Search Options

Results per page
Sort
Preferred Languages
Advance

Results 61 - 70 of 117 for Expiry (0.17 sec)

  1. cmd/iam.go

    				logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String())
    				iamLogIf(ctx, nerr.Err)
    			}
    		}
    	}
    }
    
    // SetTempUser - set temporary user credentials, these credentials have an
    // expiry. The permissions for these STS credentials is determined in one of the
    // following ways:
    //
    // - RoleARN - if a role-arn is specified in the request, the STS credential's
    // policy is the role's policy.
    //
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  2. cmd/iam-store.go

    			// Just return the first error.
    			return err
    		}
    		d.Policy = doc.Policy
    		return nil
    	}
    	*d = doc
    	return nil
    }
    
    // key options
    type options struct {
    	ttl int64 // expiry in seconds
    }
    
    type iamWatchEvent struct {
    	isCreated bool // !isCreated implies a delete event.
    	keyPath   string
    }
    
    // iamCache contains in-memory cache of IAM data.
    type iamCache struct {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Oct 14 16:35:37 UTC 2024
    - 83.2K bytes
    - Viewed (0)
  3. CHANGELOG/CHANGELOG-1.18.md

    - Added two client certificate metrics for exec auth:
        - `rest_client_certificate_expiration_seconds` a gauge reporting the lifetime of the current client certificate. Reports the time of expiry in seconds since January 1, 1970 UTC.
    Registered: Fri Nov 01 09:05:11 UTC 2024
    - Last Modified: Wed Jun 16 17:18:28 UTC 2021
    - 373.2K bytes
    - Viewed (0)
  4. cmd/sts-handlers_test.go

    		Client:      s.TestSuiteCommon.client,
    		STSEndpoint: s.endPoint,
    		GetWebIDTokenExpiry: func() (*cr.WebIdentityToken, error) {
    			return &cr.WebIdentityToken{
    				Token:  token,
    				Expiry: 900,
    			}, nil
    		},
    	}
    
    	// Create policy - with name as one of the groups in OpenID the user is
    	// a member of.
    	policy := "projecta"
    	policyTmpl := `{
     "Version": "2012-10-17",
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 10 23:40:37 UTC 2024
    - 97.1K bytes
    - Viewed (0)
  5. cmd/batch-expire_test.go

    	if err != nil {
    		t.Fatal("Failed to parse batch-job-expire yaml", err)
    	}
    	if !slices.Equal(job.Expire.Prefix.F(), []string{"myprefix"}) {
    		t.Fatal("Failed to parse batch-job-expire yaml")
    	}
    
    	multiPrefixExpireYaml := `
    expire: # Expire objects that match a condition
      apiVersion: v1
      bucket: mybucket # Bucket where this batch job will expire matching objects from
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 01 12:53:30 UTC 2024
    - 5.5K bytes
    - Viewed (0)
  6. src/test/java/jcifs/tests/KerberosTest.java

            PrincipalName principalName = convertPrincipal(principal);
            KrbAsReqBuilder builder = new KrbAsReqBuilder(principalName, password != null ? password.toCharArray() : new char[0]);
    
            if ( expire != null ) {
                System.out.println("Request expires " + expire);
                KerberosTime till = new KerberosTime(expire);
    Registered: Sun Nov 03 00:10:13 UTC 2024
    - Last Modified: Sun Mar 01 09:46:04 UTC 2020
    - 11.5K bytes
    - Viewed (0)
  7. cmd/batch-handlers_gen.go

    					return
    				}
    			}
    		case "Expire":
    			if dc.IsNil() {
    				err = dc.ReadNil()
    				if err != nil {
    					err = msgp.WrapError(err, "Expire")
    					return
    				}
    				z.Expire = nil
    			} else {
    				if z.Expire == nil {
    					z.Expire = new(BatchJobExpire)
    				}
    				err = z.Expire.DecodeMsg(dc)
    				if err != nil {
    					err = msgp.WrapError(err, "Expire")
    					return
    				}
    			}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 01 12:53:30 UTC 2024
    - 20.4K bytes
    - Viewed (0)
  8. docs_src/security/tutorial005_an_py310.py

    
    def create_access_token(data: dict, expires_delta: timedelta | None = None):
        to_encode = data.copy()
        if expires_delta:
            expire = datetime.now(timezone.utc) + expires_delta
        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  9. docs_src/security/tutorial005_an_py39.py

    def create_access_token(data: dict, expires_delta: Union[timedelta, None] = None):
        to_encode = data.copy()
        if expires_delta:
            expire = datetime.now(timezone.utc) + expires_delta
        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  10. docs_src/security/tutorial004_py310.py

    
    def create_access_token(data: dict, expires_delta: timedelta | None = None):
        to_encode = data.copy()
        if expires_delta:
            expire = datetime.now(timezone.utc) + expires_delta
        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    Registered: Sun Nov 03 07:19:11 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4K bytes
    - Viewed (0)
Back to top