Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 178 for Encryption (0.2 sec)

  1. cmd/api-errors.go

    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with AWS KMS managed key requires HTTP header x-amz-server-side-encryption : aws:kms",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrIncompatibleEncryptionMethod: {
    		Code:           "InvalidArgument",
    		Description:    "Server Side Encryption with Customer provided key is incompatible with the encryption method specified",
    		HTTPStatusCode: http.StatusBadRequest,
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sun May 05 16:56:21 GMT 2024
    - 91.4K bytes
    - Viewed (7)
  2. docs/en/docs/deployment/https.md

    * Certificates have a **lifetime**.
        * They **expire**.
        * And then they need to be **renewed**, **acquired again** from the third party.
    * The encryption of the connection happens at the **TCP level**.
        * That's one layer **below HTTP**.
        * So, the **certificate and encryption** handling is done **before HTTP**.
    * **TCP doesn't know about "domains"**. Only about IP addresses.
    Plain Text
    - Registered: Sun May 05 07:19:11 GMT 2024
    - Last Modified: Thu Jan 11 16:31:18 GMT 2024
    - 12K bytes
    - Viewed (0)
  3. docs/compression/README.md

    your setup can use this feature combination safely.
    
    To enable compression+encryption use:
    
    ```bash
    ~ mc admin config set myminio compression allow_encryption=on
    ```
    
    Or alternatively through the environment variable `MINIO_COMPRESSION_ALLOW_ENCRYPTION=on`.
    
    ### 4. Excluded Types
    
    - Already compressed objects are not fit for compression since they do not have compressible patterns.
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Mar 11 11:55:34 GMT 2024
    - 5.1K bytes
    - Viewed (0)
  4. docs/distributed/decom-encrypted-sse-s3.sh

    ret=$?
    if [ $ret -ne 0 ]; then
    	echo "expected versioning enabled after expansion"
    	exit 1
    fi
    
    ./mc encrypt info myminio/versioned | grep -q "Auto encryption 'sse-s3' is enabled"
    ret=$?
    if [ $ret -ne 0 ]; then
    	echo "expected encryption enabled after expansion"
    	exit 1
    fi
    
    ./mc mirror cmd myminio/versioned/ --quiet >/dev/null
    
    ./mc ls -r myminio/versioned/ >expanded_ns.txt
    Shell Script
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Apr 23 17:15:52 GMT 2024
    - 4.5K bytes
    - Viewed (0)
  5. cmd/batch-rotate_gen.go

    			}
    		case "Prefix":
    			z.Prefix, err = dc.ReadString()
    			if err != nil {
    				err = msgp.WrapError(err, "Prefix")
    				return
    			}
    		case "Encryption":
    			err = z.Encryption.DecodeMsg(dc)
    			if err != nil {
    				err = msgp.WrapError(err, "Encryption")
    				return
    			}
    		default:
    			err = dc.Skip()
    			if err != nil {
    				err = msgp.WrapError(err)
    				return
    			}
    		}
    	}
    	return
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Dec 02 10:51:33 GMT 2023
    - 27.1K bytes
    - Viewed (0)
  6. internal/bucket/encryption/bucket-sse-config_test.go

    		}
    
    		if tc.keyID != "" && tc.keyID != ssec.KeyID() {
    			t.Errorf("Test case %d: Expected bucket encryption KeyID %s but got %s", i+1, tc.keyID, ssec.KeyID())
    		}
    
    		if expectedXML, err := xml.Marshal(tc.expectedConfig); err != nil || !bytes.Equal(expectedXML, []byte(tc.inputXML)) {
    			t.Errorf("Test case %d: Expected bucket encryption XML %s but got %s", i+1, string(expectedXML), tc.inputXML)
    		}
    	}
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Aug 16 18:28:30 GMT 2022
    - 6.1K bytes
    - Viewed (0)
  7. docs/site-replication/run-ssec-object-replication.sh

    src_obj1_etag=$(echo "${stat_out1}" | jq '.etag')
    src_obj1_size=$(echo "${stat_out1}" | jq '.size')
    src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"')
    echo "Stat minio1/test-bucket/defpartsize"
    ./mc stat minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --json
    Shell Script
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 19 08:43:09 GMT 2024
    - 9.7K bytes
    - Viewed (1)
  8. cmd/bucket-lifecycle.go

    type RestoreRequestType string
    
    const (
    	// SelectRestoreRequest specifies select request. This is the only valid value
    	SelectRestoreRequest RestoreRequestType = "SELECT"
    )
    
    // Encryption specifies encryption setting on restored bucket
    type Encryption struct {
    	EncryptionType sse.Algorithm `xml:"EncryptionType"`
    	KMSContext     string        `xml:"KMSContext,omitempty"`
    	KMSKeyID       string        `xml:"KMSKeyId,omitempty"`
    }
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed Apr 17 05:09:58 GMT 2024
    - 33.1K bytes
    - Viewed (0)
  9. docs/site-replication/run-ssec-object-replication-with-compression.sh

    shred -s 500M /tmp/data/mpartobj.txt
    echo "done"
    
    # Enable compression for site minio1
    ./mc admin config set minio1 compression enable=on extensions=".txt" --insecure
    ./mc admin config set minio1 compression allow_encryption=on --insecure
    
    # Create bucket in source cluster
    echo "Create bucket in source MinIO instance"
    ./mc mb minio1/test-bucket --insecure
    
    # Load objects to source site
    echo "Loading objects to source MinIO instance"
    Shell Script
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Apr 19 08:43:09 GMT 2024
    - 8.1K bytes
    - Viewed (0)
  10. internal/http/headers.go

    	AmzServerSideEncryptionCopyCustomerAlgorithm = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Algorithm"
    	AmzServerSideEncryptionCopyCustomerKey       = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key"
    	AmzServerSideEncryptionCopyCustomerKeyMD5    = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5"
    
    	AmzEncryptionAES = "AES256"
    	AmzEncryptionKMS = "aws:kms"
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 10.4K bytes
    - Viewed (1)
Back to top