- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 185 for users4 (0.09 sec)
-
tests/joins_test.go
CheckUser(t, user, users2[idx]) } } func TestJoinConds(t *testing.T) { user := *GetUser("joins-conds", Config{Account: true, Pets: 3}) DB.Save(&user) var users1 []User DB.Joins("inner join pets on pets.user_id = users.id").Where("users.name = ?", user.Name).Find(&users1) if len(users1) != 3 { t.Errorf("should find two users using left join, but got %v", len(users1)) } var users2 []User
Registered: Sun Oct 27 09:35:08 UTC 2024 - Last Modified: Mon Jun 17 03:58:13 UTC 2024 - 15K bytes - Viewed (0) -
tests/query_test.go
userQuery := "SELECT .*users.*id.*users.*created_at.*users.*updated_at.*users.*deleted_at.*users.*name" + ".*users.*age.*users.*birthday.*users.*company_id.*users.*manager_id.*users.*active.* FROM .*users.* " result := dryDB.Not(map[string]interface{}{"users.name": "jinzhu"}).Find(&User{}) if !regexp.MustCompile(userQuery + "WHERE .*users.*name.* <> .+").MatchString(result.Statement.SQL.String()) {
Registered: Sun Oct 27 09:35:08 UTC 2024 - Last Modified: Mon Jun 24 09:42:59 UTC 2024 - 50.4K bytes - Viewed (0) -
tests/preload_test.go
DB.Preload("Account", clause.Eq{Column: "number", Value: users[0].Account.Number}).Find(&users2, "id IN ?", userIDs) sort.Slice(users2, func(i, j int) bool { return users2[i].ID < users2[j].ID }) for idx, user := range users2[1:2] { if user.Account.Number != "" { t.Errorf("No account should found for user %v but got %v", idx+2, user.Account.Number) } } CheckUser(t, users2[0], users[0])
Registered: Sun Oct 27 09:35:08 UTC 2024 - Last Modified: Wed Jun 12 10:00:47 UTC 2024 - 15.9K bytes - Viewed (0) -
chainable_api.go
} // Limit specify the number of records to be retrieved // // Limit conditions can be cancelled by using `Limit(-1)`. // // // retrieve 3 users // db.Limit(3).Find(&users) // // retrieve 3 users into users1, and all users into users2 // db.Limit(3).Find(&users1).Limit(-1).Find(&users2) func (db *DB) Limit(limit int) (tx *DB) { tx = db.getInstance() tx.Statement.AddClause(clause.Limit{Limit: &limit}) return }
Registered: Sun Oct 27 09:35:08 UTC 2024 - Last Modified: Mon Jun 24 09:42:59 UTC 2024 - 14.8K bytes - Viewed (0) -
cmd/admin-handlers-users.go
return } for user := range users { checkedUserList = append(checkedUserList, user) } checkedUserList = append(checkedUserList, globalActiveCred.AccessKey) } else { for _, user := range users { // Validate the user _, ok := globalIAMSys.GetUser(ctx, user) if !ok { continue } checkedUserList = append(checkedUserList, user) } }
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Thu Oct 03 23:11:02 UTC 2024 - 85.1K bytes - Viewed (0) -
cmd/admin-handlers-users-race_test.go
accessKey, secretKey := mustGenerateCredentials(c) err = s.adm.SetUser(ctx, accessKey, secretKey, madmin.AccountEnabled) if err != nil { c.Fatalf("Unable to set user: %v", err) } userReq := madmin.PolicyAssociationReq{ Policies: []string{policy}, User: accessKey, } if _, err := s.adm.AttachPolicy(ctx, userReq); err != nil { c.Fatalf("Unable to attach policy: %v", err) }
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Fri Jun 28 09:06:25 UTC 2024 - 4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/get-current-user.md
/// ```Python hl_lines="10" {!> ../../docs_src/security/tutorial001.py!} ``` //// But that is still not that useful. Let's make it give us the current user. ## Create a user model First, let's create a Pydantic user model. The same way we use Pydantic to declare bodies, we can use it anywhere else: //// tab | Python 3.10+ ```Python hl_lines="5 12-16"
Registered: Sun Oct 27 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 7.4K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
if s3Err != ErrNone { writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL) return } userDN := r.Form.Get("userDN") // If listing is requested for a specific user (who is not the request // sender), check that the user has permissions. if userDN != "" && userDN != cred.ParentUser { if !globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups,
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sat Sep 21 11:35:40 UTC 2024 - 19.1K bytes - Viewed (0) -
docs/sts/ldap.md
**Please note that when AD/LDAP is configured, MinIO will not support long term users defined internally.** Only AD/LDAP users (and the root user) are allowed. In addition to this, the server will not support operations on users or groups using `mc admin user` or `mc admin group` commands except `mc admin user info` and `mc admin group info` to list set policies for users and groups. This is because users and groups are defined externally in AD/LDAP. ## Configuring AD/LDAP on MinIO
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 18.9K bytes - Viewed (0) -
docs/en/docs/tutorial/security/simple-oauth2.md
```JSON { "detail": "Not authenticated" } ``` ### Inactive user Now try with an inactive user, authenticate with: User: `alice` Password: `secret2` And try to use the operation `GET` with the path `/users/me`. You will get an "Inactive user" error, like: ```JSON { "detail": "Inactive user" } ``` ## Recap
Registered: Sun Oct 27 07:19:11 UTC 2024 - Last Modified: Sun Oct 06 20:36:54 UTC 2024 - 12.3K bytes - Viewed (0)