Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 6 of 6 for AWSAccessKeyId (0.06 seconds)

  1. cmd/post-policy_test.go

    		{http.StatusForbidden, credentials.SecretKey, map[string]string{"AWSAccessKeyId": "invalidaccesskey"}},
    		{http.StatusForbidden, "invalidsecretkey", map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
    		{http.StatusNoContent, credentials.SecretKey, map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
    		{http.StatusForbidden, credentials.SecretKey, map[string]string{"Awsaccesskeyid": "invalidaccesskey"}},
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 30.6K bytes
    - Click Count (0)
  2. cmd/signature-v2.go

    	// Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
    	authFields := strings.Split(r.Header.Get(xhttp.Authorization), " ")
    	if len(authFields) != 2 {
    		return auth.Credentials{}, false, ErrMissingFields
    	}
    
    	// Then will be splitting on ":", this will separate `AWSAccessKeyId` and `Signature` string.
    	keySignFields := strings.Split(strings.TrimSpace(authFields[1]), ":")
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 12.2K bytes
    - Click Count (0)
  3. cmd/postpolicyform.go

    			}
    		}
    		delete(mustFindInPolicy, formCanonicalName)
    	}
    
    	// For SignV2 - Signature/AWSAccessKeyId fields do not need to be in the policy
    	if _, ok := formValues[xhttp.AmzSignatureV2]; ok {
    		delete(mustFindInPolicy, xhttp.AmzSignatureV2)
    		for k := range mustFindInPolicy {
    			// case-insensitivity for AWSAccessKeyId
    			if strings.EqualFold(k, xhttp.AmzAccessKeyID) {
    				delete(mustFindInPolicy, k)
    				break
    			}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Thu Oct 23 15:10:12 GMT 2025
    - 12.1K bytes
    - Click Count (0)
  4. cmd/auth-handler_test.go

    	testCases := []struct {
    		inputQueryKey   string
    		inputQueryValue string
    		expectedResult  bool
    	}{
    		// Test case - 1.
    		// Test case with query key "AWSAccessKeyId" set.
    		{"", "", false},
    		// Test case - 2.
    		{"AWSAccessKeyId", "", true},
    		// Test case - 3.
    		{"X-Amz-Content-Sha256", "", false},
    	}
    
    	for i, testCase := range testCases {
    		// creating an input HTTP request.
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed Apr 09 14:28:39 GMT 2025
    - 15.4K bytes
    - Click Count (0)
  5. internal/http/headers.go

    	AmzEncryptionAES = "AES256"
    	AmzEncryptionKMS = "aws:kms"
    
    	// Signature v2 related constants
    	AmzSignatureV2 = "Signature"
    	AmzAccessKeyID = "AWSAccessKeyId"
    
    	// Response request id.
    	AmzRequestID     = "x-amz-request-id"
    	AmzRequestHostID = "x-amz-id-2"
    
    	// Deployment id.
    	MinioDeploymentID = "x-minio-deployment-id"
    
    	// Peer call
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Wed May 07 15:37:12 GMT 2025
    - 10.8K bytes
    - Click Count (0)
  6. cmd/postpolicyform_test.go

    		},
    		{
    			name: "Signature does not have to appear in policy",
    			fv:   defaultFormVals.Clone().Set(xhttp.AmzSignatureV2, "signature-value"),
    		},
    		{
    			name: "AWSAccessKeyID does not have to appear in policy",
    			fv:   defaultFormVals.Clone().Set(xhttp.AmzAccessKeyID, "access").Set(xhttp.AmzSignatureV2, "signature-value"),
    		},
    		{
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 12.3K bytes
    - Click Count (0)
Back to Top