- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 14 for Epost (0.17 sec)
-
docs/hotfixes.md
Fixes that are allowed a backport must satisfy any of the following criteria's: - A fix must not be a feature, for example. ``` commit faf013ec84051b92ae0f420a658b8d35bb7bb000 Author: Klaus Post <******@****.***> Date: Thu Nov 18 12:15:22 2021 -0800 Improve performance on multiple versions (#13573) ``` - A fix must be a valid fix that was reproduced and seen in a customer environment, for example.
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Feb 14 21:36:02 GMT 2024 - 5K bytes - Viewed (0) -
docs/sts/web-identity.md
### Errors XML error response for this API is similar to [AWS STS AssumeRoleWithWebIdentity](https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRoleWithWebIdentity.html#API_AssumeRoleWithWebIdentity_Errors) ## Sample `POST` Request ```
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 19.2K bytes - Viewed (1) -
docs/iam/identity-management-plugin.md
## REST API call to plugin To verify the custom token presented in the `AssumeRoleWithCustomToken` API, MinIO makes a POST request to the configured identity management plugin endpoint and expects a response with some details as shown below: ### Request `POST` to plugin endpoint Query parameters: | Parameter Name | Value Type | Purpose |
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 4.2K bytes - Viewed (0) -
docs/sts/custom-token-identity.md
## Example request and response Sample request with `curl`: ```sh curl -XPOST 'http://localhost:9001/?Action=AssumeRoleWithCustomToken&Version=2011-06-15&Token=aaa&RoleArn=arn:minio:iam:::role/idmp-vGxBdLkOc8mQPU1-UQbBh-yWWVQ' ``` Prettified Response: ```xml <?xml version="1.0" encoding="UTF-8"?>
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 3K bytes - Viewed (0) -
docs/sts/tls.md
``` export MINIO_IDENTITY_TLS_ENABLE=on ``` ## Example MinIO exposes a custom S3 STS API endpoint as `Action=AssumeRoleWithCertificate`. A client has to send an HTTP `POST` request to `https://<host>:<port>?Action=AssumeRoleWithCertificate&Version=2011-06-15`. Since the authentication and authorization happens via X.509 certificates the client has to send the request over **TLS** and has to provide
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Sep 29 04:28:45 GMT 2022 - 6K bytes - Viewed (0) -
CONTRIBUTING.md
- To run `make test` and `make build` completes. ### Commit changes After verification, commit your changes. This is a [great post](https://chris.beams.io/posts/git-commit/) on how to write useful commit messages ``` git commit -am 'Add some feature' ``` ### Push to the branch
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 2.8K bytes - Viewed (0) -
docs/iam/access-management-plugin.md
``` By default this plugin uses HTTP 1.x. To enable HTTP2 use the `MINIO_POLICY_PLUGIN_ENABLE_HTTP2` environment variable. ## Request and Response MinIO will make a `POST` request with a JSON body to the given plugin URL. If the auth token parameter is set, it will be sent as an authorization header. The JSON body structure can be seen from this sample:
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Dec 13 22:28:48 GMT 2022 - 4.4K bytes - Viewed (0) -
docs/bucket/notifications/README.md
| `s3:ObjectCreated:Put` | `s3:ObjectCreated:CompleteMultipartUpload` | `s3:ObjectAccessed:Head` | | `s3:ObjectCreated:Post` | `s3:ObjectRemoved:Delete` | `s3:ObjectRemoved:DeleteMarkerCreated` | | `s3:ObjectCreated:Copy` | `s3:ObjectAccessed:Get` | |
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 84K bytes - Viewed (2) -
docs/lambda/README.md
Following is an example lambda handler. ```py from flask import Flask, request, abort, make_response import requests app = Flask(__name__) @app.route('/', methods=['POST']) def get_webhook(): if request.method == 'POST': # obtain the request event from the 'POST' call event = request.json object_context = event["getObjectContext"] # Get the presigned URL to fetch the requested # original object from MinIO
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Apr 04 19:15:28 GMT 2023 - 7.6K bytes - Viewed (0) -
docs/metrics/prometheus/alerts.md
- source_match: severity: 'critical' target_match: severity: 'warning' equal: ['alertname', 'dev', 'instance'] ``` This sample configuration uses a `webhook` at http://127.0.0.1:8010/webhook to post the alerts. Start the AlertManager and it listens on port `9093` by default. Make sure your webhook is up and listening for the alerts. ## Configure Prometheus to use AlertManager Add below section to your `prometheus.yml`
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Jan 28 20:53:59 GMT 2024 - 4.4K bytes - Viewed (0)