- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for LookupUser (0.19 sec)
-
internal/config/identity/openid/provider/provider.go
// looking up users, fetching additional attributes etc. type Provider interface { LoginWithUser(username, password string) error LoginWithClientID(clientID, clientSecret string) error LookupUser(userid string) (User, error)
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 2.7K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
if err = json.NewDecoder(resp.Body).Decode(&accessToken); err != nil { return err } k.Lock() k.accessToken = accessToken k.Unlock() return nil } // LookupUser lookup user by their userid. func (k *KeycloakProvider) LookupUser(userid string) (User, error) { req, err := http.NewRequest(http.MethodGet, k.adminURL, nil) if err != nil { return User{}, err }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Apr 29 01:27:09 GMT 2022 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
} return pCfg.ClaimPrefix + pCfg.ClaimName } // LookupUser lookup userid for the provider func (r Config) LookupUser(roleArn, userid string) (provider.User, error) { // Can safely ignore error here as empty or invalid ARNs will not be // mapped. arnVal, _ := arn.Parse(roleArn) pCfg, ok := r.arnProviderCfgsMap[arnVal] if ok { user, err := pCfg.provider.LookupUser(userid)
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 16.5K bytes - Viewed (0) -
cmd/iam.go
if len(roleArns) == 0 { iamLogIf(GlobalContext, fmt.Errorf("parentUser: %s had no roleArns mapped!", parentUser)) continue } roleArn = roleArns[0] u, err := sys.OpenIDConfig.LookupUser(roleArn, puInfo.subClaimValue) if err != nil { iamLogIf(GlobalContext, err) continue } // If user is set to "disabled", we will remove them // subsequently. if !u.Enabled {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 71.1K bytes - Viewed (1)