Documentation ¶
Overview ¶
DO NOT EDIT THIS FILE. IT IS GENERATED BY 'make setver'
Index ¶
Constants ¶
View Source
const ( // BoltBackendType is a BoltDB backend BoltBackendType = "bolt" // ETCDBackendType is etcd backend ETCDBackendType = "etcd" // TOTPValidityPeriod is the number of seconds a TOTP token is valid. TOTPValidityPeriod uint = 30 // TOTPSkew adds that many periods before and after to the validity window. TOTPSkew uint = 1 // Component indicates a component of teleport, used for logging Component = "component" // ComponentFields stores component-specific fields ComponentFields = "fields" // ComponentReverseTunnel is reverse tunnel agent and server // that together establish a bi-directional SSH revers tunnel // to bypass firewall restrictions ComponentReverseTunnel = "reversetunnel" // ComponentAuth is the cluster CA node (auth server API) ComponentAuth = "auth" // ComponentNode is SSH node (SSH server serving requests) ComponentNode = "node" // ComponentProxy is SSH proxy (SSH server forwarding connections) ComponentProxy = "proxy" // ComponentTunClient is a tunnel client ComponentTunClient = "tunclient" // DefaultTimeout sets read and wrie timeouts for SSH server ops DefaultTimeout time.Duration = 30 * time.Second // DebugOutputEnvVar tells tests to use verbose debug output DebugOutputEnvVar = "TELEPORT_DEBUG" // DefaultTerminalWidth defines the default width of a server-side allocated // pseudo TTY DefaultTerminalWidth = 80 // DefaultTerminalHeight defines the default height of a server-side allocated // pseudo TTY DefaultTerminalHeight = 25 // SafeTerminalType is the fall-back TTY type to fall back to (when $TERM // is not defined) SafeTerminalType = "xterm" // ConnectorOIDC means connector type OIDC ConnectorOIDC = "oidc" // DataDirParameterName is the name of the data dir configuration parameter passed // to all backends during initialization DataDirParameterName = "data_dir" // SSH request type to keep the connection alive. A client and a server keep // pining each other with it: KeepAliveReqType = "keepalive@openssh.com" // OTP means One-time Password Algorithm. OTP = "otp" // TOTP means Time-based One-time Password Algorithm. TOTP = "totp" // HOTP means HMAC-based One-time Password Algorithm. HOTP = "hotp" // U2F means Universal 2nd Factor. U2F = "u2f" // OIDC means OpenID Connect. OIDC = "oidc" )
View Source
const ForeverTTL time.Duration = 0
ForeverTTL means that object TTL will not expire unless deleted
View Source
const ( // Certificate file/ db entry/ db table prefix PocketClusterCertPrefix string = "pcssh_" )
View Source
const ( // SQLiteBackendType is a SQLite backend SQLiteBackendType string = "sqlite" )
View Source
const SSHAuthSock = "SSH_AUTH_SOCK"
SSHAuthSock is the environment variable pointing to the Unix socket the SSH agent is running on.
View Source
const (
Version = "1.3.1"
)
Variables ¶
View Source
var Gitref string
Functions ¶
This section is empty.
Types ¶
type Role ¶
type Role string
Role identifies the role of SSH server connection
const ( // RoleAuth is for teleport auth server (authority, authentication and authorization) RoleAuth Role = "Auth" // RoleUser is a role for teleport SSH user RoleUser Role = "User" // RoleWeb is for web access users RoleWeb Role = "Web" // RoleNode is a role for SSH node in the cluster RoleNode Role = "Node" // RoleProxy is a role for SSH proxy in the cluster RoleProxy Role = "Proxy" // RoleAdmin is admin role RoleAdmin Role = "Admin" // RoleProvisionToken is a role for nodes authenticated using provisioning tokens RoleProvisionToken Role = "ProvisionToken" // RoleSignup is for first time signing up users RoleSignup Role = "Signup" )
func (*Role) Check ¶
Check checks if this a a valid role value, returns nil if it's ok, false otherwise
type Roles ¶
type Roles []Role
func ParseRoles ¶
ParseRoles takes a comma-separated list of roles and returns a slice of roles, or an error if parsing failed
Directories ¶
Path | Synopsis |
---|---|
integration package tests Teleport on a high level creating clusters of servers in memory, connecting them together and connecting to them
|
integration package tests Teleport on a high level creating clusters of servers in memory, connecting them together and connecting to them |
lib
|
|
auth
Package auth implements certificate signing authority and access control server Authority server is composed of several parts:
|
Package auth implements certificate signing authority and access control server Authority server is composed of several parts: |
backend
Package backend represents interface for accessing local or remote storage
|
Package backend represents interface for accessing local or remote storage |
backend/boltbk
Package boltbk implements BoltDB backed backend for standalone instances and test mode, you should use Etcd in production
|
Package boltbk implements BoltDB backed backend for standalone instances and test mode, you should use Etcd in production |
backend/etcdbk
Package etcdbk implements Etcd powered backend
|
Package etcdbk implements Etcd powered backend |
backend/test
Package test contains a backend acceptance test suite that is backend implementation independant each backend will use the suite to test itself
|
Package test contains a backend acceptance test suite that is backend implementation independant each backend will use the suite to test itself |
defaults
Package defaults contains default constants set in various parts of teleport codebase
|
Package defaults contains default constants set in various parts of teleport codebase |
events
Package events currently implements the audit log using a simple filesystem backend.
|
Package events currently implements the audit log using a simple filesystem backend. |
httplib
Package httplib implements common utility functions for writing classic HTTP handlers
|
Package httplib implements common utility functions for writing classic HTTP handlers |
limiter
Package limiter implements connection and rate limiters for teleport
|
Package limiter implements connection and rate limiters for teleport |
reversetunnel
Package reversetunnel sets up persistent reverse tunnel between remote site and teleport proxy, when site agents dial to teleport proxy's socket and teleport proxy can connect to any server through this tunnel.
|
Package reversetunnel sets up persistent reverse tunnel between remote site and teleport proxy, when site agents dial to teleport proxy's socket and teleport proxy can connect to any server through this tunnel. |
service
Package service implements teleport running service, takes care of initialization, cleanup and shutdown procedures
|
Package service implements teleport running service, takes care of initialization, cleanup and shutdown procedures |
services
Package services implements statefule services provided by teleport, like certificate authority management, user and web sessions, events and logs.
|
Package services implements statefule services provided by teleport, like certificate authority management, user and web sessions, events and logs. |
services/local
Package local implements services interfaces using abstract key value backend provided by lib/backend, what makes it possible for teleport to run using boltdb or etcd
|
Package local implements services interfaces using abstract key value backend provided by lib/backend, what makes it possible for teleport to run using boltdb or etcd |
session
Package session is used for bookeeping of SSH interactive sessions that happen in realtime across the teleport cluster
|
Package session is used for bookeeping of SSH interactive sessions that happen in realtime across the teleport cluster |
sshutils/scp
Package scp handles file uploads and downloads via scp command
|
Package scp handles file uploads and downloads via scp command |
web
Package web implements web proxy handler that provides web interface to view and connect to teleport nodes
|
Package web implements web proxy handler that provides web interface to view and connect to teleport nodes |
tool
|
|
Click to show internal directories.
Click to hide internal directories.