"Values",
"{",
"\"",
"\"",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"loadKeys",
")",
"}",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"re",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"CertAuthority",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"items",
"{",
"ca",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"UnmarshalCertAuthority",
"(",
"raw",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"re",
"[",
"i",
"]",
"=",
"ca",
"\n",
"}",
"\n",
"return",
"re",
",",
"nil",
"\n",
"}"
] | // GetCertAuthorities returns a list of certificate authorities | [
"GetCertAuthorities",
"returns",
"a",
"list",
"of",
"certificate",
"authorities"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L513-L536 | train |
gravitational/teleport | lib/auth/clt.go | DeleteCertAuthority | func (c *Client) DeleteCertAuthority(id services.CertAuthID) error {
if err := id.Check(); err != nil {
return trace.Wrap(err)
}
_, err := c.Delete(c.Endpoint("authorities", string(id.Type), id.DomainName))
return trace.Wrap(err)
} | go | func (c *Client) DeleteCertAuthority(id services.CertAuthID) error {
if err := id.Check(); err != nil {
return trace.Wrap(err)
}
_, err := c.Delete(c.Endpoint("authorities", string(id.Type), id.DomainName))
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteCertAuthority",
"(",
"id",
"services",
".",
"CertAuthID",
")",
"error",
"{",
"if",
"err",
":=",
"id",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"string",
"(",
"id",
".",
"Type",
")",
",",
"id",
".",
"DomainName",
")",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // DeleteCertAuthority deletes cert authority by ID | [
"DeleteCertAuthority",
"deletes",
"cert",
"authority",
"by",
"ID"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L555-L561 | train |
gravitational/teleport | lib/auth/clt.go | GenerateToken | func (c *Client) GenerateToken(req GenerateTokenRequest) (string, error) {
out, err := c.PostJSON(c.Endpoint("tokens"), req)
if err != nil {
return "", trace.Wrap(err)
}
var token string
if err := json.Unmarshal(out.Bytes(), &token); err != nil {
return "", trace.Wrap(err)
}
return token, nil
} | go | func (c *Client) GenerateToken(req GenerateTokenRequest) (string, error) {
out, err := c.PostJSON(c.Endpoint("tokens"), req)
if err != nil {
return "", trace.Wrap(err)
}
var token string
if err := json.Unmarshal(out.Bytes(), &token); err != nil {
return "", trace.Wrap(err)
}
return token, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GenerateToken",
"(",
"req",
"GenerateTokenRequest",
")",
"(",
"string",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"token",
"string",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"token",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"token",
",",
"nil",
"\n",
"}"
] | // GenerateToken creates a special provisioning token for a new SSH server
// that is valid for ttl period seconds.
//
// This token is used by SSH server to authenticate with Auth server
// and get signed certificate and private key from the auth server.
//
// If token is not supplied, it will be auto generated and returned.
// If TTL is not supplied, token will be valid until removed. | [
"GenerateToken",
"creates",
"a",
"special",
"provisioning",
"token",
"for",
"a",
"new",
"SSH",
"server",
"that",
"is",
"valid",
"for",
"ttl",
"period",
"seconds",
".",
"This",
"token",
"is",
"used",
"by",
"SSH",
"server",
"to",
"authenticate",
"with",
"Auth",
"server",
"and",
"get",
"signed",
"certificate",
"and",
"private",
"key",
"from",
"the",
"auth",
"server",
".",
"If",
"token",
"is",
"not",
"supplied",
"it",
"will",
"be",
"auto",
"generated",
"and",
"returned",
".",
"If",
"TTL",
"is",
"not",
"supplied",
"token",
"will",
"be",
"valid",
"until",
"removed",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L583-L593 | train |
gravitational/teleport | lib/auth/clt.go | RegisterUsingToken | func (c *Client) RegisterUsingToken(req RegisterUsingTokenRequest) (*PackedKeys, error) {
if err := req.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
out, err := c.PostJSON(c.Endpoint("tokens", "register"), req)
if err != nil {
return nil, trace.Wrap(err)
}
var keys PackedKeys
if err := json.Unmarshal(out.Bytes(), &keys); err != nil {
return nil, trace.Wrap(err)
}
return &keys, nil
} | go | func (c *Client) RegisterUsingToken(req RegisterUsingTokenRequest) (*PackedKeys, error) {
if err := req.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
out, err := c.PostJSON(c.Endpoint("tokens", "register"), req)
if err != nil {
return nil, trace.Wrap(err)
}
var keys PackedKeys
if err := json.Unmarshal(out.Bytes(), &keys); err != nil {
return nil, trace.Wrap(err)
}
return &keys, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"RegisterUsingToken",
"(",
"req",
"RegisterUsingTokenRequest",
")",
"(",
"*",
"PackedKeys",
",",
"error",
")",
"{",
"if",
"err",
":=",
"req",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"keys",
"PackedKeys",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"keys",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"&",
"keys",
",",
"nil",
"\n",
"}"
] | // RegisterUsingToken calls the auth service API to register a new node using a registration token
// which was previously issued via GenerateToken. | [
"RegisterUsingToken",
"calls",
"the",
"auth",
"service",
"API",
"to",
"register",
"a",
"new",
"node",
"using",
"a",
"registration",
"token",
"which",
"was",
"previously",
"issued",
"via",
"GenerateToken",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L597-L610 | train |
gravitational/teleport | lib/auth/clt.go | GetTokens | func (c *Client) GetTokens(opts ...services.MarshalOption) ([]services.ProvisionToken, error) {
out, err := c.Get(c.Endpoint("tokens"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var tokens []services.ProvisionTokenV1
if err := json.Unmarshal(out.Bytes(), &tokens); err != nil {
return nil, trace.Wrap(err)
}
return services.ProvisionTokensFromV1(tokens), nil
} | go | func (c *Client) GetTokens(opts ...services.MarshalOption) ([]services.ProvisionToken, error) {
out, err := c.Get(c.Endpoint("tokens"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var tokens []services.ProvisionTokenV1
if err := json.Unmarshal(out.Bytes(), &tokens); err != nil {
return nil, trace.Wrap(err)
}
return services.ProvisionTokensFromV1(tokens), nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetTokens",
"(",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"ProvisionToken",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"tokens",
"[",
"]",
"services",
".",
"ProvisionTokenV1",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"tokens",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"ProvisionTokensFromV1",
"(",
"tokens",
")",
",",
"nil",
"\n",
"}"
] | // GetTokens returns a list of active invitation tokens for nodes and users | [
"GetTokens",
"returns",
"a",
"list",
"of",
"active",
"invitation",
"tokens",
"for",
"nodes",
"and",
"users"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L644-L654 | train |
gravitational/teleport | lib/auth/clt.go | GetToken | func (c *Client) GetToken(token string) (services.ProvisionToken, error) {
out, err := c.Get(c.Endpoint("tokens", token), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
return services.UnmarshalProvisionToken(out.Bytes(), services.SkipValidation())
} | go | func (c *Client) GetToken(token string) (services.ProvisionToken, error) {
out, err := c.Get(c.Endpoint("tokens", token), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
return services.UnmarshalProvisionToken(out.Bytes(), services.SkipValidation())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetToken",
"(",
"token",
"string",
")",
"(",
"services",
".",
"ProvisionToken",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"token",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"UnmarshalProvisionToken",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"}"
] | // GetToken returns provisioning token | [
"GetToken",
"returns",
"provisioning",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L657-L663 | train |
gravitational/teleport | lib/auth/clt.go | RegisterNewAuthServer | func (c *Client) RegisterNewAuthServer(token string) error {
_, err := c.PostJSON(c.Endpoint("tokens", "register", "auth"), registerNewAuthServerReq{
Token: token,
})
return trace.Wrap(err)
} | go | func (c *Client) RegisterNewAuthServer(token string) error {
_, err := c.PostJSON(c.Endpoint("tokens", "register", "auth"), registerNewAuthServerReq{
Token: token,
})
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"RegisterNewAuthServer",
"(",
"token",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"registerNewAuthServerReq",
