repo stringlengths 5 54 | path stringlengths 4 155 | func_name stringlengths 1 118 | original_string stringlengths 52 85.5k | language stringclasses 1
value | code stringlengths 52 85.5k | code_tokens list | docstring stringlengths 6 2.61k | docstring_tokens list | sha stringlengths 40 40 | url stringlengths 85 252 | partition stringclasses 1
value |
|---|---|---|---|---|---|---|---|---|---|---|---|
gravitational/teleport | lib/auth/auth.go | WithUserLock | func (s *AuthServer) WithUserLock(username string, authenticateFn func() error) error {
user, err := s.Identity.GetUser(username)
if err != nil {
return trace.Wrap(err)
}
status := user.GetStatus()
if status.IsLocked && status.LockExpires.After(s.clock.Now().UTC()) {
return trace.AccessDenied("%v exceeds %v fa... | go | func (s *AuthServer) WithUserLock(username string, authenticateFn func() error) error {
user, err := s.Identity.GetUser(username)
if err != nil {
return trace.Wrap(err)
}
status := user.GetStatus()
if status.IsLocked && status.LockExpires.After(s.clock.Now().UTC()) {
return trace.AccessDenied("%v exceeds %v fa... | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"WithUserLock",
"(",
"username",
"string",
",",
"authenticateFn",
"func",
"(",
")",
"error",
")",
"error",
"{",
"user",
",",
"err",
":=",
"s",
".",
"Identity",
".",
"GetUser",
"(",
"username",
")",
"\n",
"if",
... | // WithUserLock executes function authenticateFn that performs user authentication
// if authenticateFn returns non nil error, the login attempt will be logged in as failed.
// The only exception to this rule is ConnectionProblemError, in case if it occurs
// access will be denied, but login attempt will not be recorde... | [
"WithUserLock",
"executes",
"function",
"authenticateFn",
"that",
"performs",
"user",
"authentication",
"if",
"authenticateFn",
"returns",
"non",
"nil",
"error",
"the",
"login",
"attempt",
"will",
"be",
"logged",
"in",
"as",
"failed",
".",
"The",
"only",
"exceptio... | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L543-L594 | train |
gravitational/teleport | lib/auth/auth.go | PreAuthenticatedSignIn | func (s *AuthServer) PreAuthenticatedSignIn(user string) (services.WebSession, error) {
sess, err := s.NewWebSession(user)
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.UpsertWebSession(user, sess); err != nil {
return nil, trace.Wrap(err)
}
return sess.WithoutSecrets(), nil
} | go | func (s *AuthServer) PreAuthenticatedSignIn(user string) (services.WebSession, error) {
sess, err := s.NewWebSession(user)
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.UpsertWebSession(user, sess); err != nil {
return nil, trace.Wrap(err)
}
return sess.WithoutSecrets(), nil
} | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"PreAuthenticatedSignIn",
"(",
"user",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"sess",
",",
"err",
":=",
"s",
".",
"NewWebSession",
"(",
"user",
")",
"\n",
"if",
"err",
"!=",
... | // PreAuthenticatedSignIn is for 2-way authentication methods like U2F where the password is
// already checked before issuing the second factor challenge | [
"PreAuthenticatedSignIn",
"is",
"for",
"2",
"-",
"way",
"authentication",
"methods",
"like",
"U2F",
"where",
"the",
"password",
"is",
"already",
"checked",
"before",
"issuing",
"the",
"second",
"factor",
"challenge"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L598-L607 | train |
gravitational/teleport | lib/auth/auth.go | ExtendWebSession | func (s *AuthServer) ExtendWebSession(user string, prevSessionID string) (services.WebSession, error) {
prevSession, err := s.GetWebSession(user, prevSessionID)
if err != nil {
return nil, trace.Wrap(err)
}
// consider absolute expiry time that may be set for this session
// by some external identity serivce, s... | go | func (s *AuthServer) ExtendWebSession(user string, prevSessionID string) (services.WebSession, error) {
prevSession, err := s.GetWebSession(user, prevSessionID)
if err != nil {
return nil, trace.Wrap(err)
}
// consider absolute expiry time that may be set for this session
// by some external identity serivce, s... | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"ExtendWebSession",
"(",
"user",
"string",
",",
"prevSessionID",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"prevSession",
",",
"err",
":=",
"s",
".",
"GetWebSession",
"(",
"user",
... | // ExtendWebSession creates a new web session for a user based on a valid previous sessionID,
// method is used to renew the web session for a user | [
"ExtendWebSession",
"creates",
"a",
"new",
"web",
"session",
"for",
"a",
"user",
"based",
"on",
"a",
"valid",
"previous",
"sessionID",
"method",
"is",
"used",
"to",
"renew",
"the",
"web",
"session",
"for",
"a",
"user"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L686-L715 | train |
gravitational/teleport | lib/auth/auth.go | CreateWebSession | func (s *AuthServer) CreateWebSession(user string) (services.WebSession, error) {
sess, err := s.NewWebSession(user)
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.UpsertWebSession(user, sess); err != nil {
return nil, trace.Wrap(err)
}
sess, err = services.GetWebSessionMarshaler().GenerateWebSessi... | go | func (s *AuthServer) CreateWebSession(user string) (services.WebSession, error) {
sess, err := s.NewWebSession(user)
if err != nil {
return nil, trace.Wrap(err)
}
if err := s.UpsertWebSession(user, sess); err != nil {
return nil, trace.Wrap(err)
}
sess, err = services.GetWebSessionMarshaler().GenerateWebSessi... | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"CreateWebSession",
"(",
"user",
"string",
")",
"(",
"services",
".",
"WebSession",
",",
"error",
")",
"{",
"sess",
",",
"err",
":=",
"s",
".",
"NewWebSession",
"(",
"user",
")",
"\n",
"if",
"err",
"!=",
"nil... | // CreateWebSession creates a new web session for user without any
// checks, is used by admins | [
"CreateWebSession",
"creates",
"a",
"new",
"web",
"session",
"for",
"user",
"without",
"any",
"checks",
"is",
"used",
"by",
"admins"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L719-L732 | train |
gravitational/teleport | lib/auth/auth.go | CheckAndSetDefaults | func (req *GenerateTokenRequest) CheckAndSetDefaults() error {
for _, role := range req.Roles {
if err := role.Check(); err != nil {
return trace.Wrap(err)
}
}
if req.TTL == 0 {
req.TTL = defaults.ProvisioningTokenTTL
}
if req.Token == "" {
token, err := utils.CryptoRandomHex(TokenLenBytes)
if err != ... | go | func (req *GenerateTokenRequest) CheckAndSetDefaults() error {
for _, role := range req.Roles {
if err := role.Check(); err != nil {
return trace.Wrap(err)
}
}
if req.TTL == 0 {
req.TTL = defaults.ProvisioningTokenTTL
}
if req.Token == "" {
token, err := utils.CryptoRandomHex(TokenLenBytes)
if err != ... | [
"func",
"(",
"req",
"*",
"GenerateTokenRequest",
")",
"CheckAndSetDefaults",
"(",
")",
"error",
"{",
"for",
"_",
",",
"role",
":=",
"range",
"req",
".",
"Roles",
"{",
"if",
"err",
":=",
"role",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
... | // CheckAndSetDefaults checks and sets default values of request | [
"CheckAndSetDefaults",
"checks",
"and",
"sets",
"default",
"values",
"of",
"request"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L745-L762 | train |
gravitational/teleport | lib/auth/auth.go | GenerateToken | func (s *AuthServer) GenerateToken(req GenerateTokenRequest) (string, error) {
if err := req.CheckAndSetDefaults(); err != nil {
return "", trace.Wrap(err)
}
token, err := services.NewProvisionToken(req.Token, req.Roles, s.clock.Now().UTC().Add(req.TTL))
if err != nil {
return "", trace.Wrap(err)
}
if err := ... | go | func (s *AuthServer) GenerateToken(req GenerateTokenRequest) (string, error) {
if err := req.CheckAndSetDefaults(); err != nil {
return "", trace.Wrap(err)
}
token, err := services.NewProvisionToken(req.Token, req.Roles, s.clock.Now().UTC().Add(req.TTL))
if err != nil {
return "", trace.Wrap(err)
}
if err := ... | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"GenerateToken",
"(",
"req",
"GenerateTokenRequest",
")",
"(",
"string",
",",
"error",
")",
"{",
"if",
"err",
":=",
"req",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"\"",
"\"... | // GenerateToken generates multi-purpose authentication token | [
"GenerateToken",
"generates",
"multi",
"-",
"purpose",
"authentication",
"token"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L765-L777 | train |
gravitational/teleport | lib/auth/auth.go | ExtractHostID | func ExtractHostID(hostName string, clusterName string) (string, error) {
suffix := "." + clusterName
if !strings.HasSuffix(hostName, suffix) {
return "", trace.BadParameter("expected suffix %q in %q", suffix, hostName)
}
return strings.TrimSuffix(hostName, suffix), nil
} | go | func ExtractHostID(hostName string, clusterName string) (string, error) {
suffix := "." + clusterName
if !strings.HasSuffix(hostName, suffix) {
return "", trace.BadParameter("expected suffix %q in %q", suffix, hostName)
}
return strings.TrimSuffix(hostName, suffix), nil
} | [
"func",
"ExtractHostID",
"(",
"hostName",
"string",
",",
"clusterName",
"string",
")",
"(",
"string",
",",
"error",
")",
"{",
"suffix",
":=",
"\"",
"\"",
"+",
"clusterName",
"\n",
"if",
"!",
"strings",
".",
"HasSuffix",
"(",
"hostName",
",",
"suffix",
")... | // ExtractHostID returns host id based on the hostname | [
"ExtractHostID",
"returns",
"host",
"id",
"based",
"on",
"the",
"hostname"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L780-L786 | train |
gravitational/teleport | lib/auth/auth.go | ValidateToken | func (s *AuthServer) ValidateToken(token string) (roles teleport.Roles, e error) {
tkns, err := s.GetCache().GetStaticTokens()
if err != nil {
return nil, trace.Wrap(err)
}
// First check if the token is a static token. If it is, return right away.
// Static tokens have no expiration.
for _, st := range tkns.G... | go | func (s *AuthServer) ValidateToken(token string) (roles teleport.Roles, e error) {
tkns, err := s.GetCache().GetStaticTokens()
if err != nil {
return nil, trace.Wrap(err)
}
// First check if the token is a static token. If it is, return right away.
// Static tokens have no expiration.
