- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for checkKeyValid (0.12 sec)
-
cmd/signature-v2.go
func doesPolicySignatureV2Match(formValues http.Header) (auth.Credentials, APIErrorCode) { accessKey := formValues.Get(xhttp.AmzAccessKeyID) r := &http.Request{Header: formValues} cred, _, s3Err := checkKeyValid(r, accessKey) if s3Err != ErrNone { return cred, s3Err } policy := formValues.Get("Policy") signature := formValues.Get(xhttp.AmzSignatureV2)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 12.2K bytes - Viewed (0) -
cmd/signature-v4-utils_test.go
t.Fatal(err) } _, owner, s3Err := checkKeyValid(req, globalActiveCred.AccessKey) if s3Err != ErrNone { t.Fatalf("Unexpected failure with %v", errorCodes.ToAPIErr(s3Err)) } if !owner { t.Fatalf("Expected owner to be 'true', found %t", owner) } _, _, s3Err = checkKeyValid(req, "does-not-exist") if s3Err != ErrInvalidAccessKeyID {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Apr 05 21:26:41 UTC 2024 - 14.3K bytes - Viewed (0) -
cmd/signature-v4.go
if s3Err != ErrNone { return auth.Credentials{}, s3Err } r := &http.Request{Header: formValues} cred, _, s3Err := checkKeyValid(r, credHeader.accessKey) if s3Err != ErrNone { return cred, s3Err } // Get signing key. signingKey := getSigningKey(cred.SecretKey, credHeader.scope.date, credHeader.scope.region, serviceS3)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 12.4K bytes - Viewed (0) -
cmd/streaming-signature-v4.go
extractedSignedHeaders, errCode := extractSignedHeaders(signV4Values.SignedHeaders, r) if errCode != ErrNone { return cred, "", "", time.Time{}, errCode } cred, _, errCode = checkKeyValid(r, signV4Values.Credential.accessKey) if errCode != ErrNone { return cred, "", "", time.Time{}, errCode } // Verify if region is valid. region = signV4Values.Credential.scope.region
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 18.2K bytes - Viewed (0)