id
int32 0
167k
| repo
stringlengths 5
54
| path
stringlengths 4
155
| func_name
stringlengths 1
118
| original_string
stringlengths 52
85.5k
| language
stringclasses 1
value | code
stringlengths 52
85.5k
| code_tokens
listlengths 21
1.41k
| docstring
stringlengths 6
2.61k
| docstring_tokens
listlengths 3
215
| sha
stringlengths 40
40
| url
stringlengths 85
252
|
|---|---|---|---|---|---|---|---|---|---|---|---|
22,900
|
xo/xo
|
examples/django/postgres/djangocontenttype.xo.go
|
Update
|
func (dct *DjangoContentType) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !dct._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if dct._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE public.django_content_type SET (` +
`app_label, model` +
`) = ( ` +
`$1, $2` +
`) WHERE id = $3`
// run query
XOLog(sqlstr, dct.AppLabel, dct.Model, dct.ID)
_, err = db.Exec(sqlstr, dct.AppLabel, dct.Model, dct.ID)
return err
}
|
go
|
func (dct *DjangoContentType) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !dct._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if dct._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE public.django_content_type SET (` +
`app_label, model` +
`) = ( ` +
`$1, $2` +
`) WHERE id = $3`
// run query
XOLog(sqlstr, dct.AppLabel, dct.Model, dct.ID)
_, err = db.Exec(sqlstr, dct.AppLabel, dct.Model, dct.ID)
return err
}
|
[
"func",
"(",
"dct",
"*",
"DjangoContentType",
")",
"Update",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"dct",
".",
"_exists",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"dct",
".",
"_deleted",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`UPDATE public.django_content_type SET (`",
"+",
"`app_label, model`",
"+",
"`) = ( `",
"+",
"`$1, $2`",
"+",
"`) WHERE id = $3`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"dct",
".",
"AppLabel",
",",
"dct",
".",
"Model",
",",
"dct",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"dct",
".",
"AppLabel",
",",
"dct",
".",
"Model",
",",
"dct",
".",
"ID",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Update updates the DjangoContentType in the database.
|
[
"Update",
"updates",
"the",
"DjangoContentType",
"in",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangocontenttype.xo.go#L60-L84
|
22,901
|
xo/xo
|
examples/django/postgres/djangocontenttype.xo.go
|
Delete
|
func (dct *DjangoContentType) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !dct._exists {
return nil
}
// if deleted, bail
if dct._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM public.django_content_type WHERE id = $1`
// run query
XOLog(sqlstr, dct.ID)
_, err = db.Exec(sqlstr, dct.ID)
if err != nil {
return err
}
// set deleted
dct._deleted = true
return nil
}
|
go
|
func (dct *DjangoContentType) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !dct._exists {
return nil
}
// if deleted, bail
if dct._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM public.django_content_type WHERE id = $1`
// run query
XOLog(sqlstr, dct.ID)
_, err = db.Exec(sqlstr, dct.ID)
if err != nil {
return err
}
// set deleted
dct._deleted = true
return nil
}
|
[
"func",
"(",
"dct",
"*",
"DjangoContentType",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"dct",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"dct",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM public.django_content_type WHERE id = $1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"dct",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"dct",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"dct",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the DjangoContentType from the database.
|
[
"Delete",
"deletes",
"the",
"DjangoContentType",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangocontenttype.xo.go#L131-L158
|
22,902
|
xo/xo
|
examples/django/oracle/authgrouppermission.xo.go
|
AuthGroupPermissionByGroupIDPermissionID
|
func AuthGroupPermissionByGroupIDPermissionID(db XODB, groupID float64, permissionID float64) (*AuthGroupPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, group_id, permission_id ` +
`FROM django.auth_group_permissions ` +
`WHERE group_id = :1 AND permission_id = :2`
// run query
XOLog(sqlstr, groupID, permissionID)
agp := AuthGroupPermission{
_exists: true,
}
err = db.QueryRow(sqlstr, groupID, permissionID).Scan(&agp.ID, &agp.GroupID, &agp.PermissionID)
if err != nil {
return nil, err
}
return &agp, nil
}
|
go
|
func AuthGroupPermissionByGroupIDPermissionID(db XODB, groupID float64, permissionID float64) (*AuthGroupPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, group_id, permission_id ` +
`FROM django.auth_group_permissions ` +
`WHERE group_id = :1 AND permission_id = :2`
// run query
XOLog(sqlstr, groupID, permissionID)
agp := AuthGroupPermission{
_exists: true,
}
err = db.QueryRow(sqlstr, groupID, permissionID).Scan(&agp.ID, &agp.GroupID, &agp.PermissionID)
if err != nil {
return nil, err
}
return &agp, nil
}
|
[
"func",
"AuthGroupPermissionByGroupIDPermissionID",
"(",
"db",
"XODB",
",",
"groupID",
"float64",
",",
"permissionID",
"float64",
")",
"(",
"*",
"AuthGroupPermission",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, group_id, permission_id `",
"+",
"`FROM django.auth_group_permissions `",
"+",
"`WHERE group_id = :1 AND permission_id = :2`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"groupID",
",",
"permissionID",
")",
"\n",
"agp",
":=",
"AuthGroupPermission",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"groupID",
",",
"permissionID",
")",
".",
"Scan",
"(",
"&",
"agp",
".",
"ID",
",",
"&",
"agp",
".",
"GroupID",
",",
"&",
"agp",
".",
"PermissionID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"agp",
",",
"nil",
"\n",
"}"
] |
// AuthGroupPermissionByGroupIDPermissionID retrieves a row from 'django.auth_group_permissions' as a AuthGroupPermission.
//
// Generated from index 'auth_gr_group_id_0cd325b0_uniq'.
|
[
"AuthGroupPermissionByGroupIDPermissionID",
"retrieves",
"a",
"row",
"from",
"django",
".",
"auth_group_permissions",
"as",
"a",
"AuthGroupPermission",
".",
"Generated",
"from",
"index",
"auth_gr_group_id_0cd325b0_uniq",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authgrouppermission.xo.go#L145-L166
|
22,903
|
xo/xo
|
models/procparam.xo.go
|
PgProcParams
|
func PgProcParams(db XODB, schema string, proc string) ([]*ProcParam, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) ` + // ::varchar AS param_type
`FROM pg_proc p ` +
`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` +
`WHERE n.nspname = $1 AND p.proname = $2`
// run query
XOLog(sqlstr, schema, proc)
q, err := db.Query(sqlstr, schema, proc)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*ProcParam{}
for q.Next() {
pp := ProcParam{}
// scan
err = q.Scan(&pp.ParamType)
if err != nil {
return nil, err
}
res = append(res, &pp)
}
return res, nil
}
|
go
|
func PgProcParams(db XODB, schema string, proc string) ([]*ProcParam, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) ` + // ::varchar AS param_type
`FROM pg_proc p ` +
`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` +
`WHERE n.nspname = $1 AND p.proname = $2`
// run query
XOLog(sqlstr, schema, proc)
q, err := db.Query(sqlstr, schema, proc)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*ProcParam{}
for q.Next() {
pp := ProcParam{}
// scan
err = q.Scan(&pp.ParamType)
if err != nil {
return nil, err
}
res = append(res, &pp)
}
return res, nil
}
|
[
"func",
"PgProcParams",
"(",
"db",
"XODB",
",",
"schema",
"string",
",",
"proc",
"string",
")",
"(",
"[",
"]",
"*",
"ProcParam",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`UNNEST(STRING_TO_ARRAY(oidvectortypes(p.proargtypes), ', ')) `",
"+",
"// ::varchar AS param_type",
"`FROM pg_proc p `",
"+",
"`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid `",
"+",
"`WHERE n.nspname = $1 AND p.proname = $2`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"schema",
",",
"proc",
")",
"\n",
"q",
",",
"err",
":=",
"db",
".",
"Query",
"(",
"sqlstr",
",",
"schema",
",",
"proc",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"q",
".",
"Close",
"(",
")",
"\n\n",
"// load results",
"res",
":=",
"[",
"]",
"*",
"ProcParam",
"{",
"}",
"\n",
"for",
"q",
".",
"Next",
"(",
")",
"{",
"pp",
":=",
"ProcParam",
"{",
"}",
"\n\n",
"// scan",
"err",
"=",
"q",
".",
"Scan",
"(",
"&",
"pp",
".",
"ParamType",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
"=",
"append",
"(",
"res",
",",
"&",
"pp",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// PgProcParams runs a custom query, returning results as ProcParam.
|
[
"PgProcParams",
"runs",
"a",
"custom",
"query",
"returning",
"results",
"as",
"ProcParam",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/procparam.xo.go#L12-L45
|
22,904
|
xo/xo
|
examples/django/mysql/authusergroup.xo.go
|
AuthUserGroupsByGroupID
|
func AuthUserGroupsByGroupID(db XODB, groupID int) ([]*AuthUserGroup, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, group_id ` +
`FROM django.auth_user_groups ` +
`WHERE group_id = ?`
// run query
XOLog(sqlstr, groupID)
q, err := db.Query(sqlstr, groupID)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*AuthUserGroup{}
for q.Next() {
aug := AuthUserGroup{
_exists: true,
}
// scan
err = q.Scan(&aug.ID, &aug.UserID, &aug.GroupID)
if err != nil {
return nil, err
}
res = append(res, &aug)
}
return res, nil
}
|
go
|
func AuthUserGroupsByGroupID(db XODB, groupID int) ([]*AuthUserGroup, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, group_id ` +
`FROM django.auth_user_groups ` +
`WHERE group_id = ?`
// run query
XOLog(sqlstr, groupID)
q, err := db.Query(sqlstr, groupID)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*AuthUserGroup{}
for q.Next() {
aug := AuthUserGroup{
_exists: true,
}
// scan
err = q.Scan(&aug.ID, &aug.UserID, &aug.GroupID)
if err != nil {
return nil, err
}
res = append(res, &aug)
}
return res, nil
}
|
[
"func",
"AuthUserGroupsByGroupID",
"(",
"db",
"XODB",
",",
"groupID",
"int",
")",
"(",
"[",
"]",
"*",
"AuthUserGroup",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, user_id, group_id `",
"+",
"`FROM django.auth_user_groups `",
"+",
"`WHERE group_id = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"groupID",
")",
"\n",
"q",
",",
"err",
":=",
"db",
".",
"Query",
"(",
"sqlstr",
",",
"groupID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"q",
".",
"Close",
"(",
")",
"\n\n",
"// load results",
"res",
":=",
"[",
"]",
"*",
"AuthUserGroup",
"{",
"}",
"\n",
"for",
"q",
".",
"Next",
"(",
")",
"{",
"aug",
":=",
"AuthUserGroup",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"// scan",
"err",
"=",
"q",
".",
"Scan",
"(",
"&",
"aug",
".",
"ID",
",",
"&",
"aug",
".",
"UserID",
",",
"&",
"aug",
".",
"GroupID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
"=",
"append",
"(",
"res",
",",
"&",
"aug",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// AuthUserGroupsByGroupID retrieves a row from 'django.auth_user_groups' as a AuthUserGroup.
//
// Generated from index 'auth_user_groups_group_id_97559544_fk_auth_group_id'.
|
[
"AuthUserGroupsByGroupID",
"retrieves",
"a",
"row",
"from",
"django",
".",
"auth_user_groups",
"as",
"a",
"AuthUserGroup",
".",
"Generated",
"from",
"index",
"auth_user_groups_group_id_97559544_fk_auth_group_id",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authusergroup.xo.go#L147-L181
|
22,905
|
xo/xo
|
examples/django/mysql/authusergroup.xo.go
|
AuthUserGroupByID
|
func AuthUserGroupByID(db XODB, id int) (*AuthUserGroup, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, group_id ` +
`FROM django.auth_user_groups ` +
`WHERE id = ?`
// run query
XOLog(sqlstr, id)
aug := AuthUserGroup{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&aug.ID, &aug.UserID, &aug.GroupID)
if err != nil {
return nil, err
}
return &aug, nil
}
|
go
|
func AuthUserGroupByID(db XODB, id int) (*AuthUserGroup, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, group_id ` +
`FROM django.auth_user_groups ` +
`WHERE id = ?`
// run query
XOLog(sqlstr, id)
aug := AuthUserGroup{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&aug.ID, &aug.UserID, &aug.GroupID)
if err != nil {
return nil, err
}
return &aug, nil
}
|
[
"func",
"AuthUserGroupByID",
"(",
"db",
"XODB",
",",
"id",
"int",
")",
"(",
"*",
"AuthUserGroup",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, user_id, group_id `",
"+",
"`FROM django.auth_user_groups `",
"+",
"`WHERE id = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"id",
")",
"\n",
"aug",
":=",
"AuthUserGroup",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"id",
")",
".",
"Scan",
"(",
"&",
"aug",
".",
"ID",
",",
"&",
"aug",
".",
"UserID",
",",
"&",
"aug",
".",
"GroupID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"aug",
",",
"nil",
"\n",
"}"
] |
// AuthUserGroupByID retrieves a row from 'django.auth_user_groups' as a AuthUserGroup.
//
// Generated from index 'auth_user_groups_id_pkey'.
|
[
"AuthUserGroupByID",
"retrieves",
"a",
"row",
"from",
"django",
".",
"auth_user_groups",
"as",
"a",
"AuthUserGroup",
".",
"Generated",
"from",
"index",
"auth_user_groups_id_pkey",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authusergroup.xo.go#L186-L207
|
22,906
|
xo/xo
|
loaders/mssql.go
|
MsParseType
|
func MsParseType(args *internal.ArgType, dt string, nullable bool) (int, string, string) {
precision := 0
nilVal := "nil"
// extract precision
dt, precision, _ = args.ParsePrecision(dt)
var typ string
switch dt {
case "tinyint", "bit":
nilVal = "false"
typ = "bool"
if nullable {
nilVal = "sql.NullBool{}"
typ = "sql.NullBool"
}
case "char", "varchar", "text", "nchar", "nvarchar", "ntext", "smallmoney", "money":
nilVal = `""`
typ = "string"
if nullable {
nilVal = "sql.NullString{}"
typ = "sql.NullString"
}
case "smallint":
nilVal = "0"
typ = "int16"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "int":
nilVal = "0"
typ = args.Int32Type
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "bigint":
nilVal = "0"
typ = "int64"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "smallserial":
nilVal = "0"
typ = "uint16"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "serial":
nilVal = "0"
typ = args.Uint32Type
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "bigserial":
nilVal = "0"
typ = "uint64"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "real":
nilVal = "0.0"
typ = "float32"
if nullable {
nilVal = "sql.NullFloat64{}"
typ = "sql.NullFloat64"
}
case "numeric", "decimal":
nilVal = "0.0"
typ = "float64"
if nullable {
nilVal = "sql.NullFloat64{}"
typ = "sql.NullFloat64"
}
case "binary", "varbinary":
typ = "[]byte"
case "datetime", "datetime2", "timestamp":
nilVal = "time.Time{}"
typ = "time.Time"
case "time with time zone", "time without time zone", "timestamp without time zone":
nilVal = "0"
typ = "int64"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "interval":
typ = "*time.Duration"
default:
if strings.HasPrefix(dt, args.Schema+".") {
// in the same schema, so chop off
typ = snaker.SnakeToCamelIdentifier(dt[len(args.Schema)+1:])
nilVal = typ + "(0)"
} else {
typ = snaker.SnakeToCamelIdentifier(dt)
nilVal = typ + "{}"
}
}
return precision, nilVal, typ
}
|
go
|
func MsParseType(args *internal.ArgType, dt string, nullable bool) (int, string, string) {
precision := 0
nilVal := "nil"
// extract precision
dt, precision, _ = args.ParsePrecision(dt)
var typ string
switch dt {
case "tinyint", "bit":
nilVal = "false"
typ = "bool"
if nullable {
nilVal = "sql.NullBool{}"
typ = "sql.NullBool"
}
case "char", "varchar", "text", "nchar", "nvarchar", "ntext", "smallmoney", "money":
nilVal = `""`
typ = "string"
if nullable {
nilVal = "sql.NullString{}"
typ = "sql.NullString"
}
case "smallint":
nilVal = "0"
typ = "int16"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "int":
nilVal = "0"
typ = args.Int32Type
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "bigint":
nilVal = "0"
typ = "int64"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "smallserial":
nilVal = "0"
typ = "uint16"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "serial":
nilVal = "0"
typ = args.Uint32Type
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "bigserial":
nilVal = "0"
typ = "uint64"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "real":
nilVal = "0.0"
typ = "float32"
if nullable {
nilVal = "sql.NullFloat64{}"
typ = "sql.NullFloat64"
}
case "numeric", "decimal":
nilVal = "0.0"
typ = "float64"
if nullable {
nilVal = "sql.NullFloat64{}"
typ = "sql.NullFloat64"
}
case "binary", "varbinary":
typ = "[]byte"
case "datetime", "datetime2", "timestamp":
nilVal = "time.Time{}"
typ = "time.Time"
case "time with time zone", "time without time zone", "timestamp without time zone":
nilVal = "0"
typ = "int64"
if nullable {
nilVal = "sql.NullInt64{}"
typ = "sql.NullInt64"
}
case "interval":
typ = "*time.Duration"
default:
if strings.HasPrefix(dt, args.Schema+".") {
// in the same schema, so chop off
typ = snaker.SnakeToCamelIdentifier(dt[len(args.Schema)+1:])
nilVal = typ + "(0)"
} else {
typ = snaker.SnakeToCamelIdentifier(dt)
nilVal = typ + "{}"
}
}
return precision, nilVal, typ
}
|
[
"func",
"MsParseType",
"(",
"args",
"*",
"internal",
".",
"ArgType",
",",
"dt",
"string",
",",
"nullable",
"bool",
")",
"(",
"int",
",",
"string",
",",
"string",
")",
"{",
"precision",
":=",
"0",
"\n",
"nilVal",
":=",
"\"",
"\"",
"\n\n",
"// extract precision",
"dt",
",",
"precision",
",",
"_",
"=",
"args",
".",
"ParsePrecision",
"(",
"dt",
")",
"\n\n",
"var",
"typ",
"string",
"\n",
"switch",
"dt",
"{",
"case",
"\"",
"\"",
",",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
":",
"nilVal",
"=",
"`\"\"`",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"args",
".",
"Int32Type",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"args",
".",
"Uint32Type",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n",
"case",
"\"",
"\"",
",",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
",",
"\"",
"\"",
":",
"typ",
"=",
"\"",
"\"",
"\n\n",
"case",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n\n",
"case",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
":",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"if",
"nullable",
"{",
"nilVal",
"=",
"\"",
"\"",
"\n",
"typ",
"=",
"\"",
"\"",
"\n",
"}",
"\n\n",
"case",
"\"",
"\"",
":",
"typ",
"=",
"\"",
"\"",
"\n\n",
"default",
":",
"if",
"strings",
".",
"HasPrefix",
"(",
"dt",
",",
"args",
".",
"Schema",
"+",
"\"",
"\"",
")",
"{",
"// in the same schema, so chop off",
"typ",
"=",
"snaker",
".",
"SnakeToCamelIdentifier",
"(",
"dt",
"[",
"len",
"(",
"args",
".",
"Schema",
")",
"+",
"1",
":",
"]",
")",
"\n",
"nilVal",
"=",
"typ",
"+",
"\"",
"\"",
"\n",
"}",
"else",
"{",
"typ",
"=",
"snaker",
".",
"SnakeToCamelIdentifier",
"(",
"dt",
")",
"\n",
"nilVal",
"=",
"typ",
"+",
"\"",
"\"",
"\n",
"}",
"\n",
"}",
"\n\n",
"return",
"precision",
",",
"nilVal",
",",
"typ",
"\n",
"}"
] |
// MsParseType parse a mssql type into a Go type based on the column
// definition.
|
[
"MsParseType",
"parse",
"a",
"mssql",
"type",
"into",
"a",
"Go",
"type",
"based",
"on",
"the",
"column",
"definition",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L68-L182
|
22,907
|
xo/xo
|
loaders/mssql.go
|
MsQueryColumns
|
func MsQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) {
var err error
// process inspect -- cannot have 'order by' in a CREATE VIEW
ins := []string{}
for _, l := range inspect {
if !strings.HasPrefix(strings.ToUpper(l), "ORDER BY ") {
ins = append(ins, l)
}
}
// create temporary view xoid
xoid := "_xo_" + internal.GenRandomID()
viewq := `CREATE VIEW ` + xoid + ` AS ` + strings.Join(ins, "\n")
models.XOLog(viewq)
_, err = args.DB.Exec(viewq)
if err != nil {
return nil, err
}
// load columns
cols, err := models.MsTableColumns(args.DB, args.Schema, xoid)
// drop inspect view
dropq := `DROP VIEW ` + xoid
models.XOLog(dropq)
_, _ = args.DB.Exec(dropq)
// load column information
return cols, err
}
|
go
|
func MsQueryColumns(args *internal.ArgType, inspect []string) ([]*models.Column, error) {
var err error
// process inspect -- cannot have 'order by' in a CREATE VIEW
ins := []string{}
for _, l := range inspect {
if !strings.HasPrefix(strings.ToUpper(l), "ORDER BY ") {
ins = append(ins, l)
}
}
// create temporary view xoid
xoid := "_xo_" + internal.GenRandomID()
viewq := `CREATE VIEW ` + xoid + ` AS ` + strings.Join(ins, "\n")
models.XOLog(viewq)
_, err = args.DB.Exec(viewq)
if err != nil {
return nil, err
}
// load columns
cols, err := models.MsTableColumns(args.DB, args.Schema, xoid)
// drop inspect view
dropq := `DROP VIEW ` + xoid
models.XOLog(dropq)
_, _ = args.DB.Exec(dropq)
// load column information
return cols, err
}
|
[
"func",
"MsQueryColumns",
"(",
"args",
"*",
"internal",
".",
"ArgType",
",",
"inspect",
"[",
"]",
"string",
")",
"(",
"[",
"]",
"*",
"models",
".",
"Column",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// process inspect -- cannot have 'order by' in a CREATE VIEW",
"ins",
":=",
"[",
"]",
"string",
"{",
"}",
"\n",
"for",
"_",
",",
"l",
":=",
"range",
"inspect",
"{",
"if",
"!",
"strings",
".",
"HasPrefix",
"(",
"strings",
".",
"ToUpper",
"(",
"l",
")",
",",
"\"",
"\"",
")",
"{",
"ins",
"=",
"append",
"(",
"ins",
",",
"l",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// create temporary view xoid",
"xoid",
":=",
"\"",
"\"",
"+",
"internal",
".",
"GenRandomID",
"(",
")",
"\n",
"viewq",
":=",
"`CREATE VIEW `",
"+",
"xoid",
"+",
"` AS `",
"+",
"strings",
".",
"Join",
"(",
"ins",
",",
"\"",
"\\n",
"\"",
")",
"\n",
"models",
".",
"XOLog",
"(",
"viewq",
")",
"\n",
"_",
",",
"err",
"=",
"args",
".",
"DB",
".",
"Exec",
"(",
"viewq",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// load columns",
"cols",
",",
"err",
":=",
"models",
".",
"MsTableColumns",
"(",
"args",
".",
"DB",
",",
"args",
".",
"Schema",
",",
"xoid",
")",
"\n\n",
"// drop inspect view",
"dropq",
":=",
"`DROP VIEW `",
"+",
"xoid",
"\n",
"models",
".",
"XOLog",
"(",
"dropq",
")",
"\n",
"_",
",",
"_",
"=",
"args",
".",
"DB",
".",
"Exec",
"(",
"dropq",
")",
"\n\n",
"// load column information",
"return",
"cols",
",",
"err",
"\n",
"}"
] |
// MsQueryColumns parses the query and generates a type for it.
|
[
"MsQueryColumns",
"parses",
"the",
"query",
"and",
"generates",
"a",
"type",
"for",
"it",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L185-L215
|
22,908
|
xo/xo
|
loaders/mssql.go
|
MsTables
|
func MsTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) {
var err error
// get the tables
rows, err := models.MsTables(db, schema, relkind)
if err != nil {
return nil, err
}
// get the tables that have Identity included
identities, err := models.MsIdentities(db, schema)
if err != nil {
// Set it to an empty set on error.
identities = []*models.MsIdentity{}
}
// Add information about manual FK.
var tables []*models.Table
for _, row := range rows {
manualPk := true
// Look for a match in the table name where it contains the identity
for _, identity := range identities {
if identity.TableName == row.TableName {
manualPk = false
}
}
tables = append(tables, &models.Table{
TableName: row.TableName,
Type: row.Type,
ManualPk: manualPk,
})
}
return tables, nil
}
|
go
|
func MsTables(db models.XODB, schema string, relkind string) ([]*models.Table, error) {
var err error
// get the tables
rows, err := models.MsTables(db, schema, relkind)
if err != nil {
return nil, err
}
// get the tables that have Identity included
identities, err := models.MsIdentities(db, schema)
if err != nil {
// Set it to an empty set on error.
identities = []*models.MsIdentity{}
}
// Add information about manual FK.
var tables []*models.Table
for _, row := range rows {
manualPk := true
// Look for a match in the table name where it contains the identity
for _, identity := range identities {
if identity.TableName == row.TableName {
manualPk = false
}
}
tables = append(tables, &models.Table{
TableName: row.TableName,
Type: row.Type,
ManualPk: manualPk,
})
}
return tables, nil
}
|
[
"func",
"MsTables",
"(",
"db",
"models",
".",
"XODB",
",",
"schema",
"string",
",",
"relkind",
"string",
")",
"(",
"[",
"]",
"*",
"models",
".",
"Table",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// get the tables",
"rows",
",",
"err",
":=",
"models",
".",
"MsTables",
"(",
"db",
",",
"schema",
",",
"relkind",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"// get the tables that have Identity included",
"identities",
",",
"err",
":=",
"models",
".",
"MsIdentities",
"(",
"db",
",",
"schema",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// Set it to an empty set on error.",
"identities",
"=",
"[",
"]",
"*",
"models",
".",
"MsIdentity",
"{",
"}",
"\n",
"}",
"\n\n",
"// Add information about manual FK.",
"var",
"tables",
"[",
"]",
"*",
"models",
".",
"Table",
"\n",
"for",
"_",
",",
"row",
":=",
"range",
"rows",
"{",
"manualPk",
":=",
"true",
"\n",
"// Look for a match in the table name where it contains the identity",
"for",
"_",
",",
"identity",
":=",
"range",
"identities",
"{",
"if",
"identity",
".",
"TableName",
"==",
"row",
".",
"TableName",
"{",
"manualPk",
"=",
"false",
"\n",
"}",
"\n",
"}",
"\n",
"tables",
"=",
"append",
"(",
"tables",
",",
"&",
"models",
".",
"Table",
"{",
"TableName",
":",
"row",
".",
"TableName",
",",
"Type",
":",
"row",
".",
"Type",
",",
"ManualPk",
":",
"manualPk",
",",
"}",
")",
"\n",
"}",
"\n\n",
"return",
"tables",
",",
"nil",
"\n",
"}"
] |
// MsTables returns the MsSQL tables with the manual PK information added.
// ManualPk is true when the table's primary key is not an identity.
|
[
"MsTables",
"returns",
"the",
"MsSQL",
"tables",
"with",
"the",
"manual",
"PK",
"information",
"added",
".",
"ManualPk",
"is",
"true",
"when",
"the",
"table",
"s",
"primary",
"key",
"is",
"not",
"an",
"identity",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/loaders/mssql.go#L219-L253
|
22,909
|
xo/xo
|
examples/django/mysql/djangoadminlog.xo.go
|
Delete
|
func (dal *DjangoAdminLog) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !dal._exists {
return nil
}
// if deleted, bail
if dal._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.django_admin_log WHERE id = ?`
// run query
XOLog(sqlstr, dal.ID)
_, err = db.Exec(sqlstr, dal.ID)
if err != nil {
return err
}
// set deleted
dal._deleted = true
return nil
}
|
go
|
func (dal *DjangoAdminLog) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !dal._exists {
return nil
}
// if deleted, bail
if dal._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.django_admin_log WHERE id = ?`
// run query
XOLog(sqlstr, dal.ID)
_, err = db.Exec(sqlstr, dal.ID)
if err != nil {
return err
}
// set deleted
dal._deleted = true
return nil
}
|
[
"func",
"(",
"dal",
"*",
"DjangoAdminLog",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"dal",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"dal",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM django.django_admin_log WHERE id = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"dal",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"dal",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"dal",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the DjangoAdminLog from the database.
|
[
"Delete",
"deletes",
"the",
"DjangoAdminLog",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangoadminlog.xo.go#L108-L135
|
22,910
|
xo/xo
|
examples/django/mysql/djangosession.xo.go
|
DjangoSessionsByExpireDate
|
func DjangoSessionsByExpireDate(db XODB, expireDate *time.Time) ([]*DjangoSession, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`session_key, session_data, expire_date ` +
`FROM django.django_session ` +
`WHERE expire_date = ?`
// run query
XOLog(sqlstr, expireDate)
q, err := db.Query(sqlstr, expireDate)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*DjangoSession{}
for q.Next() {
ds := DjangoSession{
_exists: true,
}
// scan
err = q.Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate)
if err != nil {
return nil, err
}
res = append(res, &ds)
}
return res, nil
}
|
go
|
func DjangoSessionsByExpireDate(db XODB, expireDate *time.Time) ([]*DjangoSession, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`session_key, session_data, expire_date ` +
`FROM django.django_session ` +
`WHERE expire_date = ?`
// run query
XOLog(sqlstr, expireDate)
q, err := db.Query(sqlstr, expireDate)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*DjangoSession{}
for q.Next() {
ds := DjangoSession{
_exists: true,
}
// scan
err = q.Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate)
if err != nil {
return nil, err
}
res = append(res, &ds)
}
return res, nil
}
|
[
"func",
"DjangoSessionsByExpireDate",
"(",
"db",
"XODB",
",",
"expireDate",
"*",
"time",
".",
"Time",
")",
"(",
"[",
"]",
"*",
"DjangoSession",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`session_key, session_data, expire_date `",
"+",
"`FROM django.django_session `",
"+",
"`WHERE expire_date = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"expireDate",
")",
"\n",
"q",
",",
"err",
":=",
"db",
".",
"Query",
"(",
"sqlstr",
",",
"expireDate",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"q",
".",
"Close",
"(",
")",
"\n\n",
"// load results",
"res",
":=",
"[",
"]",
"*",
"DjangoSession",
"{",
"}",
"\n",
"for",
"q",
".",
"Next",
"(",
")",
"{",
"ds",
":=",
"DjangoSession",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"// scan",
"err",
"=",
"q",
".",
"Scan",
"(",
"&",
"ds",
".",
"SessionKey",
",",
"&",
"ds",
".",
"SessionData",
",",
"&",
"ds",
".",
"ExpireDate",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
"=",
"append",
"(",
"res",
",",
"&",
"ds",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// DjangoSessionsByExpireDate retrieves a row from 'django.django_session' as a DjangoSession.