"{",
"Token",
":",
"token",
",",
"}",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // RegisterNewAuthServer is used to register new auth server with token | [
"RegisterNewAuthServer",
"is",
"used",
"to",
"register",
"new",
"auth",
"server",
"with",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L673-L678 | train |
gravitational/teleport | lib/auth/clt.go | UpsertNode | func (c *Client) UpsertNode(s services.Server) (*services.KeepAlive, error) {
if s.GetNamespace() == "" {
return nil, trace.BadParameter("missing node namespace")
}
protoServer, ok := s.(*services.ServerV2)
if !ok {
return nil, trace.BadParameter("unsupported client")
}
clt, err := c.grpc()
if err != nil {
return nil, trace.Wrap(err)
}
keepAlive, err := clt.UpsertNode(context.TODO(), protoServer)
if err != nil {
return nil, trail.FromGRPC(err)
}
return keepAlive, nil
} | go | func (c *Client) UpsertNode(s services.Server) (*services.KeepAlive, error) {
if s.GetNamespace() == "" {
return nil, trace.BadParameter("missing node namespace")
}
protoServer, ok := s.(*services.ServerV2)
if !ok {
return nil, trace.BadParameter("unsupported client")
}
clt, err := c.grpc()
if err != nil {
return nil, trace.Wrap(err)
}
keepAlive, err := clt.UpsertNode(context.TODO(), protoServer)
if err != nil {
return nil, trail.FromGRPC(err)
}
return keepAlive, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertNode",
"(",
"s",
"services",
".",
"Server",
")",
"(",
"*",
"services",
".",
"KeepAlive",
",",
"error",
")",
"{",
"if",
"s",
".",
"GetNamespace",
"(",
")",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"protoServer",
",",
"ok",
":=",
"s",
".",
"(",
"*",
"services",
".",
"ServerV2",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"clt",
",",
"err",
":=",
"c",
".",
"grpc",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"keepAlive",
",",
"err",
":=",
"clt",
".",
"UpsertNode",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"protoServer",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trail",
".",
"FromGRPC",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"keepAlive",
",",
"nil",
"\n",
"}"
] | // UpsertNode is used by SSH servers to reprt their presence
// to the auth servers in form of hearbeat expiring after ttl period. | [
"UpsertNode",
"is",
"used",
"by",
"SSH",
"servers",
"to",
"reprt",
"their",
"presence",
"to",
"the",
"auth",
"servers",
"in",
"form",
"of",
"hearbeat",
"expiring",
"after",
"ttl",
"period",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L682-L699 | train |
gravitational/teleport | lib/auth/clt.go | KeepAliveNode | func (c *Client) KeepAliveNode(ctx context.Context, keepAlive services.KeepAlive) error {
return trace.BadParameter("not implemented, use StreamKeepAlives instead")
} | go | func (c *Client) KeepAliveNode(ctx context.Context, keepAlive services.KeepAlive) error {
return trace.BadParameter("not implemented, use StreamKeepAlives instead")
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"KeepAliveNode",
"(",
"ctx",
"context",
".",
"Context",
",",
"keepAlive",
"services",
".",
"KeepAlive",
")",
"error",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}"
] | // KeepAliveNode updates node keep alive information | [
"KeepAliveNode",
"updates",
"node",
"keep",
"alive",
"information"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L702-L704 | train |
gravitational/teleport | lib/auth/clt.go | recv | func (k *streamKeepAliver) recv() {
err := k.stream.RecvMsg(&empty.Empty{})
k.closeWithError(trail.FromGRPC(err))
} | go | func (k *streamKeepAliver) recv() {
err := k.stream.RecvMsg(&empty.Empty{})
k.closeWithError(trail.FromGRPC(err))
} | [
"func",
"(",
"k",
"*",
"streamKeepAliver",
")",
"recv",
"(",
")",
"{",
"err",
":=",
"k",
".",
"stream",
".",
"RecvMsg",
"(",
"&",
"empty",
".",
"Empty",
"{",
"}",
")",
"\n",
"k",
".",
"closeWithError",
"(",
"trail",
".",
"FromGRPC",
"(",
"err",
")",
")",
"\n",
"}"
] | // recv is necessary to receive errors from the
// server, otherwise no errors will be propagated | [
"recv",
"is",
"necessary",
"to",
"receive",
"errors",
"from",
"the",
"server",
"otherwise",
"no",
"errors",
"will",
"be",
"propagated"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L769-L772 | train |
gravitational/teleport | lib/auth/clt.go | UpsertNodes | func (c *Client) UpsertNodes(namespace string, servers []services.Server) error {
if namespace == "" {
return trace.BadParameter("missing node namespace")
}
bytes, err := services.GetServerMarshaler().MarshalServers(servers)
if err != nil {
return trace.Wrap(err)
}
args := &upsertNodesReq{
Namespace: namespace,
Nodes: bytes,
}
_, err = c.PutJSON(c.Endpoint("namespaces", namespace, "nodes"), args)
return trace.Wrap(err)
} | go | func (c *Client) UpsertNodes(namespace string, servers []services.Server) error {
if namespace == "" {
return trace.BadParameter("missing node namespace")
}
bytes, err := services.GetServerMarshaler().MarshalServers(servers)
if err != nil {
return trace.Wrap(err)
}
args := &upsertNodesReq{
Namespace: namespace,
Nodes: bytes,
}
_, err = c.PutJSON(c.Endpoint("namespaces", namespace, "nodes"), args)
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertNodes",
"(",
"namespace",
"string",
",",
"servers",
"[",
"]",
"services",
".",
"Server",
")",
"error",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"bytes",
",",
"err",
":=",
"services",
".",
"GetServerMarshaler",
"(",
")",
".",
"MarshalServers",
"(",
"servers",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"args",
":=",
"&",
"upsertNodesReq",
"{",
"Namespace",
":",
"namespace",
",",
"Nodes",
":",
"bytes",
",",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PutJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"namespace",
",",
"\"",
"\"",
")",
",",
"args",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // UpsertNodes bulk inserts nodes. | [
"UpsertNodes",
"bulk",
"inserts",
"nodes",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L873-L888 | train |
gravitational/teleport | lib/auth/clt.go | DeleteNode | func (c *Client) DeleteNode(namespace string, name string) error {
if namespace == "" {
return trace.BadParameter("missing parameter namespace")
}
if name == "" {
return trace.BadParameter("missing parameter name")
}
_, err := c.Delete(c.Endpoint("namespaces", namespace, "nodes", name))
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (c *Client) DeleteNode(namespace string, name string) error {
if namespace == "" {
return trace.BadParameter("missing parameter namespace")
}
if name == "" {
return trace.BadParameter("missing parameter name")
}
_, err := c.Delete(c.Endpoint("namespaces", namespace, "nodes", name))
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteNode",
"(",
"namespace",
"string",
",",
"name",
"string",
")",
"error",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"name",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"namespace",
",",
"\"",
"\"",
",",
"name",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // DeleteNode deletes node in the namespace by name | [
"DeleteNode",
"deletes",
"node",
"in",
"the",
"namespace",
"by",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L900-L912 | train |
gravitational/teleport | lib/auth/clt.go | GetNodes | func (c *Client) GetNodes(namespace string, opts ...services.MarshalOption) ([]services.Server, error) {
if namespace == "" {
return nil, trace.BadParameter(MissingNamespaceError)
}
cfg, err := services.CollectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
out, err := c.Get(c.Endpoint("namespaces", namespace, "nodes"), url.Values{
"skip_validation": []string{fmt.Sprintf("%t", cfg.SkipValidation)},
})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
re := make([]services.Server, len(items))
for i, raw := range items {
s, err := services.GetServerMarshaler().UnmarshalServer(
raw,
services.KindNode,
services.AddOptions(opts, services.SkipValidation())...)
if err != nil {
return nil, trace.Wrap(err)
}
re[i] = s
}
return re, nil
} | go | func (c *Client) GetNodes(namespace string, opts ...services.MarshalOption) ([]services.Server, error) {
if namespace == "" {
return nil, trace.BadParameter(MissingNamespaceError)
}
cfg, err := services.CollectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
out, err := c.Get(c.Endpoint("namespaces", namespace, "nodes"), url.Values{
"skip_validation": []string{fmt.Sprintf("%t", cfg.SkipValidation)},
})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
re := make([]services.Server, len(items))
for i, raw := range items {
s, err := services.GetServerMarshaler().UnmarshalServer(
raw,
services.KindNode,
services.AddOptions(opts, services.SkipValidation())...)
