id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
listlengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
listlengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
22,900
xo/xo
examples/django/postgres/djangocontenttype.xo.go
Update
func (dct *DjangoContentType) Update(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dct._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_content_type SET (` + `app_label, model` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, dct.AppLabel, dct.Model, dct.ID) _, err = db.Exec(sqlstr, dct.AppLabel, dct.Model, dct.ID) return err }
go
func (dct *DjangoContentType) Update(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dct._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_content_type SET (` + `app_label, model` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, dct.AppLabel, dct.Model, dct.ID) _, err = db.Exec(sqlstr, dct.AppLabel, dct.Model, dct.ID) return err }
[ "func", "(", "dct", "*", "DjangoContentType", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dct", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "dct", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE public.django_content_type SET (`", "+", "`app_label, model`", "+", "`) = ( `", "+", "`$1, $2`", "+", "`) WHERE id = $3`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dct", ".", "AppLabel", ",", "dct", ".", "Model", ",", "dct", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dct", ".", "AppLabel", ",", "dct", ".", "Model", ",", "dct", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the DjangoContentType in the database.
[ "Update", "updates", "the", "DjangoContentType", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangocontenttype.xo.go#L60-L84
22,901
xo/xo
examples/django/postgres/djangocontenttype.xo.go
Delete
func (dct *DjangoContentType) Delete(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return nil } // if deleted, bail if dct._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.django_content_type WHERE id = $1` // run query XOLog(sqlstr, dct.ID) _, err = db.Exec(sqlstr, dct.ID) if err != nil { return err } // set deleted dct._deleted = true return nil }
go
func (dct *DjangoContentType) Delete(db XODB) error { var err error // if doesn't exist, bail if !dct._exists { return nil } // if deleted, bail if dct._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.django_content_type WHERE id = $1` // run query XOLog(sqlstr, dct.ID) _, err = db.Exec(sqlstr, dct.ID) if err != nil { return err } // set deleted dct._deleted = true return nil }
[ "func", "(", "dct", "*", "DjangoContentType", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dct", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "dct", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM public.django_content_type WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dct", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dct", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "dct", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the DjangoContentType from the database.
[ "Delete", "deletes", "the", "DjangoContentType", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangocontenttype.xo.go#L131-L158
22,902
xo/xo
examples/django/oracle/authgrouppermission.xo.go
AuthGroupPermissionByGroupIDPermissionID
func AuthGroupPermissionByGroupIDPermissionID(db XODB, groupID float64, permissionID float64) (*AuthGroupPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, group_id, permission_id ` + `FROM django.auth_group_permissions ` + `WHERE group_id = :1 AND permission_id = :2` // run query XOLog(sqlstr, groupID, permissionID) agp := AuthGroupPermission{ _exists: true, } err = db.QueryRow(sqlstr, groupID, permissionID).Scan(&agp.ID, &agp.GroupID, &agp.PermissionID) if err != nil { return nil, err } return &agp, nil }
go
func AuthGroupPermissionByGroupIDPermissionID(db XODB, groupID float64, permissionID float64) (*AuthGroupPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, group_id, permission_id ` + `FROM django.auth_group_permissions ` + `WHERE group_id = :1 AND permission_id = :2` // run query XOLog(sqlstr, groupID, permissionID) agp := AuthGroupPermission{ _exists: true, } err = db.QueryRow(sqlstr, groupID, permissionID).Scan(&agp.ID, &agp.GroupID, &agp.PermissionID) if err != nil { return nil, err } return &agp, nil }
[ "func", "AuthGroupPermissionByGroupIDPermissionID", "(", "db", "XODB", ",", "groupID", "float64", ",", "permissionID", "float64", ")", "(", "*", "AuthGroupPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, group_id, permission_id `", "+", "`FROM django.auth_group_permissions `", "+", "`WHERE group_id = :1 AND permission_id = :2`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "groupID", ",", "permissionID", ")", "\n", "agp", ":=", "AuthGroupPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "groupID", ",", "permissionID", ")", ".", "Scan", "(", "&", "agp", ".", "ID", ",", "&", "agp", ".", "GroupID", ",", "&", "agp", ".", "PermissionID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "agp", ",", "nil", "\n", "}" ]
// AuthGroupPermissionByGroupIDPermissionID retrieves a row from 'django.auth_group_permissions' as a AuthGroupPermission. // // Generated from index 'auth_gr_group_id_0cd325b0_uniq'.
[ "AuthGroupPermissionByGroupIDPermissionID", "retrieves", "a", "row", "from", "django", ".", "auth_group_permissions", "as", "a", "AuthGroupPermission", ".", "Generated", "from", "index", "auth_gr_group_id_0cd325b0_uniq", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authgrouppermission.xo.go#L145-L166
22,903
xo/xo
models/procparam.xo.go
PgProcParams
func PgProcParams(db XODB, schema string, proc string) ([]*ProcParam, error) { var err error // sql query const sqlstr = `SELECT ` + `UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) ` + // ::varchar AS param_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1 AND p.proname = $2` // run query XOLog(sqlstr, schema, proc) q, err := db.Query(sqlstr, schema, proc) if err != nil { return nil, err } defer q.Close() // load results res := []*ProcParam{} for q.Next() { pp := ProcParam{} // scan err = q.Scan(&pp.ParamType) if err != nil { return nil, err } res = append(res, &pp) } return res, nil }
go
func PgProcParams(db XODB, schema string, proc string) ([]*ProcParam, error) { var err error // sql query const sqlstr = `SELECT ` + `UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) ` + // ::varchar AS param_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1 AND p.proname = $2` // run query XOLog(sqlstr, schema, proc) q, err := db.Query(sqlstr, schema, proc) if err != nil { return nil, err } defer q.Close() // load results res := []*ProcParam{} for q.Next() { pp := ProcParam{} // scan err = q.Scan(&pp.ParamType) if err != nil { return nil, err } res = append(res, &pp) } return res, nil }
[ "func", "PgProcParams", "(", "db", "XODB", ",", "schema", "string", ",", "proc", "string", ")", "(", "[", "]", "*", "ProcParam", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) `", "+", "// ::varchar AS param_type", "`FROM pg_proc p `", "+", "`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid `", "+", "`WHERE n.nspname = $1 AND p.proname = $2`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ",", "proc", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ",", "proc", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "ProcParam", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "pp", ":=", "ProcParam", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "pp", ".", "ParamType", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "pp", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// PgProcParams runs a custom query, returning results as ProcParam.
[ "PgProcParams", "runs", "a", "custom", "query", "returning", "results", "as", "ProcParam", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/procparam.xo.go#L12-L45
22,904
xo/xo
examples/django/mysql/authusergroup.xo.go
AuthUserGroupsByGroupID
func AuthUserGroupsByGroupID(db XODB, groupID int) ([]*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE group_id = ?` // run query XOLog(sqlstr, groupID) q, err := db.Query(sqlstr, groupID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthUserGroup{} for q.Next() { aug := AuthUserGroup{ _exists: true, } // scan err = q.Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } res = append(res, &aug) } return res, nil }
go
func AuthUserGroupsByGroupID(db XODB, groupID int) ([]*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE group_id = ?` // run query XOLog(sqlstr, groupID) q, err := db.Query(sqlstr, groupID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthUserGroup{} for q.Next() { aug := AuthUserGroup{ _exists: true, } // scan err = q.Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } res = append(res, &aug) } return res, nil }
[ "func", "AuthUserGroupsByGroupID", "(", "db", "XODB", ",", "groupID", "int", ")", "(", "[", "]", "*", "AuthUserGroup", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, group_id `", "+", "`FROM django.auth_user_groups `", "+", "`WHERE group_id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "groupID", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "groupID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "AuthUserGroup", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "aug", ":=", "AuthUserGroup", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "aug", ".", "ID", ",", "&", "aug", ".", "UserID", ",", "&", "aug", ".", "GroupID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "aug", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// AuthUserGroupsByGroupID retrieves a row from 'django.auth_user_groups' as a AuthUserGroup. // // Generated from index 'auth_user_groups_group_id_97559544_fk_auth_group_id'.
[ "AuthUserGroupsByGroupID", "retrieves", "a", "row", "from", "django", ".", "auth_user_groups", "as", "a", "AuthUserGroup", ".", "Generated", "from", "index", "auth_user_groups_group_id_97559544_fk_auth_group_id", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authusergroup.xo.go#L147-L181
22,905
xo/xo
examples/django/mysql/authusergroup.xo.go
AuthUserGroupByID
func AuthUserGroupByID(db XODB, id int) (*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE id = ?` // run query XOLog(sqlstr, id) aug := AuthUserGroup{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } return &aug, nil }
go
func AuthUserGroupByID(db XODB, id int) (*AuthUserGroup, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, group_id ` + `FROM django.auth_user_groups ` + `WHERE id = ?` // run query XOLog(sqlstr, id) aug := AuthUserGroup{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&aug.ID, &aug.UserID, &aug.GroupID) if err != nil { return nil, err } return &aug, nil }
[ "func", "AuthUserGroupByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "AuthUserGroup", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, group_id `", "+", "`FROM django.auth_user_groups `", "+", "`WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "aug", ":=", "AuthUserGroup", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "aug", ".", "ID", ",", "&", "aug", ".", "UserID", ",", "&", "aug", ".", "GroupID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "aug", ",", "nil", "\n", "}" ]
// AuthUserGroupByID retrieves a row from 'django.auth_user_groups' as a AuthUserGroup. // // Generated from index 'auth_user_groups_id_pkey'.
[ "AuthUserGroupByID", "retrieves", "a", "row", "from", "django", ".", "auth_user_groups", "as", "a", "AuthUserGroup", ".", "Generated", "from", "index", "auth_user_groups_id_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authusergroup.xo.go#L186-L207
22,906
xo/xo
loaders/mssql.go
MsParseType
func MsParseType(args *internal.ArgType, dt string, nullable bool) (int, string, string) { precision := 0 nilVal := "nil" // extract precision dt, precision, _ = args.ParsePrecision(dt) var typ string switch dt { case "tinyint", "bit": nilVal = "false" typ = "bool" if nullable { nilVal = "sql.NullBool{}" typ = "sql.NullBool" } case "char", "varchar", "text", "nchar", "nvarchar", "ntext", "smallmoney", "money": nilVal = `""` typ = "string" if nullable { nilVal = "sql.NullString{}" typ = "sql.NullString" } case "smallint": nilVal = "0" typ = "int16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "int": nilVal = "0" typ = args.Int32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigint": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "smallserial": nilVal = "0" typ = "uint16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "serial": nilVal = "0" typ = args.Uint32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigserial": nilVal = "0" typ = "uint64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "real": nilVal = "0.0" typ = "float32" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "numeric", "decimal": nilVal = "0.0" typ = "float64" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "binary", "varbinary": typ = "[]byte" case "datetime", "datetime2", "timestamp": nilVal = "time.Time{}" typ = "time.Time" case "time with time zone", "time without time zone", "timestamp without time zone": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "interval": typ = "*time.Duration" default: if strings.HasPrefix(dt, args.Schema+".") { // in the same schema, so chop off typ = snaker.SnakeToCamelIdentifier(dt[len(args.Schema)+1:]) nilVal = typ + "(0)" } else { typ = snaker.SnakeToCamelIdentifier(dt) nilVal = typ + "{}" } } return precision, nilVal, typ }
go
func MsParseType(args *internal.ArgType, dt string, nullable bool) (int, string, string) { precision := 0 nilVal := "nil" // extract precision dt, precision, _ = args.ParsePrecision(dt) var typ string switch dt { case "tinyint", "bit": nilVal = "false" typ = "bool" if nullable { nilVal = "sql.NullBool{}" typ = "sql.NullBool" } case "char", "varchar", "text", "nchar", "nvarchar", "ntext", "smallmoney", "money": nilVal = `""` typ = "string" if nullable { nilVal = "sql.NullString{}" typ = "sql.NullString" } case "smallint": nilVal = "0" typ = "int16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "int": nilVal = "0" typ = args.Int32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigint": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "smallserial": nilVal = "0" typ = "uint16" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "serial": nilVal = "0" typ = args.Uint32Type if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "bigserial": nilVal = "0" typ = "uint64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "real": nilVal = "0.0" typ = "float32" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "numeric", "decimal": nilVal = "0.0" typ = "float64" if nullable { nilVal = "sql.NullFloat64{}" typ = "sql.NullFloat64" } case "binary", "varbinary": typ = "[]byte" case "datetime", "datetime2", "timestamp": nilVal = "time.Time{}" typ = "time.Time" case "time with time zone", "time without time zone", "timestamp without time zone": nilVal = "0" typ = "int64" if nullable { nilVal = "sql.NullInt64{}" typ = "sql.NullInt64" } case "interval": typ = "*time.Duration" default: if strings.HasPrefix(dt, args.Schema+".") { // in the same schema, so chop off typ = snaker.SnakeToCamelIdentifier(dt[len(args.Schema)+1:]) nilVal = typ + "(0)" } else { typ = snaker.SnakeToCamelIdentifier(dt) nilVal = typ + "{}" } } return precision, nilVal, typ }
[ "func", "MsParseType", "(", "args", "*", "internal", ".", "ArgType", ",", "dt", "string", ",", "nullable", "bool", ")", "(", "int", ",", "string", ",", "string", ")", "{", "precision", ":=", "0", "\n", "nilVal", ":=", "\"", "\"", "\n\n", "// extract precision", "dt", ",", "precision", ",", "_", "=", "args", ".", "ParsePrecision", "(", "dt", ")", "\n\n", "var", "typ", "string", "\n", "switch", "dt", "{", "case", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "`\"\"`", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "args", ".", "Int32Type", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "args", ".", "Uint32Type", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n", "case", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ":", "typ", "=", "\"", "\"", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n\n", "case", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ":", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "if", "nullable", "{", "nilVal", "=", "\"", "\"", "\n", "typ", "=", "\"", "\"", "\n", "}", "\n\n", "case", "\"", "\"", ":", "typ", "=", "\"", "\"", "\n\n", "default", ":", "if", "strings", ".", "HasPrefix", "(", "dt", ",", "args", ".", "Schema", "+", "\"", "\"", ")", "{", "// in the same schema, so chop off", "typ", "=", "snaker", ".", "SnakeToCamelIdentifier", "(", "dt", "[", "len", "(", "args", ".", "Schema", ")", "+", "1", ":", "]", ")", "\n", "nilVal", "=", "typ", "+", "\"", "\"", "\n", "}", "else", "{", "typ", "=", "snaker", ".", "SnakeToCamelIdentifier", "(", "dt", ")", "\n", "nilVal", "=", "typ", "+", "\"", "\"", "\n", "}", "\n", "}", "\n\n", "return", "precision", ",", "nilVal", ",", "typ", "\n", "}" ]
// MsParseType parse a mssql type into a Go type based on the column // definition.
[ "MsParseType", "parse", "a", "mssql", "type", "into", "a", "Go", "type", "based", "on", "the", "column", "definition", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L68-L182
22,907
xo/xo
loaders/mssql.go
MsQueryColumns
func MsQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // process inspect -- cannot have 'order by' in a CREATE VIEW ins := []string{} for _, l := range inspect { if !strings.HasPrefix(strings.ToUpper(l), "ORDER BY ") { ins = append(ins, l) } } // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE VIEW ` + xoid + ` AS ` + strings.Join(ins, "\n") models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // load columns cols, err := models.MsTableColumns(args.DB, args.Schema, xoid) // drop inspect view dropq := `DROP VIEW ` + xoid models.XOLog(dropq) _, _ = args.DB.Exec(dropq) // load column information return cols, err }
go
func MsQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) { var err error // process inspect -- cannot have 'order by' in a CREATE VIEW ins := []string{} for _, l := range inspect { if !strings.HasPrefix(strings.ToUpper(l), "ORDER BY ") { ins = append(ins, l) } } // create temporary view xoid xoid := "_xo_" + internal.GenRandomID() viewq := `CREATE VIEW ` + xoid + ` AS ` + strings.Join(ins, "\n") models.XOLog(viewq) _, err = args.DB.Exec(viewq) if err != nil { return nil, err } // load columns cols, err := models.MsTableColumns(args.DB, args.Schema, xoid) // drop inspect view dropq := `DROP VIEW ` + xoid models.XOLog(dropq) _, _ = args.DB.Exec(dropq) // load column information return cols, err }
[ "func", "MsQueryColumns", "(", "args", "*", "internal", ".", "ArgType", ",", "inspect", "[", "]", "string", ")", "(", "[", "]", "*", "models", ".", "Column", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// process inspect -- cannot have 'order by' in a CREATE VIEW", "ins", ":=", "[", "]", "string", "{", "}", "\n", "for", "_", ",", "l", ":=", "range", "inspect", "{", "if", "!", "strings", ".", "HasPrefix", "(", "strings", ".", "ToUpper", "(", "l", ")", ",", "\"", "\"", ")", "{", "ins", "=", "append", "(", "ins", ",", "l", ")", "\n", "}", "\n", "}", "\n\n", "// create temporary view xoid", "xoid", ":=", "\"", "\"", "+", "internal", ".", "GenRandomID", "(", ")", "\n", "viewq", ":=", "`CREATE VIEW `", "+", "xoid", "+", "` AS `", "+", "strings", ".", "Join", "(", "ins", ",", "\"", "\\n", "\"", ")", "\n", "models", ".", "XOLog", "(", "viewq", ")", "\n", "_", ",", "err", "=", "args", ".", "DB", ".", "Exec", "(", "viewq", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// load columns", "cols", ",", "err", ":=", "models", ".", "MsTableColumns", "(", "args", ".", "DB", ",", "args", ".", "Schema", ",", "xoid", ")", "\n\n", "// drop inspect view", "dropq", ":=", "`DROP VIEW `", "+", "xoid", "\n", "models", ".", "XOLog", "(", "dropq", ")", "\n", "_", ",", "_", "=", "args", ".", "DB", ".", "Exec", "(", "dropq", ")", "\n\n", "// load column information", "return", "cols", ",", "err", "\n", "}" ]
// MsQueryColumns parses the query and generates a type for it.
[ "MsQueryColumns", "parses", "the", "query", "and", "generates", "a", "type", "for", "it", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L185-L215
22,908
xo/xo
loaders/mssql.go
MsTables
func MsTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.MsTables(db, schema, relkind) if err != nil { return nil, err } // get the tables that have Identity included identities, err := models.MsIdentities(db, schema) if err != nil { // Set it to an empty set on error. identities = []*models.MsIdentity{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the identity for _, identity := range identities { if identity.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
go
func MsTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) { var err error // get the tables rows, err := models.MsTables(db, schema, relkind) if err != nil { return nil, err } // get the tables that have Identity included identities, err := models.MsIdentities(db, schema) if err != nil { // Set it to an empty set on error. identities = []*models.MsIdentity{} } // Add information about manual FK. var tables []*models.Table for _, row := range rows { manualPk := true // Look for a match in the table name where it contains the identity for _, identity := range identities { if identity.TableName == row.TableName { manualPk = false } } tables = append(tables, &models.Table{ TableName: row.TableName, Type: row.Type, ManualPk: manualPk, }) } return tables, nil }
[ "func", "MsTables", "(", "db", "models", ".", "XODB", ",", "schema", "string", ",", "relkind", "string", ")", "(", "[", "]", "*", "models", ".", "Table", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// get the tables", "rows", ",", "err", ":=", "models", ".", "MsTables", "(", "db", ",", "schema", ",", "relkind", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// get the tables that have Identity included", "identities", ",", "err", ":=", "models", ".", "MsIdentities", "(", "db", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "// Set it to an empty set on error.", "identities", "=", "[", "]", "*", "models", ".", "MsIdentity", "{", "}", "\n", "}", "\n\n", "// Add information about manual FK.", "var", "tables", "[", "]", "*", "models", ".", "Table", "\n", "for", "_", ",", "row", ":=", "range", "rows", "{", "manualPk", ":=", "true", "\n", "// Look for a match in the table name where it contains the identity", "for", "_", ",", "identity", ":=", "range", "identities", "{", "if", "identity", ".", "TableName", "==", "row", ".", "TableName", "{", "manualPk", "=", "false", "\n", "}", "\n", "}", "\n", "tables", "=", "append", "(", "tables", ",", "&", "models", ".", "Table", "{", "TableName", ":", "row", ".", "TableName", ",", "Type", ":", "row", ".", "Type", ",", "ManualPk", ":", "manualPk", ",", "}", ")", "\n", "}", "\n\n", "return", "tables", ",", "nil", "\n", "}" ]
// MsTables returns the MsSQL tables with the manual PK information added. // ManualPk is true when the table's primary key is not an identity.
[ "MsTables", "returns", "the", "MsSQL", "tables", "with", "the", "manual", "PK", "information", "added", ".", "ManualPk", "is", "true", "when", "the", "table", "s", "primary", "key", "is", "not", "an", "identity", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L219-L253
22,909
xo/xo
examples/django/mysql/djangoadminlog.xo.go
Delete
func (dal *DjangoAdminLog) Delete(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return nil } // if deleted, bail if dal._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_admin_log WHERE id = ?` // run query XOLog(sqlstr, dal.ID) _, err = db.Exec(sqlstr, dal.ID) if err != nil { return err } // set deleted dal._deleted = true return nil }
go
func (dal *DjangoAdminLog) Delete(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return nil } // if deleted, bail if dal._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_admin_log WHERE id = ?` // run query XOLog(sqlstr, dal.ID) _, err = db.Exec(sqlstr, dal.ID) if err != nil { return err } // set deleted dal._deleted = true return nil }
[ "func", "(", "dal", "*", "DjangoAdminLog", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dal", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "dal", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.django_admin_log WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dal", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dal", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "dal", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the DjangoAdminLog from the database.
[ "Delete", "deletes", "the", "DjangoAdminLog", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangoadminlog.xo.go#L108-L135
22,910
xo/xo
examples/django/mysql/djangosession.xo.go
DjangoSessionsByExpireDate
func DjangoSessionsByExpireDate(db XODB, expireDate *time.Time) ([]*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE expire_date = ?` // run query XOLog(sqlstr, expireDate) q, err := db.Query(sqlstr, expireDate) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoSession{} for q.Next() { ds := DjangoSession{ _exists: true, } // scan err = q.Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } res = append(res, &ds) } return res, nil }
go
func DjangoSessionsByExpireDate(db XODB, expireDate *time.Time) ([]*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE expire_date = ?` // run query XOLog(sqlstr, expireDate) q, err := db.Query(sqlstr, expireDate) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoSession{} for q.Next() { ds := DjangoSession{ _exists: true, } // scan err = q.Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } res = append(res, &ds) } return res, nil }
[ "func", "DjangoSessionsByExpireDate", "(", "db", "XODB", ",", "expireDate", "*", "time", ".", "Time", ")", "(", "[", "]", "*", "DjangoSession", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`session_key, session_data, expire_date `", "+", "`FROM django.django_session `", "+", "`WHERE expire_date = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "expireDate", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "expireDate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "DjangoSession", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "ds", ":=", "DjangoSession", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "ds", ".", "SessionKey", ",", "&", "ds", ".", "SessionData", ",", "&", "ds", ".", "ExpireDate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "ds", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// DjangoSessionsByExpireDate retrieves a row from 'django.django_session' as a DjangoSession. // // Generated from index 'django_session_de54fa62'.
[ "DjangoSessionsByExpireDate", "retrieves", "a", "row", "from", "django", ".", "django_session", "as", "a", "DjangoSession", ".", "Generated", "from", "index", "django_session_de54fa62", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangosession.xo.go#L127-L161
22,911
xo/xo
examples/django/mysql/djangosession.xo.go
DjangoSessionBySessionKey
func DjangoSessionBySessionKey(db XODB, sessionKey string) (*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE session_key = ?` // run query XOLog(sqlstr, sessionKey) ds := DjangoSession{ _exists: true, } err = db.QueryRow(sqlstr, sessionKey).Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } return &ds, nil }
go
func DjangoSessionBySessionKey(db XODB, sessionKey string) (*DjangoSession, error) { var err error // sql query const sqlstr = `SELECT ` + `session_key, session_data, expire_date ` + `FROM django.django_session ` + `WHERE session_key = ?` // run query XOLog(sqlstr, sessionKey) ds := DjangoSession{ _exists: true, } err = db.QueryRow(sqlstr, sessionKey).Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate) if err != nil { return nil, err } return &ds, nil }
[ "func", "DjangoSessionBySessionKey", "(", "db", "XODB", ",", "sessionKey", "string", ")", "(", "*", "DjangoSession", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`session_key, session_data, expire_date `", "+", "`FROM django.django_session `", "+", "`WHERE session_key = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "sessionKey", ")", "\n", "ds", ":=", "DjangoSession", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "sessionKey", ")", ".", "Scan", "(", "&", "ds", ".", "SessionKey", ",", "&", "ds", ".", "SessionData", ",", "&", "ds", ".", "ExpireDate", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "ds", ",", "nil", "\n", "}" ]
// DjangoSessionBySessionKey retrieves a row from 'django.django_session' as a DjangoSession. // // Generated from index 'django_session_session_key_pkey'.
