- Sort Score
- Result 10 results
- Languages All
Results 391 - 400 of 437 for Warn (0.04 sec)
-
internal/bucket/replication/replication_test.go
sameTarget: false, expectedParsingErr: fmt.Errorf("invalid destination '%v'", "destinationbucket2"), expectedValidationErr: nil, }, // 13 missing role in config and destination ARN has target ARN {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Mar 28 17:44:56 UTC 2024 - 32.5K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
ClientSecret: "WNGvKVyyNmXq0TraSvjaDN9CtpFgx35IXtGEffMCPR0", } provider.JWKS.URL = u1 cfg := Config{ Enabled: true, pubKeys: pubKeys, arnProviderCfgsMap: map[arn.ARN]*providerCfg{ DummyRoleARN: &provider, }, ProviderCfgs: map[string]*providerCfg{ "1": &provider, }, closeRespFn: func(rc io.ReadCloser) { rc.Close() }, }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8.3K bytes - Viewed (0) -
cmd/iam.go
} // GetRolePolicy - returns policies associated with a role ARN. func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) { roleArn, err := arn.Parse(arnStr) if err != nil { return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err) } rolePolicy, ok := sys.rolesMap[roleArn] if !ok { return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 29 16:01:48 UTC 2024 - 74.6K bytes - Viewed (0) -
internal/config/lambda/event/targetlist.go
// Lookup - checks whether target by target ID exists is valid or not. func (list *TargetList) Lookup(arnStr string) (Target, error) { list.RLock() defer list.RUnlock() arn, err := ParseARN(arnStr) if err != nil { return nil, err } id, found := list.targets[arn.TargetID] if !found { return nil, &ErrARNNotFound{} } return id, nil } // TargetIDResult returns result of Remove/Send operation, sets err if
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 07 16:12:41 UTC 2023 - 4.3K bytes - Viewed (0) -
docs/bucket/notifications/README.md
We will enable bucket event notification to trigger whenever a JPEG image is uploaded or deleted `images` bucket on `myminio` server. Here ARN value is `arn:minio:sqs::1:amqp`. To understand more about ARN please follow [AWS ARN](http://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html) documentation. ``` mc mb myminio/images mc event add myminio/images arn:minio:sqs::1:amqp --suffix .jpg
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 84K bytes - Viewed (0) -
cmd/bucket-replication-stats.go
rs.set(ri.Arn, ri.Size, 0, status, ri.OpType, ri.endpoint, ri.secure, ri.Err) } case replication.Completed: if ri.OpType.IsDataReplication() { rs.set(ri.Arn, ri.Size, ri.Duration, status, ri.OpType, ri.endpoint, ri.secure, ri.Err) } case replication.Failed: if ri.OpType.IsDataReplication() && prevStatus == replication.Pending {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 12:04:40 UTC 2024 - 13.6K bytes - Viewed (0) -
docs/sts/assume-role.md
``` > NOTE: In the following commands `--role-arn` and `--role-session-name` are not meaningful for MinIO and can be set to any value satisfying the command line requirements. ``` $ aws --profile foobar --endpoint-url http://localhost:9000 sts assume-role --policy '{"Version":"2012-10-17","Statement":[{"Sid":"Stmt1","Effect":"Allow","Action":"s3:*","Resource":"arn:aws:s3:::*"}]}' --role-arn arn:xxx:xxx:xxx:xxxx --role-session-name anything {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Sep 29 04:28:45 UTC 2022 - 7.1K bytes - Viewed (0) -
cmd/server-startup-msg.go
func printLambdaTargets() { if globalLambdaTargetList == nil || globalLambdaTargetList.Empty() { return } arnMsg := color.Blue("Object Lambda ARNs: ") for _, arn := range globalLambdaTargetList.List(globalSite.Region()) { arnMsg += color.Bold(fmt.Sprintf("%s ", arn)) } logger.Startup(arnMsg + "\n") } // Prints bucket notification configurations. func printEventNotifiers() { if globalNotificationSys == nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Aug 23 14:11:35 UTC 2024 - 6.2K bytes - Viewed (0) -
docs/sts/custom-token-identity.md
After configuring the plugin, use the generated Role ARN with `AssumeRoleWithCustomToken` to get temporary credentials to access object storage. ## API Request To make an STS API request with this method, send a POST request to the MinIO endpoint with following query parameters:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 3K bytes - Viewed (0) -
docs/iam/identity-management-plugin.md
MINIO_IDENTITY_PLUGIN_ROLE_ID (string) unique ID to generate the ARN MINIO_IDENTITY_PLUGIN_COMMENT (sentence) optionally add a comment to this setting ``` If provided, the auth token parameter is sent as an authorization header. `MINIO_IDENTITY_PLUGIN_ROLE_POLICY` is a required parameter and can be list of comma separated policy names.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 4.2K bytes - Viewed (0)