- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 34 for ENCRYPTION (0.17 sec)
-
cmd/encryption-v1.go
errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS") // Additional MinIO errors for SSE-C requests. errObjectTampered = errors.New("The requested object was modified and may be compromised") // error returned when invalid encryption parameters are specified errInvalidEncryptionParameters = errors.New("The encryption parameters are not applicable to this object")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 36.5K bytes - Viewed (0) -
cmd/batch-rotate.go
encMetadata[k] = v } } if (sseKMS || sseS3) && r.Encryption.Type == ssekms { if err = r.Encryption.Validate(); err != nil { return err } newKeyID = strings.TrimPrefix(r.Encryption.Key, crypto.ARNPrefix) newKeyContext = r.Encryption.kmsContext } if err = rotateKey(ctx, []byte{}, newKeyID, []byte{}, r.Bucket, oi.Name, encMetadata, newKeyContext); err != nil {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 14.2K bytes - Viewed (0) -
cmd/handler-utils.go
var validSSEReplicationHeaders = map[string]string{ "X-Minio-Internal-Server-Side-Encryption-Sealed-Key": "X-Minio-Replication-Server-Side-Encryption-Sealed-Key", "X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm", "X-Minio-Internal-Server-Side-Encryption-Iv": "X-Minio-Replication-Server-Side-Encryption-Iv",
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 15.5K bytes - Viewed (3) -
cmd/object-multipart-handlers.go
// NewMultipartUploadHandler - New multipart upload. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) NewMultipartUploadHandler(w http.ResponseWriter, r *http.Request) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 39K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
src_obj1_keyid=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id"') echo "Stat minio1/test-bucket/defpartsize" ./mc stat minio1/test-bucket/defpartsize --insecure --json stat_out2=$(./mc stat minio1/test-bucket/defpartsize --insecure --json) src_obj2_algo=$(echo "${stat_out2}" | jq '.metadata."X-Amz-Server-Side-Encryption"')
Shell Script - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 08:43:09 GMT 2024 - 10K bytes - Viewed (0) -
cmd/object-api-options.go
} // get ObjectOptions for Copy calls with encryption headers provided on the target side and source side metadata func copyDstOpts(ctx context.Context, r *http.Request, bucket, object string, metadata map[string]string) (opts ObjectOptions, err error) { return putOptsFromReq(ctx, r, bucket, object, metadata) } // get ObjectOptions for Copy calls with encryption headers provided on the source side
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Apr 20 09:05:54 GMT 2024 - 14.2K bytes - Viewed (0) -
cmd/bucket-lifecycle.go
type RestoreRequestType string const ( // SelectRestoreRequest specifies select request. This is the only valid value SelectRestoreRequest RestoreRequestType = "SELECT" ) // Encryption specifies encryption setting on restored bucket type Encryption struct { EncryptionType sse.Algorithm `xml:"EncryptionType"` KMSContext string `xml:"KMSContext,omitempty"` KMSKeyID string `xml:"KMSKeyId,omitempty"` }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Apr 17 05:09:58 GMT 2024 - 33.1K bytes - Viewed (0) -
internal/http/headers.go
AmzServerSideEncryptionCopyCustomerAlgorithm = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Algorithm" AmzServerSideEncryptionCopyCustomerKey = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key" AmzServerSideEncryptionCopyCustomerKeyMD5 = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5" AmzEncryptionAES = "AES256" AmzEncryptionKMS = "aws:kms"
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 10.4K bytes - Viewed (1) -
internal/etag/etag.go
// // For example: ceb8853ddc5086cc4ab9e149f8f09c88-5 // // However, this scheme is only used for multipart objects that are // not encrypted. // // # Server-side Encryption // // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Mar 10 21:09:36 GMT 2024 - 13.3K bytes - Viewed (0) -
cmd/api-router.go
Queries("lifecycle", "") // GetBucketEncryption router.Methods(http.MethodGet). HandlerFunc(s3APIMiddleware(api.GetBucketEncryptionHandler)). Queries("encryption", "") // GetBucketObjectLockConfig router.Methods(http.MethodGet). HandlerFunc(s3APIMiddleware(api.GetBucketObjectLockConfigHandler)). Queries("object-lock", "") // GetBucketReplicationConfig
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Mar 04 18:05:56 GMT 2024 - 22.8K bytes - Viewed (0)