Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 23 for TLS (0.01 sec)

  1. docs/en/docs/deployment/https.md

    ### TLS with SNI Extension { #tls-with-sni-extension }
    
    **Only one process** in the server can be listening on a specific **port** in a specific **IP address**. There could be other processes listening on other ports in the same IP address, but only one for each combination of IP address and port.
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 19:34:08 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  2. cmd/ftp-server.go

    		}
    	}
    
    	// If no TLS certs were provided, server is running in TLS for S3 API
    	// we automatically make FTP also run under TLS mode.
    	if globalIsTLS && tlsPrivateKey == "" && tlsPublicCert == "" {
    		tlsPrivateKey = getPrivateKeyFile()
    		tlsPublicCert = getPublicCertFile()
    	}
    
    	tls := tlsPrivateKey != "" && tlsPublicCert != ""
    
    	if forceTLS && !tls {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 5.2K bytes
    - Viewed (0)
  3. cmd/api-response_test.go

    			}
    		})
    	}
    }
    
    // Tests getURLScheme function behavior.
    func TestGetURLScheme(t *testing.T) {
    	tls := false
    	gotScheme := getURLScheme(tls)
    	if gotScheme != httpScheme {
    		t.Errorf("Expected %s, got %s", httpScheme, gotScheme)
    	}
    	tls = true
    	gotScheme = getURLScheme(tls)
    	if gotScheme != httpsScheme {
    		t.Errorf("Expected %s, got %s", httpsScheme, gotScheme)
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 3.5K bytes
    - Viewed (0)
  4. cmd/common-main.go

    	consoleapi.Port = globalMinioConsolePort
    	consoleapi.Hostname = globalMinioConsoleHost
    
    	if globalIsTLS {
    		// If TLS certificates are provided enforce the HTTPS.
    		server.EnabledListeners = []string{"https"}
    		server.TLSPort = consolePort
    		// Need to store tls-port, tls-host un config variables so secure.middleware can read from there
    		consoleapi.TLSPort = globalMinioConsolePort
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 32.5K bytes
    - Viewed (3)
  5. cmd/config-current.go

    		if err != nil {
    			configLogIf(ctx, fmt.Errorf("Unable to load audit kafka config: %w", err))
    		}
    		for n, l := range loggerCfg.AuditKafka {
    			if l.Enabled {
    				if l.TLS.Enable {
    					l.TLS.RootCAs = globalRootCAs
    				}
    				l.LogOnce = configLogOnceIf
    				loggerCfg.AuditKafka[n] = l
    			}
    		}
    		if errs := logger.UpdateAuditKafkaTargets(ctx, loggerCfg); len(errs) > 0 {
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 28.5K bytes
    - Viewed (0)
  6. cmd/sts-handlers.go

    		return
    	}
    
    	// We have to establish a TLS connection and the
    	// client must provide exactly one client certificate.
    	// Otherwise, we don't have a certificate to verify or
    	// the policy lookup would ambiguous.
    	if r.TLS == nil {
    		writeSTSErrorResponse(ctx, w, ErrSTSInsecureConnection, errors.New("No TLS connection attempt"))
    		return
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 36.6K bytes
    - Viewed (0)
  7. cmd/utils.go

    }
    
    func newTLSConfig(getCert certs.GetCertificateFunc) *tls.Config {
    	if getCert == nil {
    		return nil
    	}
    
    	tlsConfig := &tls.Config{
    		PreferServerCipherSuites: true,
    		MinVersion:               tls.VersionTLS12,
    		NextProtos:               []string{"http/1.1", "h2"},
    		GetCertificate:           getCert,
    		ClientSessionCache:       tls.NewLRUClientSessionCache(tlsClientSessionCacheSize),
    	}
    
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 33K bytes
    - Viewed (0)
  8. docs/en/docs/deployment/docker.md

    ```
    .
    ├── app
    │   ├── __init__.py
    │   └── main.py
    ├── Dockerfile
    └── requirements.txt
    ```
    
    #### Behind a TLS Termination Proxy { #behind-a-tls-termination-proxy }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 29.5K bytes
    - Viewed (1)
  9. cmd/test-utils_test.go

    	// Fetch TLS key and pem files from test-data/ directory.
    	//	dir, _ := os.Getwd()
    	//	testDataDir := filepath.Join(filepath.Dir(dir), "test-data")
    	//
    	//	pemFile := filepath.Join(testDataDir, "server.pem")
    	//	keyFile := filepath.Join(testDataDir, "server.key")
    	cer, err := tls.X509KeyPair(cert, key)
    	if err != nil {
    		t.Fatalf("Failed to load certificate: %v", err)
    	}
    	config := &tls.Config{Certificates: []tls.Certificate{cer}}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 77K bytes
    - Viewed (0)
  10. docs/en/docs/deployment/concepts.md

    We also saw that HTTPS is normally provided by a component **external** to your application server, a **TLS Termination Proxy**.
    
    And there has to be something in charge of **renewing the HTTPS certificates**, it could be the same component or it could be something different.
    
    ### Example Tools for HTTPS { #example-tools-for-https }
    
    Some of the tools you could use as a TLS Termination Proxy are:
    
    * Traefik
        * Automatically handles certificates renewals ✨
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 09:15:41 UTC 2025
    - 18.6K bytes
    - Viewed (1)
Back to top