Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for lookupUser (0.42 sec)

  1. internal/config/identity/openid/openid.go

    	}
    	return pCfg.ClaimPrefix + pCfg.ClaimName
    }
    
    // LookupUser lookup userid for the provider
    func (r Config) LookupUser(roleArn, userid string) (provider.User, error) {
    	// Can safely ignore error here as empty or invalid ARNs will not be
    	// mapped.
    	arnVal, _ := arn.Parse(roleArn)
    	pCfg, ok := r.arnProviderCfgsMap[arnVal]
    	if ok {
    		user, err := pCfg.provider.LookupUser(userid)
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 16.5K bytes
    - Viewed (0)
  2. src/os/user/cgo_lookup_unix.go

    package user
    
    import (
    	"fmt"
    	"runtime"
    	"strconv"
    	"strings"
    	"syscall"
    	"unsafe"
    )
    
    func current() (*User, error) {
    	return lookupUnixUid(syscall.Getuid())
    }
    
    func lookupUser(username string) (*User, error) {
    	var pwd _C_struct_passwd
    	var found bool
    	nameC := make([]byte, len(username)+1)
    	copy(nameC, username)
    
    	err := retryWithBuffer(userBuffer, func(buf []byte) syscall.Errno {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Jun 11 17:08:14 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  3. cmd/iam.go

    		if len(roleArns) == 0 {
    			iamLogIf(GlobalContext,
    				fmt.Errorf("parentUser: %s had no roleArns mapped!", parentUser))
    			continue
    		}
    		roleArn = roleArns[0]
    		u, err := sys.OpenIDConfig.LookupUser(roleArn, puInfo.subClaimValue)
    		if err != nil {
    			iamLogIf(GlobalContext, err)
    			continue
    		}
    		// If user is set to "disabled", we will remove them
    		// subsequently.
    		if !u.Enabled {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 71.9K bytes
    - Viewed (0)
Back to top