//
// Generated from index 'django_session_de54fa62'.
|
[
"DjangoSessionsByExpireDate",
"retrieves",
"a",
"row",
"from",
"django",
".",
"django_session",
"as",
"a",
"DjangoSession",
".",
"Generated",
"from",
"index",
"django_session_de54fa62",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangosession.xo.go#L127-L161
|
22,911
|
xo/xo
|
examples/django/mysql/djangosession.xo.go
|
DjangoSessionBySessionKey
|
func DjangoSessionBySessionKey(db XODB, sessionKey string) (*DjangoSession, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`session_key, session_data, expire_date ` +
`FROM django.django_session ` +
`WHERE session_key = ?`
// run query
XOLog(sqlstr, sessionKey)
ds := DjangoSession{
_exists: true,
}
err = db.QueryRow(sqlstr, sessionKey).Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate)
if err != nil {
return nil, err
}
return &ds, nil
}
|
go
|
func DjangoSessionBySessionKey(db XODB, sessionKey string) (*DjangoSession, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`session_key, session_data, expire_date ` +
`FROM django.django_session ` +
`WHERE session_key = ?`
// run query
XOLog(sqlstr, sessionKey)
ds := DjangoSession{
_exists: true,
}
err = db.QueryRow(sqlstr, sessionKey).Scan(&ds.SessionKey, &ds.SessionData, &ds.ExpireDate)
if err != nil {
return nil, err
}
return &ds, nil
}
|
[
"func",
"DjangoSessionBySessionKey",
"(",
"db",
"XODB",
",",
"sessionKey",
"string",
")",
"(",
"*",
"DjangoSession",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`session_key, session_data, expire_date `",
"+",
"`FROM django.django_session `",
"+",
"`WHERE session_key = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"sessionKey",
")",
"\n",
"ds",
":=",
"DjangoSession",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"sessionKey",
")",
".",
"Scan",
"(",
"&",
"ds",
".",
"SessionKey",
",",
"&",
"ds",
".",
"SessionData",
",",
"&",
"ds",
".",
"ExpireDate",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"ds",
",",
"nil",
"\n",
"}"
] |
// DjangoSessionBySessionKey retrieves a row from 'django.django_session' as a DjangoSession.
//
// Generated from index 'django_session_session_key_pkey'.
|
[
"DjangoSessionBySessionKey",
"retrieves",
"a",
"row",
"from",
"django",
".",
"django_session",
"as",
"a",
"DjangoSession",
".",
"Generated",
"from",
"index",
"django_session_session_key_pkey",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/djangosession.xo.go#L166-L187
|
22,912
|
xo/xo
|
examples/django/mysql/authuseruserpermission.xo.go
|
Update
|
func (auup *AuthUserUserPermission) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !auup._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if auup._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE django.auth_user_user_permissions SET ` +
`user_id = ?, permission_id = ?` +
` WHERE id = ?`
// run query
XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID)
_, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID)
return err
}
|
go
|
func (auup *AuthUserUserPermission) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !auup._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if auup._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE django.auth_user_user_permissions SET ` +
`user_id = ?, permission_id = ?` +
` WHERE id = ?`
// run query
XOLog(sqlstr, auup.UserID, auup.PermissionID, auup.ID)
_, err = db.Exec(sqlstr, auup.UserID, auup.PermissionID, auup.ID)
return err
}
|
[
"func",
"(",
"auup",
"*",
"AuthUserUserPermission",
")",
"Update",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"auup",
".",
"_exists",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"auup",
".",
"_deleted",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`UPDATE django.auth_user_user_permissions SET `",
"+",
"`user_id = ?, permission_id = ?`",
"+",
"` WHERE id = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"auup",
".",
"UserID",
",",
"auup",
".",
"PermissionID",
",",
"auup",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"auup",
".",
"UserID",
",",
"auup",
".",
"PermissionID",
",",
"auup",
".",
"ID",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Update updates the AuthUserUserPermission in the database.
|
[
"Update",
"updates",
"the",
"AuthUserUserPermission",
"in",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/mysql/authuseruserpermission.xo.go#L67-L89
|
22,913
|
xo/xo
|
examples/django/oracle/djangomigration.xo.go
|
Update
|
func (dm *DjangoMigration) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !dm._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if dm._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE django.django_migrations SET ` +
`app = :1, name = :2, applied = :3` +
` WHERE id = :4`
// run query
XOLog(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID)
_, err = db.Exec(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID)
return err
}
|
go
|
func (dm *DjangoMigration) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !dm._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if dm._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE django.django_migrations SET ` +
`app = :1, name = :2, applied = :3` +
` WHERE id = :4`
// run query
XOLog(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID)
_, err = db.Exec(sqlstr, dm.App, dm.Name, dm.Applied, dm.ID)
return err
}
|
[
"func",
"(",
"dm",
"*",
"DjangoMigration",
")",
"Update",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"dm",
".",
"_exists",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"dm",
".",
"_deleted",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`UPDATE django.django_migrations SET `",
"+",
"`app = :1, name = :2, applied = :3`",
"+",
"` WHERE id = :4`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"dm",
".",
"App",
",",
"dm",
".",
"Name",
",",
"dm",
".",
"Applied",
",",
"dm",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"dm",
".",
"App",
",",
"dm",
".",
"Name",
",",
"dm",
".",
"Applied",
",",
"dm",
".",
"ID",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Update updates the DjangoMigration in the database.
|
[
"Update",
"updates",
"the",
"DjangoMigration",
"in",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L70-L92
|
22,914
|
xo/xo
|
examples/django/oracle/djangomigration.xo.go
|
Delete
|
func (dm *DjangoMigration) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !dm._exists {
return nil
}
// if deleted, bail
if dm._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.django_migrations WHERE id = :1`
// run query
XOLog(sqlstr, dm.ID)
_, err = db.Exec(sqlstr, dm.ID)
if err != nil {
return err
}
// set deleted
dm._deleted = true
return nil
}
|
go
|
func (dm *DjangoMigration) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !dm._exists {
return nil
}
// if deleted, bail
if dm._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.django_migrations WHERE id = :1`
// run query
XOLog(sqlstr, dm.ID)
_, err = db.Exec(sqlstr, dm.ID)
if err != nil {
return err
}
// set deleted
dm._deleted = true
return nil
}
|
[
"func",
"(",
"dm",
"*",
"DjangoMigration",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"dm",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"dm",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM django.django_migrations WHERE id = :1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"dm",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"dm",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"dm",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the DjangoMigration from the database.
|
[
"Delete",
"deletes",
"the",
"DjangoMigration",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L104-L131
|
22,915
|
xo/xo
|
examples/django/oracle/djangomigration.xo.go
|
DjangoMigrationByID
|
func DjangoMigrationByID(db XODB, id float64) (*DjangoMigration, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, app, name, applied ` +
`FROM django.django_migrations ` +
`WHERE id = :1`
// run query
XOLog(sqlstr, id)
dm := DjangoMigration{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&dm.ID, &dm.App, &dm.Name, &dm.Applied)
if err != nil {
return nil, err
}
return &dm, nil
}
|
go
|
func DjangoMigrationByID(db XODB, id float64) (*DjangoMigration, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, app, name, applied ` +
`FROM django.django_migrations ` +
`WHERE id = :1`
// run query
XOLog(sqlstr, id)
dm := DjangoMigration{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&dm.ID, &dm.App, &dm.Name, &dm.Applied)
if err != nil {
return nil, err
}
return &dm, nil
}
|
[
"func",
"DjangoMigrationByID",
"(",
"db",
"XODB",
",",
"id",
"float64",
")",
"(",
"*",
"DjangoMigration",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, app, name, applied `",
"+",
"`FROM django.django_migrations `",
"+",
"`WHERE id = :1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"id",
")",
"\n",
"dm",
":=",
"DjangoMigration",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"id",
")",
".",
"Scan",
"(",
"&",
"dm",
".",
"ID",
",",
"&",
"dm",
".",
"App",
",",
"&",
"dm",
".",
"Name",
",",
"&",
"dm",
".",
"Applied",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"dm",
",",
"nil",
"\n",
"}"
] |
// DjangoMigrationByID retrieves a row from 'django.django_migrations' as a DjangoMigration.
//
// Generated from index 'sys_c004953'.
|
[
"DjangoMigrationByID",
"retrieves",
"a",
"row",
"from",
"django",
".",
"django_migrations",
"as",
"a",
"DjangoMigration",
".",
"Generated",
"from",
"index",
"sys_c004953",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/djangomigration.xo.go#L136-L157
|
22,916
|
xo/xo
|
examples/django/sqlite3/djangocontenttype.xo.go
|
DjangoContentTypeByID
|
func DjangoContentTypeByID(db XODB, id int) (*DjangoContentType, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, app_label, model ` +
`FROM django_content_type ` +
`WHERE id = ?`
// run query
XOLog(sqlstr, id)
dct := DjangoContentType{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&dct.ID, &dct.AppLabel, &dct.Model)
if err != nil {
return nil, err
}
return &dct, nil
}
|
go
|
func DjangoContentTypeByID(db XODB, id int) (*DjangoContentType, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, app_label, model ` +
`FROM django_content_type ` +
`WHERE id = ?`
// run query
XOLog(sqlstr, id)
dct := DjangoContentType{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&dct.ID, &dct.AppLabel, &dct.Model)
if err != nil {
return nil, err
}
return &dct, nil
}
|
[
"func",
"DjangoContentTypeByID",
"(",
"db",
"XODB",
",",
"id",
"int",
")",
"(",
"*",
"DjangoContentType",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, app_label, model `",
"+",
"`FROM django_content_type `",
"+",
"`WHERE id = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"id",
")",
"\n",
"dct",
":=",
"DjangoContentType",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"id",
")",
".",
"Scan",
"(",
"&",
"dct",
".",
"ID",
",",
"&",
"dct",
".",
"AppLabel",
",",
"&",
"dct",
".",
"Model",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"dct",
",",
"nil",
"\n",
"}"
] |
// DjangoContentTypeByID retrieves a row from 'django_content_type' as a DjangoContentType.
//
// Generated from index 'django_content_type_id_pkey'.
|
[
"DjangoContentTypeByID",
"retrieves",
"a",
"row",
"from",
"django_content_type",
"as",
"a",
"DjangoContentType",
".",
"Generated",
"from",
"index",
"django_content_type_id_pkey",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/djangocontenttype.xo.go#L159-L180
|
22,917
|
xo/xo
|
examples/django/postgres/djangoadminlog.xo.go
|
Update
|
func (dal *DjangoAdminLog) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !dal._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if dal._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE public.django_admin_log SET (` +
`action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id` +
`) = ( ` +
`$1, $2, $3, $4, $5, $6, $7` +
`) WHERE id = $8`
// run query
XOLog(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID)
_, err = db.Exec(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID)
return err
}
|
go
|
func (dal *DjangoAdminLog) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !dal._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if dal._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE public.django_admin_log SET (` +
`action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id` +
`) = ( ` +
`$1, $2, $3, $4, $5, $6, $7` +
`) WHERE id = $8`
// run query
XOLog(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID)
_, err = db.Exec(sqlstr, dal.ActionTime, dal.ObjectID, dal.ObjectRepr, dal.ActionFlag, dal.ChangeMessage, dal.ContentTypeID, dal.UserID, dal.ID)
return err
}
|
[
"func",
"(",
"dal",
"*",
"DjangoAdminLog",
")",
"Update",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"dal",
".",
"_exists",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"dal",
".",
"_deleted",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`UPDATE public.django_admin_log SET (`",
"+",
"`action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id`",
"+",
"`) = ( `",
"+",
"`$1, $2, $3, $4, $5, $6, $7`",
"+",
"`) WHERE id = $8`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"dal",
".",
"ActionTime",
",",
"dal",
".",
"ObjectID",
",",
"dal",
".",
"ObjectRepr",
",",
"dal",
".",
"ActionFlag",
",",
"dal",
".",
"ChangeMessage",
",",
"dal",
".",
"ContentTypeID",
",",
"dal",
".",
"UserID",
",",
"dal",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"dal",
".",
"ActionTime",
",",
"dal",
".",
"ObjectID",
",",
"dal",
".",
"ObjectRepr",
",",
"dal",
".",
"ActionFlag",
",",
"dal",
".",
"ChangeMessage",
",",
"dal",
".",
"ContentTypeID",
",",
"dal",
".",
"UserID",
",",
"dal",
".",
"ID",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Update updates the DjangoAdminLog in the database.
|
[
"Update",
"updates",
"the",
"DjangoAdminLog",
"in",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangoadminlog.xo.go#L67-L91
|
22,918
|
xo/xo
|
examples/django/postgres/djangoadminlog.xo.go
|
DjangoAdminLogsByContentTypeID
|
func DjangoAdminLogsByContentTypeID(db XODB, contentTypeID sql.NullInt64) ([]*DjangoAdminLog, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id ` +
`FROM public.django_admin_log ` +
`WHERE content_type_id = $1`
// run query
XOLog(sqlstr, contentTypeID)
q, err := db.Query(sqlstr, contentTypeID)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*DjangoAdminLog{}
for q.Next() {
dal := DjangoAdminLog{
_exists: true,
}
// scan
err = q.Scan(&dal.ID, &dal.ActionTime, &dal.ObjectID, &dal.ObjectRepr, &dal.ActionFlag, &dal.ChangeMessage, &dal.ContentTypeID, &dal.UserID)
if err != nil {
return nil, err
}
res = append(res, &dal)
}
return res, nil
}
|
go
|
func DjangoAdminLogsByContentTypeID(db XODB, contentTypeID sql.NullInt64) ([]*DjangoAdminLog, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id ` +
`FROM public.django_admin_log ` +
`WHERE content_type_id = $1`
// run query
XOLog(sqlstr, contentTypeID)
q, err := db.Query(sqlstr, contentTypeID)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*DjangoAdminLog{}
for q.Next() {
dal := DjangoAdminLog{
_exists: true,
}
// scan
err = q.Scan(&dal.ID, &dal.ActionTime, &dal.ObjectID, &dal.ObjectRepr, &dal.ActionFlag, &dal.ChangeMessage, &dal.ContentTypeID, &dal.UserID)
if err != nil {
return nil, err
}
res = append(res, &dal)
}
return res, nil
}
|
[
"func",
"DjangoAdminLogsByContentTypeID",
"(",
"db",
"XODB",
",",
"contentTypeID",
"sql",
".",
"NullInt64",
")",
"(",
"[",
"]",
"*",
"DjangoAdminLog",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, action_time, object_id, object_repr, action_flag, change_message, content_type_id, user_id `",
"+",
"`FROM public.django_admin_log `",
"+",
"`WHERE content_type_id = $1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"contentTypeID",
")",
"\n",
"q",
",",
"err",
":=",
"db",
".",
"Query",
"(",
"sqlstr",
",",
"contentTypeID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"q",
".",
"Close",
"(",
")",
"\n\n",
"// load results",
"res",
":=",
"[",
"]",
"*",
"DjangoAdminLog",
"{",
"}",
"\n",
"for",
"q",
".",
"Next",
"(",
")",
"{",
"dal",
":=",
"DjangoAdminLog",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"// scan",
"err",
"=",
"q",
".",
"Scan",
"(",
"&",
"dal",
".",
"ID",
",",
"&",
"dal",
".",
"ActionTime",
",",
"&",
"dal",
".",
"ObjectID",
",",
"&",
"dal",
".",
"ObjectRepr",
",",
"&",
"dal",
".",
"ActionFlag",
",",
"&",
"dal",
".",
"ChangeMessage",
",",
"&",
"dal",
".",
"ContentTypeID",
",",
"&",
"dal",
".",
"UserID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
"=",
"append",
"(",
"res",
",",
"&",
"dal",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// DjangoAdminLogsByContentTypeID retrieves a row from 'public.django_admin_log' as a DjangoAdminLog.
//
// Generated from index 'django_admin_log_417f1b1c'.
|
[
"DjangoAdminLogsByContentTypeID",
"retrieves",
"a",
"row",
"from",
"public",
".",
"django_admin_log",
"as",
"a",
"DjangoAdminLog",
".",
"Generated",
"from",
"index",
"django_admin_log_417f1b1c",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/djangoadminlog.xo.go#L184-L218
|
22,919
|
xo/xo
|
models/proc.xo.go
|
PgProcs
|
func PgProcs(db XODB, schema string) ([]*Proc, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`p.proname, ` + // ::varchar AS proc_name
`pg_get_function_result(p.oid) ` + // ::varchar AS return_type
`FROM pg_proc p ` +
`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` +
`WHERE n.nspname = $1`
// run query
XOLog(sqlstr, schema)
q, err := db.Query(sqlstr, schema)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*Proc{}
for q.Next() {
p := Proc{}
// scan
err = q.Scan(&p.ProcName, &p.ReturnType)
if err != nil {
return nil, err
}
res = append(res, &p)
}
return res, nil
}
|
go
|
func PgProcs(db XODB, schema string) ([]*Proc, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`p.proname, ` + // ::varchar AS proc_name
`pg_get_function_result(p.oid) ` + // ::varchar AS return_type
`FROM pg_proc p ` +
`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid ` +
`WHERE n.nspname = $1`
// run query
XOLog(sqlstr, schema)
q, err := db.Query(sqlstr, schema)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*Proc{}
for q.Next() {
p := Proc{}
// scan
err = q.Scan(&p.ProcName, &p.ReturnType)
if err != nil {
return nil, err
}
res = append(res, &p)
}
return res, nil
}
|
[
"func",
"PgProcs",
"(",
"db",
"XODB",
",",
"schema",
"string",
")",
"(",
"[",
"]",
"*",
"Proc",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`p.proname, `",
"+",
"// ::varchar AS proc_name",
"`pg_get_function_result(p.oid) `",
"+",
"// ::varchar AS return_type",
"`FROM pg_proc p `",
"+",
"`JOIN ONLY pg_namespace n ON p.pronamespace = n.oid `",
"+",
"`WHERE n.nspname = $1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"schema",
")",
"\n",
"q",
",",
"err",
":=",
"db",
".",
"Query",
"(",
"sqlstr",
",",
"schema",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"q",
".",
"Close",
"(",
")",
"\n\n",
"// load results",
"res",
":=",
"[",
"]",
"*",
"Proc",
"{",
"}",
"\n",
"for",
"q",
".",
"Next",
"(",
")",
"{",
"p",
":=",
"Proc",
"{",
"}",
"\n\n",
"// scan",
"err",
"=",
"q",
".",
"Scan",
"(",
"&",
"p",
".",
"ProcName",
",",
"&",
"p",
".",
"ReturnType",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
"=",
"append",
"(",
"res",
",",
"&",
"p",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// PgProcs runs a custom query, returning results as Proc.
|
[
"PgProcs",
"runs",
"a",
"custom",
"query",
"returning",
"results",
"as",
"Proc",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/proc.xo.go#L13-L47
|
22,920
|
xo/xo
|
examples/django/oracle/authgroup.xo.go
|
Delete
|
func (ag *AuthGroup) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !ag._exists {
return nil
}
// if deleted, bail
if ag._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_group WHERE id = :1`
// run query
XOLog(sqlstr, ag.ID)
_, err = db.Exec(sqlstr, ag.ID)
if err != nil {
return err
}
// set deleted
ag._deleted = true
return nil
}
|
go
|
func (ag *AuthGroup) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !ag._exists {
return nil
}
// if deleted, bail
if ag._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_group WHERE id = :1`
// run query
XOLog(sqlstr, ag.ID)
_, err = db.Exec(sqlstr, ag.ID)
if err != nil {
return err
}
// set deleted
ag._deleted = true
return nil
}
|
[
"func",
"(",
"ag",
"*",
"AuthGroup",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"ag",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"ag",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM django.auth_group WHERE id = :1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"ag",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"ag",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"ag",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the AuthGroup from the database.
|
[
"Delete",
"deletes",
"the",
"AuthGroup",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authgroup.xo.go#L101-L128
|
22,921
|
xo/xo
|
examples/django/sqlite3/authgroup.xo.go
|
Update
|
func (ag *AuthGroup) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !ag._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if ag._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE auth_group SET ` +
`name = ?` +
` WHERE id = ?`
// run query
XOLog(sqlstr, ag.Name, ag.ID)
_, err = db.Exec(sqlstr, ag.Name, ag.ID)
return err
}
|
go
|
func (ag *AuthGroup) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !ag._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if ag._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE auth_group SET ` +
`name = ?` +
` WHERE id = ?`
// run query
XOLog(sqlstr, ag.Name, ag.ID)
_, err = db.Exec(sqlstr, ag.Name, ag.ID)
return err
}
|
[
"func",
"(",
"ag",
"*",
"AuthGroup",
")",
"Update",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"ag",
".",
"_exists",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"ag",
".",
"_deleted",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`UPDATE auth_group SET `",
"+",
"`name = ?`",
"+",
"` WHERE id = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"ag",
".",
"Name",
",",
"ag",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"ag",
".",
"Name",
",",
"ag",
".",
"ID",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Update updates the AuthGroup in the database.
|
[
"Update",
"updates",
"the",
"AuthGroup",
"in",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/sqlite3/authgroup.xo.go#L66-L88
|
22,922
|
xo/xo
|
examples/django/oracle/authuser.xo.go
|
Delete
|
func (au *AuthUser) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !au._exists {
return nil
}
// if deleted, bail
if au._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_user WHERE id = :1`
// run query
XOLog(sqlstr, au.ID)
_, err = db.Exec(sqlstr, au.ID)
if err != nil {
return err
}
// set deleted
au._deleted = true
return nil
}
|
go
|
func (au *AuthUser) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !au._exists {
return nil
}
// if deleted, bail
if au._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_user WHERE id = :1`
// run query
XOLog(sqlstr, au.ID)
_, err = db.Exec(sqlstr, au.ID)
if err != nil {
return err
}
// set deleted
au._deleted = true
return nil
}
|
[
"func",
"(",
"au",
"*",
"AuthUser",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"au",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"au",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM django.auth_user WHERE id = :1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"au",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"au",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"au",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the AuthUser from the database.
|
[
"Delete",
"deletes",
"the",
"AuthUser",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuser.xo.go#L111-L138
|
22,923
|
xo/xo
|
examples/django/oracle/authuser.xo.go
|
AuthUserByUsername
|
func AuthUserByUsername(db XODB, username sql.NullString) (*AuthUser, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined ` +
`FROM django.auth_user ` +
`WHERE username = :1`
// run query
XOLog(sqlstr, username)
au := AuthUser{
_exists: true,
}
err = db.QueryRow(sqlstr, username).Scan(&au.ID, &au.Password, &au.LastLogin, &au.IsSuperuser, &au.Username, &au.FirstName, &au.LastName, &au.Email, &au.IsStaff, &au.IsActive, &au.DateJoined)
if err != nil {
return nil, err
}
return &au, nil
}
|
go
|
func AuthUserByUsername(db XODB, username sql.NullString) (*AuthUser, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined ` +
`FROM django.auth_user ` +
`WHERE username = :1`
// run query
XOLog(sqlstr, username)
au := AuthUser{
_exists: true,
}
err = db.QueryRow(sqlstr, username).Scan(&au.ID, &au.Password, &au.LastLogin, &au.IsSuperuser, &au.Username, &au.FirstName, &au.LastName, &au.Email, &au.IsStaff, &au.IsActive, &au.DateJoined)
if err != nil {
return nil, err
}
return &au, nil
}
|
[
"func",
"AuthUserByUsername",
"(",
"db",
"XODB",
",",
"username",
"sql",
".",
"NullString",
")",
"(",
"*",
"AuthUser",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, password, last_login, is_superuser, username, first_name, last_name, email, is_staff, is_active, date_joined `",
"+",
"`FROM django.auth_user `",
"+",
"`WHERE username = :1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"username",
")",
"\n",
"au",
":=",
"AuthUser",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"username",
")",
".",
"Scan",
"(",
"&",
"au",
".",
"ID",
",",
"&",
"au",
".",
"Password",
",",
"&",
"au",
".",
"LastLogin",
",",
"&",
"au",
".",
"IsSuperuser",
",",
"&",
"au",
".",
"Username",
",",
"&",
"au",
".",
"FirstName",
",",
"&",
"au",
".",
"LastName",
",",
"&",
"au",
".",
"Email",
",",
"&",
"au",
".",
"IsStaff",
",",
"&",
"au",
".",
"IsActive",
",",
"&",
"au",
".",
"DateJoined",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"au",
",",
"nil",
"\n",
"}"
] |
// AuthUserByUsername retrieves a row from 'django.auth_user' as a AuthUser.
//
// Generated from index 'sys_c004977'.
|
[
"AuthUserByUsername",
"retrieves",
"a",
"row",
"from",
"django",
".",
"auth_user",
"as",
"a",
"AuthUser",
".",
"Generated",
"from",
"index",
"sys_c004977",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authuser.xo.go#L169-L190
|
22,924
|
xo/xo
|
internal/fkmode.go
|
UnmarshalText
|
func (f *FkMode) UnmarshalText(text []byte) error {
switch strings.ToLower(string(text)) {
case "smart", "default":
*f = FkModeSmart
case "parent":
*f = FkModeParent
case "field":
*f = FkModeField
case "key":
*f = FkModeKey
default:
return errors.New("invalid FkMode")
}
return nil
}
|
go
|
func (f *FkMode) UnmarshalText(text []byte) error {
switch strings.ToLower(string(text)) {
case "smart", "default":
*f = FkModeSmart
case "parent":
*f = FkModeParent
case "field":
*f = FkModeField
case "key":
*f = FkModeKey
default:
return errors.New("invalid FkMode")
}
return nil
}
|
[
"func",
"(",
"f",
"*",
"FkMode",
")",
"UnmarshalText",
"(",
"text",
"[",
"]",
"byte",
")",
"error",
"{",
"switch",
"strings",
".",
"ToLower",
"(",
"string",
"(",
"text",
")",
")",
"{",
"case",
"\"",
"\"",
",",
"\"",
"\"",
":",
"*",
"f",
"=",
"FkModeSmart",
"\n",
"case",
"\"",
"\"",
":",
"*",
"f",
"=",
"FkModeParent",
"\n",
"case",
"\"",
"\"",
":",
"*",
"f",
"=",
"FkModeField",
"\n",
"case",
"\"",
"\"",
":",
"*",
"f",
"=",
"FkModeKey",
"\n\n",
"default",
":",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// UnmarshalText unmarshals FkMode from text.
|
[
"UnmarshalText",
"unmarshals",
"FkMode",
"from",
"text",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L44-L60
|
22,925
|
xo/xo
|
internal/fkmode.go
|
fkName
|
func fkName(mode FkMode, fkMap map[string]*ForeignKey, fk *ForeignKey) string {
switch mode {
case FkModeParent:
return fk.RefType.Name
case FkModeField:
return fk.RefType.Name + "By" + fk.Field.Name
case FkModeKey:
return fk.RefType.Name + "By" + snaker.SnakeToCamelIdentifier(fk.ForeignKey.ForeignKeyName)
}
// mode is FkModeSmart
// inspect all foreign keys and use FkModeField if conflict found
for _, f := range fkMap {
if fk != f && fk.Type.Name == f.Type.Name && fk.RefType.Name == f.RefType.Name {
return fkName(FkModeField, fkMap, fk)
}
}
// no conflict, so use FkModeParent
return fkName(FkModeParent, fkMap, fk)
}
|
go
|
func fkName(mode FkMode, fkMap map[string]*ForeignKey, fk *ForeignKey) string {
switch mode {
case FkModeParent:
return fk.RefType.Name
case FkModeField:
return fk.RefType.Name + "By" + fk.Field.Name
case FkModeKey:
return fk.RefType.Name + "By" + snaker.SnakeToCamelIdentifier(fk.ForeignKey.ForeignKeyName)
}
// mode is FkModeSmart
// inspect all foreign keys and use FkModeField if conflict found
for _, f := range fkMap {
if fk != f && fk.Type.Name == f.Type.Name && fk.RefType.Name == f.RefType.Name {
return fkName(FkModeField, fkMap, fk)
}
}
// no conflict, so use FkModeParent
return fkName(FkModeParent, fkMap, fk)
}
|
[
"func",
"fkName",
"(",
"mode",
"FkMode",
",",
"fkMap",
"map",
"[",
"string",
"]",
"*",
"ForeignKey",
",",
"fk",
"*",
"ForeignKey",
")",
"string",
"{",
"switch",
"mode",
"{",
"case",
"FkModeParent",
":",
"return",
"fk",
".",
"RefType",
".",
"Name",
"\n",
"case",
"FkModeField",
":",
"return",
"fk",
".",
"RefType",
".",
"Name",
"+",
"\"",
"\"",
"+",
"fk",
".",
"Field",
".",
"Name",
"\n",
"case",
"FkModeKey",
":",
"return",
"fk",
".",
"RefType",
".",
"Name",
"+",
"\"",
"\"",
"+",
"snaker",
".",
"SnakeToCamelIdentifier",
"(",
"fk",
".",
"ForeignKey",
".",
"ForeignKeyName",
")",
"\n",
"}",
"\n\n",
"// mode is FkModeSmart",
"// inspect all foreign keys and use FkModeField if conflict found",
"for",
"_",
",",
"f",
":=",
"range",
"fkMap",
"{",
"if",
"fk",
"!=",
"f",
"&&",
"fk",
".",
"Type",
".",
"Name",
"==",
"f",
".",
"Type",
".",
"Name",
"&&",
"fk",
".",
"RefType",
".",
"Name",
"==",
"f",
".",
"RefType",
".",
"Name",
"{",
"return",
"fkName",
"(",
"FkModeField",
",",
"fkMap",
",",
"fk",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"// no conflict, so use FkModeParent",
"return",
"fkName",
"(",
"FkModeParent",
",",
"fkMap",
",",
"fk",
")",
"\n",
"}"
] |
// fkName returns the name for the foreign key.
|
[
"fkName",
"returns",
"the",
"name",
"for",
"the",
"foreign",
"key",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L79-L99
|
22,926
|
xo/xo
|
internal/fkmode.go
|
ForeignKeyName
|
func (a *ArgType) ForeignKeyName(fkMap map[string]*ForeignKey, fk *ForeignKey) string {
return fkName(*a.ForeignKeyMode, fkMap, fk)
}
|
go
|
func (a *ArgType) ForeignKeyName(fkMap map[string]*ForeignKey, fk *ForeignKey) string {
return fkName(*a.ForeignKeyMode, fkMap, fk)
}
|
[
"func",
"(",
"a",
"*",
"ArgType",
")",
"ForeignKeyName",
"(",
"fkMap",
"map",
"[",
"string",
"]",
"*",
"ForeignKey",
",",
"fk",
"*",
"ForeignKey",
")",
"string",
"{",
"return",
"fkName",
"(",
"*",
"a",
".",
"ForeignKeyMode",
",",
"fkMap",
",",
"fk",
")",
"\n",
"}"
] |
// ForeignKeyName returns the foreign key name for the passed type.
|
[
"ForeignKeyName",
"returns",
"the",
"foreign",
"key",
"name",
"for",
"the",
"passed",
"type",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/internal/fkmode.go#L102-L104
|
22,927
|
xo/xo
|
examples/django/postgres/authuseruserpermission.xo.go
|
Delete
|
func (auup *AuthUserUserPermission) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !auup._exists {
return nil
}
// if deleted, bail
if auup._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM public.auth_user_user_permissions WHERE id = $1`
// run query
XOLog(sqlstr, auup.ID)
_, err = db.Exec(sqlstr, auup.ID)
if err != nil {
return err
}
// set deleted
auup._deleted = true
return nil
}
|
go
|
func (auup *AuthUserUserPermission) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !auup._exists {
return nil
}
// if deleted, bail
if auup._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM public.auth_user_user_permissions WHERE id = $1`
// run query
XOLog(sqlstr, auup.ID)
_, err = db.Exec(sqlstr, auup.ID)
if err != nil {
return err
}
// set deleted
auup._deleted = true
return nil
}
|
[
"func",
"(",
"auup",
"*",
"AuthUserUserPermission",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"auup",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"auup",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM public.auth_user_user_permissions WHERE id = $1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"auup",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"auup",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"auup",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the AuthUserUserPermission from the database.
|
[
"Delete",
"deletes",
"the",
"AuthUserUserPermission",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authuseruserpermission.xo.go#L131-L158
|
22,928
|
xo/xo
|
examples/django/postgres/authuseruserpermission.xo.go
|
AuthUserUserPermissionByID
|
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, permission_id ` +
`FROM public.auth_user_user_permissions ` +
`WHERE id = $1`
// run query
XOLog(sqlstr, id)
auup := AuthUserUserPermission{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID)
if err != nil {
return nil, err
}
return &auup, nil
}
|
go
|
func AuthUserUserPermissionByID(db XODB, id int) (*AuthUserUserPermission, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`id, user_id, permission_id ` +
`FROM public.auth_user_user_permissions ` +
`WHERE id = $1`
// run query
XOLog(sqlstr, id)
auup := AuthUserUserPermission{
_exists: true,
}
err = db.QueryRow(sqlstr, id).Scan(&auup.ID, &auup.UserID, &auup.PermissionID)
if err != nil {
return nil, err
}
return &auup, nil
}
|
[
"func",
"AuthUserUserPermissionByID",
"(",
"db",
"XODB",
",",
"id",
"int",
")",
"(",
"*",
"AuthUserUserPermission",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`id, user_id, permission_id `",
"+",
"`FROM public.auth_user_user_permissions `",
"+",
"`WHERE id = $1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"id",
")",
"\n",
"auup",
":=",
"AuthUserUserPermission",
"{",
"_exists",
":",
"true",
",",
"}",
"\n\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"id",
")",
".",
"Scan",
"(",
"&",
"auup",
".",
"ID",
",",
"&",
"auup",
".",
"UserID",
",",
"&",
"auup",
".",
"PermissionID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"auup",
",",
"nil",
"\n",
"}"
] |
// AuthUserUserPermissionByID retrieves a row from 'public.auth_user_user_permissions' as a AuthUserUserPermission.
