Skip to content
This repository has been archived by the owner on Jul 24, 2024. It is now read-only.

pass sse_kms_key_id to S3 (#243) #261

Merged
merged 1 commit into from
May 7, 2020
Merged

pass sse_kms_key_id to S3 (#243) #261

merged 1 commit into from
May 7, 2020

Conversation

yiwu-arbug
Copy link
Contributor

@yiwu-arbug yiwu-arbug commented May 6, 2020

Pass sse_kms_key_id when backup to S3. This is to support using user owned KMS key for server-side encryption.

Pass sse_kms_key_id when backup to S3 to both tikv and when storing backupmeta in S3.

Tests
Manual test with BR. Try:

  • specify kms key id on backup. restore success.
  • disable the kms key and try restore again. restore failed.

Related changes

depends on kvproto change: pingcap/kvproto#607 and tikv change: tikv/tikv#7627

Signed-off-by: Yi Wu [email protected]

Co-authored-by: kennytm [email protected]

<!--
Thank you for working on BR! Please read BR's [CONTRIBUTING](https://github.com/pingcap/br/blob/master/CONTRIBUTING.md) document **BEFORE** filing this PR.
-->

Pass sse_kms_key_id when backup to S3. This is to support using user owned KMS key for server-side encryption.

Pass sse_kms_key_id when backup to S3 to both tikv and when storing backupmeta in S3.

Tests <!-- At least one of them must be included. -->
Manual test with BR. Try:
* specify kms key id on backup. restore success.
* disable the kms key and try restore again. restore failed.

Related changes

depends on kvproto change: pingcap/kvproto#607 and tikv change: tikv/tikv#7627

Signed-off-by: Yi Wu <[email protected]>

Co-authored-by: kennytm <[email protected]>
@kennytm
Copy link
Collaborator

kennytm commented May 7, 2020

Lgtm

@kennytm kennytm merged commit df0065b into pingcap:release-3.1 May 7, 2020
@yiwu-arbug yiwu-arbug deleted the cr_3.1 branch May 7, 2020 18:28
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants