- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 62 for hide (0.13 sec)
-
internal/grid/muxclient.go
} if msg.Flags&FlagSubroute != 0 { if m.subroute == nil { return fmt.Errorf("internal error: subroute not defined on client") } hid := m.subroute.withHandler(msg.Handler) before := len(dst) dst = append(dst, hid[:]...) if debugPrint { fmt.Println("Added subroute", hid.String(), "to message", msg, "len", len(dst)-before) } } if msg.Flags&FlagCRCxxh3 != 0 { h := xxh3.Hash(dst)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 14.2K bytes - Viewed (0) -
internal/crypto/sse.go
type Type interface { fmt.Stringer IsRequested(http.Header) bool IsEncrypted(map[string]string) bool } // IsRequested returns true and the SSE Type if the HTTP headers // indicate that some form server-side encryption is requested. // // If no SSE headers are present then IsRequested returns false // and no Type. func IsRequested(h http.Header) (Type, bool) { switch { case S3.IsRequested(h): return S3, true
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Aug 30 15:26:43 GMT 2022 - 4.4K bytes - Viewed (0) -
cmd/encryption-v1.go
errInvalidSSEParameters = errors.New("The SSE-C key for key-rotation is not correct") // special access denied errKMSNotConfigured = errors.New("KMS not configured for a server side encrypted objects") errKMSKeyNotFound = errors.New("Unknown KMS key ID") errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS") // Additional MinIO errors for SSE-C requests.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 36.5K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config_test.go
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Aug 16 18:28:30 GMT 2022 - 6.1K bytes - Viewed (0) -
cmd/storage-datatypes_test.go
ModTime: UTCNow(), Size: 3430, Mode: 0x0, Metadata: map[string]string{"X-Minio-Internal-Server-Side-Encryption-Iv": "jIJPsrkkVYYMvc7edBrNl+7zcM7+ZwXqMb/YAjBO/ck=", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Key-Id": "my-minio-key", "X-Minio-Internal-Server-Side-Encryption-S3-Kms-Sealed-Key": "IAAfAP2p7ZLv3UpLwBnsKkF2mtWba0qoY42tymK0szRgGvAxBNcXyHXYooe9dQpeeEJWgKUa/8R61oCy1mFwIg==", "X-Minio-Internal-Server-Side-Encryption-S3-Sealed-Key": "IAAfAPFYRDkHVirJBJxBixNj3PLWt78dFuUTyTLIdLG820J7XqLPBO4gpEE...
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Sep 19 18:05:16 GMT 2022 - 9.4K bytes - Viewed (0) -
cmd/storage-rest-server.go
// An optional error can be sent which will be picked as text only error, // without its original type by the receiver. // waitForHTTPResponse should be used to the receiving side. func keepHTTPReqResponseAlive(w http.ResponseWriter, r *http.Request) (resp func(error), body io.ReadCloser) { bodyDoneCh := make(chan struct{}) doneCh := make(chan error) ctx := r.Context() go func() {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Apr 28 17:53:50 GMT 2024 - 44.8K bytes - Viewed (0) -
internal/rest/client.go
c.dumpHTTP(req, resp) } if resp.StatusCode != http.StatusOK { // If server returns 412 pre-condition failed, it would // mean that authentication succeeded, but another // side-channel check has failed, we shall take // the client offline in such situations. // generally all implementations should simply return // 403, but in situations where there is a dependency
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Apr 28 17:53:50 GMT 2024 - 14.4K bytes - Viewed (0) -
cmd/config-current.go
}, config.HelpKV{ Key: config.BatchSubSys, Description: "manage batch job workers and wait times", }, config.HelpKV{ Key: config.CompressionSubSys, Description: "enable server side compression of objects", }, config.HelpKV{ Key: config.IdentityOpenIDSubSys, Description: "enable OpenID SSO support", MultipleTargets: true, }, config.HelpKV{
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri May 03 20:08:20 GMT 2024 - 30.8K bytes - Viewed (0) -
internal/crypto/error.go
ErrIncompatibleEncryptionMethod = Errorf("Server side encryption specified with both SSE-C and SSE-S3 headers") // ErrIncompatibleEncryptionWithCompression indicates that both data compression and SSE-C not allowed at the same time ErrIncompatibleEncryptionWithCompression = Errorf("Server side encryption specified with SSE-C with compression not allowed")
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 4.4K bytes - Viewed (0) -
internal/bucket/encryption/bucket-sse-config.go
var config BucketSSEConfig err := xml.NewDecoder(r).Decode(&config) if err != nil { return nil, err } // Validates server-side encryption config rules // Only one rule is allowed on AWS S3 if len(config.Rules) != 1 { return nil, errors.New("only one server-side encryption rule is allowed at a time") } for _, rule := range config.Rules { switch rule.DefaultEncryptionAction.Algorithm { case AES256:
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Viewed (0)