- Sort Score
- Num 10 results
- Language All
Results 11 - 20 of 192 for AccessKey (0.04 seconds)
-
internal/auth/credentials_test.go
// Two different credentialss {cred, cred2, false}, // Access key is different in credentials to compare. {cred, Credentials{AccessKey: "myuser", SecretKey: cred.SecretKey}, false}, // Secret key is different in credentials to compare. {cred, Credentials{AccessKey: cred.AccessKey, SecretKey: "mypassword"}, false}, } for i, testCase := range testCases { result := testCase.cred.Equal(testCase.ccred)Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 5.4K bytes - Click Count (0) -
cmd/admin-handlers-idp-ldap.go
serviceAccountList = append(serviceAccountList, madmin.ServiceAccountInfo{ AccessKey: svc.AccessKey, Expiration: &expiryTime, Name: svc.Name, Description: svc.Description, }) } for _, sts := range stsKeys { expiryTime := sts.Expiration stsKeyList = append(stsKeyList, madmin.ServiceAccountInfo{ AccessKey: sts.AccessKey, Expiration: &expiryTime, }) }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 08 02:46:04 GMT 2025 - 19.2K bytes - Click Count (0) -
cmd/bucket-targets.go
return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket, Err: err} case "AccessDenied": return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } if !exists { return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket} } if tgt.Type == madmin.ReplicationService {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 20.9K bytes - Click Count (0) -
cmd/admin-handlers-idp-openid.go
readableClaim, _ = accessKey.Claims[rc].(string) } openIDUserAccessKeys = madmin.OpenIDUserAccessKeys{ MinioAccessKey: accessKey.ParentUser, ID: id, ReadableName: readableClaim, } } svcAccInfo := madmin.ServiceAccountInfo{ AccessKey: accessKey.AccessKey, Expiration: &accessKey.Expiration, } if accessKey.IsServiceAccount() {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sat Sep 06 17:38:46 GMT 2025 - 7.6K bytes - Click Count (0) -
cmd/admin-handlers-users.go
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 90.6K bytes - Click Count (0) -
cmd/warm-backend-s3.go
return nil, errors.New("both the token file and the role ARN are required") case conf.AccessKey == "" && conf.SecretKey != "" || conf.AccessKey != "" && conf.SecretKey == "": return nil, errors.New("both the access and secret keys are required") case conf.AWSRole && (conf.AWSRoleWebIdentityTokenFile != "" || conf.AWSRoleARN != "" || conf.AccessKey != "" || conf.SecretKey != ""):
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Jun 08 16:13:30 GMT 2025 - 5.8K bytes - Click Count (0) -
cmd/bucket-policy-handlers_test.go
accessKey: credentials.AccessKey, secretKey: credentials.SecretKey, expectedBucketPolicy: bucketPolicyTemplate, expectedRespStatus: http.StatusNotFound, }, // Test case - 3. // Case with non-existent bucket name. { bucketName: ".invalid-bucket-name", accessKey: credentials.AccessKey,Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 32.9K bytes - Click Count (0) -
cmd/sts-handlers.go
// policy is inherited from `user.AccessKey`. cred.ParentUser = user.AccessKey // Set the newly generated credentials. updatedAt, err := globalIAMSys.SetTempUser(ctx, cred.AccessKey, cred, "") if err != nil { writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) return } // Call hook for site replication. if cred.ParentUser != globalActiveCred.AccessKey {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 36.6K bytes - Click Count (0) -
cmd/signature-v2.go
} r.Form.Del(xhttp.Expires) return ErrNone } func getReqAccessKeyV2(r *http.Request) (auth.Credentials, bool, APIErrorCode) { if accessKey := r.Form.Get(xhttp.AmzAccessKeyID); accessKey != "" { return checkKeyValid(r, accessKey) } // below is V2 Signed Auth header format, splitting on `space` (after the `AWS` string). // Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 12.2K bytes - Click Count (0) -
cmd/auth-handler.go
} secret := globalActiveCred.SecretKey if globalSiteReplicationSys.isEnabled() && cred.AccessKey != siteReplicatorSvcAcc { nsecret, err := getTokenSigningKey() if err != nil { return nil, toAPIErrorCode(r.Context(), err) } // sign root's temporary accounts also with site replicator creds if cred.ParentUser != globalActiveCred.AccessKey || cred.IsTemp() { secret = nsecret } } if cred.IsServiceAccount() {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 25.4K bytes - Click Count (0)