Search Options

Results per page
Sort
Preferred Languages
Advance

Results 21 - 30 of 120 for Pred (0.02 sec)

  1. cmd/auth-handler.go

    	s3Err = authenticateRequest(ctx, r, action)
    	reqInfo := logger.GetReqInfo(ctx)
    	if reqInfo == nil {
    		return cred, owner, ErrAccessDenied
    	}
    
    	cred = reqInfo.Cred
    	owner = reqInfo.Owner
    	if s3Err != ErrNone {
    		return cred, owner, s3Err
    	}
    
    	return cred, owner, authorizeRequest(ctx, r, action)
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
  2. cmd/signature-v4.go

    	if s3Err != ErrNone {
    		return auth.Credentials{}, s3Err
    	}
    
    	r := &http.Request{Header: formValues}
    	cred, _, s3Err := checkKeyValid(r, credHeader.accessKey)
    	if s3Err != ErrNone {
    		return cred, s3Err
    	}
    
    	// Get signing key.
    	signingKey := getSigningKey(cred.SecretKey, credHeader.scope.date, credHeader.scope.region, serviceS3)
    
    	// Get signature.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Dec 13 22:19:12 UTC 2024
    - 12.4K bytes
    - Viewed (0)
  3. cmd/streaming-signature-v4.go

    	extractedSignedHeaders, errCode := extractSignedHeaders(signV4Values.SignedHeaders, r)
    	if errCode != ErrNone {
    		return cred, "", "", time.Time{}, errCode
    	}
    
    	cred, _, errCode = checkKeyValid(r, signV4Values.Credential.accessKey)
    	if errCode != ErrNone {
    		return cred, "", "", time.Time{}, errCode
    	}
    
    	// Verify if region is valid.
    	region = signV4Values.Credential.scope.region
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Mar 30 00:56:02 UTC 2025
    - 18.2K bytes
    - Viewed (0)
  4. cmd/admin-handlers-idp-ldap.go

    	// Find the user for the request sender (as it may be sent via a service
    	// account or STS account):
    	requestorUser := cred.AccessKey
    	requestorParentUser := cred.AccessKey
    	requestorGroups := cred.Groups
    	requestorIsDerivedCredential := false
    	if cred.IsServiceAccount() || cred.IsTemp() {
    		requestorParentUser = cred.ParentUser
    		requestorIsDerivedCredential = true
    	}
    
    	// Check if we are creating svc account for request sender.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 08 02:46:04 UTC 2025
    - 19.2K bytes
    - Viewed (0)
  5. cmd/signature-v2.go

    	r := &http.Request{Header: formValues}
    	cred, _, s3Err := checkKeyValid(r, accessKey)
    	if s3Err != ErrNone {
    		return cred, s3Err
    	}
    	policy := formValues.Get("Policy")
    	signature := formValues.Get(xhttp.AmzSignatureV2)
    	if !compareSignatureV2(signature, calculateSignatureV2(policy, cred.SecretKey)) {
    		return cred, ErrSignatureDoesNotMatch
    	}
    	return cred, ErrNone
    }
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  6. cmd/sts-handlers.go

    		STSCredential: &madmin.SRSTSCredential{
    			AccessKey:    cred.AccessKey,
    			SecretKey:    cred.SecretKey,
    			SessionToken: cred.SessionToken,
    			ParentUser:   cred.ParentUser,
    		},
    		UpdatedAt: updatedAt,
    	}))
    
    	ldapIdentityResponse := &AssumeRoleWithLDAPResponse{
    		Result: LDAPIdentityResult{
    			Credentials: cred,
    		},
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  7. cmd/object-lambda-handlers.go

    		duration = time.Hour
    	}
    
    	clnt, err := miniogo.New(host, &miniogo.Options{
    		Creds:     credentials.NewStaticV4(cred.AccessKey, cred.SecretKey, cred.SessionToken),
    		Secure:    secure,
    		Transport: globalRemoteTargetTransport,
    		Region:    globalSite.Region(),
    	})
    	if err != nil {
    		return levent.Event{}, err
    	}
    
    	reqParams := url.Values{}
    	if partNumberStr := r.Form.Get("partNumber"); partNumberStr != "" {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Jul 18 21:56:31 UTC 2025
    - 6.5K bytes
    - Viewed (0)
  8. cmd/kms-handlers.go

    func checkKMSActionAllowed(r *http.Request, owner bool, cred auth.Credentials, action policy.KMSAction, resource string) bool {
    	return globalIAMSys.IsAllowed(policy.Args{
    		AccountName:     cred.AccessKey,
    		Groups:          cred.Groups,
    		Action:          policy.Action(action),
    		ConditionValues: getConditionValues(r, "", cred),
    		IsOwner:         owner,
    		Claims:          cred.Claims,
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 10.1K bytes
    - Viewed (0)
  9. cmd/signature-v4-utils.go

    			if u.Credentials.Status == auth.AccountOff {
    				return cred, false, ErrAccessKeyDisabled
    			}
    			return cred, false, ErrInvalidAccessKeyID
    		}
    		cred = u.Credentials
    	}
    
    	claims, s3Err := checkClaimsFromToken(r, cred)
    	if s3Err != ErrNone {
    		return cred, false, s3Err
    	}
    	cred.Claims = claims
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Nov 25 17:10:22 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  10. cmd/auth-handler_test.go

    func mustNewSignedRequest(method string, urlStr string, contentLength int64, body io.ReadSeeker, t *testing.T) *http.Request {
    	req := mustNewRequest(method, urlStr, contentLength, body, t)
    	cred := globalActiveCred
    	if err := signRequestV4(req, cred.AccessKey, cred.SecretKey); err != nil {
    		t.Fatalf("Unable to initialized new signed http request %s", err)
    	}
    	return req
    }
    
    // This is similar to mustNewRequest but additionally the request
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 15.4K bytes
    - Viewed (0)
Back to top