[ https://issues.apache.org/jira/browse/HADOOP-18850?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17784138#comment-17784138 ]
Steve Loughran commented on HADOOP-18850: ----------------------------------------- hey, think this is breaking my test runs on a bucket set up with SSE-KMS encryption. i will try and run from my IDE but think we'll need a followup. which must include the encryption string in the new assertion error message. {code} [ERROR] Tests run: 10, Failures: 2, Errors: 0, Skipped: 0, Time elapsed: 19.062 s <<< FAILURE! - in org.apache.hadoop.fs.s3a.scale.ITestS3AHugeFilesEncryption [ERROR] test_090_verifyRenameSourceEncryption(org.apache.hadoop.fs.s3a.scale.ITestS3AHugeFilesEncryption) Time elapsed: 0.547 s <<< FAILURE! java.lang.AssertionError: Invalid encryption configured at org.apache.hadoop.fs.s3a.scale.ITestS3AHugeFilesEncryption.assertEncrypted(ITestS3AHugeFilesEncryption.java:77) at org.apache.hadoop.fs.s3a.scale.AbstractSTestS3AHugeFiles.test_090_verifyRenameSourceEncryption(AbstractSTestS3AHugeFiles.java:640) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) at org.junit.internal.runners.statements.FailOnTimeout$CallableStatement.call(FailOnTimeout.java:299) at org.junit.internal.runners.statements.FailOnTimeout$CallableStatement.call(FailOnTimeout.java:293) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.lang.Thread.run(Thread.java:750) [ERROR] test_110_verifyRenameDestEncryption(org.apache.hadoop.fs.s3a.scale.ITestS3AHugeFilesEncryption) Time elapsed: 0.654 s <<< FAILURE! java.lang.AssertionError: Invalid encryption configured at org.apache.hadoop.fs.s3a.scale.ITestS3AHugeFilesEncryption.assertEncrypted(ITestS3AHugeFilesEncryption.java:77) at org.apache.hadoop.fs.s3a.scale.AbstractSTestS3AHugeFiles.test_110_verifyRenameDestEncryption(AbstractSTestS3AHugeFiles.java:696) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62) at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) at java.lang.reflect.Method.invoke(Method.java:498) at org.junit.runners.model.FrameworkMethod$1.runReflectiveCall(FrameworkMethod.java:59) at org.junit.internal.runners.model.ReflectiveCallable.run(ReflectiveCallable.java:12) at org.junit.runners.model.FrameworkMethod.invokeExplosively(FrameworkMethod.java:56) at org.junit.internal.runners.statements.InvokeMethod.evaluate(InvokeMethod.java:17) at org.junit.internal.runners.statements.RunBefores.evaluate(RunBefores.java:26) at org.junit.internal.runners.statements.RunAfters.evaluate(RunAfters.java:27) at org.junit.rules.TestWatcher$1.evaluate(TestWatcher.java:61) at org.junit.internal.runners.statements.FailOnTimeout$CallableStatement.call(FailOnTimeout.java:299) at org.junit.internal.runners.statements.FailOnTimeout$CallableStatement.call(FailOnTimeout.java:293) at java.util.concurrent.FutureTask.run(FutureTask.java:266) at java.lang.Thread.run(Thread.java:750) {code} > Enable dual-layer server-side encryption with AWS KMS keys (DSSE-KMS) > --------------------------------------------------------------------- > > Key: HADOOP-18850 > URL: https://issues.apache.org/jira/browse/HADOOP-18850 > Project: Hadoop Common > Issue Type: Sub-task > Components: fs/s3, security > Affects Versions: 3.4.0 > Reporter: Akira Ajisaka > Assignee: Viraj Jasani > Priority: Major > Labels: pull-request-available > Fix For: 3.4.0 > > > Add support for DSSE-KMS > https://docs.aws.amazon.com/AmazonS3/latest/userguide/specifying-dsse-encryption.html -- This message was sent by Atlassian Jira (v8.20.10#820010) --------------------------------------------------------------------- To unsubscribe, e-mail: common-issues-unsubscr...@hadoop.apache.org For additional commands, e-mail: common-issues-h...@hadoop.apache.org