Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 40 for sida (0.14 sec)

  1. cmd/config-current.go

    		},
    		config.HelpKV{
    			Key:         config.BatchSubSys,
    			Description: "manage batch job workers and wait times",
    		},
    		config.HelpKV{
    			Key:         config.CompressionSubSys,
    			Description: "enable server side compression of objects",
    		},
    		config.HelpKV{
    			Key:             config.IdentityOpenIDSubSys,
    			Description:     "enable OpenID SSO support",
    			MultipleTargets: true,
    		},
    		config.HelpKV{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri May 03 20:08:20 GMT 2024
    - 30.8K bytes
    - Viewed (0)
  2. internal/crypto/error.go

    	ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers")
    	// ErrIncompatibleEncryptionWithCompression indicates that both data compression and SSE-C not allowed at the same time
    	ErrIncompatibleEncryptionWithCompression = Errorf("Server side encryption specified with SSE-C with compression not allowed")
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 4.4K bytes
    - Viewed (0)
  3. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 17 01:15:57 GMT 2024
    - 6.3K bytes
    - Viewed (0)
  4. cmd/api-errors.go

    	ErrInvalidEncryptionMethod: {
    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with AWS KMS managed key requires HTTP header x-amz-server-side-encryption : aws:kms",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrIncompatibleEncryptionMethod: {
    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with Customer provided key is incompatible with the encryption method specified",
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sun May 05 16:56:21 GMT 2024
    - 91.4K bytes
    - Viewed (7)
  5. cmd/object-multipart-handlers.go

    			return
    		}
    
    		_, sourceReplReq := r.Header[xhttp.MinIOSourceReplicationRequest]
    		ssecRepHeaders := []string{
    			"X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    			"X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    			"X-Minio-Replication-Server-Side-Encryption-Iv",
    		}
    		ssecRep := false
    		for _, header := range ssecRepHeaders {
    			if val := r.Header.Get(header); val != "" {
    				ssecRep = true
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 39K bytes
    - Viewed (0)
  6. internal/crypto/metadata_test.go

    	{Encrypted: false, Metadata: map[string]string{"": ""}},                                        // 7
    	{Encrypted: false, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption": ""}}, // 8
    }
    
    func TestIsEncrypted(t *testing.T) {
    	for i, test := range isEncryptedTests {
    		if _, isEncrypted := IsEncrypted(test.Metadata); isEncrypted != test.Encrypted {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Feb 02 00:13:57 GMT 2024
    - 18.7K bytes
    - Viewed (0)
  7. internal/logger/target/kafka/kafka_scram_client_contrib.go

    // to create Client objects configured for SHA-512 hashing.
    var KafkaSHA512 scram.HashGeneratorFcn = sha512.New
    
    // XDGSCRAMClient implements the client-side of an authentication
    // conversation with a server.  A new conversation must be created for
    // each authentication attempt.
    type XDGSCRAMClient struct {
    	*scram.Client
    	*scram.ClientConversation
    	scram.HashGeneratorFcn
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Nov 09 04:04:01 GMT 2023
    - 3.3K bytes
    - Viewed (1)
  8. internal/config/etcd/etcd.go

    	cfg.PathPrefix = env.Get(EnvEtcdPathPrefix, kvs.Get(PathPrefix))
    	if etcdSecure {
    		cfg.TLS = &tls.Config{
    			RootCAs: rootCAs,
    		}
    		// This is only to support client side certificate authentication
    		// https://coreos.com/etcd/docs/latest/op-guide/security.html
    		etcdClientCertFile := env.Get(EnvEtcdClientCert, kvs.Get(ClientCert))
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Sep 04 19:57:37 GMT 2023
    - 4.8K bytes
    - Viewed (0)
  9. cmd/object-handlers.go

    // the handler should ensure to remove these keys before sending them to the object layer.
    // Currently these keys are:
    //   - X-Amz-Server-Side-Encryption-Customer-Key
    //   - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key
    func (api objectAPIHandlers) CopyObjectHandler(w http.ResponseWriter, r *http.Request) {
    	ctx := newContext(r, w, "CopyObject")
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu May 02 20:15:54 GMT 2024
    - 125.2K bytes
    - Viewed (0)
  10. cmd/auth-handler.go

    	// secret keys and generate an entirely new claim by essentially
    	// hijacking the policies. We need to make sure that this is
    	// based on admin credential such that token cannot be decoded
    	// on the client side and is treated like an opaque value.
    	claims, err := auth.ExtractClaims(token, secret)
    	if err != nil {
    		if subtle.ConstantTimeCompare([]byte(secret), []byte(globalActiveCred.SecretKey)) == 1 {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
Back to top