- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 104 for creg (0.11 sec)
-
cmd/auth-handler.go
s3Err = authenticateRequest(ctx, r, action) reqInfo := logger.GetReqInfo(ctx) if reqInfo == nil { return cred, owner, ErrAccessDenied } cred = reqInfo.Cred owner = reqInfo.Owner if s3Err != ErrNone { return cred, owner, s3Err } return cred, owner, authorizeRequest(ctx, r, action) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 17 16:45:46 UTC 2024 - 26.1K bytes - Viewed (0) -
cmd/signature-v4.go
if s3Err != ErrNone { return auth.Credentials{}, s3Err } r := &http.Request{Header: formValues} cred, _, s3Err := checkKeyValid(r, credHeader.accessKey) if s3Err != ErrNone { return cred, s3Err } // Get signing key. signingKey := getSigningKey(cred.SecretKey, credHeader.scope.date, credHeader.scope.region, serviceS3) // Get signature.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 12.4K bytes - Viewed (0) -
cmd/streaming-signature-v4.go
extractedSignedHeaders, errCode := extractSignedHeaders(signV4Values.SignedHeaders, r) if errCode != ErrNone { return cred, "", "", time.Time{}, errCode } cred, _, errCode = checkKeyValid(r, signV4Values.Credential.accessKey) if errCode != ErrNone { return cred, "", "", time.Time{}, errCode } // Verify if region is valid. region = signV4Values.Credential.scope.region
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 18.2K bytes - Viewed (0) -
internal/auth/credentials_test.go
} testCases := []struct { cred Credentials ccred Credentials expectedResult bool }{ // Same Credentialss. {cred, cred, true}, // Empty credentials to compare. {cred, Credentials{}, false}, // Empty credentials. {Credentials{}, cred, false}, // Two different credentialss {cred, cred2, false}, // Access key is different in credentials to compare.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Mar 01 21:09:42 UTC 2024 - 5.4K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
// Find the user for the request sender (as it may be sent via a service // account or STS account): requestorUser := cred.AccessKey requestorParentUser := cred.AccessKey requestorGroups := cred.Groups requestorIsDerivedCredential := false if cred.IsServiceAccount() || cred.IsTemp() { requestorParentUser = cred.ParentUser requestorIsDerivedCredential = true } // Check if we are creating svc account for request sender.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Sep 21 11:35:40 UTC 2024 - 19.1K bytes - Viewed (0) -
istioctl/pkg/multixds/google.go
return nil, fmt.Errorf("webhook URL %s is malformed", u) } ret.gcpProject = u.Path[i : i+j] const crSeg = "/ISTIO_META_CLOUDRUN_ADDR/" i += j j = strings.Index(u.Path[i:], crSeg) if j == -1 { return nil, fmt.Errorf("webhook URL %s is missing %s", u, crSeg) } ret.istiod = u.Path[i+j+len(crSeg):] return ret, nil
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jun 06 03:39:27 UTC 2022 - 1.5K bytes - Viewed (0) -
cmd/signature-v2.go
r := &http.Request{Header: formValues} cred, _, s3Err := checkKeyValid(r, accessKey) if s3Err != ErrNone { return cred, s3Err } policy := formValues.Get("Policy") signature := formValues.Get(xhttp.AmzSignatureV2) if !compareSignatureV2(signature, calculateSignatureV2(policy, cred.SecretKey)) { return cred, ErrSignatureDoesNotMatch } return cred, ErrNone }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 12.2K bytes - Viewed (0) -
cmd/bucket-policy.go
func getSTSConditionValues(r *http.Request, lc string, cred auth.Credentials) map[string][]string { m := make(map[string][]string) if d := r.Form.Get("DurationSeconds"); d != "" { m["DurationSeconds"] = []string{d} } return m } func getConditionValues(r *http.Request, lc string, cred auth.Credentials) map[string][]string { currTime := UTCNow() var ( username = cred.AccessKey claims = cred.Claims
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8K bytes - Viewed (0) -
cmd/iam-store.go
} else if cred.IsTemp() { var secretKey string secretKey, err = getTokenSigningKey() if err != nil { continue } claims, err = getClaimsFromTokenWithSecret(cred.SessionToken, secretKey) } if err != nil { continue } if cred.ParentUser == "" || cred.ParentUser == globalActiveCred.AccessKey { continue }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Oct 14 16:35:37 UTC 2024 - 83.2K bytes - Viewed (0) -
cmd/sftp-server.go
STSCredential: &madmin.SRSTSCredential{ AccessKey: cred.AccessKey, SecretKey: cred.SecretKey, SessionToken: cred.SessionToken, ParentUser: cred.ParentUser, }, UpdatedAt: updatedAt, })) return &ssh.Permissions{ CriticalOptions: map[string]string{ "AccessKey": cred.AccessKey, "SecretKey": cred.SecretKey, "SessionToken": cred.SessionToken, },
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 20 20:00:29 UTC 2024 - 16K bytes - Viewed (0)