- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for iamLogIf (0.08 sec)
-
cmd/iam.go
NewHTTPTransport(), xhttp.DrainBody, globalSite.Region()) if err != nil { iamLogIf(ctx, fmt.Errorf("Unable to initialize OpenID: %w", err), logger.WarningKind) } // Initialize if LDAP is enabled ldapConfig, err := xldap.Lookup(s, globalRootCAs) if err != nil { iamLogIf(ctx, fmt.Errorf("Unable to load LDAP configuration (LDAP configuration will be disabled!): %w", err), logger.WarningKind) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 29 16:01:48 UTC 2024 - 74.6K bytes - Viewed (0) -
cmd/logging.go
logger.LogOnceIf(ctx, "replication", err, id, errKind...) } func iamLogOnceIf(ctx context.Context, err error, id string, errKind ...interface{}) { logger.LogOnceIf(ctx, "iam", err, id, errKind...) } func iamLogIf(ctx context.Context, err error, errKind ...interface{}) { if !errors.Is(err, grid.ErrDisconnected) { logger.LogIf(ctx, "iam", err, errKind...) } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 03 18:49:48 UTC 2024 - 7.1K bytes - Viewed (0) -
cmd/iam-object-store.go
stsAccPoliciesFromStore := xsync.NewMapOf[string, MappedPolicy]() for _, item := range listedConfigItems[stsListKey] { userName := path.Dir(item) // loadUser() will delete expired user during the load. iamLogIf(ctx, iamOS.loadUser(ctx, userName, stsUser, stsAccountsFromStore)) // No need to return errors for failed expiration of STS users } // Loading the STS policy mappings from disk ensures that stale entries
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 23:40:37 UTC 2024 - 26.6K bytes - Viewed (0) -
cmd/iam-etcd-store.go
if !ok { time.Sleep(1 * time.Second) // Upon an error on watch channel // re-init the watch channel. goto outerLoop } if err := watchResp.Err(); err != nil { iamLogIf(ctx, err) // log and retry. time.Sleep(1 * time.Second) // Upon an error on watch channel // re-init the watch channel. goto outerLoop }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 01:29:20 UTC 2024 - 14K bytes - Viewed (0) -
cmd/admin-handlers-users.go
iamLogIf(ctx, err) } else if foundGroupDN == nil || !underBaseDN { err = errNoSuchGroup } entityName = foundGroupDN.NormDN } else { var foundUserDN *xldap.DNSearchResult if foundUserDN, err = globalIAMSys.LDAPConfig.GetValidatedDNForUsername(entityName); err != nil { iamLogIf(ctx, err) } else if foundUserDN == nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 03 23:11:02 UTC 2024 - 85.1K bytes - Viewed (0) -
cmd/iam-store.go
store.deleteMappedPolicy(ctx, user, userType, false) cache.iamUserPolicyMap.Delete(user) // we are only logging errors, not handling them. err := store.deleteUserIdentity(ctx, user, userType) iamLogIf(GlobalContext, err) if userType == stsUser { delete(cache.iamSTSAccountsMap, user) } delete(cache.iamUsersMap, user) if store.group != nil { store.group.Forget(user) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Oct 14 16:35:37 UTC 2024 - 83.2K bytes - Viewed (0) -
cmd/site-replication.go
iamLogIf(ctx, err) } else if foundGroupDN == nil || !underBaseDN { err = errNoSuchGroup } entityName = foundGroupDN.NormDN } else { var foundUserDN *xldap.DNSearchResult if foundUserDN, err = globalIAMSys.LDAPConfig.GetValidatedDNForUsername(entityName); err != nil { iamLogIf(ctx, err) } else if foundUserDN == nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 12:04:40 UTC 2024 - 185.1K bytes - Viewed (0)