Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 22 for roleArn (0.06 sec)

  1. internal/bucket/replication/replication.go

    			legacyArn = true
    		}
    		if c.RoleArn == "" && !r.Destination.TargetArn() {
    			return errDestinationArnMissing
    		}
    	}
    	// disallow combining old replication configuration which used RoleArn as target ARN with multiple
    	// destination replication
    	if c.RoleArn != "" && len(targetMap) > 1 {
    		return errRoleArnPresentForMultipleTargets
    	}
    	// validate RoleArn if destination used legacy ARN format.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Mar 28 17:44:56 UTC 2024
    - 8.9K bytes
    - Viewed (0)
  2. internal/config/identity/openid/openid.go

    				Type:    "openid",
    				Name:    cfg,
    				Enabled: false,
    			})
    		} else {
    			var roleARN string
    			if pcfg.RolePolicy != "" {
    				roleARN = pcfg.roleArn.String()
    			}
    			res = append(res, madmin.IDPListItem{
    				Type:    "openid",
    				Name:    cfg,
    				Enabled: r.Enabled,
    				RoleARN: roleARN,
    			})
    		}
    	}
    
    	return res, nil
    }
    
    // Enabled returns if configURL is enabled.
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Jul 10 20:16:44 UTC 2024
    - 16.6K bytes
    - Viewed (0)
  3. docs/site-replication/gen-oidc-sts-cred.go

    	if err != nil {
    		log.Fatalf("Failed to generate OIDC token: %v", err)
    	}
    
    	roleARN := os.Getenv("ROLE_ARN")
    	webID := cr.STSWebIdentity{
    		Client:      &http.Client{},
    		STSEndpoint: endpoint,
    		GetWebIDTokenExpiry: func() (*cr.WebIdentityToken, error) {
    			return &cr.WebIdentityToken{
    				Token: oidcToken,
    			}, nil
    		},
    		RoleARN: roleARN,
    	}
    
    	value, err := webID.Retrieve()
    	if err != nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Apr 29 01:27:09 UTC 2022
    - 2.3K bytes
    - Viewed (0)
  4. docs/sts/custom-token-identity.go

    	flag.StringVar(&token, "t", "", "Token to use with AssumeRoleWithCustomToken STS API (required)")
    	flag.StringVar(&roleArn, "r", "", "RoleARN to use with the request (required)")
    	flag.BoolVar(&displayCreds, "d", false, "Only show generated credentials")
    	flag.DurationVar(&expiryDuration, "e", 0, "Request a duration of validity for the generated credential")
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 27 00:58:09 UTC 2022
    - 3.4K bytes
    - Viewed (0)
  5. internal/config/identity/plugin/config.go

    // of claims.
    func (o *AuthNPlugin) Authenticate(roleArn arn.ARN, token string) (AuthNResponse, error) {
    	if o == nil {
    		return AuthNResponse{}, nil
    	}
    
    	if roleArn != o.args.RoleARN {
    		return AuthNResponse{}, fmt.Errorf("Invalid role ARN value: %s", roleArn.String())
    	}
    
    	u := url.URL(*o.args.URL)
    	q := u.Query()
    	q.Set("token", token)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 13.3K bytes
    - Viewed (0)
  6. cmd/iam.go

    func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) {
    	roleArn, err := arn.Parse(arnStr)
    	if err != nil {
    		return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err)
    	}
    	rolePolicy, ok := sys.rolesMap[roleArn]
    	if !ok {
    		return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr)
    	}
    	return roleArn, rolePolicy, nil
    }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 29 16:01:48 UTC 2024
    - 74.6K bytes
    - Viewed (0)
  7. cmd/sts-handlers.go

    	}
    
    	accessToken := r.Form.Get(stsWebIdentityAccessToken)
    
    	// RoleARN parameter processing: If a role ARN is given in the request, we
    	// use that and validate the authentication request. If not, we assume this
    	// is an STS request for a claim based IDP (if one is present) and set
    	// roleArn = openid.DummyRoleARN.
    	//
    	// Currently, we do not support multiple claim based IDPs, as there is no
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Aug 15 01:29:20 UTC 2024
    - 33.9K bytes
    - Viewed (0)
  8. docs/sts/custom-token-identity.md

    | Version         | String  | Yes      | Value must be `2011-06-15`                                           |
    | Token           | String  | Yes      | Token to be authenticated by identity plugin                         |
    | RoleArn         | String  | Yes      | Must match the Role ARN generated for the identity plugin            |
    | DurationSeconds | Integer | No       | Duration of validity of generated credentials. Must be at least 900. |
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 27 00:58:09 UTC 2022
    - 3K bytes
    - Viewed (0)
  9. internal/config/identity/openid/providercfg.go

    	ClaimUserinfo      bool
    	RedirectURI        string
    	RedirectURIDynamic bool
    	DiscoveryDoc       DiscoveryDoc
    	ClientID           string
    	ClientSecret       string
    	RolePolicy         string
    
    	roleArn  arn.ARN
    	provider provider.Provider
    }
    
    func newProviderCfgFromConfig(getCfgVal func(cfgName string) string) providerCfg {
    	return providerCfg{
    		DisplayName:        getCfgVal(DisplayName),
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 4.6K bytes
    - Viewed (0)
  10. cmd/data-usage.go

    			cfg, _ := getReplicationConfig(GlobalContext, bucket)
    			if cfg != nil && cfg.RoleArn != "" {
    				if dataUsageInfo.ReplicationInfo == nil {
    					dataUsageInfo.ReplicationInfo = make(map[string]BucketTargetUsageInfo)
    				}
    				dataUsageInfo.ReplicationInfo[cfg.RoleArn] = BucketTargetUsageInfo{
    					ReplicationFailedSize:   bui.ReplicationFailedSizeV1,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu May 09 00:51:34 UTC 2024
    - 5.6K bytes
    - Viewed (0)
Back to top