mirror of
https://github.com/gravitational/teleport
synced 2024-10-21 17:53:28 +00:00
Cleaned up, added checking that server is known
This commit is contained in:
parent
01cef17bd3
commit
074807012c
|
@ -254,7 +254,7 @@ func (s *server) FindSimilarSite(fqdn string) (RemoteSite, error) {
|
|||
if result != -1 {
|
||||
return s.sites[result], nil
|
||||
} else {
|
||||
return nil, trace.Errorf("Site not found")
|
||||
return nil, trace.Errorf("site not found")
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -339,18 +339,15 @@ func (s *remoteSite) GetLastConnected() time.Time {
|
|||
func (s *remoteSite) ConnectToServer(server, user string, auth []ssh.AuthMethod) (*ssh.Client, error) {
|
||||
ch, _, err := s.conn.OpenChannel(chanTransport, nil)
|
||||
if err != nil {
|
||||
log.Errorf("remoteSite:connectToServer %v", err)
|
||||
return nil, err
|
||||
return nil, trace.Wrap(err)
|
||||
}
|
||||
// ask remote channel to dial
|
||||
dialed, err := ch.SendRequest(chanTransportDialReq, true, []byte(server))
|
||||
if err != nil {
|
||||
log.Errorf("failed to process request: %v", err)
|
||||
return nil, err
|
||||
return nil, trace.Wrap(err)
|
||||
}
|
||||
if !dialed {
|
||||
log.Errorf("remote end failed to dial: %v", err)
|
||||
return nil, fmt.Errorf("remote server %v is not available", server)
|
||||
return nil, trace.Errorf("remote server %v is not available", server)
|
||||
}
|
||||
transportConn := newChConn(s.conn, ch)
|
||||
conn, chans, reqs, err := ssh.NewClientConn(
|
||||
|
@ -367,21 +364,29 @@ func (s *remoteSite) ConnectToServer(server, user string, auth []ssh.AuthMethod)
|
|||
}
|
||||
|
||||
func (s *remoteSite) DialServer(server string) (net.Conn, error) {
|
||||
// TODO: check if server is known
|
||||
serverIsKnown := false
|
||||
knownServers, err := s.GetServers()
|
||||
fmt.Println(server, "Known Servers:", knownServers)
|
||||
for _, srv := range knownServers {
|
||||
if srv.Addr == server {
|
||||
serverIsKnown = true
|
||||
}
|
||||
}
|
||||
serverIsKnown = serverIsKnown
|
||||
if !serverIsKnown {
|
||||
return nil, trace.Errorf("can't dial server %v, server is unknown", server)
|
||||
}
|
||||
ch, _, err := s.conn.OpenChannel(chanTransport, nil)
|
||||
if err != nil {
|
||||
log.Errorf("remoteSite:connectToServer %v", err)
|
||||
return nil, err
|
||||
return nil, trace.Wrap(err)
|
||||
}
|
||||
// ask remote channel to dial
|
||||
dialed, err := ch.SendRequest(chanTransportDialReq, true, []byte(server))
|
||||
if err != nil {
|
||||
log.Errorf("failed to process request: %v", err)
|
||||
return nil, err
|
||||
return nil, trace.Wrap(err)
|
||||
}
|
||||
if !dialed {
|
||||
log.Errorf("remote end failed to dial: %v", err)
|
||||
return nil, fmt.Errorf("remote server %v is not available", server)
|
||||
return nil, trace.Errorf("remote server %v is not available", server)
|
||||
}
|
||||
return newChConn(s.conn, ch), nil
|
||||
}
|
||||
|
|
|
@ -4,7 +4,9 @@ import (
|
|||
"fmt"
|
||||
"io"
|
||||
"strings"
|
||||
"sync"
|
||||
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/log"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/trace"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/golang.org/x/crypto/ssh"
|
||||
)
|
||||
|
@ -21,7 +23,7 @@ type proxySubsys struct {
|
|||
