
Security News
Risky Biz Podcast: Making Reachability Analysis Work in Real-World Codebases
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
medusa-file-minio
Advanced tools
Upload files to a MinIO server.
Learn more about how you can use this plugin in the documentation.
{
endpoint: "minio.server.com",
bucket: "test",
access_key_id: "YOUR-ACCESS-KEY",
secret_access_key: "YOUR-SECRET-KEY",
// private bucket configuration
private_bucket: 'private-bucket',
private_access_key_id: "YOUR-ACCESS-KEY",
private_secret_access_key: "YOUR-SECRET-KEY",
}
Optionally a download_url_duration
option can be specified to change the valid duration of presigned download links. The duration is configured in seconds. (Default = 60 seconds)
Certain operations in Medusa such as data import and export require a separate, protected bucket. The plugin will raise an error if operations used for imports and exports are invoked without the correct setup.
Configuring Minio for requires configuration of one additional option: private_bucket
which refers to the name given to the protected bucket in Minio.
Separate credentials can, optionally, be used to access the private bucket by configuring the following options:
private_access_key_id: "YOUR-ACCESS-KEY",
private_secret_access_key: "YOUR-SECRET-KEY",
If no separate access key is given the same access key will be used for both the bucket
and the private_bucket
.
FAQs
MinIO server file connector for Medusa
The npm package medusa-file-minio receives a total of 307 weekly downloads. As such, medusa-file-minio popularity was classified as not popular.
We found that medusa-file-minio demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.
Security News
/Research
Malicious Nx npm versions stole secrets and wallet info using AI CLI tools; Socket’s AI scanner detected the supply chain attack and flagged the malware.
Security News
CISA’s 2025 draft SBOM guidance adds new fields like hashes, licenses, and tool metadata to make software inventories more actionable.