Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 35 for myclientid (0.06 seconds)

  1. docs/bucket/notifications/README.md

    def on_message(client, userdata, msg):
        print(msg.payload)
    
    # client_id is a randomly generated unique ID for the mqtt broker to identify the connection.
    client = mqtt.Client(client_id="myclientid",clean_session=False)
    
    client.on_connect = on_connect
    client.on_message = on_message
    
    client.connect("localhost",1883,60)
    client.loop_forever()
    ```
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Tue Aug 12 18:20:36 GMT 2025
    - 84.2K bytes
    - Click Count (0)
  2. docs/sts/web-identity.go

    	}
    
    	scopes := ddoc.ScopesSupported
    	if clientScopes != "" {
    		scopes = strings.Split(clientScopes, ",")
    	}
    
    	ctx := context.Background()
    
    	config := oauth2.Config{
    		ClientID:     clientID,
    		ClientSecret: clientSec,
    		Endpoint: oauth2.Endpoint{
    			AuthURL:  ddoc.AuthEndpoint,
    			TokenURL: ddoc.TokenEndpoint,
    		},
    		RedirectURL: fmt.Sprintf("http://10.0.0.67:%d/oauth2/callback", port),
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri May 19 09:13:33 GMT 2023
    - 7.8K bytes
    - Click Count (0)
  3. internal/config/identity/openid/openid.go

    				RolePolicy:           provCfg.RolePolicy,
    				ClientID:             provCfg.ClientID,
    				HashedClientSecret:   hashedSecret,
    			}
    		} else {
    			res.ClaimProvider = madmin.OpenIDProviderSettings{
    				ClaimUserinfoEnabled: provCfg.ClaimUserinfo,
    				RolePolicy:           provCfg.RolePolicy,
    				ClientID:             provCfg.ClientID,
    				HashedClientSecret:   hashedSecret,
    			}
    		}
    	}
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 17.3K bytes
    - Click Count (0)
  4. tests/test_swagger_ui_escape.py

    
    def test_normal_init_oauth_still_works():
        html = get_swagger_ui_html(
            openapi_url="/openapi.json",
            title="Test",
            init_oauth={"clientId": "my-client", "appName": "My App"},
        )
        body = html.body.decode()
        assert '"clientId": "my-client"' in body
        assert '"appName": "My App"' in body
    Created: Sun Apr 05 07:19:11 GMT 2026
    - Last Modified: Tue Feb 24 09:28:10 GMT 2026
    - 1.1K bytes
    - Click Count (0)
  5. internal/config/identity/openid/jwt.go

    	pCfg := r.arnProviderCfgsMap[arn]
    	if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" {
    		return nil
    	}
    
    	// Add client secret for the client ID for HMAC based signature.
    	r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret))
    
    	client := &http.Client{
    		Transport: r.transport,
    	}
    
    	resp, err := client.Get(pCfg.JWKS.URL.String())
    	if err != nil {
    		return err
    	}
    	defer r.closeRespFn(resp.Body)
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 8.4K bytes
    - Click Count (0)
  6. cmd/warm-backend-azure.go

    		return errors.New("the account name is required")
    	case conf.AccountKey != "" && (conf.SPAuth.TenantID != "" || conf.SPAuth.ClientID != "" || conf.SPAuth.ClientSecret != ""):
    		return errors.New("multiple authentication mechanisms are provided")
    	case conf.AccountKey == "" && (conf.SPAuth.TenantID == "" || conf.SPAuth.ClientID == "" || conf.SPAuth.ClientSecret == ""):
    		return errors.New("no authentication mechanism was provided")
    	}
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Thu Oct 31 22:10:24 GMT 2024
    - 7K bytes
    - Click Count (0)
  7. internal/config/identity/openid/providercfg.go

    		ClaimPrefix:        getCfgVal(ClaimPrefix),
    		RedirectURI:        getCfgVal(RedirectURI),
    		RedirectURIDynamic: getCfgVal(RedirectURIDynamic) == config.EnableOn,
    		ClientID:           getCfgVal(ClientID),
    		ClientSecret:       getCfgVal(ClientSecret),
    		RolePolicy:         getCfgVal(RolePolicy),
    		UserReadableClaim:  getCfgVal(UserReadableClaim),
    		UserIDClaim:        getCfgVal(UserIDClaim),
    	}
    }
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 4.7K bytes
    - Click Count (0)
  8. internal/config/identity/openid/help.go

    			Type:        "url",
    		},
    		config.HelpKV{
    			Key:         ClientID,
    			Description: `unique public identifier for apps e.g. "292085223830.apps.googleusercontent.com"` + defaultHelpPostfix(ClientID),
    			Type:        "string",
    		},
    		config.HelpKV{
    			Key:         ClientSecret,
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Jun 23 14:45:27 GMT 2023
    - 4.3K bytes
    - Click Count (0)
  9. internal/config/identity/openid/provider/keycloak.go

    	return ErrNotImplemented
    }
    
    // LoginWithClientID is implemented by Keycloak service account support
    func (k *KeycloakProvider) LoginWithClientID(clientID, clientSecret string) error {
    	values := url.Values{}
    	values.Set("client_id", clientID)
    	values.Set("client_secret", clientSecret)
    	values.Set("grant_type", "client_credentials")
    
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Jul 14 18:12:07 GMT 2024
    - 4.6K bytes
    - Click Count (0)
  10. cmd/config-versions.go

    }
    
    // ConsoleLogger is introduced to workaround the dependency about logrus
    type ConsoleLogger struct {
    	Enable bool `json:"enable"`
    }
    
    // serverConfigV33 is just like version '32', removes clientID from NATS and MQTT, and adds queueDir, queueLimit in all notification targets.
    type serverConfigV33 struct {
    	quick.Config `json:"-"` // ignore interfaces
    
    	Version string `json:"version"`
    
    	// S3 API configuration.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri May 24 23:05:23 GMT 2024
    - 2.5K bytes
    - Click Count (0)
Back to Top