- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for iamLogIf (0.04 sec)
-
cmd/iam.go
authZInit bool ) stsTLSConfig, err := xtls.Lookup(s[config.IdentityTLSSubSys][config.Default]) if err != nil { iamLogIf(ctx, fmt.Errorf("Unable to initialize X.509/TLS STS API: %w", err), logger.WarningKind) } else { if stsTLSConfig.InsecureSkipVerify { iamLogIf(ctx, fmt.Errorf("Enabling %s is not recommended in a production environment", xtls.EnvIdentityTLSSkipVerify), logger.WarningKind) } sys.Lock()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
cmd/logging.go
logger.LogOnceIf(ctx, "replication", err, id, errKind...) } func iamLogOnceIf(ctx context.Context, err error, id string, errKind ...any) { logger.LogOnceIf(ctx, "iam", err, id, errKind...) } func iamLogIf(ctx context.Context, err error, errKind ...any) { if !errors.Is(err, grid.ErrDisconnected) { logger.LogIf(ctx, "iam", err, errKind...) } } func iamLogEvent(ctx context.Context, msg string, args ...any) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6.8K bytes - Viewed (0) -
cmd/iam-object-store.go
userName := path.Dir(item) // loadUser() will delete expired user during the load. err := iamOS.loadUser(ctx, userName, stsUser, stsAccountsFromStore) if err != nil && !errors.Is(err, errNoSuchUser) { iamLogIf(ctx, err) } // No need to return errors for failed expiration of STS users } // Loading the STS policy mappings from disk ensures that stale entries
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 26.6K bytes - Viewed (0) -
cmd/iam-etcd-store.go
if !ok { time.Sleep(1 * time.Second) // Upon an error on watch channel // re-init the watch channel. goto outerLoop } if err := watchResp.Err(); err != nil { iamLogIf(ctx, err) // log and retry. time.Sleep(1 * time.Second) // Upon an error on watch channel // re-init the watch channel. goto outerLoop }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 13.9K bytes - Viewed (0) -
cmd/admin-handlers-users.go
iamLogIf(ctx, err) } else if foundGroupDN == nil || !underBaseDN { err = errNoSuchGroup } else { entityName = foundGroupDN.NormDN } } else { var foundUserDN *xldap.DNSearchResult if foundUserDN, err = globalIAMSys.LDAPConfig.GetValidatedDNForUsername(entityName); err != nil { iamLogIf(ctx, err) } else if foundUserDN == nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/site-replication.go
iamLogIf(ctx, err) } else if foundGroupDN == nil || !underBaseDN { return wrapSRErr(errNoSuchGroup) } entityName = foundGroupDN.NormDN } else { var foundUserDN *xldap.DNSearchResult if foundUserDN, err = globalIAMSys.LDAPConfig.GetValidatedDNForUsername(entityName); err != nil { iamLogIf(ctx, err) } else if foundUserDN == nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (0) -
cmd/iam-store.go
store.deleteMappedPolicy(ctx, user, userType, false) cache.iamUserPolicyMap.Delete(user) // we are only logging errors, not handling them. err := store.deleteUserIdentity(ctx, user, userType) iamLogIf(GlobalContext, err) if userType == stsUser { delete(cache.iamSTSAccountsMap, user) } delete(cache.iamUsersMap, user) if store.group != nil { store.group.Forget(user) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 86.7K bytes - Viewed (0)