for _, st := range tkns.G... | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"ValidateToken",
"(",
"token",
"string",
")",
"(",
"roles",
"teleport",
".",
"Roles",
",",
"e",
"error",
")",
"{",
"tkns",
",",
"err",
":=",
"s",
".",
"GetCache",
"(",
")",
".",
"GetStaticTokens",
"(",
")",
... | // ValidateToken takes a provisioning token value and finds if it's valid. Returns
// a list of roles this token allows its owner to assume, or an error if the token
// cannot be found. | [
"ValidateToken",
"takes",
"a",
"provisioning",
"token",
"value",
"and",
"finds",
"if",
"it",
"s",
"valid",
".",
"Returns",
"a",
"list",
"of",
"roles",
"this",
"token",
"allows",
"its",
"owner",
"to",
"assume",
"or",
"an",
"error",
"if",
"the",
"token",
"... | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L993-L1018 | train |
gravitational/teleport | lib/auth/auth.go | checkTokenTTL | func (s *AuthServer) checkTokenTTL(tok services.ProvisionToken) bool {
now := s.clock.Now().UTC()
if tok.Expiry().Before(now) {
err := s.DeleteToken(tok.GetName())
if err != nil {
if !trace.IsNotFound(err) {
log.Warnf("Unable to delete token from backend: %v.", err)
}
}
return false
}
return true
... | go | func (s *AuthServer) checkTokenTTL(tok services.ProvisionToken) bool {
now := s.clock.Now().UTC()
if tok.Expiry().Before(now) {
err := s.DeleteToken(tok.GetName())
if err != nil {
if !trace.IsNotFound(err) {
log.Warnf("Unable to delete token from backend: %v.", err)
}
}
return false
}
return true
... | [
"func",
"(",
"s",
"*",
"AuthServer",
")",
"checkTokenTTL",
"(",
"tok",
"services",
".",
"ProvisionToken",
")",
"bool",
"{",
"now",
":=",
"s",
".",
"clock",
".",
"Now",
"(",
")",
".",
"UTC",
"(",
")",
"\n",
"if",
"tok",
".",
"Expiry",
"(",
")",
".... | // checkTokenTTL checks if the token is still valid. If it is not, the token
// is removed from the backend and returns false. Otherwise returns true. | [
"checkTokenTTL",
"checks",
"if",
"the",
"token",
"is",
"still",
"valid",
".",
"If",
"it",
"is",
"not",
"the",
"token",
"is",
"removed",
"from",
"the",
"backend",
"and",
"returns",
"false",
".",
"Otherwise",
"returns",
"true",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1022-L1034 | train |
gravitational/teleport | lib/auth/auth.go | CheckAndSetDefaults | func (r *RegisterUsingTokenRequest) CheckAndSetDefaults() error {
if r.HostID == "" {
return trace.BadParameter("missing parameter HostID")
}
if r.Token == "" {
return trace.BadParameter("missing parameter Token")
}
if err := r.Role.Check(); err != nil {
return trace.Wrap(err)
}
return nil
} | go | func (r *RegisterUsingTokenRequest) CheckAndSetDefaults() error {
if r.HostID == "" {
return trace.BadParameter("missing parameter HostID")
}
if r.Token == "" {
return trace.BadParameter("missing parameter Token")
}
if err := r.Role.Check(); err != nil {
return trace.Wrap(err)
}
return nil
} | [
"func",
"(",
"r",
"*",
"RegisterUsingTokenRequest",
")",
"CheckAndSetDefaults",
"(",
")",
"error",
"{",
"if",
"r",
".",
"HostID",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"if",
"r",
".",
"T... | // CheckAndSetDefaults checks for errors and sets defaults | [
"CheckAndSetDefaults",
"checks",
"for",
"errors",
"and",
"sets",
"defaults"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1064-L1075 | train |
gravitational/teleport | lib/auth/auth.go | NewWatcher | func (a *AuthServer) NewWatcher(ctx context.Context, watch services.Watch) (services.Watcher, error) {
return a.GetCache().NewWatcher(ctx, watch)
} | go | func (a *AuthServer) NewWatcher(ctx context.Context, watch services.Watch) (services.Watcher, error) {
return a.GetCache().NewWatcher(ctx, watch)
} | [
"func",
"(",
"a",
"*",
"AuthServer",
")",
"NewWatcher",
"(",
"ctx",
"context",
".",
"Context",
",",
"watch",
"services",
".",
"Watch",
")",
"(",
"services",
".",
"Watcher",
",",
"error",
")",
"{",
"return",
"a",
".",
"GetCache",
"(",
")",
".",
"NewWa... | // NewWatcher returns a new event watcher. In case of an auth server
// this watcher will return events as seen by the auth server's
// in memory cache, not the backend. | [
"NewWatcher",
"returns",
"a",
"new",
"event",
"watcher",
".",
"In",
"case",
"of",
"an",
"auth",
"server",
"this",
"watcher",
"will",
"return",
"events",
"as",
"seen",
"by",
"the",
"auth",
"server",
"s",
"in",
"memory",
"cache",
"not",
"the",
"backend",
"... | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1274-L1276 | train |
gravitational/teleport | lib/auth/auth.go | Error | func (k *authKeepAliver) Error() error {
k.RLock()
defer k.RUnlock()
return k.err
} | go | func (k *authKeepAliver) Error() error {
k.RLock()
defer k.RUnlock()
return k.err
} | [
"func",
"(",
"k",
"*",
"authKeepAliver",
")",
"Error",
"(",
")",
"error",
"{",
"k",
".",
"RLock",
"(",
")",
"\n",
"defer",
"k",
".",
"RUnlock",
"(",
")",
"\n",
"return",
"k",
".",
"err",
"\n",
"}"
] | // Error returns the error if keep aliver
// has been closed | [
"Error",
"returns",
"the",
"error",
"if",
"keep",
"aliver",
"has",
"been",
"closed"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1443-L1447 | train |
gravitational/teleport | lib/auth/auth.go | oidcConfigsEqual | func oidcConfigsEqual(a, b oidc.ClientConfig) bool {
if a.RedirectURL != b.RedirectURL {
return false
}
if a.Credentials.ID != b.Credentials.ID {
return false
}
if a.Credentials.Secret != b.Credentials.Secret {
return false
}
if len(a.Scope) != len(b.Scope) {
return false
}
for i := range a.Scope {
i... | go | func oidcConfigsEqual(a, b oidc.ClientConfig) bool {
if a.RedirectURL != b.RedirectURL {
return false
}
if a.Credentials.ID != b.Credentials.ID {
return false
}
if a.Credentials.Secret != b.Credentials.Secret {
return false
}
if len(a.Scope) != len(b.Scope) {
return false
}
for i := range a.Scope {
i... | [
"func",
"oidcConfigsEqual",
"(",
"a",
",",
"b",
"oidc",
".",
"ClientConfig",
")",
"bool",
"{",
"if",
"a",
".",
"RedirectURL",
"!=",
"b",
".",
"RedirectURL",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"a",
".",
"Credentials",
".",
"ID",
"!=",
"b",... | // oidcConfigsEqual returns true if the provided OIDC configs are equal | [
"oidcConfigsEqual",
"returns",
"true",
"if",
"the",
"provided",
"OIDC",
"configs",
"are",
"equal"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1488-L1507 | train |
gravitational/teleport | lib/auth/auth.go | oauth2ConfigsEqual | func oauth2ConfigsEqual(a, b oauth2.Config) bool {
if a.Credentials.ID != b.Credentials.ID {
return false
}
if a.Credentials.Secret != b.Credentials.Secret {
return false
}
if a.RedirectURL != b.RedirectURL {
return false
}
if len(a.Scope) != len(b.Scope) {
return false
}
for i := range a.Scope {
if ... | go | func oauth2ConfigsEqual(a, b oauth2.Config) bool {
if a.Credentials.ID != b.Credentials.ID {
return false
}
if a.Credentials.Secret != b.Credentials.Secret {
return false
}
if a.RedirectURL != b.RedirectURL {
return false
}
if len(a.Scope) != len(b.Scope) {
return false
}
for i := range a.Scope {
if ... | [
"func",
"oauth2ConfigsEqual",
"(",
"a",
",",
"b",
"oauth2",
".",
"Config",
")",
"bool",
"{",
"if",
"a",
".",
"Credentials",
".",
"ID",
"!=",
"b",
".",
"Credentials",
".",
"ID",
"{",
"return",
"false",
"\n",
"}",
"\n",
"if",
"a",
".",
"Credentials",
... | // oauth2ConfigsEqual returns true if the provided OAuth2 configs are equal | [
"oauth2ConfigsEqual",
"returns",
"true",
"if",
"the",
"provided",
"OAuth2",
"configs",
"are",
"equal"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1510-L1538 | train |
gravitational/teleport | lib/auth/auth.go | isHTTPS | func isHTTPS(u string) error {
earl, err := url.Parse(u)
if err != nil {
return trace.Wrap(err)
}
if earl.Scheme != "https" {
return trace.BadParameter("expected scheme https, got %q", earl.Scheme)
}
return nil
} | go | func isHTTPS(u string) error {
earl, err := url.Parse(u)
if err != nil {
return trace.Wrap(err)
}
if earl.Scheme != "https" {
return trace.BadParameter("expected scheme https, got %q", earl.Scheme)
}
return nil
} | [
"func",
"isHTTPS",
"(",
"u",
"string",
")",
"error",
"{",
"earl",
",",
"err",
":=",
"url",
".",
"Parse",
"(",
"u",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
"(",
"err",
")",
"\n",
"}",
"\n",
"if",
"earl",
".",
... | // isHTTPS checks if the scheme for a URL is https or not. | [
"isHTTPS",
"checks",
"if",
"the",
"scheme",
"for",
"a",
"URL",
"is",
"https",
"or",
"not",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/auth.go#L1541-L1551 | train |
gravitational/teleport | lib/services/oidc.go | NewOIDCConnector | func NewOIDCConnector(name string, spec OIDCConnectorSpecV2) OIDCConnector {
return &OIDCConnectorV2{
Kind: KindOIDCConnector,
Version: V2,
Metadata: Metadata{
Name: name,
Namespace: defaults.Namespace,
},
Spec: spec,
}
} | go | func NewOIDCConnector(name string, spec OIDCConnectorSpecV2) OIDCConnector {
return &OIDCConnectorV2{
Kind: KindOIDCConnector,
Version: V2,
Metadata: Metadata{
Name: name,
Namespace: defaults.Namespace,
},
Spec: spec,
}
} | [
"func",
"NewOIDCConnector",
"(",
"name",
"string",
",",
"spec",
"OIDCConnectorSpecV2",
")",
"OIDCConnector",
"{",
"return",
"&",
"OIDCConnectorV2",
"{",
"Kind",
":",
"KindOIDCConnector",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
... | // NewOIDCConnector returns a new OIDCConnector based off a name and OIDCConnectorSpecV2. | [
"NewOIDCConnector",
"returns",
"a",
"new",
"OIDCConnector",
"based",
"off",
"a",
"name",
"and",
"OIDCConnectorSpecV2",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L92-L102 | train |
gravitational/teleport | lib/services/oidc.go | UnmarshalOIDCConnector | func (*TeleportOIDCConnectorMarshaler) UnmarshalOIDCConnector(bytes []byte, opts ...MarshalOption) (OIDCConnector, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
var h ResourceHeader
err = utils.FastUnmarshal(bytes, &h)
if err != nil {
return nil, trace.Wrap(err)
}
s... | go | func (*TeleportOIDCConnectorMarshaler) UnmarshalOIDCConnector(bytes []byte, opts ...MarshalOption) (OIDCConnector, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
var h ResourceHeader
err = utils.FastUnmarshal(bytes, &h)
if err != nil {
return nil, trace.Wrap(err)
}
s... | [
"func",
"(",
"*",
"TeleportOIDCConnectorMarshaler",
")",
"UnmarshalOIDCConnector",
"(",
"bytes",
"[",
"]",
"byte",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"OIDCConnector",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
... | // UnmarshalOIDCConnector unmarshals connector from | [
"UnmarshalOIDCConnector",
"unmarshals",
"connector",
"from"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L137-L180 | train |
gravitational/teleport | lib/services/oidc.go | MarshalOIDCConnector | func (*TeleportOIDCConnectorMarshaler) MarshalOIDCConnector(c OIDCConnector, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
type connv1 interface {
V1() *OIDCConnectorV1
}
type connv2 interface {
V2() *OIDCConnectorV2
}
version := c... | go | func (*TeleportOIDCConnectorMarshaler) MarshalOIDCConnector(c OIDCConnector, opts ...MarshalOption) ([]byte, error) {
cfg, err := collectOptions(opts)
if err != nil {
return nil, trace.Wrap(err)
}
type connv1 interface {
V1() *OIDCConnectorV1
}
type connv2 interface {
V2() *OIDCConnectorV2
}
version := c... | [
"func",
"(",
"*",
"TeleportOIDCConnectorMarshaler",
")",
"MarshalOIDCConnector",
"(",
"c",
"OIDCConnector",
",",
"opts",
"...",
"MarshalOption",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"cfg",
",",
"err",
":=",
"collectOptions",
"(",
"opts",
")",
... | // MarshalUser marshals OIDC connector into JSON | [
"MarshalUser",
"marshals",
"OIDC",
"connector",
"into",
"JSON"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L183-L220 | train |
gravitational/teleport | lib/services/oidc.go | V1 | func (o *OIDCConnectorV2) V1() *OIDCConnectorV1 {
return &OIDCConnectorV1{
ID: o.Metadata.Name,
IssuerURL: o.Spec.IssuerURL,
ClientID: o.Spec.ClientID,
ClientSecret: o.Spec.ClientSecret,
RedirectURL: o.Spec.RedirectURL,
Display: o.Spec.Display,
Scope: o.Spec.Scope,
... | go | func (o *OIDCConnectorV2) V1() *OIDCConnectorV1 {
return &OIDCConnectorV1{
ID: o.Metadata.Name,
IssuerURL: o.Spec.IssuerURL,
ClientID: o.Spec.ClientID,
ClientSecret: o.Spec.ClientSecret,
RedirectURL: o.Spec.RedirectURL,
Display: o.Spec.Display,
Scope: o.Spec.Scope,
... | [
"func",
"(",
"o",
"*",
"OIDCConnectorV2",
")",
"V1",
"(",
")",
"*",
"OIDCConnectorV1",
"{",
"return",
"&",
"OIDCConnectorV1",
"{",
"ID",
":",
"o",
".",
"Metadata",
".",
"Name",
",",
"IssuerURL",
":",
"o",
".",
"Spec",
".",
"IssuerURL",
",",
"ClientID",... | // V1 converts OIDCConnectorV2 to OIDCConnectorV1 format | [
"V1",
"converts",
"OIDCConnectorV2",
"to",
"OIDCConnectorV1",
"format"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L272-L283 | train |
gravitational/teleport | lib/services/oidc.go | GetClaims | func (o *OIDCConnectorV2) GetClaims() []string {
var out []string
for _, mapping := range o.Spec.ClaimsToRoles {
out = append(out, mapping.Claim)
}
return utils.Deduplicate(out)
} | go | func (o *OIDCConnectorV2) GetClaims() []string {
var out []string
for _, mapping := range o.Spec.ClaimsToRoles {
out = append(out, mapping.Claim)
}
return utils.Deduplicate(out)
} | [
"func",
"(",
"o",
"*",
"OIDCConnectorV2",
")",
"GetClaims",
"(",
")",
"[",
"]",
"string",
"{",
"var",
"out",
"[",
"]",
"string",
"\n",
"for",
"_",
",",
"mapping",
":=",
"range",
"o",
".",
"Spec",
".",
"ClaimsToRoles",
"{",
"out",
"=",
"append",
"("... | // GetClaims returns list of claims expected by mappings | [
"GetClaims",
"returns",
"list",
"of",
"claims",
"expected",
"by",
"mappings"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L412-L418 | train |
gravitational/teleport | lib/services/oidc.go | MapClaims | func (o *OIDCConnectorV2) MapClaims(claims jose.Claims) []string {
var roles []string
for _, mapping := range o.Spec.ClaimsToRoles {
for claimName := range claims {
if claimName != mapping.Claim {
continue
}
var claimValues []string
claimValue, ok, _ := claims.StringClaim(claimName)
if ok {
c... | go | func (o *OIDCConnectorV2) MapClaims(claims jose.Claims) []string {
var roles []string
for _, mapping := range o.Spec.ClaimsToRoles {
for claimName := range claims {
if claimName != mapping.Claim {
continue
}
var claimValues []string
claimValue, ok, _ := claims.StringClaim(claimName)
if ok {
c... | [
"func",
"(",
"o",
"*",
"OIDCConnectorV2",
")",
"MapClaims",
"(",
"claims",
"jose",
".",
"Claims",
")",
"[",
"]",
"string",
"{",
"var",
"roles",
"[",
"]",
"string",
"\n",
"for",
"_",
",",
"mapping",
":=",
"range",
"o",
".",
"Spec",
".",
"ClaimsToRoles... | // MapClaims maps claims to roles | [
"MapClaims",
"maps",
"claims",
"to",
"roles"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L421-L456 | train |
gravitational/teleport | lib/services/oidc.go | GetClaimNames | func GetClaimNames(claims jose.Claims) []string {
var out []string
for claim := range claims {
out = append(out, claim)
}
return out
} | go | func GetClaimNames(claims jose.Claims) []string {
var out []string
for claim := range claims {
out = append(out, claim)
}
return out
} | [
"func",
"GetClaimNames",
"(",
"claims",
"jose",
".",
"Claims",
")",
"[",
"]",
"string",
"{",
"var",
"out",
"[",
"]",
"string",
"\n",
"for",
"claim",
":=",
"range",
"claims",
"{",
"out",
"=",
"append",
"(",
"out",
",",
"claim",
")",
"\n",
"}",
"\n",... | // GetClaimNames returns a list of claim names from the claim values | [
"GetClaimNames",
"returns",
"a",
"list",
"of",
"claim",
"names",
"from",
"the",
"claim",
"values"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L613-L619 | train |
gravitational/teleport | lib/services/oidc.go | V2 | func (o *OIDCConnectorV1) V2() *OIDCConnectorV2 {
return &OIDCConnectorV2{
Kind: KindOIDCConnector,
Version: V2,
Metadata: Metadata{
Name: o.ID,
},
Spec: OIDCConnectorSpecV2{
IssuerURL: o.IssuerURL,
ClientID: o.ClientID,
ClientSecret: o.ClientSecret,
RedirectURL: o.RedirectURL,
... | go | func (o *OIDCConnectorV1) V2() *OIDCConnectorV2 {
return &OIDCConnectorV2{
Kind: KindOIDCConnector,
Version: V2,
Metadata: Metadata{
Name: o.ID,
},
Spec: OIDCConnectorSpecV2{
IssuerURL: o.IssuerURL,
ClientID: o.ClientID,
ClientSecret: o.ClientSecret,
RedirectURL: o.RedirectURL,
... | [
"func",
"(",
"o",
"*",
"OIDCConnectorV1",
")",
"V2",
"(",
")",
"*",
"OIDCConnectorV2",
"{",
"return",
"&",
"OIDCConnectorV2",
"{",
"Kind",
":",
"KindOIDCConnector",
",",
"Version",
":",
"V2",
",",
"Metadata",
":",
"Metadata",
"{",
"Name",
":",
"o",
".",
... | // V2 returns V2 version of the connector | [
"V2",
"returns",
"V2",
"version",
"of",
"the",
"connector"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/oidc.go#L682-L699 | train |
gravitational/teleport | lib/utils/checker.go | Authenticate | func (c *CertChecker) Authenticate(conn ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) {
err := validate(key)
if err != nil {
return nil, trace.Wrap(err)
}
perms, err := c.CertChecker.Authenticate(conn, key)
if err != nil {
return nil, trace.Wrap(err)
}
return perms, nil
} | go | func (c *CertChecker) Authenticate(conn ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) {
err := validate(key)
if err != nil {
return nil, trace.Wrap(err)
}
perms, err := c.CertChecker.Authenticate(conn, key)
if err != nil {
return nil, trace.Wrap(err)
}
return perms, nil
} | [
"func",
"(",
"c",
"*",
"CertChecker",
")",
"Authenticate",
"(",
"conn",
"ssh",
".",
"ConnMetadata",
",",
"key",
"ssh",
".",
"PublicKey",
")",
"(",
"*",
"ssh",
".",
"Permissions",
",",
"error",
")",
"{",
"err",
":=",
"validate",
"(",
"key",
")",
"\n",... | // Authenticate checks the validity of a user certificate.
