-
Notifications
You must be signed in to change notification settings - Fork 9.2k
HADOOP-17922. Lookup old S3 encryption configs for JCEKS #3462
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
One commit in a test might be required which is in non-CSE mode, which I am currently running. Apart from that main change is in |
|
🎊 +1 overall
This message was automatically generated. |
steveloughran
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This all makes sense, I have one change for the docs
| private static final LogExactlyOnce IGNORE_CSE_WARN = new LogExactlyOnce(LOG); | ||
|
|
||
| /** Bucket name. */ | ||
| private String bucket; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
final?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cannot make it final. Assigning it a value in a method
|
|
||
| // Get the encryption method for this bucket. | ||
| S3AEncryptionMethods encryptionMethods = | ||
| getEncryptionAlgorithm(uri.getHost(), conf); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
bucket?
|
Can I add some text to the per bucket settings override docs for this patch...I'll compose it and add it in a comment |
mukund-thakur
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good during review session. Let's add steve's doc.
|
and the news is the method So: for encryption options not in jceks files, We don't get this for jceks files as there is no propagation, just lookup. I'm not going to worry about this, except to say "don't...I will add something in my patch which mentions this." |
|
🎊 +1 overall
This message was automatically generated. |
|
ok, I've added a patch in #3466 which
What now? I'd like that jceks resolution to be more consistent. (Oh, what a PITA). CSE is all good; we are just left trying to stabilise option names. @mehakmeet -can you cherrypick my patch into this PR and switch the failing test to use the new method you've added to look up the encryption settings? Then we can get that method to do what we want. |
|
Thanks for the changes @steveloughran. Coming to the tests. As expected the JCEKS test fails and gives the new global priority over old per-bucket configs.
So, basically, we would now make changes to the way we look-up so that this test passes and per-bucket config old or new gets priority over everything else? |
New unit test suite for propagation * adds TestBucketConfiguration for conf file propagation (succeeds) * one for jecks (fails; needs to sync up with the other patch) * moves over some test cases from ITestS3AConfiguration which don't need an FS. Change-Id: Ie1b6e0d1c655d00fc6d47ce054a1aeba01c71044
|
💔 -1 overall
This message was automatically generated. |
|
going to take this and then update with ordering of checks for old props following the exact same ordering as normal props |
Region: ap-south-1.
mvn clean verify -Dparallel-tests -DtestsThreadCount=4 -DscaleUsed long and short bucket property names for encryption properties for tests.
Tests run: 575, Failures: 0, Errors: 0, Skipped: 5Tests run: 1477, Failures: 0, Errors: 2, Skipped: 636Tests run: 151, Failures: 0, Errors: 1, Skipped: 28CSE:
Tests run: 5, Failures: 0, Errors: 0, Skipped: 0, Time elapsed: 28.081 s - in org.apache.hadoop.fs.s3a.ITestS3AClientSideEncryptionKms