-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add raw flag when replicating encrypted datasets #26
Conversation
Glad this is working for you. I haven't done any testing, but there could be problem with systems that don't yet support encryption like perhaps some older but still supported Debian systems and FreeBSD 12.x. I think we could test whether the pool supports encryption with something like I'll push my work-in-progress branch (based on a patch David Samms emailed me). If you have the time and motivation any suggestions would be appreciated. |
I thought about just adding |
Compression could be a problem to deal with now that it's a separate argument. I have to do lots of testing to confirm everything, but $job is very busy right now and for the next month or two. I just pushed what I have. |
If you are able to test this on a system that doesn't support encryption (FreeBSD 12.2) and run it through https://www.shellcheck.net/, then I think we could merge. |
I just pushed a version to the Thanks, Joe |
I like checking feature flags, but I just wanted to be sure it would not introduce issues to always use Since feature flags are being used for raw sends, why not also detect if compression is active and only add the |
We could do that. If I'm recalling correctly, the By the way, for raw sending, I ended up doing some tests myself and releasing If you do have time and motivation, a PR for issue #19 (or #9 or #11) would be welcomed. I won't have time to tackle any of those issues until the fall. Thanks, Joe |
Adds
-w
tozfs send
when the dataset is encrypted. This is required to send encrypted datasets without having the key loaded and to keep that key set on the receiving side.I do not see a reason to prevent the flag from being added, so I did not add an argument to
zap
to do so—having an encrypted dataset and then sending it unencrypted after they key was loaded sounds pretty weird. It is possible to do but I don't know why anyone would want to.I still prefer
zap
for its simplicity over more robust solutions... With this PR, I can finally usezap
in production on Linux 🎉