[ "DjangoSessionBySessionKey", "retrieves", "a", "row", "from", "django", ".", "django_session", "as", "a", "DjangoSession", ".", "Generated", "from", "index", "django_session_session_key_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangosession.xo.go#L166-L187
22,912
xo/xo
examples/django/mysql/authuseruserpermission.xo.go
Update
func (auup *AuthUserUserPermission) Update(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return errors.New("update failed: does not exist") } // if deleted, bail if auup._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.auth_user_user_permissions SET ` + `user_id = ?, permission_id = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID) _, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID) return err }
go
func (auup *AuthUserUserPermission) Update(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return errors.New("update failed: does not exist") } // if deleted, bail if auup._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.auth_user_user_permissions SET ` + `user_id = ?, permission_id = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID) _, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID) return err }
[ "func", "(", "auup", "*", "AuthUserUserPermission", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "auup", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "auup", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE django.auth_user_user_permissions SET `", "+", "`user_id = ?, permission_id = ?`", "+", "` WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "auup", ".", "UserID", ",", "auup", ".", "PermissionID", ",", "auup", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "auup", ".", "UserID", ",", "auup", ".", "PermissionID", ",", "auup", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the AuthUserUserPermission in the database.
[ "Update", "updates", "the", "AuthUserUserPermission", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authuseruserpermission.xo.go#L67-L89
22,913
xo/xo
examples/django/oracle/djangomigration.xo.go
Update
func (dm *DjangoMigration) Update(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dm._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.django_migrations SET ` + `app = :1, name = :2, applied = :3` + ` WHERE id = :4` // run query XOLog(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) _, err = db.Exec(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) return err }
go
func (dm *DjangoMigration) Update(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dm._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE django.django_migrations SET ` + `app = :1, name = :2, applied = :3` + ` WHERE id = :4` // run query XOLog(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) _, err = db.Exec(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID) return err }
[ "func", "(", "dm", "*", "DjangoMigration", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dm", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "dm", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE django.django_migrations SET `", "+", "`app = :1, name = :2, applied = :3`", "+", "` WHERE id = :4`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dm", ".", "App", ",", "dm", ".", "Name", ",", "dm", ".", "Applied", ",", "dm", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dm", ".", "App", ",", "dm", ".", "Name", ",", "dm", ".", "Applied", ",", "dm", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the DjangoMigration in the database.
[ "Update", "updates", "the", "DjangoMigration", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L70-L92
22,914
xo/xo
examples/django/oracle/djangomigration.xo.go
Delete
func (dm *DjangoMigration) Delete(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return nil } // if deleted, bail if dm._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_migrations WHERE id = :1` // run query XOLog(sqlstr, dm.ID) _, err = db.Exec(sqlstr, dm.ID) if err != nil { return err } // set deleted dm._deleted = true return nil }
go
func (dm *DjangoMigration) Delete(db XODB) error { var err error // if doesn't exist, bail if !dm._exists { return nil } // if deleted, bail if dm._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.django_migrations WHERE id = :1` // run query XOLog(sqlstr, dm.ID) _, err = db.Exec(sqlstr, dm.ID) if err != nil { return err } // set deleted dm._deleted = true return nil }
[ "func", "(", "dm", "*", "DjangoMigration", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dm", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "dm", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.django_migrations WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dm", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dm", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "dm", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the DjangoMigration from the database.
[ "Delete", "deletes", "the", "DjangoMigration", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L104-L131
22,915
xo/xo
examples/django/oracle/djangomigration.xo.go
DjangoMigrationByID
func DjangoMigrationByID(db XODB, id float64) (*DjangoMigration, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app, name, applied ` + `FROM django.django_migrations ` + `WHERE id = :1` // run query XOLog(sqlstr, id) dm := DjangoMigration{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dm.ID, &dm.App, &dm.Name, &dm.Applied) if err != nil { return nil, err } return &dm, nil }
go
func DjangoMigrationByID(db XODB, id float64) (*DjangoMigration, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app, name, applied ` + `FROM django.django_migrations ` + `WHERE id = :1` // run query XOLog(sqlstr, id) dm := DjangoMigration{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dm.ID, &dm.App, &dm.Name, &dm.Applied) if err != nil { return nil, err } return &dm, nil }
[ "func", "DjangoMigrationByID", "(", "db", "XODB", ",", "id", "float64", ")", "(", "*", "DjangoMigration", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, app, name, applied `", "+", "`FROM django.django_migrations `", "+", "`WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "dm", ":=", "DjangoMigration", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "dm", ".", "ID", ",", "&", "dm", ".", "App", ",", "&", "dm", ".", "Name", ",", "&", "dm", ".", "Applied", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "dm", ",", "nil", "\n", "}" ]
// DjangoMigrationByID retrieves a row from 'django.django_migrations' as a DjangoMigration. // // Generated from index 'sys_c004953'.
[ "DjangoMigrationByID", "retrieves", "a", "row", "from", "django", ".", "django_migrations", "as", "a", "DjangoMigration", ".", "Generated", "from", "index", "sys_c004953", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L136-L157
22,916
xo/xo
examples/django/sqlite3/djangocontenttype.xo.go
DjangoContentTypeByID
func DjangoContentTypeByID(db XODB, id int) (*DjangoContentType, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app_label, model ` + `FROM django_content_type ` + `WHERE id = ?` // run query XOLog(sqlstr, id) dct := DjangoContentType{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dct.ID, &dct.AppLabel, &dct.Model) if err != nil { return nil, err } return &dct, nil }
go
func DjangoContentTypeByID(db XODB, id int) (*DjangoContentType, error) { var err error // sql query const sqlstr = `SELECT ` + `id, app_label, model ` + `FROM django_content_type ` + `WHERE id = ?` // run query XOLog(sqlstr, id) dct := DjangoContentType{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&dct.ID, &dct.AppLabel, &dct.Model) if err != nil { return nil, err } return &dct, nil }
[ "func", "DjangoContentTypeByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "DjangoContentType", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, app_label, model `", "+", "`FROM django_content_type `", "+", "`WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "dct", ":=", "DjangoContentType", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "dct", ".", "ID", ",", "&", "dct", ".", "AppLabel", ",", "&", "dct", ".", "Model", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "dct", ",", "nil", "\n", "}" ]
// DjangoContentTypeByID retrieves a row from 'django_content_type' as a DjangoContentType. // // Generated from index 'django_content_type_id_pkey'.
[ "DjangoContentTypeByID", "retrieves", "a", "row", "from", "django_content_type", "as", "a", "DjangoContentType", ".", "Generated", "from", "index", "django_content_type_id_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/djangocontenttype.xo.go#L159-L180
22,917
xo/xo
examples/django/postgres/djangoadminlog.xo.go
Update
func (dal *DjangoAdminLog) Update(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dal._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_admin_log SET (` + `action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id` + `) = ( ` + `$1, $2, $3, $4, $5, $6, $7` + `) WHERE id = $8` // run query XOLog(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) _, err = db.Exec(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) return err }
go
func (dal *DjangoAdminLog) Update(db XODB) error { var err error // if doesn't exist, bail if !dal._exists { return errors.New("update failed: does not exist") } // if deleted, bail if dal._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.django_admin_log SET (` + `action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id` + `) = ( ` + `$1, $2, $3, $4, $5, $6, $7` + `) WHERE id = $8` // run query XOLog(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) _, err = db.Exec(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID) return err }
[ "func", "(", "dal", "*", "DjangoAdminLog", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "dal", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "dal", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE public.django_admin_log SET (`", "+", "`action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id`", "+", "`) = ( `", "+", "`$1, $2, $3, $4, $5, $6, $7`", "+", "`) WHERE id = $8`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "dal", ".", "ActionTime", ",", "dal", ".", "ObjectID", ",", "dal", ".", "ObjectRepr", ",", "dal", ".", "ActionFlag", ",", "dal", ".", "ChangeMessage", ",", "dal", ".", "ContentTypeID", ",", "dal", ".", "UserID", ",", "dal", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "dal", ".", "ActionTime", ",", "dal", ".", "ObjectID", ",", "dal", ".", "ObjectRepr", ",", "dal", ".", "ActionFlag", ",", "dal", ".", "ChangeMessage", ",", "dal", ".", "ContentTypeID", ",", "dal", ".", "UserID", ",", "dal", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the DjangoAdminLog in the database.
[ "Update", "updates", "the", "DjangoAdminLog", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangoadminlog.xo.go#L67-L91
22,918
xo/xo
examples/django/postgres/djangoadminlog.xo.go
DjangoAdminLogsByContentTypeID
func DjangoAdminLogsByContentTypeID(db XODB, contentTypeID sql.NullInt64) ([]*DjangoAdminLog, error) { var err error // sql query const sqlstr = `SELECT ` + `id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id ` + `FROM public.django_admin_log ` + `WHERE content_type_id = $1` // run query XOLog(sqlstr, contentTypeID) q, err := db.Query(sqlstr, contentTypeID) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoAdminLog{} for q.Next() { dal := DjangoAdminLog{ _exists: true, } // scan err = q.Scan(&dal.ID, &dal.ActionTime, &dal.ObjectID, &dal.ObjectRepr, &dal.ActionFlag, &dal.ChangeMessage, &dal.ContentTypeID, &dal.UserID) if err != nil { return nil, err } res = append(res, &dal) } return res, nil }
go
func DjangoAdminLogsByContentTypeID(db XODB, contentTypeID sql.NullInt64) ([]*DjangoAdminLog, error) { var err error // sql query const sqlstr = `SELECT ` + `id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id ` + `FROM public.django_admin_log ` + `WHERE content_type_id = $1` // run query XOLog(sqlstr, contentTypeID) q, err := db.Query(sqlstr, contentTypeID) if err != nil { return nil, err } defer q.Close() // load results res := []*DjangoAdminLog{} for q.Next() { dal := DjangoAdminLog{ _exists: true, } // scan err = q.Scan(&dal.ID, &dal.ActionTime, &dal.ObjectID, &dal.ObjectRepr, &dal.ActionFlag, &dal.ChangeMessage, &dal.ContentTypeID, &dal.UserID) if err != nil { return nil, err } res = append(res, &dal) } return res, nil }
[ "func", "DjangoAdminLogsByContentTypeID", "(", "db", "XODB", ",", "contentTypeID", "sql", ".", "NullInt64", ")", "(", "[", "]", "*", "DjangoAdminLog", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id `", "+", "`FROM public.django_admin_log `", "+", "`WHERE content_type_id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "contentTypeID", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "contentTypeID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "DjangoAdminLog", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "dal", ":=", "DjangoAdminLog", "{", "_exists", ":", "true", ",", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "dal", ".", "ID", ",", "&", "dal", ".", "ActionTime", ",", "&", "dal", ".", "ObjectID", ",", "&", "dal", ".", "ObjectRepr", ",", "&", "dal", ".", "ActionFlag", ",", "&", "dal", ".", "ChangeMessage", ",", "&", "dal", ".", "ContentTypeID", ",", "&", "dal", ".", "UserID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "dal", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// DjangoAdminLogsByContentTypeID retrieves a row from 'public.django_admin_log' as a DjangoAdminLog. // // Generated from index 'django_admin_log_417f1b1c'.
[ "DjangoAdminLogsByContentTypeID", "retrieves", "a", "row", "from", "public", ".", "django_admin_log", "as", "a", "DjangoAdminLog", ".", "Generated", "from", "index", "django_admin_log_417f1b1c", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangoadminlog.xo.go#L184-L218
22,919
xo/xo
models/proc.xo.go
PgProcs
func PgProcs(db XODB, schema string) ([]*Proc, error) { var err error // sql query const sqlstr = `SELECT ` + `p.proname, ` + // ::varchar AS proc_name `pg_get_function_result(p.oid) ` + // ::varchar AS return_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*Proc{} for q.Next() { p := Proc{} // scan err = q.Scan(&p.ProcName, &p.ReturnType) if err != nil { return nil, err } res = append(res, &p) } return res, nil }
go
func PgProcs(db XODB, schema string) ([]*Proc, error) { var err error // sql query const sqlstr = `SELECT ` + `p.proname, ` + // ::varchar AS proc_name `pg_get_function_result(p.oid) ` + // ::varchar AS return_type `FROM pg_proc p ` + `JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` + `WHERE n.nspname = $1` // run query XOLog(sqlstr, schema) q, err := db.Query(sqlstr, schema) if err != nil { return nil, err } defer q.Close() // load results res := []*Proc{} for q.Next() { p := Proc{} // scan err = q.Scan(&p.ProcName, &p.ReturnType) if err != nil { return nil, err } res = append(res, &p) } return res, nil }
[ "func", "PgProcs", "(", "db", "XODB", ",", "schema", "string", ")", "(", "[", "]", "*", "Proc", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`p.proname, `", "+", "// ::varchar AS proc_name", "`pg_get_function_result(p.oid) `", "+", "// ::varchar AS return_type", "`FROM pg_proc p `", "+", "`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid `", "+", "`WHERE n.nspname = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "Proc", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "p", ":=", "Proc", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "p", ".", "ProcName", ",", "&", "p", ".", "ReturnType", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "p", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// PgProcs runs a custom query, returning results as Proc.
[ "PgProcs", "runs", "a", "custom", "query", "returning", "results", "as", "Proc", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/proc.xo.go#L13-L47
22,920
xo/xo
examples/django/oracle/authgroup.xo.go
Delete
func (ag *AuthGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return nil } // if deleted, bail if ag._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_group WHERE id = :1` // run query XOLog(sqlstr, ag.ID) _, err = db.Exec(sqlstr, ag.ID) if err != nil { return err } // set deleted ag._deleted = true return nil }
go
func (ag *AuthGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return nil } // if deleted, bail if ag._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_group WHERE id = :1` // run query XOLog(sqlstr, ag.ID) _, err = db.Exec(sqlstr, ag.ID) if err != nil { return err } // set deleted ag._deleted = true return nil }
[ "func", "(", "ag", "*", "AuthGroup", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "ag", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "ag", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.auth_group WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "ag", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "ag", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "ag", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthGroup from the database.
[ "Delete", "deletes", "the", "AuthGroup", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authgroup.xo.go#L101-L128
22,921
xo/xo
examples/django/sqlite3/authgroup.xo.go
Update
func (ag *AuthGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return errors.New("update failed: does not exist") } // if deleted, bail if ag._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE auth_group SET ` + `name = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, ag.Name, ag.ID) _, err = db.Exec(sqlstr, ag.Name, ag.ID) return err }
go
func (ag *AuthGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !ag._exists { return errors.New("update failed: does not exist") } // if deleted, bail if ag._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE auth_group SET ` + `name = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, ag.Name, ag.ID) _, err = db.Exec(sqlstr, ag.Name, ag.ID) return err }
[ "func", "(", "ag", "*", "AuthGroup", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "ag", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "ag", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE auth_group SET `", "+", "`name = ?`", "+", "` WHERE id = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "ag", ".", "Name", ",", "ag", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "ag", ".", "Name", ",", "ag", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the AuthGroup in the database.
[ "Update", "updates", "the", "AuthGroup", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/authgroup.xo.go#L66-L88
22,922
xo/xo
examples/django/oracle/authuser.xo.go
Delete
func (au *AuthUser) Delete(db XODB) error { var err error // if doesn't exist, bail if !au._exists { return nil } // if deleted, bail if au._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user WHERE id = :1` // run query XOLog(sqlstr, au.ID) _, err = db.Exec(sqlstr, au.ID) if err != nil { return err } // set deleted au._deleted = true return nil }
go
func (au *AuthUser) Delete(db XODB) error { var err error // if doesn't exist, bail if !au._exists { return nil } // if deleted, bail if au._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user WHERE id = :1` // run query XOLog(sqlstr, au.ID) _, err = db.Exec(sqlstr, au.ID) if err != nil { return err } // set deleted au._deleted = true return nil }
[ "func", "(", "au", "*", "AuthUser", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "au", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "au", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.auth_user WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "au", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "au", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "au", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthUser from the database.
[ "Delete", "deletes", "the", "AuthUser", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuser.xo.go#L111-L138
22,923
xo/xo
examples/django/oracle/authuser.xo.go
AuthUserByUsername
func AuthUserByUsername(db XODB, username sql.NullString) (*AuthUser, error) { var err error // sql query const sqlstr = `SELECT ` + `id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined ` + `FROM django.auth_user ` + `WHERE username = :1` // run query XOLog(sqlstr, username) au := AuthUser{ _exists: true, } err = db.QueryRow(sqlstr, username).Scan(&au.ID, &au.Password, &au.LastLogin, &au.IsSuperuser, &au.Username, &au.FirstName, &au.LastName, &au.Email, &au.IsStaff, &au.IsActive, &au.DateJoined) if err != nil { return nil, err } return &au, nil }
go
func AuthUserByUsername(db XODB, username sql.NullString) (*AuthUser, error) { var err error // sql query const sqlstr = `SELECT ` + `id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined ` + `FROM django.auth_user ` + `WHERE username = :1` // run query XOLog(sqlstr, username) au := AuthUser{ _exists: true, } err = db.QueryRow(sqlstr, username).Scan(&au.ID, &au.Password, &au.LastLogin, &au.IsSuperuser, &au.Username, &au.FirstName, &au.LastName, &au.Email, &au.IsStaff, &au.IsActive, &au.DateJoined) if err != nil { return nil, err } return &au, nil }
[ "func", "AuthUserByUsername", "(", "db", "XODB", ",", "username", "sql", ".", "NullString", ")", "(", "*", "AuthUser", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined `", "+", "`FROM django.auth_user `", "+", "`WHERE username = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "username", ")", "\n", "au", ":=", "AuthUser", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "username", ")", ".", "Scan", "(", "&", "au", ".", "ID", ",", "&", "au", ".", "Password", ",", "&", "au", ".", "LastLogin", ",", "&", "au", ".", "IsSuperuser", ",", "&", "au", ".", "Username", ",", "&", "au", ".", "FirstName", ",", "&", "au", ".", "LastName", ",", "&", "au", ".", "Email", ",", "&", "au", ".", "IsStaff", ",", "&", "au", ".", "IsActive", ",", "&", "au", ".", "DateJoined", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "au", ",", "nil", "\n", "}" ]
// AuthUserByUsername retrieves a row from 'django.auth_user' as a AuthUser. // // Generated from index 'sys_c004977'.
[ "AuthUserByUsername", "retrieves", "a", "row", "from", "django", ".", "auth_user", "as", "a", "AuthUser", ".", "Generated", "from", "index", "sys_c004977", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuser.xo.go#L169-L190
22,924
xo/xo
internal/fkmode.go
UnmarshalText
func (f *FkMode) UnmarshalText(text []byte) error { switch strings.ToLower(string(text)) { case "smart", "default": *f = FkModeSmart case "parent": *f = FkModeParent case "field": *f = FkModeField case "key": *f = FkModeKey default: return errors.New("invalid FkMode") } return nil }
go
func (f *FkMode) UnmarshalText(text []byte) error { switch strings.ToLower(string(text)) { case "smart", "default": *f = FkModeSmart case "parent": *f = FkModeParent case "field": *f = FkModeField case "key": *f = FkModeKey default: return errors.New("invalid FkMode") } return nil }
[ "func", "(", "f", "*", "FkMode", ")", "UnmarshalText", "(", "text", "[", "]", "byte", ")", "error", "{", "switch", "strings", ".", "ToLower", "(", "string", "(", "text", ")", ")", "{", "case", "\"", "\"", ",", "\"", "\"", ":", "*", "f", "=", "FkModeSmart", "\n", "case", "\"", "\"", ":", "*", "f", "=", "FkModeParent", "\n", "case", "\"", "\"", ":", "*", "f", "=", "FkModeField", "\n", "case", "\"", "\"", ":", "*", "f", "=", "FkModeKey", "\n\n", "default", ":", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// UnmarshalText unmarshals FkMode from text.
[ "UnmarshalText", "unmarshals", "FkMode", "from", "text", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L44-L60
22,925
xo/xo
internal/fkmode.go
fkName
func fkName(mode FkMode, fkMap map[string]*ForeignKey, fk *ForeignKey) string { switch mode { case FkModeParent: return fk.RefType.Name case FkModeField: return fk.RefType.Name + "By" + fk.Field.Name case FkModeKey: return fk.RefType.Name + "By" + snaker.SnakeToCamelIdentifier(fk.ForeignKey.ForeignKeyName) } // mode is FkModeSmart // inspect all foreign keys and use FkModeField if conflict found for _, f := range fkMap { if fk != f && fk.Type.Name == f.Type.Name && fk.RefType.Name == f.RefType.Name { return fkName(FkModeField, fkMap, fk) } } // no conflict, so use FkModeParent return fkName(FkModeParent, fkMap, fk) }
go
func fkName(mode FkMode, fkMap map[string]*ForeignKey, fk *ForeignKey) string { switch mode { case FkModeParent: return fk.RefType.Name case FkModeField: return fk.RefType.Name + "By" + fk.Field.Name case FkModeKey: return fk.RefType.Name + "By" + snaker.SnakeToCamelIdentifier(fk.ForeignKey.ForeignKeyName) } // mode is FkModeSmart // inspect all foreign keys and use FkModeField if conflict found for _, f := range fkMap { if fk != f && fk.Type.Name == f.Type.Name && fk.RefType.Name == f.RefType.Name { return fkName(FkModeField, fkMap, fk) } } // no conflict, so use FkModeParent return fkName(FkModeParent, fkMap, fk) }
[ "func", "fkName", "(", "mode", "FkMode", ",", "fkMap", "map", "[", "string", "]", "*", "ForeignKey", ",", "fk", "*", "ForeignKey", ")", "string", "{", "switch", "mode", "{", "case", "FkModeParent", ":", "return", "fk", ".", "RefType", ".", "Name", "\n", "case", "FkModeField", ":", "return", "fk", ".", "RefType", ".", "Name", "+", "\"", "\"", "+", "fk", ".", "Field", ".", "Name", "\n", "case", "FkModeKey", ":", "return", "fk", ".", "RefType", ".", "Name", "+", "\"", "\"", "+", "snaker", ".", "SnakeToCamelIdentifier", "(", "fk", ".", "ForeignKey", ".", "ForeignKeyName", ")", "\n", "}", "\n\n", "// mode is FkModeSmart", "// inspect all foreign keys and use FkModeField if conflict found", "for", "_", ",", "f", ":=", "range", "fkMap", "{", "if", "fk", "!=", "f", "&&", "fk", ".", "Type", ".", "Name", "==", "f", ".", "Type", ".", "Name", "&&", "fk", ".", "RefType", ".", "Name", "==", "f", ".", "RefType", ".", "Name", "{", "return", "fkName", "(", "FkModeField", ",", "fkMap", ",", "fk", ")", "\n", "}", "\n", "}", "\n\n", "// no conflict, so use FkModeParent", "return", "fkName", "(", "FkModeParent", ",", "fkMap", ",", "fk", ")", "\n", "}" ]
// fkName returns the name for the foreign key.
[ "fkName", "returns", "the", "name", "for", "the", "foreign", "key", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L79-L99
22,926
xo/xo
internal/fkmode.go
ForeignKeyName
func (a *ArgType) ForeignKeyName(fkMap map[string]*ForeignKey, fk *ForeignKey) string { return fkName(*a.ForeignKeyMode, fkMap, fk) }
go
func (a *ArgType) ForeignKeyName(fkMap map[string]*ForeignKey, fk *ForeignKey) string { return fkName(*a.ForeignKeyMode, fkMap, fk) }
[ "func", "(", "a", "*", "ArgType", ")", "ForeignKeyName", "(", "fkMap", "map", "[", "string", "]", "*", "ForeignKey", ",", "fk", "*", "ForeignKey", ")", "string", "{", "return", "fkName", "(", "*", "a", ".", "ForeignKeyMode", ",", "fkMap", ",", "fk", ")", "\n", "}" ]
// ForeignKeyName returns the foreign key name for the passed type.
[ "ForeignKeyName", "returns", "the", "foreign", "key", "name", "for", "the", "passed", "type", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L102-L104
22,927
xo/xo
examples/django/postgres/authuseruserpermission.xo.go
Delete
func (auup *AuthUserUserPermission) Delete(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return nil } // if deleted, bail if auup._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.auth_user_user_permissions WHERE id = $1` // run query XOLog(sqlstr, auup.ID) _, err = db.Exec(sqlstr, auup.ID) if err != nil { return err } // set deleted auup._deleted = true return nil }
go
func (auup *AuthUserUserPermission) Delete(db XODB) error { var err error // if doesn't exist, bail if !auup._exists { return nil } // if deleted, bail if auup._deleted { return nil } // sql query const sqlstr = `DELETE FROM public.auth_user_user_permissions WHERE id = $1` // run query XOLog(sqlstr, auup.ID) _, err = db.Exec(sqlstr, auup.ID) if err != nil { return err } // set deleted auup._deleted = true return nil }
[ "func", "(", "auup", "*", "AuthUserUserPermission", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "auup", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "auup", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM public.auth_user_user_permissions WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "auup", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "auup", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "auup", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthUserUserPermission from the database.
[ "Delete", "deletes", "the", "AuthUserUserPermission", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authuseruserpermission.xo.go#L131-L158
22,928
xo/xo
examples/django/postgres/authuseruserpermission.xo.go
AuthUserUserPermissionByID
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM public.auth_user_user_permissions ` + `WHERE id = $1` // run query XOLog(sqlstr, id) auup := AuthUserUserPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } return &auup, nil }
go
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, user_id, permission_id ` + `FROM public.auth_user_user_permissions ` + `WHERE id = $1` // run query XOLog(sqlstr, id) auup := AuthUserUserPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID) if err != nil { return nil, err } return &auup, nil }
[ "func", "AuthUserUserPermissionByID", "(", "db", "XODB", ",", "id", "int", ")", "(", "*", "AuthUserUserPermission", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`id, user_id, permission_id `", "+", "`FROM public.auth_user_user_permissions `", "+", "`WHERE id = $1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "id", ")", "\n", "auup", ":=", "AuthUserUserPermission", "{", "_exists", ":", "true", ",", "}", "\n\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "id", ")", ".", "Scan", "(", "&", "auup", ".", "ID", ",", "&", "auup", ".", "UserID", ",", "&", "auup", ".", "PermissionID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "auup", ",", "nil", "\n", "}" ]
// AuthUserUserPermissionByID retrieves a row from 'public.auth_user_user_permissions' as a AuthUserUserPermission. // // Generated from index 'auth_user_user_permissions_pkey'.
