Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for roleArns (0.04 sec)

  1. cmd/iam.go

    		// the roleARNs to check if the user still exists. If they don't
    		// we can safely remove credentials for this parent user
    		// associated with any of the provider configurations.
    		//
    		// If there is no roleARN mapped to the user, the user may be
    		// coming from a policy claim based openid provider.
    		roleArns := puInfo.roleArns.ToSlice()
    		var roleArn string
    		if len(roleArns) == 0 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  2. cmd/iam-store.go

    			subClaimValue = v
    		}
    
    		roleArn := openid.DummyRoleARN.String()
    		s, ok := claims.Lookup(roleArnClaim)
    		if ok {
    			roleArn = s
    		}
    		v, ok := res[cred.ParentUser]
    		if ok {
    			res[cred.ParentUser] = ParentUserInfo{
    				subClaimValue: subClaimValue,
    				roleArns:      v.roleArns.Union(set.CreateStringSet(roleArn)),
    			}
    		} else {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 86.7K bytes
    - Viewed (0)
  3. cmd/admin-handlers-users.go

    		for _, policy := range policy.DefaultPolicies {
    			if policy.Name == "consoleAdmin" {
    				effectivePolicy = policy.Definition
    				break
    			}
    		}
    
    	case roleArn != "":
    		_, policy, err := globalIAMSys.GetRolePolicy(roleArn)
    		if err != nil {
    			writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL)
    			return
    		}
    		policySlice := newMappedPolicy(policy).toSlice()
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
Back to top