- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 128 for role (0.4 seconds)
-
docs/sts/assume-role.md
``` > NOTE: In the following commands `--role-arn` and `--role-session-name` are not meaningful for MinIO and can be set to any value satisfying the command line requirements. ``` $ aws --profile foobar --endpoint-url http://localhost:9000 sts assume-role --policy '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:*","Resource":"arn:aws:s3:::*"}]}' --role-arn arn:xxx:xxx:xxx:xxxx --role-session-name anything {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 7.2K bytes - Click Count (0) -
tests/test_schema_compat_pydantic_v2.py
username: str role: PlatformRole | OtherRole @app.get("/users") async def get_user() -> User: return {"username": "alice", "role": "admin"} client = TestClient(app) return client @needs_py310 def test_get(client: TestClient): response = client.get("/users") assert response.json() == {"username": "alice", "role": "admin"} @needs_py310Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 20 15:55:38 GMT 2025 - 2.7K bytes - Click Count (0) -
internal/bucket/replication/replication_test.go
`<ReplicationConfiguration xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Role>arn:aws:iam::AcctID:role/role-name</Role><Rule><Status>Enabled</Status><DeleteMarkerReplication><Status>Disabled</Status></DeleteMarkerReplication><DeleteReplication><Status>Disabled</Status></DeleteReplication><Prefix>prefix</Prefix><Priority>3</Priority><Destination><Bucket>arn:minio:replication:xxx::destinationbucket</Bucket></Destination></Rule><Rule><Status>Enabled</Status><DeleteMarkerReplication><Status>Disabled</St...
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 32.4K bytes - Click Count (0) -
internal/config/identity/openid/openid.go
} // Check if claim name is the non-default value and role policy is set. if p.ClaimName != policy.PolicyName && p.RolePolicy != "" { // In the unlikely event that the user specifies // `policy.PolicyName` as the claim name explicitly and sets // a role policy, this check is thwarted, but we will be using // the role policy anyway.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 17.3K bytes - Click Count (0) -
internal/bucket/replication/rule_test.go
testCases := []struct { inputConfig string opts ObjectOpts expectedResult bool }{ // case 1 - rule with replica modification enabled; not a replica {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 4.6K bytes - Click Count (0) -
internal/bucket/replication/replication.go
if len(c.Rules) == 0 { return false } for _, rule := range c.Rules { if rule.Status == Disabled { continue } if len(prefix) > 0 && len(rule.Filter.Prefix) > 0 { // incoming prefix must be in rule prefix if !recursive && !strings.HasPrefix(prefix, rule.Filter.Prefix) { continue } // If recursive, we can skip this rule if it doesn't match the tested prefix or level below prefix
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Mar 30 00:56:02 GMT 2025 - 8.9K bytes - Click Count (0) -
docs/sts/keycloak.md
#### Adding 'admin' Role - Go to Roles - Add new Role `admin` with Description `${role_admin}`. - Add this Role into compositive role named `default-roles-{realm}` - `{realm}` should be replaced with whatever realm you created from `prerequisites` section. This role is automatically trusted in the 'Service Accounts' tab. - Check that `account` client_id has the role 'admin' assigned in the "Service Account Roles" tab.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 8.1K bytes - Click Count (0) -
tests/test_jsonable_encoder.py
data = ModelV1(name="test") with pytest.raises(PydanticV1NotSupportedError): jsonable_encoder(data) def test_encode_model_with_config(): model = ModelWithConfig(role=RoleEnum.admin) assert jsonable_encoder(model) == {"role": "admin"} def test_encode_model_with_alias_raises(): with pytest.raises(ValidationError): ModelWithAlias(foo="Bar") def test_encode_model_with_alias():
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sat Dec 27 12:54:56 GMT 2025 - 9.2K bytes - Click Count (0) -
internal/arn/arn.go
// // Reference: https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html const ( arnPrefixArn = "arn" arnPartitionMinio = "minio" arnServiceIAM = "iam" arnResourceTypeRole = "role" ) // ARN - representation of resources based on AWS ARNs. type ARN struct { Partition string Service string Region string ResourceType string ResourceID string }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 3.5K bytes - Click Count (0) -
docs/sts/web-identity.md
comma-separated list of IAM access policy names already defined in the server. In this situation, the server prints a role ARN at startup that must be specified as a `RoleArn` API request parameter in the STS AssumeRoleWithWebIdentity API call. When using Role Policies, multiple OpenID providers and/or client applications (with unique client IDs) may be configured with independent role policies. Each configuration is assigned a unique RoleARN by the MinIO server and this is used to select the policies...
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 18.9K bytes - Click Count (0)