- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 339 for Bearer (0.18 sec)
-
internal/config/identity/openid/providercfg.go
req, err := http.NewRequestWithContext(ctx, http.MethodPost, p.DiscoveryDoc.UserInfoEndpoint, nil) if err != nil { return nil, err } req.Header.Set("Content-Type", "application/x-www-form-urlencoded") if accessToken != "" { req.Header.Set("Authorization", "Bearer "+accessToken) } client := &http.Client{ Transport: transport, } resp, err := client.Do(req) if err != nil {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 4.6K bytes - Viewed (0) -
istioctl/pkg/xds/client.go
) ([]grpc.DialOption, error) { ctx := context.TODO() // If we are using the insecure 15010 don't bother getting a token if opts.Plaintext || opts.CertDir != "" { return make([]grpc.DialOption, 0), nil } // Use bearer token aud := tokenAudiences isMCP := strings.HasSuffix(opts.Xds, ".googleapis.com") || strings.HasSuffix(opts.Xds, ".googleapis.com:443") if isMCP { // Special credentials handling when using ASM Managed Control Plane.
Go - Registered: Wed May 08 22:53:08 GMT 2024 - Last Modified: Tue Dec 19 22:42:42 GMT 2023 - 3.7K bytes - Viewed (0) -
internal/event/target/webhook.go
// already present we can blindly use the // authToken as is instead of adding 'Bearer' tokens := strings.Fields(target.args.AuthToken) switch len(tokens) { case 2: req.Header.Set("Authorization", target.args.AuthToken) case 1: req.Header.Set("Authorization", "Bearer "+target.args.AuthToken) } req.Header.Set("Content-Type", "application/json") resp, err := target.httpClient.Do(req)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Nov 20 22:40:07 GMT 2023 - 8.5K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
k.Lock() accessToken := k.accessToken k.Unlock() if accessToken.AccessToken == "" { return User{}, ErrAccessTokenExpired } req.Header.Set("Authorization", "Bearer "+accessToken.AccessToken) resp, err := k.client.Do(req) if err != nil { return User{}, err } defer resp.Body.Close() switch resp.StatusCode {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 29 01:27:09 GMT 2022 - 4.6K bytes - Viewed (0) -
internal/config/dns/operator_dns.go
Subject: config.EnvDNSWebhook, } token := jwt.NewWithClaims(jwt.SigningMethodHS512, claims) ss, err := token.SignedString([]byte(c.password)) if err != nil { return err } r.Header.Set("Authorization", "Bearer "+ss) return nil } func (c *OperatorDNS) endpoint(bucket string, delete bool) (string, error) { u, err := url.Parse(c.Endpoint) if err != nil { return "", err } q := u.Query()
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 6.6K bytes - Viewed (0) -
cmd/batch-rotate.go
// kmskey: "key-id" # match objects with KMS key-id (applicable only for sse-kms) // notify: // endpoint: "https://notify.endpoint" # notification endpoint to receive job status events // token: "Bearer xxxxx" # optional authentication token for the notification endpoint // retry: // attempts: 10 # number of retries for the job before giving up // delay: "500ms" # least amount of delay between each retry
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 14.2K bytes - Viewed (0) -
internal/config/lambda/target/webhook.go
// already present we can blindly use the // authToken as is instead of adding 'Bearer' tokens := strings.Fields(target.args.AuthToken) switch len(tokens) { case 2: req.Header.Set("Authorization", target.args.AuthToken) case 1: req.Header.Set("Authorization", "Bearer "+target.args.AuthToken) } req.Header.Set("Content-Type", "application/json") return target.httpClient.Do(req) }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Nov 17 20:02:26 GMT 2023 - 6.7K bytes - Viewed (0) -
internal/rest/client.go
} } if c.newAuthToken != nil { req.Header.Set("Authorization", "Bearer "+c.newAuthToken(u.RawQuery)) } req.Header.Set("X-Minio-Time", time.Now().UTC().Format(time.RFC3339)) if tc, ok := ctx.Value(mcontext.ContextTraceKey).(*mcontext.TraceCtxt); ok { req.Header.Set(xhttp.AmzRequestID, tc.AmzReqID) } return req, nil } type respBodyMonitor struct {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Apr 28 17:53:50 GMT 2024 - 14.4K bytes - Viewed (0) -
cmd/auth-handler_test.go
}, // Test case - 2 // Check for JWT header. { req: &http.Request{ URL: &url.URL{ Host: "127.0.0.1:9000", Scheme: httpScheme, Path: SlashSeparator, }, Header: http.Header{ "Authorization": []string{"Bearer 12313123"}, }, }, authT: authTypeJWT, }, // Test case - 3 // Empty authorization header. { req: &http.Request{ URL: &url.URL{
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Feb 22 06:26:06 GMT 2024 - 15.4K bytes - Viewed (0) -
cmd/batch-expire.go
if r.NotificationCfg.Endpoint == "" { return nil } ctx, cancel := context.WithTimeout(ctx, 10*time.Second) defer cancel() req, err := http.NewRequestWithContext(ctx, http.MethodPost, r.NotificationCfg.Endpoint, body) if err != nil { return err } if r.NotificationCfg.Token != "" { req.Header.Set("Authorization", r.NotificationCfg.Token)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 21K bytes - Viewed (1)