if err != nil {
return nil, trace.Wrap(err)
}
re[i] = s
}
return re, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetNodes",
"(",
"namespace",
"string",
",",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"error",
")",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"MissingNamespaceError",
")",
"\n",
"}",
"\n",
"cfg",
",",
"err",
":=",
"services",
".",
"CollectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"namespace",
",",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"\"",
"\"",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"cfg",
".",
"SkipValidation",
")",
"}",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"re",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"items",
"{",
"s",
",",
"err",
":=",
"services",
".",
"GetServerMarshaler",
"(",
")",
".",
"UnmarshalServer",
"(",
"raw",
",",
"services",
".",
"KindNode",
",",
"services",
".",
"AddOptions",
"(",
"opts",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"...",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"re",
"[",
"i",
"]",
"=",
"s",
"\n",
"}",
"\n\n",
"return",
"re",
",",
"nil",
"\n",
"}"
] | // GetNodes returns the list of servers registered in the cluster. | [
"GetNodes",
"returns",
"the",
"list",
"of",
"servers",
"registered",
"in",
"the",
"cluster",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L915-L948 | train |
gravitational/teleport | lib/auth/clt.go | UpsertReverseTunnel | func (c *Client) UpsertReverseTunnel(tunnel services.ReverseTunnel) error {
data, err := services.GetReverseTunnelMarshaler().MarshalReverseTunnel(tunnel)
if err != nil {
return trace.Wrap(err)
}
args := &upsertReverseTunnelRawReq{
ReverseTunnel: data,
}
_, err = c.PostJSON(c.Endpoint("reversetunnels"), args)
return trace.Wrap(err)
} | go | func (c *Client) UpsertReverseTunnel(tunnel services.ReverseTunnel) error {
data, err := services.GetReverseTunnelMarshaler().MarshalReverseTunnel(tunnel)
if err != nil {
return trace.Wrap(err)
}
args := &upsertReverseTunnelRawReq{
ReverseTunnel: data,
}
_, err = c.PostJSON(c.Endpoint("reversetunnels"), args)
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertReverseTunnel",
"(",
"tunnel",
"services",
".",
"ReverseTunnel",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"GetReverseTunnelMarshaler",
"(",
")",
".",
"MarshalReverseTunnel",
"(",
"tunnel",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"args",
":=",
"&",
"upsertReverseTunnelRawReq",
"{",
"ReverseTunnel",
":",
"data",
",",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"args",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // UpsertReverseTunnel is used by admins to create a new reverse tunnel
// to the remote proxy to bypass firewall restrictions | [
"UpsertReverseTunnel",
"is",
"used",
"by",
"admins",
"to",
"create",
"a",
"new",
"reverse",
"tunnel",
"to",
"the",
"remote",
"proxy",
"to",
"bypass",
"firewall",
"restrictions"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L952-L962 | train |
gravitational/teleport | lib/auth/clt.go | GetReverseTunnels | func (c *Client) GetReverseTunnels(opts ...services.MarshalOption) ([]services.ReverseTunnel, error) {
out, err := c.Get(c.Endpoint("reversetunnels"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
tunnels := make([]services.ReverseTunnel, len(items))
for i, raw := range items {
tunnel, err := services.GetReverseTunnelMarshaler().UnmarshalReverseTunnel(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
tunnels[i] = tunnel
}
return tunnels, nil
} | go | func (c *Client) GetReverseTunnels(opts ...services.MarshalOption) ([]services.ReverseTunnel, error) {
out, err := c.Get(c.Endpoint("reversetunnels"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
tunnels := make([]services.ReverseTunnel, len(items))
for i, raw := range items {
tunnel, err := services.GetReverseTunnelMarshaler().UnmarshalReverseTunnel(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
tunnels[i] = tunnel
}
return tunnels, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetReverseTunnels",
"(",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"ReverseTunnel",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"tunnels",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"ReverseTunnel",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"items",
"{",
"tunnel",
",",
"err",
":=",
"services",
".",
"GetReverseTunnelMarshaler",
"(",
")",
".",
"UnmarshalReverseTunnel",
"(",
"raw",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"tunnels",
"[",
"i",
"]",
"=",
"tunnel",
"\n",
"}",
"\n",
"return",
"tunnels",
",",
"nil",
"\n",
"}"
] | // GetReverseTunnels returns the list of created reverse tunnels | [
"GetReverseTunnels",
"returns",
"the",
"list",
"of",
"created",
"reverse",
"tunnels"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L970-L988 | train |
gravitational/teleport | lib/auth/clt.go | DeleteReverseTunnel | func (c *Client) DeleteReverseTunnel(domainName string) error {
// this is to avoid confusing error in case if domain empty for example
// HTTP route will fail producing generic not found error
// instead we catch the error here
if strings.TrimSpace(domainName) == "" {
return trace.BadParameter("empty domain name")
}
_, err := c.Delete(c.Endpoint("reversetunnels", domainName))
return trace.Wrap(err)
} | go | func (c *Client) DeleteReverseTunnel(domainName string) error {
// this is to avoid confusing error in case if domain empty for example
// HTTP route will fail producing generic not found error
// instead we catch the error here
if strings.TrimSpace(domainName) == "" {
return trace.BadParameter("empty domain name")
}
_, err := c.Delete(c.Endpoint("reversetunnels", domainName))
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteReverseTunnel",
"(",
"domainName",
"string",
")",
"error",
"{",
"// this is to avoid confusing error in case if domain empty for example",
"// HTTP route will fail producing generic not found error",
"// instead we catch the error here",
"if",
"strings",
".",
"TrimSpace",
"(",
"domainName",
")",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"domainName",
")",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // DeleteReverseTunnel deletes reverse tunnel by domain name | [
"DeleteReverseTunnel",
"deletes",
"reverse",
"tunnel",
"by",
"domain",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L991-L1000 | train |
gravitational/teleport | lib/auth/clt.go | UpsertTunnelConnection | func (c *Client) UpsertTunnelConnection(conn services.TunnelConnection) error {
data, err := services.MarshalTunnelConnection(conn)
if err != nil {
return trace.Wrap(err)
}
args := &upsertTunnelConnectionRawReq{
TunnelConnection: data,
}
_, err = c.PostJSON(c.Endpoint("tunnelconnections"), args)
return trace.Wrap(err)
} | go | func (c *Client) UpsertTunnelConnection(conn services.TunnelConnection) error {
data, err := services.MarshalTunnelConnection(conn)
if err != nil {
return trace.Wrap(err)
}
args := &upsertTunnelConnectionRawReq{
TunnelConnection: data,
}
_, err = c.PostJSON(c.Endpoint("tunnelconnections"), args)
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertTunnelConnection",
"(",
"conn",
"services",
".",
"TunnelConnection",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"MarshalTunnelConnection",
"(",
"conn",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"args",
":=",
"&",
"upsertTunnelConnectionRawReq",
"{",
"TunnelConnection",
":",
"data",
",",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"args",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // UpsertTunnelConnection upserts tunnel connection | [
"UpsertTunnelConnection",
"upserts",
"tunnel",
"connection"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1003-L1013 | train |
gravitational/teleport | lib/auth/clt.go | CreateRemoteCluster | func (c *Client) CreateRemoteCluster(rc services.RemoteCluster) error {
data, err := services.MarshalRemoteCluster(rc)
if err != nil {
return trace.Wrap(err)
}
args := &createRemoteClusterRawReq{
RemoteCluster: data,
}
_, err = c.PostJSON(c.Endpoint("remoteclusters"), args)
return trace.Wrap(err)
} | go | func (c *Client) CreateRemoteCluster(rc services.RemoteCluster) error {
data, err := services.MarshalRemoteCluster(rc)
if err != nil {
return trace.Wrap(err)
}
args := &createRemoteClusterRawReq{
RemoteCluster: data,
}
_, err = c.PostJSON(c.Endpoint("remoteclusters"), args)
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateRemoteCluster",
"(",
"rc",
"services",
".",
"RemoteCluster",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"MarshalRemoteCluster",
"(",
"rc",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"args",
":=",
"&",
"createRemoteClusterRawReq",
"{",
"RemoteCluster",
":",
"data",
",",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"args",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // CreateRemoteCluster creates remote cluster resource | [
"CreateRemoteCluster",
"creates",
"remote",
"cluster",
"resource"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1151-L1161 | train |
gravitational/teleport | lib/auth/clt.go | GetAuthServers | func (c *Client) GetAuthServers() ([]services.Server, error) {
out, err := c.Get(c.Endpoint("authservers"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
re := make([]services.Server, len(items))
for i, raw := range items {
server, err := services.GetServerMarshaler().UnmarshalServer(raw, services.KindAuthServer, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
re[i] = server
}
return re, nil
} | go | func (c *Client) GetAuthServers() ([]services.Server, error) {
out, err := c.Get(c.Endpoint("authservers"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
re := make([]services.Server, len(items))
