Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 20 of 74 for sids (0.12 sec)

  1. cmd/object-handlers.go

    // the handler should ensure to remove these keys before sending them to the object layer.
    // Currently these keys are:
    //   - X-Amz-Server-Side-Encryption-Customer-Key
    //   - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key
    func (api objectAPIHandlers) CopyObjectHandler(w http.ResponseWriter, r *http.Request) {
    	ctx := newContext(r, w, "CopyObject")
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu May 02 20:15:54 GMT 2024
    - 125.2K bytes
    - Viewed (0)
  2. cmd/auth-handler.go

    	// secret keys and generate an entirely new claim by essentially
    	// hijacking the policies. We need to make sure that this is
    	// based on admin credential such that token cannot be decoded
    	// on the client side and is treated like an opaque value.
    	claims, err := auth.ExtractClaims(token, secret)
    	if err != nil {
    		if subtle.ConstantTimeCompare([]byte(secret), []byte(globalActiveCred.SecretKey)) == 1 {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 26K bytes
    - Viewed (0)
  3. cmd/server_test.go

    	// while unmarshalling time.Time type for 'Initiated' field.
    	// time.Time does not honor xml marshaller, it means that we need
    	// to encode/format it before giving it to xml marshaling.
    
    	// This below check adds client side verification to see if its
    	// truly parsable.
    
    	// listMultipartUploadsResponse - format for list multipart uploads response.
    	type listMultipartUploadsResponse struct {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Feb 22 06:26:06 GMT 2024
    - 108K bytes
    - Viewed (0)
  4. cmd/handler-utils.go

    var validSSEReplicationHeaders = map[string]string{
    	"X-Minio-Internal-Server-Side-Encryption-Sealed-Key":     "X-Minio-Replication-Server-Side-Encryption-Sealed-Key",
    	"X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "X-Minio-Replication-Server-Side-Encryption-Seal-Algorithm",
    	"X-Minio-Internal-Server-Side-Encryption-Iv":             "X-Minio-Replication-Server-Side-Encryption-Iv",
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 15.5K bytes
    - Viewed (3)
  5. docs/site-replication/run-ssec-object-replication.sh

    src_obj1_etag=$(echo "${stat_out1}" | jq '.etag')
    src_obj1_size=$(echo "${stat_out1}" | jq '.size')
    src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"')
    echo "Stat minio1/test-bucket/defpartsize"
    ./mc stat minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --json
    Shell Script
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 19 08:43:09 GMT 2024
    - 9.7K bytes
    - Viewed (1)
  6. internal/crypto/sse_test.go

    		Headers: http.Header{
    			"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"},
    			"X-Amz-Server-Side-Encryption-Customer-Key":       []string{"MzJieXRlc2xvbmdzZWNyZXRrZXltdXN0cHJvdmlkZWQ="},
    			"X-Amz-Server-Side-Encryption-Customer-Key-Md5":   []string{"7PpPLAK26ONlVUGOWlusfg=="},
    		},
    		Bucket: "bucket",
    		Object: "object",
    		Metadata: map[string]string{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jun 01 21:59:40 GMT 2021
    - 8.4K bytes
    - Viewed (0)
  7. docs/ftp/README.md

      an older version you must use an `S3 API client` such as [`mc`](https://github.com/minio/mc).
    
    - All features currently used by your buckets will work as is without any changes
      - SSE (Server Side Encryption)
      - Replication (Server Side Replication)
    
    ## Prerequisites
    
    - It is assumed you have users created and configured with relevant access policies, to start with
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Apr 30 15:15:45 GMT 2024
    - 7.1K bytes
    - Viewed (0)
  8. internal/event/targetlist.go

    	// ID where the remove or send were initiated.
    	ID TargetID
    	// Stores any error while removing a target or while sending an event.
    	Err error
    }
    
    // Remove - closes and removes targets by given target IDs.
    func (list *TargetList) Remove(targetIDSet TargetIDSet) {
    	list.Lock()
    	defer list.Unlock()
    
    	for id := range targetIDSet {
    		target, ok := list.targets[id]
    		if ok {
    			target.Close()
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 9.2K bytes
    - Viewed (0)
  9. docs/security/README.md

    - `X-Amz-Server-Side-Encryption-Customer-Key`: Base64 encoded new key.
    - `X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key`: Base64 encoded current key.
    
    Such a special COPY request is also known as S3 SSE-C key rotation.
    
    ### Server-Side Encryption with a KMS
    
    SSE-S3 allows an S3 client to en/decrypt an object at the MinIO server using a KMS. The MinIO
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 12 00:51:25 GMT 2022
    - 13.8K bytes
    - Viewed (0)
  10. docs/site-replication/README.md

    - All sites must be using the **same** external IDP(s) if any.
    - For [SSE-S3 or SSE-KMS encryption via KMS](https://min.io/docs/minio/linux/operations/server-side-encryption.html "MinIO KMS Guide"), all sites **must**  have access to a central KMS deployment. This can be achieved via a central KES server or multiple KES servers (say one per site) connected via a central KMS (Vault) server.
    
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Feb 26 21:30:28 GMT 2024
    - 3.4K bytes
    - Viewed (0)
Back to top