- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 107 for Account (0.21 sec)
-
tests/joins_test.go
user := GetUser("TestJoinWithSoftDeletedUser", Config{Account: true, NamedPet: true}) DB.Create(&user) var user1 User DB.Model(&User{}).Joins("NamedPet").Joins("Account").First(&user1, user.ID) if user1.NamedPet == nil || user1.Account.ID == 0 { t.Fatalf("joins NamedPet and Account should not empty:%v", user1) } // Account should empty DB.Delete(&user1.Account) var user2 User
Go - Registered: Sun Apr 28 09:35:09 GMT 2024 - Last Modified: Wed Apr 26 14:19:32 GMT 2023 - 13.5K bytes - Viewed (1) -
tests/update_test.go
Go - Registered: Sun Apr 28 09:35:09 GMT 2024 - Last Modified: Mon Dec 04 03:50:58 GMT 2023 - 30.3K bytes - Viewed (0) -
tests/create_test.go
user.Birthday = nil user.Account = Account{} user.Toys = nil user.Manager = nil CheckUser(t, result, user) user2 := *GetUser("omit_create", Config{Account: true, Pets: 3, Toys: 3, Company: true, Manager: true, Team: 3, Languages: 3, Friends: 4}) DB.Omit(clause.Associations).Create(&user2) var result2 User DB.Preload(clause.Associations).First(&result2, user2.ID) user2.Account = Account{} user2.Toys = nil
Go - Registered: Sun Apr 28 09:35:09 GMT 2024 - Last Modified: Tue Mar 19 03:50:28 GMT 2024 - 26.4K bytes - Viewed (0) -
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Feb 12 16:36:16 GMT 2024 - 45.7K bytes - Viewed (0) -
tests/preload_test.go
} var users2 []User DB.Preload("Account", clause.Eq{Column: "number", Value: users[0].Account.Number}).Find(&users2, "id IN ?", userIDs) sort.Slice(users2, func(i, j int) bool { return users2[i].ID < users2[j].ID }) for idx, user := range users2[1:2] { if user.Account.Number != "" { t.Errorf("No account should found for user %v but got %v", idx+2, user.Account.Number) } }
Go - Registered: Sun Apr 28 09:35:09 GMT 2024 - Last Modified: Thu Apr 25 12:21:03 GMT 2024 - 14.9K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender. isSvcAccForRequestor := false
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 13.3K bytes - Viewed (0) -
tests/associations_test.go
. "gorm.io/gorm/utils/tests" ) func AssertAssociationCount(t *testing.T, data interface{}, name string, result int64, reason string) { if count := DB.Model(data).Association(name).Count(); count != result { t.Fatalf("invalid %v count %v, expects: %v got %v", name, reason, result, count) } var newUser User if user, ok := data.(User); ok { DB.Find(&newUser, "id = ?", user.ID) } else if user, ok := data.(*User); ok {
Go - Registered: Sun Apr 28 09:35:09 GMT 2024 - Last Modified: Wed Feb 08 08:29:09 GMT 2023 - 10.9K bytes - Viewed (0) -
internal/config/identity/ldap/ldap.go
} // GetNonEligibleUserDistNames - find user accounts (DNs) that are no longer // present in the LDAP server or do not meet filter criteria anymore func (l *Config) GetNonEligibleUserDistNames(userDistNames []string) ([]string, error) { conn, err := l.LDAP.Connect() if err != nil { return nil, err } defer conn.Close() // Bind to the lookup user account if err = l.LDAP.LookupBind(conn); err != nil {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 9.9K bytes - Viewed (0) -
cmd/iam-object-store.go
if _, ok := cache.iamUsersMap[svcParent]; !ok { // If a service account's parent user is not in iamUsersMap, the // parent is an STS account. Such accounts may have a policy mapped // on the parent user, so we load them. This is not needed for the // initial server startup, however, it is needed for the case where // the STS account's policy mapping (for example in LDAP mode) may
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Apr 05 21:26:41 GMT 2024 - 19.9K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
flagset.StringVar(&o.ServiceAccountName, "service-account", "", "Create a secret with this service account's credentials. Default value is \""+ constants.DefaultServiceAccountName+"\" if --type is \"remote\", \""+ constants.DefaultConfigServiceAccountName+"\" if --type is \"config\".") flagset.BoolVar(&o.CreateServiceAccount, "create-service-account", true, "If true, the service account needed for creating the remote secret will be created "+
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Wed Oct 11 01:43:17 GMT 2023 - 24K bytes - Viewed (0)