Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for twenty (0.2 sec)

  1. internal/logger/message/audit/entry.go

    func NewEntry(deploymentID string) audit.Entry {
    	return audit.Entry{
    		Version:      Version,
    		DeploymentID: deploymentID,
    		Time:         time.Now().UTC(),
    	}
    }
    
    // ToEntry - constructs an audit entry from a http request
    func ToEntry(w http.ResponseWriter, r *http.Request, reqClaims map[string]interface{}, deploymentID string) audit.Entry {
    	entry := NewEntry(deploymentID)
    
    	entry.RemoteHost = handlers.GetSourceIP(r)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Sep 04 19:57:37 GMT 2023
    - 2.2K bytes
    - Viewed (0)
  2. docs/debugging/inspect/decrypt-v1.go

    		return fmt.Errorf("Invalid key checksum, want %x, got %x", want, got)
    	}
    
    	stream, err := sio.AES_256_GCM.Stream(key)
    	if err != nil {
    		return err
    	}
    	// Zero nonce, we only use each key once, and 32 bytes is plenty.
    	nonce := make([]byte, stream.NonceSize())
    	encr := stream.DecryptReader(r, nonce, nil)
    	_, err = io.Copy(w, encr)
    	if err == nil {
    		fmt.Println(okMsg)
    	}
    	return err
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 11 21:22:47 GMT 2024
    - 1.6K bytes
    - Viewed (0)
  3. LICENSE

      No covered work shall be deemed part of an effective technological
    measure under any applicable law fulfilling obligations under article
    11 of the WIPO copyright treaty adopted on 20 December 1996, or
    similar laws prohibiting or restricting circumvention of such
    measures.
    
      When you convey a covered work, you waive any legal power to forbid
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 23 18:58:53 GMT 2021
    - 33.7K bytes
    - Viewed (0)
  4. cmd/admin-handlers.go

    	now := time.Now().UTC()
    	entryMap := make(map[string]*madmin.LockEntry)
    	toEntry := func(lri lockRequesterInfo) string {
    		return fmt.Sprintf("%s/%s", lri.Name, lri.UID)
    	}
    	for _, peerLock := range peerLocks {
    		if peerLock == nil {
    			continue
    		}
    		for k, v := range peerLock.Locks {
    			for _, lockReqInfo := range v {
    				if val, ok := entryMap[toEntry(lockReqInfo)]; ok {
    					val.ServerList = append(val.ServerList, peerLock.Addr)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Apr 29 17:39:04 GMT 2024
    - 97.8K bytes
    - Viewed (2)
  5. docs/LICENSE

         Rights.
    
      d. Effective Technological Measures means those measures that, in the
         absence of proper authority, may not be circumvented under laws
         fulfilling obligations under Article 11 of the WIPO Copyright
         Treaty adopted on December 20, 1996, and/or similar international
         agreements.
    
      e. Exceptions and Limitations means fair use, fair dealing, and/or
         any other exception or limitation to Copyright and Similar Rights
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon May 10 16:50:06 GMT 2021
    - 18.2K bytes
    - Viewed (0)
  6. docs/bucket/replication/DESIGN.md

    It must be noted that if active-active replication is set up with delete marker replication, there is potential for duplicate delete markers to be created if both source and target concurrently set a Delete Marker or if one/both of the clusters went down at tandem before the replication event was synced.This is an unavoidable side-effect in active-active replication caused by allowing delete markers set on a object version with `REPLICA` status back to source.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Sep 29 04:28:45 GMT 2022
    - 14.7K bytes
    - Viewed (0)
  7. internal/logger/audit.go

    		return
    	}
    
    	var entry audit.Entry
    	if w != nil && r != nil {
    		reqInfo := GetReqInfo(ctx)
    		if reqInfo == nil {
    			return
    		}
    		reqInfo.RLock()
    		defer reqInfo.RUnlock()
    
    		entry = internalAudit.ToEntry(w, r, reqClaims, xhttp.GlobalDeploymentID)
    		// indicates all requests for this API call are inbound
    		entry.Trigger = "incoming"
    
    		for _, filterKey := range filterKeys {
    			delete(entry.ReqClaims, filterKey)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 4.6K bytes
    - Viewed (0)
  8. docs/distributed/DESIGN.md

    the number of drives to 16 for erasure set because, erasure code shards more than 16 can become chatty and do not have any performance advantages. Additionally since 16 drive erasure set gives you tolerance of 8 drives per object by default which is plenty in any practical scenario.
    
    - Choice of erasure set size is automatic based on the number of drives available, let's say for example if there are 32 servers and 32 drives which is a total of 1024 drives. In this scenario 16 becomes the erasure...
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Aug 15 23:04:20 GMT 2023
    - 8K bytes
    - Viewed (0)
  9. CREDITS

         thereof, including any amended or successor version of such
         directive); and
    vii. other similar, equivalent or corresponding rights throughout the
         world based on applicable law or treaty, and any national
         implementations thereof.
    
    2. Waiver. To the greatest extent permitted by, but not in contravention
    of, applicable law, Affirmer hereby overtly, fully, permanently,
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 26 06:31:35 GMT 2024
    - 1.6M bytes
    - Viewed (0)
Back to top