Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 51 - 60 of 311 for Accounts (0.11 seconds)

  1. cmd/sftp-server.go

    	cred, err := auth.GetNewCredentialsWithMetadata(claims, globalActiveCred.SecretKey)
    	if err != nil {
    		return nil, err
    	}
    
    	// Set the parent of the temporary access key, this is useful
    	// in obtaining service accounts by this cred.
    	cred.ParentUser = lookupResult.NormDN
    
    	// Set this value to LDAP groups, LDAP user can be part
    	// of large number of groups
    	cred.Groups = targetGroups
    
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 16.5K bytes
    - Click Count (0)
  2. cmd/site-replication.go

    	// policies and any (LDAP user created) service accounts on the other
    	// peer clusters, and if so, reject the cluster replicate add request.
    	// This is not yet implemented.
    
    	// VALIDATIONS COMPLETE.
    
    	// Create a common service account for all clusters, with root
    	// permissions.
    
    	// Create a local service account.
    
    	// Generate a secret key for the service account if not created already.
    	var secretKey string
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 184.8K bytes
    - Click Count (1)
  3. cmd/auth-handler.go

    	if globalSiteReplicationSys.isEnabled() && cred.AccessKey != siteReplicatorSvcAcc {
    		nsecret, err := getTokenSigningKey()
    		if err != nil {
    			return nil, toAPIErrorCode(r.Context(), err)
    		}
    		// sign root's temporary accounts also with site replicator creds
    		if cred.ParentUser != globalActiveCred.AccessKey || cred.IsTemp() {
    			secret = nsecret
    		}
    	}
    	if cred.IsServiceAccount() {
    		token = cred.SessionToken
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 25.4K bytes
    - Click Count (0)
  4. src/archive/tar/writer.go

    				spb = append(strconv.AppendInt(spb, s.Length, 10), '\n')
    			}
    			pad := blockPadding(int64(len(spb)))
    			spb = append(spb, zeroBlock[:pad]...)
    			hdr.Size += int64(len(spb)) // Accounts for encoded sparse map
    
    			// Add and modify appropriate PAX records.
    			dir, file := path.Split(realName)
    			hdr.Name = path.Join(dir, "GNUSparseFile.0", file)
    			paxHdrs[paxGNUSparseMajor] = "1"
    Created: Tue Dec 30 11:13:12 GMT 2025
    - Last Modified: Mon Feb 03 16:38:43 GMT 2025
    - 19.7K bytes
    - Click Count (0)
  5. tests/migrate_test.go

    	}
    
    	if tables, err := DB.Migrator().GetTables(); err != nil {
    		t.Fatalf("Failed to get database all tables, but got error %v", err)
    	} else {
    		for _, t1 := range []string{"users", "accounts", "pets", "companies", "toys", "languages", "tools"} {
    			hasTable := false
    			for _, t2 := range tables {
    				if t2 == t1 {
    					hasTable = true
    					break
    				}
    			}
    			if !hasTable {
    Created: Sun Dec 28 09:35:17 GMT 2025
    - Last Modified: Wed Aug 20 04:51:17 GMT 2025
    - 65.2K bytes
    - Click Count (0)
  6. CHANGELOG/CHANGELOG-1.5.md

    * Fix [broken service accounts when using dedicated service account key](https://github.com/kubernetes/kubernetes/issues/44285). ([#44169](https://github.com/kubernetes/kubernetes/pull/44169), [@mikedanese](https://github.com/mikedanese))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 136.4K bytes
    - Click Count (0)
  7. CHANGELOG/CHANGELOG-1.10.md

    [@caesarxuchao](https://github.com/caesarxuchao))
    
    * Using kubectl gcp auth plugin with a Google Service Account to authenticate to a cluster now additionally requests a token with the  "userinfo.email" scope. This way, users can write ClusterRoleBindings/RoleBindings with the email address of the service account directly. (This is a breaking change if the numeric uniqueIDs of the Google service accounts were being used in RBAC role bindings. The behavior can be overridden by explicitly specifying the...
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu May 05 13:44:43 GMT 2022
    - 341.8K bytes
    - Click Count (0)
  8. CHANGELOG/CHANGELOG-1.14.md

    ### Windows
    
    Support for Windows nodes and Windows containers went going stable.
    
    Support for Group Managed Service Accounts (GMSA) for Windows containers in Kubernetes. GMSA are a specific type of Active Directory account that provides automatic password management, simplified service principal name (SPN) management, and the ability to delegate the management to other administrators across multiple servers.
    
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Mon Jun 14 22:06:39 GMT 2021
    - 271.5K bytes
    - Click Count (0)
  9. CHANGELOG/CHANGELOG-1.6.md

    * An `automountServiceAccountToken` field was added to ServiceAccount and PodSpec objects. If set to `false` on a pod spec, no service account token is automounted in the pod. If set to `false` on a service account, no service account token is automounted for that service account unless explicitly overridden in the pod spec. ([#37953](https://github.com/kubernetes/kubernetes/pull/37953), [@liggitt](https://github.com/liggitt))
    Created: Fri Dec 26 09:05:12 GMT 2025
    - Last Modified: Thu Dec 24 02:28:26 GMT 2020
    - 304K bytes
    - Click Count (0)
  10. tests/update_has_one_test.go

    			t.Fatalf("errors happened when create: %v", err)
    		}
    
    		var account2 CustomizeAccount
    		DB.Find(&account2, "user_id = ?", cusUser.ID)
    		AssertEqual(t, account2.Number, number)
    		AssertEqual(t, account2.Number2, cusUser.Account.Number2)
    	})
    Created: Sun Dec 28 09:35:17 GMT 2025
    - Last Modified: Thu Jul 14 06:55:54 GMT 2022
    - 3.6K bytes
    - Click Count (0)
Back to Top