Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 34 for aside (0.13 sec)

  1. cmd/object-multipart-handlers.go

    			return
    		}
    
    		_, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
    		ssecRepHeaders := []string{
    			"X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    			"X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    			"X-Minio-Replication-Server-Side-Encryption-Iv",
    		}
    		ssecRep := false
    		for _, header := range ssecRepHeaders {
    			if val := r.Header.Get(header); val != "" {
    				ssecRep = true
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 39K bytes
    - Viewed (0)
  2. cmd/object-handlers.go

    			buf = bytebufferpool.Get()
    			defer bytebufferpool.Put(buf)
    		}
    		defer func() {
    			var data []byte
    			if buf != nil {
    				data = buf.Bytes()
    			}
    
    			asize, err := objInfo.GetActualSize()
    			if err != nil {
    				asize = objInfo.Size
    			}
    
    			globalCacheConfig.Set(&cache.ObjectInfo{
    				Key:          objInfo.Name,
    				Bucket:       objInfo.Bucket,
    				ETag:         objInfo.ETag,
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu May 02 20:15:54 GMT 2024
    - 125.2K bytes
    - Viewed (0)
  3. internal/crypto/error.go

    	ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
    	// ErrIncompatibleEncryptionWithCompression indicates that both data compression and SSE-C not allowed at the same time
    	ErrIncompatibleEncryptionWithCompression = Errorf("Server side encryption specified with SSE-C with compression not allowed")
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 4.4K bytes
    - Viewed (0)
  4. cmd/api-errors.go

    	ErrInvalidEncryptionMethod: {
    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with AWS KMS managed key requires HTTP header x-amz-server-side-encryption : aws:kms",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrIncompatibleEncryptionMethod: {
    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with Customer provided key is incompatible with the encryption method specified",
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sun May 05 16:56:21 GMT 2024
    - 91.4K bytes
    - Viewed (7)
  5. cmd/auth-handler.go

    	// secret keys and generate an entirely new claim by essentially
    	// hijacking the policies. We need to make sure that this is
    	// based on admin credential such that token cannot be decoded
    	// on the client side and is treated like an opaque value.
    	claims, err := auth.ExtractClaims(token, secret)
    	if err != nil {
    		if subtle.ConstantTimeCompare([]byte(secret), []byte(globalActiveCred.SecretKey)) == 1 {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
  6. cmd/server_test.go

    	// while unmarshalling time.Time type for 'Initiated' field.
    	// time.Time does not honor xml marshaller, it means that we need
    	// to encode/format it before giving it to xml marshaling.
    
    	// This below check adds client side verification to see if its
    	// truly parsable.
    
    	// listMultipartUploadsResponse - format for list multipart uploads response.
    	type listMultipartUploadsResponse struct {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Feb 22 06:26:06 GMT 2024
    - 108K bytes
    - Viewed (0)
  7. cmd/handler-utils.go

    var validSSEReplicationHeaders = map[string]string{
    	"X-Minio-Internal-Server-Side-Encryption-Sealed-Key":     "X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    	"X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    	"X-Minio-Internal-Server-Side-Encryption-Iv":             "X-Minio-Replication-Server-Side-Encryption-Iv",
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 15.5K bytes
    - Viewed (3)
  8. docs/site-replication/run-ssec-object-replication.sh

    src_obj1_etag=$(echo "${stat_out1}" | jq '.etag')
    src_obj1_size=$(echo "${stat_out1}" | jq '.size')
    src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"')
    echo "Stat minio1/test-bucket/defpartsize"
    ./mc stat minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --json
    Shell Script
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 19 08:43:09 GMT 2024
    - 9.7K bytes
    - Viewed (1)
  9. docs/ftp/README.md

      an older version you must use an `S3 API client` such as [`mc`](https://github.com/minio/mc).
    
    - All features currently used by your buckets will work as is without any changes
      - SSE (Server Side Encryption)
      - Replication (Server Side Replication)
    
    ## Prerequisites
    
    - It is assumed you have users created and configured with relevant access policies, to start with
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Apr 30 15:15:45 GMT 2024
    - 7.1K bytes
    - Viewed (0)
  10. docs/site-replication/README.md

    - All sites must be using the **same** external IDP(s) if any.
    - For [SSE-S3 or SSE-KMS encryption via KMS](https://min.io/docs/minio/linux/operations/server-side-encryption.html "MinIO KMS Guide"), all sites **must**  have access to a central KMS deployment. This can be achieved via a central KES server or multiple KES servers (say one per site) connected via a central KMS (Vault) server.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Feb 26 21:30:28 GMT 2024
    - 3.4K bytes
    - Viewed (0)
Back to top