// a value for ServerConfig.PublicKeyCallback. | [
"Authenticate",
"checks",
"the",
"validity",
"of",
"a",
"user",
"certificate",
".",
"a",
"value",
"for",
"ServerConfig",
".",
"PublicKeyCallback",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/checker.go#L43-L55 | train |
gravitational/teleport | lib/utils/checker.go | CheckCert | func (c *CertChecker) CheckCert(principal string, cert *ssh.Certificate) error {
err := validate(cert)
if err != nil {
return trace.Wrap(err)
}
return c.CertChecker.CheckCert(principal, cert)
} | go | func (c *CertChecker) CheckCert(principal string, cert *ssh.Certificate) error {
err := validate(cert)
if err != nil {
return trace.Wrap(err)
}
return c.CertChecker.CheckCert(principal, cert)
} | [
"func",
"(",
"c",
"*",
"CertChecker",
")",
"CheckCert",
"(",
"principal",
"string",
",",
"cert",
"*",
"ssh",
".",
"Certificate",
")",
"error",
"{",
"err",
":=",
"validate",
"(",
"cert",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
"."... | // CheckCert checks certificate metadata and signature. | [
"CheckCert",
"checks",
"certificate",
"metadata",
"and",
"signature",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/checker.go#L58-L65 | train |
gravitational/teleport | lib/utils/checker.go | CheckHostKey | func (c *CertChecker) CheckHostKey(addr string, remote net.Addr, key ssh.PublicKey) error {
err := validate(key)
if err != nil {
return trace.Wrap(err)
}
return c.CertChecker.CheckHostKey(addr, remote, key)
} | go | func (c *CertChecker) CheckHostKey(addr string, remote net.Addr, key ssh.PublicKey) error {
err := validate(key)
if err != nil {
return trace.Wrap(err)
}
return c.CertChecker.CheckHostKey(addr, remote, key)
} | [
"func",
"(",
"c",
"*",
"CertChecker",
")",
"CheckHostKey",
"(",
"addr",
"string",
",",
"remote",
"net",
".",
"Addr",
",",
"key",
"ssh",
".",
"PublicKey",
")",
"error",
"{",
"err",
":=",
"validate",
"(",
"key",
")",
"\n",
"if",
"err",
"!=",
"nil",
"... | // CheckHostKey checks the validity of a host certificate. | [
"CheckHostKey",
"checks",
"the",
"validity",
"of",
"a",
"host",
"certificate",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/checker.go#L68-L75 | train |
gravitational/teleport | lib/utils/checker.go | CreateCertificate | func CreateCertificate(principal string, certType uint32) (*ssh.Certificate, ssh.Signer, error) {
// Create RSA key for CA and certificate to be signed by CA.
caKey, err := rsa.GenerateKey(rand.Reader, teleport.RSAKeySize)
if err != nil {
return nil, nil, trace.Wrap(err)
}
key, err := rsa.GenerateKey(rand.Reader... | go | func CreateCertificate(principal string, certType uint32) (*ssh.Certificate, ssh.Signer, error) {
// Create RSA key for CA and certificate to be signed by CA.
caKey, err := rsa.GenerateKey(rand.Reader, teleport.RSAKeySize)
if err != nil {
return nil, nil, trace.Wrap(err)
}
key, err := rsa.GenerateKey(rand.Reader... | [
"func",
"CreateCertificate",
"(",
"principal",
"string",
",",
"certType",
"uint32",
")",
"(",
"*",
"ssh",
".",
"Certificate",
",",
"ssh",
".",
"Signer",
",",
"error",
")",
"{",
"// Create RSA key for CA and certificate to be signed by CA.",
"caKey",
",",
"err",
":... | // CreateCertificate creates a valid 2048-bit RSA certificate. | [
"CreateCertificate",
"creates",
"a",
"valid",
"2048",
"-",
"bit",
"RSA",
"certificate",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/checker.go#L111-L128 | train |
gravitational/teleport | lib/utils/checker.go | CreateEllipticCertificate | func CreateEllipticCertificate(principal string, certType uint32) (*ssh.Certificate, ssh.Signer, error) {
// Create ECDSA key for CA and certificate to be signed by CA.
caKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
return nil, nil, trace.Wrap(err)
}
key, err := ecdsa.GenerateKey(e... | go | func CreateEllipticCertificate(principal string, certType uint32) (*ssh.Certificate, ssh.Signer, error) {
// Create ECDSA key for CA and certificate to be signed by CA.
caKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
return nil, nil, trace.Wrap(err)
}
key, err := ecdsa.GenerateKey(e... | [
"func",
"CreateEllipticCertificate",
"(",
"principal",
"string",
",",
"certType",
"uint32",
")",
"(",
"*",
"ssh",
".",
"Certificate",
",",
"ssh",
".",
"Signer",
",",
"error",
")",
"{",
"// Create ECDSA key for CA and certificate to be signed by CA.",
"caKey",
",",
"... | // CreateEllipticCertificate creates a valid, but not supported, ECDSA
// SSH certificate. This certificate is used to make sure Teleport rejects
// such certificates. | [
"CreateEllipticCertificate",
"creates",
"a",
"valid",
"but",
"not",
"supported",
"ECDSA",
"SSH",
"certificate",
".",
"This",
"certificate",
"is",
"used",
"to",
"make",
"sure",
"Teleport",
"rejects",
"such",
"certificates",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/checker.go#L133-L150 | train |
gravitational/teleport | lib/utils/checker.go | createCertificate | func createCertificate(principal string, certType uint32, caKey crypto.Signer, key crypto.Signer) (*ssh.Certificate, ssh.Signer, error) {
// Create CA.
caPublicKey, err := ssh.NewPublicKey(caKey.Public())
if err != nil {
return nil, nil, trace.Wrap(err)
}
caSigner, err := ssh.NewSignerFromKey(caKey)
if err != n... | go | func createCertificate(principal string, certType uint32, caKey crypto.Signer, key crypto.Signer) (*ssh.Certificate, ssh.Signer, error) {
// Create CA.
caPublicKey, err := ssh.NewPublicKey(caKey.Public())
if err != nil {
return nil, nil, trace.Wrap(err)
}
caSigner, err := ssh.NewSignerFromKey(caKey)
if err != n... | [
"func",
"createCertificate",
"(",
"principal",
"string",
",",
"certType",
"uint32",
",",
"caKey",
"crypto",
".",
"Signer",
",",
"key",
"crypto",
".",
"Signer",
")",
"(",
"*",
"ssh",
".",
"Certificate",
",",
"ssh",
".",
"Signer",
",",
"error",
")",
"{",
... | // createCertificate creates a SSH certificate for the given key signed by the
// given CA key. This function exists here to allow easy key generation for
// some of the more core packages like "sshutils". | [
"createCertificate",
"creates",
"a",
"SSH",
"certificate",
"for",
"the",
"given",
"key",
"signed",
"by",
"the",
"given",
"CA",
"key",
".",
"This",
"function",
"exists",
"here",
"to",
"allow",
"easy",
"key",
"generation",
"for",
"some",
"of",
"the",
"more",
... | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/checker.go#L155-L196 | train |
gravitational/teleport | lib/auth/apiserver.go | upsertServer | func (s *APIServer) upsertServer(auth ClientI, role teleport.Role, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertServerRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
var kind string
switch role {
case tel... | go | func (s *APIServer) upsertServer(auth ClientI, role teleport.Role, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertServerRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
var kind string
switch role {
case tel... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"upsertServer",
"(",
"auth",
"ClientI",
",",
"role",
"teleport",
".",
"Role",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version"... | // upsertServer is a common utility function | [
"upsertServer",
"is",
"a",
"common",
"utility",
"function"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L279-L325 | train |
gravitational/teleport | lib/auth/apiserver.go | keepAliveNode | func (s *APIServer) keepAliveNode(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var handle services.KeepAlive
if err := httplib.ReadJSON(r, &handle); err != nil {
return nil, trace.Wrap(err)
}
if err := auth.KeepAliveNode(r.Context(), handle); er... | go | func (s *APIServer) keepAliveNode(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var handle services.KeepAlive
if err := httplib.ReadJSON(r, &handle); err != nil {
return nil, trace.Wrap(err)
}
if err := auth.KeepAliveNode(r.Context(), handle); er... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"keepAliveNode",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
"{... | // keepAliveNode updates node TTL in the backend | [
"keepAliveNode",
"updates",
"node",
"TTL",
"in",
"the",
"backend"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L328-L337 | train |
gravitational/teleport | lib/auth/apiserver.go | upsertNodes | func (s *APIServer) upsertNodes(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertNodesReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
if !services.IsValidNamespace(req.Namespace) {
return nil, trac... | go | func (s *APIServer) upsertNodes(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertNodesReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
if !services.IsValidNamespace(req.Namespace) {
return nil, trac... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"upsertNodes",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
"{",... | // upsertNodes is used to bulk insert nodes into the backend. | [
"upsertNodes",
"is",
"used",
"to",
"bulk",
"insert",
"nodes",
"into",
"the",
"backend",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L345-L365 | train |
gravitational/teleport | lib/auth/apiserver.go | getNodes | func (s *APIServer) getNodes(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
namespace := p.ByName("namespace")
if !services.IsValidNamespace(namespace) {
return nil, trace.BadParameter("invalid namespace %q", namespace)
}
skipValidation, _, err :=... | go | func (s *APIServer) getNodes(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
namespace := p.ByName("namespace")
if !services.IsValidNamespace(namespace) {
return nil, trace.BadParameter("invalid namespace %q", namespace)
}
skipValidation, _, err :=... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getNodes",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
"{",
... | // getNodes returns registered SSH nodes | [
"getNodes",
"returns",
"registered",
"SSH",
"nodes"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L373-L392 | train |
gravitational/teleport | lib/auth/apiserver.go | deleteProxy | func (s *APIServer) deleteProxy(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
name := p.ByName("name")
if name == "" {
return nil, trace.BadParameter("missing proxy name")
}
err := auth.DeleteProxy(name)
if err != nil {
return nil, trace.Wrap(... | go | func (s *APIServer) deleteProxy(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
name := p.ByName("name")
if name == "" {
return nil, trace.BadParameter("missing proxy name")
}
err := auth.DeleteProxy(name)
if err != nil {
return nil, trace.Wrap(... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"deleteProxy",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
"{",... | // deleteProxy deletes proxy | [
"deleteProxy",
"deletes",
"proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L448-L458 | train |
gravitational/teleport | lib/auth/apiserver.go | upsertAuthServer | func (s *APIServer) upsertAuthServer(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
return s.upsertServer(auth, teleport.RoleAuth, w, r, p, version)
} | go | func (s *APIServer) upsertAuthServer(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
return s.upsertServer(auth, teleport.RoleAuth, w, r, p, version)
} | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"upsertAuthServer",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
... | // upsertAuthServer is called by remote Auth servers when they ping back into the auth service | [
"upsertAuthServer",
"is",
"called",
"by",
"remote",
"Auth",
"servers",
"when",
"they",
"ping",
"back",
"into",
"the",
"auth",
"service"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L461-L463 | train |
gravitational/teleport | lib/auth/apiserver.go | getAuthServers | func (s *APIServer) getAuthServers(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
servers, err := auth.GetAuthServers()
if err != nil {
return nil, trace.Wrap(err)
}
return marshalServers(servers, version)
} | go | func (s *APIServer) getAuthServers(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
servers, err := auth.GetAuthServers()
if err != nil {
return nil, trace.Wrap(err)
}
return marshalServers(servers, version)
} | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getAuthServers",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
"... | // getAuthServers returns registered auth servers | [
"getAuthServers",
"returns",
"registered",
"auth",
"servers"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L466-L472 | train |
gravitational/teleport | lib/auth/apiserver.go | upsertReverseTunnel | func (s *APIServer) upsertReverseTunnel(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertReverseTunnelRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
tun, err := services.GetReverseTunnelMarshaler... | go | func (s *APIServer) upsertReverseTunnel(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertReverseTunnelRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
tun, err := services.GetReverseTunnelMarshaler... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"upsertReverseTunnel",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface"... | // upsertReverseTunnel is called by admin to create a reverse tunnel to remote proxy | [
"upsertReverseTunnel",
"is",
"called",
"by",
"admin",
"to",
"create",
"a",
"reverse",
"tunnel",
"to",
"remote",
"proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L492-L508 | train |
gravitational/teleport | lib/auth/apiserver.go | getReverseTunnels | func (s *APIServer) getReverseTunnels(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
