shameersss1 commented on code in PR #6884:
URL: https://github.com/apache/hadoop/pull/6884#discussion_r1820203738


##########
hadoop-tools/hadoop-aws/src/site/markdown/tools/hadoop-aws/encryption.md:
##########
@@ -704,10 +704,20 @@ clients where S3-CSE has not been enabled.
 
 ### Features
 
-- Supports client side encryption with keys managed in AWS KMS.
+- Supports client side encryption with keys managed in AWS KMS (CSE-KMS)
+- Supports client side encryption with custom keys by implementing custom 
[Keyring](https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/choose-keyring.html)
 (CSE-CUSTOM)
+- Backward compatible with older encryption clients like 
`AmazonS3EncryptionClient.java`(V1) and `AmazonS3EncryptionClientV2.java`(V2)
 - encryption settings propagated into jobs through any issued delegation 
tokens.
 - encryption information stored as headers in the uploaded object.
 
+### Compatibility Issues
+
+- The V1 and V2 clients support reading unencrypted S3 objects, whereas the V3 
client does not. In order to read S3 objects in a directory with a mix of 
encrypted and unencrypted objects.
+- Unlike the V2 and V3 clients which always pads 16 bytes, V1 client pads 
extra bytes to the next multiple of 16. For example if unencrypted object size 
is 12bytes, V1 client pads extra 4bytes to make it multiple of 16.

Review Comment:
   ack.



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org
For additional commands, e-mail: common-issues-h...@hadoop.apache.org

Reply via email to