Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 49 for secretKeys (0.08 sec)

  1. cmd/admin-handlers-users-race_test.go

    			c.Fatalf("Unable to attach policy: %v", err)
    		}
    
    		accessKeys[i] = accessKey
    		secretKeys[i] = secretKey
    	}
    
    	g := errgroup.Group{}
    	for i := range userCount {
    		g.Go(func(i int) func() error {
    			return func() error {
    				uClient := s.getUserClient(c, accessKeys[i], secretKeys[i], "")
    				err := s.adm.RemoveUser(ctx, accessKeys[i])
    				if err != nil {
    					return err
    				}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4K bytes
    - Viewed (0)
  2. cmd/bucket-handlers_test.go

    	testCases := []struct {
    		bucketName string
    		accessKey  string
    		secretKey  string
    		// expected Response.
    		expectedRespStatus int
    	}{
    		// Test case - 1.
    		// Bucket exists.
    		{
    			bucketName:         bucketName,
    			accessKey:          credentials.AccessKey,
    			secretKey:          credentials.SecretKey,
    			expectedRespStatus: http.StatusOK,
    		},
    		// Test case - 2.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 39.8K bytes
    - Viewed (0)
  3. cmd/object-handlers_test.go

    			secretKey:          credentials.SecretKey,
    			expectedRespStatus: http.StatusNotFound,
    		},
    		// Test case - 3.
    		// Test case to induce a signature mismatch.
    		// Using invalid accessID.
    		{
    			bucketName:         bucketName,
    			objectName:         objectName,
    			accessKey:          "Invalid-AccessID",
    			secretKey:          credentials.SecretKey,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 163.1K bytes
    - Viewed (0)
  4. cmd/server_test.go

    	// Create new HTTP request with incorrect secretKey to generate an incorrect signature.
    	secretKey := s.secretKey + "a"
    	request, err = newTestSignedRequest(http.MethodPut, getPutObjectURL(s.endPoint, bucketName, objName), 0, nil, s.accessKey, secretKey, s.signer)
    	c.Assert(err, nil)
    	response, err = s.client.Do(request)
    	c.Assert(err, nil)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 118.1K bytes
    - Viewed (0)
  5. cmd/signature-v2_test.go

    		signature string
    		errCode   APIErrorCode
    	}{
    		{"invalidAccessKey", policy, calculateSignatureV2(policy, creds.SecretKey), ErrInvalidAccessKeyID},
    		{creds.AccessKey, policy, calculateSignatureV2("random", creds.SecretKey), ErrSignatureDoesNotMatch},
    		{creds.AccessKey, policy, calculateSignatureV2(policy, creds.SecretKey), ErrNone},
    	}
    	for i, test := range testCases {
    		formValues := make(http.Header)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8K bytes
    - Viewed (0)
  6. cmd/ftp-server-driver.go

    					AccessKey:    cred.AccessKey,
    					SecretKey:    cred.SecretKey,
    					SessionToken: cred.SessionToken,
    					ParentUser:   cred.ParentUser,
    				},
    				UpdatedAt: updatedAt,
    			}))
    
    			mcreds = credentials.NewStaticV4(cred.AccessKey, cred.SecretKey, cred.SessionToken)
    		} else {
    			mcreds = credentials.NewStaticV4(sa.Credentials.AccessKey, sa.Credentials.SecretKey, "")
    		}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  7. cmd/post-policy_test.go

    	testCasesV2 := []struct {
    		expectedStatus int
    		secretKey      string
    		formData       map[string]string
    	}{
    		{http.StatusForbidden, credentials.SecretKey, map[string]string{"AWSAccessKeyId": "invalidaccesskey"}},
    		{http.StatusForbidden, "invalidsecretkey", map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
    		{http.StatusNoContent, credentials.SecretKey, map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 30.6K bytes
    - Viewed (0)
  8. cmd/test-utils_test.go

    	return nil
    }
    
    // Sign given request using Signature V2.
    func signRequestV2(req *http.Request, accessKey, secretKey string) error {
    	signer.SignV2(*req, accessKey, secretKey, false)
    	return nil
    }
    
    // Sign given request using Signature V4.
    func signRequestV4(req *http.Request, accessKey, secretKey string) error {
    	// Get hashed payload.
    	hashedPayload := req.Header.Get("x-amz-content-sha256")
    	if hashedPayload == "" {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 77K bytes
    - Viewed (0)
  9. cmd/admin-handlers-users_test.go

    	}
    
    	// 2. Create a user, associate policy and verify access
    	accessKey, secretKey := mustGenerateCredentials(c)
    	err = s.adm.SetUser(ctx, accessKey, secretKey, madmin.AccountEnabled)
    	if err != nil {
    		c.Fatalf("Unable to set user: %v", err)
    	}
    	// 2.1 check that user does not have any access to the bucket
    	uClient := s.getUserClient(c, accessKey, secretKey, "")
    	c.mustNotListObjects(ctx, uClient, bucket)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 47.4K bytes
    - Viewed (0)
  10. cmd/sftp-server.go

    		STSCredential: &madmin.SRSTSCredential{
    			AccessKey:    cred.AccessKey,
    			SecretKey:    cred.SecretKey,
    			SessionToken: cred.SessionToken,
    			ParentUser:   cred.ParentUser,
    		},
    		UpdatedAt: updatedAt,
    	}))
    
    	return &ssh.Permissions{
    		CriticalOptions: map[string]string{
    			"AccessKey":    cred.AccessKey,
    			"SecretKey":    cred.SecretKey,
    			"SessionToken": cred.SessionToken,
    		},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.5K bytes
    - Viewed (0)
Back to top