- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 350 for accesskey (0.04 sec)
-
cmd/server_test.go
} else { s.testServer = StartTestServer(c, s.serverType) } s.client = s.testServer.Server.Client() s.endPoint = s.testServer.Server.URL s.accessKey = s.testServer.AccessKey s.secretKey = s.testServer.SecretKey } func (s *TestSuiteCommon) RestartTestServer(c *check) { // Shutdown. s.testServer.cancel() s.testServer.Server.Close()Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 118.1K bytes - Viewed (0) -
cmd/admin-handlers-idp-openid.go
readableClaim, _ = accessKey.Claims[rc].(string) } openIDUserAccessKeys = madmin.OpenIDUserAccessKeys{ MinioAccessKey: accessKey.ParentUser, ID: id, ReadableName: readableClaim, } } svcAccInfo := madmin.ServiceAccountInfo{ AccessKey: accessKey.AccessKey, Expiration: &accessKey.Expiration, } if accessKey.IsServiceAccount() {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sat Sep 06 17:38:46 UTC 2025 - 7.6K bytes - Viewed (0) -
cmd/admin-handlers-users.go
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 90.6K bytes - Viewed (0) -
internal/auth/credentials_test.go
// Two different credentialss {cred, cred2, false}, // Access key is different in credentials to compare. {cred, Credentials{AccessKey: "myuser", SecretKey: cred.SecretKey}, false}, // Secret key is different in credentials to compare. {cred, Credentials{AccessKey: cred.AccessKey, SecretKey: "mypassword"}, false}, } for i, testCase := range testCases { result := testCase.cred.Equal(testCase.ccred)Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.4K bytes - Viewed (0) -
cmd/bucket-targets.go
return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket, Err: err} case "AccessDenied": return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } return RemoteTargetConnectionErr{Bucket: tgt.TargetBucket, AccessKey: tgt.Credentials.AccessKey, Err: err} } if !exists { return BucketRemoteTargetNotFound{Bucket: tgt.TargetBucket} } if tgt.Type == madmin.ReplicationService {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 20.9K bytes - Viewed (0) -
cmd/signature-v2.go
} r.Form.Del(xhttp.Expires) return ErrNone } func getReqAccessKeyV2(r *http.Request) (auth.Credentials, bool, APIErrorCode) { if accessKey := r.Form.Get(xhttp.AmzAccessKeyID); accessKey != "" { return checkKeyValid(r, accessKey) } // below is V2 Signed Auth header format, splitting on `space` (after the `AWS` string). // Authorization = "AWS" + " " + AWSAccessKeyId + ":" + Signature
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
cmd/sts-handlers.go
// policy is inherited from `user.AccessKey`. cred.ParentUser = user.AccessKey // Set the newly generated credentials. updatedAt, err := globalIAMSys.SetTempUser(ctx, cred.AccessKey, cred, "") if err != nil { writeSTSErrorResponse(ctx, w, ErrSTSInternalError, err) return } // Call hook for site replication. if cred.ParentUser != globalActiveCred.AccessKey {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/test-utils_test.go
return nil } // Sign given request using Signature V2. func signRequestV2(req *http.Request, accessKey, secretKey string) error { signer.SignV2(*req, accessKey, secretKey, false) return nil } // Sign given request using Signature V4. func signRequestV4(req *http.Request, accessKey, secretKey string) error { // Get hashed payload. hashedPayload := req.Header.Get("x-amz-content-sha256")
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 77K bytes - Viewed (0) -
cmd/auth-handler.go
} secret := globalActiveCred.SecretKey if globalSiteReplicationSys.isEnabled() && cred.AccessKey != siteReplicatorSvcAcc { nsecret, err := getTokenSigningKey() if err != nil { return nil, toAPIErrorCode(r.Context(), err) } // sign root's temporary accounts also with site replicator creds if cred.ParentUser != globalActiveCred.AccessKey || cred.IsTemp() { secret = nsecret } } if cred.IsServiceAccount() {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0) -
cmd/signature-v4_test.go
_, fsDir, err := prepareFS(t.Context()) if err != nil { t.Fatal(err) } defer removeRoots([]string{fsDir}) credentialTemplate := "%s/%s/%s/s3/aws4_request" now := UTCNow() accessKey := globalActiveCred.AccessKey testCases := []struct { form http.Header expected APIErrorCode }{ // (0) It should fail if 'X-Amz-Credential' is missing. { form: http.Header{},
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 10.5K bytes - Viewed (0)