- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 43 for arn (0.25 sec)
-
cmd/bucket-targets.go
} } sys.incTargetErr(bucket, arn) }() return nil } // GetRemoteBucketTargetByArn returns BucketTarget for a ARN func (sys *BucketTargetSys) GetRemoteBucketTargetByArn(ctx context.Context, bucket, arn string) madmin.BucketTarget { sys.RLock() defer sys.RUnlock() var tgt madmin.BucketTarget for _, t := range sys.targetsMap[bucket] { if t.Arn == arn { tgt = t.Clone()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 20.9K bytes - Viewed (0) -
cmd/bucket-stats.go
defer r.RUnlock() brs, ok := r.Cache[bucket] if !ok { return qs } for arn := range brs.Stats { qs.TgtXferStats[arn] = make(map[RMetricName]XferStats) } count := 0 var totPeak float64 // calculate large, small transfers and total transfer rates per replication target at bucket level for arn, v := range brs.Stats { lcurrTgt := v.XferRateLrg.curr() scurrTgt := v.XferRateSml.curr()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 13.5K bytes - Viewed (0) -
docs/sts/assume-role.md
``` > NOTE: In the following commands `--role-arn` and `--role-session-name` are not meaningful for MinIO and can be set to any value satisfying the command line requirements. ``` $ aws --profile foobar --endpoint-url http://localhost:9000 sts assume-role --policy '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:*","Resource":"arn:aws:s3:::*"}]}' --role-arn arn:xxx:xxx:xxx:xxxx --role-session-name anything {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.2K bytes - Viewed (0) -
cmd/bucket-replication-utils.go
func (rs *ReplicationState) targetState(arn string) (r replicatedTargetInfo) { return replicatedTargetInfo{ Arn: arn, PrevReplicationStatus: rs.Targets[arn], VersionPurgeStatus: rs.PurgeTargets[arn], ResyncTimestamp: rs.ResetStatusesMap[arn], } }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 26K bytes - Viewed (0) -
cmd/iam.go
} // GetRolePolicy - returns policies associated with a role ARN. func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) { roleArn, err := arn.Parse(arnStr) if err != nil { return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err) } rolePolicy, ok := sys.rolesMap[roleArn] if !ok { return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
cmd/bucket-replication-utils_test.go
} for arn, tdsc := range dsc.targetsMap { expDsc, ok := test.expDsc.targetsMap[arn] if !ok || expDsc != tdsc { t.Errorf("Test%d (%s): Invalid target replicate decision: got %+v, want %+v", i+1, test.name, tdsc, expDsc) } } } } var replicationStateTest = []struct { name string rs ReplicationState arn string expStatus replication.StatusType
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 9.3K bytes - Viewed (0) -
cmd/bucket-replication_test.go
ReplicationStatus: replication.Pending, VersionID: "a3348c34-c352-4498-82f0-1098e8b34df9", }, rcfg: replicationConfig{remotes: &madmin.BucketTargets{Targets: []madmin.BucketTarget{{ Arn: "arn1", }}}}, dsc: ReplicateDecision{targetsMap: map[string]replicateTargetDecision{"arn1": newReplicateTargetDecision("arn1", true, false)}}, expectedSync: true, },
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 12.1K bytes - Viewed (0) -
cmd/admin-handlers-idp-openid.go
continue // skip if not the type we want } arn, ok := accessKey.Claims[roleArnClaim].(string) if !ok { if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok { continue // skip if no roleArn and no policy claim } // claim-based provider is in the roleArnMap under dummy ARN arn = dummyRoleARN } matchingCfgName, ok := roleArnMap[arn] if !ok {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
cmd/bucket-replication-handlers.go
OpType: replication.ResyncReplicationType, TargetArn: arn, }) if len(tgtArns) == 0 { writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErrWithErr(ErrBadRequest, InvalidArgument{ Bucket: bucket, Err: fmt.Errorf("Remote target ARN %s missing or ineligible for replication resync", arn), }), r.URL) return } if len(tgtArns) > 1 && arn == "" {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 15 12:04:40 UTC 2024 - 23.3K bytes - Viewed (0) -
cmd/bucket-notification-handlers.go
for i, queue := range config.QueueList { // Remove ARN not found queues, because we previously allowed // adding unexpected entries into the config. // // With newer config disallowing changing / turning off // notification targets without removing ARN in notification // configuration we won't see this problem anymore. if reflect.DeepEqual(queue.ARN, arnErr.ARN) && i < len(config.QueueList) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 5.1K bytes - Viewed (0)