- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for lookupUser (0.42 sec)
-
internal/config/identity/openid/openid.go
} return pCfg.ClaimPrefix + pCfg.ClaimName } // LookupUser lookup userid for the provider func (r Config) LookupUser(roleArn, userid string) (provider.User, error) { // Can safely ignore error here as empty or invalid ARNs will not be // mapped. arnVal, _ := arn.Parse(roleArn) pCfg, ok := r.arnProviderCfgsMap[arnVal] if ok { user, err := pCfg.provider.LookupUser(userid)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 16.5K bytes - Viewed (0) -
src/os/user/cgo_lookup_unix.go
package user import ( "fmt" "runtime" "strconv" "strings" "syscall" "unsafe" ) func current() (*User, error) { return lookupUnixUid(syscall.Getuid()) } func lookupUser(username string) (*User, error) { var pwd _C_struct_passwd var found bool nameC := make([]byte, len(username)+1) copy(nameC, username) err := retryWithBuffer(userBuffer, func(buf []byte) syscall.Errno {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Jun 11 17:08:14 UTC 2024 - 5.2K bytes - Viewed (0) -
cmd/iam.go
if len(roleArns) == 0 { iamLogIf(GlobalContext, fmt.Errorf("parentUser: %s had no roleArns mapped!", parentUser)) continue } roleArn = roleArns[0] u, err := sys.OpenIDConfig.LookupUser(roleArn, puInfo.subClaimValue) if err != nil { iamLogIf(GlobalContext, err) continue } // If user is set to "disabled", we will remove them // subsequently. if !u.Enabled {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 22:26:38 UTC 2024 - 71.9K bytes - Viewed (0)