Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for Changes (0.37 sec)

  1. cmd/erasure-object.go

    	}
    
    	kind, encrypted := crypto.IsEncrypted(userDefined)
    	actualSize := data.ActualSize()
    	if actualSize < 0 {
    		compressed := fi.IsCompressed()
    		switch {
    		case compressed:
    			// ... nothing changes for compressed stream.
    			// if actualSize is -1 we have no known way to
    			// determine what is the actualSize.
    		case encrypted:
    			decSize, err := sio.DecryptedSize(uint64(n))
    			if err == nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 80.4K bytes
    - Viewed (0)
  2. cmd/erasure-multipart.go

    	}
    
    	actualSize := data.ActualSize()
    	if actualSize < 0 {
    		_, encrypted := crypto.IsEncrypted(fi.Metadata)
    		compressed := fi.IsCompressed()
    		switch {
    		case compressed:
    			// ... nothing changes for compressed stream.
    			// if actualSize is -1 we have no known way to
    			// determine what is the actualSize.
    		case encrypted:
    			decSize, err := sio.DecryptedSize(uint64(n))
    			if err == nil {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 47.3K bytes
    - Viewed (0)
  3. cmd/object-handlers.go

    	// We have to copy metadata only if source and destination are same.
    	// this changes for encryption which can be observed below.
    	if cpSrcDstSame {
    		srcInfo.metadataOnly = true
    	}
    
    	var chStorageClass bool
    	if dstSc != "" && dstSc != srcInfo.StorageClass {
    		chStorageClass = true
    		srcInfo.metadataOnly = false
    	} // no changes in storage-class expected so its a metadataonly operation.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 120.6K bytes
    - Viewed (0)
  4. cmd/object-multipart-handlers.go

    	// object also has an ETag that is the MD5 of its part ETags.
    	// The fact the in case of encryption the ETag of a part is
    	// not the MD5 of the part content does not change that.
    	var completeETags []etag.ETag
    	for _, part := range complMultipartUpload.Parts {
    		ETag, err := etag.Parse(part.ETag)
    		if err != nil {
    			continue
    		}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
Back to top