- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for eclair (0.22 sec)
-
internal/config/identity/openid/jwt.go
if !ok { return errors.New("STS JWT Token has `aud` claim invalid, `aud` must match configured OpenID Client ID") } if !audValues.Contains(pCfg.ClientID) { // if audience claims is missing, look for "azp" claims. // OPTIONAL. Authorized party - the party to which the ID // Token was issued. If present, it MUST contain the OAuth // 2.0 Client ID of this party. This Claim is only needed
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 8.3K bytes - Viewed (5) -
cmd/bucket-policy.go
vStr, ok := v.(string) if ok { // Trim any LDAP specific prefix args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr} } } // Add groups claim which could be a list. This will ensure that the claim // `jwt:groups` works. if grpsVal, ok := claims["groups"]; ok { if grpsIs, ok := grpsVal.([]interface{}); ok { grps := []string{} for _, gI := range grpsIs {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 8K bytes - Viewed (0) -
internal/config/constants.go
EnvRegion = "MINIO_REGION" // legacy EnvRegionName = "MINIO_REGION_NAME" // legacy ) // Expiration Token durations // These values are used to validate the expiration time range from // either the exp claim or MINI_STS_DURATION value const ( MinExpiration = 900 MaxExpiration = 31536000
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Jan 01 16:36:33 GMT 2024 - 3.4K bytes - Viewed (3) -
internal/config/identity/openid/jwt_test.go
claimsMap.SetAccessKey("test-access") if err := updateClaimsExpiry("3600", claimsMap.MapClaims); err != nil { t.Error(err) } // Build simple token with updated expiration claim token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS256, claimsMap) tokenString, err := token.SignedString(signKey) if err != nil { t.Error(err) } // Parse token to be sure it is valid
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.3K bytes - Viewed (0) -
internal/config/identity/openid/help.go
Optional: true, Type: "on|off", }, config.HelpKV{ Key: ClaimPrefix, Description: `[DEPRECATED use 'claim_name'] JWT claim namespace prefix e.g. "customer1/"` + defaultHelpPostfix(ClaimPrefix), Optional: true, Type: "string", }, config.HelpKV{ Key: RedirectURI,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Jun 23 14:45:27 GMT 2023 - 4.3K bytes - Viewed (0) -
internal/jwt/parser_test.go
import ( "fmt" "testing" "time" "github.com/golang-jwt/jwt/v4" ) var ( defaultKeyFunc = func(claim *MapClaims) ([]byte, error) { return []byte("HelloSecret"), nil } emptyKeyFunc = func(claim *MapClaims) ([]byte, error) { return nil, nil } errorKeyFunc = func(claim *MapClaims) ([]byte, error) { return nil, fmt.Errorf("error loading key") } ) var jwtTestData = []struct { name string
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Nov 05 19:20:08 GMT 2021 - 6K bytes - Viewed (0) -
internal/dsync/dsync-server_test.go
time.Sleep(time.Duration(d)) } l.mutex.Lock() defer l.mutex.Unlock() if _, reply = l.lockMap[args.Resources[0]]; !reply { l.lockMap[args.Resources[0]] = WriteLock // No locks held on the given name, so claim write lock } reply = !reply // Negate *reply to return true when lock is granted or false otherwise return reply, nil } func (l *lockServer) Unlock(args *LockArgs) (reply bool, err error) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Jan 23 16:46:37 GMT 2023 - 8.3K bytes - Viewed (0) -
cmd/jwt.go
if !ok { return nil, nil, false, errInvalidAccessKeyID } ucred := u.Credentials // get embedded claims eclaims, s3Err := checkClaimsFromToken(req, ucred) if s3Err != ErrNone { return nil, nil, false, errAuthentication } for k, v := range eclaims { claims.MapClaims[k] = v } // if root access is disabled, disable all its service accounts and temporary credentials.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 16:45:14 GMT 2024 - 5.4K bytes - Viewed (0)