Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for checkClaimsFromToken (0.08 sec)

  1. cmd/jwt.go

    		u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey)
    		if !ok {
    			return nil, nil, false, errInvalidAccessKeyID
    		}
    		ucred := u.Credentials
    		// get embedded claims
    		eclaims, s3Err := checkClaimsFromToken(req, ucred)
    		if s3Err != ErrNone {
    			return nil, nil, false, errAuthentication
    		}
    
    		maps.Copy(claims.MapClaims, eclaims)
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 4.5K bytes
    - Viewed (0)
  2. cmd/signature-v4-utils.go

    			if u.Credentials.Status == auth.AccountOff {
    				return cred, false, ErrAccessKeyDisabled
    			}
    			return cred, false, ErrInvalidAccessKeyID
    		}
    		cred = u.Credentials
    	}
    
    	claims, s3Err := checkClaimsFromToken(r, cred)
    	if s3Err != ErrNone {
    		return cred, false, s3Err
    	}
    	cred.Claims = claims
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Mon Nov 25 17:10:22 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  3. cmd/auth-handler.go

    	if err != nil {
    		return nil, err
    	}
    	return jwtClaims.Map(), nil
    }
    
    // Fetch claims in the security token returned by the client and validate the token.
    func checkClaimsFromToken(r *http.Request, cred auth.Credentials) (map[string]any, APIErrorCode) {
    	token := getSessionToken(r)
    	if token != "" && cred.AccessKey == "" {
    		// x-amz-security-token is not allowed for anonymous access.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 25.4K bytes
    - Viewed (0)
Back to top