[ "AuthUserUserPermissionByID", "retrieves", "a", "row", "from", "public", ".", "auth_user_user_permissions", "as", "a", "AuthUserUserPermission", ".", "Generated", "from", "index", "auth_user_user_permissions_pkey", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authuseruserpermission.xo.go#L255-L276
22,929
xo/xo
examples/django/oracle/authusergroup.xo.go
Delete
func (aug *AuthUserGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return nil } // if deleted, bail if aug._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user_groups WHERE id = :1` // run query XOLog(sqlstr, aug.ID) _, err = db.Exec(sqlstr, aug.ID) if err != nil { return err } // set deleted aug._deleted = true return nil }
go
func (aug *AuthUserGroup) Delete(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return nil } // if deleted, bail if aug._deleted { return nil } // sql query const sqlstr = `DELETE FROM django.auth_user_groups WHERE id = :1` // run query XOLog(sqlstr, aug.ID) _, err = db.Exec(sqlstr, aug.ID) if err != nil { return err } // set deleted aug._deleted = true return nil }
[ "func", "(", "aug", "*", "AuthUserGroup", ")", "Delete", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "aug", ".", "_exists", "{", "return", "nil", "\n", "}", "\n\n", "// if deleted, bail", "if", "aug", ".", "_deleted", "{", "return", "nil", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`DELETE FROM django.auth_user_groups WHERE id = :1`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "aug", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "aug", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// set deleted", "aug", ".", "_deleted", "=", "true", "\n\n", "return", "nil", "\n", "}" ]
// Delete deletes the AuthUserGroup from the database.
[ "Delete", "deletes", "the", "AuthUserGroup", "from", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authusergroup.xo.go#L99-L126
22,930
xo/xo
models/myenumvalue.xo.go
MyEnumValues
func MyEnumValues(db XODB, schema string, enum string) (*MyEnumValue, error) { var err error // sql query const sqlstr = `SELECT ` + `SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values ` + `FROM information_schema.columns ` + `WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?` // run query XOLog(sqlstr, schema, enum) var mev MyEnumValue err = db.QueryRow(sqlstr, schema, enum).Scan(&mev.EnumValues) if err != nil { return nil, err } return &mev, nil }
go
func MyEnumValues(db XODB, schema string, enum string) (*MyEnumValue, error) { var err error // sql query const sqlstr = `SELECT ` + `SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values ` + `FROM information_schema.columns ` + `WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?` // run query XOLog(sqlstr, schema, enum) var mev MyEnumValue err = db.QueryRow(sqlstr, schema, enum).Scan(&mev.EnumValues) if err != nil { return nil, err } return &mev, nil }
[ "func", "MyEnumValues", "(", "db", "XODB", ",", "schema", "string", ",", "enum", "string", ")", "(", "*", "MyEnumValue", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values `", "+", "`FROM information_schema.columns `", "+", "`WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ",", "enum", ")", "\n", "var", "mev", "MyEnumValue", "\n", "err", "=", "db", ".", "QueryRow", "(", "sqlstr", ",", "schema", ",", "enum", ")", ".", "Scan", "(", "&", "mev", ".", "EnumValues", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "mev", ",", "nil", "\n", "}" ]
// MyEnumValues runs a custom query, returning results as MyEnumValue.
[ "MyEnumValues", "runs", "a", "custom", "query", "returning", "results", "as", "MyEnumValue", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/myenumvalue.xo.go#L12-L30
22,931
xo/xo
examples/django/postgres/authusergroup.xo.go
Update
func (aug *AuthUserGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return errors.New("update failed: does not exist") } // if deleted, bail if aug._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.auth_user_groups SET (` + `user_id, group_id` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, aug.UserID, aug.GroupID, aug.ID) _, err = db.Exec(sqlstr, aug.UserID, aug.GroupID, aug.ID) return err }
go
func (aug *AuthUserGroup) Update(db XODB) error { var err error // if doesn't exist, bail if !aug._exists { return errors.New("update failed: does not exist") } // if deleted, bail if aug._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE public.auth_user_groups SET (` + `user_id, group_id` + `) = ( ` + `$1, $2` + `) WHERE id = $3` // run query XOLog(sqlstr, aug.UserID, aug.GroupID, aug.ID) _, err = db.Exec(sqlstr, aug.UserID, aug.GroupID, aug.ID) return err }
[ "func", "(", "aug", "*", "AuthUserGroup", ")", "Update", "(", "db", "XODB", ")", "error", "{", "var", "err", "error", "\n\n", "// if doesn't exist, bail", "if", "!", "aug", ".", "_exists", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// if deleted, bail", "if", "aug", ".", "_deleted", "{", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n\n", "// sql query", "const", "sqlstr", "=", "`UPDATE public.auth_user_groups SET (`", "+", "`user_id, group_id`", "+", "`) = ( `", "+", "`$1, $2`", "+", "`) WHERE id = $3`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "aug", ".", "UserID", ",", "aug", ".", "GroupID", ",", "aug", ".", "ID", ")", "\n", "_", ",", "err", "=", "db", ".", "Exec", "(", "sqlstr", ",", "aug", ".", "UserID", ",", "aug", ".", "GroupID", ",", "aug", ".", "ID", ")", "\n", "return", "err", "\n", "}" ]
// Update updates the AuthUserGroup in the database.
[ "Update", "updates", "the", "AuthUserGroup", "in", "the", "database", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authusergroup.xo.go#L60-L84
22,932
xo/xo
models/column.xo.go
MyTableColumns
func MyTableColumns(db XODB, schema string, table string) ([]*Column, error) { var err error // sql query const sqlstr = `SELECT ` + `ordinal_position AS field_ordinal, ` + `column_name, ` + `IF(data_type = 'enum', column_name, column_type) AS data_type, ` + `IF(is_nullable = 'YES', false, true) AS not_null, ` + `column_default AS default_value, ` + `IF(column_key = 'PRI', true, false) AS is_primary_key ` + `FROM information_schema.columns ` + `WHERE table_schema = ? AND table_name = ? ` + `ORDER BY ordinal_position` // run query XOLog(sqlstr, schema, table) q, err := db.Query(sqlstr, schema, table) if err != nil { return nil, err } defer q.Close() // load results res := []*Column{} for q.Next() { c := Column{} // scan err = q.Scan(&c.FieldOrdinal, &c.ColumnName, &c.DataType, &c.NotNull, &c.DefaultValue, &c.IsPrimaryKey) if err != nil { return nil, err } res = append(res, &c) } return res, nil }
go
func MyTableColumns(db XODB, schema string, table string) ([]*Column, error) { var err error // sql query const sqlstr = `SELECT ` + `ordinal_position AS field_ordinal, ` + `column_name, ` + `IF(data_type = 'enum', column_name, column_type) AS data_type, ` + `IF(is_nullable = 'YES', false, true) AS not_null, ` + `column_default AS default_value, ` + `IF(column_key = 'PRI', true, false) AS is_primary_key ` + `FROM information_schema.columns ` + `WHERE table_schema = ? AND table_name = ? ` + `ORDER BY ordinal_position` // run query XOLog(sqlstr, schema, table) q, err := db.Query(sqlstr, schema, table) if err != nil { return nil, err } defer q.Close() // load results res := []*Column{} for q.Next() { c := Column{} // scan err = q.Scan(&c.FieldOrdinal, &c.ColumnName, &c.DataType, &c.NotNull, &c.DefaultValue, &c.IsPrimaryKey) if err != nil { return nil, err } res = append(res, &c) } return res, nil }
[ "func", "MyTableColumns", "(", "db", "XODB", ",", "schema", "string", ",", "table", "string", ")", "(", "[", "]", "*", "Column", ",", "error", ")", "{", "var", "err", "error", "\n\n", "// sql query", "const", "sqlstr", "=", "`SELECT `", "+", "`ordinal_position AS field_ordinal, `", "+", "`column_name, `", "+", "`IF(data_type = 'enum', column_name, column_type) AS data_type, `", "+", "`IF(is_nullable = 'YES', false, true) AS not_null, `", "+", "`column_default AS default_value, `", "+", "`IF(column_key = 'PRI', true, false) AS is_primary_key `", "+", "`FROM information_schema.columns `", "+", "`WHERE table_schema = ? AND table_name = ? `", "+", "`ORDER BY ordinal_position`", "\n\n", "// run query", "XOLog", "(", "sqlstr", ",", "schema", ",", "table", ")", "\n", "q", ",", "err", ":=", "db", ".", "Query", "(", "sqlstr", ",", "schema", ",", "table", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "q", ".", "Close", "(", ")", "\n\n", "// load results", "res", ":=", "[", "]", "*", "Column", "{", "}", "\n", "for", "q", ".", "Next", "(", ")", "{", "c", ":=", "Column", "{", "}", "\n\n", "// scan", "err", "=", "q", ".", "Scan", "(", "&", "c", ".", "FieldOrdinal", ",", "&", "c", ".", "ColumnName", ",", "&", "c", ".", "DataType", ",", "&", "c", ".", "NotNull", ",", "&", "c", ".", "DefaultValue", ",", "&", "c", ".", "IsPrimaryKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "res", "=", "append", "(", "res", ",", "&", "c", ")", "\n", "}", "\n\n", "return", "res", ",", "nil", "\n", "}" ]
// MyTableColumns runs a custom query, returning results as Column.
[ "MyTableColumns", "runs", "a", "custom", "query", "returning", "results", "as", "Column", "." ]
1a94fa516029cb306cce6d379d086e4d5b5bb232
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/column.xo.go#L66-L104
22,933
gravitational/teleport
lib/auth/methods.go
AuthenticateUser
func (s *AuthServer) AuthenticateUser(req AuthenticateUserRequest) error { err := s.authenticateUser(req) if err != nil { s.EmitAuditEvent(events.UserLocalLoginFailure, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: false, events.AuthAttemptErr: err.Error(), }) } else { s.EmitAuditEvent(events.UserLocalLogin, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: true, }) } return err }
go
func (s *AuthServer) AuthenticateUser(req AuthenticateUserRequest) error { err := s.authenticateUser(req) if err != nil { s.EmitAuditEvent(events.UserLocalLoginFailure, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: false, events.AuthAttemptErr: err.Error(), }) } else { s.EmitAuditEvent(events.UserLocalLogin, events.EventFields{ events.EventUser: req.Username, events.LoginMethod: events.LoginMethodLocal, events.AuthAttemptSuccess: true, }) } return err }
[ "func", "(", "s", "*", "AuthServer", ")", "AuthenticateUser", "(", "req", "AuthenticateUserRequest", ")", "error", "{", "err", ":=", "s", ".", "authenticateUser", "(", "req", ")", "\n", "if", "err", "!=", "nil", "{", "s", ".", "EmitAuditEvent", "(", "events", ".", "UserLocalLoginFailure", ",", "events", ".", "EventFields", "{", "events", ".", "EventUser", ":", "req", ".", "Username", ",", "events", ".", "LoginMethod", ":", "events", ".", "LoginMethodLocal", ",", "events", ".", "AuthAttemptSuccess", ":", "false", ",", "events", ".", "AuthAttemptErr", ":", "err", ".", "Error", "(", ")", ",", "}", ")", "\n", "}", "else", "{", "s", ".", "EmitAuditEvent", "(", "events", ".", "UserLocalLogin", ",", "events", ".", "EventFields", "{", "events", ".", "EventUser", ":", "req", ".", "Username", ",", "events", ".", "LoginMethod", ":", "events", ".", "LoginMethodLocal", ",", "events", ".", "AuthAttemptSuccess", ":", "true", ",", "}", ")", "\n", "}", "\n", "return", "err", "\n", "}" ]
// AuthenticateUser authenticates user based on the request type
[ "AuthenticateUser", "authenticates", "user", "based", "on", "the", "request", "type" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L85-L102
22,934
gravitational/teleport
lib/auth/methods.go
AuthenticateWebUser
func (s *AuthServer) AuthenticateWebUser(req AuthenticateUserRequest) (services.WebSession, error) { if req.Session != nil { session, err := s.GetWebSession(req.Username, req.Session.ID) if err != nil { return nil, trace.AccessDenied("session is invalid or has expired") } return session, nil } if err := s.AuthenticateUser(req); err != nil { return nil, trace.Wrap(err) } sess, err := s.NewWebSession(req.Username) if err != nil { return nil, trace.Wrap(err) } if err := s.UpsertWebSession(req.Username, sess); err != nil { return nil, trace.Wrap(err) } sess, err = services.GetWebSessionMarshaler().GenerateWebSession(sess) if err != nil { return nil, trace.Wrap(err) } return sess, nil }
go
func (s *AuthServer) AuthenticateWebUser(req AuthenticateUserRequest) (services.WebSession, error) { if req.Session != nil { session, err := s.GetWebSession(req.Username, req.Session.ID) if err != nil { return nil, trace.AccessDenied("session is invalid or has expired") } return session, nil } if err := s.AuthenticateUser(req); err != nil { return nil, trace.Wrap(err) } sess, err := s.NewWebSession(req.Username) if err != nil { return nil, trace.Wrap(err) } if err := s.UpsertWebSession(req.Username, sess); err != nil { return nil, trace.Wrap(err) } sess, err = services.GetWebSessionMarshaler().GenerateWebSession(sess) if err != nil { return nil, trace.Wrap(err) } return sess, nil }
[ "func", "(", "s", "*", "AuthServer", ")", "AuthenticateWebUser", "(", "req", "AuthenticateUserRequest", ")", "(", "services", ".", "WebSession", ",", "error", ")", "{", "if", "req", ".", "Session", "!=", "nil", "{", "session", ",", "err", ":=", "s", ".", "GetWebSession", "(", "req", ".", "Username", ",", "req", ".", "Session", ".", "ID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "AccessDenied", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "session", ",", "nil", "\n", "}", "\n", "if", "err", ":=", "s", ".", "AuthenticateUser", "(", "req", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "sess", ",", "err", ":=", "s", ".", "NewWebSession", "(", "req", ".", "Username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "s", ".", "UpsertWebSession", "(", "req", ".", "Username", ",", "sess", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "sess", ",", "err", "=", "services", ".", "GetWebSessionMarshaler", "(", ")", ".", "GenerateWebSession", "(", "sess", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "sess", ",", "nil", "\n", "}" ]
// AuthenticateWebUser authenticates web user, creates and returns web session // in case if authentication is successful. In case if existing session id // is used to authenticate, returns session associated with the existing session id // instead of creating the new one
[ "AuthenticateWebUser", "authenticates", "web", "user", "creates", "and", "returns", "web", "session", "in", "case", "if", "authentication", "is", "successful", ".", "In", "case", "if", "existing", "session", "id", "is", "used", "to", "authenticate", "returns", "session", "associated", "with", "the", "existing", "session", "id", "instead", "of", "creating", "the", "new", "one" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L165-L188
22,935
gravitational/teleport
lib/auth/methods.go
CheckAndSetDefaults
func (a *AuthenticateSSHRequest) CheckAndSetDefaults() error { if err := a.AuthenticateUserRequest.CheckAndSetDefaults(); err != nil { return trace.Wrap(err) } if len(a.PublicKey) == 0 { return trace.BadParameter("missing parameter 'public_key'") } certificateFormat, err := utils.CheckCertificateFormatFlag(a.CompatibilityMode) if err != nil { return trace.Wrap(err) } a.CompatibilityMode = certificateFormat return nil }
go
func (a *AuthenticateSSHRequest) CheckAndSetDefaults() error { if err := a.AuthenticateUserRequest.CheckAndSetDefaults(); err != nil { return trace.Wrap(err) } if len(a.PublicKey) == 0 { return trace.BadParameter("missing parameter 'public_key'") } certificateFormat, err := utils.CheckCertificateFormatFlag(a.CompatibilityMode) if err != nil { return trace.Wrap(err) } a.CompatibilityMode = certificateFormat return nil }
[ "func", "(", "a", "*", "AuthenticateSSHRequest", ")", "CheckAndSetDefaults", "(", ")", "error", "{", "if", "err", ":=", "a", ".", "AuthenticateUserRequest", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "len", "(", "a", ".", "PublicKey", ")", "==", "0", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "certificateFormat", ",", "err", ":=", "utils", ".", "CheckCertificateFormatFlag", "(", "a", ".", "CompatibilityMode", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "a", ".", "CompatibilityMode", "=", "certificateFormat", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default certificate values
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "certificate", "values" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L203-L216
22,936
gravitational/teleport
lib/auth/methods.go
SSHCertPublicKeys
func (c *TrustedCerts) SSHCertPublicKeys() ([]ssh.PublicKey, error) { out := make([]ssh.PublicKey, 0, len(c.HostCertificates)) for _, keyBytes := range c.HostCertificates { publicKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes) if err != nil { return nil, trace.Wrap(err) } out = append(out, publicKey) } return out, nil }
go
func (c *TrustedCerts) SSHCertPublicKeys() ([]ssh.PublicKey, error) { out := make([]ssh.PublicKey, 0, len(c.HostCertificates)) for _, keyBytes := range c.HostCertificates { publicKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes) if err != nil { return nil, trace.Wrap(err) } out = append(out, publicKey) } return out, nil }
[ "func", "(", "c", "*", "TrustedCerts", ")", "SSHCertPublicKeys", "(", ")", "(", "[", "]", "ssh", ".", "PublicKey", ",", "error", ")", "{", "out", ":=", "make", "(", "[", "]", "ssh", ".", "PublicKey", ",", "0", ",", "len", "(", "c", ".", "HostCertificates", ")", ")", "\n", "for", "_", ",", "keyBytes", ":=", "range", "c", ".", "HostCertificates", "{", "publicKey", ",", "_", ",", "_", ",", "_", ",", "err", ":=", "ssh", ".", "ParseAuthorizedKey", "(", "keyBytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "out", "=", "append", "(", "out", ",", "publicKey", ")", "\n", "}", "\n", "return", "out", ",", "nil", "\n", "}" ]
// SSHCertPublicKeys returns a list of trusted host SSH certificate authority public keys
[ "SSHCertPublicKeys", "returns", "a", "list", "of", "trusted", "host", "SSH", "certificate", "authority", "public", "keys" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L247-L257
22,937
gravitational/teleport
lib/auth/methods.go
AuthoritiesToTrustedCerts
func AuthoritiesToTrustedCerts(authorities []services.CertAuthority) []TrustedCerts { out := make([]TrustedCerts, len(authorities)) for i, ca := range authorities { out[i] = TrustedCerts{ ClusterName: ca.GetClusterName(), HostCertificates: ca.GetCheckingKeys(), TLSCertificates: services.TLSCerts(ca), } } return out }
go
func AuthoritiesToTrustedCerts(authorities []services.CertAuthority) []TrustedCerts { out := make([]TrustedCerts, len(authorities)) for i, ca := range authorities { out[i] = TrustedCerts{ ClusterName: ca.GetClusterName(), HostCertificates: ca.GetCheckingKeys(), TLSCertificates: services.TLSCerts(ca), } } return out }
[ "func", "AuthoritiesToTrustedCerts", "(", "authorities", "[", "]", "services", ".", "CertAuthority", ")", "[", "]", "TrustedCerts", "{", "out", ":=", "make", "(", "[", "]", "TrustedCerts", ",", "len", "(", "authorities", ")", ")", "\n", "for", "i", ",", "ca", ":=", "range", "authorities", "{", "out", "[", "i", "]", "=", "TrustedCerts", "{", "ClusterName", ":", "ca", ".", "GetClusterName", "(", ")", ",", "HostCertificates", ":", "ca", ".", "GetCheckingKeys", "(", ")", ",", "TLSCertificates", ":", "services", ".", "TLSCerts", "(", "ca", ")", ",", "}", "\n", "}", "\n", "return", "out", "\n", "}" ]
// AuthoritiesToTrustedCerts serializes authorities to TrustedCerts data structure
[ "AuthoritiesToTrustedCerts", "serializes", "authorities", "to", "TrustedCerts", "data", "structure" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L260-L270
22,938
gravitational/teleport
lib/auth/methods.go
AuthenticateSSHUser
func (s *AuthServer) AuthenticateSSHUser(req AuthenticateSSHRequest) (*SSHLoginResponse, error) { clusterName, err := s.GetClusterName() if err != nil { return nil, trace.Wrap(err) } if err := s.AuthenticateUser(req.AuthenticateUserRequest); err != nil { return nil, trace.Wrap(err) } user, err := s.GetUser(req.Username) if err != nil { return nil, trace.Wrap(err) } roles, err := services.FetchRoles(user.GetRoles(), s, user.GetTraits()) if err != nil { return nil, trace.Wrap(err) } // Return the host CA for this cluster only. authority, err := s.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName.GetClusterName(), }, false) if err != nil { return nil, trace.Wrap(err) } hostCertAuthorities := []services.CertAuthority{ authority, } certs, err := s.generateUserCert(certRequest{ user: user, roles: roles, ttl: req.TTL, publicKey: req.PublicKey, compatibility: req.CompatibilityMode, }) if err != nil { return nil, trace.Wrap(err) } return &SSHLoginResponse{ Username: req.Username, Cert: certs.ssh, TLSCert: certs.tls, HostSigners: AuthoritiesToTrustedCerts(hostCertAuthorities), }, nil }
go
func (s *AuthServer) AuthenticateSSHUser(req AuthenticateSSHRequest) (*SSHLoginResponse, error) { clusterName, err := s.GetClusterName() if err != nil { return nil, trace.Wrap(err) } if err := s.AuthenticateUser(req.AuthenticateUserRequest); err != nil { return nil, trace.Wrap(err) } user, err := s.GetUser(req.Username) if err != nil { return nil, trace.Wrap(err) } roles, err := services.FetchRoles(user.GetRoles(), s, user.GetTraits()) if err != nil { return nil, trace.Wrap(err) } // Return the host CA for this cluster only. authority, err := s.GetCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName.GetClusterName(), }, false) if err != nil { return nil, trace.Wrap(err) } hostCertAuthorities := []services.CertAuthority{ authority, } certs, err := s.generateUserCert(certRequest{ user: user, roles: roles, ttl: req.TTL, publicKey: req.PublicKey, compatibility: req.CompatibilityMode, }) if err != nil { return nil, trace.Wrap(err) } return &SSHLoginResponse{ Username: req.Username, Cert: certs.ssh, TLSCert: certs.tls, HostSigners: AuthoritiesToTrustedCerts(hostCertAuthorities), }, nil }
[ "func", "(", "s", "*", "AuthServer", ")", "AuthenticateSSHUser", "(", "req", "AuthenticateSSHRequest", ")", "(", "*", "SSHLoginResponse", ",", "error", ")", "{", "clusterName", ",", "err", ":=", "s", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "s", ".", "AuthenticateUser", "(", "req", ".", "AuthenticateUserRequest", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "user", ",", "err", ":=", "s", ".", "GetUser", "(", "req", ".", "Username", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "roles", ",", "err", ":=", "services", ".", "FetchRoles", "(", "user", ".", "GetRoles", "(", ")", ",", "s", ",", "user", ".", "GetTraits", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Return the host CA for this cluster only.", "authority", ",", "err", ":=", "s", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "clusterName", ".", "GetClusterName", "(", ")", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "hostCertAuthorities", ":=", "[", "]", "services", ".", "CertAuthority", "{", "authority", ",", "}", "\n\n", "certs", ",", "err", ":=", "s", ".", "generateUserCert", "(", "certRequest", "{", "user", ":", "user", ",", "roles", ":", "roles", ",", "ttl", ":", "req", ".", "TTL", ",", "publicKey", ":", "req", ".", "PublicKey", ",", "compatibility", ":", "req", ".", "CompatibilityMode", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "&", "SSHLoginResponse", "{", "Username", ":", "req", ".", "Username", ",", "Cert", ":", "certs", ".", "ssh", ",", "TLSCert", ":", "certs", ".", "tls", ",", "HostSigners", ":", "AuthoritiesToTrustedCerts", "(", "hostCertAuthorities", ")", ",", "}", ",", "nil", "\n", "}" ]
// AuthenticateSSHUser authenticates web user, creates and returns web session // in case if authentication is successful
[ "AuthenticateSSHUser", "authenticates", "web", "user", "creates", "and", "returns", "web", "session", "in", "case", "if", "authentication", "is", "successful" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L274-L320
22,939
gravitational/teleport
lib/pam/pam.go
unregisterHandler
func unregisterHandler(handlerIndex int) { handlerMu.Lock() defer handlerMu.Unlock() delete(handlers, handlerIndex) }
go
func unregisterHandler(handlerIndex int) { handlerMu.Lock() defer handlerMu.Unlock() delete(handlers, handlerIndex) }
[ "func", "unregisterHandler", "(", "handlerIndex", "int", ")", "{", "handlerMu", ".", "Lock", "(", ")", "\n", "defer", "handlerMu", ".", "Unlock", "(", ")", "\n\n", "delete", "(", "handlers", ",", "handlerIndex", ")", "\n", "}" ]
// unregisterHandler will remove the PAM handle from the package level map // once no more C callbacks can come back.
