Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 43 for arn (0.25 sec)

  1. cmd/bucket-targets.go

    			}
    		}
    		sys.incTargetErr(bucket, arn)
    	}()
    	return nil
    }
    
    // GetRemoteBucketTargetByArn returns BucketTarget for a ARN
    func (sys *BucketTargetSys) GetRemoteBucketTargetByArn(ctx context.Context, bucket, arn string) madmin.BucketTarget {
    	sys.RLock()
    	defer sys.RUnlock()
    	var tgt madmin.BucketTarget
    	for _, t := range sys.targetsMap[bucket] {
    		if t.Arn == arn {
    			tgt = t.Clone()
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 20.9K bytes
    - Viewed (0)
  2. cmd/bucket-stats.go

    	defer r.RUnlock()
    
    	brs, ok := r.Cache[bucket]
    	if !ok {
    		return qs
    	}
    	for arn := range brs.Stats {
    		qs.TgtXferStats[arn] = make(map[RMetricName]XferStats)
    	}
    	count := 0
    	var totPeak float64
    	// calculate large, small transfers and total transfer rates per replication target at bucket level
    	for arn, v := range brs.Stats {
    		lcurrTgt := v.XferRateLrg.curr()
    		scurrTgt := v.XferRateSml.curr()
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 13.5K bytes
    - Viewed (0)
  3. docs/sts/assume-role.md

    ```
    
    > NOTE: In the following commands `--role-arn` and `--role-session-name` are not meaningful for MinIO and can be set to any value satisfying the command line requirements.
    
    ```
    $ aws --profile foobar --endpoint-url http://localhost:9000 sts assume-role --policy '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:*","Resource":"arn:aws:s3:::*"}]}' --role-arn arn:xxx:xxx:xxx:xxxx --role-session-name anything
    {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 7.2K bytes
    - Viewed (0)
  4. cmd/bucket-replication-utils.go

    func (rs *ReplicationState) targetState(arn string) (r replicatedTargetInfo) {
    	return replicatedTargetInfo{
    		Arn:                   arn,
    		PrevReplicationStatus: rs.Targets[arn],
    		VersionPurgeStatus:    rs.PurgeTargets[arn],
    		ResyncTimestamp:       rs.ResetStatusesMap[arn],
    	}
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 26K bytes
    - Viewed (0)
  5. cmd/iam.go

    }
    
    // GetRolePolicy - returns policies associated with a role ARN.
    func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) {
    	roleArn, err := arn.Parse(arnStr)
    	if err != nil {
    		return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err)
    	}
    	rolePolicy, ok := sys.rolesMap[roleArn]
    	if !ok {
    		return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr)
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  6. cmd/bucket-replication-utils_test.go

    		}
    		for arn, tdsc := range dsc.targetsMap {
    			expDsc, ok := test.expDsc.targetsMap[arn]
    			if !ok || expDsc != tdsc {
    				t.Errorf("Test%d (%s): Invalid  target replicate decision: got %+v, want %+v", i+1, test.name, tdsc, expDsc)
    			}
    		}
    	}
    }
    
    var replicationStateTest = []struct {
    	name      string
    	rs        ReplicationState
    	arn       string
    	expStatus replication.StatusType
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 9.3K bytes
    - Viewed (0)
  7. cmd/bucket-replication_test.go

    				ReplicationStatus:         replication.Pending,
    				VersionID:                 "a3348c34-c352-4498-82f0-1098e8b34df9",
    			},
    			rcfg: replicationConfig{remotes: &madmin.BucketTargets{Targets: []madmin.BucketTarget{{
    				Arn: "arn1",
    			}}}},
    			dsc:          ReplicateDecision{targetsMap: map[string]replicateTargetDecision{"arn1": newReplicateTargetDecision("arn1", true, false)}},
    			expectedSync: true,
    		},
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  8. cmd/admin-handlers-idp-openid.go

    			continue // skip if not the type we want
    		}
    		arn, ok := accessKey.Claims[roleArnClaim].(string)
    		if !ok {
    			if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok {
    				continue // skip if no roleArn and no policy claim
    			}
    			// claim-based provider is in the roleArnMap under dummy ARN
    			arn = dummyRoleARN
    		}
    		matchingCfgName, ok := roleArnMap[arn]
    		if !ok {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:38:46 UTC 2025
    - 7.6K bytes
    - Viewed (0)
  9. cmd/bucket-replication-handlers.go

    			OpType:    replication.ResyncReplicationType,
    			TargetArn: arn,
    		})
    
    	if len(tgtArns) == 0 {
    		writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErrWithErr(ErrBadRequest, InvalidArgument{
    			Bucket: bucket,
    			Err:    fmt.Errorf("Remote target ARN %s missing or ineligible for replication resync", arn),
    		}), r.URL)
    		return
    	}
    
    	if len(tgtArns) > 1 && arn == "" {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Aug 15 12:04:40 UTC 2024
    - 23.3K bytes
    - Viewed (0)
  10. cmd/bucket-notification-handlers.go

    			for i, queue := range config.QueueList {
    				// Remove ARN not found queues, because we previously allowed
    				// adding unexpected entries into the config.
    				//
    				// With newer config disallowing changing / turning off
    				// notification targets without removing ARN in notification
    				// configuration we won't see this problem anymore.
    				if reflect.DeepEqual(queue.ARN, arnErr.ARN) && i < len(config.QueueList) {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 5.1K bytes
    - Viewed (0)
Back to top