//
// Generated from index 'auth_user_user_permissions_pkey'.
|
[
"AuthUserUserPermissionByID",
"retrieves",
"a",
"row",
"from",
"public",
".",
"auth_user_user_permissions",
"as",
"a",
"AuthUserUserPermission",
".",
"Generated",
"from",
"index",
"auth_user_user_permissions_pkey",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authuseruserpermission.xo.go#L255-L276
|
22,929
|
xo/xo
|
examples/django/oracle/authusergroup.xo.go
|
Delete
|
func (aug *AuthUserGroup) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !aug._exists {
return nil
}
// if deleted, bail
if aug._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_user_groups WHERE id = :1`
// run query
XOLog(sqlstr, aug.ID)
_, err = db.Exec(sqlstr, aug.ID)
if err != nil {
return err
}
// set deleted
aug._deleted = true
return nil
}
|
go
|
func (aug *AuthUserGroup) Delete(db XODB) error {
var err error
// if doesn't exist, bail
if !aug._exists {
return nil
}
// if deleted, bail
if aug._deleted {
return nil
}
// sql query
const sqlstr = `DELETE FROM django.auth_user_groups WHERE id = :1`
// run query
XOLog(sqlstr, aug.ID)
_, err = db.Exec(sqlstr, aug.ID)
if err != nil {
return err
}
// set deleted
aug._deleted = true
return nil
}
|
[
"func",
"(",
"aug",
"*",
"AuthUserGroup",
")",
"Delete",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"aug",
".",
"_exists",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"aug",
".",
"_deleted",
"{",
"return",
"nil",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`DELETE FROM django.auth_user_groups WHERE id = :1`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"aug",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"aug",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"err",
"\n",
"}",
"\n\n",
"// set deleted",
"aug",
".",
"_deleted",
"=",
"true",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Delete deletes the AuthUserGroup from the database.
|
[
"Delete",
"deletes",
"the",
"AuthUserGroup",
"from",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/oracle/authusergroup.xo.go#L99-L126
|
22,930
|
xo/xo
|
models/myenumvalue.xo.go
|
MyEnumValues
|
func MyEnumValues(db XODB, schema string, enum string) (*MyEnumValue, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values ` +
`FROM information_schema.columns ` +
`WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?`
// run query
XOLog(sqlstr, schema, enum)
var mev MyEnumValue
err = db.QueryRow(sqlstr, schema, enum).Scan(&mev.EnumValues)
if err != nil {
return nil, err
}
return &mev, nil
}
|
go
|
func MyEnumValues(db XODB, schema string, enum string) (*MyEnumValue, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values ` +
`FROM information_schema.columns ` +
`WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?`
// run query
XOLog(sqlstr, schema, enum)
var mev MyEnumValue
err = db.QueryRow(sqlstr, schema, enum).Scan(&mev.EnumValues)
if err != nil {
return nil, err
}
return &mev, nil
}
|
[
"func",
"MyEnumValues",
"(",
"db",
"XODB",
",",
"schema",
"string",
",",
"enum",
"string",
")",
"(",
"*",
"MyEnumValue",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`SUBSTRING(column_type, 6, CHAR_LENGTH(column_type) - 6) AS enum_values `",
"+",
"`FROM information_schema.columns `",
"+",
"`WHERE data_type = 'enum' AND table_schema = ? AND column_name = ?`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"schema",
",",
"enum",
")",
"\n",
"var",
"mev",
"MyEnumValue",
"\n",
"err",
"=",
"db",
".",
"QueryRow",
"(",
"sqlstr",
",",
"schema",
",",
"enum",
")",
".",
"Scan",
"(",
"&",
"mev",
".",
"EnumValues",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"return",
"&",
"mev",
",",
"nil",
"\n",
"}"
] |
// MyEnumValues runs a custom query, returning results as MyEnumValue.
|
[
"MyEnumValues",
"runs",
"a",
"custom",
"query",
"returning",
"results",
"as",
"MyEnumValue",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/myenumvalue.xo.go#L12-L30
|
22,931
|
xo/xo
|
examples/django/postgres/authusergroup.xo.go
|
Update
|
func (aug *AuthUserGroup) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !aug._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if aug._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE public.auth_user_groups SET (` +
`user_id, group_id` +
`) = ( ` +
`$1, $2` +
`) WHERE id = $3`
// run query
XOLog(sqlstr, aug.UserID, aug.GroupID, aug.ID)
_, err = db.Exec(sqlstr, aug.UserID, aug.GroupID, aug.ID)
return err
}
|
go
|
func (aug *AuthUserGroup) Update(db XODB) error {
var err error
// if doesn't exist, bail
if !aug._exists {
return errors.New("update failed: does not exist")
}
// if deleted, bail
if aug._deleted {
return errors.New("update failed: marked for deletion")
}
// sql query
const sqlstr = `UPDATE public.auth_user_groups SET (` +
`user_id, group_id` +
`) = ( ` +
`$1, $2` +
`) WHERE id = $3`
// run query
XOLog(sqlstr, aug.UserID, aug.GroupID, aug.ID)
_, err = db.Exec(sqlstr, aug.UserID, aug.GroupID, aug.ID)
return err
}
|
[
"func",
"(",
"aug",
"*",
"AuthUserGroup",
")",
"Update",
"(",
"db",
"XODB",
")",
"error",
"{",
"var",
"err",
"error",
"\n\n",
"// if doesn't exist, bail",
"if",
"!",
"aug",
".",
"_exists",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// if deleted, bail",
"if",
"aug",
".",
"_deleted",
"{",
"return",
"errors",
".",
"New",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`UPDATE public.auth_user_groups SET (`",
"+",
"`user_id, group_id`",
"+",
"`) = ( `",
"+",
"`$1, $2`",
"+",
"`) WHERE id = $3`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"aug",
".",
"UserID",
",",
"aug",
".",
"GroupID",
",",
"aug",
".",
"ID",
")",
"\n",
"_",
",",
"err",
"=",
"db",
".",
"Exec",
"(",
"sqlstr",
",",
"aug",
".",
"UserID",
",",
"aug",
".",
"GroupID",
",",
"aug",
".",
"ID",
")",
"\n",
"return",
"err",
"\n",
"}"
] |
// Update updates the AuthUserGroup in the database.
|
[
"Update",
"updates",
"the",
"AuthUserGroup",
"in",
"the",
"database",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/examples/django/postgres/authusergroup.xo.go#L60-L84
|
22,932
|
xo/xo
|
models/column.xo.go
|
MyTableColumns
|
func MyTableColumns(db XODB, schema string, table string) ([]*Column, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`ordinal_position AS field_ordinal, ` +
`column_name, ` +
`IF(data_type = 'enum', column_name, column_type) AS data_type, ` +
`IF(is_nullable = 'YES', false, true) AS not_null, ` +
`column_default AS default_value, ` +
`IF(column_key = 'PRI', true, false) AS is_primary_key ` +
`FROM information_schema.columns ` +
`WHERE table_schema = ? AND table_name = ? ` +
`ORDER BY ordinal_position`
// run query
XOLog(sqlstr, schema, table)
q, err := db.Query(sqlstr, schema, table)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*Column{}
for q.Next() {
c := Column{}
// scan
err = q.Scan(&c.FieldOrdinal, &c.ColumnName, &c.DataType, &c.NotNull, &c.DefaultValue, &c.IsPrimaryKey)
if err != nil {
return nil, err
}
res = append(res, &c)
}
return res, nil
}
|
go
|
func MyTableColumns(db XODB, schema string, table string) ([]*Column, error) {
var err error
// sql query
const sqlstr = `SELECT ` +
`ordinal_position AS field_ordinal, ` +
`column_name, ` +
`IF(data_type = 'enum', column_name, column_type) AS data_type, ` +
`IF(is_nullable = 'YES', false, true) AS not_null, ` +
`column_default AS default_value, ` +
`IF(column_key = 'PRI', true, false) AS is_primary_key ` +
`FROM information_schema.columns ` +
`WHERE table_schema = ? AND table_name = ? ` +
`ORDER BY ordinal_position`
// run query
XOLog(sqlstr, schema, table)
q, err := db.Query(sqlstr, schema, table)
if err != nil {
return nil, err
}
defer q.Close()
// load results
res := []*Column{}
for q.Next() {
c := Column{}
// scan
err = q.Scan(&c.FieldOrdinal, &c.ColumnName, &c.DataType, &c.NotNull, &c.DefaultValue, &c.IsPrimaryKey)
if err != nil {
return nil, err
}
res = append(res, &c)
}
return res, nil
}
|
[
"func",
"MyTableColumns",
"(",
"db",
"XODB",
",",
"schema",
"string",
",",
"table",
"string",
")",
"(",
"[",
"]",
"*",
"Column",
",",
"error",
")",
"{",
"var",
"err",
"error",
"\n\n",
"// sql query",
"const",
"sqlstr",
"=",
"`SELECT `",
"+",
"`ordinal_position AS field_ordinal, `",
"+",
"`column_name, `",
"+",
"`IF(data_type = 'enum', column_name, column_type) AS data_type, `",
"+",
"`IF(is_nullable = 'YES', false, true) AS not_null, `",
"+",
"`column_default AS default_value, `",
"+",
"`IF(column_key = 'PRI', true, false) AS is_primary_key `",
"+",
"`FROM information_schema.columns `",
"+",
"`WHERE table_schema = ? AND table_name = ? `",
"+",
"`ORDER BY ordinal_position`",
"\n\n",
"// run query",
"XOLog",
"(",
"sqlstr",
",",
"schema",
",",
"table",
")",
"\n",
"q",
",",
"err",
":=",
"db",
".",
"Query",
"(",
"sqlstr",
",",
"schema",
",",
"table",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n",
"defer",
"q",
".",
"Close",
"(",
")",
"\n\n",
"// load results",
"res",
":=",
"[",
"]",
"*",
"Column",
"{",
"}",
"\n",
"for",
"q",
".",
"Next",
"(",
")",
"{",
"c",
":=",
"Column",
"{",
"}",
"\n\n",
"// scan",
"err",
"=",
"q",
".",
"Scan",
"(",
"&",
"c",
".",
"FieldOrdinal",
",",
"&",
"c",
".",
"ColumnName",
",",
"&",
"c",
".",
"DataType",
",",
"&",
"c",
".",
"NotNull",
",",
"&",
"c",
".",
"DefaultValue",
",",
"&",
"c",
".",
"IsPrimaryKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"err",
"\n",
"}",
"\n\n",
"res",
"=",
"append",
"(",
"res",
",",
"&",
"c",
")",
"\n",
"}",
"\n\n",
"return",
"res",
",",
"nil",
"\n",
"}"
] |
// MyTableColumns runs a custom query, returning results as Column.
|
[
"MyTableColumns",
"runs",
"a",
"custom",
"query",
"returning",
"results",
"as",
"Column",
"."
] |
1a94fa516029cb306cce6d379d086e4d5b5bb232
|
https://github.com/xo/xo/blob/1a94fa516029cb306cce6d379d086e4d5b5bb232/models/column.xo.go#L66-L104
|
22,933
|
gravitational/teleport
|
lib/auth/methods.go
|
AuthenticateUser
|
func (s *AuthServer) AuthenticateUser(req AuthenticateUserRequest) error {
err := s.authenticateUser(req)
if err != nil {
s.EmitAuditEvent(events.UserLocalLoginFailure, events.EventFields{
events.EventUser: req.Username,
events.LoginMethod: events.LoginMethodLocal,
events.AuthAttemptSuccess: false,
events.AuthAttemptErr: err.Error(),
})
} else {
s.EmitAuditEvent(events.UserLocalLogin, events.EventFields{
events.EventUser: req.Username,
events.LoginMethod: events.LoginMethodLocal,
events.AuthAttemptSuccess: true,
})
}
return err
}
|
go
|
func (s *AuthServer) AuthenticateUser(req AuthenticateUserRequest) error {
err := s.authenticateUser(req)
if err != nil {
s.EmitAuditEvent(events.UserLocalLoginFailure, events.EventFields{
events.EventUser: req.Username,
events.LoginMethod: events.LoginMethodLocal,
events.AuthAttemptSuccess: false,
events.AuthAttemptErr: err.Error(),
})
} else {
s.EmitAuditEvent(events.UserLocalLogin, events.EventFields{
events.EventUser: req.Username,
events.LoginMethod: events.LoginMethodLocal,
events.AuthAttemptSuccess: true,
})
}
return err
}
|
[
"func",
"(",
"s",
"*",
"AuthServer",
")",
"AuthenticateUser",
"(",
"req",
"AuthenticateUserRequest",
")",
"error",
"{",
"err",
":=",
"s",
".",
"authenticateUser",
"(",
"req",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"s",
".",
"EmitAuditEvent",
"(",
"events",
".",
"UserLocalLoginFailure",
",",
"events",
".",
"EventFields",
"{",
"events",
".",
"EventUser",
":",
"req",
".",
"Username",
",",
"events",
".",
"LoginMethod",
":",
"events",
".",
"LoginMethodLocal",
",",
"events",
".",
"AuthAttemptSuccess",
":",
"false",
",",
"events",
".",
"AuthAttemptErr",
":",
"err",
".",
"Error",
"(",
")",
",",
"}",
")",
"\n",
"}",
"else",
"{",
"s",
".",
"EmitAuditEvent",
"(",
"events",
".",
"UserLocalLogin",
",",
"events",
".",
"EventFields",
"{",
"events",
".",
"EventUser",
":",
"req",
".",
"Username",
",",
"events",
".",
"LoginMethod",
":",
"events",
".",
"LoginMethodLocal",
",",
"events",
".",
"AuthAttemptSuccess",
":",
"true",
",",
"}",
")",
"\n",
"}",
"\n",
"return",
"err",
"\n",
"}"
] |
// AuthenticateUser authenticates user based on the request type
|
[
"AuthenticateUser",
"authenticates",
"user",
"based",
"on",
"the",
"request",
"type"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L85-L102
|
22,934
|
gravitational/teleport
|
lib/auth/methods.go
|
AuthenticateWebUser
|
func (s *AuthServer) AuthenticateWebUser(req AuthenticateUserRequest) (services.WebSession, error) {
if req.Session != nil {
session, err := s.GetWebSession(req.Username, req.Session.ID)
if err != nil {
return nil, trace.AccessDenied("session is invalid or has expired")
}
return session, nil
}
if err := s.AuthenticateUser(req); err != nil {
return nil, trace.Wrap(err)
}
sess, err := s.NewWebSession(req.Username)
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.UpsertWebSession(req.Username, sess); err != nil {
return nil, trace.Wrap(err)
}
sess, err = services.GetWebSessionMarshaler().GenerateWebSession(sess)
if err != nil {
return nil, trace.Wrap(err)
}
return sess, nil
}
|
go
|
func (s *AuthServer) AuthenticateWebUser(req AuthenticateUserRequest) (services.WebSession, error) {
if req.Session != nil {
session, err := s.GetWebSession(req.Username, req.Session.ID)
if err != nil {
return nil, trace.AccessDenied("session is invalid or has expired")
}
return session, nil
}
if err := s.AuthenticateUser(req); err != nil {
return nil, trace.Wrap(err)
}
sess, err := s.NewWebSession(req.Username)
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.UpsertWebSession(req.Username, sess); err != nil {
return nil, trace.Wrap(err)
}
sess, err = services.GetWebSessionMarshaler().GenerateWebSession(sess)
if err != nil {
return nil, trace.Wrap(err)
}
return sess, nil
}
|
[
"func",
"(",
"s",
"*",
"AuthServer",
")",
"AuthenticateWebUser",
"(",
"req",
"AuthenticateUserRequest",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"if",
"req",
".",
"Session",
"!=",
"nil",
"{",
"session",
",",
"err",
":=",
"s",
".",
"GetWebSession",
"(",
"req",
".",
"Username",
",",
"req",
".",
"Session",
".",
"ID",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"AccessDenied",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"session",
",",
"nil",
"\n",
"}",
"\n",
"if",
"err",
":=",
"s",
".",
"AuthenticateUser",
"(",
"req",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"sess",
",",
"err",
":=",
"s",
".",
"NewWebSession",
"(",
"req",
".",
"Username",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"s",
".",
"UpsertWebSession",
"(",
"req",
".",
"Username",
",",
"sess",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"sess",
",",
"err",
"=",
"services",
".",
"GetWebSessionMarshaler",
"(",
")",
".",
"GenerateWebSession",
"(",
"sess",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"sess",
",",
"nil",
"\n",
"}"
] |
// AuthenticateWebUser authenticates web user, creates and returns web session
// in case if authentication is successful. In case if existing session id
// is used to authenticate, returns session associated with the existing session id
// instead of creating the new one
|
[
"AuthenticateWebUser",
"authenticates",
"web",
"user",
"creates",
"and",
"returns",
"web",
"session",
"in",
"case",
"if",
"authentication",
"is",
"successful",
".",
"In",
"case",
"if",
"existing",
"session",
"id",
"is",
"used",
"to",
"authenticate",
"returns",
"session",
"associated",
"with",
"the",
"existing",
"session",
"id",
"instead",
"of",
"creating",
"the",
"new",
"one"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L165-L188
|
22,935
|
gravitational/teleport
|
lib/auth/methods.go
|
CheckAndSetDefaults
|
func (a *AuthenticateSSHRequest) CheckAndSetDefaults() error {
if err := a.AuthenticateUserRequest.CheckAndSetDefaults(); err != nil {
return trace.Wrap(err)
}
if len(a.PublicKey) == 0 {
return trace.BadParameter("missing parameter 'public_key'")
}
certificateFormat, err := utils.CheckCertificateFormatFlag(a.CompatibilityMode)
if err != nil {
return trace.Wrap(err)
}
a.CompatibilityMode = certificateFormat
return nil
}
|
go
|
func (a *AuthenticateSSHRequest) CheckAndSetDefaults() error {
if err := a.AuthenticateUserRequest.CheckAndSetDefaults(); err != nil {
return trace.Wrap(err)
}
if len(a.PublicKey) == 0 {
return trace.BadParameter("missing parameter 'public_key'")
}
certificateFormat, err := utils.CheckCertificateFormatFlag(a.CompatibilityMode)
if err != nil {
return trace.Wrap(err)
}
a.CompatibilityMode = certificateFormat
return nil
}
|
[
"func",
"(",
"a",
"*",
"AuthenticateSSHRequest",
")",
"CheckAndSetDefaults",
"(",
")",
"error",
"{",
"if",
"err",
":=",
"a",
".",
"AuthenticateUserRequest",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"len",
"(",
"a",
".",
"PublicKey",
")",
"==",
"0",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"certificateFormat",
",",
"err",
":=",
"utils",
".",
"CheckCertificateFormatFlag",
"(",
"a",
".",
"CompatibilityMode",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"a",
".",
"CompatibilityMode",
"=",
"certificateFormat",
"\n",
"return",
"nil",
"\n",
"}"
] |
// CheckAndSetDefaults checks and sets default certificate values
|
[
"CheckAndSetDefaults",
"checks",
"and",
"sets",
"default",
"certificate",
"values"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L203-L216
|
22,936
|
gravitational/teleport
|
lib/auth/methods.go
|
SSHCertPublicKeys
|
func (c *TrustedCerts) SSHCertPublicKeys() ([]ssh.PublicKey, error) {
out := make([]ssh.PublicKey, 0, len(c.HostCertificates))
for _, keyBytes := range c.HostCertificates {
publicKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes)
if err != nil {
return nil, trace.Wrap(err)
}
out = append(out, publicKey)
}
return out, nil
}
|
go
|
func (c *TrustedCerts) SSHCertPublicKeys() ([]ssh.PublicKey, error) {
out := make([]ssh.PublicKey, 0, len(c.HostCertificates))
for _, keyBytes := range c.HostCertificates {
publicKey, _, _, _, err := ssh.ParseAuthorizedKey(keyBytes)
if err != nil {
return nil, trace.Wrap(err)
}
out = append(out, publicKey)
}
return out, nil
}
|
[
"func",
"(",
"c",
"*",
"TrustedCerts",
")",
"SSHCertPublicKeys",
"(",
")",
"(",
"[",
"]",
"ssh",
".",
"PublicKey",
",",
"error",
")",
"{",
"out",
":=",
"make",
"(",
"[",
"]",
"ssh",
".",
"PublicKey",
",",
"0",
",",
"len",
"(",
"c",
".",
"HostCertificates",
")",
")",
"\n",
"for",
"_",
",",
"keyBytes",
":=",
"range",
"c",
".",
"HostCertificates",
"{",
"publicKey",
",",
"_",
",",
"_",
",",
"_",
",",
"err",
":=",
"ssh",
".",
"ParseAuthorizedKey",
"(",
"keyBytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"out",
"=",
"append",
"(",
"out",
",",
"publicKey",
")",
"\n",
"}",
"\n",
"return",
"out",
",",
"nil",
"\n",
"}"
] |
// SSHCertPublicKeys returns a list of trusted host SSH certificate authority public keys
|
[
"SSHCertPublicKeys",
"returns",
"a",
"list",
"of",
"trusted",
"host",
"SSH",
"certificate",
"authority",
"public",
"keys"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L247-L257
|
22,937
|
gravitational/teleport
|
lib/auth/methods.go
|
AuthoritiesToTrustedCerts
|
func AuthoritiesToTrustedCerts(authorities []services.CertAuthority) []TrustedCerts {
out := make([]TrustedCerts, len(authorities))
for i, ca := range authorities {
out[i] = TrustedCerts{
ClusterName: ca.GetClusterName(),
HostCertificates: ca.GetCheckingKeys(),
TLSCertificates: services.TLSCerts(ca),
}
}
return out
}
|
go
|
func AuthoritiesToTrustedCerts(authorities []services.CertAuthority) []TrustedCerts {
out := make([]TrustedCerts, len(authorities))
for i, ca := range authorities {
out[i] = TrustedCerts{
ClusterName: ca.GetClusterName(),
HostCertificates: ca.GetCheckingKeys(),
TLSCertificates: services.TLSCerts(ca),
}
}
return out
}
|
[
"func",
"AuthoritiesToTrustedCerts",
"(",
"authorities",
"[",
"]",
"services",
".",
"CertAuthority",
")",
"[",
"]",
"TrustedCerts",
"{",
"out",
":=",
"make",
"(",
"[",
"]",
"TrustedCerts",
",",
"len",
"(",
"authorities",
")",
")",
"\n",
"for",
"i",
",",
"ca",
":=",
"range",
"authorities",
"{",
"out",
"[",
"i",
"]",
"=",
"TrustedCerts",
"{",
"ClusterName",
":",
"ca",
".",
"GetClusterName",
"(",
")",
",",
"HostCertificates",
":",
"ca",
".",
"GetCheckingKeys",
"(",
")",
",",
"TLSCertificates",
":",
"services",
".",
"TLSCerts",
"(",
"ca",
")",
",",
"}",
"\n",
"}",
"\n",
"return",
"out",
"\n",
"}"
] |
// AuthoritiesToTrustedCerts serializes authorities to TrustedCerts data structure
|
[
"AuthoritiesToTrustedCerts",
"serializes",
"authorities",
"to",
"TrustedCerts",
"data",
"structure"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L260-L270
|
22,938
|
gravitational/teleport
|
lib/auth/methods.go
|
AuthenticateSSHUser
|
func (s *AuthServer) AuthenticateSSHUser(req AuthenticateSSHRequest) (*SSHLoginResponse, error) {
clusterName, err := s.GetClusterName()
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.AuthenticateUser(req.AuthenticateUserRequest); err != nil {
return nil, trace.Wrap(err)
}
user, err := s.GetUser(req.Username)
if err != nil {
return nil, trace.Wrap(err)
}
roles, err := services.FetchRoles(user.GetRoles(), s, user.GetTraits())
if err != nil {
return nil, trace.Wrap(err)
}
// Return the host CA for this cluster only.
authority, err := s.GetCertAuthority(services.CertAuthID{
Type: services.HostCA,
DomainName: clusterName.GetClusterName(),
}, false)
if err != nil {
return nil, trace.Wrap(err)
}
hostCertAuthorities := []services.CertAuthority{
authority,
}
certs, err := s.generateUserCert(certRequest{
user: user,
roles: roles,
ttl: req.TTL,
publicKey: req.PublicKey,
compatibility: req.CompatibilityMode,
})
if err != nil {
return nil, trace.Wrap(err)
}
return &SSHLoginResponse{
Username: req.Username,
Cert: certs.ssh,
TLSCert: certs.tls,
HostSigners: AuthoritiesToTrustedCerts(hostCertAuthorities),
}, nil
}
|
go
|
func (s *AuthServer) AuthenticateSSHUser(req AuthenticateSSHRequest) (*SSHLoginResponse, error) {
clusterName, err := s.GetClusterName()
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.AuthenticateUser(req.AuthenticateUserRequest); err != nil {
return nil, trace.Wrap(err)
}
user, err := s.GetUser(req.Username)
if err != nil {
return nil, trace.Wrap(err)
}
roles, err := services.FetchRoles(user.GetRoles(), s, user.GetTraits())
if err != nil {
return nil, trace.Wrap(err)
}
// Return the host CA for this cluster only.
authority, err := s.GetCertAuthority(services.CertAuthID{
Type: services.HostCA,
DomainName: clusterName.GetClusterName(),
}, false)
if err != nil {
return nil, trace.Wrap(err)
}
hostCertAuthorities := []services.CertAuthority{
authority,
}
certs, err := s.generateUserCert(certRequest{
user: user,
roles: roles,
ttl: req.TTL,
publicKey: req.PublicKey,
compatibility: req.CompatibilityMode,
})
if err != nil {
return nil, trace.Wrap(err)
}
return &SSHLoginResponse{
Username: req.Username,
Cert: certs.ssh,
TLSCert: certs.tls,
HostSigners: AuthoritiesToTrustedCerts(hostCertAuthorities),
}, nil
}
|
[
"func",
"(",
"s",
"*",
"AuthServer",
")",
"AuthenticateSSHUser",
"(",
"req",
"AuthenticateSSHRequest",
")",
"(",
"*",
"SSHLoginResponse",
",",
"error",
")",
"{",
"clusterName",
",",
"err",
":=",
"s",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"s",
".",
"AuthenticateUser",
"(",
"req",
".",
"AuthenticateUserRequest",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"user",
",",
"err",
":=",
"s",
".",
"GetUser",
"(",
"req",
".",
"Username",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"roles",
",",
"err",
":=",
"services",
".",
"FetchRoles",
"(",
"user",
".",
"GetRoles",
"(",
")",
",",
"s",
",",
"user",
".",
"GetTraits",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Return the host CA for this cluster only.",
"authority",
",",
"err",
":=",
"s",
".",
"GetCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"HostCA",
",",
"DomainName",
":",
"clusterName",
".",
"GetClusterName",
"(",
")",
",",
"}",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"hostCertAuthorities",
":=",
"[",
"]",
"services",
".",
"CertAuthority",
"{",
"authority",
",",
"}",
"\n\n",
"certs",
",",
"err",
":=",
"s",
".",
"generateUserCert",
"(",
"certRequest",
"{",
"user",
":",
"user",
",",
"roles",
":",
"roles",
",",
"ttl",
":",
"req",
".",
"TTL",
",",
"publicKey",
":",
"req",
".",
"PublicKey",
",",
"compatibility",
":",
"req",
".",
"CompatibilityMode",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"&",
"SSHLoginResponse",
"{",
"Username",
":",
"req",
".",
"Username",
",",
"Cert",
":",
"certs",
".",
"ssh",
",",
"TLSCert",
":",
"certs",
".",
"tls",
",",
"HostSigners",
":",
"AuthoritiesToTrustedCerts",
"(",
"hostCertAuthorities",
")",
",",
"}",
",",
"nil",
"\n",
"}"
] |
// AuthenticateSSHUser authenticates web user, creates and returns web session
// in case if authentication is successful
|
[
"AuthenticateSSHUser",
"authenticates",
"web",
"user",
"creates",
"and",
"returns",
"web",
"session",
"in",
"case",
"if",
"authentication",
"is",
"successful"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/methods.go#L274-L320
|
22,939
|
gravitational/teleport
|
lib/pam/pam.go
|
unregisterHandler
|
func unregisterHandler(handlerIndex int) {
handlerMu.Lock()
defer handlerMu.Unlock()
delete(handlers, handlerIndex)
}
|
go
|
func unregisterHandler(handlerIndex int) {
handlerMu.Lock()
defer handlerMu.Unlock()
delete(handlers, handlerIndex)
}
|
[
"func",
"unregisterHandler",
"(",
"handlerIndex",
"int",
")",
"{",
"handlerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"handlerMu",
".",
"Unlock",
"(",
")",
"\n\n",
"delete",
"(",
"handlers",
",",
"handlerIndex",
")",
"\n",
"}"
] |
// unregisterHandler will remove the PAM handle from the package level map
// once no more C callbacks can come back.
|
[
"unregisterHandler",
"will",
"remove",
"the",
"PAM",
"handle",
"from",
"the",
"package",
"level",
"map",
"once",
"no",
"more",
"C",
"callbacks",
"can",
"come",
"back",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L140-L145
|
22,940
|
gravitational/teleport
|
lib/pam/pam.go
|
lookupHandler
|
func lookupHandler(handlerIndex int) (handler, error) {
handlerMu.Lock()
defer handlerMu.Unlock()
handle, ok := handlers[handlerIndex]
if !ok {
return nil, trace.BadParameter("handler with index %v not registered", handlerIndex)
}
return handle, nil
}
|
go
|
func lookupHandler(handlerIndex int) (handler, error) {
handlerMu.Lock()
defer handlerMu.Unlock()
handle, ok := handlers[handlerIndex]
if !ok {
return nil, trace.BadParameter("handler with index %v not registered", handlerIndex)
}
return handle, nil
}
|
[
"func",
"lookupHandler",
"(",
"handlerIndex",
"int",
")",
"(",
"handler",
",",
"error",
")",
"{",
"handlerMu",
".",
"Lock",
"(",
")",
"\n",
"defer",
"handlerMu",
".",
"Unlock",
"(",
")",
"\n\n",
"handle",
",",
"ok",
":=",
"handlers",
"[",
"handlerIndex",
"]",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"handlerIndex",
")",
"\n",
"}",
"\n\n",
"return",
"handle",
",",
"nil",
"\n",
"}"
] |
// lookupHandler returns a particular handler from the package level map.
|
[
"lookupHandler",
"returns",
"a",
"particular",
"handler",
"from",
"the",
"package",
"level",
"map",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L148-L158
|
22,941
|
gravitational/teleport
|
lib/pam/pam.go
|
Open
|
func Open(config *Config) (*PAM, error) {
if config == nil {
return nil, trace.BadParameter("PAM configuration is required.")
