Search Options

Results per page
Sort
Preferred Languages
Advance

Results 221 - 230 of 1,509 for ushr (0.02 sec)

  1. cmd/admin-handlers-users.go

    		return
    	}
    
    	var targetAccount string
    
    	// If listing is requested for a specific user (who is not the request
    	// sender), check that the user has permissions.
    	user := r.Form.Get("user")
    	if user != "" && user != cred.AccessKey {
    		if !globalIAMSys.IsAllowed(policy.Args{
    			AccountName:     cred.AccessKey,
    			Groups:          cred.Groups,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 90.6K bytes
    - Viewed (0)
  2. cmd/iam.go

    //
    // - inherited from parent - this is the case for AssumeRole API, where the
    // parent user is an actual real user with their own (permanent) credentials and
    // policy association.
    //
    // - inherited from "virtual" parent - this is the case for AssumeRoleWithLDAP
    // where the parent user is the DN of the actual LDAP user. The parent user
    // itself cannot login, but the policy associated with them determines the base
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  3. docs/es/docs/deployment/docker.md

    ```Dockerfile
    RUN pip install --no-cache-dir --upgrade -r /code/requirements.txt
    ```
    
    El archivo con los requisitos de los paquetes **no cambiará con frecuencia**. Así que, al copiar solo ese archivo, Docker podrá **usar la caché** para ese paso.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Fri May 30 13:15:52 UTC 2025
    - 31K bytes
    - Viewed (0)
  4. src/main/java/org/codelibs/fess/ldap/LdapUser.java

    import org.dbflute.optional.OptionalThing;
    
    /**
     * An LDAP user.
     */
    public class LdapUser implements FessUser {
    
        private static final long serialVersionUID = 1L;
    
        /** The environment for LDAP connection. */
        protected Hashtable<String, String> env;
    
        /** The name of the user. */
        protected String name;
    
        /** The permissions of the user. */
        protected String[] permissions = null;
    
        /**
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 07 03:06:29 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  5. tests/main_test.go

    		t.Errorf("Should got error with invalid SQL")
    	}
    
    	if DB.Model(&User{}).Where("sdsd.zaaa = ?", "sd;;;aa").Pluck("aaa", &columns).Error == nil {
    		t.Errorf("Should got error with invalid SQL")
    	}
    
    	if DB.Where("sdsd.zaaa = ?", "sd;;;aa").Find(&User{}).Error == nil {
    		t.Errorf("Should got error with invalid SQL")
    	}
    
    	var count1, count2 int64
    	DB.Model(&User{}).Count(&count1)
    	if count1 <= 0 {
    		t.Errorf("Should find some users")
    Registered: Sun Sep 07 09:35:13 UTC 2025
    - Last Modified: Thu Mar 24 01:31:58 UTC 2022
    - 1.4K bytes
    - Viewed (0)
  6. docs/distributed/decom-compressed-sse-s3.sh

    pid=$!
    
    ./mc ready myminio
    
    ./mc admin user add myminio/ minio123 minio123
    ./mc admin user add myminio/ minio12345 minio12345
    
    ./mc admin policy create myminio/ rw ./docs/distributed/rw.json
    ./mc admin policy create myminio/ lake ./docs/distributed/rw.json
    
    ./mc admin policy attach myminio/ rw --user=minio123
    ./mc admin policy attach myminio/ lake --user=minio12345
    
    ./mc mb -l myminio/versioned
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  7. tests/count_test.go

    	}
    
    	if err := DB.Model(&User{}).Where("name = ?", user1.Name).Or("name = ?", user3.Name).Count(&count).Find(&users).Error; err != nil {
    		t.Errorf(fmt.Sprintf("Count should work, but got err %v", err))
    	}
    
    	if count != int64(len(users)) {
    		t.Errorf("Count() method should get correct value, expect: %v, got %v", count, len(users))
    	}
    
    Registered: Sun Sep 07 09:35:13 UTC 2025
    - Last Modified: Mon Oct 30 09:15:49 UTC 2023
    - 6.9K bytes
    - Viewed (0)
  8. src/test/java/jcifs/smb/NtlmUtilTest.java

            // Arrange
            String domain = "Domain";
            String user = "User";
            String password = "password";
    
            // Act
            byte[] viaHash = NtlmUtil.nTOWFv2(domain, user, NtlmUtil.getNTHash(password));
            byte[] viaPassword = NtlmUtil.nTOWFv2(domain, user, password);
    
            // Assert: overloads consistent
    Registered: Sun Sep 07 00:10:21 UTC 2025
    - Last Modified: Sat Aug 30 05:58:03 UTC 2025
    - 12K bytes
    - Viewed (0)
  9. docs/es/docs/tutorial/security/oauth2-jwt.md

    Pero no puedes convertir del galimatías de nuevo a la contraseña.
    
    ### Por qué usar hashing de contraseñas
    
    Si tu base de datos es robada, el ladrón no tendrá las contraseñas en texto claro de tus usuarios, solo los hashes.
    
    Por lo tanto, el ladrón no podrá intentar usar esa contraseña en otro sistema (como muchos usuarios usan la misma contraseña en todas partes, esto sería peligroso).
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.9K bytes
    - Viewed (0)
  10. src/main/java/org/codelibs/fess/sso/aad/AzureAdAuthenticator.java

         * @param user The Azure AD user to update.
         */
        public void updateMemberOf(final AzureAdUser user) {
            final List<String> groupList = new ArrayList<>();
            final List<String> roleList = new ArrayList<>();
            groupList.addAll(getDefaultGroupList());
            roleList.addAll(getDefaultRoleList());
    Registered: Thu Sep 04 12:52:25 UTC 2025
    - Last Modified: Thu Aug 28 09:13:08 UTC 2025
    - 37.3K bytes
    - Viewed (0)
Back to top