func parseProxySubsys(name string, srv *Server) (*proxySubsys, error) {
|
||||
out := strings.Split(name, ":")
|
||||
if len(out) != 3 {
|
||||
return nil, fmt.Errorf("invalid format for proxy request: '%v', expected 'proxy:host:port'", name)
|
||||
return nil, trace.Errorf("invalid format for proxy request: '%v', expected 'proxy:host:port'", name)
|
||||
}
|
||||
return &proxySubsys{
|
||||
srv: srv,
|
||||
|
@ -41,8 +43,31 @@ func (t *proxySubsys) execute(sconn *ssh.ServerConn, ch ssh.Channel, req *ssh.Re
|
|||
}
|
||||
|
||||
conn, err := remoteSrv.DialServer(t.host + ":" + t.port)
|
||||
if err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
|
||||
wg := &sync.WaitGroup{}
|
||||
wg.Add(2)
|
||||
|
||||
go func() {
|
||||
defer wg.Done()
|
||||
_, err := io.Copy(ch, conn)
|
||||
if err != nil {
|
||||
log.Errorf(err.Error())
|
||||
}
|
||||
ch.Close()
|
||||
}()
|
||||
go func() {
|
||||
defer wg.Done()
|
||||
_, err := io.Copy(conn, ch)
|
||||
if err != nil {
|
||||
log.Errorf(err.Error())
|
||||
}
|
||||
conn.Close()
|
||||
}()
|
||||
|
||||
wg.Wait()
|
||||
|
||||
go io.Copy(ch, conn)
|
||||
io.Copy(conn, ch)
|
||||
return nil
|
||||
}
|
||||
|
|
|
@ -266,22 +266,22 @@ func (s *Server) HandleRequest(r *ssh.Request) {
|
|||
}
|
||||
|
||||
func (s *Server) HandleNewChan(sconn *ssh.ServerConn, nch ssh.NewChannel) {
|
||||
cht := nch.ChannelType()
|
||||
channelType := nch.ChannelType()
|
||||
|
||||
if s.proxyMode {
|
||||
if cht == "session" { // interactive sessions
|
||||
if channelType == "session" { // interactive sessions
|
||||
ch, requests, err := nch.Accept()
|
||||
if err != nil {
|
||||
log.Infof("could not accept channel (%s)", err)
|
||||
}
|
||||
go s.handleSessionRequests(sconn, ch, requests)
|
||||
} else {
|
||||
nch.Reject(ssh.UnknownChannelType, fmt.Sprintf("unknown channel type: %v", cht))
|
||||
nch.Reject(ssh.UnknownChannelType, fmt.Sprintf("unknown channel type: %v", channelType))
|
||||
}
|
||||
return
|
||||
}
|
||||
|
||||
switch cht {
|
||||
switch channelType {
|
||||
case "session": // interactive sessions
|
||||
ch, requests, err := nch.Accept()
|
||||
if err != nil {
|
||||
|
@ -300,7 +300,7 @@ func (s *Server) HandleNewChan(sconn *ssh.ServerConn, nch ssh.NewChannel) {
|
|||
}
|
||||
go s.handleDirectTCPIPRequest(sconn, sshCh, req)
|
||||
default:
|
||||
nch.Reject(ssh.UnknownChannelType, fmt.Sprintf("unknown channel type: %v", cht))
|
||||
nch.Reject(ssh.UnknownChannelType, fmt.Sprintf("unknown channel type: %v", channelType))
|
||||
}
|
||||
}
|
||||
|
||||
|
|
|
@ -34,14 +34,15 @@ import (
|
|||
func TestSrv(t *testing.T) { TestingT(t) }
|
||||
|
||||
type SrvSuite struct {
|
||||
srv *Server
|
||||
clt *ssh.Client
|
||||
bk *encryptedbk.ReplicatedBackend
|
||||
a *auth.AuthServer
|
||||
up *upack
|
||||
scrt secret.SecretService
|
||||
signer ssh.Signer
|
||||
dir string
|
||||
srv *Server
|
||||
srvAddress string
|
||||
clt *ssh.Client
|
||||
bk *encryptedbk.ReplicatedBackend
|
||||
a *auth.AuthServer
|
||||
up *upack
|
||||
scrt secret.SecretService
|
||||
signer ssh.Signer
|
||||
dir string
|
||||
}
|
||||
|
||||
var _ = Suite(&SrvSuite{})
|
||||
|
@ -80,9 +81,9 @@ func (s *SrvSuite) SetUpTest(c *C) {
|
|||
c.Assert(err, IsNil)
|
||||
|
||||
ap := auth.NewBackendAccessPoint(s.bk)
|
||||
|
