Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 13 for s3sms (0.02 sec)

  1. internal/crypto/metadata.go

    //
    // IsEncrypted only checks whether the metadata contains at least
    // one entry indicating SSE-C or SSE-S3.
    func IsEncrypted(metadata map[string]string) (Type, bool) {
    	if S3KMS.IsEncrypted(metadata) {
    		return S3KMS, true
    	}
    	if S3.IsEncrypted(metadata) {
    		return S3, true
    	}
    	if SSEC.IsEncrypted(metadata) {
    		return SSEC, true
    	}
    	if IsMultiPart(metadata) {
    		return nil, true
    	}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  2. cmd/encryption-v1.go

    		return nil
    	case crypto.S3KMS:
    		if GlobalKMS == nil {
    			return errKMSNotConfigured
    		}
    		objectKey, err := crypto.S3KMS.UnsealObjectKey(GlobalKMS, metadata, bucket, object)
    		if err != nil {
    			return err
    		}
    
    		if len(cryptoCtx) == 0 {
    			_, _, _, cryptoCtx, err = crypto.S3KMS.ParseMetadata(metadata)
    			if err != nil {
    				return err
    			}
    		}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  3. internal/crypto/sse-kms.go

    	"github.com/minio/minio/internal/kms"
    	"github.com/minio/minio/internal/logger"
    )
    
    type ssekms struct{}
    
    var (
    	// S3KMS represents AWS SSE-KMS. It provides functionality to
    	// handle SSE-KMS requests.
    	S3KMS = ssekms{}
    
    	_ Type = S3KMS
    )
    
    // String returns the SSE domain as string. For SSE-KMS the
    // domain is "SSE-KMS".
    func (ssekms) String() string { return "SSE-KMS" }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  4. cmd/object-handlers.go

    	var objEncKey crypto.ObjectKey
    	sseCopyKMS := crypto.S3KMS.IsEncrypted(srcInfo.UserDefined)
    	sseCopyS3 := crypto.S3.IsEncrypted(srcInfo.UserDefined)
    	sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header)
    	sseC := crypto.SSEC.IsRequested(r.Header)
    	sseS3 := crypto.S3.IsRequested(r.Header)
    	sseKMS := crypto.S3KMS.IsRequested(r.Header)
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  5. cmd/s3-zip-handlers.go

    func (api objectAPIHandlers) getObjectInArchiveFileHandler(ctx context.Context, objectAPI ObjectLayer, bucket, object string, w http.ResponseWriter, r *http.Request) {
    	if crypto.S3.IsRequested(r.Header) || crypto.S3KMS.IsRequested(r.Header) { // If SSE-S3 or SSE-KMS present -> AWS fails with undefined error
    		writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL)
    		return
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 15:31:51 UTC 2024
    - 15.8K bytes
    - Viewed (0)
  6. cmd/api-response.go

    	m := cloneMSS(metadata)
    
    	switch kind, _ := crypto.IsEncrypted(metadata); kind {
    	case crypto.S3:
    		m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionAES
    	case crypto.S3KMS:
    		m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionKMS
    		m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata)
    		if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 19:27:06 UTC 2024
    - 33.4K bytes
    - Viewed (0)
  7. cmd/batch-rotate.go

    	srcBucket := r.Bucket
    	srcObject := objInfo.Name
    
    	if objInfo.DeleteMarker || !objInfo.VersionPurgeStatus.Empty() {
    		return nil
    	}
    	sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined)
    	sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined)
    	if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed
    		return errInvalidEncryptionParameters
    	}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Sep 18 17:59:03 UTC 2024
    - 14.7K bytes
    - Viewed (0)
  8. cmd/object-api-options.go

    	if err != nil {
    		return opts, fmt.Errorf("invalid/unknown checksum sent: %v", err)
    	}
    	etag := strings.TrimSpace(hdr.Get(xhttp.MinIOSourceETag))
    
    	if crypto.S3KMS.IsRequested(hdr) {
    		keyID, context, err := crypto.S3KMS.ParseHTTP(hdr)
    		if err != nil {
    			return ObjectOptions{}, err
    		}
    		sseKms, err := encrypt.NewSSEKMS(keyID, context)
    		if err != nil {
    			return ObjectOptions{}, err
    		}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 21 21:13:59 UTC 2024
    - 14.4K bytes
    - Viewed (0)
  9. cmd/object-multipart-handlers.go

    			writeErrorResponse(ctx, w, toAPIError(ctx, crypto.ErrIncompatibleEncryptionMethod), r.URL)
    			return
    		}
    
    		if crypto.SSEC.IsRequested(r.Header) && crypto.S3KMS.IsRequested(r.Header) {
    			writeErrorResponse(ctx, w, toAPIError(ctx, crypto.ErrIncompatibleEncryptionMethod), r.URL)
    			return
    		}
    
    		_, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  10. cmd/bucket-handlers.go

    		case crypto.SSEC:
    			key, err = ParseSSECustomerHeader(formValues)
    			if err != nil {
    				writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    				return
    			}
    		case crypto.S3KMS:
    			keyID, kmsCtx, err = crypto.S3KMS.ParseHTTP(formValues)
    			if err != nil {
    				writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    				return
    			}
    		}
    
    		if len(fanOutEntries) == 0 {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 12 12:24:04 UTC 2024
    - 63.4K bytes
    - Viewed (0)
Back to top