}
err := config.CheckDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
p := &PAM{
pamh: nil,
stdin: config.Stdin,
stdout: config.Stdout,
stderr: config.Stderr,
}
// Both config.ServiceName and config.Username convert between Go strings to
// C strings. Since the C strings are allocated on the heap in Go code, this
// memory must be released (and will be on the call to the Close method).
p.service_name = C.CString(config.ServiceName)
p.user = C.CString(config.Username)
// C code does not know that this PAM context exists. To ensure the
// conversation function can get messages to the right context, a handle
// registry at the package level is created (handlers). Each instance of the
// PAM context has it's own handle which is used to communicate between C
// and a instance of a PAM context.
p.handlerIndex = registerHandler(p)
// Create and initialize a PAM context. The pam_start function will
// allocate pamh if needed and the pam_end function will release any
// allocated memory.
p.retval = C._pam_start(pamHandle, p.service_name, p.user, p.conv, &p.pamh)
if p.retval != C.PAM_SUCCESS {
return nil, p.codeToError(p.retval)
}
// Check that the *nix account is valid. Checking an account varies based off
// the PAM modules used in the account stack. Typically this consists of
// checking if the account is expired or has access restrictions.
//
// Note: This function does not perform any authentication!
retval := C._pam_acct_mgmt(pamHandle, p.pamh, 0)
if retval != C.PAM_SUCCESS {
return nil, p.codeToError(retval)
}
// Open a user session. Opening a session varies based off the PAM modules
// used in the "session" stack. Opening a session typically consists of
// printing the MOTD, mounting a home directory, updating auth.log.
p.retval = C._pam_open_session(pamHandle, p.pamh, 0)
if p.retval != C.PAM_SUCCESS {
return nil, p.codeToError(p.retval)
}
return p, nil
}
|
go
|
func Open(config *Config) (*PAM, error) {
if config == nil {
return nil, trace.BadParameter("PAM configuration is required.")
}
err := config.CheckDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
p := &PAM{
pamh: nil,
stdin: config.Stdin,
stdout: config.Stdout,
stderr: config.Stderr,
}
// Both config.ServiceName and config.Username convert between Go strings to
// C strings. Since the C strings are allocated on the heap in Go code, this
// memory must be released (and will be on the call to the Close method).
p.service_name = C.CString(config.ServiceName)
p.user = C.CString(config.Username)
// C code does not know that this PAM context exists. To ensure the
// conversation function can get messages to the right context, a handle
// registry at the package level is created (handlers). Each instance of the
// PAM context has it's own handle which is used to communicate between C
// and a instance of a PAM context.
p.handlerIndex = registerHandler(p)
// Create and initialize a PAM context. The pam_start function will
// allocate pamh if needed and the pam_end function will release any
// allocated memory.
p.retval = C._pam_start(pamHandle, p.service_name, p.user, p.conv, &p.pamh)
if p.retval != C.PAM_SUCCESS {
return nil, p.codeToError(p.retval)
}
// Check that the *nix account is valid. Checking an account varies based off
// the PAM modules used in the account stack. Typically this consists of
// checking if the account is expired or has access restrictions.
//
// Note: This function does not perform any authentication!
retval := C._pam_acct_mgmt(pamHandle, p.pamh, 0)
if retval != C.PAM_SUCCESS {
return nil, p.codeToError(retval)
}
// Open a user session. Opening a session varies based off the PAM modules
// used in the "session" stack. Opening a session typically consists of
// printing the MOTD, mounting a home directory, updating auth.log.
p.retval = C._pam_open_session(pamHandle, p.pamh, 0)
if p.retval != C.PAM_SUCCESS {
return nil, p.codeToError(p.retval)
}
return p, nil
}
|
[
"func",
"Open",
"(",
"config",
"*",
"Config",
")",
"(",
"*",
"PAM",
",",
"error",
")",
"{",
"if",
"config",
"==",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"err",
":=",
"config",
".",
"CheckDefaults",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"p",
":=",
"&",
"PAM",
"{",
"pamh",
":",
"nil",
",",
"stdin",
":",
"config",
".",
"Stdin",
",",
"stdout",
":",
"config",
".",
"Stdout",
",",
"stderr",
":",
"config",
".",
"Stderr",
",",
"}",
"\n\n",
"// Both config.ServiceName and config.Username convert between Go strings to",
"// C strings. Since the C strings are allocated on the heap in Go code, this",
"// memory must be released (and will be on the call to the Close method).",
"p",
".",
"service_name",
"=",
"C",
".",
"CString",
"(",
"config",
".",
"ServiceName",
")",
"\n",
"p",
".",
"user",
"=",
"C",
".",
"CString",
"(",
"config",
".",
"Username",
")",
"\n\n",
"// C code does not know that this PAM context exists. To ensure the",
"// conversation function can get messages to the right context, a handle",
"// registry at the package level is created (handlers). Each instance of the",
"// PAM context has it's own handle which is used to communicate between C",
"// and a instance of a PAM context.",
"p",
".",
"handlerIndex",
"=",
"registerHandler",
"(",
"p",
")",
"\n\n",
"// Create and initialize a PAM context. The pam_start function will",
"// allocate pamh if needed and the pam_end function will release any",
"// allocated memory.",
"p",
".",
"retval",
"=",
"C",
".",
"_pam_start",
"(",
"pamHandle",
",",
"p",
".",
"service_name",
",",
"p",
".",
"user",
",",
"p",
".",
"conv",
",",
"&",
"p",
".",
"pamh",
")",
"\n",
"if",
"p",
".",
"retval",
"!=",
"C",
".",
"PAM_SUCCESS",
"{",
"return",
"nil",
",",
"p",
".",
"codeToError",
"(",
"p",
".",
"retval",
")",
"\n",
"}",
"\n\n",
"// Check that the *nix account is valid. Checking an account varies based off",
"// the PAM modules used in the account stack. Typically this consists of",
"// checking if the account is expired or has access restrictions.",
"//",
"// Note: This function does not perform any authentication!",
"retval",
":=",
"C",
".",
"_pam_acct_mgmt",
"(",
"pamHandle",
",",
"p",
".",
"pamh",
",",
"0",
")",
"\n",
"if",
"retval",
"!=",
"C",
".",
"PAM_SUCCESS",
"{",
"return",
"nil",
",",
"p",
".",
"codeToError",
"(",
"retval",
")",
"\n",
"}",
"\n\n",
"// Open a user session. Opening a session varies based off the PAM modules",
"// used in the \"session\" stack. Opening a session typically consists of",
"// printing the MOTD, mounting a home directory, updating auth.log.",
"p",
".",
"retval",
"=",
"C",
".",
"_pam_open_session",
"(",
"pamHandle",
",",
"p",
".",
"pamh",
",",
"0",
")",
"\n",
"if",
"p",
".",
"retval",
"!=",
"C",
".",
"PAM_SUCCESS",
"{",
"return",
"nil",
",",
"p",
".",
"codeToError",
"(",
"p",
".",
"retval",
")",
"\n",
"}",
"\n\n",
"return",
"p",
",",
"nil",
"\n",
"}"
] |
// Open creates a PAM context and initiates a PAM transaction to check the
// account and then opens a session.
|
[
"Open",
"creates",
"a",
"PAM",
"context",
"and",
"initiates",
"a",
"PAM",
"transaction",
"to",
"check",
"the",
"account",
"and",
"then",
"opens",
"a",
"session",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L215-L271
|
22,942
|
gravitational/teleport
|
lib/pam/pam.go
|
Close
|
func (p *PAM) Close() error {
// Close the PAM session. Closing a session can entail anything from
// unmounting a home directory and updating auth.log.
p.retval = C._pam_close_session(pamHandle, p.pamh, 0)
if p.retval != C.PAM_SUCCESS {
return p.codeToError(p.retval)
}
// Terminate the PAM transaction.
retval := C._pam_end(pamHandle, p.pamh, p.retval)
if retval != C.PAM_SUCCESS {
return p.codeToError(retval)
}
// Unregister handler index at the package level.
unregisterHandler(p.handlerIndex)
// Release the memory allocated for the conversation function.
C.free(unsafe.Pointer(p.conv))
// Release strings that were allocated when opening the PAM context.
C.free(unsafe.Pointer(p.service_name))
C.free(unsafe.Pointer(p.user))
return nil
}
|
go
|
func (p *PAM) Close() error {
// Close the PAM session. Closing a session can entail anything from
// unmounting a home directory and updating auth.log.
p.retval = C._pam_close_session(pamHandle, p.pamh, 0)
if p.retval != C.PAM_SUCCESS {
return p.codeToError(p.retval)
}
// Terminate the PAM transaction.
retval := C._pam_end(pamHandle, p.pamh, p.retval)
if retval != C.PAM_SUCCESS {
return p.codeToError(retval)
}
// Unregister handler index at the package level.
unregisterHandler(p.handlerIndex)
// Release the memory allocated for the conversation function.
C.free(unsafe.Pointer(p.conv))
// Release strings that were allocated when opening the PAM context.
C.free(unsafe.Pointer(p.service_name))
C.free(unsafe.Pointer(p.user))
return nil
}
|
[
"func",
"(",
"p",
"*",
"PAM",
")",
"Close",
"(",
")",
"error",
"{",
"// Close the PAM session. Closing a session can entail anything from",
"// unmounting a home directory and updating auth.log.",
"p",
".",
"retval",
"=",
"C",
".",
"_pam_close_session",
"(",
"pamHandle",
",",
"p",
".",
"pamh",
",",
"0",
")",
"\n",
"if",
"p",
".",
"retval",
"!=",
"C",
".",
"PAM_SUCCESS",
"{",
"return",
"p",
".",
"codeToError",
"(",
"p",
".",
"retval",
")",
"\n",
"}",
"\n\n",
"// Terminate the PAM transaction.",
"retval",
":=",
"C",
".",
"_pam_end",
"(",
"pamHandle",
",",
"p",
".",
"pamh",
",",
"p",
".",
"retval",
")",
"\n",
"if",
"retval",
"!=",
"C",
".",
"PAM_SUCCESS",
"{",
"return",
"p",
".",
"codeToError",
"(",
"retval",
")",
"\n",
"}",
"\n\n",
"// Unregister handler index at the package level.",
"unregisterHandler",
"(",
"p",
".",
"handlerIndex",
")",
"\n\n",
"// Release the memory allocated for the conversation function.",
"C",
".",
"free",
"(",
"unsafe",
".",
"Pointer",
"(",
"p",
".",
"conv",
")",
")",
"\n\n",
"// Release strings that were allocated when opening the PAM context.",
"C",
".",
"free",
"(",
"unsafe",
".",
"Pointer",
"(",
"p",
".",
"service_name",
")",
")",
"\n",
"C",
".",
"free",
"(",
"unsafe",
".",
"Pointer",
"(",
"p",
".",
"user",
")",
")",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// Close will close the session, the PAM context, and release any allocated
// memory.
|
[
"Close",
"will",
"close",
"the",
"session",
"the",
"PAM",
"context",
"and",
"release",
"any",
"allocated",
"memory",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L275-L300
|
22,943
|
gravitational/teleport
|
lib/pam/pam.go
|
codeToError
|
func (p *PAM) codeToError(returnValue C.int) error {
// Error strings are not allocated on the heap, so memory does not need
// released.
err := C._pam_strerror(pamHandle, p.pamh, returnValue)
if err != nil {
return trace.BadParameter(C.GoString(err))
}
return nil
}
|
go
|
func (p *PAM) codeToError(returnValue C.int) error {
// Error strings are not allocated on the heap, so memory does not need
// released.
err := C._pam_strerror(pamHandle, p.pamh, returnValue)
if err != nil {
return trace.BadParameter(C.GoString(err))
}
return nil
}
|
[
"func",
"(",
"p",
"*",
"PAM",
")",
"codeToError",
"(",
"returnValue",
"C",
".",
"int",
")",
"error",
"{",
"// Error strings are not allocated on the heap, so memory does not need",
"// released.",
"err",
":=",
"C",
".",
"_pam_strerror",
"(",
"pamHandle",
",",
"p",
".",
"pamh",
",",
"returnValue",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"C",
".",
"GoString",
"(",
"err",
")",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// codeToError returns a human readable string from the PAM error.
|
[
"codeToError",
"returns",
"a",
"human",
"readable",
"string",
"from",
"the",
"PAM",
"error",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/pam/pam.go#L334-L343
|
22,944
|
gravitational/teleport
|
lib/utils/fakeconn.go
|
DualPipeNetConn
|
func DualPipeNetConn(srcAddr net.Addr, dstAddr net.Addr) (*PipeNetConn, *PipeNetConn) {
server, client := net.Pipe()
serverConn := NewPipeNetConn(server, server, server, dstAddr, srcAddr)
clientConn := NewPipeNetConn(client, client, client, srcAddr, dstAddr)
return serverConn, clientConn
}
|
go
|
func DualPipeNetConn(srcAddr net.Addr, dstAddr net.Addr) (*PipeNetConn, *PipeNetConn) {
server, client := net.Pipe()
serverConn := NewPipeNetConn(server, server, server, dstAddr, srcAddr)
clientConn := NewPipeNetConn(client, client, client, srcAddr, dstAddr)
return serverConn, clientConn
}
|
[
"func",
"DualPipeNetConn",
"(",
"srcAddr",
"net",
".",
"Addr",
",",
"dstAddr",
"net",
".",
"Addr",
")",
"(",
"*",
"PipeNetConn",
",",
"*",
"PipeNetConn",
")",
"{",
"server",
",",
"client",
":=",
"net",
".",
"Pipe",
"(",
")",
"\n\n",
"serverConn",
":=",
"NewPipeNetConn",
"(",
"server",
",",
"server",
",",
"server",
",",
"dstAddr",
",",
"srcAddr",
")",
"\n",
"clientConn",
":=",
"NewPipeNetConn",
"(",
"client",
",",
"client",
",",
"client",
",",
"srcAddr",
",",
"dstAddr",
")",
"\n\n",
"return",
"serverConn",
",",
"clientConn",
"\n",
"}"
] |
// DualPipeAddrConn creates a net.Pipe to connect a client and a server. The
// two net.Conn instances are wrapped in an addrConn which holds the source and
// destination addresses.
|
[
"DualPipeAddrConn",
"creates",
"a",
"net",
".",
"Pipe",
"to",
"connect",
"a",
"client",
"and",
"a",
"server",
".",
"The",
"two",
"net",
".",
"Conn",
"instances",
"are",
"wrapped",
"in",
"an",
"addrConn",
"which",
"holds",
"the",
"source",
"and",
"destination",
"addresses",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/fakeconn.go#L89-L96
|
22,945
|
gravitational/teleport
|
lib/services/clustername.go
|
NewClusterName
|
func NewClusterName(spec ClusterNameSpecV2) (ClusterName, error) {
cn := ClusterNameV2{
Kind: KindClusterName,
Version: V2,
Metadata: Metadata{
Name: MetaNameClusterName,
Namespace: defaults.Namespace,
},
Spec: spec,
}
if err := cn.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return &cn, nil
}
|
go
|
func NewClusterName(spec ClusterNameSpecV2) (ClusterName, error) {
cn := ClusterNameV2{
Kind: KindClusterName,
Version: V2,
Metadata: Metadata{
Name: MetaNameClusterName,
Namespace: defaults.Namespace,
},
Spec: spec,
}
if err := cn.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return &cn, nil
}
|
[
"func",
"NewClusterName",
"(",
"spec",
"ClusterNameSpecV2",
")",
"(",
"ClusterName",
",",
"error",
")",
"{",
"cn",
":=",
"ClusterNameV2",
"{",
"Kind",
":",
"KindClusterName",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"MetaNameClusterName",
",",
"Namespace",
":",
"defaults",
".",
"Namespace",
",",
"}",
",",
"Spec",
":",
"spec",
",",
"}",
"\n",
"if",
"err",
":=",
"cn",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"cn",
",",
"nil",
"\n",
"}"
] |
// NewClusterName is a convenience wrapper to create a ClusterName resource.
|
[
"NewClusterName",
"is",
"a",
"convenience",
"wrapper",
"to",
"create",
"a",
"ClusterName",
"resource",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L46-L61
|
22,946
|
gravitational/teleport
|
lib/services/clustername.go
|
GetClusterNameSchema
|
func GetClusterNameSchema(extensionSchema string) string {
var clusterNameSchema string
if clusterNameSchema == "" {
clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, "")
} else {
clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, ","+extensionSchema)
}
return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterNameSchema, DefaultDefinitions)
}
|
go
|
func GetClusterNameSchema(extensionSchema string) string {
var clusterNameSchema string
if clusterNameSchema == "" {
clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, "")
} else {
clusterNameSchema = fmt.Sprintf(ClusterNameSpecSchemaTemplate, ","+extensionSchema)
}
return fmt.Sprintf(V2SchemaTemplate, MetadataSchema, clusterNameSchema, DefaultDefinitions)
}
|
[
"func",
"GetClusterNameSchema",
"(",
"extensionSchema",
"string",
")",
"string",
"{",
"var",
"clusterNameSchema",
"string",
"\n",
"if",
"clusterNameSchema",
"==",
"\"",
"\"",
"{",
"clusterNameSchema",
"=",
"fmt",
".",
"Sprintf",
"(",
"ClusterNameSpecSchemaTemplate",
",",
"\"",
"\"",
")",
"\n",
"}",
"else",
"{",
"clusterNameSchema",
"=",
"fmt",
".",
"Sprintf",
"(",
"ClusterNameSpecSchemaTemplate",
",",
"\"",
"\"",
"+",
"extensionSchema",
")",
"\n",
"}",
"\n",
"return",
"fmt",
".",
"Sprintf",
"(",
"V2SchemaTemplate",
",",
"MetadataSchema",
",",
"clusterNameSchema",
",",
"DefaultDefinitions",
")",
"\n",
"}"
] |
// GetClusterNameSchema returns the schema with optionally injected
// schema for extensions.
|
[
"GetClusterNameSchema",
"returns",
"the",
"schema",
"with",
"optionally",
"injected",
"schema",
"for",
"extensions",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L166-L174
|
22,947
|
gravitational/teleport
|
lib/services/clustername.go
|
Unmarshal
|
func (t *TeleportClusterNameMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterName, error) {
var clusterName ClusterNameV2
if len(bytes) == 0 {
return nil, trace.BadParameter("missing resource data")
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.SkipValidation {
if err := utils.FastUnmarshal(bytes, &clusterName); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
err = utils.UnmarshalWithSchema(GetClusterNameSchema(""), &clusterName, bytes)
if err != nil {
return nil, trace.BadParameter(err.Error())
}
}
err = clusterName.CheckAndSetDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
clusterName.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
clusterName.SetExpiry(cfg.Expires)
}
return &clusterName, nil
}
|
go
|
func (t *TeleportClusterNameMarshaler) Unmarshal(bytes []byte, opts ...MarshalOption) (ClusterName, error) {
var clusterName ClusterNameV2
if len(bytes) == 0 {
return nil, trace.BadParameter("missing resource data")
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.SkipValidation {
if err := utils.FastUnmarshal(bytes, &clusterName); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
err = utils.UnmarshalWithSchema(GetClusterNameSchema(""), &clusterName, bytes)
if err != nil {
return nil, trace.BadParameter(err.Error())
}
}
err = clusterName.CheckAndSetDefaults()
if err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
clusterName.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
clusterName.SetExpiry(cfg.Expires)
}
return &clusterName, nil
}
|
[
"func",
"(",
"t",
"*",
"TeleportClusterNameMarshaler",
")",
"Unmarshal",
"(",
"bytes",
"[",
"]",
"byte",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"ClusterName",
",",
"error",
")",
"{",
"var",
"clusterName",
"ClusterNameV2",
"\n\n",
"if",
"len",
"(",
"bytes",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"cfg",
".",
"SkipValidation",
"{",
"if",
"err",
":=",
"utils",
".",
"FastUnmarshal",
"(",
"bytes",
",",
"&",
"clusterName",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"err",
"=",
"utils",
".",
"UnmarshalWithSchema",
"(",
"GetClusterNameSchema",
"(",
"\"",
"\"",
")",
",",
"&",
"clusterName",
",",
"bytes",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"err",
"=",
"clusterName",
".",
"CheckAndSetDefaults",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"cfg",
".",
"ID",
"!=",
"0",
"{",
"clusterName",
".",
"SetResourceID",
"(",
"cfg",
".",
"ID",
")",
"\n",
"}",
"\n",
"if",
"!",
"cfg",
".",
"Expires",
".",
"IsZero",
"(",
")",
"{",
"clusterName",
".",
"SetExpiry",
"(",
"cfg",
".",
"Expires",
")",
"\n",
"}",
"\n\n",
"return",
"&",
"clusterName",
",",
"nil",
"\n",
"}"
] |
// Unmarshal unmarshals ClusterName from JSON.
|
[
"Unmarshal",
"unmarshals",
"ClusterName",
"from",
"JSON",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L203-L239
|
22,948
|
gravitational/teleport
|
lib/services/clustername.go
|
Marshal
|
func (t *TeleportClusterNameMarshaler) Marshal(c ClusterName, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := c.(type) {
case *ClusterNameV2:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", c)
}
}
|
go
|
func (t *TeleportClusterNameMarshaler) Marshal(c ClusterName, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := c.(type) {
case *ClusterNameV2:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", c)
}
}
|
[
"func",
"(",
"t",
"*",
"TeleportClusterNameMarshaler",
")",
"Marshal",
"(",
"c",
"ClusterName",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"switch",
"resource",
":=",
"c",
".",
"(",
"type",
")",
"{",
"case",
"*",
"ClusterNameV2",
":",
"if",
"!",
"cfg",
".",
"PreserveResourceID",
"{",
"// avoid modifying the original object",
"// to prevent unexpected data races",
"copy",
":=",
"*",
"resource",
"\n",
"copy",
".",
"SetResourceID",
"(",
"0",
")",
"\n",
"resource",
"=",
"&",
"copy",
"\n",
"}",
"\n",
"return",
"utils",
".",
"FastMarshal",
"(",
"resource",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"c",
")",
"\n",
"}",
"\n",
"}"
] |
// Marshal marshals ClusterName to JSON.
