- Sort Score
- Num 10 results
- Language All
Results 21 - 30 of 1,841 for aren (0.03 seconds)
-
cmd/object-api-errors.go
return "Remote with this label already exists for this bucket: " + e.Bucket } // BucketRemoteArnTypeInvalid arn type for remote is not valid. type BucketRemoteArnTypeInvalid GenericError func (e BucketRemoteArnTypeInvalid) Error() string { return "Remote ARN type not valid: " + e.Bucket } // BucketRemoteArnInvalid arn needs to be specified. type BucketRemoteArnInvalid GenericError
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 09 02:05:14 GMT 2024 - 22.1K bytes - Click Count (0) -
cmd/admin-bucket-handlers.go
if update { ops = madmin.GetTargetUpdateOps(r.Form) } else { var exists bool // true if arn exists target.Arn, exists = globalBucketTargetSys.getRemoteARN(bucket, &target, "") if exists && target.Arn != "" { // return pre-existing ARN data, err := json.Marshal(target.Arn) if err != nil { writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) return }Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Feb 18 16:25:55 GMT 2025 - 33.3K bytes - Click Count (0) -
cmd/api-errors.go
Code: "XMinioAdminRemoteRemoveDisallowed", Description: "This ARN is in use by an existing configuration", HTTPStatusCode: http.StatusBadRequest, }, ErrBucketRemoteArnTypeInvalid: { Code: "XMinioAdminRemoteARNTypeInvalid", Description: "The bucket remote ARN type is not valid", HTTPStatusCode: http.StatusBadRequest, }, ErrBucketRemoteArnInvalid: {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Apr 16 07:34:24 GMT 2025 - 93K bytes - Click Count (3) -
docs/sts/web-identity.md
OpenID provider configuration, all users authenticating via this provider are authorized to (only) use the specified role policy. The policy to associate with such users is specified via the `role_policy` configuration parameter or the `MINIO_IDENTITY_OPENID_ROLE_POLICY` environment variable. The value is a comma-separated list of IAM access policy names already defined in the server. In this situation, the server prints a role ARN at startup that must be specified as a `RoleArn` API request parameter...
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 18.9K bytes - Click Count (0) -
cmd/bucket-replication-handlers.go
OpType: replication.ResyncReplicationType, TargetArn: arn, }) if len(tgtArns) == 0 { writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErrWithErr(ErrBadRequest, InvalidArgument{ Bucket: bucket, Err: fmt.Errorf("Remote target ARN %s missing or ineligible for replication resync", arn), }), r.URL) return } if len(tgtArns) > 1 && arn == "" {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 15 12:04:40 GMT 2024 - 23.3K bytes - Click Count (0) -
cmd/veeam-sos-api.go
// // - Optional: Set server preferences for Backup & Replication parallel sessions, batch size of deletes, and block sizes (before // compression). This is an optional area; by default, there should be no <SystemRecommendations> section in the // system.xml. Vendors can work with Veeam Product Management and the Alliances team on getting approval to integrate
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Thu Aug 15 00:34:56 GMT 2024 - 8.8K bytes - Click Count (0) -
cmd/bucket-replication.go
d, ok := dsc.targetsMap[tgt.Arn] if !ok { continue } if !d.Replicate { continue } r.targets[d.Arn] = resyncTarget(oi, tgt.Arn, tgt.ResetID, tgt.ResetBeforeDate, tgtStatuses[tgt.Arn]) } return r } func targetResetHeader(arn string) string { return fmt.Sprintf("%s-%s", ReservedMetadataPrefixLower+ReplicationReset, arn) }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 118.2K bytes - Click Count (0) -
docs/de/docs/tutorial/cookie-param-models.md
Ihre API hat jetzt die Macht, ihre eigene <abbr title="Das ist ein Scherz, nur für den Fall. Es hat nichts mit Cookie-Einwilligungen zu tun, aber es ist witzig, dass selbst die API jetzt die armen Cookies ablehnen kann. Haben Sie einen Keks. 🍪">Cookie-Einwilligung</abbr> zu kontrollieren. 🤪🍪 Sie können die Modellkonfiguration von Pydantic verwenden, um `extra` Felder zu verbieten (`forbid`):
Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Dec 10 13:54:34 GMT 2025 - 3.8K bytes - Click Count (0) -
cmd/warm-backend-s3.go
return nil, errors.New("both the token file and the role ARN are required") case conf.AccessKey == "" && conf.SecretKey != "" || conf.AccessKey != "" && conf.SecretKey == "": return nil, errors.New("both the access and secret keys are required") case conf.AWSRole && (conf.AWSRoleWebIdentityTokenFile != "" || conf.AWSRoleARN != "" || conf.AccessKey != "" || conf.SecretKey != ""):
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Jun 08 16:13:30 GMT 2025 - 5.8K bytes - Click Count (0) -
cmd/erasure-metadata.go
case strings.HasPrefix(k, ReservedMetadataPrefixLower+ReplicationReset): arn := strings.TrimPrefix(k, fmt.Sprintf("%s-", ReservedMetadataPrefixLower+ReplicationReset)) if d.ResetStatusesMap == nil { d.ResetStatusesMap = make(map[string]string, 1) } d.ResetStatusesMap[arn] = v } } return d
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 21.3K bytes - Click Count (0)