Search Options

Results per page
Sort
Preferred Languages
Advance

Results 631 - 640 of 675 for buckets (0.05 sec)

  1. cmd/signature-v4-utils_test.go

    	}
    
    	initAllSubsystems(ctx)
    	initConfigSubsystem(ctx, objLayer)
    
    	globalIAMSys.Init(ctx, objLayer, globalEtcdClient, 2*time.Second)
    
    	req, err := newTestRequest(http.MethodGet, "http://example.com:9000/bucket/object", 0, nil)
    	if err != nil {
    		t.Fatal(err)
    	}
    
    	if err = signRequestV4(req, globalActiveCred.AccessKey, globalActiveCred.SecretKey); err != nil {
    		t.Fatal(err)
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Apr 05 21:26:41 UTC 2024
    - 14.3K bytes
    - Viewed (0)
  2. internal/kms/config.go

    const (
    	EnvKESEndpoint       = "MINIO_KMS_KES_ENDPOINT"     // One or multiple KES endpoints, separated by ','
    	EnvKESDefaultKey     = "MINIO_KMS_KES_KEY_NAME"     // The default key name used for IAM data and when no key ID is specified on a bucket
    	EnvKESAPIKey         = "MINIO_KMS_KES_API_KEY"      // Access credential for KES - API keys and private key / certificate are mutually exclusive
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 15 11:46:39 UTC 2024
    - 14.2K bytes
    - Viewed (0)
  3. architecture/environments/operator.md

    hpaSpec | [HorizontalPodAutoscaler](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/)
    podDisruptionBudget | [PodDisruptionBudget](https://kubernetes.io/docs/concepts/workloads/pods/disruptions/#how-disruption-budgets-work)
    podAnnotations | [pod annotations](https://kubernetes.io/docs/concepts/overview/working-with-objects/annotations/)
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Mon Jul 29 21:11:35 UTC 2024
    - 13.2K bytes
    - Viewed (0)
  4. internal/event/target/elasticsearch.go

    			return err
    		}
    
    		// Calculate a hash of the key for the id of the ES document.
    		// Id's are limited to 512 bytes in V7+, so we need to do this.
    		var keyHash string
    		{
    			key := eventData.S3.Bucket.Name + "/" + objectName
    			if target.client.isAtleastV7() {
    				hh, _ := highwayhash.New(magicHighwayHash256Key) // New will never return error since key is 256 bit
    				hh.Write([]byte(key))
    				hashBytes := hh.Sum(nil)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 23:06:30 UTC 2024
    - 15K bytes
    - Viewed (0)
  5. src/main/java/org/codelibs/fess/Constants.java

        public static final String STORAGE_ACCESS_KEY = "storage.accesskey";
    
        public static final String STORAGE_SECRET_KEY = "storage.secretkey";
    
        public static final String STORAGE_BUCKET = "storage.bucket";
    
        public static final String MAPPING_TYPE_ARRAY = "array";
    
        public static final String MAPPING_TYPE_STRING = "string";
    
        public static final String MAPPING_TYPE_LONG = "long";
    
    Registered: Thu Oct 31 13:40:30 UTC 2024
    - Last Modified: Thu Aug 22 12:43:18 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  6. android/guava/src/com/google/common/hash/HashFunction.java

     *       in the hash code should be as evenly "spread out" through the hash code's bits as possible.
     *       The result is that, for example, when choosing a bucket in a hash table of size 2^8,
     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  7. guava/src/com/google/common/hash/HashFunction.java

     *       in the hash code should be as evenly "spread out" through the hash code's bits as possible.
     *       The result is that, for example, when choosing a bucket in a hash table of size 2^8,
     *       <i>any</i> eight bits could be consistently used.
     *   <li><b>cryptographic:</b> certain hash functions such as {@link Hashing#sha512} are designed to
    Registered: Fri Nov 01 12:43:10 UTC 2024
    - Last Modified: Tue May 25 18:22:59 UTC 2021
    - 10.9K bytes
    - Viewed (0)
  8. src/main/java/jcifs/smb1/netbios/NameServiceClient.java

                thread.setDaemon( true );
                thread.start();
            }
        }
        void tryClose() {
            synchronized( LOCK ) {
    
                /* Yes, there is the potential to drop packets
                 * because we might close the socket during a
                 * request. However the chances are slim and the
                 * retry code should ensure the overall request
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Fri Mar 22 20:39:42 UTC 2019
    - 17.4K bytes
    - Viewed (0)
  9. architecture/ambient/ztunnel-cni-lifecycle.md

    However, because Ztunnel operates only at Layer 4, we are in a tricky position:
    * TCP is stateful, so we cannot really just pass state over to the other process.
      If we operated at L3 we could just start processing packets in the new Ztunnel.
    * We do not operate at L7, so we cannot signal to the application, in any way, that it should reconnect (to the new Ztunnel).
    
    Realistically, that means the best we can do is:
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  10. cni/README.md

    See [architecture doc](../architecture/ambient/ztunnel-cni-lifecycle.md).
    
    ## Reference
    
    ### Design details
    
    Broadly, `istio-cni` accomplishes ambient redirection by instructing ztunnel to set up sockets within the application pod network namespace, where:
    
    - one end of the socket is in the application pod
    - and the other end is in ztunnel's pod
    
    Registered: Wed Nov 06 22:53:10 UTC 2024
    - Last Modified: Wed Jul 17 23:10:17 UTC 2024
    - 10.5K bytes
    - Viewed (0)
Back to top