- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 18 for eclair (0.18 sec)
-
cmd/sts-handlers.go
// JWT claim keys expClaim = "exp" subClaim = "sub" audClaim = "aud" issClaim = "iss" // JWT claim to check the parent user parentClaim = "parent" // LDAP claim keys ldapUser = "ldapUser" // this is a key name for a DN value ldapUserN = "ldapUsername" // this is a key name for the short/login username // Role Claim key roleArnClaim = "roleArn" )
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 04 18:36:18 GMT 2024 - 34.7K bytes - Viewed (2) -
cmd/local-locker.go
defer l.mutex.Unlock() if !l.canTakeLock(args.Resources...) { // Not all locks can be taken on resources, // reject it completely. return false, nil } // No locks held on the all resources, so claim write // lock on all resources at once. for i, resource := range args.Resources { l.lockMap[resource] = []lockRequesterInfo{ { Name: resource, Writer: true,
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Feb 19 22:54:46 GMT 2024 - 10.6K bytes - Viewed (0) -
cmd/jwt.go
if !ok { return nil, nil, false, errInvalidAccessKeyID } ucred := u.Credentials // get embedded claims eclaims, s3Err := checkClaimsFromToken(req, ucred) if s3Err != ErrNone { return nil, nil, false, errAuthentication } for k, v := range eclaims { claims.MapClaims[k] = v } // if root access is disabled, disable all its service accounts and temporary credentials.
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Apr 19 16:45:14 GMT 2024 - 5.4K bytes - Viewed (0) -
cmd/bucket-policy.go
vStr, ok := v.(string) if ok { // Trim any LDAP specific prefix args[strings.ToLower(strings.TrimPrefix(k, "ldap"))] = []string{vStr} } } // Add groups claim which could be a list. This will ensure that the claim // `jwt:groups` works. if grpsVal, ok := claims["groups"]; ok { if grpsIs, ok := grpsVal.([]interface{}); ok { grps := []string{} for _, gI := range grpsIs {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 8K bytes - Viewed (0) -
internal/config/constants.go
EnvRegion = "MINIO_REGION" // legacy EnvRegionName = "MINIO_REGION_NAME" // legacy ) // Expiration Token durations // These values are used to validate the expiration time range from // either the exp claim or MINI_STS_DURATION value const ( MinExpiration = 900 MaxExpiration = 31536000
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Jan 01 16:36:33 GMT 2024 - 3.4K bytes - Viewed (3) -
internal/config/identity/openid/jwt_test.go
claimsMap.SetAccessKey("test-access") if err := updateClaimsExpiry("3600", claimsMap.MapClaims); err != nil { t.Error(err) } // Build simple token with updated expiration claim token := jwtgo.NewWithClaims(jwtgo.SigningMethodHS256, claimsMap) tokenString, err := token.SignedString(signKey) if err != nil { t.Error(err) } // Parse token to be sure it is valid
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.3K bytes - Viewed (0) -
internal/auth/credentials.go
DefaultSecretKey = "minioadmin" ) // Default access credentials var ( DefaultCredentials = Credentials{ AccessKey: DefaultAccessKey, SecretKey: DefaultSecretKey, } ) // claim key found in credentials which are service accounts const iamPolicyClaimNameSA = "sa-policy" const ( // AccountOn indicates that credentials are enabled AccountOn = "on"
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 11.4K bytes - Viewed (0) -
cmd/site-replication.go
return fmt.Errorf("STS credential could not be verified: %w", err) } mapClaims := claims.Map() expiry, err := auth.ExpToInt64(mapClaims["exp"]) if err != nil { return fmt.Errorf("Expiry claim was not found: %v: %w", mapClaims, err) } cred := auth.Credentials{ AccessKey: stsCred.AccessKey, SecretKey: stsCred.SecretKey, Expiration: time.Unix(expiry, 0).UTC(),
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 25 15:50:16 GMT 2024 - 184.1K bytes - Viewed (1) -
internal/config/identity/openid/openid.go
"github.com/minio/pkg/v2/policy" ) // OpenID keys and envs. const ( ClientID = "client_id" ClientSecret = "client_secret" ConfigURL = "config_url" ClaimName = "claim_name" ClaimUserinfo = "claim_userinfo" RolePolicy = "role_policy" DisplayName = "display_name" Scopes = "scopes" RedirectURI = "redirect_uri" RedirectURIDynamic = "redirect_uri_dynamic"
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 16.5K bytes - Viewed (0) -
internal/config/identity/openid/jwt.go
if !ok { return errors.New("STS JWT Token has `aud` claim invalid, `aud` must match configured OpenID Client ID") } if !audValues.Contains(pCfg.ClientID) { // if audience claims is missing, look for "azp" claims. // OPTIONAL. Authorized party - the party to which the ID // Token was issued. If present, it MUST contain the OAuth // 2.0 Client ID of this party. This Claim is only needed
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Nov 16 04:42:31 GMT 2023 - 8.3K bytes - Viewed (5)