|
[
"Marshal",
"marshals",
"ClusterName",
"to",
"JSON",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/clustername.go#L242-L260
|
22,949
|
gravitational/teleport
|
lib/services/trust.go
|
Check
|
func (c CertAuthType) Check() error {
if c != HostCA && c != UserCA {
return trace.BadParameter("'%v' authority type is not supported", c)
}
return nil
}
|
go
|
func (c CertAuthType) Check() error {
if c != HostCA && c != UserCA {
return trace.BadParameter("'%v' authority type is not supported", c)
}
return nil
}
|
[
"func",
"(",
"c",
"CertAuthType",
")",
"Check",
"(",
")",
"error",
"{",
"if",
"c",
"!=",
"HostCA",
"&&",
"c",
"!=",
"UserCA",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"c",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Check checks if certificate authority type value is correct
|
[
"Check",
"checks",
"if",
"certificate",
"authority",
"type",
"value",
"is",
"correct"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trust.go#L81-L86
|
22,950
|
gravitational/teleport
|
lib/services/trust.go
|
Check
|
func (c *CertAuthID) Check() error {
if err := c.Type.Check(); err != nil {
return trace.Wrap(err)
}
if strings.TrimSpace(c.DomainName) == "" {
return trace.BadParameter("identity validation error: empty domain name")
}
return nil
}
|
go
|
func (c *CertAuthID) Check() error {
if err := c.Type.Check(); err != nil {
return trace.Wrap(err)
}
if strings.TrimSpace(c.DomainName) == "" {
return trace.BadParameter("identity validation error: empty domain name")
}
return nil
}
|
[
"func",
"(",
"c",
"*",
"CertAuthID",
")",
"Check",
"(",
")",
"error",
"{",
"if",
"err",
":=",
"c",
".",
"Type",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"strings",
".",
"TrimSpace",
"(",
"c",
".",
"DomainName",
")",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Check returns error if any of the id parameters are bad, nil otherwise
|
[
"Check",
"returns",
"error",
"if",
"any",
"of",
"the",
"id",
"parameters",
"are",
"bad",
"nil",
"otherwise"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/trust.go#L99-L107
|
22,951
|
gravitational/teleport
|
lib/services/tunnel.go
|
NewReverseTunnel
|
func NewReverseTunnel(clusterName string, dialAddrs []string) ReverseTunnel {
return &ReverseTunnelV2{
Kind: KindReverseTunnel,
Version: V2,
Metadata: Metadata{
Name: clusterName,
Namespace: defaults.Namespace,
},
Spec: ReverseTunnelSpecV2{
ClusterName: clusterName,
DialAddrs: dialAddrs,
},
}
}
|
go
|
func NewReverseTunnel(clusterName string, dialAddrs []string) ReverseTunnel {
return &ReverseTunnelV2{
Kind: KindReverseTunnel,
Version: V2,
Metadata: Metadata{
Name: clusterName,
Namespace: defaults.Namespace,
},
Spec: ReverseTunnelSpecV2{
ClusterName: clusterName,
DialAddrs: dialAddrs,
},
}
}
|
[
"func",
"NewReverseTunnel",
"(",
"clusterName",
"string",
",",
"dialAddrs",
"[",
"]",
"string",
")",
"ReverseTunnel",
"{",
"return",
"&",
"ReverseTunnelV2",
"{",
"Kind",
":",
"KindReverseTunnel",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"clusterName",
",",
"Namespace",
":",
"defaults",
".",
"Namespace",
",",
"}",
",",
"Spec",
":",
"ReverseTunnelSpecV2",
"{",
"ClusterName",
":",
"clusterName",
",",
"DialAddrs",
":",
"dialAddrs",
",",
"}",
",",
"}",
"\n",
"}"
] |
// NewReverseTunnel returns new version of reverse tunnel
|
[
"NewReverseTunnel",
"returns",
"new",
"version",
"of",
"reverse",
"tunnel"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L55-L68
|
22,952
|
gravitational/teleport
|
lib/services/tunnel.go
|
V2
|
func (r *ReverseTunnelV1) V2() *ReverseTunnelV2 {
return &ReverseTunnelV2{
Kind: KindReverseTunnel,
Version: V2,
Metadata: Metadata{
Name: r.DomainName,
Namespace: defaults.Namespace,
},
Spec: ReverseTunnelSpecV2{
ClusterName: r.DomainName,
Type: ProxyTunnel,
DialAddrs: r.DialAddrs,
},
}
}
|
go
|
func (r *ReverseTunnelV1) V2() *ReverseTunnelV2 {
return &ReverseTunnelV2{
Kind: KindReverseTunnel,
Version: V2,
Metadata: Metadata{
Name: r.DomainName,
Namespace: defaults.Namespace,
},
Spec: ReverseTunnelSpecV2{
ClusterName: r.DomainName,
Type: ProxyTunnel,
DialAddrs: r.DialAddrs,
},
}
}
|
[
"func",
"(",
"r",
"*",
"ReverseTunnelV1",
")",
"V2",
"(",
")",
"*",
"ReverseTunnelV2",
"{",
"return",
"&",
"ReverseTunnelV2",
"{",
"Kind",
":",
"KindReverseTunnel",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"r",
".",
"DomainName",
",",
"Namespace",
":",
"defaults",
".",
"Namespace",
",",
"}",
",",
"Spec",
":",
"ReverseTunnelSpecV2",
"{",
"ClusterName",
":",
"r",
".",
"DomainName",
",",
"Type",
":",
"ProxyTunnel",
",",
"DialAddrs",
":",
"r",
".",
"DialAddrs",
",",
"}",
",",
"}",
"\n",
"}"
] |
// V2 returns V2 version of reverse tunnel
|
[
"V2",
"returns",
"V2",
"version",
"of",
"reverse",
"tunnel"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L240-L254
|
22,953
|
gravitational/teleport
|
lib/services/tunnel.go
|
UnmarshalReverseTunnel
|
func UnmarshalReverseTunnel(data []byte, opts ...MarshalOption) (ReverseTunnel, error) {
if len(data) == 0 {
return nil, trace.BadParameter("missing tunnel data")
}
var h ResourceHeader
err := json.Unmarshal(data, &h)
if err != nil {
return nil, trace.Wrap(err)
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch h.Version {
case "":
var r ReverseTunnelV1
err := json.Unmarshal(data, &r)
if err != nil {
return nil, trace.Wrap(err)
}
v2 := r.V2()
if cfg.ID != 0 {
v2.SetResourceID(cfg.ID)
}
return r.V2(), nil
case V2:
var r ReverseTunnelV2
if cfg.SkipValidation {
if err := utils.FastUnmarshal(data, &r); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
if err := utils.UnmarshalWithSchema(GetReverseTunnelSchema(), &r, data); err != nil {
return nil, trace.BadParameter(err.Error())
}
}
if err := r.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
r.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
r.SetExpiry(cfg.Expires)
}
return &r, nil
}
return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version)
}
|
go
|
func UnmarshalReverseTunnel(data []byte, opts ...MarshalOption) (ReverseTunnel, error) {
if len(data) == 0 {
return nil, trace.BadParameter("missing tunnel data")
}
var h ResourceHeader
err := json.Unmarshal(data, &h)
if err != nil {
return nil, trace.Wrap(err)
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch h.Version {
case "":
var r ReverseTunnelV1
err := json.Unmarshal(data, &r)
if err != nil {
return nil, trace.Wrap(err)
}
v2 := r.V2()
if cfg.ID != 0 {
v2.SetResourceID(cfg.ID)
}
return r.V2(), nil
case V2:
var r ReverseTunnelV2
if cfg.SkipValidation {
if err := utils.FastUnmarshal(data, &r); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
if err := utils.UnmarshalWithSchema(GetReverseTunnelSchema(), &r, data); err != nil {
return nil, trace.BadParameter(err.Error())
}
}
if err := r.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
r.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
r.SetExpiry(cfg.Expires)
}
return &r, nil
}
return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version)
}
|
[
"func",
"UnmarshalReverseTunnel",
"(",
"data",
"[",
"]",
"byte",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"ReverseTunnel",
",",
"error",
")",
"{",
"if",
"len",
"(",
"data",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"var",
"h",
"ResourceHeader",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"data",
",",
"&",
"h",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"switch",
"h",
".",
"Version",
"{",
"case",
"\"",
"\"",
":",
"var",
"r",
"ReverseTunnelV1",
"\n",
"err",
":=",
"json",
".",
"Unmarshal",
"(",
"data",
",",
"&",
"r",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"v2",
":=",
"r",
".",
"V2",
"(",
")",
"\n",
"if",
"cfg",
".",
"ID",
"!=",
"0",
"{",
"v2",
".",
"SetResourceID",
"(",
"cfg",
".",
"ID",
")",
"\n",
"}",
"\n",
"return",
"r",
".",
"V2",
"(",
")",
",",
"nil",
"\n",
"case",
"V2",
":",
"var",
"r",
"ReverseTunnelV2",
"\n",
"if",
"cfg",
".",
"SkipValidation",
"{",
"if",
"err",
":=",
"utils",
".",
"FastUnmarshal",
"(",
"data",
",",
"&",
"r",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"utils",
".",
"UnmarshalWithSchema",
"(",
"GetReverseTunnelSchema",
"(",
")",
",",
"&",
"r",
",",
"data",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n",
"if",
"err",
":=",
"r",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"cfg",
".",
"ID",
"!=",
"0",
"{",
"r",
".",
"SetResourceID",
"(",
"cfg",
".",
"ID",
")",
"\n",
"}",
"\n",
"if",
"!",
"cfg",
".",
"Expires",
".",
"IsZero",
"(",
")",
"{",
"r",
".",
"SetExpiry",
"(",
"cfg",
".",
"Expires",
")",
"\n",
"}",
"\n",
"return",
"&",
"r",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"h",
".",
"Version",
")",
"\n",
"}"
] |
// UnmarshalReverseTunnel unmarshals reverse tunnel from JSON or YAML,
// sets defaults and checks the schema
|
[
"UnmarshalReverseTunnel",
"unmarshals",
"reverse",
"tunnel",
"from",
"JSON",
"or",
"YAML",
"sets",
"defaults",
"and",
"checks",
"the",
"schema"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L264-L313
|
22,954
|
gravitational/teleport
|
lib/services/tunnel.go
|
UnmarshalReverseTunnel
|
func (*TeleportTunnelMarshaler) UnmarshalReverseTunnel(bytes []byte, opts ...MarshalOption) (ReverseTunnel, error) {
return UnmarshalReverseTunnel(bytes, opts...)
}
|
go
|
func (*TeleportTunnelMarshaler) UnmarshalReverseTunnel(bytes []byte, opts ...MarshalOption) (ReverseTunnel, error) {
return UnmarshalReverseTunnel(bytes, opts...)
}
|
[
"func",
"(",
"*",
"TeleportTunnelMarshaler",
")",
"UnmarshalReverseTunnel",
"(",
"bytes",
"[",
"]",
"byte",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"ReverseTunnel",
",",
"error",
")",
"{",
"return",
"UnmarshalReverseTunnel",
"(",
"bytes",
",",
"opts",
"...",
")",
"\n",
"}"
] |
// UnmarshalReverseTunnel unmarshals reverse tunnel from JSON or YAML
|
[
"UnmarshalReverseTunnel",
"unmarshals",
"reverse",
"tunnel",
"from",
"JSON",
"or",
"YAML"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L340-L342
|
22,955
|
gravitational/teleport
|
lib/services/tunnel.go
|
MarshalReverseTunnel
|
func (*TeleportTunnelMarshaler) MarshalReverseTunnel(rt ReverseTunnel, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
type tunv1 interface {
V1() *ReverseTunnelV1
}
type tunv2 interface {
V2() *ReverseTunnelV2
}
version := cfg.GetVersion()
switch version {
case V1:
v, ok := rt.(tunv1)
if !ok {
return nil, trace.BadParameter("don't know how to marshal %v", V1)
}
return json.Marshal(v.V1())
case V2:
v, ok := rt.(tunv2)
if !ok {
return nil, trace.BadParameter("don't know how to marshal %v", V2)
}
v2 := v.V2()
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *v2
copy.SetResourceID(0)
v2 = ©
}
return utils.FastMarshal(v2)
default:
return nil, trace.BadParameter("version %v is not supported", version)
}
}
|
go
|
func (*TeleportTunnelMarshaler) MarshalReverseTunnel(rt ReverseTunnel, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
type tunv1 interface {
V1() *ReverseTunnelV1
}
type tunv2 interface {
V2() *ReverseTunnelV2
}
version := cfg.GetVersion()
switch version {
case V1:
v, ok := rt.(tunv1)
if !ok {
return nil, trace.BadParameter("don't know how to marshal %v", V1)
}
return json.Marshal(v.V1())
case V2:
v, ok := rt.(tunv2)
if !ok {
return nil, trace.BadParameter("don't know how to marshal %v", V2)
}
v2 := v.V2()
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *v2
copy.SetResourceID(0)
v2 = ©
}
return utils.FastMarshal(v2)
default:
return nil, trace.BadParameter("version %v is not supported", version)
}
}
|
[
"func",
"(",
"*",
"TeleportTunnelMarshaler",
")",
"MarshalReverseTunnel",
"(",
"rt",
"ReverseTunnel",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"type",
"tunv1",
"interface",
"{",
"V1",
"(",
")",
"*",
"ReverseTunnelV1",
"\n",
"}",
"\n",
"type",
"tunv2",
"interface",
"{",
"V2",
"(",
")",
"*",
"ReverseTunnelV2",
"\n",
"}",
"\n",
"version",
":=",
"cfg",
".",
"GetVersion",
"(",
")",
"\n",
"switch",
"version",
"{",
"case",
"V1",
":",
"v",
",",
"ok",
":=",
"rt",
".",
"(",
"tunv1",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"V1",
")",
"\n",
"}",
"\n",
"return",
"json",
".",
"Marshal",
"(",
"v",
".",
"V1",
"(",
")",
")",
"\n",
"case",
"V2",
":",
"v",
",",
"ok",
":=",
"rt",
".",
"(",
"tunv2",
")",
"\n",
"if",
"!",
"ok",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"V2",
")",
"\n",
"}",
"\n",
"v2",
":=",
"v",
".",
"V2",
"(",
")",
"\n",
"if",
"!",
"cfg",
".",
"PreserveResourceID",
"{",
"// avoid modifying the original object",
"// to prevent unexpected data races",
"copy",
":=",
"*",
"v2",
"\n",
"copy",
".",
"SetResourceID",
"(",
"0",
")",
"\n",
"v2",
"=",
"&",
"copy",
"\n",
"}",
"\n",
"return",
"utils",
".",
"FastMarshal",
"(",
"v2",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"version",
")",
"\n",
"}",
"\n",
"}"
] |
// MarshalRole marshalls role into JSON
|
[
"MarshalRole",
"marshalls",
"role",
"into",
"JSON"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnel.go#L345-L381
|
22,956
|
gravitational/teleport
|
lib/utils/syslog.go
|
SwitchLoggingtoSyslog
|
func SwitchLoggingtoSyslog() error {
log.StandardLogger().SetHooks(make(log.LevelHooks))
hook, err := logrusSyslog.NewSyslogHook("", "", syslog.LOG_WARNING, "")
if err != nil {
// syslog is not available
log.SetOutput(os.Stderr)
return trace.Wrap(err)
}
log.AddHook(hook)
// ... and disable stderr:
log.SetOutput(ioutil.Discard)
return nil
}
|
go
|
func SwitchLoggingtoSyslog() error {
log.StandardLogger().SetHooks(make(log.LevelHooks))
hook, err := logrusSyslog.NewSyslogHook("", "", syslog.LOG_WARNING, "")
if err != nil {
// syslog is not available
log.SetOutput(os.Stderr)
return trace.Wrap(err)
}
log.AddHook(hook)
// ... and disable stderr:
log.SetOutput(ioutil.Discard)
return nil
}
|
[
"func",
"SwitchLoggingtoSyslog",
"(",
")",
"error",
"{",
"log",
".",
"StandardLogger",
"(",
")",
".",
"SetHooks",
"(",
"make",
"(",
"log",
".",
"LevelHooks",
")",
")",
"\n",
"hook",
",",
"err",
":=",
"logrusSyslog",
".",
"NewSyslogHook",
"(",
"\"",
"\"",
",",
"\"",
"\"",
",",
"syslog",
".",
"LOG_WARNING",
",",
"\"",
"\"",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// syslog is not available",
"log",
".",
"SetOutput",
"(",
"os",
".",
"Stderr",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"log",
".",
"AddHook",
"(",
"hook",
")",
"\n",
"// ... and disable stderr:",
"log",
".",
"SetOutput",
"(",
"ioutil",
".",
"Discard",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// SwitchLoggingtoSyslog tells the logger to send the output to syslog. This
// code is behind a build flag because Windows does not support syslog.
|
[
"SwitchLoggingtoSyslog",
"tells",
"the",
"logger",
"to",
"send",
"the",
"output",
"to",
"syslog",
".",
"This",
"code",
"is",
"behind",
"a",
"build",
"flag",
"because",
"Windows",
"does",
"not",
"support",
"syslog",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/syslog.go#L33-L45
|
22,957
|
gravitational/teleport
|
lib/auth/rotate.go
|
Types
|
func (r *RotateRequest) Types() []services.CertAuthType {
switch r.Type {
case "":
return []services.CertAuthType{services.HostCA, services.UserCA}
case services.HostCA:
return []services.CertAuthType{services.HostCA}
case services.UserCA:
return []services.CertAuthType{services.UserCA}
}
return nil
}
|
go
|
func (r *RotateRequest) Types() []services.CertAuthType {
switch r.Type {
case "":
return []services.CertAuthType{services.HostCA, services.UserCA}
case services.HostCA:
return []services.CertAuthType{services.HostCA}
case services.UserCA:
return []services.CertAuthType{services.UserCA}
}
return nil
}
|
[
"func",
"(",
"r",
"*",
"RotateRequest",
")",
"Types",
"(",
")",
"[",
"]",
"services",
".",
"CertAuthType",
"{",
"switch",
"r",
".",
"Type",
"{",
"case",
"\"",
"\"",
":",
"return",
"[",
"]",
"services",
".",
"CertAuthType",
"{",
"services",
".",
"HostCA",
",",
"services",
".",
"UserCA",
"}",
"\n",
"case",
"services",
".",
"HostCA",
":",
"return",
"[",
"]",
"services",
".",
"CertAuthType",
"{",
"services",
".",
"HostCA",
"}",
"\n",
"case",
"services",
".",
"UserCA",
":",
"return",
"[",
"]",
"services",
".",
"CertAuthType",
"{",
"services",
".",
"UserCA",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Types returns cert authority types requested to be rotated.
|
[
"Types",
"returns",
"cert",
"authority",
"types",
"requested",
"to",
"be",
"rotated",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L61-L71
|
22,958
|
gravitational/teleport
|
lib/auth/rotate.go
|
CheckAndSetDefaults
|
func (r *RotateRequest) CheckAndSetDefaults(clock clockwork.Clock) error {
if r.TargetPhase == "" {
// if phase if not set, imply that the first meaningful phase
// is set as a target phase
r.TargetPhase = services.RotationPhaseInit
}
// if mode is not set, default to manual (as it's safer)
if r.Mode == "" {
r.Mode = services.RotationModeManual
}
switch r.Type {
case "", services.HostCA, services.UserCA:
default:
return trace.BadParameter("unsupported certificate authority type: %q", r.Type)
}
if r.GracePeriod == nil {
period := defaults.RotationGracePeriod
r.GracePeriod = &period
}
if r.Schedule == nil {
var err error
r.Schedule, err = services.GenerateSchedule(clock, *r.GracePeriod)
if err != nil {
return trace.Wrap(err)
}
} else {
if err := r.Schedule.CheckAndSetDefaults(clock); err != nil {
return trace.Wrap(err)
}
}
return nil
}
|
go
|
func (r *RotateRequest) CheckAndSetDefaults(clock clockwork.Clock) error {
if r.TargetPhase == "" {
// if phase if not set, imply that the first meaningful phase
// is set as a target phase
r.TargetPhase = services.RotationPhaseInit
}
// if mode is not set, default to manual (as it's safer)
if r.Mode == "" {
r.Mode = services.RotationModeManual
}
switch r.Type {
case "", services.HostCA, services.UserCA:
default:
return trace.BadParameter("unsupported certificate authority type: %q", r.Type)
}
if r.GracePeriod == nil {
period := defaults.RotationGracePeriod
r.GracePeriod = &period
}
if r.Schedule == nil {
var err error
r.Schedule, err = services.GenerateSchedule(clock, *r.GracePeriod)
if err != nil {
return trace.Wrap(err)
}
} else {
if err := r.Schedule.CheckAndSetDefaults(clock); err != nil {
return trace.Wrap(err)
}
}
return nil
}
|
[
"func",
"(",
"r",
"*",
"RotateRequest",
")",
"CheckAndSetDefaults",
"(",
"clock",
"clockwork",
".",
"Clock",
")",
"error",
"{",
"if",
"r",
".",
"TargetPhase",
"==",
"\"",
"\"",
"{",
"// if phase if not set, imply that the first meaningful phase",
"// is set as a target phase",
"r",
".",
"TargetPhase",
"=",
"services",
".",
"RotationPhaseInit",
"\n",
"}",
"\n",
"// if mode is not set, default to manual (as it's safer)",
"if",
"r",
".",
"Mode",
"==",
"\"",
"\"",
"{",
"r",
".",
"Mode",
"=",
"services",
".",
"RotationModeManual",
"\n",
"}",
"\n",
"switch",
"r",
".",
"Type",
"{",
"case",
"\"",
"\"",
",",
"services",
".",
"HostCA",
",",
"services",
".",
"UserCA",
":",
"default",
":",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"r",
".",
"Type",
")",
"\n",
"}",
"\n",
"if",
"r",
".",
"GracePeriod",
"==",
"nil",
"{",
"period",
":=",
"defaults",
".",
"RotationGracePeriod",
"\n",
"r",
".",
"GracePeriod",
"=",
"&",
"period",
"\n",
"}",
"\n",
"if",
"r",
".",
"Schedule",
"==",
"nil",
"{",
"var",
"err",
"error",
"\n",
"r",
".",
"Schedule",
",",
"err",
"=",
"services",
".",
"GenerateSchedule",
"(",
"clock",
",",
"*",
"r",
".",
"GracePeriod",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"r",
".",
"Schedule",
".",
"CheckAndSetDefaults",
"(",
"clock",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// CheckAndSetDefaults checks and sets default values.
|
[
"CheckAndSetDefaults",
"checks",
"and",
"sets",
"default",
"values",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L74-L105
|
22,959
|
gravitational/teleport
|
lib/auth/rotate.go
|
RotateExternalCertAuthority
|
func (a *AuthServer) RotateExternalCertAuthority(ca services.CertAuthority) error {
if ca == nil {
return trace.BadParameter("missing certificate authority")
}
clusterName, err := a.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
// this is just an extra precaution against local admins,
// because this is additionally enforced by RBAC as well
if ca.GetClusterName() == clusterName.GetClusterName() {
return trace.BadParameter("can not rotate local certificate authority")
}
existing, err := a.Trust.GetCertAuthority(services.CertAuthID{
Type: ca.GetType(),
DomainName: ca.GetClusterName(),
}, false)
if err != nil {
return trace.Wrap(err)
}
updated := existing.Clone()
updated.SetCheckingKeys(ca.GetCheckingKeys())
updated.SetTLSKeyPairs(ca.GetTLSKeyPairs())
updated.SetRotation(ca.GetRotation())
// use compare and swap to protect from concurrent updates
// by trusted cluster API
if err := a.CompareAndSwapCertAuthority(updated, existing); err != nil {
return trace.Wrap(err)
}
return nil
}
|
go
|
func (a *AuthServer) RotateExternalCertAuthority(ca services.CertAuthority) error {
if ca == nil {
return trace.BadParameter("missing certificate authority")
}
clusterName, err := a.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
// this is just an extra precaution against local admins,
// because this is additionally enforced by RBAC as well
if ca.GetClusterName() == clusterName.GetClusterName() {
return trace.BadParameter("can not rotate local certificate authority")
}
existing, err := a.Trust.GetCertAuthority(services.CertAuthID{
Type: ca.GetType(),
DomainName: ca.GetClusterName(),
}, false)
if err != nil {
return trace.Wrap(err)
}
updated := existing.Clone()
updated.SetCheckingKeys(ca.GetCheckingKeys())
updated.SetTLSKeyPairs(ca.GetTLSKeyPairs())
updated.SetRotation(ca.GetRotation())
// use compare and swap to protect from concurrent updates
// by trusted cluster API
if err := a.CompareAndSwapCertAuthority(updated, existing); err != nil {
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"RotateExternalCertAuthority",
"(",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"if",
"ca",
"==",
"nil",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"clusterName",
",",
"err",
":=",
"a",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// this is just an extra precaution against local admins,",
"// because this is additionally enforced by RBAC as well",
"if",
"ca",
".",
"GetClusterName",
"(",
")",
"==",
"clusterName",
".",
"GetClusterName",
"(",
")",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n\n",
"existing",
",",
"err",
":=",
"a",
".",
"Trust",
".",
"GetCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"ca",
".",
"GetType",
"(",
")",
",",
"DomainName",
":",
"ca",
".",
"GetClusterName",
"(",
")",
",",
"}",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"updated",
":=",
"existing",
".",
"Clone",
"(",
")",
"\n",
"updated",
".",
"SetCheckingKeys",
"(",
"ca",
".",
"GetCheckingKeys",
"(",
")",
")",
"\n",
"updated",
".",
"SetTLSKeyPairs",
"(",
"ca",
".",
"GetTLSKeyPairs",
"(",
")",
")",
"\n",
"updated",
".",
"SetRotation",
"(",
"ca",
".",
"GetRotation",
"(",
")",
")",
"\n\n",
"// use compare and swap to protect from concurrent updates",
"// by trusted cluster API",
"if",
"err",
":=",
"a",
".",
"CompareAndSwapCertAuthority",
"(",
"updated",
",",
"existing",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// RotateExternalCertAuthority rotates external certificate authority,
// this method is called by remote trusted cluster and is used to update
// only public keys and certificates of the certificate authority.
|
[
"RotateExternalCertAuthority",
"rotates",
"external",
"certificate",
"authority",
"this",
"method",
"is",
"called",
"by",
"remote",
"trusted",
"cluster",
"and",
"is",
"used",
"to",
"update",
"only",
"public",
"keys",
"and",
"certificates",
"of",
"the",
"certificate",
"authority",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L245-L280
|
22,960
|
gravitational/teleport
|
lib/auth/rotate.go
|
autoRotateCertAuthorities
|
func (a *AuthServer) autoRotateCertAuthorities() error {
clusterName, err := a.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
for _, caType := range []services.CertAuthType{services.HostCA, services.UserCA} {
ca, err := a.Trust.GetCertAuthority(services.CertAuthID{
Type: caType,
DomainName: clusterName.GetClusterName(),
}, true)
if err != nil {
return trace.Wrap(err)
}
if err := a.autoRotate(ca); err != nil {
return trace.Wrap(err)
}
}
return nil
}
|
go
|
func (a *AuthServer) autoRotateCertAuthorities() error {
clusterName, err := a.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
for _, caType := range []services.CertAuthType{services.HostCA, services.UserCA} {
ca, err := a.Trust.GetCertAuthority(services.CertAuthID{
Type: caType,
DomainName: clusterName.GetClusterName(),
}, true)
if err != nil {
return trace.Wrap(err)
}
if err := a.autoRotate(ca); err != nil {
return trace.Wrap(err)
}
}
return nil
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"autoRotateCertAuthorities",
"(",
")",
"error",
"{",
"clusterName",
",",
"err",
":=",
"a",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"for",
"_",
",",
"caType",
":=",
"range",
"[",
"]",
"services",
".",
"CertAuthType",
"{",
"services",
".",
"HostCA",
",",
"services",
".",
"UserCA",
"}",
"{",
"ca",
",",
"err",
":=",
"a",
".",
"Trust",
".",
"GetCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"caType",
",",
"DomainName",
":",
"clusterName",
".",
"GetClusterName",
"(",
")",
",",
"}",
",",
"true",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"a",
".",
"autoRotate",
"(",
"ca",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// autoRotateCertAuthorities automatically rotates cert authorities,
// does nothing if no rotation parameters were set up
// or it is too early to rotate per schedule
|
[
"autoRotateCertAuthorities",
"automatically",
"rotates",
"cert",
"authorities",
"does",
"nothing",
"if",
"no",
"rotation",
"parameters",
"were",
"set",
"up",
"or",
"it",
"is",
"too",
"early",
"to",
"rotate",
"per",
"schedule"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L285-L303
|
22,961
|
gravitational/teleport
|
lib/auth/rotate.go
|
processRotationRequest
|
func processRotationRequest(req rotationReq) (services.CertAuthority, error) {
rotation := req.ca.GetRotation()
ca := req.ca.Clone()
switch req.targetPhase {
case services.RotationPhaseInit:
// This is the first stage of the rotation - new certificate authorities
// are being generated, but no components are using them yet
switch rotation.State {
case services.RotationStateStandby, "":
default:
return nil, trace.BadParameter("can not initate rotation while another is in progress")
}
if err := startNewRotation(req, ca); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
case services.RotationPhaseUpdateClients:
// Update client phase clients will start using new credentials
// and servers will use the existing credentials, but will trust clients
// with both old and new credentials.
if rotation.Phase != services.RotationPhaseInit {
return nil, trace.BadParameter(
"can only switch to phase %v from %v, current phase is %v",
services.RotationPhaseUpdateClients,
services.RotationPhaseInit,
rotation.Phase)
}
if err := updateClients(ca, req.mode); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
case services.RotationPhaseUpdateServers:
// Update server phase uses the new credentials both for servers
// and clients, but still trusts clients with old credentials.
if rotation.Phase != services.RotationPhaseUpdateClients {
return nil, trace.BadParameter(
"can only switch to phase %v from %v, current phase is %v",
services.RotationPhaseUpdateServers,
services.RotationPhaseUpdateClients,
rotation.Phase)
}
// Signal nodes to restart and start serving new signatures
// by updating the phase.
rotation.Phase = req.targetPhase
rotation.Mode = req.mode
ca.SetRotation(rotation)
return ca, nil
case services.RotationPhaseRollback:
// Rollback moves back both clients and servers to use the old credentials
// but will trust new credentials.
switch rotation.Phase {
case services.RotationPhaseInit, services.RotationPhaseUpdateClients, services.RotationPhaseUpdateServers:
if err := startRollingBackRotation(ca); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
default:
return nil, trace.BadParameter("can not transition to phase %q from %q phase.", req.targetPhase, rotation.Phase)
}
case services.RotationPhaseStandby:
// Transition to the standby phase moves rotation process
// to standby, servers will only trust one certificate authority.
switch rotation.Phase {
case services.RotationPhaseUpdateServers, services.RotationPhaseRollback:
if err := completeRotation(req.clock, ca); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
default:
return nil, trace.BadParameter(
"can only switch to phase %v from %v, current phase is %v",
services.RotationPhaseUpdateServers,
services.RotationPhaseUpdateClients,
rotation.Phase)
}
default:
return nil, trace.BadParameter("unsupported phase: %q", req.targetPhase)
}
}
|
go
|
func processRotationRequest(req rotationReq) (services.CertAuthority, error) {
rotation := req.ca.GetRotation()
ca := req.ca.Clone()
switch req.targetPhase {
case services.RotationPhaseInit:
// This is the first stage of the rotation - new certificate authorities
// are being generated, but no components are using them yet
switch rotation.State {
case services.RotationStateStandby, "":
default:
return nil, trace.BadParameter("can not initate rotation while another is in progress")
}
if err := startNewRotation(req, ca); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
case services.RotationPhaseUpdateClients:
// Update client phase clients will start using new credentials
// and servers will use the existing credentials, but will trust clients
// with both old and new credentials.
if rotation.Phase != services.RotationPhaseInit {
return nil, trace.BadParameter(
"can only switch to phase %v from %v, current phase is %v",
services.RotationPhaseUpdateClients,
services.RotationPhaseInit,
rotation.Phase)
}
if err := updateClients(ca, req.mode); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
case services.RotationPhaseUpdateServers:
// Update server phase uses the new credentials both for servers
// and clients, but still trusts clients with old credentials.
if rotation.Phase != services.RotationPhaseUpdateClients {
return nil, trace.BadParameter(
"can only switch to phase %v from %v, current phase is %v",
services.RotationPhaseUpdateServers,
services.RotationPhaseUpdateClients,
rotation.Phase)
}
// Signal nodes to restart and start serving new signatures
// by updating the phase.
rotation.Phase = req.targetPhase
rotation.Mode = req.mode
ca.SetRotation(rotation)
return ca, nil
case services.RotationPhaseRollback:
// Rollback moves back both clients and servers to use the old credentials
// but will trust new credentials.
switch rotation.Phase {
case services.RotationPhaseInit, services.RotationPhaseUpdateClients, services.RotationPhaseUpdateServers:
if err := startRollingBackRotation(ca); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
default:
return nil, trace.BadParameter("can not transition to phase %q from %q phase.", req.targetPhase, rotation.Phase)
}
case services.RotationPhaseStandby:
// Transition to the standby phase moves rotation process
// to standby, servers will only trust one certificate authority.
