mirror of
https://github.com/edgelesssys/constellation.git
synced 2024-12-28 00:49:26 -05:00
c603b547db
This flag allows users to control wether multipart uploads are blocked or allowed. At the moment s3proxy doesn't encrypt multipart uploads, so there is a potential for inadvertent data leakage. With this flag the default behavior is changed to a more secure default one: block multipart uploads. The previous behavior can be enabled by setting allow-multipart.
29 lines
738 B
Python
29 lines
738 B
Python
load("@io_bazel_rules_go//go:def.bzl", "go_library")
|
|
load("//bazel/go:go_test.bzl", "go_test")
|
|
|
|
go_library(
|
|
name = "router",
|
|
srcs = [
|
|
"handler.go",
|
|
"object.go",
|
|
"router.go",
|
|
],
|
|
importpath = "github.com/edgelesssys/constellation/v2/s3proxy/internal/router",
|
|
visibility = ["//s3proxy:__subpackages__"],
|
|
deps = [
|
|
"//internal/logger",
|
|
"//s3proxy/internal/crypto",
|
|
"//s3proxy/internal/kms",
|
|
"//s3proxy/internal/s3",
|
|
"@com_github_aws_aws_sdk_go_v2_service_s3//:s3",
|
|
"@org_uber_go_zap//:zap",
|
|
],
|
|
)
|
|
|
|
go_test(
|
|
name = "router_test",
|
|
srcs = ["router_test.go"],
|
|
embed = [":router"],
|
|
deps = ["@com_github_stretchr_testify//assert"],
|
|
)
|