[ "unregisterHandler", "will", "remove", "the", "PAM", "handle", "from", "the", "package", "level", "map", "once", "no", "more", "C", "callbacks", "can", "come", "back", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L140-L145
22,940
gravitational/teleport
lib/pam/pam.go
lookupHandler
func lookupHandler(handlerIndex int) (handler, error) { handlerMu.Lock() defer handlerMu.Unlock() handle, ok := handlers[handlerIndex] if !ok { return nil, trace.BadParameter("handler with index %v not registered", handlerIndex) } return handle, nil }
go
func lookupHandler(handlerIndex int) (handler, error) { handlerMu.Lock() defer handlerMu.Unlock() handle, ok := handlers[handlerIndex] if !ok { return nil, trace.BadParameter("handler with index %v not registered", handlerIndex) } return handle, nil }
[ "func", "lookupHandler", "(", "handlerIndex", "int", ")", "(", "handler", ",", "error", ")", "{", "handlerMu", ".", "Lock", "(", ")", "\n", "defer", "handlerMu", ".", "Unlock", "(", ")", "\n\n", "handle", ",", "ok", ":=", "handlers", "[", "handlerIndex", "]", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "handlerIndex", ")", "\n", "}", "\n\n", "return", "handle", ",", "nil", "\n", "}" ]
// lookupHandler returns a particular handler from the package level map.
[ "lookupHandler", "returns", "a", "particular", "handler", "from", "the", "package", "level", "map", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L148-L158
22,941
gravitational/teleport
lib/pam/pam.go
Open
func Open(config *Config) (*PAM, error) { if config == nil { return nil, trace.BadParameter("PAM configuration is required.") } err := config.CheckDefaults() if err != nil { return nil, trace.Wrap(err) } p := &PAM{ pamh: nil, stdin: config.Stdin, stdout: config.Stdout, stderr: config.Stderr, } // Both config.ServiceName and config.Username convert between Go strings to // C strings. Since the C strings are allocated on the heap in Go code, this // memory must be released (and will be on the call to the Close method). p.service_name = C.CString(config.ServiceName) p.user = C.CString(config.Username) // C code does not know that this PAM context exists. To ensure the // conversation function can get messages to the right context, a handle // registry at the package level is created (handlers). Each instance of the // PAM context has it's own handle which is used to communicate between C // and a instance of a PAM context. p.handlerIndex = registerHandler(p) // Create and initialize a PAM context. The pam_start function will // allocate pamh if needed and the pam_end function will release any // allocated memory. p.retval = C._pam_start(pamHandle, p.service_name, p.user, p.conv, &p.pamh) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } // Check that the *nix account is valid. Checking an account varies based off // the PAM modules used in the account stack. Typically this consists of // checking if the account is expired or has access restrictions. // // Note: This function does not perform any authentication! retval := C._pam_acct_mgmt(pamHandle, p.pamh, 0) if retval != C.PAM_SUCCESS { return nil, p.codeToError(retval) } // Open a user session. Opening a session varies based off the PAM modules // used in the "session" stack. Opening a session typically consists of // printing the MOTD, mounting a home directory, updating auth.log. p.retval = C._pam_open_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } return p, nil }
go
func Open(config *Config) (*PAM, error) { if config == nil { return nil, trace.BadParameter("PAM configuration is required.") } err := config.CheckDefaults() if err != nil { return nil, trace.Wrap(err) } p := &PAM{ pamh: nil, stdin: config.Stdin, stdout: config.Stdout, stderr: config.Stderr, } // Both config.ServiceName and config.Username convert between Go strings to // C strings. Since the C strings are allocated on the heap in Go code, this // memory must be released (and will be on the call to the Close method). p.service_name = C.CString(config.ServiceName) p.user = C.CString(config.Username) // C code does not know that this PAM context exists. To ensure the // conversation function can get messages to the right context, a handle // registry at the package level is created (handlers). Each instance of the // PAM context has it's own handle which is used to communicate between C // and a instance of a PAM context. p.handlerIndex = registerHandler(p) // Create and initialize a PAM context. The pam_start function will // allocate pamh if needed and the pam_end function will release any // allocated memory. p.retval = C._pam_start(pamHandle, p.service_name, p.user, p.conv, &p.pamh) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } // Check that the *nix account is valid. Checking an account varies based off // the PAM modules used in the account stack. Typically this consists of // checking if the account is expired or has access restrictions. // // Note: This function does not perform any authentication! retval := C._pam_acct_mgmt(pamHandle, p.pamh, 0) if retval != C.PAM_SUCCESS { return nil, p.codeToError(retval) } // Open a user session. Opening a session varies based off the PAM modules // used in the "session" stack. Opening a session typically consists of // printing the MOTD, mounting a home directory, updating auth.log. p.retval = C._pam_open_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return nil, p.codeToError(p.retval) } return p, nil }
[ "func", "Open", "(", "config", "*", "Config", ")", "(", "*", "PAM", ",", "error", ")", "{", "if", "config", "==", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "err", ":=", "config", ".", "CheckDefaults", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "p", ":=", "&", "PAM", "{", "pamh", ":", "nil", ",", "stdin", ":", "config", ".", "Stdin", ",", "stdout", ":", "config", ".", "Stdout", ",", "stderr", ":", "config", ".", "Stderr", ",", "}", "\n\n", "// Both config.ServiceName and config.Username convert between Go strings to", "// C strings. Since the C strings are allocated on the heap in Go code, this", "// memory must be released (and will be on the call to the Close method).", "p", ".", "service_name", "=", "C", ".", "CString", "(", "config", ".", "ServiceName", ")", "\n", "p", ".", "user", "=", "C", ".", "CString", "(", "config", ".", "Username", ")", "\n\n", "// C code does not know that this PAM context exists. To ensure the", "// conversation function can get messages to the right context, a handle", "// registry at the package level is created (handlers). Each instance of the", "// PAM context has it's own handle which is used to communicate between C", "// and a instance of a PAM context.", "p", ".", "handlerIndex", "=", "registerHandler", "(", "p", ")", "\n\n", "// Create and initialize a PAM context. The pam_start function will", "// allocate pamh if needed and the pam_end function will release any", "// allocated memory.", "p", ".", "retval", "=", "C", ".", "_pam_start", "(", "pamHandle", ",", "p", ".", "service_name", ",", "p", ".", "user", ",", "p", ".", "conv", ",", "&", "p", ".", "pamh", ")", "\n", "if", "p", ".", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "nil", ",", "p", ".", "codeToError", "(", "p", ".", "retval", ")", "\n", "}", "\n\n", "// Check that the *nix account is valid. Checking an account varies based off", "// the PAM modules used in the account stack. Typically this consists of", "// checking if the account is expired or has access restrictions.", "//", "// Note: This function does not perform any authentication!", "retval", ":=", "C", ".", "_pam_acct_mgmt", "(", "pamHandle", ",", "p", ".", "pamh", ",", "0", ")", "\n", "if", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "nil", ",", "p", ".", "codeToError", "(", "retval", ")", "\n", "}", "\n\n", "// Open a user session. Opening a session varies based off the PAM modules", "// used in the \"session\" stack. Opening a session typically consists of", "// printing the MOTD, mounting a home directory, updating auth.log.", "p", ".", "retval", "=", "C", ".", "_pam_open_session", "(", "pamHandle", ",", "p", ".", "pamh", ",", "0", ")", "\n", "if", "p", ".", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "nil", ",", "p", ".", "codeToError", "(", "p", ".", "retval", ")", "\n", "}", "\n\n", "return", "p", ",", "nil", "\n", "}" ]
// Open creates a PAM context and initiates a PAM transaction to check the // account and then opens a session.
[ "Open", "creates", "a", "PAM", "context", "and", "initiates", "a", "PAM", "transaction", "to", "check", "the", "account", "and", "then", "opens", "a", "session", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L215-L271
22,942
gravitational/teleport
lib/pam/pam.go
Close
func (p *PAM) Close() error { // Close the PAM session. Closing a session can entail anything from // unmounting a home directory and updating auth.log. p.retval = C._pam_close_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return p.codeToError(p.retval) } // Terminate the PAM transaction. retval := C._pam_end(pamHandle, p.pamh, p.retval) if retval != C.PAM_SUCCESS { return p.codeToError(retval) } // Unregister handler index at the package level. unregisterHandler(p.handlerIndex) // Release the memory allocated for the conversation function. C.free(unsafe.Pointer(p.conv)) // Release strings that were allocated when opening the PAM context. C.free(unsafe.Pointer(p.service_name)) C.free(unsafe.Pointer(p.user)) return nil }
go
func (p *PAM) Close() error { // Close the PAM session. Closing a session can entail anything from // unmounting a home directory and updating auth.log. p.retval = C._pam_close_session(pamHandle, p.pamh, 0) if p.retval != C.PAM_SUCCESS { return p.codeToError(p.retval) } // Terminate the PAM transaction. retval := C._pam_end(pamHandle, p.pamh, p.retval) if retval != C.PAM_SUCCESS { return p.codeToError(retval) } // Unregister handler index at the package level. unregisterHandler(p.handlerIndex) // Release the memory allocated for the conversation function. C.free(unsafe.Pointer(p.conv)) // Release strings that were allocated when opening the PAM context. C.free(unsafe.Pointer(p.service_name)) C.free(unsafe.Pointer(p.user)) return nil }
[ "func", "(", "p", "*", "PAM", ")", "Close", "(", ")", "error", "{", "// Close the PAM session. Closing a session can entail anything from", "// unmounting a home directory and updating auth.log.", "p", ".", "retval", "=", "C", ".", "_pam_close_session", "(", "pamHandle", ",", "p", ".", "pamh", ",", "0", ")", "\n", "if", "p", ".", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "p", ".", "codeToError", "(", "p", ".", "retval", ")", "\n", "}", "\n\n", "// Terminate the PAM transaction.", "retval", ":=", "C", ".", "_pam_end", "(", "pamHandle", ",", "p", ".", "pamh", ",", "p", ".", "retval", ")", "\n", "if", "retval", "!=", "C", ".", "PAM_SUCCESS", "{", "return", "p", ".", "codeToError", "(", "retval", ")", "\n", "}", "\n\n", "// Unregister handler index at the package level.", "unregisterHandler", "(", "p", ".", "handlerIndex", ")", "\n\n", "// Release the memory allocated for the conversation function.", "C", ".", "free", "(", "unsafe", ".", "Pointer", "(", "p", ".", "conv", ")", ")", "\n\n", "// Release strings that were allocated when opening the PAM context.", "C", ".", "free", "(", "unsafe", ".", "Pointer", "(", "p", ".", "service_name", ")", ")", "\n", "C", ".", "free", "(", "unsafe", ".", "Pointer", "(", "p", ".", "user", ")", ")", "\n\n", "return", "nil", "\n", "}" ]
// Close will close the session, the PAM context, and release any allocated // memory.
[ "Close", "will", "close", "the", "session", "the", "PAM", "context", "and", "release", "any", "allocated", "memory", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L275-L300
22,943
gravitational/teleport
lib/pam/pam.go
codeToError
func (p *PAM) codeToError(returnValue C.int) error { // Error strings are not allocated on the heap, so memory does not need // released. err := C._pam_strerror(pamHandle, p.pamh, returnValue) if err != nil { return trace.BadParameter(C.GoString(err)) } return nil }
go
func (p *PAM) codeToError(returnValue C.int) error { // Error strings are not allocated on the heap, so memory does not need // released. err := C._pam_strerror(pamHandle, p.pamh, returnValue) if err != nil { return trace.BadParameter(C.GoString(err)) } return nil }
[ "func", "(", "p", "*", "PAM", ")", "codeToError", "(", "returnValue", "C", ".", "int", ")", "error", "{", "// Error strings are not allocated on the heap, so memory does not need", "// released.", "err", ":=", "C", ".", "_pam_strerror", "(", "pamHandle", ",", "p", ".", "pamh", ",", "returnValue", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "BadParameter", "(", "C", ".", "GoString", "(", "err", ")", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// codeToError returns a human readable string from the PAM error.
[ "codeToError", "returns", "a", "human", "readable", "string", "from", "the", "PAM", "error", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L334-L343
22,944
gravitational/teleport
lib/utils/fakeconn.go
DualPipeNetConn
func DualPipeNetConn(srcAddr net.Addr, dstAddr net.Addr) (*PipeNetConn, *PipeNetConn) { server, client := net.Pipe() serverConn := NewPipeNetConn(server, server, server, dstAddr, srcAddr) clientConn := NewPipeNetConn(client, client, client, srcAddr, dstAddr) return serverConn, clientConn }
go
func DualPipeNetConn(srcAddr net.Addr, dstAddr net.Addr) (*PipeNetConn, *PipeNetConn) { server, client := net.Pipe() serverConn := NewPipeNetConn(server, server, server, dstAddr, srcAddr) clientConn := NewPipeNetConn(client, client, client, srcAddr, dstAddr) return serverConn, clientConn }
[ "func", "DualPipeNetConn", "(", "srcAddr", "net", ".", "Addr", ",", "dstAddr", "net", ".", "Addr", ")", "(", "*", "PipeNetConn", ",", "*", "PipeNetConn", ")", "{", "server", ",", "client", ":=", "net", ".", "Pipe", "(", ")", "\n\n", "serverConn", ":=", "NewPipeNetConn", "(", "server", ",", "server", ",", "server", ",", "dstAddr", ",", "srcAddr", ")", "\n", "clientConn", ":=", "NewPipeNetConn", "(", "client", ",", "client", ",", "client", ",", "srcAddr", ",", "dstAddr", ")", "\n\n", "return", "serverConn", ",", "clientConn", "\n", "}" ]
// DualPipeAddrConn creates a net.Pipe to connect a client and a server. The // two net.Conn instances are wrapped in an addrConn which holds the source and // destination addresses.
[ "DualPipeAddrConn", "creates", "a", "net", ".", "Pipe", "to", "connect", "a", "client", "and", "a", "server", ".", "The", "two", "net", ".", "Conn", "instances", "are", "wrapped", "in", "an", "addrConn", "which", "holds", "the", "source", "and", "destination", "addresses", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fakeconn.go#L89-L96
22,945
gravitational/teleport
lib/services/clustername.go
NewClusterName
func NewClusterName(spec ClusterNameSpecV2) (ClusterName, error) { cn := ClusterNameV2{ Kind: KindClusterName, Version: V2, Metadata: Metadata{ Name: MetaNameClusterName, Namespace: defaults.Namespace, }, Spec: spec, } if err := cn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &cn, nil }
go
func NewClusterName(spec ClusterNameSpecV2) (ClusterName, error) { cn := ClusterNameV2{ Kind: KindClusterName, Version: V2, Metadata: Metadata{ Name: MetaNameClusterName, Namespace: defaults.Namespace, }, Spec: spec, } if err := cn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return &cn, nil }
[ "func", "NewClusterName", "(", "spec", "ClusterNameSpecV2", ")", "(", "ClusterName", ",", "error", ")", "{", "cn", ":=", "ClusterNameV2", "{", "Kind", ":", "KindClusterName", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "MetaNameClusterName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", "\n", "if", "err", ":=", "cn", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "&", "cn", ",", "nil", "\n", "}" ]
// NewClusterName is a convenience wrapper to create a ClusterName resource.
[ "NewClusterName", "is", "a", "convenience", "wrapper", "to", "create", "a", "ClusterName", "resource", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L46-L61
22,946
gravitational/teleport
lib/services/clustername.go
GetClusterNameSchema
func GetClusterNameSchema(extensionSchema string) string { var clusterNameSchema string if clusterNameSchema == "" { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, "") } else { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterNameSchema, DefaultDefinitions) }
go
func GetClusterNameSchema(extensionSchema string) string { var clusterNameSchema string if clusterNameSchema == "" { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, "") } else { clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, ","+extensionSchema) } return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterNameSchema, DefaultDefinitions) }
[ "func", "GetClusterNameSchema", "(", "extensionSchema", "string", ")", "string", "{", "var", "clusterNameSchema", "string", "\n", "if", "clusterNameSchema", "==", "\"", "\"", "{", "clusterNameSchema", "=", "fmt", ".", "Sprintf", "(", "ClusterNameSpecSchemaTemplate", ",", "\"", "\"", ")", "\n", "}", "else", "{", "clusterNameSchema", "=", "fmt", ".", "Sprintf", "(", "ClusterNameSpecSchemaTemplate", ",", "\"", "\"", "+", "extensionSchema", ")", "\n", "}", "\n", "return", "fmt", ".", "Sprintf", "(", "V2SchemaTemplate", ",", "MetadataSchema", ",", "clusterNameSchema", ",", "DefaultDefinitions", ")", "\n", "}" ]
// GetClusterNameSchema returns the schema with optionally injected // schema for extensions.
[ "GetClusterNameSchema", "returns", "the", "schema", "with", "optionally", "injected", "schema", "for", "extensions", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L166-L174
22,947
gravitational/teleport
lib/services/clustername.go
Unmarshal
func (t *TeleportClusterNameMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterName, error) { var clusterName ClusterNameV2 if len(bytes) == 0 { return nil, trace.BadParameter("missing resource data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &clusterName); err != nil { return nil, trace.BadParameter(err.Error()) } } else { err = utils.UnmarshalWithSchema(GetClusterNameSchema(""), &clusterName, bytes) if err != nil { return nil, trace.BadParameter(err.Error()) } } err = clusterName.CheckAndSetDefaults() if err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { clusterName.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { clusterName.SetExpiry(cfg.Expires) } return &clusterName, nil }
go
func (t *TeleportClusterNameMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterName, error) { var clusterName ClusterNameV2 if len(bytes) == 0 { return nil, trace.BadParameter("missing resource data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } if cfg.SkipValidation { if err := utils.FastUnmarshal(bytes, &clusterName); err != nil { return nil, trace.BadParameter(err.Error()) } } else { err = utils.UnmarshalWithSchema(GetClusterNameSchema(""), &clusterName, bytes) if err != nil { return nil, trace.BadParameter(err.Error()) } } err = clusterName.CheckAndSetDefaults() if err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { clusterName.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { clusterName.SetExpiry(cfg.Expires) } return &clusterName, nil }
[ "func", "(", "t", "*", "TeleportClusterNameMarshaler", ")", "Unmarshal", "(", "bytes", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ClusterName", ",", "error", ")", "{", "var", "clusterName", "ClusterNameV2", "\n\n", "if", "len", "(", "bytes", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "bytes", ",", "&", "clusterName", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "err", "=", "utils", ".", "UnmarshalWithSchema", "(", "GetClusterNameSchema", "(", "\"", "\"", ")", ",", "&", "clusterName", ",", "bytes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "clusterName", ".", "CheckAndSetDefaults", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "cfg", ".", "ID", "!=", "0", "{", "clusterName", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "if", "!", "cfg", ".", "Expires", ".", "IsZero", "(", ")", "{", "clusterName", ".", "SetExpiry", "(", "cfg", ".", "Expires", ")", "\n", "}", "\n\n", "return", "&", "clusterName", ",", "nil", "\n", "}" ]
// Unmarshal unmarshals ClusterName from JSON.
[ "Unmarshal", "unmarshals", "ClusterName", "from", "JSON", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L203-L239
22,948
gravitational/teleport
lib/services/clustername.go
Marshal
func (t *TeleportClusterNameMarshaler) Marshal(c ClusterName, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *ClusterNameV2: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
go
func (t *TeleportClusterNameMarshaler) Marshal(c ClusterName, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := c.(type) { case *ClusterNameV2: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", c) } }
[ "func", "(", "t", "*", "TeleportClusterNameMarshaler", ")", "Marshal", "(", "c", "ClusterName", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "resource", ":=", "c", ".", "(", "type", ")", "{", "case", "*", "ClusterNameV2", ":", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "resource", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "resource", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "resource", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ")", "\n", "}", "\n", "}" ]
// Marshal marshals ClusterName to JSON.