for i, raw := range items {
server, err := services.GetServerMarshaler().UnmarshalServer(raw, services.KindAuthServer, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
re[i] = server
}
return re, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetAuthServers",
"(",
")",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"re",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"items",
"{",
"server",
",",
"err",
":=",
"services",
".",
"GetServerMarshaler",
"(",
")",
".",
"UnmarshalServer",
"(",
"raw",
",",
"services",
".",
"KindAuthServer",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"re",
"[",
"i",
"]",
"=",
"server",
"\n",
"}",
"\n",
"return",
"re",
",",
"nil",
"\n",
"}"
] | // GetAuthServers returns the list of auth servers registered in the cluster. | [
"GetAuthServers",
"returns",
"the",
"list",
"of",
"auth",
"servers",
"registered",
"in",
"the",
"cluster",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1178-L1196 | train |
gravitational/teleport | lib/auth/clt.go | UpsertProxy | func (c *Client) UpsertProxy(s services.Server) error {
data, err := services.GetServerMarshaler().MarshalServer(s)
if err != nil {
return trace.Wrap(err)
}
args := &upsertServerRawReq{
Server: data,
}
_, err = c.PostJSON(c.Endpoint("proxies"), args)
return trace.Wrap(err)
} | go | func (c *Client) UpsertProxy(s services.Server) error {
data, err := services.GetServerMarshaler().MarshalServer(s)
if err != nil {
return trace.Wrap(err)
}
args := &upsertServerRawReq{
Server: data,
}
_, err = c.PostJSON(c.Endpoint("proxies"), args)
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertProxy",
"(",
"s",
"services",
".",
"Server",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"GetServerMarshaler",
"(",
")",
".",
"MarshalServer",
"(",
"s",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"args",
":=",
"&",
"upsertServerRawReq",
"{",
"Server",
":",
"data",
",",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"args",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // UpsertProxy is used by proxies to report their presence
// to other auth servers in form of hearbeat expiring after ttl period. | [
"UpsertProxy",
"is",
"used",
"by",
"proxies",
"to",
"report",
"their",
"presence",
"to",
"other",
"auth",
"servers",
"in",
"form",
"of",
"hearbeat",
"expiring",
"after",
"ttl",
"period",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1210-L1220 | train |
gravitational/teleport | lib/auth/clt.go | UpsertPassword | func (c *Client) UpsertPassword(user string, password []byte) error {
_, err := c.PostJSON(
c.Endpoint("users", user, "web", "password"),
upsertPasswordReq{
Password: string(password),
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (c *Client) UpsertPassword(user string, password []byte) error {
_, err := c.PostJSON(
c.Endpoint("users", user, "web", "password"),
upsertPasswordReq{
Password: string(password),
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertPassword",
"(",
"user",
"string",
",",
"password",
"[",
"]",
"byte",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"user",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"upsertPasswordReq",
"{",
"Password",
":",
"string",
"(",
"password",
")",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] | // UpsertPassword updates web access password for the user | [
"UpsertPassword",
"updates",
"web",
"access",
"password",
"for",
"the",
"user"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1278-L1289 | train |
gravitational/teleport | lib/auth/clt.go | UpsertUser | func (c *Client) UpsertUser(user services.User) error {
data, err := services.GetUserMarshaler().MarshalUser(user)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("users"), &upsertUserRawReq{User: data})
return trace.Wrap(err)
} | go | func (c *Client) UpsertUser(user services.User) error {
data, err := services.GetUserMarshaler().MarshalUser(user)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("users"), &upsertUserRawReq{User: data})
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertUser",
"(",
"user",
"services",
".",
"User",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"GetUserMarshaler",
"(",
")",
".",
"MarshalUser",
"(",
"user",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"&",
"upsertUserRawReq",
"{",
"User",
":",
"data",
"}",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // UpsertUser user updates or inserts user entry | [
"UpsertUser",
"user",
"updates",
"or",
"inserts",
"user",
"entry"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1292-L1299 | train |
gravitational/teleport | lib/auth/clt.go | ChangePassword | func (c *Client) ChangePassword(req services.ChangePasswordReq) error {
_, err := c.PutJSON(c.Endpoint("users", req.User, "web", "password"), req)
return trace.Wrap(err)
} | go | func (c *Client) ChangePassword(req services.ChangePasswordReq) error {
_, err := c.PutJSON(c.Endpoint("users", req.User, "web", "password"), req)
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"ChangePassword",
"(",
"req",
"services",
".",
"ChangePasswordReq",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"PutJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"req",
".",
"User",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"req",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // ChangePassword changes user password | [
"ChangePassword",
"changes",
"user",
"password"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1302-L1305 | train |
gravitational/teleport | lib/auth/clt.go | CheckPassword | func (c *Client) CheckPassword(user string, password []byte, otpToken string) error {
_, err := c.PostJSON(
c.Endpoint("users", user, "web", "password", "check"),
checkPasswordReq{
Password: string(password),
OTPToken: otpToken,
})
return trace.Wrap(err)
} | go | func (c *Client) CheckPassword(user string, password []byte, otpToken string) error {
_, err := c.PostJSON(
c.Endpoint("users", user, "web", "password", "check"),
checkPasswordReq{
Password: string(password),
OTPToken: otpToken,
})
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CheckPassword",
"(",
"user",
"string",
",",
"password",
"[",
"]",
"byte",
",",
"otpToken",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"user",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"checkPasswordReq",
"{",
"Password",
":",
"string",
"(",
"password",
")",
",",
"OTPToken",
":",
"otpToken",
",",
"}",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // CheckPassword checks if the suplied web access password is valid. | [
"CheckPassword",
"checks",
"if",
"the",
"suplied",
"web",
"access",
"password",
"is",
"valid",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1308-L1316 | train |
gravitational/teleport | lib/auth/clt.go | GetU2FSignRequest | func (c *Client) GetU2FSignRequest(user string, password []byte) (*u2f.SignRequest, error) {
out, err := c.PostJSON(
c.Endpoint("u2f", "users", user, "sign"),
signInReq{
Password: string(password),
},
)
if err != nil {
return nil, trace.Wrap(err)
}
var signRequest *u2f.SignRequest
if err := json.Unmarshal(out.Bytes(), &signRequest); err != nil {
return nil, err
}
return signRequest, nil
} | go | func (c *Client) GetU2FSignRequest(user string, password []byte) (*u2f.SignRequest, error) {
out, err := c.PostJSON(
c.Endpoint("u2f", "users", user, "sign"),
signInReq{
Password: string(password),
},
)
if err != nil {
return nil, trace.Wrap(err)
}
var signRequest *u2f.SignRequest
if err := json.Unmarshal(out.Bytes(), &signRequest); err != nil {
return nil, err
}
return signRequest, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetU2FSignRequest",
"(",
"user",
"string",
",",
"password",
"[",
"]",
"byte",
")",
"(",
"*",
"u2f",
".",
"SignRequest",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"user",
",",
"\"",
"\"",
")",
",",
"signInReq",
"{",
"Password",
":",
"string",
"(",
"password",
")",
",",
"}",
",",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"signRequest",
"*",
"u2f",
".",
"SignRequest",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"signRequest",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"signRequest",
",",
"nil",
"\n",
"}"
] | // GetU2FSignRequest generates request for user trying to authenticate with U2F token | [
"GetU2FSignRequest",
"generates",
"request",
"for",
"user",
"trying",
"to",
"authenticate",
"with",
"U2F",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1319-L1334 | train |
gravitational/teleport | lib/auth/clt.go | ExtendWebSession | func (c *Client) ExtendWebSession(user string, prevSessionID string) (services.WebSession, error) {
out, err := c.PostJSON(
c.Endpoint("users", user, "web", "sessions"),
createWebSessionReq{
PrevSessionID: prevSessionID,
},
)
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | go | func (c *Client) ExtendWebSession(user string, prevSessionID string) (services.WebSession, error) {
out, err := c.PostJSON(
c.Endpoint("users", user, "web", "sessions"),
createWebSessionReq{
PrevSessionID: prevSessionID,
},
)
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"ExtendWebSession",
"(",
"user",
"string",
",",
"prevSessionID",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"user",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"createWebSessionReq",
"{",
"PrevSessionID",
":",
"prevSessionID",
",",
"}",
",",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetWebSessionMarshaler",
"(",
")",
".",
"UnmarshalWebSession",
"(",
"out",
".",
"Bytes",
"(",
")",
")",
"\n",
"}"
] | // ExtendWebSession creates a new web session for a user based on another
// valid web session | [
"ExtendWebSession",
"creates",
"a",
"new",
"web",
"session",
"for",
"a",
"user",
"based",
