@@ -1161,7 +1161,7 @@ file using configured SSE-C keyB into that structure.
1161
1161
1162
1162
### Instruction file not found for S3 object
1163
1163
1164
- Reading an unencrypted file would fail when read through CSE enabled client.
1164
+ Reading an unencrypted file would fail when read through CSE enabled client.
1165
1165
```
1166
1166
java.lang.SecurityException: Instruction file not found for S3 object with bucket name: ap-south-cse, key: unencryptedData.txt
1167
1167
at com.amazonaws.services.s3.internal.crypto.v2.S3CryptoModuleAE.decipher(S3CryptoModuleAE.java:190)
@@ -1199,13 +1199,13 @@ java.lang.SecurityException: Instruction file not found for S3 object with bucke
1199
1199
at org.apache.hadoop.util.ToolRunner.run(ToolRunner.java:95)
1200
1200
at org.apache.hadoop.fs.FsShell.main(FsShell.java:390)
1201
1201
```
1202
- CSE enabled client should read encrypted data only.
1202
+ CSE enabled client should read encrypted data only.
1203
1203
1204
- ### CSE-KMS method requires KMS key ID
1204
+ ### CSE-KMS method requires KMS key ID
1205
1205
1206
1206
KMS key ID is required for CSE-KMS to encrypt data, not providing one leads
1207
- to failure.
1208
-
1207
+ to failure.
1208
+
1209
1209
```
1210
1210
2021-07-07 11:33:04,550 WARN fs.FileSystem: Failed to initialize fileystem
1211
1211
s3a://ap-south-cse/: java.lang.IllegalArgumentException: CSE-KMS
@@ -1214,7 +1214,7 @@ method requires KMS key ID. Use fs.s3a.server-side-encryption.key property to se
1214
1214
set it.
1215
1215
```
1216
1216
1217
- set ` fs.s3a.server-side-encryption.key=<KMS_KEY_ID> ` generated through AWS console.
1217
+ set ` fs.s3a.server-side-encryption.key=<KMS_KEY_ID> ` generated through AWS console.
1218
1218
1219
1219
### ` com.amazonaws.services.kms.model.IncorrectKeyException ` The key ID in the request does not identify a CMK that can perform this operation.
1220
1220
@@ -1231,7 +1231,7 @@ The key ID in the request does not identify a CMK that can perform this
1231
1231
operation. (Service: AWSKMS ; Status Code: 400; Error Code: IncorrectKeyException;
1232
1232
Request ID: da21aa8a-f00d-467c-94a0-32b627d32bc0; Proxy: null)
1233
1233
```
1234
- Use the same KMS key ID used to upload data to download and read it as well.
1234
+ Use the same KMS key ID used to upload data to download and read it as well.
1235
1235
1236
1236
### ` com.amazonaws.services.kms.model.NotFoundException ` key/<KMS_KEY_ID> does not exist
1237
1237
@@ -1249,8 +1249,8 @@ does not exist(Service: AWSKMS; Status Code: 400; Error Code: NotFoundException;
1249
1249
Request ID: 279db85d-864d-4a38-9acd-d892adb504c0; Proxy: null)
1250
1250
```
1251
1251
While generating the KMS Key ID make sure to generate it in the same region
1252
- as your bucket.
1253
-
1252
+ as your bucket.
1253
+
1254
1254
### Unable to perform range get request: Range get support has been disabled
1255
1255
1256
1256
If Range get is not supported for a CSE algorithm or is disabled:
@@ -1276,7 +1276,7 @@ java.lang.SecurityException: Unable to perform range get request: Range get supp
1276
1276
at org.apache.hadoop.fs.s3a.S3AInputStream.read(S3AInputStream.java:408)
1277
1277
at java.io.DataInputStream.readByte(DataInputStream.java:265)
1278
1278
```
1279
- Range gets msut be enabled for CSE to work.
1279
+ Range gets must be enabled for CSE to work.
1280
1280
1281
1281
### WARNING: Range gets do not provide authenticated encryption properties even when used with an authenticated mode (AES-GCM).
1282
1282
@@ -1297,7 +1297,7 @@ get data.
1297
1297
1298
1298
The S3 Encryption Client is configured to read encrypted data with legacy
1299
1299
encryption modes through the CryptoMode setting, and we would see this
1300
- warning for all S3-CSE request.
1300
+ warning for all S3-CSE request.
1301
1301
1302
1302
```
1303
1303
2021-07-14 12:54:09,519 [main] WARN s3.AmazonS3EncryptionClientV2
@@ -1307,16 +1307,18 @@ encryption modes through the CryptoMode setting. If you don't have objects
1307
1307
encrypted with these legacy modes, you should disable support for them to
1308
1308
enhance security. See https://docs.aws.amazon.com/general/latest/gr/aws_sdk_cryptography.html
1309
1309
```
1310
- We can ignore this, since this CryptoMode setting(CryptoMode.AuthenticatedEncryption)
1311
- is required for range gets to work.
1310
+ We can ignore this, since this CryptoMode setting(CryptoMode.AuthenticatedEncryption)
1311
+ is required for range gets to work.
