Skip to content

Commit ad80ac2

Browse files
authored
Documentation: standardized headers + pg_waldump cleanup (#406)
Headers now do not have `pg_tde` mentioned (removed ``) and improved the text flow of pg_waldump. Other minor text fixes and linting done.
1 parent ca790cd commit ad80ac2

File tree

5 files changed

+13
-18
lines changed

5 files changed

+13
-18
lines changed

contrib/pg_tde/documentation/docs/architecture/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -175,7 +175,7 @@ For such situations, `pg_tde` also provides [command line tools](../command-line
175175

176176
## User interface
177177

178-
### Setting up `pg_tde`
178+
### Setting up pg_tde
179179

180180
To use `pg_tde`, users are required to:
181181

contrib/pg_tde/documentation/docs/command-line-tools/pg-waldump.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,9 @@
44

55
To read encrypted WAL records, `pg_waldump` supports the following additional arguments:
66

7-
* `keyring_path`: the directory where keyring configuration files for WAL are stored. These files include:
8-
* `1664_keys`
9-
* `1664_providers`
7+
* `keyring_path` is the directory where the keyring configuration files for WAL are stored. The following files are included:
8+
* `1664_keys`
9+
* `1664_providers`
1010

1111
!!! note
12-
13-
`pg_waldump` will not decrypt WAL unless the `keyring_path` is set.
12+
`pg_waldump` does not decrypt WAL unless the `keyring_path` is set.

contrib/pg_tde/documentation/docs/faq.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ Thus, to protect your sensitive data, consider using TDE to encrypt it at the ta
6161
* Regular monitoring and auditing
6262
* Additional data protection for sensitive fields (e.g., application-layer encryption)
6363

64-
## How does `pg_tde` make my data safe?
64+
## How does pg_tde make my data safe?
6565

6666
`pg_tde` uses two keys to encrypt data:
6767

@@ -106,7 +106,7 @@ Consider encrypting only tables that store sensitive data. You can decide what t
106106

107107
We advise encrypting the whole database only if all your data is sensitive, like PII, or if there is no other way to comply with data safety requirements.
108108

109-
## What cipher mechanisms are used by `pg_tde`?
109+
## What cipher mechanisms are used by pg_tde?
110110

111111
`pg_tde` currently uses a AES-CBC-128 algorithm. First the internal keys in the datafile are encrypted using the principal key with AES-CBC-128, then the file data itself is again encrypted using AES-CBC-128 with the internal key.
112112

@@ -141,7 +141,7 @@ After that, no database restart is required. When you create or alter the table
141141

142142
If you lose encryption keys, especially, the principal key, the data is lost. That's why it's critical to back up your encryption keys securely and use the Key Management service for key management.
143143

144-
## Can I use `pg_tde` in a multi-tenant setup?
144+
## Can I use pg_tde in a multi-tenant setup?
145145

146146
Multi-tenancy is the type of architecture where multiple users, or tenants, share the same resource. It can be a database, a schema or an entire cluster.
147147

@@ -159,6 +159,6 @@ Since the encryption happens on the database level, it makes no difference for y
159159

160160
To restore from an encrypted backup, you must have the same principal encryption key, which was used to encrypt files in your backup.
161161

162-
## I'm using OpenSSL in FIPS mode and need to use `pg_tde`. Does `pg_tde` comply with FIPS requirements? Can I use my own FIPS-mode OpenSSL library with `pg_tde`?
162+
## I'm using OpenSSL in FIPS mode and need to use pg_tde. Does pg_tde comply with FIPS requirements? Can I use my own FIPS-mode OpenSSL library with pg_tde?
163163

164164
Yes. `pg_tde` works with the FIPS-compliant version of OpenSSL, whether it is provided by your operating system or if you use your own OpenSSL libraries. If you use your own libraries, make sure they are FIPS certified.

contrib/pg_tde/documentation/docs/functions.md

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ However, database owners can run the “view keys” and “set principal key”
1515

1616
A key provider is a system or service responsible for managing encryption keys. `pg_tde` supports the following key providers:
1717

18-
* local file (not for production use)
18+
* local file (not recommended for production use)
1919
* Hashicorp Vault / OpenBao
2020
* KMIP compatible providers
2121

@@ -26,7 +26,7 @@ Key provider management includes the following operations:
2626
* deleting a key provider,
2727
* listing key providers.
2828

29-
### Add a provider
29+
### Add a key provider
3030

3131
You can add a new key provider using the provided functions, which are implemented for each provider type.
3232

@@ -35,7 +35,7 @@ There are two functions to add a key provider: one function adds it for the curr
3535
* `pg_tde_add_database_key_provider_<type>('provider-name', <provider specific parameters>)`
3636
* `pg_tde_add_global_key_provider_<type>('provider-name', <provider specific parameters>)`
3737

38-
When you add a new provider, the provider name must be unqiue in the scope. But a local database provider and a global provider can have the same name.
38+
When you add a new provider, the provider name must be unique in the scope. But a local database provider and a global provider can have the same name.
3939

4040
### Change an existing provider
4141

@@ -106,8 +106,6 @@ where:
106106
* `secret_token_path` is a path to the file that contains an access token with read and write access to the above mount point
107107
* **[optional]** `ca_path` is the path of the CA file used for SSL verification
108108

109-
110-
111109
#### Adding or modifying KMIP providers
112110

113111
The KMIP provider uses a remote KMIP server.
@@ -167,7 +165,6 @@ where:
167165
!!! note
168166
The specified access parameters require permission to read and write keys at the server.
169167

170-
171168
### Adding or modifying local keyfile providers
172169

173170
This provider manages database keys using a local keyfile.
@@ -210,7 +207,6 @@ where:
210207
* `provider-name` is the name of the provider. You can specify any name, it's for you to identify the provider.
211208
* `/path/to/the/key/provider/data.file` is the path to the key provider file.
212209

213-
214210
### Delete a provider
215211

216212
These functions delete an existing provider in the current database or in the global scope:

contrib/pg_tde/documentation/docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# `pg_tde` Documentation
1+
# pg_tde Documentation
22

33
`pg_tde` is the open source, community driven and futureproof PostgreSQL extension that provides Transparent Data Encryption (TDE) to protect data at rest. `pg_tde` ensures that the data stored on disk is encrypted, and that no one can read it without the proper encryption keys, even if they gain access to the physical storage media.
44

0 commit comments

Comments
 (0)