- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 465 for account (0.53 sec)
-
tests/update_test.go
Go - Registered: Sun May 05 09:35:13 GMT 2024 - Last Modified: Mon Dec 04 03:50:58 GMT 2023 - 30.3K bytes - Viewed (0) -
cmd/admin-handlers-users_test.go
c.assertSvcAccS3Access(ctx, s, cr, bucket) // 3. Check that svc account can restrict the policy, and that the // session policy can be updated. c.assertSvcAccSessionPolicyUpdate(ctx, s, s.adm, accessKey, bucket) // 4. Check that service account's secret key and account status can be // updated. c.assertSvcAccSecretKeyAndStatusUpdate(ctx, s, s.adm, accessKey, bucket)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Feb 12 16:36:16 GMT 2024 - 45.7K bytes - Viewed (0) -
tests/create_test.go
user.Birthday = nil user.Account = Account{} user.Toys = nil user.Manager = nil CheckUser(t, result, user) user2 := *GetUser("omit_create", Config{Account: true, Pets: 3, Toys: 3, Company: true, Manager: true, Team: 3, Languages: 3, Friends: 4}) DB.Omit(clause.Associations).Create(&user2) var result2 User DB.Preload(clause.Associations).First(&result2, user2.ID) user2.Account = Account{} user2.Toys = nil
Go - Registered: Sun May 05 09:35:13 GMT 2024 - Last Modified: Tue Mar 19 03:50:28 GMT 2024 - 26.4K bytes - Viewed (0) -
tests/preload_test.go
} var users2 []User DB.Preload("Account", clause.Eq{Column: "number", Value: users[0].Account.Number}).Find(&users2, "id IN ?", userIDs) sort.Slice(users2, func(i, j int) bool { return users2[i].ID < users2[j].ID }) for idx, user := range users2[1:2] { if user.Account.Number != "" { t.Errorf("No account should found for user %v but got %v", idx+2, user.Account.Number) } }
Go - Registered: Sun May 05 09:35:13 GMT 2024 - Last Modified: Thu Apr 25 12:21:03 GMT 2024 - 14.9K bytes - Viewed (0) -
cmd/iam-store.go
// The caller did not ask to update status account, do nothing case "": case string(madmin.AccountEnabled): cr.Status = auth.AccountOn case string(madmin.AccountDisabled): cr.Status = auth.AccountOff // Update account status case auth.AccountOn, auth.AccountOff: cr.Status = opts.status default: return updatedAt, errors.New("unknown account status value") }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Apr 27 10:04:10 GMT 2024 - 75.2K bytes - Viewed (2) -
tests/helper_test.go
"ManagerID", "Active") t.Run("Account", func(t *testing.T) { AssertObjEqual(t, user.Account, expect.Account, "ID", "CreatedAt", "UpdatedAt", "DeletedAt", "UserID", "Number") if user.Account.Number != "" { if !user.Account.UserID.Valid { t.Errorf("Account's foreign key should be saved") } else { var account Account db(unscoped).First(&account, "user_id = ?", user.ID)
Go - Registered: Sun May 05 09:35:13 GMT 2024 - Last Modified: Tue Mar 19 03:50:28 GMT 2024 - 8K bytes - Viewed (0) -
istioctl/pkg/multicluster/remote_secret.go
flagset.StringVar(&o.ServiceAccountName, "service-account", "", "Create a secret with this service account's credentials. Default value is \""+ constants.DefaultServiceAccountName+"\" if --type is \"remote\", \""+ constants.DefaultConfigServiceAccountName+"\" if --type is \"config\".") flagset.BoolVar(&o.CreateServiceAccount, "create-service-account", true, "If true, the service account needed for creating the remote secret will be created "+
Go - Registered: Wed May 01 22:53:12 GMT 2024 - Last Modified: Wed Oct 11 01:43:17 GMT 2023 - 24K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender. isSvcAccForRequestor := false
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 13.3K bytes - Viewed (0) -
tests/delete_test.go
Go - Registered: Sun May 05 09:35:13 GMT 2024 - Last Modified: Tue Oct 10 07:03:34 GMT 2023 - 9.4K bytes - Viewed (0) -
docs/sts/ldap.md
### Lookup-Bind A low-privilege read-only LDAP service account is configured in the MinIO server by providing the account's Distinguished Name (DN) and password. This service account is used to perform directory lookups as needed. ``` MINIO_IDENTITY_LDAP_LOOKUP_BIND_DN* (string) DN for LDAP read-only service account used to perform DN and group lookups
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 18.4K bytes - Viewed (1)