- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 27 for clientKey (0.2 sec)
-
internal/logger/config.go
if err != nil { return cfg, err } clientCert := getCfgVal(EnvLoggerWebhookClientCert, k, kv.Get(ClientCert)) clientKey := getCfgVal(EnvLoggerWebhookClientKey, k, kv.Get(ClientKey)) err = config.EnsureCertAndKey(clientCert, clientKey) if err != nil { return cfg, err } queueSizeCfgVal := getCfgVal(EnvLoggerWebhookQueueSize, k, kv.Get(QueueSize))
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 20 16:02:50 UTC 2024 - 18.3K bytes - Viewed (0) -
internal/event/target/nats.go
TLSSkipVerify bool `json:"tlsSkipVerify"` Secure bool `json:"secure"` CertAuthority string `json:"certAuthority"` ClientCert string `json:"clientCert"` ClientKey string `json:"clientKey"` PingInterval int64 `json:"pingInterval"` QueueDir string `json:"queueDir"` QueueLimit uint64 `json:"queueLimit"` JetStream struct { Enable bool `json:"enable"`
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 12.9K bytes - Viewed (0) -
cmd/object-api-options.go
if copySource { if crypto.SSECopy.IsRequested(header) { clientKey, err = crypto.SSECopy.ParseHTTP(header) if err != nil { return } if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil { return } opts.ServerSideEncryption = encrypt.SSECopy(sse) return } return } if crypto.SSEC.IsRequested(header) { clientKey, err = crypto.SSEC.ParseHTTP(header) if err != nil { return
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 21 21:13:59 UTC 2024 - 14.4K bytes - Viewed (0) -
cmd/sftp-server.go
}, Extensions: make(map[string]string), }, nil } func validateKey(c ssh.ConnMetadata, clientKey ssh.PublicKey) (err error) { if caPublicKey == nil { return errors.New("public key authority validation requested but no ca public key specified.") } cert, ok := clientKey.(*ssh.Certificate) if !ok { return errSftpPublicKeyWithoutCert }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 20 20:00:29 UTC 2024 - 16K bytes - Viewed (0) -
internal/config/notify/legacy.go
Value: strconv.Itoa(int(cfg.QueueLimit)), }, config.KV{ Key: target.WebhookClientCert, Value: cfg.ClientCert, }, config.KV{ Key: target.WebhookClientKey, Value: cfg.ClientKey, }, } return nil } // SetNotifyPostgres - helper for config migration from older config. func SetNotifyPostgres(s config.Config, psqName string, cfg target.PostgreSQLArgs) error {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 19 04:37:54 UTC 2024 - 13.1K bytes - Viewed (0) -
internal/logger/target/http/http.go
UserAgent string `json:"userAgent"` Endpoint *xnet.URL `json:"endpoint"` AuthToken string `json:"authToken"` ClientCert string `json:"clientCert"` ClientKey string `json:"clientKey"` BatchSize int `json:"batchSize"` QueueSize int `json:"queueSize"` QueueDir string `json:"queueDir"` MaxRetry int `json:"maxRetry"`
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Sep 11 22:20:42 UTC 2024 - 15.6K bytes - Viewed (0) -
cmd/config-current.go
for n, l := range loggerCfg.HTTP { if l.Enabled { l.LogOnceIf = configLogOnceConsoleIf l.UserAgent = userAgent l.Transport = NewHTTPTransportWithClientCerts(l.ClientCert, l.ClientKey) } loggerCfg.HTTP[n] = l } if errs := logger.UpdateHTTPWebhooks(ctx, loggerCfg.HTTP); len(errs) > 0 { configLogIf(ctx, fmt.Errorf("Unable to update logger webhook config: %v", errs)) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 30.1K bytes - Viewed (0) -
cmd/utils.go
TCPOptions: globalTCPOptions, EnableHTTP2: false, } if clientCert != "" && clientKey != "" { ctx, cancel := context.WithTimeout(context.Background(), time.Second) defer cancel() transport, err := s.NewHTTPTransportWithClientCerts(ctx, clientCert, clientKey) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 13 22:22:04 UTC 2024 - 31.9K bytes - Viewed (0) -
internal/config/notify/parse.go
CertAuthority: env.Get(certAuthorityEnv, kv.Get(target.NATSCertAuthority)), ClientCert: env.Get(clientCertEnv, kv.Get(target.NATSClientCert)), ClientKey: env.Get(clientKeyEnv, kv.Get(target.NATSClientKey)), Token: env.Get(tokenEnv, kv.Get(target.NATSToken)), TLS: env.Get(tlsEnv, kv.Get(target.NATSTLS)) == config.EnableOn,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 47K bytes - Viewed (0) -
docs/pt/docs/tutorial/sql-databases.md
Agora criamos um modelo `HeroCreate`, este é o que **validará** os dados dos clientes. Ele tem os mesmos campos que `HeroBase`, e também tem `secret_name`. Agora, quando os clientes **criarem um novo hero**, eles enviarão o `secret_name`, ele será armazenado no banco de dados, mas esses nomes secretos não serão retornados na API para os clientes. /// tip | Dica
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sun Oct 27 15:25:29 UTC 2024 - 15.8K bytes - Viewed (0)