- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 220 for Account (0.19 sec)
-
tests/associations_has_one_test.go
account := Account{Number: "account-has-one-append"} if err := DB.Model(&user2).Association("Account").Append(&account); err != nil { t.Fatalf("Error happened when append account, got %v", err) } if account.ID == 0 { t.Fatalf("Account's ID should be created") } user.Account = account CheckUser(t, user2, user) AssertAssociationCount(t, user, "Account", 1, "AfterAppend") // Replace
Go - Registered: Sun Apr 21 09:35:09 GMT 2024 - Last Modified: Thu Jan 06 07:02:53 GMT 2022 - 6.8K bytes - Viewed (0) -
tests/update_test.go
Go - Registered: Sun Apr 21 09:35:09 GMT 2024 - Last Modified: Mon Dec 04 03:50:58 GMT 2023 - 30.3K bytes - Viewed (0) -
tests/helper_test.go
"ManagerID", "Active") t.Run("Account", func(t *testing.T) { AssertObjEqual(t, user.Account, expect.Account, "ID", "CreatedAt", "UpdatedAt", "DeletedAt", "UserID", "Number") if user.Account.Number != "" { if !user.Account.UserID.Valid { t.Errorf("Account's foreign key should be saved") } else { var account Account db(unscoped).First(&account, "user_id = ?", user.ID)
Go - Registered: Sun Apr 21 09:35:09 GMT 2024 - Last Modified: Tue Mar 19 03:50:28 GMT 2024 - 8K bytes - Viewed (0) -
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Mon Feb 12 16:36:16 GMT 2024 - 45.7K bytes - Viewed (0) -
tests/preload_test.go
} var users2 []User DB.Preload("Account", clause.Eq{Column: "number", Value: users[0].Account.Number}).Find(&users2, "id IN ?", userIDs) sort.Slice(users2, func(i, j int) bool { return users2[i].ID < users2[j].ID }) for idx, user := range users2[1:2] { if user.Account.Number != "" { t.Errorf("No account should found for user %v but got %v", idx+2, user.Account.Number) } }
Go - Registered: Sun Apr 21 09:35:09 GMT 2024 - Last Modified: Mon Apr 15 03:20:20 GMT 2024 - 13.4K bytes - Viewed (0) -
tests/delete_test.go
Go - Registered: Sun Apr 21 09:35:09 GMT 2024 - Last Modified: Tue Oct 10 07:03:34 GMT 2023 - 9.4K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender. isSvcAccForRequestor := false
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Sat Apr 06 05:26:02 GMT 2024 - 13.3K bytes - Viewed (0) -
cmd/admin-handlers-users.go
addExpirationToCondValues(updateReq.NewExpiration, condValues) // Permission checks: // // 1. Any type of account (i.e. access keys (previously/still called service // accounts), STS accounts, internal IDP accounts, etc) with the // policy.UpdateServiceAccountAdminAction permission can update any service // account. // // 2. We would like to let a user update their own access keys, however it
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 18 15:15:02 GMT 2024 - 76K bytes - Viewed (0) -
internal/arn/arn.go
package arn import ( "errors" "fmt" "regexp" "strings" ) // ARN structure: // // arn:partition:service:region:account-id:resource-type/resource-id // // In this implementation, account-id is empty. // // Reference: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html const ( arnPrefixArn = "arn" arnPartitionMinio = "minio"
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 04 08:31:34 GMT 2024 - 3.5K bytes - Viewed (0) -
internal/config/identity/ldap/ldap.go
} // GetNonEligibleUserDistNames - find user accounts (DNs) that are no longer // present in the LDAP server or do not meet filter criteria anymore func (l *Config) GetNonEligibleUserDistNames(userDistNames []string) ([]string, error) { conn, err := l.LDAP.Connect() if err != nil { return nil, err } defer conn.Close() // Bind to the lookup user account if err = l.LDAP.LookupBind(conn); err != nil {
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Apr 18 15:15:02 GMT 2024 - 9.2K bytes - Viewed (0)