You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Fix/disable tests which do not work or fail as expected when CSE-KMS is used.
Move documentation on encryption problems from troubleshooting.md
to encryption.md, and extends that with some new stack traces + explanations
Followup to HADOOP-18708: S3A: Support S3 Client Side Encryption(CSE)
Contributed by Syed Shameerur Rahman
method requires KMS key ID. Use fs.s3a.encryption.key property to set it.
885
+
-ls: CSE-KMS method requires KMS key ID. Use fs.s3a.encryption.key property to
886
+
set it.
887
+
```
888
+
889
+
set `fs.s3a.encryption.key=<KMS_KEY_ID>` generated through AWS console.
890
+
891
+
#### `software.amazon.awssdk.services.kms.model.IncorrectKeyException` The key ID in the request does not identify a CMK that can perform this operation.
892
+
893
+
KMS key ID used to PUT(encrypt) the data, must be the one used to GET the
894
+
data.
895
+
```
896
+
cat: open s3a://ap-south-cse/encryptedData.txt at 0 on
897
+
s3a://ap-south-cse/encryptedData.txt:
898
+
software.amazon.awssdk.services.kms.model.IncorrectKeyException: The key ID in the
899
+
request does not identify a CMK that can perform this operation. (Service: AWSKMS;
900
+
Status Code: 400; ErrorCode: IncorrectKeyException;
S3 encryption jars are not bundled into hadoop-aws jar by default. It needs to be added
941
+
separately to the class path. Currently, [amazon-s3-encryption-client-java v3.1.1](https://github.com/aws/amazon-s3-encryption-client-java/tree/v3.1.1) is used.
Service returned HTTP status code 400 (Service: Kms, Status Code: 400, Request ID: XG6CGC5ZH1JQS34S, Extended Request ID: KIyVA/pmbUUGmiqcy/ueyx0iw5ifgpuJMcrs0b4lYYZsXxikuUM2nRCl2lFnya+1TqGCt6YxLnM=)
Check if `fs.s3a.encryption.key` is set correctly and matches the
979
+
same on AWS console.
980
+
981
+
#### software.amazon.awssdk.services.kms.model.KmsException: User: <User_ARN> is not authorized to perform : kms :GenerateDataKey on resource: <KEY_ID>
982
+
983
+
User doesn't have authorization to the specific AWS KMS Key ID.
method requires KMS key ID. Use fs.s3a.encryption.key property to set it.
1082
-
-ls: CSE-KMS method requires KMS key ID. Use fs.s3a.encryption.key property to
1083
-
set it.
1084
-
```
1085
-
1086
-
set `fs.s3a.encryption.key=<KMS_KEY_ID>` generated through AWS console.
1087
-
1088
-
### `software.amazon.awssdk.services.kms.model.IncorrectKeyException` The key ID in the request does not identify a CMK that can perform this operation.
1089
-
1090
-
KMS key ID used to PUT(encrypt) the data, must be the one used to GET the
1091
-
data.
1092
-
```
1093
-
cat: open s3a://ap-south-cse/encryptedData.txt at 0 on
1094
-
s3a://ap-south-cse/encryptedData.txt:
1095
-
software.amazon.awssdk.services.kms.model.IncorrectKeyException: The key ID in the
1096
-
request does not identify a CMK that can perform this operation. (Service: AWSKMS;
1097
-
Status Code: 400; ErrorCode: IncorrectKeyException;
0 commit comments