- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 22 for roleArn (0.06 sec)
-
internal/bucket/replication/replication.go
legacyArn = true } if c.RoleArn == "" && !r.Destination.TargetArn() { return errDestinationArnMissing } } // disallow combining old replication configuration which used RoleArn as target ARN with multiple // destination replication if c.RoleArn != "" && len(targetMap) > 1 { return errRoleArnPresentForMultipleTargets } // validate RoleArn if destination used legacy ARN format.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Mar 28 17:44:56 UTC 2024 - 8.9K bytes - Viewed (0) -
internal/config/identity/openid/openid.go
Type: "openid", Name: cfg, Enabled: false, }) } else { var roleARN string if pcfg.RolePolicy != "" { roleARN = pcfg.roleArn.String() } res = append(res, madmin.IDPListItem{ Type: "openid", Name: cfg, Enabled: r.Enabled, RoleARN: roleARN, }) } } return res, nil } // Enabled returns if configURL is enabled.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Jul 10 20:16:44 UTC 2024 - 16.6K bytes - Viewed (0) -
docs/site-replication/gen-oidc-sts-cred.go
if err != nil { log.Fatalf("Failed to generate OIDC token: %v", err) } roleARN := os.Getenv("ROLE_ARN") webID := cr.STSWebIdentity{ Client: &http.Client{}, STSEndpoint: endpoint, GetWebIDTokenExpiry: func() (*cr.WebIdentityToken, error) { return &cr.WebIdentityToken{ Token: oidcToken, }, nil }, RoleARN: roleARN, } value, err := webID.Retrieve() if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Apr 29 01:27:09 UTC 2022 - 2.3K bytes - Viewed (0) -
docs/sts/custom-token-identity.go
flag.StringVar(&token, "t", "", "Token to use with AssumeRoleWithCustomToken STS API (required)") flag.StringVar(&roleArn, "r", "", "RoleARN to use with the request (required)") flag.BoolVar(&displayCreds, "d", false, "Only show generated credentials") flag.DurationVar(&expiryDuration, "e", 0, "Request a duration of validity for the generated credential")
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 3.4K bytes - Viewed (0) -
internal/config/identity/plugin/config.go
// of claims. func (o *AuthNPlugin) Authenticate(roleArn arn.ARN, token string) (AuthNResponse, error) { if o == nil { return AuthNResponse{}, nil } if roleArn != o.args.RoleARN { return AuthNResponse{}, fmt.Errorf("Invalid role ARN value: %s", roleArn.String()) } u := url.URL(*o.args.URL) q := u.Query() q.Set("token", token)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 13.3K bytes - Viewed (0) -
cmd/iam.go
func (sys *IAMSys) GetRolePolicy(arnStr string) (arn.ARN, string, error) { roleArn, err := arn.Parse(arnStr) if err != nil { return arn.ARN{}, "", fmt.Errorf("RoleARN parse err: %v", err) } rolePolicy, ok := sys.rolesMap[roleArn] if !ok { return arn.ARN{}, "", fmt.Errorf("RoleARN %s is not defined.", arnStr) } return roleArn, rolePolicy, nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 29 16:01:48 UTC 2024 - 74.6K bytes - Viewed (0) -
cmd/sts-handlers.go
} accessToken := r.Form.Get(stsWebIdentityAccessToken) // RoleARN parameter processing: If a role ARN is given in the request, we // use that and validate the authentication request. If not, we assume this // is an STS request for a claim based IDP (if one is present) and set // roleArn = openid.DummyRoleARN. // // Currently, we do not support multiple claim based IDPs, as there is no
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Aug 15 01:29:20 UTC 2024 - 33.9K bytes - Viewed (0) -
docs/sts/custom-token-identity.md
| Version | String | Yes | Value must be `2011-06-15` | | Token | String | Yes | Token to be authenticated by identity plugin | | RoleArn | String | Yes | Must match the Role ARN generated for the identity plugin | | DurationSeconds | Integer | No | Duration of validity of generated credentials. Must be at least 900. |
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 27 00:58:09 UTC 2022 - 3K bytes - Viewed (0) -
internal/config/identity/openid/providercfg.go
ClaimUserinfo bool RedirectURI string RedirectURIDynamic bool DiscoveryDoc DiscoveryDoc ClientID string ClientSecret string RolePolicy string roleArn arn.ARN provider provider.Provider } func newProviderCfgFromConfig(getCfgVal func(cfgName string) string) providerCfg { return providerCfg{ DisplayName: getCfgVal(DisplayName),
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 4.6K bytes - Viewed (0) -
cmd/data-usage.go
cfg, _ := getReplicationConfig(GlobalContext, bucket) if cfg != nil && cfg.RoleArn != "" { if dataUsageInfo.ReplicationInfo == nil { dataUsageInfo.ReplicationInfo = make(map[string]BucketTargetUsageInfo) } dataUsageInfo.ReplicationInfo[cfg.RoleArn] = BucketTargetUsageInfo{ ReplicationFailedSize: bui.ReplicationFailedSizeV1,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 09 00:51:34 UTC 2024 - 5.6K bytes - Viewed (0)