- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 123 for Claims (0.04 seconds)
-
cmd/sts-handlers.go
writeSTSErrorResponse(ctx, w, ErrSTSInvalidParameterValue, err) return } claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUser] = ldapUserDN claims[ldapActualUser] = ldapActualUserDN claims[ldapUserN] = ldapUsername // Add lookup up LDAP attributes as claims. for attrib, value := range lookupResult.Attributes { claims[ldapAttribPrefix+attrib] = value } tokenRevokeType := r.Form.Get(stsRevokeTokenType)
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 36.6K bytes - Click Count (0) -
cmd/auth-handler.go
return token } return r.Form.Get(xhttp.AmzSecurityToken) } // Fetch claims in the security token returned by the client, doesn't return // errors - upon errors the returned claims map will be empty. func mustGetClaimsFromToken(r *http.Request) map[string]any { claims, _ := getClaimsFromToken(getSessionToken(r)) return claims } func getClaimsFromTokenWithSecret(token, secret string) (*xjwt.MapClaims, error) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 25.4K bytes - Click Count (0) -
cmd/admin-handlers-idp-ldap.go
writeErrorResponseJSON(ctx, w, APIErr, r.URL) return } // In case of LDAP/OIDC we need to set `opts.claims` to ensure // it is associated with the LDAP/OIDC user properly. for k, v := range cred.Claims { if k == expClaim { continue } opts.claims[k] = v } } else { // We still need to ensure that the target user is a valid LDAP user. //
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 08 02:46:04 GMT 2025 - 19.2K bytes - Click Count (0) -
internal/auth/credentials.go
return jwt.SignedString([]byte(tokenSecret)) } // ExtractClaims extracts JWT claims from a security token using a secret key func ExtractClaims(token, secretKey string) (*jwt.MapClaims, error) { if token == "" || secretKey == "" { return nil, errors.New("invalid argument") } claims := jwt.NewMapClaims() stsTokenCallback := func(claims *jwt.MapClaims) ([]byte, error) { return []byte(secretKey), nil }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 11.8K bytes - Click Count (0) -
internal/jwt/parser.go
return jwtgo.ErrSignatureInvalid } borrow.ReturnAll() if claims.AccessKey == "" && claims.Subject == "" { return jwtgo.NewValidationError("accessKey/sub missing", jwtgo.ValidationErrorClaimsInvalid) } // Signature is valid, lets validate the claims for // other fields such as expiry etc. return claims.Valid() }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 14.1K bytes - Click Count (0) -
cmd/metrics.go
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { tc, ok := r.Context().Value(mcontext.ContextTraceKey).(*mcontext.TraceCtxt) claims, groups, owner, authErr := metricsRequestAuthenticate(r) if authErr != nil || (claims != nil && !claims.VerifyIssuer("prometheus", true)) { if ok { tc.FuncName = "handler.MetricsAuth" tc.ResponseRecorder.LogErrBody = true }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Oct 24 04:06:31 GMT 2025 - 16.7K bytes - Click Count (0) -
apache-maven/src/main/appended-resources/licenses/EPL-2.0.txt
Contributor. If that Commercial Contributor then makes performance claims, or offers warranties related to Product X, those performance claims and warranties are such Commercial Contributor's responsibility alone. Under this section, the Commercial Contributor would have to defend claims against the other Contributors related to those performance claims and warranties, and if a court requires any other Contributor to
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Tue Jun 04 06:45:16 GMT 2024 - 13.9K bytes - Click Count (0) -
cmd/ftp-server-driver.go
if err != nil { return nil, err } claims := make(map[string]any) claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUser] = lookupResult.NormDN claims[ldapActualUser] = lookupResult.ActualDN claims[ldapUserN] = ctx.Sess.LoginUser() // Add LDAP attributes that were looked up into the claims. for attribKey, attribValue := range lookupResult.Attributes {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 14.3K bytes - Click Count (0) -
cmd/sftp-server.go
if err != nil { return nil, err } claims[expClaim] = UTCNow().Add(expiryDur).Unix() claims[ldapUserN] = user claims[ldapUser] = lookupResult.NormDN cred, err := auth.GetNewCredentialsWithMetadata(claims, globalActiveCred.SecretKey) if err != nil { return nil, err } // Set the parent of the temporary access key, this is usefulCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.5K bytes - Click Count (0) -
apache-maven/src/main/appended-resources/licenses/EPL-1.0.txt
that Commercial Contributor then makes performance claims, or offers warranties related to Product X, those performance claims and warranties are such Commercial Contributor's responsibility alone. Under this section, the Commercial Contributor would have to defend claims against the other Contributors related to those performance claims and warranties, and if a court requires any other Contributor
Created: Sun Dec 28 03:35:09 GMT 2025 - Last Modified: Mon Sep 17 05:50:12 GMT 2018 - 11.1K bytes - Click Count (0)