- Sort Score
- Num 10 results
- Language All
Results 1 - 5 of 5 for parentuser (0.12 seconds)
-
cmd/iam.go
for parentUser, info := range parentUsers { if !sys.LDAPConfig.IsLDAPUserDN(parentUser) { continue } if info.subClaimValue != "" { // we need to ask LDAP about the actual user DN not normalized DN. allDistNames = append(allDistNames, info.subClaimValue) } else { allDistNames = append(allDistNames, parentUser) } }Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 76.5K bytes - Click Count (0) -
cmd/admin-handlers-users.go
IsOwner: owner, Claims: cred.Claims, }) if !adminPrivilege { parentUser := cred.AccessKey if cred.ParentUser != "" { parentUser = cred.ParentUser } if svcAccount.ParentUser != "" && parentUser != svcAccount.ParentUser { // The service account belongs to another user but return not // found error to mitigate brute force attacks. or theCreated: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 90.6K bytes - Click Count (0) -
cmd/iam-store.go
defer store.unlock() accessKey := cred.AccessKey parentUser := cred.ParentUser // Found newly requested service account, to be an existing account - // reject such operation (updates to the service account are handled in // a different API). if su, found := cache.iamUsersMap[accessKey]; found { scred := su.Credentials if scred.ParentUser != parentUser {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 87.1K bytes - Click Count (0) -
cmd/batch-handlers.go
if err != nil { writeErrorResponseJSON(ctx, w, toAPIError(ctx, err), r.URL) return } user := creds.AccessKey if creds.ParentUser != "" { user = creds.ParentUser } job := &BatchJobRequest{} if err = yaml.Unmarshal(buf, job); err != nil { writeErrorResponseJSON(ctx, w, toAPIError(ctx, err), r.URL) return }Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 63.5K bytes - Click Count (1) -
cmd/admin-handlers-users_test.go
infoResp, err := madmClient.InfoServiceAccount(ctx, svcAK) if err != nil { c.Fatalf("unable to get svc acc info: %v", err) } if !skipParentUserCheck { c.Assert(infoResp.ParentUser, parentAK) } c.Assert(infoResp.AccountStatus, "on") c.Assert(infoResp.ImpliedPolicy, true) } // This test assumes that the policy for `accessKey` allows listing on the given
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed Oct 15 17:00:45 GMT 2025 - 50.6K bytes - Click Count (0)