[ "Marshal", "marshals", "ClusterName", "to", "JSON", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L242-L260
22,949
gravitational/teleport
lib/services/trust.go
Check
func (c CertAuthType) Check() error { if c != HostCA && c != UserCA { return trace.BadParameter("'%v' authority type is not supported", c) } return nil }
go
func (c CertAuthType) Check() error { if c != HostCA && c != UserCA { return trace.BadParameter("'%v' authority type is not supported", c) } return nil }
[ "func", "(", "c", "CertAuthType", ")", "Check", "(", ")", "error", "{", "if", "c", "!=", "HostCA", "&&", "c", "!=", "UserCA", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "c", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Check checks if certificate authority type value is correct
[ "Check", "checks", "if", "certificate", "authority", "type", "value", "is", "correct" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trust.go#L81-L86
22,950
gravitational/teleport
lib/services/trust.go
Check
func (c *CertAuthID) Check() error { if err := c.Type.Check(); err != nil { return trace.Wrap(err) } if strings.TrimSpace(c.DomainName) == "" { return trace.BadParameter("identity validation error: empty domain name") } return nil }
go
func (c *CertAuthID) Check() error { if err := c.Type.Check(); err != nil { return trace.Wrap(err) } if strings.TrimSpace(c.DomainName) == "" { return trace.BadParameter("identity validation error: empty domain name") } return nil }
[ "func", "(", "c", "*", "CertAuthID", ")", "Check", "(", ")", "error", "{", "if", "err", ":=", "c", ".", "Type", ".", "Check", "(", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "strings", ".", "TrimSpace", "(", "c", ".", "DomainName", ")", "==", "\"", "\"", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Check returns error if any of the id parameters are bad, nil otherwise
[ "Check", "returns", "error", "if", "any", "of", "the", "id", "parameters", "are", "bad", "nil", "otherwise" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trust.go#L99-L107
22,951
gravitational/teleport
lib/services/tunnel.go
NewReverseTunnel
func NewReverseTunnel(clusterName string, dialAddrs []string) ReverseTunnel { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: clusterName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: clusterName, DialAddrs: dialAddrs, }, } }
go
func NewReverseTunnel(clusterName string, dialAddrs []string) ReverseTunnel { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: clusterName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: clusterName, DialAddrs: dialAddrs, }, } }
[ "func", "NewReverseTunnel", "(", "clusterName", "string", ",", "dialAddrs", "[", "]", "string", ")", "ReverseTunnel", "{", "return", "&", "ReverseTunnelV2", "{", "Kind", ":", "KindReverseTunnel", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "clusterName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "ReverseTunnelSpecV2", "{", "ClusterName", ":", "clusterName", ",", "DialAddrs", ":", "dialAddrs", ",", "}", ",", "}", "\n", "}" ]
// NewReverseTunnel returns new version of reverse tunnel
[ "NewReverseTunnel", "returns", "new", "version", "of", "reverse", "tunnel" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L55-L68
22,952
gravitational/teleport
lib/services/tunnel.go
V2
func (r *ReverseTunnelV1) V2() *ReverseTunnelV2 { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: r.DomainName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: r.DomainName, Type: ProxyTunnel, DialAddrs: r.DialAddrs, }, } }
go
func (r *ReverseTunnelV1) V2() *ReverseTunnelV2 { return &ReverseTunnelV2{ Kind: KindReverseTunnel, Version: V2, Metadata: Metadata{ Name: r.DomainName, Namespace: defaults.Namespace, }, Spec: ReverseTunnelSpecV2{ ClusterName: r.DomainName, Type: ProxyTunnel, DialAddrs: r.DialAddrs, }, } }
[ "func", "(", "r", "*", "ReverseTunnelV1", ")", "V2", "(", ")", "*", "ReverseTunnelV2", "{", "return", "&", "ReverseTunnelV2", "{", "Kind", ":", "KindReverseTunnel", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "r", ".", "DomainName", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "ReverseTunnelSpecV2", "{", "ClusterName", ":", "r", ".", "DomainName", ",", "Type", ":", "ProxyTunnel", ",", "DialAddrs", ":", "r", ".", "DialAddrs", ",", "}", ",", "}", "\n", "}" ]
// V2 returns V2 version of reverse tunnel
[ "V2", "returns", "V2", "version", "of", "reverse", "tunnel" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L240-L254
22,953
gravitational/teleport
lib/services/tunnel.go
UnmarshalReverseTunnel
func UnmarshalReverseTunnel(data []byte, opts ...MarshalOption) (ReverseTunnel, error) { if len(data) == 0 { return nil, trace.BadParameter("missing tunnel data") } var h ResourceHeader err := json.Unmarshal(data, &h) if err != nil { return nil, trace.Wrap(err) } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case "": var r ReverseTunnelV1 err := json.Unmarshal(data, &r) if err != nil { return nil, trace.Wrap(err) } v2 := r.V2() if cfg.ID != 0 { v2.SetResourceID(cfg.ID) } return r.V2(), nil case V2: var r ReverseTunnelV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(data, &r); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetReverseTunnelSchema(), &r, data); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := r.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { r.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { r.SetExpiry(cfg.Expires) } return &r, nil } return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version) }
go
func UnmarshalReverseTunnel(data []byte, opts ...MarshalOption) (ReverseTunnel, error) { if len(data) == 0 { return nil, trace.BadParameter("missing tunnel data") } var h ResourceHeader err := json.Unmarshal(data, &h) if err != nil { return nil, trace.Wrap(err) } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case "": var r ReverseTunnelV1 err := json.Unmarshal(data, &r) if err != nil { return nil, trace.Wrap(err) } v2 := r.V2() if cfg.ID != 0 { v2.SetResourceID(cfg.ID) } return r.V2(), nil case V2: var r ReverseTunnelV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(data, &r); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetReverseTunnelSchema(), &r, data); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := r.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { r.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { r.SetExpiry(cfg.Expires) } return &r, nil } return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version) }
[ "func", "UnmarshalReverseTunnel", "(", "data", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ReverseTunnel", ",", "error", ")", "{", "if", "len", "(", "data", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "var", "h", "ResourceHeader", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "data", ",", "&", "h", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "switch", "h", ".", "Version", "{", "case", "\"", "\"", ":", "var", "r", "ReverseTunnelV1", "\n", "err", ":=", "json", ".", "Unmarshal", "(", "data", ",", "&", "r", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "v2", ":=", "r", ".", "V2", "(", ")", "\n", "if", "cfg", ".", "ID", "!=", "0", "{", "v2", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "return", "r", ".", "V2", "(", ")", ",", "nil", "\n", "case", "V2", ":", "var", "r", "ReverseTunnelV2", "\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "data", ",", "&", "r", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "if", "err", ":=", "utils", ".", "UnmarshalWithSchema", "(", "GetReverseTunnelSchema", "(", ")", ",", "&", "r", ",", "data", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n", "if", "err", ":=", "r", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "cfg", ".", "ID", "!=", "0", "{", "r", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "if", "!", "cfg", ".", "Expires", ".", "IsZero", "(", ")", "{", "r", ".", "SetExpiry", "(", "cfg", ".", "Expires", ")", "\n", "}", "\n", "return", "&", "r", ",", "nil", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "h", ".", "Version", ")", "\n", "}" ]
// UnmarshalReverseTunnel unmarshals reverse tunnel from JSON or YAML, // sets defaults and checks the schema
[ "UnmarshalReverseTunnel", "unmarshals", "reverse", "tunnel", "from", "JSON", "or", "YAML", "sets", "defaults", "and", "checks", "the", "schema" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L264-L313
22,954
gravitational/teleport
lib/services/tunnel.go
UnmarshalReverseTunnel
func (*TeleportTunnelMarshaler) UnmarshalReverseTunnel(bytes []byte, opts ...MarshalOption) (ReverseTunnel, error) { return UnmarshalReverseTunnel(bytes, opts...) }
go
func (*TeleportTunnelMarshaler) UnmarshalReverseTunnel(bytes []byte, opts ...MarshalOption) (ReverseTunnel, error) { return UnmarshalReverseTunnel(bytes, opts...) }
[ "func", "(", "*", "TeleportTunnelMarshaler", ")", "UnmarshalReverseTunnel", "(", "bytes", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "ReverseTunnel", ",", "error", ")", "{", "return", "UnmarshalReverseTunnel", "(", "bytes", ",", "opts", "...", ")", "\n", "}" ]
// UnmarshalReverseTunnel unmarshals reverse tunnel from JSON or YAML
[ "UnmarshalReverseTunnel", "unmarshals", "reverse", "tunnel", "from", "JSON", "or", "YAML" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L340-L342
22,955
gravitational/teleport
lib/services/tunnel.go
MarshalReverseTunnel
func (*TeleportTunnelMarshaler) MarshalReverseTunnel(rt ReverseTunnel, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } type tunv1 interface { V1() *ReverseTunnelV1 } type tunv2 interface { V2() *ReverseTunnelV2 } version := cfg.GetVersion() switch version { case V1: v, ok := rt.(tunv1) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V1) } return json.Marshal(v.V1()) case V2: v, ok := rt.(tunv2) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V2) } v2 := v.V2() if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *v2 copy.SetResourceID(0) v2 = &copy } return utils.FastMarshal(v2) default: return nil, trace.BadParameter("version %v is not supported", version) } }
go
func (*TeleportTunnelMarshaler) MarshalReverseTunnel(rt ReverseTunnel, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } type tunv1 interface { V1() *ReverseTunnelV1 } type tunv2 interface { V2() *ReverseTunnelV2 } version := cfg.GetVersion() switch version { case V1: v, ok := rt.(tunv1) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V1) } return json.Marshal(v.V1()) case V2: v, ok := rt.(tunv2) if !ok { return nil, trace.BadParameter("don't know how to marshal %v", V2) } v2 := v.V2() if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *v2 copy.SetResourceID(0) v2 = &copy } return utils.FastMarshal(v2) default: return nil, trace.BadParameter("version %v is not supported", version) } }
[ "func", "(", "*", "TeleportTunnelMarshaler", ")", "MarshalReverseTunnel", "(", "rt", "ReverseTunnel", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "type", "tunv1", "interface", "{", "V1", "(", ")", "*", "ReverseTunnelV1", "\n", "}", "\n", "type", "tunv2", "interface", "{", "V2", "(", ")", "*", "ReverseTunnelV2", "\n", "}", "\n", "version", ":=", "cfg", ".", "GetVersion", "(", ")", "\n", "switch", "version", "{", "case", "V1", ":", "v", ",", "ok", ":=", "rt", ".", "(", "tunv1", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "V1", ")", "\n", "}", "\n", "return", "json", ".", "Marshal", "(", "v", ".", "V1", "(", ")", ")", "\n", "case", "V2", ":", "v", ",", "ok", ":=", "rt", ".", "(", "tunv2", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "V2", ")", "\n", "}", "\n", "v2", ":=", "v", ".", "V2", "(", ")", "\n", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "v2", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "v2", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "v2", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "version", ")", "\n", "}", "\n", "}" ]
// MarshalRole marshalls role into JSON
[ "MarshalRole", "marshalls", "role", "into", "JSON" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L345-L381
22,956
gravitational/teleport
lib/utils/syslog.go
SwitchLoggingtoSyslog
func SwitchLoggingtoSyslog() error { log.StandardLogger().SetHooks(make(log.LevelHooks)) hook, err := logrusSyslog.NewSyslogHook("", "", syslog.LOG_WARNING, "") if err != nil { // syslog is not available log.SetOutput(os.Stderr) return trace.Wrap(err) } log.AddHook(hook) // ... and disable stderr: log.SetOutput(ioutil.Discard) return nil }
go
func SwitchLoggingtoSyslog() error { log.StandardLogger().SetHooks(make(log.LevelHooks)) hook, err := logrusSyslog.NewSyslogHook("", "", syslog.LOG_WARNING, "") if err != nil { // syslog is not available log.SetOutput(os.Stderr) return trace.Wrap(err) } log.AddHook(hook) // ... and disable stderr: log.SetOutput(ioutil.Discard) return nil }
[ "func", "SwitchLoggingtoSyslog", "(", ")", "error", "{", "log", ".", "StandardLogger", "(", ")", ".", "SetHooks", "(", "make", "(", "log", ".", "LevelHooks", ")", ")", "\n", "hook", ",", "err", ":=", "logrusSyslog", ".", "NewSyslogHook", "(", "\"", "\"", ",", "\"", "\"", ",", "syslog", ".", "LOG_WARNING", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "// syslog is not available", "log", ".", "SetOutput", "(", "os", ".", "Stderr", ")", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "log", ".", "AddHook", "(", "hook", ")", "\n", "// ... and disable stderr:", "log", ".", "SetOutput", "(", "ioutil", ".", "Discard", ")", "\n", "return", "nil", "\n", "}" ]
// SwitchLoggingtoSyslog tells the logger to send the output to syslog. This // code is behind a build flag because Windows does not support syslog.
[ "SwitchLoggingtoSyslog", "tells", "the", "logger", "to", "send", "the", "output", "to", "syslog", ".", "This", "code", "is", "behind", "a", "build", "flag", "because", "Windows", "does", "not", "support", "syslog", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/syslog.go#L33-L45
22,957
gravitational/teleport
lib/auth/rotate.go
Types
func (r *RotateRequest) Types() []services.CertAuthType { switch r.Type { case "": return []services.CertAuthType{services.HostCA, services.UserCA} case services.HostCA: return []services.CertAuthType{services.HostCA} case services.UserCA: return []services.CertAuthType{services.UserCA} } return nil }
go
func (r *RotateRequest) Types() []services.CertAuthType { switch r.Type { case "": return []services.CertAuthType{services.HostCA, services.UserCA} case services.HostCA: return []services.CertAuthType{services.HostCA} case services.UserCA: return []services.CertAuthType{services.UserCA} } return nil }
[ "func", "(", "r", "*", "RotateRequest", ")", "Types", "(", ")", "[", "]", "services", ".", "CertAuthType", "{", "switch", "r", ".", "Type", "{", "case", "\"", "\"", ":", "return", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "HostCA", ",", "services", ".", "UserCA", "}", "\n", "case", "services", ".", "HostCA", ":", "return", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "HostCA", "}", "\n", "case", "services", ".", "UserCA", ":", "return", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "UserCA", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Types returns cert authority types requested to be rotated.
[ "Types", "returns", "cert", "authority", "types", "requested", "to", "be", "rotated", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L61-L71
22,958
gravitational/teleport
lib/auth/rotate.go
CheckAndSetDefaults
func (r *RotateRequest) CheckAndSetDefaults(clock clockwork.Clock) error { if r.TargetPhase == "" { // if phase if not set, imply that the first meaningful phase // is set as a target phase r.TargetPhase = services.RotationPhaseInit } // if mode is not set, default to manual (as it's safer) if r.Mode == "" { r.Mode = services.RotationModeManual } switch r.Type { case "", services.HostCA, services.UserCA: default: return trace.BadParameter("unsupported certificate authority type: %q", r.Type) } if r.GracePeriod == nil { period := defaults.RotationGracePeriod r.GracePeriod = &period } if r.Schedule == nil { var err error r.Schedule, err = services.GenerateSchedule(clock, *r.GracePeriod) if err != nil { return trace.Wrap(err) } } else { if err := r.Schedule.CheckAndSetDefaults(clock); err != nil { return trace.Wrap(err) } } return nil }
go
func (r *RotateRequest) CheckAndSetDefaults(clock clockwork.Clock) error { if r.TargetPhase == "" { // if phase if not set, imply that the first meaningful phase // is set as a target phase r.TargetPhase = services.RotationPhaseInit } // if mode is not set, default to manual (as it's safer) if r.Mode == "" { r.Mode = services.RotationModeManual } switch r.Type { case "", services.HostCA, services.UserCA: default: return trace.BadParameter("unsupported certificate authority type: %q", r.Type) } if r.GracePeriod == nil { period := defaults.RotationGracePeriod r.GracePeriod = &period } if r.Schedule == nil { var err error r.Schedule, err = services.GenerateSchedule(clock, *r.GracePeriod) if err != nil { return trace.Wrap(err) } } else { if err := r.Schedule.CheckAndSetDefaults(clock); err != nil { return trace.Wrap(err) } } return nil }
[ "func", "(", "r", "*", "RotateRequest", ")", "CheckAndSetDefaults", "(", "clock", "clockwork", ".", "Clock", ")", "error", "{", "if", "r", ".", "TargetPhase", "==", "\"", "\"", "{", "// if phase if not set, imply that the first meaningful phase", "// is set as a target phase", "r", ".", "TargetPhase", "=", "services", ".", "RotationPhaseInit", "\n", "}", "\n", "// if mode is not set, default to manual (as it's safer)", "if", "r", ".", "Mode", "==", "\"", "\"", "{", "r", ".", "Mode", "=", "services", ".", "RotationModeManual", "\n", "}", "\n", "switch", "r", ".", "Type", "{", "case", "\"", "\"", ",", "services", ".", "HostCA", ",", "services", ".", "UserCA", ":", "default", ":", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "r", ".", "Type", ")", "\n", "}", "\n", "if", "r", ".", "GracePeriod", "==", "nil", "{", "period", ":=", "defaults", ".", "RotationGracePeriod", "\n", "r", ".", "GracePeriod", "=", "&", "period", "\n", "}", "\n", "if", "r", ".", "Schedule", "==", "nil", "{", "var", "err", "error", "\n", "r", ".", "Schedule", ",", "err", "=", "services", ".", "GenerateSchedule", "(", "clock", ",", "*", "r", ".", "GracePeriod", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "else", "{", "if", "err", ":=", "r", ".", "Schedule", ".", "CheckAndSetDefaults", "(", "clock", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// CheckAndSetDefaults checks and sets default values.
[ "CheckAndSetDefaults", "checks", "and", "sets", "default", "values", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L74-L105
22,959
gravitational/teleport
lib/auth/rotate.go
RotateExternalCertAuthority
func (a *AuthServer) RotateExternalCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } // this is just an extra precaution against local admins, // because this is additionally enforced by RBAC as well if ca.GetClusterName() == clusterName.GetClusterName() { return trace.BadParameter("can not rotate local certificate authority") } existing, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: ca.GetType(), DomainName: ca.GetClusterName(), }, false) if err != nil { return trace.Wrap(err) } updated := existing.Clone() updated.SetCheckingKeys(ca.GetCheckingKeys()) updated.SetTLSKeyPairs(ca.GetTLSKeyPairs()) updated.SetRotation(ca.GetRotation()) // use compare and swap to protect from concurrent updates // by trusted cluster API if err := a.CompareAndSwapCertAuthority(updated, existing); err != nil { return trace.Wrap(err) } return nil }
go
func (a *AuthServer) RotateExternalCertAuthority(ca services.CertAuthority) error { if ca == nil { return trace.BadParameter("missing certificate authority") } clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } // this is just an extra precaution against local admins, // because this is additionally enforced by RBAC as well if ca.GetClusterName() == clusterName.GetClusterName() { return trace.BadParameter("can not rotate local certificate authority") } existing, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: ca.GetType(), DomainName: ca.GetClusterName(), }, false) if err != nil { return trace.Wrap(err) } updated := existing.Clone() updated.SetCheckingKeys(ca.GetCheckingKeys()) updated.SetTLSKeyPairs(ca.GetTLSKeyPairs()) updated.SetRotation(ca.GetRotation()) // use compare and swap to protect from concurrent updates // by trusted cluster API if err := a.CompareAndSwapCertAuthority(updated, existing); err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "a", "*", "AuthServer", ")", "RotateExternalCertAuthority", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "if", "ca", "==", "nil", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "clusterName", ",", "err", ":=", "a", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// this is just an extra precaution against local admins,", "// because this is additionally enforced by RBAC as well", "if", "ca", ".", "GetClusterName", "(", ")", "==", "clusterName", ".", "GetClusterName", "(", ")", "{", "return", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n\n", "existing", ",", "err", ":=", "a", ".", "Trust", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "ca", ".", "GetType", "(", ")", ",", "DomainName", ":", "ca", ".", "GetClusterName", "(", ")", ",", "}", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "updated", ":=", "existing", ".", "Clone", "(", ")", "\n", "updated", ".", "SetCheckingKeys", "(", "ca", ".", "GetCheckingKeys", "(", ")", ")", "\n", "updated", ".", "SetTLSKeyPairs", "(", "ca", ".", "GetTLSKeyPairs", "(", ")", ")", "\n", "updated", ".", "SetRotation", "(", "ca", ".", "GetRotation", "(", ")", ")", "\n\n", "// use compare and swap to protect from concurrent updates", "// by trusted cluster API", "if", "err", ":=", "a", ".", "CompareAndSwapCertAuthority", "(", "updated", ",", "existing", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// RotateExternalCertAuthority rotates external certificate authority, // this method is called by remote trusted cluster and is used to update // only public keys and certificates of the certificate authority.
[ "RotateExternalCertAuthority", "rotates", "external", "certificate", "authority", "this", "method", "is", "called", "by", "remote", "trusted", "cluster", "and", "is", "used", "to", "update", "only", "public", "keys", "and", "certificates", "of", "the", "certificate", "authority", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L245-L280
22,960
gravitational/teleport
lib/auth/rotate.go
autoRotateCertAuthorities
func (a *AuthServer) autoRotateCertAuthorities() error { clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } for _, caType := range []services.CertAuthType{services.HostCA, services.UserCA} { ca, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: caType, DomainName: clusterName.GetClusterName(), }, true) if err != nil { return trace.Wrap(err) } if err := a.autoRotate(ca); err != nil { return trace.Wrap(err) } } return nil }
go
func (a *AuthServer) autoRotateCertAuthorities() error { clusterName, err := a.GetClusterName() if err != nil { return trace.Wrap(err) } for _, caType := range []services.CertAuthType{services.HostCA, services.UserCA} { ca, err := a.Trust.GetCertAuthority(services.CertAuthID{ Type: caType, DomainName: clusterName.GetClusterName(), }, true) if err != nil { return trace.Wrap(err) } if err := a.autoRotate(ca); err != nil { return trace.Wrap(err) } } return nil }
[ "func", "(", "a", "*", "AuthServer", ")", "autoRotateCertAuthorities", "(", ")", "error", "{", "clusterName", ",", "err", ":=", "a", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "for", "_", ",", "caType", ":=", "range", "[", "]", "services", ".", "CertAuthType", "{", "services", ".", "HostCA", ",", "services", ".", "UserCA", "}", "{", "ca", ",", "err", ":=", "a", ".", "Trust", ".", "GetCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "caType", ",", "DomainName", ":", "clusterName", ".", "GetClusterName", "(", ")", ",", "}", ",", "true", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "autoRotate", "(", "ca", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// autoRotateCertAuthorities automatically rotates cert authorities, // does nothing if no rotation parameters were set up // or it is too early to rotate per schedule
[ "autoRotateCertAuthorities", "automatically", "rotates", "cert", "authorities", "does", "nothing", "if", "no", "rotation", "parameters", "were", "set", "up", "or", "it", "is", "too", "early", "to", "rotate", "per", "schedule" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L285-L303
22,961
gravitational/teleport
lib/auth/rotate.go
processRotationRequest
func processRotationRequest(req rotationReq) (services.CertAuthority, error) { rotation := req.ca.GetRotation() ca := req.ca.Clone() switch req.targetPhase { case services.RotationPhaseInit: // This is the first stage of the rotation - new certificate authorities // are being generated, but no components are using them yet switch rotation.State { case services.RotationStateStandby, "": default: return nil, trace.BadParameter("can not initate rotation while another is in progress") } if err := startNewRotation(req, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateClients: // Update client phase clients will start using new credentials // and servers will use the existing credentials, but will trust clients // with both old and new credentials. if rotation.Phase != services.RotationPhaseInit { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateClients, services.RotationPhaseInit, rotation.Phase) } if err := updateClients(ca, req.mode); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateServers: // Update server phase uses the new credentials both for servers // and clients, but still trusts clients with old credentials. if rotation.Phase != services.RotationPhaseUpdateClients { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } // Signal nodes to restart and start serving new signatures // by updating the phase. rotation.Phase = req.targetPhase rotation.Mode = req.mode ca.SetRotation(rotation) return ca, nil case services.RotationPhaseRollback: // Rollback moves back both clients and servers to use the old credentials // but will trust new credentials. switch rotation.Phase { case services.RotationPhaseInit, services.RotationPhaseUpdateClients, services.RotationPhaseUpdateServers: if err := startRollingBackRotation(ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter("can not transition to phase %q from %q phase.", req.targetPhase, rotation.Phase) } case services.RotationPhaseStandby: // Transition to the standby phase moves rotation process // to standby, servers will only trust one certificate authority. switch rotation.Phase { case services.RotationPhaseUpdateServers, services.RotationPhaseRollback: if err := completeRotation(req.clock, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } default: return nil, trace.BadParameter("unsupported phase: %q", req.targetPhase) } }
go
func processRotationRequest(req rotationReq) (services.CertAuthority, error) { rotation := req.ca.GetRotation() ca := req.ca.Clone() switch req.targetPhase { case services.RotationPhaseInit: // This is the first stage of the rotation - new certificate authorities // are being generated, but no components are using them yet switch rotation.State { case services.RotationStateStandby, "": default: return nil, trace.BadParameter("can not initate rotation while another is in progress") } if err := startNewRotation(req, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateClients: // Update client phase clients will start using new credentials // and servers will use the existing credentials, but will trust clients // with both old and new credentials. if rotation.Phase != services.RotationPhaseInit { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateClients, services.RotationPhaseInit, rotation.Phase) } if err := updateClients(ca, req.mode); err != nil { return nil, trace.Wrap(err) } return ca, nil case services.RotationPhaseUpdateServers: // Update server phase uses the new credentials both for servers // and clients, but still trusts clients with old credentials. if rotation.Phase != services.RotationPhaseUpdateClients { return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } // Signal nodes to restart and start serving new signatures // by updating the phase. rotation.Phase = req.targetPhase rotation.Mode = req.mode ca.SetRotation(rotation) return ca, nil case services.RotationPhaseRollback: // Rollback moves back both clients and servers to use the old credentials // but will trust new credentials. switch rotation.Phase { case services.RotationPhaseInit, services.RotationPhaseUpdateClients, services.RotationPhaseUpdateServers: if err := startRollingBackRotation(ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter("can not transition to phase %q from %q phase.", req.targetPhase, rotation.Phase) } case services.RotationPhaseStandby: // Transition to the standby phase moves rotation process // to standby, servers will only trust one certificate authority. switch rotation.Phase { case services.RotationPhaseUpdateServers, services.RotationPhaseRollback: if err := completeRotation(req.clock, ca); err != nil { return nil, trace.Wrap(err) } return ca, nil default: return nil, trace.BadParameter( "can only switch to phase %v from %v, current phase is %v", services.RotationPhaseUpdateServers, services.RotationPhaseUpdateClients, rotation.Phase) } default: return nil, trace.BadParameter("unsupported phase: %q", req.targetPhase) } }
[ "func", "processRotationRequest", "(", "req", "rotationReq", ")", "(", "services", ".", "CertAuthority", ",", "error", ")", "{", "rotation", ":=", "req", ".", "ca", ".", "GetRotation", "(", ")", "\n", "ca", ":=", "req", ".", "ca", ".", "Clone", "(", ")", "\n\n", "switch", "req", ".", "targetPhase", "{", "case", "services", ".", "RotationPhaseInit", ":", "// This is the first stage of the rotation - new certificate authorities", "// are being generated, but no components are using them yet", "switch", "rotation", ".", "State", "{", "case", "services", ".", "RotationStateStandby", ",", "\"", "\"", ":", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "err", ":=", "startNewRotation", "(", "req", ",", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "case", "services", ".", "RotationPhaseUpdateClients", ":", "// Update client phase clients will start using new credentials", "// and servers will use the existing credentials, but will trust clients", "// with both old and new credentials.", "if", "rotation", ".", "Phase", "!=", "services", ".", "RotationPhaseInit", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "services", ".", "RotationPhaseUpdateClients", ",", "services", ".", "RotationPhaseInit", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "if", "err", ":=", "updateClients", "(", "ca", ",", "req", ".", "mode", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "case", "services", ".", "RotationPhaseUpdateServers", ":", "// Update server phase uses the new credentials both for servers", "// and clients, but still trusts clients with old credentials.", "if", "rotation", ".", "Phase", "!=", "services", ".", "RotationPhaseUpdateClients", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "services", ".", "RotationPhaseUpdateServers", ",", "services", ".", "RotationPhaseUpdateClients", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "// Signal nodes to restart and start serving new signatures", "// by updating the phase.", "rotation", ".", "Phase", "=", "req", ".", "targetPhase", "\n", "rotation", ".", "Mode", "=", "req", ".", "mode", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "ca", ",", "nil", "\n", "case", "services", ".", "RotationPhaseRollback", ":", "// Rollback moves back both clients and servers to use the old credentials", "// but will trust new credentials.", "switch", "rotation", ".", "Phase", "{", "case", "services", ".", "RotationPhaseInit", ",", "services", ".", "RotationPhaseUpdateClients", ",", "services", ".", "RotationPhaseUpdateServers", ":", "if", "err", ":=", "startRollingBackRotation", "(", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "req", ".", "targetPhase", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "case", "services", ".", "RotationPhaseStandby", ":", "// Transition to the standby phase moves rotation process", "// to standby, servers will only trust one certificate authority.", "switch", "rotation", ".", "Phase", "{", "case", "services", ".", "RotationPhaseUpdateServers", ",", "services", ".", "RotationPhaseRollback", ":", "if", "err", ":=", "completeRotation", "(", "req", ".", "clock", ",", "ca", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "ca", ",", "nil", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "services", ".", "RotationPhaseUpdateServers", ",", "services", ".", "RotationPhaseUpdateClients", ",", "rotation", ".", "Phase", ")", "\n", "}", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "req", ".", "targetPhase", ")", "\n", "}", "\n", "}" ]
// processRotationRequest processes rotation request based on the target and // current phase and state.
