Bug 1473430 - [TestOnly] Test S3 encryption support added to S3A in Hadoop 2.8.0 with Ceph RGW
Summary: [TestOnly] Test S3 encryption support added to S3A in Hadoop 2.8.0 with Ceph RGW
Keywords:
Status: CLOSED CURRENTRELEASE
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: RGW
Version: 3.0
Hardware: Unspecified
OS: Unspecified
low
low
Target Milestone: z1
: 3.2
Assignee: Matt Benjamin (redhat)
QA Contact: Tejas
URL:
Whiteboard:
Depends On:
Blocks: 1473188
TreeView+ depends on / blocked
 
Reported: 2017-07-20 19:52 UTC by Kyle Bader
Modified: 2019-08-21 05:17 UTC (History)
13 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-08-21 05:17:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Kyle Bader 2017-07-20 19:52:02 UTC
Up to date all testing with S3A has been with unencrypted objects. This is because our testing has been against Jewel based downstream releases that did not support any of the S3 encryption features. We should begin verifying that S3 encryption features, as invoked by the S3A filesystem client, work correctly with Luminous, as we will want these features to be available in RHCS 3.0

1. Verify SSE-KMS works properly when configured with a Barbican backend.
2. Verify SSE-C works properly
3. Verify per-bucket encryption is supported
4. Verify our bucket policy implementation supports examples in [1]

References:

[1] https://hortonworks.github.io/hdp-aws/s3-encryption/index.html
[2] http://docs.ceph.com/docs/master/radosgw/encryption/

Comment 2 Vasu Kulkarni 2017-07-20 19:56:59 UTC
This should be part of rhcs 3.0 trello card first?

Comment 17 Giridhar Ramaraju 2019-08-05 13:06:10 UTC
Updating the QA Contact to a Hemant. Hemant will be rerouting them to the appropriate QE Associate. 

Regards,
Giri

Comment 18 Giridhar Ramaraju 2019-08-05 13:08:52 UTC
Updating the QA Contact to a Hemant. Hemant will be rerouting them to the appropriate QE Associate. 

Regards,
Giri


Note You need to log in before you can comment on or make changes to this bug.