Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for checkClaimsFromToken (0.22 sec)

  1. cmd/jwt.go

    		u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey)
    		if !ok {
    			return nil, nil, false, errInvalidAccessKeyID
    		}
    		ucred := u.Credentials
    		// get embedded claims
    		eclaims, s3Err := checkClaimsFromToken(req, ucred)
    		if s3Err != ErrNone {
    			return nil, nil, false, errAuthentication
    		}
    
    		for k, v := range eclaims {
    			claims.MapClaims[k] = v
    		}
    
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Fri Apr 19 16:45:14 GMT 2024
    - 5.4K bytes
    - Viewed (0)
  2. cmd/signature-v4-utils.go

    			if u.Credentials.Status == auth.AccountOff {
    				return cred, false, ErrAccessKeyDisabled
    			}
    			return cred, false, ErrInvalidAccessKeyID
    		}
    		cred = u.Credentials
    	}
    
    	claims, s3Err := checkClaimsFromToken(r, cred)
    	if s3Err != ErrNone {
    		return cred, false, s3Err
    	}
    	cred.Claims = claims
    
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Wed Jan 31 18:56:45 GMT 2024
    - 9K bytes
    - Viewed (0)
  3. cmd/auth-handler.go

    	return getClaimsFromTokenWithSecret(token, globalActiveCred.SecretKey)
    }
    
    // Fetch claims in the security token returned by the client and validate the token.
    func checkClaimsFromToken(r *http.Request, cred auth.Credentials) (map[string]interface{}, APIErrorCode) {
    	token := getSessionToken(r)
    	if token != "" && cred.AccessKey == "" {
    		// x-amz-security-token is not allowed for anonymous access.
    Go
    - Registered: Sun Apr 28 19:28:10 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
Back to top