[ "processRotationRequest", "processes", "rotation", "request", "based", "on", "the", "target", "and", "current", "phase", "and", "state", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L371-L450
22,962
gravitational/teleport
lib/auth/rotate.go
startRollingBackRotation
func startRollingBackRotation(ca services.CertAuthority) error { rotation := ca.GetRotation() // Rollback always sets rotation to manual mode. rotation.Mode = services.RotationModeManual signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() // Rotation sets the first key to be the new key // and keep only public keys/certs for the new CA. signingKeys = [][]byte{signingKeys[1]} checkingKeys = [][]byte{checkingKeys[1]} // Keep the new certificate as trusted // as during the rollback phase, both types of clients may be present in the cluster. keyPairs = []services.TLSKeyPair{keyPairs[1], services.TLSKeyPair{Cert: keyPairs[0].Cert}} rotation.State = services.RotationStateInProgress rotation.Phase = services.RotationPhaseRollback ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
go
func startRollingBackRotation(ca services.CertAuthority) error { rotation := ca.GetRotation() // Rollback always sets rotation to manual mode. rotation.Mode = services.RotationModeManual signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() // Rotation sets the first key to be the new key // and keep only public keys/certs for the new CA. signingKeys = [][]byte{signingKeys[1]} checkingKeys = [][]byte{checkingKeys[1]} // Keep the new certificate as trusted // as during the rollback phase, both types of clients may be present in the cluster. keyPairs = []services.TLSKeyPair{keyPairs[1], services.TLSKeyPair{Cert: keyPairs[0].Cert}} rotation.State = services.RotationStateInProgress rotation.Phase = services.RotationPhaseRollback ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
[ "func", "startRollingBackRotation", "(", "ca", "services", ".", "CertAuthority", ")", "error", "{", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n\n", "// Rollback always sets rotation to manual mode.", "rotation", ".", "Mode", "=", "services", ".", "RotationModeManual", "\n\n", "signingKeys", ":=", "ca", ".", "GetSigningKeys", "(", ")", "\n", "checkingKeys", ":=", "ca", ".", "GetCheckingKeys", "(", ")", "\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n\n", "// Rotation sets the first key to be the new key", "// and keep only public keys/certs for the new CA.", "signingKeys", "=", "[", "]", "[", "]", "byte", "{", "signingKeys", "[", "1", "]", "}", "\n", "checkingKeys", "=", "[", "]", "[", "]", "byte", "{", "checkingKeys", "[", "1", "]", "}", "\n\n", "// Keep the new certificate as trusted", "// as during the rollback phase, both types of clients may be present in the cluster.", "keyPairs", "=", "[", "]", "services", ".", "TLSKeyPair", "{", "keyPairs", "[", "1", "]", ",", "services", ".", "TLSKeyPair", "{", "Cert", ":", "keyPairs", "[", "0", "]", ".", "Cert", "}", "}", "\n", "rotation", ".", "State", "=", "services", ".", "RotationStateInProgress", "\n", "rotation", ".", "Phase", "=", "services", ".", "RotationPhaseRollback", "\n\n", "ca", ".", "SetSigningKeys", "(", "signingKeys", ")", "\n", "ca", ".", "SetCheckingKeys", "(", "checkingKeys", ")", "\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "nil", "\n", "}" ]
// startRollingBackRotation starts roll back to the original state.
[ "startRollingBackRotation", "starts", "roll", "back", "to", "the", "original", "state", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L575-L601
22,963
gravitational/teleport
lib/auth/rotate.go
completeRollingBackRotation
func completeRollingBackRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() // clean up the state rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} keyPairs := ca.GetTLSKeyPairs() // only keep the original certificate authority as trusted // and remove everything else. keyPairs = []services.TLSKeyPair{keyPairs[0]} ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
go
func completeRollingBackRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() // clean up the state rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} keyPairs := ca.GetTLSKeyPairs() // only keep the original certificate authority as trusted // and remove everything else. keyPairs = []services.TLSKeyPair{keyPairs[0]} ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
[ "func", "completeRollingBackRotation", "(", "clock", "clockwork", ".", "Clock", ",", "ca", "services", ".", "CertAuthority", ")", "error", "{", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n\n", "// clean up the state", "rotation", ".", "Started", "=", "time", ".", "Time", "{", "}", "\n", "rotation", ".", "State", "=", "services", ".", "RotationStateStandby", "\n", "rotation", ".", "Phase", "=", "services", ".", "RotationPhaseStandby", "\n", "rotation", ".", "Mode", "=", "\"", "\"", "\n", "rotation", ".", "Schedule", "=", "services", ".", "RotationSchedule", "{", "}", "\n\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n", "// only keep the original certificate authority as trusted", "// and remove everything else.", "keyPairs", "=", "[", "]", "services", ".", "TLSKeyPair", "{", "keyPairs", "[", "0", "]", "}", "\n\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "nil", "\n", "}" ]
// completeRollingBackRotation completes rollback of the rotation and sets it to the standby state
[ "completeRollingBackRotation", "completes", "rollback", "of", "the", "rotation", "and", "sets", "it", "to", "the", "standby", "state" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L604-L622
22,964
gravitational/teleport
lib/auth/rotate.go
completeRotation
func completeRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() signingKeys = signingKeys[:1] checkingKeys = checkingKeys[:1] keyPairs = keyPairs[:1] rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.LastRotated = clock.Now() rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
go
func completeRotation(clock clockwork.Clock, ca services.CertAuthority) error { rotation := ca.GetRotation() signingKeys := ca.GetSigningKeys() checkingKeys := ca.GetCheckingKeys() keyPairs := ca.GetTLSKeyPairs() signingKeys = signingKeys[:1] checkingKeys = checkingKeys[:1] keyPairs = keyPairs[:1] rotation.Started = time.Time{} rotation.State = services.RotationStateStandby rotation.Phase = services.RotationPhaseStandby rotation.LastRotated = clock.Now() rotation.Mode = "" rotation.Schedule = services.RotationSchedule{} ca.SetSigningKeys(signingKeys) ca.SetCheckingKeys(checkingKeys) ca.SetTLSKeyPairs(keyPairs) ca.SetRotation(rotation) return nil }
[ "func", "completeRotation", "(", "clock", "clockwork", ".", "Clock", ",", "ca", "services", ".", "CertAuthority", ")", "error", "{", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n", "signingKeys", ":=", "ca", ".", "GetSigningKeys", "(", ")", "\n", "checkingKeys", ":=", "ca", ".", "GetCheckingKeys", "(", ")", "\n", "keyPairs", ":=", "ca", ".", "GetTLSKeyPairs", "(", ")", "\n\n", "signingKeys", "=", "signingKeys", "[", ":", "1", "]", "\n", "checkingKeys", "=", "checkingKeys", "[", ":", "1", "]", "\n", "keyPairs", "=", "keyPairs", "[", ":", "1", "]", "\n\n", "rotation", ".", "Started", "=", "time", ".", "Time", "{", "}", "\n", "rotation", ".", "State", "=", "services", ".", "RotationStateStandby", "\n", "rotation", ".", "Phase", "=", "services", ".", "RotationPhaseStandby", "\n", "rotation", ".", "LastRotated", "=", "clock", ".", "Now", "(", ")", "\n", "rotation", ".", "Mode", "=", "\"", "\"", "\n", "rotation", ".", "Schedule", "=", "services", ".", "RotationSchedule", "{", "}", "\n\n", "ca", ".", "SetSigningKeys", "(", "signingKeys", ")", "\n", "ca", ".", "SetCheckingKeys", "(", "checkingKeys", ")", "\n", "ca", ".", "SetTLSKeyPairs", "(", "keyPairs", ")", "\n", "ca", ".", "SetRotation", "(", "rotation", ")", "\n", "return", "nil", "\n", "}" ]
// completeRotation completes the certificate authority rotation.
[ "completeRotation", "completes", "the", "certificate", "authority", "rotation", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L625-L647
22,965
gravitational/teleport
lib/utils/unpack.go
Extract
func Extract(r io.Reader, dir string) error { tarball := tar.NewReader(r) for { header, err := tarball.Next() if err == io.EOF { break } else if err != nil { return trace.Wrap(err) } if err := extractFile(tarball, header, dir); err != nil { return trace.Wrap(err) } } return nil }
go
func Extract(r io.Reader, dir string) error { tarball := tar.NewReader(r) for { header, err := tarball.Next() if err == io.EOF { break } else if err != nil { return trace.Wrap(err) } if err := extractFile(tarball, header, dir); err != nil { return trace.Wrap(err) } } return nil }
[ "func", "Extract", "(", "r", "io", ".", "Reader", ",", "dir", "string", ")", "error", "{", "tarball", ":=", "tar", ".", "NewReader", "(", "r", ")", "\n\n", "for", "{", "header", ",", "err", ":=", "tarball", ".", "Next", "(", ")", "\n", "if", "err", "==", "io", ".", "EOF", "{", "break", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "if", "err", ":=", "extractFile", "(", "tarball", ",", "header", ",", "dir", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Extract extracts the contents of the specified tarball under dir. // The resulting files and directories are created using the current user context.
[ "Extract", "extracts", "the", "contents", "of", "the", "specified", "tarball", "under", "dir", ".", "The", "resulting", "files", "and", "directories", "are", "created", "using", "the", "current", "user", "context", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/unpack.go#L33-L49
22,966
gravitational/teleport
lib/utils/rand.go
CryptoRandomHex
func CryptoRandomHex(len int) (string, error) { randomBytes := make([]byte, len) if _, err := rand.Reader.Read(randomBytes); err != nil { return "", trace.Wrap(err) } return hex.EncodeToString(randomBytes), nil }
go
func CryptoRandomHex(len int) (string, error) { randomBytes := make([]byte, len) if _, err := rand.Reader.Read(randomBytes); err != nil { return "", trace.Wrap(err) } return hex.EncodeToString(randomBytes), nil }
[ "func", "CryptoRandomHex", "(", "len", "int", ")", "(", "string", ",", "error", ")", "{", "randomBytes", ":=", "make", "(", "[", "]", "byte", ",", "len", ")", "\n", "if", "_", ",", "err", ":=", "rand", ".", "Reader", ".", "Read", "(", "randomBytes", ")", ";", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "hex", ".", "EncodeToString", "(", "randomBytes", ")", ",", "nil", "\n", "}" ]
// CryptoRandomHex returns hex encoded random string generated with crypto-strong // pseudo random generator of the given bytes
[ "CryptoRandomHex", "returns", "hex", "encoded", "random", "string", "generated", "with", "crypto", "-", "strong", "pseudo", "random", "generator", "of", "the", "given", "bytes" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/rand.go#L30-L36
22,967
gravitational/teleport
lib/utils/rand.go
RandomDuration
func RandomDuration(max time.Duration) time.Duration { randomVal, err := rand.Int(rand.Reader, big.NewInt(int64(max))) if err != nil { return max / 2 } return time.Duration(randomVal.Int64()) }
go
func RandomDuration(max time.Duration) time.Duration { randomVal, err := rand.Int(rand.Reader, big.NewInt(int64(max))) if err != nil { return max / 2 } return time.Duration(randomVal.Int64()) }
[ "func", "RandomDuration", "(", "max", "time", ".", "Duration", ")", "time", ".", "Duration", "{", "randomVal", ",", "err", ":=", "rand", ".", "Int", "(", "rand", ".", "Reader", ",", "big", ".", "NewInt", "(", "int64", "(", "max", ")", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "max", "/", "2", "\n", "}", "\n", "return", "time", ".", "Duration", "(", "randomVal", ".", "Int64", "(", ")", ")", "\n", "}" ]
// RandomDuration returns a duration in a range [0, max)
[ "RandomDuration", "returns", "a", "duration", "in", "a", "range", "[", "0", "max", ")" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/rand.go#L39-L45
22,968
gravitational/teleport
lib/services/suite/suite.go
NewServer
func NewServer(kind, name, addr, namespace string) *services.ServerV2 { return &services.ServerV2{ Kind: kind, Version: services.V2, Metadata: services.Metadata{ Name: name, Namespace: namespace, }, Spec: services.ServerSpecV2{ Addr: addr, PublicAddr: addr, }, } }
go
func NewServer(kind, name, addr, namespace string) *services.ServerV2 { return &services.ServerV2{ Kind: kind, Version: services.V2, Metadata: services.Metadata{ Name: name, Namespace: namespace, }, Spec: services.ServerSpecV2{ Addr: addr, PublicAddr: addr, }, } }
[ "func", "NewServer", "(", "kind", ",", "name", ",", "addr", ",", "namespace", "string", ")", "*", "services", ".", "ServerV2", "{", "return", "&", "services", ".", "ServerV2", "{", "Kind", ":", "kind", ",", "Version", ":", "services", ".", "V2", ",", "Metadata", ":", "services", ".", "Metadata", "{", "Name", ":", "name", ",", "Namespace", ":", "namespace", ",", "}", ",", "Spec", ":", "services", ".", "ServerSpecV2", "{", "Addr", ":", "addr", ",", "PublicAddr", ":", "addr", ",", "}", ",", "}", "\n", "}" ]
// NewServer creates a new server resource
[ "NewServer", "creates", "a", "new", "server", "resource" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L302-L315
22,969
gravitational/teleport
lib/services/suite/suite.go
AuthPreference
func (s *ServicesTestSuite) AuthPreference(c *check.C) { ap, err := services.NewAuthPreference(services.AuthPreferenceSpecV2{ Type: "local", SecondFactor: "otp", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetAuthPreference(ap) c.Assert(err, check.IsNil) gotAP, err := s.ConfigS.GetAuthPreference() c.Assert(err, check.IsNil) c.Assert(gotAP.GetType(), check.Equals, "local") c.Assert(gotAP.GetSecondFactor(), check.Equals, "otp") }
go
func (s *ServicesTestSuite) AuthPreference(c *check.C) { ap, err := services.NewAuthPreference(services.AuthPreferenceSpecV2{ Type: "local", SecondFactor: "otp", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetAuthPreference(ap) c.Assert(err, check.IsNil) gotAP, err := s.ConfigS.GetAuthPreference() c.Assert(err, check.IsNil) c.Assert(gotAP.GetType(), check.Equals, "local") c.Assert(gotAP.GetSecondFactor(), check.Equals, "otp") }
[ "func", "(", "s", "*", "ServicesTestSuite", ")", "AuthPreference", "(", "c", "*", "check", ".", "C", ")", "{", "ap", ",", "err", ":=", "services", ".", "NewAuthPreference", "(", "services", ".", "AuthPreferenceSpecV2", "{", "Type", ":", "\"", "\"", ",", "SecondFactor", ":", "\"", "\"", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetAuthPreference", "(", "ap", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotAP", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetAuthPreference", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "c", ".", "Assert", "(", "gotAP", ".", "GetType", "(", ")", ",", "check", ".", "Equals", ",", "\"", "\"", ")", "\n", "c", ".", "Assert", "(", "gotAP", ".", "GetSecondFactor", "(", ")", ",", "check", ".", "Equals", ",", "\"", "\"", ")", "\n", "}" ]
// AuthPreference tests authentication preference service
[ "AuthPreference", "tests", "authentication", "preference", "service" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L890-L905
22,970
gravitational/teleport
lib/services/suite/suite.go
CollectOptions
func CollectOptions(opts ...SuiteOption) SuiteOptions { var suiteOpts SuiteOptions for _, o := range opts { o(&suiteOpts) } return suiteOpts }
go
func CollectOptions(opts ...SuiteOption) SuiteOptions { var suiteOpts SuiteOptions for _, o := range opts { o(&suiteOpts) } return suiteOpts }
[ "func", "CollectOptions", "(", "opts", "...", "SuiteOption", ")", "SuiteOptions", "{", "var", "suiteOpts", "SuiteOptions", "\n", "for", "_", ",", "o", ":=", "range", "opts", "{", "o", "(", "&", "suiteOpts", ")", "\n", "}", "\n", "return", "suiteOpts", "\n", "}" ]
// CollectOptions collects suite options
[ "CollectOptions", "collects", "suite", "options" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L953-L959
22,971
gravitational/teleport
lib/services/suite/suite.go
ClusterConfig
func (s *ServicesTestSuite) ClusterConfig(c *check.C, opts ...SuiteOption) { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{ ClientIdleTimeout: services.NewDuration(17 * time.Second), DisconnectExpiredCert: services.NewBool(true), ClusterID: "27", SessionRecording: services.RecordAtProxy, Audit: services.AuditConfig{ Region: "us-west-1", Type: "dynamodb", AuditSessionsURI: "file:///home/log", AuditTableName: "audit_table_name", AuditEventsURI: []string{"dynamodb://audit_table_name", "file:///home/log"}, }, }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) gotConfig, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) config.SetResourceID(gotConfig.GetResourceID()) fixtures.DeepCompare(c, config, gotConfig) // Some parts (e.g. auth server) will not function // without cluster name or cluster config if CollectOptions(opts...).SkipDelete { return } err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterConfig() fixtures.ExpectNotFound(c, err) clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterName() fixtures.ExpectNotFound(c, err) err = s.ConfigS.UpsertClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err = s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) }
go
func (s *ServicesTestSuite) ClusterConfig(c *check.C, opts ...SuiteOption) { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{ ClientIdleTimeout: services.NewDuration(17 * time.Second), DisconnectExpiredCert: services.NewBool(true), ClusterID: "27", SessionRecording: services.RecordAtProxy, Audit: services.AuditConfig{ Region: "us-west-1", Type: "dynamodb", AuditSessionsURI: "file:///home/log", AuditTableName: "audit_table_name", AuditEventsURI: []string{"dynamodb://audit_table_name", "file:///home/log"}, }, }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) gotConfig, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) config.SetResourceID(gotConfig.GetResourceID()) fixtures.DeepCompare(c, config, gotConfig) // Some parts (e.g. auth server) will not function // without cluster name or cluster config if CollectOptions(opts...).SkipDelete { return } err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterConfig() fixtures.ExpectNotFound(c, err) clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) _, err = s.ConfigS.GetClusterName() fixtures.ExpectNotFound(c, err) err = s.ConfigS.UpsertClusterName(clusterName) c.Assert(err, check.IsNil) gotName, err = s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) clusterName.SetResourceID(gotName.GetResourceID()) fixtures.DeepCompare(c, clusterName, gotName) }
[ "func", "(", "s", "*", "ServicesTestSuite", ")", "ClusterConfig", "(", "c", "*", "check", ".", "C", ",", "opts", "...", "SuiteOption", ")", "{", "config", ",", "err", ":=", "services", ".", "NewClusterConfig", "(", "services", ".", "ClusterConfigSpecV3", "{", "ClientIdleTimeout", ":", "services", ".", "NewDuration", "(", "17", "*", "time", ".", "Second", ")", ",", "DisconnectExpiredCert", ":", "services", ".", "NewBool", "(", "true", ")", ",", "ClusterID", ":", "\"", "\"", ",", "SessionRecording", ":", "services", ".", "RecordAtProxy", ",", "Audit", ":", "services", ".", "AuditConfig", "{", "Region", ":", "\"", "\"", ",", "Type", ":", "\"", "\"", ",", "AuditSessionsURI", ":", "\"", "\"", ",", "AuditTableName", ":", "\"", "\"", ",", "AuditEventsURI", ":", "[", "]", "string", "{", "\"", "\"", ",", "\"", "\"", "}", ",", "}", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterConfig", "(", "config", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotConfig", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "config", ".", "SetResourceID", "(", "gotConfig", ".", "GetResourceID", "(", ")", ")", "\n", "fixtures", ".", "DeepCompare", "(", "c", ",", "config", ",", "gotConfig", ")", "\n\n", "// Some parts (e.g. auth server) will not function", "// without cluster name or cluster config", "if", "CollectOptions", "(", "opts", "...", ")", ".", "SkipDelete", "{", "return", "\n", "}", "\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "_", ",", "err", "=", "s", ".", "ConfigS", ".", "GetClusterConfig", "(", ")", "\n", "fixtures", ".", "ExpectNotFound", "(", "c", ",", "err", ")", "\n\n", "clusterName", ",", "err", ":=", "services", ".", "NewClusterName", "(", "services", ".", "ClusterNameSpecV2", "{", "ClusterName", ":", "\"", "\"", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterName", "(", "clusterName", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotName", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "clusterName", ".", "SetResourceID", "(", "gotName", ".", "GetResourceID", "(", ")", ")", "\n", "fixtures", ".", "DeepCompare", "(", "c", ",", "clusterName", ",", "gotName", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "_", ",", "err", "=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "fixtures", ".", "ExpectNotFound", "(", "c", ",", "err", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "UpsertClusterName", "(", "clusterName", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "gotName", ",", "err", "=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "clusterName", ".", "SetResourceID", "(", "gotName", ".", "GetResourceID", "(", ")", ")", "\n", "fixtures", ".", "DeepCompare", "(", "c", ",", "clusterName", ",", "gotName", ")", "\n", "}" ]
// ClusterConfig tests cluster configuration
[ "ClusterConfig", "tests", "cluster", "configuration" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L962-L1023
22,972
gravitational/teleport
lib/services/suite/suite.go
EventsClusterConfig
func (s *ServicesTestSuite) EventsClusterConfig(c *check.C) { testCases := []eventTest{ { name: "Cluster config", kind: services.WatchKind{ Kind: services.KindClusterConfig, }, crud: func() services.Resource { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{}) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) return out }, }, { name: "Cluster name", kind: services.WatchKind{ Kind: services.KindClusterName, }, crud: func() services.Resource { clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) return out }, }, } s.runEventsTests(c, testCases) }
go
func (s *ServicesTestSuite) EventsClusterConfig(c *check.C) { testCases := []eventTest{ { name: "Cluster config", kind: services.WatchKind{ Kind: services.KindClusterConfig, }, crud: func() services.Resource { config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{}) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterConfig(config) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterConfig() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterConfig() c.Assert(err, check.IsNil) return out }, }, { name: "Cluster name", kind: services.WatchKind{ Kind: services.KindClusterName, }, crud: func() services.Resource { clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{ ClusterName: "example.com", }) c.Assert(err, check.IsNil) err = s.ConfigS.SetClusterName(clusterName) c.Assert(err, check.IsNil) out, err := s.ConfigS.GetClusterName() c.Assert(err, check.IsNil) err = s.ConfigS.DeleteClusterName() c.Assert(err, check.IsNil) return out }, }, } s.runEventsTests(c, testCases) }
[ "func", "(", "s", "*", "ServicesTestSuite", ")", "EventsClusterConfig", "(", "c", "*", "check", ".", "C", ")", "{", "testCases", ":=", "[", "]", "eventTest", "{", "{", "name", ":", "\"", "\"", ",", "kind", ":", "services", ".", "WatchKind", "{", "Kind", ":", "services", ".", "KindClusterConfig", ",", "}", ",", "crud", ":", "func", "(", ")", "services", ".", "Resource", "{", "config", ",", "err", ":=", "services", ".", "NewClusterConfig", "(", "services", ".", "ClusterConfigSpecV3", "{", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterConfig", "(", "config", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "out", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterConfig", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "return", "out", "\n", "}", ",", "}", ",", "{", "name", ":", "\"", "\"", ",", "kind", ":", "services", ".", "WatchKind", "{", "Kind", ":", "services", ".", "KindClusterName", ",", "}", ",", "crud", ":", "func", "(", ")", "services", ".", "Resource", "{", "clusterName", ",", "err", ":=", "services", ".", "NewClusterName", "(", "services", ".", "ClusterNameSpecV2", "{", "ClusterName", ":", "\"", "\"", ",", "}", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "SetClusterName", "(", "clusterName", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "out", ",", "err", ":=", "s", ".", "ConfigS", ".", "GetClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n\n", "err", "=", "s", ".", "ConfigS", ".", "DeleteClusterName", "(", ")", "\n", "c", ".", "Assert", "(", "err", ",", "check", ".", "IsNil", ")", "\n", "return", "out", "\n", "}", ",", "}", ",", "}", "\n", "s", ".", "runEventsTests", "(", "c", ",", "testCases", ")", "\n", "}" ]
// EventsClusterConfig tests cluster config resource events
[ "EventsClusterConfig", "tests", "cluster", "config", "resource", "events" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L1310-L1357
22,973
gravitational/teleport
lib/services/tunnelconn.go
TunnelConnectionStatus
func TunnelConnectionStatus(clock clockwork.Clock, conn TunnelConnection) string { diff := clock.Now().Sub(conn.GetLastHeartbeat()) if diff < defaults.ReverseTunnelOfflineThreshold { return teleport.RemoteClusterStatusOnline } return teleport.RemoteClusterStatusOffline }
go
func TunnelConnectionStatus(clock clockwork.Clock, conn TunnelConnection) string { diff := clock.Now().Sub(conn.GetLastHeartbeat()) if diff < defaults.ReverseTunnelOfflineThreshold { return teleport.RemoteClusterStatusOnline } return teleport.RemoteClusterStatusOffline }
[ "func", "TunnelConnectionStatus", "(", "clock", "clockwork", ".", "Clock", ",", "conn", "TunnelConnection", ")", "string", "{", "diff", ":=", "clock", ".", "Now", "(", ")", ".", "Sub", "(", "conn", ".", "GetLastHeartbeat", "(", ")", ")", "\n", "if", "diff", "<", "defaults", ".", "ReverseTunnelOfflineThreshold", "{", "return", "teleport", ".", "RemoteClusterStatusOnline", "\n", "}", "\n", "return", "teleport", ".", "RemoteClusterStatusOffline", "\n", "}" ]
// IsTunnelConnectionStatus returns tunnel connection status based on the last // heartbeat time recorded for a connection
[ "IsTunnelConnectionStatus", "returns", "tunnel", "connection", "status", "based", "on", "the", "last", "heartbeat", "time", "recorded", "for", "a", "connection" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L78-L84
22,974
gravitational/teleport
lib/services/tunnelconn.go
MustCreateTunnelConnection
func MustCreateTunnelConnection(name string, spec TunnelConnectionSpecV2) TunnelConnection { conn, err := NewTunnelConnection(name, spec) if err != nil { panic(err) } return conn }
go
func MustCreateTunnelConnection(name string, spec TunnelConnectionSpecV2) TunnelConnection { conn, err := NewTunnelConnection(name, spec) if err != nil { panic(err) } return conn }
[ "func", "MustCreateTunnelConnection", "(", "name", "string", ",", "spec", "TunnelConnectionSpecV2", ")", "TunnelConnection", "{", "conn", ",", "err", ":=", "NewTunnelConnection", "(", "name", ",", "spec", ")", "\n", "if", "err", "!=", "nil", "{", "panic", "(", "err", ")", "\n", "}", "\n", "return", "conn", "\n", "}" ]
// MustCreateTunnelConnection returns new connection from V2 spec or panics if // parameters are incorrect
[ "MustCreateTunnelConnection", "returns", "new", "connection", "from", "V2", "spec", "or", "panics", "if", "parameters", "are", "incorrect" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L88-L94
22,975
gravitational/teleport
lib/services/tunnelconn.go
NewTunnelConnection
func NewTunnelConnection(name string, spec TunnelConnectionSpecV2) (TunnelConnection, error) { conn := &TunnelConnectionV2{ Kind: KindTunnelConnection, SubKind: spec.ClusterName, Version: V2, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, } if err := conn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return conn, nil }
