Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for transparent (0.2 sec)

  1. cmd/endpoint-ellipses.go

    	}
    	*el = list
    	return nil
    }
    
    type poolArgs struct {
    	args          []string
    	setDriveCount uint64
    }
    
    // buildDisksLayoutFromConfFile supports with and without ellipses transparently.
    func buildDisksLayoutFromConfFile(pools []poolArgs) (layout disksLayout, err error) {
    	if len(pools) == 0 {
    		return layout, errInvalidArgument
    	}
    
    	for _, list := range pools {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri May 03 15:54:03 GMT 2024
    - 14.7K bytes
    - Viewed (0)
  2. cmd/streaming-signature-v4.go

    // a chunk with a chunk size = 0. However, this chunk still has a signature and we must
    // verify it.
    const maxChunkSize = 16 << 20 // 16 MiB
    
    // Read - implements `io.Reader`, which transparently decodes
    // the incoming AWS Signature V4 streaming signature.
    func (cr *s3ChunkedReader) Read(buf []byte) (n int, err error) {
    	if cr.err != nil {
    		if cr.debug {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 18.2K bytes
    - Viewed (0)
  3. docs/kms/IAM.md

      secure key store. For example, you can run MinIO + KES + Hashicorp Vault.
    
    > What about an exiting MinIO deployment? Can I just upgrade my cluster?
    
    Yes, MinIO will try to transparently migrate any existing IAM data and either stores
    it in plaintext (no KMS) or re-encrypts using the KMS.
    
    > Is this change backward compatible? Will it break my setup?
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.3K bytes
    - Viewed (0)
Back to top