- Sort Score
- Result 10 results
- Languages All
Results 71 - 80 of 402 for S3 (0.02 sec)
-
.github/workflows/run-mint.sh
docker volume rm $(docker volume ls -q -f dangling=true) || true # Stop two nodes, one of each pool, to check that all S3 calls work while quorum is still there [ "${MODE}" == "pools" ] && docker-compose -f minio-${MODE}.yaml stop minio2 [ "${MODE}" == "pools" ] && docker-compose -f minio-${MODE}.yaml stop minio6 # Pause one node, to check that all S3 calls work while one node goes wrong [ "${MODE}" == "resiliency" ] && docker-compose -f minio-${MODE}.yaml pause minio4Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Jan 20 14:49:07 UTC 2025 - 1.9K bytes - Viewed (0) -
internal/bucket/replication/rule_test.go
inputConfig string opts ObjectOpts expectedResult bool }{ // case 1 - rule with replica modification enabled; not a replica {Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.6K bytes - Viewed (0) -
docs/metrics/prometheus/list.md
| `minio_s3_requests_canceled_total` | Total number S3 requests canceled by the client. | | `minio_s3_requests_errors_total` | Total number S3 requests with (4xx and 5xx) errors. | | `minio_s3_requests_incoming_total` | Volatile number of total incoming S3 requests. |
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 43.4K bytes - Viewed (0) -
docs/kms/README.md
``` mc encrypt set sse-s3 myminio/bucket/ ``` Verify if MinIO has `sse-s3` enabled ``` mc encrypt info myminio/bucket/ Auto encryption 'sse-s3' is enabled ``` ### Using environment (not-recommended)
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 7.2K bytes - Viewed (0) -
internal/bucket/object/lock/lock_test.go
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 18.4K bytes - Viewed (0) -
internal/crypto/error.go
// ErrIncompatibleEncryptionMethod indicates that both SSE-C headers and SSE-S3 headers were specified, and are incompatible // The client needs to remove the SSE-S3 header or the SSE-C headers ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers") // ErrIncompatibleEncryptionWithCompression indicates that both data compression and SSE-C not allowed at the same time
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.4K bytes - Viewed (0) -
internal/crypto/sse.go
func IsRequested(h http.Header) (Type, bool) { switch { case S3.IsRequested(h): return S3, true case S3KMS.IsRequested(h): return S3KMS, true case SSEC.IsRequested(h): return SSEC, true default: return nil, false } } // Requested returns whether any type of encryption is requested. func Requested(h http.Header) bool { return S3.IsRequested(h) || S3KMS.IsRequested(h) || SSEC.IsRequested(h) }
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0) -
android/guava-tests/benchmark/com/google/common/base/ObjectsBenchmark.java
int dummy = 0; for (int i = 0; i < reps; i++) { dummy += Objects.hashCode(S0, S1, S2, S3); } return dummy; } @Benchmark int hashString_5(int reps) { int dummy = 0; for (int i = 0; i < reps; i++) { dummy += Objects.hashCode(S0, S1, S2, S3, S4); } return dummy; } @Benchmark int hashMixed_5(int reps) { int dummy = 0;Registered: Fri Dec 26 12:43:10 UTC 2025 - Last Modified: Thu Dec 19 18:03:30 UTC 2024 - 2.2K bytes - Viewed (0) -
internal/s3select/message.go
// It has a buffer size of 128K: // https://github.com/aws/aws-sdk-java/blob/master/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/internal/eventstreaming/MessageDecoder.java#L26 // but we must make sure there is always space to add 256 bytes: // https://github.com/aws/aws-sdk-java/blob/master/aws-java-sdk-s3/src/main/java/com/amazonaws/services/s3/model/SelectObjectContentEventStream.java#L197 maxRecordMessageLength = (128 << 10) - 256 )
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue Feb 18 16:25:55 UTC 2025 - 15.3K bytes - Viewed (0) -
docs/iam/policies/deny-objects-with-invalid-sse-kms-key-id.json
"Statement":[{ "Sid":"DenyObjectsWithInvalidSSEKMS", "Effect":"Deny", "Principal":"*", "Action":"s3:PutObject", "Resource":"arn:aws:s3:::multi-key-poc/*", "Condition":{ "StringNotEquals":{ "s3:x-amz-server-side-encryption-aws-kms-key-id":"minio-default-key" } } } ]
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue May 14 15:43:07 UTC 2024 - 439 bytes - Viewed (0)