Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 9 of 9 for ErrInvalidAccessKeyID (0.07 sec)

  1. cmd/jwt.go

    				if u.Credentials.Status == auth.AccountOff {
    					return nil, errAccessKeyDisabled
    				}
    				return nil, errInvalidAccessKeyID
    			}
    			cred := u.Credentials
    			// Expired credentials return error.
    			if cred.IsTemp() && cred.IsExpired() {
    				return nil, errInvalidAccessKeyID
    			}
    			return []byte(cred.SecretKey), nil
    		} // this means claims.AccessKey == rootAccessKey
    		if !globalAPIConfig.permitRootAccess() {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  2. cmd/signature-v2_test.go

    		{
    			queryParams: map[string]string{
    				"Expires":        "60",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": "Z7IXGOO6BZ0REAN1Q26I",
    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) Should error with malformed expires.
    		{
    			queryParams: map[string]string{
    				"Expires":        "60s",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": accessKey,
    			},
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 8K bytes
    - Viewed (0)
  3. cmd/signature-v4-parser.go

    		return ch, ErrCredMalformed
    	}
    	accessKey := strings.Join(credElements[:len(credElements)-4], SlashSeparator) // The access key may contain one or more `/`
    	if !auth.IsAccessKeyValid(accessKey) {
    		return ch, ErrInvalidAccessKeyID
    	}
    	// Save access key id.
    	cred := credentialHeader{
    		accessKey: accessKey,
    	}
    	credElements = credElements[len(credElements)-4:]
    	var e error
    	cred.scope.date, e = time.Parse(yyyymmdd, credElements[0])
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Oct 10 18:57:35 UTC 2025
    - 9.4K bytes
    - Viewed (0)
  4. cmd/storage-rest-client.go

    		return errCorruptedFormat
    	case errCorruptedBackend.Error():
    		return errCorruptedBackend
    	case errUnformattedDisk.Error():
    		return errUnformattedDisk
    	case errInvalidAccessKeyID.Error():
    		return errInvalidAccessKeyID
    	case errAuthentication.Error():
    		return errAuthentication
    	case errRPCAPIVersionUnsupported.Error():
    		return errRPCAPIVersionUnsupported
    	case errServerTimeMismatch.Error():
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 08 02:38:41 UTC 2025
    - 30.4K bytes
    - Viewed (0)
  5. cmd/auth-handler.go

    		return nil, ErrInvalidToken
    	}
    
    	// Expired credentials must return error right away.
    	if cred.IsTemp() && cred.IsExpired() {
    		return nil, toAPIErrorCode(r.Context(), errInvalidAccessKeyID)
    	}
    	secret := globalActiveCred.SecretKey
    	if globalSiteReplicationSys.isEnabled() && cred.AccessKey != siteReplicatorSvcAcc {
    		nsecret, err := getTokenSigningKey()
    		if err != nil {
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  6. cmd/signature-v4-parser_test.go

    		{
    			inputCredentialStr: generateCredentialStr(
    				"^#",
    				UTCNow().Format(yyyymmdd),
    				"ABCD",
    				"ABCD",
    				"ABCD"),
    			expectedCredentials: credentialHeader{},
    			expectedErrCode:     ErrInvalidAccessKeyID,
    		},
    		// Test Case - 5.
    		// Test case with invalid date format date.
    		// a valid date format for credentials is "yyyymmdd".
    		{
    			inputCredentialStr: generateCredentialStr(
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Oct 10 18:57:35 UTC 2025
    - 27.8K bytes
    - Viewed (0)
  7. cmd/sts-handlers.go

    		Queries(stsAction, customTokenIdentity).
    		Queries(stsVersion, stsAPIVersion)
    }
    
    func apiToSTSError(authErr APIErrorCode) (stsErrCode STSErrorCode) {
    	switch authErr {
    	case ErrSignatureDoesNotMatch, ErrInvalidAccessKeyID, ErrAccessKeyDisabled:
    		return ErrSTSAccessDenied
    	case ErrServerNotInitialized:
    		return ErrSTSNotInitialized
    	case ErrInternalError:
    		return ErrSTSInternalError
    	default:
    		return ErrSTSAccessDenied
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  8. cmd/bucket-handlers.go

    		if apiErrCode := checkRequestAuthTypeWithVID(ctx, r, policy.DeleteObjectAction, bucket, object.ObjectName, object.VersionID); apiErrCode != ErrNone {
    			if apiErrCode == ErrSignatureDoesNotMatch || apiErrCode == ErrInvalidAccessKeyID {
    				writeErrorResponse(ctx, w, errorCodes.ToAPIErr(apiErrCode), r.URL)
    				return
    			}
    			apiErr := errorCodes.ToAPIErr(apiErrCode)
    			deleteResults[index].errInfo = DeleteError{
    				Code:      apiErr.Code,
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 63.9K bytes
    - Viewed (0)
  9. cmd/object-handlers_test.go

    			objectName: objectName,
    			byteRange:  "",
    			accessKey:  "Invalid-AccessID",
    			secretKey:  credentials.SecretKey,
    
    			expectedContent: encodeResponse(getAPIErrorResponse(ctx,
    				getAPIError(ErrInvalidAccessKeyID),
    				getGetObjectURL("", bucketName, objectName), "", "")),
    			expectedRespStatus: http.StatusForbidden,
    		},
    		// Test case - 7.
    		// Case with bad components in object name.
    		{
    Registered: Sun Dec 28 19:28:13 UTC 2025
    - Last Modified: Sun Sep 28 20:59:21 UTC 2025
    - 163.1K bytes
    - Viewed (0)
Back to top