[ 
https://issues.apache.org/jira/browse/HADOOP-14507?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16365538#comment-16365538
 ] 

Larry McCay edited comment on HADOOP-14507 at 2/15/18 1:47 PM:
---------------------------------------------------------------

Hi [~ste...@apache.org] - this looks good.

The per bucket layering looks right to me.

Question: Why use the credential providers for the encryption key as well 
rather than the key provider API?

The key provider API would assure that the algorithm and key length, etc are 
proper and also provide key rolling/versioning, and allow for management in one 
of the available KMS servers as well - rather than just jceks.

Migrating to key provider later may make sense if you want to get this in now. 
It would however require backward compatible code to remain in this layer for 
existing jceks stores. Just another layer, I guess. 


was (Author: lmccay):
Hi [~ste...@apache.org] - this looks good.

The per bucket layering looks right to me.

Question: Why use the credential providers for the encryption key as well 
rather than the key provider API?

The key provider API would assure that the algorithm and key length, etc are 
proper and also provide key rolling/versioning, and allow for management in one 
of the available KMS servers as well - rather than just jceks.

 

> extend per-bucket secret key config with explicit getPassword() on 
> fs.s3a.$bucket.secret,key
> --------------------------------------------------------------------------------------------
>
>                 Key: HADOOP-14507
>                 URL: https://issues.apache.org/jira/browse/HADOOP-14507
>             Project: Hadoop Common
>          Issue Type: Sub-task
>          Components: fs/s3
>    Affects Versions: 2.8.1
>            Reporter: Steve Loughran
>            Assignee: Steve Loughran
>            Priority: Critical
>         Attachments: HADOOP-14507-001.patch, HADOOP-14507-002.patch, 
> HADOOP-14507-003.patch, HADOOP-14507-004.patch, HADOOP-14507-005.patch, 
> HADOOP-14507-006.patch, HADOOP-14507-006.patch, HADOOP-14507-007.patch
>
>
> Per-bucket jceks support turns out to be complex as you have to manage 
> multiple jecks files & configure the client to ask for the right one. This is 
> because we're calling {{Configuration.getPassword{"fs,s3a.secret.key"}}. 
> If before that, we do a check for the explict id, key, session key in the 
> properties {{fs.s3a.$bucket.secret}} ( & c), we could have a single JCEKs 
> file with all the secrets for different bucket. You would only need to 
> explicitly point the base config to the secrets file, and the right 
> credentials would be picked up, if set



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org

Reply via email to