Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 321 for side (0.01 sec)

  1. cmd/storage-datatypes_test.go

    b6-4919140d53b3", XLV1: false, ModTime: UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBi...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 9.1K bytes
    - Viewed (0)
  2. docs/security/README.md

    - `X-Amz-Server-Side-Encryption-Customer-Key`: Base64 encoded new key.
    - `X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key`: Base64 encoded current key.
    
    Such a special COPY request is also known as S3 SSE-C key rotation.
    
    ### Server-Side Encryption with a KMS
    
    SSE-S3 allows an S3 client to en/decrypt an object at the MinIO server using a KMS. The MinIO
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Feb 26 09:25:50 UTC 2025
    - 13.8K bytes
    - Viewed (0)
  3. cmd/handler-utils.go

    var validSSEReplicationHeaders = map[string]string{
    	"X-Minio-Internal-Server-Side-Encryption-Sealed-Key":     "X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    	"X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    	"X-Minio-Internal-Server-Side-Encryption-Iv":             "X-Minio-Replication-Server-Side-Encryption-Iv",
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 16.3K bytes
    - Viewed (1)
  4. docs/bucket/replication/README.md

    bject-retention.html) enabled. Similarly objects encrypted on the server side, will be replicated if destination also supports encryption.
    
    Replication status can be seen in the metadata on the source and destination objects. On the source side, the `X-Amz-Replication-Status` changes from `PENDING` to `COMPLETED` or `FAILED` after replication attempt either succeeded or failed respectively. On the destination side, a `X-Amz-Replication-Status` status of `REPLICA` indicates that the object...
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 18.3K bytes
    - Viewed (0)
  5. .typos.toml

        "ZXJuZXQxDjAMBgNVBA-some-junk-Q4wDAYDVQQLEwVNaW5pbzEOMAwGA1UEAxMF",
        "eyJmb28iOiJiYXIifQ",
        "eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.*",
        "MIIDBTCCAe2gAwIBAgIQWHw7h.*",
        'http\.Header\{"X-Amz-Server-Side-Encryptio":',
        "ZoEoZdLlzVbOlT9rbhD7ZN7TLyiYXSAlB79uGEge",
        "ERRO:",
        "(?Rm)^.*(#|//)\\s*spellchecker:disable-line$", # ignore line
    ]
    
    [default.extend-words]
    "encrypter" = "encrypter"
    "kms" = "kms"
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Apr 03 06:45:06 UTC 2025
    - 1.2K bytes
    - Viewed (0)
  6. cmd/api-errors.go

    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrIncompatibleEncryptionMethod: {
    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with Customer provided key is incompatible with the encryption method specified",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrInvalidEncryptionKeyID: {
    		Code:           "InvalidRequest",
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 16 07:34:24 UTC 2025
    - 93K bytes
    - Viewed (3)
  7. docs/site-replication/README.md

    - For [SSE-S3 or SSE-KMS encryption via KMS](https://docs.min.io/community/minio-object-store/operations/server-side-encryption.html "MinIO KMS Guide"), all sites **must**  have access to a central KMS deployment. This can be achieved via a central KES server or multiple KES servers (say one per site) connected via a central KMS (Vault) server.
    
    ## Configuring Site Replication
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 3.4K bytes
    - Viewed (0)
  8. cmd/object-multipart-handlers.go

    			return
    		}
    
    		_, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
    		ssecRepHeaders := []string{
    			"X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    			"X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    			"X-Minio-Replication-Server-Side-Encryption-Iv",
    		}
    		ssecRep := false
    		for _, header := range ssecRepHeaders {
    			if val := r.Header.Get(header); val != "" {
    				ssecRep = true
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Sep 07 16:13:09 UTC 2025
    - 39.5K bytes
    - Viewed (0)
  9. cmd/signature-v4-utils_test.go

    	signedHeaders = append(signedHeaders, "x-amz-server-side-encryption")
    	// expect to fail with `ErrUnsignedHeaders` because couldn't find some header
    	_, errCode = extractSignedHeaders(signedHeaders, r)
    	if errCode != ErrUnsignedHeaders {
    		t.Fatalf("Expected the APIErrorCode to %d, but got %d", ErrUnsignedHeaders, errCode)
    	}
    	// set headers value through Get parameter
    	inputQuery.Add("x-amz-server-side-encryption", xhttp.AmzEncryptionAES)
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  10. docs/select/README.md

    - Parquet API supports columnar compression for  using GZIP, Snappy, LZ4. Whole object compression is not supported for Parquet objects.
    - Server-side encryption - The Select API supports querying objects that are protected with server-side encryption.
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Aug 12 18:20:36 UTC 2025
    - 6.6K bytes
    - Viewed (0)
Back to top