- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 143 for ENCRYPTION (0.15 sec)
-
cmd/bucket-encryption.go
"io" sse "github.com/minio/minio/internal/bucket/encryption" ) // BucketSSEConfigSys - in-memory cache of bucket encryption config type BucketSSEConfigSys struct{} // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache func NewBucketSSEConfigSys() *BucketSSEConfigSys { return &BucketSSEConfigSys{} } // Get - gets bucket encryption config for the given bucket.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 1.7K bytes - Viewed (0) -
cmd/encryption-v1.go
errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS") // Additional MinIO errors for SSE-C requests. errObjectTampered = errors.New("The requested object was modified and may be compromised") // error returned when invalid encryption parameters are specified errInvalidEncryptionParameters = errors.New("The encryption parameters are not applicable to this object")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 36.5K bytes - Viewed (0) -
internal/crypto/auto-encryption.go
// SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off". EnvKMSAutoEncryption = "MINIO_KMS_AUTO_ENCRYPTION" ) // LookupAutoEncryption returns true if and only if // the MINIO_KMS_AUTO_ENCRYPTION env. variable is // set to "on".
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 04 19:57:37 GMT 2023 - 1.4K bytes - Viewed (0) -
cmd/bucket-encryption-handlers.go
"github.com/minio/minio/internal/logger" "github.com/minio/mux" "github.com/minio/pkg/v2/policy" ) const ( // Bucket Encryption configuration file name. bucketSSEConfig = "bucket-encryption.xml" ) // PutBucketEncryptionHandler - Stores given bucket encryption configuration // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 6.4K bytes - Viewed (0) -
cmd/encryption-v1_test.go
if opts.ServerSideEncryption == nil && test.encryptionType != "" { t.Errorf("Case %d: expected opts to be of %v encryption type", i, test.encryptionType) } if opts.ServerSideEncryption != nil && test.encryptionType != opts.ServerSideEncryption.Type() { t.Errorf("Case %d: expected opts to have encryption type %v but was %v ", i, test.encryptionType, opts.ServerSideEncryption.Type()) } } }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Sep 24 04:17:08 GMT 2022 - 19.9K bytes - Viewed (0) -
cmd/storage-datatypes_test.go
UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBixNj3PLWt78dFuUTyTLIdLG820J7XqLPBO4gpEEEWw/DoTs...
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 19 18:05:16 GMT 2022 - 9.4K bytes - Viewed (0) -
internal/crypto/header_test.go
"X-Amz-Server-Side-Encryption": []string{""}, "X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id": []string{""}, "X-Amz-Server-Side-Encryption-Context": []string{""}, }, Expected: true, }, // 4 { Header: http.Header{ "X-Amz-Server-Side-Encryption": []string{"AES256"}, "X-Amz-Server-Side-Encryption-Aws-Kms-Key-Id": []string{""}, }, Expected: true, }, // 5
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Jul 13 14:52:15 GMT 2022 - 21.4K bytes - Viewed (0) -
docs/kms/README.md
``` export MINIO_KMS_AUTO_ENCRYPTION=on ``` ### Verify auto-encryption > Note that auto-encryption only affects requests without S3 encryption headers. So, if a S3 client sends > e.g. SSE-C headers, MinIO will encrypt the object with the key sent by the client and won't reach out to > the configured KMS. To verify auto-encryption, use the following `mc` command: ```
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 7.1K bytes - Viewed (0) -
internal/crypto/metadata.go
// MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key" // MetaKeyID is the KMS master key ID used to generate/encrypt the data // encryption key (DEK). MetaKeyID = "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id" // MetaDataEncryptionKey is the sealed data encryption key (DEK) received from
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 6.2K bytes - Viewed (0) -
cmd/batch-rotate.go
encMetadata[k] = v } } if (sseKMS || sseS3) && r.Encryption.Type == ssekms { if err = r.Encryption.Validate(); err != nil { return err } newKeyID = strings.TrimPrefix(r.Encryption.Key, crypto.ARNPrefix) newKeyContext = r.Encryption.kmsContext } if err = rotateKey(ctx, []byte{}, newKeyID, []byte{}, r.Bucket, oi.Name, encMetadata, newKeyContext); err != nil {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 14.2K bytes - Viewed (0)