@@ -14,19 +14,11 @@ also available, although in this case values must be manually encrypted and/or d
14
14
Client-side encryption and decryption should work against all versions of Cassandra and DSE. It does not
15
15
utilize any server-side functionality to do its work.
16
16
17
- WARNING: Consider upgrading to 3.28.0 or later
17
+ WARNING: Encryption format changes in 3.28.0
18
18
------------------------------------------------
19
- There is a significant issue with the column encryption functionality in Python driver 3.27.0.
20
- To be able to decrypt your data, you must preserve the cipher initialization vector (IV) used by
21
- the :class: `~.AES256ColumnEncryptionPolicy ` when your data was written.
22
- To decrypt your data, you must supply this IV when creating a policy to read this data.
23
- If you do not supply this IV in the policy to read this data, you will **NOT BE ABLE TO DECRYPT YOUR DATA **.
24
- See
25
- `PYTHON-1350 <https://datastax-oss.atlassian.net/browse/PYTHON-1350 >`_ for more detail.
26
-
27
- DataStax recommends upgrading to Python driver 3.28.0 or later to avoid this issue. 3.28.0 or later manages the IV automatically.
28
- Because of this change in functionality, any encrypted data written in 3.27.0 will **NOT ** be readable by 3.28.0 or later.
29
- After upgrading to Python driver 3.28.0 or later, it is critical that you re-encrypt your data with the new driver version.
19
+ Python driver 3.28.0 introduces a new encryption format for data written by :class: `~.AES256ColumnEncryptionPolicy `.
20
+ As a result, any encrypted data written by Python driver 3.27.0 will **NOT ** be readable.
21
+ If you upgraded from 3.27.0, you should re-encrypt your data with 3.28.0.
30
22
31
23
Configuration
32
24
-------------
0 commit comments