Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 15 for sse (0.07 sec)

  1. docs/site-replication/run-sse-kms-object-replication.sh

    # sleep for replication to complete
    sleep 30
    
    # Create bucket in source cluster
    echo "Create bucket in source MinIO instance"
    ./mc mb minio1/test-bucket --insecure
    
    # Enable SSE KMS for the bucket
    ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure
    
    # Load objects to source site
    echo "Loading objects to source MinIO instance"
    ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 10 06:49:55 UTC 2024
    - 11.5K bytes
    - Viewed (0)
  2. Makefile

    	@echo "Running tests for automatic site replication of SSE-C objects"
    	@(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket"
    	@(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh)
    	@echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Oct 31 22:10:24 UTC 2024
    - 11.1K bytes
    - Viewed (0)
  3. cmd/encryption-v1.go

    			return objInfo.ETag
    		}
    	}
    
    	// As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data.
    	// Since server side copy with same source and dest just replaces the ETag, we save
    	// encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag
    	// encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  4. cmd/batch-rotate.go

    )
    
    // keyrotate:
    //   apiVersion: v1
    //   bucket: BUCKET
    //   prefix: PREFIX
    //   encryption:
    //     type: sse-s3 # valid values are sse-s3 and sse-kms
    //     key: <new-kms-key> # valid only for sse-kms
    //     context: <new-kms-key-context> # valid only for sse-kms
    // # optional flags based filtering criteria
    // # for all objects
    // flags:
    //   filter:
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Sep 18 17:59:03 UTC 2024
    - 14.7K bytes
    - Viewed (0)
  5. cmd/object-multipart-handlers.go

    	// are slightly larger due to encryption overhead.
    	// Further, we have to adjust the ETags of parts when using SSE-S3.
    	// Due to AWS S3, SSE-S3 encrypted parts return the plaintext ETag
    	// being the content MD5 of that particular part. This is not the
    	// case for SSE-C and SSE-KMS objects.
    	if kind, ok := crypto.IsEncrypted(listPartsInfo.UserDefined); ok {
    		var objectEncryptionKey []byte
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
  6. internal/http/headers.go

    	AmzMetaUnencryptedContentLength = "X-Amz-Meta-X-Amz-Unencrypted-Content-Length"
    	AmzMetaUnencryptedContentMD5    = "X-Amz-Meta-X-Amz-Unencrypted-Content-Md5"
    
    	// AWS server-side encryption headers for SSE-S3, SSE-KMS and SSE-C.
    	AmzServerSideEncryption                      = "X-Amz-Server-Side-Encryption"
    	AmzServerSideEncryptionKmsID                 = AmzServerSideEncryption + "-Aws-Kms-Key-Id"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 28 15:31:56 UTC 2024
    - 10.4K bytes
    - Viewed (0)
  7. cmd/globals.go

    	GlobalKMS *kms.KMS
    
    	// Common lock for various subsystems performing the leader tasks
    	globalLeaderLock *sharedLock
    
    	// Auto-Encryption, if enabled, turns any non-SSE-C request
    	// into an SSE-S3 request. If enabled a valid, non-empty KMS
    	// configuration must be present.
    	globalAutoEncryption bool
    
    	// Is compression enabled?
    	globalCompressConfigMu sync.Mutex
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 03 18:23:41 UTC 2024
    - 16.2K bytes
    - Viewed (0)
  8. cmd/object-handlers.go

    			writeErrorResponse(ctx, w, toAPIError(ctx, err), r.URL)
    			return
    		}
    	}
    
    	// If src == dst and either
    	// - the object is encrypted using SSE-C and two different SSE-C keys are present
    	// - the object is encrypted using SSE-S3 and the SSE-S3 header is present
    	// - the object storage class is not changing
    	// then execute a key rotation.
    	if cpSrcDstSame && (sseCopyC && sseC) && !chStorageClass {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  9. docs/site-replication/run-ssec-object-replication-with-compression.sh

    #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then
    #	echo "BUG: Loading an SSE-C object to site with compression should fail. Succeeded though."
    #	exit_1
    #fi
    
    # Add replication site
    ./mc admin replicate add minio1 minio2 --insecure
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 24 08:03:58 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  10. cmd/bucket-handlers.go

    	clientETag, err := etag.FromContentMD5(formValues)
    	if err != nil {
    		writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrInvalidDigest), r.URL)
    		return
    	}
    
    	var forceMD5 []byte
    	// Optimization: If SSE-KMS and SSE-C did not request Content-Md5. Use uuid as etag. Optionally enable this also
    	// for server that is started with `--no-compat`.
    	kind, _ := crypto.IsRequested(formValues)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Sep 12 12:24:04 UTC 2024
    - 63.4K bytes
    - Viewed (0)
Back to top