- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 11 for normalize (0.37 sec)
-
internal/event/target/kafka_scram_client_contrib.go
type XDGSCRAMClient struct { *scram.Client *scram.ClientConversation scram.HashGeneratorFcn } // Begin constructs a SCRAM client component based on a given hash.Hash // factory receiver. This constructor will normalize the username, password // and authzID via the SASLprep algorithm, as recommended by RFC-5802. If // SASLprep fails, the method returns an error. func (x *XDGSCRAMClient) Begin(userName, password, authzID string) (err error) {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Nov 09 04:04:01 GMT 2023 - 3.2K bytes - Viewed (0) -
internal/logger/target/kafka/kafka_scram_client_contrib.go
type XDGSCRAMClient struct { *scram.Client *scram.ClientConversation scram.HashGeneratorFcn } // Begin constructs a SCRAM client component based on a given hash.Hash // factory receiver. This constructor will normalize the username, password // and authzID via the SASLprep algorithm, as recommended by RFC-5802. If // SASLprep fails, the method returns an error. func (x *XDGSCRAMClient) Begin(userName, password, authzID string) (err error) {
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Nov 09 04:04:01 GMT 2023 - 3.3K bytes - Viewed (1) -
internal/config/identity/ldap/ldap.go
// server is canonical. Additionally, the attribute type names in the DN are // lower-cased. // // Return values: // // If the DN is found, the normalized (string) value is returned and error is // nil. // // If the DN is not found, the string returned is empty and the error is nil. // // The returned boolean is true iff the DN is found under one of the LDAP
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 9.9K bytes - Viewed (0) -
cmd/utils.go
} ep = ep[1:] } return ep } // unescapeGeneric is similar to url.PathUnescape or url.QueryUnescape // depending on input, additionally also handles situations such as // `//` are normalized as `/`, also removes any `/` prefix before // returning. func unescapeGeneric(p string, escapeFn func(string) (string, error)) (string, error) { ep, err := escapeFn(p) if err != nil { return "", err }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Wed Apr 24 04:08:47 GMT 2024 - 31.3K bytes - Viewed (0) -
cmd/admin-handlers-users.go
return } } userType := regUser if globalIAMSys.GetUsersSysType() == LDAPUsersSysType { userType = stsUser // Validate that the user or group exists in LDAP and use the normalized // form of the entityName (which will be an LDAP DN). var err error if isGroup { var foundGroupDN string var underBaseDN bool
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 77.3K bytes - Viewed (0) -
internal/event/target/postgresql.go
// check for quoted string (string may not contain a quote) if match, err := regexp.MatchString("^\"[^\"]+\"$", name); err != nil { return err } else if match { return nil } // normalize the name to letters, digits, _ or $ valid := true cleaned := strings.Map(func(r rune) rune { switch { case unicode.IsLetter(r): return 'a' case unicode.IsDigit(r): return '0'
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Wed Apr 24 17:51:07 GMT 2024 - 13.3K bytes - Viewed (0) -
cmd/iam.go
// Log and continue error - perhaps it'll work the next time. iamLogIf(GlobalContext, err) } } } } // NormalizeLDAPAccessKeypairs - normalize the access key pairs (service // accounts) for LDAP users. This normalizes the parent user and the group names // whenever the parent user parses validly as a DN.
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 71.1K bytes - Viewed (1) -
cmd/site-replication.go
// use the normalized form of the entityName (which will be an LDAP DN). userType := IAMUserType(mapping.UserType) isGroup := mapping.IsGroup entityName := mapping.UserOrGroup if globalIAMSys.GetUsersSysType() == LDAPUsersSysType && userType == stsUser { // Validate that the user or group exists in LDAP and use the normalized // form of the entityName (which will be an LDAP DN).
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 184.1K bytes - Viewed (1) -
cmd/sts-handlers_test.go
suite.TestLDAPSTSServiceAccountsWithGroups(c) suite.TearDownSuite(c) }, ) } } // This test is for a fix added to handle non-normalized base DN values in the // LDAP configuration. It runs the existing LDAP sub-tests with a non-normalized // LDAP configuration. func TestIAMWithLDAPNonNormalizedBaseDNConfigServerSuite(t *testing.T) { for i, testCase := range iamTestSuites { t.Run(
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 85.7K bytes - Viewed (0) -
internal/s3select/parquet/reader.go
} case int64: value = val if logicalType := se.GetLogicalType(); logicalType != nil { if ts := logicalType.GetTIMESTAMP(); ts != nil { var duration time.Duration // Only support UTC normalized timestamps. if ts.IsAdjustedToUTC { switch { case ts.Unit.IsSetNANOS(): duration = time.Duration(val) * time.Nanosecond case ts.Unit.IsSetMILLIS():
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 14 13:54:47 GMT 2022 - 4.5K bytes - Viewed (0)