Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for RemoveSensitiveEntries (0.13 sec)

  1. internal/crypto/metadata.go

    	if _, ok := metadata[MetaMultipart]; ok {
    		return true
    	}
    	return false
    }
    
    // RemoveSensitiveEntries removes confidential encryption
    // information - e.g. the SSE-C key - from the metadata map.
    // It has the same semantics as RemoveSensitiveHeaders.
    func RemoveSensitiveEntries(metadata map[string]string) { // The functions is tested in TestRemoveSensitiveHeaders for compatibility reasons
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Mon Jun 10 17:40:33 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  2. cmd/event-notification.go

    	if _, ok := args.ReqParams[xhttp.MinIOSourceReplicationRequest]; ok {
    		return
    	}
    
    	args.Object.Size, _ = args.Object.GetActualSize()
    
    	// remove sensitive encryption entries in metadata.
    	crypto.RemoveSensitiveEntries(args.Object.UserDefined)
    	crypto.RemoveInternalEntries(args.Object.UserDefined)
    
    	if globalHTTPListen.NumSubscribers(pubsub.MaskFromMaskable(args.EventName)) > 0 {
    		globalHTTPListen.Publish(args.ToEvent(false))
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Jun 21 22:22:24 UTC 2024
    - 7.7K bytes
    - Viewed (0)
  3. cmd/object-handlers.go

    	// so we do not want to override them, copy them instead.
    	for k, v := range encMetadata {
    		srcInfo.UserDefined[k] = v
    	}
    
    	// Ensure that metadata does not contain sensitive information
    	crypto.RemoveSensitiveEntries(srcInfo.UserDefined)
    
    	// If we see legacy source, metadataOnly we have to overwrite the content.
    	if srcInfo.Legacy {
    		srcInfo.metadataOnly = false
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Oct 05 05:16:15 UTC 2024
    - 117.4K bytes
    - Viewed (0)
  4. cmd/object-multipart-handlers.go

    	// so we do not want to override them, copy them instead.
    	for k, v := range encMetadata {
    		metadata[k] = v
    	}
    
    	// Ensure that metadata does not contain sensitive information
    	crypto.RemoveSensitiveEntries(metadata)
    
    	if isCompressible(r.Header, object) {
    		// Storing the compression metadata.
    		metadata[ReservedMetadataPrefix+"compression"] = compressionAlgorithmV2
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sat Aug 31 18:25:48 UTC 2024
    - 39.2K bytes
    - Viewed (0)
Back to top