Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for ErrInvalidAccessKeyID (0.17 sec)

  1. cmd/jwt.go

    				if u.Credentials.Status == auth.AccountOff {
    					return nil, errAccessKeyDisabled
    				}
    				return nil, errInvalidAccessKeyID
    			}
    			cred := u.Credentials
    			// Expired credentials return error.
    			if cred.IsTemp() && cred.IsExpired() {
    				return nil, errInvalidAccessKeyID
    			}
    			return []byte(cred.SecretKey), nil
    		} // this means claims.AccessKey == rootAccessKey
    		if !globalAPIConfig.permitRootAccess() {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jul 22 07:04:48 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  2. cmd/signature-v2_test.go

    		{
    			queryParams: map[string]string{
    				"Expires":        "60",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": "Z7IXGOO6BZ0REAN1Q26I",
    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) Should error with malformed expires.
    		{
    			queryParams: map[string]string{
    				"Expires":        "60s",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": accessKey,
    			},
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Oct 14 10:08:40 UTC 2022
    - 8K bytes
    - Viewed (0)
  3. cmd/signature-v4-parser.go

    		return ch, ErrCredMalformed
    	}
    	accessKey := strings.Join(credElements[:len(credElements)-4], SlashSeparator) // The access key may contain one or more `/`
    	if !auth.IsAccessKeyValid(accessKey) {
    		return ch, ErrInvalidAccessKeyID
    	}
    	// Save access key id.
    	cred := credentialHeader{
    		accessKey: accessKey,
    	}
    	credElements = credElements[len(credElements)-4:]
    	var e error
    	cred.scope.date, e = time.Parse(yyyymmdd, credElements[0])
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jan 18 07:03:17 UTC 2024
    - 9.4K bytes
    - Viewed (0)
  4. cmd/signature-v4-utils.go

    			// error in such a scenario.
    			if u.Credentials.Status == auth.AccountOff {
    				return cred, false, ErrAccessKeyDisabled
    			}
    			return cred, false, ErrInvalidAccessKeyID
    		}
    		cred = u.Credentials
    	}
    
    	claims, s3Err := checkClaimsFromToken(r, cred)
    	if s3Err != ErrNone {
    		return cred, false, s3Err
    	}
    	cred.Claims = claims
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 9.1K bytes
    - Viewed (0)
Back to top