Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 1,771 for useAbs (0.31 sec)

  1. pkg/kubelet/userns/userns_manager.go

    		return
    	}
    
    	if len(userNs.UIDMappings) != 1 {
    		err = fmt.Errorf("invalid user namespace configuration: no more than one mapping allowed.")
    		return
    	}
    
    	if len(userNs.UIDMappings) != len(userNs.GIDMappings) {
    		err = fmt.Errorf("invalid user namespace configuration: GID and UID mappings should be identical.")
    		return
    	}
    
    	if userNs.UIDMappings[0] != userNs.GIDMappings[0] {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Jun 04 06:25:43 UTC 2024
    - 14.3K bytes
    - Viewed (0)
  2. tests/update_test.go

    		t.Errorf("Failed to update users")
    	}
    
    	if users[0].Name != "updates_01_newname" || users[0].Age != 100 {
    		t.Errorf("Record should be updated also with map")
    	}
    
    	if users[0].UpdatedAt.UnixNano() == lastUpdatedAt.UnixNano() {
    Registered: Wed Jun 12 16:27:09 UTC 2024
    - Last Modified: Mon Dec 04 03:50:58 UTC 2023
    - 30.3K bytes
    - Viewed (0)
  3. docs/sts/ldap.md

    **Please note that when AD/LDAP is configured, MinIO will not support long term users defined internally.** Only AD/LDAP users (and the root user) are allowed. In addition to this, the server will not support operations on users or groups using `mc admin user` or `mc admin group` commands except `mc admin user info` and `mc admin group info` to list set policies for users and groups. This is because users and groups are defined externally in AD/LDAP.
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 18.9K bytes
    - Viewed (0)
  4. chainable_api.go

    		}
    	}
    	return
    }
    
    // Limit specify the number of records to be retrieved
    //
    // Limit conditions can be cancelled by using `Limit(-1)`.
    //
    //	// retrieve 3 users
    //	db.Limit(3).Find(&users)
    //	// retrieve 3 users into users1, and all users into users2
    //	db.Limit(3).Find(&users1).Limit(-1).Find(&users2)
    func (db *DB) Limit(limit int) (tx *DB) {
    	tx = db.getInstance()
    	tx.Statement.AddClause(clause.Limit{Limit: &limit})
    Registered: Wed Jun 12 16:27:09 UTC 2024
    - Last Modified: Wed Jun 12 09:47:34 UTC 2024
    - 14.5K bytes
    - Viewed (0)
  5. tests/joins_test.go

    	} else if len(users2) != len(users) {
    		t.Fatalf("Failed to load join users, got: %v, expect: %v", len(users2), len(users))
    	}
    
    	sort.Slice(users2, func(i, j int) bool {
    		return users2[i].ID > users2[j].ID
    	})
    
    	sort.Slice(users, func(i, j int) bool {
    		return users[i].ID > users[j].ID
    	})
    
    	for idx, user := range users {
    		// user
    		CheckUser(t, user, users2[idx])
    Registered: Wed Jun 12 16:27:09 UTC 2024
    - Last Modified: Wed Jun 12 10:52:33 UTC 2024
    - 15K bytes
    - Viewed (0)
  6. tests/create_test.go

    	}
    
    	result := DB.CreateInBatches(&users, 2)
    	if result.RowsAffected != int64(len(users)) {
    		t.Errorf("affected rows should be %v, but got %v", len(users), result.RowsAffected)
    	}
    
    	for _, user := range users {
    		if user.ID == 0 {
    			t.Fatalf("failed to fill user's ID, got %v", user.ID)
    		} else {
    			var newUser User
    Registered: Wed Jun 12 16:27:09 UTC 2024
    - Last Modified: Tue Mar 19 03:50:28 UTC 2024
    - 26.4K bytes
    - Viewed (0)
  7. src/syscall/security_windows.go

    // The system creates an access token when a user logs on, and every
    // process executed on behalf of the user has a copy of the token.
    // The token identifies the user, the user's groups, and the user's
    // privileges. The system uses the token to control access to securable
    // objects and to control the ability of the user to perform various
    // system-related operations on the local computer.
    type Token Handle
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Sep 12 16:42:41 UTC 2023
    - 10K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/simple-oauth2.md

    After authenticating in the system, you will see it like:
    
    <img src="/img/tutorial/security/image05.png">
    
    ### Get your own user data
    
    Now use the operation `GET` with the path `/users/me`.
    
    You will get your user's data, like:
    
    ```JSON
    {
      "username": "johndoe",
      "email": "******@****.***",
      "full_name": "John Doe",
      "disabled": false,
      "hashed_password": "fakehashedsecret"
    }
    ```
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Thu Apr 18 19:53:19 UTC 2024
    - 12.5K bytes
    - Viewed (0)
  9. LICENSE

    linked with it, is called a "work that uses the Library".  Such a
    work, in isolation, is not a derivative work of the Library, and
    therefore falls outside the scope of this License.
    
      However, linking a "work that uses the Library" with the Library
    creates an executable that is a derivative of the Library (because it
    contains portions of the Library), rather than a "work that uses the
    Registered: Wed Jun 12 15:45:55 UTC 2024
    - Last Modified: Mon Jan 18 20:25:38 UTC 2016
    - 25.8K bytes
    - Viewed (0)
  10. guava/src/com/google/common/collect/Ordering.java

    /**
     * A comparator, with additional methods to support common operations. This is an "enriched" version
     * of {@code Comparator} for pre-Java-8 users, in the same sense that {@link FluentIterable} is an
     * enriched {@link Iterable} for pre-Java-8 users.
     *
     * <h3>Three types of methods</h3>
     *
     * Like other fluent types, there are three types of methods present: methods for <i>acquiring</i>,
    Registered: Wed Jun 12 16:38:11 UTC 2024
    - Last Modified: Tue May 28 18:11:09 UTC 2024
    - 39.4K bytes
    - Viewed (0)
Back to top