- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 1,673 for user4 (0.04 sec)
-
tests/test_tutorial/test_security/test_tutorial005_py39.py
response = client.get( "/users/me", headers={"Authorization": f"Bearer {access_token}"} ) assert response.status_code == 400, response.text assert response.json() == {"detail": "Inactive user"} @needs_py39 def test_read_items(client: TestClient): access_token = get_access_token(scope="me items", client=client) response = client.get(
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Wed Mar 13 19:07:10 UTC 2024 - 16.3K bytes - Viewed (0) -
tests/test_tutorial/test_security/test_tutorial005_an_py310.py
response = client.get( "/users/me", headers={"Authorization": f"Bearer {access_token}"} ) assert response.status_code == 400, response.text assert response.json() == {"detail": "Inactive user"} @needs_py310 def test_read_items(client: TestClient): access_token = get_access_token(scope="me items", client=client) response = client.get(
Registered: Mon Jun 17 08:32:26 UTC 2024 - Last Modified: Wed Mar 13 19:07:10 UTC 2024 - 16.3K bytes - Viewed (0) -
tensorflow/compiler/mlir/tensorflow/transforms/cluster_ops_by_policy.cc
for (Operation *user : op->getUsers()) { // Skip users in other blocks. if (user->getBlock() != op->getBlock()) continue; // Skip users is in the `dst_root` or `src_root` clusters, if we'll merge // roots they'll become a single cluster and will not violate the // dominance property after that. auto it = member_ids.find(user);
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Thu Apr 25 16:01:03 UTC 2024 - 27.9K bytes - Viewed (0) -
docs/sts/ldap.md
**Please note that when AD/LDAP is configured, MinIO will not support long term users defined internally.** Only AD/LDAP users (and the root user) are allowed. In addition to this, the server will not support operations on users or groups using `mc admin user` or `mc admin group` commands except `mc admin user info` and `mc admin group info` to list set policies for users and groups. This is because users and groups are defined externally in AD/LDAP.
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 18.9K bytes - Viewed (0) -
cmd/iam-etcd-store.go
users := set.NewStringSet() for _, kv := range kvs { user := extractPathPrefixAndSuffix(string(kv.Key), prefix, path.Base(string(kv.Key))) users.Add(user) } return users } // Extract path string by stripping off the `prefix` value and the suffix, // value, usually in the following form. // // s := "config/iam/users/foo/config.json" // prefix := "config/iam/users/"
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 22:26:38 UTC 2024 - 13.6K bytes - Viewed (0) -
pkg/kubelet/certificate/bootstrap/bootstrap_test.go
contexts: - context: cluster: cluster-a namespace: ns-a user: user-a name: context-a - context: cluster: cluster-b namespace: ns-b user: user-b name: context-b current-context: context-b users: - name: user-a user: client-certificate: mycertvalid.crt client-key: mycertvalid.key - name: user-b user: client-certificate: mycertvalid.crt client-key: mycertvalid.key
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue May 09 14:24:11 UTC 2023 - 13K bytes - Viewed (0) -
src/cmd/go/internal/vcs/vcs_test.go
nil, }, // Dots are not valid in user names { "hub.jazz.net/git/user.1/pkgname", nil, }, { "hub.jazz.net/git/user/pkg.name", &RepoRoot{ VCS: vcsGit, Repo: "https://hub.jazz.net/git/user/pkg.name", }, }, // User names cannot have uppercase letters { "hub.jazz.net/git/USER/pkgname", nil, }, // OpenStack tests {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu Nov 03 15:33:59 UTC 2022 - 17K bytes - Viewed (0) -
src/os/user/lookup_windows.go
if e != nil { return "", e } // If the user has joined a domain use the RID of the default primary group // called "Domain Users": // https://support.microsoft.com/en-us/help/243330/well-known-security-identifiers-in-windows-operating-systems // SID: S-1-5-21domain-513 // // The correct way to obtain the primary group of a domain user is // probing the user primaryGroupID attribute in the server Active Directory:
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Sep 12 16:42:41 UTC 2023 - 11.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/flowcontrol/bootstrap/default.go
"system-leader-election", "leader-election", 100, flowcontrol.FlowDistinguisherMethodByUserType, flowcontrol.PolicyRulesWithSubjects{ Subjects: append( users(user.KubeControllerManager, user.KubeScheduler), kubeSystemServiceAccount(flowcontrol.NameAll)...), ResourceRules: []flowcontrol.ResourcePolicyRule{ resourceRule( []string{"get", "create", "update"},
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Oct 30 12:18:40 UTC 2023 - 20.5K bytes - Viewed (0) -
pkg/apis/rbac/helpers.go
} return r } // Users adds the specified users as the subjects of the ClusterRoleBinding. func (r *ClusterRoleBindingBuilder) Users(users ...string) *ClusterRoleBindingBuilder { for _, user := range users { r.ClusterRoleBinding.Subjects = append(r.ClusterRoleBinding.Subjects, Subject{Kind: UserKind, APIGroup: GroupName, Name: user}) } return r }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sun Feb 23 15:11:00 UTC 2020 - 12.1K bytes - Viewed (0)