Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 18 for isAllowed (0.12 sec)

  1. cmd/auth-handler.go

    		byPassSet = globalIAMSys.IsAllowed(policy.Args{
    			AccountName:     cred.AccessKey,
    			Groups:          cred.Groups,
    			Action:          policy.BypassGovernanceRetentionAction,
    			BucketName:      bucketName,
    			ObjectName:      objectName,
    			ConditionValues: conditions,
    			IsOwner:         owner,
    			Claims:          cred.Claims,
    		})
    	}
    	if globalIAMSys.IsAllowed(policy.Args{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 17 16:45:46 UTC 2024
    - 26.1K bytes
    - Viewed (0)
  2. cmd/admin-handlers-users.go

    	}
    
    	checkDenyOnly := false
    	if name == cred.AccessKey {
    		// Check that there is no explicit deny - otherwise it's allowed
    		// to view one's own info.
    		checkDenyOnly = true
    	}
    
    	if !globalIAMSys.IsAllowed(policy.Args{
    		AccountName:     cred.AccessKey,
    		Groups:          cred.Groups,
    		Action:          policy.GetUserAdminAction,
    		ConditionValues: getConditionValues(r, "", cred),
    		IsOwner:         owner,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 03 23:11:02 UTC 2024
    - 85.1K bytes
    - Viewed (0)
  3. cmd/iam.go

    	}
    
    	// Sub policy not set, this is most common since subPolicy
    	// is optional, use the inherited policies.
    	return isOwnerDerived || combinedPolicy.IsAllowed(args)
    }
    
    func isAllowedBySessionPolicyForServiceAccount(args policy.Args) (hasSessionPolicy bool, isAllowed bool) {
    	hasSessionPolicy = false
    	isAllowed = false
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  4. cmd/admin-handlers-idp-ldap.go

    	// If listing is requested for a specific user (who is not the request
    	// sender), check that the user has permissions.
    	if userDN != "" && userDN != cred.ParentUser {
    		if !globalIAMSys.IsAllowed(policy.Args{
    			AccountName:     cred.AccessKey,
    			Groups:          cred.Groups,
    			Action:          policy.ListServiceAccountsAdminAction,
    			ConditionValues: getConditionValues(r, "", cred),
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Sep 21 11:35:40 UTC 2024
    - 19.1K bytes
    - Viewed (0)
  5. cmd/bucket-handlers.go

    	readable := globalPolicySys.IsAllowed(policy.BucketPolicyArgs{
    		Action:          policy.ListBucketAction,
    		BucketName:      bucket,
    		ConditionValues: getConditionValues(r, "", auth.AnonymousCredentials),
    		IsOwner:         false,
    	})
    
    	// Check if anonymous (non-owner) has access to upload objects.
    	writable := globalPolicySys.IsAllowed(policy.BucketPolicyArgs{
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 12 12:24:04 UTC 2024
    - 63.4K bytes
    - Viewed (0)
  6. cmd/kms-handlers.go

    // checkKMSActionAllowed checks for authorization for a specific action on a resource.
    func checkKMSActionAllowed(r *http.Request, owner bool, cred auth.Credentials, action policy.KMSAction, resource string) bool {
    	return globalIAMSys.IsAllowed(policy.Args{
    		AccountName:     cred.AccessKey,
    		Groups:          cred.Groups,
    		Action:          policy.Action(action),
    		ConditionValues: getConditionValues(r, "", cred),
    		IsOwner:         owner,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 10.1K bytes
    - Viewed (0)
  7. cmd/metrics.go

    		}
    
    		cred := auth.Credentials{
    			AccessKey: claims.AccessKey,
    			Claims:    claims.Map(),
    			Groups:    groups,
    		}
    
    		// For authenticated users apply IAM policy.
    		if !globalIAMSys.IsAllowed(policy.Args{
    			AccountName:     cred.AccessKey,
    			Groups:          cred.Groups,
    			Action:          policy.PrometheusAdminAction,
    			ConditionValues: getConditionValues(r, "", cred),
    			IsOwner:         owner,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 15 12:04:40 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  8. cmd/admin-handlers.go

    	// Set delimiter value for "s3:delimiter" policy conditionals.
    	r.Header.Set("delimiter", SlashSeparator)
    
    	isAllowedAccess := func(bucketName string) (rd, wr bool) {
    		if globalIAMSys.IsAllowed(policy.Args{
    			AccountName:     cred.AccessKey,
    			Groups:          cred.Groups,
    			Action:          policy.GetObjectAction,
    			BucketName:      bucketName,
    			ConditionValues: getConditionValues(r, "", cred),
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Oct 04 11:32:32 UTC 2024
    - 99.7K bytes
    - Viewed (0)
  9. cmd/object-handlers.go

    			//   error.
    			// * if you don’t have the s3:ListBucket
    			//   permission, Amazon S3 will return an HTTP
    			//   status code 403 ("access denied") error.`
    			if globalPolicySys.IsAllowed(policy.BucketPolicyArgs{
    				Action:          policy.ListBucketAction,
    				BucketName:      bucket,
    				ConditionValues: getConditionValues(r, "", auth.AnonymousCredentials),
    				IsOwner:         false,
    			}) {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  10. cmd/batch-rotate.go

    	sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined)
    	if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed
    		return errInvalidEncryptionParameters
    	}
    	if sseKMS && r.Encryption.Type == sses3 { // previously encrypted with sse-kms, now sse-s3 disallowed
    		return errInvalidEncryptionParameters
    	}
    	versioned := globalBucketVersioningSys.PrefixEnabled(srcBucket, srcObject)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Sep 18 17:59:03 UTC 2024
    - 14.7K bytes
    - Viewed (0)
Back to top