- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for canonical (0.19 sec)
-
cmd/signature-v4-utils.go
// deployment has asked MinIO to allow for // such broken clients and content-length > 0. return r.ContentLength > 0 && !globalServerCtxt.StrictS3Compat } return false } // Returns SHA256 for calculating canonical-request. func getContentSha256Cksum(r *http.Request, stype serviceType) string { if stype == serviceSTS { payload, err := io.ReadAll(io.LimitReader(r.Body, stsRequestBodyLimit)) if err != nil {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Jan 31 18:56:45 GMT 2024 - 9K bytes - Viewed (0) -
internal/crypto/key.go
encryptedKey bytes.Buffer ) mac := hmac.New(sha256.New, extKey) mac.Write(iv[:]) mac.Write([]byte(domain)) mac.Write([]byte(SealAlgorithm)) mac.Write([]byte(path.Join(bucket, object))) // use path.Join for canonical 'bucket/object' mac.Sum(sealingKey[:0]) if n, err := sio.Encrypt(&encryptedKey, bytes.NewReader(key[:]), sio.Config{Key: sealingKey[:], CipherSuites: fips.DARECiphers()}); n != 64 || err != nil {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Mar 19 20:28:10 GMT 2024 - 6.4K bytes - Viewed (0) -
cmd/globals.go
globalMinioDefaultRegion = "" // This is a sha256 output of ``arn:aws:iam::minio:user/admin``, // this is kept in present form to be compatible with S3 owner ID // requirements - // // ``` // The canonical user ID is the Amazon S3–only concept. // It is 64-character obfuscated version of the account ID. // ``` // http://docs.aws.amazon.com/AmazonS3/latest/dev/example-walkthroughs-managing-access-example4.html
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Apr 24 04:08:47 GMT 2024 - 16.5K bytes - Viewed (0) -
cmd/signature-v2.go
return false } signature2, err := base64.StdEncoding.DecodeString(sig2) if err != nil { return false } return subtle.ConstantTimeCompare(signature1, signature2) == 1 } // Return canonical headers. func canonicalizedAmzHeadersV2(headers http.Header) string { var keys []string keyval := make(map[string]string, len(headers)) for key := range headers { lkey := strings.ToLower(key)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 12.2K bytes - Viewed (0) -
cmd/test-utils_test.go
canonicalHeaders := buf.String() // Get signed headers. signedHeaders := strings.Join(headers, ";") // Get canonical query string. req.URL.RawQuery = strings.ReplaceAll(req.URL.Query().Encode(), "+", "%20") // Get canonical URI. canonicalURI := s3utils.EncodePath(req.URL.Path) // Get canonical request. // canonicalRequest = // <HTTPMethod>\n // <CanonicalURI>\n // <CanonicalQueryString>\n
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 03 17:26:51 GMT 2024 - 76.2K bytes - Viewed (0) -
cmd/streaming-signature-v4.go
return cred, "", "", time.Time{}, ErrMalformedDate } // Query string. queryStr := req.Form.Encode() // Get canonical request. canonicalRequest := getCanonicalRequest(extractedSignedHeaders, payload, queryStr, req.URL.Path, req.Method) // Get string to sign from canonical request. stringToSign := getStringToSign(canonicalRequest, date, signV4Values.Credential.getScope()) // Get hmac signing key.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 18.2K bytes - Viewed (0) -
cmd/iam.go
} else if foundGroupDN == "" || !underBaseDN { err = errNoSuchGroup return } // We use the group DN returned by the LDAP server (this may not // equal the input group name, but we assume it is canonical). dn = foundGroupDN } else { dn = r.Group } isGroup = true } // Backward compatibility in detaching non-normalized DNs. if !isAttach { var oldDN string
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 71.1K bytes - Viewed (1) -
cmd/signature-v4.go
return ErrInvalidToken } // Verify finally if signature is same. // Get canonical request. presignedCanonicalReq := getCanonicalRequest(extractedSignedHeaders, hashedPayload, encodedQuery, req.URL.Path, req.Method) // Get string to sign from canonical request. presignedStringToSign := getStringToSign(presignedCanonicalReq, t, pSignValues.Credential.getScope())
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 16:45:54 GMT 2024 - 12.3K bytes - Viewed (0) -
cmd/postpolicyform.go
var condPassed bool // Iterate over policy conditions and check them against received form fields for _, policy := range postPolicyForm.Conditions.Policies { // Form fields names are in canonical format, convert conditions names // to canonical for simplification purpose, so `$key` will become `Key` formCanonicalName := http.CanonicalHeaderKey(strings.TrimPrefix(policy.Key, "$")) // Operator for the current policy condition
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 16:45:54 GMT 2024 - 12.2K bytes - Viewed (0) -
cmd/object-handlers-common.go
// if any present func canonicalizeETag(etag string) string { return etagRegex.ReplaceAllString(etag, "$1") } // isETagEqual return true if the canonical representations of two ETag strings // are equal, false otherwise func isETagEqual(left, right string) bool { return canonicalizeETag(left) == canonicalizeETag(right) }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Apr 09 08:17:49 GMT 2024 - 14.6K bytes - Viewed (0)