- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 15 for IsAllowed (0.15 sec)
-
cmd/auth-handler.go
byPassSet = globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.BypassGovernanceRetentionAction, BucketName: bucketName, ObjectName: objectName, ConditionValues: conditions, IsOwner: owner, Claims: cred.Claims, }) } if globalIAMSys.IsAllowed(policy.Args{Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0) -
internal/config/policy/opa/config.go
return nil } return &Opa{ args: args, client: &http.Client{Transport: args.Transport}, } } // IsAllowed - checks given policy args is allowed to continue the REST API. func (o *Opa) IsAllowed(args policy.Args) (bool, error) { if o == nil { return false, nil } // OPA input body := make(map[string]any) body["input"] = args
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.3K bytes - Viewed (0) -
cmd/iam.go
} // Sub policy not set, this is most common since subPolicy // is optional, use the inherited policies. return isOwnerDerived || combinedPolicy.IsAllowed(args) } func isAllowedBySessionPolicyForServiceAccount(args policy.Args) (hasSessionPolicy bool, isAllowed bool) { hasSessionPolicy = false isAllowed = false
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Oct 15 17:00:45 UTC 2025 - 76.5K bytes - Viewed (0) -
cmd/admin-handlers-idp-openid.go
writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(ErrInvalidRequest), r.URL) return } // Empty DN list and not self, list access keys for all users if isAll { if !globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.ListUsersAdminAction, ConditionValues: getConditionValues(r, "", cred), IsOwner: owner,
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
cmd/bucket-policy.go
policy, _, err := globalBucketMetadataSys.GetPolicyConfig(bucket) return policy, err } // IsAllowed - checks given policy args is allowed to continue the Rest API. func (sys *PolicySys) IsAllowed(args policy.BucketPolicyArgs) bool { p, err := sys.Get(args.BucketName) if err == nil { return p.IsAllowed(args) } // Log unhandled errors. if _, ok := err.(BucketPolicyNotFound); !ok {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 7.9K bytes - Viewed (0) -
cmd/admin-handlers-users.go
if s3Err != ErrNone { writeErrorResponseJSON(ctx, w, errorCodes.ToAPIErr(s3Err), r.URL) return } checkDenyOnly := name == cred.AccessKey if !globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.GetUserAdminAction, ConditionValues: getConditionValues(r, "", cred), IsOwner: owner,Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
internal/config/policy/plugin/config.go
return nil } return &AuthZPlugin{ args: args, client: &http.Client{Transport: args.Transport}, } } // IsAllowed - checks given policy args is allowed to continue the REST API. func (o *AuthZPlugin) IsAllowed(args policy.Args) (bool, error) { if o == nil { return false, nil } // Access Management Plugin Input body := make(map[string]any)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.8K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// If listing is requested for a specific user (who is not the request // sender), check that the user has permissions. if userDN != "" && userDN != cred.ParentUser { if !globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.ListServiceAccountsAdminAction, ConditionValues: getConditionValues(r, "", cred),
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/bucket-handlers.go
readable := globalPolicySys.IsAllowed(policy.BucketPolicyArgs{ Action: policy.ListBucketAction, BucketName: bucket, ConditionValues: getConditionValues(r, "", auth.AnonymousCredentials), IsOwner: false, }) // Check if anonymous (non-owner) has access to upload objects. writable := globalPolicySys.IsAllowed(policy.BucketPolicyArgs{Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 63.9K bytes - Viewed (0) -
cmd/kms-handlers.go
// checkKMSActionAllowed checks for authorization for a specific action on a resource. func checkKMSActionAllowed(r *http.Request, owner bool, cred auth.Credentials, action policy.KMSAction, resource string) bool { return globalIAMSys.IsAllowed(policy.Args{ AccountName: cred.AccessKey, Groups: cred.Groups, Action: policy.Action(action), ConditionValues: getConditionValues(r, "", cred), IsOwner: owner,
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Aug 18 06:43:03 UTC 2024 - 10.1K bytes - Viewed (0)