- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 66 for Encryption (0.09 sec)
-
internal/crypto/auto-encryption.go
package crypto import ( "github.com/minio/minio/internal/config" "github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off".
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 1.4K bytes - Viewed (0) -
cmd/bucket-encryption.go
"io" sse "github.com/minio/minio/internal/bucket/encryption" ) // BucketSSEConfigSys - in-memory cache of bucket encryption config type BucketSSEConfigSys struct{} // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache func NewBucketSSEConfigSys() *BucketSSEConfigSys { return &BucketSSEConfigSys{} } // Get - gets bucket encryption config for the given bucket.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 1.7K bytes - Viewed (0) -
cmd/bucket-encryption-handlers.go
"github.com/minio/minio/internal/logger" "github.com/minio/mux" "github.com/minio/pkg/v3/policy" ) const ( // Bucket Encryption configuration file name. bucketSSEConfig = "bucket-encryption.xml" ) // PutBucketEncryptionHandler - Stores given bucket encryption configuration // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6.4K bytes - Viewed (0) -
internal/crypto/metadata.go
// MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key" // MetaKeyID is the KMS master key ID used to generate/encrypt the data // encryption key (DEK). MetaKeyID = "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id" // MetaDataEncryptionKey is the sealed data encryption key (DEK) received from
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 17:40:33 UTC 2024 - 6.4K bytes - Viewed (0) -
internal/config/crypto.go
if err != nil { return nil, err } return io.ReadAll(ciphertext) } // DecryptBytes decrypts the ciphertext using a key managed by the KMS. // The same context that have been used during encryption must be // provided. func DecryptBytes(k *kms.KMS, ciphertext []byte, context kms.Context) ([]byte, error) { plaintext, err := Decrypt(k, bytes.NewReader(ciphertext), context) if err != nil { return nil, err }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 5K bytes - Viewed (0) -
internal/crypto/sse_test.go
"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"}, "X-Amz-Server-Side-Encryption-Customer-Key": []string{"MzJieXRlc2xvbmdzZWNyZXRrZXltdXN0cHJvdmlkZWQ="}, "X-Amz-Server-Side-Encryption-Customer-Key-Md5": []string{"7PpPLAK26ONlVUGOWlusfg=="}, }, Bucket: "bucket", Object: "object2", Metadata: map[string]string{
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jun 01 21:59:40 UTC 2021 - 8.4K bytes - Viewed (0) -
docs/distributed/decom-encrypted-sse-s3.sh
ret=$? if [ $ret -ne 0 ]; then echo "expected versioning enabled after expansion" exit 1 fi ./mc encrypt info myminio/versioned | grep -q "Auto encryption 'sse-s3' is enabled" ret=$? if [ $ret -ne 0 ]; then echo "expected encryption enabled after expansion" exit 1 fi ./mc mirror cmd myminio/versioned/ --quiet >/dev/null ./mc ls -r myminio/versioned/ >expanded_ns.txt
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 27 19:17:46 UTC 2024 - 4.5K bytes - Viewed (0) -
cmd/storage-datatypes_test.go
UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBixNj3PLWt78dFuUTyTLIdLG820J7XqLPBO4gpEEEWw/DoTs...
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Sep 19 18:05:16 UTC 2022 - 9.4K bytes - Viewed (0) -
internal/crypto/doc.go
// for implementing Server-Side-Encryption (SSE-S3) and Server-Side-Encryption // with customer provided keys (SSE-C). // // All objects are encrypted with an unique and randomly generated 'ObjectKey'. // The ObjectKey itself is never stored in plaintext. Instead it is only stored // in a sealed from. The sealed 'ObjectKey' is created by encrypting the 'ObjectKey' // with an unique key-encryption-key. Given the correct key-encryption-key the
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Aug 26 19:52:29 UTC 2022 - 5K bytes - Viewed (0) -
docs/site-replication/README.md
- **Removing a site** is not allowed from a set of replicated sites once configured. - All sites must be using the **same** external IDP(s) if any.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Feb 26 21:30:28 UTC 2024 - 3.4K bytes - Viewed (0)