- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 148 for ssec (0.02 sec)
-
docs/site-replication/run-ssec-object-replication.sh
exit_1 fi repcount4=$(./mc ls minio2/test-bucket/custpartsize --insecure | wc -l) if [ "${repcount4}" -ne 1 ]; then echo "BUG: object test-bucket/custpartsize not replicated" exit_1 fi # Stat the SSEC objects from source site echo "Stat minio1/test-bucket/encrypted" ./mc stat --no-list minio1/test-bucket/encrypted --enc-c "minio1/test-bucket/encrypted=${TEST_MINIO_ENC_KEY}" --insecure --json
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 9.9K bytes - Viewed (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
# Below should fail as compression and SSEC used at the same time # DISABLED: We must check the response header to see if compression was actually applied #RESULT=$({ ./mc put /tmp/data/mpartobj.txt minio1/test-bucket/mpartobj.txt --enc-c "minio1/test-bucket/mpartobj.txt=${TEST_MINIO_ENC_KEY}" --insecure; } 2>&1) #if [[ ${RESULT} != *"Server side encryption specified with SSE-C with compression not allowed"* ]]; then
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Sep 24 08:03:58 UTC 2024 - 8.3K bytes - Viewed (0) -
cmd/encryption-v1.go
return objInfo.ETag } } // As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data. // Since server side copy with same source and dest just replaces the ETag, we save // encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag // encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
var objectEncryptionKey crypto.ObjectKey if isEncrypted { if !crypto.SSEC.IsRequested(r.Header) && crypto.SSEC.IsEncrypted(mi.UserDefined) { writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL) return } if crypto.S3.IsEncrypted(mi.UserDefined) && crypto.SSEC.IsRequested(r.Header) { writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrSSEMultipartEncrypted), r.URL)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0) -
Makefile
@echo "Running tests for automatic site replication of SSE-C objects" @(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket" @(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 11.1K bytes - Viewed (0) -
cmd/object-handlers.go
sseCopyC := crypto.SSEC.IsEncrypted(srcInfo.UserDefined) && crypto.SSECopy.IsRequested(r.Header) sseC := crypto.SSEC.IsRequested(r.Header) sseS3 := crypto.S3.IsRequested(r.Header) sseKMS := crypto.S3KMS.IsRequested(r.Header) isSourceEncrypted := sseCopyC || sseCopyS3 || sseCopyKMS isTargetEncrypted := sseC || sseS3 || sseKMS if sseC { newKey, err = ParseSSECustomerRequest(r)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Oct 05 05:16:15 UTC 2024 - 117.4K bytes - Viewed (0) -
cmd/bucket-replication.go
Dsc: dsc, TargetStatuses: tgtStatuses, TargetPurgeStatuses: purgeStatuses, ReplicationTimestamp: tm, SSEC: crypto.SSEC.IsEncrypted(oi.UserDefined), UserTags: oi.UserTags, } if ri.SSEC { ri.Checksum = oi.Checksum } if dsc.Synchronous() { replicateObject(ctx, ri, o) } else {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 06:49:55 UTC 2024 - 116.1K bytes - Viewed (0) -
cmd/api-response.go
m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata) if kmsCtx, ok := metadata[crypto.MetaContext]; ok { m[xhttp.AmzServerSideEncryptionKmsContext] = kmsCtx } case crypto.SSEC: m[xhttp.AmzServerSideEncryptionCustomerAlgorithm] = xhttp.AmzEncryptionAES } var toRemove []string for k := range cleanMinioInternalMetadataKeys(m) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 19:27:06 UTC 2024 - 33.4K bytes - Viewed (0) -
internal/http/headers.go
AmzMetaUnencryptedContentLength = "X-Amz-Meta-X-Amz-Unencrypted-Content-Length" AmzMetaUnencryptedContentMD5 = "X-Amz-Meta-X-Amz-Unencrypted-Content-Md5" // AWS server-side encryption headers for SSE-S3, SSE-KMS and SSE-C. AmzServerSideEncryption = "X-Amz-Server-Side-Encryption" AmzServerSideEncryptionKmsID = AmzServerSideEncryption + "-Aws-Kms-Key-Id"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 28 15:31:56 UTC 2024 - 10.4K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
# sleep for replication to complete sleep 30 # Create bucket in source cluster echo "Create bucket in source MinIO instance" ./mc mb minio1/test-bucket --insecure # Enable SSE KMS for the bucket ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure # Load objects to source site echo "Loading objects to source MinIO instance" ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 06:49:55 UTC 2024 - 11.5K bytes - Viewed (0)