- Sort Score
- Result 10 results
- Languages All
Results 11 - 20 of 68 for ENCRYPTION (0.17 sec)
-
docs/distributed/decom-encrypted-sse-s3.sh
ret=$? if [ $ret -ne 0 ]; then echo "expected versioning enabled after expansion" exit 1 fi ./mc encrypt info myminio/versioned | grep -q "Auto encryption 'sse-s3' is enabled" ret=$? if [ $ret -ne 0 ]; then echo "expected encryption enabled after expansion" exit 1 fi ./mc mirror cmd myminio/versioned/ --quiet >/dev/null ./mc ls -r myminio/versioned/ >expanded_ns.txt
Shell Script - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Apr 23 17:15:52 GMT 2024 - 4.5K bytes - Viewed (0) -
docs/site-replication/run-ssec-object-replication-with-compression.sh
shred -s 500M /tmp/data/mpartobj.txt echo "done" # Enable compression for site minio1 ./mc admin config set minio1 compression enable=on extensions=".txt" --insecure ./mc admin config set minio1 compression allow_encryption=on --insecure # Create bucket in source cluster echo "Create bucket in source MinIO instance" ./mc mb minio1/test-bucket --insecure # Load objects to source site echo "Loading objects to source MinIO instance"
Shell Script - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 08:43:09 GMT 2024 - 8.1K bytes - Viewed (0) -
docs/site-replication/run-ssec-object-replication.sh
src_obj1_etag=$(echo "${stat_out1}" | jq '.etag') src_obj1_size=$(echo "${stat_out1}" | jq '.size') src_obj1_md5=$(echo "${stat_out1}" | jq '.metadata."X-Amz-Server-Side-Encryption-Customer-Key-Md5"') echo "Stat minio1/test-bucket/defpartsize" ./mc stat minio1/test-bucket/defpartsize --enc-c "minio1/test-bucket/defpartsize=${TEST_MINIO_ENC_KEY}" --insecure --json
Shell Script - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Apr 19 08:43:09 GMT 2024 - 9.7K bytes - Viewed (1) -
cmd/bucket-lifecycle.go
type RestoreRequestType string const ( // SelectRestoreRequest specifies select request. This is the only valid value SelectRestoreRequest RestoreRequestType = "SELECT" ) // Encryption specifies encryption setting on restored bucket type Encryption struct { EncryptionType sse.Algorithm `xml:"EncryptionType"` KMSContext string `xml:"KMSContext,omitempty"` KMSKeyID string `xml:"KMSKeyId,omitempty"` }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Apr 17 05:09:58 GMT 2024 - 33.1K bytes - Viewed (0) -
internal/http/headers.go
AmzServerSideEncryptionCopyCustomerAlgorithm = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Algorithm" AmzServerSideEncryptionCopyCustomerKey = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key" AmzServerSideEncryptionCopyCustomerKeyMD5 = "X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key-Md5" AmzEncryptionAES = "AES256" AmzEncryptionKMS = "aws:kms"
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 10.4K bytes - Viewed (1) -
internal/kms/kms.go
Metrics(ctx context.Context) (kes.Metric, error) // CreateKey creates a new key at the KMS with the given key ID. CreateKey(ctx context.Context, keyID string) error // GenerateKey generates a new data encryption key using the // key referenced by the key ID. // // The KMS may use a default key if the key ID is empty. // GenerateKey returns an error if the referenced key does // not exist. //
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 4.6K bytes - Viewed (0) -
cmd/object-handlers.go
// while reading the object from another source. // Notice: The S3 client can send secret keys in headers for encryption related jobs, // the handler should ensure to remove these keys before sending them to the object layer. // Currently these keys are: // - X-Amz-Server-Side-Encryption-Customer-Key // - X-Amz-Copy-Source-Server-Side-Encryption-Customer-Key func (api objectAPIHandlers) CopyObjectHandler(w http.ResponseWriter, r *http.Request) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu May 02 20:15:54 GMT 2024 - 125.2K bytes - Viewed (0) -
.github/workflows/go.yml
if: matrix.os == 'ubuntu-latest' env: CGO_ENABLED: 0 GO111MODULE: on MINIO_KMS_SECRET_KEY: "my-minio-key:OSMM+vkKUTCvQs9YL/CVMIMt43HFhkUpqJxTmGl6rYw=" MINIO_KMS_AUTO_ENCRYPTION: on run: | sudo sysctl net.ipv6.conf.all.disable_ipv6=0 sudo sysctl net.ipv6.conf.default.disable_ipv6=0
Others - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 23:44:49 GMT 2024 - 1.1K bytes - Viewed (0) -
internal/etag/etag.go
// // For example: ceb8853ddc5086cc4ab9e149f8f09c88-5 // // However, this scheme is only used for multipart objects that are // not encrypted. // // # Server-side Encryption // // S3 specifies three types of server-side-encryption - SSE-C, SSE-S3 // and SSE-KMS - with different semantics w.r.t. ETags. // In case of SSE-S3, the ETag of an object is computed the same as
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Mar 10 21:09:36 GMT 2024 - 13.3K bytes - Viewed (0) -
.github/workflows/go-healing.yml
if: matrix.os == 'ubuntu-latest' env: CGO_ENABLED: 0 GO111MODULE: on MINIO_KMS_SECRET_KEY: "my-minio-key:oyArl7zlPECEduNbB1KXgdzDn2Bdpvvw0l8VO51HQnY=" MINIO_KMS_AUTO_ENCRYPTION: on run: | sudo sysctl net.ipv6.conf.all.disable_ipv6=0 sudo sysctl net.ipv6.conf.default.disable_ipv6=0 make verify-healing make verify-healing-inconsistent-versions
Others - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 23:44:49 GMT 2024 - 1.2K bytes - Viewed (0)