Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for checkClaimsFromToken (0.07 sec)

  1. cmd/jwt.go

    		u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey)
    		if !ok {
    			return nil, nil, false, errInvalidAccessKeyID
    		}
    		ucred := u.Credentials
    		// get embedded claims
    		eclaims, s3Err := checkClaimsFromToken(req, ucred)
    		if s3Err != ErrNone {
    			return nil, nil, false, errAuthentication
    		}
    
    		maps.Copy(claims.MapClaims, eclaims)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  2. cmd/auth-handler.go

    	if err != nil {
    		return nil, err
    	}
    	return jwtClaims.Map(), nil
    }
    
    // Fetch claims in the security token returned by the client and validate the token.
    func checkClaimsFromToken(r *http.Request, cred auth.Credentials) (map[string]any, APIErrorCode) {
    	token := getSessionToken(r)
    	if token != "" && cred.AccessKey == "" {
    		// x-amz-security-token is not allowed for anonymous access.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
Back to top