- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 45 for validation (0.22 sec)
-
internal/logger/console.go
args = append(args, msg) msg = "%s" } console.pretty(msg+"\n", args...) } } // Fatal prints only fatal error message with no stack trace // it will be called for input validation failures func Fatal(err error, msg string, data ...interface{}) { fatal(err, msg, data...) } func fatal(err error, msg string, data ...interface{}) { var errMsg string if msg != "" {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed May 01 17:57:52 GMT 2024 - 5.8K bytes - Viewed (0) -
cmd/object-api-errors.go
} // ReplicationPermissionCheck - Check if error type is ReplicationPermissionCheck. type ReplicationPermissionCheck struct{} func (e ReplicationPermissionCheck) Error() string { return "Replication permission validation requests cannot be completed" } func isReplicationPermissionCheck(err error) bool { _, ok := err.(ReplicationPermissionCheck) return ok
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun May 05 16:56:21 GMT 2024 - 21.3K bytes - Viewed (0) -
cmd/api-errors.go
HTTPStatusCode: http.StatusBadRequest, }, ErrReplicationValidationError: { Code: "InvalidRequest", Description: "Replication validation failed on target", HTTPStatusCode: http.StatusBadRequest, }, ErrReplicationPermissionCheckError: { Code: "ReplicationPermissionCheck",
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun May 05 16:56:21 GMT 2024 - 91.4K bytes - Viewed (7) -
cmd/warm-backend-minio.go
DisableContentSha256: true, }) return remoteVersionID(res.VersionID), m.ToObjectError(err, object) } func newWarmBackendMinIO(conf madmin.TierMinIO, tier string) (*warmBackendMinIO, error) { // Validation of credentials if conf.AccessKey == "" || conf.SecretKey == "" { return nil, errors.New("both access and secret keys are required") } if conf.Bucket == "" {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Apr 21 11:43:18 GMT 2024 - 3.8K bytes - Viewed (0) -
cmd/iam.go
return (isOwnerDerived || combinedPolicy.IsAllowed(parentArgs)) } // IsAllowedSTS is meant for STS based temporary credentials, // which implements claims validation and verification other than // applying policies. func (sys *IAMSys) IsAllowedSTS(args policy.Args, parentUser string) bool { // 1. Determine mapped policies
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 71.1K bytes - Viewed (1) -
cmd/erasure-server-pool.go
if err != nil { return nil, err } } if err = storageclass.ValidateParity(commonParityDrives, ep.DrivesPerSet); err != nil { return nil, fmt.Errorf("parity validation returned an error: %w <- (%d, %d), for pool(%s)", err, commonParityDrives, ep.DrivesPerSet, humanize.Ordinal(i+1)) } bootstrapTrace("waitForFormatErasure: loading disks", func() {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 03 20:08:20 GMT 2024 - 80.5K bytes - Viewed (0) -
cmd/signature-v4-utils_test.go
} if policies[0] != "consoleAdmin" { t.Fatalf("expected 'consoleAdmin', %s", policies[0]) } } // TestSkipContentSha256Cksum - Test validate the logic which decides whether // to skip checksum validation based on the request header. func TestSkipContentSha256Cksum(t *testing.T) { testCases := []struct { inputHeaderKey string inputHeaderValue string inputQueryKey string inputQueryValue string
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 05 21:26:41 GMT 2024 - 14.3K bytes - Viewed (0) -
cmd/server_test.go
0, nil, s.accessKey, s.secretKey, s.signer) c.Assert(err, nil) // executing the HTTP request. response, err = s.client.Do(request) c.Assert(err, nil) // validating the response status code. c.Assert(response.StatusCode, http.StatusOK) // reading the response body. // response body is expected to have the copied content of the first uploaded object.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Feb 22 06:26:06 GMT 2024 - 108K bytes - Viewed (0) -
cmd/auth-handler.go
_, ok := supportedS3AuthTypes[aType] return ok } // setAuthMiddleware to validate authorization header for the incoming request. func setAuthMiddleware(h http.Handler) http.Handler { // handler for validating incoming authorization headers. return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { tc, ok := r.Context().Value(mcontext.ContextTraceKey).(*mcontext.TraceCtxt) aType := getRequestAuthType(r)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 26K bytes - Viewed (0) -
internal/event/target/postgresql.go
return fmt.Errorf("unrecognized format value") } } if p.ConnectionString != "" { // No pq API doesn't help to validate connection string // prior connection, so no validation for now. } else { // Some fields need to be specified when ConnectionString is unspecified if p.Port == "" { return fmt.Errorf("unspecified port") } if _, err := strconv.Atoi(p.Port); err != nil {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Apr 24 17:51:07 GMT 2024 - 13.3K bytes - Viewed (0)