Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 68 for verified (0.04 sec)

  1. cmd/os-reliable.go

    	}
    
    	if err = checkPathLength(dirPath); err != nil {
    		return err
    	}
    
    	if err = reliableRemoveAll(dirPath); err != nil {
    		switch {
    		case isSysErrNotDir(err):
    			// File path cannot be verified since one of
    			// the parents is a file.
    			return errFileAccessDenied
    		case isSysErrPathNotFound(err):
    			// This is a special case should be handled only for
    			// windows, because windows API does not return "not a
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Apr 22 17:49:30 UTC 2024
    - 5.8K bytes
    - Viewed (0)
  2. cmd/bitrot-whole.go

    type wholeBitrotReader struct {
    	disk       StorageAPI
    	volume     string
    	filePath   string
    	verifier   *BitrotVerifier // Holds the bit-rot info
    	tillOffset int64           // Affects the length of data requested in disk.ReadFile depending on Read()'s offset
    	buf        []byte          // Holds bit-rot verified data
    }
    
    func (b *wholeBitrotReader) ReadAt(buf []byte, offset int64) (n int, err error) {
    	if b.buf == nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Jan 31 02:11:45 UTC 2024
    - 2.7K bytes
    - Viewed (0)
  3. docs/debugging/xl-meta/main.go

    				}
    				if splitData[shardsIdx][startOffset+i] != shards[shardsIdx][i] {
    					fmt.Println("Internal error: Mismatch at", startOffset+i)
    				}
    				verified++
    			}
    		}
    	}
    	fmt.Println("Reconstructed", reconstructed, "bytes and verified", verified, "bytes of partial shard with config", string(shardConfig))
    }
    
    // bitrot returns a shard beginning at startOffset after doing bitrot checks.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 40.3K bytes
    - Viewed (0)
  4. docs/bucket/replication/setup_3site_replication.sh

    	echo "verified sitea-> COMPLETED, siteb-> REPLICA"
    fi
    
    if diff -pruN <(./mc stat --no-list --json sitea/bucket/hosts | jq .) <(./mc stat --no-list --json sitec/bucket/hosts | jq .) | grep -q 'COMPLETED\|REPLICA'; then
    	echo "verified sitea-> COMPLETED, sitec-> REPLICA"
    fi
    
    echo "Verifying the metadata difference between source and target"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 10.3K bytes
    - Viewed (0)
  5. docs/sts/wso2.md

    2. The id_token self-contains the authorization information in a manner that can be verified. For example, by encoding authorization information along with a signature into the token.
    
    WSO2 generates tokens in first style by default, but if to be used with MinIO we should configure WSO2 to provide JWT tokens instead.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 8.7K bytes
    - Viewed (0)
  6. cmd/object-api-getobjectinfo_test.go

    				t.Errorf("Test %d: %s: Expected to fail with error \"%s\", but instead failed with error \"%s\" instead", i+1, instanceType, testCase.err.Error(), err.Error())
    			}
    		}
    
    		// Test passes as expected, but the output values are verified for correctness here.
    		if err == nil && testCase.shouldPass {
    			if testCase.result.Bucket != result.Bucket {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Dec 23 15:46:00 UTC 2022
    - 5.6K bytes
    - Viewed (0)
  7. cmd/object-api-putobject_test.go

    			continue
    		}
    		// Test passes as expected, but the output values are verified for correctness here.
    		if actualErr == nil {
    			// Asserting whether the md5 output is correct.
    			if expectedMD5, ok := testCase.inputMeta["etag"]; ok && expectedMD5 != objInfo.ETag {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Feb 22 06:26:06 UTC 2024
    - 25.8K bytes
    - Viewed (0)
  8. docs/sts/ldap.md

    ```
    
    The search filter must use the LDAP username to find the user DN. This is done via [variable substitution](#variable-substitution-in-configuration-strings).
    
    The returned user's DN and their password are then verified with the LDAP server. The user DN may also be associated with an [access policy](#managing-usergroup-access-policy).
    
    The User DN attributes configuration parameter:
    ```
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  9. src/archive/tar/writer_test.go

    				Uname:    "dsymonds",
    				Gname:    "eng",
    				ModTime:  time.Unix(1254699560, 0),
    				Format:   FormatGNU,
    			}, nil},
    		},
    	}, {
    		// This truncated file was produced using this library.
    		// It was verified to work with GNU tar 1.27.1 and BSD tar 3.1.2.
    		//  dd if=/dev/zero bs=1G count=16 >> writer-big-long.tar
    		//  gnutar -xvf writer-big-long.tar
    		//  bsdtar -xvf writer-big-long.tar
    		//
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Mon Feb 03 16:38:43 UTC 2025
    - 39.8K bytes
    - Viewed (0)
  10. docs/en/docs/deployment/https.md

    The domains are securely verified and the certificates are generated automatically. This also allows automating the renewal of these certificates.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
Back to top