Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for AWSAccessKeyId (0.5 sec)

  1. cmd/signature-v2_test.go

    				"Expires":        "60",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": "Z7IXGOO6BZ0REAN1Q26I",
    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) Should error with malformed expires.
    		{
    			queryParams: map[string]string{
    				"Expires":        "60s",
    				"Signature":      "badsignature",
    				"AWSAccessKeyId": accessKey,
    			},
    			expected: ErrMalformedExpires,
    		},
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Fri Oct 14 10:08:40 GMT 2022
    - 8K bytes
    - Viewed (0)
  2. cmd/signature-v2.go

    	// Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
    	authFields := strings.Split(r.Header.Get(xhttp.Authorization), " ")
    	if len(authFields) != 2 {
    		return auth.Credentials{}, false, ErrMissingFields
    	}
    
    	// Then will be splitting on ":", this will separate `AWSAccessKeyId` and `Signature` string.
    	keySignFields := strings.Split(strings.TrimSpace(authFields[1]), ":")
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 12.2K bytes
    - Viewed (0)
  3. cmd/auth-handler_test.go

    	testCases := []struct {
    		inputQueryKey   string
    		inputQueryValue string
    		expectedResult  bool
    	}{
    		// Test case - 1.
    		// Test case with query key "AWSAccessKeyId" set.
    		{"", "", false},
    		// Test case - 2.
    		{"AWSAccessKeyId", "", true},
    		// Test case - 3.
    		{"X-Amz-Content-Sha256", "", false},
    	}
    
    	for i, testCase := range testCases {
    		// creating an input HTTP request.
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Feb 22 06:26:06 GMT 2024
    - 15.4K bytes
    - Viewed (0)
  4. internal/http/headers.go

    	AmzEncryptionAES = "AES256"
    	AmzEncryptionKMS = "aws:kms"
    
    	// Signature v2 related constants
    	AmzSignatureV2 = "Signature"
    	AmzAccessKeyID = "AWSAccessKeyId"
    
    	// Response request id.
    	AmzRequestID     = "x-amz-request-id"
    	AmzRequestHostID = "x-amz-id-2"
    
    	// Deployment id.
    	MinioDeploymentID = "x-minio-deployment-id"
    
    	// Peer call
    Go
    - Registered: Sun Apr 21 19:28:08 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 10.4K bytes
    - Viewed (1)
  5. cmd/post-policy_test.go

    	formData := map[string]string{
    		"AWSAccessKeyId":              accessKey,
    		"bucket":                      bucketName,
    		"key":                         objectName + "/${filename}",
    		"policy":                      encodedPolicy,
    		"signature":                   signature,
    		"X-Amz-Ignore-AWSAccessKeyId": "",
    	}
    
    	// Create the multipart form.
    	var buf bytes.Buffer
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Fri Apr 19 16:45:54 GMT 2024
    - 29.6K bytes
    - Viewed (0)
  6. cmd/test-utils_test.go

    	// Construct the final presigned URL.
    	return nil
    }
    
    // preSignV2 - presign the request in following style.
    // https://${S3_BUCKET}.s3.amazonaws.com/${S3_OBJECT}?AWSAccessKeyId=${S3_ACCESS_KEY}&Expires=${TIMESTAMP}&Signature=${SIGNATURE}.
    func preSignV2(req *http.Request, accessKeyID, secretAccessKey string, expires int64) error {
    	// Presign is not needed for anonymous credentials.
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 04 12:06:57 GMT 2024
    - 75.7K bytes
    - Viewed (0)
Back to top