Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 151 for userIDs (0.07 sec)

  1. tests/generics_test.go

    		t.Fatalf("CreateInBatches failed: %v", err)
    	}
    
    	userIds := []uuid.UUID{}
    	if err := gorm.G[User](DB).Select("name").Where("id in ?", []uint{users[0].ID, users[1].ID, users[2].ID}).Order("age").Scan(ctx, &userIds); err != nil || len(users) != 3 {
    		t.Fatalf("Scan failed: %v, userids %v", err, userIds)
    	}
    
    Registered: Sun Sep 07 09:35:13 UTC 2025
    - Last Modified: Thu Sep 04 13:13:16 UTC 2025
    - 28K bytes
    - Viewed (0)
  2. cmd/admin-handlers-users.go

    	if s3Err != ErrNone {
    		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL)
    		return
    	}
    
    	users := r.Form["users"]
    	isAll := r.Form.Get("all") == "true"
    	selfOnly := !isAll && len(users) == 0
    
    	if isAll && len(users) > 0 {
    		// This should be checked on client side, so return generic error
    		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
  3. cmd/admin-handlers-users-race_test.go

    				if err != nil {
    					return err
    				}
    				c.mustNotListObjects(ctx, uClient, bucket)
    				return nil
    			}
    		}(i), i)
    	}
    	if errs := g.Wait(); len(errs) > 0 {
    		c.Fatalf("unable to remove users: %v", errs)
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4K bytes
    - Viewed (0)
  4. docs/sts/ldap.md

    **Please note that when AD/LDAP is configured, MinIO will not support long term users defined internally.** Only AD/LDAP users (and the root user) are allowed. In addition to this, the server will not support operations on users or groups using `mc admin user` or `mc admin group` commands except `mc admin user info` and `mc admin group info` to list set policies for users and groups. This is because users and groups are defined externally in AD/LDAP.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  5. docs/en/docs/tutorial/security/simple-oauth2.md

    <img src="/img/tutorial/security/image05.png">
    
    ### Get your own user data { #get-your-own-user-data }
    
    Now use the operation `GET` with the path `/users/me`.
    
    You will get your user's data, like:
    
    ```JSON
    {
      "username": "johndoe",
      "email": "******@****.***",
      "full_name": "John Doe",
      "disabled": false,
      "hashed_password": "fakehashedsecret"
    }
    ```
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  6. docs/en/docs/tutorial/security/oauth2-jwt.md

    ### Why use password hashing { #why-use-password-hashing }
    
    If your database is stolen, the thief won't have your users' plaintext passwords, only the hashes.
    
    So, the thief won't be able to try to use that password in another system (as many users use the same password everywhere, this would be dangerous).
    
    ## Install `passlib` { #install-passlib }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  7. cmd/iam-store.go

    					return true
    				}
    			}
    			if pset.Contains(policy) {
    				users = append(users, u)
    			}
    			return true
    		})
    		cache.iamGroupPolicyMap.Range(func(g string, mp MappedPolicy) bool {
    			pset := mp.policySet()
    			if pset.Contains(policy) {
    				groups = append(groups, g)
    			}
    			return true
    		})
    		if len(users) != 0 || len(groups) != 0 {
    			return errPolicyInUse
    		}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 86.7K bytes
    - Viewed (0)
  8. docs/en/docs/tutorial/security/first-steps.md

    So, let's review it from that simplified point of view:
    
    * The user types the `username` and `password` in the frontend, and hits `Enter`.
    * The frontend (running in the user's browser) sends that `username` and `password` to a specific URL in our API (declared with `tokenUrl="token"`).
    * The API checks that `username` and `password`, and responds with a "token" (we haven't implemented any of this yet).
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 8.4K bytes
    - Viewed (0)
  9. cmd/iam-object-store.go

    	return u, nil
    }
    
    func (iamOS *IAMObjectStore) loadUserConcurrent(ctx context.Context, userType IAMUserType, users ...string) ([]UserIdentity, error) {
    	userIdentities := make([]UserIdentity, len(users))
    	g := errgroup.WithNErrs(len(users))
    
    	for index := range users {
    		g.Go(func() error {
    			userName := path.Dir(users[index])
    			user, err := iamOS.loadUserIdentity(ctx, userName, userType)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 26.6K bytes
    - Viewed (0)
  10. cmd/admin-handlers-idp-ldap.go

    		return
    	}
    
    	dnList := r.Form["userDNs"]
    	isAll := r.Form.Get("all") == "true"
    	selfOnly := !isAll && len(dnList) == 0
    
    	if isAll && len(dnList) > 0 {
    		// This should be checked on client side, so return generic error
    		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL)
    		return
    	}
    
    	// Empty DN list and not self, list access keys for all users
    	if isAll {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
Back to top