8000 Create Fortanix config topic by Andriciuc · Pull Request #329 · percona/postgres · GitHub
[go: up one dir, main page]

Skip to content

Create Fortanix config topic #329

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 9 commits into from
Closed
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
updated with RC2
added RC2 information and added 1 small fix
  • Loading branch information
Andriciuc committed May 12, 2025
commit 31fd33c26758feb705213d47dcbdc352ff8b3993
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,6 @@
* System tables are currently not encrypted. This means that statistics data and database metadata are currently not encrypted.

* `pg_rewind` doesn't work with encrypted WAL for now. We plan to fix it in future releases.
* `pb_tde` Release candidate is incompatible with `pg_tde`Beta2 due to significant changes in code. There is no direct upgrade flow from one version to another. You must [uninstall](../how-to/uninstall.md) `pg_tde` Beta2 first and then [install](../install.md) and configure the new Release Candidate version.
* `pg_tde` Release candidate is incompatible with `pg_tde`Beta2 due to significant changes in code. There is no direct upgrade flow from one version to another. You must [uninstall](../how-to/uninstall.md) `pg_tde` Beta2 first and then [install](../install.md) and configure the new Release Candidate version.

[Versions and supported PostgreSQL deployments](supported-versions.md){.md-button}
36 changes: 18 additions & 18 deletions contrib/pg_tde/documentation/docs/release-notes/rc2.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,4 @@
<!-- robots: noindex, nofollow -->

# pg_tde Release Candidate ({{date.RC2}})
# pg_tde Release Candidate 2 ({{date.RC2}})
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should be a separate commit / PR, not related at fortanix at all.


`pg_tde` extension brings in [Transparent Data Encryption (TDE)](../index/index.md) to PostgreSQL and enables you to keep sensitive data safe and secure.

Expand All @@ -14,29 +12,31 @@ This release provides the following features and improvements:

The approach to WAL encryption has been redesigned. Now, `pg_tde` encrypts entire WAL files starting from the first WAL write after the server was started with the encryption turned on. The information about what is encrypted is stored in the internal key metadata. This change improves WAL encryption flow with native replication and increases performance for large scale databases.

* **Default encryption key for single-tenancy**.
It now supports the Vault keyring for secure key storage.

* **Automatic WAL key rotation**.

The new functionality allows you to set a default principal key for the entire database cluster. This key is used to encrypt all databases and tables that do not have a custom principal key set. This feature simplifies encryption configuration and management in single-tenant environments where each user has their own database instance.
A new automatic WAL key rotation occurs on server start. This ensures each server instance uses a fresh internal key for WAL encryption, improving cryptographic hygiene and reducing the risk of key reuse.

* **Ability to change key provider configuration**
* **Fixed external tablespace data loss with encrypted partitions**

You no longer need to configure a new key provider and set a new principal key if the provider's configuration changed. Now can change the key provider configuration both for the current database and the entire PostgreSQL cluster using [functions](../functions.md#key-provider-management). This enhancement lifts existing limitations and is a native and common way to operate in PostgreSQL.
An issue was fixed where data could be lost when the encrypted partitioned tables were moved to external tablespaces.

* **Key management permissions**
* **New visibility and verification functions for default principal keys**

The new functions allow you to manage permissions for global and database key management separately. This feature provides more granular control over key management operations and allows you to delegate key management tasks to different roles.
Added additional functions to help you verify and inspect the state of default principal keys more easily.

* **Additional information about principal keys and providers**
* **Restricted key provider configuration to superusers**

The new functions allow you to display additional information about principal keys and providers. This feature helps you to understand the current key configuration and troubleshoot issues related to key management.
The database owners can no longer configure key providers directly. Instead, they must refer to the superuser who manages the provider setup. This security improvement clearly separates the responsibilities between users and administrators.

* **`tde_heap_basic` access method deprecation**

The `tde_heap_basic` access method has limitations in encryption capabilities and affects performance. Also, it poses a potential security risk when used in production environments due to indexes remaining unencrypted. Considering all the above, we decided to deprecate this access method and remove it in future releases. Use the `tde_heap` access method instead that is available with Percona Server for PostgreSQL 17 - a drop-in replacement for PostgreSQL Community.

## Upgrade considerations

`pg_tde` Release Candidate is not backward compatible with `pg_tde` Beta2 due to significant changes in code. This means you cannot directly upgrade from one version to another. You must [uninstall](../how-to/uninstall.md) `pg_tde` Beta2 first and then [install](../install.md) and configure the new Release Candidate version.
`pg_tde` Release Candidate 2 is not backward compatible with `pg_tde` Beta2 due to significant changes in code. This means you cannot directly upgrade from one version to another. You must [uninstall](../how-to/uninstall.md) `pg_tde` Beta2 first and then [install](../install.md) and configure the new Release Candidate version.

## Known issues

Expand All @@ -55,17 +55,17 @@ This release provides the following features and improvements:

### New Features

* [PG-1234](https://perconadev.atlassian.net/browse/PG-1234) - Added functions for separate global and database key management permissions.
[PG-830]() – Added support for full WAL encryption using Vault keyring, significantly improving data security in transit.

* [PG-1255](https://perconadev.atlassian.net/browse/PG-1255) - Added functionality to delete key providers.
[PG-1460] – Enabled automatic rotation of WAL internal keys on server startup for improved cryptographic hygiene.

* [PG-1256](https://perconadev.atlassian.net/browse/PG-1256) - Added single-tenant support via the default principal key functionality.
[PG-1455] – Introduced random base numbers to encryption IVs to enhance uniqueness and security.

* [PG-1258](https://perconadev.atlassian.net/browse/PG-1258) - Added functions to display additional information about principal keys / providers.
[PG-1506] – Added a new parameter for passing client certificates while registering a KMIP provider.

* [PG-1294](https://perconadev.atlassian.net/browse/PG-1294) - Redesigned WAL encryption.
[PG-1458] – Added missing information and verification functions for default principal keys.

* [PG-1303](https://perconadev.atlassian.net/browse/PG-1303) - Deprecated tde_heap_basic access method.
[PG-1304] – Removed the deprecated tde_heap_basic access method in preparation for GA.

## Improvements

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@

`pg_tde` extension brings in [Transparent Data Encryption (TDE)](../index/index.md) to PostgreSQL and enables you to keep sensitive data safe and secure.

* [pg_tde Release Candidate 2 {{date.RC}}](rc2.md)
* [pg_tde Release Candidate {{date.RC}}](rc.md)
* [pg_tde Beta2 (2024-12-16)](beta2.md)
* [pg_tde Beta (2024-06-30)](beta.md)
Expand Down
6 changes: 3 additions & 3 deletions contrib/pg_tde/documentation/variables.yml
Original file line number Diff line number Diff line change
@@ -1,9 +1,9 @@
#Variables used throughout the docs

release: 'RC'
pgversion17: '17.4'
release: 'RC2'
pgversion17: '17.5.1'
tdebranch: TDE_REL_17_STABLE

date:
RC2:
RC2: '2025-05-14'
RC: '2025-03-27'
0