- Sort Score
- Num 10 results
- Language All
Results 31 - 40 of 694 for Ok (0.12 seconds)
-
tests/lru_test.go
if v != "val1" { t.Fatalf("value differs from expected") } if !ok { t.Fatalf("should be true") } for { result, ok := lc.Get("key1") if ok && result == "" { t.Fatalf("ok should return a result") } if !ok { break } } time.Sleep(time.Millisecond * 100) // wait for expiration reaper if lc.Len() != 0 { t.Fatalf("length differs from expected") }
Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Mon Sep 08 09:19:22 GMT 2025 - 10.4K bytes - Click Count (0) -
callbacks/helper.go
for k, v := range mapValue { if stmt.Schema != nil { if field := stmt.Schema.LookUpField(k); field != nil { k = field.DBName } } if _, ok := result[k]; !ok { if v, ok := selectColumns[k]; (ok && v) || (!ok && !restricted) { result[k] = make([]interface{}, len(mapValues)) columns = append(columns, k) } else { continue } } result[k][idx] = v }Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Thu Apr 14 12:32:57 GMT 2022 - 3.7K bytes - Click Count (0) -
cmd/admin-handlers-idp-openid.go
// Filter out any disqualifying access keys _, ok := accessKey.Claims[subClaim] if !ok { continue // OpenID access keys must have a sub claim } if (!listSTSKeys && !accessKey.IsServiceAccount()) || (!listServiceAccounts && accessKey.IsServiceAccount()) { continue // skip if not the type we want } arn, ok := accessKey.Claims[roleArnClaim].(string) if !ok { if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sat Sep 06 17:38:46 GMT 2025 - 7.6K bytes - Click Count (0) -
schema/schema.go
if field, ok := schema.FieldsByDBName[name]; ok { return field } if field, ok := schema.FieldsByName[name]; ok { return field } // Lookup field using namer-driven ColumnName if schema.namer == nil { return nil } namerColumnName := schema.namer.ColumnName(schema.Table, name) if field, ok := schema.FieldsByDBName[namerColumnName]; ok { return field } return nil }
Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Sat Mar 21 11:35:55 GMT 2026 - 13.3K bytes - Click Count (0) -
cmd/local-locker_test.go
Source: t.Name(), Owner: "owner", Quorum: &quorum, } ok, err := l.RLock(ctx, arg) if err != nil { t.Fatal(err) } if !ok { t.Fatal("did not get read lock") } // RLock twice ok, err = l.RLock(ctx, arg) if err != nil { t.Fatal(err) } if !ok { t.Fatal("did not get write lock") } rResources[i] = arg.Resources[0] }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 11.8K bytes - Click Count (0) -
src/cmd/asm/internal/arch/loong64.go
a.Index = num } else { switch simdType { case loong64.LSX: arngType, ok = loong64LsxArngExtMap[ext] if !ok { return errors.New("Loong64 extension: invalid LSX arrangement type: " + ext) } case loong64.LASX: arngType, ok = loong64LasxArngExtMap[ext] if !ok { return errors.New("Loong64 extension: invalid LASX arrangement type: " + ext) } }Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Sat Feb 14 15:17:33 GMT 2026 - 3.9K bytes - Click Count (0) -
cmd/bucket-policy.go
for k, v := range claims { vStr, ok := v.(string) if ok { // Trim any LDAP specific prefix args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr} } } // Add groups claim which could be a list. This will ensure that the claim // `jwt:groups` works. if grpsVal, ok := claims["groups"]; ok { if grpsIs, ok := grpsVal.([]any); ok { grps := []string{}Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 7.9K bytes - Click Count (0) -
clause/expression.go
inName = true name = name[:0] } else if v == ' ' || v == ',' || v == ')' || v == '"' || v == '\'' || v == '`' || v == '\r' || v == '\n' || v == ';' { if inName { if nv, ok := namedMap[string(name)]; ok { if afterParenthesis { processValue(builder, nv) } else { builder.AddVar(builder, nv) } } else { builder.WriteByte('@')
Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Tue Nov 04 07:04:52 GMT 2025 - 8K bytes - Click Count (0) -
cmd/iam-store.go
} subClaimValue := cred.ParentUser if v, ok := claims.Lookup(subClaim); ok { subClaimValue = v } if v, ok := claims.Lookup(ldapActualUser); ok { subClaimValue = v } roleArn := openid.DummyRoleARN.String() s, ok := claims.Lookup(roleArnClaim) if ok { roleArn = s } v, ok := res[cred.ParentUser] if ok { res[cred.ParentUser] = ParentUserInfo{
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 87.1K bytes - Click Count (0) -
schema/relationship.go
Value: schema.Table, } var ( typeName = polymorphic + "Type" typeId = polymorphic + "ID" ) if value, ok := field.TagSettings["POLYMORPHICTYPE"]; ok { typeName = strings.TrimSpace(value) } if value, ok := field.TagSettings["POLYMORPHICID"]; ok { typeId = strings.TrimSpace(value) } relation.Polymorphic.PolymorphicType = relation.FieldSchema.FieldsByName[typeName]
Created: Sun Apr 05 09:35:12 GMT 2026 - Last Modified: Sun Nov 16 04:11:05 GMT 2025 - 23.1K bytes - Click Count (1)