||||
s.srvAddress = "localhost:30185"
|
||||
srv, err := New(
|
||||
utils.NetAddr{Network: "tcp", Addr: "localhost:30185"},
|
||||
utils.NetAddr{Network: "tcp", Addr: s.srvAddress},
|
||||
[]ssh.Signer{s.signer},
|
||||
ap,
|
||||
SetShell("/bin/sh"),
|
||||
|
@ -274,22 +275,25 @@ func (s *SrvSuite) TestProxy(c *C) {
|
|||
Auth: []ssh.AuthMethod{ssh.PublicKeys(up.certSigner)},
|
||||
}
|
||||
|
||||
// Trying to connect to unregistered ssh node
|
||||
|
||||
client, err := ssh.Dial("tcp", proxy.Addr(), sshConfig)
|
||||
c.Assert(err, IsNil)
|
||||
c.Assert(agent.ForwardToAgent(client, keyring), IsNil)
|
||||
|
||||
se, err := client.NewSession()
|
||||
se0, err := client.NewSession()
|
||||
c.Assert(err, IsNil)
|
||||
defer se.Close()
|
||||
defer se0.Close()
|
||||
|
||||
writer, err := se.StdinPipe()
|
||||
writer, err := se0.StdinPipe()
|
||||
c.Assert(err, IsNil)
|
||||
|
||||
reader, err := se.StdoutPipe()
|
||||
reader, err := se0.StdoutPipe()
|
||||
c.Assert(err, IsNil)
|
||||
|
||||
// Request opening TCP connection to the remote host
|
||||
c.Assert(se.RequestSubsystem(fmt.Sprintf("proxy:%v", s.srv.Addr())), IsNil)
|
||||
unregisteredAddress := s.srv.Addr() // proper ssh node address but with 127.0.0.1 instead of localhost
|
||||
c.Assert(se0.RequestSubsystem(fmt.Sprintf("proxy:%v", unregisteredAddress)), IsNil)
|
||||
|
||||
local, err := net.ResolveTCPAddr("tcp", proxy.Addr())
|
||||
c.Assert(err, IsNil)
|
||||
|
@ -299,7 +303,7 @@ func (s *SrvSuite) TestProxy(c *C) {
|
|||
pipeNetConn := utils.NewPipeNetConn(
|
||||
reader,
|
||||
writer,
|
||||
se,
|
||||
se0,
|
||||
local,
|
||||
remote,
|
||||
)
|
||||
|
@ -307,6 +311,42 @@ func (s *SrvSuite) TestProxy(c *C) {
|
|||
// Open SSH connection via TCP
|
||||
conn, chans, reqs, err := ssh.NewClientConn(pipeNetConn,
|
||||
s.srv.Addr(), sshConfig)
|
||||
c.Assert(err, NotNil)
|
||||
|
||||
// Connect to node using registered address
|
||||
client, err = ssh.Dial("tcp", proxy.Addr(), sshConfig)
|
||||
c.Assert(err, IsNil)
|
||||
c.Assert(agent.ForwardToAgent(client, keyring), IsNil)
|
||||
|
||||
se, err := client.NewSession()
|
||||
c.Assert(err, IsNil)
|
||||
defer se.Close()
|
||||
|
||||
writer, err = se.StdinPipe()
|
||||
c.Assert(err, IsNil)
|
||||
|
||||
reader, err = se.StdoutPipe()
|
||||
c.Assert(err, IsNil)
|
||||
|
||||
// Request opening TCP connection to the remote host
|
||||
c.Assert(se.RequestSubsystem(fmt.Sprintf("proxy:%v", s.srvAddress)), IsNil)
|
||||
|
||||
local, err = net.ResolveTCPAddr("tcp", proxy.Addr())
|
||||
c.Assert(err, IsNil)
|
||||
remote, err = net.ResolveTCPAddr("tcp", s.srv.Addr())
|
||||
c.Assert(err, IsNil)
|
||||
|
||||
pipeNetConn = utils.NewPipeNetConn(
|
||||
reader,
|
||||
writer,
|
||||
se,
|
||||
local,
|
||||
remote,
|
||||
)
|
||||
|
||||
// Open SSH connection via TCP
|
||||
conn, chans, reqs, err = ssh.NewClientConn(pipeNetConn,
|
||||
s.srv.Addr(), sshConfig)
|
||||
c.Assert(err, IsNil)
|
||||
|
||||
// using this connection as regular SSH
|
||||
|
|
|
@ -3,6 +3,7 @@ package teleagent
|
|||
import (
|
||||
"golang.org/x/crypto/ssh"
|
||||
"golang.org/x/crypto/ssh/agent"
|
||||
"io"
|
||||
"net"
|
||||
"time"
|
||||
|
||||
|
@ -15,7 +16,14 @@ import (
|
|||
)
|
||||
|
||||
type TeleAgent struct {
|
||||
keys []Key
