- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for NewWithClaims (0.12 sec)
-
internal/jwt/parser_test.go
} func mapClaimsToken(claims *MapClaims) string { claims.SetAccessKey("test") j := jwt.NewWithClaims(jwt.SigningMethodHS512, claims) tk, _ := j.SignedString([]byte("HelloSecret")) return tk } func standardClaimsToken(claims *StandardClaims) string { claims.AccessKey = "test" claims.Subject = "test" j := jwt.NewWithClaims(jwt.SigningMethodHS512, claims) tk, _ := j.SignedString([]byte("HelloSecret")) return tk }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 6K bytes - Viewed (0) -
cmd/jwt_test.go
) func getTokenString(accessKey, secretKey string) (string, error) { claims := xjwt.NewMapClaims() claims.SetExpiry(UTCNow().Add(defaultJWTExpiry)) claims.SetAccessKey(accessKey) token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, claims) return token.SignedString([]byte(secretKey)) } // Tests web request authenticator. func TestWebRequestAuthenticate(t *testing.T) { ctx, cancel := context.WithCancel(t.Context())
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.4K bytes - Viewed (0) -
cmd/jwt.go
) func authenticateNode(accessKey, secretKey string) (string, error) { claims := xjwt.NewStandardClaims() claims.SetExpiry(UTCNow().Add(defaultInterNodeJWTExpiry)) claims.SetAccessKey(accessKey) jwt := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, claims) return jwt.SignedString([]byte(secretKey)) } // Check if the request is authenticated. // Returns nil if the request is authenticated. errNoAuthToken if token missing.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.5K bytes - Viewed (0) -
internal/config/identity/openid/jwt_test.go
claimsMap.SetAccessKey("test-access") if err := updateClaimsExpiry("3600", claimsMap.MapClaims); err != nil { t.Error(err) } // Build simple token with updated expiration claim token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS256, claimsMap) tokenString, err := token.SignedString(signKey) if err != nil { t.Error(err) } // Parse token to be sure it is valid
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8.2K bytes - Viewed (0) -
internal/config/dns/operator_dns.go
return nil } claims := &jwt.StandardClaims{ ExpiresAt: int64(15 * time.Minute), Issuer: c.username, Subject: config.EnvDNSWebhook, } token := jwt.NewWithClaims(jwt.SigningMethodHS512, claims) ss, err := token.SignedString([]byte(c.password)) if err != nil { return err } r.Header.Set("Authorization", "Bearer "+ss) return nil }Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Nov 11 14:51:43 UTC 2024 - 6.6K bytes - Viewed (0) -
internal/auth/credentials.go
} // JWTSignWithAccessKey - generates a session token. func JWTSignWithAccessKey(accessKey string, m map[string]any, tokenSecret string) (string, error) { m["accessKey"] = accessKey jwt := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, jwtgo.MapClaims(m)) return jwt.SignedString([]byte(tokenSecret)) } // ExtractClaims extracts JWT claims from a security token using a secret key
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 11.8K bytes - Viewed (0) -
cmd/server_test.go
s.testServer.Stop() } const ( defaultPrometheusJWTExpiry = 100 * 365 * 24 * time.Hour ) func (s *TestSuiteCommon) TestMetricsV3Handler(c *check) { jwt := jwtgo.NewWithClaims(jwtgo.SigningMethodHS512, jwtgo.StandardClaims{ ExpiresAt: time.Now().UTC().Add(defaultPrometheusJWTExpiry).Unix(), Subject: s.accessKey, Issuer: "prometheus", })
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 118.1K bytes - Viewed (0)