switch rotation.Phase {
case services.RotationPhaseUpdateServers, services.RotationPhaseRollback:
if err := completeRotation(req.clock, ca); err != nil {
return nil, trace.Wrap(err)
}
return ca, nil
default:
return nil, trace.BadParameter(
"can only switch to phase %v from %v, current phase is %v",
services.RotationPhaseUpdateServers,
services.RotationPhaseUpdateClients,
rotation.Phase)
}
default:
return nil, trace.BadParameter("unsupported phase: %q", req.targetPhase)
}
}
|
[
"func",
"processRotationRequest",
"(",
"req",
"rotationReq",
")",
"(",
"services",
".",
"CertAuthority",
",",
"error",
")",
"{",
"rotation",
":=",
"req",
".",
"ca",
".",
"GetRotation",
"(",
")",
"\n",
"ca",
":=",
"req",
".",
"ca",
".",
"Clone",
"(",
")",
"\n\n",
"switch",
"req",
".",
"targetPhase",
"{",
"case",
"services",
".",
"RotationPhaseInit",
":",
"// This is the first stage of the rotation - new certificate authorities",
"// are being generated, but no components are using them yet",
"switch",
"rotation",
".",
"State",
"{",
"case",
"services",
".",
"RotationStateStandby",
",",
"\"",
"\"",
":",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"startNewRotation",
"(",
"req",
",",
"ca",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"ca",
",",
"nil",
"\n",
"case",
"services",
".",
"RotationPhaseUpdateClients",
":",
"// Update client phase clients will start using new credentials",
"// and servers will use the existing credentials, but will trust clients",
"// with both old and new credentials.",
"if",
"rotation",
".",
"Phase",
"!=",
"services",
".",
"RotationPhaseInit",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"services",
".",
"RotationPhaseUpdateClients",
",",
"services",
".",
"RotationPhaseInit",
",",
"rotation",
".",
"Phase",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"updateClients",
"(",
"ca",
",",
"req",
".",
"mode",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"ca",
",",
"nil",
"\n",
"case",
"services",
".",
"RotationPhaseUpdateServers",
":",
"// Update server phase uses the new credentials both for servers",
"// and clients, but still trusts clients with old credentials.",
"if",
"rotation",
".",
"Phase",
"!=",
"services",
".",
"RotationPhaseUpdateClients",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"services",
".",
"RotationPhaseUpdateServers",
",",
"services",
".",
"RotationPhaseUpdateClients",
",",
"rotation",
".",
"Phase",
")",
"\n",
"}",
"\n",
"// Signal nodes to restart and start serving new signatures",
"// by updating the phase.",
"rotation",
".",
"Phase",
"=",
"req",
".",
"targetPhase",
"\n",
"rotation",
".",
"Mode",
"=",
"req",
".",
"mode",
"\n",
"ca",
".",
"SetRotation",
"(",
"rotation",
")",
"\n",
"return",
"ca",
",",
"nil",
"\n",
"case",
"services",
".",
"RotationPhaseRollback",
":",
"// Rollback moves back both clients and servers to use the old credentials",
"// but will trust new credentials.",
"switch",
"rotation",
".",
"Phase",
"{",
"case",
"services",
".",
"RotationPhaseInit",
",",
"services",
".",
"RotationPhaseUpdateClients",
",",
"services",
".",
"RotationPhaseUpdateServers",
":",
"if",
"err",
":=",
"startRollingBackRotation",
"(",
"ca",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"ca",
",",
"nil",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"req",
".",
"targetPhase",
",",
"rotation",
".",
"Phase",
")",
"\n",
"}",
"\n",
"case",
"services",
".",
"RotationPhaseStandby",
":",
"// Transition to the standby phase moves rotation process",
"// to standby, servers will only trust one certificate authority.",
"switch",
"rotation",
".",
"Phase",
"{",
"case",
"services",
".",
"RotationPhaseUpdateServers",
",",
"services",
".",
"RotationPhaseRollback",
":",
"if",
"err",
":=",
"completeRotation",
"(",
"req",
".",
"clock",
",",
"ca",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"ca",
",",
"nil",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"services",
".",
"RotationPhaseUpdateServers",
",",
"services",
".",
"RotationPhaseUpdateClients",
",",
"rotation",
".",
"Phase",
")",
"\n",
"}",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"req",
".",
"targetPhase",
")",
"\n",
"}",
"\n",
"}"
] |
// processRotationRequest processes rotation request based on the target and
// current phase and state.
|
[
"processRotationRequest",
"processes",
"rotation",
"request",
"based",
"on",
"the",
"target",
"and",
"current",
"phase",
"and",
"state",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L371-L450
|
22,962
|
gravitational/teleport
|
lib/auth/rotate.go
|
startRollingBackRotation
|
func startRollingBackRotation(ca services.CertAuthority) error {
rotation := ca.GetRotation()
// Rollback always sets rotation to manual mode.
rotation.Mode = services.RotationModeManual
signingKeys := ca.GetSigningKeys()
checkingKeys := ca.GetCheckingKeys()
keyPairs := ca.GetTLSKeyPairs()
// Rotation sets the first key to be the new key
// and keep only public keys/certs for the new CA.
signingKeys = [][]byte{signingKeys[1]}
checkingKeys = [][]byte{checkingKeys[1]}
// Keep the new certificate as trusted
// as during the rollback phase, both types of clients may be present in the cluster.
keyPairs = []services.TLSKeyPair{keyPairs[1], services.TLSKeyPair{Cert: keyPairs[0].Cert}}
rotation.State = services.RotationStateInProgress
rotation.Phase = services.RotationPhaseRollback
ca.SetSigningKeys(signingKeys)
ca.SetCheckingKeys(checkingKeys)
ca.SetTLSKeyPairs(keyPairs)
ca.SetRotation(rotation)
return nil
}
|
go
|
func startRollingBackRotation(ca services.CertAuthority) error {
rotation := ca.GetRotation()
// Rollback always sets rotation to manual mode.
rotation.Mode = services.RotationModeManual
signingKeys := ca.GetSigningKeys()
checkingKeys := ca.GetCheckingKeys()
keyPairs := ca.GetTLSKeyPairs()
// Rotation sets the first key to be the new key
// and keep only public keys/certs for the new CA.
signingKeys = [][]byte{signingKeys[1]}
checkingKeys = [][]byte{checkingKeys[1]}
// Keep the new certificate as trusted
// as during the rollback phase, both types of clients may be present in the cluster.
keyPairs = []services.TLSKeyPair{keyPairs[1], services.TLSKeyPair{Cert: keyPairs[0].Cert}}
rotation.State = services.RotationStateInProgress
rotation.Phase = services.RotationPhaseRollback
ca.SetSigningKeys(signingKeys)
ca.SetCheckingKeys(checkingKeys)
ca.SetTLSKeyPairs(keyPairs)
ca.SetRotation(rotation)
return nil
}
|
[
"func",
"startRollingBackRotation",
"(",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"rotation",
":=",
"ca",
".",
"GetRotation",
"(",
")",
"\n\n",
"// Rollback always sets rotation to manual mode.",
"rotation",
".",
"Mode",
"=",
"services",
".",
"RotationModeManual",
"\n\n",
"signingKeys",
":=",
"ca",
".",
"GetSigningKeys",
"(",
")",
"\n",
"checkingKeys",
":=",
"ca",
".",
"GetCheckingKeys",
"(",
")",
"\n",
"keyPairs",
":=",
"ca",
".",
"GetTLSKeyPairs",
"(",
")",
"\n\n",
"// Rotation sets the first key to be the new key",
"// and keep only public keys/certs for the new CA.",
"signingKeys",
"=",
"[",
"]",
"[",
"]",
"byte",
"{",
"signingKeys",
"[",
"1",
"]",
"}",
"\n",
"checkingKeys",
"=",
"[",
"]",
"[",
"]",
"byte",
"{",
"checkingKeys",
"[",
"1",
"]",
"}",
"\n\n",
"// Keep the new certificate as trusted",
"// as during the rollback phase, both types of clients may be present in the cluster.",
"keyPairs",
"=",
"[",
"]",
"services",
".",
"TLSKeyPair",
"{",
"keyPairs",
"[",
"1",
"]",
",",
"services",
".",
"TLSKeyPair",
"{",
"Cert",
":",
"keyPairs",
"[",
"0",
"]",
".",
"Cert",
"}",
"}",
"\n",
"rotation",
".",
"State",
"=",
"services",
".",
"RotationStateInProgress",
"\n",
"rotation",
".",
"Phase",
"=",
"services",
".",
"RotationPhaseRollback",
"\n\n",
"ca",
".",
"SetSigningKeys",
"(",
"signingKeys",
")",
"\n",
"ca",
".",
"SetCheckingKeys",
"(",
"checkingKeys",
")",
"\n",
"ca",
".",
"SetTLSKeyPairs",
"(",
"keyPairs",
")",
"\n",
"ca",
".",
"SetRotation",
"(",
"rotation",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// startRollingBackRotation starts roll back to the original state.
|
[
"startRollingBackRotation",
"starts",
"roll",
"back",
"to",
"the",
"original",
"state",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L575-L601
|
22,963
|
gravitational/teleport
|
lib/auth/rotate.go
|
completeRollingBackRotation
|
func completeRollingBackRotation(clock clockwork.Clock, ca services.CertAuthority) error {
rotation := ca.GetRotation()
// clean up the state
rotation.Started = time.Time{}
rotation.State = services.RotationStateStandby
rotation.Phase = services.RotationPhaseStandby
rotation.Mode = ""
rotation.Schedule = services.RotationSchedule{}
keyPairs := ca.GetTLSKeyPairs()
// only keep the original certificate authority as trusted
// and remove everything else.
keyPairs = []services.TLSKeyPair{keyPairs[0]}
ca.SetTLSKeyPairs(keyPairs)
ca.SetRotation(rotation)
return nil
}
|
go
|
func completeRollingBackRotation(clock clockwork.Clock, ca services.CertAuthority) error {
rotation := ca.GetRotation()
// clean up the state
rotation.Started = time.Time{}
rotation.State = services.RotationStateStandby
rotation.Phase = services.RotationPhaseStandby
rotation.Mode = ""
rotation.Schedule = services.RotationSchedule{}
keyPairs := ca.GetTLSKeyPairs()
// only keep the original certificate authority as trusted
// and remove everything else.
keyPairs = []services.TLSKeyPair{keyPairs[0]}
ca.SetTLSKeyPairs(keyPairs)
ca.SetRotation(rotation)
return nil
}
|
[
"func",
"completeRollingBackRotation",
"(",
"clock",
"clockwork",
".",
"Clock",
",",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"rotation",
":=",
"ca",
".",
"GetRotation",
"(",
")",
"\n\n",
"// clean up the state",
"rotation",
".",
"Started",
"=",
"time",
".",
"Time",
"{",
"}",
"\n",
"rotation",
".",
"State",
"=",
"services",
".",
"RotationStateStandby",
"\n",
"rotation",
".",
"Phase",
"=",
"services",
".",
"RotationPhaseStandby",
"\n",
"rotation",
".",
"Mode",
"=",
"\"",
"\"",
"\n",
"rotation",
".",
"Schedule",
"=",
"services",
".",
"RotationSchedule",
"{",
"}",
"\n\n",
"keyPairs",
":=",
"ca",
".",
"GetTLSKeyPairs",
"(",
")",
"\n",
"// only keep the original certificate authority as trusted",
"// and remove everything else.",
"keyPairs",
"=",
"[",
"]",
"services",
".",
"TLSKeyPair",
"{",
"keyPairs",
"[",
"0",
"]",
"}",
"\n\n",
"ca",
".",
"SetTLSKeyPairs",
"(",
"keyPairs",
")",
"\n",
"ca",
".",
"SetRotation",
"(",
"rotation",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// completeRollingBackRotation completes rollback of the rotation and sets it to the standby state
|
[
"completeRollingBackRotation",
"completes",
"rollback",
"of",
"the",
"rotation",
"and",
"sets",
"it",
"to",
"the",
"standby",
"state"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L604-L622
|
22,964
|
gravitational/teleport
|
lib/auth/rotate.go
|
completeRotation
|
func completeRotation(clock clockwork.Clock, ca services.CertAuthority) error {
rotation := ca.GetRotation()
signingKeys := ca.GetSigningKeys()
checkingKeys := ca.GetCheckingKeys()
keyPairs := ca.GetTLSKeyPairs()
signingKeys = signingKeys[:1]
checkingKeys = checkingKeys[:1]
keyPairs = keyPairs[:1]
rotation.Started = time.Time{}
rotation.State = services.RotationStateStandby
rotation.Phase = services.RotationPhaseStandby
rotation.LastRotated = clock.Now()
rotation.Mode = ""
rotation.Schedule = services.RotationSchedule{}
ca.SetSigningKeys(signingKeys)
ca.SetCheckingKeys(checkingKeys)
ca.SetTLSKeyPairs(keyPairs)
ca.SetRotation(rotation)
return nil
}
|
go
|
func completeRotation(clock clockwork.Clock, ca services.CertAuthority) error {
rotation := ca.GetRotation()
signingKeys := ca.GetSigningKeys()
checkingKeys := ca.GetCheckingKeys()
keyPairs := ca.GetTLSKeyPairs()
signingKeys = signingKeys[:1]
checkingKeys = checkingKeys[:1]
keyPairs = keyPairs[:1]
rotation.Started = time.Time{}
rotation.State = services.RotationStateStandby
rotation.Phase = services.RotationPhaseStandby
rotation.LastRotated = clock.Now()
rotation.Mode = ""
rotation.Schedule = services.RotationSchedule{}
ca.SetSigningKeys(signingKeys)
ca.SetCheckingKeys(checkingKeys)
ca.SetTLSKeyPairs(keyPairs)
ca.SetRotation(rotation)
return nil
}
|
[
"func",
"completeRotation",
"(",
"clock",
"clockwork",
".",
"Clock",
",",
"ca",
"services",
".",
"CertAuthority",
")",
"error",
"{",
"rotation",
":=",
"ca",
".",
"GetRotation",
"(",
")",
"\n",
"signingKeys",
":=",
"ca",
".",
"GetSigningKeys",
"(",
")",
"\n",
"checkingKeys",
":=",
"ca",
".",
"GetCheckingKeys",
"(",
")",
"\n",
"keyPairs",
":=",
"ca",
".",
"GetTLSKeyPairs",
"(",
")",
"\n\n",
"signingKeys",
"=",
"signingKeys",
"[",
":",
"1",
"]",
"\n",
"checkingKeys",
"=",
"checkingKeys",
"[",
":",
"1",
"]",
"\n",
"keyPairs",
"=",
"keyPairs",
"[",
":",
"1",
"]",
"\n\n",
"rotation",
".",
"Started",
"=",
"time",
".",
"Time",
"{",
"}",
"\n",
"rotation",
".",
"State",
"=",
"services",
".",
"RotationStateStandby",
"\n",
"rotation",
".",
"Phase",
"=",
"services",
".",
"RotationPhaseStandby",
"\n",
"rotation",
".",
"LastRotated",
"=",
"clock",
".",
"Now",
"(",
")",
"\n",
"rotation",
".",
"Mode",
"=",
"\"",
"\"",
"\n",
"rotation",
".",
"Schedule",
"=",
"services",
".",
"RotationSchedule",
"{",
"}",
"\n\n",
"ca",
".",
"SetSigningKeys",
"(",
"signingKeys",
")",
"\n",
"ca",
".",
"SetCheckingKeys",
"(",
"checkingKeys",
")",
"\n",
"ca",
".",
"SetTLSKeyPairs",
"(",
"keyPairs",
")",
"\n",
"ca",
".",
"SetRotation",
"(",
"rotation",
")",
"\n",
"return",
"nil",
"\n",
"}"
] |
// completeRotation completes the certificate authority rotation.
|
[
"completeRotation",
"completes",
"the",
"certificate",
"authority",
"rotation",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/rotate.go#L625-L647
|
22,965
|
gravitational/teleport
|
lib/utils/unpack.go
|
Extract
|
func Extract(r io.Reader, dir string) error {
tarball := tar.NewReader(r)
for {
header, err := tarball.Next()
if err == io.EOF {
break
} else if err != nil {
return trace.Wrap(err)
}
if err := extractFile(tarball, header, dir); err != nil {
return trace.Wrap(err)
}
}
return nil
}
|
go
|
func Extract(r io.Reader, dir string) error {
tarball := tar.NewReader(r)
for {
header, err := tarball.Next()
if err == io.EOF {
break
} else if err != nil {
return trace.Wrap(err)
}
if err := extractFile(tarball, header, dir); err != nil {
return trace.Wrap(err)
}
}
return nil
}
|
[
"func",
"Extract",
"(",
"r",
"io",
".",
"Reader",
",",
"dir",
"string",
")",
"error",
"{",
"tarball",
":=",
"tar",
".",
"NewReader",
"(",
"r",
")",
"\n\n",
"for",
"{",
"header",
",",
"err",
":=",
"tarball",
".",
"Next",
"(",
")",
"\n",
"if",
"err",
"==",
"io",
".",
"EOF",
"{",
"break",
"\n",
"}",
"else",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"extractFile",
"(",
"tarball",
",",
"header",
",",
"dir",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Extract extracts the contents of the specified tarball under dir.
// The resulting files and directories are created using the current user context.
|
[
"Extract",
"extracts",
"the",
"contents",
"of",
"the",
"specified",
"tarball",
"under",
"dir",
".",
"The",
"resulting",
"files",
"and",
"directories",
"are",
"created",
"using",
"the",
"current",
"user",
"context",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/unpack.go#L33-L49
|
22,966
|
gravitational/teleport
|
lib/utils/rand.go
|
CryptoRandomHex
|
func CryptoRandomHex(len int) (string, error) {
randomBytes := make([]byte, len)
if _, err := rand.Reader.Read(randomBytes); err != nil {
return "", trace.Wrap(err)
}
return hex.EncodeToString(randomBytes), nil
}
|
go
|
func CryptoRandomHex(len int) (string, error) {
randomBytes := make([]byte, len)
if _, err := rand.Reader.Read(randomBytes); err != nil {
return "", trace.Wrap(err)
}
return hex.EncodeToString(randomBytes), nil
}
|
[
"func",
"CryptoRandomHex",
"(",
"len",
"int",
")",
"(",
"string",
",",
"error",
")",
"{",
"randomBytes",
":=",
"make",
"(",
"[",
"]",
"byte",
",",
"len",
")",
"\n",
"if",
"_",
",",
"err",
":=",
"rand",
".",
"Reader",
".",
"Read",
"(",
"randomBytes",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"hex",
".",
"EncodeToString",
"(",
"randomBytes",
")",
",",
"nil",
"\n",
"}"
] |
// CryptoRandomHex returns hex encoded random string generated with crypto-strong
// pseudo random generator of the given bytes
|
[
"CryptoRandomHex",
"returns",
"hex",
"encoded",
"random",
"string",
"generated",
"with",
"crypto",
"-",
"strong",
"pseudo",
"random",
"generator",
"of",
"the",
"given",
"bytes"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/rand.go#L30-L36
|
22,967
|
gravitational/teleport
|
lib/utils/rand.go
|
RandomDuration
|
func RandomDuration(max time.Duration) time.Duration {
randomVal, err := rand.Int(rand.Reader, big.NewInt(int64(max)))
if err != nil {
return max / 2
}
return time.Duration(randomVal.Int64())
}
|
go
|
func RandomDuration(max time.Duration) time.Duration {
randomVal, err := rand.Int(rand.Reader, big.NewInt(int64(max)))
if err != nil {
return max / 2
}
return time.Duration(randomVal.Int64())
}
|
[
"func",
"RandomDuration",
"(",
"max",
"time",
".",
"Duration",
")",
"time",
".",
"Duration",
"{",
"randomVal",
",",
"err",
":=",
"rand",
".",
"Int",
"(",
"rand",
".",
"Reader",
",",
"big",
".",
"NewInt",
"(",
"int64",
"(",
"max",
")",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"max",
"/",
"2",
"\n",
"}",
"\n",
"return",
"time",
".",
"Duration",
"(",
"randomVal",
".",
"Int64",
"(",
")",
")",
"\n",
"}"
] |
// RandomDuration returns a duration in a range [0, max)
|
[
"RandomDuration",
"returns",
"a",
"duration",
"in",
"a",
"range",
"[",
"0",
"max",
")"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/rand.go#L39-L45
|
22,968
|
gravitational/teleport
|
lib/services/suite/suite.go
|
NewServer
|
func NewServer(kind, name, addr, namespace string) *services.ServerV2 {
return &services.ServerV2{
Kind: kind,
Version: services.V2,
Metadata: services.Metadata{
Name: name,
Namespace: namespace,
},
Spec: services.ServerSpecV2{
Addr: addr,
PublicAddr: addr,
},
}
}
|
go
|
func NewServer(kind, name, addr, namespace string) *services.ServerV2 {
return &services.ServerV2{
Kind: kind,
Version: services.V2,
Metadata: services.Metadata{
Name: name,
Namespace: namespace,
},
Spec: services.ServerSpecV2{
Addr: addr,
PublicAddr: addr,
},
}
}
|
[
"func",
"NewServer",
"(",
"kind",
",",
"name",
",",
"addr",
",",
"namespace",
"string",
")",
"*",
"services",
".",
"ServerV2",
"{",
"return",
"&",
"services",
".",
"ServerV2",
"{",
"Kind",
":",
"kind",
",",
"Version",
":",
"services",
".",
"V2",
",",
"Metadata",
":",
"services",
".",
"Metadata",
"{",
"Name",
":",
"name",
",",
"Namespace",
":",
"namespace",
",",
"}",
",",
"Spec",
":",
"services",
".",
"ServerSpecV2",
"{",
"Addr",
":",
"addr",
",",
"PublicAddr",
":",
"addr",
",",
"}",
",",
"}",
"\n",
"}"
] |
// NewServer creates a new server resource
|
[
"NewServer",
"creates",
"a",
"new",
"server",
"resource"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L302-L315
|
22,969
|
gravitational/teleport
|
lib/services/suite/suite.go
|
AuthPreference
|
func (s *ServicesTestSuite) AuthPreference(c *check.C) {
ap, err := services.NewAuthPreference(services.AuthPreferenceSpecV2{
Type: "local",
SecondFactor: "otp",
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetAuthPreference(ap)
c.Assert(err, check.IsNil)
gotAP, err := s.ConfigS.GetAuthPreference()
c.Assert(err, check.IsNil)
c.Assert(gotAP.GetType(), check.Equals, "local")
c.Assert(gotAP.GetSecondFactor(), check.Equals, "otp")
}
|
go
|
func (s *ServicesTestSuite) AuthPreference(c *check.C) {
ap, err := services.NewAuthPreference(services.AuthPreferenceSpecV2{
Type: "local",
SecondFactor: "otp",
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetAuthPreference(ap)
c.Assert(err, check.IsNil)
gotAP, err := s.ConfigS.GetAuthPreference()
c.Assert(err, check.IsNil)
c.Assert(gotAP.GetType(), check.Equals, "local")
c.Assert(gotAP.GetSecondFactor(), check.Equals, "otp")
}
|
[
"func",
"(",
"s",
"*",
"ServicesTestSuite",
")",
"AuthPreference",
"(",
"c",
"*",
"check",
".",
"C",
")",
"{",
"ap",
",",
"err",
":=",
"services",
".",
"NewAuthPreference",
"(",
"services",
".",
"AuthPreferenceSpecV2",
"{",
"Type",
":",
"\"",
"\"",
",",
"SecondFactor",
":",
"\"",
"\"",
",",
"}",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"SetAuthPreference",
"(",
"ap",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"gotAP",
",",
"err",
":=",
"s",
".",
"ConfigS",
".",
"GetAuthPreference",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"c",
".",
"Assert",
"(",
"gotAP",
".",
"GetType",
"(",
")",
",",
"check",
".",
"Equals",
",",
"\"",
"\"",
")",
"\n",
"c",
".",
"Assert",
"(",
"gotAP",
".",
"GetSecondFactor",
"(",
")",
",",
"check",
".",
"Equals",
",",
"\"",
"\"",
")",
"\n",
"}"
] |
// AuthPreference tests authentication preference service
|
[
"AuthPreference",
"tests",
"authentication",
"preference",
"service"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L890-L905
|
22,970
|
gravitational/teleport
|
lib/services/suite/suite.go
|
CollectOptions
|
func CollectOptions(opts ...SuiteOption) SuiteOptions {
var suiteOpts SuiteOptions
for _, o := range opts {
o(&suiteOpts)
}
return suiteOpts
}
|
go
|
func CollectOptions(opts ...SuiteOption) SuiteOptions {
var suiteOpts SuiteOptions
for _, o := range opts {
o(&suiteOpts)
}
return suiteOpts
}
|
[
"func",
"CollectOptions",
"(",
"opts",
"...",
"SuiteOption",
")",
"SuiteOptions",
"{",
"var",
"suiteOpts",
"SuiteOptions",
"\n",
"for",
"_",
",",
"o",
":=",
"range",
"opts",
"{",
"o",
"(",
"&",
"suiteOpts",
")",
"\n",
"}",
"\n",
"return",
"suiteOpts",
"\n",
"}"
] |
// CollectOptions collects suite options
|
[
"CollectOptions",
"collects",
"suite",
"options"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L953-L959
|
22,971
|
gravitational/teleport
|
lib/services/suite/suite.go
|
ClusterConfig
|
func (s *ServicesTestSuite) ClusterConfig(c *check.C, opts ...SuiteOption) {
config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{
ClientIdleTimeout: services.NewDuration(17 * time.Second),
DisconnectExpiredCert: services.NewBool(true),
ClusterID: "27",
SessionRecording: services.RecordAtProxy,
Audit: services.AuditConfig{
Region: "us-west-1",
Type: "dynamodb",
AuditSessionsURI: "file:///home/log",
AuditTableName: "audit_table_name",
AuditEventsURI: []string{"dynamodb://audit_table_name", "file:///home/log"},
},
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterConfig(config)
c.Assert(err, check.IsNil)
gotConfig, err := s.ConfigS.GetClusterConfig()
c.Assert(err, check.IsNil)
config.SetResourceID(gotConfig.GetResourceID())
fixtures.DeepCompare(c, config, gotConfig)
// Some parts (e.g. auth server) will not function
// without cluster name or cluster config
if CollectOptions(opts...).SkipDelete {
return
}
err = s.ConfigS.DeleteClusterConfig()
c.Assert(err, check.IsNil)
_, err = s.ConfigS.GetClusterConfig()
fixtures.ExpectNotFound(c, err)
clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{
ClusterName: "example.com",
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterName(clusterName)
c.Assert(err, check.IsNil)
gotName, err := s.ConfigS.GetClusterName()
c.Assert(err, check.IsNil)
clusterName.SetResourceID(gotName.GetResourceID())
fixtures.DeepCompare(c, clusterName, gotName)
err = s.ConfigS.DeleteClusterName()
c.Assert(err, check.IsNil)
_, err = s.ConfigS.GetClusterName()
fixtures.ExpectNotFound(c, err)
err = s.ConfigS.UpsertClusterName(clusterName)
c.Assert(err, check.IsNil)
gotName, err = s.ConfigS.GetClusterName()
c.Assert(err, check.IsNil)
clusterName.SetResourceID(gotName.GetResourceID())
fixtures.DeepCompare(c, clusterName, gotName)
}
|
go
|
func (s *ServicesTestSuite) ClusterConfig(c *check.C, opts ...SuiteOption) {
config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{
ClientIdleTimeout: services.NewDuration(17 * time.Second),
DisconnectExpiredCert: services.NewBool(true),
ClusterID: "27",
SessionRecording: services.RecordAtProxy,
Audit: services.AuditConfig{
Region: "us-west-1",
Type: "dynamodb",
AuditSessionsURI: "file:///home/log",
AuditTableName: "audit_table_name",
AuditEventsURI: []string{"dynamodb://audit_table_name", "file:///home/log"},
},
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterConfig(config)
c.Assert(err, check.IsNil)
gotConfig, err := s.ConfigS.GetClusterConfig()
c.Assert(err, check.IsNil)
config.SetResourceID(gotConfig.GetResourceID())
fixtures.DeepCompare(c, config, gotConfig)
// Some parts (e.g. auth server) will not function
// without cluster name or cluster config
if CollectOptions(opts...).SkipDelete {
return
}
err = s.ConfigS.DeleteClusterConfig()
c.Assert(err, check.IsNil)
_, err = s.ConfigS.GetClusterConfig()
fixtures.ExpectNotFound(c, err)
clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{
ClusterName: "example.com",
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterName(clusterName)
c.Assert(err, check.IsNil)
gotName, err := s.ConfigS.GetClusterName()
c.Assert(err, check.IsNil)
clusterName.SetResourceID(gotName.GetResourceID())
fixtures.DeepCompare(c, clusterName, gotName)
err = s.ConfigS.DeleteClusterName()
c.Assert(err, check.IsNil)
_, err = s.ConfigS.GetClusterName()
fixtures.ExpectNotFound(c, err)
err = s.ConfigS.UpsertClusterName(clusterName)
c.Assert(err, check.IsNil)
gotName, err = s.ConfigS.GetClusterName()
c.Assert(err, check.IsNil)
clusterName.SetResourceID(gotName.GetResourceID())
fixtures.DeepCompare(c, clusterName, gotName)
}
|
[
"func",
"(",
"s",
"*",
"ServicesTestSuite",
")",
"ClusterConfig",
"(",
"c",
"*",
"check",
".",
"C",
",",
"opts",
"...",
"SuiteOption",
")",
"{",
"config",
",",
"err",
":=",
"services",
".",
"NewClusterConfig",
"(",
"services",
".",
"ClusterConfigSpecV3",
"{",
"ClientIdleTimeout",
":",
"services",
".",
"NewDuration",
"(",
"17",
"*",
"time",
".",
"Second",
")",
",",
"DisconnectExpiredCert",
":",
"services",
".",
"NewBool",
"(",
"true",
")",
",",
"ClusterID",
":",
"\"",
"\"",
",",
"SessionRecording",
":",
"services",
".",
"RecordAtProxy",
",",
"Audit",
":",
"services",
".",
"AuditConfig",
"{",
"Region",
":",
"\"",
"\"",
",",
"Type",
":",
"\"",
"\"",
",",
"AuditSessionsURI",
":",
"\"",
"\"",
",",
"AuditTableName",
":",
"\"",
"\"",
",",
"AuditEventsURI",
":",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"\"",
"\"",
"}",
",",
"}",
",",
"}",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"SetClusterConfig",
"(",
"config",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"gotConfig",
",",
"err",
":=",
"s",
".",
"ConfigS",
".",
"GetClusterConfig",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n",
"config",
".",
"SetResourceID",
"(",
"gotConfig",
".",
"GetResourceID",
"(",
")",
")",
"\n",
"fixtures",
".",
"DeepCompare",
"(",
"c",
",",
"config",
",",
"gotConfig",
")",
"\n\n",
"// Some parts (e.g. auth server) will not function",
"// without cluster name or cluster config",
"if",
"CollectOptions",
"(",
"opts",
"...",
")",
".",
"SkipDelete",
"{",
"return",
"\n",
"}",
"\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"DeleteClusterConfig",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"ConfigS",
".",
"GetClusterConfig",
"(",
")",
"\n",
"fixtures",
".",
"ExpectNotFound",
"(",
"c",
",",
"err",
")",
"\n\n",
"clusterName",
",",
"err",
":=",
"services",
".",
"NewClusterName",
"(",
"services",
".",
"ClusterNameSpecV2",
"{",
"ClusterName",
":",
"\"",
"\"",
",",
"}",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"SetClusterName",
"(",
"clusterName",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"gotName",
",",
"err",
":=",
"s",
".",
"ConfigS",
".",
"GetClusterName",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n",
"clusterName",
".",
"SetResourceID",
"(",
"gotName",
".",
"GetResourceID",
"(",
")",
")",
"\n",
"fixtures",
".",
"DeepCompare",
"(",
"c",
",",
"clusterName",
",",
"gotName",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"DeleteClusterName",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"ConfigS",
".",
"GetClusterName",
"(",
")",
"\n",
"fixtures",
".",
"ExpectNotFound",
"(",
"c",
",",
"err",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"UpsertClusterName",
"(",
"clusterName",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"gotName",
",",
"err",
"=",
"s",
".",
"ConfigS",
".",
"GetClusterName",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n",
"clusterName",
".",
"SetResourceID",
"(",
"gotName",
".",
"GetResourceID",
"(",
")",
")",
"\n",
"fixtures",
".",
"DeepCompare",
"(",
"c",
",",
"clusterName",
",",
"gotName",
")",
"\n",
"}"
] |
// ClusterConfig tests cluster configuration
|
[
"ClusterConfig",
"tests",
"cluster",
"configuration"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L962-L1023
|
22,972
|
gravitational/teleport
|
lib/services/suite/suite.go
|
EventsClusterConfig
|
func (s *ServicesTestSuite) EventsClusterConfig(c *check.C) {
testCases := []eventTest{
{
name: "Cluster config",
kind: services.WatchKind{
Kind: services.KindClusterConfig,
},
crud: func() services.Resource {
config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterConfig(config)
c.Assert(err, check.IsNil)
out, err := s.ConfigS.GetClusterConfig()
c.Assert(err, check.IsNil)
err = s.ConfigS.DeleteClusterConfig()
c.Assert(err, check.IsNil)
return out
},
},
{
name: "Cluster name",
kind: services.WatchKind{
Kind: services.KindClusterName,
},
crud: func() services.Resource {
clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{
ClusterName: "example.com",
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterName(clusterName)
c.Assert(err, check.IsNil)
out, err := s.ConfigS.GetClusterName()
c.Assert(err, check.IsNil)
err = s.ConfigS.DeleteClusterName()
c.Assert(err, check.IsNil)
return out
},
},
}
s.runEventsTests(c, testCases)
}
|
go
|
func (s *ServicesTestSuite) EventsClusterConfig(c *check.C) {
testCases := []eventTest{
{
name: "Cluster config",
kind: services.WatchKind{
Kind: services.KindClusterConfig,
},
crud: func() services.Resource {
config, err := services.NewClusterConfig(services.ClusterConfigSpecV3{})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterConfig(config)
c.Assert(err, check.IsNil)
out, err := s.ConfigS.GetClusterConfig()
c.Assert(err, check.IsNil)
err = s.ConfigS.DeleteClusterConfig()
c.Assert(err, check.IsNil)
return out
},
},
{
name: "Cluster name",
kind: services.WatchKind{
Kind: services.KindClusterName,
},
crud: func() services.Resource {
clusterName, err := services.NewClusterName(services.ClusterNameSpecV2{
