- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for ParseMetadata (0.07 sec)
-
internal/crypto/sse-s3.go
func (s3 sses3) UnsealObjectKey(k *kms.KMS, metadata map[string]string, bucket, object string) (key ObjectKey, err error) { if k == nil { return key, Errorf("KMS not configured") } keyID, kmsKey, sealedKey, err := s3.ParseMetadata(metadata) if err != nil { return key, err } unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
internal/crypto/sse-c.go
metadata[MetaSealedKeySSEC] = base64.StdEncoding.EncodeToString(sealedKey.Key[:]) return metadata } // ParseMetadata extracts all SSE-C related values from the object metadata // and checks whether they are well-formed. It returns the sealed object key // on success. func (ssec) ParseMetadata(metadata map[string]string) (sealedKey SealedKey, err error) { // Extract all required values from object metadata
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.2K bytes - Viewed (0) -
internal/crypto/sse-kms.go
if k == nil { return key, Errorf("KMS not configured") } keyID, kmsKey, sealedKey, ctx, err := s3.ParseMetadata(metadata) if err != nil { return key, err } if ctx == nil { ctx = kms.Context{bucket: path.Join(bucket, object)} } else if _, ok := ctx[bucket]; !ok { ctx[bucket] = path.Join(bucket, object)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0) -
internal/crypto/metadata_test.go
}, // 10 } func TestS3ParseMetadata(t *testing.T) { for i, test := range s3ParseMetadataTests { keyID, dataKey, sealedKey, err := S3.ParseMetadata(test.Metadata) if err != nil && test.ExpectedErr == nil { t.Errorf("Test %d: got error '%v' - want error '%v'", i, err, test.ExpectedErr) } if err == nil && test.ExpectedErr != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 20:51:54 UTC 2024 - 18.7K bytes - Viewed (0) -
istioctl/pkg/version/version.go
node := core.Node{} err := resource.UnmarshalTo(&node) if err != nil { return nil, fmt.Errorf("could not unmarshal Node: %w", err) } meta, err := model.ParseMetadata(node.Metadata) if err != nil || meta.ProxyConfig == nil { // Skip non-sidecars (e.g. istioctl queries) continue } pi = append(pi, istioVersion.ProxyInfo{ ID: node.Id,
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Mon Jul 29 21:11:35 UTC 2024 - 8.3K bytes - Viewed (0) -
istioctl/pkg/writer/pilot/status.go
clientConfig := xdsstatus.ClientConfig{} err := resource.UnmarshalTo(&clientConfig) if err != nil { return nil, nil, fmt.Errorf("could not unmarshal ClientConfig: %w", err) } meta, err := model.ParseMetadata(clientConfig.GetNode().GetMetadata()) if err != nil { return nil, nil, fmt.Errorf("could not parse node metadata: %w", err) } if s.Namespace != "" && meta.Namespace != s.Namespace { continue }
Registered: Wed Nov 06 22:53:10 UTC 2024 - Last Modified: Fri Jun 21 22:47:20 UTC 2024 - 6.5K bytes - Viewed (0) -
internal/crypto/sse.go
// from the metadata using the SSE-C client key. func unsealObjectKey(clientKey []byte, metadata map[string]string, bucket, object string) (key ObjectKey, err error) { sealedKey, err := SSEC.ParseMetadata(metadata) if err != nil { return } err = key.Unseal(clientKey, sealedKey, SSEC.String(), bucket, object) return } // EncryptSinglePart encrypts an io.Reader which must be the
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 30 15:26:43 UTC 2022 - 4.4K bytes - Viewed (0) -
cmd/encryption-v1.go
kind, _ := crypto.IsEncrypted(metadata) switch kind { case crypto.S3: if GlobalKMS == nil { return errKMSNotConfigured } keyID, kmsKey, sealedKey, err := crypto.S3.ParseMetadata(metadata) if err != nil { return err } oldKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/bucket-metadata.go
func decryptBucketMetadata(input []byte, bucket string, meta map[string]string, kmsContext kms.Context) ([]byte, error) { if GlobalKMS == nil { return nil, errKMSNotConfigured } keyID, kmsKey, sealedKey, err := crypto.S3.ParseMetadata(meta) if err != nil { return nil, err } extKey, err := GlobalKMS.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: kmsContext, })
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Aug 28 15:32:18 UTC 2024 - 18.2K bytes - Viewed (0)