Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 42 for SSE (0.27 sec)

  1. internal/crypto/sse-kms.go

    type ssekms struct{}
    
    var (
    	// S3KMS represents AWS SSE-KMS. It provides functionality to
    	// handle SSE-KMS requests.
    	S3KMS = ssekms{}
    
    	_ Type = S3KMS
    )
    
    // String returns the SSE domain as string. For SSE-KMS the
    // domain is "SSE-KMS".
    func (ssekms) String() string { return "SSE-KMS" }
    
    // IsRequested returns true if the HTTP headers contains
    // at least one SSE-KMS header.
    func (ssekms) IsRequested(h http.Header) bool {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 8.5K bytes
    - Viewed (0)
  2. internal/crypto/sse-s3.go

    	"github.com/minio/minio/internal/logger"
    )
    
    type sses3 struct{}
    
    var (
    	// S3 represents AWS SSE-S3. It provides functionality to handle
    	// SSE-S3 requests.
    	S3 = sses3{}
    
    	_ Type = S3
    )
    
    // String returns the SSE domain as string. For SSE-S3 the
    // domain is "SSE-S3".
    func (sses3) String() string { return "SSE-S3" }
    
    func (sses3) IsRequested(h http.Header) bool {
    	_, ok := h[xhttp.AmzServerSideEncryption]
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  3. docs/distributed/decom-encrypted-sse-s3.sh

    ./mc admin policy attach myminio/ rw --user=minio123
    ./mc admin policy attach myminio/ lake --user=minio12345
    
    ./mc mb -l myminio/versioned
    
    ./mc encrypt set sse-s3 myminio/versioned
    
    ./mc mirror internal myminio/versioned/ --quiet >/dev/null
    
    ## Soft delete (creates delete markers)
    ./mc rm -r --force myminio/versioned >/dev/null
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.5K bytes
    - Viewed (0)
  4. docs/site-replication/run-sse-kms-object-replication.sh

    # sleep for replication to complete
    sleep 30
    
    # Create bucket in source cluster
    echo "Create bucket in source MinIO instance"
    ./mc mb minio1/test-bucket --insecure
    
    # Enable SSE KMS for the bucket
    ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure
    
    # Load objects to source site
    echo "Loading objects to source MinIO instance"
    ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sat May 18 18:19:01 UTC 2024
    - 10.1K bytes
    - Viewed (0)
  5. docs/distributed/decom-compressed-sse-s3.sh

    Harshavardhana <******@****.***> 1716837466 -0700
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon May 27 19:17:46 UTC 2024
    - 4.3K bytes
    - Viewed (0)
  6. docs/iam/policies/deny-non-sse-kms-objects.json

    Shubhendu <******@****.***> 1715701387 +0530
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 14 15:43:07 UTC 2024
    - 413 bytes
    - Viewed (0)
  7. docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json

    Shubhendu <******@****.***> 1715701387 +0530
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 14 15:43:07 UTC 2024
    - 439 bytes
    - Viewed (0)
  8. docs/iam/policies/pbac-tests.sh

    ./mc admin policy create myminio/ deny-non-sse-kms-pol ./docs/iam/policies/deny-non-sse-kms-objects.json
    ./mc admin policy create myminio/ deny-invalid-sse-kms-pol ./docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json
    
    ./mc admin policy attach myminio deny-non-sse-kms-pol --user minio123
    ./mc admin policy attach myminio deny-invalid-sse-kms-pol --user minio123
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Sat May 18 18:19:01 UTC 2024
    - 2.5K bytes
    - Viewed (0)
  9. internal/crypto/auto-encryption.go

    	"github.com/minio/pkg/v3/env"
    )
    
    const (
    	// EnvKMSAutoEncryption is the environment variable used to en/disable
    	// SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled,
    	// requires a valid KMS configuration and turns any non-SSE-C
    	// request into an SSE-S3 request.
    	// If present EnvAutoEncryption must be either "on" or "off".
    	EnvKMSAutoEncryption = "MINIO_KMS_AUTO_ENCRYPTION"
    )
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 1.4K bytes
    - Viewed (0)
  10. internal/crypto/metadata.go

    	// MetaSealedKeySSEC is the sealed object encryption key in case of SSE-C.
    	MetaSealedKeySSEC = "X-Minio-Internal-Server-Side-Encryption-Sealed-Key"
    	// MetaSealedKeyS3 is the sealed object encryption key in case of SSE-S3
    	MetaSealedKeyS3 = "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key"
    	// MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS
    	MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key"
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
Back to top