go
func NewTunnelConnection(name string, spec TunnelConnectionSpecV2) (TunnelConnection, error) { conn := &TunnelConnectionV2{ Kind: KindTunnelConnection, SubKind: spec.ClusterName, Version: V2, Metadata: Metadata{ Name: name, Namespace: defaults.Namespace, }, Spec: spec, } if err := conn.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } return conn, nil }
[ "func", "NewTunnelConnection", "(", "name", "string", ",", "spec", "TunnelConnectionSpecV2", ")", "(", "TunnelConnection", ",", "error", ")", "{", "conn", ":=", "&", "TunnelConnectionV2", "{", "Kind", ":", "KindTunnelConnection", ",", "SubKind", ":", "spec", ".", "ClusterName", ",", "Version", ":", "V2", ",", "Metadata", ":", "Metadata", "{", "Name", ":", "name", ",", "Namespace", ":", "defaults", ".", "Namespace", ",", "}", ",", "Spec", ":", "spec", ",", "}", "\n", "if", "err", ":=", "conn", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "conn", ",", "nil", "\n", "}" ]
// NewTunnelConnection returns new connection from V2 spec
[ "NewTunnelConnection", "returns", "new", "connection", "from", "V2", "spec" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L97-L112
22,976
gravitational/teleport
lib/services/tunnelconn.go
String
func (r *TunnelConnectionV2) String() string { return fmt.Sprintf("TunnelConnection(name=%v, type=%v, cluster=%v, proxy=%v)", r.Metadata.Name, r.Spec.Type, r.Spec.ClusterName, r.Spec.ProxyName) }
go
func (r *TunnelConnectionV2) String() string { return fmt.Sprintf("TunnelConnection(name=%v, type=%v, cluster=%v, proxy=%v)", r.Metadata.Name, r.Spec.Type, r.Spec.ClusterName, r.Spec.ProxyName) }
[ "func", "(", "r", "*", "TunnelConnectionV2", ")", "String", "(", ")", "string", "{", "return", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "r", ".", "Metadata", ".", "Name", ",", "r", ".", "Spec", ".", "Type", ",", "r", ".", "Spec", ".", "ClusterName", ",", "r", ".", "Spec", ".", "ProxyName", ")", "\n", "}" ]
// String returns user-friendly description of this connection
[ "String", "returns", "user", "-", "friendly", "description", "of", "this", "connection" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L151-L154
22,977
gravitational/teleport
lib/services/tunnelconn.go
SetLastHeartbeat
func (r *TunnelConnectionV2) SetLastHeartbeat(tm time.Time) { r.Spec.LastHeartbeat = tm }
go
func (r *TunnelConnectionV2) SetLastHeartbeat(tm time.Time) { r.Spec.LastHeartbeat = tm }
[ "func", "(", "r", "*", "TunnelConnectionV2", ")", "SetLastHeartbeat", "(", "tm", "time", ".", "Time", ")", "{", "r", ".", "Spec", ".", "LastHeartbeat", "=", "tm", "\n", "}" ]
// SetLastHeartbeat sets last heartbeat time
[ "SetLastHeartbeat", "sets", "last", "heartbeat", "time" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L221-L223
22,978
gravitational/teleport
lib/services/tunnelconn.go
UnmarshalTunnelConnection
func UnmarshalTunnelConnection(data []byte, opts ...MarshalOption) (TunnelConnection, error) { if len(data) == 0 { return nil, trace.BadParameter("missing tunnel connection data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } var h ResourceHeader err = utils.FastUnmarshal(data, &h) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case V2: var r TunnelConnectionV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(data, &r); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetTunnelConnectionSchema(), &r, data); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := r.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { r.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { r.SetExpiry(cfg.Expires) } return &r, nil } return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version) }
go
func UnmarshalTunnelConnection(data []byte, opts ...MarshalOption) (TunnelConnection, error) { if len(data) == 0 { return nil, trace.BadParameter("missing tunnel connection data") } cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } var h ResourceHeader err = utils.FastUnmarshal(data, &h) if err != nil { return nil, trace.Wrap(err) } switch h.Version { case V2: var r TunnelConnectionV2 if cfg.SkipValidation { if err := utils.FastUnmarshal(data, &r); err != nil { return nil, trace.BadParameter(err.Error()) } } else { if err := utils.UnmarshalWithSchema(GetTunnelConnectionSchema(), &r, data); err != nil { return nil, trace.BadParameter(err.Error()) } } if err := r.CheckAndSetDefaults(); err != nil { return nil, trace.Wrap(err) } if cfg.ID != 0 { r.SetResourceID(cfg.ID) } if !cfg.Expires.IsZero() { r.SetExpiry(cfg.Expires) } return &r, nil } return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version) }
[ "func", "UnmarshalTunnelConnection", "(", "data", "[", "]", "byte", ",", "opts", "...", "MarshalOption", ")", "(", "TunnelConnection", ",", "error", ")", "{", "if", "len", "(", "data", ")", "==", "0", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ")", "\n", "}", "\n", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "var", "h", "ResourceHeader", "\n", "err", "=", "utils", ".", "FastUnmarshal", "(", "data", ",", "&", "h", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "h", ".", "Version", "{", "case", "V2", ":", "var", "r", "TunnelConnectionV2", "\n\n", "if", "cfg", ".", "SkipValidation", "{", "if", "err", ":=", "utils", ".", "FastUnmarshal", "(", "data", ",", "&", "r", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "if", "err", ":=", "utils", ".", "UnmarshalWithSchema", "(", "GetTunnelConnectionSchema", "(", ")", ",", "&", "r", ",", "data", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "BadParameter", "(", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n", "}", "\n\n", "if", "err", ":=", "r", ".", "CheckAndSetDefaults", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "cfg", ".", "ID", "!=", "0", "{", "r", ".", "SetResourceID", "(", "cfg", ".", "ID", ")", "\n", "}", "\n", "if", "!", "cfg", ".", "Expires", ".", "IsZero", "(", ")", "{", "r", ".", "SetExpiry", "(", "cfg", ".", "Expires", ")", "\n", "}", "\n", "return", "&", "r", ",", "nil", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "h", ".", "Version", ")", "\n", "}" ]
// UnmarshalTunnelConnection unmarshals reverse tunnel from JSON or YAML, // sets defaults and checks the schema
[ "UnmarshalTunnelConnection", "unmarshals", "reverse", "tunnel", "from", "JSON", "or", "YAML", "sets", "defaults", "and", "checks", "the", "schema" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L275-L314
22,979
gravitational/teleport
lib/services/tunnelconn.go
MarshalTunnelConnection
func MarshalTunnelConnection(rt TunnelConnection, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := rt.(type) { case *TunnelConnectionV2: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", rt) } }
go
func MarshalTunnelConnection(rt TunnelConnection, opts ...MarshalOption) ([]byte, error) { cfg, err := collectOptions(opts) if err != nil { return nil, trace.Wrap(err) } switch resource := rt.(type) { case *TunnelConnectionV2: if !cfg.PreserveResourceID { // avoid modifying the original object // to prevent unexpected data races copy := *resource copy.SetResourceID(0) resource = &copy } return utils.FastMarshal(resource) default: return nil, trace.BadParameter("unrecognized resource version %T", rt) } }
[ "func", "MarshalTunnelConnection", "(", "rt", "TunnelConnection", ",", "opts", "...", "MarshalOption", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "cfg", ",", "err", ":=", "collectOptions", "(", "opts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "switch", "resource", ":=", "rt", ".", "(", "type", ")", "{", "case", "*", "TunnelConnectionV2", ":", "if", "!", "cfg", ".", "PreserveResourceID", "{", "// avoid modifying the original object", "// to prevent unexpected data races", "copy", ":=", "*", "resource", "\n", "copy", ".", "SetResourceID", "(", "0", ")", "\n", "resource", "=", "&", "copy", "\n", "}", "\n", "return", "utils", ".", "FastMarshal", "(", "resource", ")", "\n", "default", ":", "return", "nil", ",", "trace", ".", "BadParameter", "(", "\"", "\"", ",", "rt", ")", "\n", "}", "\n", "}" ]
// MarshalTunnelConnection marshals tunnel connection
[ "MarshalTunnelConnection", "marshals", "tunnel", "connection" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L317-L335
22,980
gravitational/teleport
tool/tctl/common/status_command.go
Initialize
func (c *StatusCommand) Initialize(app *kingpin.Application, config *service.Config) { c.config = config c.status = app.Command("status", "Report cluster status") }
go
func (c *StatusCommand) Initialize(app *kingpin.Application, config *service.Config) { c.config = config c.status = app.Command("status", "Report cluster status") }
[ "func", "(", "c", "*", "StatusCommand", ")", "Initialize", "(", "app", "*", "kingpin", ".", "Application", ",", "config", "*", "service", ".", "Config", ")", "{", "c", ".", "config", "=", "config", "\n", "c", ".", "status", "=", "app", ".", "Command", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "}" ]
// Initialize allows StatusCommand to plug itself into the CLI parser.
[ "Initialize", "allows", "StatusCommand", "to", "plug", "itself", "into", "the", "CLI", "parser", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/status_command.go#L41-L44
22,981
gravitational/teleport
tool/tctl/common/status_command.go
Status
func (c *StatusCommand) Status(client auth.ClientI) error { clusterNameResource, err := client.GetClusterName() if err != nil { return trace.Wrap(err) } clusterName := clusterNameResource.GetClusterName() hostCAs, err := client.GetCertAuthorities(services.HostCA, false) if err != nil { return trace.Wrap(err) } userCAs, err := client.GetCertAuthorities(services.UserCA, false) if err != nil { return trace.Wrap(err) } // Calculate the CA pin for this cluster. The CA pin is used by the client // to verify the identity of the Auth Server. caPin, err := calculateCAPin(client) if err != nil { return trace.Wrap(err) } authorities := append(userCAs, hostCAs...) view := func() string { table := asciitable.MakeHeadlessTable(2) table.AddRow([]string{"Cluster", clusterName}) for _, ca := range authorities { if ca.GetClusterName() != clusterName { continue } info := fmt.Sprintf("%v CA ", strings.Title(string(ca.GetType()))) rotation := ca.GetRotation() if c.config.Debug { table.AddRow([]string{info, fmt.Sprintf("%v, update_servers: %v, complete: %v", rotation.String(), rotation.Schedule.UpdateServers.Format(teleport.HumanDateFormatSeconds), rotation.Schedule.Standby.Format(teleport.HumanDateFormatSeconds), )}) } else { table.AddRow([]string{info, rotation.String()}) } } table.AddRow([]string{"CA pin", caPin}) return table.AsBuffer().String() } fmt.Printf(view()) // in debug mode, output mode of remote certificate authorities if c.config.Debug { view := func() string { table := asciitable.MakeHeadlessTable(2) for _, ca := range authorities { if ca.GetClusterName() == clusterName { continue } info := fmt.Sprintf("Remote %v CA %q", strings.Title(string(ca.GetType())), ca.GetClusterName()) rotation := ca.GetRotation() table.AddRow([]string{info, rotation.String()}) } return "Remote clusters\n\n" + table.AsBuffer().String() } fmt.Printf(view()) } return nil }
go
func (c *StatusCommand) Status(client auth.ClientI) error { clusterNameResource, err := client.GetClusterName() if err != nil { return trace.Wrap(err) } clusterName := clusterNameResource.GetClusterName() hostCAs, err := client.GetCertAuthorities(services.HostCA, false) if err != nil { return trace.Wrap(err) } userCAs, err := client.GetCertAuthorities(services.UserCA, false) if err != nil { return trace.Wrap(err) } // Calculate the CA pin for this cluster. The CA pin is used by the client // to verify the identity of the Auth Server. caPin, err := calculateCAPin(client) if err != nil { return trace.Wrap(err) } authorities := append(userCAs, hostCAs...) view := func() string { table := asciitable.MakeHeadlessTable(2) table.AddRow([]string{"Cluster", clusterName}) for _, ca := range authorities { if ca.GetClusterName() != clusterName { continue } info := fmt.Sprintf("%v CA ", strings.Title(string(ca.GetType()))) rotation := ca.GetRotation() if c.config.Debug { table.AddRow([]string{info, fmt.Sprintf("%v, update_servers: %v, complete: %v", rotation.String(), rotation.Schedule.UpdateServers.Format(teleport.HumanDateFormatSeconds), rotation.Schedule.Standby.Format(teleport.HumanDateFormatSeconds), )}) } else { table.AddRow([]string{info, rotation.String()}) } } table.AddRow([]string{"CA pin", caPin}) return table.AsBuffer().String() } fmt.Printf(view()) // in debug mode, output mode of remote certificate authorities if c.config.Debug { view := func() string { table := asciitable.MakeHeadlessTable(2) for _, ca := range authorities { if ca.GetClusterName() == clusterName { continue } info := fmt.Sprintf("Remote %v CA %q", strings.Title(string(ca.GetType())), ca.GetClusterName()) rotation := ca.GetRotation() table.AddRow([]string{info, rotation.String()}) } return "Remote clusters\n\n" + table.AsBuffer().String() } fmt.Printf(view()) } return nil }
[ "func", "(", "c", "*", "StatusCommand", ")", "Status", "(", "client", "auth", ".", "ClientI", ")", "error", "{", "clusterNameResource", ",", "err", ":=", "client", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "clusterName", ":=", "clusterNameResource", ".", "GetClusterName", "(", ")", "\n\n", "hostCAs", ",", "err", ":=", "client", ".", "GetCertAuthorities", "(", "services", ".", "HostCA", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "userCAs", ",", "err", ":=", "client", ".", "GetCertAuthorities", "(", "services", ".", "UserCA", ",", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "// Calculate the CA pin for this cluster. The CA pin is used by the client", "// to verify the identity of the Auth Server.", "caPin", ",", "err", ":=", "calculateCAPin", "(", "client", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "authorities", ":=", "append", "(", "userCAs", ",", "hostCAs", "...", ")", "\n", "view", ":=", "func", "(", ")", "string", "{", "table", ":=", "asciitable", ".", "MakeHeadlessTable", "(", "2", ")", "\n", "table", ".", "AddRow", "(", "[", "]", "string", "{", "\"", "\"", ",", "clusterName", "}", ")", "\n", "for", "_", ",", "ca", ":=", "range", "authorities", "{", "if", "ca", ".", "GetClusterName", "(", ")", "!=", "clusterName", "{", "continue", "\n", "}", "\n", "info", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "strings", ".", "Title", "(", "string", "(", "ca", ".", "GetType", "(", ")", ")", ")", ")", "\n", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n", "if", "c", ".", "config", ".", "Debug", "{", "table", ".", "AddRow", "(", "[", "]", "string", "{", "info", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "rotation", ".", "String", "(", ")", ",", "rotation", ".", "Schedule", ".", "UpdateServers", ".", "Format", "(", "teleport", ".", "HumanDateFormatSeconds", ")", ",", "rotation", ".", "Schedule", ".", "Standby", ".", "Format", "(", "teleport", ".", "HumanDateFormatSeconds", ")", ",", ")", "}", ")", "\n", "}", "else", "{", "table", ".", "AddRow", "(", "[", "]", "string", "{", "info", ",", "rotation", ".", "String", "(", ")", "}", ")", "\n", "}", "\n\n", "}", "\n", "table", ".", "AddRow", "(", "[", "]", "string", "{", "\"", "\"", ",", "caPin", "}", ")", "\n", "return", "table", ".", "AsBuffer", "(", ")", ".", "String", "(", ")", "\n", "}", "\n", "fmt", ".", "Printf", "(", "view", "(", ")", ")", "\n\n", "// in debug mode, output mode of remote certificate authorities", "if", "c", ".", "config", ".", "Debug", "{", "view", ":=", "func", "(", ")", "string", "{", "table", ":=", "asciitable", ".", "MakeHeadlessTable", "(", "2", ")", "\n", "for", "_", ",", "ca", ":=", "range", "authorities", "{", "if", "ca", ".", "GetClusterName", "(", ")", "==", "clusterName", "{", "continue", "\n", "}", "\n", "info", ":=", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "strings", ".", "Title", "(", "string", "(", "ca", ".", "GetType", "(", ")", ")", ")", ",", "ca", ".", "GetClusterName", "(", ")", ")", "\n", "rotation", ":=", "ca", ".", "GetRotation", "(", ")", "\n", "table", ".", "AddRow", "(", "[", "]", "string", "{", "info", ",", "rotation", ".", "String", "(", ")", "}", ")", "\n", "}", "\n", "return", "\"", "\\n", "\\n", "\"", "+", "table", ".", "AsBuffer", "(", ")", ".", "String", "(", ")", "\n", "}", "\n", "fmt", ".", "Printf", "(", "view", "(", ")", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Status is called to execute "status" CLI command.
[ "Status", "is", "called", "to", "execute", "status", "CLI", "command", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/status_command.go#L58-L126
22,982
gravitational/teleport
lib/auth/trustedcluster.go
DeleteTrustedCluster
func (a *AuthServer) DeleteTrustedCluster(name string) error { err := a.DeleteCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: name}) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } err = a.DeleteCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: name}) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } err = a.DeleteReverseTunnel(name) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } err = a.Presence.DeleteTrustedCluster(name) if err != nil { return trace.Wrap(err) } return nil }
go
func (a *AuthServer) DeleteTrustedCluster(name string) error { err := a.DeleteCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: name}) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } err = a.DeleteCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: name}) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } err = a.DeleteReverseTunnel(name) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } err = a.Presence.DeleteTrustedCluster(name) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "a", "*", "AuthServer", ")", "DeleteTrustedCluster", "(", "name", "string", ")", "error", "{", "err", ":=", "a", ".", "DeleteCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "name", "}", ")", "\n", "if", "err", "!=", "nil", "{", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "a", ".", "DeleteCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "UserCA", ",", "DomainName", ":", "name", "}", ")", "\n", "if", "err", "!=", "nil", "{", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "a", ".", "DeleteReverseTunnel", "(", "name", ")", "\n", "if", "err", "!=", "nil", "{", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n\n", "err", "=", "a", ".", "Presence", ".", "DeleteTrustedCluster", "(", "name", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// DeleteTrustedCluster removes services.CertAuthority, services.ReverseTunnel, // and services.TrustedCluster resources.
[ "DeleteTrustedCluster", "removes", "services", ".", "CertAuthority", "services", ".", "ReverseTunnel", "and", "services", ".", "TrustedCluster", "resources", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L171-L199
22,983
gravitational/teleport
lib/auth/trustedcluster.go
DeleteRemoteCluster
func (a *AuthServer) DeleteRemoteCluster(clusterName string) error { // To make sure remote cluster exists - to protect against random // clusterName requests (e.g. when clusterName is set to local cluster name) _, err := a.Presence.GetRemoteCluster(clusterName) if err != nil { return trace.Wrap(err) } // delete cert authorities associated with the cluster err = a.DeleteCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName, }) if err != nil { // this method could have succeeded on the first call, // but then if the remote cluster resource could not be deleted // it would be impossible to delete the cluster after then if !trace.IsNotFound(err) { return trace.Wrap(err) } } // there should be no User CA in trusted clusters on the main cluster side // per standard automation but clean up just in case err = a.DeleteCertAuthority(services.CertAuthID{ Type: services.UserCA, DomainName: clusterName, }) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } return a.Presence.DeleteRemoteCluster(clusterName) }
go
func (a *AuthServer) DeleteRemoteCluster(clusterName string) error { // To make sure remote cluster exists - to protect against random // clusterName requests (e.g. when clusterName is set to local cluster name) _, err := a.Presence.GetRemoteCluster(clusterName) if err != nil { return trace.Wrap(err) } // delete cert authorities associated with the cluster err = a.DeleteCertAuthority(services.CertAuthID{ Type: services.HostCA, DomainName: clusterName, }) if err != nil { // this method could have succeeded on the first call, // but then if the remote cluster resource could not be deleted // it would be impossible to delete the cluster after then if !trace.IsNotFound(err) { return trace.Wrap(err) } } // there should be no User CA in trusted clusters on the main cluster side // per standard automation but clean up just in case err = a.DeleteCertAuthority(services.CertAuthID{ Type: services.UserCA, DomainName: clusterName, }) if err != nil { if !trace.IsNotFound(err) { return trace.Wrap(err) } } return a.Presence.DeleteRemoteCluster(clusterName) }
[ "func", "(", "a", "*", "AuthServer", ")", "DeleteRemoteCluster", "(", "clusterName", "string", ")", "error", "{", "// To make sure remote cluster exists - to protect against random", "// clusterName requests (e.g. when clusterName is set to local cluster name)", "_", ",", "err", ":=", "a", ".", "Presence", ".", "GetRemoteCluster", "(", "clusterName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "// delete cert authorities associated with the cluster", "err", "=", "a", ".", "DeleteCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "clusterName", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "// this method could have succeeded on the first call,", "// but then if the remote cluster resource could not be deleted", "// it would be impossible to delete the cluster after then", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "// there should be no User CA in trusted clusters on the main cluster side", "// per standard automation but clean up just in case", "err", "=", "a", ".", "DeleteCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "UserCA", ",", "DomainName", ":", "clusterName", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "if", "!", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "a", ".", "Presence", ".", "DeleteRemoteCluster", "(", "clusterName", ")", "\n", "}" ]
// DeleteRemoteCluster deletes remote cluster resource, all certificate authorities // associated with it
[ "DeleteRemoteCluster", "deletes", "remote", "cluster", "resource", "all", "certificate", "authorities", "associated", "with", "it" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L293-L325
22,984
gravitational/teleport
lib/auth/trustedcluster.go
GetRemoteCluster
func (a *AuthServer) GetRemoteCluster(clusterName string) (services.RemoteCluster, error) { // To make sure remote cluster exists - to protect against random // clusterName requests (e.g. when clusterName is set to local cluster name) remoteCluster, err := a.Presence.GetRemoteCluster(clusterName) if err != nil { return nil, trace.Wrap(err) } if err := a.updateRemoteClusterStatus(remoteCluster); err != nil { return nil, trace.Wrap(err) } return remoteCluster, nil }
go
func (a *AuthServer) GetRemoteCluster(clusterName string) (services.RemoteCluster, error) { // To make sure remote cluster exists - to protect against random // clusterName requests (e.g. when clusterName is set to local cluster name) remoteCluster, err := a.Presence.GetRemoteCluster(clusterName) if err != nil { return nil, trace.Wrap(err) } if err := a.updateRemoteClusterStatus(remoteCluster); err != nil { return nil, trace.Wrap(err) } return remoteCluster, nil }
[ "func", "(", "a", "*", "AuthServer", ")", "GetRemoteCluster", "(", "clusterName", "string", ")", "(", "services", ".", "RemoteCluster", ",", "error", ")", "{", "// To make sure remote cluster exists - to protect against random", "// clusterName requests (e.g. when clusterName is set to local cluster name)", "remoteCluster", ",", "err", ":=", "a", ".", "Presence", ".", "GetRemoteCluster", "(", "clusterName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "err", ":=", "a", ".", "updateRemoteClusterStatus", "(", "remoteCluster", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "remoteCluster", ",", "nil", "\n", "}" ]
// GetRemoteCluster returns remote cluster by name
[ "GetRemoteCluster", "returns", "remote", "cluster", "by", "name" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L328-L339
22,985
gravitational/teleport
lib/auth/trustedcluster.go
GetRemoteClusters
func (a *AuthServer) GetRemoteClusters(opts ...services.MarshalOption) ([]services.RemoteCluster, error) { // To make sure remote cluster exists - to protect against random // clusterName requests (e.g. when clusterName is set to local cluster name) remoteClusters, err := a.Presence.GetRemoteClusters(opts...) if err != nil { return nil, trace.Wrap(err) } for i := range remoteClusters { if err := a.updateRemoteClusterStatus(remoteClusters[i]); err != nil { return nil, trace.Wrap(err) } } return remoteClusters, nil }
go
func (a *AuthServer) GetRemoteClusters(opts ...services.MarshalOption) ([]services.RemoteCluster, error) { // To make sure remote cluster exists - to protect against random // clusterName requests (e.g. when clusterName is set to local cluster name) remoteClusters, err := a.Presence.GetRemoteClusters(opts...) if err != nil { return nil, trace.Wrap(err) } for i := range remoteClusters { if err := a.updateRemoteClusterStatus(remoteClusters[i]); err != nil { return nil, trace.Wrap(err) } } return remoteClusters, nil }
[ "func", "(", "a", "*", "AuthServer", ")", "GetRemoteClusters", "(", "opts", "...", "services", ".", "MarshalOption", ")", "(", "[", "]", "services", ".", "RemoteCluster", ",", "error", ")", "{", "// To make sure remote cluster exists - to protect against random", "// clusterName requests (e.g. when clusterName is set to local cluster name)", "remoteClusters", ",", "err", ":=", "a", ".", "Presence", ".", "GetRemoteClusters", "(", "opts", "...", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "for", "i", ":=", "range", "remoteClusters", "{", "if", "err", ":=", "a", ".", "updateRemoteClusterStatus", "(", "remoteClusters", "[", "i", "]", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "}", "\n", "return", "remoteClusters", ",", "nil", "\n", "}" ]
// GetRemoteClusters returns remote clusters with updated statuses
[ "GetRemoteClusters", "returns", "remote", "clusters", "with", "updated", "statuses" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L357-L370
22,986
gravitational/teleport
lib/auth/trustedcluster.go
activateCertAuthority
func (a *AuthServer) activateCertAuthority(t services.TrustedCluster) error { err := a.ActivateCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: t.GetName()}) if err != nil { return trace.Wrap(err) } return trace.Wrap(a.ActivateCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: t.GetName()})) }
go
func (a *AuthServer) activateCertAuthority(t services.TrustedCluster) error { err := a.ActivateCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: t.GetName()}) if err != nil { return trace.Wrap(err) } return trace.Wrap(a.ActivateCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: t.GetName()})) }
[ "func", "(", "a", "*", "AuthServer", ")", "activateCertAuthority", "(", "t", "services", ".", "TrustedCluster", ")", "error", "{", "err", ":=", "a", ".", "ActivateCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "UserCA", ",", "DomainName", ":", "t", ".", "GetName", "(", ")", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "trace", ".", "Wrap", "(", "a", ".", "ActivateCertAuthority", "(", "services", ".", "CertAuthID", "{", "Type", ":", "services", ".", "HostCA", ",", "DomainName", ":", "t", ".", "GetName", "(", ")", "}", ")", ")", "\n", "}" ]
// activateCertAuthority will activate both the user and host certificate // authority given in the services.TrustedCluster resource.