|
||||
agent agent.Agent
|
||||
}
|
||||
|
||||
func NewTeleAgent() *TeleAgent {
|
||||
ta := TeleAgent{
|
||||
agent: agent.NewKeyring(),
|
||||
}
|
||||
return &ta
|
||||
}
|
||||
|
||||
func (a *TeleAgent) Start(agentAddr string) error {
|
||||
|
@ -32,48 +40,23 @@ func (a *TeleAgent) Start(agentAddr string) error {
|
|||
go func() {
|
||||
for {
|
||||
conn, err := l.Accept()
|
||||
ag, err := a.GetAgent()
|
||||
if err != nil {
|
||||
log.Errorf(err.Error())
|
||||
} else {
|
||||
go func() {
|
||||
if err := agent.ServeAgent(ag, conn); err != nil {
|
||||
continue
|
||||
}
|
||||
go func() {
|
||||
if err := agent.ServeAgent(a.agent, conn); err != nil {
|
||||
if err != io.EOF {
|
||||
log.Errorf(err.Error())
|
||||
}
|
||||
}()
|
||||
}
|
||||
}
|
||||
}()
|
||||
}
|
||||
}()
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
func (a *TeleAgent) GetAgent() (agent.Agent, error) {
|
||||
ag := agent.NewKeyring()
|
||||
|
||||
for _, key := range a.keys {
|
||||
k, err := ssh.ParseRawPrivateKey(key.Priv)
|
||||
if err != nil {
|
||||
log.Errorf("failed to add: %v", err)
|
||||
return nil, trace.Wrap(err)
|
||||
}
|
||||
addedKey := agent.AddedKey{
|
||||
PrivateKey: k,
|
||||
Certificate: key.Cert,
|
||||
Comment: "",
|
||||
LifetimeSecs: 0,
|
||||
ConfirmBeforeUse: false,
|
||||
}
|
||||
if err := ag.Add(addedKey); err != nil {
|
||||
log.Errorf("failed to add: %v", err)
|
||||
return nil, trace.Wrap(err)
|
||||
}
|
||||
}
|
||||
|
||||
return ag, nil
|
||||
|
||||
}
|
||||
|
||||
func (a *TeleAgent) Login(proxyAddr string, user string, pass string,
|
||||
hotpToken string, ttl time.Duration) error {
|
||||
priv, pub, err := native.New().GenerateKeyPair("")
|
||||
|
@ -92,21 +75,24 @@ func (a *TeleAgent) Login(proxyAddr string, user string, pass string,
|
|||
return trace.Wrap(err)
|
||||
}
|
||||
|
||||
key := Key{
|
||||
Priv: priv,
|
||||
Cert: pcert.(*ssh.Certificate),
|
||||
pk, err := ssh.ParseRawPrivateKey(priv)
|
||||
if err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
addedKey := agent.AddedKey{
|
||||
PrivateKey: pk,
|
||||
Certificate: pcert.(*ssh.Certificate),
|
||||
Comment: "",
|
||||
LifetimeSecs: 0,
|
||||
ConfirmBeforeUse: false,
|
||||
}
|
||||
if err := a.agent.Add(addedKey); err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
|
||||
a.keys = append(a.keys, key)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
type Key struct {
|
||||
Priv []byte
|
||||
Cert *ssh.Certificate
|
||||
}
|
||||
|
||||
const (
|
||||
DefaultAgentAddress = "unix:///tmp/teleport.agent.sock"
|
||||
)
|
||||
|
|
|
@ -23,7 +23,7 @@ func NewAgentAPIServer(ag *TeleAgent) *AgentAPIServer {
|
|||
srv.ag = ag
|
||||
srv.Router = *httprouter.New()
|
||||
|
||||
srv.POST("/login", srv.login)
|
||||
srv.POST("/v1/login", srv.login)
|
||||
|
||||
return &srv
|
||||
}
|
||||
|
@ -54,18 +54,21 @@ func (s *AgentAPIServer) login(w http.ResponseWriter, r *http.Request, p httprou
|
|||
form.String("ttl", &ttlJSON, form.Required()),
|
||||
)
|
||||
if err != nil {
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte(err.Error()))
|
||||
return
|
||||
}
|
||||
|
||||
var ttl time.Duration
|
||||
if err != json.Unmarshal([]byte(ttlJSON), &ttl) {
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte(err.Error()))
|
||||
