- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 138 for AWS (0.01 seconds)
-
docs/site-replication/run-replication-with-checksum-header.sh
export MINIO_ROOT_PASSWORD="minio123" # Download AWS CLI echo -n "Download and install AWS CLI" rm -rf /usr/local/aws-cli || sudo rm -rf /usr/local/aws-cli curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" unzip -qq awscliv2.zip ./aws/install || sudo ./aws/install echo "done" # Add credentials to ~/.aws/credentials if ! [ -d ~/.aws ]; then mkdir -p ~/.aws fi cat >~/.aws/credentials <<EOF [enterprise]
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Jan 20 14:49:07 GMT 2025 - 11.5K bytes - Click Count (0) -
internal/s3select/message.go
} const ( // Chosen for compatibility with AWS JAVA SDK // It has a buffer size of 128K: // https://github.com/aws/aws-sdk-java/blob/master/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/internal/eventstreaming/MessageDecoder.java#L26 // but we must make sure there is always space to add 256 bytes:
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Feb 18 16:25:55 GMT 2025 - 15.3K bytes - Click Count (0) -
internal/etag/etag.go
} // Format returns an ETag that is formatted as specified // by AWS S3. // // An AWS S3 ETag is 16 bytes long and, in case of a multipart // upload, has a `-N` suffix encoding the number of object parts. // An ETag is not AWS S3 compatible when encrypted. When sending // an ETag back to an S3 client it has to be formatted to be // AWS S3 compatible. // // Therefore, Format returns the last 16 bytes of an encrypted
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 16 14:27:42 GMT 2025 - 13.2K bytes - Click Count (0) -
cmd/signature-v2.go
"uploadId", "uploads", "versionId", "versioning", "versions", "website", } // Signature and API related constants. const ( signV2Algorithm = "AWS" ) // AWS S3 Signature V2 calculation rule is give here: // http://docs.aws.amazon.com/AmazonS3/latest/dev/RESTAuthentication.html#RESTAuthenticationStringToSign func doesPolicySignatureV2Match(formValues http.Header) (auth.Credentials, APIErrorCode) {
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 12.2K bytes - Click Count (0) -
docs/bucket/replication/README.md
## Highlights - Supports source and destination buckets to have the same name unlike AWS S3, addresses variety of use-cases such as *Splunk*, *Veeam* site to site DR. - Supports object locking/retention across source and destination buckets natively out of the box, unlike AWS S3.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 18.3K bytes - Click Count (0) -
cmd/auth-handler.go
} // Verify if request has AWS PreSign Version '4'. func isRequestPresignedSignatureV4(r *http.Request) bool { _, ok := r.Form[xhttp.AmzCredential] return ok } // Verify request has AWS PreSign Version '2'. func isRequestPresignedSignatureV2(r *http.Request) bool { _, ok := r.Form[xhttp.AmzAccessKeyID] return ok } // Verify if request has AWS Post policy Signature Version '4'.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 25.4K bytes - Click Count (0) -
docs/bigdata/README.md
- [https://hadoop.apache.org/docs/current/hadoop-aws/tools/hadoop-aws/index.html](https://hadoop.apache.org/docs/current/hadoop-aws/tools/hadoop-aws/index.html) - [https://hadoop.apache.org/docs/r3.1.1/hadoop-aws/tools/hadoop-aws/committers.html](https://hadoop.apache.org/docs/r3.1.1/hadoop-aws/tools/hadoop-aws/committers.html) Once the config changes are applied, proceed to restart **Hadoop** services.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 14.7K bytes - Click Count (0) -
internal/crypto/header_test.go
{Header: http.Header{"X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id": []string{"0839-9047947-844842874-481"}}, Expected: true}, // 2 {Header: http.Header{"X-Amz-Server-Side-Encryption-Context": []string{"7PpPLAK26ONlVUGOWlusfg=="}}, Expected: true}, // 3 { Header: http.Header{ "X-Amz-Server-Side-Encryption": []string{""}, "X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id": []string{""},Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Jul 13 14:52:15 GMT 2022 - 21.4K bytes - Click Count (0) -
cmd/signature-v4.go
// // You should have received a copy of the GNU Affero General Public License // along with this program. If not, see <http://www.gnu.org/licenses/>. // Package cmd This file implements helper functions to validate AWS // Signature Version '4' authorization header. // // This package provides comprehensive helpers for following signature // types. // - Based on Authorization header. // - Based on Query parameters.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Dec 13 22:19:12 GMT 2024 - 12.4K bytes - Click Count (0) -
cmd/sts-datatypes.go
// the operation returns. Please also see https://docs.aws.amazon.com/goto/WebAPI/sts-2011-06-15/AssumedRoleUser type AssumedRoleUser struct { // The ARN of the temporary security credentials that are returned from the // AssumeRole action. For more information about ARNs and how to use them in // policies, see IAM Identifiers (http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html) // in Using IAM. //Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 27 00:58:09 GMT 2022 - 9.9K bytes - Click Count (0)