Search Options

Results per page
Sort
Preferred Languages
Advance

Results 41 - 50 of 81 for sse (0.04 sec)

  1. okhttp-sse/src/main/kotlin/okhttp3/sse/EventSource.kt

     * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     * See the License for the specific language governing permissions and
     * limitations under the License.
     */
    package okhttp3.sse
    
    import okhttp3.Request
    
    interface EventSource {
      /** Returns the original request that initiated this event source. */
      fun request(): Request
    
      /**
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Mon Jan 08 01:13:22 UTC 2024
    - 1.4K bytes
    - Viewed (0)
  2. okhttp-sse/src/test/java/okhttp3/sse/internal/EventSourcesHttpTest.kt

     * See the License for the specific language governing permissions and
     * limitations under the License.
     */
    package okhttp3.sse.internal
    
    import mockwebserver3.MockResponse
    import mockwebserver3.MockWebServer
    import okhttp3.OkHttpClientTestRule
    import okhttp3.Request
    import okhttp3.sse.EventSources.processResponse
    import okhttp3.testing.PlatformRule
    import org.junit.jupiter.api.AfterEach
    import org.junit.jupiter.api.BeforeEach
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Jan 14 10:20:09 UTC 2024
    - 2.6K bytes
    - Viewed (0)
  3. okhttp-sse/README.md

    =========================
    
    Experimental support for server-sent events.
    API is not considered stable and may change at any time.
    
    ### Download
    
    ```kotlin
    testImplementation("com.squareup.okhttp3:okhttp-sse:4.12.0")
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sun Dec 17 15:34:10 UTC 2023
    - 245 bytes
    - Viewed (0)
  4. cmd/object-api-options.go

    			if err != nil {
    				return
    			}
    			if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    				return
    			}
    			opts.ServerSideEncryption = encrypt.SSECopy(sse)
    			return
    		}
    		return
    	}
    
    	if crypto.SSEC.IsRequested(header) {
    		clientKey, err = crypto.SSEC.ParseHTTP(header)
    		if err != nil {
    			return
    		}
    		if sse, err = encrypt.NewSSEC(clientKey[:]); err != nil {
    			return
    		}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 21 21:13:59 UTC 2024
    - 14.4K bytes
    - Viewed (0)
  5. internal/crypto/metadata_test.go

    	}, // 1
    	{
    		ExpectedErr: Errorf("The object metadata is missing the internal sealed key for SSE-S3"),
    		Metadata:    map[string]string{MetaIV: "", MetaAlgorithm: ""}, DataKey: []byte{}, KeyID: "", SealedKey: SealedKey{},
    	}, // 2
    	{
    		ExpectedErr: Errorf("The object metadata is missing the internal KMS key-ID for SSE-S3"),
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jul 12 20:51:54 UTC 2024
    - 18.7K bytes
    - Viewed (0)
  6. docs/bucket/lifecycle/DESIGN.md

              "x-amz-restore": "ongoing-request=false, expiry-date=Sat, 27 Feb 2021 00:00:00 GMT",
    ...
    ```
    
    ### Encrypted/Object locked objects
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 29 04:28:45 UTC 2022
    - 4.3K bytes
    - Viewed (0)
  7. cmd/object-multipart-handlers.go

    	// are slightly larger due to encryption overhead.
    	// Further, we have to adjust the ETags of parts when using SSE-S3.
    	// Due to AWS S3, SSE-S3 encrypted parts return the plaintext ETag
    	// being the content MD5 of that particular part. This is not the
    	// case for SSE-C and SSE-KMS objects.
    	if kind, ok := crypto.IsEncrypted(listPartsInfo.UserDefined); ok {
    		var objectEncryptionKey []byte
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  8. internal/http/headers.go

    	AmzMetaUnencryptedContentLength = "X-Amz-Meta-X-Amz-Unencrypted-Content-Length"
    	AmzMetaUnencryptedContentMD5    = "X-Amz-Meta-X-Amz-Unencrypted-Content-Md5"
    
    	// AWS server-side encryption headers for SSE-S3, SSE-KMS and SSE-C.
    	AmzServerSideEncryption                      = "X-Amz-Server-Side-Encryption"
    	AmzServerSideEncryptionKmsID                 = AmzServerSideEncryption + "-Aws-Kms-Key-Id"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 28 15:31:56 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  9. native-image-tests/build.gradle.kts

    }
    
    sourceSets {
      main {
        java.srcDirs(
          "../okhttp-brotli/src/test/java",
          "../okhttp-dnsoverhttps/src/test/java",
          "../okhttp-logging-interceptor/src/test/java",
          "../okhttp-sse/src/test/java",
        )
      }
    }
    
    graal {
      mainClass("okhttp3.RunTestsKt")
      outputName("ConsoleLauncher")
      graalVersion(libs.versions.graalvm.get())
      javaVersion("11")
    
      option("--no-fallback")
    Registered: Fri Nov 01 11:42:11 UTC 2024
    - Last Modified: Sat Jan 06 05:31:00 UTC 2024
    - 1.6K bytes
    - Viewed (0)
  10. cmd/s3-zip-handlers.go

    	if crypto.S3.IsRequested(r.Header) || crypto.S3KMS.IsRequested(r.Header) { // If SSE-S3 or SSE-KMS present -> AWS fails with undefined error
    		writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL)
    		return
    	}
    
    	zipPath, object, err := splitZipExtensionPath(object)
    	if err != nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:31:51 UTC 2024
    - 15.8K bytes
    - Viewed (0)
Back to top