reverseTunnels, err := auth.GetReverseTunnels()
if err != nil {
return nil, trace.Wrap(err)
}
items := make([]json.RawMessage, len(reverseTunnels))
for i, tunnel... | go | func (s *APIServer) getReverseTunnels(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
reverseTunnels, err := auth.GetReverseTunnels()
if err != nil {
return nil, trace.Wrap(err)
}
items := make([]json.RawMessage, len(reverseTunnels))
for i, tunnel... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getReverseTunnels",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
... | // getReverseTunnels returns a list of reverse tunnels | [
"getReverseTunnels",
"returns",
"a",
"list",
"of",
"reverse",
"tunnels"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L511-L525 | train |
gravitational/teleport | lib/auth/apiserver.go | deleteReverseTunnel | func (s *APIServer) deleteReverseTunnel(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
domainName := p.ByName("domain")
err := auth.DeleteReverseTunnel(domainName)
if err != nil {
return nil, trace.Wrap(err)
}
return message(fmt.Sprintf("reverse ... | go | func (s *APIServer) deleteReverseTunnel(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
domainName := p.ByName("domain")
err := auth.DeleteReverseTunnel(domainName)
if err != nil {
return nil, trace.Wrap(err)
}
return message(fmt.Sprintf("reverse ... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"deleteReverseTunnel",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface"... | // deleteReverseTunnel deletes reverse tunnel | [
"deleteReverseTunnel",
"deletes",
"reverse",
"tunnel"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L528-L535 | train |
gravitational/teleport | lib/auth/apiserver.go | getClusterCACert | func (s *APIServer) getClusterCACert(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
localCA, err := auth.GetClusterCACert()
if err != nil {
return nil, trace.Wrap(err)
}
return localCA, nil
} | go | func (s *APIServer) getClusterCACert(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
localCA, err := auth.GetClusterCACert()
if err != nil {
return nil, trace.Wrap(err)
}
return localCA, nil
} | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getClusterCACert",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
... | // getClusterCACert returns the CAs for the local cluster without signing keys. | [
"getClusterCACert",
"returns",
"the",
"CAs",
"for",
"the",
"local",
"cluster",
"without",
"signing",
"keys",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L1075-L1082 | train |
gravitational/teleport | lib/auth/apiserver.go | getU2FAppID | func (s *APIServer) getU2FAppID(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
cap, err := auth.GetAuthPreference()
if err != nil {
return nil, trace.Wrap(err)
}
universalSecondFactor, err := cap.GetU2F()
if err != nil {
return nil, trace.Wrap... | go | func (s *APIServer) getU2FAppID(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
cap, err := auth.GetAuthPreference()
if err != nil {
return nil, trace.Wrap(err)
}
universalSecondFactor, err := cap.GetU2F()
if err != nil {
return nil, trace.Wrap... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getU2FAppID",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
"{",... | // getU2FAppID returns the U2F AppID in the auth configuration | [
"getU2FAppID",
"returns",
"the",
"U2F",
"AppID",
"in",
"the",
"auth",
"configuration"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L1085-L1098 | train |
gravitational/teleport | lib/auth/apiserver.go | getSignupTokenData | func (s *APIServer) getSignupTokenData(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
token := p.ByName("token")
user, otpQRCode, err := auth.GetSignupTokenData(token)
if err != nil {
return nil, trace.Wrap(err)
}
return &getSignupTokenDataResp... | go | func (s *APIServer) getSignupTokenData(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
token := p.ByName("token")
user, otpQRCode, err := auth.GetSignupTokenData(token)
if err != nil {
return nil, trace.Wrap(err)
}
return &getSignupTokenDataResp... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getSignupTokenData",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",... | // getSignupTokenData returns the signup data for a token. | [
"getSignupTokenData",
"returns",
"the",
"signup",
"data",
"for",
"a",
"token",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L1185-L1197 | train |
gravitational/teleport | lib/auth/apiserver.go | upsertTunnelConnection | func (s *APIServer) upsertTunnelConnection(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertTunnelConnectionRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
conn, err := services.UnmarshalTunnelCon... | go | func (s *APIServer) upsertTunnelConnection(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req upsertTunnelConnectionRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
conn, err := services.UnmarshalTunnelCon... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"upsertTunnelConnection",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interfa... | // upsertTunnelConnection updates or inserts tunnel connection | [
"upsertTunnelConnection",
"updates",
"or",
"inserts",
"tunnel",
"connection"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L2259-L2272 | train |
gravitational/teleport | lib/auth/apiserver.go | getTunnelConnections | func (s *APIServer) getTunnelConnections(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
conns, err := auth.GetTunnelConnections(p.ByName("cluster"))
if err != nil {
return nil, trace.Wrap(err)
}
items := make([]json.RawMessage, len(conns))
for i,... | go | func (s *APIServer) getTunnelConnections(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
conns, err := auth.GetTunnelConnections(p.ByName("cluster"))
if err != nil {
return nil, trace.Wrap(err)
}
items := make([]json.RawMessage, len(conns))
for i,... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getTunnelConnections",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface... | // getTunnelConnections returns a list of tunnel connections from a cluster | [
"getTunnelConnections",
"returns",
"a",
"list",
"of",
"tunnel",
"connections",
"from",
"a",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L2275-L2289 | train |
gravitational/teleport | lib/auth/apiserver.go | createRemoteCluster | func (s *APIServer) createRemoteCluster(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req createRemoteClusterRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
conn, err := services.UnmarshalRemoteCluster(r... | go | func (s *APIServer) createRemoteCluster(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
var req createRemoteClusterRawReq
if err := httplib.ReadJSON(r, &req); err != nil {
return nil, trace.Wrap(err)
}
conn, err := services.UnmarshalRemoteCluster(r... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"createRemoteCluster",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface"... | // createRemoteCluster creates remote cluster | [
"createRemoteCluster",
"creates",
"remote",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L2341-L2354 | train |
gravitational/teleport | lib/auth/apiserver.go | getRemoteClusters | func (s *APIServer) getRemoteClusters(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
clusters, err := auth.GetRemoteClusters()
if err != nil {
return nil, trace.Wrap(err)
}
items := make([]json.RawMessage, len(clusters))
for i, cluster := range c... | go | func (s *APIServer) getRemoteClusters(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
clusters, err := auth.GetRemoteClusters()
if err != nil {
return nil, trace.Wrap(err)
}
items := make([]json.RawMessage, len(clusters))
for i, cluster := range c... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getRemoteClusters",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
... | // getRemoteClusters returns a list of remote clusters | [
"getRemoteClusters",
"returns",
"a",
"list",
"of",
"remote",
"clusters"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L2357-L2371 | train |
gravitational/teleport | lib/auth/apiserver.go | getRemoteCluster | func (s *APIServer) getRemoteCluster(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
cluster, err := auth.GetRemoteCluster(p.ByName("cluster"))
if err != nil {
return nil, trace.Wrap(err)
}
return rawMessage(services.MarshalRemoteCluster(cluster, s... | go | func (s *APIServer) getRemoteCluster(auth ClientI, w http.ResponseWriter, r *http.Request, p httprouter.Params, version string) (interface{}, error) {
cluster, err := auth.GetRemoteCluster(p.ByName("cluster"))
if err != nil {
return nil, trace.Wrap(err)
}
return rawMessage(services.MarshalRemoteCluster(cluster, s... | [
"func",
"(",
"s",
"*",
"APIServer",
")",
"getRemoteCluster",
"(",
"auth",
"ClientI",
",",
"w",
"http",
".",
"ResponseWriter",
",",
"r",
"*",
"http",
".",
"Request",
",",
"p",
"httprouter",
".",
"Params",
",",
"version",
"string",
")",
"(",
"interface",
... | // getRemoteCluster returns a remote cluster by name | [
"getRemoteCluster",
"returns",
"a",
"remote",
"cluster",
"by",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/apiserver.go#L2374-L2380 | train |
gravitational/teleport | lib/auth/saml.go | buildSAMLRoles | func (a *AuthServer) buildSAMLRoles(connector services.SAMLConnector, assertionInfo saml2.AssertionInfo) ([]string, error) {
roles := connector.MapAttributes(assertionInfo)
if len(roles) == 0 {
return nil, trace.AccessDenied("unable to map attributes to role for connector: %v", connector.GetName())
}
return role... | go | func (a *AuthServer) buildSAMLRoles(connector services.SAMLConnector, assertionInfo saml2.AssertionInfo) ([]string, error) {
roles := connector.MapAttributes(assertionInfo)
if len(roles) == 0 {
return nil, trace.AccessDenied("unable to map attributes to role for connector: %v", connector.GetName())
}
return role... | [
"func",
"(",
"a",
"*",
"AuthServer",
")",
"buildSAMLRoles",
"(",
"connector",
"services",
".",
"SAMLConnector",
",",
"assertionInfo",
"saml2",
".",
"AssertionInfo",
")",
"(",
"[",
"]",
"string",
",",
"error",
")",
"{",
"roles",
":=",
"connector",
".",
"Map... | // buildSAMLRoles takes a connector and claims and returns a slice of roles. | [
"buildSAMLRoles",
"takes",
"a",
"connector",
"and",
"claims",
"and",
"returns",
"a",
"slice",
"of",
"roles",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/saml.go#L98-L105 | train |
gravitational/teleport | lib/auth/saml.go | assertionsToTraitMap | func assertionsToTraitMap(assertionInfo saml2.AssertionInfo) map[string][]string {
traits := make(map[string][]string)
for _, assr := range assertionInfo.Values {
var vals []string
for _, value := range assr.Values {
vals = append(vals, value.Value)
}
traits[assr.Name] = vals
}
return traits
} | go | func assertionsToTraitMap(assertionInfo saml2.AssertionInfo) map[string][]string {
traits := make(map[string][]string)
for _, assr := range assertionInfo.Values {
var vals []string
for _, value := range assr.Values {
vals = append(vals, value.Value)
}
traits[assr.Name] = vals
}
return traits
} | [
"func",
"assertionsToTraitMap",
"(",
"assertionInfo",
"saml2",
".",
"AssertionInfo",
")",
"map",
"[",
"string",
"]",
"[",
"]",
"string",
"{",
"traits",
":=",
"make",
"(",
"map",
"[",
"string",
"]",
"[",
"]",
"string",
")",
"\n\n",
"for",
"_",
",",
"ass... | // assertionsToTraitMap extracts all string assertions and creates a map of traits
// that can be used to populate role variables. | [
"assertionsToTraitMap",
"extracts",
"all",
"string",
"assertions",
"and",
"creates",
"a",
"map",
"of",
"traits",
"that",
"can",
"be",
"used",
"to",
"populate",
"role",
"variables",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/saml.go#L109-L121 | train |
gravitational/teleport | lib/auth/saml.go | ValidateSAMLResponse | func (a *AuthServer) ValidateSAMLResponse(samlResponse string) (*SAMLAuthResponse, error) {
re, err := a.validateSAMLResponse(samlResponse)
if err != nil {
a.EmitAuditEvent(events.UserSSOLoginFailure, events.EventFields{
events.LoginMethod: events.LoginMethodSAML,
events.AuthAttemptSuccess: false,
e... | go | func (a *AuthServer) ValidateSAMLResponse(samlResponse string) (*SAMLAuthResponse, error) {
re, err := a.validateSAMLResponse(samlResponse)
if err != nil {
a.EmitAuditEvent(events.UserSSOLoginFailure, events.EventFields{
events.LoginMethod: events.LoginMethodSAML,
events.AuthAttemptSuccess: false,
e... | [
"func",
"(",
"a",
"*",
"AuthServer",
")",
"ValidateSAMLResponse",
"(",
"samlResponse",
"string",
")",
"(",
"*",
"SAMLAuthResponse",
",",
"error",
")",
"{",
"re",
",",
"err",
":=",
"a",
".",
"validateSAMLResponse",
"(",
"samlResponse",
")",
"\n",
"if",
"err... | // ValidateSAMLResponse consumes attribute statements from SAML identity provider | [
"ValidateSAMLResponse",
"consumes",
"attribute",
"statements",
"from",
"SAML",
"identity",
"provider"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/auth/saml.go#L278-L294 | train |
gravitational/teleport | lib/cache/cache.go | ForAuth | func ForAuth(cfg Config) Config {
cfg.Watches = []services.WatchKind{
{Kind: services.KindCertAuthority, LoadSecrets: true},
{Kind: services.KindClusterName},
{Kind: services.KindClusterConfig},
{Kind: services.KindStaticTokens},
{Kind: services.KindToken},
{Kind: services.KindUser},
{Kind: services.Kind... | go | func ForAuth(cfg Config) Config {
cfg.Watches = []services.WatchKind{
{Kind: services.KindCertAuthority, LoadSecrets: true},
