Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for LookupUser (0.19 sec)

  1. internal/config/identity/openid/provider/provider.go

    // looking up users, fetching additional attributes etc.
    type Provider interface {
    	LoginWithUser(username, password string) error
    	LoginWithClientID(clientID, clientSecret string) error
    	LookupUser(userid string) (User, error)
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 2.7K bytes
    - Viewed (0)
  2. internal/config/identity/openid/provider/keycloak.go

    	if err = json.NewDecoder(resp.Body).Decode(&accessToken); err != nil {
    		return err
    	}
    
    	k.Lock()
    	k.accessToken = accessToken
    	k.Unlock()
    	return nil
    }
    
    // LookupUser lookup user by their userid.
    func (k *KeycloakProvider) LookupUser(userid string) (User, error) {
    	req, err := http.NewRequest(http.MethodGet, k.adminURL, nil)
    	if err != nil {
    		return User{}, err
    	}
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Fri Apr 29 01:27:09 GMT 2022
    - 4.6K bytes
    - Viewed (0)
  3. internal/config/identity/openid/openid.go

    	}
    	return pCfg.ClaimPrefix + pCfg.ClaimName
    }
    
    // LookupUser lookup userid for the provider
    func (r Config) LookupUser(roleArn, userid string) (provider.User, error) {
    	// Can safely ignore error here as empty or invalid ARNs will not be
    	// mapped.
    	arnVal, _ := arn.Parse(roleArn)
    	pCfg, ok := r.arnProviderCfgsMap[arnVal]
    	if ok {
    		user, err := pCfg.provider.LookupUser(userid)
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Nov 16 04:42:31 GMT 2023
    - 16.5K bytes
    - Viewed (0)
  4. cmd/iam.go

    		if len(roleArns) == 0 {
    			iamLogIf(GlobalContext,
    				fmt.Errorf("parentUser: %s had no roleArns mapped!", parentUser))
    			continue
    		}
    		roleArn = roleArns[0]
    		u, err := sys.OpenIDConfig.LookupUser(roleArn, puInfo.subClaimValue)
    		if err != nil {
    			iamLogIf(GlobalContext, err)
    			continue
    		}
    		// If user is set to "disabled", we will remove them
    		// subsequently.
    		if !u.Enabled {
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 25 21:28:16 GMT 2024
    - 71.1K bytes
    - Viewed (1)
Back to top