"on",
"another",
"valid",
"web",
"session"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1338-L1349 | train |
gravitational/teleport | lib/auth/clt.go | GetWebSessionInfo | func (c *Client) GetWebSessionInfo(user string, sid string) (services.WebSession, error) {
out, err := c.Get(
c.Endpoint("users", user, "web", "sessions", sid), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | go | func (c *Client) GetWebSessionInfo(user string, sid string) (services.WebSession, error) {
out, err := c.Get(
c.Endpoint("users", user, "web", "sessions", sid), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetWebSessionInfo",
"(",
"user",
"string",
",",
"sid",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"user",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"sid",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetWebSessionMarshaler",
"(",
")",
".",
"UnmarshalWebSession",
"(",
"out",
".",
"Bytes",
"(",
")",
")",
"\n",
"}"
] | // GetWebSessionInfo checks if a web sesion is valid, returns session id in case if
// it is valid, or error otherwise. | [
"GetWebSessionInfo",
"checks",
"if",
"a",
"web",
"sesion",
"is",
"valid",
"returns",
"session",
"id",
"in",
"case",
"if",
"it",
"is",
"valid",
"or",
"error",
"otherwise",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1395-L1402 | train |
gravitational/teleport | lib/auth/clt.go | DeleteWebSession | func (c *Client) DeleteWebSession(user string, sid string) error {
_, err := c.Delete(c.Endpoint("users", user, "web", "sessions", sid))
return trace.Wrap(err)
} | go | func (c *Client) DeleteWebSession(user string, sid string) error {
_, err := c.Delete(c.Endpoint("users", user, "web", "sessions", sid))
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteWebSession",
"(",
"user",
"string",
",",
"sid",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"user",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"sid",
")",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // DeleteWebSession deletes a web session for this user by id | [
"DeleteWebSession",
"deletes",
"a",
"web",
"session",
"for",
"this",
"user",
"by",
"id"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1405-L1408 | train |
gravitational/teleport | lib/auth/clt.go | GetUser | func (c *Client) GetUser(name string) (services.User, error) {
if name == "" {
return nil, trace.BadParameter("missing username")
}
out, err := c.Get(c.Endpoint("users", name), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
user, err := services.GetUserMarshaler().UnmarshalUser(out.Bytes(), services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
return user, nil
} | go | func (c *Client) GetUser(name string) (services.User, error) {
if name == "" {
return nil, trace.BadParameter("missing username")
}
out, err := c.Get(c.Endpoint("users", name), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
user, err := services.GetUserMarshaler().UnmarshalUser(out.Bytes(), services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
return user, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetUser",
"(",
"name",
"string",
")",
"(",
"services",
".",
"User",
",",
"error",
")",
"{",
"if",
"name",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"name",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"user",
",",
"err",
":=",
"services",
".",
"GetUserMarshaler",
"(",
")",
".",
"UnmarshalUser",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"user",
",",
"nil",
"\n",
"}"
] | // GetUser returns a list of usernames registered in the system | [
"GetUser",
"returns",
"a",
"list",
"of",
"usernames",
"registered",
"in",
"the",
"system"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1411-L1424 | train |
gravitational/teleport | lib/auth/clt.go | GetUsers | func (c *Client) GetUsers() ([]services.User, error) {
out, err := c.Get(c.Endpoint("users"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
users := make([]services.User, len(items))
for i, userBytes := range items {
user, err := services.GetUserMarshaler().UnmarshalUser(userBytes, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
users[i] = user
}
return users, nil
} | go | func (c *Client) GetUsers() ([]services.User, error) {
out, err := c.Get(c.Endpoint("users"), url.Values{})
if err != nil {
return nil, trace.Wrap(err)
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
users := make([]services.User, len(items))
for i, userBytes := range items {
user, err := services.GetUserMarshaler().UnmarshalUser(userBytes, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
users[i] = user
}
return users, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetUsers",
"(",
")",
"(",
"[",
"]",
"services",
".",
"User",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"users",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"User",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"userBytes",
":=",
"range",
"items",
"{",
"user",
",",
"err",
":=",
"services",
".",
"GetUserMarshaler",
"(",
")",
".",
"UnmarshalUser",
"(",
"userBytes",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"users",
"[",
"i",
"]",
"=",
"user",
"\n",
"}",
"\n",
"return",
"users",
",",
"nil",
"\n",
"}"
] | // GetUsers returns a list of usernames registered in the system | [
"GetUsers",
"returns",
"a",
"list",
"of",
"usernames",
"registered",
"in",
"the",
"system"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1427-L1445 | train |
gravitational/teleport | lib/auth/clt.go | DeleteUser | func (c *Client) DeleteUser(user string) error {
_, err := c.Delete(c.Endpoint("users", user))
return trace.Wrap(err)
} | go | func (c *Client) DeleteUser(user string) error {
_, err := c.Delete(c.Endpoint("users", user))
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteUser",
"(",
"user",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"user",
")",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // DeleteUser deletes a user by username | [
"DeleteUser",
"deletes",
"a",
"user",
"by",
"username"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1448-L1451 | train |
gravitational/teleport | lib/auth/clt.go | GenerateHostCert | func (c *Client) GenerateHostCert(
key []byte, hostID, nodeName string, principals []string, clusterName string, roles teleport.Roles, ttl time.Duration) ([]byte, error) {
out, err := c.PostJSON(c.Endpoint("ca", "host", "certs"),
generateHostCertReq{
Key: key,
HostID: hostID,
NodeName: nodeName,
Principals: principals,
ClusterName: clusterName,
Roles: roles,
TTL: ttl,
})
if err != nil {
return nil, trace.Wrap(err)
}
var cert string
if err := json.Unmarshal(out.Bytes(), &cert); err != nil {
return nil, err
}
return []byte(cert), nil
} | go | func (c *Client) GenerateHostCert(
key []byte, hostID, nodeName string, principals []string, clusterName string, roles teleport.Roles, ttl time.Duration) ([]byte, error) {
out, err := c.PostJSON(c.Endpoint("ca", "host", "certs"),
generateHostCertReq{
Key: key,
HostID: hostID,
NodeName: nodeName,
Principals: principals,
ClusterName: clusterName,
Roles: roles,
TTL: ttl,
})
if err != nil {
return nil, trace.Wrap(err)
}
var cert string
if err := json.Unmarshal(out.Bytes(), &cert); err != nil {
return nil, err
}
return []byte(cert), nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GenerateHostCert",
"(",
"key",
"[",
"]",
"byte",
",",
"hostID",
",",
"nodeName",
"string",
",",
"principals",
"[",
"]",
"string",
",",
"clusterName",
"string",
",",
"roles",
"teleport",
".",
"Roles",
",",
"ttl",
"time",
".",
"Duration",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"generateHostCertReq",
"{",
"Key",
":",
"key",
",",
"HostID",
":",
"hostID",
",",
"NodeName",
":",
"nodeName",
",",
"Principals",
":",
"principals",
",",
"ClusterName",
":",
"clusterName",
",",
"Roles",
":",
"roles",
",",
"TTL",
":",
"ttl",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"var",
"cert",
"string",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"cert",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"[",
"]",
"byte",
"(",
"cert",
")",
",",
"nil",
"\n",
"}"
] | // GenerateHostCert takes the public key in the Open SSH ``authorized_keys``
// plain text format, signs it using Host Certificate Authority private key and returns the
// resulting certificate. | [
"GenerateHostCert",
"takes",
"the",
"public",
"key",
"in",
"the",
"Open",
"SSH",
"authorized_keys",
"plain",
"text",
"format",
"signs",
"it",
"using",
"Host",
"Certificate",
"Authority",
"private",
"key",
"and",
"returns",
"the",
"resulting",
"certificate",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1471-L1494 | train |
gravitational/teleport | lib/auth/clt.go | GetSignupTokenData | func (c *Client) GetSignupTokenData(token string) (user string, otpQRCode []byte, e error) {
out, err := c.Get(c.Endpoint("signuptokens", token), url.Values{})
if err != nil {
return "", nil, err
}
var tokenData getSignupTokenDataResponse
if err := json.Unmarshal(out.Bytes(), &tokenData); err != nil {
return "", nil, err
}
return tokenData.User, tokenData.QRImg, nil
} | go | func (c *Client) GetSignupTokenData(token string) (user string, otpQRCode []byte, e error) {
out, err := c.Get(c.Endpoint("signuptokens", token), url.Values{})
if err != nil {
return "", nil, err
}
var tokenData getSignupTokenDataResponse
if err := json.Unmarshal(out.Bytes(), &tokenData); err != nil {
return "", nil, err
}
return tokenData.User, tokenData.QRImg, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetSignupTokenData",
"(",
"token",
"string",
")",
"(",
"user",
"string",
",",
"otpQRCode",
"[",
"]",
"byte",
",",
"e",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"token",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"var",
"tokenData",