{Kind: services.KindClusterName},
{Kind: services.KindClusterConfig},
{Kind: services.KindStaticTokens},
{Kind: services.KindToken},
{Kind: services.KindUser},
{Kind: services.Kind... | [
"func",
"ForAuth",
"(",
"cfg",
"Config",
")",
"Config",
"{",
"cfg",
".",
"Watches",
"=",
"[",
"]",
"services",
".",
"WatchKind",
"{",
"{",
"Kind",
":",
"services",
".",
"KindCertAuthority",
",",
"LoadSecrets",
":",
"true",
"}",
",",
"{",
"Kind",
":",
... | // ForAuth sets up watch configuration for the auth server | [
"ForAuth",
"sets",
"up",
"watch",
"configuration",
"for",
"the",
"auth",
"server"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L37-L54 | train |
gravitational/teleport | lib/cache/cache.go | ForProxy | func ForProxy(cfg Config) Config {
cfg.Watches = []services.WatchKind{
{Kind: services.KindCertAuthority, LoadSecrets: false},
{Kind: services.KindClusterName},
{Kind: services.KindClusterConfig},
{Kind: services.KindUser},
{Kind: services.KindRole},
{Kind: services.KindNamespace},
{Kind: services.KindNo... | go | func ForProxy(cfg Config) Config {
cfg.Watches = []services.WatchKind{
{Kind: services.KindCertAuthority, LoadSecrets: false},
{Kind: services.KindClusterName},
{Kind: services.KindClusterConfig},
{Kind: services.KindUser},
{Kind: services.KindRole},
{Kind: services.KindNamespace},
{Kind: services.KindNo... | [
"func",
"ForProxy",
"(",
"cfg",
"Config",
")",
"Config",
"{",
"cfg",
".",
"Watches",
"=",
"[",
"]",
"services",
".",
"WatchKind",
"{",
"{",
"Kind",
":",
"services",
".",
"KindCertAuthority",
",",
"LoadSecrets",
":",
"false",
"}",
",",
"{",
"Kind",
":",... | // ForProxy sets up watch configuration for proxy | [
"ForProxy",
"sets",
"up",
"watch",
"configuration",
"for",
"proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L57-L73 | train |
gravitational/teleport | lib/cache/cache.go | ForNode | func ForNode(cfg Config) Config {
cfg.Watches = []services.WatchKind{
{Kind: services.KindCertAuthority, LoadSecrets: false},
{Kind: services.KindClusterName},
{Kind: services.KindClusterConfig},
{Kind: services.KindUser},
{Kind: services.KindRole},
// Node only needs to "know" about default
// namespace... | go | func ForNode(cfg Config) Config {
cfg.Watches = []services.WatchKind{
{Kind: services.KindCertAuthority, LoadSecrets: false},
{Kind: services.KindClusterName},
{Kind: services.KindClusterConfig},
{Kind: services.KindUser},
{Kind: services.KindRole},
// Node only needs to "know" about default
// namespace... | [
"func",
"ForNode",
"(",
"cfg",
"Config",
")",
"Config",
"{",
"cfg",
".",
"Watches",
"=",
"[",
"]",
"services",
".",
"WatchKind",
"{",
"{",
"Kind",
":",
"services",
".",
"KindCertAuthority",
",",
"LoadSecrets",
":",
"false",
"}",
",",
"{",
"Kind",
":",
... | // ForNode sets up watch configuration for node | [
"ForNode",
"sets",
"up",
"watch",
"configuration",
"for",
"node"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L76-L90 | train |
gravitational/teleport | lib/cache/cache.go | New | func New(config Config) (*Cache, error) {
if err := config.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
wrapper := backend.NewWrapper(config.Backend)
ctx, cancel := context.WithCancel(config.Context)
cs := &Cache{
wrapper: wrapper,
ctx: ctx,
cancel: ... | go | func New(config Config) (*Cache, error) {
if err := config.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
wrapper := backend.NewWrapper(config.Backend)
ctx, cancel := context.WithCancel(config.Context)
cs := &Cache{
wrapper: wrapper,
ctx: ctx,
cancel: ... | [
"func",
"New",
"(",
"config",
"Config",
")",
"(",
"*",
"Cache",
",",
"error",
")",
"{",
"if",
"err",
":=",
"config",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"nil",
",",
"trace",
".",
"Wrap",
"(",
"err",
")",
... | // New creates a new instance of Cache | [
"New",
"creates",
"a",
"new",
"instance",
"of",
"Cache"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L261-L300 | train |
gravitational/teleport | lib/cache/cache.go | NewWatcher | func (c *Cache) NewWatcher(ctx context.Context, watch services.Watch) (services.Watcher, error) {
return c.eventsCache.NewWatcher(ctx, watch)
} | go | func (c *Cache) NewWatcher(ctx context.Context, watch services.Watch) (services.Watcher, error) {
return c.eventsCache.NewWatcher(ctx, watch)
} | [
"func",
"(",
"c",
"*",
"Cache",
")",
"NewWatcher",
"(",
"ctx",
"context",
".",
"Context",
",",
"watch",
"services",
".",
"Watch",
")",
"(",
"services",
".",
"Watcher",
",",
"error",
")",
"{",
"return",
"c",
".",
"eventsCache",
".",
"NewWatcher",
"(",
... | // NewWatcher returns a new event watcher. In case of a cache
// this watcher will return events as seen by the cache,
// not the backend. This feature allows auth server
// to handle subscribers connected to the in-memory caches
// instead of reading from the backend. | [
"NewWatcher",
"returns",
"a",
"new",
"event",
"watcher",
".",
"In",
"case",
"of",
"a",
"cache",
"this",
"watcher",
"will",
"return",
"events",
"as",
"seen",
"by",
"the",
"cache",
"not",
"the",
"backend",
".",
"This",
"feature",
"allows",
"auth",
"server",
... | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L307-L309 | train |
gravitational/teleport | lib/cache/cache.go | setCacheState | func (c *Cache) setCacheState(err error) error {
if !c.OnlyRecent.Enabled {
return err
}
if err := c.eraseAll(); err != nil {
if !c.isClosed() {
c.Warningf("Failed to erase the data: %v.", err)
}
}
c.wrapper.SetReadError(trace.ConnectionProblem(err, "cache is unavailable"))
return err
} | go | func (c *Cache) setCacheState(err error) error {
if !c.OnlyRecent.Enabled {
return err
}
if err := c.eraseAll(); err != nil {
if !c.isClosed() {
c.Warningf("Failed to erase the data: %v.", err)
}
}
c.wrapper.SetReadError(trace.ConnectionProblem(err, "cache is unavailable"))
return err
} | [
"func",
"(",
"c",
"*",
"Cache",
")",
"setCacheState",
"(",
"err",
"error",
")",
"error",
"{",
"if",
"!",
"c",
".",
"OnlyRecent",
".",
"Enabled",
"{",
"return",
"err",
"\n",
"}",
"\n",
"if",
"err",
":=",
"c",
".",
"eraseAll",
"(",
")",
";",
"err",... | // setCacheState for "only recent" cache behavior will erase
// the cache and set error mode to refuse to serve stale data,
// otherwise does nothing | [
"setCacheState",
"for",
"only",
"recent",
"cache",
"behavior",
"will",
"erase",
"the",
"cache",
"and",
"set",
"error",
"mode",
"to",
"refuse",
"to",
"serve",
"stale",
"data",
"otherwise",
"does",
"nothing"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L358-L369 | train |
gravitational/teleport | lib/cache/cache.go | eraseAll | func (c *Cache) eraseAll() error {
var errors []error
for _, collection := range c.collections {
errors = append(errors, collection.erase())
}
return trace.NewAggregate(errors...)
} | go | func (c *Cache) eraseAll() error {
var errors []error
for _, collection := range c.collections {
errors = append(errors, collection.erase())
}
return trace.NewAggregate(errors...)
} | [
"func",
"(",
"c",
"*",
"Cache",
")",
"eraseAll",
"(",
")",
"error",
"{",
"var",
"errors",
"[",
"]",
"error",
"\n",
"for",
"_",
",",
"collection",
":=",
"range",
"c",
".",
"collections",
"{",
"errors",
"=",
"append",
"(",
"errors",
",",
"collection",
... | // eraseAll erases all the data from cache collections | [
"eraseAll",
"erases",
"all",
"the",
"data",
"from",
"cache",
"collections"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/cache/cache.go#L501-L507 | train |
gravitational/teleport | lib/reversetunnel/localsite.go | findMatchingConn | func (s *localSite) findMatchingConn(principals []string) (*remoteConn, bool) {
for _, principal := range principals {
rconn, err := s.getConn(principal)
if err == nil {
return rconn, true
}
}
return nil, false
} | go | func (s *localSite) findMatchingConn(principals []string) (*remoteConn, bool) {
for _, principal := range principals {
rconn, err := s.getConn(principal)
if err == nil {
return rconn, true
}
}
return nil, false
} | [
"func",
"(",
"s",
"*",
"localSite",
")",
"findMatchingConn",
"(",
"principals",
"[",
"]",
"string",
")",
"(",
"*",
"remoteConn",
",",
"bool",
")",
"{",
"for",
"_",
",",
"principal",
":=",
"range",
"principals",
"{",
"rconn",
",",
"err",
":=",
"s",
".... | // findMatchingConn iterates over passed in principals looking for matching
// remote connections. | [
"findMatchingConn",
"iterates",
"over",
"passed",
"in",
"principals",
"looking",
"for",
"matching",
"remote",
"connections",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/reversetunnel/localsite.go#L244-L252 | train |
gravitational/teleport | examples/go-client/main.go | setupClientTLS | func setupClientTLS() (*tls.Config, error) {
storage, err := auth.NewProcessStorage(filepath.Join("/var/lib/teleport", teleport.ComponentProcess))
if err != nil {
return nil, trace.Wrap(err)
}
defer storage.Close()
identity, err := storage.ReadIdentity(auth.IdentityCurrent, teleport.RoleAdmin)
if err != nil {
... | go | func setupClientTLS() (*tls.Config, error) {
storage, err := auth.NewProcessStorage(filepath.Join("/var/lib/teleport", teleport.ComponentProcess))
if err != nil {
return nil, trace.Wrap(err)
}
defer storage.Close()
identity, err := storage.ReadIdentity(auth.IdentityCurrent, teleport.RoleAdmin)
if err != nil {
... | [
"func",
"setupClientTLS",
"(",
")",
"(",
"*",
"tls",
".",
"Config",
",",
"error",
")",
"{",
"storage",
",",
"err",
":=",
"auth",
".",
"NewProcessStorage",
"(",
"filepath",
".",
"Join",
"(",
"\"",
"\"",
",",
"teleport",
".",
"ComponentProcess",
")",
")"... | // setupClientTLS sets up client TLS authentiction between TLS client
// and Teleport Auth server. This function uses hardcoded certificate paths,
// assuming program runs alongside auth server, but it can be ran
// on a remote location, assuming client has all the client certificates. | [
"setupClientTLS",
"sets",
"up",
"client",
"TLS",
"authentiction",
"between",
"TLS",
"client",
"and",
"Teleport",
"Auth",
"server",
".",
"This",
"function",
"uses",
"hardcoded",
"certificate",
"paths",
"assuming",
"program",
"runs",
"alongside",
"auth",
"server",
"... | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/examples/go-client/main.go#L64-L77 | train |
gravitational/teleport | lib/services/local/presence.go | NewPresenceService | func NewPresenceService(b backend.Backend) *PresenceService {
return &PresenceService{
log: logrus.WithFields(logrus.Fields{trace.Component: "Presence"}),
Backend: b,
}
} | go | func NewPresenceService(b backend.Backend) *PresenceService {
return &PresenceService{
log: logrus.WithFields(logrus.Fields{trace.Component: "Presence"}),
Backend: b,
}
} | [
"func",
"NewPresenceService",
"(",
"b",
"backend",
".",
"Backend",
")",
"*",
"PresenceService",
"{",
"return",
"&",
"PresenceService",
"{",
"log",
":",
"logrus",
".",
"WithFields",
"(",
"logrus",
".",
"Fields",
"{",
"trace",
".",
"Component",
":",
"\"",
"\... | // NewPresenceService returns new presence service instance | [
"NewPresenceService",
"returns",
"new",
"presence",
"service",
"instance"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L41-L46 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertLocalClusterName | func (s *PresenceService) UpsertLocalClusterName(name string) error {
_, err := s.Put(context.TODO(), backend.Item{
Key: backend.Key(localClusterPrefix, valPrefix),
Value: []byte(name),
})
return trace.Wrap(err)
} | go | func (s *PresenceService) UpsertLocalClusterName(name string) error {
_, err := s.Put(context.TODO(), backend.Item{
Key: backend.Key(localClusterPrefix, valPrefix),
Value: []byte(name),
})
return trace.Wrap(err)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertLocalClusterName",
"(",
"name",
"string",
")",
"error",
"{",
"_",
",",
"err",
":=",
"s",
".",
"Put",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Item",
"{",
"Key",
":",
"backend",... | // UpsertLocalClusterName upserts local cluster name | [
"UpsertLocalClusterName",
"upserts",
"local",
"cluster",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L53-L59 | train |
gravitational/teleport | lib/services/local/presence.go | GetLocalClusterName | func (s *PresenceService) GetLocalClusterName() (string, error) {
item, err := s.Get(context.TODO(), backend.Key(localClusterPrefix, valPrefix))
if err != nil {
return "", trace.Wrap(err)
}
return string(item.Value), nil
} | go | func (s *PresenceService) GetLocalClusterName() (string, error) {
item, err := s.Get(context.TODO(), backend.Key(localClusterPrefix, valPrefix))
if err != nil {
return "", trace.Wrap(err)
}
return string(item.Value), nil
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetLocalClusterName",
"(",
")",
"(",
"string",
",",
"error",
")",
"{",
"item",
",",
"err",
":=",
"s",
".",
"Get",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"localClusterPre... | // GetLocalClusterName upserts local domain | [
"GetLocalClusterName",
"upserts",
"local",
"domain"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L62-L68 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteAllNamespaces | func (s *PresenceService) DeleteAllNamespaces() error {
return s.DeleteRange(context.TODO(), backend.Key(namespacesPrefix), backend.RangeEnd(backend.Key(namespacesPrefix)))
} | go | func (s *PresenceService) DeleteAllNamespaces() error {
return s.DeleteRange(context.TODO(), backend.Key(namespacesPrefix), backend.RangeEnd(backend.Key(namespacesPrefix)))
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteAllNamespaces",
"(",
")",
"error",
"{",
"return",
"s",
".",