[ "activateCertAuthority", "will", "activate", "both", "the", "user", "and", "host", "certificate", "authority", "given", "in", "the", "services", ".", "TrustedCluster", "resource", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L599-L606
22,987
gravitational/teleport
lib/auth/trustedcluster.go
createReverseTunnel
func (a *AuthServer) createReverseTunnel(t services.TrustedCluster) error { reverseTunnel := services.NewReverseTunnel( t.GetName(), []string{t.GetReverseTunnelAddress()}, ) return trace.Wrap(a.UpsertReverseTunnel(reverseTunnel)) }
go
func (a *AuthServer) createReverseTunnel(t services.TrustedCluster) error { reverseTunnel := services.NewReverseTunnel( t.GetName(), []string{t.GetReverseTunnelAddress()}, ) return trace.Wrap(a.UpsertReverseTunnel(reverseTunnel)) }
[ "func", "(", "a", "*", "AuthServer", ")", "createReverseTunnel", "(", "t", "services", ".", "TrustedCluster", ")", "error", "{", "reverseTunnel", ":=", "services", ".", "NewReverseTunnel", "(", "t", ".", "GetName", "(", ")", ",", "[", "]", "string", "{", "t", ".", "GetReverseTunnelAddress", "(", ")", "}", ",", ")", "\n", "return", "trace", ".", "Wrap", "(", "a", ".", "UpsertReverseTunnel", "(", "reverseTunnel", ")", ")", "\n", "}" ]
// createReverseTunnel will create a services.ReverseTunnel givenin the // services.TrustedCluster resource.
[ "createReverseTunnel", "will", "create", "a", "services", ".", "ReverseTunnel", "givenin", "the", "services", ".", "TrustedCluster", "resource", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L621-L627
22,988
gravitational/teleport
lib/services/local/configuration.go
DeleteClusterName
func (s *ClusterConfigurationService) DeleteClusterName() error { err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, namePrefix)) if err != nil { if trace.IsNotFound(err) { return trace.NotFound("cluster configuration not found") } return trace.Wrap(err) } return nil }
go
func (s *ClusterConfigurationService) DeleteClusterName() error { err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, namePrefix)) if err != nil { if trace.IsNotFound(err) { return trace.NotFound("cluster configuration not found") } return trace.Wrap(err) } return nil }
[ "func", "(", "s", "*", "ClusterConfigurationService", ")", "DeleteClusterName", "(", ")", "error", "{", "err", ":=", "s", ".", "Delete", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "clusterConfigPrefix", ",", "namePrefix", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "NotFound", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// DeleteClusterName deletes services.ClusterName from the backend.
[ "DeleteClusterName", "deletes", "services", ".", "ClusterName", "from", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L54-L63
22,989
gravitational/teleport
lib/services/local/configuration.go
SetClusterName
func (s *ClusterConfigurationService) SetClusterName(c services.ClusterName) error { value, err := services.GetClusterNameMarshaler().Marshal(c) if err != nil { return trace.Wrap(err) } _, err = s.Create(context.TODO(), backend.Item{ Key: backend.Key(clusterConfigPrefix, namePrefix), Value: value, Expires: c.Expiry(), }) if err != nil { return trace.Wrap(err) } return nil }
go
func (s *ClusterConfigurationService) SetClusterName(c services.ClusterName) error { value, err := services.GetClusterNameMarshaler().Marshal(c) if err != nil { return trace.Wrap(err) } _, err = s.Create(context.TODO(), backend.Item{ Key: backend.Key(clusterConfigPrefix, namePrefix), Value: value, Expires: c.Expiry(), }) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "s", "*", "ClusterConfigurationService", ")", "SetClusterName", "(", "c", "services", ".", "ClusterName", ")", "error", "{", "value", ",", "err", ":=", "services", ".", "GetClusterNameMarshaler", "(", ")", ".", "Marshal", "(", "c", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "_", ",", "err", "=", "s", ".", "Create", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Item", "{", "Key", ":", "backend", ".", "Key", "(", "clusterConfigPrefix", ",", "namePrefix", ")", ",", "Value", ":", "value", ",", "Expires", ":", "c", ".", "Expiry", "(", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// SetClusterName sets the name of the cluster in the backend. SetClusterName // can only be called once on a cluster after which it will return trace.AlreadyExists.
[ "SetClusterName", "sets", "the", "name", "of", "the", "cluster", "in", "the", "backend", ".", "SetClusterName", "can", "only", "be", "called", "once", "on", "a", "cluster", "after", "which", "it", "will", "return", "trace", ".", "AlreadyExists", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L67-L83
22,990
gravitational/teleport
lib/services/local/configuration.go
GetAuthPreference
func (s *ClusterConfigurationService) GetAuthPreference() (services.AuthPreference, error) { item, err := s.Get(context.TODO(), backend.Key(authPrefix, preferencePrefix, generalPrefix)) if err != nil { if trace.IsNotFound(err) { return nil, trace.NotFound("authentication preference not found") } return nil, trace.Wrap(err) } return services.GetAuthPreferenceMarshaler().Unmarshal(item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires)) }
go
func (s *ClusterConfigurationService) GetAuthPreference() (services.AuthPreference, error) { item, err := s.Get(context.TODO(), backend.Key(authPrefix, preferencePrefix, generalPrefix)) if err != nil { if trace.IsNotFound(err) { return nil, trace.NotFound("authentication preference not found") } return nil, trace.Wrap(err) } return services.GetAuthPreferenceMarshaler().Unmarshal(item.Value, services.WithResourceID(item.ID), services.WithExpires(item.Expires)) }
[ "func", "(", "s", "*", "ClusterConfigurationService", ")", "GetAuthPreference", "(", ")", "(", "services", ".", "AuthPreference", ",", "error", ")", "{", "item", ",", "err", ":=", "s", ".", "Get", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "authPrefix", ",", "preferencePrefix", ",", "generalPrefix", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "nil", ",", "trace", ".", "NotFound", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "nil", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "services", ".", "GetAuthPreferenceMarshaler", "(", ")", ".", "Unmarshal", "(", "item", ".", "Value", ",", "services", ".", "WithResourceID", "(", "item", ".", "ID", ")", ",", "services", ".", "WithExpires", "(", "item", ".", "Expires", ")", ")", "\n", "}" ]
// GetAuthPreference fetches the cluster authentication preferences // from the backend and return them.
[ "GetAuthPreference", "fetches", "the", "cluster", "authentication", "preferences", "from", "the", "backend", "and", "return", "them", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L151-L161
22,991
gravitational/teleport
lib/services/local/configuration.go
SetAuthPreference
func (s *ClusterConfigurationService) SetAuthPreference(preferences services.AuthPreference) error { value, err := services.GetAuthPreferenceMarshaler().Marshal(preferences) if err != nil { return trace.Wrap(err) } item := backend.Item{ Key: backend.Key(authPrefix, preferencePrefix, generalPrefix), Value: value, ID: preferences.GetResourceID(), } _, err = s.Put(context.TODO(), item) if err != nil { return trace.Wrap(err) } return nil }
go
func (s *ClusterConfigurationService) SetAuthPreference(preferences services.AuthPreference) error { value, err := services.GetAuthPreferenceMarshaler().Marshal(preferences) if err != nil { return trace.Wrap(err) } item := backend.Item{ Key: backend.Key(authPrefix, preferencePrefix, generalPrefix), Value: value, ID: preferences.GetResourceID(), } _, err = s.Put(context.TODO(), item) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "s", "*", "ClusterConfigurationService", ")", "SetAuthPreference", "(", "preferences", "services", ".", "AuthPreference", ")", "error", "{", "value", ",", "err", ":=", "services", ".", "GetAuthPreferenceMarshaler", "(", ")", ".", "Marshal", "(", "preferences", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "item", ":=", "backend", ".", "Item", "{", "Key", ":", "backend", ".", "Key", "(", "authPrefix", ",", "preferencePrefix", ",", "generalPrefix", ")", ",", "Value", ":", "value", ",", "ID", ":", "preferences", ".", "GetResourceID", "(", ")", ",", "}", "\n\n", "_", ",", "err", "=", "s", ".", "Put", "(", "context", ".", "TODO", "(", ")", ",", "item", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// SetAuthPreference sets the cluster authentication preferences // on the backend.
[ "SetAuthPreference", "sets", "the", "cluster", "authentication", "preferences", "on", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L165-L183
22,992
gravitational/teleport
lib/services/local/configuration.go
DeleteClusterConfig
func (s *ClusterConfigurationService) DeleteClusterConfig() error { err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, generalPrefix)) if err != nil { if trace.IsNotFound(err) { return trace.NotFound("cluster configuration not found") } return trace.Wrap(err) } return nil }
go
func (s *ClusterConfigurationService) DeleteClusterConfig() error { err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, generalPrefix)) if err != nil { if trace.IsNotFound(err) { return trace.NotFound("cluster configuration not found") } return trace.Wrap(err) } return nil }
[ "func", "(", "s", "*", "ClusterConfigurationService", ")", "DeleteClusterConfig", "(", ")", "error", "{", "err", ":=", "s", ".", "Delete", "(", "context", ".", "TODO", "(", ")", ",", "backend", ".", "Key", "(", "clusterConfigPrefix", ",", "generalPrefix", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "trace", ".", "IsNotFound", "(", "err", ")", "{", "return", "trace", ".", "NotFound", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// DeleteClusterConfig deletes services.ClusterConfig from the backend.
[ "DeleteClusterConfig", "deletes", "services", ".", "ClusterConfig", "from", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L200-L209
22,993
gravitational/teleport
lib/services/local/configuration.go
SetClusterConfig
func (s *ClusterConfigurationService) SetClusterConfig(c services.ClusterConfig) error { value, err := services.GetClusterConfigMarshaler().Marshal(c) if err != nil { return trace.Wrap(err) } item := backend.Item{ Key: backend.Key(clusterConfigPrefix, generalPrefix), Value: value, ID: c.GetResourceID(), } _, err = s.Put(context.TODO(), item) if err != nil { return trace.Wrap(err) } return nil }
go
func (s *ClusterConfigurationService) SetClusterConfig(c services.ClusterConfig) error { value, err := services.GetClusterConfigMarshaler().Marshal(c) if err != nil { return trace.Wrap(err) } item := backend.Item{ Key: backend.Key(clusterConfigPrefix, generalPrefix), Value: value, ID: c.GetResourceID(), } _, err = s.Put(context.TODO(), item) if err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "s", "*", "ClusterConfigurationService", ")", "SetClusterConfig", "(", "c", "services", ".", "ClusterConfig", ")", "error", "{", "value", ",", "err", ":=", "services", ".", "GetClusterConfigMarshaler", "(", ")", ".", "Marshal", "(", "c", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "item", ":=", "backend", ".", "Item", "{", "Key", ":", "backend", ".", "Key", "(", "clusterConfigPrefix", ",", "generalPrefix", ")", ",", "Value", ":", "value", ",", "ID", ":", "c", ".", "GetResourceID", "(", ")", ",", "}", "\n\n", "_", ",", "err", "=", "s", ".", "Put", "(", "context", ".", "TODO", "(", ")", ",", "item", ")", "\n", "if", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// SetClusterConfig sets services.ClusterConfig on the backend.
[ "SetClusterConfig", "sets", "services", ".", "ClusterConfig", "on", "the", "backend", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L212-L230
22,994
gravitational/teleport
lib/httplib/httpheaders.go
SetNoCacheHeaders
func SetNoCacheHeaders(h http.Header) { h.Set("Cache-Control", "no-cache, no-store, must-revalidate") h.Set("Pragma", "no-cache") h.Set("Expires", "0") }
go
func SetNoCacheHeaders(h http.Header) { h.Set("Cache-Control", "no-cache, no-store, must-revalidate") h.Set("Pragma", "no-cache") h.Set("Expires", "0") }
[ "func", "SetNoCacheHeaders", "(", "h", "http", ".", "Header", ")", "{", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "}" ]
// SetNoCacheHeaders tells proxies and browsers do not cache the content
[ "SetNoCacheHeaders", "tells", "proxies", "and", "browsers", "do", "not", "cache", "the", "content" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/httplib/httpheaders.go#L27-L31
22,995
gravitational/teleport
lib/httplib/httpheaders.go
SetIndexHTMLHeaders
func SetIndexHTMLHeaders(h http.Header) { SetNoCacheHeaders(h) SetSameOriginIFrame(h) SetNoSniff(h) // X-Frame-Options indicates that the page can only be displayed in iframe on the same origin as the page itself h.Set("X-Frame-Options", "SAMEORIGIN") // X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages // from loading when they detect reflected cross-site scripting (XSS) attacks. h.Set("X-XSS-Protection", "1; mode=block") // Once a supported browser receives this header that browser will prevent any communications from // being sent over HTTP to the specified domain and will instead send all communications over HTTPS. // It also prevents HTTPS click through prompts on browsers h.Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains") // Prevent web browsers from using content sniffing to discover a file’s MIME type h.Set("X-Content-Type-Options", "nosniff") // Set content policy flags var cspValue = strings.Join([]string{ "script-src 'self'", // 'unsafe-inline' needed for reactjs inline styles "style-src 'self' 'unsafe-inline'", "object-src 'none'", "img-src 'self' data: blob:", }, ";") h.Set("Content-Security-Policy", cspValue) }
go
func SetIndexHTMLHeaders(h http.Header) { SetNoCacheHeaders(h) SetSameOriginIFrame(h) SetNoSniff(h) // X-Frame-Options indicates that the page can only be displayed in iframe on the same origin as the page itself h.Set("X-Frame-Options", "SAMEORIGIN") // X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages // from loading when they detect reflected cross-site scripting (XSS) attacks. h.Set("X-XSS-Protection", "1; mode=block") // Once a supported browser receives this header that browser will prevent any communications from // being sent over HTTP to the specified domain and will instead send all communications over HTTPS. // It also prevents HTTPS click through prompts on browsers h.Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains") // Prevent web browsers from using content sniffing to discover a file’s MIME type h.Set("X-Content-Type-Options", "nosniff") // Set content policy flags var cspValue = strings.Join([]string{ "script-src 'self'", // 'unsafe-inline' needed for reactjs inline styles "style-src 'self' 'unsafe-inline'", "object-src 'none'", "img-src 'self' data: blob:", }, ";") h.Set("Content-Security-Policy", cspValue) }
[ "func", "SetIndexHTMLHeaders", "(", "h", "http", ".", "Header", ")", "{", "SetNoCacheHeaders", "(", "h", ")", "\n", "SetSameOriginIFrame", "(", "h", ")", "\n", "SetNoSniff", "(", "h", ")", "\n\n", "// X-Frame-Options indicates that the page can only be displayed in iframe on the same origin as the page itself", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n\n", "// X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages", "// from loading when they detect reflected cross-site scripting (XSS) attacks.", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n\n", "// Once a supported browser receives this header that browser will prevent any communications from", "// being sent over HTTP to the specified domain and will instead send all communications over HTTPS.", "// It also prevents HTTPS click through prompts on browsers", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n\n", "// Prevent web browsers from using content sniffing to discover a file’s MIME type", "h", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n\n", "// Set content policy flags", "var", "cspValue", "=", "strings", ".", "Join", "(", "[", "]", "string", "{", "\"", "\"", ",", "// 'unsafe-inline' needed for reactjs inline styles", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "}", ",", "\"", "\"", ")", "\n\n", "h", ".", "Set", "(", "\"", "\"", ",", "cspValue", ")", "\n", "}" ]
// SetIndexHTMLHeaders sets security header flags for main index.html page
[ "SetIndexHTMLHeaders", "sets", "security", "header", "flags", "for", "main", "index", ".", "html", "page" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/httplib/httpheaders.go#L40-L70
22,996
gravitational/teleport
lib/kube/proxy/roundtrip.go
NewSpdyRoundTripperWithDialer
func NewSpdyRoundTripperWithDialer(cfg roundTripperConfig) *SpdyRoundTripper { return &SpdyRoundTripper{tlsConfig: cfg.tlsConfig, followRedirects: cfg.followRedirects, dialWithContext: cfg.dial, ctx: cfg.ctx, authCtx: cfg.authCtx, bearerToken: cfg.bearerToken} }
go
func NewSpdyRoundTripperWithDialer(cfg roundTripperConfig) *SpdyRoundTripper { return &SpdyRoundTripper{tlsConfig: cfg.tlsConfig, followRedirects: cfg.followRedirects, dialWithContext: cfg.dial, ctx: cfg.ctx, authCtx: cfg.authCtx, bearerToken: cfg.bearerToken} }
[ "func", "NewSpdyRoundTripperWithDialer", "(", "cfg", "roundTripperConfig", ")", "*", "SpdyRoundTripper", "{", "return", "&", "SpdyRoundTripper", "{", "tlsConfig", ":", "cfg", ".", "tlsConfig", ",", "followRedirects", ":", "cfg", ".", "followRedirects", ",", "dialWithContext", ":", "cfg", ".", "dial", ",", "ctx", ":", "cfg", ".", "ctx", ",", "authCtx", ":", "cfg", ".", "authCtx", ",", "bearerToken", ":", "cfg", ".", "bearerToken", "}", "\n", "}" ]
// NewSpdyRoundTripperWithDialer creates a new SpdyRoundTripper that will use // the specified tlsConfig. This function is mostly meant for unit tests.
[ "NewSpdyRoundTripperWithDialer", "creates", "a", "new", "SpdyRoundTripper", "that", "will", "use", "the", "specified", "tlsConfig", ".", "This", "function", "is", "mostly", "meant", "for", "unit", "tests", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/kube/proxy/roundtrip.go#L99-L101
22,997
gravitational/teleport
lib/kube/proxy/roundtrip.go
dial
func (s *SpdyRoundTripper) dial(req *http.Request) (net.Conn, error) { return s.dialWithoutProxy(req.URL) }
go
func (s *SpdyRoundTripper) dial(req *http.Request) (net.Conn, error) { return s.dialWithoutProxy(req.URL) }
[ "func", "(", "s", "*", "SpdyRoundTripper", ")", "dial", "(", "req", "*", "http", ".", "Request", ")", "(", "net", ".", "Conn", ",", "error", ")", "{", "return", "s", ".", "dialWithoutProxy", "(", "req", ".", "URL", ")", "\n", "}" ]
// dial dials the host specified by req
[ "dial", "dials", "the", "host", "specified", "by", "req" ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/kube/proxy/roundtrip.go#L125-L127
22,998
gravitational/teleport
lib/srv/authhandlers.go
CreateIdentityContext
func (h *AuthHandlers) CreateIdentityContext(sconn *ssh.ServerConn) (IdentityContext, error) { identity := IdentityContext{ TeleportUser: sconn.Permissions.Extensions[utils.CertTeleportUser], Certificate: []byte(sconn.Permissions.Extensions[utils.CertTeleportUserCertificate]), Login: sconn.User(), } clusterName, err := h.AccessPoint.GetClusterName() if err != nil { return IdentityContext{}, trace.Wrap(err) } certificate, err := identity.GetCertificate() if err != nil { return IdentityContext{}, trace.Wrap(err) } if certificate.ValidBefore != 0 { identity.CertValidBefore = time.Unix(int64(certificate.ValidBefore), 0) } certAuthority, err := h.authorityForCert(services.UserCA, certificate.SignatureKey) if err != nil { return IdentityContext{}, trace.Wrap(err) } identity.CertAuthority = certAuthority roleSet, err := h.fetchRoleSet(certificate, certAuthority, identity.TeleportUser, clusterName.GetClusterName()) if err != nil { return IdentityContext{}, trace.Wrap(err) } identity.RoleSet = roleSet return identity, nil }
go
func (h *AuthHandlers) CreateIdentityContext(sconn *ssh.ServerConn) (IdentityContext, error) { identity := IdentityContext{ TeleportUser: sconn.Permissions.Extensions[utils.CertTeleportUser], Certificate: []byte(sconn.Permissions.Extensions[utils.CertTeleportUserCertificate]), Login: sconn.User(), } clusterName, err := h.AccessPoint.GetClusterName() if err != nil { return IdentityContext{}, trace.Wrap(err) } certificate, err := identity.GetCertificate() if err != nil { return IdentityContext{}, trace.Wrap(err) } if certificate.ValidBefore != 0 { identity.CertValidBefore = time.Unix(int64(certificate.ValidBefore), 0) } certAuthority, err := h.authorityForCert(services.UserCA, certificate.SignatureKey) if err != nil { return IdentityContext{}, trace.Wrap(err) } identity.CertAuthority = certAuthority roleSet, err := h.fetchRoleSet(certificate, certAuthority, identity.TeleportUser, clusterName.GetClusterName()) if err != nil { return IdentityContext{}, trace.Wrap(err) } identity.RoleSet = roleSet return identity, nil }
[ "func", "(", "h", "*", "AuthHandlers", ")", "CreateIdentityContext", "(", "sconn", "*", "ssh", ".", "ServerConn", ")", "(", "IdentityContext", ",", "error", ")", "{", "identity", ":=", "IdentityContext", "{", "TeleportUser", ":", "sconn", ".", "Permissions", ".", "Extensions", "[", "utils", ".", "CertTeleportUser", "]", ",", "Certificate", ":", "[", "]", "byte", "(", "sconn", ".", "Permissions", ".", "Extensions", "[", "utils", ".", "CertTeleportUserCertificate", "]", ")", ",", "Login", ":", "sconn", ".", "User", "(", ")", ",", "}", "\n\n", "clusterName", ",", "err", ":=", "h", ".", "AccessPoint", ".", "GetClusterName", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "IdentityContext", "{", "}", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "certificate", ",", "err", ":=", "identity", ".", "GetCertificate", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "IdentityContext", "{", "}", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "if", "certificate", ".", "ValidBefore", "!=", "0", "{", "identity", ".", "CertValidBefore", "=", "time", ".", "Unix", "(", "int64", "(", "certificate", ".", "ValidBefore", ")", ",", "0", ")", "\n", "}", "\n\n", "certAuthority", ",", "err", ":=", "h", ".", "authorityForCert", "(", "services", ".", "UserCA", ",", "certificate", ".", "SignatureKey", ")", "\n", "if", "err", "!=", "nil", "{", "return", "IdentityContext", "{", "}", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "identity", ".", "CertAuthority", "=", "certAuthority", "\n\n", "roleSet", ",", "err", ":=", "h", ".", "fetchRoleSet", "(", "certificate", ",", "certAuthority", ",", "identity", ".", "TeleportUser", ",", "clusterName", ".", "GetClusterName", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "IdentityContext", "{", "}", ",", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n", "identity", ".", "RoleSet", "=", "roleSet", "\n\n", "return", "identity", ",", "nil", "\n", "}" ]
// BuildIdentityContext returns an IdentityContext populated with information // about the logged in user on the connection.
[ "BuildIdentityContext", "returns", "an", "IdentityContext", "populated", "with", "information", "about", "the", "logged", "in", "user", "on", "the", "connection", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/authhandlers.go#L59-L92
22,999
gravitational/teleport
lib/srv/authhandlers.go
CheckAgentForward
func (h *AuthHandlers) CheckAgentForward(ctx *ServerContext) error { if err := ctx.Identity.RoleSet.CheckAgentForward(ctx.Identity.Login); err != nil { return trace.Wrap(err) } return nil }
go
func (h *AuthHandlers) CheckAgentForward(ctx *ServerContext) error { if err := ctx.Identity.RoleSet.CheckAgentForward(ctx.Identity.Login); err != nil { return trace.Wrap(err) } return nil }
[ "func", "(", "h", "*", "AuthHandlers", ")", "CheckAgentForward", "(", "ctx", "*", "ServerContext", ")", "error", "{", "if", "err", ":=", "ctx", ".", "Identity", ".", "RoleSet", ".", "CheckAgentForward", "(", "ctx", ".", "Identity", ".", "Login", ")", ";", "err", "!=", "nil", "{", "return", "trace", ".", "Wrap", "(", "err", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CheckAgentForward checks if agent forwarding is allowed for the users RoleSet.
[ "CheckAgentForward", "checks", "if", "agent", "forwarding", "is", "allowed", "for", "the", "users", "RoleSet", "." ]
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/authhandlers.go#L95-L101