Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for actualIds (0.2 sec)

  1. src/net/smtp/smtp_test.go

    		t.Fatalf("Bad data response: %s", err)
    	}
    
    	if err := c.Quit(); err != nil {
    		t.Fatalf("QUIT failed: %s", err)
    	}
    
    	bcmdbuf.Flush()
    	actualcmds := cmdbuf.String()
    	if client != actualcmds {
    		t.Fatalf("Got:\n%s\nExpected:\n%s", actualcmds, client)
    	}
    }
    
    var basicServer = `250 mx.google.com at your service
    502 Unrecognized command.
    250-mx.google.com at your service
    250-SIZE 35651584
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 18:42:28 UTC 2024
    - 28.5K bytes
    - Viewed (0)
  2. pilot/pkg/serviceregistry/kube/conversion_test.go

    	}
    
    	if ips[0] != ip {
    		t.Fatalf("service IP incorrect => %q, want %q", ips[0], ip)
    	}
    
    	actualIPs := service.ClusterVIPs.GetAddressesFor(clusterID)
    	expectedIPs := []string{ip}
    	if !reflect.DeepEqual(actualIPs, expectedIPs) {
    		t.Fatalf("service IPs incorrect => %q, want %q", actualIPs, expectedIPs)
    	}
    
    	if !reflect.DeepEqual(service.Attributes.LabelSelectors, localSvc.Spec.Selector) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu May 23 21:07:03 UTC 2024
    - 12.7K bytes
    - Viewed (0)
  3. internal/config/identity/ldap/ldap.go

    		errRet := fmt.Errorf("Unable to find user DN: %w", err)
    		return nil, nil, errRet
    	}
    
    	// Authenticate the user credentials.
    	err = conn.Bind(lookupResult.ActualDN, password)
    	if err != nil {
    		errRet := fmt.Errorf("LDAP auth failed for DN %s: %w", lookupResult.ActualDN, err)
    		return nil, nil, errRet
    	}
    
    	// Bind to the lookup user account again to perform group search.
    	if err = l.LDAP.LookupBind(conn); err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sat May 25 13:43:06 UTC 2024
    - 10.3K bytes
    - Viewed (1)
  4. staging/src/k8s.io/apimachinery/pkg/util/net/http_test.go

    				req.Header.Set("X-Forwarded-For", test.forwardedFor)
    			}
    			if test.realIP != "" {
    				req.Header.Set("X-Real-Ip", test.realIP)
    			}
    
    			actualIPs := SourceIPs(req)
    			actual := make([]string, len(actualIPs))
    			for i, ip := range actualIPs {
    				actual[i] = ip.String()
    			}
    
    			assert.Equal(t, test.expected, actual)
    		})
    	}
    }
    
    func TestParseWarningHeader(t *testing.T) {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Apr 18 01:21:56 UTC 2023
    - 24.5K bytes
    - Viewed (0)
  5. src/cmd/asm/internal/lex/input.go

    		in.peek = true
    		in.Push(NewSlice(in.Base(), in.Line(), []Token{Make(macroName, macro.name)}))
    		return
    	}
    	actuals := in.argsFor(macro)
    	var tokens []Token
    	for _, tok := range macro.tokens {
    		if tok.ScanToken != scanner.Ident {
    			tokens = append(tokens, tok)
    			continue
    		}
    		substitution := actuals[tok.text]
    		if substitution == nil {
    			tokens = append(tokens, tok)
    			continue
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 29 07:48:38 UTC 2023
    - 12.6K bytes
    - Viewed (0)
  6. cmd/admin-handlers-idp-ldap.go

    			}
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		targetUser = lookupResult.NormDN
    		opts.claims[ldapUser] = targetUser // DN
    		opts.claims[ldapActualUser] = lookupResult.ActualDN
    
    		// Check if this user or their groups have a policy applied.
    		ldapPolicies, err := globalIAMSys.PolicyDBGet(targetUser, targetGroups...)
    		if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 03 19:58:48 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  7. cmd/ftp-server-driver.go

    				return nil, err
    			}
    			claims := make(map[string]interface{})
    			claims[expClaim] = UTCNow().Add(expiryDur).Unix()
    
    			claims[ldapUser] = lookupResult.NormDN
    			claims[ldapActualUser] = lookupResult.ActualDN
    			claims[ldapUserN] = ctx.Sess.LoginUser()
    
    			// Add LDAP attributes that were looked up into the claims.
    			for attribKey, attribValue := range lookupResult.Attributes {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 03 15:45:54 UTC 2024
    - 14K bytes
    - Viewed (0)
  8. cmd/sts-handlers.go

    	if err != nil {
    		err = fmt.Errorf("LDAP server error: %w", err)
    		writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err)
    		return
    	}
    	ldapUserDN := lookupResult.NormDN
    	ldapActualUserDN := lookupResult.ActualDN
    
    	// Check if this user or their groups have a policy applied.
    	ldapPolicies, err := globalIAMSys.PolicyDBGet(ldapUserDN, groupDistNames...)
    	if err != nil {
    		writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err)
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue Jun 11 03:13:30 UTC 2024
    - 33.9K bytes
    - Viewed (0)
Back to top