"DeleteRange",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"namespacesPrefix",
")",
",",
"backend",
".",
"RangeE... | // DeleteAllNamespaces deletes all namespaces | [
"DeleteAllNamespaces",
"deletes",
"all",
"namespaces"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L71-L73 | train |
gravitational/teleport | lib/services/local/presence.go | GetNamespace | func (s *PresenceService) GetNamespace(name string) (*services.Namespace, error) {
if name == "" {
return nil, trace.BadParameter("missing namespace name")
}
item, err := s.Get(context.TODO(), backend.Key(namespacesPrefix, name, paramsPrefix))
if err != nil {
if trace.IsNotFound(err) {
return nil, trace.NotF... | go | func (s *PresenceService) GetNamespace(name string) (*services.Namespace, error) {
if name == "" {
return nil, trace.BadParameter("missing namespace name")
}
item, err := s.Get(context.TODO(), backend.Key(namespacesPrefix, name, paramsPrefix))
if err != nil {
if trace.IsNotFound(err) {
return nil, trace.NotF... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetNamespace",
"(",
"name",
"string",
")",
"(",
"*",
"services",
".",
"Namespace",
",",
"error",
")",
"{",
"if",
"name",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
"... | // GetNamespace returns a namespace by name | [
"GetNamespace",
"returns",
"a",
"namespace",
"by",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L121-L134 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteNamespace | func (s *PresenceService) DeleteNamespace(namespace string) error {
if namespace == "" {
return trace.BadParameter("missing namespace name")
}
err := s.Delete(context.TODO(), backend.Key(namespacesPrefix, namespace, paramsPrefix))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("namespace %q... | go | func (s *PresenceService) DeleteNamespace(namespace string) error {
if namespace == "" {
return trace.BadParameter("missing namespace name")
}
err := s.Delete(context.TODO(), backend.Key(namespacesPrefix, namespace, paramsPrefix))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("namespace %q... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteNamespace",
"(",
"namespace",
"string",
")",
"error",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"err",
":=",
"s",
... | // DeleteNamespace deletes a namespace with all the keys from the backend | [
"DeleteNamespace",
"deletes",
"a",
"namespace",
"with",
"all",
"the",
"keys",
"from",
"the",
"backend"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L137-L148 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteAllNodes | func (s *PresenceService) DeleteAllNodes(namespace string) error {
startKey := backend.Key(nodesPrefix, namespace)
return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
} | go | func (s *PresenceService) DeleteAllNodes(namespace string) error {
startKey := backend.Key(nodesPrefix, namespace)
return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteAllNodes",
"(",
"namespace",
"string",
")",
"error",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"nodesPrefix",
",",
"namespace",
")",
"\n",
"return",
"s",
".",
"DeleteRange",
"(",
"context",
"."... | // DeleteAllNodes deletes all nodes in a namespace | [
"DeleteAllNodes",
"deletes",
"all",
"nodes",
"in",
"a",
"namespace"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L188-L191 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteNode | func (s *PresenceService) DeleteNode(namespace string, name string) error {
key := backend.Key(nodesPrefix, namespace, name)
return s.Delete(context.TODO(), key)
} | go | func (s *PresenceService) DeleteNode(namespace string, name string) error {
key := backend.Key(nodesPrefix, namespace, name)
return s.Delete(context.TODO(), key)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteNode",
"(",
"namespace",
"string",
",",
"name",
"string",
")",
"error",
"{",
"key",
":=",
"backend",
".",
"Key",
"(",
"nodesPrefix",
",",
"namespace",
",",
"name",
")",
"\n",
"return",
"s",
".",
"De... | // DeleteNode deletes node | [
"DeleteNode",
"deletes",
"node"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L194-L197 | train |
gravitational/teleport | lib/services/local/presence.go | GetNodes | func (s *PresenceService) GetNodes(namespace string, opts ...services.MarshalOption) ([]services.Server, error) {
if namespace == "" {
return nil, trace.BadParameter("missing namespace value")
}
// Get all items in the bucket.
startKey := backend.Key(nodesPrefix, namespace)
result, err := s.GetRange(context.TOD... | go | func (s *PresenceService) GetNodes(namespace string, opts ...services.MarshalOption) ([]services.Server, error) {
if namespace == "" {
return nil, trace.BadParameter("missing namespace value")
}
// Get all items in the bucket.
startKey := backend.Key(nodesPrefix, namespace)
result, err := s.GetRange(context.TOD... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetNodes",
"(",
"namespace",
"string",
",",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"error",
")",
"{",
"if",
"namespace",
"==",
"\"",
"\"",
"{"... | // GetNodes returns a list of registered servers | [
"GetNodes",
"returns",
"a",
"list",
"of",
"registered",
"servers"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L200-L227 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertNode | func (s *PresenceService) UpsertNode(server services.Server) (*services.KeepAlive, error) {
if server.GetNamespace() == "" {
return nil, trace.BadParameter("missing node namespace")
}
value, err := services.GetServerMarshaler().MarshalServer(server)
if err != nil {
return nil, trace.Wrap(err)
}
lease, err := ... | go | func (s *PresenceService) UpsertNode(server services.Server) (*services.KeepAlive, error) {
if server.GetNamespace() == "" {
return nil, trace.BadParameter("missing node namespace")
}
value, err := services.GetServerMarshaler().MarshalServer(server)
if err != nil {
return nil, trace.Wrap(err)
}
lease, err := ... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertNode",
"(",
"server",
"services",
".",
"Server",
")",
"(",
"*",
"services",
".",
"KeepAlive",
",",
"error",
")",
"{",
"if",
"server",
".",
"GetNamespace",
"(",
")",
"==",
"\"",
"\"",
"{",
"return",
... | // UpsertNode registers node presence, permanently if TTL is 0 or for the
// specified duration with second resolution if it's >= 1 second. | [
"UpsertNode",
"registers",
"node",
"presence",
"permanently",
"if",
"TTL",
"is",
"0",
"or",
"for",
"the",
"specified",
"duration",
"with",
"second",
"resolution",
"if",
"it",
"s",
">",
"=",
"1",
"second",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L231-L252 | train |
gravitational/teleport | lib/services/local/presence.go | KeepAliveNode | func (s *PresenceService) KeepAliveNode(ctx context.Context, h services.KeepAlive) error {
if err := h.CheckAndSetDefaults(); err != nil {
return trace.Wrap(err)
}
err := s.KeepAlive(ctx, backend.Lease{
ID: h.LeaseID,
Key: backend.Key(nodesPrefix, h.Namespace, h.ServerName),
}, h.Expires)
return trace.Wrap(... | go | func (s *PresenceService) KeepAliveNode(ctx context.Context, h services.KeepAlive) error {
if err := h.CheckAndSetDefaults(); err != nil {
return trace.Wrap(err)
}
err := s.KeepAlive(ctx, backend.Lease{
ID: h.LeaseID,
Key: backend.Key(nodesPrefix, h.Namespace, h.ServerName),
}, h.Expires)
return trace.Wrap(... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"KeepAliveNode",
"(",
"ctx",
"context",
".",
"Context",
",",
"h",
"services",
".",
"KeepAlive",
")",
"error",
"{",
"if",
"err",
":=",
"h",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{"... | // KeepAliveNode updates node expiry | [
"KeepAliveNode",
"updates",
"node",
"expiry"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L255-L264 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertNodes | func (s *PresenceService) UpsertNodes(namespace string, servers []services.Server) error {
batch, ok := s.Backend.(backend.Batch)
if !ok {
return trace.BadParameter("backend does not support batch interface")
}
if namespace == "" {
return trace.BadParameter("missing node namespace")
}
start := time.Now()
i... | go | func (s *PresenceService) UpsertNodes(namespace string, servers []services.Server) error {
batch, ok := s.Backend.(backend.Batch)
if !ok {
return trace.BadParameter("backend does not support batch interface")
}
if namespace == "" {
return trace.BadParameter("missing node namespace")
}
start := time.Now()
i... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertNodes",
"(",
"namespace",
"string",
",",
"servers",
"[",
"]",
"services",
".",
"Server",
")",
"error",
"{",
"batch",
",",
"ok",
":=",
"s",
".",
"Backend",
".",
"(",
"backend",
".",
"Batch",
")",
"... | // UpsertNodes is used for bulk insertion of nodes. Schema validation is
// always skipped during bulk insertion. | [
"UpsertNodes",
"is",
"used",
"for",
"bulk",
"insertion",
"of",
"nodes",
".",
"Schema",
"validation",
"is",
"always",
"skipped",
"during",
"bulk",
"insertion",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L268-L302 | train |
gravitational/teleport | lib/services/local/presence.go | GetAuthServers | func (s *PresenceService) GetAuthServers() ([]services.Server, error) {
return s.getServers(services.KindAuthServer, authServersPrefix)
} | go | func (s *PresenceService) GetAuthServers() ([]services.Server, error) {
return s.getServers(services.KindAuthServer, authServersPrefix)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetAuthServers",
"(",
")",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"error",
")",
"{",
"return",
"s",
".",
"getServers",
"(",
"services",
".",
"KindAuthServer",
",",
"authServersPrefix",
")",
"\n",
"}... | // GetAuthServers returns a list of registered servers | [
"GetAuthServers",
"returns",
"a",
"list",
"of",
"registered",
"servers"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L305-L307 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertAuthServer | func (s *PresenceService) UpsertAuthServer(server services.Server) error {
return s.upsertServer(authServersPrefix, server)
} | go | func (s *PresenceService) UpsertAuthServer(server services.Server) error {
return s.upsertServer(authServersPrefix, server)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertAuthServer",
"(",
"server",
"services",
".",
"Server",
")",
"error",
"{",
"return",
"s",
".",
"upsertServer",
"(",
"authServersPrefix",
",",
"server",
")",
"\n",
"}"
] | // UpsertAuthServer registers auth server presence, permanently if ttl is 0 or
// for the specified duration with second resolution if it's >= 1 second | [
"UpsertAuthServer",
"registers",
"auth",
"server",
"presence",
"permanently",
"if",
"ttl",
"is",
"0",
"or",
"for",
"the",
"specified",
"duration",
"with",
"second",
"resolution",
"if",
"it",
"s",
">",
"=",
"1",
"second"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L311-L313 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertProxy | func (s *PresenceService) UpsertProxy(server services.Server) error {
return s.upsertServer(proxiesPrefix, server)
} | go | func (s *PresenceService) UpsertProxy(server services.Server) error {
return s.upsertServer(proxiesPrefix, server)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertProxy",
"(",
"server",
"services",
".",
"Server",
")",
"error",
"{",
"return",
"s",
".",
"upsertServer",
"(",
"proxiesPrefix",
",",
"server",
")",
"\n",
"}"
] | // UpsertProxy registers proxy server presence, permanently if ttl is 0 or
// for the specified duration with second resolution if it's >= 1 second | [
"UpsertProxy",
"registers",
"proxy",
"server",
"presence",
"permanently",
"if",
"ttl",
"is",
"0",
"or",
"for",
"the",
"specified",
"duration",
"with",
"second",
"resolution",
"if",
"it",
"s",
">",
"=",
"1",
"second"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L329-L331 | train |
gravitational/teleport | lib/services/local/presence.go | GetProxies | func (s *PresenceService) GetProxies() ([]services.Server, error) {
return s.getServers(services.KindProxy, proxiesPrefix)
} | go | func (s *PresenceService) GetProxies() ([]services.Server, error) {
return s.getServers(services.KindProxy, proxiesPrefix)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetProxies",
"(",
")",
"(",
"[",
"]",
"services",
".",
"Server",
",",
"error",
")",
"{",
"return",
"s",
".",
"getServers",
"(",
"services",
".",
"KindProxy",
",",
"proxiesPrefix",
")",
"\n",
"}"
] | // GetProxies returns a list of registered proxies | [
"GetProxies",
"returns",
"a",
"list",
"of",
"registered",
"proxies"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L334-L336 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteProxy | func (s *PresenceService) DeleteProxy(name string) error {
key := backend.Key(proxiesPrefix, name)
return s.Delete(context.TODO(), key)
} | go | func (s *PresenceService) DeleteProxy(name string) error {
key := backend.Key(proxiesPrefix, name)
return s.Delete(context.TODO(), key)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteProxy",
"(",
"name",
"string",
")",
"error",
"{",
"key",
":=",
"backend",
".",
"Key",
"(",
"proxiesPrefix",
",",
"name",
")",
"\n",
"return",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
... | // DeleteProxy deletes proxy | [
"DeleteProxy",
"deletes",
"proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L345-L348 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteAllReverseTunnels | func (s *PresenceService) DeleteAllReverseTunnels() error {
startKey := backend.Key(reverseTunnelsPrefix)
return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
