- Sort Score
- Result 10 results
- Languages All
Results 61 - 70 of 117 for Expiry (0.17 sec)
-
cmd/iam.go
logger.GetReqInfo(ctx).SetTags("peerAddress", nerr.Host.String()) iamLogIf(ctx, nerr.Err) } } } } // SetTempUser - set temporary user credentials, these credentials have an // expiry. The permissions for these STS credentials is determined in one of the // following ways: // // - RoleARN - if a role-arn is specified in the request, the STS credential's // policy is the role's policy. //
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 29 16:01:48 UTC 2024 - 74.6K bytes - Viewed (0) -
cmd/iam-store.go
// Just return the first error. return err } d.Policy = doc.Policy return nil } *d = doc return nil } // key options type options struct { ttl int64 // expiry in seconds } type iamWatchEvent struct { isCreated bool // !isCreated implies a delete event. keyPath string } // iamCache contains in-memory cache of IAM data. type iamCache struct {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Oct 14 16:35:37 UTC 2024 - 83.2K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.18.md
- Added two client certificate metrics for exec auth: - `rest_client_certificate_expiration_seconds` a gauge reporting the lifetime of the current client certificate. Reports the time of expiry in seconds since January 1, 1970 UTC.
Registered: Fri Nov 01 09:05:11 UTC 2024 - Last Modified: Wed Jun 16 17:18:28 UTC 2021 - 373.2K bytes - Viewed (0) -
cmd/sts-handlers_test.go
Client: s.TestSuiteCommon.client, STSEndpoint: s.endPoint, GetWebIDTokenExpiry: func() (*cr.WebIdentityToken, error) { return &cr.WebIdentityToken{ Token: token, Expiry: 900, }, nil }, } // Create policy - with name as one of the groups in OpenID the user is // a member of. policy := "projecta" policyTmpl := `{ "Version": "2012-10-17",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 23:40:37 UTC 2024 - 97.1K bytes - Viewed (0) -
cmd/batch-expire_test.go
if err != nil { t.Fatal("Failed to parse batch-job-expire yaml", err) } if !slices.Equal(job.Expire.Prefix.F(), []string{"myprefix"}) { t.Fatal("Failed to parse batch-job-expire yaml") } multiPrefixExpireYaml := ` expire: # Expire objects that match a condition apiVersion: v1 bucket: mybucket # Bucket where this batch job will expire matching objects from
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 01 12:53:30 UTC 2024 - 5.5K bytes - Viewed (0) -
src/test/java/jcifs/tests/KerberosTest.java
PrincipalName principalName = convertPrincipal(principal); KrbAsReqBuilder builder = new KrbAsReqBuilder(principalName, password != null ? password.toCharArray() : new char[0]); if ( expire != null ) { System.out.println("Request expires " + expire); KerberosTime till = new KerberosTime(expire);
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Mar 01 09:46:04 UTC 2020 - 11.5K bytes - Viewed (0) -
cmd/batch-handlers_gen.go
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 01 12:53:30 UTC 2024 - 20.4K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py310.py
def create_access_token(data: dict, expires_delta: timedelta | None = None): to_encode = data.copy() if expires_delta: expire = datetime.now(timezone.utc) + expires_delta else: expire = datetime.now(timezone.utc) + timedelta(minutes=15) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt async def get_current_user(
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.2K bytes - Viewed (0) -
docs_src/security/tutorial005_an_py39.py
def create_access_token(data: dict, expires_delta: Union[timedelta, None] = None): to_encode = data.copy() if expires_delta: expire = datetime.now(timezone.utc) + expires_delta else: expire = datetime.now(timezone.utc) + timedelta(minutes=15) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt async def get_current_user(
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 5.3K bytes - Viewed (0) -
docs_src/security/tutorial004_py310.py
def create_access_token(data: dict, expires_delta: timedelta | None = None): to_encode = data.copy() if expires_delta: expire = datetime.now(timezone.utc) + expires_delta else: expire = datetime.now(timezone.utc) + timedelta(minutes=15) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Mon May 20 17:37:28 UTC 2024 - 4K bytes - Viewed (0)