- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 13 for ETags (0.02 sec)
-
internal/etag/etag_test.go
} } var multipartTests = []struct { // Test cases have been generated using AWS S3 ETags []ETag Multipart ETag }{ { ETags: []ETag{}, Multipart: ETag{}, }, { ETags: []ETag{must("b10a8db164e0754105b7a99be72e3fe5")}, Multipart: must("7b976cc68452e003eec7cb0eb631a19a-1"), }, { ETags: []ETag{must("5f363e0e58a95f06cbe9bbc662c5dfb6"), must("5f363e0e58a95f06cbe9bbc662c5dfb6")},
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Sep 18 17:00:54 UTC 2023 - 12.6K bytes - Viewed (0) -
internal/etag/etag.go
// S3 singlepart ETags. It returns nil if the list of // ETags is empty. // // Any encrypted or multipart ETag will be ignored and not // used to compute the returned ETag. func Multipart(etags ...ETag) ETag { if len(etags) == 0 { return nil } var n int64 h := md5.New() for _, etag := range etags { if !etag.IsMultipart() && !etag.IsEncrypted() {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Mar 10 21:09:36 UTC 2024 - 13.3K bytes - Viewed (0) -
cmd/erasure-healing-common.go
package cmd import ( "bytes" "context" "slices" "time" "github.com/minio/madmin-go/v3" ) func commonETags(etags []string) (etag string, maxima int) { etagOccurrenceMap := make(map[string]int, len(etags)) // Ignore the uuid sentinel and count the rest. for _, etag := range etags { if etag == "" { continue } etagOccurrenceMap[etag]++ }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 12.7K bytes - Viewed (0) -
internal/crypto/key.go
mac := hmac.New(sha256.New, key[:]) mac.Write(bin[:]) mac.Sum(partKey[:0]) return partKey } // SealETag seals the etag using the object key. // It does not encrypt empty ETags because such ETags indicate // that the S3 client hasn't sent an ETag = MD5(object) and // the backend can pick an ETag value. func (key ObjectKey) SealETag(etag []byte) []byte {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 19 20:28:10 UTC 2024 - 6.4K bytes - Viewed (0) -
docs/site-replication/run-replication-with-checksum-header.sh
exit_1 fi if [ "${SRC_OBJ_1_ETAG}" != "${DEST_OBJ_1_ETAG}" ]; then echo "BUG: Etags dont match for 'obj'. Source: ${SRC_OBJ_1_ETAG}, Destination: ${DEST_OBJ_1_ETAG}" exit_1 fi if [ "${SRC_OBJ_2_ETAG}" != "${DEST_OBJ_2_ETAG}" ]; then echo "BUG: Etags dont match for 'mpartobj'. Source: ${SRC_OBJ_2_ETAG}, Destination: ${DEST_OBJ_2_ETAG}" exit_1 fi echo "Set default encryption on "
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jul 29 08:02:16 UTC 2024 - 11.4K bytes - Viewed (0) -
cmd/encryption-v1.go
// objects are slightly larger due to encryption overhead. // Further, it decrypts all single-part SSE-S3 encrypted objects // and formats ETags of SSE-C / SSE-KMS encrypted objects to // be AWS S3 compliant. // // DecryptETags uses a KMS bulk decryption API, if available, which // is more efficient than decrypting ETags sequentually. func DecryptETags(ctx context.Context, k *kms.KMS, objects []ObjectInfo) error {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/erasure-multipart.go
} } } var checksumCombined []byte // However, in case of encryption, the persisted part ETags don't match // what we have sent to the client during PutObjectPart. The reason is // that ETags are encrypted. Hence, the client will send a list of complete // part ETags of which may not match the ETag of any part. For example // ETag (client): 30902184f4e62dd8f98f0aaff810c626
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Sep 29 22:40:36 UTC 2024 - 44.7K bytes - Viewed (0) -
internal/etag/reader.go
// A Reader wraps an io.Reader and computes the // MD5 checksum of the read content as ETag. // // Optionally, a Reader can also verify that // the computed ETag matches an expected value. // Therefore, it compares both ETags once the // underlying io.Reader returns io.EOF. // If the computed ETag does not match the // expected ETag then Read returns a VerifyError. // // Reader implements the Tagger interface. type Reader struct {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 4.8K bytes - Viewed (0) -
cmd/encryption-v1_test.go
ObjectInfo: ObjectInfo{ETag: "00000f00f27834c9a2654927546df57f9e998187496394d4ee80f3d9978f85f3c7d81f72600cdbe03d80dc5a13d69354"}, ETag: "", ShouldFail: true, // modified ETag }, // Special tests for ETags that end with a '-x' { ObjectKey: [32]byte{}, ObjectInfo: ObjectInfo{ETag: "916516b396f0f4d4f2a0e7177557bec4-1"}, ETag: "916516b396f0f4d4f2a0e7177557bec4-1", }, { ObjectKey: [32]byte{},
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Sep 24 04:17:08 UTC 2022 - 19.9K bytes - Viewed (0) -
cmd/object-multipart-handlers.go
// ETag := MD5(ETag_p1, ETag_p2, ...)+"-N" (N being the number of parts) // // This is independent of encryption. An encrypted multipart // object also has an ETag that is the MD5 of its part ETags. // The fact the in case of encryption the ETag of a part is // not the MD5 of the part content does not change that. var completeETags []etag.ETag for _, part := range complMultipartUpload.Parts {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sat Aug 31 18:25:48 UTC 2024 - 39.2K bytes - Viewed (0)