Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for getClaimsFromTokenWithSecret (0.68 sec)

  1. cmd/auth-handler.go

    func mustGetClaimsFromToken(r *http.Request) map[string]interface{} {
    	claims, _ := getClaimsFromToken(getSessionToken(r))
    	return claims
    }
    
    func getClaimsFromTokenWithSecret(token, secret string) (*xjwt.MapClaims, error) {
    	// JWT token for x-amz-security-token is signed with admin
    	// secret key, temporary credentials become invalid if
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 17 16:45:46 UTC 2024
    - 26.1K bytes
    - Viewed (0)
  2. cmd/iam-store.go

    			claims *jwt.MapClaims
    		)
    
    		if cred.IsServiceAccount() {
    			claims, err = getClaimsFromTokenWithSecret(cred.SessionToken, cred.SecretKey)
    		} else if cred.IsTemp() {
    			var secretKey string
    			secretKey, err = getTokenSigningKey()
    			if err != nil {
    				continue
    			}
    			claims, err = getClaimsFromTokenWithSecret(cred.SessionToken, secretKey)
    		}
    
    		if err != nil {
    			continue
    		}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Oct 14 16:35:37 UTC 2024
    - 83.2K bytes
    - Viewed (0)
  3. cmd/sts-handlers_test.go

    		}
    
    		// Retrieve the credential's claims.
    		secret, err := getTokenSigningKey()
    		if err != nil {
    			c.Fatalf("Error getting token signing key: %v", err)
    		}
    		claims, err := getClaimsFromTokenWithSecret(value.SessionToken, secret)
    		if err != nil {
    			c.Fatalf("Error getting claims from token: %v", err)
    		}
    
    		// Validate claims.
    		dnClaim := claims.MapClaims[ldapActualUser].(string)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 10 23:40:37 UTC 2024
    - 97.1K bytes
    - Viewed (0)
Back to top