- Sort Score
- Num 10 results
- Language All
Results 41 - 50 of 108 for kms (0.01 seconds)
-
cmd/tier.go
} // configReader returns a PutObjReader and ObjectOptions needed to save config // using a PutObject API. PutObjReader encrypts json encoded tier configurations // if KMS is enabled, otherwise simply yields the json encoded bytes as is. // Similarly, ObjectOptions value depends on KMS' status. func (config *TierConfigMgr) configReader(ctx context.Context) (*PutObjReader, *ObjectOptions, error) { b, err := config.Bytes() if err != nil {
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 15.6K bytes - Click Count (0) -
cmd/admin-router.go
// -- KMS APIs -- // adminRouter.Methods(http.MethodPost).Path(adminVersion + "/kms/status").HandlerFunc(adminMiddleware(adminAPI.KMSStatusHandler, traceAllFlag)) adminRouter.Methods(http.MethodPost).Path(adminVersion+"/kms/key/create").HandlerFunc(adminMiddleware(adminAPI.KMSCreateKeyHandler, traceAllFlag)).Queries("key-id", "{key-id:.*}")
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Oct 10 18:57:03 GMT 2025 - 26.7K bytes - Click Count (0) -
docs/metrics/prometheus/list.md
| `minio_cluster_kms_request_failure` | Number of KMS requests that failed due to some internal failure. (HTTP 5xx status code). | | `minio_cluster_kms_request_success` | Number of KMS requests that succeeded. |
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 43.4K bytes - Click Count (0) -
cmd/post-policy-fan-out.go
"github.com/minio/minio/internal/crypto" "github.com/minio/minio/internal/hash" xhttp "github.com/minio/minio/internal/http" "github.com/minio/minio/internal/kms" ) type fanOutOptions struct { Kind crypto.Type KeyID string Key []byte KmsCtx kms.Context Checksum *hash.Checksum MD5Hex string } // fanOutPutObject takes an input source reader and fans out multiple PUT operations
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Aug 29 02:39:48 GMT 2025 - 3.5K bytes - Click Count (0) -
docs/bucket/versioning/DESIGN.md
"PartSizes": [314], "PartASizes": [282], "Size": 314, "MTime": 1591820730, "MetaSys": { "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "bXktbWluaW8ta2V5",
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Jul 17 15:43:14 GMT 2022 - 5.8K bytes - Click Count (0) -
docs/distributed/decom-encrypted-kes.sh
./mc admin policy attach myminio/ lake --user=minio12345 ./mc mb -l myminio/versioned ./mc mb -l myminio/versioned-1 ./mc encrypt set sse-s3 myminio/versioned ./mc encrypt set sse-kms minio-default-key myminio/versioned-1 ./mc mirror internal myminio/versioned/ --quiet >/dev/null ./mc mirror internal myminio/versioned-1/ --quiet >/dev/null ## Soft delete (creates delete markers)
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Mon May 27 19:17:46 GMT 2024 - 7.1K bytes - Click Count (1) -
internal/crypto/metadata_test.go
}, // 2 { ExpectedErr: Errorf("The object metadata is missing the internal KMS key-ID for SSE-S3"), Metadata: map[string]string{MetaIV: "", MetaAlgorithm: "", MetaSealedKeyS3: "", MetaDataEncryptionKey: "IAAF0b=="}, DataKey: []byte{}, KeyID: "", SealedKey: SealedKey{}, }, // 3 { ExpectedErr: Errorf("The object metadata is missing the internal sealed KMS data key for SSE-S3"),Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri Jul 12 20:51:54 GMT 2024 - 18.7K bytes - Click Count (0) -
cmd/bucket-metadata.go
encBytes, metaBytes, err := encryptBucketMetadata(ctx, b.Name, b.BucketTargetsConfigJSON, kms.Context{b.Name: b.Name, bucketTargetsFile: bucketTargetsFile}) if err != nil { return err } b.BucketTargetsConfigJSON = encBytes b.BucketTargetsConfigMetaJSON = metaBytes return b.Save(ctx, objectAPI) } // encrypt bucket metadata if kms is configured.
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 18.2K bytes - Click Count (0) -
internal/http/headers.go
AmzMetaUnencryptedContentMD5 = "X-Amz-Meta-X-Amz-Unencrypted-Content-Md5" // AWS server-side encryption headers for SSE-S3, SSE-KMS and SSE-C. AmzServerSideEncryption = "X-Amz-Server-Side-Encryption" AmzServerSideEncryptionKmsID = AmzServerSideEncryption + "-Aws-Kms-Key-Id" AmzServerSideEncryptionKmsContext = AmzServerSideEncryption + "-Context"
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Wed May 07 15:37:12 GMT 2025 - 10.8K bytes - Click Count (0) -
cmd/globals.go
globalDNSConfig dns.Store // GlobalKMS initialized KMS configuration GlobalKMS *kms.KMS // Common lock for various subsystems performing the leader tasks globalLeaderLock *sharedLock // Auto-Encryption, if enabled, turns any non-SSE-C request // into an SSE-S3 request. If enabled a valid, non-empty KMS // configuration must be present. globalAutoEncryption bool
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Sep 03 18:23:41 GMT 2024 - 16.2K bytes - Click Count (1)