"getSignupTokenDataResponse",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"tokenData",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"tokenData",
".",
"User",
",",
"tokenData",
".",
"QRImg",
",",
"nil",
"\n",
"}"
] | // GetSignupTokenData returns token data for a valid token | [
"GetSignupTokenData",
"returns",
"token",
"data",
"for",
"a",
"valid",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1517-L1529 | train |
gravitational/teleport | lib/auth/clt.go | GenerateUserCert | func (c *Client) GenerateUserCert(key []byte, user string, ttl time.Duration, compatibility string) ([]byte, error) {
out, err := c.PostJSON(c.Endpoint("ca", "user", "certs"),
generateUserCertReq{
Key: key,
User: user,
TTL: ttl,
Compatibility: compatibility,
})
if err != nil {
return nil, trace.Wrap(err)
}
var cert string
if err := json.Unmarshal(out.Bytes(), &cert); err != nil {
return nil, trace.Wrap(err)
}
return []byte(cert), nil
} | go | func (c *Client) GenerateUserCert(key []byte, user string, ttl time.Duration, compatibility string) ([]byte, error) {
out, err := c.PostJSON(c.Endpoint("ca", "user", "certs"),
generateUserCertReq{
Key: key,
User: user,
TTL: ttl,
Compatibility: compatibility,
})
if err != nil {
return nil, trace.Wrap(err)
}
var cert string
if err := json.Unmarshal(out.Bytes(), &cert); err != nil {
return nil, trace.Wrap(err)
}
return []byte(cert), nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GenerateUserCert",
"(",
"key",
"[",
"]",
"byte",
",",
"user",
"string",
",",
"ttl",
"time",
".",
"Duration",
",",
"compatibility",
"string",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"generateUserCertReq",
"{",
"Key",
":",
"key",
",",
"User",
":",
"user",
",",
"TTL",
":",
"ttl",
",",
"Compatibility",
":",
"compatibility",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"cert",
"string",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"cert",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"[",
"]",
"byte",
"(",
"cert",
")",
",",
"nil",
"\n",
"}"
] | // GenerateUserCert takes the public key in the OpenSSH `authorized_keys` plain
// text format, signs it using User Certificate Authority signing key and
// returns the resulting certificate. | [
"GenerateUserCert",
"takes",
"the",
"public",
"key",
"in",
"the",
"OpenSSH",
"authorized_keys",
"plain",
"text",
"format",
"signs",
"it",
"using",
"User",
"Certificate",
"Authority",
"signing",
"key",
"and",
"returns",
"the",
"resulting",
"certificate",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1534-L1550 | train |
gravitational/teleport | lib/auth/clt.go | GetSignupU2FRegisterRequest | func (c *Client) GetSignupU2FRegisterRequest(token string) (u2fRegisterRequest *u2f.RegisterRequest, e error) {
out, err := c.Get(c.Endpoint("u2f", "signuptokens", token), url.Values{})
if err != nil {
return nil, err
}
var u2fRegReq u2f.RegisterRequest
if err := json.Unmarshal(out.Bytes(), &u2fRegReq); err != nil {
return nil, err
}
return &u2fRegReq, nil
} | go | func (c *Client) GetSignupU2FRegisterRequest(token string) (u2fRegisterRequest *u2f.RegisterRequest, e error) {
out, err := c.Get(c.Endpoint("u2f", "signuptokens", token), url.Values{})
if err != nil {
return nil, err
}
var u2fRegReq u2f.RegisterRequest
if err := json.Unmarshal(out.Bytes(), &u2fRegReq); err != nil {
return nil, err
}
return &u2fRegReq, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetSignupU2FRegisterRequest",
"(",
"token",
"string",
")",
"(",
"u2fRegisterRequest",
"*",
"u2f",
".",
"RegisterRequest",
",",
"e",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"token",
")",
",",
"url",
".",
"Values",
"{",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"var",
"u2fRegReq",
"u2f",
".",
"RegisterRequest",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"u2fRegReq",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"&",
"u2fRegReq",
",",
"nil",
"\n",
"}"
] | // GetSignupU2FRegisterRequest generates sign request for user trying to sign up with invite tokenx | [
"GetSignupU2FRegisterRequest",
"generates",
"sign",
"request",
"for",
"user",
"trying",
"to",
"sign",
"up",
"with",
"invite",
"tokenx"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1553-L1563 | train |
gravitational/teleport | lib/auth/clt.go | CreateUserWithOTP | func (c *Client) CreateUserWithOTP(token, password, otpToken string) (services.WebSession, error) {
out, err := c.PostJSON(c.Endpoint("signuptokens", "users"), createUserWithTokenReq{
Token: token,
Password: password,
OTPToken: otpToken,
})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | go | func (c *Client) CreateUserWithOTP(token, password, otpToken string) (services.WebSession, error) {
out, err := c.PostJSON(c.Endpoint("signuptokens", "users"), createUserWithTokenReq{
Token: token,
Password: password,
OTPToken: otpToken,
})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateUserWithOTP",
"(",
"token",
",",
"password",
",",
"otpToken",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"createUserWithTokenReq",
"{",
"Token",
":",
"token",
",",
"Password",
":",
"password",
",",
"OTPToken",
":",
"otpToken",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetWebSessionMarshaler",
"(",
")",
".",
"UnmarshalWebSession",
"(",
"out",
".",
"Bytes",
"(",
")",
")",
"\n",
"}"
] | // CreateUserWithOTP creates account with provided token and password.
// Account username and OTP key are taken from token data.
// Deletes token after account creation. | [
"CreateUserWithOTP",
"creates",
"account",
"with",
"provided",
"token",
"and",
"password",
".",
"Account",
"username",
"and",
"OTP",
"key",
"are",
"taken",
"from",
"token",
"data",
".",
"Deletes",
"token",
"after",
"account",
"creation",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1568-L1578 | train |
gravitational/teleport | lib/auth/clt.go | CreateUserWithU2FToken | func (c *Client) CreateUserWithU2FToken(token string, password string, u2fRegisterResponse u2f.RegisterResponse) (services.WebSession, error) {
out, err := c.PostJSON(c.Endpoint("u2f", "users"), createUserWithU2FTokenReq{
Token: token,
Password: password,
U2FRegisterResponse: u2fRegisterResponse,
})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | go | func (c *Client) CreateUserWithU2FToken(token string, password string, u2fRegisterResponse u2f.RegisterResponse) (services.WebSession, error) {
out, err := c.PostJSON(c.Endpoint("u2f", "users"), createUserWithU2FTokenReq{
Token: token,
Password: password,
U2FRegisterResponse: u2fRegisterResponse,
})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetWebSessionMarshaler().UnmarshalWebSession(out.Bytes())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateUserWithU2FToken",
"(",
"token",
"string",
",",
"password",
"string",
",",
"u2fRegisterResponse",
"u2f",
".",
"RegisterResponse",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"createUserWithU2FTokenReq",
"{",
"Token",
":",
"token",
",",
"Password",
":",
"password",
",",
"U2FRegisterResponse",
":",
"u2fRegisterResponse",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetWebSessionMarshaler",
"(",
")",
".",
"UnmarshalWebSession",
"(",
"out",
".",
"Bytes",
"(",
")",
")",
"\n",
"}"
] | // CreateUserWithU2FToken creates user account with provided token and U2F sign response | [
"CreateUserWithU2FToken",
"creates",
"user",
"account",
"with",
"provided",
"token",
"and",
"U2F",
"sign",
"response"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1594-L1604 | train |
gravitational/teleport | lib/auth/clt.go | UpsertOIDCConnector | func (c *Client) UpsertOIDCConnector(connector services.OIDCConnector) error {
data, err := services.GetOIDCConnectorMarshaler().MarshalOIDCConnector(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("oidc", "connectors"), &upsertOIDCConnectorRawReq{
Connector: data,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (c *Client) UpsertOIDCConnector(connector services.OIDCConnector) error {
data, err := services.GetOIDCConnectorMarshaler().MarshalOIDCConnector(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("oidc", "connectors"), &upsertOIDCConnectorRawReq{
Connector: data,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertOIDCConnector",
"(",
"connector",
"services",
".",
"OIDCConnector",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"GetOIDCConnectorMarshaler",
"(",
")",
".",
"MarshalOIDCConnector",
"(",
"connector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"&",
"upsertOIDCConnectorRawReq",
"{",
"Connector",
":",
"data",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // UpsertOIDCConnector updates or creates OIDC connector | [
"UpsertOIDCConnector",
"updates",
"or",
"creates",
"OIDC",
"connector"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1607-L1619 | train |
gravitational/teleport | lib/auth/clt.go | GetOIDCConnector | func (c *Client) GetOIDCConnector(id string, withSecrets bool) (services.OIDCConnector, error) {
if id == "" {
return nil, trace.BadParameter("missing connector id")
}
out, err := c.Get(c.Endpoint("oidc", "connectors", id),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, err
}
return services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(out.Bytes(), services.SkipValidation())
} | go | func (c *Client) GetOIDCConnector(id string, withSecrets bool) (services.OIDCConnector, error) {
if id == "" {
return nil, trace.BadParameter("missing connector id")
}
out, err := c.Get(c.Endpoint("oidc", "connectors", id),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, err
}
return services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(out.Bytes(), services.SkipValidation())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetOIDCConnector",
"(",
"id",
"string",
",",