return
|
||||
}
|
||||
|
||||
err = s.ag.Login(proxyAddr, user, pass, hotpToken, ttl)
|
||||
if err != nil {
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte("Login error: " + err.Error()))
|
||||
return
|
||||
}
|
||||
|
|
|
@ -3,14 +3,15 @@ package teleagent
|
|||
import (
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"net"
|
||||
"net/http"
|
||||
"net/url"
|
||||
"strings"
|
||||
"time"
|
||||
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/roundtrip"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/trace"
|
||||
|
||||
"github.com/gravitational/teleport/lib/utils"
|
||||
)
|
||||
|
||||
|
@ -23,11 +24,20 @@ func Login(agentAPIAddr string, proxyAddr string, user string,
|
|||
return trace.Wrap(err)
|
||||
}
|
||||
|
||||
c := &http.Client{
|
||||
Transport: &http.Transport{
|
||||
Dial: func(network, address string) (net.Conn, error) {
|
||||
return net.Dial(pAgentAPIAddr.Network, pAgentAPIAddr.Addr)
|
||||
}}}
|
||||
c, err := roundtrip.NewClient(
|
||||
"http://localhost", //domain is not used because of the custom transport
|
||||
"v1",
|
||||
roundtrip.HTTPClient(
|
||||
&http.Client{
|
||||
Transport: &http.Transport{
|
||||
Dial: func(network, address string) (net.Conn, error) {
|
||||
return net.Dial(pAgentAPIAddr.Network, pAgentAPIAddr.Addr)
|
||||
}}},
|
||||
),
|
||||
)
|
||||
if err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
|
||||
ttlJSON, err := json.Marshal(ttl)
|
||||
if err != nil {
|
||||
|
@ -35,7 +45,7 @@ func Login(agentAPIAddr string, proxyAddr string, user string,
|
|||
}
|
||||
|
||||
out, err := c.PostForm(
|
||||
"http://localhost/login", //domain is not used because of the custom transport
|
||||
c.Endpoint("login"),
|
||||
url.Values{
|
||||
"proxyAddr": []string{proxyAddr},
|
||||
"user": []string{user},
|
||||
|
@ -46,12 +56,8 @@ func Login(agentAPIAddr string, proxyAddr string, user string,
|
|||
if err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
defer out.Body.Close()
|
||||
|
||||
body, err := ioutil.ReadAll(out.Body)
|
||||
if err != nil {
|
||||
return trace.Wrap(err)
|
||||
}
|
||||
body := out.Bytes()
|
||||
|
||||
if string(body) == LoginSuccess {
|
||||
return nil
|
||||
|
@ -61,7 +67,7 @@ func Login(agentAPIAddr string, proxyAddr string, user string,
|
|||
return fmt.Errorf("Wrong user or password or HOTP token")
|
||||
}
|
||||
|
||||
return fmt.Errorf(string(body))
|
||||
return trace.Errorf(string(body))
|
||||
}
|
||||
|
||||
const WrongPasswordError = "ssh: handshake failed: ssh: unable to authenticate, attempted methods [none password], no supported methods remain"
|
||||
|
|
|
@ -13,6 +13,7 @@ import (
|
|||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/log"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/roundtrip"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/session"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/trace"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/julienschmidt/httprouter"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/mailgun/ttlmap"
|
||||
"github.com/gravitational/teleport/lib/reversetunnel"
|
||||
|
@ -148,18 +149,25 @@ func (h *MultiSiteHandler) loginSSHProxy(w http.ResponseWriter, r *http.Request,
|
|||
form.String("credentials", &credJSON, form.Required()),
|
||||
)
