- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for checkClaimsFromToken (0.08 sec)
-
cmd/jwt.go
u, ok := globalIAMSys.GetUser(req.Context(), claims.AccessKey) if !ok { return nil, nil, false, errInvalidAccessKeyID } ucred := u.Credentials // get embedded claims eclaims, s3Err := checkClaimsFromToken(req, ucred) if s3Err != ErrNone { return nil, nil, false, errAuthentication } maps.Copy(claims.MapClaims, eclaims)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.5K bytes - Viewed (0) -
cmd/signature-v4-utils.go
if u.Credentials.Status == auth.AccountOff { return cred, false, ErrAccessKeyDisabled } return cred, false, ErrInvalidAccessKeyID } cred = u.Credentials } claims, s3Err := checkClaimsFromToken(r, cred) if s3Err != ErrNone { return cred, false, s3Err } cred.Claims = claims
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Nov 25 17:10:22 UTC 2024 - 9.1K bytes - Viewed (0) -
cmd/auth-handler.go
if err != nil { return nil, err } return jwtClaims.Map(), nil } // Fetch claims in the security token returned by the client and validate the token. func checkClaimsFromToken(r *http.Request, cred auth.Credentials) (map[string]any, APIErrorCode) { token := getSessionToken(r) if token != "" && cred.AccessKey == "" { // x-amz-security-token is not allowed for anonymous access.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 25.4K bytes - Viewed (0)