- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 80 for kms (0.23 sec)
-
cmd/s3-zip-handlers.go
if crypto.S3.IsRequested(r.Header) || crypto.S3KMS.IsRequested(r.Header) { // If SSE-S3 or SSE-KMS present -> AWS fails with undefined error writeErrorResponse(ctx, w, errorCodes.ToAPIErr(ErrBadRequest), r.URL) return } zipPath, object, err := splitZipExtensionPath(object) if err != nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 15.8K bytes - Viewed (0) -
cmd/routers.go
// Add healthCheck router registerHealthCheckRouter(router) // Add server metrics router registerMetricsRouter(router) // Add STS router always. registerSTSRouter(router) // Add KMS router registerKMSRouter(router) // Add API router registerAPIRouter(router) router.Use(globalMiddlewares...) return router, nil
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Jul 29 18:10:04 UTC 2024 - 3.9K bytes - Viewed (0) -
docs/debugging/s3-check-md5/main.go
continue } if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" { log.Println("SKIPPED: encrypted with SSE-KMS do not have md5sum as ETag:", objFullPath(object)) continue } parts := 1 multipart := false s := strings.Split(object.ETag, "-") switch len(s) { case 1: // nothing to do
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sat Feb 17 01:15:57 UTC 2024 - 6.3K bytes - Viewed (0) -
cmd/api-errors.go
Description: "Server side encryption specified but KMS is not configured", HTTPStatusCode: http.StatusNotImplemented, }, ErrKMSKeyNotFoundException: { Code: "KMS.NotFoundException", Description: "Invalid keyId", HTTPStatusCode: http.StatusBadRequest, }, ErrKMSDefaultKeyAlreadyConfigured: { Code: "KMS.DefaultKeyAlreadyConfiguredException",
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 16 07:34:24 UTC 2025 - 93K bytes - Viewed (1) -
docs/distributed/samples/myminio-iam-info.zip
iam-assets/policies.json {"consoleAdmin":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:*"]},{"Effect":"Allow","Action":["kms:*"]},{"Effect":"Allow","Action":["s3:*"],"Resource":["arn:aws:s3:::*"]}]},diagnostics":{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["admin:ConsoleLog","admin:ServerInfo","admin:TopLocksInfo","admin:OBDInfo","admin:BandwidthMonitor","admin:Prometheus","admin:Profiling","admin:ServerTrace"],"Resource":["arn:aws:s3:::*"]}]},rea...
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Sep 12 15:59:00 UTC 2024 - 1.9K bytes - Viewed (0) -
cmd/config-current.go
globalSite.Update(siteCfg) globalAutoEncryption = crypto.LookupAutoEncryption() // Enable auto-encryption if enabled if globalAutoEncryption && GlobalKMS == nil { logger.Fatal(errors.New("no KMS configured"), "MINIO_KMS_AUTO_ENCRYPTION requires a valid KMS configuration") } transport := NewHTTPTransport() bootstrapTraceMsg("initialize the event notification targets")
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 28.5K bytes - Viewed (0) -
cmd/iam-object-store.go
if err == nil { return pdata, nil } if GlobalKMS != nil { pdata, err = config.DecryptBytes(GlobalKMS, data, kms.Context{ minioMetaBucket: path.Join(minioMetaBucket, objPath), }) if err == nil { return pdata, nil } pdata, err = config.DecryptBytes(GlobalKMS, data, kms.Context{ minioMetaBucket: objPath, }) if err == nil { return pdata, nil } } return nil, err }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 26.6K bytes - Viewed (0) -
docs/site-replication/run-replication-with-checksum-header.sh
exit_1 fi echo "Set default encryption on " # test if checksum header is replicated for encrypted objects # Enable SSE KMS for test-bucket bucket ./mc encrypt set sse-kms minio-default-key minio1/test-bucket --insecure # Load objects to source site with checksum header echo "Loading objects to source MinIO instance"
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Jan 20 14:49:07 UTC 2025 - 11.5K bytes - Viewed (0) -
cmd/encryption-v1_test.go
crypto.MetaKeyID: "kms-key", crypto.MetaDataEncryptionKey: "m-key", }, encryptionType: encrypt.S3, err: nil, }, // 4 { headers: http.Header{}, copySource: true, metadata: map[string]string{ crypto.MetaSealedKeyS3: base64.StdEncoding.EncodeToString(make([]byte, 64)), crypto.MetaKeyID: "kms-key", crypto.MetaDataEncryptionKey: "m-key",
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 19.9K bytes - Viewed (0) -
docs/bucket/replication/README.md
- SSE-C is hardly adopted by most widely used applications, applications prefer server to manage the keys via SSE-KMS or SSE-S3. - MinIO recommends applications to use SSE-KMS, SSE-S3 for simpler, safer and robust encryption mechanism for replicated buckets. ## Explore Further
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Aug 12 18:20:36 UTC 2025 - 18.3K bytes - Viewed (0)