|
||||
if err != nil {
|
||||
w.Write(sshLoginResponse(nil, err))
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte(trace.Wrap(err).Error()))
|
||||
return
|
||||
}
|
||||
|
||||
var cred SSHLoginCredentials
|
||||
if err := json.Unmarshal([]byte(credJSON), &cred); err != nil {
|
||||
w.Write(sshLoginResponse(nil, err))
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte(trace.Wrap(err).Error()))
|
||||
return
|
||||
}
|
||||
|
||||
cert, err := h.auth.GetCertificate(cred)
|
||||
w.Write(sshLoginResponse(cert, err))
|
||||
if err != nil {
|
||||
w.WriteHeader(http.StatusInternalServerError)
|
||||
w.Write([]byte(trace.Wrap(err).Error()))
|
||||
return
|
||||
}
|
||||
w.Write(cert)
|
||||
}
|
||||
|
||||
func (s *MultiSiteHandler) siteEvents(w http.ResponseWriter, r *http.Request, p httprouter.Params, c Context) error {
|
||||
|
|
|
@ -7,7 +7,6 @@ import (
|
|||
"net/url"
|
||||
"time"
|
||||
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/log"
|
||||
"github.com/gravitational/teleport/Godeps/_workspace/src/github.com/gravitational/trace"
|
||||
)
|
||||
|
||||
|
@ -42,16 +41,11 @@ func SSHAgentLogin(proxyAddr, user, password, hotpToken string, pubKey []byte,
|
|||
return nil, trace.Wrap(err)
|
||||
}
|
||||
|
||||
var res SSHLoginResponse
|
||||
if err := json.Unmarshal(body, &res); err != nil {
|
||||
return nil, trace.Errorf("error: " + err.Error() + "body: " + string(body))
|
||||
if out.StatusCode != 200 {
|
||||
return nil, trace.Errorf(string(body))
|
||||
}
|
||||
|
||||
if len(res.Err) == 0 {
|
||||
return res.Cert, nil
|
||||
} else {
|
||||
return res.Cert, trace.Errorf(res.Err)
|
||||
}
|
||||
return body, nil
|
||||
}
|
||||
|
||||
type SSHLoginCredentials struct {
|
||||
|
@ -61,22 +55,3 @@ type SSHLoginCredentials struct {
|
|||
PubKey []byte
|
||||
TTL time.Duration
|
||||
}
|
||||
|
||||
type SSHLoginResponse struct {
|
||||
Cert []byte
|
||||
Err string
|
||||
}
|
||||
|
||||
func sshLoginResponse(cert []byte, e error) (jsonResponse []byte) {
|
||||
res := SSHLoginResponse{
|
||||
Cert: cert,
|
||||
}
|
||||
if e != nil {
|
||||
res.Err = e.Error()
|
||||
}
|
||||
resJSON, err := json.Marshal(res)
|
||||
if err != nil {
|
||||
log.Errorf(err.Error())
|
||||
}
|
||||
return resJSON
|
||||
}
|
||||
|
|
|
@ -46,8 +46,8 @@ func (cmd *Command) AgentLogin(agentAddr string, proxyAddr string, ttl time.Dura
|
|||
}
|
||||
|
||||
func (cmd *Command) AgentStart(agentAddr string, apiAddr string) {
|
||||
agent := teleagent.TeleAgent{}
|
||||
apiServer := teleagent.NewAgentAPIServer(&agent)
|
||||
agent := teleagent.NewTeleAgent()
|
||||
apiServer := teleagent.NewAgentAPIServer(agent)
|
||||
if err := agent.Start(agentAddr); err != nil {
|
||||
cmd.printError(trace.Wrap(err))
|
||||
return
|
||||
|
|
|
@ -157,8 +157,8 @@ func (s *TeleagentSuite) TestTeleagent(c *C) {
|
|||
agentAddr := "unix://" + filepath.Join(dir, "agent.sock")
|
||||
agentAPIAddr := "unix://" + filepath.Join(dir, "api.sock")
|
||||
|
||||
agent := teleagent.TeleAgent{}
|
||||
apiServer := teleagent.NewAgentAPIServer(&agent)
|
||||
agent := teleagent.NewTeleAgent()
|
||||
apiServer := teleagent.NewAgentAPIServer(agent)
|
||||
c.Assert(agent.Start(agentAddr), IsNil)
|
||||
|
||||
go func() {
|
||||
|
|
Loading…
Reference in a new issue