- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 127 for usar (0.01 sec)
-
cmd/user-provider-utils.go
// getUserWithProvider - returns the appropriate internal username based on the user provider. // if validate is true, an error is returned if the user does not exist. func getUserWithProvider(ctx context.Context, userProvider, user string, validate bool) (string, error) { switch userProvider { case madmin.BuiltinProvider: if validate { if _, ok := globalIAMSys.GetUser(ctx, user); !ok { return "", errNoSuchUser } } return user, nil
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
.bazelrc
# workers: build:rbe_base --remote_download_toplevel test:rbe_base --test_env=USER=anon # TODO(kanglan): Check if we want to merge rbe_linux into rbe_linux_cpu. build:rbe_linux --config=rbe_base build:rbe_linux --action_env=PATH="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/go/bin" # Non-rbe settings we should include because we do not run configure build:rbe_linux --config=avx_linux
Registered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Fri Aug 22 21:03:34 UTC 2025 - 56K bytes - Viewed (0) -
docs/bigdata/README.md
Follow these steps to run the Spark Pi example: - Login as user **‘spark’**. - When the job runs, the library can now use **MinIO** during intermediate processing. - Navigate to a node with the Spark client and access the spark2-client directory: ``` cd /usr/hdp/current/spark2-client su spark ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 14.7K bytes - Viewed (0) -
docs/multi-user/README.md
``` ### 4. Disable user Disable user `newuser`. ``` mc admin user disable myminio newuser ``` Disable group `newgroup`. ``` mc admin group disable myminio newgroup ``` ### 5. Remove user Remove the user `newuser`. ``` mc admin user remove myminio newuser ``` Remove the user `newuser` from a group. ```
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.2K bytes - Viewed (0) -
tests/update_test.go
} else { CheckUser(t, result2, *user) } if err := DB.Model(user).Updates(User{Age: 2}).Error; err != nil { t.Errorf("errors happened when update: %v", err) } else if user.Age != 2 { t.Errorf("Age should equals to 2, but got %v", user.Age) } checkUpdatedAtChanged("Updates with struct", user.UpdatedAt) checkOtherData("Updates with struct") var result3 UserRegistered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Mon Jul 21 02:46:58 UTC 2025 - 30.4K bytes - Viewed (0) -
schema/relationship_test.go
type User struct { ID int32 `gorm:"primaryKey"` Name string CreatorID *int32 Creator *User } checkStructRelation(t, &User{}, Relation{ Name: "Creator", Type: schema.BelongsTo, Schema: "User", FieldSchema: "User", References: []Reference{{"ID", "User", "CreatorID", "User", "", false}}, }) } func TestSelfReferentialBelongsToOverrideReferences(t *testing.T) { type User struct {Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Mon Aug 18 11:44:52 UTC 2025 - 26.5K bytes - Viewed (0) -
tests/delete_test.go
} } for _, user := range []User{users[0], users[2]} { result = User{} if err := DB.Where("id = ?", user.ID).First(&result).Error; err != nil { t.Errorf("no error should returns when query %v, but got %v", user.ID, err) } } if err := DB.Delete(&users[0]).Error; err != nil { t.Errorf("errors happened when delete: %v", err) }
Registered: Sun Sep 07 09:35:13 UTC 2025 - Last Modified: Mon Jul 21 02:46:58 UTC 2025 - 9.5K bytes - Viewed (0) -
cmd/iam-store.go
cache.iamUserPolicyMap.Delete(user) // we are only logging errors, not handling them. err := store.deleteUserIdentity(ctx, user, userType) iamLogIf(GlobalContext, err) if userType == stsUser { delete(cache.iamSTSAccountsMap, user) } delete(cache.iamUsersMap, user) if store.group != nil { store.group.Forget(user) } deleted = true } }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 86.7K bytes - Viewed (0) -
cmd/iam.go
// // - inherited from parent - this is the case for AssumeRole API, where the // parent user is an actual real user with their own (permanent) credentials and // policy association. // // - inherited from "virtual" parent - this is the case for AssumeRoleWithLDAP // where the parent user is the DN of the actual LDAP user. The parent user // itself cannot login, but the policy associated with them determines the base
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// In case of LDAP/OIDC we need to set `opts.claims` to ensure // it is associated with the LDAP/OIDC user properly. for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else { // We still need to ensure that the target user is a valid LDAP user. // // The target user may be supplied as a (short) username or a DN.Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0)