Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 11 - 15 of 15 for s3sms (0.03 seconds)

  1. cmd/batch-rotate.go

    	srcBucket := r.Bucket
    	srcObject := objInfo.Name
    
    	if objInfo.DeleteMarker || !objInfo.VersionPurgeStatus.Empty() {
    		return nil
    	}
    	sseKMS := crypto.S3KMS.IsEncrypted(objInfo.UserDefined)
    	sseS3 := crypto.S3.IsEncrypted(objInfo.UserDefined)
    	if !sseKMS && !sseS3 { // neither sse-s3 nor sse-kms disallowed
    		return errInvalidEncryptionParameters
    	}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Aug 29 02:39:48 GMT 2025
    - 14.7K bytes
    - Click Count (0)
  2. cmd/object-api-options.go

    		}
    	}
    
    	if metadata == nil {
    		metadata = make(map[string]string)
    	}
    
    	etag := strings.TrimSpace(hdr.Get(xhttp.MinIOSourceETag))
    	if crypto.S3KMS.IsRequested(hdr) {
    		keyID, context, err := crypto.S3KMS.ParseHTTP(hdr)
    		if err != nil {
    			return ObjectOptions{}, err
    		}
    		sseKms, err := encrypt.NewSSEKMS(keyID, context)
    		if err != nil {
    			return ObjectOptions{}, err
    		}
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 14.3K bytes
    - Click Count (0)
  3. cmd/api-response.go

    	m := cloneMSS(metadata)
    
    	switch kind, _ := crypto.IsEncrypted(metadata); kind {
    	case crypto.S3:
    		m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionAES
    	case crypto.S3KMS:
    		m[xhttp.AmzServerSideEncryption] = xhttp.AmzEncryptionKMS
    		m[xhttp.AmzServerSideEncryptionKmsID] = kmsKeyIDFromMetadata(metadata)
    		if kmsCtx, ok := metadata[crypto.MetaContext]; ok {
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Oct 24 04:05:19 GMT 2025
    - 35K bytes
    - Click Count (0)
  4. cmd/erasure-multipart.go

    			}
    			objectEncryptionKey, err = decryptObjectMeta(baseKey, bucket, object, fi.Metadata)
    			if err != nil {
    				return oi, err
    			}
    		}
    	case crypto.S3, crypto.S3KMS:
    		objectEncryptionKey, err = decryptObjectMeta(nil, bucket, object, fi.Metadata)
    		if err != nil {
    			return oi, err
    		}
    	}
    	if len(objectEncryptionKey) == 32 {
    		var key crypto.ObjectKey
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Fri Oct 24 04:05:31 GMT 2025
    - 47.1K bytes
    - Click Count (0)
  5. cmd/bucket-replication.go

    			}
    		}
    		putOpts.Internal.LegalholdTimestamp = lholdTimestamp
    	}
    	if crypto.S3.IsEncrypted(objInfo.UserDefined) {
    		putOpts.ServerSideEncryption = encrypt.NewSSE()
    	}
    
    	if crypto.S3KMS.IsEncrypted(objInfo.UserDefined) {
    		// If KMS key ID replication is enabled (as by default)
    		// we include the object's KMS key ID. In any case, we
    		// always set the SSE-KMS header. If no KMS key ID is
    Created: Sun Apr 05 19:28:12 GMT 2026
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 118.2K bytes
    - Click Count (0)
Back to Top