-
Notifications
You must be signed in to change notification settings - Fork 502
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature: enable column encryption at the TDS level #265
Comments
@simenfd Can you link to official docs in the TDS documentation? |
They use AES-256 with CBC and HMAC with SHA-512 for column encryption. |
parameter "Column Encryption Setting=enabled" is woking? package main import (
) var db *sql.DB var server = "" // Always Encrypted func main() {
} func ReadaeTest1() (int, error) {
} |
Any update on adding support for Column Level Encryption to tds.go? thanks! |
Github-fix: denisenkom#265 Signed-off-by: Nicolas Sebrecht <[email protected]>
…ql (denisenkom#265) * Fix in the URL parser with go 1.12.8 and github.com/go-sql-driver/mysql Change schemeFromURL to just split the url by :// to find the scheme. It's not required to parse the whole URL. MySQL DSNs aren't valid URLs. Fixes denisenkom#264 * The mysql driver itself also used net/url.Parse * Also fix TestPasswordUnencodedReservedURLChars * Keep backwards compatibility with url encoded username and passwords * Fix suggestions * Reuse old function names
Hello everyone, this feature is now implemented (check the related PR). At the moment only support for decryption is available though. cc/ @rcscoggin , @simenfd |
I've started a more extensive AE implementation in the Microsoft fork and welcome feedback. We're starting with decryption using local certs or Azure Key Vault then expanding to encryption. microsoft#116 |
Information about the Get() errors included in the documentation
This might not be an issue, as much as it is a missing feature:
It seems like sql server has a feature called "always encrypted" which can be enabled by writing "Column Encryption Setting=enabled;" in the connection string. The idea is that the driver pulls some keys from a certificate and automatically decrypts the encrypted columns. Currently, this is not working with this driver.
The text was updated successfully, but these errors were encountered: