- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for membres (0.15 sec)
-
cmd/metrics-v3-system-memory.go
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Apr 17 05:10:25 GMT 2024 - 2.2K bytes - Viewed (0) -
buildscripts/minio-iam-ldap-upgrade-import-test.sh
lookup_bind_password=admin \ user_dn_search_base_dn=dc=min,dc=io \ user_dn_search_filter="(uid=%s)" \ group_search_base_dn=ou=swengg,dc=min,dc=io \ group_search_filter="(&(objectclass=groupOfNames)(member=%d))" mc admin service restart old-minio mc idp ldap policy attach old-minio readwrite --user=UID=dillon,ou=people,ou=swengg,dc=min,dc=io
Shell Script - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 15:49:53 GMT 2024 - 3.4K bytes - Viewed (0) -
code_of_conduct.md
* Being respectful of differing viewpoints and experiences * Gracefully accepting constructive criticism * Focusing on what is best for the community * Showing empathy towards other community members Examples of unacceptable behavior by participants include: * The use of sexualized language or imagery and unwelcome sexual attention or advances
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Jan 20 18:38:58 GMT 2020 - 3.5K bytes - Viewed (0) -
SECURITY.md
- If you receive no response: ******@****.*** ### Disclosure Process MinIO uses the following disclosure process: 1. Once the security report is received one member of the security team tries to verify and reproduce the issue and determines the impact it has. 2. A member of the security team will respond and either confirm or reject the security report. If the report is rejected the response explains why.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 2.2K bytes - Viewed (0) -
VULNERABILITY_REPORT.md
a well-established vulnerability identifier, e.g. CVE number, can be used instead. Based on the description mentioned above, a MinIO engineer or security team member investigates: - Whether the reported vulnerability exists. - The conditions that are required such that the vulnerability can be exploited. - The steps required to fix the vulnerability.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 1.5K bytes - Viewed (0)