- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 23 for TLS (0.01 sec)
-
docs/en/docs/deployment/https.md
### TLS with SNI Extension { #tls-with-sni-extension } **Only one process** in the server can be listening on a specific **port** in a specific **IP address**. There could be other processes listening on other ports in the same IP address, but only one for each combination of IP address and port.Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 19:34:08 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/ftp-server.go
} } // If no TLS certs were provided, server is running in TLS for S3 API // we automatically make FTP also run under TLS mode. if globalIsTLS && tlsPrivateKey == "" && tlsPublicCert == "" { tlsPrivateKey = getPrivateKeyFile() tlsPublicCert = getPublicCertFile() } tls := tlsPrivateKey != "" && tlsPublicCert != "" if forceTLS && !tls {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.2K bytes - Viewed (0) -
cmd/api-response_test.go
} }) } } // Tests getURLScheme function behavior. func TestGetURLScheme(t *testing.T) { tls := false gotScheme := getURLScheme(tls) if gotScheme != httpScheme { t.Errorf("Expected %s, got %s", httpScheme, gotScheme) } tls = true gotScheme = getURLScheme(tls) if gotScheme != httpsScheme { t.Errorf("Expected %s, got %s", httpsScheme, gotScheme) }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 3.5K bytes - Viewed (0) -
cmd/common-main.go
consoleapi.Port = globalMinioConsolePort consoleapi.Hostname = globalMinioConsoleHost if globalIsTLS { // If TLS certificates are provided enforce the HTTPS. server.EnabledListeners = []string{"https"} server.TLSPort = consolePort // Need to store tls-port, tls-host un config variables so secure.middleware can read from there consoleapi.TLSPort = globalMinioConsolePortRegistered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 32.5K bytes - Viewed (3) -
cmd/config-current.go
if err != nil { configLogIf(ctx, fmt.Errorf("Unable to load audit kafka config: %w", err)) } for n, l := range loggerCfg.AuditKafka { if l.Enabled { if l.TLS.Enable { l.TLS.RootCAs = globalRootCAs } l.LogOnce = configLogOnceIf loggerCfg.AuditKafka[n] = l } } if errs := logger.UpdateAuditKafkaTargets(ctx, loggerCfg); len(errs) > 0 {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 28.5K bytes - Viewed (0) -
cmd/sts-handlers.go
return } // We have to establish a TLS connection and the // client must provide exactly one client certificate. // Otherwise, we don't have a certificate to verify or // the policy lookup would ambiguous. if r.TLS == nil { writeSTSErrorResponse(ctx, w, ErrSTSInsecureConnection, errors.New("No TLS connection attempt")) return }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 36.6K bytes - Viewed (0) -
cmd/utils.go
} func newTLSConfig(getCert certs.GetCertificateFunc) *tls.Config { if getCert == nil { return nil } tlsConfig := &tls.Config{ PreferServerCipherSuites: true, MinVersion: tls.VersionTLS12, NextProtos: []string{"http/1.1", "h2"}, GetCertificate: getCert, ClientSessionCache: tls.NewLRUClientSessionCache(tlsClientSessionCacheSize), }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 33K bytes - Viewed (0) -
docs/en/docs/deployment/docker.md
``` . ├── app │ ├── __init__.py │ └── main.py ├── Dockerfile └── requirements.txt ``` #### Behind a TLS Termination Proxy { #behind-a-tls-termination-proxy }Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 29.5K bytes - Viewed (1) -
cmd/test-utils_test.go
// Fetch TLS key and pem files from test-data/ directory. // dir, _ := os.Getwd() // testDataDir := filepath.Join(filepath.Dir(dir), "test-data") // // pemFile := filepath.Join(testDataDir, "server.pem") // keyFile := filepath.Join(testDataDir, "server.key") cer, err := tls.X509KeyPair(cert, key) if err != nil { t.Fatalf("Failed to load certificate: %v", err) } config := &tls.Config{Certificates: []tls.Certificate{cer}}
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 77K bytes - Viewed (0) -
docs/en/docs/deployment/concepts.md
We also saw that HTTPS is normally provided by a component **external** to your application server, a **TLS Termination Proxy**. And there has to be something in charge of **renewing the HTTPS certificates**, it could be the same component or it could be something different. ### Example Tools for HTTPS { #example-tools-for-https } Some of the tools you could use as a TLS Termination Proxy are: * Traefik * Automatically handles certificates renewals ✨Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 09:15:41 UTC 2025 - 18.6K bytes - Viewed (1)