- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 10 for IsServiceAccount (0.09 sec)
-
cmd/admin-handlers-idp-openid.go
// Filter out any disqualifying access keys _, ok := accessKey.Claims[subClaim] if !ok { continue // OpenID access keys must have a sub claim } if (!listSTSKeys && !accessKey.IsServiceAccount()) || (!listServiceAccounts && accessKey.IsServiceAccount()) { continue // skip if not the type we want } arn, ok := accessKey.Claims[roleArnClaim].(string) if !ok { if _, ok := accessKey.Claims[iamPolicyClaimNameOpenID()]; !ok {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
cmd/iam-store.go
// Only consider service account or STS credentials with // non-empty session tokens. if (!cred.IsServiceAccount() && !cred.IsTemp()) || cred.SessionToken == "" { continue } var ( err error claims *jwt.MapClaims ) if cred.IsServiceAccount() { claims, err = getClaimsFromTokenWithSecret(cred.SessionToken, cred.SecretKey) } else if cred.IsTemp() {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 86.7K bytes - Viewed (0) -
cmd/auth-handler.go
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0) -
cmd/user-provider-utils.go
return "", errIAMActionNotAllowed } } // guessUserProvider - guesses the user provider based on the access key and claims. func guessUserProvider(credentials auth.Credentials) string { if !credentials.IsServiceAccount() && !credentials.IsTemp() { return madmin.BuiltinProvider // regular users are always internal } claims := credentials.Claims if _, ok := claims[ldapUser]; ok { return madmin.LDAPProvider // ldap users
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
cmd/iam.go
return false, "", nil } // IsServiceAccount - returns if given key is a service account func (sys *IAMSys) IsServiceAccount(name string) (bool, string, error) { if !sys.Initialized() { return false, "", errServerNotInitialized } u, found := sys.store.GetUser(name) if !found { return false, "", errNoSuchUser } cred := u.Credentials if cred.IsServiceAccount() { return true, cred.ParentUser, nil
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 75.3K bytes - Viewed (0) -
cmd/admin-handlers-users.go
if exists && (user.Credentials.IsTemp() || user.Credentials.IsServiceAccount()) { // Updating STS credential is not allowed, and this API does not // support updating service accounts. writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrAddUserInvalidArgument), r.URL) return } if (cred.IsTemp() || cred.IsServiceAccount()) && cred.ParentUser == accessKey {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
cmd/bucket-policy.go
currTime := UTCNow() var ( username = cred.AccessKey claims = cred.Claims groups = cred.Groups ) if cred.IsTemp() || cred.IsServiceAccount() { // For derived credentials, check the parent user's permissions. username = cred.ParentUser } principalType := "Anonymous" if username != "" { principalType = "User" if len(claims) > 0 {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 7.9K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/sts-handlers.go
if s3Err != ErrNone { return auth.Credentials{}, s3Err } // Temporary credentials or Service accounts cannot generate further temporary credentials. if user.IsTemp() || user.IsServiceAccount() { return auth.Credentials{}, ErrAccessDenied } // Session tokens are not allowed in STS AssumeRole requests. if getSessionToken(r) != "" { return auth.Credentials{}, ErrAccessDenied }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/site-replication.go
continue } peerName := info.Sites[dID].Name u, ok := globalIAMSys.GetUser(ctx, user) if !ok { continue } creds := u.Credentials if creds.IsServiceAccount() { claims, err := globalIAMSys.GetClaimsForSvcAcc(ctx, creds.AccessKey) if err != nil { replLogOnceIf(ctx,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 184.7K bytes - Viewed (0)