} | go | func (s *PresenceService) DeleteAllReverseTunnels() error {
startKey := backend.Key(reverseTunnelsPrefix)
return s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteAllReverseTunnels",
"(",
")",
"error",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"reverseTunnelsPrefix",
")",
"\n",
"return",
"s",
".",
"DeleteRange",
"(",
"context",
".",
"TODO",
"(",
")",
","... | // DeleteAllReverseTunnels deletes all reverse tunnels | [
"DeleteAllReverseTunnels",
"deletes",
"all",
"reverse",
"tunnels"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L351-L354 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertReverseTunnel | func (s *PresenceService) UpsertReverseTunnel(tunnel services.ReverseTunnel) error {
if err := tunnel.Check(); err != nil {
return trace.Wrap(err)
}
value, err := services.GetReverseTunnelMarshaler().MarshalReverseTunnel(tunnel)
if err != nil {
return trace.Wrap(err)
}
_, err = s.Put(context.TODO(), backend.I... | go | func (s *PresenceService) UpsertReverseTunnel(tunnel services.ReverseTunnel) error {
if err := tunnel.Check(); err != nil {
return trace.Wrap(err)
}
value, err := services.GetReverseTunnelMarshaler().MarshalReverseTunnel(tunnel)
if err != nil {
return trace.Wrap(err)
}
_, err = s.Put(context.TODO(), backend.I... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertReverseTunnel",
"(",
"tunnel",
"services",
".",
"ReverseTunnel",
")",
"error",
"{",
"if",
"err",
":=",
"tunnel",
".",
"Check",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
... | // UpsertReverseTunnel upserts reverse tunnel entry temporarily or permanently | [
"UpsertReverseTunnel",
"upserts",
"reverse",
"tunnel",
"entry",
"temporarily",
"or",
"permanently"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L357-L372 | train |
gravitational/teleport | lib/services/local/presence.go | GetReverseTunnels | func (s *PresenceService) GetReverseTunnels(opts ...services.MarshalOption) ([]services.ReverseTunnel, error) {
startKey := backend.Key(reverseTunnelsPrefix)
result, err := s.GetRange(context.TODO(), startKey, backend.RangeEnd(startKey), backend.NoLimit)
if err != nil {
return nil, trace.Wrap(err)
}
tunnels := m... | go | func (s *PresenceService) GetReverseTunnels(opts ...services.MarshalOption) ([]services.ReverseTunnel, error) {
startKey := backend.Key(reverseTunnelsPrefix)
result, err := s.GetRange(context.TODO(), startKey, backend.RangeEnd(startKey), backend.NoLimit)
if err != nil {
return nil, trace.Wrap(err)
}
tunnels := m... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetReverseTunnels",
"(",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"ReverseTunnel",
",",
"error",
")",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"reverseTu... | // GetReverseTunnels returns a list of registered servers | [
"GetReverseTunnels",
"returns",
"a",
"list",
"of",
"registered",
"servers"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L385-L403 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteReverseTunnel | func (s *PresenceService) DeleteReverseTunnel(clusterName string) error {
err := s.Delete(context.TODO(), backend.Key(reverseTunnelsPrefix, clusterName))
return trace.Wrap(err)
} | go | func (s *PresenceService) DeleteReverseTunnel(clusterName string) error {
err := s.Delete(context.TODO(), backend.Key(reverseTunnelsPrefix, clusterName))
return trace.Wrap(err)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteReverseTunnel",
"(",
"clusterName",
"string",
")",
"error",
"{",
"err",
":=",
"s",
".",
"Delete",
"(",
"context",
".",
"TODO",
"(",
")",
",",
"backend",
".",
"Key",
"(",
"reverseTunnelsPrefix",
",",
"... | // DeleteReverseTunnel deletes reverse tunnel by it's cluster name | [
"DeleteReverseTunnel",
"deletes",
"reverse",
"tunnel",
"by",
"it",
"s",
"cluster",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L406-L409 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertTrustedCluster | func (s *PresenceService) UpsertTrustedCluster(trustedCluster services.TrustedCluster) (services.TrustedCluster, error) {
if err := trustedCluster.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
value, err := services.GetTrustedClusterMarshaler().Marshal(trustedCluster)
if err != nil {
return ... | go | func (s *PresenceService) UpsertTrustedCluster(trustedCluster services.TrustedCluster) (services.TrustedCluster, error) {
if err := trustedCluster.CheckAndSetDefaults(); err != nil {
return nil, trace.Wrap(err)
}
value, err := services.GetTrustedClusterMarshaler().Marshal(trustedCluster)
if err != nil {
return ... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertTrustedCluster",
"(",
"trustedCluster",
"services",
".",
"TrustedCluster",
")",
"(",
"services",
".",
"TrustedCluster",
",",
"error",
")",
"{",
"if",
"err",
":=",
"trustedCluster",
".",
"CheckAndSetDefaults",
... | // UpsertTrustedCluster creates or updates a TrustedCluster in the backend. | [
"UpsertTrustedCluster",
"creates",
"or",
"updates",
"a",
"TrustedCluster",
"in",
"the",
"backend",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L412-L430 | train |
gravitational/teleport | lib/services/local/presence.go | GetTrustedCluster | func (s *PresenceService) GetTrustedCluster(name string) (services.TrustedCluster, error) {
if name == "" {
return nil, trace.BadParameter("missing trusted cluster name")
}
item, err := s.Get(context.TODO(), backend.Key(trustedClustersPrefix, name))
if err != nil {
return nil, trace.Wrap(err)
}
return service... | go | func (s *PresenceService) GetTrustedCluster(name string) (services.TrustedCluster, error) {
if name == "" {
return nil, trace.BadParameter("missing trusted cluster name")
}
item, err := s.Get(context.TODO(), backend.Key(trustedClustersPrefix, name))
if err != nil {
return nil, trace.Wrap(err)
}
return service... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetTrustedCluster",
"(",
"name",
"string",
")",
"(",
"services",
".",
"TrustedCluster",
",",
"error",
")",
"{",
"if",
"name",
"==",
"\"",
"\"",
"{",
"return",
"nil",
",",
"trace",
".",
"BadParameter",
"(",
... | // GetTrustedCluster returns a single TrustedCluster by name. | [
"GetTrustedCluster",
"returns",
"a",
"single",
"TrustedCluster",
"by",
"name",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L433-L442 | train |
gravitational/teleport | lib/services/local/presence.go | GetTrustedClusters | func (s *PresenceService) GetTrustedClusters() ([]services.TrustedCluster, error) {
startKey := backend.Key(trustedClustersPrefix)
result, err := s.GetRange(context.TODO(), startKey, backend.RangeEnd(startKey), backend.NoLimit)
if err != nil {
return nil, trace.Wrap(err)
}
out := make([]services.TrustedCluster, ... | go | func (s *PresenceService) GetTrustedClusters() ([]services.TrustedCluster, error) {
startKey := backend.Key(trustedClustersPrefix)
result, err := s.GetRange(context.TODO(), startKey, backend.RangeEnd(startKey), backend.NoLimit)
if err != nil {
return nil, trace.Wrap(err)
}
out := make([]services.TrustedCluster, ... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetTrustedClusters",
"(",
")",
"(",
"[",
"]",
"services",
".",
"TrustedCluster",
",",
"error",
")",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"trustedClustersPrefix",
")",
"\n",
"result",
",",
"err",... | // GetTrustedClusters returns all TrustedClusters in the backend. | [
"GetTrustedClusters",
"returns",
"all",
"TrustedClusters",
"in",
"the",
"backend",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L445-L463 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteTrustedCluster | func (s *PresenceService) DeleteTrustedCluster(name string) error {
if name == "" {
return trace.BadParameter("missing trusted cluster name")
}
err := s.Delete(context.TODO(), backend.Key(trustedClustersPrefix, name))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("trusted cluster %q is not... | go | func (s *PresenceService) DeleteTrustedCluster(name string) error {
if name == "" {
return trace.BadParameter("missing trusted cluster name")
}
err := s.Delete(context.TODO(), backend.Key(trustedClustersPrefix, name))
if err != nil {
if trace.IsNotFound(err) {
return trace.NotFound("trusted cluster %q is not... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteTrustedCluster",
"(",
"name",
"string",
")",
"error",
"{",
"if",
"name",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"err",
":=",
"s",
"."... | // DeleteTrustedCluster removes a TrustedCluster from the backend by name. | [
"DeleteTrustedCluster",
"removes",
"a",
"TrustedCluster",
"from",
"the",
"backend",
"by",
"name",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L466-L477 | train |
gravitational/teleport | lib/services/local/presence.go | UpsertTunnelConnection | func (s *PresenceService) UpsertTunnelConnection(conn services.TunnelConnection) error {
if err := conn.CheckAndSetDefaults(); err != nil {
return trace.Wrap(err)
}
value, err := services.MarshalTunnelConnection(conn)
if err != nil {
return trace.Wrap(err)
}
_, err = s.Put(context.TODO(), backend.Item{
Key:... | go | func (s *PresenceService) UpsertTunnelConnection(conn services.TunnelConnection) error {
if err := conn.CheckAndSetDefaults(); err != nil {
return trace.Wrap(err)
}
value, err := services.MarshalTunnelConnection(conn)
if err != nil {
return trace.Wrap(err)
}
_, err = s.Put(context.TODO(), backend.Item{
Key:... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"UpsertTunnelConnection",
"(",
"conn",
"services",
".",
"TunnelConnection",
")",
"error",
"{",
"if",
"err",
":=",
"conn",
".",
"CheckAndSetDefaults",
"(",
")",
";",
"err",
"!=",
"nil",
"{",
"return",
"trace",
... | // UpsertTunnelConnection updates or creates tunnel connection | [
"UpsertTunnelConnection",
"updates",
"or",
"creates",
"tunnel",
"connection"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L480-L498 | train |
gravitational/teleport | lib/services/local/presence.go | GetTunnelConnection | func (s *PresenceService) GetTunnelConnection(clusterName, connectionName string, opts ...services.MarshalOption) (services.TunnelConnection, error) {
item, err := s.Get(context.TODO(), backend.Key(tunnelConnectionsPrefix, clusterName, connectionName))
if err != nil {
if trace.IsNotFound(err) {
return nil, trace... | go | func (s *PresenceService) GetTunnelConnection(clusterName, connectionName string, opts ...services.MarshalOption) (services.TunnelConnection, error) {
item, err := s.Get(context.TODO(), backend.Key(tunnelConnectionsPrefix, clusterName, connectionName))
if err != nil {
if trace.IsNotFound(err) {
return nil, trace... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetTunnelConnection",
"(",
"clusterName",
",",
"connectionName",
"string",
",",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"services",
".",
"TunnelConnection",
",",
"error",
")",
"{",
"item",
",",... | // GetTunnelConnection returns connection by cluster name and connection name | [
"GetTunnelConnection",
"returns",
"connection",
"by",
"cluster",
"name",
"and",
"connection",
"name"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L501-L515 | train |
gravitational/teleport | lib/services/local/presence.go | GetTunnelConnections | func (s *PresenceService) GetTunnelConnections(clusterName string, opts ...services.MarshalOption) ([]services.TunnelConnection, error) {
if clusterName == "" {
return nil, trace.BadParameter("missing cluster name")
}
startKey := backend.Key(tunnelConnectionsPrefix, clusterName)
result, err := s.GetRange(context.... | go | func (s *PresenceService) GetTunnelConnections(clusterName string, opts ...services.MarshalOption) ([]services.TunnelConnection, error) {
if clusterName == "" {
return nil, trace.BadParameter("missing cluster name")
}
startKey := backend.Key(tunnelConnectionsPrefix, clusterName)
result, err := s.GetRange(context.... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"GetTunnelConnections",
"(",
"clusterName",
"string",
",",
"opts",
"...",
"services",
".",
"MarshalOption",
")",
"(",
"[",
"]",
"services",
".",
"TunnelConnection",
",",
"error",
")",
"{",
"if",
"clusterName",
"... | // GetTunnelConnections returns connections for a trusted cluster | [
"GetTunnelConnections",
"returns",
"connections",
"for",
"a",
"trusted",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L518-L538 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteTunnelConnections | func (s *PresenceService) DeleteTunnelConnections(clusterName string) error {
if clusterName == "" {
return trace.BadParameter("missing cluster name")
}
startKey := backend.Key(tunnelConnectionsPrefix, clusterName)
err := s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
return trace.Wrap(err)
... | go | func (s *PresenceService) DeleteTunnelConnections(clusterName string) error {
if clusterName == "" {
return trace.BadParameter("missing cluster name")
}
startKey := backend.Key(tunnelConnectionsPrefix, clusterName)
err := s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
return trace.Wrap(err)
... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteTunnelConnections",
"(",
"clusterName",
"string",
")",
"error",
"{",
"if",
"clusterName",
"==",
"\"",
"\"",
"{",
"return",
"trace",
".",
"BadParameter",
"(",
"\"",
"\"",
")",
"\n",
"}",
"\n",
"startKey"... | // DeleteTunnelConnections deletes all tunnel connections for cluster | [
"DeleteTunnelConnections",
"deletes",
"all",
"tunnel",
"connections",
"for",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L575-L582 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteAllTunnelConnections | func (s *PresenceService) DeleteAllTunnelConnections() error {