"withSecrets",
"bool",
")",
"(",
"services",
".",
"OIDCConnector",
",",
"error",
")",
"{",
"if",
"id",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"id",
")",
",",
"url",
".",
"Values",
"{",
"\"",
"\"",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"withSecrets",
")",
"}",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetOIDCConnectorMarshaler",
"(",
")",
".",
"UnmarshalOIDCConnector",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"}"
] | // GetOIDCConnector returns OIDC connector information by id | [
"GetOIDCConnector",
"returns",
"OIDC",
"connector",
"information",
"by",
"id"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1622-L1632 | train |
gravitational/teleport | lib/auth/clt.go | GetOIDCConnectors | func (c *Client) GetOIDCConnectors(withSecrets bool) ([]services.OIDCConnector, error) {
out, err := c.Get(c.Endpoint("oidc", "connectors"),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, err
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
connectors := make([]services.OIDCConnector, len(items))
for i, raw := range items {
connector, err := services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
connectors[i] = connector
}
return connectors, nil
} | go | func (c *Client) GetOIDCConnectors(withSecrets bool) ([]services.OIDCConnector, error) {
out, err := c.Get(c.Endpoint("oidc", "connectors"),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, err
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
connectors := make([]services.OIDCConnector, len(items))
for i, raw := range items {
connector, err := services.GetOIDCConnectorMarshaler().UnmarshalOIDCConnector(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
connectors[i] = connector
}
return connectors, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetOIDCConnectors",
"(",
"withSecrets",
"bool",
")",
"(",
"[",
"]",
"services",
".",
"OIDCConnector",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"\"",
"\"",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"withSecrets",
")",
"}",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"connectors",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"OIDCConnector",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"items",
"{",
"connector",
",",
"err",
":=",
"services",
".",
"GetOIDCConnectorMarshaler",
"(",
")",
".",
"UnmarshalOIDCConnector",
"(",
"raw",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"connectors",
"[",
"i",
"]",
"=",
"connector",
"\n",
"}",
"\n",
"return",
"connectors",
",",
"nil",
"\n",
"}"
] | // GetOIDCConnector gets OIDC connectors list | [
"GetOIDCConnector",
"gets",
"OIDC",
"connectors",
"list"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1635-L1654 | train |
gravitational/teleport | lib/auth/clt.go | CreateOIDCAuthRequest | func (c *Client) CreateOIDCAuthRequest(req services.OIDCAuthRequest) (*services.OIDCAuthRequest, error) {
out, err := c.PostJSON(c.Endpoint("oidc", "requests", "create"), createOIDCAuthRequestReq{
Req: req,
})
if err != nil {
return nil, trace.Wrap(err)
}
var response *services.OIDCAuthRequest
if err := json.Unmarshal(out.Bytes(), &response); err != nil {
return nil, trace.Wrap(err)
}
return response, nil
} | go | func (c *Client) CreateOIDCAuthRequest(req services.OIDCAuthRequest) (*services.OIDCAuthRequest, error) {
out, err := c.PostJSON(c.Endpoint("oidc", "requests", "create"), createOIDCAuthRequestReq{
Req: req,
})
if err != nil {
return nil, trace.Wrap(err)
}
var response *services.OIDCAuthRequest
if err := json.Unmarshal(out.Bytes(), &response); err != nil {
return nil, trace.Wrap(err)
}
return response, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateOIDCAuthRequest",
"(",
"req",
"services",
".",
"OIDCAuthRequest",
")",
"(",
"*",
"services",
".",
"OIDCAuthRequest",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"createOIDCAuthRequestReq",
"{",
"Req",
":",
"req",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"response",
"*",
"services",
".",
"OIDCAuthRequest",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"response",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"response",
",",
"nil",
"\n",
"}"
] | // CreateOIDCAuthRequest creates OIDCAuthRequest | [
"CreateOIDCAuthRequest",
"creates",
"OIDCAuthRequest"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1666-L1678 | train |
gravitational/teleport | lib/auth/clt.go | CreateSAMLConnector | func (c *Client) CreateSAMLConnector(connector services.SAMLConnector) error {
data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("saml", "connectors"), &createSAMLConnectorRawReq{
Connector: data,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (c *Client) CreateSAMLConnector(connector services.SAMLConnector) error {
data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PostJSON(c.Endpoint("saml", "connectors"), &createSAMLConnectorRawReq{
Connector: data,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateSAMLConnector",
"(",
"connector",
"services",
".",
"SAMLConnector",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"GetSAMLConnectorMarshaler",
"(",
")",
".",
"MarshalSAMLConnector",
"(",
"connector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"&",
"createSAMLConnectorRawReq",
"{",
"Connector",
":",
"data",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // CreateOIDCConnector creates SAML connector | [
"CreateOIDCConnector",
"creates",
"SAML",
"connector"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1718-L1730 | train |
gravitational/teleport | lib/auth/clt.go | UpsertSAMLConnector | func (c *Client) UpsertSAMLConnector(connector services.SAMLConnector) error {
data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PutJSON(c.Endpoint("saml", "connectors"), &upsertSAMLConnectorRawReq{
Connector: data,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (c *Client) UpsertSAMLConnector(connector services.SAMLConnector) error {
data, err := services.GetSAMLConnectorMarshaler().MarshalSAMLConnector(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PutJSON(c.Endpoint("saml", "connectors"), &upsertSAMLConnectorRawReq{
Connector: data,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertSAMLConnector",
"(",
"connector",
"services",
".",
"SAMLConnector",
")",
"error",
"{",
"data",
",",
"err",
":=",
"services",
".",
"GetSAMLConnectorMarshaler",
"(",
")",
".",
"MarshalSAMLConnector",
"(",
"connector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PutJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"&",
"upsertSAMLConnectorRawReq",
"{",
"Connector",
":",
"data",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // UpsertSAMLConnector updates or creates OIDC connector | [
"UpsertSAMLConnector",
"updates",
"or",
"creates",
"OIDC",
"connector"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1733-L1745 | train |
gravitational/teleport | lib/auth/clt.go | GetSAMLConnector | func (c *Client) GetSAMLConnector(id string, withSecrets bool) (services.SAMLConnector, error) {
if id == "" {
return nil, trace.BadParameter("missing connector id")
}
out, err := c.Get(c.Endpoint("saml", "connectors", id),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(out.Bytes(), services.SkipValidation())
} | go | func (c *Client) GetSAMLConnector(id string, withSecrets bool) (services.SAMLConnector, error) {
if id == "" {
return nil, trace.BadParameter("missing connector id")
}
out, err := c.Get(c.Endpoint("saml", "connectors", id),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, trace.Wrap(err)
}
return services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(out.Bytes(), services.SkipValidation())
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetSAMLConnector",
"(",
"id",
"string",
",",
"withSecrets",
"bool",
")",
"(",
"services",
".",
"SAMLConnector",
",",
"error",
")",
"{",
"if",
"id",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"id",
")",
",",
"url",
".",
"Values",
"{",
"\"",
"\"",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"withSecrets",
")",
"}",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetSAMLConnectorMarshaler",
"(",
")",
".",
"UnmarshalSAMLConnector",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"}"
] | // GetOIDCConnector returns SAML connector information by id | [
"GetOIDCConnector",
"returns",
"SAML",
"connector",
"information",
"by",
"id"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1748-L1758 | train |
gravitational/teleport | lib/auth/clt.go | GetSAMLConnectors | func (c *Client) GetSAMLConnectors(withSecrets bool) ([]services.SAMLConnector, error) {
out, err := c.Get(c.Endpoint("saml", "connectors"),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, err
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
connectors := make([]services.SAMLConnector, len(items))
for i, raw := range items {
connector, err := services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
connectors[i] = connector
}
return connectors, nil
} | go | func (c *Client) GetSAMLConnectors(withSecrets bool) ([]services.SAMLConnector, error) {
out, err := c.Get(c.Endpoint("saml", "connectors"),
url.Values{"with_secrets": []string{fmt.Sprintf("%t", withSecrets)}})
if err != nil {
return nil, err
}
var items []json.RawMessage
if err := json.Unmarshal(out.Bytes(), &items); err != nil {
return nil, trace.Wrap(err)
}
connectors := make([]services.SAMLConnector, len(items))
for i, raw := range items {
connector, err := services.GetSAMLConnectorMarshaler().UnmarshalSAMLConnector(raw, services.SkipValidation())
if err != nil {
return nil, trace.Wrap(err)
}
connectors[i] = connector
}
return connectors, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"GetSAMLConnectors",
"(",
"withSecrets",
"bool",
