Displaying 5 results from an estimated 5 matches for "valid_from".
2006 Mar 17
3
Timestamps casted to nil?
...tamp fields with or without time zone in my
Postgres tables seem to be casted to nil. From console:
>> me = User.find(''PS12345'')
=> #<User:0x2379788 @attributes={"mtime"=>"01.03.2006 13:26:32.737166",
"valid"=>"8", "valid_from"=>"01.03.1999 14:09:21 CET",
"valid_thru"=>nil, "lastlogin"=>"13.03.2006 16:04:58",
"password"=>"cbd8f7984c654c25512e3d9241ae569f", "login"=>"PS12345",
"email"=>"jan.foeh@parshi...
2010 Mar 03
2
Viewing cetificate details
Hi,
I don't see any way to view the details of a certificate once it is
generated. Having such a capability would be very handy for debugging
purposes to check what constraints, principals, and validity interval
are associated with a given cert.
--
Iain Morgan
2007 Oct 07
1
activerecord problem with contrains,belongs_to and has_many keyword
...doesn''t fetch the images automatically.
When I dump the advertisement via <%= debug @advertisement %>, my
output is :
--- &id001 !ruby/object:Advertisement
attributes:
valid_to: "2007-10-06"
body: some text
title: Villa Katherina
service:
id: "1"
valid_from: "2007-10-06"
active: "0"
parent:
errors: !ruby/object:ActiveRecord::Errors
base: *id001
errors: {}
I must have done a mistake somewhere in my declarations or so.... does
anyone know what I''ve done wrong ??
Thanx in advance,
alex !
--~--~---------~--~----~-...
2007 Nov 24
12
orphan habtm rows
HI,
i use models User and Groups connected with many to many association, so
i have users table, groups and groups_users.
lets say i create one user and one group. next i add a group to user. so
now my table groups_users has one entry i.e.
group_id | user_id
_________|________
1 | 1
ok, when i delete both my group and user, above entry is not deleted,
thus leaving alone without
2006 Nov 15
11
OpenSSH Certkey (PKI)
..._mday = mday;
+ tm.tm_hour = hour;
+ tm.tm_min = min;
+ tm.tm_sec = sec;
+ return timegm(&tm);
+}
+
+static void
+do_sign_host_key(struct passwd *pw)
+{
+ struct stat st;
+ u_char ca_name[128], ca_id[128], ca_opts[512];
+ u_char dat[8192], sig[8192], key_fn[1024], cert_fn[1024];
+ unsigned long valid_from, valid_to;
+ u_int slen;
+ Key *ca_key, *host_key;
+ char *ca_fp, *host_fp;
+ FILE *f;
+ int i;
+
+ if (!have_identity)
+ ask_filename(pw, "Enter file in which the CA key is");
+ if (stat(identity_file, &st) < 0) {
+ perror(identity_file);
+ exit(1);
+ }
+ ca_key = load_identity...