- Sort Score
- Result 10 results
- Languages All
Results 31 - 40 of 113 for access_key (0.06 sec)
-
cmd/jwt.go
} return nil, nil, false, err } claims := xjwt.NewMapClaims() if err := xjwt.ParseWithClaims(token, claims, func(claims *xjwt.MapClaims) ([]byte, error) { if claims.AccessKey != globalActiveCred.AccessKey { u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey) if !ok { // Credentials will be invalid but for disabled // return a different error in such a scenario. if u.Credentials.Status == auth.AccountOff {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.5K bytes - Viewed (0) -
cmd/object-handlers_test.go
byteRange: "", accessKey: credentials.AccessKey, secretKey: credentials.SecretKey, expectedContent: bytesData[0].byteData, expectedRespStatus: http.StatusOK, }, // Test case - 2. // Case with non-existent object name. { bucketName: bucketName, objectName: "abcd", byteRange: "", accessKey: credentials.AccessKey, secretKey: credentials.SecretKey,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 163.1K bytes - Viewed (0) -
cmd/server_test.go
} else { s.testServer = StartTestServer(c, s.serverType) } s.client = s.testServer.Server.Client() s.endPoint = s.testServer.Server.URL s.accessKey = s.testServer.AccessKey s.secretKey = s.testServer.SecretKey } func (s *TestSuiteCommon) RestartTestServer(c *check) { // Shutdown. s.testServer.cancel() s.testServer.Server.Close()
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 118.1K bytes - Viewed (0) -
cmd/signature-v4-parser.go
if len(credElements) < 5 { return ch, ErrCredMalformed } accessKey := strings.Join(credElements[:len(credElements)-4], SlashSeparator) // The access key may contain one or more `/` if !auth.IsAccessKeyValid(accessKey) { return ch, ErrInvalidAccessKeyID } // Save access key id. cred := credentialHeader{ accessKey: accessKey, } credElements = credElements[len(credElements)-4:] var e error
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 9.4K bytes - Viewed (0) -
cmd/bucket-targets.go
return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket, Err: err} case "AccessDenied": return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } if !exists { return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket} } if tgt.Type == madmin.ReplicationService {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 20.9K bytes - Viewed (0) -
cmd/bucket-lifecycle-handlers_test.go
method string bucketName string accessKey string secretKey string // Sent body body []byte // Expected response expectedRespStatus int lifecycleResponse []byte errorResponse APIErrorResponse shouldPass bool }{ // GET empty credentials { method: http.MethodGet, bucketName: bucketName, accessKey: "", secretKey: "",
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Jun 10 15:50:49 UTC 2024 - 11.3K bytes - Viewed (0) -
cmd/signature-v2.go
} r.Form.Del(xhttp.Expires) return ErrNone } func getReqAccessKeyV2(r *http.Request) (auth.Credentials, bool, APIErrorCode) { if accessKey := r.Form.Get(xhttp.AmzAccessKeyID); accessKey != "" { return checkKeyValid(r, accessKey) } // below is V2 Signed Auth header format, splitting on `space` (after the `AWS` string). // Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
cmd/sts-handlers.go
// policy is inherited from `user.AccessKey`. cred.ParentUser = user.AccessKey // Set the newly generated credentials. updatedAt, err := globalIAMSys.SetTempUser(ctx, cred.AccessKey, cred, "") if err != nil { writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) return } // Call hook for site replication. if cred.ParentUser != globalActiveCred.AccessKey {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/warm-backend-s3.go
return nil, errors.New("both the token file and the role ARN are required") case conf.AccessKey == "" && conf.SecretKey != "" || conf.AccessKey != "" && conf.SecretKey == "": return nil, errors.New("both the access and secret keys are required") case conf.AWSRole && (conf.AWSRoleWebIdentityTokenFile != "" || conf.AWSRoleARN != "" || conf.AccessKey != "" || conf.SecretKey != ""):
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Jun 08 16:13:30 UTC 2025 - 5.8K bytes - Viewed (0) -
cmd/signature-v4-parser_test.go
func validateCredentialfields(t *testing.T, testNum int, expectedCredentials credentialHeader, actualCredential credentialHeader) { if expectedCredentials.accessKey != actualCredential.accessKey { t.Errorf("Test %d: AccessKey mismatch: Expected \"%s\", got \"%s\"", testNum, expectedCredentials.accessKey, actualCredential.accessKey) } if !expectedCredentials.scope.date.Equal(actualCredential.scope.date) {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Feb 18 16:25:55 UTC 2025 - 27.4K bytes - Viewed (0)