- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 14 for Eclair (0.17 sec)
-
cmd/bucket-policy.go
vStr, ok := v.(string) if ok { // Trim any LDAP specific prefix args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr} } } // Add groups claim which could be a list. This will ensure that the claim // `jwt:groups` works. if grpsVal, ok := claims["groups"]; ok { if grpsIs, ok := grpsVal.([]interface{}); ok { grps := []string{} for _, gI := range grpsIs {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 8K bytes - Viewed (0) -
internal/config/constants.go
EnvRegion = "MINIO_REGION" // legacy EnvRegionName = "MINIO_REGION_NAME" // legacy ) // Expiration Token durations // These values are used to validate the expiration time range from // either the exp claim or MINI_STS_DURATION value const ( MinExpiration = 900 MaxExpiration = 31536000
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Jan 01 16:36:33 GMT 2024 - 3.4K bytes - Viewed (3) -
internal/config/identity/openid/jwt_test.go
claimsMap.SetAccessKey("test-access") if err := updateClaimsExpiry("3600", claimsMap.MapClaims); err != nil { t.Error(err) } // Build simple token with updated expiration claim token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS256, claimsMap) tokenString, err := token.SignedString(signKey) if err != nil { t.Error(err) } // Parse token to be sure it is valid
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.3K bytes - Viewed (0) -
cmd/site-replication.go
return fmt.Errorf("STS credential could not be verified: %w", err) } mapClaims := claims.Map() expiry, err := auth.ExpToInt64(mapClaims["exp"]) if err != nil { return fmt.Errorf("Expiry claim was not found: %v: %w", mapClaims, err) } cred := auth.Credentials{ AccessKey: stsCred.AccessKey, SecretKey: stsCred.SecretKey, Expiration: time.Unix(expiry, 0).UTC(),
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed May 01 01:09:56 GMT 2024 - 184.2K bytes - Viewed (1) -
internal/config/identity/openid/help.go
Optional: true, Type: "on|off", }, config.HelpKV{ Key: ClaimPrefix, Description: `[DEPRECATED use 'claim_name'] JWT claim namespace prefix e.g. "customer1/"` + defaultHelpPostfix(ClaimPrefix), Optional: true, Type: "string", }, config.HelpKV{ Key: RedirectURI,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Jun 23 14:45:27 GMT 2023 - 4.3K bytes - Viewed (0) -
cmd/iam-store.go
// or service credentials, mapped to all distinct roleARNs associated with the // parent user. The dummy role ARN is associated with parent users from // policy-claim based OpenID providers. func (store *IAMStoreSys) GetAllParentUsers() map[string]ParentUserInfo { cache := store.rlock() defer store.runlock() res := map[string]ParentUserInfo{}
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Apr 27 10:04:10 GMT 2024 - 75.2K bytes - Viewed (2) -
internal/config/identity/openid/openid.go
"github.com/minio/pkg/v2/policy" ) // OpenID keys and envs. const ( ClientID = "client_id" ClientSecret = "client_secret" ConfigURL = "config_url" ClaimName = "claim_name" ClaimUserinfo = "claim_userinfo" RolePolicy = "role_policy" DisplayName = "display_name" Scopes = "scopes" RedirectURI = "redirect_uri" RedirectURIDynamic = "redirect_uri_dynamic"
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 16.5K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
if !ok { return errors.New("STS JWT Token has `aud` claim invalid, `aud` must match configured OpenID Client ID") } if !audValues.Contains(pCfg.ClientID) { // if audience claims is missing, look for "azp" claims. // OPTIONAL. Authorized party - the party to which the ID // Token was issued. If present, it MUST contain the OAuth // 2.0 Client ID of this party. This Claim is only needed
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 8.3K bytes - Viewed (5) -
cmd/iam.go
} // Finally, if there is no parent policy, check if a policy claim is // present in the session token. if len(policies) == 0 { // If there is no parent policy mapping, we fall back to // using policy claim from JWT. policySet, ok := args.GetPolicies(iamPolicyClaimNameOpenID()) if !ok { // When claims are set, it should have a policy claim field. return false }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 21:28:16 GMT 2024 - 71.1K bytes - Viewed (1) -
cmd/sts-handlers_test.go
// the i-th server in this will be applied the i-th policy in `rolePolicies`. If // a rolePolicies entry is an empty string, that server will be configured as // policy-claim based openid server. NOTE that a valid configuration can have a // policy claim based provider only if it is the only OpenID provider. func (s *TestSuiteIAM) SetUpOpenIDs(c *check, testApps []OpenIDClientAppParams, rolePolicies []string) error {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 85.7K bytes - Viewed (0)