- Sort Score
- Result 10 results
- Languages All
Results 31 - 37 of 37 for genitive (0.13 sec)
-
cmd/object-multipart-handlers.go
// so we do not want to override them, copy them instead. for k, v := range encMetadata { metadata[k] = v } // Ensure that metadata does not contain sensitive information crypto.RemoveSensitiveEntries(metadata) if isCompressible(r.Header, object) { // Storing the compression metadata. metadata[ReservedMetadataPrefix+"compression"] = compressionAlgorithmV2 }
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0) -
internal/config/config.go
} return dynOnly, nil } // RedactSensitiveInfo - removes sensitive information // like urls and credentials from the configuration func (c Config) RedactSensitiveInfo() Config { nc := c.Clone() for configName, configVals := range nc { for _, helpKV := range HelpSubSysMap[configName] { if helpKV.Sensitive { for name, kvs := range configVals { for i := range kvs {
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Tue Sep 03 18:23:41 UTC 2024 - 37.7K bytes - Viewed (0) -
docs/LICENSE
b. TO THE EXTENT POSSIBLE, IN NO EVENT WILL THE LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY (INCLUDING, WITHOUT LIMITATION, NEGLIGENCE) OR OTHERWISE FOR ANY DIRECT, SPECIAL, INDIRECT, INCIDENTAL, CONSEQUENTIAL, PUNITIVE, EXEMPLARY, OR OTHER LOSSES, COSTS, EXPENSES, OR DAMAGES ARISING OUT OF THIS PUBLIC LICENSE OR USE OF THE LICENSED MATERIAL, EVEN IF THE LICENSOR HAS BEEN
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Mon May 10 16:50:06 UTC 2021 - 18.2K bytes - Viewed (0) -
cmd/auth-handler.go
amzDate, errCode := parseAmzDateHeader(r) if errCode != ErrNone { if ok { tc.FuncName = "handler.Auth" tc.ResponseRecorder.LogErrBody = true } // All our internal APIs are sensitive towards Date // header, for all requests where Date header is not // present we will reject such clients. defer logger.AuditLog(r.Context(), w, r, mustGetClaimsFromToken(r))
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 26.1K bytes - Viewed (0) -
cmd/object-handlers.go
// so we do not want to override them, copy them instead. for k, v := range encMetadata { srcInfo.UserDefined[k] = v } // Ensure that metadata does not contain sensitive information crypto.RemoveSensitiveEntries(srcInfo.UserDefined) // If we see legacy source, metadataOnly we have to overwrite the content. if srcInfo.Legacy { srcInfo.metadataOnly = false }
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0) -
cmd/server-main.go
ks := []string{ config.EnvAccessKey, config.EnvSecretKey, config.EnvRootUser, config.EnvRootPassword, } for _, v := range os.Environ() { // Do not print sensitive creds in debug. if slices.Contains(ks, strings.Split(v, "=")[0]) { continue } fmt.Println(v) } fmt.Println("======") } daemon.SdNotify(false, daemon.SdNotifyReady)
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Tue Sep 24 21:50:11 UTC 2024 - 35.2K bytes - Viewed (3) -
cmd/bucket-handlers.go
etag := getDecryptedETag(formValues, objInfo, false) // We must not use the http.Header().Set method here because some (broken) // clients expect the ETag header key to be literally "ETag" - not "Etag" (case-sensitive). // Therefore, we have to set the ETag directly as map entry. w.Header()[xhttp.ETag] = []string{`"` + etag + `"`} // Set the relevant version ID as part of the response header.
Registered: Sun Oct 27 19:28:09 UTC 2024 - Last Modified: Thu Sep 12 12:24:04 UTC 2024 - 63.4K bytes - Viewed (0)