- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 37 for SSE (0.05 sec)
-
internal/crypto/sse-kms.go
type ssekms struct{} var ( // S3KMS represents AWS SSE-KMS. It provides functionality to // handle SSE-KMS requests. S3KMS = ssekms{} _ Type = S3KMS ) // String returns the SSE domain as string. For SSE-KMS the // domain is "SSE-KMS". func (ssekms) String() string { return "SSE-KMS" } // IsRequested returns true if the HTTP headers contains // at least one SSE-KMS header. func (ssekms) IsRequested(h http.Header) bool {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0) -
internal/crypto/sse-s3.go
"github.com/minio/minio/internal/logger" ) type sses3 struct{} var ( // S3 represents AWS SSE-S3. It provides functionality to handle // SSE-S3 requests. S3 = sses3{} _ Type = S3 ) // String returns the SSE domain as string. For SSE-S3 the // domain is "SSE-S3". func (sses3) String() string { return "SSE-S3" } func (sses3) IsRequested(h http.Header) bool { _, ok := h[xhttp.AmzServerSideEncryption]
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
docs/distributed/decom-encrypted-sse-s3.sh
./mc admin policy attach myminio/ rw --user=minio123 ./mc admin policy attach myminio/ lake --user=minio12345 ./mc mb -l myminio/versioned ./mc encrypt set sse-s3 myminio/versioned ./mc mirror internal myminio/versioned/ --quiet >/dev/null ## Soft delete (creates delete markers) ./mc rm -r --force myminio/versioned >/dev/null
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 27 19:17:46 UTC 2024 - 4.5K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
# sleep for replication to complete sleep 30 # Create bucket in source cluster echo "Create bucket in source MinIO instance" ./mc mb minio1/test-bucket --insecure # Enable SSE KMS for the bucket ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure # Load objects to source site echo "Loading objects to source MinIO instance" ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 06:49:55 UTC 2024 - 11.5K bytes - Viewed (0) -
docs/distributed/decom-compressed-sse-s3.sh
Harshavardhana <******@****.***> 1716837466 -0700
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 27 19:17:46 UTC 2024 - 4.3K bytes - Viewed (0) -
docs/iam/policies/deny-non-sse-kms-objects.json
Shubhendu <******@****.***> 1715701387 +0530
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 413 bytes - Viewed (0) -
docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json
Shubhendu <******@****.***> 1715701387 +0530
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 439 bytes - Viewed (0) -
internal/crypto/key_test.go
SealExtKey: [32]byte{}, SealIV: [32]byte{}, SealDomain: "SSE-C", SealBucket: "bucket", SealObject: "object", UnsealExtKey: [32]byte{}, UnsealDomain: "SSE-C", UnsealBucket: "bucket", UnsealObject: "object", ShouldPass: true, }, // 0 { SealExtKey: [32]byte{}, SealIV: [32]byte{}, SealDomain: "SSE-C", SealBucket: "bucket", SealObject: "object",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 20:51:54 UTC 2024 - 6.7K bytes - Viewed (0) -
internal/crypto/metadata.go
// MetaSealedKeySSEC is the sealed object encryption key in case of SSE-C. MetaSealedKeySSEC = "X-Minio-Internal-Server-Side-Encryption-Sealed-Key" // MetaSealedKeyS3 is the sealed object encryption key in case of SSE-S3 MetaSealedKeyS3 = "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key" // MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 17:40:33 UTC 2024 - 6.4K bytes - Viewed (0) -
internal/crypto/auto-encryption.go
"github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off". EnvKMSAutoEncryption = "MINIO_KMS_AUTO_ENCRYPTION" )
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 1.4K bytes - Viewed (0)