- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 120 for accessKey (0.03 sec)
-
cmd/admin-handlers-users_test.go
// 2. Check that svc account info can be queried c.assertSvcAccInfoQueryable(ctx, userAdmClient, accessKey, cr.AccessKey, false) // 3. Check S3 access c.assertSvcAccS3Access(ctx, s, cr, bucket) // 5. Check that service account can be deleted. c.assertSvcAccDeletion(ctx, s, userAdmClient, accessKey, bucket)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 47.4K bytes - Viewed (0) -
cmd/bucket-handlers_test.go
bucketName string accessKey string secretKey string // expected Response. expectedRespStatus int locationResponse []byte errorResponse APIErrorResponse shouldPass bool }{ // Test case - 1. // Tests for authenticated request and proper response. { bucketName: bucketName, accessKey: credentials.AccessKey, secretKey: credentials.SecretKey,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 39.8K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
serviceAccountList = append(serviceAccountList, madmin.ServiceAccountInfo{ AccessKey: svc.AccessKey, Expiration: &expiryTime, Name: svc.Name, Description: svc.Description, }) } for _, sts := range stsKeys { expiryTime := sts.Expiration stsKeyList = append(stsKeyList, madmin.ServiceAccountInfo{ AccessKey: sts.AccessKey, Expiration: &expiryTime, }) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/post-policy_test.go
{http.StatusNoContent, credentials.SecretKey, map[string]string{"AWSAccessKeyId": credentials.AccessKey}}, {http.StatusForbidden, credentials.SecretKey, map[string]string{"Awsaccesskeyid": "invalidaccesskey"}}, {http.StatusForbidden, "invalidsecretkey", map[string]string{"Awsaccesskeyid": credentials.AccessKey}},
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 30.6K bytes - Viewed (0) -
cmd/bucket-targets.go
return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket, Err: err} case "AccessDenied": return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } if !exists { return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket} } if tgt.Type == madmin.ReplicationService {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 20.9K bytes - Viewed (0) -
cmd/bucket-lifecycle-handlers_test.go
method string bucketName string accessKey string secretKey string // Sent body body []byte // Expected response expectedRespStatus int lifecycleResponse []byte errorResponse APIErrorResponse shouldPass bool }{ // GET empty credentials { method: http.MethodGet, bucketName: bucketName, accessKey: "", secretKey: "",
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Jun 10 15:50:49 UTC 2024 - 11.3K bytes - Viewed (0) -
cmd/signature-v2.go
} r.Form.Del(xhttp.Expires) return ErrNone } func getReqAccessKeyV2(r *http.Request) (auth.Credentials, bool, APIErrorCode) { if accessKey := r.Form.Get(xhttp.AmzAccessKeyID); accessKey != "" { return checkKeyValid(r, accessKey) } // below is V2 Signed Auth header format, splitting on `space` (after the `AWS` string). // Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
cmd/signature-v4-parser_test.go
func validateCredentialfields(t *testing.T, testNum int, expectedCredentials credentialHeader, actualCredential credentialHeader) { if expectedCredentials.accessKey != actualCredential.accessKey { t.Errorf("Test %d: AccessKey mismatch: Expected \"%s\", got \"%s\"", testNum, expectedCredentials.accessKey, actualCredential.accessKey) } if !expectedCredentials.scope.date.Equal(actualCredential.scope.date) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Feb 18 16:25:55 UTC 2025 - 27.4K bytes - Viewed (0) -
cmd/auth-handler.go
} secret := globalActiveCred.SecretKey if globalSiteReplicationSys.isEnabled() && cred.AccessKey != siteReplicatorSvcAcc { nsecret, err := getTokenSigningKey() if err != nil { return nil, toAPIErrorCode(r.Context(), err) } // sign root's temporary accounts also with site replicator creds if cred.ParentUser != globalActiveCred.AccessKey || cred.IsTemp() { secret = nsecret } } if cred.IsServiceAccount() {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0) -
cmd/sts-handlers.go
// policy is inherited from `user.AccessKey`. cred.ParentUser = user.AccessKey // Set the newly generated credentials. updatedAt, err := globalIAMSys.SetTempUser(ctx, cred.AccessKey, cred, "") if err != nil { writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) return } // Call hook for site replication. if cred.ParentUser != globalActiveCred.AccessKey {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0)