1312
1312
1313
1313
### com.amazonaws.services.kms.model.InvalidKeyUsageException: You cannot generate a data key with an asymmetric CMK
1314
1314
1315
1315
If you generated an Asymmetric CMK from AWS console then CSE-KMS won't be
1316
- able to generate unique data key for encryption.
1316
+ able to generate unique data key for encryption.
1317
1317
1318
1318
```
1319
- Caused by: com.amazonaws.services.kms.model.InvalidKeyUsageException: You cannot generate a data key with an asymmetric CMK (Service: AWSKMS; Status Code: 400; Error Code: InvalidKeyUsageException; Request ID: 93609c15-e490-4035-8390-f4396f0d90bf; Proxy: null)
1319
+ Caused by: com.amazonaws.services.kms.model.InvalidKeyUsageException:
1320
+ You cannot generate a data key with an asymmetric CMK
1321
+ (Service: AWSKMS; Status Code: 400; Error Code: InvalidKeyUsageException; Request ID: 93609c15-e490-4035-8390-f4396f0d90bf; Proxy: null)
1320
1322
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleErrorResponse(AmazonHttpClient.java:1819)
1321
1323
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleServiceErrorResponse(AmazonHttpClient.java:1403)
1322
1324
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.executeOneRequest(AmazonHttpClient.java:1372)
@@ -1348,15 +1350,16 @@ Caused by: com.amazonaws.services.kms.model.InvalidKeyUsageException: You cannot
1348
1350
```
1349
1351
1350
1352
Generate a Symmetric Key in the same region as your S3 storage for CSE-KMS to
1351
- work.
1353
+ work.
1352
1354
1353
1355
### com.amazonaws.services.kms.model.NotFoundException: Invalid keyId
1354
1356
1355
1357
If the value in ` fs.s3a.server-side-encryption.key ` property, does not exist
1356
1358
/valid in AWS KMS CMK(Customer managed keys), then this error would be seen.
1357
1359
1358
1360
```
1359
- Caused by: com.amazonaws.services.kms.model.NotFoundException: Invalid keyId abc (Service: AWSKMS; Status Code: 400; Error Code: NotFoundException; Request ID: 9d53552a-3d1b-47c8-984c-9a599d5c2391; Proxy: null)
1361
+ Caused by: com.amazonaws.services.kms.model.NotFoundException: Invalid keyId abc
1362
+ (Service: AWSKMS; Status Code: 400; Error Code: NotFoundException; Request ID: 9d53552a-3d1b-47c8-984c-9a599d5c2391; Proxy: null)
1360
1363
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleErrorResponse(AmazonHttpClient.java:1819)
1361
1364
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleServiceErrorResponse(AmazonHttpClient.java:1403)
1362
1365
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.executeOneRequest(AmazonHttpClient.java:1372)
@@ -1392,12 +1395,11 @@ same on AWS console.
1392
1395
1393
1396
### com.amazonaws.services.kms.model.AWSKMSException: User: <User_ARN> is not authorized to perform : kms : GenerateDataKey on resource: <KEY_ID>
1394
1397
1395
- User doesn't have authorisation to the specific AWS KMS Key ID.
1398
+ User doesn't have authorization to the specific AWS KMS Key ID.
1396
1399
```
1397
- Caused by: com.amazonaws.services.kms.model.AWSKMSException: User: arn:aws
1398
- :iam::152813717728:user/<user> is not authorized to perform: kms
1399
- :GenerateDataKey on resource: <key_ID> (Service: AWSKMS; Status Code: 400
1400
- ; Error Code: AccessDeniedException; Request ID: 4ded9f1f-b245-4213-87fc-16cba7a1c4b9; Proxy: null)
1400
+ Caused by: com.amazonaws.services.kms.model.AWSKMSException:
1401
+ User: arn:aws:iam::152813717728:user/<user> is not authorized to perform: kms:GenerateDataKey on resource: <key_ID>
1402
+ (Service: AWSKMS; Status Code: 400; Error Code: AccessDeniedException; Request ID: 4ded9f1f-b245-4213-87fc-16cba7a1c4b9; Proxy: null)
1401
1403
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleErrorResponse(AmazonHttpClient.java:1819)
1402
1404
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.handleServiceErrorResponse(AmazonHttpClient.java:1403)
1403
1405
at com.amazonaws.http.AmazonHttpClient$RequestExecutor.executeOneRequest(AmazonHttpClient.java:1372)
@@ -1431,8 +1433,8 @@ Caused by: com.amazonaws.services.kms.model.AWSKMSException: User: arn:aws
1431
1433
The user trying to use the KMS Key ID should have the right permissions to access
1432
1434
(encrypt/decrypt) using the AWS KMS Key used via ` fs.s3a.server-side-encryption.key ` .
1433
1435
If not, then add permission(or IAM role) in "Key users" section by selecting the
1434
- AWS-KMS CMK Key on AWS console.
1435
-
1436
+ AWS-KMS CMK Key on AWS console.
1437
+
1436
1438
### <a name =" not_all_bytes_were_read " ></a > Message appears in logs "Not all bytes were read from the S3ObjectInputStream"
1437
1439
1438
1440
0 commit comments