Details
-
Type:
Bug
-
Status: Closed (View Workflow)
-
Priority:
Minor
-
Resolution: Not a Bug
-
Affects Version/s: 10.1.23
-
Fix Version/s: N/A
-
Component/s: Plugin - AWS key management
-
Labels:None
Description
Encryption management messages shouldn't be exposed to Users who execute SQL commands.
MariaDB [test]> create table test.t1(a int) encryption_key_id=2;
|
Query OK, 0 rows affected, 2 warnings (1.44 sec)
|
MariaDB [test]> show warnings;
|
+-------+------+---------------------------------------------------------------------+
|
| Level | Code | Message |
|
+-------+------+---------------------------------------------------------------------+
|
| Note | 1105 | AWS KMS plugin: generated encrypted datakey for key id=2, version=1 |
|
| Note | 1105 | AWS KMS plugin: loaded key 2, version 1, key length 128 bit |
|
+-------+------+---------------------------------------------------------------------+
|
2 rows in set (0.00 sec)
|
Another example:
MariaDB [(none)]> select * from test.t1;
|
Empty set, 1 warning (0.28 sec) |
 |
MariaDB [(none)]> show warnings;
|
+-------+------+-------------------------------------------------------------+
|
| Level | Code | Message |
|
+-------+------+-------------------------------------------------------------+
|
| Note | 1105 | AWS KMS plugin: loaded key 2, version 1, key length 128 bit | |
+-------+------+-------------------------------------------------------------+
|
1 row in set (0.00 sec |