- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for lookupUser (0.12 sec)
-
src/os/user/lookup_unix_test.go
if tt.uid == "" { if err == nil { t.Errorf("lookupUser(%s): got nil error, expected err", tt.uid) continue } switch terr := err.(type) { case UnknownUserError: if want := "user: unknown user " + tt.name; terr.Error() != want { t.Errorf("lookupUser(%s): got %v, want %v", tt.name, terr, want) } default: t.Errorf("lookupUser(%s): got unexpected error %v", tt.name, terr) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Nov 11 04:31:34 UTC 2022 - 7.3K bytes - Viewed (0) -
internal/config/identity/openid/provider/provider.go
// looking up users, fetching additional attributes etc. type Provider interface { LoginWithUser(username, password string) error LoginWithClientID(clientID, clientSecret string) error LookupUser(userid string) (User, error)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 2.7K bytes - Viewed (0) -
src/os/user/lookup_plan9.go
} uname := string(ubytes) u := &User{ Uid: uname, Gid: uname, Username: uname, Name: uname, HomeDir: os.Getenv("home"), } return u, nil } func lookupUser(username string) (*User, error) { return nil, syscall.EPLAN9 } func lookupUserId(uid string) (*User, error) { return nil, syscall.EPLAN9 } func lookupGroup(groupname string) (*Group, error) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Dec 07 16:09:09 UTC 2022 - 1.3K bytes - Viewed (0) -
src/os/user/lookup.go
// returned error is of type [UnknownUserError]. func Lookup(username string) (*User, error) { if u, err := Current(); err == nil && u.Username == username { return u, err } return lookupUser(username) } // LookupId looks up a user by userid. If the user cannot be found, the // returned error is of type [UnknownUserIdError]. func LookupId(uid string) (*User, error) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:33:12 UTC 2024 - 1.8K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
} return pCfg.ClaimPrefix + pCfg.ClaimName } // LookupUser lookup userid for the provider func (r Config) LookupUser(roleArn, userid string) (provider.User, error) { // Can safely ignore error here as empty or invalid ARNs will not be // mapped. arnVal, _ := arn.Parse(roleArn) pCfg, ok := r.arnProviderCfgsMap[arnVal] if ok { user, err := pCfg.provider.LookupUser(userid)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 16.5K bytes - Viewed (0) -
src/os/user/cgo_lookup_unix.go
package user import ( "fmt" "runtime" "strconv" "strings" "syscall" "unsafe" ) func current() (*User, error) { return lookupUnixUid(syscall.Getuid()) } func lookupUser(username string) (*User, error) { var pwd _C_struct_passwd var found bool nameC := make([]byte, len(username)+1) copy(nameC, username) err := retryWithBuffer(userBuffer, func(buf []byte) syscall.Errno {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 11 17:08:14 UTC 2024 - 5.2K bytes - Viewed (0) -
src/os/user/lookup_unix.go
} func lookupGroupId(id string) (*Group, error) { f, err := os.Open(groupFile) if err != nil { return nil, err } defer f.Close() return findGroupId(id, f) } func lookupUser(username string) (*User, error) { f, err := os.Open(userFile) if err != nil { return nil, err } defer f.Close() return findUsername(username, f) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Apr 07 23:34:21 UTC 2023 - 6K bytes - Viewed (0) -
src/os/user/lookup_windows.go
dir, e = getProfilesDirectory() if e != nil { return nil, e } dir += `\` + username } return newUser(uid, gid, dir, username, domain) } func lookupUser(username string) (*User, error) { sid, _, t, e := syscall.LookupSID("", username) if e != nil { return nil, e } if t != syscall.SidTypeUser {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Sep 12 16:42:41 UTC 2023 - 11.8K bytes - Viewed (0) -
cmd/iam.go
if len(roleArns) == 0 { iamLogIf(GlobalContext, fmt.Errorf("parentUser: %s had no roleArns mapped!", parentUser)) continue } roleArn = roleArns[0] u, err := sys.OpenIDConfig.LookupUser(roleArn, puInfo.subClaimValue) if err != nil { iamLogIf(GlobalContext, err) continue } // If user is set to "disabled", we will remove them // subsequently. if !u.Enabled {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 22:26:38 UTC 2024 - 71.9K bytes - Viewed (0)