- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 23 for myclientid (0.08 sec)
-
docs/bucket/notifications/README.md
def on_message(client, userdata, msg): print(msg.payload) # client_id is a randomly generated unique ID for the mqtt broker to identify the connection. client = mqtt.Client(client_id="myclientid",clean_session=False) client.on_connect = on_connect client.on_message = on_message client.connect("localhost",1883,60) client.loop_forever() ```
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 84K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } else { res.ClaimProvider = madmin.OpenIDProviderSettings{ ClaimUserinfoEnabled: provCfg.ClaimUserinfo, RolePolicy: provCfg.RolePolicy, ClientID: provCfg.ClientID, HashedClientSecret: hashedSecret, } } }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 16.6K bytes - Viewed (0) -
cmd/warm-backend-azure.go
return errors.New("the account name is required") case conf.AccountKey != "" && (conf.SPAuth.TenantID != "" || conf.SPAuth.ClientID != "" || conf.SPAuth.ClientSecret != ""): return errors.New("multiple authentication mechanisms are provided") case conf.AccountKey == "" && (conf.SPAuth.TenantID == "" || conf.SPAuth.ClientID == "" || conf.SPAuth.ClientSecret == ""): return errors.New("no authentication mechanism was provided") }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 7K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
pCfg := r.arnProviderCfgsMap[arn] if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" { return nil } // Add client secret for the client ID for HMAC based signature. r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret)) client := &http.Client{ Transport: r.transport, } resp, err := client.Get(pCfg.JWKS.URL.String()) if err != nil { return err } defer r.closeRespFn(resp.Body)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 02:46:36 UTC 2024 - 8.4K bytes - Viewed (0) -
internal/config/identity/openid/provider/keycloak.go
return ErrNotImplemented } // LoginWithClientID is implemented by Keycloak service account support func (k *KeycloakProvider) LoginWithClientID(clientID, clientSecret string) error { values := url.Values{} values.Set("client_id", clientID) values.Set("client_secret", clientSecret) values.Set("grant_type", "client_credentials")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Jul 14 18:12:07 UTC 2024 - 4.6K bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 4.6K bytes - Viewed (0) -
cmd/config-versions.go
} // ConsoleLogger is introduced to workaround the dependency about logrus type ConsoleLogger struct { Enable bool `json:"enable"` } // serverConfigV33 is just like version '32', removes clientID from NATS and MQTT, and adds queueDir, queueLimit in all notification targets. type serverConfigV33 struct { quick.Config `json:"-"` // ignore interfaces Version string `json:"version"` // S3 API configuration.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 2.5K bytes - Viewed (0) -
internal/config/identity/openid/provider/provider.go
// Provider implements identity provider specific admin operations, such as // looking up users, fetching additional attributes etc. type Provider interface { LoginWithUser(username, password string) error LoginWithClientID(clientID, clientSecret string) error LookupUser(userid string) (User, error)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 2.7K bytes - Viewed (0) -
internal/event/target/mqtt.go
args := target.args // Using hex here, to make sure we avoid 23 // character limit on client_id according to // MQTT spec. clientID := fmt.Sprintf("%x", time.Now().UnixNano()) options := mqtt.NewClientOptions(). SetClientID(clientID). SetCleanSession(true). SetUsername(args.User). SetPassword(args.Password). SetMaxReconnectInterval(args.MaxReconnectInterval).
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Sep 06 23:06:30 UTC 2024 - 8.2K bytes - Viewed (0) -
cmd/tier.go
if creds.SecretKey != "" { cfg.Azure.AccountKey = creds.SecretKey } if creds.AzSP.TenantID != "" { cfg.Azure.SPAuth.TenantID = creds.AzSP.TenantID } if creds.AzSP.ClientID != "" { cfg.Azure.SPAuth.ClientID = creds.AzSP.ClientID } if creds.AzSP.ClientSecret != "" { cfg.Azure.SPAuth.ClientSecret = creds.AzSP.ClientSecret } case madmin.GCS: if creds.CredsJSON == nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 12 20:44:05 UTC 2024 - 15.7K bytes - Viewed (0)