- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 31 for sse (0.01 sec)
-
docs/distributed/decom-encrypted-sse-s3.sh
./mc admin policy attach myminio/ rw --user=minio123 ./mc admin policy attach myminio/ lake --user=minio12345 ./mc mb -l myminio/versioned ./mc encrypt set sse-s3 myminio/versioned ./mc mirror internal myminio/versioned/ --quiet >/dev/null ## Soft delete (creates delete markers) ./mc rm -r --force myminio/versioned >/dev/null
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 27 19:17:46 UTC 2024 - 4.5K bytes - Viewed (0) -
docs/site-replication/run-sse-kms-object-replication.sh
# sleep for replication to complete sleep 30 # Create bucket in source cluster echo "Create bucket in source MinIO instance" ./mc mb minio1/test-bucket --insecure # Enable SSE KMS for the bucket ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure # Load objects to source site echo "Loading objects to source MinIO instance" ./mc cp /tmp/data/encrypted minio1/test-bucket --insecure
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 10 06:49:55 UTC 2024 - 11.5K bytes - Viewed (0) -
docs/distributed/decom-compressed-sse-s3.sh
Harshavardhana <******@****.***> 1716837466 -0700
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon May 27 19:17:46 UTC 2024 - 4.3K bytes - Viewed (0) -
internal/crypto/key_test.go
SealExtKey: [32]byte{}, SealIV: [32]byte{}, SealDomain: "SSE-C", SealBucket: "bucket", SealObject: "object", UnsealExtKey: [32]byte{}, UnsealDomain: "SSE-C", UnsealBucket: "bucket", UnsealObject: "object", ShouldPass: true, }, // 0 { SealExtKey: [32]byte{}, SealIV: [32]byte{}, SealDomain: "SSE-C", SealBucket: "bucket", SealObject: "object",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 20:51:54 UTC 2024 - 6.7K bytes - Viewed (0) -
internal/crypto/metadata.go
// MetaSealedKeySSEC is the sealed object encryption key in case of SSE-C. MetaSealedKeySSEC = "X-Minio-Internal-Server-Side-Encryption-Sealed-Key" // MetaSealedKeyS3 is the sealed object encryption key in case of SSE-S3 MetaSealedKeyS3 = "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key" // MetaSealedKeyKMS is the sealed object encryption key in case of SSE-KMS MetaSealedKeyKMS = "X-Minio-Internal-Server-Side-Encryption-Kms-Sealed-Key"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Mon Jun 10 17:40:33 UTC 2024 - 6.4K bytes - Viewed (0) -
internal/crypto/auto-encryption.go
"github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off". EnvKMSAutoEncryption = "MINIO_KMS_AUTO_ENCRYPTION" )
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 1.4K bytes - Viewed (0) -
docs/iam/policies/pbac-tests.sh
mc admin policy create myminio/ deny-non-sse-kms-pol ./docs/iam/policies/deny-non-sse-kms-objects.json mc admin policy create myminio/ deny-invalid-sse-kms-pol ./docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json mc admin policy attach myminio deny-non-sse-kms-pol --user minio123 mc admin policy attach myminio deny-invalid-sse-kms-pol --user minio123 mc admin policy attach myminio consoleAdmin --user minio123
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Jun 25 01:15:27 UTC 2024 - 2.5K bytes - Viewed (0) -
Makefile
@echo "Running tests for automatic site replication of SSE-C objects" @(env bash $(PWD)/docs/site-replication/run-ssec-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with SSE-KMS enabled for bucket" @(env bash $(PWD)/docs/site-replication/run-sse-kms-object-replication.sh) @echo "Running tests for automatic site replication of SSE-C objects with compression enabled for site"
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Oct 31 22:10:24 UTC 2024 - 11.1K bytes - Viewed (0) -
cmd/encryption-v1.go
return objInfo.ETag } } // As per AWS S3 Spec, ETag for SSE-C encrypted objects need not be MD5Sum of the data. // Since server side copy with same source and dest just replaces the ETag, we save // encrypted content MD5Sum as ETag for both SSE-C and SSE-KMS, we standardize the ETag // encryption across SSE-C and SSE-KMS, and only return last 32 bytes for SSE-C
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Sun Oct 13 13:06:08 UTC 2024 - 37.2K bytes - Viewed (0) -
cmd/batch-rotate.go
) // keyrotate: // apiVersion: v1 // bucket: BUCKET // prefix: PREFIX // encryption: // type: sse-s3 # valid values are sse-s3 and sse-kms // key: <new-kms-key> # valid only for sse-kms // context: <new-kms-key-context> # valid only for sse-kms // # optional flags based filtering criteria // # for all objects // flags: // filter:
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Wed Sep 18 17:59:03 UTC 2024 - 14.7K bytes - Viewed (0)