Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for ErrInvalidAccessKeyID (0.12 sec)

  1. cmd/jwt.go

    				if u.Credentials.Status == auth.AccountOff {
    					return nil, errAccessKeyDisabled
    				}
    				return nil, errInvalidAccessKeyID
    			}
    			cred := u.Credentials
    			// Expired credentials return error.
    			if cred.IsTemp() && cred.IsExpired() {
    				return nil, errInvalidAccessKeyID
    			}
    			return []byte(cred.SecretKey), nil
    		} // this means claims.AccessKey == rootAccessKey
    		if !globalAPIConfig.permitRootAccess() {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  2. cmd/signature-v2_test.go

    		{
    			queryParams: map[string]string{
    				"Expires":        "60",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": "Z7IXGOO6BZ0REAN1Q26I",
    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) Should error with malformed expires.
    		{
    			queryParams: map[string]string{
    				"Expires":        "60s",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": accessKey,
    			},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8K bytes
    - Viewed (0)
  3. cmd/auth-handler.go

    		return nil, ErrInvalidToken
    	}
    
    	// Expired credentials must return error right away.
    	if cred.IsTemp() && cred.IsExpired() {
    		return nil, toAPIErrorCode(r.Context(), errInvalidAccessKeyID)
    	}
    	secret := globalActiveCred.SecretKey
    	if globalSiteReplicationSys.isEnabled() && cred.AccessKey != siteReplicatorSvcAcc {
    		nsecret, err := getTokenSigningKey()
    		if err != nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  4. cmd/sts-handlers.go

    		Queries(stsAction, customTokenIdentity).
    		Queries(stsVersion, stsAPIVersion)
    }
    
    func apiToSTSError(authErr APIErrorCode) (stsErrCode STSErrorCode) {
    	switch authErr {
    	case ErrSignatureDoesNotMatch, ErrInvalidAccessKeyID, ErrAccessKeyDisabled:
    		return ErrSTSAccessDenied
    	case ErrServerNotInitialized:
    		return ErrSTSNotInitialized
    	case ErrInternalError:
    		return ErrSTSInternalError
    	default:
    		return ErrSTSAccessDenied
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  5. cmd/object-handlers_test.go

    			objectName: objectName,
    			byteRange:  "",
    			accessKey:  "Invalid-AccessID",
    			secretKey:  credentials.SecretKey,
    
    			expectedContent: encodeResponse(getAPIErrorResponse(ctx,
    				getAPIError(ErrInvalidAccessKeyID),
    				getGetObjectURL("", bucketName, objectName), "", "")),
    			expectedRespStatus: http.StatusForbidden,
    		},
    		// Test case - 7.
    		// Case with bad components in object name.
    		{
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 163.1K bytes
    - Viewed (0)
  6. cmd/bucket-handlers.go

    		if apiErrCode := checkRequestAuthTypeWithVID(ctx, r, policy.DeleteObjectAction, bucket, object.ObjectName, object.VersionID); apiErrCode != ErrNone {
    			if apiErrCode == ErrSignatureDoesNotMatch || apiErrCode == ErrInvalidAccessKeyID {
    				writeErrorResponse(ctx, w, errorCodes.ToAPIErr(apiErrCode), r.URL)
    				return
    			}
    			apiErr := errorCodes.ToAPIErr(apiErrCode)
    			deleteResults[index].errInfo = DeleteError{
    				Code:      apiErr.Code,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 63.9K bytes
    - Viewed (0)
Back to top