")",
"(",
"[",
"]",
"services",
".",
"SAMLConnector",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"Get",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"url",
".",
"Values",
"{",
"\"",
"\"",
":",
"[",
"]",
"string",
"{",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"withSecrets",
")",
"}",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"var",
"items",
"[",
"]",
"json",
".",
"RawMessage",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"items",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"connectors",
":=",
"make",
"(",
"[",
"]",
"services",
".",
"SAMLConnector",
",",
"len",
"(",
"items",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"items",
"{",
"connector",
",",
"err",
":=",
"services",
".",
"GetSAMLConnectorMarshaler",
"(",
")",
".",
"UnmarshalSAMLConnector",
"(",
"raw",
",",
"services",
".",
"SkipValidation",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"connectors",
"[",
"i",
"]",
"=",
"connector",
"\n",
"}",
"\n",
"return",
"connectors",
",",
"nil",
"\n",
"}"
] | // GetSAMLConnectors gets SAML connectors list | [
"GetSAMLConnectors",
"gets",
"SAML",
"connectors",
"list"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1761-L1780 | train |
gravitational/teleport | lib/auth/clt.go | DeleteSAMLConnector | func (c *Client) DeleteSAMLConnector(connectorID string) error {
if connectorID == "" {
return trace.BadParameter("missing connector id")
}
_, err := c.Delete(c.Endpoint("saml", "connectors", connectorID))
return trace.Wrap(err)
} | go | func (c *Client) DeleteSAMLConnector(connectorID string) error {
if connectorID == "" {
return trace.BadParameter("missing connector id")
}
_, err := c.Delete(c.Endpoint("saml", "connectors", connectorID))
return trace.Wrap(err)
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"DeleteSAMLConnector",
"(",
"connectorID",
"string",
")",
"error",
"{",
"if",
"connectorID",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
":=",
"c",
".",
"Delete",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"connectorID",
")",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}"
] | // DeleteSAMLConnector deletes SAML connector by ID | [
"DeleteSAMLConnector",
"deletes",
"SAML",
"connector",
"by",
"ID"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1783-L1789 | train |
gravitational/teleport | lib/auth/clt.go | CreateSAMLAuthRequest | func (c *Client) CreateSAMLAuthRequest(req services.SAMLAuthRequest) (*services.SAMLAuthRequest, error) {
out, err := c.PostJSON(c.Endpoint("saml", "requests", "create"), createSAMLAuthRequestReq{
Req: req,
})
if err != nil {
return nil, trace.Wrap(err)
}
var response *services.SAMLAuthRequest
if err := json.Unmarshal(out.Bytes(), &response); err != nil {
return nil, trace.Wrap(err)
}
return response, nil
} | go | func (c *Client) CreateSAMLAuthRequest(req services.SAMLAuthRequest) (*services.SAMLAuthRequest, error) {
out, err := c.PostJSON(c.Endpoint("saml", "requests", "create"), createSAMLAuthRequestReq{
Req: req,
})
if err != nil {
return nil, trace.Wrap(err)
}
var response *services.SAMLAuthRequest
if err := json.Unmarshal(out.Bytes(), &response); err != nil {
return nil, trace.Wrap(err)
}
return response, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"CreateSAMLAuthRequest",
"(",
"req",
"services",
".",
"SAMLAuthRequest",
")",
"(",
"*",
"services",
".",
"SAMLAuthRequest",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"createSAMLAuthRequestReq",
"{",
"Req",
":",
"req",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"response",
"*",
"services",
".",
"SAMLAuthRequest",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"response",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"response",
",",
"nil",
"\n",
"}"
] | // CreateSAMLAuthRequest creates SAML AuthnRequest | [
"CreateSAMLAuthRequest",
"creates",
"SAML",
"AuthnRequest"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1792-L1804 | train |
gravitational/teleport | lib/auth/clt.go | ValidateSAMLResponse | func (c *Client) ValidateSAMLResponse(re string) (*SAMLAuthResponse, error) {
out, err := c.PostJSON(c.Endpoint("saml", "requests", "validate"), validateSAMLResponseReq{
Response: re,
})
if err != nil {
return nil, trace.Wrap(err)
}
var rawResponse *samlAuthRawResponse
if err := json.Unmarshal(out.Bytes(), &rawResponse); err != nil {
return nil, trace.Wrap(err)
}
response := SAMLAuthResponse{
Username: rawResponse.Username,
Identity: rawResponse.Identity,
Cert: rawResponse.Cert,
Req: rawResponse.Req,
TLSCert: rawResponse.TLSCert,
}
if len(rawResponse.Session) != 0 {
session, err := services.GetWebSessionMarshaler().UnmarshalWebSession(rawResponse.Session)
if err != nil {
return nil, trace.Wrap(err)
}
response.Session = session
}
response.HostSigners = make([]services.CertAuthority, len(rawResponse.HostSigners))
for i, raw := range rawResponse.HostSigners {
ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw)
if err != nil {
return nil, trace.Wrap(err)
}
response.HostSigners[i] = ca
}
return &response, nil
} | go | func (c *Client) ValidateSAMLResponse(re string) (*SAMLAuthResponse, error) {
out, err := c.PostJSON(c.Endpoint("saml", "requests", "validate"), validateSAMLResponseReq{
Response: re,
})
if err != nil {
return nil, trace.Wrap(err)
}
var rawResponse *samlAuthRawResponse
if err := json.Unmarshal(out.Bytes(), &rawResponse); err != nil {
return nil, trace.Wrap(err)
}
response := SAMLAuthResponse{
Username: rawResponse.Username,
Identity: rawResponse.Identity,
Cert: rawResponse.Cert,
Req: rawResponse.Req,
TLSCert: rawResponse.TLSCert,
}
if len(rawResponse.Session) != 0 {
session, err := services.GetWebSessionMarshaler().UnmarshalWebSession(rawResponse.Session)
if err != nil {
return nil, trace.Wrap(err)
}
response.Session = session
}
response.HostSigners = make([]services.CertAuthority, len(rawResponse.HostSigners))
for i, raw := range rawResponse.HostSigners {
ca, err := services.GetCertAuthorityMarshaler().UnmarshalCertAuthority(raw)
if err != nil {
return nil, trace.Wrap(err)
}
response.HostSigners[i] = ca
}
return &response, nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"ValidateSAMLResponse",
"(",
"re",
"string",
")",
"(",
"*",
"SAMLAuthResponse",
",",
"error",
")",
"{",
"out",
",",
"err",
":=",
"c",
".",
"PostJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"validateSAMLResponseReq",
"{",
"Response",
":",
"re",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"rawResponse",
"*",
"samlAuthRawResponse",
"\n",
"if",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"out",
".",
"Bytes",
"(",
")",
",",
"&",
"rawResponse",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"response",
":=",
"SAMLAuthResponse",
"{",
"Username",
":",
"rawResponse",
".",
"Username",
",",
"Identity",
":",
"rawResponse",
".",
"Identity",
",",
"Cert",
":",
"rawResponse",
".",
"Cert",
",",
"Req",
":",
"rawResponse",
".",
"Req",
",",
"TLSCert",
":",
"rawResponse",
".",
"TLSCert",
",",
"}",
"\n",
"if",
"len",
"(",
"rawResponse",
".",
"Session",
")",
"!=",
"0",
"{",
"session",
",",
"err",
":=",
"services",
".",
"GetWebSessionMarshaler",
"(",
")",
".",
"UnmarshalWebSession",
"(",
"rawResponse",
".",
"Session",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"response",
".",
"Session",
"=",
"session",
"\n",
"}",
"\n",
"response",
".",
"HostSigners",
"=",
"make",
"(",
"[",
"]",
"services",
".",
"CertAuthority",
",",
"len",
"(",
"rawResponse",
".",
"HostSigners",
")",
")",
"\n",
"for",
"i",
",",
"raw",
":=",
"range",
"rawResponse",
".",
"HostSigners",
"{",
"ca",
",",
"err",
":=",
"services",
".",
"GetCertAuthorityMarshaler",
"(",
")",
".",
"UnmarshalCertAuthority",
"(",
"raw",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"response",
".",
"HostSigners",
"[",
"i",
"]",
"=",
"ca",
"\n",
"}",
"\n",
"return",
"&",
"response",
",",
"nil",
"\n",
"}"
] | // ValidateSAMLResponse validates response returned by SAML identity provider | [
"ValidateSAMLResponse",
"validates",
"response",
"returned",
"by",
"SAML",
"identity",
"provider"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1807-L1841 | train |
gravitational/teleport | lib/auth/clt.go | UpsertGithubConnector | func (c *Client) UpsertGithubConnector(connector services.GithubConnector) error {
bytes, err := services.GetGithubConnectorMarshaler().Marshal(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PutJSON(c.Endpoint("github", "connectors"), &upsertGithubConnectorRawReq{
Connector: bytes,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (c *Client) UpsertGithubConnector(connector services.GithubConnector) error {
bytes, err := services.GetGithubConnectorMarshaler().Marshal(connector)
if err != nil {
return trace.Wrap(err)
}
_, err = c.PutJSON(c.Endpoint("github", "connectors"), &upsertGithubConnectorRawReq{
Connector: bytes,
})
if err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"c",
"*",
"Client",
")",
"UpsertGithubConnector",
"(",
"connector",
"services",
".",
"GithubConnector",
")",
"error",
"{",
"bytes",
",",
"err",
":=",
"services",
".",
"GetGithubConnectorMarshaler",
"(",
")",
".",
"Marshal",
"(",
"connector",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"_",
",",
"err",
"=",
"c",
".",
"PutJSON",
"(",
"c",
".",
"Endpoint",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
",",
"&",
"upsertGithubConnectorRawReq",
"{",
"Connector",
":",
"bytes",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] | // UpsertGithubConnector creates or updates a Github connector | [
"UpsertGithubConnector",
"creates",
"or",
"updates",
"a",
"Github",
"connector"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/clt.go#L1859-L1871 | train |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.