- Sort Score
- Result 10 results
- Languages All
Results 1 - 4 of 4 for AuthenticateToken (0.25 sec)
-
pkg/serviceaccount/jwt_test.go
ctx := authenticator.WithAudiences(context.Background(), auds) if _, ok, err := authn.AuthenticateToken(ctx, "invalid token"); err != nil || ok { t.Errorf("%s: Expected err=nil, ok=false for non-JWT token", k) continue } resp, ok, err := authn.AuthenticateToken(ctx, tc.Token) if (err != nil) != tc.ExpectedErr { t.Errorf("%s: Expected error=%v, got %v", k, tc.ExpectedErr, err)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 17K bytes - Viewed (0) -
pkg/serviceaccount/jwt.go
// call. This struct should contain fields for any private claims that the // Validator requires to validate the JWT. NewPrivateClaims() interface{} } func (j *jwtTokenAuthenticator) AuthenticateToken(ctx context.Context, tokenData string) (*authenticator.Response, bool, error) { if !j.hasCorrectIssuer(tokenData) { return nil, false, nil } tok, err := jwt.ParseSigned(tokenData) if err != nil {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Feb 27 22:16:08 UTC 2024 - 10.7K bytes - Viewed (0) -
pkg/kubeapiserver/authenticator/config.go
tokenAuthenticators = append(tokenAuthenticators, authenticator.TokenFunc(func(ctx context.Context, token string) (*authenticator.Response, bool, error) { return jwtAuthenticatorPtr.Load().jwtAuthenticator.AuthenticateToken(ctx, token) }), ) } if len(config.WebhookTokenAuthnConfigFile) > 0 { webhookTokenAuth, err := newWebhookTokenAuthenticator(config) if err != nil { return nil, nil, nil, nil, err
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 09 19:29:33 UTC 2024 - 15.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/plugin/pkg/authenticator/token/oidc/oidc.go
} if v.audiences.HasAny(t.Audience...) { return nil } return fmt.Errorf("oidc: expected audience in %q got %q", sets.List(v.audiences), t.Audience) } func (a *jwtAuthenticator) AuthenticateToken(ctx context.Context, token string) (*authenticator.Response, bool, error) { if !hasCorrectIssuer(a.jwtAuthenticator.Issuer.URL, token) { return nil, false, nil } verifier, ok := a.idTokenVerifier()
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Sat Mar 09 19:29:33 UTC 2024 - 37.9K bytes - Viewed (0)