Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for roleArns (0.03 sec)

  1. cmd/iam.go

    		// the roleARNs to check if the user still exists. If they don't
    		// we can safely remove credentials for this parent user
    		// associated with any of the provider configurations.
    		//
    		// If there is no roleARN mapped to the user, the user may be
    		// coming from a policy claim based openid provider.
    		roleArns := puInfo.roleArns.ToSlice()
    		var roleArn string
    		if len(roleArns) == 0 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 75.3K bytes
    - Viewed (0)
  2. cmd/iam-store.go

    			subClaimValue = v
    		}
    
    		roleArn := openid.DummyRoleARN.String()
    		s, ok := claims.Lookup(roleArnClaim)
    		if ok {
    			roleArn = s
    		}
    		v, ok := res[cred.ParentUser]
    		if ok {
    			res[cred.ParentUser] = ParentUserInfo{
    				subClaimValue: subClaimValue,
    				roleArns:      v.roleArns.Union(set.CreateStringSet(roleArn)),
    			}
    		} else {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 86.7K bytes
    - Viewed (0)
  3. cmd/sts-handlers.go

    			// If there *is* a claim-based provider configured, then
    			// treat an unrecognized roleArn the same as no roleArn
    			// at all.  This is to support clients like the AWS SDKs
    			// or CLI that will not allow an AssumeRoleWithWebIdentity
    			// call without a RoleARN parameter - for these cases the
    			// user can supply a dummy ARN, which Minio will ignore.
    			roleArn = openid.DummyRoleARN
    			isRolePolicyProvider = false
    		}
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  4. cmd/user-provider-utils.go

    	}
    }
    
    func getOpenIDCfgNameFromClaims(claims map[string]any) (string, bool) {
    	roleArn := claims[roleArnClaim]
    
    	s := globalServerConfig.Clone()
    	configs, err := globalIAMSys.OpenIDConfig.GetConfigList(s)
    	if err != nil {
    		return "", false
    	}
    	for _, cfg := range configs {
    		if cfg.RoleARN == roleArn {
    			return cfg.Name, true
    		}
    	}
    	return "", false
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.1K bytes
    - Viewed (0)
  5. cmd/admin-handlers-idp-openid.go

    		return
    	}
    	for _, config := range configs {
    		if !allConfigs && cfgName != config.Name {
    			continue
    		}
    		arn := dummyRoleARN
    		if config.RoleARN != "" {
    			arn = config.RoleARN
    		}
    		roleArnMap[arn] = config.Name
    		newResp := make(map[string]madmin.OpenIDUserAccessKeys)
    		cfgToUsersMap[config.Name] = newResp
    	}
    	if len(roleArnMap) == 0 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sat Sep 06 17:38:46 UTC 2025
    - 7.6K bytes
    - Viewed (0)
  6. docs/sts/web-identity.md

    defined in the server. In this situation, the server prints a role ARN at startup that must be specified as a `RoleArn` API request parameter in the STS AssumeRoleWithWebIdentity API call. When using Role Policies, multiple OpenID providers and/or client applications (with unique client IDs) may be configured with independent role policies. Each configuration is assigned a unique RoleARN by the MinIO server and this is used to select the policies to apply to temporary credentials generated in the...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.9K bytes
    - Viewed (0)
  7. cmd/bucket-replication-utils.go

    	userDefined := cloneMSS(oi.UserDefined)
    	if rcfg.Config != nil && rcfg.Config.RoleArn != "" {
    		// For backward compatibility of objects pending/failed replication.
    		// Save replication related statuses in the new internal representation for
    		// compatible behavior.
    		if !oi.ReplicationStatus.Empty() {
    			oi.ReplicationStatusInternal = fmt.Sprintf("%s=%s;", rcfg.Config.RoleArn, oi.ReplicationStatus)
    		}
    		if !oi.VersionPurgeStatus.Empty() {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 26K bytes
    - Viewed (0)
  8. cmd/warm-backend-s3.go

    		}
    		s3WebIdentityIAM := credentials.IAM{
    			Client: &http.Client{
    				Transport: NewHTTPTransport(),
    			},
    			EKSIdentity: struct {
    				TokenFile       string
    				RoleARN         string
    				RoleSessionName string
    			}{
    				conf.AWSRoleWebIdentityTokenFile,
    				conf.AWSRoleARN,
    				sessionName,
    			},
    		}
    		creds = credentials.New(&s3WebIdentityIAM)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Jun 08 16:13:30 UTC 2025
    - 5.8K bytes
    - Viewed (0)
  9. cmd/sts-handlers_test.go

    		Client:      s.TestSuiteCommon.client,
    		STSEndpoint: s.endPoint,
    		GetWebIDTokenExpiry: func() (*cr.WebIdentityToken, error) {
    			return &cr.WebIdentityToken{
    				Token: token,
    			}, nil
    		},
    		RoleARN: roleARN,
    	}
    
    	value, err := webID.Retrieve()
    	if err != nil {
    		c.Fatalf("Expected to generate STS creds, got err: %#v", err)
    	}
    	// fmt.Printf("value: %#v\n", value)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 100.2K bytes
    - Viewed (1)
  10. cmd/bucket-targets.go

    		if err == nil && rcfg != nil {
    			for _, tgtArn := range rcfg.FilterTargetArns(replication.ObjectOpts{OpType: replication.AllReplicationType}) {
    				if err == nil && (tgtArn == arnStr || rcfg.RoleArn == arnStr) {
    					sys.RLock()
    					_, ok := sys.arnRemotesMap[arnStr]
    					sys.RUnlock()
    					if ok {
    						return BucketRemoteRemoveDisallowed{Bucket: bucket}
    					}
    				}
    			}
    		}
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 20.9K bytes
    - Viewed (0)
Back to top