ClusterName: "example.com",
})
c.Assert(err, check.IsNil)
err = s.ConfigS.SetClusterName(clusterName)
c.Assert(err, check.IsNil)
out, err := s.ConfigS.GetClusterName()
c.Assert(err, check.IsNil)
err = s.ConfigS.DeleteClusterName()
c.Assert(err, check.IsNil)
return out
},
},
}
s.runEventsTests(c, testCases)
}
|
[
"func",
"(",
"s",
"*",
"ServicesTestSuite",
")",
"EventsClusterConfig",
"(",
"c",
"*",
"check",
".",
"C",
")",
"{",
"testCases",
":=",
"[",
"]",
"eventTest",
"{",
"{",
"name",
":",
"\"",
"\"",
",",
"kind",
":",
"services",
".",
"WatchKind",
"{",
"Kind",
":",
"services",
".",
"KindClusterConfig",
",",
"}",
",",
"crud",
":",
"func",
"(",
")",
"services",
".",
"Resource",
"{",
"config",
",",
"err",
":=",
"services",
".",
"NewClusterConfig",
"(",
"services",
".",
"ClusterConfigSpecV3",
"{",
"}",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"SetClusterConfig",
"(",
"config",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"out",
",",
"err",
":=",
"s",
".",
"ConfigS",
".",
"GetClusterConfig",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"DeleteClusterConfig",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"return",
"out",
"\n",
"}",
",",
"}",
",",
"{",
"name",
":",
"\"",
"\"",
",",
"kind",
":",
"services",
".",
"WatchKind",
"{",
"Kind",
":",
"services",
".",
"KindClusterName",
",",
"}",
",",
"crud",
":",
"func",
"(",
")",
"services",
".",
"Resource",
"{",
"clusterName",
",",
"err",
":=",
"services",
".",
"NewClusterName",
"(",
"services",
".",
"ClusterNameSpecV2",
"{",
"ClusterName",
":",
"\"",
"\"",
",",
"}",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"SetClusterName",
"(",
"clusterName",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"out",
",",
"err",
":=",
"s",
".",
"ConfigS",
".",
"GetClusterName",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n\n",
"err",
"=",
"s",
".",
"ConfigS",
".",
"DeleteClusterName",
"(",
")",
"\n",
"c",
".",
"Assert",
"(",
"err",
",",
"check",
".",
"IsNil",
")",
"\n",
"return",
"out",
"\n",
"}",
",",
"}",
",",
"}",
"\n",
"s",
".",
"runEventsTests",
"(",
"c",
",",
"testCases",
")",
"\n",
"}"
] |
// EventsClusterConfig tests cluster config resource events
|
[
"EventsClusterConfig",
"tests",
"cluster",
"config",
"resource",
"events"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/suite/suite.go#L1310-L1357
|
22,973
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
TunnelConnectionStatus
|
func TunnelConnectionStatus(clock clockwork.Clock, conn TunnelConnection) string {
diff := clock.Now().Sub(conn.GetLastHeartbeat())
if diff < defaults.ReverseTunnelOfflineThreshold {
return teleport.RemoteClusterStatusOnline
}
return teleport.RemoteClusterStatusOffline
}
|
go
|
func TunnelConnectionStatus(clock clockwork.Clock, conn TunnelConnection) string {
diff := clock.Now().Sub(conn.GetLastHeartbeat())
if diff < defaults.ReverseTunnelOfflineThreshold {
return teleport.RemoteClusterStatusOnline
}
return teleport.RemoteClusterStatusOffline
}
|
[
"func",
"TunnelConnectionStatus",
"(",
"clock",
"clockwork",
".",
"Clock",
",",
"conn",
"TunnelConnection",
")",
"string",
"{",
"diff",
":=",
"clock",
".",
"Now",
"(",
")",
".",
"Sub",
"(",
"conn",
".",
"GetLastHeartbeat",
"(",
")",
")",
"\n",
"if",
"diff",
"<",
"defaults",
".",
"ReverseTunnelOfflineThreshold",
"{",
"return",
"teleport",
".",
"RemoteClusterStatusOnline",
"\n",
"}",
"\n",
"return",
"teleport",
".",
"RemoteClusterStatusOffline",
"\n",
"}"
] |
// IsTunnelConnectionStatus returns tunnel connection status based on the last
// heartbeat time recorded for a connection
|
[
"IsTunnelConnectionStatus",
"returns",
"tunnel",
"connection",
"status",
"based",
"on",
"the",
"last",
"heartbeat",
"time",
"recorded",
"for",
"a",
"connection"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L78-L84
|
22,974
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
MustCreateTunnelConnection
|
func MustCreateTunnelConnection(name string, spec TunnelConnectionSpecV2) TunnelConnection {
conn, err := NewTunnelConnection(name, spec)
if err != nil {
panic(err)
}
return conn
}
|
go
|
func MustCreateTunnelConnection(name string, spec TunnelConnectionSpecV2) TunnelConnection {
conn, err := NewTunnelConnection(name, spec)
if err != nil {
panic(err)
}
return conn
}
|
[
"func",
"MustCreateTunnelConnection",
"(",
"name",
"string",
",",
"spec",
"TunnelConnectionSpecV2",
")",
"TunnelConnection",
"{",
"conn",
",",
"err",
":=",
"NewTunnelConnection",
"(",
"name",
",",
"spec",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"panic",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"conn",
"\n",
"}"
] |
// MustCreateTunnelConnection returns new connection from V2 spec or panics if
// parameters are incorrect
|
[
"MustCreateTunnelConnection",
"returns",
"new",
"connection",
"from",
"V2",
"spec",
"or",
"panics",
"if",
"parameters",
"are",
"incorrect"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L88-L94
|
22,975
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
NewTunnelConnection
|
func NewTunnelConnection(name string, spec TunnelConnectionSpecV2) (TunnelConnection, error) {
conn := &TunnelConnectionV2{
Kind: KindTunnelConnection,
SubKind: spec.ClusterName,
Version: V2,
Metadata: Metadata{
Name: name,
Namespace: defaults.Namespace,
},
Spec: spec,
}
if err := conn.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return conn, nil
}
|
go
|
func NewTunnelConnection(name string, spec TunnelConnectionSpecV2) (TunnelConnection, error) {
conn := &TunnelConnectionV2{
Kind: KindTunnelConnection,
SubKind: spec.ClusterName,
Version: V2,
Metadata: Metadata{
Name: name,
Namespace: defaults.Namespace,
},
Spec: spec,
}
if err := conn.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
return conn, nil
}
|
[
"func",
"NewTunnelConnection",
"(",
"name",
"string",
",",
"spec",
"TunnelConnectionSpecV2",
")",
"(",
"TunnelConnection",
",",
"error",
")",
"{",
"conn",
":=",
"&",
"TunnelConnectionV2",
"{",
"Kind",
":",
"KindTunnelConnection",
",",
"SubKind",
":",
"spec",
".",
"ClusterName",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"name",
",",
"Namespace",
":",
"defaults",
".",
"Namespace",
",",
"}",
",",
"Spec",
":",
"spec",
",",
"}",
"\n",
"if",
"err",
":=",
"conn",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"conn",
",",
"nil",
"\n",
"}"
] |
// NewTunnelConnection returns new connection from V2 spec
|
[
"NewTunnelConnection",
"returns",
"new",
"connection",
"from",
"V2",
"spec"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L97-L112
|
22,976
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
String
|
func (r *TunnelConnectionV2) String() string {
return fmt.Sprintf("TunnelConnection(name=%v, type=%v, cluster=%v, proxy=%v)",
r.Metadata.Name, r.Spec.Type, r.Spec.ClusterName, r.Spec.ProxyName)
}
|
go
|
func (r *TunnelConnectionV2) String() string {
return fmt.Sprintf("TunnelConnection(name=%v, type=%v, cluster=%v, proxy=%v)",
r.Metadata.Name, r.Spec.Type, r.Spec.ClusterName, r.Spec.ProxyName)
}
|
[
"func",
"(",
"r",
"*",
"TunnelConnectionV2",
")",
"String",
"(",
")",
"string",
"{",
"return",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"r",
".",
"Metadata",
".",
"Name",
",",
"r",
".",
"Spec",
".",
"Type",
",",
"r",
".",
"Spec",
".",
"ClusterName",
",",
"r",
".",
"Spec",
".",
"ProxyName",
")",
"\n",
"}"
] |
// String returns user-friendly description of this connection
|
[
"String",
"returns",
"user",
"-",
"friendly",
"description",
"of",
"this",
"connection"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L151-L154
|
22,977
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
SetLastHeartbeat
|
func (r *TunnelConnectionV2) SetLastHeartbeat(tm time.Time) {
r.Spec.LastHeartbeat = tm
}
|
go
|
func (r *TunnelConnectionV2) SetLastHeartbeat(tm time.Time) {
r.Spec.LastHeartbeat = tm
}
|
[
"func",
"(",
"r",
"*",
"TunnelConnectionV2",
")",
"SetLastHeartbeat",
"(",
"tm",
"time",
".",
"Time",
")",
"{",
"r",
".",
"Spec",
".",
"LastHeartbeat",
"=",
"tm",
"\n",
"}"
] |
// SetLastHeartbeat sets last heartbeat time
|
[
"SetLastHeartbeat",
"sets",
"last",
"heartbeat",
"time"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L221-L223
|
22,978
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
UnmarshalTunnelConnection
|
func UnmarshalTunnelConnection(data []byte, opts ...MarshalOption) (TunnelConnection, error) {
if len(data) == 0 {
return nil, trace.BadParameter("missing tunnel connection data")
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
var h ResourceHeader
err = utils.FastUnmarshal(data, &h)
if err != nil {
return nil, trace.Wrap(err)
}
switch h.Version {
case V2:
var r TunnelConnectionV2
if cfg.SkipValidation {
if err := utils.FastUnmarshal(data, &r); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
if err := utils.UnmarshalWithSchema(GetTunnelConnectionSchema(), &r, data); err != nil {
return nil, trace.BadParameter(err.Error())
}
}
if err := r.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
r.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
r.SetExpiry(cfg.Expires)
}
return &r, nil
}
return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version)
}
|
go
|
func UnmarshalTunnelConnection(data []byte, opts ...MarshalOption) (TunnelConnection, error) {
if len(data) == 0 {
return nil, trace.BadParameter("missing tunnel connection data")
}
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
var h ResourceHeader
err = utils.FastUnmarshal(data, &h)
if err != nil {
return nil, trace.Wrap(err)
}
switch h.Version {
case V2:
var r TunnelConnectionV2
if cfg.SkipValidation {
if err := utils.FastUnmarshal(data, &r); err != nil {
return nil, trace.BadParameter(err.Error())
}
} else {
if err := utils.UnmarshalWithSchema(GetTunnelConnectionSchema(), &r, data); err != nil {
return nil, trace.BadParameter(err.Error())
}
}
if err := r.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
if cfg.ID != 0 {
r.SetResourceID(cfg.ID)
}
if !cfg.Expires.IsZero() {
r.SetExpiry(cfg.Expires)
}
return &r, nil
}
return nil, trace.BadParameter("reverse tunnel version %v is not supported", h.Version)
}
|
[
"func",
"UnmarshalTunnelConnection",
"(",
"data",
"[",
"]",
"byte",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"TunnelConnection",
",",
"error",
")",
"{",
"if",
"len",
"(",
"data",
")",
"==",
"0",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"var",
"h",
"ResourceHeader",
"\n",
"err",
"=",
"utils",
".",
"FastUnmarshal",
"(",
"data",
",",
"&",
"h",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"switch",
"h",
".",
"Version",
"{",
"case",
"V2",
":",
"var",
"r",
"TunnelConnectionV2",
"\n\n",
"if",
"cfg",
".",
"SkipValidation",
"{",
"if",
"err",
":=",
"utils",
".",
"FastUnmarshal",
"(",
"data",
",",
"&",
"r",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"else",
"{",
"if",
"err",
":=",
"utils",
".",
"UnmarshalWithSchema",
"(",
"GetTunnelConnectionSchema",
"(",
")",
",",
"&",
"r",
",",
"data",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"err",
".",
"Error",
"(",
")",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"if",
"err",
":=",
"r",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"cfg",
".",
"ID",
"!=",
"0",
"{",
"r",
".",
"SetResourceID",
"(",
"cfg",
".",
"ID",
")",
"\n",
"}",
"\n",
"if",
"!",
"cfg",
".",
"Expires",
".",
"IsZero",
"(",
")",
"{",
"r",
".",
"SetExpiry",
"(",
"cfg",
".",
"Expires",
")",
"\n",
"}",
"\n",
"return",
"&",
"r",
",",
"nil",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"h",
".",
"Version",
")",
"\n",
"}"
] |
// UnmarshalTunnelConnection unmarshals reverse tunnel from JSON or YAML,
// sets defaults and checks the schema
|
[
"UnmarshalTunnelConnection",
"unmarshals",
"reverse",
"tunnel",
"from",
"JSON",
"or",
"YAML",
"sets",
"defaults",
"and",
"checks",
"the",
"schema"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L275-L314
|
22,979
|
gravitational/teleport
|
lib/services/tunnelconn.go
|
MarshalTunnelConnection
|
func MarshalTunnelConnection(rt TunnelConnection, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := rt.(type) {
case *TunnelConnectionV2:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", rt)
}
}
|
go
|
func MarshalTunnelConnection(rt TunnelConnection, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
switch resource := rt.(type) {
case *TunnelConnectionV2:
if !cfg.PreserveResourceID {
// avoid modifying the original object
// to prevent unexpected data races
copy := *resource
copy.SetResourceID(0)
resource = ©
}
return utils.FastMarshal(resource)
default:
return nil, trace.BadParameter("unrecognized resource version %T", rt)
}
}
|
[
"func",
"MarshalTunnelConnection",
"(",
"rt",
"TunnelConnection",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"switch",
"resource",
":=",
"rt",
".",
"(",
"type",
")",
"{",
"case",
"*",
"TunnelConnectionV2",
":",
"if",
"!",
"cfg",
".",
"PreserveResourceID",
"{",
"// avoid modifying the original object",
"// to prevent unexpected data races",
"copy",
":=",
"*",
"resource",
"\n",
"copy",
".",
"SetResourceID",
"(",
"0",
")",
"\n",
"resource",
"=",
"&",
"copy",
"\n",
"}",
"\n",
"return",
"utils",
".",
"FastMarshal",
"(",
"resource",
")",
"\n",
"default",
":",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
",",
"rt",
")",
"\n",
"}",
"\n",
"}"
] |
// MarshalTunnelConnection marshals tunnel connection
|
[
"MarshalTunnelConnection",
"marshals",
"tunnel",
"connection"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/tunnelconn.go#L317-L335
|
22,980
|
gravitational/teleport
|
tool/tctl/common/status_command.go
|
Initialize
|
func (c *StatusCommand) Initialize(app *kingpin.Application, config *service.Config) {
c.config = config
c.status = app.Command("status", "Report cluster status")
}
|
go
|
func (c *StatusCommand) Initialize(app *kingpin.Application, config *service.Config) {
c.config = config
c.status = app.Command("status", "Report cluster status")
}
|
[
"func",
"(",
"c",
"*",
"StatusCommand",
")",
"Initialize",
"(",
"app",
"*",
"kingpin",
".",
"Application",
",",
"config",
"*",
"service",
".",
"Config",
")",
"{",
"c",
".",
"config",
"=",
"config",
"\n",
"c",
".",
"status",
"=",
"app",
".",
"Command",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"}"
] |
// Initialize allows StatusCommand to plug itself into the CLI parser.
|
[
"Initialize",
"allows",
"StatusCommand",
"to",
"plug",
"itself",
"into",
"the",
"CLI",
"parser",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/status_command.go#L41-L44
|
22,981
|
gravitational/teleport
|
tool/tctl/common/status_command.go
|
Status
|
func (c *StatusCommand) Status(client auth.ClientI) error {
clusterNameResource, err := client.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
clusterName := clusterNameResource.GetClusterName()
hostCAs, err := client.GetCertAuthorities(services.HostCA, false)
if err != nil {
return trace.Wrap(err)
}
userCAs, err := client.GetCertAuthorities(services.UserCA, false)
if err != nil {
return trace.Wrap(err)
}
// Calculate the CA pin for this cluster. The CA pin is used by the client
// to verify the identity of the Auth Server.
caPin, err := calculateCAPin(client)
if err != nil {
return trace.Wrap(err)
}
authorities := append(userCAs, hostCAs...)
view := func() string {
table := asciitable.MakeHeadlessTable(2)
table.AddRow([]string{"Cluster", clusterName})
for _, ca := range authorities {
if ca.GetClusterName() != clusterName {
continue
}
info := fmt.Sprintf("%v CA ", strings.Title(string(ca.GetType())))
rotation := ca.GetRotation()
if c.config.Debug {
table.AddRow([]string{info,
fmt.Sprintf("%v, update_servers: %v, complete: %v",
rotation.String(),
rotation.Schedule.UpdateServers.Format(teleport.HumanDateFormatSeconds),
rotation.Schedule.Standby.Format(teleport.HumanDateFormatSeconds),
)})
} else {
table.AddRow([]string{info, rotation.String()})
}
}
table.AddRow([]string{"CA pin", caPin})
return table.AsBuffer().String()
}
fmt.Printf(view())
// in debug mode, output mode of remote certificate authorities
if c.config.Debug {
view := func() string {
table := asciitable.MakeHeadlessTable(2)
for _, ca := range authorities {
if ca.GetClusterName() == clusterName {
continue
}
info := fmt.Sprintf("Remote %v CA %q", strings.Title(string(ca.GetType())), ca.GetClusterName())
rotation := ca.GetRotation()
table.AddRow([]string{info, rotation.String()})
}
return "Remote clusters\n\n" + table.AsBuffer().String()
}
fmt.Printf(view())
}
return nil
}
|
go
|
func (c *StatusCommand) Status(client auth.ClientI) error {
clusterNameResource, err := client.GetClusterName()
if err != nil {
return trace.Wrap(err)
}
clusterName := clusterNameResource.GetClusterName()
hostCAs, err := client.GetCertAuthorities(services.HostCA, false)
if err != nil {
return trace.Wrap(err)
}
userCAs, err := client.GetCertAuthorities(services.UserCA, false)
if err != nil {
return trace.Wrap(err)
}
// Calculate the CA pin for this cluster. The CA pin is used by the client
// to verify the identity of the Auth Server.
caPin, err := calculateCAPin(client)
if err != nil {
return trace.Wrap(err)
}
authorities := append(userCAs, hostCAs...)
view := func() string {
table := asciitable.MakeHeadlessTable(2)
table.AddRow([]string{"Cluster", clusterName})
for _, ca := range authorities {
if ca.GetClusterName() != clusterName {
continue
}
info := fmt.Sprintf("%v CA ", strings.Title(string(ca.GetType())))
rotation := ca.GetRotation()
if c.config.Debug {
table.AddRow([]string{info,
fmt.Sprintf("%v, update_servers: %v, complete: %v",
rotation.String(),
rotation.Schedule.UpdateServers.Format(teleport.HumanDateFormatSeconds),
rotation.Schedule.Standby.Format(teleport.HumanDateFormatSeconds),
)})
} else {
table.AddRow([]string{info, rotation.String()})
}
}
table.AddRow([]string{"CA pin", caPin})
return table.AsBuffer().String()
}
fmt.Printf(view())
// in debug mode, output mode of remote certificate authorities
if c.config.Debug {
view := func() string {
table := asciitable.MakeHeadlessTable(2)
for _, ca := range authorities {
if ca.GetClusterName() == clusterName {
continue
}
info := fmt.Sprintf("Remote %v CA %q", strings.Title(string(ca.GetType())), ca.GetClusterName())
rotation := ca.GetRotation()
table.AddRow([]string{info, rotation.String()})
}
return "Remote clusters\n\n" + table.AsBuffer().String()
}
fmt.Printf(view())
}
return nil
}
|
[
"func",
"(",
"c",
"*",
"StatusCommand",
")",
"Status",
"(",
"client",
"auth",
".",
"ClientI",
")",
"error",
"{",
"clusterNameResource",
",",
"err",
":=",
"client",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"clusterName",
":=",
"clusterNameResource",
".",
"GetClusterName",
"(",
")",
"\n\n",
"hostCAs",
",",
"err",
":=",
"client",
".",
"GetCertAuthorities",
"(",
"services",
".",
"HostCA",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"userCAs",
",",
"err",
":=",
"client",
".",
"GetCertAuthorities",
"(",
"services",
".",
"UserCA",
",",
"false",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"// Calculate the CA pin for this cluster. The CA pin is used by the client",
"// to verify the identity of the Auth Server.",
"caPin",
",",
"err",
":=",
"calculateCAPin",
"(",
"client",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"authorities",
":=",
"append",
"(",
"userCAs",
",",
"hostCAs",
"...",
")",
"\n",
"view",
":=",
"func",
"(",
")",
"string",
"{",
"table",
":=",
"asciitable",
".",
"MakeHeadlessTable",
"(",
"2",
")",
"\n",
"table",
".",
"AddRow",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"clusterName",
"}",
")",
"\n",
"for",
"_",
",",
"ca",
":=",
"range",
"authorities",
"{",
"if",
"ca",
".",
"GetClusterName",
"(",
")",
"!=",
"clusterName",
"{",
"continue",
"\n",
"}",
"\n",
"info",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"strings",
".",
"Title",
"(",
"string",
"(",
"ca",
".",
"GetType",
"(",
")",
")",
")",
")",
"\n",
"rotation",
":=",
"ca",
".",
"GetRotation",
"(",
")",
"\n",
"if",
"c",
".",
"config",
".",
"Debug",
"{",
"table",
".",
"AddRow",
"(",
"[",
"]",
"string",
"{",
"info",
",",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"rotation",
".",
"String",
"(",
")",
",",
"rotation",
".",
"Schedule",
".",
"UpdateServers",
".",
"Format",
"(",
"teleport",
".",
"HumanDateFormatSeconds",
")",
",",
"rotation",
".",
"Schedule",
".",
"Standby",
".",
"Format",
"(",
"teleport",
".",
"HumanDateFormatSeconds",
")",
",",
")",
"}",
")",
"\n",
"}",
"else",
"{",
"table",
".",
"AddRow",
"(",
"[",
"]",
"string",
"{",
"info",
",",
"rotation",
".",
"String",
"(",
")",
"}",
")",
"\n",
"}",
"\n\n",
"}",
"\n",
"table",
".",
"AddRow",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"caPin",
"}",
")",
"\n",
"return",
"table",
".",
"AsBuffer",
"(",
")",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"fmt",
".",
"Printf",
"(",
"view",
"(",
")",
")",
"\n\n",
"// in debug mode, output mode of remote certificate authorities",
"if",
"c",
".",
"config",
".",
"Debug",
"{",
"view",
":=",
"func",
"(",
")",
"string",
"{",
"table",
":=",
"asciitable",
".",
"MakeHeadlessTable",
"(",
"2",
")",
"\n",
"for",
"_",
",",
"ca",
":=",
"range",
"authorities",
"{",
"if",
"ca",
".",
"GetClusterName",
"(",
")",
"==",
"clusterName",
"{",
"continue",
"\n",
"}",
"\n",
"info",
":=",
"fmt",
".",
"Sprintf",
"(",
"\"",
"\"",
",",
"strings",
".",
"Title",
"(",
"string",
"(",
"ca",
".",
"GetType",
"(",
")",
")",
")",
",",
"ca",
".",
"GetClusterName",
"(",
")",
")",
"\n",
"rotation",
":=",
"ca",
".",
"GetRotation",
"(",
")",
"\n",
"table",
".",
"AddRow",
"(",
"[",
"]",
"string",
"{",
"info",
",",
"rotation",
".",
"String",
"(",
")",
"}",
")",
"\n",
"}",
"\n",
"return",
"\"",
"\\n",
"\\n",
"\"",
"+",
"table",
".",
"AsBuffer",
"(",
")",
".",
"String",
"(",
")",
"\n",
"}",
"\n",
"fmt",
".",
"Printf",
"(",
"view",
"(",
")",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// Status is called to execute "status" CLI command.
|
[
"Status",
"is",
"called",
"to",
"execute",
"status",
"CLI",
"command",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/tool/tctl/common/status_command.go#L58-L126
|
22,982
|
gravitational/teleport
|
lib/auth/trustedcluster.go
|
DeleteTrustedCluster
|
func (a *AuthServer) DeleteTrustedCluster(name string) error {
err := a.DeleteCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: name})
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = a.DeleteCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: name})
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = a.DeleteReverseTunnel(name)
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = a.Presence.DeleteTrustedCluster(name)
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
go
|
func (a *AuthServer) DeleteTrustedCluster(name string) error {
err := a.DeleteCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: name})
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = a.DeleteCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: name})
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = a.DeleteReverseTunnel(name)
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
err = a.Presence.DeleteTrustedCluster(name)
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"DeleteTrustedCluster",
"(",
"name",
"string",
")",
"error",
"{",
"err",
":=",
"a",
".",
"DeleteCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"HostCA",
",",
"DomainName",
":",
"name",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"!",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"err",
"=",
"a",
".",
"DeleteCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"UserCA",
",",
"DomainName",
":",
"name",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"!",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"err",
"=",
"a",
".",
"DeleteReverseTunnel",
"(",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"!",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n\n",
"err",
"=",
"a",
".",
"Presence",
".",
"DeleteTrustedCluster",
"(",
"name",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// DeleteTrustedCluster removes services.CertAuthority, services.ReverseTunnel,
// and services.TrustedCluster resources.
|
[
"DeleteTrustedCluster",
"removes",
"services",
".",
"CertAuthority",
"services",
".",
"ReverseTunnel",
"and",
"services",
".",
"TrustedCluster",
"resources",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L171-L199
|
22,983
|
gravitational/teleport
|
lib/auth/trustedcluster.go
|
DeleteRemoteCluster
|
func (a *AuthServer) DeleteRemoteCluster(clusterName string) error {
// To make sure remote cluster exists - to protect against random
// clusterName requests (e.g. when clusterName is set to local cluster name)
_, err := a.Presence.GetRemoteCluster(clusterName)
if err != nil {
return trace.Wrap(err)
}
// delete cert authorities associated with the cluster
err = a.DeleteCertAuthority(services.CertAuthID{
Type: services.HostCA,
DomainName: clusterName,
})
if err != nil {
// this method could have succeeded on the first call,
// but then if the remote cluster resource could not be deleted
// it would be impossible to delete the cluster after then
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
// there should be no User CA in trusted clusters on the main cluster side
// per standard automation but clean up just in case
err = a.DeleteCertAuthority(services.CertAuthID{
Type: services.UserCA,
DomainName: clusterName,
})
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
return a.Presence.DeleteRemoteCluster(clusterName)
}
|
go
|
func (a *AuthServer) DeleteRemoteCluster(clusterName string) error {
// To make sure remote cluster exists - to protect against random
// clusterName requests (e.g. when clusterName is set to local cluster name)
_, err := a.Presence.GetRemoteCluster(clusterName)
if err != nil {
return trace.Wrap(err)
}
// delete cert authorities associated with the cluster
err = a.DeleteCertAuthority(services.CertAuthID{
Type: services.HostCA,
DomainName: clusterName,
})
if err != nil {
// this method could have succeeded on the first call,
// but then if the remote cluster resource could not be deleted
// it would be impossible to delete the cluster after then
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
// there should be no User CA in trusted clusters on the main cluster side
// per standard automation but clean up just in case
err = a.DeleteCertAuthority(services.CertAuthID{
Type: services.UserCA,
DomainName: clusterName,
})
if err != nil {
if !trace.IsNotFound(err) {
return trace.Wrap(err)
}
}
return a.Presence.DeleteRemoteCluster(clusterName)
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"DeleteRemoteCluster",
"(",
"clusterName",
"string",
")",
"error",
"{",
"// To make sure remote cluster exists - to protect against random",
"// clusterName requests (e.g. when clusterName is set to local cluster name)",
"_",
",",
"err",
":=",
"a",
".",
"Presence",
".",
"GetRemoteCluster",
"(",
"clusterName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"// delete cert authorities associated with the cluster",
"err",
"=",
"a",
".",
"DeleteCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"HostCA",
",",
"DomainName",
":",
"clusterName",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"// this method could have succeeded on the first call,",
"// but then if the remote cluster resource could not be deleted",
"// it would be impossible to delete the cluster after then",
"if",
"!",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"// there should be no User CA in trusted clusters on the main cluster side",
"// per standard automation but clean up just in case",
"err",
"=",
"a",
".",
"DeleteCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"UserCA",
",",
"DomainName",
":",
"clusterName",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"!",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"a",
".",
"Presence",
".",
"DeleteRemoteCluster",
"(",
"clusterName",
")",
"\n",
"}"
] |
// DeleteRemoteCluster deletes remote cluster resource, all certificate authorities
// associated with it
|
[
"DeleteRemoteCluster",
"deletes",
"remote",
"cluster",
"resource",
"all",
"certificate",
"authorities",
"associated",
"with",
"it"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L293-L325
|
22,984
|
gravitational/teleport
|
lib/auth/trustedcluster.go
|
GetRemoteCluster
|
func (a *AuthServer) GetRemoteCluster(clusterName string) (services.RemoteCluster, error) {
// To make sure remote cluster exists - to protect against random
// clusterName requests (e.g. when clusterName is set to local cluster name)
remoteCluster, err := a.Presence.GetRemoteCluster(clusterName)
if err != nil {
return nil, trace.Wrap(err)
}
if err := a.updateRemoteClusterStatus(remoteCluster); err != nil {
return nil, trace.Wrap(err)
}
return remoteCluster, nil
}
|
go
|
func (a *AuthServer) GetRemoteCluster(clusterName string) (services.RemoteCluster, error) {
// To make sure remote cluster exists - to protect against random
// clusterName requests (e.g. when clusterName is set to local cluster name)
remoteCluster, err := a.Presence.GetRemoteCluster(clusterName)
if err != nil {
return nil, trace.Wrap(err)
}
if err := a.updateRemoteClusterStatus(remoteCluster); err != nil {
return nil, trace.Wrap(err)
}
return remoteCluster, nil
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"GetRemoteCluster",
"(",
"clusterName",
"string",
")",
"(",
"services",
".",
"RemoteCluster",
",",
"error",
")",
"{",
"// To make sure remote cluster exists - to protect against random",
"// clusterName requests (e.g. when clusterName is set to local cluster name)",
"remoteCluster",
",",
"err",
":=",
"a",
".",
"Presence",
".",
"GetRemoteCluster",
"(",
"clusterName",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"err",
":=",
"a",
".",
"updateRemoteClusterStatus",
"(",
"remoteCluster",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"remoteCluster",
",",
"nil",
"\n",
"}"
] |
// GetRemoteCluster returns remote cluster by name
|
[
"GetRemoteCluster",
"returns",
"remote",
"cluster",
"by",
"name"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L328-L339
|
22,985
|
gravitational/teleport
|
lib/auth/trustedcluster.go
|
GetRemoteClusters
|
func (a *AuthServer) GetRemoteClusters(opts ...services.MarshalOption) ([]services.RemoteCluster, error) {
// To make sure remote cluster exists - to protect against random
// clusterName requests (e.g. when clusterName is set to local cluster name)
remoteClusters, err := a.Presence.GetRemoteClusters(opts...)
