- Sort Score
- Result 10 results
- Languages All
Results 1 - 6 of 6 for AWSAccessKeyId (0.04 sec)
-
cmd/signature-v2_test.go
"Expires": "60", "Signature": "badsignature", "AWSAccessKeyId": "Z7IXGOO6BZ0REAN1Q26I", }, expected: ErrInvalidAccessKeyID, }, // (2) Should error with malformed expires. { queryParams: map[string]string{ "Expires": "60s", "Signature": "badsignature", "AWSAccessKeyId": accessKey, }, expected: ErrMalformedExpires, },
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8K bytes - Viewed (0) -
cmd/post-policy_test.go
{http.StatusForbidden, credentials.SecretKey, map[string]string{"AWSAccessKeyId": "invalidaccesskey"}}, {http.StatusForbidden, "invalidsecretkey", map[string]string{"AWSAccessKeyId": credentials.AccessKey}}, {http.StatusNoContent, credentials.SecretKey, map[string]string{"AWSAccessKeyId": credentials.AccessKey}}, {http.StatusForbidden, credentials.SecretKey, map[string]string{"Awsaccesskeyid": "invalidaccesskey"}},
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 30.6K bytes - Viewed (0) -
cmd/signature-v2.go
// Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature authFields := strings.Split(r.Header.Get(xhttp.Authorization), " ") if len(authFields) != 2 { return auth.Credentials{}, false, ErrMissingFields } // Then will be splitting on ":", this will separate `AWSAccessKeyId` and `Signature` string. keySignFields := strings.Split(strings.TrimSpace(authFields[1]), ":")
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
cmd/postpolicyform.go
} } delete(mustFindInPolicy, formCanonicalName) } // For SignV2 - Signature/AWSAccessKeyId fields do not need to be in the policy if _, ok := formValues[xhttp.AmzSignatureV2]; ok { delete(mustFindInPolicy, xhttp.AmzSignatureV2) for k := range mustFindInPolicy { // case-insensitivity for AWSAccessKeyId if strings.EqualFold(k, xhttp.AmzAccessKeyID) { delete(mustFindInPolicy, k) break }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.1K bytes - Viewed (0) -
cmd/postpolicyform_test.go
}, { name: "Signature does not have to appear in policy", fv: defaultFormVals.Clone().Set(xhttp.AmzSignatureV2, "signature-value"), }, { name: "AWSAccessKeyID does not have to appear in policy", fv: defaultFormVals.Clone().Set(xhttp.AmzAccessKeyID, "access").Set(xhttp.AmzSignatureV2, "signature-value"), }, {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.3K bytes - Viewed (0) -
cmd/test-utils_test.go
// Construct the final presigned URL. return nil } // preSignV2 - presign the request in following style. // https://${S3_BUCKET}.s3.amazonaws.com/${S3_OBJECT}?AWSAccessKeyId=${S3_ACCESS_KEY}&Expires=${TIMESTAMP}&Signature=${SIGNATURE}. func preSignV2(req *http.Request, accessKeyID, secretAccessKey string, expires int64) error { // Presign is not needed for anonymous credentials.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 77K bytes - Viewed (0)