Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pass server-side encryption option to minio.StatObject call #142

Merged
merged 6 commits into from
Jan 20, 2025

Conversation

jabbrwcky
Copy link
Contributor

@jabbrwcky jabbrwcky commented Sep 26, 2024

Adds missing encryption data passed to minio.StatObject() calls, causing client methods Exists() and Attributes() to fail with a 400 Bad Request error.

This may only affects encryption using SSE-C because here it is the callers responsibility to send the encryption key along with the request. In contrast SSE-KMS and SSE-S3 are handled transparently (if the user has permissions to use the key in the casse of SSE-KMS)

Fixes #141

  • I added CHANGELOG entry for this change.
  • Change is not relevant to the end user.

Changes

  • Add SSE-C configuration to Bucket.Exists()
  • Add SSE-C configuration to Bucket.Attributes()

Verification

Added E2E-Test that uploads, checks for existence and downloads a file using SSE-C

@toporek3112
Copy link

Any updates on this one?

@dagobertdocker
Copy link

Thanks for this PR! I'd love for this to be merged, my provider is using SSE-C and I cannot use Thanos because of the underlying issue.

Copy link
Collaborator

@JoaoBraveCoding JoaoBraveCoding left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@JoaoBraveCoding JoaoBraveCoding enabled auto-merge (squash) January 6, 2025 11:15
auto-merge was automatically disabled January 17, 2025 08:03

Head branch was pushed to by a user without write access

@jabbrwcky
Copy link
Contributor Author

@JoaoBraveCoding Rebasing onto main has reset the automerge for the PR

Copy link
Collaborator

@JoaoBraveCoding JoaoBraveCoding left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

SSE-C encryption broken for Exists/Attributes call
4 participants