startKey := backend.Key(tunnelConnectionsPrefix)
err := s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
return trace.Wrap(err)
} | go | func (s *PresenceService) DeleteAllTunnelConnections() error {
startKey := backend.Key(tunnelConnectionsPrefix)
err := s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
return trace.Wrap(err)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteAllTunnelConnections",
"(",
")",
"error",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"tunnelConnectionsPrefix",
")",
"\n",
"err",
":=",
"s",
".",
"DeleteRange",
"(",
"context",
".",
"TODO",
"(",
... | // DeleteAllTunnelConnections deletes all tunnel connections | [
"DeleteAllTunnelConnections",
"deletes",
"all",
"tunnel",
"connections"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L585-L589 | train |
gravitational/teleport | lib/services/local/presence.go | CreateRemoteCluster | func (s *PresenceService) CreateRemoteCluster(rc services.RemoteCluster) error {
value, err := json.Marshal(rc)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(remoteClustersPrefix, rc.GetName()),
Value: value,
Expires: rc.Expiry(),
}
_, err = s.Create(context.TODO(),... | go | func (s *PresenceService) CreateRemoteCluster(rc services.RemoteCluster) error {
value, err := json.Marshal(rc)
if err != nil {
return trace.Wrap(err)
}
item := backend.Item{
Key: backend.Key(remoteClustersPrefix, rc.GetName()),
Value: value,
Expires: rc.Expiry(),
}
_, err = s.Create(context.TODO(),... | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"CreateRemoteCluster",
"(",
"rc",
"services",
".",
"RemoteCluster",
")",
"error",
"{",
"value",
",",
"err",
":=",
"json",
".",
"Marshal",
"(",
"rc",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"tra... | // CreateRemoteCluster creates remote cluster | [
"CreateRemoteCluster",
"creates",
"remote",
"cluster"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L592-L607 | train |
gravitational/teleport | lib/services/local/presence.go | DeleteAllRemoteClusters | func (s *PresenceService) DeleteAllRemoteClusters() error {
startKey := backend.Key(remoteClustersPrefix)
err := s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
return trace.Wrap(err)
} | go | func (s *PresenceService) DeleteAllRemoteClusters() error {
startKey := backend.Key(remoteClustersPrefix)
err := s.DeleteRange(context.TODO(), startKey, backend.RangeEnd(startKey))
return trace.Wrap(err)
} | [
"func",
"(",
"s",
"*",
"PresenceService",
")",
"DeleteAllRemoteClusters",
"(",
")",
"error",
"{",
"startKey",
":=",
"backend",
".",
"Key",
"(",
"remoteClustersPrefix",
")",
"\n",
"err",
":=",
"s",
".",
"DeleteRange",
"(",
"context",
".",
"TODO",
"(",
")",
... | // DeleteAllRemoteClusters deletes all remote clusters | [
"DeleteAllRemoteClusters",
"deletes",
"all",
"remote",
"clusters"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/services/local/presence.go#L654-L658 | train |
gravitational/teleport | lib/client/player.go | timestampFrame | func timestampFrame(message string) {
const (
saveCursor = "7"
restoreCursor = "8"
)
sz, err := term.GetWinsize(0)
if err != nil {
return
}
esc := func(s string) {
os.Stdout.Write([]byte("\x1b" + s))
}
esc(saveCursor)
defer esc(restoreCursor)
// move cursor to -10:0
esc(fmt.Sprintf("[%d;%df", 0, ... | go | func timestampFrame(message string) {
const (
saveCursor = "7"
restoreCursor = "8"
)
sz, err := term.GetWinsize(0)
if err != nil {
return
}
esc := func(s string) {
os.Stdout.Write([]byte("\x1b" + s))
}
esc(saveCursor)
defer esc(restoreCursor)
// move cursor to -10:0
esc(fmt.Sprintf("[%d;%df", 0, ... | [
"func",
"timestampFrame",
"(",
"message",
"string",
")",
"{",
"const",
"(",
"saveCursor",
"=",
"\"",
"\"",
"\n",
"restoreCursor",
"=",
"\"",
"\"",
"\n",
")",
"\n",
"sz",
",",
"err",
":=",
"term",
".",
"GetWinsize",
"(",
"0",
")",
"\n",
"if",
"err",
... | // timestampFrame prints 'event timestamp' in the top right corner of the
// terminal after playing every 'print' event | [
"timestampFrame",
"prints",
"event",
"timestamp",
"in",
"the",
"top",
"right",
"corner",
"of",
"the",
"terminal",
"after",
"playing",
"every",
"print",
"event"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/player.go#L119-L137 | train |
gravitational/teleport | lib/utils/jsontools.go | FastUnmarshal | func FastUnmarshal(data []byte, v interface{}) error {
iter := jsoniter.ConfigFastest.BorrowIterator(data)
defer jsoniter.ConfigFastest.ReturnIterator(iter)
iter.ReadVal(v)
if iter.Error != nil {
return trace.Wrap(iter.Error)
}
return nil
} | go | func FastUnmarshal(data []byte, v interface{}) error {
iter := jsoniter.ConfigFastest.BorrowIterator(data)
defer jsoniter.ConfigFastest.ReturnIterator(iter)
iter.ReadVal(v)
if iter.Error != nil {
return trace.Wrap(iter.Error)
}
return nil
} | [
"func",
"FastUnmarshal",
"(",
"data",
"[",
"]",
"byte",
",",
"v",
"interface",
"{",
"}",
")",
"error",
"{",
"iter",
":=",
"jsoniter",
".",
"ConfigFastest",
".",
"BorrowIterator",
"(",
"data",
")",
"\n",
"defer",
"jsoniter",
".",
"ConfigFastest",
".",
"Re... | // FastUnmarshal uses the json-iterator library for fast JSON unmarshalling.
// Note, this function marshals floats with 6 digits precision. | [
"FastUnmarshal",
"uses",
"the",
"json",
"-",
"iterator",
"library",
"for",
"fast",
"JSON",
"unmarshalling",
".",
"Note",
"this",
"function",
"marshals",
"floats",
"with",
"6",
"digits",
"precision",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/jsontools.go#L61-L71 | train |
gravitational/teleport | lib/utils/jsontools.go | FastMarshal | func FastMarshal(v interface{}) ([]byte, error) {
data, err := jsoniter.ConfigFastest.Marshal(v)
if err != nil {
return nil, trace.Wrap(err)
}
return data, nil
} | go | func FastMarshal(v interface{}) ([]byte, error) {
data, err := jsoniter.ConfigFastest.Marshal(v)
if err != nil {
return nil, trace.Wrap(err)
}
return data, nil
} | [
"func",
"FastMarshal",
"(",
"v",
"interface",
"{",
"}",
")",
"(",
"[",
"]",
"byte",
",",
"error",
")",
"{",
"data",
",",
"err",
":=",
"jsoniter",
".",
"ConfigFastest",
".",
"Marshal",
"(",
"v",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
... | // FastMarshal uses the json-iterator library for fast JSON marshalling.
// Note, this function marshals floats with 6 digits precision. | [
"FastMarshal",
"uses",
"the",
"json",
"-",
"iterator",
"library",
"for",
"fast",
"JSON",
"marshalling",
".",
"Note",
"this",
"function",
"marshals",
"floats",
"with",
"6",
"digits",
"precision",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/jsontools.go#L75-L82 | train |
gravitational/teleport | lib/utils/jsontools.go | isDoc | func isDoc(val reflect.Value) bool {
iterations := 0
for val.Kind() == reflect.Interface || val.Kind() == reflect.Ptr {
val = val.Elem()
// preventing cycles
iterations++
if iterations > 10 {
return false
}
}
return val.Kind() == reflect.Struct || val.Kind() == reflect.Map
} | go | func isDoc(val reflect.Value) bool {
iterations := 0
for val.Kind() == reflect.Interface || val.Kind() == reflect.Ptr {
val = val.Elem()
// preventing cycles
iterations++
if iterations > 10 {
return false
}
}
return val.Kind() == reflect.Struct || val.Kind() == reflect.Map
} | [
"func",
"isDoc",
"(",
"val",
"reflect",
".",
"Value",
")",
"bool",
"{",
"iterations",
":=",
"0",
"\n",
"for",
"val",
".",
"Kind",
"(",
")",
"==",
"reflect",
".",
"Interface",
"||",
"val",
".",
"Kind",
"(",
")",
"==",
"reflect",
".",
"Ptr",
"{",
"... | // isDoc detects whether value constitues a document | [
"isDoc",
"detects",
"whether",
"value",
"constitues",
"a",
"document"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/jsontools.go#L122-L133 | train |
gravitational/teleport | lib/utils/jsontools.go | writeYAML | func writeYAML(w io.Writer, values interface{}) error {
data, err := yaml.Marshal(values)
if err != nil {
return trace.Wrap(err)
}
_, err = w.Write(data)
return trace.Wrap(err)
} | go | func writeYAML(w io.Writer, values interface{}) error {
data, err := yaml.Marshal(values)
if err != nil {
return trace.Wrap(err)
}
_, err = w.Write(data)
return trace.Wrap(err)
} | [
"func",
"writeYAML",
"(",
"w",
"io",
".",
"Writer",
",",
"values",
"interface",
"{",
"}",
")",
"error",
"{",
"data",
",",
"err",
":=",
"yaml",
".",
"Marshal",
"(",
"values",
")",
"\n",
"if",
"err",
"!=",
"nil",
"{",
"return",
"trace",
".",
"Wrap",
... | // writeYAML writes marshaled YAML to writer | [
"writeYAML",
"writes",
"marshaled",
"YAML",
"to",
"writer"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/jsontools.go#L136-L143 | train |
gravitational/teleport | lib/utils/jsontools.go | ReadYAML | func ReadYAML(reader io.Reader) (interface{}, error) {
decoder := kyaml.NewYAMLOrJSONDecoder(reader, 32*1024)
var values []interface{}
for {
var val interface{}
err := decoder.Decode(&val)
if err != nil {
if err == io.EOF {
if len(values) == 0 {
return nil, trace.BadParameter("no resources found, e... | go | func ReadYAML(reader io.Reader) (interface{}, error) {
decoder := kyaml.NewYAMLOrJSONDecoder(reader, 32*1024)
var values []interface{}
for {
var val interface{}
err := decoder.Decode(&val)
if err != nil {
if err == io.EOF {
if len(values) == 0 {
return nil, trace.BadParameter("no resources found, e... | [
"func",
"ReadYAML",
"(",
"reader",
"io",
".",
"Reader",
")",
"(",
"interface",
"{",
"}",
",",
"error",
")",
"{",
"decoder",
":=",
"kyaml",
".",
"NewYAMLOrJSONDecoder",
"(",
"reader",
",",
"32",
"*",
"1024",
")",
"\n",
"var",
"values",
"[",
"]",
"inte... | // ReadYAML can unmarshal a stream of documents, used in tests. | [
"ReadYAML",
"can",
"unmarshal",
"a",
"stream",
"of",
"documents",
"used",
"in",
"tests",
"."
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/utils/jsontools.go#L146-L166 | train |
gravitational/teleport | lib/client/redirect.go | NewRedirector | func NewRedirector(login SSHLogin) (*Redirector, error) {
//clt, proxyURL, err := initClient(login.ProxyAddr, login.Insecure, login.Pool)
//if err != nil {
// return nil, trace.Wrap(err)
//}
clt, err := NewCredentialsClient(login.ProxyAddr, login.Insecure, login.Pool)
if err != nil {
return nil, trace.Wrap(err... | go | func NewRedirector(login SSHLogin) (*Redirector, error) {
//clt, proxyURL, err := initClient(login.ProxyAddr, login.Insecure, login.Pool)
//if err != nil {
// return nil, trace.Wrap(err)
//}
clt, err := NewCredentialsClient(login.ProxyAddr, login.Insecure, login.Pool)
if err != nil {
return nil, trace.Wrap(err... | [
"func",
"NewRedirector",
"(",
"login",
"SSHLogin",
")",
"(",
"*",
"Redirector",
",",
"error",
")",
"{",
"//clt, proxyURL, err := initClient(login.ProxyAddr, login.Insecure, login.Pool)",
"//if err != nil {",
"//\treturn nil, trace.Wrap(err)",
"//}",
"clt",
",",
"err",
":=",
... | // NewRedirector returns new local web server redirector | [
"NewRedirector",
"returns",
"new",
"local",
"web",
"server",
"redirector"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/redirect.go#L69-L111 | train |
gravitational/teleport | lib/client/redirect.go | Start | func (rd *Redirector) Start() error {
if rd.BindAddr != "" {
log.Debugf("Binding to %v.", rd.BindAddr)
listener, err := net.Listen("tcp", rd.BindAddr)
if err != nil {
return trace.Wrap(err, "%v: could not bind to %v, make sure the address is host:port format for ipv4 and [ipv6]:port format for ipv6, and the a... | go | func (rd *Redirector) Start() error {
if rd.BindAddr != "" {
log.Debugf("Binding to %v.", rd.BindAddr)
listener, err := net.Listen("tcp", rd.BindAddr)
if err != nil {
return trace.Wrap(err, "%v: could not bind to %v, make sure the address is host:port format for ipv4 and [ipv6]:port format for ipv6, and the a... | [
"func",
"(",
"rd",
"*",
"Redirector",
")",
"Start",
"(",
")",
"error",
"{",
"if",
"rd",
".",
"BindAddr",
"!=",
"\"",
"\"",
"{",
"log",
".",
"Debugf",
"(",
"\"",
"\"",
",",
"rd",
".",
"BindAddr",
")",
"\n",
"listener",
",",
"err",
":=",
"net",
"... | // Start launches local http server on the machine,
// initiates SSO login request sequence with the Teleport Proxy | [
"Start",
"launches",
"local",
"http",
"server",
"on",
"the",
"machine",
"initiates",
"SSO",
"login",
"request",
"sequence",
"with",
"the",
"Teleport",
"Proxy"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/redirect.go#L115-L163 | train |
gravitational/teleport | lib/client/redirect.go | ClickableURL | func (rd *Redirector) ClickableURL() string {
if rd.server == nil {
return "<undefined - server is not started>"
}
return utils.ClickableURL(rd.server.URL + rd.shortPath)
} | go | func (rd *Redirector) ClickableURL() string {
if rd.server == nil {
return "<undefined - server is not started>"
}
return utils.ClickableURL(rd.server.URL + rd.shortPath)
} | [
"func",
"(",
"rd",
"*",
"Redirector",
")",
"ClickableURL",
"(",
")",
"string",
"{",
"if",
"rd",
".",
"server",
"==",
"nil",
"{",
"return",
"\"",
"\"",
"\n",
"}",
"\n",
"return",
"utils",
".",
"ClickableURL",
"(",
"rd",
".",
"server",
".",
"URL",
"+... | // ClickableURL returns a short clickable redirect URL | [
"ClickableURL",
"returns",
"a",
"short",
"clickable",
"redirect",
"URL"
] | d5243dbe8d36bba44bf640c08f1c49185ed2c8a4 | https://github.com/gravitational/teleport/blob/d5243dbe8d36bba44bf640c08f1c49185ed2c8a4/lib/client/redirect.go#L172-L177 | train |
Subsets and Splits
SQL Console for semeru/code-text-go
Retrieves a limited set of code samples with their languages, with a specific case adjustment for 'Go' language.