- Sort Score
- Result 10 results
- Languages All
Results 341 - 350 of 459 for Pending (0.05 sec)
-
docs/sts/ldap.md
- On finding the user's info, MinIO verifies the login credentials with the AD/LDAP server. - MinIO optionally queries the AD/LDAP server for a list of groups that the user is a member of. - MinIO then checks if there are any policies [explicitly associated](#managing-usergroup-access-policy) with the user or their groups.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 18.9K bytes - Viewed (0) -
common-protos/k8s.io/api/rbac/v1alpha1/generated.proto
optional string kind = 2; // Name is the name of resource being referenced optional string name = 3; } // Subject contains a reference to the object or user identities a role binding applies to. This can either hold a direct API object reference, // or a value for non-objects such as user and group names. message Subject {
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Mar 11 18:43:24 UTC 2024 - 8.5K bytes - Viewed (0) -
src/main/java/jcifs/internal/dtyp/ACE.java
* of the access check algorithm used by Windows is required. The following * is a basic description of the algorithm. For a more complete description * we recommend reading the section on Access Control in Keith Brown's * "The .NET Developer's Guide to Windows Security" (which is also * available online). * <p> * Direct ACEs are evaluated first in order. The SID of the user performing
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Jul 01 13:12:10 UTC 2018 - 5.4K bytes - Viewed (0) -
architecture/environments/operator.md
## Introduction This document covers primarily the code, with some background on how the design maps to it. See the [design doc](https://docs.google.com/document/d/11j9ZtYWNWnxQYnZy8ayZav1FMwTH6F6z6fkDYZ7V298/edit#heading=h.qex63c29z2to) for a more complete design description. The operator code is divided roughly into five areas: 1. [IstioOperatorSpec API](#istiooperatorspec-api) and related infrastructure, which is expressed as a
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jul 29 21:11:35 UTC 2024 - 13.2K bytes - Viewed (0) -
internal/s3select/jstream/decoder.go
i, err = d.object() } return i, Object, err default: return nil, Unknown, d.mkError(ErrSyntax, "looking for beginning of value") } } // string called by `any` or `object`(for map keys) after reading `"` func (d *Decoder) string() (string, error) { d.scratch.reset() c := d.next() scan: for { switch { case c == '"': return string(d.scratch.bytes()), nil case c == '\\':
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Sep 23 19:35:41 UTC 2024 - 13.5K bytes - Viewed (0) -
internal/ringbuffer/ring_buffer.go
// When Read encounters an error or end-of-file condition after successfully reading n > 0 bytes, it returns the number of bytes read. // It may return the (non-nil) error from the same call or return the error (and n == 0) from a subsequent call. // Callers should always process the n > 0 bytes returned before considering the error err. // Doing so correctly handles I/O errors that happen after reading some bytes and also both of the allowed EOF behaviors.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed May 15 00:11:04 UTC 2024 - 13.3K bytes - Viewed (0) -
cmd/object-handlers-common.go
// use mtime < t+1s instead of mtime <= t to check for unmodified. return objTime.After(givenTime.Add(1 * time.Second)) } // canonicalizeETag returns ETag with leading and trailing double-quotes removed, // if any present func canonicalizeETag(etag string) string { return etagRegex.ReplaceAllString(etag, "$1") }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 06:33:53 UTC 2024 - 15.3K bytes - Viewed (0) -
internal/s3select/message.go
// in Finish() quitFlag := false for !quitFlag { select { case data := <-writer.errCh: quitFlag = true // Flush collected records before sending error message if !writer.flushRecords() { break } writer.write(data) case payload, ok := <-writer.payloadCh: if !ok { // payloadCh is closed by caller to
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 30 15:26:43 UTC 2022 - 15.2K bytes - Viewed (0) -
guava/src/com/google/common/base/Utf8.java
if (byte1 < (byte) 0xE0) { // Two-byte form. if (index == end) { return false; } // Simultaneously check for illegal trailing-byte in leading position // and overlong 2-byte form. if (byte1 < (byte) 0xC2 || bytes[index++] > (byte) 0xBF) { return false; } } else if (byte1 < (byte) 0xF0) { // Three-byte form.
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Thu Oct 17 13:00:28 UTC 2024 - 7K bytes - Viewed (0) -
guava/src/com/google/common/util/concurrent/AggregateFutureState.java
* seenExceptions to its exception * * Thread2: calls setException(), which returns false, CASes seenExceptions to its exception, * and wrongly believes that its exception is new (leading it to logging it when it shouldn't) * * Our solution is for threads to CAS seenExceptions from null to a Set populated with _the
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Tue May 28 20:40:51 UTC 2024 - 8.4K bytes - Viewed (0)