Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for AWSAccessKeyId (0.04 sec)

  1. cmd/signature-v2_test.go

    				"Expires":        "60",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": "Z7IXGOO6BZ0REAN1Q26I",
    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) Should error with malformed expires.
    		{
    			queryParams: map[string]string{
    				"Expires":        "60s",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": accessKey,
    			},
    			expected: ErrMalformedExpires,
    		},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8K bytes
    - Viewed (0)
  2. cmd/post-policy_test.go

    		{http.StatusForbidden, credentials.SecretKey, map[string]string{"AWSAccessKeyId": "invalidaccesskey"}},
    		{http.StatusForbidden, "invalidsecretkey", map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
    		{http.StatusNoContent, credentials.SecretKey, map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
    		{http.StatusForbidden, credentials.SecretKey, map[string]string{"Awsaccesskeyid": "invalidaccesskey"}},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 30.6K bytes
    - Viewed (0)
  3. cmd/signature-v2.go

    	// Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
    	authFields := strings.Split(r.Header.Get(xhttp.Authorization), " ")
    	if len(authFields) != 2 {
    		return auth.Credentials{}, false, ErrMissingFields
    	}
    
    	// Then will be splitting on ":", this will separate `AWSAccessKeyId` and `Signature` string.
    	keySignFields := strings.Split(strings.TrimSpace(authFields[1]), ":")
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  4. cmd/postpolicyform.go

    			}
    		}
    		delete(mustFindInPolicy, formCanonicalName)
    	}
    
    	// For SignV2 - Signature/AWSAccessKeyId fields do not need to be in the policy
    	if _, ok := formValues[xhttp.AmzSignatureV2]; ok {
    		delete(mustFindInPolicy, xhttp.AmzSignatureV2)
    		for k := range mustFindInPolicy {
    			// case-insensitivity for AWSAccessKeyId
    			if strings.EqualFold(k, xhttp.AmzAccessKeyID) {
    				delete(mustFindInPolicy, k)
    				break
    			}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.1K bytes
    - Viewed (0)
  5. cmd/postpolicyform_test.go

    		},
    		{
    			name: "Signature does not have to appear in policy",
    			fv:   defaultFormVals.Clone().Set(xhttp.AmzSignatureV2, "signature-value"),
    		},
    		{
    			name: "AWSAccessKeyID does not have to appear in policy",
    			fv:   defaultFormVals.Clone().Set(xhttp.AmzAccessKeyID, "access").Set(xhttp.AmzSignatureV2, "signature-value"),
    		},
    		{
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.3K bytes
    - Viewed (0)
  6. cmd/test-utils_test.go

    	// Construct the final presigned URL.
    	return nil
    }
    
    // preSignV2 - presign the request in following style.
    // https://${S3_BUCKET}.s3.amazonaws.com/${S3_OBJECT}?AWSAccessKeyId=${S3_ACCESS_KEY}&Expires=${TIMESTAMP}&Signature=${SIGNATURE}.
    func preSignV2(req *http.Request, accessKeyID, secretAccessKey string, expires int64) error {
    	// Presign is not needed for anonymous credentials.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 77K bytes
    - Viewed (0)
Back to top