- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 40 for sida (0.14 sec)
-
cmd/config-current.go
}, config.HelpKV{ Key: config.BatchSubSys, Description: "manage batch job workers and wait times", }, config.HelpKV{ Key: config.CompressionSubSys, Description: "enable server side compression of objects", }, config.HelpKV{ Key: config.IdentityOpenIDSubSys, Description: "enable OpenID SSO support", MultipleTargets: true, }, config.HelpKV{
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 03 20:08:20 GMT 2024 - 30.8K bytes - Viewed (0) -
internal/crypto/error.go
ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers") // ErrIncompatibleEncryptionWithCompression indicates that both data compression and SSE-C not allowed at the same time ErrIncompatibleEncryptionWithCompression = Errorf("Server side encryption specified with SSE-C with compression not allowed")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 4.4K bytes - Viewed (0) -
docs/debugging/s3-check-md5/main.go
continue } if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok { log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object)) continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Feb 17 01:15:57 GMT 2024 - 6.3K bytes - Viewed (0) -
cmd/api-errors.go
ErrInvalidEncryptionMethod: { Code: "InvalidArgument", Description: "Server Side Encryption with AWS KMS managed key requires HTTP header x-amz-server-side-encryption : aws:kms", HTTPStatusCode: http.StatusBadRequest, }, ErrIncompatibleEncryptionMethod: { Code: "InvalidArgument", Description: "Server Side Encryption with Customer provided key is incompatible with the encryption method specified",
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun May 05 16:56:21 GMT 2024 - 91.4K bytes - Viewed (7) -
cmd/object-multipart-handlers.go
return } _, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest] ssecRepHeaders := []string{ "X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm", "X-Minio-Replication-Server-Side-Encryption-Sealed-Key", "X-Minio-Replication-Server-Side-Encryption-Iv", } ssecRep := false for _, header := range ssecRepHeaders { if val := r.Header.Get(header); val != "" { ssecRep = true
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 39K bytes - Viewed (0) -
internal/crypto/metadata_test.go
{Encrypted: false, Metadata: map[string]string{"": ""}}, // 7 {Encrypted: false, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption": ""}}, // 8 } func TestIsEncrypted(t *testing.T) { for i, test := range isEncryptedTests { if _, isEncrypted := IsEncrypted(test.Metadata); isEncrypted != test.Encrypted {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Feb 02 00:13:57 GMT 2024 - 18.7K bytes - Viewed (0) -
internal/logger/target/kafka/kafka_scram_client_contrib.go
// to create Client objects configured for SHA-512 hashing. var KafkaSHA512 scram.HashGeneratorFcn = sha512.New // XDGSCRAMClient implements the client-side of an authentication // conversation with a server. A new conversation must be created for // each authentication attempt. type XDGSCRAMClient struct { *scram.Client *scram.ClientConversation scram.HashGeneratorFcn
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Nov 09 04:04:01 GMT 2023 - 3.3K bytes - Viewed (1) -
internal/config/etcd/etcd.go
cfg.PathPrefix = env.Get(EnvEtcdPathPrefix, kvs.Get(PathPrefix)) if etcdSecure { cfg.TLS = &tls.Config{ RootCAs: rootCAs, } // This is only to support client side certificate authentication // https://coreos.com/etcd/docs/latest/op-guide/security.html etcdClientCertFile := env.Get(EnvEtcdClientCert, kvs.Get(ClientCert))
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 04 19:57:37 GMT 2023 - 4.8K bytes - Viewed (0) -
cmd/object-handlers.go
// the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) CopyObjectHandler(w http.ResponseWriter, r *http.Request) { ctx := newContext(r, w, "CopyObject")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu May 02 20:15:54 GMT 2024 - 125.2K bytes - Viewed (0) -
cmd/auth-handler.go
// secret keys and generate an entirely new claim by essentially // hijacking the policies. We need to make sure that this is // based on admin credential such that token cannot be decoded // on the client side and is treated like an opaque value. claims, err := auth.ExtractClaims(token, secret) if err != nil { if subtle.ConstantTimeCompare([]byte(secret), []byte(globalActiveCred.SecretKey)) == 1 {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 26K bytes - Viewed (0)