- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 23 for roleARN (0.03 sec)
-
internal/bucket/replication/replication.go
legacyArn = true } if c.RoleArn == "" && !r.Destination.TargetArn() { return errDestinationArnMissing } } // disallow combining old replication configuration which used RoleArn as target ARN with multiple // destination replication if c.RoleArn != "" && len(targetMap) > 1 { return errRoleArnPresentForMultipleTargets } // validate RoleArn if destination used legacy ARN format.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Mar 30 00:56:02 UTC 2025 - 8.9K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
Type: "openid", Name: cfg, Enabled: false, }) } else { var roleARN string if pcfg.RolePolicy != "" { roleARN = pcfg.roleArn.String() } res = append(res, madmin.IDPListItem{ Type: "openid", Name: cfg, Enabled: r.Enabled, RoleARN: roleARN, }) } } return res, nil } // Enabled returns if configURL is enabled.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 17.3K bytes - Viewed (0) -
docs/sts/custom-token-identity.go
flag.StringVar(&token, "t", "", "Token to use with AssumeRoleWithCustomToken STS API (required)") flag.StringVar(&roleArn, "r", "", "RoleARN to use with the request (required)") flag.BoolVar(&displayCreds, "d", false, "Only show generated credentials") flag.DurationVar(&expiryDuration, "e", 0, "Request a duration of validity for the generated credential")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 3.4K bytes - Viewed (0) -
docs/site-replication/gen-oidc-sts-cred.go
if err != nil { log.Fatalf("Failed to generate OIDC token: %v", err) } roleARN := os.Getenv("ROLE_ARN") webID := cr.STSWebIdentity{ Client: &http.Client{}, STSEndpoint: endpoint, GetWebIDTokenExpiry: func() (*cr.WebIdentityToken, error) { return &cr.WebIdentityToken{ Token: oidcToken, }, nil }, RoleARN: roleARN, } value, err := webID.Retrieve() if err != nil {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Apr 29 01:27:09 UTC 2022 - 2.3K bytes - Viewed (1) -
cmd/sts-handlers.go
// If there *is* a claim-based provider configured, then // treat an unrecognized roleArn the same as no roleArn // at all. This is to support clients like the AWS SDKs // or CLI that will not allow an AssumeRoleWithWebIdentity // call without a RoleARN parameter - for these cases the // user can supply a dummy ARN, which Minio will ignore. roleArn = openid.DummyRoleARN isRolePolicyProvider = false } }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
internal/config/identity/plugin/config.go
// of claims. func (o *AuthNPlugin) Authenticate(roleArn arn.ARN, token string) (AuthNResponse, error) { if o == nil { return AuthNResponse{}, nil } if roleArn != o.args.RoleARN { return AuthNResponse{}, fmt.Errorf("Invalid role ARN value: %s", roleArn.String()) } u := url.URL(*o.args.URL) q := u.Query() q.Set("token", token)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 13.3K bytes - Viewed (0) -
cmd/user-provider-utils.go
} } func getOpenIDCfgNameFromClaims(claims map[string]any) (string, bool) { roleArn := claims[roleArnClaim] s := globalServerConfig.Clone() configs, err := globalIAMSys.OpenIDConfig.GetConfigList(s) if err != nil { return "", false } for _, cfg := range configs { if cfg.RoleARN == roleArn { return cfg.Name, true } } return "", false }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.1K bytes - Viewed (0) -
docs/sts/custom-token-identity.md
| Version | String | Yes | Value must be `2011-06-15` | | Token | String | Yes | Token to be authenticated by identity plugin | | RoleArn | String | Yes | Must match the Role ARN generated for the identity plugin | | DurationSeconds | Integer | No | Duration of validity of generated credentials. Must be at least 900. |
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 3K bytes - Viewed (0) -
cmd/iam.go
func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) { roleArn, err := arn.Parse(arnStr) if err != nil { return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err) } rolePolicy, ok := sys.rolesMap[roleArn] if !ok { return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr) } return roleArn, rolePolicy, nil }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 76.5K bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
RedirectURIDynamic bool DiscoveryDoc DiscoveryDoc ClientID string ClientSecret string RolePolicy string UserReadableClaim string UserIDClaim string roleArn arn.ARN provider provider.Provider } func newProviderCfgFromConfig(getCfgVal func(cfgName string) string) providerCfg { return providerCfg{ DisplayName: getCfgVal(DisplayName),
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.7K bytes - Viewed (0)