- Sort Score
- Result 10 results
- Languages All
Results 1 - 5 of 5 for become (0.24 sec)
-
cmd/erasure-object.go
// the content implicitly for all versions, we can // avoid triggering another MRF heal for offline drives. if len(versions) == 0 { // Whether a disk was initially or becomes offline // during this upload, send it to the MRF list. for i := range len(onlineDisks) { if onlineDisks[i] != nil && onlineDisks[i].IsOnline() { continue }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 80.4K bytes - Viewed (0) -
cmd/object-handlers.go
dstOpts.WantChecksum = hash.ChecksumFromBytes(srcChecksumDecrypted) // When an object is being copied from a source that is multipart, the destination will // no longer be multipart, and thus the checksum becomes full-object instead. Since // the CopyObject API does not require that the caller send us this final checksum, we need // to compute it server-side, with the same type as the source object.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 120.6K bytes - Viewed (0) -
cmd/erasure-multipart.go
Initiated: startTime, }) populatedUploadIDs.Add(uploadID) } sort.Slice(uploads, func(i int, j int) bool { return uploads[i].Initiated.Before(uploads[j].Initiated) }) uploadIndex := 0 if uploadIDMarker != "" { for uploadIndex < len(uploads) { if uploads[uploadIndex].UploadID != uploadIDMarker { uploadIndex++ continue }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 47.3K bytes - Viewed (0) -
cmd/object-api-interface.go
EvalRetentionBypassFn EvalRetentionBypassFn // only set for enforcing retention bypass on DeleteObject. FastGetObjInfo bool // Only for S3 Head/Get Object calls for now NoAuditLog bool // Only set for decom, rebalance, to avoid double audits. } // WalkOptions provides filtering, marker and other Walk() specific options. type WalkOptions struct {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 17.5K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
) // Multipart objectAPIHandlers // NewMultipartUploadHandler - New multipart upload. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Sep 07 16:13:09 UTC 2025 - 39.5K bytes - Viewed (0)