- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 14 for arn (0.01 sec)
-
docs/sts/assume-role.md
``` > NOTE: In the following commands `--role-arn` and `--role-session-name` are not meaningful for MinIO and can be set to any value satisfying the command line requirements. ``` $ aws --profile foobar --endpoint-url http://localhost:9000 sts assume-role --policy '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:*","Resource":"arn:aws:s3:::*"}]}' --role-arn arn:xxx:xxx:xxx:xxxx --role-session-name anything {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.2K bytes - Viewed (0) -
cmd/bucket-replication-utils_test.go
} for arn, tdsc := range dsc.targetsMap { expDsc, ok := test.expDsc.targetsMap[arn] if !ok || expDsc != tdsc { t.Errorf("Test%d (%s): Invalid target replicate decision: got %+v, want %+v", i+1, test.name, tdsc, expDsc) } } } } var replicationStateTest = []struct { name string rs ReplicationState arn string expStatus replication.StatusType
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 9.3K bytes - Viewed (0) -
cmd/admin-handlers-idp-openid.go
continue // skip if not the type we want } arn, ok := accessKey.Claims[roleArnClaim].(string) if !ok { if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok { continue // skip if no roleArn and no policy claim } // claim-based provider is in the roleArnMap under dummy ARN arn = dummyRoleARN } matchingCfgName, ok := roleArnMap[arn] if !ok {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
cmd/bucket-notification-handlers.go
for i, queue := range config.QueueList { // Remove ARN not found queues, because we previously allowed // adding unexpected entries into the config. // // With newer config disallowing changing / turning off // notification targets without removing ARN in notification // configuration we won't see this problem anymore. if reflect.DeepEqual(queue.ARN, arnErr.ARN) && i < len(config.QueueList) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 5.1K bytes - Viewed (0) -
cmd/event-notification.go
return arns } region := globalSite.Region() for targetID := range evnot.targetList.TargetMap() { // httpclient target is part of ListenNotification // which doesn't need to be listed as part of the ARN list // This list is only meant for external targets, filter // this out pro-actively. if !strings.HasPrefix(targetID.ID, "httpclient+") { arns = append(arns, targetID.ToARN(region).String()) } }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Jun 21 22:22:24 UTC 2024 - 7.7K bytes - Viewed (0) -
docs/multi-user/README.md
variables in the *Resource* element and in string comparisons in the *Condition* element. You can use a policy variable in the Resource element, but only in the resource portion of the ARN. This portion of the ARN appears after the 5th colon (:). You can't use a variable to replace parts of the ARN before the 5th colon, such as the service or account. The following policy might be attached to a group. It gives each of the users in the group full programmatic access to a user-specific object...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 8.2K bytes - Viewed (0) -
cmd/server-startup-msg.go
func printLambdaTargets() { if globalLambdaTargetList == nil || globalLambdaTargetList.Empty() { return } arnMsg := color.Blue("Object Lambda ARNs: ") for _, arn := range globalLambdaTargetList.List(globalSite.Region()) { arnMsg += color.Bold(fmt.Sprintf("%s ", arn)) } logger.Startup(arnMsg + "\n") } // Prints bucket notification configurations. func printEventNotifiers() { if globalNotificationSys == nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 6.2K bytes - Viewed (0) -
docs/iam/identity-management-plugin.md
MINIO_IDENTITY_PLUGIN_ROLE_ID (string) unique ID to generate the ARN MINIO_IDENTITY_PLUGIN_COMMENT (sentence) optionally add a comment to this setting ``` If provided, the auth token parameter is sent as an authorization header. `MINIO_IDENTITY_PLUGIN_ROLE_POLICY` is a required parameter and can be list of comma separated policy names.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 4.2K bytes - Viewed (0) -
docs/sts/custom-token-identity.md
After configuring the plugin, use the generated Role ARN with `AssumeRoleWithCustomToken` to get temporary credentials to access object storage. ## API Request To make an STS API request with this method, send a POST request to the MinIO endpoint with following query parameters:
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 3K bytes - Viewed (0) -
cmd/metrics-v3-bucket-replication.go
for _, bucket := range buckets { if s, ok := bucketReplStats[bucket]; ok { stats := s.ReplicationStats if stats.hasReplicationUsage() { for arn, stat := range stats.Stats { labels := []string{bucketL, bucket, targetArnL, arn} m.Set(bucketReplLastHrFailedBytes, float64(stat.Failed.LastHour.Bytes), labels...) m.Set(bucketReplLastHrFailedCount, float64(stat.Failed.LastHour.Count), labels...)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Jun 04 20:45:31 UTC 2025 - 8.3K bytes - Viewed (0)