if err != nil {
return nil, trace.Wrap(err)
}
for i := range remoteClusters {
if err := a.updateRemoteClusterStatus(remoteClusters[i]); err != nil {
return nil, trace.Wrap(err)
}
}
return remoteClusters, nil
}
|
go
|
func (a *AuthServer) GetRemoteClusters(opts ...services.MarshalOption) ([]services.RemoteCluster, error) {
// To make sure remote cluster exists - to protect against random
// clusterName requests (e.g. when clusterName is set to local cluster name)
remoteClusters, err := a.Presence.GetRemoteClusters(opts...)
if err != nil {
return nil, trace.Wrap(err)
}
for i := range remoteClusters {
if err := a.updateRemoteClusterStatus(remoteClusters[i]); err != nil {
return nil, trace.Wrap(err)
}
}
return remoteClusters, nil
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"GetRemoteClusters",
"(",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"RemoteCluster",
",",
"error",
")",
"{",
"// To make sure remote cluster exists - to protect against random",
"// clusterName requests (e.g. when clusterName is set to local cluster name)",
"remoteClusters",
",",
"err",
":=",
"a",
".",
"Presence",
".",
"GetRemoteClusters",
"(",
"opts",
"...",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"for",
"i",
":=",
"range",
"remoteClusters",
"{",
"if",
"err",
":=",
"a",
".",
"updateRemoteClusterStatus",
"(",
"remoteClusters",
"[",
"i",
"]",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"}",
"\n",
"return",
"remoteClusters",
",",
"nil",
"\n",
"}"
] |
// GetRemoteClusters returns remote clusters with updated statuses
|
[
"GetRemoteClusters",
"returns",
"remote",
"clusters",
"with",
"updated",
"statuses"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L357-L370
|
22,986
|
gravitational/teleport
|
lib/auth/trustedcluster.go
|
activateCertAuthority
|
func (a *AuthServer) activateCertAuthority(t services.TrustedCluster) error {
err := a.ActivateCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: t.GetName()})
if err != nil {
return trace.Wrap(err)
}
return trace.Wrap(a.ActivateCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: t.GetName()}))
}
|
go
|
func (a *AuthServer) activateCertAuthority(t services.TrustedCluster) error {
err := a.ActivateCertAuthority(services.CertAuthID{Type: services.UserCA, DomainName: t.GetName()})
if err != nil {
return trace.Wrap(err)
}
return trace.Wrap(a.ActivateCertAuthority(services.CertAuthID{Type: services.HostCA, DomainName: t.GetName()}))
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"activateCertAuthority",
"(",
"t",
"services",
".",
"TrustedCluster",
")",
"error",
"{",
"err",
":=",
"a",
".",
"ActivateCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"UserCA",
",",
"DomainName",
":",
"t",
".",
"GetName",
"(",
")",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"trace",
".",
"Wrap",
"(",
"a",
".",
"ActivateCertAuthority",
"(",
"services",
".",
"CertAuthID",
"{",
"Type",
":",
"services",
".",
"HostCA",
",",
"DomainName",
":",
"t",
".",
"GetName",
"(",
")",
"}",
")",
")",
"\n",
"}"
] |
// activateCertAuthority will activate both the user and host certificate
// authority given in the services.TrustedCluster resource.
|
[
"activateCertAuthority",
"will",
"activate",
"both",
"the",
"user",
"and",
"host",
"certificate",
"authority",
"given",
"in",
"the",
"services",
".",
"TrustedCluster",
"resource",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L599-L606
|
22,987
|
gravitational/teleport
|
lib/auth/trustedcluster.go
|
createReverseTunnel
|
func (a *AuthServer) createReverseTunnel(t services.TrustedCluster) error {
reverseTunnel := services.NewReverseTunnel(
t.GetName(),
[]string{t.GetReverseTunnelAddress()},
)
return trace.Wrap(a.UpsertReverseTunnel(reverseTunnel))
}
|
go
|
func (a *AuthServer) createReverseTunnel(t services.TrustedCluster) error {
reverseTunnel := services.NewReverseTunnel(
t.GetName(),
[]string{t.GetReverseTunnelAddress()},
)
return trace.Wrap(a.UpsertReverseTunnel(reverseTunnel))
}
|
[
"func",
"(",
"a",
"*",
"AuthServer",
")",
"createReverseTunnel",
"(",
"t",
"services",
".",
"TrustedCluster",
")",
"error",
"{",
"reverseTunnel",
":=",
"services",
".",
"NewReverseTunnel",
"(",
"t",
".",
"GetName",
"(",
")",
",",
"[",
"]",
"string",
"{",
"t",
".",
"GetReverseTunnelAddress",
"(",
")",
"}",
",",
")",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"a",
".",
"UpsertReverseTunnel",
"(",
"reverseTunnel",
")",
")",
"\n",
"}"
] |
// createReverseTunnel will create a services.ReverseTunnel givenin the
// services.TrustedCluster resource.
|
[
"createReverseTunnel",
"will",
"create",
"a",
"services",
".",
"ReverseTunnel",
"givenin",
"the",
"services",
".",
"TrustedCluster",
"resource",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/trustedcluster.go#L621-L627
|
22,988
|
gravitational/teleport
|
lib/services/local/configuration.go
|
DeleteClusterName
|
func (s *ClusterConfigurationService) DeleteClusterName() error {
err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, namePrefix))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("cluster configuration not found")
}
return trace.Wrap(err)
}
return nil
}
|
go
|
func (s *ClusterConfigurationService) DeleteClusterName() error {
err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, namePrefix))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("cluster configuration not found")
}
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"s",
"*",
"ClusterConfigurationService",
")",
"DeleteClusterName",
"(",
")",
"error",
"{",
"err",
":=",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"clusterConfigPrefix",
",",
"namePrefix",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// DeleteClusterName deletes services.ClusterName from the backend.
|
[
"DeleteClusterName",
"deletes",
"services",
".",
"ClusterName",
"from",
"the",
"backend",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L54-L63
|
22,989
|
gravitational/teleport
|
lib/services/local/configuration.go
|
SetClusterName
|
func (s *ClusterConfigurationService) SetClusterName(c services.ClusterName) error {
value, err := services.GetClusterNameMarshaler().Marshal(c)
if err != nil {
return trace.Wrap(err)
}
_, err = s.Create(context.TODO(), backend.Item{
Key: backend.Key(clusterConfigPrefix, namePrefix),
Value: value,
Expires: c.Expiry(),
})
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
go
|
func (s *ClusterConfigurationService) SetClusterName(c services.ClusterName) error {
value, err := services.GetClusterNameMarshaler().Marshal(c)
if err != nil {
return trace.Wrap(err)
}
_, err = s.Create(context.TODO(), backend.Item{
Key: backend.Key(clusterConfigPrefix, namePrefix),
Value: value,
Expires: c.Expiry(),
})
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"s",
"*",
"ClusterConfigurationService",
")",
"SetClusterName",
"(",
"c",
"services",
".",
"ClusterName",
")",
"error",
"{",
"value",
",",
"err",
":=",
"services",
".",
"GetClusterNameMarshaler",
"(",
")",
".",
"Marshal",
"(",
"c",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"Create",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"clusterConfigPrefix",
",",
"namePrefix",
")",
",",
"Value",
":",
"value",
",",
"Expires",
":",
"c",
".",
"Expiry",
"(",
")",
",",
"}",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// SetClusterName sets the name of the cluster in the backend. SetClusterName
// can only be called once on a cluster after which it will return trace.AlreadyExists.
|
[
"SetClusterName",
"sets",
"the",
"name",
"of",
"the",
"cluster",
"in",
"the",
"backend",
".",
"SetClusterName",
"can",
"only",
"be",
"called",
"once",
"on",
"a",
"cluster",
"after",
"which",
"it",
"will",
"return",
"trace",
".",
"AlreadyExists",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L67-L83
|
22,990
|
gravitational/teleport
|
lib/services/local/configuration.go
|
GetAuthPreference
|
func (s *ClusterConfigurationService) GetAuthPreference() (services.AuthPreference, error) {
item, err := s.Get(context.TODO(), backend.Key(authPrefix, preferencePrefix, generalPrefix))
if err != nil {
if trace.IsNotFound(err) {
return nil, trace.NotFound("authentication preference not found")
}
return nil, trace.Wrap(err)
}
return services.GetAuthPreferenceMarshaler().Unmarshal(item.Value,
services.WithResourceID(item.ID), services.WithExpires(item.Expires))
}
|
go
|
func (s *ClusterConfigurationService) GetAuthPreference() (services.AuthPreference, error) {
item, err := s.Get(context.TODO(), backend.Key(authPrefix, preferencePrefix, generalPrefix))
if err != nil {
if trace.IsNotFound(err) {
return nil, trace.NotFound("authentication preference not found")
}
return nil, trace.Wrap(err)
}
return services.GetAuthPreferenceMarshaler().Unmarshal(item.Value,
services.WithResourceID(item.ID), services.WithExpires(item.Expires))
}
|
[
"func",
"(",
"s",
"*",
"ClusterConfigurationService",
")",
"GetAuthPreference",
"(",
")",
"(",
"services",
".",
"AuthPreference",
",",
"error",
")",
"{",
"item",
",",
"err",
":=",
"s",
".",
"Get",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"authPrefix",
",",
"preferencePrefix",
",",
"generalPrefix",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"nil",
",",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"services",
".",
"GetAuthPreferenceMarshaler",
"(",
")",
".",
"Unmarshal",
"(",
"item",
".",
"Value",
",",
"services",
".",
"WithResourceID",
"(",
"item",
".",
"ID",
")",
",",
"services",
".",
"WithExpires",
"(",
"item",
".",
"Expires",
")",
")",
"\n",
"}"
] |
// GetAuthPreference fetches the cluster authentication preferences
// from the backend and return them.
|
[
"GetAuthPreference",
"fetches",
"the",
"cluster",
"authentication",
"preferences",
"from",
"the",
"backend",
"and",
"return",
"them",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L151-L161
|
22,991
|
gravitational/teleport
|
lib/services/local/configuration.go
|
SetAuthPreference
|
func (s *ClusterConfigurationService) SetAuthPreference(preferences services.AuthPreference) error {
value, err := services.GetAuthPreferenceMarshaler().Marshal(preferences)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authPrefix, preferencePrefix, generalPrefix),
Value: value,
ID: preferences.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
go
|
func (s *ClusterConfigurationService) SetAuthPreference(preferences services.AuthPreference) error {
value, err := services.GetAuthPreferenceMarshaler().Marshal(preferences)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(authPrefix, preferencePrefix, generalPrefix),
Value: value,
ID: preferences.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"s",
"*",
"ClusterConfigurationService",
")",
"SetAuthPreference",
"(",
"preferences",
"services",
".",
"AuthPreference",
")",
"error",
"{",
"value",
",",
"err",
":=",
"services",
".",
"GetAuthPreferenceMarshaler",
"(",
")",
".",
"Marshal",
"(",
"preferences",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"item",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"authPrefix",
",",
"preferencePrefix",
",",
"generalPrefix",
")",
",",
"Value",
":",
"value",
",",
"ID",
":",
"preferences",
".",
"GetResourceID",
"(",
")",
",",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"Put",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"item",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// SetAuthPreference sets the cluster authentication preferences
// on the backend.
|
[
"SetAuthPreference",
"sets",
"the",
"cluster",
"authentication",
"preferences",
"on",
"the",
"backend",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L165-L183
|
22,992
|
gravitational/teleport
|
lib/services/local/configuration.go
|
DeleteClusterConfig
|
func (s *ClusterConfigurationService) DeleteClusterConfig() error {
err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, generalPrefix))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("cluster configuration not found")
}
return trace.Wrap(err)
}
return nil
}
|
go
|
func (s *ClusterConfigurationService) DeleteClusterConfig() error {
err := s.Delete(context.TODO(), backend.Key(clusterConfigPrefix, generalPrefix))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("cluster configuration not found")
}
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"s",
"*",
"ClusterConfigurationService",
")",
"DeleteClusterConfig",
"(",
")",
"error",
"{",
"err",
":=",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"clusterConfigPrefix",
",",
"generalPrefix",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"if",
"trace",
".",
"IsNotFound",
"(",
"err",
")",
"{",
"return",
"trace",
".",
"NotFound",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"return",
"nil",
"\n",
"}"
] |
// DeleteClusterConfig deletes services.ClusterConfig from the backend.
|
[
"DeleteClusterConfig",
"deletes",
"services",
".",
"ClusterConfig",
"from",
"the",
"backend",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L200-L209
|
22,993
|
gravitational/teleport
|
lib/services/local/configuration.go
|
SetClusterConfig
|
func (s *ClusterConfigurationService) SetClusterConfig(c services.ClusterConfig) error {
value, err := services.GetClusterConfigMarshaler().Marshal(c)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(clusterConfigPrefix, generalPrefix),
Value: value,
ID: c.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
go
|
func (s *ClusterConfigurationService) SetClusterConfig(c services.ClusterConfig) error {
value, err := services.GetClusterConfigMarshaler().Marshal(c)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(clusterConfigPrefix, generalPrefix),
Value: value,
ID: c.GetResourceID(),
}
_, err = s.Put(context.TODO(), item)
if err != nil {
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"s",
"*",
"ClusterConfigurationService",
")",
"SetClusterConfig",
"(",
"c",
"services",
".",
"ClusterConfig",
")",
"error",
"{",
"value",
",",
"err",
":=",
"services",
".",
"GetClusterConfigMarshaler",
"(",
")",
".",
"Marshal",
"(",
"c",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"item",
":=",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",
".",
"Key",
"(",
"clusterConfigPrefix",
",",
"generalPrefix",
")",
",",
"Value",
":",
"value",
",",
"ID",
":",
"c",
".",
"GetResourceID",
"(",
")",
",",
"}",
"\n\n",
"_",
",",
"err",
"=",
"s",
".",
"Put",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"item",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// SetClusterConfig sets services.ClusterConfig on the backend.
|
[
"SetClusterConfig",
"sets",
"services",
".",
"ClusterConfig",
"on",
"the",
"backend",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/configuration.go#L212-L230
|
22,994
|
gravitational/teleport
|
lib/httplib/httpheaders.go
|
SetNoCacheHeaders
|
func SetNoCacheHeaders(h http.Header) {
h.Set("Cache-Control", "no-cache, no-store, must-revalidate")
h.Set("Pragma", "no-cache")
h.Set("Expires", "0")
}
|
go
|
func SetNoCacheHeaders(h http.Header) {
h.Set("Cache-Control", "no-cache, no-store, must-revalidate")
h.Set("Pragma", "no-cache")
h.Set("Expires", "0")
}
|
[
"func",
"SetNoCacheHeaders",
"(",
"h",
"http",
".",
"Header",
")",
"{",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n",
"}"
] |
// SetNoCacheHeaders tells proxies and browsers do not cache the content
|
[
"SetNoCacheHeaders",
"tells",
"proxies",
"and",
"browsers",
"do",
"not",
"cache",
"the",
"content"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/httplib/httpheaders.go#L27-L31
|
22,995
|
gravitational/teleport
|
lib/httplib/httpheaders.go
|
SetIndexHTMLHeaders
|
func SetIndexHTMLHeaders(h http.Header) {
SetNoCacheHeaders(h)
SetSameOriginIFrame(h)
SetNoSniff(h)
// X-Frame-Options indicates that the page can only be displayed in iframe on the same origin as the page itself
h.Set("X-Frame-Options", "SAMEORIGIN")
// X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages
// from loading when they detect reflected cross-site scripting (XSS) attacks.
h.Set("X-XSS-Protection", "1; mode=block")
// Once a supported browser receives this header that browser will prevent any communications from
// being sent over HTTP to the specified domain and will instead send all communications over HTTPS.
// It also prevents HTTPS click through prompts on browsers
h.Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains")
// Prevent web browsers from using content sniffing to discover a file’s MIME type
h.Set("X-Content-Type-Options", "nosniff")
// Set content policy flags
var cspValue = strings.Join([]string{
"script-src 'self'",
// 'unsafe-inline' needed for reactjs inline styles
"style-src 'self' 'unsafe-inline'",
"object-src 'none'",
"img-src 'self' data: blob:",
}, ";")
h.Set("Content-Security-Policy", cspValue)
}
|
go
|
func SetIndexHTMLHeaders(h http.Header) {
SetNoCacheHeaders(h)
SetSameOriginIFrame(h)
SetNoSniff(h)
// X-Frame-Options indicates that the page can only be displayed in iframe on the same origin as the page itself
h.Set("X-Frame-Options", "SAMEORIGIN")
// X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages
// from loading when they detect reflected cross-site scripting (XSS) attacks.
h.Set("X-XSS-Protection", "1; mode=block")
// Once a supported browser receives this header that browser will prevent any communications from
// being sent over HTTP to the specified domain and will instead send all communications over HTTPS.
// It also prevents HTTPS click through prompts on browsers
h.Set("Strict-Transport-Security", "max-age=31536000; includeSubDomains")
// Prevent web browsers from using content sniffing to discover a file’s MIME type
h.Set("X-Content-Type-Options", "nosniff")
// Set content policy flags
var cspValue = strings.Join([]string{
"script-src 'self'",
// 'unsafe-inline' needed for reactjs inline styles
"style-src 'self' 'unsafe-inline'",
"object-src 'none'",
"img-src 'self' data: blob:",
}, ";")
h.Set("Content-Security-Policy", cspValue)
}
|
[
"func",
"SetIndexHTMLHeaders",
"(",
"h",
"http",
".",
"Header",
")",
"{",
"SetNoCacheHeaders",
"(",
"h",
")",
"\n",
"SetSameOriginIFrame",
"(",
"h",
")",
"\n",
"SetNoSniff",
"(",
"h",
")",
"\n\n",
"// X-Frame-Options indicates that the page can only be displayed in iframe on the same origin as the page itself",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n\n",
"// X-XSS-Protection is a feature of Internet Explorer, Chrome and Safari that stops pages",
"// from loading when they detect reflected cross-site scripting (XSS) attacks.",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n\n",
"// Once a supported browser receives this header that browser will prevent any communications from",
"// being sent over HTTP to the specified domain and will instead send all communications over HTTPS.",
"// It also prevents HTTPS click through prompts on browsers",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n\n",
"// Prevent web browsers from using content sniffing to discover a file’s MIME type",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"\"",
"\"",
")",
"\n\n",
"// Set content policy flags",
"var",
"cspValue",
"=",
"strings",
".",
"Join",
"(",
"[",
"]",
"string",
"{",
"\"",
"\"",
",",
"// 'unsafe-inline' needed for reactjs inline styles",
"\"",
"\"",
",",
"\"",
"\"",
",",
"\"",
"\"",
",",
"}",
",",
"\"",
"\"",
")",
"\n\n",
"h",
".",
"Set",
"(",
"\"",
"\"",
",",
"cspValue",
")",
"\n",
"}"
] |
// SetIndexHTMLHeaders sets security header flags for main index.html page
|
[
"SetIndexHTMLHeaders",
"sets",
"security",
"header",
"flags",
"for",
"main",
"index",
".",
"html",
"page"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/httplib/httpheaders.go#L40-L70
|
22,996
|
gravitational/teleport
|
lib/kube/proxy/roundtrip.go
|
NewSpdyRoundTripperWithDialer
|
func NewSpdyRoundTripperWithDialer(cfg roundTripperConfig) *SpdyRoundTripper {
return &SpdyRoundTripper{tlsConfig: cfg.tlsConfig, followRedirects: cfg.followRedirects, dialWithContext: cfg.dial, ctx: cfg.ctx, authCtx: cfg.authCtx, bearerToken: cfg.bearerToken}
}
|
go
|
func NewSpdyRoundTripperWithDialer(cfg roundTripperConfig) *SpdyRoundTripper {
return &SpdyRoundTripper{tlsConfig: cfg.tlsConfig, followRedirects: cfg.followRedirects, dialWithContext: cfg.dial, ctx: cfg.ctx, authCtx: cfg.authCtx, bearerToken: cfg.bearerToken}
}
|
[
"func",
"NewSpdyRoundTripperWithDialer",
"(",
"cfg",
"roundTripperConfig",
")",
"*",
"SpdyRoundTripper",
"{",
"return",
"&",
"SpdyRoundTripper",
"{",
"tlsConfig",
":",
"cfg",
".",
"tlsConfig",
",",
"followRedirects",
":",
"cfg",
".",
"followRedirects",
",",
"dialWithContext",
":",
"cfg",
".",
"dial",
",",
"ctx",
":",
"cfg",
".",
"ctx",
",",
"authCtx",
":",
"cfg",
".",
"authCtx",
",",
"bearerToken",
":",
"cfg",
".",
"bearerToken",
"}",
"\n",
"}"
] |
// NewSpdyRoundTripperWithDialer creates a new SpdyRoundTripper that will use
// the specified tlsConfig. This function is mostly meant for unit tests.
|
[
"NewSpdyRoundTripperWithDialer",
"creates",
"a",
"new",
"SpdyRoundTripper",
"that",
"will",
"use",
"the",
"specified",
"tlsConfig",
".",
"This",
"function",
"is",
"mostly",
"meant",
"for",
"unit",
"tests",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/kube/proxy/roundtrip.go#L99-L101
|
22,997
|
gravitational/teleport
|
lib/kube/proxy/roundtrip.go
|
dial
|
func (s *SpdyRoundTripper) dial(req *http.Request) (net.Conn, error) {
return s.dialWithoutProxy(req.URL)
}
|
go
|
func (s *SpdyRoundTripper) dial(req *http.Request) (net.Conn, error) {
return s.dialWithoutProxy(req.URL)
}
|
[
"func",
"(",
"s",
"*",
"SpdyRoundTripper",
")",
"dial",
"(",
"req",
"*",
"http",
".",
"Request",
")",
"(",
"net",
".",
"Conn",
",",
"error",
")",
"{",
"return",
"s",
".",
"dialWithoutProxy",
"(",
"req",
".",
"URL",
")",
"\n",
"}"
] |
// dial dials the host specified by req
|
[
"dial",
"dials",
"the",
"host",
"specified",
"by",
"req"
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/kube/proxy/roundtrip.go#L125-L127
|
22,998
|
gravitational/teleport
|
lib/srv/authhandlers.go
|
CreateIdentityContext
|
func (h *AuthHandlers) CreateIdentityContext(sconn *ssh.ServerConn) (IdentityContext, error) {
identity := IdentityContext{
TeleportUser: sconn.Permissions.Extensions[utils.CertTeleportUser],
Certificate: []byte(sconn.Permissions.Extensions[utils.CertTeleportUserCertificate]),
Login: sconn.User(),
}
clusterName, err := h.AccessPoint.GetClusterName()
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
certificate, err := identity.GetCertificate()
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
if certificate.ValidBefore != 0 {
identity.CertValidBefore = time.Unix(int64(certificate.ValidBefore), 0)
}
certAuthority, err := h.authorityForCert(services.UserCA, certificate.SignatureKey)
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
identity.CertAuthority = certAuthority
roleSet, err := h.fetchRoleSet(certificate, certAuthority, identity.TeleportUser, clusterName.GetClusterName())
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
identity.RoleSet = roleSet
return identity, nil
}
|
go
|
func (h *AuthHandlers) CreateIdentityContext(sconn *ssh.ServerConn) (IdentityContext, error) {
identity := IdentityContext{
TeleportUser: sconn.Permissions.Extensions[utils.CertTeleportUser],
Certificate: []byte(sconn.Permissions.Extensions[utils.CertTeleportUserCertificate]),
Login: sconn.User(),
}
clusterName, err := h.AccessPoint.GetClusterName()
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
certificate, err := identity.GetCertificate()
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
if certificate.ValidBefore != 0 {
identity.CertValidBefore = time.Unix(int64(certificate.ValidBefore), 0)
}
certAuthority, err := h.authorityForCert(services.UserCA, certificate.SignatureKey)
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
identity.CertAuthority = certAuthority
roleSet, err := h.fetchRoleSet(certificate, certAuthority, identity.TeleportUser, clusterName.GetClusterName())
if err != nil {
return IdentityContext{}, trace.Wrap(err)
}
identity.RoleSet = roleSet
return identity, nil
}
|
[
"func",
"(",
"h",
"*",
"AuthHandlers",
")",
"CreateIdentityContext",
"(",
"sconn",
"*",
"ssh",
".",
"ServerConn",
")",
"(",
"IdentityContext",
",",
"error",
")",
"{",
"identity",
":=",
"IdentityContext",
"{",
"TeleportUser",
":",
"sconn",
".",
"Permissions",
".",
"Extensions",
"[",
"utils",
".",
"CertTeleportUser",
"]",
",",
"Certificate",
":",
"[",
"]",
"byte",
"(",
"sconn",
".",
"Permissions",
".",
"Extensions",
"[",
"utils",
".",
"CertTeleportUserCertificate",
"]",
")",
",",
"Login",
":",
"sconn",
".",
"User",
"(",
")",
",",
"}",
"\n\n",
"clusterName",
",",
"err",
":=",
"h",
".",
"AccessPoint",
".",
"GetClusterName",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"IdentityContext",
"{",
"}",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"certificate",
",",
"err",
":=",
"identity",
".",
"GetCertificate",
"(",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"IdentityContext",
"{",
"}",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"certificate",
".",
"ValidBefore",
"!=",
"0",
"{",
"identity",
".",
"CertValidBefore",
"=",
"time",
".",
"Unix",
"(",
"int64",
"(",
"certificate",
".",
"ValidBefore",
")",
",",
"0",
")",
"\n",
"}",
"\n\n",
"certAuthority",
",",
"err",
":=",
"h",
".",
"authorityForCert",
"(",
"services",
".",
"UserCA",
",",
"certificate",
".",
"SignatureKey",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"IdentityContext",
"{",
"}",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"identity",
".",
"CertAuthority",
"=",
"certAuthority",
"\n\n",
"roleSet",
",",
"err",
":=",
"h",
".",
"fetchRoleSet",
"(",
"certificate",
",",
"certAuthority",
",",
"identity",
".",
"TeleportUser",
",",
"clusterName",
".",
"GetClusterName",
"(",
")",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"IdentityContext",
"{",
"}",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"identity",
".",
"RoleSet",
"=",
"roleSet",
"\n\n",
"return",
"identity",
",",
"nil",
"\n",
"}"
] |
// BuildIdentityContext returns an IdentityContext populated with information
// about the logged in user on the connection.
|
[
"BuildIdentityContext",
"returns",
"an",
"IdentityContext",
"populated",
"with",
"information",
"about",
"the",
"logged",
"in",
"user",
"on",
"the",
"connection",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/authhandlers.go#L59-L92
|
22,999
|
gravitational/teleport
|
lib/srv/authhandlers.go
|
CheckAgentForward
|
func (h *AuthHandlers) CheckAgentForward(ctx *ServerContext) error {
if err := ctx.Identity.RoleSet.CheckAgentForward(ctx.Identity.Login); err != nil {
return trace.Wrap(err)
}
return nil
}
|
go
|
func (h *AuthHandlers) CheckAgentForward(ctx *ServerContext) error {
if err := ctx.Identity.RoleSet.CheckAgentForward(ctx.Identity.Login); err != nil {
return trace.Wrap(err)
}
return nil
}
|
[
"func",
"(",
"h",
"*",
"AuthHandlers",
")",
"CheckAgentForward",
"(",
"ctx",
"*",
"ServerContext",
")",
"error",
"{",
"if",
"err",
":=",
"ctx",
".",
"Identity",
".",
"RoleSet",
".",
"CheckAgentForward",
"(",
"ctx",
".",
"Identity",
".",
"Login",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n\n",
"return",
"nil",
"\n",
"}"
] |
// CheckAgentForward checks if agent forwarding is allowed for the users RoleSet.
|
[
"CheckAgentForward",
"checks",
"if",
"agent",
"forwarding",
"is",
"allowed",
"for",
"the",
"users",
"RoleSet",
"."
] |
d5243dbe8d36bba44bf640c08f1c49185ed2c8a4
|
https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/srv/authhandlers.go#L95-L101
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.